10 research outputs found

    Using Contexts and Constraints for Improved Geotagging of Human Trafficking Webpages

    Full text link
    Extracting geographical tags from webpages is a well-motivated application in many domains. In illicit domains with unusual language models, like human trafficking, extracting geotags with both high precision and recall is a challenging problem. In this paper, we describe a geotag extraction framework in which context, constraints and the openly available Geonames knowledge base work in tandem in an Integer Linear Programming (ILP) model to achieve good performance. In preliminary empirical investigations, the framework improves precision by 28.57% and F-measure by 36.9% on a difficult human trafficking geotagging task compared to a machine learning-based baseline. The method is already being integrated into an existing knowledge base construction system widely used by US law enforcement agencies to combat human trafficking.Comment: 6 pages, GeoRich 2017 workshop at ACM SIGMOD conferenc

    A Survey of Operations Research and Analytics Literature Related to Anti-Human Trafficking

    Full text link
    Human trafficking is a compound social, economic, and human rights issue occurring in all regions of the world. Understanding and addressing such a complex crime requires effort from multiple domains and perspectives. As of this writing, no systematic review exists of the Operations Research and Analytics literature applied to the domain of human trafficking. The purpose of this work is to fill this gap through a systematic literature review. Studies matching our search criteria were found ranging from 2010 to March 2021. These studies were gathered and analyzed to help answer the following three research questions: (i) What aspects of human trafficking are being studied by Operations Research and Analytics researchers? (ii) What Operations Research and Analytics methods are being applied in the anti-human trafficking domain? and (iii) What are the existing research gaps associated with (i) and (ii)? By answering these questions, we illuminate the extent to which these topics have been addressed in the literature, as well as inform future research opportunities in applying analytical methods to advance the fight against human trafficking.Comment: 28 pages, 6 Figures, 2 Table

    Why are You Here? Modeling Illicit Massage Business Location Characteristics with Machine Learning

    Get PDF
    Illicit massage businesses are a venue for sex and labor trafficking in the United States. Though many of their locations are made publicly available through online advertising, little is known about why they choose to locate where they do. In this work, we use inferential modeling to better understand the spatial distribution of illicit massage businesses within the U.S. Based on addresses web-scraped weekly from online advertisements over 6 months, we modeled illicit massage business prevalence at the census tract and county levels. We used publicly available data to characterize census tracts and counties, finding that the state in which they are located, distance to international airports, rent and income levels, racial composition, and religious presence all had significant relationships to illicit massage business presence. Illicit massage businesses operating with unethical labor practices and/or forced sexual services are not in line with just, peaceful, and inclusive societal goals, and the burdens of this industry disproportionately fall on women. While we emphasize that not all illicit massage businesses are settings of human trafficking, better understanding this industry is a key step toward better regulating it and protecting those harmed within it

    Trustworthiness in Social Big Data Incorporating Semantic Analysis, Machine Learning and Distributed Data Processing

    Get PDF
    This thesis presents several state-of-the-art approaches constructed for the purpose of (i) studying the trustworthiness of users in Online Social Network platforms, (ii) deriving concealed knowledge from their textual content, and (iii) classifying and predicting the domain knowledge of users and their content. The developed approaches are refined through proof-of-concept experiments, several benchmark comparisons, and appropriate and rigorous evaluation metrics to verify and validate their effectiveness and efficiency, and hence, those of the applied frameworks

    Cybersecurity

    Get PDF
    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world. Offering practical guidance for addressing contemporary risks, the book is organized into three sections: Global Trends—considers international e-government trends, includes case studies of common cyber threats and presents efforts of the premier global institution in the field National and Local Policy Approaches—examines the current policy environment in the United States and Europe and illustrates challenges at all levels of government Practical Considerations—explains how to prepare for cyber attacks, including an overview of relevant U.S. Federal cyber incident response policies, an organizational framework for assessing risk, and emerging trends Also suitable for classroom use, this book will help you understand the threats facing your organization and the issues to consider when thinking about cybersecurity from a policy perspective

    The Palgrave Handbook of Digital Russia Studies

    Get PDF
    This open access handbook presents a multidisciplinary and multifaceted perspective on how the ‘digital’ is simultaneously changing Russia and the research methods scholars use to study Russia. It provides a critical update on how Russian society, politics, economy, and culture are reconfigured in the context of ubiquitous connectivity and accounts for the political and societal responses to digitalization. In addition, it answers practical and methodological questions in handling Russian data and a wide array of digital methods. The volume makes a timely intervention in our understanding of the changing field of Russian Studies and is an essential guide for scholars, advanced undergraduate and graduate students studying Russia today

    The Palgrave Handbook of Digital Russia Studies

    Get PDF
    This open access handbook presents a multidisciplinary and multifaceted perspective on how the ‘digital’ is simultaneously changing Russia and the research methods scholars use to study Russia. It provides a critical update on how Russian society, politics, economy, and culture are reconfigured in the context of ubiquitous connectivity and accounts for the political and societal responses to digitalization. In addition, it answers practical and methodological questions in handling Russian data and a wide array of digital methods. The volume makes a timely intervention in our understanding of the changing field of Russian Studies and is an essential guide for scholars, advanced undergraduate and graduate students studying Russia today

    Dictionary of privacy, data protection and information security

    Get PDF
    The Dictionary of Privacy, Data Protection and Information Security explains the complex technical terms, legal concepts, privacy management techniques, conceptual matters and vocabulary that inform public debate about privacy. The revolutionary and pervasive influence of digital technology affects numerous disciplines and sectors of society, and concerns about its potential threats to privacy are growing. With over a thousand terms meticulously set out, described and cross-referenced, this Dictionary enables productive discussion by covering the full range of fields accessibly and comprehensively. In the ever-evolving debate surrounding privacy, this Dictionary takes a longer view, transcending the details of today''s problems, technology, and the law to examine the wider principles that underlie privacy discourse. Interdisciplinary in scope, this Dictionary is invaluable to students, scholars and researchers in law, technology and computing, cybersecurity, sociology, public policy and administration, and regulation. It is also a vital reference for diverse practitioners including data scientists, lawyers, policymakers and regulators
    corecore