[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2307729.2307769acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

Data integration from open internet sources to combat sex trafficking of minors

Published: 04 June 2012 Publication History

Abstract

Sex trafficking is the process and means of using force, fraud, or coercion to obtain and compel men, women and children into commercial sexual exploitation. Prevalent in both international and domestic spheres, this form of human trafficking constitutes a serious crime. Traffickers use a variety of means to advertise the illicit sexual services of the children and women they offer, including Internet classified ads, bulletin boards, and social media associated with escort and massage services (EMS). Clients ("johns") of the EMS fronts for prostitution also use the Internet and social media to compare their experiences and offer leads to one another. Law enforcement organizations have implemented a number of initiatives to combat child sexual trafficking. We describe a prototype law enforcement support system developed to automatically compile and correlate information from open Internet sources about trafficking and sexual abuse of women and especially children. The system, called TrafficBot, employs information retrieval, information integration, and natural language technologies to build a data warehouse allowing various visualizations of information for the benefit of law enforcement. We discuss the current capabilities of TrafficBot, how it could be used by law enforcement, and suggest some future directions.

References

[1]
Bird, Steven, Klein, Ewan, and Loper, Edward. 2009. Natural Language Processing with Python --- Analyzing Text with the Natural Language Toolkit. O'Reilly Media, Sebastopol, CA,. Also available at <http://www.nltk.org>
[2]
boyd, danah, Casteel, Heather, Thakor Mitali, and Johnson, Rane. 2011. Human Trafficking and Technology: A framework for understanding the role of technology in the commercial sexual exploitation of children in the U. S. Microsoft Research, Cambridge, MA.
[3]
De Fabrique, Nathalie, Stephen J. Romano, Gregory M. Vecchi, and Vincent B. Van Hasselt. 2007. Understanding Stockholm Syndrome. FBI Law Enforcement Bulletin (July 2007), 10--15.
[4]
FBI, 2008. FBI --- Initiatives. http://www.fbi.gov/about-us/investigate/civilrights/human_trafficking/initiatives. Accessed 9 Apr. 2012
[5]
FBI, 2012. FBI --- Innocence Lost. http://www.fbi.gov/about-us/investigate/vc_majorthefts/cac/innocencelost. Accessed 9 Apr. 2012.
[6]
U.S. Department of State. 2012. Human Smuggling and Trafficking. http://www.state.gov/m/ds/hstcenter/. Accessed 9 Apr. 2012.
[7]
Joachims, Thorsten. 1999. Making large-Scale SVM Learning Practical. In Advances in Kernel Methods - Support Vector Learning, B. Schölkopf, C. Burges and A. Smola, Eds. MIT Press, Cambridge, MA.
[8]
Latonero, Mark. September 2011. Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds. Technical Report. USC Annenberg School for Communication.
[9]
Muslea, Ion, Minton, Steve, and Knoblock, Craig. 1999. A Hierarchical Approach to Wrapper Induction. In Proceedings of the Third International Conference on Autonomous Agents, Seattle, WA, May 1999, Oren Etzioni, Jörg P. Müller, and Jeffrey M. Bradshaw, Eds. ACM, New York, NY.
[10]
U.S. Department of Justice, Civil Rights Division, 2006. Report on Activities to Combat Human Trafficking Fiscal Years 2001--2005.
[11]
U.S. Department of State, 2012. What is Modern Slavery? http://www.state.gov/j/tip/what/index.htm. Accessed 9 Apr. 2012.
[12]
Human Smuggling and Trafficking Center. 2008. Domestic Human Trafficking: An Internal Issue. Technical Report. Human Smuggling and Trafficking Center, Washington, DC.
[13]
Walker-Rodriguez, Amanda, and Rodney Hill, 2011. FBI --- Human Sex Trafficking. http://www.fbi.gov/stats-services/publications/law-enforcement-bulletin/march_2011/human_sex_trafficking. Accessed Apr. 2012.
[14]
Woolf, Linda M, 2012. Women and Global Human Rights. http://www.webster.edu/~woolflm/trafficking.html. Accessed 9 Apr. 2012.

Cited By

View all
  • (2024)"Just Like, Risking Your Life Here": Participatory Design of User Interactions with Risk Detection AI to Prevent Online-to-Offline Harm Through Dating AppsProceedings of the ACM on Human-Computer Interaction10.1145/36869068:CSCW2(1-41)Online publication date: 8-Nov-2024
  • (2023)Predicting Cyber-Trafficking Websites Using a Naive Bayes Algorithm, Logistic Regression, KNN, and SVM6th International Conference on Signal Processing and Information Communications10.1007/978-3-031-43781-6_6(61-71)Online publication date: 11-Nov-2023
  • (2022)Operations research and analytics to combat human trafficking: A systematic review of academic literaturePLOS ONE10.1371/journal.pone.027370817:8(e0273708)Online publication date: 29-Aug-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
dg.o '12: Proceedings of the 13th Annual International Conference on Digital Government Research
June 2012
324 pages
ISBN:9781450314039
DOI:10.1145/2307729
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Elsevier
  • iSchool: College of Information Studies, University of Maryland
  • iPAC: Information Policy and Access Center

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 June 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. child trafficking
  2. information integration
  3. law enforcement
  4. natural language processing
  5. sex trafficking

Qualifiers

  • Research-article

Conference

dg.o '12
Sponsor:
  • iSchool
  • iPAC

Acceptance Rates

Overall Acceptance Rate 150 of 271 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)31
  • Downloads (Last 6 weeks)8
Reflects downloads up to 10 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)"Just Like, Risking Your Life Here": Participatory Design of User Interactions with Risk Detection AI to Prevent Online-to-Offline Harm Through Dating AppsProceedings of the ACM on Human-Computer Interaction10.1145/36869068:CSCW2(1-41)Online publication date: 8-Nov-2024
  • (2023)Predicting Cyber-Trafficking Websites Using a Naive Bayes Algorithm, Logistic Regression, KNN, and SVM6th International Conference on Signal Processing and Information Communications10.1007/978-3-031-43781-6_6(61-71)Online publication date: 11-Nov-2023
  • (2022)Operations research and analytics to combat human trafficking: A systematic review of academic literaturePLOS ONE10.1371/journal.pone.027370817:8(e0273708)Online publication date: 29-Aug-2022
  • (2022)Foregrounding Women's Safety in Mobile Social Matching and Dating AppsProceedings of the ACM on Human-Computer Interaction10.1145/35675597:GROUP(1-25)Online publication date: 29-Dec-2022
  • (2022)Ethical Tensions in Applications of AI for Addressing Human Trafficking: A Human Rights PerspectiveProceedings of the ACM on Human-Computer Interaction10.1145/35551866:CSCW2(1-29)Online publication date: 11-Nov-2022
  • (2021)Identifying human trafficking indicators in the UK online sex marketTrends in Organized Crime10.1007/s12117-021-09431-027:1(10-33)Online publication date: 17-Sep-2021
  • (2020)Natural Language-based Integration of Online Review Datasets for Identification of Sex Trafficking Businesses2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI)10.1109/IRI49571.2020.00044(259-264)Online publication date: Aug-2020
  • (2018)Organised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime onlineSecurity Informatics10.1186/s13388-018-0032-87:1Online publication date: 13-Dec-2018
  • (2018)Illicit, Hidden Advertisements on Twitter2018 International Conference on eDemocracy & eGovernment (ICEDEG)10.1109/ICEDEG.2018.8372370(317-321)Online publication date: Apr-2018
  • (2017)Technologies and Social Justice Outcomes in Sex Work CharitiesProceedings of the 2017 CHI Conference on Human Factors in Computing Systems10.1145/3025453.3025615(3352-3364)Online publication date: 2-May-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media