87
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Improving Sex Trafficking Victim Identification: Indicators of Trafficking in Online Escort Ads

ORCID Icon, , , , &

References

  • Allison, P. D. (2002). Missing data. SAGE Publications, Inc. https://doi.org/10.4135/9781412985079
  • Allow States and Victims to Fight Online Sex Trafficking Act of 2017 (FOSTA). Pub. L. 115–164, 132 stat. 1253, codified as amended at 47 U.S.C. 230. https://www.congress.gov/bill/115th-congress/house-bill/1865
  • Alvari, H., Shakarian, P., & Snyder, J. K. (2016, September). A non-parametric learning approach to identify online human trafficking. Proceedings of the 2016 IEEE Conference on Intelligence and Security Informatics (ISI) (pp. 133–138). IEEE. https://doi.org/10.1109/ISI.2016.7745456
  • Alvari, H., Shakarian, P., & Snyder, J. K. (2017). Semi-supervised learning for detecting human trafficking. Security Informatics, 6(1), 1. https://doi.org/10.1186/s13388-017-0029-8
  • Anthony, B. (2018). On-ramps, intersections, and exit routes: A roadmap for systems and industries to prevent and disrupt human trafficking. Polaris. https://polarisproject.org/on-ramps-intersections-and-exit-routes/
  • Bollen, K. A. (2002). Latent variables in psychology and the social sciences. Annual Review of Psychology, 53(1), 605–634. https://doi.org/10.1146/annurev.psych.53.100901.135239
  • Bouché, V. (2015). A report on the use of technology to recruit, groom and sell domestic minor sex trafficking victims. Thorn. https://www.thorn.org/wp-content/uploads/2015/02/Survivor_Survey_r5.pdf
  • Bouché, V. (2018). Survivor insights: The role of technology in domestic minor sex trafficking. Thorn. https://www.thorn.org/wp-content/uploads/2018/06/Thorn_Survivor_Insights_061118.pdf
  • Cafarella, M., DeAngelo, G., Dunnmon, J., Minh-Ai Vo-Phamhi, J., & Re, C. (2021). Predicting sex trafficking in online advertisements. Working paper.
  • Cheung, K. K. C., & Tai, K. W. H. (2021). The use of intercoder reliability in qualitative interview data analysis in science education. Research in Science & Technological Education, 41(3), 1155–1175. https://doi.org/10.1080/02635143.2021.1993179
  • Citron, D. K., & Franks, M. A. (2020). The internet as a speech machine and other myths confounding section 230 reform. U Chi. Legal F., 45. https://doi.org/10.2139/ssrn.3532691
  • Couch, C. (2016, September 21). How artificial intelligence can stop sex trafficking. NOVA. https://www.pbs.org/wgbh/nova/article/sex-trafficking/
  • Coxen, J. O., Castro, V., Carr, B., Bredin, G., & Guikema, S. (2023). COVID-19 pandemic’s impact on online sex advertising and sex trafficking. Journal of Human Trafficking, 1–18. https://doi.org/10.1080/23322705.2023.2215362
  • Dank, M., Khan, B., Downey, P. M., Kotonias, C., Mayer, D., Owens, C., Pacifici, L., & Yu, L. (2014). Estimating the size and structure of the underground commercial sex economy in eight major U.S. cities. Urban Institute. https://www.urban.org/research/publication/estimating-size-and-structure-underground-commercial-sex-economy-eight-major-us-cities
  • Dank, M., Yahner, J., Madden, K., Banuelos, I., Yu, L., Ritchie, A., Mora, M., & Conner, B. (2015). Surviving the streets of New York: Experiences of LGBTQ youth, YMSM, and YWSW engaged in survival sex. Urban Institute. https://www.urban.org/research/publication/surviving-streets-new-york-experiences-lgbtq-youth-ymsm-and-ywsw-engaged-survival-sex
  • Frank, M. J., & Terwilliger, G. Z. (2015). Gang-controlled sex trafficking. Virginia Journal of Criminal Law, 3, 434.
  • George, A. L., & Bennett, A. (2005). Case studies and theory development in the social sciences. MIT Press.
  • Gerassi, L. B., Cruys, C., Hendry, N., & Del Carmen Rosales, M. (2023). How do providers assess young people for risk of sex trafficking? Observed indicators, follow-up, and assessment questions from a sample of social service providers. Children and Youth Services Review, 148, 106906. https://doi.org/10.1016/j.childyouth.2023.106906
  • Goldman, E. (2018). The complicated story of FOSTA and section 230. First Amendment Law Review, 17, 279. https://heinonline.org/HOL/LandingPage?handle=hein.journals/falr17&div=17&id=&page=
  • Hayden, T. C. (2014). ”A content analysis of Backpage.com advertisements in Louisville, Kentucky”. Sixth Annual Interdisciplinary Conference on Human Trafficking 2014. http://digitalcommons.unl.edu/humtrafcon6/10
  • Hultgren, M., Jennex, M. E., Persano, J., & Ornatowski, C. (2016, January). Using knowledge management to assist in identifying human sex trafficking. 2016 49th Hawaii International Conference on System Sciences (HICSS) (pp. 4344–4353). IEEE. https://doi.org/10.1109/HICSS.2016.539
  • Ibanez, M., & Suthers, D. D. (2016, August). Detecting covert sex trafficking networks in virtual markets. Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (pp. 876–879). IEEE. https://ieeexplore.ieee.org/abstract/document/7752340
  • Kejriwal, M., Ding, J., Shao, R., Kumar, A., & Szekely, P. (2017). Flagit: A system for minimally supervised human trafficking indicator mining. Proceedings of the 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA. https://doi.org/10.48550/arXiv.1712.03086
  • Kennedy, E. (2022). Technology and human trafficking in human trafficking: Interdisciplinary perspectives. In Mary Burke (Eds.), Chapter 15 (3rd ed. 299–327). Routledge.
  • Landis, J. R., & Koch, G. G. (1977). An application of hierarchical kappa-type statistics in the assessment of majority agreement among multiple observers. Biometrics Bulletin, 33(2), 363–374. https://doi.org/10.2307/2529786
  • Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. University of Southern California, Center on Communication Leadership & Policy. https://doi.org/10.2139/ssrn.2045851
  • Lee, M. C., Vajiac, C., Kulshrestha, A., Levy, S., Park, N., Jones, C., & Faloutsos, C. (2021, April). InfoShield: Generalizable information-theoretic human-trafficking detection. 2021 IEEE 37th International Conference on Data Engineering (ICDE), Chania, Greece (pp. 1116–1127).
  • Liemontas, M., & Huibregtse, M. (2020). A baseline assessment: Analysis of women Escort advertisements posted on Backpage.com in Madison, WI. http://digital.library.wisc.edu/1793/80835
  • Moorman, J. D., & Harrison, K. (2016). Gender, race, and risk: Intersectional risk management in the sale of sex online. The Journal of Sex Research, 53(7), 816–824. https://doi.org/10.1080/00224499.2015.1065950
  • Nagpal, C., Miller, K., Boecking, B., & Dubrawski, A. (2017). An entity resolution approach to isolate instances of human trafficking online. https://doi.org/10.48550/arXiv.1509.06659
  • National Academies of Sciences, Engineering, and Medicine. (2018). Modernizing crime statistics: Report 2: New systems for measuring crime. The National Academies Press. https://doi.org/10.17226/25035
  • Nylund-Gibson, K., & Choi, A. Y. (2018). Ten Frequently asked questions about latent class analysis. Translational Issues in Psychological Science, 4(4), 440–461. https://doi.org/10.1037/tps0000176
  • Pardes, A. (2018, February 1). The WIRED guide to emoji. Wired. https://www.wired.com/story/guide-emoji/
  • Robles, C. S. (2021). Section 230 is not broken: Why most proposed section 230 Reforms Will Do More Harm Than Good, and how the Ninth Circuit got it right. FIU Law Review, 16(1), 213. https://doi.org/10.25148/lawrev.16.1.15
  • Roe-Sepowitz, D., Hickle, K., Gallagher, J., Smith, J., & Hedberg, E. (2013). Invisible offenders: A study estimating online sex customers. Arizona State University. https://www.thorn.org/wp-content/uploads/2015/02/Final-Research-Report-Invisible-Offenders-ASU-Study.pdf.
  • Rostami, A., & Mondani, H.(2015). The complexity of crime network data: A case study of its consequences for crime control and the study of networks. Public Library of Science ONE, 10(3), e0119309. https://doi.org/10.1371/journal.pone.0119309
  • Sabatier, P. A., & Weible, C. M. (2019). The advocacy coalition framework: Innovations and clarifications. In P. Sabatier (Ed.), Theories of the policy process, second edition (pp. 189–220). Routledge.
  • Seltman, H. (2018). Experimental design and analysis. Carnegie Mellon University. http://www.stat.cmu.edu/~hseltman/309/Book/Book.pdf
  • Stylianou, A., Xuan, H., Shende, M., Brandt, J., Souvenir, R., & Pless, R. (2019). Hotels-50K: A global hotel recognition data set. Proceedings of the AAAI Conference on Artificial Intelligence, 33(1), 726–733. arXiv preprint arXiv:1901.11397. https://doi.org/10.1609/aaai.v33i01.3301726
  • TGG Group. (2016). Using online escort content to identify sex trafficking: Generating data on who’s trafficked and who isn’t will yield the best ideas on where to focus.
  • Tidball, S., Zheng, M., & Creswell, J. W. (2016). Buying sex on-line from girls: NGO representatives, law enforcement officials, and public officials speak out about human trafficking—A qualitative analysis. Gender Issues, 33(1), 53–68. https://doi.org/10.1007/s12147-015-9146-1
  • Tong, E., Zadeh, A., Jones, C., & Morency, L. P. (2017). Combating human trafficking with deep multimodal models. Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers) (pp. 1547–1556). Association for Computational Linguistics. https://doi.org/10.48550/arXiv.1705.02735
  • Tracy, S. J. (2019). Qualitative research methods: Collecting evidence, crafting analysis, communicating impact. John Wiley & Sons.
  • Trafficking Victims Protection Act (TVPA) of 2000, 22 U.S.C. § 7101 et seq. https://www.govinfo.gov/content/pkg/PLAW-106publ386/pdf/PLAW-106publ386.pdf
  • Vogelsang, R. (2023). The failure of FOSTA: Unintended consequences outweigh good intentions. U La Verne L Review, 44(1), 59.
  • Wang, L., Laber, E., Saanchi, Y., & Caltagirone, S. (2020). Sex trafficking detection with ordinal regression neural networks. The AAAI-20 Workshop on Artificial Intelligence for Cyber Security. https://doi.org/10.48550/arXiv.1908.05434
  • Weller, B. E., Bowen, N. K., & Faubert, S. J. (2020). Latent class analysis: A guide to best practice. Journal of Black Psychology, 46(4), 287–311. https://doi.org/10.1177/0095798420930932
  • Whitney, J., Jennex, M., Elkins, A., & Frost, E. (2018). Don’t want to get caught? don’t say it: The use of emojis in online human sex trafficking ads. Proceedings of the 51st Hawaii International Conference on System Sciences. http://hdl.handle.net/10125/50426
  • Wiriyakun, C., & Kurutach, W. (2022). Extracting Co-occurrences of emojis and words as important features for human trafficking detection models. Journal of Intelligent Informatics and Smart Technology, 7, 12–1–12–5. https://jiist.aiat.or.th/assets/uploads/1650204566864oTR0312_Extracting%20Co-occurences%20of%20Emojis%20and%20Words%20as%20Important%20Features%20for%20Human%20Trafficking%20Detection%20Models.pdf
  • Wurpts, I. C., & Geiser, C. (2014). Is adding more indicators to a latent class analysis beneficial or detrimental? Results of a Monte-Carlo study. Frontiers in Psychology, 5(920), 1–15. https://doi.org/10.3389/fpsyg.2014.00920
  • Zeng, H. S., Danaher, B., & Smith, M. D. (2022). Internet governance through site shutdowns: The impact of shutting down two major commercial sex advertising sites. Management Science, 68(11), 8234–8248. https://doi.org/10.1287/mnsc.2022.4498
  • Zhu, J., Li, L., & Jones, C. (2019). Identification and detection of human trafficking using language models. 2019 European Intelligence and Security Informatics Conference (EISIC) (pp. 24–31). https://ieeexplore.ieee.org/abstract/document/9108860

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.