Problem definition: Approximately 11,000 alleged illicit massage businesses (IMBs) exist across the United States hidden in plain sight among legitimate businesses. These illicit businesses frequently exploit workers, many of whom are victims of human trafficking, forced or coerced to provide commercial sex. Academic/practical relevance: Although IMB review boards like Rubmaps.ch can provide first-hand information to identify IMBs, these sites are likely to be closed by law enforcement. Open websites like Yelp.com provide more accessible and detailed information about a larger set of massage businesses. Reviews from these sites can be screened for risk factors of trafficking. Methodology: We develop a natural language processing approach to detect online customer reviews that indicate a massage business is likely engaged in human trafficking. We label data sets of Yelp reviews using knowledge of known IMBs. We develop a lexicon of key words/phrases related to human trafficking and commercial sex acts. We then build two classification models based on this lexicon. We also train two classification models using embeddings from the bidirectional encoder representations from transformers (BERT) model and the Doc2Vec model. Results: We evaluate the performance of these classification models and various ensemble models. The lexicon-based models achieve high precision, whereas the embedding-based models have relatively high recall. The ensemble models provide a compromise and achieve the best performance on the out-of-sample test. Our results verify the usefulness of ensemble methods for building robust models to detect risk factors of human trafficking in reviews on open websites like Yelp. Managerial implications: The proposed models can save countless hours in IMB investigations by automatically sorting through large quantities of data to flag potential illicit activity, eliminating the need for manual screening of these reviews by law enforcement and other stakeholders. Funding: This work was supported by the National Science Foundation [Grant 1936331]. Supplemental Material: The online appendix is available at https://doi.org/10.1287/msom.2023.1196 .
more »
« less
Non-traditional cyber adversaries: Combating human trafficking through data science
Human trafficking is a complex and challenging global crime exacerbated by the use of technology. Traffickers utilize technology for scalability, anonymity, and profitability as the Internet, social media platforms and encrypted messaging make the recruitment, exploitation and profit of an individual a low-risk, high-reward enterprise. Counter-trafficking efforts are often siloed approaches, resulting in decentralized information and analysis on the size and scope of trafficking in persons. Resources and tools such as the human trafficking kill chain methodology and Artemis, a machine learning (ML) human trafficking risk classifier, show promising disruption tactics which may also be applied to other asymmetrical threats. Recommendations for centralized data collections methods, inter-agency collaboration, and cybersecurity adjacent legislation are also made.
more »
« less
- Award ID(s):
- 1936331
- PAR ID:
- 10191333
- Date Published:
- Journal Name:
- Cyber security
- Volume:
- 4
- Issue:
- 1
- ISSN:
- 2398-5119
- Page Range / eLocation ID:
- 1 - 12
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Human trafficking, the commercial exploitation of individuals, is a gross violation of human rights; harming societies, economies, health and development. The related disciplines of Operations Research (OR) and Analytics are uniquely positioned to support trafficking prevention and intervention efforts by efficiently evaluating a plethora of decision alternatives and providing quantitative, actionable insights. As operations and analytical efforts in the counter-trafficking field emerge, it is imperative to grasp subtle, yet distinctive, nuances associated with human trafficking. This paper is intended to inform those practitioners working in the Operations and Analytics fields by highlighting key features of human trafficking activity. We grouped ten themes around two broad categories: (1) representation of human trafficking and (2) consideration of survivors and communities. These insights are derived from our collective experience in working in this area and substantiated by domain expertise. Based on these areas, we then suggest avenues for future work.more » « less
-
Legitimate companies are key facilitators of human trafficking. These corporate facilitators include not only websites providing advertisements for commercial sex services but also hotels and motels. Analysis of all active federal criminal sex trafficking cases in 2018 and 2019 reveals that in approximately 80% of these cases, victims were exploited at either hotels or motels. This paper studies the prevalence of the hospitality industry in the crime of sex trafficking and the failure of this industry to address this problem until recent civil suits were filed by victims against individual hotels and chains. Drawing on the civil cases filed in federal courts by victims of human trafficking between 2015 and 2021 along the East Coast of the United States, this paper assesses the characteristics of these hotels and the conditions in the hotels that facilitated sex trafficking. The paper then explores the moral and ethical problems posed by the facilitating role of hotel owners/operators in sex trafficking either through collusion or failure to act on and/or report evidence of individual abuse. Suggestions on how to address the problem are provided.more » « less
-
null (Ed.)This paper is exploring the connection between human trafficking in the dark web. It also looks into the different variations as to how people are trafficked and who is more likely to be trafficked. The surveys that were conducted is to mainly see current knowledge of everyday people on what they personally knew about the connection between trafficking and the dark web.more » « less
-
Wearable sensors are beneficial for continuous health monitoring, movement analysis, rehabilitation, evaluation of human performance, and for fall detection. Wearable stretch sensors are increasingly being used for human movement monitoring. Additionally, falls are one of the leading causes of both fatal and nonfatal injuries in the workplace. The use of wearable technology in the workplace could be a successful solution for human movement monitoring and fall detection, especially for high fall-risk occupations. This paper provides an in-depth review of different wearable stretch sensors and summarizes the need for wearable technology in the field of ergonomics and the current wearable devices used for fall detection. Additionally, the paper proposes the use of soft-robotic-stretch (SRS) sensors for human movement monitoring and fall detection. This paper also recapitulates the findings of a series of five published manuscripts from ongoing research that are published as Parts I to V of “Closing the Wearable Gap” journal articles that discuss the design and development of a foot and ankle wearable device using SRS sensors that can be used for fall detection. The use of SRS sensors in fall detection, its current limitations, and challenges for adoption in human factors and ergonomics are also discussed.more » « less
An official website of the United States government

