skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Maass, Kayse Lee"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Abonazel, Mohamed R (Ed.)
    Agricultural workers are essential to the supply chain for our daily food, and yet, many face harmful work conditions, including garnished wages, and other labor violations. Workers on H-2A visas are particularly vulnerable due to the precarity of their immigration status being tied to their employer. Although worksite inspections are one mechanism to detect such violations, many labor violations affecting agricultural workers go undetected due to limited inspection resources. In this study, we identify multiple state and industry level factors that correlate with H-2A violations identified by the U.S. Department of Labor’s Wage and Hour Division using a multilevel zero-inflated negative binomial model. We find that three state-level factors (average farm acreage size, the number of agricultural establishments with less than 20 employees, and higher poverty rates) are correlated with H-2A violations. These findings offer valuable insights into where H-2A violations are being detected at the state and industry levels. 
    more » « less
  2. We consider a new class of multi-period network interdiction problems, where interdiction and restructuring decisions are decided upon before the network is operated and implemented throughout the time horizon.We discuss how we apply this new problem to disrupting domestic sex trafficking networks, and introduce a variant where a second cooperating attacker has the ability to interdict victims and prevent the recruitment of prospective victims. This problem is modeled as a bilevel mixed integer linear program (BMILP), and is solved using column-and-constraint generation with partial information. We also simplify the BMILP when all interdictions are implemented before the network is operated. Modeling-based augmentations are proposed to significantly improve the solution time in a majority of instances tested. We apply our method to synthetic domestic sex trafficking networks, and discuss policy implications from our model. In particular, we show how preventing the recruitment of prospective victims may be as essential to disrupting sex trafficking as interdicting existing participants. 
    more » « less
  3. Law enforcement interventions continue to be the primary mechanism used to identify offenders and illicit businesses involved in human trafficking, yet trafficking continues to be a thriving international operation. We explore alternative mechanisms to disrupt illicit operations and reduce victimization through labor trafficking supply chains using supply chain disruption theory. Using a case study approach to examine one federally prosecuted labor trafficking case in the agricultural sector, we (1) extend criminological concepts of disruption by identifying sources and methods of disruption and (2) inform criminal justice system responses by presenting novel methods of assessing effectiveness of anti-human trafficking policies and programs. 
    more » « less
  4. Human trafficking, the commercial exploitation of individuals, is a gross violation of human rights; harming societies, economies, health and development. The related disciplines of Operations Research (OR) and Analytics are uniquely positioned to support trafficking prevention and intervention efforts by efficiently evaluating a plethora of decision alternatives and providing quantitative, actionable insights. As operations and analytical efforts in the counter-trafficking field emerge, it is imperative to grasp subtle, yet distinctive, nuances associated with human trafficking. This paper is intended to inform those practitioners working in the Operations and Analytics fields by highlighting key features of human trafficking activity. We grouped ten themes around two broad categories: (1) representation of human trafficking and (2) consideration of survivors and communities. These insights are derived from our collective experience in working in this area and substantiated by domain expertise. Based on these areas, we then suggest avenues for future work. 
    more » « less
  5. The New York City (NYC) youth shelter system provides housing, counseling, and other support services to runaway and homeless youth and young adults (RHY). These resources reduce RHY's vulnerability to human trafficking, yet most shelters are unable to meet demand. This paper presents a Discrete Event Simulation (DES) model of a crisis-emergency and drop-in center for LGBTQ+ youth in NYC, which aims to analyze the current operations and test potential capacity expansion interventions. The model uses data from publicly available resources and interviews with service providers and key stakeholders. The simulated shelter has 66 crisis-emergency beds, offers five different support services, and serves on average 1,399 LGBTQ+ RHY per year. The capacity expansion interventions examined in this paper are adding crisis-emergency beds and psychiatric therapists. This application of DES serves as a tool to communicate with policymakers, funders, and service providers-potentially having a strong humanitarian impact. 
    more » « less
  6. The New York City (Ed.)