skip to main content


Search for: All records

Creators/Authors contains: "Sharkey, Thomas C"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Free, publicly-accessible full text available December 4, 2024
  2. We consider a new class of multi-period network interdiction problems, where interdiction and restructuring decisions are decided upon before the network is operated and implemented throughout the time horizon.We discuss how we apply this new problem to disrupting domestic sex trafficking networks, and introduce a variant where a second cooperating attacker has the ability to interdict victims and prevent the recruitment of prospective victims. This problem is modeled as a bilevel mixed integer linear program (BMILP), and is solved using column-and-constraint generation with partial information. We also simplify the BMILP when all interdictions are implemented before the network is operated. Modeling-based augmentations are proposed to significantly improve the solution time in a majority of instances tested. We apply our method to synthetic domestic sex trafficking networks, and discuss policy implications from our model. In particular, we show how preventing the recruitment of prospective victims may be as essential to disrupting sex trafficking as interdicting existing participants. 
    more » « less
  3. ISE tools, advisory group guidance applied to tackle global crisis 
    more » « less
  4. null (Ed.)
  5. Background: Human trafficking for sexual exploitation (referred to as sex trafficking) is a complex global challenge that causes harm and violates human rights. Most research has focused on victim-level harms and experiences, with limited understanding of the networks and business functions of trafficking operations. Empirical evidence is lacking on how to disrupt trafficking operations because it is difficult to study; it is hidden and dangerous, spans academic disciplinary boundaries, and necessitates ways of knowing that include lived experience. Collaborative approaches are needed, but there is limited research on methods to best build transdisciplinary teams. Aim: The aim of this study was to understand how to form a community-engaged transdisciplinary research team that combines qualitative and operations research with a survivor-centered advisory group. Methods: We conducted a qualitative meta-study of our team that is seeking to mathematically model sex trafficking operations. Data were collected from the minutes of 16 team meetings and a survey of 13 team members. Results: Analysis of meeting minutes surfaced four themes related to content and style of communication, one related to value statements, and one capturing intentional team building efforts. Survey results highlighted respect, trust, integrity, openness and asking and answering questions as key aspects of team building. Results show that an action research approach to team building, focused on trust and communication, fostered effective collaboration among social scientists, operations researchers, and survivors of trafficking. Conclusion: Team building, shared language, and trust are essential, yet often neglected, elements of team science. This meta-study provides important methodological insights on community engaged transdisciplinary team formation to tackle vexing social challenges. 
    more » « less
  6. This article describes the role that industrial and systems engineers (ISE) can have in the future of the Arctic but only if they partner with Arctic communities, residents, and academic experts. It provides an overview to some of the problems that are within the field of ISE that are relevant. 
    more » « less
  7. Abstract

    Fifty years of research inNetworkscoincides with 50 years of advances in resilience theory and applications. The purpose of this review is to identify how these two technical communities influenced each other in the past and can bolster each other in the future. Advances in resilience theory show that there are at least four ways networks demonstrate resilience: robustness, rebound, extensibility, and adaptability. Research published inNetworksand by the broader network optimization community has focused primarily on technical methods for robustness and rebound. We review this literature to organize seminal problems and papers on the ability of networks to manage increasing stressors and return to normal activities after a stressful event. In contrast, theNetworkscommunity has made less progress addressing issues for network extensibility and adaptability. Extensibility refers to the ability to stretch current operations to surprising situations and adaptability refers to the ability to sustain operations into the future. We discuss ways to harness existing network optimization methods to study these forms of resilience and outline their limitations. We conclude by providing a research agenda that ensures theNetworkscommunity remains central to future advances in resilience while being pragmatic about the limitations of network optimization for achieving this task.

     
    more » « less