Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

Ethical Tensions in Applications of AI for Addressing Human Trafficking: A Human Rights Perspective

Published: 11 November 2022 Publication History

Abstract

In the last two decades, human trafficking (where individuals are forcibly exploited for the profits of another) has seen increased attention from the artificial intelligence (AI) community. Clear focus on the ethical risks of this research is critical given that those risks are disproportionately born by already vulnerable populations. To understand and subsequently address these risks, we conducted a systematic literature review of computing research leveraging AI to combat human trafficking and apply a framework using principles from international human rights law to categorize ethical risks. This paper uncovers a number of ethical tensions including bias endemic in datasets, privacy risks stemming from data collection and reporting, and issues concerning potential misuse. We conclude by highlighting four suggestions for future research: broader use of participatory design; engaging with other forms of trafficking; developing best practices for harm prevention; and including transparent ethics disclosures in research. We find that there are significant gaps in what aspects of human trafficking researchers have focused on. Most research to date focuses on aiding criminal investigations in cases of sex trafficking, but more work is needed to support other anti-trafficking activities like supporting survivors, adequately address labor trafficking, and support more diverse survivor populations including transgender and nonbinary individuals.

References

[1]
[n.d.]. Regional Trial Court of Misamis Oriental, the Philippines, 10th Judicial Region, Branch 41, CRIM Case NO. 2009--337.
[2]
2000. United States of America: Victims of Trafficking and Violence Protection Act of 2000. Public Law 106--386 [H.R. 3244].
[3]
Evgeni Aizenberg and Jeroen van den Hoven. 2020. Designing for human rights in AI. Big Data & Society 7, 2 (2020), 2053951720949566.
[4]
Hamdan Z. Alshammari and Khaled S. Alghathbar. 2017. CLogVis: Crime Data Analysis and Visualization Tool. In Proceedings of the Second International Conference on Advanced Wireless Information, Data, and Communication Technologies (Paris, France) (AWICT 2017). Association for Computing Machinery, New York, NY, USA, Article 2, 7 pages. https://doi.org/10.1145/3231830.3231832
[5]
Hamidreza Alvari, Paulo Shakarian, and JE Kelly Snyder. 2016. A non-parametric learning approach to identify online human trafficking. In 2016 IEEE Conference on Intelligence and Security Informatics (ISI). IEEE, 133--138.
[6]
Hamidreza Alvari, Paulo Shakarian, and JE Kelly Snyder. 2017. Semi-supervised learning for detecting human trafficking. Security Informatics 6, 1 (2017), 1.
[7]
Amnesty International. [n.d.]. Ban dangerous facial recognition technology that amplifies racist policing. https://www.amnesty.org/en/latest/news/2021/01/ban-dangerous-facial-recognition-technology-that-amplifies-racist-policing/#: :text=While%20other%20US%20cities%2C%20including,the%20Black%20Lives%20Matters%20protests.
[8]
Felix Anda, Brett A Becker, David Lillis, Nhien-An Le-Khac, and Mark Scanlon. 2020. Assessing the Influencing 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE, 1--8.
[9]
Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, and Mark Scanlon. 2019. Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning. In Proceedings of the 14th International Conference on Availability, Reliability and Security (Canterbury, CA, United Kingdom) (ARES '19). Association for Computing Machinery, New York, NY, USA, Article 57, 8 pages. https://doi.org/10.1145/3339252.3341491
[10]
Felix Anda, David Lillis, Nhien-An Le-Khac, and Mark Scanlon. 2018. Evaluating automated facial age estimation techniques for digital forensics. In 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 129--139.
[11]
Lindsey Andersen et al. 2018. Human Rights in the age of Artificial Intelligence. Access Now (2018), 29.
[12]
Simon Andrews, Ben Brewster, and Tony Day. 2018. Organised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime online. Security Informatics 7, 1 (2018), 1--21.
[13]
UN General Assembly et al . 1948. Universal declaration of human rights. UN General Assembly 302, 2 (1948), 14--25.
[14]
Paul Baker and Amanda Potts. 2013. "Why do white people have thin lips?'Google and the perpetuation of stereotypes via auto-complete search forms. Critical discourse studies 10, 2 (2013), 187--204.
[15]
G. Josemin Bala and Steven Lawrence Fernandes. 2016. Developing Novel Skin Detection on ODROID XU4 Heterogeneous Multi-Processing Device. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (Udaipur, India) (ICTCS '16). Association for Computing Machinery, New York, NY, USA, Article 86, 4 pages. https://doi.org/10.1145/2905055.2905297
[16]
Adrian Benton, Glen Coppersmith, and Mark Dredze. 2017. Ethical research protocols for social media health research. In Proceedings of the First ACL Workshop on Ethics in Natural Language Processing. 94--102.
[17]
Chris Beyrer and Adeeba Kamarulzaman. 2017. Ethnic cleansing in Myanmar: the Rohingya crisis and human rights. The Lancet 390, 10102 (2017), 1570--1573.
[18]
Andrew Booth, Anthea Sutton, and Diana Papaioannou. 2016. Systematic approaches to a successful literature review. (2016).
[19]
Vanessa Bouche et al. 2015. A report on the use of technology to recruit, groom and sell domestic minor sex trafficking victims. (2015).
[20]
Danah Boyd and Kate Crawford. 2012. Critical questions for big data: Provocations for a cultural, technological, and scholarly phenomenon. Information, communication & society 15, 5 (2012), 662--679.
[21]
Sarah Brayne. 2020. Predict and surveil: Data, discretion, and the future of policing. Oxford University Press, USA.
[22]
Jeffrey Brelsford and Saurabh Parakh. 2018. A systems modeling approach to analyzing human trafficking. In 2018 Winter Simulation Conference (WSC). IEEE, 12--21.
[23]
Morten Broberg and Hans-Otto Sano. 2018. Strengths and weaknesses in a human rights-based approach to international development--an analysis of a rights-based approach to development assistance based on practical experiences. The International Journal of Human Rights 22, 5 (2018), 664--680.
[24]
Axel Bruns, Katrin Weller, Michael Zimmer, and Nicholas John Proferes. 2014. A topology of Twitter research: disciplines, methods, and ethics. Aslib Journal of Information Management (2014).
[25]
Danilo Burbano and Myriam Hernández-Alvarez. 2018. Illicit, hidden advertisements on Twitter. In 2018 International Conference on eDemocracy & eGovernment (ICEDEG). IEEE, 317--321.
[26]
Joshua Carback. 2018. Cybersex Trafficking: Toward a More Effective Prosecutorial Response. Criminal Law Bulletin 54, 1 (2018).
[27]
Stevie Chancellor, Michael L Birnbaum, Eric D Caine, Vincent MB Silenzio, and Munmun De Choudhury. 2019. A taxonomy of ethical tensions in inferring mental health states from social media. In Proceedings of the conference on fairness, accountability, and transparency. 79--88.
[28]
Praveen Kumar Chandaliya and Neeta Nain. 2019. Conditional Perceptual Adversarial Variational Autoencoder for Age Progression and Regression on Child Face. In 2019 International Conference on Biometrics (ICB). IEEE, 1--8.
[29]
Kasia S Chmielinski, Sarah Newman, Matt Taylor, Josh Joseph, Kemi Thomas, Jessica Yurkofsky, and YC Qiu. 2020. The Dataset Nutrition Label (2nd Gen): Leveraging Context to Mitigate Harms in Artificial Intelligence. In Proceedings of the NeurIPS 2020 Workshop on Dataset Curation and Security, Online, Vol. 11.
[30]
Niraj Chokshi. 2019. Facial Recognition's Many Controversies, From Stadium Surveillance to Racist Software'. New York Times 15 (2019).
[31]
Wingyan Chung, Elizabeth Mustaine, and Daniel Zeng. 2017. Criminal intelligence surveillance and monitoring on social media: Cases of cyber-trafficking. In 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 191--193.
[32]
Karen Countryman-Roswurm and Bailey Patton Brackin. 2017. Awareness without re-exploitation: Empowering approaches to sharing the message about human trafficking. Journal of Human Trafficking 3, 4 (2017), 327--334.
[33]
Tessa Couture. 2016. More than Drinks for Sale: Exposing Sex Trafficking in Cantinas & Bars in the U.S. Technical Report. Polaris.
[34]
M. da Silva Santos, M. Ladeira, G. C. G. Van Erven, and G. Luiz da Silva. 2019. Machine Learning Models to Identify the Risk of Modern Slavery in Brazilian Cities. In 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA). 740--746.
[35]
Julia Deeb-Swihart, Alex Endert, and Amy Bruckman. 2019. Understanding law enforcement strategies and needs for combating human trafficking. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--14.
[36]
Matthew Edwards, Awais Rashid, and Paul Rayson. 2015. A systematic survey of online data mining technology intended for law enforcement. ACM Computing Surveys (CSUR) 48, 1 (2015), 1--54.
[37]
Paul Elzinga, Karl Erich Wolff, and Jonas Poelmans. 2012. Analyzing chat conversations of pedophiles with temporal relational semantic systems. In 2012 European Intelligence and Security Informatics Conference. IEEE, 242--249.
[38]
Muhammad Ali Fauzi and Patrick Bours. 2020. Ensemble Method for Sexual Predators Identification in Online Chats. In 2020 8th International Workshop on Biometrics and Forensics (IWBF). IEEE, 1--6.
[39]
Jessica Fjeld, Nele Achten, Hannah Hilligoss, Adam Nagy, and Madhulika Srikumar. 2020. Principled artificial intelligence: Mapping consensus in ethical and rights-based approaches to principles for AI. Berkman Klein Center Research Publication 2020--1 (2020).
[40]
Sakiko Fukuda-Parr and Elizabeth Gibbons. 2021. Emerging Consensus on "Ethical AI': Human Rights Critique of Stakeholder Guidelines. Global Policy 12 (2021), 32--44.
[41]
Aakash Gautam, Chandani Shrestha, Andrew Kulak, Steve Harrison, and Deborah Tatar. 2018. Participatory tensions in working with a vulnerable population. In Proceedings of the 15th Participatory Design Conference: Short Papers, Situated Actions, Workshops and Tutorial-Volume 2. 1--5.
[42]
Aakash Gautam, Deborah Tatar, and Steve Harrison. 2020. Crafting, Communality, and Computing: Building on Existing Strengths To Support a Vulnerable Population. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI '20). Association for Computing Machinery, New York, NY, USA, 1--14. https://doi.org/10.1145/3313831.3376647
[43]
N. A. Giacobe, J. B. Altmire, A. E. Forster, A. C. Jackson, E. W. Raibick, J. A. Reep, R. Y. Tsang, and P. K. Forster. 2016. Characterizing sex trafficking in Pennsylvania for law enforcement. In 2016 IEEE Symposium on Technologies for Homeland Security (HST). 1--5.
[44]
Tarleton Gillespie and Nick Seaver. 2016. Critical algorithm studies: A reading list. Social Media Collective (2016).
[45]
Mitchell Goist, Ted Hsuan Yun Chen, and Christopher Boylan. 2019. Reconstructing and analyzing the transnational human trafficking network. In 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 493--500.
[46]
Sergio L Granizo, Ángel Leonardo Valdivieso Caraguay, Lorena Isabel Barona López, and Myriam Hernández-Álvarez. 2020. Detection of Possible Illicit Messages Using Natural Language Processing and Computer Vision on Twitter and Linked Websites. IEEE Access 8 (2020), 44534--44546.
[47]
Gillian R Hayes. 2020. Inclusive and engaged HCI. Interactions 27, 2 (2020), 26--31.
[48]
M. Hernández-Álvarez. 2019. Detection of Possible Human Trafficking in Twitter. In 2019 International Conference on Information Systems and Software Technologies (ICI2ST). 187--191.
[49]
AI HLEG. 2019. High-level Expert Group on Artificial Intelligence: Ethics guidelines for trustworthy AI. European Commission, 09.04 (2019).
[50]
Marisa Hultgren, Murray E Jennex, John Persano, and Cezar Ornatowski. 2016. Using knowledge management to assist in identifying human sex trafficking. In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, 4344--4353.
[51]
Kyle Hundman, Thamme Gowda, Mayank Kejriwal, and Benedikt Boecking. 2018. Always Lurking: Understanding and Mitigating Bias in Online Human Trafficking Detection. In Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society (New Orleans, LA, USA) (AIES '18). Association for Computing Machinery, New York, NY, USA, 137--143. https://doi.org/10.1145/3278721.3278782
[52]
Ryan Hurley, Swagatika Prusty, Hamed Soroush, Robert J. Walls, Jeannie Albrecht, Emmanuel Cecchet, Brian Neil Levine, Marc Liberatore, Brian Lynn, and Janis Wolak. 2013. Measurement and Analysis of Child Pornography Trafficking on P2P Networks. In Proceedings of the 22nd International Conference on World Wide Web (Rio de Janeiro, Brazil) (WWW '13). Association for Computing Machinery, New York, NY, USA, 631--642. https://doi.org/10.1145/2488388.2488444
[53]
M. Ibanez and R. Gazan. 2016. Detecting sex trafficking circuits in the U.S. through analysis of online escort advertisements. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 892--895.
[54]
M. Ibanez and R. Gazan. 2016. Virtual indicators of sex trafficking to identify potential victims in online advertisements. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 818--824.
[55]
M. Ibanez and D. D. Suthers. 2014. Detection of Domestic Human Trafficking Indicators and Movement Trends Using Content Available on Open Internet Sources. In 2014 47th Hawaii International Conference on System Sciences. 1556--1565.
[56]
M. Ibanez and D. D. Suthers. 2016. Detecting covert sex trafficking networks in virtual markets. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 876--879.
[57]
Amin Ibrahim and Miguel Vargas Martin. 2009. Addressing privacy constraints for efficient monitoring of network traffic for illicit images. In 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH). IEEE, 302--308.
[58]
International Labour Office. 2017. Global Estimates of Modern Slavery: Forced Labour and Forced Marriage. http://www.ilo.org/global/publications/books/WCMS_575479/lang--en/index.htm
[59]
Lucas Introna and David Wood. 2004. Picturing algorithmic surveillance: The politics of facial recognition systems. Surveillance & Society 2, 2/3 (2004), 177--198.
[60]
Rikke Frank Jørgensen. 2019. Human rights in the age of platforms. The MIT Press.
[61]
Rahul Kapoor, Mayank Kejriwal, and Pedro Szekely. 2017. Using Contexts and Constraints for Improved Geotagging of Human Trafficking Webpages. In Proceedings of the Fourth International ACM Workshop on Managing and Mining Enriched Geo-Spatial Data (Chicago, Illinois) (GeoRich '17). Association for Computing Machinery, New York, NY, USA, Article 3, 6 pages. https://doi.org/10.1145/3080546.3080547
[62]
Mayank Kejriwal, Jiayuan Ding, Runqi Shao, Anoop Kumar, and Pedro Szekely. 2017. Flagit: A system for minimally supervised human trafficking indicator mining. arXiv preprint arXiv:1712.03086 (2017).
[63]
Mayank Kejriwal and Yao Gu. 2020. Network-theoretic modeling of complex activity using UK online sex advertisements. Applied Network Science 5, 1 (2020), 1--23.
[64]
Mayank Kejriwal and Rahul Kapoor. 2019. Network-theoretic information extraction quality assessment in the human trafficking domain. Applied Network Science 4, 1 (2019), 1--26.
[65]
Mayank Kejriwal and Pedro Szekely. 2017. Information Extraction in Illicit Web Domains. In Proceedings of the 26th International Conference on World Wide Web (Perth, Australia) (WWW '17). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 997--1006. https://doi.org/10.1145/3038912.3052642
[66]
Mayank Kejriwal and Pedro Szekely. 2018. Technology-Assisted Investigative Search: A Case Study from an Illicit Domain. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI EA '18). Association for Computing Machinery, New York, NY, USA, 1--9. https://doi.org/10.1145/3170427.3174364
[67]
Finn Kensing and Jeanette Blomberg. 1998. Participatory design: Issues and concerns. Computer supported cooperative work (CSCW) 7, 3 (1998), 167--185.
[68]
Reuben Kirkham. 2020. Using European Human Rights Jurisprudence for Incorporating Values into Design. In Proceedings of the 2020 ACM Designing Interactive Systems Conference. 115--128.
[69]
Barbara Kitchenham and Stuart Charters. 2007. Guidelines for performing systematic literature reviews in software engineering. (2007).
[70]
Jon Kleinberg, Himabindu Lakkaraju, Jure Leskovec, Jens Ludwig, and Sendhil Mullainathan. 2018. Human decisions and machine predictions. The quarterly journal of economics 133, 1 (2018), 237--293.
[71]
Renata A Konrad, Andrew C Trapp, Timothy M Palmbach, and Jeffrey S Blom. 2017. Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications. European Journal of Operational Research 259, 2 (2017), 733--745.
[72]
Panos Kostakos, Lucie "práchalová, Abhinay Pandya, Mohamed Aboeleinen, and Mourad Oussalah. 2018. Covert online ethnography and machine learning for detecting individuals at risk of being drawn into online sex work. In 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 1096--1099.
[73]
PM Krafft, Meg Young, Michael Katell, Karen Huang, and Ghislain Bugingo. 2020. Defining AI in policy versus practice. In Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society. 72--78.
[74]
Mark Latonero. 2011. Human trafficking online: The role of social networking sites and online classifieds. Available at SSRN 2045851 (2011).
[75]
Mark Latonero. 2018. Governing artificial intelligence: Upholding human rights & dignity. Data & Society (2018), 1--37.
[76]
Lin Li, Olga Simek, Angela Lai, Matthew Daggett, Charlie K Dagli, and Cara Jones. 2018. Detection and characterization of human trafficking networks using unsupervised scalable text template matching. In 2018 IEEE International Conference on Big Data (Big Data). IEEE, 3111--3120.
[77]
Xiaodong Li, Giles M Foody, Doreen S Boyd, and Feng Ling. 2019. Aging brick kilns in the asian brick belt using a long time series of Landsat sensor data to inform the study of modern day slavery. In IGARSS 2019--2019 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 130--133.
[78]
Marc Liberatore, Brian Neil Levine, and Clay Shields. 2010. Strengthening Forensic Investigations of Child Pornography on P2P Networks. In Proceedings of the 6th International COnference (Philadelphia, Pennsylvania) (Co-NEXT '10). Association for Computing Machinery, New York, NY, USA, Article 19, 12 pages. https://doi.org/10.1145/1921168.1921193
[79]
Amos Lichtman and Mohit Nair. 2015. Humanitarian uses of drones and satellite imagery analysis: the promises and perils. AMA journal of ethics 17, 10 (2015), 931--937.
[80]
David Lyon. 2001. Surveillance society: Monitoring everyday life. McGraw-Hill Education (UK).
[81]
Marinus Analytics. 2019. TRAFFIC JAM for FACIAL RECOGNITION: Sex Trafficking Victim Found Online from 2 Year Old Photo.
[82]
Estelle Massé. 2020. Recommendations on privacy and data protection in the fight against COVID-19. Technical Report. Access Now.
[83]
Lorna McGregor, Daragh Murray, and Vivian Ng. 2019. International human rights law as a framework for algorithmic accountability. International & Comparative Law Quarterly 68, 2 (2019), 309--343.
[84]
Jacob Metcalf and Kate Crawford. 2016. Where are human subjects in big data research? The emerging ethics divide. Big Data & Society 3, 1 (2016), 2053951716650211.
[85]
Dimitrios Michalopoulos and Ioannis Mavridis. 2010. Towards risk based prevention of grooming attacks. In 2010 International Conference on Security and Cryptography (SECRYPT). IEEE, 1--4.
[86]
Dimitrios Michalopoulos and Ioannis Mavridis. 2011. Utilizing document classification for grooming attack recognition. In 2011 IEEE Symposium on Computers and Communications (ISCC). IEEE, 864--869.
[87]
Dimitrios Michalopoulos, Eustathios Papadopoulos, and Ioannis Mavridis. 2012. Artemis: protection from sexual exploitation attacks via SMS. In 2012 16th Panhellenic Conference on Informatics. IEEE, 19--24.
[88]
Josephina Mikka-Muntuumo, Anicia Peters, and Hussin Jazri. 2018. CyberBullet - Share Your Story: An Interactive Game for Stimulating Awareness on the Harm and Negative Effects of the Internet. In Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities (Windhoek, Namibia) (AfriCHI '18). Association for Computing Machinery, New York, NY, USA, Article 54, 4 pages. https://doi.org/10.1145/3283458.3283482
[89]
Meredith Minkler. 2004. Ethical challenges for the "outside" researcher in community-based participatory research. Health Education & Behavior 31, 6 (2004), 684--697.
[90]
Kimberly J Mitchell and Dana Boyd. 2014. Understanding the role of technology in the commercial sexual exploitation of children: the perspective of law enforcement. (2014).
[91]
Jessica D Moorman and Kristen Harrison. 2016. Gender, race, and risk: Intersectional risk management in the sale of sex online. The Journal of Sex Research 53, 7 (2016), 816--824.
[92]
Andrea J Nichols and Andrea Nichols. 2017. Sex Trafficking in the United States. In Sex Trafficking in the United States. Columbia University Press.
[93]
Helen Nissenbaum. 2001. How computer systems embody values. Computer 34, 3 (2001), 120--119.
[94]
US Department of State. 2010. Four "Ps": Prevention, protection, prosecution, partnerships.
[95]
Chitu Okoli. 2015. A guide to conducting a standalone systematic literature review. Communications of the Association for Information Systems 37, 1 (2015), 43.
[96]
Kien Pham, Aécio Santos, and Juliana Freire. 2018. Learning to Discover Domain-Specific Web Content. In Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining (Marina Del Rey, CA, USA) (WSDM '18). Association for Computing Machinery, New York, NY, USA, 432--440. https://doi.org/10.1145/3159652.3159724
[97]
Jason Pielemeier. 2019. AI & Global Governance: The Advantages of Applying the International Human Rights Framework to Artificial Intelligence. Centre for Policy Research at United Nations University. Retrieved 30 (2019).
[98]
Jonas Poelmans, Paul Elzinga, Stijn Viaene, and Guido Dedene. 2010. Concept discovery innovations in law enforcement: A perspective. In 2010 International Conference on Intelligent Networking and Collaborative Systems. IEEE, 473--478.
[99]
Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz, and Damon McCoy. 2017. Backpage and Bitcoin: Uncovering Human Traffickers. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (Halifax, NS, Canada) (KDD '17). Association for Computing Machinery, New York, NY, USA, 1595--1604. https://doi.org/10.1145/3097983.3098082
[100]
Reihaneh Rabbany, David Bayani, and Artur Dubrawski. 2018. Active Search of Connections for Case Building and Combating Human Trafficking. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (London, United Kingdom) (KDD '18). Association for Computing Machinery, New York, NY, USA, 2120--2129. https://doi.org/10.1145/3219819.3220103
[101]
Vinoth Rengaraj and Kamal Bijlani. 2016. A study and implementation of smart ID card with M-learning and child security. In 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT). IEEE, 305--311.
[102]
Claire M Ribando. 2007. Trafficking in Persons: US policy and issues for Congress. LIBRARY OF CONGRESS WASHINGTON DC CONGRESSIONAL RESEARCH SERVICE.
[103]
Tatiana R Ringenberg, Kanishka Misra, and Julia Taylor Rayz. 2019. Not so cute but fuzzy: Estimating risk of sexual predation in online conversations. In 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE, 2946--2951.
[104]
Katelyn Ringrose. 2019. Law Enforcement's Pairing of Facial Recognition Technology with Body-Worn Cameras Escalates Privacy Concerns. Va. L. Rev. Online 105 (2019), 57.
[105]
S. Roshan, S. V. Kumar, and M. Kumar. 2017. Project spear: Reporting human trafficking using crowdsourcing. In 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON). 295--299.
[106]
Rasmus Rothe, Radu Timofte, and Luc Van Gool. 2018. Deep expectation of real and apparent age from a single image without facial landmarks. International Journal of Computer Vision 126, 2--4 (2018), 144--157.
[107]
Jennifer Salerno, Bartha M Knoppers, Lisa M Lee, Wayway M Hlaing, and Kenneth W Goodman. 2017. Ethics, big data and computing in epidemiology and public health. Annals of Epidemiology 27, 5 (2017), 297--301.
[108]
M Sastry and John D Sterman. 1992. Desert island dynamics: an annotated survey of the essential system dynamics literature. In Proceedings of the 1993 Internatioanl System Dynamics Conference, Cancun, Mexico. 466--475.
[109]
Ellie Senft, Benton Weeks, James Palmer, Benson Neely, Benjamin Turner, and JD Caddell. 2019. A systems dynamics approach to human trafficking in Maharashtra, India. In 2019 IEEE International Systems Conference (SysCon). IEEE, 1--7.
[110]
Elham Shaabani, Hamidreza Alvari, Paulo Shakarian, and J.E. Kelly Snyder. 2016. MIST: Missing Person Intelligence Synthesis Toolkit. In Proceedings of the 25th ACM International on Conference on Information and Knowledge Management (Indianapolis, Indiana, USA) (CIKM '16). Association for Computing Machinery, New York, NY, USA, 1843--1867. https://doi.org/10.1145/2983323.2983346
[111]
Jia Shao, Bo Du, Chen Wu, and Lefei Zhang. 2019. Tracking objects from satellite videos: A velocity feature based correlation filter. IEEE Transactions on Geoscience and Remote Sensing 57, 10 (2019), 7860--7871.
[112]
Hamid Reza Sharifzadeh, Hengyi Zhang, and Adams Wai-Kin Kong. 2014. Vein pattern visualization through multiple mapping models and local parameter estimation for forensic investigation. In 2014 22nd International Conference on Pattern Recognition. IEEE, 160--165.
[113]
Jaeho Shin, Christopher Ré, and Michael Cafarella. 2015. Mindtagger: A Demonstration of Data Labeling in Knowledge Base Construction. Proc. VLDB Endow. 8, 12 (Aug. 2015), 1920--1923. https://doi.org/10.14778/2824032.2824101
[114]
Omer Shwartz, Yael Mathov, Michael Bohadana, Yuval Elovici, and Yossi Oren. 2017. Opening Pandora's box: effective techniques for reverse engineering IoT devices. In International Conference on Smart Card Research and Advanced Applications. Springer, 1--21.
[115]
Daniel Ribeiro Silva, Andrew Philpot, Abhishek Sundararajan, Nicole Marie Bryan, and Eduard Hovy. 2014. Data Integration from Open Internet Sources and Network Detection to Combat Underage Sex Trafficking. In Proceedings of the 15th Annual International Conference on Digital Government Research (Aguascalientes, Mexico) (dg.o '14). Association for Computing Machinery, New York, NY, USA, 86--90. https://doi.org/10.1145/2612733.2612746
[116]
Nathalie A Smuha. 2020. Beyond a Human Rights-Based Approach to AI Governance: Promise, Pitfalls, Plea. Philosophy & Technology (2020), 1--14.
[117]
Amazon Staff. 2019. How Amazon Rekognition helps in the fight against some of the worst types of crime. https://www.aboutamazon.com/news/innovation-at-amazon/how-amazon-rekognition-helps-in-the-fight-against-some-of-the-worst-types-of-crime
[118]
Jennifer Stoll, W Keith Edwards, and Elizabeth D Mynatt. 2010. Informal interactions in nonprofit networks. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 533--536.
[119]
Jennifer Stoll, W Keith Edwards, and Elizabeth D Mynatt. 2010. Interorganizational coordination and awareness in a nonprofit ecosystem. In Proceedings of the 2010 ACM conference on Computer supported cooperative work. 51--60.
[120]
Angelika Strohmayer, Mary Laing, and Rob Comber. 2017. Technologies and social justice outcomes in sex work charities: Fighting stigma, saving lives. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 3352--3364.
[121]
Abby Stylianou, Abigail Norling-Ruggles, Richard Souvenir, and Robert Pless. 2015. Indexing open imagery to create tools to fight sex trafficking. In 2015 IEEE Applied Imagery Pattern Recognition Workshop (AIPR). IEEE, 1--6.
[122]
A. Stylianou, J. Schreier, R. Souvenir, and R. Pless. 2017. TraffickCam: Crowdsourced and Computer Vision Based Approaches to Fighting Sex Trafficking. In 2017 IEEE Applied Imagery Pattern Recognition Workshop (AIPR). 1--8.
[123]
Hannah Thinyane and Karthik S. Bhat. 2019. Apprise: Supporting the Critical-Agency of Victims of Human Trafficking in Thailand. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI '19). Association for Computing Machinery, New York, NY, USA, 1--14. https://doi.org/10.1145/3290605.3300385
[124]
Sabina Tomkins, Golnoosh Farnadi, Brian Amanatullah, Lise Getoor, and Steven Minton. 2018. The impact of environmental stressors on human trafficking. In 2018 IEEE International Conference on Data Mining (ICDM). IEEE, 507--516.
[125]
Edmund Tong, Amir Zadeh, Cara Jones, and Louis-Philippe Morency. 2017. Combating human trafficking with deep multimodal models. arXiv preprint arXiv:1705.02735 (2017).
[126]
Amna Toor. 2018. Our Identity Is Often What's Triggering Surveillance: How Government Surveillance of# Black-Lives Matter Violates the First Amendments Freedom of Association. Rutgers Computer & Tech. LJ 44 (2018), 286.
[127]
Edgar Torres, Sergio L Granizo, and Myriam Hernandez-Alvarez. 2019. Gender and Age Classification Based on Human Features to Detect Illicit Activity in Suspicious Sites. In 2019 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 416--419.
[128]
Andrea Tundis, Archit Jain, Gaurav Bhatia, and Max Muhlhauser. 2019. Similarity analysis of criminals on social networks: An example on Twitter. In 2019 28th International Conference on Computer Communication and Networks (ICCCN). IEEE, 1--9.
[129]
Mary K Twis and Kathleen Preble. 2020. Intersectional standpoint methodology: Toward theory-driven participatory research on human trafficking. Violence and victims 35, 3 (2020), 418--439.
[130]
UN General Assembly. 2000. Protocol to Prevent, Suppress and Punish Trafficking in Persons, Especially Women and Children, Supplementing the United Nations Convention against Transnational Organized Crime. (2000).
[131]
United Nations General Assembly. 2017. Resolution adopted by the General Assembly on 19 December 2016: The right to privacy in the digital age. United Nations (2017).
[132]
United Nations Office of Drugs and Crime. 2020. 2020 UNODC Global Report on Trafficking in Persons.
[133]
US Department of Justice. 2017. National Strategy to Combat Human Trafficking. Technical Report.
[134]
Soheil Varastehpour, Hamid Sharifzadeh, Iman Ardekani, and Xavier Francis. 2019. Vein Pattern Visualisation and Feature Extraction using Sparse Auto-Encoder for Forensic Purposes. In 2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, 1--8.
[135]
Anna Vartapetiance and Lee Gillam. 2014. " Our Little Secret": pinpointing potential predators. Security Informatics 3, 1 (2014), 1--19.
[136]
Lauren Vollinger. 2021. Concretizing intersectional research methods: Incorporating social justice and action into United States sex trafficking research. Journal of Human Behavior in the Social Environment 31, 5 (2021), 599--625.
[137]
Emily Wall, Leslie M Blaha, Lyndsey Franklin, and Alex Endert. 2017. Warning, bias may occur: A proposed approach to detecting cognitive bias in interactive visual analytics. In 2017 IEEE Conference on Visual Analytics Science and Technology (VAST). IEEE, 104--115.
[138]
Emily Wall, John Stasko, and Alex Endert. 2019. Toward a design space for mitigating cognitive bias in vis. In 2019 IEEE Visualization Conference (VIS). IEEE, 111--115.
[139]
Hao Wang, Congxing Cai, Andrew Philpot, Mark Latonero, Eduard H. Hovy, and Donald Metzler. 2012. Data Integration from Open Internet Sources to Combat Sex Trafficking of Minors. In Proceedings of the 13th Annual International Conference on Digital Government Research (College Park, Maryland, USA) (dg.o '12). Association for Computing Machinery, New York, NY, USA, 246--252. https://doi.org/10.1145/2307729.2307769
[140]
Bryce Westlake, Martin Bouchard, and Richard Frank. 2012. Comparing methods for detecting child exploitation content online. In 2012 European Intelligence and Security Informatics Conference. IEEE, 156--163.
[141]
Florian Wettstein. 2015. Normativity, ethics, and the UN guiding principles on business and human rights: A critical assessment. Journal of Human Rights 14, 2 (2015), 162--182.
[142]
Susan Wolfinbarger, Jonathan Drake, and Eric Ashcroft. 2014. Geospatial Technologies and Human Rights Project: Satellite Imagery Assessment of Forced Relocation near Luiswishi Mine. (2014).
[143]
Meg Young, Luke Rodriguez, Emily Keller, Feiyang Sun, Boyang Sa, Jan Whittington, and Bill Howe. 2019. Beyond open vs. closed: Balancing individual privacy and public accountability in data sharing. In Proceedings of the Conference on Fairness, Accountability, and Transparency. 191--200.
[144]
Ale? Zavrsnik. 2019. Algorithmic justice: Algorithms and big data in criminal justice settings. European Journal of Criminology (2019), 1477370819876762.
[145]
Ce Zhang, Jaeho Shin, Christopher Ré, Michael Cafarella, and Feng Niu. 2016. Extracting Databases from Dark Data with DeepDive. In Proceedings of the 2016 International Conference on Management of Data (San Francisco, California, USA) (SIGMOD '16). Association for Computing Machinery, New York, NY, USA, 847--859. https://doi.org/10.1145/2882903.2904442
[146]
Jessica Zhu, Lin Li, and Cara Jones. 2019. Identification and Detection of Human Trafficking Using Language Models. In 2019 European Intelligence and Security Informatics Conference (EISIC). IEEE, 24--31.
[147]
Michael Zimmer. 2010. "But the data is already public": on the ethics of research in Facebook. Ethics and information technology 12, 4 (2010), 313--325.

Cited By

View all
  • (2024)The changing meaning of “no” in Canadian sex workPLOS ONE10.1371/journal.pone.030160019:4(e0301600)Online publication date: 4-Apr-2024
  • (2023)Tackling Digital Entrepreneurship Within the Illicit EconomyDigital Entrepreneurship and Co-Creating Value Through Digital Encounters10.4018/978-1-6684-7416-7.ch006(118-144)Online publication date: 23-Jun-2023

Index Terms

  1. Ethical Tensions in Applications of AI for Addressing Human Trafficking: A Human Rights Perspective

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 6, Issue CSCW2
    CSCW
    November 2022
    8205 pages
    EISSN:2573-0142
    DOI:10.1145/3571154
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 November 2022
    Published in PACMHCI Volume 6, Issue CSCW2

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. artificial intelligence
    2. ethics
    3. human rights
    4. human trafficking

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1,314
    • Downloads (Last 6 weeks)135
    Reflects downloads up to 12 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)The changing meaning of “no” in Canadian sex workPLOS ONE10.1371/journal.pone.030160019:4(e0301600)Online publication date: 4-Apr-2024
    • (2023)Tackling Digital Entrepreneurship Within the Illicit EconomyDigital Entrepreneurship and Co-Creating Value Through Digital Encounters10.4018/978-1-6684-7416-7.ch006(118-144)Online publication date: 23-Jun-2023

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media