The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2015
DOI: 10.1080/21931674.2014.991184
|View full text |Cite|
|
Sign up to set email alerts
|

Use of technology in human trafficking networks and sexual exploitation: A cross-sectional multi-country study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
2

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 22 publications
0
14
0
2
Order By: Relevance
“…In [18], it is revealed that attackers use sophisticated software and techniques such as encrypted communication, or strongly protected online servers, to avoid tracking and remain an unknown status. Some authors [19], recommend analyzing: inconsistency of the age, variance in the alias, frequency of content, shared management, race, nationality, and third-party publications, in order to detect anomalies in the profiles of alleged followers which are online attackers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In [18], it is revealed that attackers use sophisticated software and techniques such as encrypted communication, or strongly protected online servers, to avoid tracking and remain an unknown status. Some authors [19], recommend analyzing: inconsistency of the age, variance in the alias, frequency of content, shared management, race, nationality, and third-party publications, in order to detect anomalies in the profiles of alleged followers which are online attackers.…”
Section: Related Workmentioning
confidence: 99%
“…Figure 1 shows the whole process from the tweet searching related to human traffic [17] or slavery [21] of people; download and processing of this information [18], [22]; until the extraction of characteristics and their classification. The main objective of this phase is to obtain a blacklist of suspicious websites related to tweets.…”
Section: System Proposalmentioning
confidence: 99%
“…Indeed, many virtual convergence settings are used by the actors in this market to either recruit victims or sell sexual services. In addition, the Internet is also being used to communicate with clients, to gather information on available services, and even to provide reviews of escort services by the clients (Kunze 2010;Sarkar 2015).…”
Section: Trafficking In Human Beings: the Case Of Sexual Exploitationmentioning
confidence: 99%
“…The two, however, should not be confused as the different goals and processes of each activity can be neatly distinguished, certainly in theory, but also, typically, in actuality (Salt and Hogarth, 2000). Due to the ascendancy of human trafficking as an issue, more is known about the role and use of ICT in the human trafficking business, particularly sex trafficking, and in this context, the literature appears to grow at a more certain pace (Di Nicola, Cauduro and Falletta, 2013;Latonero, Berhane, Hernandez, Mohebi and Movius, 2011;Latonero et al, 2012;Sykiotou, 2007;Myria, 2017;Sarkar, 2015). Conversely, the knowledge base on the use of ICT in human smuggling has rarely gone beyond the rather generic observation that the Internet and mobile technologies are available to and are used by both smugglers and migrants.…”
Section: Introduction: Situating Ict In Human Smugglingmentioning
confidence: 99%