Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

University of New Haven

Discipline
Keyword
Publication

Articles 1 - 30 of 31

Full-Text Articles in Social and Behavioral Sciences

Attributes Of Police Vehicle Crashes, David Lambert Dec 2016

Attributes Of Police Vehicle Crashes, David Lambert

Criminal Justice Faculty Publications

While overall on-duty law enforcement deaths has decreased moderately from over 160 in 1980 to a level under 120 per year in the late 2000s, fatalities by motor vehicle collisions have steadily increased. This descriptive analysis examines police vehicle crashes during specific conditions such as emergency response, road surface, lighting, and weather in a large statewide police agency. Police vehicle crashes are most likely to occur on dry roads, in daylight conditions, and in clear weather on weekdays as opposed to weekends. Weather and lighting conditions are not the most frequent factors associated with cruiser crashes in this examination.


Collecting Quality Infrared Spectra From Microscopic Samples Of Suspicious Powders In A Sealed Cell, Brooke Weinger Kammrath, Pauline E. Leary, John A. Reffner Sep 2016

Collecting Quality Infrared Spectra From Microscopic Samples Of Suspicious Powders In A Sealed Cell, Brooke Weinger Kammrath, Pauline E. Leary, John A. Reffner

Forensic Science Publications

The infrared (IR) microspectroscopical analysis of samples within a sealed-cell containing barium fluoride is a critical need when identifying toxic agents or suspicious powders of unidentified composition. The dispersive nature of barium fluoride is well understood and experimental conditions can be easily adjusted during reflection–absorption measurements to account for differences in focus between the visible and IR regions of the spectrum. In most instances, the ability to collect a viable spectrum is possible when using the sealed cell regardless of whether visible or IR focus is optimized. However, when IR focus is optimized, it is possible to collect useful data …


Changes In Job Satisfaction Through Time In Two Major New England Fishing Ports, Tarsila Seara, Richard Pollnac, John J. Poggie Aug 2016

Changes In Job Satisfaction Through Time In Two Major New England Fishing Ports, Tarsila Seara, Richard Pollnac, John J. Poggie

Biology and Environmental Science Faculty Publications

Fishing communities in the U.S. have been the subject of great transformation due to changes in availability of resources and the implementation of different rules and regulations to manage the fisheries and conserve fish stocks. Job satisfaction has been widely regarded as an important component of well-being especially among fishermen because the occupation of fishing includes attributes of ‘adventure,’ ‘challenge,’ and ‘being outdoors’ infrequently found in other employment. It has been previously demonstrated that management driven changes to fishing communities can directly and indirectly affect aspects of fishermen’s job satisfaction and, consequently, their wellbeing. This paper presents a unique through …


Out Of Big Brother's Shadow: Ranking Economics Faculties At Regional Universities In The Us South, Franklin Mixon, Jr., Kamal Upadhyaya Aug 2016

Out Of Big Brother's Shadow: Ranking Economics Faculties At Regional Universities In The Us South, Franklin Mixon, Jr., Kamal Upadhyaya

Economics & Business Analytics Faculty Publications

This study applies the methodology of a recent study that ranks economics departments at national universities in the U.S. South to economics faculties at regional universities in the same geographic location. Ranking results from a “core” (i.e., the top five faculty researchers) of each institution's economics faculty reveals that Appalachian State University, James Madison University, Southeastern Louisiana University, Trinity University and Loyola University – New Orleans currently maintain the top five economics faculties, respectively, among the approximately 200 regional universities in the U.S. South.


Cufa: A More Formal Definition For Digital Forensic Artifacts, Vikram S. Harichandran, Daniel Walnycky, Ibrahim Baggili, Frank Breitinger Aug 2016

Cufa: A More Formal Definition For Digital Forensic Artifacts, Vikram S. Harichandran, Daniel Walnycky, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

The term “artifact” currently does not have a formal definition within the domain of cyber/ digital forensics, resulting in a lack of standardized reporting, linguistic understanding between professionals, and efficiency. In this paper we propose a new definition based on a survey we conducted, literature usage, prior definitions of the word itself, and similarities with archival science. This definition includes required fields that all artifacts must have and encompasses the notion of curation. Thus, we propose using a new term e curated forensic artifact (CuFA) e to address items which have been cleared for entry into a CuFA database (one …


Deleting Collected Digital Evidence By Exploiting A Widely Adopted Hardware Write Blocker, Christopher S. Meffert, Ibrahim Baggili, Frank Breitinger Aug 2016

Deleting Collected Digital Evidence By Exploiting A Widely Adopted Hardware Write Blocker, Christopher S. Meffert, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

In this primary work we call for the importance of integrating security testing into the process of testing digital forensic tools. We postulate that digital forensic tools are increasing in features (such as network imaging), becoming networkable, and are being proposed as forensic cloud services. This raises the need for testing the security of these tools, especially since digital evidence integrity is of paramount importance. At the time of conducting this work, little to no published anti-forensic research had focused on attacks against the forensic tools/process.We used the TD3, a popular, validated, touch screen disk duplicator and hardware write blocker …


Anti-Forensics: Furthering Digital Forensic Science Through A New Extended, Granular Taxonomy, Kevin Conlan, Ibrahim Baggili, Frank Breitinger Aug 2016

Anti-Forensics: Furthering Digital Forensic Science Through A New Extended, Granular Taxonomy, Kevin Conlan, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital forensic community. Thus, new research initiatives and strategies must be formulated to address this growing problem. In this work we first collect and categorize 308 antidigital forensic tools to survey the field. We then devise an extended anti-forensic taxonomy to the one proposed by Rogers (2006) in order to create a more comprehensive taxonomy and facilitate linguistic standardization. Our work also takes into consideration anti-forensic activity which utilizes tools that were not originally designed for antiforensic purposes, but can still be used with malicious intent. This category …


Juvenile Transfer To Adult Court: Ongoing Search For Scientific Support, David Myers Jul 2016

Juvenile Transfer To Adult Court: Ongoing Search For Scientific Support, David Myers

Criminal Justice Faculty Publications

(From p. 3) The basic question addressed in this body of research is as follows: Does transferring juvenile offenders to the adult criminal justice system produce a specific deterrent, criminogenic, or null effect? Unfortunately, despite two decades of research and the meta-analytic techniques employed in this study, a definitive answer to this question remains unclear. Nevertheless, when the results of this meta-analysis are considered along with findings from other relevant research conducted during the past 20 years, it seems clear that the practice of treating juveniles as adults should be limited to the most serious, violent, and chronic offenders, who …


How Personality Affects Vulnerability Among Israelis And Palestinians Following The 2009 Gaza Conflict, Daphna Canetti, Shaul Kimhi, Rasmiyah Hanoun, Gabriel A. Rocha, Sandro Galea, Charles A. Morgan Iii Jul 2016

How Personality Affects Vulnerability Among Israelis And Palestinians Following The 2009 Gaza Conflict, Daphna Canetti, Shaul Kimhi, Rasmiyah Hanoun, Gabriel A. Rocha, Sandro Galea, Charles A. Morgan Iii

National Security Faculty Publications

Can the onset of PTSD symptoms and depression be predicted by personality factors and thought control strategies? A logical explanation for the different mental health outcomes of individuals exposed to trauma would seem to be personality factors and thought control strategies. Trauma exposure is necessary but not sufficient for the development of PTSD. To this end, we assess the role of personality traits and coping styles in PTSD vulnerability among Israeli and Palestinian students amid conflict.We also determine whether gender and exposure level to trauma impact the likelihood of the onset of PTSD symptoms. Five questionnaires assess previous trauma, PTSD …


Parenting Stress As A Mediator Of Exposure To Potentially Traumatic Events And Behavioral Health Outcomes In Children And Youth, Joy S. Kaufman, Melissa L. Whitson, Cindy A. Crusto Jun 2016

Parenting Stress As A Mediator Of Exposure To Potentially Traumatic Events And Behavioral Health Outcomes In Children And Youth, Joy S. Kaufman, Melissa L. Whitson, Cindy A. Crusto

Psychology Faculty Publications

The research team has been examining parenting stress, defined as stress that parents feel in their parenting role, as a mediator of behavioral health outcomes for children exposed to potentially traumatic events. The results of our studies demonstrate the interplay between a child’s exposure to potentially traumatic events and their parent/caregiver’s report of stress related to parenting their child.


Assessing The Relevance Of Statistics And Crime Analysis Courses For Working Crime Analysts, Jonathan A. Kringen, Christopher M. Sedelmaier, Elink-Schuurman-Laura Jun 2016

Assessing The Relevance Of Statistics And Crime Analysis Courses For Working Crime Analysts, Jonathan A. Kringen, Christopher M. Sedelmaier, Elink-Schuurman-Laura

Criminal Justice Faculty Publications

Crime analysts study criminal activity and police function to improve performance. Analysts inform operations, aid resource allocation, and evaluate programs. These tasks require high levels of statistical literacy. Given that most analysts are college-educated civilians, college coursework in statistics and/or crime analysis may represent the foundational knowledgebase within the profession. However, little research has attempted to determine if coursework teaches the skills needed by analysts. Underlying this issue is a limited understanding about what technical skills crime analysts regularly use. Analyzing parallel surveys of 98 criminal justice educators and 146 crime analysts, this study compares the skills taught in undergraduate-level …


Rapid Android Parser For Investigating Dex Files (Rapid), Xiaolu Zhang, Frank Breitinger, Ibrahim Baggili Jun 2016

Rapid Android Parser For Investigating Dex Files (Rapid), Xiaolu Zhang, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Android malware is a well-known challenging problem and many researchers/vendors/practitioners have tried to address this issue through application analysis techniques. In order to analyze Android applications, tools decompress APK files and extract relevant data from the Dalvik EXecutable (DEX) files. To acquire the data, investigators either use decompiled intermediate code generated by existing tools, e.g., Baksmali or Dex2jar or write their own parsers/dissemblers. Thus, they either need additional time because of decompiling the application into an intermediate representation and then parsing text files, or they reinvent the wheel by implementing their own parsers. In this article, we present Rapid Android …


A Cyber Forensics Needs Analysis Survey: Revisiting The Domain's Needs A Decade Later, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili, Andrew Marrington Mar 2016

A Cyber Forensics Needs Analysis Survey: Revisiting The Domain's Needs A Decade Later, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili, Andrew Marrington

Electrical & Computer Engineering and Computer Science Faculty Publications

The number of successful cyber attacks continues to increase, threatening financial and personal security worldwide. Cyber/digital forensics is undergoing a paradigm shift in which evidence is frequently massive in size, demands live acquisition, and may be insufficient to convict a criminal residing in another legal jurisdiction. This paper presents the findings of the first broad needs analysis survey in cyber forensics in nearly a decade, aimed at obtaining an updated consensus of professional attitudes in order to optimize resource allocation and to prioritize problems and possible solutions more efficiently. Results from the 99 respondents gave compelling testimony that the following …


A Method And A Case Study For The Selection Of The Best Available Tool For Mobile Device Forensics Using Decision Analysis, Shahzad Saleem, Oliver Popov, Ibrahim Baggili Mar 2016

A Method And A Case Study For The Selection Of The Best Available Tool For Mobile Device Forensics Using Decision Analysis, Shahzad Saleem, Oliver Popov, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The omnipresence of mobile devices (or small scale digital devices - SSDD) and more importantly the utility of their associated applications for our daily activities, which range from financial transactions to learning, and from entertainment to distributed social presence, create an abundance of digital evidence for each individual. Some of the evidence may be a result of illegal activities that need to be identified, understood and eventually prevented in the future. There are numerous tools for acquiring and analyzing digital evidence extracted from mobile devices. The diversity of SSDDs, types of evidence generated and the number of tools used to …


The Cost Of War: Weighing Civilian Losses In The Afghan War, Jibey Asthappan Mar 2016

The Cost Of War: Weighing Civilian Losses In The Afghan War, Jibey Asthappan

Criminal Justice Faculty Publications

Spending almost US $700 billion to combat insurgents in Afghanistan, the U.S. population should be hopeful that they “bought” something of value as the Afghan War concludes. This exploratory study focuses on evaluating operations within Afghanistan by accounting for enemy and civilian losses. Integration of civilian losses offers an opportunity to evaluate operations that represent societal losses to the Afghan people. Regression estimates using zero-inflated negative-binomial models indicate that military operations resulted in more civilian casualties than enemy losses.


Sectoral Herding: Evidence From An Emerging Market, Esin Cakan, Aram Balagyozyan Jan 2016

Sectoral Herding: Evidence From An Emerging Market, Esin Cakan, Aram Balagyozyan

Economics & Business Analytics Faculty Publications

This study examines herding behavior in all industrial sectors of the Turkish stock market. Applying the methodology of Chang et al. (2000) to the Turkish sectoral daily stock prices from 2002 to 2014, we found strong evidence of herding. This evidence did not disappear even after we controlled for market regimes and firm fundamentals. Investor herding is asymmetric in all sectors; even though herding is prevalent in both rising and falling markets, it is more pronounced in rising markets. In the financial, services, and technology sectors herding is detected only in the highly volatile markets. In contrast, in low-volatility markets …


Climate Change And Its Impact On Wheat Production In Kansas, Joshua C. Howard, Esin Cakan, Kamal Upadhyaya Jan 2016

Climate Change And Its Impact On Wheat Production In Kansas, Joshua C. Howard, Esin Cakan, Kamal Upadhyaya

Economics & Business Analytics Faculty Publications

This paper studies the effect of climate change on wheat production in Kansas using annual time series data from 1949 to 2014. For the study, an error correction model is developed in which the price of wheat, the price of oats (substitute good), average annual temperature and average annual precipitation are used as explanatory variables with total output of wheat being the dependent variable. Time series properties of the data series are diagnosed using unit root and cointegration tests. The estimated results suggest that Kansas farmers are supply responsive to both wheat as well as its substitute (oat) prices in …


Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili Jan 2016

Bytewise Approximate Matching: The Good, The Bad, And The Unknown, Vikram S. Harichandran, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Hash functions are established and well-known in digital forensics, where they are commonly used for proving integrity and file identification (i.e., hash all files on a seized device and compare the fingerprints against a reference database). However, with respect to the latter operation, an active adversary can easily overcome this approach because traditional hashes are designed to be sensitive to altering an input; output will significantly change if a single bit is flipped. Therefore, researchers developed approximate matching, which is a rather new, less prominent area but was conceived as a more robust counterpart to traditional hashing. Since the conception …


Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee Jan 2016

Towards Syntactic Approximate Matching-A Pre-Processing Experiment, Doowon Jeong, Frank Breitinger, Hari Kang, Sangjin Lee

Electrical & Computer Engineering and Computer Science Faculty Publications

Over the past few years, the popularity of approximate matching algorithms (a.k.a. fuzzy hashing) has increased. Especially within the area of bytewise approximate matching, several algorithms were published, tested, and improved. It has been shown that these algorithms are powerful, however they are sometimes too precise for real world investigations. That is, even very small commonalities (e.g., in the header of a file) can cause a match. While this is a desired property, it may also lead to unwanted results. In this paper, we show that by using simple pre-processing, we significantly can influence the outcome. Although our test set …


Exploring Deviant Hacker Networks (Dhn) On Social Media Platforms, Samer Al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger Jan 2016

Exploring Deviant Hacker Networks (Dhn) On Social Media Platforms, Samer Al-Kateeb, Kevin Conlan, Nitin Agarwal, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Online Social Networks (OSNs) have grown exponentially over the past decade. The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious activities (e.g., cybercrime, cyberterrorism, and cyberwarfare). These nefarious uses of OSNs poses a signi_cant threat to society, and thus requires research attention. In this exploratory work, we study activities of one deviant groups: hacker groups on social media, which we term Deviant Hacker Networks (DHN). We investigated the connection between different DHNs on Twitter: how they are connected, identified …


Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger Jan 2016

Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …


Correlates Of Improvement In Substance Abuse Among Dually Diagnosed Veterans With Post-Traumatic Stress Disorder In Specialized Intensive Va Treatment, Kendell Coker, Elina Stefanovics, Robert Rosenheck Jan 2016

Correlates Of Improvement In Substance Abuse Among Dually Diagnosed Veterans With Post-Traumatic Stress Disorder In Specialized Intensive Va Treatment, Kendell Coker, Elina Stefanovics, Robert Rosenheck

Psychology Faculty Publications

Substantial rates of substance use comorbidity have been observed among veterans with PTSD highlighting the need to identify patient and program characteristics associated with improved outcomes for substance abuse. Data were drawn from 12,270 dually diagnosed veterans who sought treatment from specialized intensive Veterans Health Administration PTSD programs between 1993 and 2011. The magnitude of the improvement in Addiction Severity Index (ASI) alcohol and drug use composite scores from baseline was moderate, with effect sizes (ES) of -.269 and -.287, respectively. Multivariate analyses revealed that treatment in longer-term programs, being prescribed psychiatric medication, and planned participation in reunions were all …


Detection Of White-Collar Corruption In Public Procurement In Norway: The Role Of Whistleblowers, Petter Gottschalk, Christy Smith Jan 2016

Detection Of White-Collar Corruption In Public Procurement In Norway: The Role Of Whistleblowers, Petter Gottschalk, Christy Smith

Public Administration Faculty Publications

There is a low risk of detection for white-collar criminals in most nations. White-collar criminals in public procurement corruption are probably no exception. Public procurement appears particularly vulnerable to corruption despite the multitude of policies and procedures that most public organizations have in place to ensure proper stewardship of public funds. While these mechanisms are designed to control and make transparent the procurement process, corruption has been inherent in public procurement since governments first began buying goods and services. This article presents the topics of white-collar crime, public procurement corruption, and detection by whistleblowers. Based on a sample of 390 …


The Dark Figure Of Online Property Crime: Is Cyberspace Hiding A Crime Wave?, Maria Tcherni-Buzzeo, Andrew Davis, Giza Lopes, Alan Lizotte Jan 2016

The Dark Figure Of Online Property Crime: Is Cyberspace Hiding A Crime Wave?, Maria Tcherni-Buzzeo, Andrew Davis, Giza Lopes, Alan Lizotte

Criminal Justice Faculty Publications

A pronounced drop in crime, since the early 1990s, has encompassed every crime category tracked by the FBI’s Uniform Crime Reports, including property crime. However, over the same period, the rates of online property crime (OPC) have been on the rise according to available evidence. We delineate the extent of our knowledge and data concerning cybercrime and identity theft and, using data from several nationally representative victimization surveys, offer an alternative view of property crime trends while pointing out the glaring gap in crime reporting and accounting in relation to the growing category of property crimes perpetrated online. In addition, …


Transnational Criminal Organizations (Tcos): The Case Of Combating Criminal Biker Gangs, Petter Gottschalk, Vesna Markovic Jan 2016

Transnational Criminal Organizations (Tcos): The Case Of Combating Criminal Biker Gangs, Petter Gottschalk, Vesna Markovic

Criminal Justice Faculty Publications

Transnational crime organizations (TCOs) represent a challenge to societies all over the world. This article explores combating criminal biker gangs, where stakeholders in the community and governments vary in their responses. These stakeholders include the government, law enforcers, courts, and the communities. The variation in responses is conceptualized in terms of a four stage of growth model. This model includes criminal biker gang members being treated as movie stars, individual criminals, organized criminals, and finally, enemies of the state. A stage model is a theoretical approach to understanding different levels of maturity in combating criminal biker gangs. Due to the …


Professor Mike Morris' Full Bibliography, Mike Morris Jan 2016

Professor Mike Morris' Full Bibliography, Mike Morris

Psychology Faculty Publications

No abstract provided.


Overcoming The Barriers To Green Procurement In The County: Interest Groups And Administrative Professionalism, Christy Smith, Jessica N. Terman Jan 2016

Overcoming The Barriers To Green Procurement In The County: Interest Groups And Administrative Professionalism, Christy Smith, Jessica N. Terman

Public Administration Faculty Publications

Scholars and practitioners have come to understand the important role of local governments in the causes and effects of climate change. The literature has examined both the substantive and symbolic determinants of urban sustainability policies in addition to the implementation issues associated with those policies. At the heart of these policies is the idea that local governments have the desire and ability to engage in socially and environmentally responsible practices to mitigate climate change. While important, these studies are missing a key component in the investigation of local government involvement in sustainability policies: government purchasing power. This study examines the …


Species Identification Of Golden And Bald Eagle Talons Using Morphometrics, Avery J. Appleton, R. Christopher O'Brien, Pepper W. Trail Jan 2016

Species Identification Of Golden And Bald Eagle Talons Using Morphometrics, Avery J. Appleton, R. Christopher O'Brien, Pepper W. Trail

Forensic Science Publications

The Golden Eagle (Aquila chrysaetos) and Bald Eagle (Haliaeetus leucocephalus) are the largest avian predators in North America, and are thus species of great ecological importance and cultural significance. There is a long history of human use of eagle body parts, and this use continues today: Bald and Golden eagles are among the North American birds most affected by the illegal wildlife trade. Detached eagle talons are often recovered in both law enforcement and archaeological contexts, but data to allow morphological identification of these talons have been lacking. This study documents measureable differences in the morphology of Bald Eagle and …


Screening Of Exosomal Micrornas From Colorectal Cancer Cells, Cillian Clancy, Sonja Khan, Claire L. Glynn, Emma Holian, Peter Dockery, Pierce Lalor, James A.L. Brown, Myles Joyce, Michael J. Kerin, Roisin M. Dwyer Jan 2016

Screening Of Exosomal Micrornas From Colorectal Cancer Cells, Cillian Clancy, Sonja Khan, Claire L. Glynn, Emma Holian, Peter Dockery, Pierce Lalor, James A.L. Brown, Myles Joyce, Michael J. Kerin, Roisin M. Dwyer

Forensic Science Publications

BACKGROUND: Cells release extracellular membrane vesicles including microvesicles known as exosomes. Exosomes contain microRNAs (miRNAs) however the full range within colorectal cancer cell secreted exosomes is unknown. OBJECTIVE: To identify the full range of exosome encapsulated miRNAs secreted from 2 colorectal cancer cell lines and to investigate engineering of exosomes over-expressing miRNAs. METHODS: Exosomes were isolated from HCT-116 and HT-29 cell lines. RNA was extracted from exosomes and microRNA array performed. Cells were engineered to express miR-379 (HCT-116-379) or a non-targeting control (HCT-116-NTC) and functional effects were determined. Exosomes secreted by engineered cells were transferred to recipient cells and the …


Overcoming Human Trafficking Via Operations Research And Analytics: Opportunities For Methods, Models, And Applications, Renata A. Konrad, Andrew C. Trapp, Timothy Palmbach Jan 2016

Overcoming Human Trafficking Via Operations Research And Analytics: Opportunities For Methods, Models, And Applications, Renata A. Konrad, Andrew C. Trapp, Timothy Palmbach

Forensic Science Publications

Human trafficking is a transnational complex societal and economic issue. While human trafficking has been studied in a variety of contexts, including criminology, sociological, and clinical domains, to date there has been very little coverage in the operations research (OR) and analytics community. This paper highlights how operations research and analytics techniques can be used to address the growing issue of human trafficking. It is intended to give insight to operations research and analytics professionals into the unique concerns, problems, and challenges in human trafficking; the relevance of OR and analytics to key pillars of human trafficking including prevention, protection, …