ucla underground railroad presentation.pptx
TRANSCRIPT
September 21, 2015
Using Technology to Counter Human Trafficking
Researchers: Sarah Godoy, MSW and Kathleen Baca, MaEd
Project Manager: Rebecca Sadwick
Faculty Advisor: John Villasenor, Ph.D.
Luskin Center for Innovation, University of California, Los Angeles
Google has tasked UCLA with suggesting recommendations to combat human trafficking
Explore Human Trafficking Across the U.S. Focus: Domestic-born sex trafficked and labor trafficked minors
Depict Geographic Manifestations of Trafficking Focus: High-intense areas
Collect New Data Focus: Gaps and Needs
Develop RecommendationsFocus: Technology
Scope of Work Current Data Themes Recommendations Conclusions
Reviewing extant literature informs research gaps
Scope of Work Current Data Themes Recommendations Conclusion
Exploiter initiates conversation with child
via social media
Exploiter sends minor new phone to communicate
• Minor agrees to meet her new “boyfriend” in
person
Minor is trapped
• Exploiter advertises minor on
Backpage.com
Minor is sold for sex
To drive the final recommendations, the team collected primary source data
Scope of Work Current Data Themes Recommendations Conclusion
• Across all sectors • All areas of traffickingTraining
To drive the final recommendations, the team collected primary source data
Scope of Work Current Data Themes Recommendations Conclusion
Collaborate• Intersectional• Cross-sectional
To drive the final recommendations, the team collected primary source data
Scope of Work Current Data Themes Recommendations Conclusion
Current Tech
• Lack of awareness• Need to leverage
To drive the final recommendations, the team collected primary source data
Scope of Work Current Data Themes Recommendations Conclusion
Collaborate
Current Tech
Develop Tech
• Intersectional• Cross-sectional
• Lack of awareness• Need to leverage
• Across all sectors • All areas of traffickingTraining
• Invest in innovative ideas
Themes
Researchers recommend using technology in the following ways
Scope of Work Current Data Themes Recommendations Conclusion
National Database
Law EnforcementVictim
Emergency Help
Service Providers
Available Servicesin real-time
Identified challenges to mitigate during implementation
● Financial concerns ● Policies and regulations● Confidentiality ● Sensitive information● Safety Issues● Access ● Hacking● Maintenance
Scope of Work Current Data Themes Recommendations Conclusion