{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:50:06Z","timestamp":1767340206043,"version":"3.44.0"},"reference-count":120,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,5,2]]},"abstract":"<jats:p>In recent years, human traffickers have increasingly relied on social media to target and recruit victims. However, limited research has been conducted on the recruitment methods used for human trafficking on social media, particularly in developing countries. Through in-person and digital observations, interviews, and case analysis, our paper sheds light on the tactics used by traffickers on social media to lure people into trafficking and highlights the characteristics of suspicious job advertisements used for human trafficking recruitment.<\/jats:p>\n          <jats:p>Our paper also discusses the investigative techniques employed by anti-trafficking experts to address recruitment and the challenges they face when identifying and investigating fraudulent jobs. Based on these findings, we provide recommendations on how technology can help tackle the problem of recruiting people online, and suggest design implications to improve the safety of social media platforms. Furthermore, we discuss the challenges and ethical considerations in developing anti-trafficking software and provide suggestions for addressing these challenges.<\/jats:p>","DOI":"10.1145\/3711016","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T01:35:05Z","timestamp":1746236105000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Investigating Human Trafficking Recruitment Online: A Study of Fraudulent Job Offers on Social Media Platforms"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-1265-4451","authenticated-orcid":false,"given":"Towera Jessica","family":"Moyo","sequence":"first","affiliation":[{"name":"University of Oxford, Oxford, Oxfordshire, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2727-6424","authenticated-orcid":false,"given":"Omer","family":"Gunes","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, Oxfordshire, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6088-3955","authenticated-orcid":false,"given":"Marina Denise","family":"Jirotka","sequence":"additional","affiliation":[{"name":"University of Oxford, Oxford, Oxfordshire, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"5Rights Foundation. 2023. 5Rights African Union approves pioneering Child Online Safety and Empowerment Policy leveraging 5Rights Toolkit. https:\/\/5rightsfoundation.com\/in-action\/african-union-adopts-pioneering-child-online-safety-and-empowerment-policy-leveraging-5rights-toolkit.html#: :text=The%20African%20Union%20Ministerial%20Meeting empowerment%20by%20design%20and%20default."},{"key":"e_1_2_1_2_1","unstructured":"ActiveFence. [n.d.]. Compliance and Regulation. https:\/\/www.activefence.com\/compliance-regulation\/"},{"key":"e_1_2_1_3_1","unstructured":"ActiveFence. 2023. Advancing Trust Safety. (2023)."},{"key":"e_1_2_1_4_1","unstructured":"African Union. 2024. Africa Has Become The First Region in The World to Implement a Child Online Safety and Empowerment Policy | African Union. https:\/\/au.int\/en\/pressreleases\/20240523\/child-online-safety-and-empowerment-policy-africa-union#: :text=The%20policy%2C%20and%20its%20proposed digital%20society%20and%20economy%20with"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph16091490nolinkurl10.3390\/ijerph16091490"},{"key":"e_1_2_1_6_1","unstructured":"Caitlin Allen. 2019. The Role of the Internet on Sex Trafficking - International Observatory of Human Rights. https:\/\/observatoryihr.org\/blog\/the-role-of-the-internet-on-sex-trafficking\/"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","unstructured":"Issa Alsmadi and Keng Hoon Gan. 2019. Review of short-text classification. 155--182 pages.https:\/\/doi.org\/10.1108\/IJWIS-12--2017-0083doi:nolinkurl10.1108\/IJWIS-12--2017-0083","DOI":"10.1108\/IJWIS-12--2017-0083nolinkurl10.1108\/IJWIS-12--2017-0083"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2016.7745456"},{"key":"e_1_2_1_9_1","unstructured":"Brittany Anthony. 2018. On-Ramps Intersections Routes: and Exit A Roadmap for Systems and Industries to Prevent and Disrupt Human Trafficking. (2018)."},{"key":"e_1_2_1_10_1","unstructured":"Hassan Marzoughi Ardakani. 2020. LSU Digital Commons Identifying Human Trafficking Networks in Louisiana by Using Authorship Attribution and Network Modeling IDENTIFYING HUMAN TRAFFICKING NETWORKS IN LOUISIANA BY USING AUTHORSHIP ATTRIBUTION. LSU Doctoral Dissertations Vol. 5274 (2020)."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","unstructured":"M. Arenas O. Corcho E. Simperl M. Strohmaier M. D'Aquin K. Srinivas P. Groth M. Dumontier J. Heflin K. Thirunarayan and S. Staab. 2015. The semantic Web -ISWC 2015: 14th international semantic web conference bethlehem PA USA October 11--15 2015 proceedings part II. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 9367 (2015) 205--221. https:\/\/doi.org\/10.1007\/978--3--319--25010--6doi:nolinkurl10.1007\/978--3--319--25010--6","DOI":"10.1007\/978--3--319--25010--6nolinkurl10.1007\/978--3--319--25010--6"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/10496491.2017.1297974nolinkurl10.1080\/10496491.2017.1297974"},{"key":"e_1_2_1_13_1","volume-title":"A partner in TRAFFICKING: THE ROLE OF INTERNET TECHNOLOGIES IN THE FACILITATION OF HUMAN TRAFFICKING. December","author":"Arronte Renata","year":"2018","unstructured":"Renata Arronte. 2018. A partner in TRAFFICKING: THE ROLE OF INTERNET TECHNOLOGIES IN THE FACILITATION OF HUMAN TRAFFICKING. December (2018)."},{"key":"e_1_2_1_14_1","unstructured":"Coryn Barclay. 2018. Semi-Structured Interviews. Technical Report. http:\/\/sociology.fas.harvard.edu\/files\/sociology\/files\/interview_strategies.pdf"},{"key":"e_1_2_1_15_1","volume-title":"John Richards, Diptikalyan Saha, Prasanna Sattigeri, Moninder Singh, Kush R. Varshney, and Yunfeng Zhang.","author":"Bellamy Rachel K. E.","year":"2018","unstructured":"Rachel K. E. Bellamy, Kuntal Dey, Michael Hind, Samuel C. Hoffman, Stephanie Houde, Kalapriya Kannan, Pranay Lohia, Jacquelyn Martino, Sameep Mehta, Aleksandra Mojsilovic, Seema Nagar, Karthikeyan Natesan Ramamurthy, John Richards, Diptikalyan Saha, Prasanna Sattigeri, Moninder Singh, Kush R. Varshney, and Yunfeng Zhang. 2018. AI Fairness 360: An Extensible Toolkit for Detecting, Understanding, and Mitigating Unwanted Algorithmic Bias. (10 2018). http:\/\/arxiv.org\/abs\/1810.01943"},{"key":"e_1_2_1_16_1","unstructured":"Tolga Bolukbasi KaiWei Chang James Zou Venkatesh Saligrama and Adam Kalai. 2016. Man is to Computer Programmer as Woman is to Homemaker? Debiasing Word Embeddings. (2016)."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12142-014-0303--9nolinkurl10.1007\/s12142-014-0303--9"},{"key":"e_1_2_1_18_1","volume-title":"Language Models are Few-Shot Learners. (5","author":"Brown Tom B.","year":"2020","unstructured":"Tom B. Brown, Benjamin Mann, Nick Ryder, Melanie Subbiah, Jared Kaplan, Prafulla Dhariwal, Arvind Neelakantan, Pranav Shyam, Girish Sastry, Amanda Askell, Sandhini Agarwal, Ariel Herbert-Voss, Gretchen Krueger, Tom Henighan, Rewon Child, Aditya Ramesh, Daniel M. Ziegler, Jeffrey Wu, Clemens Winter, Christopher Hesse, Mark Chen, Eric Sigler, Mateusz Litwin, Scott Gray, Benjamin Chess, Jack Clark, Christopher Berner, Sam McCandlish, Alec Radford, Ilya Sutskever, and Dario Amodei. 2020. Language Models are Few-Shot Learners. (5 2020). http:\/\/arxiv.org\/abs\/2005.14165"},{"key":"e_1_2_1_19_1","unstructured":"Louis Bruijn. 2020. Inter-Annotator Agreement (IAA). Pair-wise Cohen kappa and group Fleiss'?dots | by Louis de Bruijn | Towards Data Science. https:\/\/towardsdatascience.com\/inter-annotator-agreement-2f46c6d37bf3"},{"key":"e_1_2_1_20_1","unstructured":"Imogen Calderwood. 2018. Human Traffickers Using Facebook to Lure Migrants Into 'Trips'. https:\/\/www.globalcitizen.org\/en\/content\/human-trafficking-facebook-adverts-refugees\/"},{"key":"e_1_2_1_21_1","unstructured":"Paolo Campana. 2022. Online and technology-facilitated trafficking in human beings Summary and recommendations Group of Experts on Action against Trafficking in Human Beings. Technical Report."},{"key":"e_1_2_1_22_1","volume-title":"LARGE LANGUAGE MODELS FOR TEXT CLASSIFICATION: FROM ZERO-SHOT LEARNING TO FINE-TUNING Large language models for text classification. Technical Report.","author":"Chae Youngjin","year":"2023","unstructured":"Youngjin Chae and Thomas Davidson. 2023. LARGE LANGUAGE MODELS FOR TEXT CLASSIFICATION: FROM ZERO-SHOT LEARNING TO FINE-TUNING Large language models for text classification. Technical Report."},{"key":"e_1_2_1_23_1","volume-title":"FOSTA: A Hostile Law with a Human Cost. Technical Report. 2171 pages.","author":"Chamberlain Lura","year":"2019","unstructured":"Lura Chamberlain. 2019. FOSTA: A Hostile Law with a Human Cost. Technical Report. 2171 pages."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/0956797617714579nolinkurl10.1177\/0956797617714579"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.51357\/jdll.v3i2.226nolinkurl10.51357\/jdll.v3i2.226"},{"key":"e_1_2_1_26_1","unstructured":"DataGrail. 2023. How to Implement Data Minimization | DataGrail. https:\/\/www.datagrail.io\/blog\/data-privacy\/how-to-implement-data-minimization\/"},{"key":"e_1_2_1_27_1","unstructured":"Julia Deeb-Swihart. 2022. DEEB-SWIHART-DISSERTATION-2022. (2022)."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555186"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555186"},{"key":"e_1_2_1_30_1","unstructured":"Us Department of State. 2023. OFFICE TO MONITOR AND COMBAT T RAFFICKING IN PERSONS Online Recruitment of Vulnerable Populations for Forced Labor. Technical Report. https:\/\/www.state."},{"key":"e_1_2_1_31_1","unstructured":"Dhaliwal Jasdev. [n. d.]. Online Job Scams -- TikTokers Tell Their Stories with a Warning | McAfee Blog. https:\/\/www.mcafee.com\/blogs\/internet-security\/online-job-scams-tiktokers-tell-their-stories-with-a-warning\/"},{"key":"e_1_2_1_32_1","volume-title":"THE EVOLUTION OF HUMAN TRAFFICKING: THE USE OF SOCIAL MEDIA AND FINANCIAL INSTITUTIONS. December","author":"Dorton Katherine","year":"2019","unstructured":"Katherine Dorton. 2019. THE EVOLUTION OF HUMAN TRAFFICKING: THE USE OF SOCIAL MEDIA AND FINANCIAL INSTITUTIONS. December (2019)."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/23322705.2015.1015342nolinkurl10.1080\/23322705.2015.1015342"},{"key":"e_1_2_1_34_1","unstructured":"Egnyte. 2021. Data Auditing -- Improve Data Quality | Egnyte. https:\/\/www.egnyte.com\/guides\/governance\/data-auditing"},{"key":"e_1_2_1_35_1","unstructured":"European Commission. [n. d.]. The Digital Services Act. https:\/\/commission.europa.eu\/strategy-and-policy\/priorities-2019--2024\/europe-fit-digital-age\/digital-services-act_en"},{"volume-title":"Intelligence Notfification: Trafficking in Human Beings and the Internet. October","year":"2014","key":"e_1_2_1_36_1","unstructured":"Europol. 2014. Intelligence Notfification: Trafficking in Human Beings and the Internet. October (2014), 1--3. https:\/\/www.europol.europa.eu\/publications-documents\/trafficking-in-human-beings-and-internet"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","unstructured":"Camilla Fabbri Heidi St\u00f6ckl Cathy Zimmerman Katharine Jones Harry Cook Claire Galez-Davis Naomi Grant and Yuki Lo. 2023. Labor Recruitment and Human Trafficking: Analysis of a Global Trafficking Survivor Database. https:\/\/doi.org\/10.1177\/01979183221139120doi:nolinkurl10.1177\/01979183221139120","DOI":"10.1177\/01979183221139120nolinkurl10.1177\/01979183221139120"},{"key":"e_1_2_1_38_1","unstructured":"Amy Fedele. 2021. Human Trafficking Trends in Sub-Saharan Africa (Infographic) | ASEC-SLDI News. http:\/\/asec-sldi.org\/news\/current\/human-trafficking-sub-saharan-africa\/"},{"key":"e_1_2_1_39_1","unstructured":"Kyleigh Feehs and Alyssa Currier Wheeler. 2020. Federal Human Trafficking Report. (2020)."},{"key":"e_1_2_1_40_1","unstructured":"Mackenzie Flynn. 2021. FOSTA-SESTA and its impact on sex workers - AIDS United. https:\/\/aidsunited.org\/fosta-sesta-and-its-impact-on-sex-workers\/"},{"key":"e_1_2_1_41_1","unstructured":"Freedom Signal. [n. d.]. Freedom Signal. https:\/\/freedomsignal.org\/"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","unstructured":"Jo\u00e3o Gama Indre Zliobaite Albert Bifet Mykola Pechenizkiy and Abdelhamid Bouchachia. 2014. A survey on concept drift adaptation. https:\/\/doi.org\/10.1145\/2523813doi:nolinkurl10.1145\/2523813","DOI":"10.1145\/2523813nolinkurl10.1145\/2523813"},{"key":"e_1_2_1_43_1","unstructured":"Government Gazette and Government Notice. 2022. Films and Publications Act: Regulations: Amendment. Technical Report. www.gpwonline.co.za"},{"key":"e_1_2_1_44_1","unstructured":"Global Slavery Index. 2018. Africa | Region Highlights. https:\/\/www.globalslaveryindex.org\/2018\/findings\/regional-analysis\/africa\/"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-021-00095--8nolinkurl10.1007\/s43681-021-00095--8"},{"key":"e_1_2_1_46_1","unstructured":"GOV.UK. 2023. A guide to the Online Safety Bill - GOV.UK. https:\/\/www.gov.uk\/guidance\/a-guide-to-the-online-safety-bill"},{"key":"e_1_2_1_47_1","volume-title":"International Journal of Cyber Warfare and Terrorism ( IJCWT )","author":"Greiman V","year":"2013","unstructured":"V Greiman and C Bain. 2013. The Emergence of Cyber Activity. International Journal of Cyber Warfare and Terrorism ( IJCWT ), Vol. 12, 2 (2013), 41--49."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D19-6115"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICI2ST.2019.00034"},{"key":"e_1_2_1_50_1","unstructured":"Kristin Houser. 2019. Human Traffickers Are Selling Slaves on Instagram | Futurism. https:\/\/futurism.com\/human-traffickers-selling-slaves-instagram"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300637"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.539nolinkurl10.1109\/HICSS.2016.539"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.200nolinkurl10.1109\/HICSS.2014.200"},{"key":"e_1_2_1_54_1","unstructured":"Iguazio. [n. d.]. What is Concept Drift. https:\/\/www.iguazio.com\/glossary\/concept-drift\/"},{"key":"e_1_2_1_55_1","unstructured":"Information Commissioner's Office. 2022. Chapter 3: pseudonymisation Draft anonymisation pseudonymisation and privacy enhancing technologies guidance. Technical Report."},{"key":"e_1_2_1_56_1","volume-title":"Removing Spurious Features can Hurt Accuracy and Affect Groups Disproportionately. (12","author":"Khani Fereshte","year":"2020","unstructured":"Fereshte Khani and Percy Liang. 2020. Removing Spurious Features can Hurt Accuracy and Affect Groups Disproportionately. (12 2020). http:\/\/arxiv.org\/abs\/2012.04104"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1162\/taclnolinkurl10.1162\/tacl"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.3233\/978--1--61499--858--7--80nolinkurl10.3233\/978--1--61499--858--7--80"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2177556nolinkurl10.2139\/ssrn.2177556"},{"key":"e_1_2_1_60_1","volume-title":"M.A., Research Associate September","author":"Latonero Mark","year":"2011","unstructured":"Mark Latonero and Lauren Movius. 2011. Center on Communication Leadership & Policy Human Trafficking Online The Role of Social Networking Sites and Online Classifieds. Research Assistant Tala Mohebi, M.A., Research Associate September (2011). http:\/\/technologyandtrafficking.usc.edu\/files\/2011\/09\/HumanTrafficking_FINAL.pdf"},{"key":"e_1_2_1_61_1","volume-title":"Fighting Fire with Fire : Technology in Child Sex Trafficking '' From low-tech methods such as prostituting minors at truck stops, to high-tech or trade","author":"Leary Mary Graw","year":"2014","unstructured":"Mary Graw Leary. 2014. Fighting Fire with Fire : Technology in Child Sex Trafficking '' From low-tech methods such as prostituting minors at truck stops, to high-tech or trade. '''. , Vol. 21 (2014)."},{"key":"e_1_2_1_62_1","volume-title":"RoBERTa: A Robustly Optimized BERT Pretraining Approach. (7","author":"Liu Yinhan","year":"2019","unstructured":"Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke Zettlemoyer, and Veselin Stoyanov. 2019. RoBERTa: A Robustly Optimized BERT Pretraining Approach. (7 2019). http:\/\/arxiv.org\/abs\/1907.11692"},{"key":"e_1_2_1_63_1","unstructured":"Rachel Marshall. 2016. Sex Workers and Human Rights A Critical Analysis of Laws Sex Work. Technical Report. 2016--2017 pages. http:\/\/perma.cc\/A8BDZNUR]."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2023.101710nolinkurl10.1016\/j.copsyc.2023.101710"},{"key":"e_1_2_1_65_1","unstructured":"Michael McKenna. [n. d.]. Bias in AI: How to Mitigate Bias in AI Systems | Toptal\u00ae. https:\/\/www.toptal.com\/artificial-intelligence\/mitigating-ai-bias"},{"key":"e_1_2_1_66_1","unstructured":"Meta. [n. d.]. Community Standards Enforcement | Transparency Center. https:\/\/transparency.meta.com\/reports\/community-standards-enforcement\/fake-accounts\/facebook\/#content-actioned"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2019.2901464nolinkurl10.1109\/TPAMI.2019.2901464"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","unstructured":"Dhiraj Murthy. 2008. Digital ethnography: An examination of the use of new technologies for social research. 837--855 pages.https:\/\/doi.org\/10.1177\/0038038508094565doi:nolinkurl10.1177\/0038038508094565","DOI":"10.1177\/0038038508094565nolinkurl10.1177\/0038038508094565"},{"key":"e_1_2_1_69_1","unstructured":"National Computer and Cybercrime Coordination Committee. [n. d.]. The Computer Misuse and Cybercrimes Act 2018 | NC4. https:\/\/nc4.go.ke\/the-computer-misuse-and-cybercrimes-act-2018\/#: :text=CMCA%20provides%20for%20offences%20relating matters%2C%20and%20for%20connected%20purposes."},{"key":"e_1_2_1_70_1","unstructured":"NETalent. 2024. NETalent African Union approves a pioneering Child Online Safety and Empowerment Policy leveraging 5Rights Toolkit. https:\/\/www.netalent.pro\/views\/EN\/article.html?id=240122"},{"key":"e_1_2_1_71_1","unstructured":"Newsome Melton. 2020. What Is the Process of Sex and Human Trafficking? https:\/\/www.newsomelaw.com\/sex-trafficking-lawyer\/what-is-the-process-of-sex-and-human-trafficking\/"},{"key":"e_1_2_1_72_1","volume-title":"Australia: The scope of the Online Safety Act | Insights | DataGuidance. https:\/\/www.dataguidance.com\/opinion\/australia-scope-online-safety-act","author":"Data Guidance OneTrust","year":"2022","unstructured":"OneTrust Data Guidance. 2022. Australia: The scope of the Online Safety Act | Insights | DataGuidance. https:\/\/www.dataguidance.com\/opinion\/australia-scope-online-safety-act"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1080\/10282580.2011.565973nolinkurl10.1080\/10282580.2011.565973"},{"key":"e_1_2_1_74_1","unstructured":"OSCE. 2020. Leveraging innovation to fight trafficking in human beings : A comprehensive analysis of technology tools."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2021.100336nolinkurl10.1016\/j.patter.2021.100336"},{"key":"e_1_2_1_76_1","unstructured":"Ambika Pawar Swati Ahirrao Mr Prathamesh and P Churi. [n. d.]. Anonymization Techniques for Protecting Privacy: A Survey. Technical Report."},{"key":"e_1_2_1_77_1","unstructured":"Chris (Behavioural researcher) Perry Krishna Chhatralia Dom Damesick Sylvie Hobden Leanora Volpe and Health Foundation (Great Britain). 2015. Behavioural insights in health care : nudging to reduce inefficiency and waste. 73 pages."},{"key":"e_1_2_1_78_1","unstructured":"Eliska Pirkova. 2022. The Digital Services Act: your guide to the EU's new content moderation rules - Access Now. https:\/\/www.accessnow.org\/digital-services-act-eu-content-moderation-rules-guide\/"},{"key":"e_1_2_1_79_1","volume-title":"Nesta Italia, LABC Srl, and CWEP.","author":"Tenda Progetto","year":"2021","unstructured":"Progetto Tenda, Danish Refugee Council, Nesta Italia, LABC Srl, and CWEP. 2021. Free2Link Report. (2021)."},{"key":"e_1_2_1_80_1","unstructured":"Prostasia Foundation. [n. d.]. Support the SAFE SEX Workers Study Act - Prostasia Foundation. https:\/\/prostasia.org\/campaign\/support-the-safe-sex-workers-study-act\/"},{"key":"e_1_2_1_81_1","unstructured":"Alec Radford Jeffrey Wu Rewon Child David Luan Dario Amodei and Ilya Sutskever. [n. d.]. Language Models are Unsupervised Multitask Learners. Technical Report. https:\/\/github.com\/codelucas\/newspaper"},{"key":"e_1_2_1_82_1","unstructured":"Rephrain. 2024. REPHRAIN -- National Research Centre on Privacy Harm Reduction and Adversarial Influence Online. https:\/\/www.rephrain.ac.uk\/"},{"key":"e_1_2_1_83_1","unstructured":"Ines Rold\u00f3s. [n. d.]. Major Challenges of Natural Language Processing (NLP). https:\/\/monkeylearn.com\/blog\/natural-language-processing-challenges\/"},{"key":"e_1_2_1_84_1","unstructured":"Aja Romano. 2018. FOSTA-SESTA a law intended to curb sex trafficking threatens the internet's future - Vox. https:\/\/www.vox.com\/culture\/2018\/4\/13\/17172762\/fosta-sesta-backpage-230-internet-freedom"},{"key":"e_1_2_1_85_1","doi-asserted-by":"crossref","unstructured":"Keisuke Sakaguchi Ronan Le Bras Chandra Bhagavatula and Yejin Choi. 2019. WINOGRANDE: An Adversarial Winograd Schema Challenge at Scale. Technical Report. http:\/\/winogrande.enai.org.","DOI":"10.1609\/aaai.v34i05.6399"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1080\/21931674.2014.991184nolinkurl10.1080\/21931674.2014.991184"},{"key":"e_1_2_1_87_1","unstructured":"Seldon. 2021. Machine Learning Concept Drift - What is it and Five Steps to Deal With it - Seldon. https:\/\/www.seldon.io\/machine-learning-concept-drift"},{"key":"e_1_2_1_88_1","unstructured":"Abby Seneor and Matteo Mezzanotte. 2022. Open source data science: How to reduce bias in AI | World Economic Forum. https:\/\/www.weforum.org\/agenda\/2022\/10\/open-source-data-science-bias-more-ethical-ai-technology\/"},{"key":"e_1_2_1_89_1","doi-asserted-by":"crossref","unstructured":"Shabnoor Siddiqui. 2016. Social Media its Impact with Positive and Negative Aspects. Technical Report 2. 71--75 pages. www.ijcat.com","DOI":"10.7753\/IJCATR0502.1006"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2612733.2612746"},{"key":"e_1_2_1_91_1","unstructured":"City Simon. 2018. Perma | On Backpage | Tits and Sass. https:\/\/perma.cc\/39AT-6MKT"},{"key":"e_1_2_1_92_1","unstructured":"Ellie Louise Simonson. 2021. Semi-Supervised Classification of Social Media Posts : Identifying Sex-Industry Posts to Enable Better Support for Those Experiencing Sex-Trafficking by Semi-Supervised Classification of Social Media Posts : Identifying Sex-Industry Posts to Enable Better. (2021)."},{"key":"e_1_2_1_93_1","unstructured":"Devin Soni. 2022. Feedback Loops in Machine Learning Systems | by Devin Soni | Towards Data Science. https:\/\/towardsdatascience.com\/feedback-loops-in-machine-learning-systems-701296c91787"},{"key":"e_1_2_1_94_1","volume-title":"Dataset Cartography: Mapping and Diagnosing Datasets with Training Dynamics. (9","author":"Swayamdipta Swabha","year":"2020","unstructured":"Swabha Swayamdipta, Roy Schwartz, Nicholas Lourie, Yizhong Wang, Hannaneh Hajishirzi, Noah A. Smith, and Yejin Choi. 2020. Dataset Cartography: Mapping and Diagnosing Datasets with Training Dynamics. (9 2020). http:\/\/arxiv.org\/abs\/2009.10795"},{"key":"e_1_2_1_95_1","volume-title":"Trafficking in human beings: Internet recruitment. Europe","author":"Sykiotou Athanassia","year":"2007","unstructured":"Athanassia Sykiotou. 2007. Trafficking in human beings: Internet recruitment. Europe (2007)."},{"key":"e_1_2_1_96_1","unstructured":"Rende Lisa Taylor and Mark Latonero. 2018. Updated Guide to Ethics and Human rights in Anti-Human Trafficking: Ethical Standards for Working with Migrant Workers and Trafficked PErsons in the Digital Age. (2018). http:\/\/library1.nida.ac.th\/termpaper6\/sd\/2554\/19755.pdf"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58607-2_34"},{"key":"e_1_2_1_98_1","unstructured":"The UN Agency for Digital Technologies. 2021. Are African countries doing enough to ensure cybersecurity and Internet safety? - ITU. https:\/\/www.itu.int\/hub\/2021\/09\/are-african-countries-doing-enough-to-ensure-cybersecurity-and-internet-safety\/"},{"key":"e_1_2_1_99_1","unstructured":"Thorn. 2018. Survivor Insights:The Role of Technology in Domestic Minor Sex Trafficking JANUARY. Thorn (2018)."},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1142"},{"volume-title":"Africa","author":"UNICEF.","key":"e_1_2_1_101_1","unstructured":"UNICEF. 2003. Trafficking in human beings, especially women and children, in Africa. UNICEF Innocenti Research Center. 72 pages."},{"key":"e_1_2_1_102_1","unstructured":"United Nations. 2000. Protocol to Prevent Suppress and Punish Trafficking in Persons Especially Women and Children supplementing the United Nations Convention against Transnational Organized Crime | OHCHR. https:\/\/www.ohchr.org\/en\/instruments-mechanisms\/instruments\/protocol-prevent-suppress-and-punish-trafficking-persons"},{"key":"e_1_2_1_103_1","unstructured":"United Nations Office on Drugs and Crime. 2018. Global Report on Trafficking in Persons. Technical Report."},{"key":"e_1_2_1_104_1","unstructured":"United Nations Office on Drugs and Crime. 2020. Global Report on Trafficking in Persons. (2020)."},{"key":"e_1_2_1_105_1","unstructured":"US Department of State. 2019. TRAFFICKING IN PERSONS REPORT. (2019)."},{"key":"e_1_2_1_106_1","unstructured":"US Department of State. 2023. Report to Congress on 2023 Trafficking in Persons Interim Assessment Pursuant to the Trafficking Victims Protection Act - United States Department of State. https:\/\/www.state.gov\/report-to-congress-on-2023-trafficking-in-persons-interim-assessment-pursuant-to-the-trafficking-victims-protection-act\/#: :text=The%20Trafficking%20Victims%20Protection%20Act%20of%202000%20as%20amended%20(TVPA the%20countries%20on%20that%20list."},{"key":"e_1_2_1_107_1","unstructured":"Liudmyla Vasylieva. 2021. Anonymisation and pseudonymisation of textual documents. Technical Report."},{"key":"e_1_2_1_108_1","doi-asserted-by":"crossref","unstructured":"Ada Volodko Ella Cockbain and Bennett Kleinberg. 2020. '' Spotting the signs '' of trafficking recruitment online : exploring the characteristics of advertisements targeted at migrant job-seekers. (2020).","DOI":"10.1007\/s12117-019-09376-5"},{"key":"e_1_2_1_109_1","unstructured":"S Walby B Apitzsch J. E. Armstrong S Balderston K Szmagalska-Follis Kelly L Francis B. J. C. A May-Chahal A Rashid K. Shire J. Towers and M Tunte. 2016. Study on the gender dimension of trafficking in human beings. (2016) 18--31."},{"key":"e_1_2_1_110_1","volume-title":"REVISE: A Tool for Measuring and Mitigating Bias in Visual Datasets. Technical Report. https:\/\/github.com\/princetonvisualai\/revise-tool.","author":"Wang Angelina","year":"2020","unstructured":"Angelina Wang. 2020. REVISE: A Tool for Measuring and Mitigating Bias in Visual Datasets. Technical Report. https:\/\/github.com\/princetonvisualai\/revise-tool."},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307729.2307769"},{"key":"e_1_2_1_112_1","volume-title":"Sex trafficking detection with ordinal regression neural networks. arXiv","author":"Wang Longshaokan","year":"2018","unstructured":"Longshaokan Wang, Eric Laber, Yeng Saanchi, and Sherrie Caltagirone. 2020. Sex trafficking detection with ordinal regression neural networks. arXiv April 2018 (2020)."},{"key":"e_1_2_1_113_1","unstructured":"Peter Waters. 2023. The perils of feedback loops in machine learning: predictive policing | Gilbert Tobin Lawyers: Law Firm in Sydney Melbourne & Perth. https:\/\/www.gtlaw.com.au\/knowledge\/perils-feedback-loops-machine-learning-predictive-policing"},{"key":"e_1_2_1_114_1","unstructured":"Jessica Whitney. 2017. KM VS HUMAN TRAFFICKING : AN EXPLORATORY STUDY ON USING EMOJIS FOR A KNOWLEDGE DRIVEN APPROACH TO IDENTIFYING ONLINE HUMAN SEX TRAFFICKING Presented to the Faculty of San Diego State University In Partial Fulfillment of the Requirements for the Degree Mas. (2017)."},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.537"},{"key":"e_1_2_1_116_1","unstructured":"Maarit2 Widmann. 2020. Cohen's Kappa: what it is when to use it how to avoid pitfalls | KNIME. https:\/\/www.knime.com\/blog\/cohens-kappa-an-overview"},{"key":"e_1_2_1_117_1","unstructured":"Kate Williams. 2022. Participant Observation 101: Definition Types Uses Examples. https:\/\/surveysparrow.com\/blog\/participant-observation\/#: :text=Passive%20participant%20observation done%20without%20the%20participants'%20knowledge."},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808769.2808779"},{"key":"e_1_2_1_119_1","doi-asserted-by":"crossref","unstructured":"Siyi Zhou Jiankun Peng and Emilio Ferrara. 2024. Tracing the Unseen: Uncovering Human Trafficking Patterns in Job Listings. Technical Report. https:\/\/www.chineseinla.com\/user\/id","DOI":"10.2139\/ssrn.4883445"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC49498.2019.9108860"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711016","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:57:46Z","timestamp":1755737866000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711016"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":120,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,5,2]]}},"alternative-id":["10.1145\/3711016"],"URL":"https:\/\/doi.org\/10.1145\/3711016","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2025,5,2]]},"assertion":[{"value":"2025-05-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}