SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Extra Credit: Domestic Minor Sex Trafficking: Technology and Project Management
Michael Punzo
Texas Tech University
INTS 2310 -001
Domestic Minor Sex Trafficking: Technology and Project Management
Working in today’s society we find multiple complex problems. None so disturbing as
domestic sex trafficking among minors. When the Community Needs Assessment Committee
(CNAC) met for the first time in 2011 there were multiple backgrounds that came together to
discuss this problem. Members of the group began to concentrate on certain groups to gather
information among these groups were local law enforcement, state and federal, legal, medical,
community members, mental health professionals, and political groups.
Certainly one can see that management of such a vast varied group would take developed
skills in Project Management. A Project Manager is needed to oversee such a huge task. For
every background there are multiple different personalities and thoughts on how to eliminate this
problem. Being able to use an interdisciplinary approach results in a team of like-minded
individuals.
In Stage 1 providing research training and development of a Domestic Minor Sex
Trafficking (DMST) program is one of the necessary tools needed. A Project Manager can keep
and direct focus each of the team members to gather such information that is necessary for said
program. Another tool needed in Stage 1 is providing education for the various backgrounds
working on the team (local law enforcement, state and federal, legal, medical, community
members, mental health professionals, and political groups). In my project management class I
was able to develop a plan that took my team from early development to completed project. It
certainly comes with bumps in the road but a focused project manager can usually finish the task.
A Project Manager (PM) in this case is not just a boss, but also a liaison between the various
members. In this situation the Project Manager can direct the focus for the various research and
training that is needed to develop an overall program. Even though the article does not state that
a Project Manager of some sort was not used, one can realize the value of a project manager in a
task this overwhelming.
In Stage 4 the Voice of Hope purposed that maintaining the program and even expanding
the program would be necessary for attempting to eliminate sex trafficking among minors. These
two opportunities certainly would fall in my area of expertise in Information Technology (IT).
Whether we like it or not, technology (internet, social media, smart phone, tablets and mobile
applications) is in every facet of our lives. We must use our intelligence hand-in-hand with
technology to encompass the global initiative.
Being able to use my skills to combat this growing problem is a way of turning
something that is being used for illegal activity and then using it for the global good of mankind.
Information Technology is not limited to one facet, but rather multiple facets of this problem.
Being in the IT world one can collaborate with the different fields of expertise. We can improve
this collaboration by identifying those who prey upon the weak. This gives us an edge to combat
sex trafficking using multiple platforms. The enormous volume of data that is available to
predators must be harnessed [collected] in a database that is made available to the global first
responder network [Interpol]. After the data is collected the first responder network (Polaris,
state, federal, and global police agencies) can then sift through the information, analyze the
important and immediate needs and take action. As shown in the article being able to red flag
certain information can notify authorities when necessary. With information technologies sex
trafficking can be monitored possibly eradicated.
Technology-facilitated trafficking is far more diffuse than initially thought, it has spread
across multiple online sites and digital platforms. Mobile devices and networks play an
increasingly important role that can potentially transform the trafficking landscape. Technology
is rapidly growing and technology in its most innocent form is good, but it can be used for evil.
What happens when the weapon (technology) used for the elimination of crime is the same
weapon used against people’s safety? Something that is developed (built) for good is often
exploited which can result in depraved actions. The Internet has become both the hunting ground
and the marketplace for human sex trafficking.
We have to find ways to combat these abusers and sex traffickers of children and others
that are hiding behind encrypted networks. It is key that cyber security and social media work
together in finding a solution.
In modern times the term cybercrime is an umbrella term for heinous crimes or actions
done through and over the Internet. Sex trafficking knows no boundaries and the Internet has
made it easier for traffickers to hide and do business anonymously. Bit Coin is the new online
currency and is virtually untraceable. This makes sex trafficking through the use of the Internet
much more readily available. Smartphones are the new phenomenon and the police have to play
catch-up and learn this new technology in order to stay up with today’s cyber criminal. A few
years ago the majority of crimes were being committed via desktop computers. However, in
today’s society just about every crime that is committed, there seems to be a cellphone tied to the
crime. The rapid advancement of technology is perhaps the answer for combating the criminal
element that uses technology for sex trafficking.

Weitere ähnliche Inhalte

Was ist angesagt?

Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
The International Journal of Business Management and Technology
 
The power of social networks
The power of social networksThe power of social networks
The power of social networks
liamsmith662
 
Implementing ICT’s in Developing Countries - Condensed
Implementing ICT’s in Developing Countries - CondensedImplementing ICT’s in Developing Countries - Condensed
Implementing ICT’s in Developing Countries - Condensed
bmock3
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
UltraUploader
 
Information and Communication Technologies
Information and Communication TechnologiesInformation and Communication Technologies
Information and Communication Technologies
bmock3
 
1. Impact On How Practitioners Do Their Work
1. Impact On How Practitioners Do Their Work1. Impact On How Practitioners Do Their Work
1. Impact On How Practitioners Do Their Work
mctripletwo
 

Was ist angesagt? (20)

Final survey on disinformation and its practice during covid 19 in developing...
Final survey on disinformation and its practice during covid 19 in developing...Final survey on disinformation and its practice during covid 19 in developing...
Final survey on disinformation and its practice during covid 19 in developing...
 
Digital Gender Gaps Seen Through Social Media
Digital Gender Gaps Seen Through Social MediaDigital Gender Gaps Seen Through Social Media
Digital Gender Gaps Seen Through Social Media
 
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
 
8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
Knowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of ThingsKnowledge Sharing in the Networked World of the Internet of Things
Knowledge Sharing in the Networked World of the Internet of Things
 
The power of social networks
The power of social networksThe power of social networks
The power of social networks
 
Analysing Large-Scale News Media Content for Early Warning of Conflict - Proj...
Analysing Large-Scale News Media Content for Early Warning of Conflict - Proj...Analysing Large-Scale News Media Content for Early Warning of Conflict - Proj...
Analysing Large-Scale News Media Content for Early Warning of Conflict - Proj...
 
Implementing ICT’s in Developing Countries - Condensed
Implementing ICT’s in Developing Countries - CondensedImplementing ICT’s in Developing Countries - Condensed
Implementing ICT’s in Developing Countries - Condensed
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Information and Communication Technologies
Information and Communication TechnologiesInformation and Communication Technologies
Information and Communication Technologies
 
DIY Policing
DIY PolicingDIY Policing
DIY Policing
 
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations --   Inglis 04 27-17 -- SASCCyber-enabled Information Operations --   Inglis 04 27-17 -- SASC
Cyber-enabled Information Operations -- Inglis 04 27-17 -- SASC
 
1. Impact On How Practitioners Do Their Work
1. Impact On How Practitioners Do Their Work1. Impact On How Practitioners Do Their Work
1. Impact On How Practitioners Do Their Work
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
Biases in Social Media Research (NoBias EU project)
Biases in Social Media Research (NoBias EU project)Biases in Social Media Research (NoBias EU project)
Biases in Social Media Research (NoBias EU project)
 
Politics 3.0 : A New Democratic Model Forged by Civil Society and Digital Tec...
Politics 3.0 : A New Democratic Model Forged by Civil Society and Digital Tec...Politics 3.0 : A New Democratic Model Forged by Civil Society and Digital Tec...
Politics 3.0 : A New Democratic Model Forged by Civil Society and Digital Tec...
 
The internet’s turbulent next decade
The internet’s turbulent next decadeThe internet’s turbulent next decade
The internet’s turbulent next decade
 
Digital technology impacts by 2020
Digital technology impacts by 2020Digital technology impacts by 2020
Digital technology impacts by 2020
 
presentation to raise awareness on the ramifications of Digital Divide
 presentation to raise awareness on the ramifications of Digital Divide presentation to raise awareness on the ramifications of Digital Divide
presentation to raise awareness on the ramifications of Digital Divide
 

Andere mochten auch

Rodriquez_INTS2310_PersonalNarrative
Rodriquez_INTS2310_PersonalNarrativeRodriquez_INTS2310_PersonalNarrative
Rodriquez_INTS2310_PersonalNarrative
Kylee Rodriquez
 
Literarture Review Map
Literarture Review MapLiterarture Review Map
Literarture Review Map
Michael Rendon
 
Yoakum_3300_human trafficking
Yoakum_3300_human traffickingYoakum_3300_human trafficking
Yoakum_3300_human trafficking
Kenneth Yoakum
 
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingAnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTrafficking
Turner Sparks
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Turner Sparks
 
Final Research Paper Linkedin
Final Research Paper LinkedinFinal Research Paper Linkedin
Final Research Paper Linkedin
Dylan Rawls
 
INTS330 What is Integrative Studies
INTS330 What is Integrative StudiesINTS330 What is Integrative Studies
INTS330 What is Integrative Studies
Kali Morrison
 

Andere mochten auch (9)

Rodriquez_INTS2310_PersonalNarrative
Rodriquez_INTS2310_PersonalNarrativeRodriquez_INTS2310_PersonalNarrative
Rodriquez_INTS2310_PersonalNarrative
 
Literarture Review Map
Literarture Review MapLiterarture Review Map
Literarture Review Map
 
Yoakum_3300_human trafficking
Yoakum_3300_human traffickingYoakum_3300_human trafficking
Yoakum_3300_human trafficking
 
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingAnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTrafficking
 
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
 
Final Research Paper Linkedin
Final Research Paper LinkedinFinal Research Paper Linkedin
Final Research Paper Linkedin
 
Portfolio
PortfolioPortfolio
Portfolio
 
INTS330 What is Integrative Studies
INTS330 What is Integrative StudiesINTS330 What is Integrative Studies
INTS330 What is Integrative Studies
 
PUNZO_M2_A1
PUNZO_M2_A1PUNZO_M2_A1
PUNZO_M2_A1
 

Ähnlich wie INTS2310_PUNZO_EC

Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
Tracy Clark
 
The 9 Themes Of Digital Citizenship
The 9 Themes Of Digital CitizenshipThe 9 Themes Of Digital Citizenship
The 9 Themes Of Digital Citizenship
elie010
 

Ähnlich wie INTS2310_PUNZO_EC (14)

Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
 
Emtech2.pptx
Emtech2.pptxEmtech2.pptx
Emtech2.pptx
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
sun editorial
sun editorialsun editorial
sun editorial
 
Social-Media
Social-MediaSocial-Media
Social-Media
 
Social Media: The New DNA - flyer
Social Media: The New DNA - flyerSocial Media: The New DNA - flyer
Social Media: The New DNA - flyer
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
The 9 Themes Of Digital Citizenship
The 9 Themes Of Digital CitizenshipThe 9 Themes Of Digital Citizenship
The 9 Themes Of Digital Citizenship
 
Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.pptPOWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
POWERPOINT_-Digital-Citizenship-by-JONALYN-VINLUAN.ppt
 
CT synopsis
CT synopsisCT synopsis
CT synopsis
 

Mehr von Michael Punzo

ISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectationsISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectations
Michael Punzo
 
landtroop_letter_of_reccomendation
landtroop_letter_of_reccomendationlandtroop_letter_of_reccomendation
landtroop_letter_of_reccomendation
Michael Punzo
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6
Michael Punzo
 
ISQS 4385 ASSIGNMENT - 12
ISQS 4385 ASSIGNMENT - 12ISQS 4385 ASSIGNMENT - 12
ISQS 4385 ASSIGNMENT - 12
Michael Punzo
 
ISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectationsISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectations
Michael Punzo
 
BurningtheAmericanFlag_MSE_FINAL.doc
BurningtheAmericanFlag_MSE_FINAL.docBurningtheAmericanFlag_MSE_FINAL.doc
BurningtheAmericanFlag_MSE_FINAL.doc
Michael Punzo
 

Mehr von Michael Punzo (11)

ISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectationsISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectations
 
landtroop_letter_of_reccomendation
landtroop_letter_of_reccomendationlandtroop_letter_of_reccomendation
landtroop_letter_of_reccomendation
 
mfariley_4MPUNZO
mfariley_4MPUNZOmfariley_4MPUNZO
mfariley_4MPUNZO
 
rcc_lisk_lor
rcc_lisk_lorrcc_lisk_lor
rcc_lisk_lor
 
mfariley_4MPUNZO
mfariley_4MPUNZOmfariley_4MPUNZO
mfariley_4MPUNZO
 
ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6ISQS 4385 ASSIGNMENT - 6
ISQS 4385 ASSIGNMENT - 6
 
ISQS 4385 ASSIGNMENT - 12
ISQS 4385 ASSIGNMENT - 12ISQS 4385 ASSIGNMENT - 12
ISQS 4385 ASSIGNMENT - 12
 
SOPAandPIPA
SOPAandPIPASOPAandPIPA
SOPAandPIPA
 
ISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectationsISQS4350-ManagingStakeholderExpectations
ISQS4350-ManagingStakeholderExpectations
 
BurningtheAmericanFlag_MSE_FINAL.doc
BurningtheAmericanFlag_MSE_FINAL.docBurningtheAmericanFlag_MSE_FINAL.doc
BurningtheAmericanFlag_MSE_FINAL.doc
 
Punzo_3300_L8-RP
Punzo_3300_L8-RPPunzo_3300_L8-RP
Punzo_3300_L8-RP
 

INTS2310_PUNZO_EC

  • 1. Extra Credit: Domestic Minor Sex Trafficking: Technology and Project Management Michael Punzo Texas Tech University INTS 2310 -001
  • 2. Domestic Minor Sex Trafficking: Technology and Project Management Working in today’s society we find multiple complex problems. None so disturbing as domestic sex trafficking among minors. When the Community Needs Assessment Committee (CNAC) met for the first time in 2011 there were multiple backgrounds that came together to discuss this problem. Members of the group began to concentrate on certain groups to gather information among these groups were local law enforcement, state and federal, legal, medical, community members, mental health professionals, and political groups. Certainly one can see that management of such a vast varied group would take developed skills in Project Management. A Project Manager is needed to oversee such a huge task. For every background there are multiple different personalities and thoughts on how to eliminate this problem. Being able to use an interdisciplinary approach results in a team of like-minded individuals. In Stage 1 providing research training and development of a Domestic Minor Sex Trafficking (DMST) program is one of the necessary tools needed. A Project Manager can keep and direct focus each of the team members to gather such information that is necessary for said program. Another tool needed in Stage 1 is providing education for the various backgrounds working on the team (local law enforcement, state and federal, legal, medical, community members, mental health professionals, and political groups). In my project management class I was able to develop a plan that took my team from early development to completed project. It certainly comes with bumps in the road but a focused project manager can usually finish the task. A Project Manager (PM) in this case is not just a boss, but also a liaison between the various members. In this situation the Project Manager can direct the focus for the various research and training that is needed to develop an overall program. Even though the article does not state that
  • 3. a Project Manager of some sort was not used, one can realize the value of a project manager in a task this overwhelming. In Stage 4 the Voice of Hope purposed that maintaining the program and even expanding the program would be necessary for attempting to eliminate sex trafficking among minors. These two opportunities certainly would fall in my area of expertise in Information Technology (IT). Whether we like it or not, technology (internet, social media, smart phone, tablets and mobile applications) is in every facet of our lives. We must use our intelligence hand-in-hand with technology to encompass the global initiative. Being able to use my skills to combat this growing problem is a way of turning something that is being used for illegal activity and then using it for the global good of mankind. Information Technology is not limited to one facet, but rather multiple facets of this problem. Being in the IT world one can collaborate with the different fields of expertise. We can improve this collaboration by identifying those who prey upon the weak. This gives us an edge to combat sex trafficking using multiple platforms. The enormous volume of data that is available to predators must be harnessed [collected] in a database that is made available to the global first responder network [Interpol]. After the data is collected the first responder network (Polaris, state, federal, and global police agencies) can then sift through the information, analyze the important and immediate needs and take action. As shown in the article being able to red flag certain information can notify authorities when necessary. With information technologies sex trafficking can be monitored possibly eradicated. Technology-facilitated trafficking is far more diffuse than initially thought, it has spread across multiple online sites and digital platforms. Mobile devices and networks play an increasingly important role that can potentially transform the trafficking landscape. Technology
  • 4. is rapidly growing and technology in its most innocent form is good, but it can be used for evil. What happens when the weapon (technology) used for the elimination of crime is the same weapon used against people’s safety? Something that is developed (built) for good is often exploited which can result in depraved actions. The Internet has become both the hunting ground and the marketplace for human sex trafficking. We have to find ways to combat these abusers and sex traffickers of children and others that are hiding behind encrypted networks. It is key that cyber security and social media work together in finding a solution. In modern times the term cybercrime is an umbrella term for heinous crimes or actions done through and over the Internet. Sex trafficking knows no boundaries and the Internet has made it easier for traffickers to hide and do business anonymously. Bit Coin is the new online currency and is virtually untraceable. This makes sex trafficking through the use of the Internet much more readily available. Smartphones are the new phenomenon and the police have to play catch-up and learn this new technology in order to stay up with today’s cyber criminal. A few years ago the majority of crimes were being committed via desktop computers. However, in today’s society just about every crime that is committed, there seems to be a cellphone tied to the crime. The rapid advancement of technology is perhaps the answer for combating the criminal element that uses technology for sex trafficking.