SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Human Trafficking: A Perspective from Computer Science and
Organizational Leadership
Turner Sparks
University Studies
Abstract
With human trafficking plaguing our society, it is obvious the measures taken thus far are
not adequate in solving the problem. An interdisciplinary technique is necessary to address
human trafficking, because it is a complex issue that is a serious societal concern and has
not been resolved. It was found that perspectives from Computer Science and
Organizational Leadership together can provide valuable insights. Better surveillance and
tracking software can be developed, and appropriate strategies can be created to utilize the
software to the best potential. The current software works well in controlled environments,
but the video sensors we have today are not ideal for real world applications. Law
enforcement officers do not have adequate training in dealing with human trafficking, and
there aren’t many regulations to protect citizens’ privacy and safety when it comes to
video surveillance. In order to overcome these obstacles, further development of video
surveillance technology and more extensive training in regards to human trafficking
should be the focus for future research and development on this topic.
Focus Question
How is law enforcement utilizing surveillance and tracking software to track the
whereabouts of possible victims or suspects involved with human trafficking?
Conclusions
During the research process, it was discovered that law
enforcement has implemented types of tracking surveillance software
before and other types of video tracking were being tested, but were not
reliable enough for use in the field. By integrating insights from
Computer Science and Organizational Leadership, it could be possible to
develop better video tracking systems and have leaders implement them
to be used in tracking suspects and victims of human trafficking.
Future efforts for this research could be focused on getting better
video sensors to have more depth and resolution to make tracking
subjects easier. Also, developing better tracking algorithms could
improve the accuracy and reliability of the tracking systems’ results. The
weaknesses in today’s tracking systems are brought about by the video
sensors not being able to differentiate objects in adverse lighting
conditions and the software not being able to handle all of the raw data
that is accumulated on all of the available video surveillance systems.
Future study should look at how to overcome these obstacles.
Once a more reliable system has been developed, it could be
implemented as a real world solution by placing these systems in
strategic locations such as airports, bus and train stations, border
crossings, and ports. With these insights in mind, video surveillance
systems could soon be an invaluable tool for addressing the wicked
problem of human trafficking.
Repko’s 10 Steps
A. Drawing on disciplinary insights
1. Define the problem or state the research question
2. Justify using an interdisciplinary approach
3. Identify relevant disciplines
4. Conduct the literature search
5. Develop adequacy in each relevant discipline
6. Analyze the problem and evaluate each insight or theory
B. Integrating disciplinary insights
7. Identify conflicts between insights and their sources
8. Create common ground between concepts and theories
9. Construct a more comprehensive understanding
10. Reflect on, test, and communicate the understanding
Conflicts
When looking at a problem from the perspectives of different disciplines, conflicts
can occur between or within the insights of those disciplines. It is necessary to identify
these conflicts “because [they] stand in the way of creating common ground and, thus, of
achieving integration” (Repko, 2012, p. 294).
Conflicts within the discipline of Computer Science:
• Lin et al. (2009) and Szpak and Tapamo (2011) claim success using video surveillance
and behavior recognition.
• Hassaballah (2015) argues variations in lighting and the use of masks will make these
systems useless.
Conflicts between the disciplines of Computer Science and Organizational Leadership:
• Hadjimatheou (2014) discusses privacy concerns with using untargeted facial
recognition. He argues this will make innocent people feel like suspects.
• Computer Scientists believe the face is not private and even if this is an invasion of
privacy, it is necessary to ensure the safety and wellbeing of our citizens.
A More Comprehensive Understanding
Creating Common Ground
• Extending the concept of ever-evolving technology, it is expected that hardware will
improve making the video surveillance systems be more reliable in the future.
• When addressing the privacy concerns with facial recognition, the concept that one’s
face is private is redefined. By acknowledging a person’s face is not private when that
person is in a public place with his/her face uncovered, there can be no claim to an
invasion of privacy when using facial recognition in public areas.
• To create a more comprehensive understanding, the insights of Computer Science and
Organizational Leadership need to be synthesized. The new integrative insight will
focus on placing the appropriate leaders in the necessary positions to ensure updated,
more reliable tracking software can be developed and then given to leaders in law
enforcement to utilize in the field.
• Many people are not comfortable with untargeted scanning and tracking of their faces.
However, it has been determined the face is not private. Photo ID is already required to
purchase certain goods or to take advantage of certain services available to us. It is not
practical or logical to believe it is acceptable to use our faces for these purposes, but not
for improving security and ensuring our safety and wellbeing.
Grubb, D., & Bennett, K. (2012). The readiness of local law enforcement to engage in US anti-trafficking efforts: an assessment of human
trafficking training and awareness of local, county, and state law enforcement agencies in the State of Georgia. Police Practice &
Research, 13(6), 487-500.
Guzman, O. (2015) Organizational Leadership theories. Retrieved from http://smallbusiness.chron.com/organizational-leadership-theories-284.html
Hadjimatheou, K. (2014). The relative moral risks of untargeted and targeted surveillance. Ethical Theory & Moral Practice, 17(2), 187-207.
Hassaballah, M., & Aly, S. (2015). Face recognition: challenges, achievements and future directions. IET Computer Vision, 9(4), 614-626.
Lin, L., Seo, Y., Gen, M., & Cheng, R. (2009). Unusual human behavior recognition using evolutionary technique. Computers & Industrial
Engineering, 56(3), 1137-1153.
Lochner, S. A. (2013 Saving face: Regulating law enforcement’s use of mobile facial recognition technology and iris scans. Arizona Law Review,
55(1), 201-233.
Repko, A. (2012). Interdisciplinary research: Process and theory. Los Angeles, CA, Sage.
Szpak, Z., & Tapamo, J. (2011). Maritime surveillance: Tracking ships inside a dynamic background using a fast level-set. Expert Systems With
Applications, 38(6), 6669-6680.
The Vancouver Canucks Fan Zone (2011, June 15). Retrieved from http://www.gigapixel.com/image/gigapan-canucks-g7.html
References

Weitere ähnliche Inhalte

Was ist angesagt?

Norman Sadeh's Presentation
Norman Sadeh's PresentationNorman Sadeh's Presentation
Norman Sadeh's PresentationMediabistro
 
Analysis of Existing Models & Proposed Cyber Crime Investigation Model
Analysis of Existing Models & Proposed Cyber Crime Investigation ModelAnalysis of Existing Models & Proposed Cyber Crime Investigation Model
Analysis of Existing Models & Proposed Cyber Crime Investigation ModelIJERD Editor
 
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeMark Underwood
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on CybersecurityGraham Mann
 
Insights of Engineering Technology and Organizational Leadership on Human Tra...
Insights of Engineering Technology and Organizational Leadership on Human Tra...Insights of Engineering Technology and Organizational Leadership on Human Tra...
Insights of Engineering Technology and Organizational Leadership on Human Tra...Pablo Villa-Martinez
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceAnimesh Singh
 
Taubenberger
TaubenbergerTaubenberger
Taubenbergeranesah
 
Top 10 intrusion detection system papes
Top 10 intrusion detection system papesTop 10 intrusion detection system papes
Top 10 intrusion detection system papesIJNSA Journal
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelCSCJournals
 
Blackbox Testing in AI Cybersecurity
Blackbox Testing in AI CybersecurityBlackbox Testing in AI Cybersecurity
Blackbox Testing in AI CybersecurityShauryaGupta38
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignmentMagalyLippens
 
Community Supervision in the 21st Century
Community Supervision in the 21st CenturyCommunity Supervision in the 21st Century
Community Supervision in the 21st CenturyMathew Shelby
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...DETER-Project
 
Starting From Scratch - the ELN Reality
Starting From Scratch - the ELN RealityStarting From Scratch - the ELN Reality
Starting From Scratch - the ELN RealityJohn Trigg
 
Data Reliability Challenges with Spark by Henning Kropp (Spark & Hadoop User ...
Data Reliability Challenges with Spark by Henning Kropp (Spark & Hadoop User ...Data Reliability Challenges with Spark by Henning Kropp (Spark & Hadoop User ...
Data Reliability Challenges with Spark by Henning Kropp (Spark & Hadoop User ...Comsysto Reply GmbH
 

Was ist angesagt? (20)

Norman Sadeh's Presentation
Norman Sadeh's PresentationNorman Sadeh's Presentation
Norman Sadeh's Presentation
 
Analysis of Existing Models & Proposed Cyber Crime Investigation Model
Analysis of Existing Models & Proposed Cyber Crime Investigation ModelAnalysis of Existing Models & Proposed Cyber Crime Investigation Model
Analysis of Existing Models & Proposed Cyber Crime Investigation Model
 
Codes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of CodeCodes of Ethics and the Ethics of Code
Codes of Ethics and the Ethics of Code
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
Insights of Engineering Technology and Organizational Leadership on Human Tra...
Insights of Engineering Technology and Organizational Leadership on Human Tra...Insights of Engineering Technology and Organizational Leadership on Human Tra...
Insights of Engineering Technology and Organizational Leadership on Human Tra...
 
merged_document
merged_documentmerged_document
merged_document
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
Trusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open SourceTrusted, Transparent and Fair AI using Open Source
Trusted, Transparent and Fair AI using Open Source
 
Taubenberger
TaubenbergerTaubenberger
Taubenberger
 
Top 10 intrusion detection system papes
Top 10 intrusion detection system papesTop 10 intrusion detection system papes
Top 10 intrusion detection system papes
 
A Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment ModelA Bring Your Own Device Risk Assessment Model
A Bring Your Own Device Risk Assessment Model
 
Blackbox Testing in AI Cybersecurity
Blackbox Testing in AI CybersecurityBlackbox Testing in AI Cybersecurity
Blackbox Testing in AI Cybersecurity
 
I018145157
I018145157I018145157
I018145157
 
Facial recognition e-skills assignment
Facial recognition e-skills assignmentFacial recognition e-skills assignment
Facial recognition e-skills assignment
 
Capstone Paper
Capstone PaperCapstone Paper
Capstone Paper
 
Community Supervision in the 21st Century
Community Supervision in the 21st CenturyCommunity Supervision in the 21st Century
Community Supervision in the 21st Century
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
 
Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...Testimony of Terry V. Benzel, University of Southern California Information S...
Testimony of Terry V. Benzel, University of Southern California Information S...
 
Starting From Scratch - the ELN Reality
Starting From Scratch - the ELN RealityStarting From Scratch - the ELN Reality
Starting From Scratch - the ELN Reality
 
Data Reliability Challenges with Spark by Henning Kropp (Spark & Hadoop User ...
Data Reliability Challenges with Spark by Henning Kropp (Spark & Hadoop User ...Data Reliability Challenges with Spark by Henning Kropp (Spark & Hadoop User ...
Data Reliability Challenges with Spark by Henning Kropp (Spark & Hadoop User ...
 

Ähnlich wie CS Org Ldrshp Poster

Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Turner Sparks
 
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingAnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingTurner Sparks
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfMahdi_Fahmideh
 
Public Health Surveillance Systems
Public Health Surveillance SystemsPublic Health Surveillance Systems
Public Health Surveillance SystemsRochelle Schear
 
Automatic video censoring system using deep learning
Automatic video censoring system using deep learningAutomatic video censoring system using deep learning
Automatic video censoring system using deep learningIJECEIAES
 
The Ohio State University Law Enforcement Agencies and Emerging Technology.docx
The Ohio State University Law Enforcement Agencies and Emerging Technology.docxThe Ohio State University Law Enforcement Agencies and Emerging Technology.docx
The Ohio State University Law Enforcement Agencies and Emerging Technology.docxwrite5
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxgerardkortney
 
Age and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural NetworkAge and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural NetworkIRJET Journal
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 yearsMehedi Hasan
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationAIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONAIRCC Publishing Corporation
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technologyVivek Soni
 
Running head surveillance state research1 page 2running
Running head surveillance state research1 page  2runningRunning head surveillance state research1 page  2running
Running head surveillance state research1 page 2runningSHIVA101531
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial RecognitionJennifer York
 
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination EnvironmentA Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 

Ähnlich wie CS Org Ldrshp Poster (20)

Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...Human Trafficking-A Perspective from Computer Science and Organizational Lead...
Human Trafficking-A Perspective from Computer Science and Organizational Lead...
 
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingAnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTrafficking
 
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdfDigital Forensics for Artificial Intelligence (AI ) Systems.pdf
Digital Forensics for Artificial Intelligence (AI ) Systems.pdf
 
Public Health Surveillance Systems
Public Health Surveillance SystemsPublic Health Surveillance Systems
Public Health Surveillance Systems
 
Automatic video censoring system using deep learning
Automatic video censoring system using deep learningAutomatic video censoring system using deep learning
Automatic video censoring system using deep learning
 
The Ohio State University Law Enforcement Agencies and Emerging Technology.docx
The Ohio State University Law Enforcement Agencies and Emerging Technology.docxThe Ohio State University Law Enforcement Agencies and Emerging Technology.docx
The Ohio State University Law Enforcement Agencies and Emerging Technology.docx
 
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxOral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docx
 
Age and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural NetworkAge and Gender Classification using Convolutional Neural Network
Age and Gender Classification using Convolutional Neural Network
 
Digital forensics research: The next 10 years
Digital forensics research: The next 10 yearsDigital forensics research: The next 10 years
Digital forensics research: The next 10 years
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technology
 
Running head surveillance state research1 page 2running
Running head surveillance state research1 page  2runningRunning head surveillance state research1 page  2running
Running head surveillance state research1 page 2running
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Biometric Facial Recognition
Biometric Facial RecognitionBiometric Facial Recognition
Biometric Facial Recognition
 
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination EnvironmentA Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 

CS Org Ldrshp Poster

  • 1. Human Trafficking: A Perspective from Computer Science and Organizational Leadership Turner Sparks University Studies Abstract With human trafficking plaguing our society, it is obvious the measures taken thus far are not adequate in solving the problem. An interdisciplinary technique is necessary to address human trafficking, because it is a complex issue that is a serious societal concern and has not been resolved. It was found that perspectives from Computer Science and Organizational Leadership together can provide valuable insights. Better surveillance and tracking software can be developed, and appropriate strategies can be created to utilize the software to the best potential. The current software works well in controlled environments, but the video sensors we have today are not ideal for real world applications. Law enforcement officers do not have adequate training in dealing with human trafficking, and there aren’t many regulations to protect citizens’ privacy and safety when it comes to video surveillance. In order to overcome these obstacles, further development of video surveillance technology and more extensive training in regards to human trafficking should be the focus for future research and development on this topic. Focus Question How is law enforcement utilizing surveillance and tracking software to track the whereabouts of possible victims or suspects involved with human trafficking? Conclusions During the research process, it was discovered that law enforcement has implemented types of tracking surveillance software before and other types of video tracking were being tested, but were not reliable enough for use in the field. By integrating insights from Computer Science and Organizational Leadership, it could be possible to develop better video tracking systems and have leaders implement them to be used in tracking suspects and victims of human trafficking. Future efforts for this research could be focused on getting better video sensors to have more depth and resolution to make tracking subjects easier. Also, developing better tracking algorithms could improve the accuracy and reliability of the tracking systems’ results. The weaknesses in today’s tracking systems are brought about by the video sensors not being able to differentiate objects in adverse lighting conditions and the software not being able to handle all of the raw data that is accumulated on all of the available video surveillance systems. Future study should look at how to overcome these obstacles. Once a more reliable system has been developed, it could be implemented as a real world solution by placing these systems in strategic locations such as airports, bus and train stations, border crossings, and ports. With these insights in mind, video surveillance systems could soon be an invaluable tool for addressing the wicked problem of human trafficking. Repko’s 10 Steps A. Drawing on disciplinary insights 1. Define the problem or state the research question 2. Justify using an interdisciplinary approach 3. Identify relevant disciplines 4. Conduct the literature search 5. Develop adequacy in each relevant discipline 6. Analyze the problem and evaluate each insight or theory B. Integrating disciplinary insights 7. Identify conflicts between insights and their sources 8. Create common ground between concepts and theories 9. Construct a more comprehensive understanding 10. Reflect on, test, and communicate the understanding Conflicts When looking at a problem from the perspectives of different disciplines, conflicts can occur between or within the insights of those disciplines. It is necessary to identify these conflicts “because [they] stand in the way of creating common ground and, thus, of achieving integration” (Repko, 2012, p. 294). Conflicts within the discipline of Computer Science: • Lin et al. (2009) and Szpak and Tapamo (2011) claim success using video surveillance and behavior recognition. • Hassaballah (2015) argues variations in lighting and the use of masks will make these systems useless. Conflicts between the disciplines of Computer Science and Organizational Leadership: • Hadjimatheou (2014) discusses privacy concerns with using untargeted facial recognition. He argues this will make innocent people feel like suspects. • Computer Scientists believe the face is not private and even if this is an invasion of privacy, it is necessary to ensure the safety and wellbeing of our citizens. A More Comprehensive Understanding Creating Common Ground • Extending the concept of ever-evolving technology, it is expected that hardware will improve making the video surveillance systems be more reliable in the future. • When addressing the privacy concerns with facial recognition, the concept that one’s face is private is redefined. By acknowledging a person’s face is not private when that person is in a public place with his/her face uncovered, there can be no claim to an invasion of privacy when using facial recognition in public areas. • To create a more comprehensive understanding, the insights of Computer Science and Organizational Leadership need to be synthesized. The new integrative insight will focus on placing the appropriate leaders in the necessary positions to ensure updated, more reliable tracking software can be developed and then given to leaders in law enforcement to utilize in the field. • Many people are not comfortable with untargeted scanning and tracking of their faces. However, it has been determined the face is not private. Photo ID is already required to purchase certain goods or to take advantage of certain services available to us. It is not practical or logical to believe it is acceptable to use our faces for these purposes, but not for improving security and ensuring our safety and wellbeing.
  • 2. Grubb, D., & Bennett, K. (2012). The readiness of local law enforcement to engage in US anti-trafficking efforts: an assessment of human trafficking training and awareness of local, county, and state law enforcement agencies in the State of Georgia. Police Practice & Research, 13(6), 487-500. Guzman, O. (2015) Organizational Leadership theories. Retrieved from http://smallbusiness.chron.com/organizational-leadership-theories-284.html Hadjimatheou, K. (2014). The relative moral risks of untargeted and targeted surveillance. Ethical Theory & Moral Practice, 17(2), 187-207. Hassaballah, M., & Aly, S. (2015). Face recognition: challenges, achievements and future directions. IET Computer Vision, 9(4), 614-626. Lin, L., Seo, Y., Gen, M., & Cheng, R. (2009). Unusual human behavior recognition using evolutionary technique. Computers & Industrial Engineering, 56(3), 1137-1153. Lochner, S. A. (2013 Saving face: Regulating law enforcement’s use of mobile facial recognition technology and iris scans. Arizona Law Review, 55(1), 201-233. Repko, A. (2012). Interdisciplinary research: Process and theory. Los Angeles, CA, Sage. Szpak, Z., & Tapamo, J. (2011). Maritime surveillance: Tracking ships inside a dynamic background using a fast level-set. Expert Systems With Applications, 38(6), 6669-6680. The Vancouver Canucks Fan Zone (2011, June 15). Retrieved from http://www.gigapixel.com/image/gigapan-canucks-g7.html References