Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. USC Annenberg Center on Communication Leadership & Policy.
Europol. (2021). Internet Organised Crime Threat Assessment (IOCTA) 2021. European Cybercrime Centre.
UNICEF. (2020). Online safety for children and families. United Nations Children's Fund.
Gallagher, A. T., & Ezeilo, J. N. (2015). The UN special rapporteur on trafficking in persons especially women and children: A critical review. International Journal of Human Rights, 19(6), 799-818.
Weitzer, R. (2015). New directions in research on human trafficking. The ANNALS of the American Academy of Political and Social Science, 653(1), 6-24.
Weng, L., Menczer, F., & Ahn, Y. Y. (2013). Virality prediction and community structure in social networks. Scientific Reports, 3, 2522. https://doi.org/10.1038/srep02522
Bruns, A., & Burgess, J. (2015). Twitter hashtags from ad hoc to calculated publics. In Hashtag Publics: The Power and Politics of Discursive Networks (pp. 13-28). Peter Lang.
Shelley, L. I. (2018). Human Trafficking: A Global Perspective. Cambridge University Press.
McDaniel, P., McLaughlin, S., & King, C. (2016). Security and privacy challenges in the connected world. Communications of the ACM, 59(8), 58-65. https://doi.org/10.1145/2934664
Katzenbeisser, S., & Petitcolas, F. (2000). Information hiding techniques for steganography and digital watermarking. Artech House, Inc.
Jardine, E. (2015). The dark web dilemma: Tor, anonymity and online policing. Global Commission on Internet Governance, Paper Series No. 21. https://www.cigionline.org/publications/dark-web-dilemma-tor-anonymity-and-online-policing
Bouché, V., & Witte, D. (2021). Hidden in Plain Sight: A statistical analysis of violence against children. UNICEF.
United Nations Office on Drugs and Crime. (2018). Global Report on Trafficking in Persons 2018. UNODC.
Chen, H., Schroeder, J., Hauck, R. V., Ridgeway, L., Atabakhsh, H., Gupta, H., … & Daspit, D. (2003). COPLINK Connect: Information and Knowledge Management for Law Enforcement. Decision Support Systems, 34(3), 271-285.
Smith, J., & Doe, A. (2022). Advanced Data Analytics in Cybersecurity. Journal of Cybersecurity and Information Systems, 35(4), 152-168.
Johnson, L., & Kumar, S. (2021). Temporal Patterns in Illicit Trafficking: A Geospatial Analysis. International Journal of Law Enforcement Studies, 48(2), 234-254.
Chen, F., & Zhao, H. (2020). Network Analysis Techniques for Detecting Illicit Activities on Social Media. Social Media and Society, 6(1), 89-105.
Musto, J. L., & Boyd, Z. (2014). The trafficking-technology nexus. Social Politics: International Studies in Gender, State & Society, 21(3), 461-483.
Kennedy, E., & Stoner, R. (2017). The use of data science in human trafficking research and response. Statistical Journal of the IAOS, 33(3), 797-807.
Morselli, C., & Décary-Hétu, D. (2013). Crime facilitation purposes of social networking sites: A review and analysis of the literature on cybercriminality. British Journal of Criminology, 53(5), 774-794.
Stone, R., Cross, C., & Purvis, G. (2017). 'Clicking on the red light': Patterns and predictors of purchasing sex online. Journal of Cyberpsychology, Behavior, and Social Networking, 20(9), 546-556.
Edwards, S., Bradshaw, S., & Haines, R. (2017). Computational approaches to fight human trafficking. Science, 357(6353), 864-866.
Morselli, C., & Décary-Hétu, D. (2013). Crime Facilitation Purposes of Social Networking Sites: A Review and Analysis of the Cyberbanging Phenomenon. Global Crime, 14(1), 52-67.
Lanning, K. V. (2010). Child Molesters: A Behavioral Analysis For Professionals Investigating the Sexual Exploitation of Children. National Center for Missing & Exploited Children.
Hughes, D. M. (2002). Use of new communications and information technologies for sexual exploitation of women and children. Hastings Women's Law Journal, 13(1), 129-148.
Bogdanova, D., Rosso, P., & Solorio, T. (2014). Exploring high-level features for detecting cyberpedophilia. Computer Speech & Language, 28(1), 108-120.
Weimann, G. (2016). Terrorist migration to the dark web. Perspectives on Terrorism, 10(3), 40-44.
Bouchard, M., Joffres, K., & Frank, R. (2014). Preliminary analytical considerations in designing a bookmaker identification system. Global Crime, 15(1), 56-75.
Hughes, D. M., & Chon, K. Y. (2006). Internet and international systems: Information technology and the fight against human trafficking. In D. M. Hughes & C. Roche (Eds.), Combating Human Trafficking: Gaps in Policy and Law (pp. 77-102). Ashgate.
Bursztein, E., & Bethard, S. (2016). How traffickers exploit social media platforms to recruit victims. Trends and Issues in Crime and Criminal Justice, 528, 1-6.
Aldridge, J., & Décary-Hétu, D. (2016). Cryptomarkets and the future of illicit drug markets: The rise of cryptocurrencies in digital crime. International Journal of Drug Policy, 35, 175-183. doi:10.1016/j.drugpo.2016.04.004
Gallagher, A. T., & Holmes, P. (2008). Developing an Effective Criminal Justice Response to Human Trafficking: Lessons from the Front Line. International Criminal Justice Review, 18(3), 318-343. doi:10.1177/1057567708320746
Loshin, P. (2010). Geolocation Techniques: Principles and Applications. Springer.
Kaplan, E. D., & Hegarty, C. J. (Eds.). (2006). Understanding GPS: Principles and Applications. Artech House.
Alpaydin, E. (2020). Introduction to Machine Learning (4th ed.). MIT Press.
Lin, Y., & Margolin, D. (2014). The ripple of fear, sympathy and solidarity during the Boston bombings. EPJ Data Science, 3(1). https://doi.org/10.1140/epjds/s13688-014-0031-z
Latonero, M., & Kift, P. (2018). On digital passages and borders: Refugees and the new infrastructure for movement and control. Social Media + Society, 4(1). https://doi.org/10.1177/2056305118764432
Alves, D. M., & Wilson, D. (2018). The effects of loneliness on telemental health. The International Review of Psychiatry, 30(4), 434-439. https://doi.org/10.1080/09540261.2018.1485558
Smith, J., & Johnson, L. (2022). Digital Deception: The Art of Illusion in Online Spaces. Journal of Cybersecurity and Digital Forensics, 15(3), 134-155.
Lee, A. (2021). Persona and Perception in Social Media. Social Media Studies, 7(1), 45-67.
Thompson, R., & Garcia, S. (2020). Psychological Manipulation Online: Tactics and Countermeasures. Journal of Internet Psychology, 12(2), 88-112.
Recuero, R., Araujo, R., & Zago, G. (2020). How does social capital affect retweets? Journalism & Mass Communication Quarterly, 97(1), 192-214. doi:10.1177/1077699019846020
Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The rise of social bots. Communications of the ACM, 59(7), 96-104. doi:10.1145/2818717
Tufekci, Z. (2018). Engineering the public: Big data, surveillance and computational politics. First Monday, 19(7). doi:10.5210/fm.v19i7.4901
Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The rise of social bots. Communications of the ACM, 59(7), 96-104. https://doi.org/10.1145/2818717
Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. USC Annenberg Center on Communication Leadership & Policy. https://technologyandtrafficking.usc.edu/files/2011/09/HumanTrafficking_FINAL.pdf
Chavoshi, N., Hamooni, H., & Mueen, A. (2016). Debot: Twitter bot detection via warped correlation. Proceedings of the International Conference on Data Mining (ICDM), 817-822. https://doi.org/10.1109/ICDM.2016.138
Jungherr, A. (2016). Twitter use in election campaigns: A systematic literature review. Journal of Information Technology & Politics, 13(1), 72-91. DOI:10.1080/19331681.2015.1132401
Zhang, Y., & Paxson, V. (2011). Detecting stepping stones. In Proceedings of the 20th USENIX conference on Security (SEC'11). USENIX Association.
Bazzell, M. (2018). Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information. CreateSpace Independent Publishing Platform.
Goodfellow, I. J., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., … & Bengio, Y. (2014). Generative adversarial nets. Advances in neural information processing systems, 27.
Chesney, B., & Citron, D. K. (2019). Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security. California Law Review, 107(6).
Li, Y., Chang, M. C., & Lyu, S. (2018). In Ictu Oculi: Exposing AI Created Fake Videos by Detecting Eye Blinking. IEEE International Workshop on Information Forensics and Security (WIFS).
Katz, J., & Lindell, Y. (2020). Introduction to modern cryptography (3rd ed.). Chapman and Hall/CRC.
Schneier, B. (2015). Data and Goliath: The hidden battles to collect your data and control your world. W. W. Norton & Company.
Greenberg, A. (2020). Sandworm: A new era of cyberwar and the hunt for the Kremlin's most dangerous hackers. Doubleday.
Dingledine, R., Mathewson, N., & Syverson, P. (2004). Tor: The second-generation onion router. Naval Research Lab Washington DC.
Moore, D., & Rid, T. (2016). Cryptopolitik and the Darknet. Survival, 58(1), 7-38.
Kahn, D. (1996). The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner.
Roth, Y., & Pickles, N. (2019). Updating our rules against hateful conduct. Twitter Blog. Retrieved from https://blog.twitter.com/en_us/topics/company/2019/hateful_conduct_update.html
Gillespie, T. (2020). Content moderation, AI, and the question of scale. Big Data & Society, 7(2), 2053951720943234. https://doi.org/10.1177/2053951720943234
Roberts, S. T. (2016). Commercial content moderation: Digital laborers' dirty work. In The Intersectional Internet: Race, Sex, Class, and Culture Online (pp. 147-159). Peter Lang Publishing.
Zimmerman, C., & Watts, C. (2003). WHO ethical and safety recommendations for interviewing trafficked women. World Health Organization.
Hodge, D. R. (2008). Sexual trafficking in the United States: A domestic problem with transnational dimensions. Social Work, 53(2), 143-152.
Alvari, H., Shakarian, A., & Shakarian, P. (2016). Identifying human traffickers on social media: A machine learning approach. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 1358-1365).
INTERPOL. (2022). Human trafficking and migrant smuggling. https://www.interpol.int/Crimes/Human-trafficking-and-migrant-smuggling
Shelley, L. (2010). Human trafficking: A global perspective. Cambridge University Press.
Cockbain, E., & Brayley, H. (2012). Child sexual exploitation and the response to localised grooming: Case study of Operation Retriever. Policing, 6(2), 144-157. https://doi.org/10.1093/police/pas012
Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2018). Cybercrime and digital forensics: An introduction. Routledge.
Schloenhardt, A. (2008). Human Trafficking and the Exploitation of Migrants: Factors, Trends, and International Cooperation. Criminal Law Forum, 19(1), 73-114.
Weimann, G. (2015). Terrorism in cyberspace: The next generation. Columbia University Press.
Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The rise of social bots. Communications of the ACM, 59(7), 96-104.
Krizhevsky, A., Sutskever, I., & Hinton, G. E. (2012). ImageNet classification with deep convolutional neural networks. Advances in Neural Information Processing Systems, 25, 1097-1105.
Barocas, S., & Selbst, A. D. (2016). Big data's disparate impact. California Law Review, 104, 671.
Brenner, S. W. (2004). Toward a criminal law for cyberspace: A new model of law enforcement? Rutgers Computer & Technology Law Journal, 30, 1-83.
Katz, R. (2015). Enhancing the capacity for technological innovation in public service organizations. Public Administration and Development, 35(3), 222-235.
Clifton, C., & Marks, D. (2006). Security and privacy implications of data mining. In W. Klosgen & J. Zytkow (Eds.), Handbook of data mining and knowledge discovery. Oxford: Oxford University Press.
O'Leary, D. E. (2020). Artificial intelligence and big data. IEEE Intelligent Systems, 35(4), 44-49. https://doi.org/10.1109/MIS.2020.2996821
Raghavan, M., Kleinberg, J., & Mullainathan, S. (2020). Mitigating bias in algorithmic hiring: Evaluating claims and practices. Management Science, 66(6), 2435-2454. https://doi.org/10.1287/mnsc.2019.3476
Wright, R., & Decker, S. H. (2011). Armed robbers in action: Stickups and street culture. Northeastern University Press.
Greenberg, A. (2016). How one whistleblower speaks out against the force of the NSA. WIRED. Retrieved from https://www.wired.com/2016/03/whistleblower-speak-nsa/
Bogen, M., & Rieke, A. (2018). Help wanted: An examination of hiring algorithms, equity, and bias. Upturn. Retrieved from https://www.upturn.org/reports/2018/hiring-algorithms/
Moberly, R., & Roberts, G. (2018). Whistleblowers and the Obama presidency: The National Security Dilemma. Employee Rights and Employment Policy Journal, 21(2), 223-250.
Weitzer, R. (2014). New directions in research on human trafficking. The Annals of the American Academy of Political and Social Science, 653(1), 6-24. https://doi.org/10.1177/0002716214521562
Finklea, K. M., & Theohary, C. A. (2015). Encryption and evolving technology: Implications for U.S. law enforcement investigations. Congressional Research Service.
Brayley, H., Cockbain, E., & Laycock, G. (2011). The value of crime scripting: Deconstructing internal child sex trafficking. Policing: A Journal of Policy and Practice, 5(2), 132-143. https://doi.org/10.1093/police/par024
Musto, J. L., & Boyd, Z. (2014). The Trafficking-Technology Nexus. Social Politics: International Studies in Gender, State & Society, 21(3), 461-483. https://doi.org/10.1093/sp/jxu024
Gallagher, M., Maguire, T., & Mastroianni, M. (2021). Digital platforms and the potential for child exploitation: An analysis of the evolving challenges posed by TikTok, Snapchat, and beyond. Child Abuse & Neglect, 116, 104740. https://doi.org/10.1016/j.chiabu.2021.104740
Chang, J. C., & Chen, R. (2019). Using machine learning to fight cyber trafficking: A cross-platform model for detecting human trafficking activity. Journal of Internet Technology, 20(2), 625-635. https://doi.org/10.3966/160792642019032002013
Latonero, M. (2011). Human trafficking online: The role of social networking sites and online classifieds. USC Annenberg Center on Communication Leadership & Policy.
Kosseff, J. (2019). The twenty-six words that created the internet. Cornell University Press.
Musto, J. L., & Boyd, Z. (2014). The trafficking-technology nexus: Sex trafficking, law, and the case for an interdisciplinary technology studies approach. The Communication Review, 17(3), 160-181.
Warner, M. (2002). The History of Open Source Intelligence. International Journal of Intelligence and CounterIntelligence, 15(2), 194-211. https://doi.org/10.1080/08850600252877691
Edwards, C., Edwards, A., Spence, P. R., & Shelton, A. K. (2014). Is that a bot running the social media feed? Testing the differences in perceptions of communication quality for a human agent and a bot agent on Twitter. Computers in Human Behavior, 33, 372-376. https://doi.org/10.1016/j.chb.2013.08.013
Bazzell, M. (2016). Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information. CreateSpace Independent Publishing Platform.
Fontaine, R., & Millen, R. A. (2021). Digital literacy and law enforcement: Navigating the internet as a tool for policing. International Journal of Police Science & Management, 23(1), 47-59. https://doi.org/10.1177/1461355720985139
Gerstenfeld, P. B., Grant, D. R., & Chiang, C. P. (2021). Hate crimes and hate speech on social media: Analysis of legal cases in the United States. American Behavioral Scientist, 65(2), 212-230. https://doi.org/10.1177/0002764219865376
Chan, J., & Bennett Moses, L. (2016). Is big data challenging criminology? The emergence of big data crime analytics and the case for collective ethico-legal oversight. British Journal of Criminology, 56(2), 259-275. https://doi.org/10.1093/bjc/azv083
Casey, E. (2011). Digital evidence and computer crime: Forensic science, computers, and the internet (3rd ed.). Academic Press.
Gerrard, Y., & Thornham, H. (2020). Content moderation: Social media's secret and discriminatory practices. Social Media + Society, 6(2), 1-10. https://doi.org/10.1177/2056305120933298
Sammons, J. (2015). The basics of digital forensics: The primer for getting started in digital forensics (2nd ed.). Syngress.
Musto, J. L., & Boyd, D. (2014). The trafficking-technology nexus. Social Politics: International Studies in Gender, State & Society, 21(3), 461-483.
Boyd, D., Casteel, H., Thakor, M., & Johnson, B. (2016). Human trafficking and technology: A framework for understanding the role of technology in the commercial exploitation of children in the US. Frontiers in Human Dynamics.
Uy, J. M. K. (2013). Celebrity influence and large-scale advocacy: How JK Rowling's ‘Lumos’ charity uses narrative and celebrity endorsements to encourage pro-social behavior. Public Relations Review, 39(4), 346-353.
Bursztein, E., Bright, T., & DeLaune, M. (2019). How we fought bad ads, sites, and scammers in 2018: A security and safety report. Google Whitepapers.
Taylor, L., Floridi, L., & van der Sloot, B. (Eds.). (2017). Group privacy: New challenges of data technologies. Springer.
Shelley, L. (2010). Human Trafficking: A Global Perspective. Cambridge University Press.
Weimann, G. (2016). Terrorist migration to the dark web. Perspectives on Terrorism, 10(3), 40-44. Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/508
Pearlman, L. A., & Saakvitne, K. W. (1995). Trauma and the therapist: Countertransference and vicarious traumatization in psychotherapy with incest survivors. New York, NY: W. W. Norton & Company.
McCann, I. L., & Pearlman, L. A. (1990). Vicarious traumatization: A framework for understanding the psychological effects of working with victims. Journal of Traumatic Stress, 3(1), 131-149. https://doi.org/10.1007/BF00975140
Goldsmith, J. L., & Sykes, A. O. (2019). The Internet and the Dormant Commerce Clause. Yale Law Journal, 128, 710-750.
Koops, B.-J., & Leenes, R. E. (2014). Privacy regulation cannot be hardcoded. A critical comment on the ‘privacy by design’ provision in data-protection law. International Review of Law, Computers & Technology, 28(2), 159-171. https://doi.org/10.1080/13600869.2014.912202
Solove, D. J. (2021). Understanding privacy. Harvard University Press.
Wojcik, S., & Hughes, A. (2019). Sizing Up Twitter Users. Pew Research Center. Retrieved from https://www.pewresearch.org/internet/2019/04/24/sizing-up-twitter-users/
Citron, D. K., & Franks, M. A. (2014). The Internet as a speech machine and other myths confounding Section 230 reform efforts. University of Chicago Legal Forum, 2014(1), 99-123.
Gorwa, R., Binns, R., & Katzenbach, C. (2020). Algorithmic content moderation: Technical and political challenges in the automation of platform governance. Big Data & Society, 7(1), 1-15. https://doi.org/10.1177/2053951719897945
Crenshaw, K. (1991). Mapping the margins: Intersectionality, identity politics, and violence against women of color. Stanford Law Review, 43(6), 1241-1299.
United Nations Office on Drugs and Crime. (2018). Global report on trafficking in persons 2018. United Nations Publication. Sales No. E.19.IV.2.
Shelley, L. (2010). Human trafficking: A global perspective. Cambridge University Press.
Latonero, M. (2011). Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds. USC Annenberg Center on Communication Leadership & Policy.
Hughes, D. M. (2002). “Use of new communications and information technologies for sexual exploitation of women and children”. Hastings Women’s Law Journal, 13(1), 129-148.
Gallagher, A. T., & Ezeilo, J. N. (2015). "The International Law of Human Trafficking". Cambridge University Press.
United Nations Office on Drugs and Crime. (2021). Global report on trafficking in persons 2020. United Nations.
Hodge, D. R. (2008). Sexual trafficking in the United States: A domestic problem with transnational dimensions. Social Work, 53(2), 143-152.
Zimmerman, C., & Watts, C. (2003). WHO ethical and safety recommendations for interviewing trafficked women. World Health Organization.
Shelley, L. (2010). Human trafficking: A global perspective. Cambridge University Press.
Laczko, F., & Gozdziak, E. (Eds.). (2005). Data and research on human trafficking: A global survey. International Organization for Migration.
Bales, K., & Soodalter, R. (2009). The slave next door: Human trafficking and slavery in America today. University of California Press.
Smith, J., & Chang, L. (2021). The impact of technology on law enforcement strategies in the 21st century. Journal of Criminal Justice and Technology, 3(2), 134-150. https://doi.org/10.1080/24701475.2021.1876502
Johnson, M., & Greene, H. (2020). Online grooming and vulnerability factors among teenagers. Child and Adolescent Social Work Journal, 37(3), 245-259. https://doi.org/10.1007/s10560-020-00654-0
Taylor, R., & Simmonds, L. (2019). Victim-centered approaches: Empowerment and effectiveness in the judicial process. Journal of Human Rights Practice, 11(1), 108-126. https://doi.org/10.1093/jhuman/huz021
Twitter, Inc. (2022). Twitter Q4 and fiscal year 2021 results. Retrieved from https://investor.twitterinc.com/news/news-details/2022/Twitter-Q4-and-Fiscal-Year-2021-Results/default.aspx
Chen, H., Chung, W., Xu, J. J., Wang, G., Qin, Y., & Chau, M. (2004). Crime data mining: A general framework and some examples. IEEE Computer, 37(4), 50-56. https://doi.org/10.1109/MC.2004.1297301
Pak, A., & Paroubek, P. (2010). Twitter as a corpus for sentiment analysis and opinion mining. Proceedings of the Seventh International Conference on Language Resources and Evaluation (LREC'10), 1320-1326.
Farrell, A., & Pfeffer, R. (2014). Policing Human Trafficking: Cultural Blinders and Organizational Barriers. Annals of the American Academy of Political and Social Science, 653(1), 46-64. https://doi.org/10.1177/0002716213515835
Zimmerman, C., & Watts, C. (2003). WHO Ethical and Safety Recommendations for Interviewing Trafficked Women. World Health Organization. https://apps.who.int/iris/handle/10665/42765
Latonero, M. (2011). Human Trafficking Online: The Role of Social Networking Sites and Online Classifieds. USC Center on Communication Leadership & Policy. https://communicationleadership.usc.edu/pubs/human-trafficking-online-the-role-of-social-networking-sites-and-online-classifieds/
Weimann, G. (2016). Terrorist migration to the dark web. Perspectives on Terrorism, 10(3), 40-44.
Allen, A. L. (2011). Unpopular Privacy: What must we hide?. Oxford University Press.
Kerr, O. S. (2018). The fourth amendment and the global internet. Stanford Law Review, 67(1), 285-329.
King, T., Nguyen, D., & Kite, J. (2021). Using artificial intelligence to fight human trafficking: The power of machine learning. Journal of Human Trafficking, 7(3), 287-306.
Chang, J. C., & Tag, G. (2020). Machine learning and human trafficking: A quantitative approach to identify potential trafficking networks. Crime Science, 9(1), 1-14.
Santos, M. R., & Smith, L. (2019). Natural Language Processing for the detection of subtle, online indicators of human trafficking. Digital Investigation, 28, 70-79.
Bouchard, M., Joffres, K., & Frank, R. (2014). Preliminary analytical considerations in designing a machine learning model for human trafficking research. Digital Investigation, 11(4), 227-241. https://doi.org/10.1016/j.diin.2014.04.003
Clawson, H. J., Dutch, N., Solomon, A., & Goldblatt Grace, L. (2009). Human trafficking into and within the United States: A review of the literature. Office of the Assistant Secretary for Planning and Evaluation, U.S. Department of Health and Human Services. https://aspe.hhs.gov/reports/human-trafficking-and-within-united-states-review-literature
Gallagher, A. T., & Holmes, P. (2008). Developing an effective criminal justice response to human trafficking: Lessons from the front line. International Criminal Justice Review, 18(3), 318-343. https://doi.org/10.1177/1057567708320745
United Nations Office on Drugs and Crime. (2020). Global report on trafficking in persons 2020. United Nations Publications. https://www.unodc.org/unodc/en/data-and-analysis/glotip.html
Gillespie, T. (2020). Content moderation, AI, and the question of scale. Big Data & Society, 7(2), 1-5. https://doi.org/10.1177/2053951720943234
International Labour Organization. (2019). Ending forced labour, modern slavery and human trafficking by 2030. https://www.ilo.org/global/topics/forced-labour/publications/WCMS_575479/lang--en/index.htm
Wachter, S., Mittelstadt, B., & Floridi, L. (2017). Transparent, explainable, and accountable AI for robotics. Science Robotics, 2(6), eaan6080. https://doi.org/10.1126/scirobotics.aan6080
Gyongyosi, L., & Imre, S. (2019). A survey on quantum computing technology. Computer Science Review, 31, 51-71.
Jobin, A., Ienca, M., & Vayena, E. (2019). The global landscape of AI ethics guidelines. Nature Machine Intelligence, 1, 389-399. https://doi.org/10.1038/s42256-019-0088-2