CS Org Ldrshp Poster

2
Human Trafficking: A Perspective from Computer Science and Organizational Leadership Turner Sparks University Studies Abstract With human trafficking plaguing our society, it is obvious the measures taken thus far are not adequate in solving the problem. An interdisciplinary technique is necessary to address human trafficking, because it is a complex issue that is a serious societal concern and has not been resolved. It was found that perspectives from Computer Science and Organizational Leadership together can provide valuable insights. Better surveillance and tracking software can be developed, and appropriate strategies can be created to utilize the software to the best potential. The current software works well in controlled environments, but the video sensors we have today are not ideal for real world applications. Law enforcement officers do not have adequate training in dealing with human trafficking, and there aren’t many regulations to protect citizens’ privacy and safety when it comes to video surveillance. In order to overcome these obstacles, further development of video surveillance technology and more extensive training in regards to human trafficking should be the focus for future research and development on this topic. Focus Question How is law enforcement utilizing surveillance and tracking software to track the whereabouts of possible victims or suspects involved with human trafficking? Conclusions During the research process, it was discovered that law enforcement has implemented types of tracking surveillance software before and other types of video tracking were being tested, but were not reliable enough for use in the field. By integrating insights from Computer Science and Organizational Leadership, it could be possible to develop better video tracking systems and have leaders implement them to be used in tracking suspects and victims of human trafficking. Future efforts for this research could be focused on getting better video sensors to have more depth and resolution to make tracking subjects easier. Also, developing better tracking algorithms could improve the accuracy and reliability of the tracking systems’ results. The weaknesses in today’s tracking systems are brought about by the video sensors not being able to differentiate objects in adverse lighting conditions and the software not being able to handle all of the raw data that is accumulated on all of the available video surveillance systems. Future study should look at how to overcome these obstacles. Once a more reliable system has been developed, it could be implemented as a real world solution by placing these systems in strategic locations such as airports, bus and train stations, border crossings, and ports. With these insights in mind, video surveillance systems could soon be an invaluable tool for addressing the wicked problem of human Repko’s 10 Steps A. Drawing on disciplinary insights 1. Define the problem or state the research question 2. Justify using an interdisciplinary approach 3. Identify relevant disciplines 4. Conduct the literature search 5. Develop adequacy in each relevant discipline 6. Analyze the problem and evaluate each insight or theory B. Integrating disciplinary insights 7. Identify conflicts between insights and their sources 8. Create common ground between concepts and theories 9. Construct a more comprehensive understanding 10.Reflect on, test, and communicate the understanding Conflicts When looking at a problem from the perspectives of different disciplines, conflicts can occur between or within the insights of those disciplines. It is necessary to identify these conflicts “because [they] stand in the way of creating common ground and, thus, of achieving integration” (Repko, 2012, p. 294). Conflicts within the discipline of Computer Science: Lin et al. (2009) and Szpak and Tapamo (2011) claim success using video surveillance and behavior recognition. Hassaballah (2015) argues variations in lighting and the use of masks will make these systems useless. Conflicts between the disciplines of Computer Science and Organizational Leadership: Hadjimatheou (2014) discusses privacy concerns with using untargeted facial recognition. He argues this will make innocent people feel like suspects. Computer Scientists believe the face is not private and even if this is an invasion of privacy, it is necessary to ensure the safety and wellbeing of our citizens. A More Comprehensive Understanding Creating Common Ground Extending the concept of ever-evolving technology, it is expected that hardware will improve making the video surveillance systems be more reliable in the future. When addressing the privacy concerns with facial recognition, the concept that one’s face is private is redefined. By acknowledging a person’s face is not private when that person is in a public place with his/her face uncovered, there can be no claim to an invasion of privacy when using facial recognition in public areas. To create a more comprehensive understanding, the insights of Computer Science and Organizational Leadership need to be synthesized. The new integrative insight will focus on placing the appropriate leaders in the necessary positions to ensure updated, more reliable tracking software can be developed and then given to leaders in law enforcement to utilize in the field. Many people are not comfortable with untargeted scanning and tracking of their faces. However, it has been determined the face is not private. Photo ID is already required to purchase certain goods or to take advantage of certain services available to us. It is not practical or logical to believe it is acceptable to use our faces for these purposes, but not for improving security and ensuring our safety and wellbeing.

Transcript of CS Org Ldrshp Poster

PowerPoint Presentation

Human Trafficking: A Perspective from Computer Science and Organizational LeadershipTurner Sparks University Studies

AbstractWith human trafficking plaguing our society, it is obvious the measures taken thus far are not adequate in solving the problem. An interdisciplinary technique is necessary to address human trafficking, because it is a complex issue that is a serious societal concern and has not been resolved. It was found that perspectives from Computer Science and Organizational Leadership together can provide valuable insights. Better surveillance and tracking software can be developed, and appropriate strategies can be created to utilize the software to the best potential. The current software works well in controlled environments, but the video sensors we have today are not ideal for real world applications. Law enforcement officers do not have adequate training in dealing with human trafficking, and there arent many regulations to protect citizens privacy and safety when it comes to video surveillance. In order to overcome these obstacles, further development of video surveillance technology and more extensive training in regards to human trafficking should be the focus for future research and development on this topic.

Focus Question

How is law enforcement utilizing surveillance and tracking software to track the whereabouts of possible victims or suspects involved with human trafficking?Conclusions

During the research process, it was discovered that law enforcement has implemented types of tracking surveillance software before and other types of video tracking were being tested, but were not reliable enough for use in the field. By integrating insights from Computer Science and Organizational Leadership, it could be possible to develop better video tracking systems and have leaders implement them to be used in tracking suspects and victims of human trafficking. Future efforts for this research could be focused on getting better video sensors to have more depth and resolution to make tracking subjects easier. Also, developing better tracking algorithms could improve the accuracy and reliability of the tracking systems results. The weaknesses in todays tracking systems are brought about by the video sensors not being able to differentiate objects in adverse lighting conditions and the software not being able to handle all of the raw data that is accumulated on all of the available video surveillance systems. Future study should look at how to overcome these obstacles. Once a more reliable system has been developed, it could be implemented as a real world solution by placing these systems in strategic locations such as airports, bus and train stations, border crossings, and ports. With these insights in mind, video surveillance systems could soon be an invaluable tool for addressing the wicked problem of human trafficking.

Repkos 10 StepsDrawing on disciplinary insightsDefine the problem or state the research questionJustify using an interdisciplinary approachIdentify relevant disciplinesConduct the literature searchDevelop adequacy in each relevant disciplineAnalyze the problem and evaluate each insight or theoryIntegrating disciplinary insights7. Identify conflicts between insights and their sources8. Create common ground between concepts and theoriesConstruct a more comprehensive understandingReflect on, test, and communicate the understanding

ConflictsWhen looking at a problem from the perspectives of different disciplines, conflicts can occur between or within the insights of those disciplines. It is necessary to identify these conflicts because [they] stand in the way of creating common ground and, thus, of achieving integration (Repko, 2012, p. 294).

Conflicts within the discipline of Computer Science:Lin et al. (2009) and Szpak and Tapamo (2011) claim success using video surveillance and behavior recognition.Hassaballah (2015) argues variations in lighting and the use of masks will make these systems useless.

Conflicts between the disciplines of Computer Science and Organizational Leadership:Hadjimatheou (2014) discusses privacy concerns with using untargeted facial recognition. He argues this will make innocent people feel like suspects. Computer Scientists believe the face is not private and even if this is an invasion of privacy, it is necessary to ensure the safety and wellbeing of our citizens.

A More Comprehensive Understanding

Creating Common Ground

Extending the concept of ever-evolving technology, it is expected that hardware will improve making the video surveillance systems be more reliable in the future.When addressing the privacy concerns with facial recognition, the concept that ones face is private is redefined. By acknowledging a persons face is not private when that person is in a public place with his/her face uncovered, there can be no claim to an invasion of privacy when using facial recognition in public areas.

To create a more comprehensive understanding, the insights of Computer Science and Organizational Leadership need to be synthesized. The new integrative insight will focus on placing the appropriate leaders in the necessary positions to ensure updated, more reliable tracking software can be developed and then given to leaders in law enforcement to utilize in the field. Many people are not comfortable with untargeted scanning and tracking of their faces. However, it has been determined the face is not private. Photo ID is already required to purchase certain goods or to take advantage of certain services available to us. It is not practical or logical to believe it is acceptable to use our faces for these purposes, but not for improving security and ensuring our safety and wellbeing.

1

Grubb, D., & Bennett, K. (2012). The readiness of local law enforcement to engage in US anti-trafficking efforts: an assessment of human trafficking training and awareness of local, county, and state law enforcement agencies in the State of Georgia. Police Practice & Research, 13(6), 487-500.

Guzman, O. (2015) Organizational Leadership theories. Retrieved from http://smallbusiness.chron.com/organizational-leadership-theories-284.html

Hadjimatheou, K. (2014). The relative moral risks of untargeted and targeted surveillance. Ethical Theory & Moral Practice, 17(2), 187-207.

Hassaballah, M., & Aly, S. (2015). Face recognition: challenges, achievements and future directions. IET Computer Vision, 9(4), 614-626.

Lin, L., Seo, Y., Gen, M., & Cheng, R. (2009). Unusual human behavior recognition using evolutionary technique. Computers & Industrial Engineering, 56(3), 1137-1153.

Lochner, S. A. (2013 Saving face: Regulating law enforcements use of mobile facial recognition technology and iris scans. Arizona Law Review, 55(1), 201-233.

Repko, A. (2012). Interdisciplinary research: Process and theory. Los Angeles, CA, Sage.

Szpak, Z., & Tapamo, J. (2011). Maritime surveillance: Tracking ships inside a dynamic background using a fast level-set. Expert Systems With Applications, 38(6), 6669-6680.

The Vancouver Canucks Fan Zone (2011, June 15). Retrieved from http://www.gigapixel.com/image/gigapan-canucks-g7.htmlReferences