Case records on identified victims of human trafficking are highly sensitive, yet the ability to share such data is critical to evidence-based practice and policy development across government, business, and civil society. We propose new methods to anonymize, publish, and explore data on identified victims of trafficking, implemented as a single pipeline producing three data artifacts: synthetic microdata modelled on sensitive case records and released in their place, mitigating the privacy risk that traffickers might link distinctive combinations of attributes in published records to known victims; aggregate data summarizing the precomputed frequencies of all short attribute combinations, mitigating the utility risk that synthetic data might misrepresent statistics needed for official reporting; and visual analytics interfaces for parallel exploration and evaluation of synthetic data representations and sensitive data aggregates, mitigating the accessibility risk that privacy mechanisms or analysis tools might not be understandable or usable by all stakeholders. Central to our mitigation of these risks is the notion of k-synthetic data, which we generate through a distributed machine learning pipeline. k-synthetic data preserves privacy by ensuring that longer combinations of attributes are not rare in the sensitive dataset and thus potentially identifying; it preserves utility by ensuring that shorter combinations of attributes are both present and frequent in the sensitive dataset; and it improves accessibility by being easy to explain and apply. We present our work as a design study motivated by the goal of creating a new privacy-preserving data platform for the Counter-Trafficking Data Collaborative (CTDC), transforming how the world’s largest database of identified victims is made available for global collaboration against human trafficking.

Design of a Privacy-Preserving Data Platform for Collaboration Against Human Trafficking - Microsoft, May 2020 DOWNLOAD

post

page

attachment

revision

nav_menu_item

custom_css

customize_changeset

oembed_cache

user_request

wp_block

wp_template

wp_template_part

wp_global_styles

wp_navigation

wp_font_family

wp_font_face

acf-taxonomy

acf-post-type

acf-field-group

acf-field

ai1ec_event

exactmetrics_note

No limits to exploitation: Migrant labourers in the supply chains of German supermarkets
News & Analysis

Fat profits on the one hand, starvation wages on the other: The inequalities along the supply chains for our food are enormous. Dieter Schwarz, owner of Lidl and Kaufland, earns the annual income of a farmworker on a pineapple plantation in Costa Ri...Read More

Fishers first: Good practices to end labour exploitation at sea
Good Practices

The purpose of this report is to present, analyse and share good practices and innovative interventions towards eradicating forced labour and other forms of labour exploitation in the fishing industry. This report consists of two parts. Chapters...Read More

Cyber Slavery in the Scamming Compounds
News & Analysis

Cyber slavery is emerging as a form of organized crime of unprecedented severity and scale. Conservative estimates suggest that tens of thousands of victims are held captive in scamming compounds. While getting spammed with fraudulent messages i...Read More

Prevalence Estimation: Methods Brief
Guidance

Despite being long banned and universally condemned, “slavery persists in many corners of the world today, victimizing tens of millions of people”. In the modern age, slavery manifests in the form of forced labour, debt bondage, forced marriage,...Read More

TAGS: