Skip to main content

Currently Skimming:

2 Before Measuring: Identifying Victims and Understanding Vulnerability
Pages 7-16

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 7...
... . Since 2008, she said, the ILO has been testing tools both for qualitative and quantitative research on various forms of forced labor: bonded labor, which is of particular concern in some Asian countries; vestiges of slavery, which is being measured in Niger; and forced labor of children, although De Cock noted that there are several different ways of identifying forced child labor.
From page 8...
... The guidelines use a unique statistical definition for human trafficking, and the ILO is working to translate it into an operational definition that can be used to create information guides for first-line respondents. Because the forms of coercion, recruitment, and type of exploitation vary among countries and labor sectors, De Cock said the ILO is also working on identification guides for specific sectors.
From page 9...
... She considers familial trafficking an important area to research, noting that the vast majority of commercial sex trafficking victims report having been sexually abused or victimized for the first time at home by someone they knew. Dore shared her personal experiences as a victim of familial trafficking from the ages of 1 to 14.
From page 10...
... There can be significant challenges with self-reported data. Men in some countries may interpret that they are victims of labor trafficking or labor exploitation because they are forced to work unpaid overtime, while those in other countries who report working in legally prohibited and extremely dangerous mining situations with compromised food and water sources may not identify as victims.
From page 11...
... As she gained more control in her life, Lundstrom also eventually regained control of her social media, and she then stayed connected with the women she knew were still in "the game." As she talked openly about her experiences, her social media network began to grow. Her organization, Free Our Girls, formally adopted her social media page and network, and it is now a private group of more than 1,600 actively exploited women across the United States and Canada.
From page 12...
... She sees that as coercion, and she urged researchers to consider instances such as these when they seek to collect prevalence data on commercial sexual exploitation and sex trafficking. Reducing Survivors' Vulnerability Jessica Hubley (AnnieCannons)
From page 13...
... Another reason Hubley gave for targeting vulnerability instead of the crime is that while criminal activity is carefully and purposefully hidden, vulnerability can exist in plain sight. She gave examples of government actions that can exacerbate vulnerability, such as de-enrollment from or elimination of food assistance programs for people who cannot find enough work to support their families and the trauma inflicted by separating children from their parents at the southern border.
From page 14...
... , a coalition that is developing the National Outreach Survey, which will help identify challenges among those working to combat human trafficking and illustrate to policy makers what human trafficking looks like in their respective states. UAS has partnered with representatives from more than 26 stakeholder groups, including government officials, health care professionals, hospitality workers, human trafficking survivors, and law enforcement officials.
From page 15...
... The foundation developed a risk profile, based on GSI's Vulnerability Model,4 which maps 23 risk variables across five major dimensions: governance issues, lack of basic needs, inequality, dis ­ enfranchised groups, and effects of conflict. GSI also has a component that assesses the actions governments are taking to respond to modern slavery by measuring their progress toward the achievement of five milestones, one of which is for "Government and business [to]


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.