06.01.2015 Views

413047-Underground-Commercial-Sex-Economy

413047-Underground-Commercial-Sex-Economy

413047-Underground-Commercial-Sex-Economy

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Table 2.2 Proxy Variables<br />

Dataset<br />

Variables<br />

Illicit Drugs<br />

NSDUH D1: Illicit drug use in the past month among population age 12+<br />

D2: Illicit drug use (other than marijuana) in past month among population age 12+<br />

D3: Cocaine use in past year among population age 12+<br />

YRBSS<br />

D4: Percent of high school students offered, sold, or given drugs at school<br />

multiplied by total MSA population<br />

DAWN<br />

D5: Emergency room visits attributed to drug use<br />

D6: Emergency room visits at which drug use was mentioned<br />

ADAM<br />

D7: Percent of property crime arrestees who tested positive for any drug, scaled by<br />

MSA population<br />

Weapons<br />

YRBSS<br />

W1: Percent of high school students who carried a gun multiplied by total MSA<br />

population<br />

ATF<br />

W2: Number of weapons seized by the ATF<br />

NVSS<br />

W3: Fraction of suicides committed with firearms, multiplied by MSA population<br />

Other<br />

N/A<br />

O1: Percent of employment in private-sector service industry, scaled by MSA<br />

population<br />

O2: Percent of employment in construction, scaled by MSA population<br />

O3: Percent of employment in food services and drinking establishments, scaled by<br />

MSA population<br />

Limitations of the Study<br />

As with all research, this study is subject to methodological limitations. As discussed previously, our<br />

initial objective was to adopt methods that had previously been used to estimate the size of illicit<br />

economic activity. After reviewing some of these techniques, we determined that none were suitable for<br />

our purposes, and sought to develop a new method that could overcome these challenges. As a result,<br />

there are a number of limitations to the method developed. Primarily, these limitations center on the data<br />

used for the approach. The theory in itself (building a system of equations and solving the system using<br />

ratios implied by proxy variables) is complete, concise, and accurate. Given our definitions of variables,<br />

the equality is a tautology and, given the right input data, the method is guaranteed to produce accurate<br />

answers. The challenge is finding the right data. Identifying proxy variables is not an exact science, and<br />

there is often little or no past literature on which to base our choices. Assumptions and approximations<br />

must be made to estimate such ratios, and variable selection, imprecise measurement, and data<br />

availability all presented significant challenges.<br />

We believe that this method holds promise for future research seeking to estimate illicit economic<br />

activities in multiple geographic entities. However, such research must further explore what proxies<br />

should be used, their reliability, and necessary adjustments. Here, we offer a foundation for such<br />

considerations based on our own analyses and assumptions, but other researchers might have different<br />

preferences and assumptions.<br />

Similarly, we were surprised by the difficulty involved in estimating currency in circulation at the city<br />

level. While this quantity is the focus of significant attention at the national level, almost no work seeks to<br />

estimate it locally. In the absence of a literature upon which to draw, our estimates are based on what we<br />

believed were relatively conservative assumptions. We sought to employ the simplest possible approach,<br />

acknowledging that estimating currency is of central importance and erring in favor of transparency over<br />

sophistication.<br />

In addition to the limitations with the proxy data used to estimate the UCSE in the eight study sites, there<br />

were limitations to how the offender sample was chosen. We were only able to document the business<br />

practices, networks and technology use of traffickers and child pornographers who were incarcerated at<br />

the time of data collection. Thus, we were limited to speaking to those individuals that were convicted of<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!