Strategic Choices of Migrants and Smugglers in the Central Mediterranean
Sea
- URL: http://arxiv.org/abs/2207.04480v1
- Date: Sun, 10 Jul 2022 15:06:34 GMT
- Title: Strategic Choices of Migrants and Smugglers in the Central Mediterranean
Sea
- Authors: Katherine Hoffmann Pham and Junpei Komiyama
- Abstract summary: Sea crossing from Libya to Italy is one of the world's most dangerous and politically contentious migration routes.
Over half a million people have attempted the crossing since 2014.
We estimate how migrants and smugglers have reacted to changes in border enforcement.
- Score: 3.096615629099617
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The sea crossing from Libya to Italy is one of the world's most dangerous and
politically contentious migration routes, and yet over half a million people
have attempted the crossing since 2014. Leveraging data on aggregate migration
flows and individual migration incidents, we estimate how migrants and
smugglers have reacted to changes in border enforcement, namely the rise in
interceptions by the Libyan Coast Guard starting in 2017 and the corresponding
decrease in the probability of rescue at sea. We find support for a deterrence
effect in which attempted crossings along the Central Mediterranean route
declined, and a diversion effect in which some migrants substituted to the
Western Mediterranean route. At the same time, smugglers adapted their tactics.
Using a strategic model of the smuggler's choice of boat size, we estimate how
smugglers trade off between the short-run payoffs to launching overcrowded
boats and the long-run costs of making less successful crossing attempts under
different levels of enforcement. Taken together, these analyses shed light on
how the integration of incident- and flow-level datasets can inform ongoing
migration policy debates and identify potential consequences of changing
enforcement regimes.
Related papers
- A Chatbot for Asylum-Seeking Migrants in Europe [14.060846768281705]
ACME aims to help migrants identify the highest level of protection they can apply for.
This would contribute to a more sustainable migration by reducing the load on territorial commissions, Courts, and humanitarian organizations supporting asylum applicants.
arXiv Detail & Related papers (2024-07-12T11:53:40Z) - Combining Twitter and Mobile Phone Data to Observe Border-Rush: The Turkish-European Border Opening [2.5693085674985117]
Following Turkey's 2020 decision to revoke border controls, many individuals journeyed towards the Greek, Bulgarian, and Turkish borders.
However, the lack of verifiable statistics on irregular migration and discrepancies between media reports and actual migration patterns require further exploration.
This study is to bridge this knowledge gap by harnessing novel data sources, specifically mobile phone and Twitter data.
arXiv Detail & Related papers (2024-05-21T09:51:15Z) - Narrative to Trajectory (N2T+): Extracting Routes of Life or Death from Human Trafficking Text Corpora [0.0]
We propose a system called Narrative to Trajectory (N2T+), which extracts trajectories of trafficking routes.
N2T+ uses Data Science and Natural Language Processing techniques to analyze trafficking narratives, automatically extract relevant location names, and plot the trafficking route on a map.
arXiv Detail & Related papers (2024-05-09T22:21:40Z) - The diaspora model for human migration [0.07852714805965527]
Existing models primarily rely on population size and travel distance to explain flow fluctuations.
We propose the diaspora model of migration, incorporating intensity (the number of people moving to a country) and assortativity (the destination within the country)
Our model considers only the existing diaspora sizes in the destination country, influencing the probability of migrants selecting a specific residence.
arXiv Detail & Related papers (2023-09-06T15:17:53Z) - Boosting Adversarial Attacks by Leveraging Decision Boundary Information [68.07365511533675]
gradients of different models are more similar on the decision boundary than in the original position.
We propose a Boundary Fitting Attack to improve transferability.
Our method obtains an average attack success rate of 58.2%, which is 10.8% higher than other state-of-the-art transfer-based attacks.
arXiv Detail & Related papers (2023-03-10T05:54:11Z) - Logit Margin Matters: Improving Transferable Targeted Adversarial Attack
by Logit Calibration [85.71545080119026]
Cross-Entropy (CE) loss function is insufficient to learn transferable targeted adversarial examples.
We propose two simple and effective logit calibration methods, which are achieved by downscaling the logits with a temperature factor and an adaptive margin.
Experiments conducted on the ImageNet dataset validate the effectiveness of the proposed methods.
arXiv Detail & Related papers (2023-03-07T06:42:52Z) - Long-HOT: A Modular Hierarchical Approach for Long-Horizon Object
Transport [83.06265788137443]
We address key challenges in long-horizon embodied exploration and navigation by proposing a new object transport task and a novel modular framework for temporally extended navigation.
Our first contribution is the design of a novel Long-HOT environment focused on deep exploration and long-horizon planning.
We propose a modular hierarchical transport policy (HTP) that builds a topological graph of the scene to perform exploration with the help of weighted frontiers.
arXiv Detail & Related papers (2022-10-28T05:30:49Z) - SALT: Sea lice Adaptive Lattice Tracking -- An Unsupervised Approach to
Generate an Improved Ocean Model [72.3183990520267]
We propose SALT: Sea lice Adaptive Lattice Tracking approach for efficient estimation of sea lice dispersion and distribution.
Specifically, an adaptive spatial mesh is generated by merging nodes in the lattice graph of the Ocean Model based on local ocean properties.
The proposed SALT technique shows promise for enhancing proactive aquaculture management through predictive modelling of sea lice infestation pressure maps in a changing climate.
arXiv Detail & Related papers (2021-06-24T17:29:42Z) - Robust Reinforcement Learning Under Minimax Regret for Green Security [50.03819244940543]
Green security domains feature defenders who plan patrols in the face of uncertainty about the adversarial behavior of poachers, illegal loggers, and illegal fishers.
We focus on robust sequential patrol planning for green security following the minimax regret criterion, which has not been considered in the literature.
We formulate the problem as a game between the defender and nature who controls the parameter values of the adversarial behavior and design an algorithm MIRROR to find a robust policy.
arXiv Detail & Related papers (2021-06-15T20:11:12Z) - Staircase Sign Method for Boosting Adversarial Attacks [123.19227129979943]
Crafting adversarial examples for the transfer-based attack is challenging and remains a research hot spot.
We propose a novel Staircase Sign Method (S$2$M) to alleviate this issue, thus boosting transfer-based attacks.
Our method can be generally integrated into any transfer-based attacks, and the computational overhead is negligible.
arXiv Detail & Related papers (2021-04-20T02:31:55Z) - Forecasting asylum-related migration flows with machine learning and
data at scale [0.0]
We show that adaptive machine learning algorithms can effectively forecast asylum-related migration flows.
We exploit three tiers of data - geolocated events and internet searches in countries of origin, detections of irregular crossings at the EU border, and asylum recognition rates in countries of destination.
arXiv Detail & Related papers (2020-11-09T11:31:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.