<?xml version="1.0"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "JATS-journalpublishing1.dtd" [
]>
<article xml:lang="en" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
  xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML"
  dtd-version="1.2" article-type="abstract">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">IJPDS</journal-id>
      <journal-title-group>
        <journal-title>International Journal of Population Data Science</journal-title>
        <abbrev-journal-title>IJPDS</abbrev-journal-title>
      </journal-title-group>
      <issn pub-type="epub">2399-4908</issn>
      <publisher>
        <publisher-name>Swansea University</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.23889/ijpds.v10i4.3153</article-id>
      <article-id pub-id-type="publisher-id">10:3:124</article-id>
      <title-group>
        <article-title>Using Sankey diagrams to visually depict the service journeys of criminally exploited children</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Maxwell</surname>
            <given-names initials="N">Nina</given-names>
          </name>
          <xref ref-type="aff" rid="affil-1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Cserző</surname>
            <given-names initials="D">Dorottya</given-names>
          </name>
          <xref ref-type="aff" rid="affil-1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Wang</surname>
            <given-names initials="T">Ting</given-names>
          </name>
          <xref ref-type="aff" rid="affil-2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Toby</surname>
            <given-names initials="R">Roshan</given-names>
          </name>
          <xref ref-type="aff" rid="affil-2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname>Evans</surname>
            <given-names initials="H">Hywel</given-names>
          </name>
          <xref ref-type="aff" rid="affil-2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <name>
            <surname></surname>
            <given-names initials="L">Lois Laio</given-names>
          </name>
          <xref ref-type="aff" rid="affil-1">1</xref>
        </contrib>
      </contrib-group>
      <aff id="affil-1"><label>1</label><institution>Cardiff University, Cardiff, United Kingdom</institution></aff>
      <aff id="affil-2"><label>2</label><institution>Swansea University, Swansea, United Kingdom</institution></aff>
      <pub-date date-type="pub" publication-format="electronic">
        <day>01</day>
        <month>06</month>
        <year>2025</year>
      </pub-date>
      <pub-date date-type="collection" publication-format="electronic">
        <year>2025</year>
      </pub-date>
      <volume>8</volume>
      <issue>4</issue>
      <elocation-id>3153</elocation-id>
      <permissions>
        <license license-type="open-access"
          xlink:href="https://creativecommons.org/licences/by/4.0/">
          <license-p>This work is licenced under a Creative Commons Attribution 4.0 International License.</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="https://ijpds.org/article/view/3153">This article is available from the IJPDS website at: https://ijpds.org/article/view/3153</self-uri>
    </article-meta>
  </front>
  <body>
    <sec>
      <title>Objectives</title>
      <p>Despite growing awareness of child criminal exploitation, there is little evidence about how to identify and respond effectively. This study explored the feasibility of linking service data with routinely collected administrative datasets for children in one Welsh local authority. The aim was to map service journeys to inform service provision.</p>
    </sec>
    <sec>
      <title>Methods</title>
      <p>Data was extracted from local authority service records for the 163 children who were referred to an exploitation meeting between 2021 and 2023. This data was linked to routinely collected administrative datasets from health, education and social services, five years before referral and up to two years afterwards.</p>
      <p>Quantitative data was analysed using Sankey diagrams which are visual representations of complex information using nodes and links between nodes. Nodes included school exclusion, living arrangements, care status and service provider. Nodes were identified through qualitative analysis of the service records and consultation with professionals from health, children’s services, police and youth justice.</p>
    </sec>
    <sec>
      <title>Results</title>
      <p>Descriptive statistics showed that most children referred to an exploitation meeting were male with a median age of 16. Further analysis revealed that females were more likely to be recorded as known to child protection whereas males were recorded in a wider range of service categories, including subject to child protection, known to child protection, in need of care and support, or looked after. Information regarding ethnicity, nationality, additional learning need and missing episodes was frequently missing.</p>
      <p>The feasibility of using latent class analysis will be discussed and Sankey diagrams will be presented to illustrate referral routes, service pathways and outcomes for sub-groups.</p>
    </sec>
    <sec>
      <title>Conclusion</title>
      <p>To our knowledge, this is the first time Sankey diagrams have been used to map service and referral journeys in linked social care data. These findings are contributing to evidence-informed practice about criminally exploited children and what service pathways are more effective in relation to their circumstances.</p>
    </sec>
  </body>
</article>