Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Keyword: law & law enforcement
Found
148 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
Applications and extensions of cost curves to marine container inspection
2011,
Hoshino R
Drummond and Holte introduced the theory of cost curves, a graphical technique for...
Network deployment of radiation detectors with physics‐based detection probability calculations
2011,
Popova Elmira
We describe a model for deploying radiation detectors on a transportation network...
Impact of measurement error on container inspection policies at port‐of‐entry
2011,
Zhu Yada
Containers arriving at a port‐of‐entry are inspected using sensors and...
Detecting nuclear materials smuggling: using radiography to improve container inspection policies
2011,
Ding Yu
This paper proposes a layered container inspection system for detecting illicit...
Robin Hood Under the Hood: Wealth‐Based Discrimination in Illicit Customer Help
2010,
Gino Francesca
This paper investigates whether an employee's perception of customer wealth affects...
Effects of litigation risk on board oversight and CEO incentive pay
2010,
Laux Volker
Various commentators have praised the WorldCom and Enron settlements for holding...
The role of social cost–benefit analysis in societal decision-making under large uncertainties with application to robbery at a cash depot
2009,
Aven T
Social cost–benefit analysis is a well-established method for guiding decisions...
Improving Intrusion Prevention Models: Dual-Threshold and Dual-Filter Approaches
2008,
Ryu Young U
Intrusion detection, once considered as the last line of defense in the layered...
Fraud detection in energy distribution using support vector machines
2007,
Silva Vinicius Dornela
Several economics sectors are exposed to fraud made by their own customers. At the...
What should be done about the illegal immigration from Mexico to the United States?
2007,
Crowe Susan
In this paper we discuss the question: What should be done about the excessive illegal...
How effective is security screening of airline passengers?
2006,
Barnett Arnold
With a simple mathematical model, we explored the antiterrorist effectiveness of...
Improving emergency responsiveness with management science
2004,
Green Linda V.
While the goal of OR/MS is to aid decision makers, implementation of published models...
E-World security: a pragmatic view
2004,
Anketell Devarajan (Rajan)
Evolution has ensured that all current life forms have an inherent sense of self...
An inspection game: Taking account of fulfillment probabilities of players' aims
2006,
Hohzaki Ryusuke
This paper deals with an inspection game of customs and a smuggler. The customs can...
A compulsory smuggling model of inspection game taking account of fulfillment probabilities of players' aims
2006,
Hohzaki Ryusuke
This paper deals with an inspection game of the customs and a smuggler. The customs...
An empirical study of software piracy among tertiary institutions in Singapore
2006,
Koh Hian Chye
We used a survey technique at Singapore's three universities to examine perceptions of...
Spatial analysis with preference specification of latent decision makers for criminal event prediction
2006,
Brown Donald E.
Spatial analysis looks for statistically significant patterns in observed events that...
A decision analysis method for evaluating computer intrusion detection systems
2004,
Ulvila Jacob W.
This paper presents a decision analysis method for evaluating computer intrusion...
An outlier-based data association method for linking criminal incidents
2006,
Brown Donald E.
Serial criminals are a major threat in the modern society. Associating incidents...
Fighting cybercrime: a review and the Taiwan experience
2006,
Chen Hsinchun
Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and...
Process-driven collaboration support for intra-agency crime analysis
2006,
Zhao J. Leon
In law enforcement applications, there is a critical need for new tools that can...
Agents with shared mental models for enhancing team decision makings
2006,
Yen John
Proactive information sharing is a challenging issue faced by intelligence agencies in...
Corruption and taxation: Lessons from the Indian experience
2005,
Vijayakumar Jayaraman
This paper examines the results of a series of steps taken by the Customs and Excise...
Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach
2006,
Rees Jackie
Organizations are making substantial investments in information security to reduce the...
First Page
1
2
3
4
5
Last Page
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers