Keyword: law & law enforcement

Found 148 papers in total
Applications and extensions of cost curves to marine container inspection
2011,
Drummond and Holte introduced the theory of cost curves, a graphical technique for...
Network deployment of radiation detectors with physics‐based detection probability calculations
2011,
We describe a model for deploying radiation detectors on a transportation network...
Impact of measurement error on container inspection policies at port‐of‐entry
2011,
Containers arriving at a port‐of‐entry are inspected using sensors and...
Detecting nuclear materials smuggling: using radiography to improve container inspection policies
2011,
This paper proposes a layered container inspection system for detecting illicit...
Robin Hood Under the Hood: Wealth‐Based Discrimination in Illicit Customer Help
2010,
This paper investigates whether an employee's perception of customer wealth affects...
Effects of litigation risk on board oversight and CEO incentive pay
2010,
Various commentators have praised the WorldCom and Enron settlements for holding...
The role of social cost–benefit analysis in societal decision-making under large uncertainties with application to robbery at a cash depot
2009,
Social cost–benefit analysis is a well-established method for guiding decisions...
Improving Intrusion Prevention Models: Dual-Threshold and Dual-Filter Approaches
2008,
Intrusion detection, once considered as the last line of defense in the layered...
Fraud detection in energy distribution using support vector machines
2007,
Several economics sectors are exposed to fraud made by their own customers. At the...
What should be done about the illegal immigration from Mexico to the United States?
2007,
In this paper we discuss the question: What should be done about the excessive illegal...
How effective is security screening of airline passengers?
2006,
With a simple mathematical model, we explored the antiterrorist effectiveness of...
Improving emergency responsiveness with management science
2004,
While the goal of OR/MS is to aid decision makers, implementation of published models...
E-World security: a pragmatic view
2004,
Evolution has ensured that all current life forms have an inherent sense of self...
An inspection game: Taking account of fulfillment probabilities of players' aims
2006,
This paper deals with an inspection game of customs and a smuggler. The customs can...
A compulsory smuggling model of inspection game taking account of fulfillment probabilities of players' aims
2006,
This paper deals with an inspection game of the customs and a smuggler. The customs...
An empirical study of software piracy among tertiary institutions in Singapore
2006,
We used a survey technique at Singapore's three universities to examine perceptions of...
Spatial analysis with preference specification of latent decision makers for criminal event prediction
2006,
Spatial analysis looks for statistically significant patterns in observed events that...
A decision analysis method for evaluating computer intrusion detection systems
2004,
This paper presents a decision analysis method for evaluating computer intrusion...
An outlier-based data association method for linking criminal incidents
2006,
Serial criminals are a major threat in the modern society. Associating incidents...
Fighting cybercrime: a review and the Taiwan experience
2006,
Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and...
Process-driven collaboration support for intra-agency crime analysis
2006,
In law enforcement applications, there is a critical need for new tools that can...
Agents with shared mental models for enhancing team decision makings
2006,
Proactive information sharing is a challenging issue faced by intelligence agencies in...
Corruption and taxation: Lessons from the Indian experience
2005,
This paper examines the results of a series of steps taken by the Customs and Excise...
Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach
2006,
Organizations are making substantial investments in information security to reduce the...
Papers per page: