Using Pattern Analysis and Systematic Randomness to Allocate U.S. Border Security Resources
This report investigates how the Office of Border Patrol could employ pattern and trend analysis and systematic randomness to increase interdiction rates and mitigate smuggler adaptation. The analysis shows how approaches that combine the techniques yield higher interdiction rates than approaches us...
Saved in:
Main Author: | |
---|---|
Other Authors: | , , |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
RAND Corporation
2012
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_115029 | ||
005 | 20231005 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231005s2012 xx |||||o ||| 0|eng d | ||
020 | |a j.ctt3fgzws | ||
020 | |a 9780833077738 | ||
020 | |a 9780833068415 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.7249/j.ctt3fgzws |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UNA |2 bicssc | |
072 | 7 | |a JKSW1 |2 bicssc | |
100 | 1 | |a Predd, Joel B. |4 auth | |
700 | 1 | |a Willis, Henry H. |4 auth | |
700 | 1 | |a Setodji, Claude Messan |4 auth | |
700 | 1 | |a Stelzner, Chuck |4 auth | |
245 | 1 | 0 | |a Using Pattern Analysis and Systematic Randomness to Allocate U.S. Border Security Resources |
260 | |b RAND Corporation |c 2012 | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a This report investigates how the Office of Border Patrol could employ pattern and trend analysis and systematic randomness to increase interdiction rates and mitigate smuggler adaptation. The analysis shows how approaches that combine the techniques yield higher interdiction rates than approaches using either technique alone, and it examines the circumstances in which combined approaches are competitive with perfect surveillance. | ||
540 | |a All rights reserved |4 http://oapen.org/content/about-rights | ||
546 | |a English | ||
650 | 7 | |a Database design & theory |2 bicssc | |
650 | 7 | |a Police & security services |2 bicssc | |
653 | |a Political Science | ||
653 | |a Technology | ||
856 | 4 | 0 | |a www.oapen.org |u https://www.jstor.org/stable/10.7249/j.ctt3fgzws |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/115029 |7 0 |z DOAB: description of the publication |