SEGURIDAD FRONTERIZA: SIMULACIÓN, MODELAMIENTO Y GRADO DE CONTROL ANTE EL INCREMENTO DE ACTIVIDADES ILÍCITAS EN LA FRONTERA COLOMBO- ECUATORIANA
Main Article Content
Abstract
This work examines border security as a problem pending to be resolved in an ideal way by the States, mainly due to the diversity of associated variables that force them to allocate enormous resources of all kinds in a space of binational responsibility. Based on this interest, literature on research on the performance of the Military Forces of various countries in the world, who seek to protect their borders through the application of data and associated technology, was analyzed. After an exhaustive analysis, no specific investigations were found towards the use of statistical tools with modeling of the operations of the Ecuadorian Armed Forces against the control of the northern border. In this investigation, simulations were carried out with the results obtained in the protection of the northern border. The variables investigated were: the use of the Armed Forces and illegal activities. In the first phase, several non-automated stochastic processes, projections and more objective data were applied, which contribute to decision-making at the military strategic level.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Politicas de acceso y reuso
El autor conserva el derecho a ser propietario intelectual del artículo y podría solicitar al Director de la Revista el uso posterior de este trabajo.
El lector tiene derecho a enviar los comentarios que crea conveniente sobre los artículos de la revista, y a participar en los foros que se organicen en torno de los artículos de la revista.
How to Cite
Share
References
Ackleson, J. (2005). Constructing security on the U.S.–Mexico border. Political Geography, 24(2), 165-184. https://doi.org/10.1016/j.polgeo.2004.09.017
Bagchi, A., & Paul, J. A. (2021). National security vs. human rights: A game theoretic analysis of the tension between these objectives. European Journal of Operational Research, 290(2), 790-805. https://doi.org/10.1016/j.ejor.2020.08.017
Brantly, A. F., Keller, W. W., & Jones, S. A. (2016). The Decision to Attack: Military and Intelligence Cyber Decision-Making. Http://www.jstor.org/stable/j.ctt189trzw. University of Georgia Press. http://www.jstor.org/stable/j.ctt189trzw
Brockett, P. L., Cooper, W. W., Golden, L. L., Kumbhakar, S. C., Kwinn, M. J., Layton, B., & Parker, B. R. (2008). Estimating elasticities with frontier and other regressions in evaluating two advertising strategies for US Army recruiting. Socio-Economic Planning Sciences, 42(1), 1-17. https://doi.org/10.1016/j.seps.2007.07.001
Constitución de la República del Ecuador. (2008). Registro Oficial 449. Quito.
Carrión Sánchez, C. (2014). Procesos de resistencia en la frontera colombo-ecuatoriana. Latinoamérica. Revista de Estudios Latinoamericanos, 58, 85-111. https://doi.org/10.1016/S1665-8574(14)70102-4
CISAN-UNAM, Quiroz Félix, J., Castillo Ponce, R. A., Ocegueda Hernández, J. M., & Varela Llamas, R. (2015). Criminal and Economic Activity in Mexico. Norteamérica, 10(2), 187-209. https://doi.org/10.20999/nam.2015.b007
El Comercio. (21 de Enero de 2022). Incremento de la inseguridad. Obtenido de https://www.elcomercio.com/opinion/incremento-inseguridad-ecuador-sebastian-mantilla.html
El Universo, (29 de diciembre de 2022) Obtenido de https://www.eluniverso.com/noticias/seguridad/el-2022-dejo-un-record-de-asesinatos-en-ecuador-4450-casos-solo-308-fueron-resueltos-nota/
Fox, W. P., & Burks, R. (2019). Applications of Operations Research and Management Science for Military Decision Making (Vol. 283). Springer International Publishing. https://doi.org/10.1007/978-3-030-20569-0
González, L. (2010). Balance de estudios sobre Violencia y Seguridad Ciudadana en la frontera colombo ecuatoriana. Fronteras (5), 6-9. Obtenido de https://www.flacso.edu.ec/portal/pnTemp/PageMaster/nuer982k8cm3r920nopl2ldgyv80gs.pdf
Hernández Bringas, Héctor (2021). Homicidios en América Latina y el Caribe: magnitud y factores asociados. Notas de población, 119 – 144. https://hdl.handle.net/11362/47698
Hinsch, M., & Komdeur, J. (2010). Defense, intrusion and the evolutionary stability of territoriality. Journal of Theoretical Biology, 266(4), 606-613. https://doi.org/10.1016/j.jtbi.2010.07.033
Hoffman, F. G., & Neuhard, R. (2016). Avoiding Strategic Inertia: Enabling the National Security Council. Orbis, 60(2), 217-236. https://doi.org/10.1016/j.orbis.2016.01.003
Khan, N., & Efthymiou, M. (2021). The use of biometric technology at airports: The case of customs and border protection (CBP). International Journal of Information Management Data Insights, 1(2), 100049. https://doi.org/10.1016/j.jjimei.2021.100049
Killebrew, R., Irvine, M., & Glaser, D. (2012). A New U.S.-Colombian Relationship: Transnational Crime and U.S. National Security. Orbis, 56(2), 233-248. https://doi.org/10.1016/j.orbis.2012.01.006
Kırdar, M. G., López Cruz, I., & Türküm, B. (2022). The effect of 3.6 million refugees on crime. Journal of Economic Behavior & Organization, 194, 568-582. https://doi.org/10.1016/j.jebo.2021.11.014
Lemley, S., Sandoval, J., & Sapankevych, N. (2013). Open border CONOPS simulation. 2013 IEEE International Conference on Technologies for Homeland Security (HST), 43-47. https://doi.org/10.1109/THS.2013.6698974
Leuprecht, C., Hataley, T., Sundberg, K., Cozine, K., & Brunet-Jailly, E. (2021). The United States–Canada security community: A case study in mature border management. Commonwealth & Comparative Politics, 59(4), 376-398. https://doi.org/10.1080/14662043.2021.1994724
Ley de Seguridad Pública y del Estado Ecuador (Vol. Estado: Reformado). (2017). Quito.
Mallik, A. (2008). National security challenges and competition for India: Defence and space R&D in a strategic context. Technology in Society, 30(3-4), 362-370. https://doi.org/10.1016/j.techsoc.2008.04.015
McCarthy-Jones, A., Doyle, C., & Turner, M. (2020). From hierarchies to networks: The organizational evolution of the international drug trade. International Journal of Law, Crime and Justice, 63, 100436. https://doi.org/10.1016/j.ijlcj.2020.100436
Ministerio de Defensa Nacional. (2017). Política de Defensa, Seguridad y Desarrollo para la Frontera Norte. Ministerio de Defensa Nacional, Agenda de Coordinación Intersectorial de Seguridad 2017- 2021. Quito: Instituto Geográfico Militar.
Ministerio de Defensa Nacional Ecuador. (2017). Política de la Defensa Nacional del Ecuador “Libro Blanco". Quito. Obtenido de https://www.defensa.gob.ec/wp-content/uploads/2019/01/Pol%C3%ADticade-Defensa-Nacional-Libro-Blanco-2018-web.pdf
Ministerio de Defensa Nacional Ecuador. (2018). Plan Estratégico de Seguridad integral Fronteriza. Frontera norte. Comité nacional de seguridad integral fronteriza. Quito.
Ministerio de Defensa Nacional Ecuador. (2019). Plan Nacional de Seguridad Integral 2019-2030. Quito: Instituto Geográfico Militar (IGM).
Oficina de las Naciones Unidas contra la Droga y el Delito (UNODC). (2021). Aproximación de la delincuencia organizada transnacional y la violencia en la frontera. Obtenido de https://www.unodc.org/peruandecuador/es/02AREAS/colh45.html.
Rea Granados, S. (2016). Retos actuales en la implementación de la Ley sobre Refugiados y protección complementaria en México: Identificación, admisión y acceso al procedimiento de asilo. Anuario Mexicano de Derecho Internacional, 1(16), 373. https://doi.org/10.22201/iij.24487872e.2016.16.530
Reveron, D. S., & Savage, J. E. (2020). Cybersecurity Convergence: Digital Human and National Security. Orbis, 64(4), 555-570. https://doi.org/10.1016/j.orbis.2020.08.005
Scala, N. M., & Howard, J. P. (2020). Handbook of Military and Defense Operations Research (N. M. Scala & I. Howard, Eds.; 1.a ed.). Chapman and Hall/CRC. https://doi.org/10.1201/9780429467219
Singh, A., Amutha, J., Nagar, J., & Sharma, S. (2023). A deep learning approach to predict the number of k -barriers for intrusion detection over a circular region using wireless sensor networks. Expert Systems with Applications, 211, 118588. https://doi.org/10.1016/j.eswa.2022.118588
Spapens, T. (2015). Transnational Organized Crime. En International Encyclopedia of the Social & Behavioral Sciences (pp. 596-601). Elsevier. https://doi.org/10.1016/B978-0-08-097086-8.45091-9
Staniforth, A. (2013). Port and Border Security. En Strategic Intelligence Management (pp. 49-64). Elsevier. https://doi.org/10.1016/B978-0-12-407191-9.00005-3
Vollmer, B. A. (2019). The paradox of border security – an example from the UK. Political Geography, 71, 1-9. https://doi.org/10.1016/j.polgeo.2019.01.016
Wrathall, D. J., Devine, J., Aguilar-González, B., Benessaiah, K., Tellman, E., Sesnie, S., Nielsen, E., Magliocca, N., McSweeney, K., Pearson, Z., Ponstingel, J., Sosa, A. R., & Dávila, A. (2020). The impacts of cocaine-trafficking on conservation governance in Central America. Global Environmental Change, 63, 102098. https://doi.org/10.1016/j.gloenvcha.2020.102098
You, I., Ogiela, M. R., Min Tjoa, A., & Shin, D. (2014). Advanced technologies for homeland defense and security. Journal of Network and Computer Applications, 38, 1-2. https://doi.org/10.1016/j.jnca.2013.12.001