SEGURIDAD FRONTERIZA: SIMULACIÓN, MODELAMIENTO Y GRADO DE CONTROL ANTE EL INCREMENTO DE ACTIVIDADES ILÍCITAS EN LA FRONTERA COLOMBO- ECUATORIANA

Main Article Content

NELSÓN RAÚL MOLINA

Abstract

This work examines border security as a problem pending to be resolved in an ideal way by the States, mainly due to the diversity of associated variables that force them to allocate enormous resources of all kinds in a space of binational responsibility. Based on this interest, literature on research on the performance of the Military Forces of various countries in the world, who seek to protect their borders through the application of data and associated technology, was analyzed. After an exhaustive analysis, no specific investigations were found towards the use of statistical tools with modeling of the operations of the Ecuadorian Armed Forces against the control of the northern border. In this investigation, simulations were carried out with the results obtained in the protection of the northern border. The variables investigated were: the use of the Armed Forces and illegal activities. In the first phase, several non-automated stochastic processes, projections and more objective data were applied, which contribute to decision-making at the military strategic level.

Downloads

Download data is not yet available.

Article Details

How to Cite
SEGURIDAD FRONTERIZA: SIMULACIÓN, MODELAMIENTO Y GRADO DE CONTROL ANTE EL INCREMENTO DE ACTIVIDADES ILÍCITAS EN LA FRONTERA COLOMBO- ECUATORIANA. (2023). Revista De La Academia Del Guerra Del Ejército Ecuatoriano, 16(1), 15. https://doi.org/10.24133/AGE.VOL16.N01.2023.13
Section
Artículos Originales

How to Cite

SEGURIDAD FRONTERIZA: SIMULACIÓN, MODELAMIENTO Y GRADO DE CONTROL ANTE EL INCREMENTO DE ACTIVIDADES ILÍCITAS EN LA FRONTERA COLOMBO- ECUATORIANA. (2023). Revista De La Academia Del Guerra Del Ejército Ecuatoriano, 16(1), 15. https://doi.org/10.24133/AGE.VOL16.N01.2023.13

Share

References

Ackleson, J. (2005). Constructing security on the U.S.–Mexico border. Political Geography, 24(2), 165-184. https://doi.org/10.1016/j.polgeo.2004.09.017

Bagchi, A., & Paul, J. A. (2021). National security vs. human rights: A game theoretic analysis of the tension between these objectives. European Journal of Operational Research, 290(2), 790-805. https://doi.org/10.1016/j.ejor.2020.08.017

Brantly, A. F., Keller, W. W., & Jones, S. A. (2016). The Decision to Attack: Military and Intelligence Cyber Decision-Making. Http://www.jstor.org/stable/j.ctt189trzw. University of Georgia Press. http://www.jstor.org/stable/j.ctt189trzw

Brockett, P. L., Cooper, W. W., Golden, L. L., Kumbhakar, S. C., Kwinn, M. J., Layton, B., & Parker, B. R. (2008). Estimating elasticities with frontier and other regressions in evaluating two advertising strategies for US Army recruiting. Socio-Economic Planning Sciences, 42(1), 1-17. https://doi.org/10.1016/j.seps.2007.07.001

Constitución de la República del Ecuador. (2008). Registro Oficial 449. Quito.

Carrión Sánchez, C. (2014). Procesos de resistencia en la frontera colombo-ecuatoriana. Latinoamérica. Revista de Estudios Latinoamericanos, 58, 85-111. https://doi.org/10.1016/S1665-8574(14)70102-4

CISAN-UNAM, Quiroz Félix, J., Castillo Ponce, R. A., Ocegueda Hernández, J. M., & Varela Llamas, R. (2015). Criminal and Economic Activity in Mexico. Norteamérica, 10(2), 187-209. https://doi.org/10.20999/nam.2015.b007

El Comercio. (21 de Enero de 2022). Incremento de la inseguridad. Obtenido de https://www.elcomercio.com/opinion/incremento-inseguridad-ecuador-sebastian-mantilla.html

El Universo, (29 de diciembre de 2022) Obtenido de https://www.eluniverso.com/noticias/seguridad/el-2022-dejo-un-record-de-asesinatos-en-ecuador-4450-casos-solo-308-fueron-resueltos-nota/

Fox, W. P., & Burks, R. (2019). Applications of Operations Research and Management Science for Military Decision Making (Vol. 283). Springer International Publishing. https://doi.org/10.1007/978-3-030-20569-0

González, L. (2010). Balance de estudios sobre Violencia y Seguridad Ciudadana en la frontera colombo ecuatoriana. Fronteras (5), 6-9. Obtenido de https://www.flacso.edu.ec/portal/pnTemp/PageMaster/nuer982k8cm3r920nopl2ldgyv80gs.pdf

Hernández Bringas, Héctor (2021). Homicidios en América Latina y el Caribe: magnitud y factores asociados. Notas de población, 119 – 144. https://hdl.handle.net/11362/47698

Hinsch, M., & Komdeur, J. (2010). Defense, intrusion and the evolutionary stability of territoriality. Journal of Theoretical Biology, 266(4), 606-613. https://doi.org/10.1016/j.jtbi.2010.07.033

Hoffman, F. G., & Neuhard, R. (2016). Avoiding Strategic Inertia: Enabling the National Security Council. Orbis, 60(2), 217-236. https://doi.org/10.1016/j.orbis.2016.01.003

Khan, N., & Efthymiou, M. (2021). The use of biometric technology at airports: The case of customs and border protection (CBP). International Journal of Information Management Data Insights, 1(2), 100049. https://doi.org/10.1016/j.jjimei.2021.100049

Killebrew, R., Irvine, M., & Glaser, D. (2012). A New U.S.-Colombian Relationship: Transnational Crime and U.S. National Security. Orbis, 56(2), 233-248. https://doi.org/10.1016/j.orbis.2012.01.006

Kırdar, M. G., López Cruz, I., & Türküm, B. (2022). The effect of 3.6 million refugees on crime. Journal of Economic Behavior & Organization, 194, 568-582. https://doi.org/10.1016/j.jebo.2021.11.014

Lemley, S., Sandoval, J., & Sapankevych, N. (2013). Open border CONOPS simulation. 2013 IEEE International Conference on Technologies for Homeland Security (HST), 43-47. https://doi.org/10.1109/THS.2013.6698974

Leuprecht, C., Hataley, T., Sundberg, K., Cozine, K., & Brunet-Jailly, E. (2021). The United States–Canada security community: A case study in mature border management. Commonwealth & Comparative Politics, 59(4), 376-398. https://doi.org/10.1080/14662043.2021.1994724

Ley de Seguridad Pública y del Estado Ecuador (Vol. Estado: Reformado). (2017). Quito.

Mallik, A. (2008). National security challenges and competition for India: Defence and space R&D in a strategic context. Technology in Society, 30(3-4), 362-370. https://doi.org/10.1016/j.techsoc.2008.04.015

McCarthy-Jones, A., Doyle, C., & Turner, M. (2020). From hierarchies to networks: The organizational evolution of the international drug trade. International Journal of Law, Crime and Justice, 63, 100436. https://doi.org/10.1016/j.ijlcj.2020.100436

Ministerio de Defensa Nacional. (2017). Política de Defensa, Seguridad y Desarrollo para la Frontera Norte. Ministerio de Defensa Nacional, Agenda de Coordinación Intersectorial de Seguridad 2017- 2021. Quito: Instituto Geográfico Militar.

Ministerio de Defensa Nacional Ecuador. (2017). Política de la Defensa Nacional del Ecuador “Libro Blanco". Quito. Obtenido de https://www.defensa.gob.ec/wp-content/uploads/2019/01/Pol%C3%ADticade-Defensa-Nacional-Libro-Blanco-2018-web.pdf

Ministerio de Defensa Nacional Ecuador. (2018). Plan Estratégico de Seguridad integral Fronteriza. Frontera norte. Comité nacional de seguridad integral fronteriza. Quito.

Ministerio de Defensa Nacional Ecuador. (2019). Plan Nacional de Seguridad Integral 2019-2030. Quito: Instituto Geográfico Militar (IGM).

Oficina de las Naciones Unidas contra la Droga y el Delito (UNODC). (2021). Aproximación de la delincuencia organizada transnacional y la violencia en la frontera. Obtenido de https://www.unodc.org/peruandecuador/es/02AREAS/colh45.html.

Rea Granados, S. (2016). Retos actuales en la implementación de la Ley sobre Refugiados y protección complementaria en México: Identificación, admisión y acceso al procedimiento de asilo. Anuario Mexicano de Derecho Internacional, 1(16), 373. https://doi.org/10.22201/iij.24487872e.2016.16.530

Reveron, D. S., & Savage, J. E. (2020). Cybersecurity Convergence: Digital Human and National Security. Orbis, 64(4), 555-570. https://doi.org/10.1016/j.orbis.2020.08.005

Scala, N. M., & Howard, J. P. (2020). Handbook of Military and Defense Operations Research (N. M. Scala & I. Howard, Eds.; 1.a ed.). Chapman and Hall/CRC. https://doi.org/10.1201/9780429467219

Singh, A., Amutha, J., Nagar, J., & Sharma, S. (2023). A deep learning approach to predict the number of k -barriers for intrusion detection over a circular region using wireless sensor networks. Expert Systems with Applications, 211, 118588. https://doi.org/10.1016/j.eswa.2022.118588

Spapens, T. (2015). Transnational Organized Crime. En International Encyclopedia of the Social & Behavioral Sciences (pp. 596-601). Elsevier. https://doi.org/10.1016/B978-0-08-097086-8.45091-9

Staniforth, A. (2013). Port and Border Security. En Strategic Intelligence Management (pp. 49-64). Elsevier. https://doi.org/10.1016/B978-0-12-407191-9.00005-3

Vollmer, B. A. (2019). The paradox of border security – an example from the UK. Political Geography, 71, 1-9. https://doi.org/10.1016/j.polgeo.2019.01.016

Wrathall, D. J., Devine, J., Aguilar-González, B., Benessaiah, K., Tellman, E., Sesnie, S., Nielsen, E., Magliocca, N., McSweeney, K., Pearson, Z., Ponstingel, J., Sosa, A. R., & Dávila, A. (2020). The impacts of cocaine-trafficking on conservation governance in Central America. Global Environmental Change, 63, 102098. https://doi.org/10.1016/j.gloenvcha.2020.102098

You, I., Ogiela, M. R., Min Tjoa, A., & Shin, D. (2014). Advanced technologies for homeland defense and security. Journal of Network and Computer Applications, 38, 1-2. https://doi.org/10.1016/j.jnca.2013.12.001

Most read articles by the same author(s)

<< < 1 2 3 4 5 6 7 8 9 10 11 12 > >>