From Operational Experience to Predictive Models: A Decision Tree Approach to Traveler Risk Assessment at Border Crossing Points
DOI:
https://doi.org/10.18485/fb_ijcss.2025.1.2.8Keywords:
border security, risk analysis, decision tree, machine learning, pre-screening, threat assessmentAbstract
Border security teams today face a challenging puzzle: how do you spot genuine threats among millions of travelers without creating endless delays for everyone else? This research explores a practical solution using decision tree analysis, a data-driven method for identifying patterns in traveler data. Think of it like a smart checklist that border officers can use to focus their attention where it matters most. We built our dataset by analyzing patterns documented in risk analysis reports from Frontex (the European Border and Coast Guard Agency) and from national police forces such as Moldova’s Border Police. Using these real-world insights, we created a simulation that mirrors the actual patterns and warning signs border guard officers encounter. Our system examines key pieces of information: where someone is traveling from, what documents they’re carrying, their citizenship, and, importantly, what conditions might be pushing people to leave their home countries (such as war, poverty, or political persecution). The science behind this uses a simple but powerful equation: Risk = Threat × Vulnerability × Consequence. In plain terms, we’re asking: What could go wrong? How easy would it be for it to happen? And how severe would the impact be? Our findings show that this approach works. The decision tree successfully separated different types of border concerns—from human trafficking to document fraud to potential security threats—by analyzing patterns in traveler profiles. For example, someone fleeing war zones shows different patterns than someone using fraudulent documents. This means border officers can make better-informed decisions quickly, keeping security tight while letting legitimate travelers move through smoothly.
Downloads
References
1. Bakker, P. (2013) ‘Border Security and the Risk Society’, Journal of Borderlands Studies, 28(2), pp. 234–248.
2. Bousquet, A. (2018) The Eye of War: Military Perception from the Telescope to the Drone. Minneapolis: University of Minnesota Press.
3. Breiman, L. (2001) ‘Random Forests’, Machine Learning, 45(1), pp. 5–32.
4. Department of Finance (2019) Maintaining a Risk Profile. Australian Government. Available at: https://www.finance.gov.au/sites/default/files/2019-11/Maintaining-a-Risk-Profile.pdf (Accessed: 1 December 2025).
5. European Border and Coast Guard Agency (Frontex) (2023) Risk analysis for 2023. Warsaw: Frontex.
6. European Border and Coast Guard Agency (Frontex) (2024) Annual risk analysis 2024. Warsaw: Frontex.
7. Kalanj, S. (2025). Gender-based violence in armed conflicts. International Journal of Contemporary Security Studies, 1(1), 125–138.
8. Liu, H. and Cocea, M. (2017) ‘Semi-random decision tree for data stream classification’, International Journal of Machine Learning and Cybernetics, 8(1), pp. 281–294.
9. National Institute of Standards and Technology (NIST) (2012) Guide for Conducting Risk Assessments (SP 800-30 Rev. 1). U.S. Department of Commerce. Available at: https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-30r1.pdf.
10. Quinlan, J.R. (1986) ‘Induction of Decision Trees’, Machine Learning, 1(1), pp. 81–106.
11. Rokach, L. and Maimon, O. (2014) Data Mining with Decision Trees: Theory and Applications. 2nd edn. World Scientific Publishing.
12. UNHCR (2021) Global Trends: Forced Displacement in 2020. Geneva: The UN Refugee Agency. Available at: https://www.unhcr.org/50ababbe9.pdf.
13. Willis, H.H. (2007) ‘Guiding Resource Allocations Based on Terrorism Risk’, Risk Analysis, 27(3), pp. 597–606.
14. Zureik, E. and Salter, M.B. (2013) Global Surveillance and Policing: Borders, Security, Identity. Cullompton: Willan Publishing.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Constantin Plămădeală (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.
By submitting a manuscript to the International Journal of Contemporary Security Studies, authors acknowledge and agree to the following copyright terms and conditions:
-
Author Rights and Ownership
- Authors retain the copyright to their submitted work. However, by submitting their manuscript, authors grant the International Journal of Contemporary Security Studies a non-exclusive right to publish, distribute, and archive the work in any format (print, digital, or electronic).
- Authors are free to share, reproduce, and distribute their published work, provided proper credit is given to the original publication in this journal.
-
Licensing and Open Access Policy
- The journal publishes under the [insert applicable license, e.g., Creative Commons Attribution License (CC BY)], which allows others to share and adapt the work with appropriate attribution.
- Authors are responsible for ensuring that their submission complies with the journal's licensing terms and does not violate any third-party rights.
-
Originality and Permissions
- The submitted work must be original and not previously published or under consideration elsewhere.
- If the manuscript includes copyrighted materials (e.g., figures, tables, excerpts), authors must obtain the necessary permissions for reproduction and provide appropriate attribution.
-
Author Warranties
- By submitting, authors confirm that their work does not infringe on any intellectual property rights, is free from plagiarism, and adheres to ethical publishing standards.
- The journal is not responsible for any legal disputes arising from copyright infringement, misrepresentation, or unauthorized use of third-party materials.
-
Editorial and Publication Rights
- The International Journal of Contemporary Security Studies reserves the right to make editorial modifications to ensure clarity, consistency, and compliance with journal standards.
- If accepted, the manuscript will be published online and made publicly available according to the journal’s open-access policy.
By proceeding with submission, authors confirm that they have read and agreed to the terms outlined in this Copyright Notice.