The role of the United States Postal Service in public safety and security : implications of relaxing the mailbox monopoly / / Lois M. Davis ... [et al.].

The United States Postal Service has a statutory monopoly to deliver mail to mailboxes, but there are arguments to relax that monopoly. This study assesses the public safety concerns of doing so and makes recommendations to address these concerns.

Saved in:
Bibliographic Details
TeilnehmendeR:
Year of Publication:2008
Language:English
Physical Description:1 online resource (221 p.)
Notes:Description based upon print version of record.
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE- Introduction; Background; Study Approach; Study Limitations; Organization of This Monograph; CHAPTER TWO- The USPS's Monopolies and Its Role in Public Safety; Introduction to the USPS Monopolies; What Happens If the Mailbox Rule Is Relaxed?; The Public Safety and Security Roles of the USPS and Private Couriers; The Role of the IS in Public Safety and Security; CHAPTER THREE- Relaxing the Mailbox Rule: Effect on Public Safety and Security Incidents; Types of Security Incidents and Trends
  • Differences Between the USPS and Private Courier Companies in Training, Public Accountability, and OversightSecurity Implications of Relaxing the Mailbox Rule; Summary; CHAPTER FOUR- Relaxing the Mailbox Rule: Effect on the IS's Ability to Detect, Deter, and Investigate Crime; Relaxing the Mailbox Rule: Effect on Federal JurisdictionOver Mail; Relaxing the Mailbox Rule: Effect on Investigation Costs; Relaxing the Mailbox Rule: Effect on Tracking Trends in Mail Crime; Relaxing the Mailbox Rule: Effect on the Ability to Deter Crime; Summary
  • CHAPTER FIVE- Public Perceptions About Relaxing the Mailbox RuleMethods; Key Survey Findings; Summary; CHAPTER SIX- Conclusions and Issues for Further Consideration; Conclusions; Issues to Be Considered If the Mailbox Rule Were Relaxed; APPENDIX A- Methods; APPENDIX B- Detailed Tables of Incidents; APPENDIX C- Guidelines and Training; APPENDIX D- Differences Between FTC and IS Fraud Data; References