IDEAS home Printed from https://ideas.repec.org/a/eee/ejores/v265y2018i3p919-930.html
   My bibliography  Save this article

Security screening queues with impatient applicants: A new model with a case study

Author

Listed:
  • Pala, Ali
  • Zhuang, Jun

Abstract

Security screening policies are critical in military contexts, airports, ports, and visa issuance processes in order to minimize risks from terrorists, smugglers, fugitives, and others. However, such screening procedures also increase congestion and inconvenience for normal applicants, which may create a trade-off for the authorities balancing between risk and congestion. In this paper, we develop a game-theoretical model to investigate optimal screening policies that acknowledges the trade-offs between risk, congestion, and abandonment behavior of the applicants. To calculate the average waiting time in the screening queue with heterogeneous impatient applicants, we use a two-dimensional Markov chain model. As a case study, we tackle the security screening process of US visa applications by conducting an online survey. Collected data shows some key aspects of applicant preferences such as abandonment behavior. We conduct sensitivity analysis for our model. We show that if the authorities take the abandonment behavior of the applicants into account beforehand, they may achieve higher utility depending on the characteristics of applicants.

Suggested Citation

  • Pala, Ali & Zhuang, Jun, 2018. "Security screening queues with impatient applicants: A new model with a case study," European Journal of Operational Research, Elsevier, vol. 265(3), pages 919-930.
  • Handle: RePEc:eee:ejores:v:265:y:2018:i:3:p:919-930
    DOI: 10.1016/j.ejor.2017.08.038
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0377221717307695
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ejor.2017.08.038?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. C. J. Ancker & A. V. Gafarian, 1963. "Some Queuing Problems with Balking and Reneging. I," Operations Research, INFORMS, vol. 11(1), pages 88-100, February.
    2. Sakano, R. & Obeng, K. & Fuller, K., 2016. "Airport security and screening satisfaction: A case study of U.S," Journal of Air Transport Management, Elsevier, vol. 55(C), pages 129-138.
    3. D. Y. Barrer, 1957. "Queuing with Impatient Customers and Indifferent Clerks," Operations Research, INFORMS, vol. 5(5), pages 644-649, October.
    4. C. J. Ancker & A. V. Gafarian, 1963. "Some Queuing Problems with Balking and Reneging---II," Operations Research, INFORMS, vol. 11(6), pages 928-937, December.
    5. Neiman, Brent & Swagel, Phillip, 2009. "The impact of post-9/11 visa policies on travel to the United States," Journal of International Economics, Elsevier, vol. 78(1), pages 86-99, June.
    6. Haviv, Moshe & van der Wal, Jan, 2008. "Mean sojourn times for phase-type discriminatory processor sharing systems," European Journal of Operational Research, Elsevier, vol. 189(2), pages 375-386, September.
    7. Ward Whitt, 2005. "Engineering Solution of a Basic Call-Center Model," Management Science, INFORMS, vol. 51(2), pages 221-235, February.
    8. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    9. Rubinstein, Ariel, 1999. "Experience from a Course in Game Theory: Pre- and Postclass Problem Sets as a Didactic Device," Games and Economic Behavior, Elsevier, vol. 28(1), pages 155-170, July.
    10. Kim, Chesoong & Dudin, Alexander & Dudina, Olga & Dudin, Sergey, 2014. "Tandem queueing system with infinite and finite intermediate buffers and generalized phase-type service time distribution," European Journal of Operational Research, Elsevier, vol. 235(1), pages 170-179.
    11. McLay, Laura A. & Dreiding, Rebecca, 2012. "Multilevel, threshold-based policies for cargo container security screening systems," European Journal of Operational Research, Elsevier, vol. 220(2), pages 522-529.
    12. Nitin Bakshi & Noah Gans, 2010. "Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment," Management Science, INFORMS, vol. 56(2), pages 219-233, February.
    13. Chun, Young H., 2016. "Designing repetitive screening procedures with imperfect inspections: An empirical Bayes approach," European Journal of Operational Research, Elsevier, vol. 253(3), pages 639-647.
    14. Winfried K. Grassmann & Michael I. Taksar & Daniel P. Heyman, 1985. "Regenerative Analysis and Steady State Distributions for Markov Chains," Operations Research, INFORMS, vol. 33(5), pages 1107-1116, October.
    15. Ravner, Liron & Haviv, Moshe & Vu, Hai L., 2016. "A strategic timing of arrivals to a linear slowdown processor sharing system," European Journal of Operational Research, Elsevier, vol. 255(2), pages 496-504.
    16. D. Y. Barrer, 1957. "Queuing with Impatient Customers and Ordered Service," Operations Research, INFORMS, vol. 5(5), pages 650-656, October.
    17. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    18. O. Garnet & A. Mandelbaum & M. Reiman, 2002. "Designing a Call Center with Impatient Customers," Manufacturing & Service Operations Management, INFORMS, vol. 4(3), pages 208-227, October.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    2. Liu, Jian & Chen, Jian & Bo, Rui & Meng, Fanlin & Xu, Yong & Li, Peng, 2023. "Increases or discounts: Price strategies based on customers’ patience times," European Journal of Operational Research, Elsevier, vol. 305(2), pages 722-737.
    3. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    4. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bolandifar, Ehsan & DeHoratius, Nicole & Olsen, Tava, 2023. "Modeling abandonment behavior among patients," European Journal of Operational Research, Elsevier, vol. 306(1), pages 243-254.
    2. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    3. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
    4. Veena Goswami & Gopinath Panda, 2024. "Analysis of Renewal Batch Arrival Queues with Multiple Vacations and Geometric Abandonment," Methodology and Computing in Applied Probability, Springer, vol. 26(2), pages 1-27, June.
    5. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    6. Hayriye Ayhan, 2022. "Server assignment policies in queues with customer abandonments," Queueing Systems: Theory and Applications, Springer, vol. 100(3), pages 393-395, April.
    7. Niyirora, Jerome & Zhuang, Jun, 2017. "Fluid approximations and control of queues in emergency departments," European Journal of Operational Research, Elsevier, vol. 261(3), pages 1110-1124.
    8. Eliran Sherzer & Yoav Kerner, 2018. "Customers’ abandonment strategy in an M / G / 1 queue," Queueing Systems: Theory and Applications, Springer, vol. 90(1), pages 65-87, October.
    9. W. Rogiest & K. Laevens & J. Walraevens & H. Bruneel, 2015. "Random-order-of-service for heterogeneous customers: waiting time analysis," Annals of Operations Research, Springer, vol. 226(1), pages 527-550, March.
    10. Veeraruna Kavitha & Jayakrishnan Nair & Raman Kumar Sinha, 2019. "Pseudo conservation for partially fluid, partially lossy queueing systems," Annals of Operations Research, Springer, vol. 277(2), pages 255-292, June.
    11. Konrad, Renata A. & Trapp, Andrew C. & Palmbach, Timothy M. & Blom, Jeffrey S., 2017. "Overcoming human trafficking via operations research and analytics: Opportunities for methods, models, and applications," European Journal of Operational Research, Elsevier, vol. 259(2), pages 733-745.
    12. Liu, Dehai & Xiao, Xingzhi & Li, Hongyi & Wang, Weiguo, 2015. "Historical evolution and benefit–cost explanation of periodical fluctuation in coal mine safety supervision: An evolutionary game analysis framework," European Journal of Operational Research, Elsevier, vol. 243(3), pages 974-984.
    13. Defraeye, Mieke & Van Nieuwenhuyse, Inneke, 2016. "Staffing and scheduling under nonstationary demand for service: A literature review," Omega, Elsevier, vol. 58(C), pages 4-25.
    14. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    15. Wei Xiong & Tayfur Altiok, 2009. "An approximation for multi-server queues with deterministic reneging times," Annals of Operations Research, Springer, vol. 172(1), pages 143-151, November.
    16. Walid Nasrallah & Raymond Levitt & Peter Glynn, 2003. "Interaction Value Analysis: When Structured Communication Benefits Organizations," Organization Science, INFORMS, vol. 14(5), pages 541-557, October.
    17. Skorupski, Jacek & Uchroński, Piotr, 2018. "Evaluation of the effectiveness of an airport passenger and baggage security screening system," Journal of Air Transport Management, Elsevier, vol. 66(C), pages 53-64.
    18. Chai, Xudong & Liu, Liwei & Chang, Baoxian & Jiang, Tao & Wang, Zhen, 2019. "On a batch matching system with impatient servers and boundedly rational customers," Applied Mathematics and Computation, Elsevier, vol. 354(C), pages 308-328.
    19. Jouini, Oualid & Pot, Auke & Koole, Ger & Dallery, Yves, 2010. "Online scheduling policies for multiclass call centers with impatient customers," European Journal of Operational Research, Elsevier, vol. 207(1), pages 258-268, November.
    20. Shaul K. Bar-Lev & Hans Blanc & Onno Boxma & Guido Janssen & David Perry, 2013. "Tandem Queues with Impatient Customers for Blood Screening Procedures," Methodology and Computing in Applied Probability, Springer, vol. 15(2), pages 423-451, June.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:265:y:2018:i:3:p:919-930. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.