IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v4y2011i1p14-21.html
   My bibliography  Save this article

A decision-analysis approach for optimal airport security

Author

Listed:
  • Gerstenfeld, Arthur
  • Berger, Paul D.

Abstract

As the danger from a terrorist on board a plane continues to plague air travel, it is becoming increasingly clear that the issue of the proper set of security devices at airports is of paramount criticality. While security devices such as metal detectors have been used at airports for years, there is increased divisiveness concerning the right amount and scope of security devices at airports. There are many proponents and many opponents of the latest rage, full-body scanners and enhanced pat-downs, and the refrain of liberty vs. security is often heard. In previous work, we have shown that it is inadvisable to rely on a single supplier. Similarly, one may argue that it is inadvisable to rely on a security system with a single device, the metal detector, even if it is augmented with the now routine identification process of matching a passenger’s boarding pass and driver’s license.

Suggested Citation

  • Gerstenfeld, Arthur & Berger, Paul D., 2011. "A decision-analysis approach for optimal airport security," International Journal of Critical Infrastructure Protection, Elsevier, vol. 4(1), pages 14-21.
  • Handle: RePEc:eee:ijocip:v:4:y:2011:i:1:p:14-21
    DOI: 10.1016/j.ijcip.2011.01.002
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548211000035
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2011.01.002?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Sundararaghavan, P.S. & Kunnathur, Anand & Fang, Xiao, 2010. "Sequencing questions to ferret out terrorists: Models and heuristics," Omega, Elsevier, vol. 38(1-2), pages 12-19, February.
    2. Berger, Paul D. & Harper, William K., 1973. "Determination of an Optimal Revolving Credit Agreement," Journal of Financial and Quantitative Analysis, Cambridge University Press, vol. 8(3), pages 491-497, June.
    3. Detlof von Winterfeldt & Terrence M. O'Sullivan, 2006. "Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists?," Decision Analysis, INFORMS, vol. 3(2), pages 63-75, June.
    4. Anonymous, 2010. "Letter to the Editors," International Labor and Working-Class History, Cambridge University Press, vol. 78(1), pages 181-183, October.
    5. Stewart, Mark G., 2010. "Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 29-40.
    6. Berger, Paul D. & Gerstenfeld, Arthur & Zeng, Amy Z., 2004. "How many suppliers are best? A decision-analysis approach," Omega, Elsevier, vol. 32(1), pages 9-15, February.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Skorupski, Jacek & Uchroński, Piotr, 2017. "A fuzzy model for evaluating metal detection equipment at airport security screening checkpoints," International Journal of Critical Infrastructure Protection, Elsevier, vol. 16(C), pages 39-48.
    2. Skorupski, Jacek & Uchroński, Piotr, 2018. "Evaluation of the effectiveness of an airport passenger and baggage security screening system," Journal of Air Transport Management, Elsevier, vol. 66(C), pages 53-64.
    3. Nunes-Vaz, Rick & Lord, Steven, 2014. "Designing physical security for complex infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(3), pages 178-192.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Paul D Berger, 2016. "One man’s path to marketing analytics," Journal of Marketing Analytics, Palgrave Macmillan, vol. 4(1), pages 1-13, March.
    2. Mark G. Stewart & John Mueller, 2013. "Terrorism Risks and Cost‐Benefit Analysis of Aviation Security," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 893-908, May.
    3. Skorupski, Jacek & Uchroński, Piotr, 2017. "A fuzzy model for evaluating metal detection equipment at airport security screening checkpoints," International Journal of Critical Infrastructure Protection, Elsevier, vol. 16(C), pages 39-48.
    4. L. Robin Keller & Ali Abbas & Manel Baucells & Vicki M. Bier & David Budescu & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Ahti Salo & George Wu, 2010. "From the Editors..," Decision Analysis, INFORMS, vol. 7(4), pages 327-330, December.
      • L. Robin Keller & Manel Baucells & Kevin F. McCardle & Gregory S. Parnell & Ahti Salo, 2007. "From the Editors..," Decision Analysis, INFORMS, vol. 4(4), pages 173-175, December.
      • L. Robin Keller & Manel Baucells & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Gregory S. Parnell & Ahti Salo, 2008. "From the Editors..," Decision Analysis, INFORMS, vol. 5(4), pages 173-176, December.
      • L. Robin Keller & Manel Baucells & John C. Butler & Philippe Delquié & Jason R. W. Merrick & Gregory S. Parnell & Ahti Salo, 2009. "From the Editors ..," Decision Analysis, INFORMS, vol. 6(4), pages 199-201, December.
    5. Preetam Basu & Soumita Ghosh & Milan Kumar, 2019. "Supplier ratings and dynamic sourcing strategies to mitigate supply disruption risks," DECISION: Official Journal of the Indian Institute of Management Calcutta, Springer;Indian Institute of Management Calcutta, vol. 46(1), pages 41-57, March.
    6. Qi, Xiangtong, 2007. "Order splitting with multiple capacitated suppliers," European Journal of Operational Research, Elsevier, vol. 178(2), pages 421-432, April.
    7. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    8. Davide Luzzini & Stefano Ronchi, 2016. "Cinderella purchasing transformation: linking purchasing status to purchasing practices and business performance," Post-Print hal-01289902, HAL.
    9. Faiza Hamdi & Ahmed Ghorbel & Faouzi Masmoudi & Lionel Dupont, 2018. "Optimization of a supply portfolio in the context of supply chain risk management: literature review," Journal of Intelligent Manufacturing, Springer, vol. 29(4), pages 763-788, April.
    10. Chowdhury, Md Maruf H. & Quaddus, Mohammed, 2017. "Supply chain resilience: Conceptualization and scale development using dynamic capability theory," International Journal of Production Economics, Elsevier, vol. 188(C), pages 185-204.
    11. Shin, Nina & Park, Sangwook, 2021. "Supply chain leadership driven strategic resilience capabilities management: A leader-member exchange perspective," Journal of Business Research, Elsevier, vol. 122(C), pages 1-13.
    12. K Hausken & G Levitin, 2010. "Defence of homogeneous parallel multi-state systems subject to two sequential attacks," Journal of Risk and Reliability, , vol. 224(3), pages 171-183, September.
    13. Roni, Mohammad S. & Jin, Mingzhou & Eksioglu, Sandra D., 2015. "A hybrid inventory management system responding to regular demand and surge demand," Omega, Elsevier, vol. 52(C), pages 190-200.
    14. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
    15. Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
    16. Meena, P.L. & Sarmah, S.P., 2013. "Multiple sourcing under supplier failure risk and quantity discount: A genetic algorithm approach," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 50(C), pages 84-97.
    17. Samrat Chatterjee & Stephen C. Hora & Heather Rosoff, 2015. "Portfolio Analysis of Layered Security Measures," Risk Analysis, John Wiley & Sons, vol. 35(3), pages 459-475, March.
    18. Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
    19. L. Robin Keller & Kelly M. Kophazi, 2010. "From the Editors..," Decision Analysis, INFORMS, vol. 7(2), pages 151-154, June.
    20. Stephan Boehm, 2015. "The best horse in the Viennese stables: Gottfried Haberler and Joseph Schumpeter," Journal of Evolutionary Economics, Springer, vol. 25(1), pages 107-115, January.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:4:y:2011:i:1:p:14-21. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.