IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v207y2021ics0951832020308462.html
   My bibliography  Save this article

Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game

Author

Listed:
  • Hunt, Kyle
  • Agarwal, Puneet
  • Zhuang, Jun

Abstract

Airport security agencies throughout the world play a vital role in safeguarding the aviation industry against terrorist attacks. As a result of the evolving and adaptive behaviors of terrorists, it is critical that security agencies continue to adopt new airport screening technologies in order to expose and deter threats. To this end, the question arises as to whether or not to publicly disclose new screening technology adoption. Although there is literature on strategic information disclosure in defensive resource allocation, to the best of our knowledge, no previous literature has focused on modeling disclosure and secrecy for defensive technology adoption. To address this gap, we develop an attacker-defender game model where the defender is considering adopting a new screening technology, and an adversary is considering attacking an aviation target. Our model addresses two distinct information disclosure strategies on behalf of the defender: (i) public disclosure, which is modeled in a sequential subgame, and (ii) secrecy, which is modeled in a simultaneous subgame. We find that in the proposed complete information game, disclosure of the defender’s technology adoption strategy is either preferred to, or equivalent to, maintaining secrecy. That is to say that the defender never prefers secrecy over disclosure. Overall, this paper helps to fill a significant gap in the literature concerning technology adoption and information disclosure strategies for airport security screening, and also has implications that can inform decision makers in the broader homeland security domain. Historical data is used to drive numerical sensitivity analyses of the equilibrium strategies.

Suggested Citation

  • Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
  • Handle: RePEc:eee:reensy:v:207:y:2021:i:c:s0951832020308462
    DOI: 10.1016/j.ress.2020.107355
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832020308462
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2020.107355?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Bruno S. Frey & Simon Luechinger & Alois Stutzer, 2007. "Calculating Tragedy: Assessing The Costs Of Terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 21(1), pages 1-24, February.
    2. Powell, Robert, 2007. "Allocating Defensive Resources with Private Information about Vulnerability," American Political Science Review, Cambridge University Press, vol. 101(4), pages 799-809, November.
    3. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    4. Johannes Ulrich Siebert & Detlof von Winterfeldt, 2020. "Comparative Analysis of Terrorists’ Objectives Hierarchies," Decision Analysis, INFORMS, vol. 17(2), pages 97-114, June.
    5. Laura A. McLay & Adrian J. Lee & Sheldon H. Jacobson, 2010. "Risk-Based Policies for Airport Security Checkpoint Screening," Transportation Science, INFORMS, vol. 44(3), pages 333-349, August.
    6. Zhang, Jing & Zhuang, Jun & Jose, Victor Richmond R., 2018. "The role of risk preferences in a multi-target defender-attacker resource allocation game," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 95-104.
    7. Levitin, Gregory & Hausken, Kjell, 2009. "Intelligence and impact contests in systems with redundancy, false targets, and partial protection," Reliability Engineering and System Safety, Elsevier, vol. 94(12), pages 1927-1941.
    8. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    9. Abdollah Shafieezadeh & Eun J. Cha & Bruce R. Ellingwood, 2015. "A Decision Framework for Managing Risk to Airports from Terrorist Attack," Risk Analysis, John Wiley & Sons, vol. 35(2), pages 292-306, February.
    10. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    11. Feng, Qianmei & Sahin, Hande & Kapur, Kailash C., 2009. "Designing airport checked-baggage-screening strategies considering system capability and reliability," Reliability Engineering and System Safety, Elsevier, vol. 94(2), pages 618-627.
    12. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    13. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    14. Jennifer F. Reinganum, 1981. "On the Diffusion of New Technology: A Game Theoretic Approach," The Review of Economic Studies, Review of Economic Studies Ltd, vol. 48(3), pages 395-405.
    15. Estrada, Mario Arturo Ruiz & Park, Donghyun & Kim, Jung Suk & Khan, Alam, 2015. "The economic impact of terrorism: A new model and its application to Pakistan," Journal of Policy Modeling, Elsevier, vol. 37(6), pages 1065-1080.
    16. Mark G. Stewart & John Mueller, 2013. "Terrorism Risks and Cost‐Benefit Analysis of Aviation Security," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 893-908, May.
    17. Kenneth D. Nguyen & Heather Rosoff & Richard S. John, 2017. "Valuing Equal Protection in Aviation Security Screening," Risk Analysis, John Wiley & Sons, vol. 37(12), pages 2405-2419, December.
    18. Vineet M. Payyappalli & Jun Zhuang & Victor Richmond R. Jose, 2017. "Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts," Risk Analysis, John Wiley & Sons, vol. 37(11), pages 2229-2245, November.
    19. Jun Zhuang & Vicki Bier, 2011. "Secrecy And Deception At Equilibrium, With Applications To Anti-Terrorism Resource Allocation," Defence and Peace Economics, Taylor & Francis Journals, vol. 22(1), pages 43-61.
    20. Pala, Ali & Zhuang, Jun, 2018. "Security screening queues with impatient applicants: A new model with a case study," European Journal of Operational Research, Elsevier, vol. 265(3), pages 919-930.
    21. Canan Ulu & James E. Smith, 2009. "Uncertainty, Information Acquisition, and Technology Adoption," Operations Research, INFORMS, vol. 57(3), pages 740-752, June.
    22. Jun Zhuang & Vicki M. Bier, 2010. "Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 30(12), pages 1737-1743, December.
    23. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    24. Tamasi, Galileo & Demichela, Micaela, 2011. "Risk assessment techniques for civil aviation security," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 892-899.
    25. Qianmei Feng, 2007. "On Determining Specifications and Selections of Alternative Technologies for Airport Checked‐Baggage Security Screening," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1299-1310, October.
    26. James E. Smith & Canan Ulu, 2017. "Risk Aversion, Information Acquisition, and Technology Adoption," Operations Research, INFORMS, vol. 65(4), pages 1011-1028, August.
    27. Sandler, Todd & Arce, Daniel G., 2007. "Terrorism: A Game-Theoretic Approach," Handbook of Defense Economics, in: Keith Hartley & Todd Sandler (ed.), Handbook of Defense Economics, edition 1, volume 2, chapter 25, pages 775-813, Elsevier.
    28. Levitin, Gregory & Hausken, Kjell, 2010. "Separation in homogeneous systems with independent identical elements," European Journal of Operational Research, Elsevier, vol. 203(3), pages 625-634, June.
    29. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    30. Sheldon H. Jacobson & Tamana Karnani & John E. Kobza & Lynsey Ritchie, 2006. "A Cost‐Benefit Analysis of Alternative Device Configurations for Aviation‐Checked Baggage Security Screening," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 297-310, April.
    31. Lee, Adrian J. & Jacobson, Sheldon H., 2011. "The impact of aviation checkpoint queues on optimizing security screening effectiveness," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 900-911.
    32. Cen Song & Jun Zhuang, 2018. "Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors," Risk Analysis, John Wiley & Sons, vol. 38(1), pages 118-133, January.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Wang, Jian & Cui, Lei, 2023. "Patrolling games with coordination between monitoring devices and patrols," Reliability Engineering and System Safety, Elsevier, vol. 233(C).
    2. Tomáš Loveček & Lenka Straková & Katarína Kampová, 2021. "Modeling and Simulation as Tools to Increase the Protection of Critical Infrastructure and the Sustainability of the Provision of Essential Needs of Citizens," Sustainability, MDPI, vol. 13(11), pages 1-18, May.
    3. Magoua, Joseph Jonathan & Li, Nan, 2023. "The human factor in the disaster resilience modeling of critical infrastructure systems," Reliability Engineering and System Safety, Elsevier, vol. 232(C).
    4. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    5. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    2. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    3. Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
    4. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    5. Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
    6. Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
    7. Nie, Xiaofeng, 2019. "The impact of conditional dependence on checked baggage screening," European Journal of Operational Research, Elsevier, vol. 278(3), pages 883-893.
    8. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    9. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    10. Kjell Hausken, 2014. "Choosing what to protect when attacker resources and asset valuations are uncertain," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 24(3), pages 23-44.
    11. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    12. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    13. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    14. Timothy Mathews & Anton D. Lowenberg, 2012. "The Interdependence Between Homeland Security Efforts of a State and a Terrorist’s Choice of Attack," Conflict Management and Peace Science, Peace Science Society (International), vol. 29(2), pages 195-218, April.
    15. Nikoofal, Mohammad E. & Zhuang, Jun, 2015. "On the value of exposure and secrecy of defense system: First-mover advantage vs. robustness," European Journal of Operational Research, Elsevier, vol. 246(1), pages 320-330.
    16. Kjell Hausken & Jun Zhuang, 2011. "Governments' and Terrorists' Defense and Attack in a T -Period Game," Decision Analysis, INFORMS, vol. 8(1), pages 46-70, March.
    17. Peiqiu Guan & Jun Zhuang, 2016. "Modeling Resources Allocation in Attacker‐Defender Games with “Warm Up” CSF," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 776-791, April.
    18. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    19. Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
    20. Schlicher, Loe & Lurkin, Virginie, 2024. "Fighting pickpocketing using a choice-based resource allocation model," European Journal of Operational Research, Elsevier, vol. 315(2), pages 580-595.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:207:y:2021:i:c:s0951832020308462. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.