Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers
Author
Abstract
Suggested Citation
DOI: 10.1287/deca.1120.0258
Download full text from publisher
References listed on IDEAS
- Huseyin Cavusoglu & Byungwan Koh & Srinivasan Raghunathan, 2010. "An Analysis of the Impact of Passenger Profiling for Transportation Security," Operations Research, INFORMS, vol. 58(5), pages 1287-1302, October.
- Gary S. Becker, 1974.
"Crime and Punishment: An Economic Approach,"
NBER Chapters, in: Essays in the Economics of Crime and Punishment, pages 1-54,
National Bureau of Economic Research, Inc.
- Gary S. Becker, 1968. "Crime and Punishment: An Economic Approach," Journal of Political Economy, University of Chicago Press, vol. 76(2), pages 169-169.
- Ravich, Timothy M., 2005. "Airline Passenger Profiling Systems After 9/11: Personal Privacy Versus National Security," 46th Annual Transportation Research Forum, Washington, D.C., March 6-8, 2005 208191, Transportation Research Forum.
- Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
- Laura A. McLay & Adrian J. Lee & Sheldon H. Jacobson, 2010. "Risk-Based Policies for Airport Security Checkpoint Screening," Transportation Science, INFORMS, vol. 44(3), pages 333-349, August.
- Ravich, Timothy M., 2005. "Industry Issue Paper: Airline Passenger Profiling Systems after 9/11: Personal Privacy versus National Security," Journal of the Transportation Research Forum, Transportation Research Forum, vol. 44(2).
- Gustav Feichtinger, 1983. "A Differential Games Solution to a Model of Competition Between a Thief and the Police," Management Science, INFORMS, vol. 29(6), pages 686-699, June.
- Charles F. Manski, 2006. "Profiling: Introduction to the Feature," Economic Journal, Royal Economic Society, vol. 116(515), pages 347-350, November.
- George J. Stigler, 1974.
"The Optimum Enforcement of Laws,"
NBER Chapters, in: Essays in the Economics of Crime and Punishment, pages 55-67,
National Bureau of Economic Research, Inc.
- Stigler, George J, 1970. "The Optimum Enforcement of Laws," Journal of Political Economy, University of Chicago Press, vol. 78(3), pages 526-536, May-June.
- Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
- Shavell, Steven, 1991.
"Specific versus General Enforcement of Law,"
Journal of Political Economy, University of Chicago Press, vol. 99(5), pages 1088-1108, October.
- Steven Shavell, 1989. "Specific Versus General Enforcement of Law," NBER Working Papers 3062, National Bureau of Economic Research, Inc.
- Arnold Barnett & Mary K. Higgins, 1989. "Airline Safety: The Last Decade," Management Science, INFORMS, vol. 35(1), pages 1-21, January.
- Vicki Bier & Naraphorn Haphuriwat, 2011. "Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks," Annals of Operations Research, Springer, vol. 187(1), pages 137-158, July.
- Alexander G. Nikolaev & Sheldon H. Jacobson & Laura A. McLay, 2007. "A Sequential Stochastic Security System Design Problem for Aviation Security," Transportation Science, INFORMS, vol. 41(2), pages 182-194, May.
- Jacob W. Ulvila & John E. Gaffney, 2004. "A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems," Decision Analysis, INFORMS, vol. 1(1), pages 35-50, March.
- Huseyin Cavusoglu & Srinivasan Raghunathan, 2004. "Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches," Decision Analysis, INFORMS, vol. 1(3), pages 131-148, September.
- Julie L. Virta & Sheldon H. Jacobson & John E. Kobza, 2003. "Analyzing the Cost of Screening Selectee and Non‐Selectee Baggage," Risk Analysis, John Wiley & Sons, vol. 23(5), pages 897-908, October.
- Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
- Polinsky, Mitchell & Shavell, Steven, 1979. "The Optimal Tradeoff between the Probability and Magnitude of Fines," American Economic Review, American Economic Association, vol. 69(5), pages 880-891, December.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
- Guang Zhu & Hu Liu & Mining Feng, 2018. "Sustainability of Information Security Investment in Online Social Networks: An Evolutionary Game-Theoretic Approach," Mathematics, MDPI, vol. 6(10), pages 1-19, September.
- Nie, Xiaofeng, 2019. "The impact of conditional dependence on checked baggage screening," European Journal of Operational Research, Elsevier, vol. 278(3), pages 883-893.
- Guang Zhu & Hu Liu & Mining Feng, 2018. "An Evolutionary Game-Theoretic Approach for Assessing Privacy Protection in mHealth Systems," IJERPH, MDPI, vol. 15(10), pages 1-27, October.
- Ajay Sudharshan Satish & Akul Mangal & Prathamesh Churi, 2023. "A systematic review of passenger profiling in airport security system: Taking a potential case study of CAPPS II," Journal of Transportation Security, Springer, vol. 16(1), pages 1-41, December.
- Yong Wu & Junlin Duan & Tao Dai & Dong Cheng, 2020. "Managing Security Outsourcing in the Presence of Strategic Hackers," Decision Analysis, INFORMS, vol. 17(3), pages 235-259, September.
- Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
- Katsikopoulos, Konstantinos V., 2016. "On the role of psychological heuristics in operational research; and a demonstration in military stability operationsAuthor-Name: Keller, Niklas," European Journal of Operational Research, Elsevier, vol. 249(3), pages 1063-1073.
- Rakesh K. Sarin & L. Robin Keller, 2013. "From the Editors: Probability Approximations, Anti-Terrorism Strategy, and Bull's-Eye Display for Performance Feedback," Decision Analysis, INFORMS, vol. 10(1), pages 1-5, March.
- Rakesh K. Sarin, 2013. "From the Editor ---Median Aggregation, Scoring Rules, Expert Forecasts, Choices with Binary Attributes, Portfolio with Dependent Projects, and Information Security," Decision Analysis, INFORMS, vol. 10(4), pages 277-278, December.
- Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
- Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
- Yael Deutsch & Boaz Golany, 2019. "Securing Gates of a Protected Area: A Hybrid Game and Queueing Theory Modeling Approach," Decision Analysis, INFORMS, vol. 16(1), pages 31-45, March.
- Yanling Chang & Alan Erera & Chelsea White, 2015. "A leader–follower partially observed, multiobjective Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 103-128, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Huseyin Cavusoglu & Byungwan Koh & Srinivasan Raghunathan, 2010. "An Analysis of the Impact of Passenger Profiling for Transportation Security," Operations Research, INFORMS, vol. 58(5), pages 1287-1302, October.
- Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
- Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
- Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
- Kantorowicz-Reznichenko Elena, 2015. "Day-Fines: Should the Rich Pay More?," Review of Law & Economics, De Gruyter, vol. 11(3), pages 481-501, November.
- Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
- Polinsky, A. Mitchell & Shavell, Steven, 2007.
"The Theory of Public Enforcement of Law,"
Handbook of Law and Economics, in: A. Mitchell Polinsky & Steven Shavell (ed.), Handbook of Law and Economics, edition 1, volume 1, chapter 6, pages 403-454,
Elsevier.
- A. Mitchell Polinsky & Steven Shavell, 2005. "The Theory of Public Enforcement of Law," Discussion Papers 05-004, Stanford Institute for Economic Policy Research.
- A. Mitchell Polinsky & Steven Shavell, 2005. "The Theory of Public Enforcement of Law," NBER Working Papers 11780, National Bureau of Economic Research, Inc.
- Feess, Eberhard & Wohlschlegel, Ansgar, 2009. "Why higher punishment may reduce deterrence," Economics Letters, Elsevier, vol. 104(2), pages 69-71, August.
- Avner Bar-Ilan & Bruce Sacerdote, 2001. "The Response to Fines and Probability of Detection in a Series of Experiments," NBER Working Papers 8638, National Bureau of Economic Research, Inc.
- A. Mitchell Polinsky & Steven Shavell, 2009.
"Public Enforcement of Law,"
Chapters, in: Nuno Garoupa (ed.), Criminal Law and Economics, chapter 1,
Edward Elgar Publishing.
- A. Mitchell Polinsky & Steven Shavell, 2006. "Public Enforcement of Law," Discussion Papers 05-016, Stanford Institute for Economic Policy Research.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Antonio Acconcia & Marcello D'Amato & Riccardo Martina, 2003. "Corruption and Tax Evasion with Competitive Bribes," CSEF Working Papers 112, Centre for Studies in Economics and Finance (CSEF), University of Naples, Italy.
- ÇakanyIldIrIm, Metin & Yue, Wei T. & Ryu, Young U., 2009. "The management of intrusion detection: Configuration, inspection, and investment," European Journal of Operational Research, Elsevier, vol. 195(1), pages 186-204, May.
- Jan Eeckhout & Nicola Persico & Petra E. Todd, 2010. "A Theory of Optimal Random Crackdowns," American Economic Review, American Economic Association, vol. 100(3), pages 1104-1135, June.
- Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
- Giovanni Immordino & Marco Pagano, 2010.
"Legal Standards, Enforcement, and Corruption,"
Journal of the European Economic Association, MIT Press, vol. 8(5), pages 1104-1132, September.
- Giovanni Immordino & Marco Pagano, 2003. "Legal Standards, Enforcement and Corruption," CSEF Working Papers 98, Centre for Studies in Economics and Finance (CSEF), University of Naples, Italy, revised 01 Oct 2009.
- Pagano, Marco & Immordino, Giovanni, 2008. "Legal Standards, Enforcement and Corruption," CEPR Discussion Papers 7071, C.E.P.R. Discussion Papers.
- Giovanni Immordino & Marco Pagano, 2009. "Legal Standards, Enforcement and Corruption," EIEF Working Papers Series 0914, Einaudi Institute for Economics and Finance (EIEF), revised Oct 2009.
- Steven Shavell, 1989. "A Note on Optimal Deterrence When Individuals Choose Among Harmful Acts," NBER Working Papers 3061, National Bureau of Economic Research, Inc.
- Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
- Isaac Ehrlich, 1996. "Crime, Punishment, and the Market for Offenses," Journal of Economic Perspectives, American Economic Association, vol. 10(1), pages 43-67, Winter.
- Marcel Boyer & Tracy R. Lewis & Wei Lin Liu, 2000.
"Setting standards for credible compliance and law enforcement,"
Canadian Journal of Economics, Canadian Economics Association, vol. 33(2), pages 319-340, May.
- Marcel Boyer & Tracy R. Lewis & Wei Lin Liu, 2000. "Setting standards for credible compliance and law enforcement," Canadian Journal of Economics/Revue canadienne d'économique, John Wiley & Sons, vol. 33(2), pages 319-340, May.
- Marcel Boyer & Tracy R. Lewis & Wei Lin Liu, 1996. "Setting Standards for Credible Compliance and Law Enforcement," CIRANO Working Papers 96s-27, CIRANO.
More about this item
Keywords
passenger profiling; screening devices; inspection; configuration; faking; airport security;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ordeca:v:10:y:2013:i:1:p:63-81. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.