An Analysis of the Impact of Passenger Profiling for Transportation Security
Author
Abstract
Suggested Citation
DOI: 10.1287/opre.1090.0793
Download full text from publisher
References listed on IDEAS
- Arnold Barnett & Mary K. Higgins, 1989. "Airline Safety: The Last Decade," Management Science, INFORMS, vol. 35(1), pages 1-21, January.
- Jeff Dominitz & John Knowles, 2006.
"Crime minimisation and racial bias: what can we learn from police search data?,"
Economic Journal, Royal Economic Society, vol. 116(515), pages 368-384, November.
- Jeff Dominitz & John Knowles, 2005. "Crime Minimization and Racial Bias: What Can We Learn From Police Search Data?," PIER Working Paper Archive 05-019, Penn Institute for Economic Research, Department of Economics, University of Pennsylvania.
- Laura A. McLay & Sheldon H. Jacobson & John E. Kobza, 2006. "A multilevel passenger screening problem for aviation security," Naval Research Logistics (NRL), John Wiley & Sons, vol. 53(3), pages 183-197, April.
- Gary S. Becker, 1974.
"Crime and Punishment: An Economic Approach,"
NBER Chapters, in: Essays in the Economics of Crime and Punishment, pages 1-54,
National Bureau of Economic Research, Inc.
- Gary S. Becker, 1968. "Crime and Punishment: An Economic Approach," Journal of Political Economy, University of Chicago Press, vol. 76(2), pages 169-169.
- George J. Stigler, 1974.
"The Optimum Enforcement of Laws,"
NBER Chapters, in: Essays in the Economics of Crime and Punishment, pages 55-67,
National Bureau of Economic Research, Inc.
- Stigler, George J, 1970. "The Optimum Enforcement of Laws," Journal of Political Economy, University of Chicago Press, vol. 78(3), pages 526-536, May-June.
- John Knowles & Nicola Persico & Petra Todd, 2001.
"Racial Bias in Motor Vehicle Searches: Theory and Evidence,"
Journal of Political Economy, University of Chicago Press, vol. 109(1), pages 203-232, February.
- John Knowles & Nicola Persico & Petra Todd, "undated". "Racial Bias in Motor Vehicle Searches: Theory and Evidence," Penn CARESS Working Papers 5940d5c4875c571776fb29700, Penn Economics Department.
- John Knowles & Nicola Persico & Petra Todd, 1999. "Racial Bias in Motor Vehicle Searches: Theory and Evidence," NBER Working Papers 7449, National Bureau of Economic Research, Inc.
- John Knowles & Nicola Persico & Petra Todd, "undated". ""Racial Bias in Motor Vehicle Searches: Theory and Evidence''," CARESS Working Papres 99-06, University of Pennsylvania Center for Analytic Research and Economics in the Social Sciences.
- Steven N. Durlauf, 2006.
"Assessing Racial Profiling,"
Economic Journal, Royal Economic Society, vol. 116(515), pages 402-426, November.
- Durlauf,S.N., 2005. "Assessing racial profiling," Working papers 2, Wisconsin Madison - Social Systems.
- Nicola Persico & Petra Todd, 2006. "Generalising the Hit Rates Test for Racial Bias in Law Enforcement, With an Application to Vehicle Searches in Wichita," Economic Journal, Royal Economic Society, vol. 116(515), pages 351-367, November.
- Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
- Maschler, Michael, 1976. "An advantage of the bargaining set over the core," Journal of Economic Theory, Elsevier, vol. 13(2), pages 184-192, October.
- Arnold Barnett, 2004. "CAPPS II: The Foundation of Aviation Security?," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 909-916, August.
- Young U. Ryu & Hyeun-Suk Rhee, 2008. "Improving Intrusion Prevention Models: Dual-Threshold and Dual-Filter Approaches," INFORMS Journal on Computing, INFORMS, vol. 20(3), pages 356-367, August.
- Jacob W. Ulvila & John E. Gaffney, 2004. "A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems," Decision Analysis, INFORMS, vol. 1(1), pages 35-50, March.
- Gustav Feichtinger, 1983. "A Differential Games Solution to a Model of Competition Between a Thief and the Police," Management Science, INFORMS, vol. 29(6), pages 686-699, June.
- Shavell, Steven, 1991.
"Specific versus General Enforcement of Law,"
Journal of Political Economy, University of Chicago Press, vol. 99(5), pages 1088-1108, October.
- Steven Shavell, 1989. "Specific Versus General Enforcement of Law," NBER Working Papers 3062, National Bureau of Economic Research, Inc.
- Mishra, Birendra K. & Paul Newman, D. & Stinson, Christopher H., 1997. "Environmental regulations and incentives for compliance audits," Journal of Accounting and Public Policy, Elsevier, vol. 16(2), pages 187-214.
- Lazar Babu, Vellara L. & Batta, Rajan & Lin, Li, 2006. "Passenger grouping under constant threat probability in an airport security system," European Journal of Operational Research, Elsevier, vol. 168(2), pages 633-644, January.
- Huseyin Cavusoglu & Srinivasan Raghunathan, 2004. "Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches," Decision Analysis, INFORMS, vol. 1(3), pages 131-148, September.
- Hulisi Ogut & Huseyin Cavusoglu & Srinivasan Raghunathan, 2008. "Intrusion-Detection Policies for IT Security Breaches," INFORMS Journal on Computing, INFORMS, vol. 20(1), pages 112-123, February.
- Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
- Viscusi, W Kip & Zeckhauser, Richard J, 2003.
"Sacrificing Civil Liberties to Reduce Terrorism Risks,"
Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 99-120, March-May.
- Viscusi, W. Kip & Zeckhauser, Richard, 2003. "Sacrificing Civil Liberties to Reduce Terrorism Risks," Working Paper Series rwp03-017, Harvard University, John F. Kennedy School of Government.
- Polinsky, Mitchell & Shavell, Steven, 1979. "The Optimal Tradeoff between the Probability and Magnitude of Fines," American Economic Review, American Economic Association, vol. 69(5), pages 880-891, December.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
- Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
- Huseyin Cavusoglu & Young Kwark & Bin Mai & Srinivasan Raghunathan, 2013. "Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers," Decision Analysis, INFORMS, vol. 10(1), pages 63-81, March.
- Nie, Xiaofeng, 2019. "The impact of conditional dependence on checked baggage screening," European Journal of Operational Research, Elsevier, vol. 278(3), pages 883-893.
- Hoogstrate, André J. & Klaassen, Chris A.J., 2015. "Information weighted sampling for detecting rare items in finite populations with a focus on security," European Journal of Operational Research, Elsevier, vol. 241(3), pages 880-887.
- Kirschenbaum, Alan (Avi), 2013. "The cost of airport security: The passenger dilemma," Journal of Air Transport Management, Elsevier, vol. 30(C), pages 39-45.
- Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
- Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
- Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Huseyin Cavusoglu & Young Kwark & Bin Mai & Srinivasan Raghunathan, 2013. "Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers," Decision Analysis, INFORMS, vol. 10(1), pages 63-81, March.
- Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
- Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
- Jan Eeckhout & Nicola Persico & Petra E. Todd, 2010. "A Theory of Optimal Random Crackdowns," American Economic Review, American Economic Association, vol. 100(3), pages 1104-1135, June.
- Kantorowicz-Reznichenko Elena, 2015. "Day-Fines: Should the Rich Pay More?," Review of Law & Economics, De Gruyter, vol. 11(3), pages 481-501, November.
- Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
- Polinsky, A. Mitchell & Shavell, Steven, 2007.
"The Theory of Public Enforcement of Law,"
Handbook of Law and Economics, in: A. Mitchell Polinsky & Steven Shavell (ed.), Handbook of Law and Economics, edition 1, volume 1, chapter 6, pages 403-454,
Elsevier.
- A. Mitchell Polinsky & Steven Shavell, 2005. "The Theory of Public Enforcement of Law," Discussion Papers 05-004, Stanford Institute for Economic Policy Research.
- A. Mitchell Polinsky & Steven Shavell, 2005. "The Theory of Public Enforcement of Law," NBER Working Papers 11780, National Bureau of Economic Research, Inc.
- Feess, Eberhard & Wohlschlegel, Ansgar, 2009. "Why higher punishment may reduce deterrence," Economics Letters, Elsevier, vol. 104(2), pages 69-71, August.
- Avner Bar-Ilan & Bruce Sacerdote, 2001. "The Response to Fines and Probability of Detection in a Series of Experiments," NBER Working Papers 8638, National Bureau of Economic Research, Inc.
- Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
- Georgiou, Georgios, 2022. "Do correctional authorities treat all offenders equally? Evaluating the use of a risk assessment instrument," International Review of Law and Economics, Elsevier, vol. 69(C).
- A. Mitchell Polinsky & Steven Shavell, 2009.
"Public Enforcement of Law,"
Chapters, in: Nuno Garoupa (ed.), Criminal Law and Economics, chapter 1,
Edward Elgar Publishing.
- A. Mitchell Polinsky & Steven Shavell, 2006. "Public Enforcement of Law," Discussion Papers 05-016, Stanford Institute for Economic Policy Research.
- Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
- Chuanxi Cai & Shue Mei & Weijun Zhong, 2019. "Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems," Information Technology and Management, Springer, vol. 20(2), pages 55-71, June.
- Alain Bensoussan & Vijay Mookerjee & Wei T. Yue, 2020. "Managing Information System Security Under Continuous and Abrupt Deterioration," Production and Operations Management, Production and Operations Management Society, vol. 29(8), pages 1894-1917, August.
- Antonio Acconcia & Marcello D'Amato & Riccardo Martina, 2003. "Corruption and Tax Evasion with Competitive Bribes," CSEF Working Papers 112, Centre for Studies in Economics and Finance (CSEF), University of Naples, Italy.
- ÇakanyIldIrIm, Metin & Yue, Wei T. & Ryu, Young U., 2009. "The management of intrusion detection: Configuration, inspection, and investment," European Journal of Operational Research, Elsevier, vol. 195(1), pages 186-204, May.
- Giovanni Immordino & Marco Pagano, 2010.
"Legal Standards, Enforcement, and Corruption,"
Journal of the European Economic Association, MIT Press, vol. 8(5), pages 1104-1132, September.
- Giovanni Immordino & Marco Pagano, 2003. "Legal Standards, Enforcement and Corruption," CSEF Working Papers 98, Centre for Studies in Economics and Finance (CSEF), University of Naples, Italy, revised 01 Oct 2009.
- Pagano, Marco & Immordino, Giovanni, 2008. "Legal Standards, Enforcement and Corruption," CEPR Discussion Papers 7071, C.E.P.R. Discussion Papers.
- Giovanni Immordino & Marco Pagano, 2009. "Legal Standards, Enforcement and Corruption," EIEF Working Papers Series 0914, Einaudi Institute for Economics and Finance (EIEF), revised Oct 2009.
- Steven Shavell, 1989. "A Note on Optimal Deterrence When Individuals Choose Among Harmful Acts," NBER Working Papers 3061, National Bureau of Economic Research, Inc.
- Isaac Ehrlich, 1996. "Crime, Punishment, and the Market for Offenses," Journal of Economic Perspectives, American Economic Association, vol. 10(1), pages 43-67, Winter.
More about this item
Keywords
aviation security; homeland and transportation security; screening systems; passenger profiling;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:oropre:v:58:y:2010:i:5:p:1287-1302. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.