IDEAS home Printed from https://ideas.repec.org/a/spr/annopr/v245y2016i1d10.1007_s10479-014-1690-7.html
   My bibliography  Save this article

Security economics: an adversarial risk analysis approach to airport protection

Author

Listed:
  • Javier Cano

    (Rey Juan Carlos University)

  • David Ríos Insua

    (ICMAT-CSIC)

  • Alessandra Tedeschi

    (Deep Blue)

  • Ug̃ur Turhan

    (Anadolu University)

Abstract

We analyze the case of protecting an airport, in which there is concern with terrorist threats against the Air Traffic Control Tower. To deter terrorist actions, airport authorities rely on various protective measures, which entail multiple consequences. By deploying them, airport authorities expect to reduce the probabilities and potential impacts of terrorist actions. We aim at giving advice to the airport authorities by devising a security resource allocation plan. We use the framework of adversarial risk analysis to deal with the problem.

Suggested Citation

  • Javier Cano & David Ríos Insua & Alessandra Tedeschi & Ug̃ur Turhan, 2016. "Security economics: an adversarial risk analysis approach to airport protection," Annals of Operations Research, Springer, vol. 245(1), pages 359-378, October.
  • Handle: RePEc:spr:annopr:v:245:y:2016:i:1:d:10.1007_s10479-014-1690-7
    DOI: 10.1007/s10479-014-1690-7
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10479-014-1690-7
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10479-014-1690-7?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. James S. Dyer & Rakesh K. Sarin, 1982. "Relative Risk Aversion," Management Science, INFORMS, vol. 28(8), pages 875-886, August.
    2. Gary S. Becker, 1974. "Crime and Punishment: An Economic Approach," NBER Chapters, in: Essays in the Economics of Crime and Punishment, pages 1-54, National Bureau of Economic Research, Inc.
    3. Koller, Daphne & Milch, Brian, 2003. "Multi-agent influence diagrams for representing and solving games," Games and Economic Behavior, Elsevier, vol. 45(1), pages 181-221, October.
    4. Andrew Cook & Graham Tanner & Adrian Lawes, 2012. "The Hidden Cost of Airline Unpunctuality," Journal of Transport Economics and Policy, University of Bath, vol. 46(2), pages 157-173, May.
    5. Viscusi, W Kip & Aldy, Joseph E, 2003. "The Value of a Statistical Life: A Critical Review of Market Estimates throughout the World," Journal of Risk and Uncertainty, Springer, vol. 27(1), pages 5-76, August.
    6. Kleijnen, Jack P. C. & Sargent, Robert G., 2000. "A methodology for fitting and validating metamodels in simulation," European Journal of Operational Research, Elsevier, vol. 120(1), pages 14-29, January.
    7. W. Viscusi, 2009. "Valuing risks of death from terrorism and natural disasters," Journal of Risk and Uncertainty, Springer, vol. 38(3), pages 191-213, June.
    8. Gerald Brown & Matthew Carlyle & Javier Salmerón & Kevin Wood, 2006. "Defending Critical Infrastructure," Interfaces, INFORMS, vol. 36(6), pages 530-544, December.
    9. Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.
    10. Ross D. Shachter, 1986. "Evaluating Influence Diagrams," Operations Research, INFORMS, vol. 34(6), pages 871-882, December.
    11. James S. Dyer & Rakesh K. Sarin, 1979. "Measurable Multiattribute Value Functions," Operations Research, INFORMS, vol. 27(4), pages 810-822, August.
    12. repec:reg:rpubli:282 is not listed on IDEAS
    13. Peter H. Farquhar, 1984. "State of the Art---Utility Assessment Methods," Management Science, INFORMS, vol. 30(11), pages 1283-1300, November.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Amorim da Cunha, Duarte & Macário, Rosário & Reis, Vasco, 2017. "Keeping cargo security costs down: A risk-based approach to air cargo airport security in small and medium airports," Journal of Air Transport Management, Elsevier, vol. 61(C), pages 115-122.
    2. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    3. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    4. William N. Caballero & Ethan Gharst & David Banks & Jeffery D. Weir, 2023. "Multipolar Security Cooperation Planning: A Multiobjective, Adversarial-Risk-Analysis Approach," Decision Analysis, INFORMS, vol. 20(1), pages 16-39, March.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. G. Quijano, Eduardo & Ríos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
    2. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    3. César Gil & David Rios Insua & Jesus Rios, 2016. "Adversarial Risk Analysis for Urban Security Resource Allocation," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 727-741, April.
    4. González-Ortega, Jorge & Ríos Insua, David & Cano, Javier, 2019. "Adversarial risk analysis for bi-agent influence diagrams: An algorithmic approach," European Journal of Operational Research, Elsevier, vol. 273(3), pages 1085-1096.
    5. David Rios Insua & David Banks & Jesus Rios, 2016. "Modeling Opponents in Adversarial Risk Analysis," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 742-755, April.
    6. Misuri, Alessio & Khakzad, Nima & Reniers, Genserik & Cozzani, Valerio, 2019. "A Bayesian network methodology for optimal security management of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 191(C).
    7. Wei Wang & Francesco Di Maio & Enrico Zio, 2019. "Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber–Physical Systems from Cyber Attacks," Risk Analysis, John Wiley & Sons, vol. 39(12), pages 2766-2785, December.
    8. Rios Insua, D. & Alfaro, C. & Gomez, J. & Hernandez-Coronado, P. & Bernal, F., 2018. "A framework for risk management decisions in aviation safety at state level," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 74-82.
    9. Salo, Ahti & Andelmin, Juho & Oliveira, Fabricio, 2022. "Decision programming for mixed-integer multi-stage optimization under uncertainty," European Journal of Operational Research, Elsevier, vol. 299(2), pages 550-565.
    10. Aitor Couce-Vieira & David Rios Insua & Alex Kosgodagan, 2020. "Assessing and Forecasting Cybersecurity Impacts," Decision Analysis, INFORMS, vol. 17(4), pages 356-374, December.
    11. Roponen, Juho & Ríos Insua, David & Salo, Ahti, 2020. "Adversarial risk analysis under partial information," European Journal of Operational Research, Elsevier, vol. 287(1), pages 306-316.
    12. Bielza, Concha & Gómez, Manuel & Shenoy, Prakash P., 2011. "A review of representation issues and modeling challenges with influence diagrams," Omega, Elsevier, vol. 39(3), pages 227-241, June.
    13. Peter Reichert & Klemens Niederberger & Peter Rey & Urs Helg & Susanne Haertel-Borer, 2019. "The need for unconventional value aggregation techniques: experiences from eliciting stakeholder preferences in environmental management," EURO Journal on Decision Processes, Springer;EURO - The Association of European Operational Research Societies, vol. 7(3), pages 197-219, November.
    14. Jay Simon, 2016. "On the existence of altruistic value and utility functions," Theory and Decision, Springer, vol. 81(3), pages 371-391, September.
    15. Sriwastava, Ambuj & Reichert, Peter, 2023. "Reducing sample size requirements by extending discrete choice experiments to indifference elicitation," Journal of choice modelling, Elsevier, vol. 48(C).
    16. Janet Currie & Michael Mueller-Smith & Maya Rossin-Slater, 2022. "Violence While in Utero: The Impact of Assaults during Pregnancy on Birth Outcomes," The Review of Economics and Statistics, MIT Press, vol. 104(3), pages 525-540, May.
    17. Loomes, Graham, 1995. "The myth of the HYE," Journal of Health Economics, Elsevier, vol. 14(1), pages 1-7, May.
    18. Christopher L Ambrey & Christopher M Fleming & Matthew Manning, 2013. "The life satisfaction approach to estimating the cost of crime: An individual's willingness-to-pay for crime reduction," Discussion Papers in Economics economics:201301, Griffith University, Department of Accounting, Finance and Economics.
    19. Ralph L. Keeney, 2002. "Common Mistakes in Making Value Trade-Offs," Operations Research, INFORMS, vol. 50(6), pages 935-945, December.
    20. Thwaites, Peter A. & Smith, Jim Q., 2018. "A graphical method for simplifying Bayesian games," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 3-11.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:annopr:v:245:y:2016:i:1:d:10.1007_s10479-014-1690-7. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.