Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors
Author
Abstract
Suggested Citation
DOI: 10.1007/s10479-015-2043-x
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Nie, Xiaofeng & Batta, Rajan & Drury, Colin G. & Lin, Li, 2009. "Passenger grouping with risk levels in an airport security system," European Journal of Operational Research, Elsevier, vol. 194(2), pages 574-584, April.
- Azaiez, M.N. & Bier, Vicki M., 2007. "Optimal resource allocation for security in reliability systems," European Journal of Operational Research, Elsevier, vol. 181(2), pages 773-786, September.
- Edgar Cudmore & John Whalley, 2005.
"Border Delays and Trade Liberalization,"
NBER Chapters, in: International Trade in East Asia, pages 391-406,
National Bureau of Economic Research, Inc.
- Edgar Cudmore & John Whalley, 2002. "Border Delays and Trade Liberalization," University of Western Ontario, Economic Policy Research Institute Working Papers 20026, University of Western Ontario, Economic Policy Research Institute.
- Edgar Cudmore & John Whalley, 2003. "Border Delays and Trade Liberalization," NBER Working Papers 9485, National Bureau of Economic Research, Inc.
- Nitin Bakshi & Stephen E. Flynn & Noah Gans, 2011. "Estimating the Operational Impact of Container Inspections at International Ports," Management Science, INFORMS, vol. 57(1), pages 1-20, January.
- Kjell Hausken & Jun Zhuang, 2016.
"The strategic interaction between a company and the government surrounding disasters,"
Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
- Kjell Hausken & Jun Zhuang, 2016. "The strategic interaction between a company and the government surrounding disasters," Annals of Operations Research, Springer, vol. 237(1), pages 27-40, February.
- Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
- Laura McLay & Sheldon Jacobson & Alexander Nikolaev, 2009. "A sequential stochastic passenger screening problem for aviation security," IISE Transactions, Taylor & Francis Journals, vol. 41(6), pages 575-591.
- Jie Xu & Jun Zhuang & Zigeng Liu, 2016.
"Modeling and mitigating the effects of supply chain disruption in a defender–attacker game,"
Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
- Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
- Huseyin Cavusoglu & Young Kwark & Bin Mai & Srinivasan Raghunathan, 2013. "Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers," Decision Analysis, INFORMS, vol. 10(1), pages 63-81, March.
- Jie Xu & Jun Zhuang, 2016.
"Modeling costly learning and counter-learning in a defender-attacker game with private defender information,"
Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
- Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
- Zhe George Zhang, 2009. "Performance Analysis of a Queue with Congestion-Based Staffing Policy," Management Science, INFORMS, vol. 55(2), pages 240-251, February.
- Jie Ding & Betsy S. Greenberg & Hirofumi Matsuo, 1998. "Repetitive Testing Strategies When the Testing Process Is Imperfect," Management Science, INFORMS, vol. 44(10), pages 1367-1378, October.
- Anthony Downs, 1957. "An Economic Theory of Political Action in a Democracy," Journal of Political Economy, University of Chicago Press, vol. 65(2), pages 135-135.
- Zhe George Zhang & Hsing Paul Luh & Chia-Hung Wang, 2011. "Modeling Security-Check Queues," Management Science, INFORMS, vol. 57(11), pages 1979-1995, November.
- Balachandran, K. R. & Schaefer, Mark E., 1980. "Public and private optimization at a service facility with approximate information on congestion," European Journal of Operational Research, Elsevier, vol. 4(3), pages 195-202, March.
- Yisha Xiang & Jun Zhuang, 2016.
"A medical resource allocation model for serving emergency victims with deteriorating health conditions,"
Annals of Operations Research, Springer, vol. 236(1), pages 177-196, January.
- Yisha Xiang & Jun Zhuang, 2016. "A medical resource allocation model for serving emergency victims with deteriorating health conditions," Annals of Operations Research, Springer, vol. 236(1), pages 177-196, January.
- Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
- Jun Zhuang & Gregory Saxton & Han Wu, 2014. "Publicity vs. impact in nonprofit disclosures and donor preferences: a sequential game with one nonprofit organization and N donors," Annals of Operations Research, Springer, vol. 221(1), pages 469-491, October.
- Haphuriwat, N. & Bier, V.M., 2011. "Trade-offs between target hardening and overarching protection," European Journal of Operational Research, Elsevier, vol. 213(1), pages 320-328, August.
- Lee, Adrian J. & Jacobson, Sheldon H., 2011. "The impact of aviation checkpoint queues on optimizing security screening effectiveness," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 900-911.
- Nie, Xiaofeng & Parab, Gautam & Batta, Rajan & Lin, Li, 2012. "Simulation-based Selectee Lane queueing design for passenger checkpoint screening," European Journal of Operational Research, Elsevier, vol. 219(1), pages 146-155.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Liu, Zhongyi & Liu, Jingchen & Zhai, Xin & Wang, Guanying, 2019. "Police staffing and workload assignment in law enforcement using multi-server queueing models," European Journal of Operational Research, Elsevier, vol. 276(2), pages 614-625.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Yael Deutsch & Boaz Golany, 2019. "Securing Gates of a Protected Area: A Hybrid Game and Queueing Theory Modeling Approach," Decision Analysis, INFORMS, vol. 16(1), pages 31-45, March.
- Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
- Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
- John B. Coles & Jing Zhang & Jun Zhuang, 2022. "Bridging the research-practice gap in disaster relief: using the IFRC Code of Conduct to develop an aid model," Annals of Operations Research, Springer, vol. 312(2), pages 1337-1357, May.
- Nie, Xiaofeng, 2019. "The impact of conditional dependence on checked baggage screening," European Journal of Operational Research, Elsevier, vol. 278(3), pages 883-893.
- Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
- Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
- Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
- Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
- Yan, Xihong & Nie, Xiaofeng, 2016. "Optimal placement of multiple types of detectors under a small vessel attack threat to port security," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 93(C), pages 71-94.
- Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
- Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
- Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
- Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
- Li, Xingyu & Epureanu, Bogdan I., 2020. "AI-based competition of autonomous vehicle fleets with application to fleet modularity," European Journal of Operational Research, Elsevier, vol. 287(3), pages 856-874.
- Ajay Sudharshan Satish & Akul Mangal & Prathamesh Churi, 2023. "A systematic review of passenger profiling in airport security system: Taking a potential case study of CAPPS II," Journal of Transportation Security, Springer, vol. 16(1), pages 1-41, December.
- Liu, Zhongyi & Liu, Jingchen & Zhai, Xin & Wang, Guanying, 2019. "Police staffing and workload assignment in law enforcement using multi-server queueing models," European Journal of Operational Research, Elsevier, vol. 276(2), pages 614-625.
- Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
- Kjell Hausken & Jonathan W. Welburn & Jun Zhuang, 2024. "A Review of Attacker–Defender Games and Cyber Security," Games, MDPI, vol. 15(4), pages 1-27, August.
- Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
More about this item
Keywords
Security screening policy; Two-stage queueing network; Waiting time; Game theory; Imperfect screening;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:annopr:v:258:y:2017:i:2:d:10.1007_s10479-015-2043-x. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.