IDEAS home Printed from https://ideas.repec.org/a/spr/jtrsec/v17y2024i1d10.1007_s12198-024-00290-8.html
   My bibliography  Save this article

Aviation security screening optimizer for risk and throughput (ASSORT)

Author

Listed:
  • Robert Brigantic

    (Pacific Northwest National Laboratory (PNNL))

  • Jennifer Willis

    (Pacific Northwest National Laboratory (PNNL))

  • Rachel Pulliam

    (Pacific Northwest National Laboratory (PNNL))

  • Brian Lewis

    (Noblis, Inc.)

  • Julianna Puccio

    (Pacific Northwest National Laboratory (PNNL))

  • Kathryn Otte

    (Pacific Northwest National Laboratory (PNNL))

  • Emily Bonus

    (Pacific Northwest National Laboratory (PNNL))

  • Brenda Forland

    (Pacific Northwest National Laboratory (PNNL))

  • Nick Betzsold

    (Pacific Northwest National Laboratory (PNNL))

  • Atithi Bharth

    (Pacific Northwest National Laboratory (PNNL))

  • Jonathan Mills

    (Pacific Northwest National Laboratory (PNNL))

  • Casey Perkins

    (Pacific Northwest National Laboratory (PNNL))

Abstract

The increasing number of air travelers each year presents a challenge as many airports are near their capacity in terms of resources and space for passenger screening. Fortunately, advancements in technologies like next-generation millimeter wave scanning offer solutions to ease this strain. The focus remains on managing risk while enhancing the passenger experience for the traveling public. The risk model presented in this paper known as the Aviation Security Screening Optimizer for Risk and Throughput (ASSORT) is designed to assess risk-based approaches for passenger screening and checkpoint operations. Additionally, ASSORT is exploring various traveler categories — general, trusted, and trusted-plus — along with different checkpoint screening Concept of Operations tailored to each traveler type. For instance, travelers with a higher trust level may experience fewer screening technologies, resulting in quicker processing times at the checkpoint. The output of ASSORT provides a risk score for predefined threat scenarios, as well as the overall risk to the checkpoint, aircraft, and airport by traveler type. Benefits of using this tool include assessing the trade-offs between the overall risk associated with checkpoints and the throughput rate of passengers screened. We show for example the impact that different passenger volumes at the checkpoint can have on risk.

Suggested Citation

  • Robert Brigantic & Jennifer Willis & Rachel Pulliam & Brian Lewis & Julianna Puccio & Kathryn Otte & Emily Bonus & Brenda Forland & Nick Betzsold & Atithi Bharth & Jonathan Mills & Casey Perkins, 2024. "Aviation security screening optimizer for risk and throughput (ASSORT)," Journal of Transportation Security, Springer, vol. 17(1), pages 1-26, December.
  • Handle: RePEc:spr:jtrsec:v:17:y:2024:i:1:d:10.1007_s12198-024-00290-8
    DOI: 10.1007/s12198-024-00290-8
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s12198-024-00290-8
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s12198-024-00290-8?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Adam Rose & Misak Avetisyan & Heather Rosoff & William J. Burns & Paul Slovic & Oswin Chan, 2017. "The Role of Behavioral Responses in the Total Economic Consequences of Terrorist Attacks on U.S. Air Travel Targets," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1403-1418, July.
    2. Cole, Mara, 2014. "Towards proactive airport security management: Supporting decision making through systematic threat scenario assessment," Journal of Air Transport Management, Elsevier, vol. 35(C), pages 12-18.
    3. Laura A. McLay & Adrian J. Lee & Sheldon H. Jacobson, 2010. "Risk-Based Policies for Airport Security Checkpoint Screening," Transportation Science, INFORMS, vol. 44(3), pages 333-349, August.
    4. Henry H. Willis, 2007. "Guiding Resource Allocations Based on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 597-606, June.
    5. Abdollah Shafieezadeh & Eun J. Cha & Bruce R. Ellingwood, 2015. "A Decision Framework for Managing Risk to Airports from Terrorist Attack," Risk Analysis, John Wiley & Sons, vol. 35(2), pages 292-306, February.
    6. Danijela Vukadinovic & Miguel Ruiz Osés & David Anderson, 2023. "Automated detection of inorganic powders in X-ray images of airport luggage," Journal of Transportation Security, Springer, vol. 16(1), pages 1-28, December.
    7. Laura A. Albert & Alexander Nikolaev & Adrian J. Lee & Kenneth Fletcher & Sheldon H. Jacobson, 2020. "A review of risk-based security and its impact on TSA PreCheck," IISE Transactions, Taylor & Francis Journals, vol. 53(6), pages 657-670, October.
    8. Adrian J. Lee & Sheldon H. Jacobson, 2012. "Addressing Passenger Risk Uncertainty for Aviation Security Screening," Transportation Science, INFORMS, vol. 46(2), pages 189-203, May.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    2. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    3. Yan, Xihong & Nie, Xiaofeng, 2016. "Optimal placement of multiple types of detectors under a small vessel attack threat to port security," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 93(C), pages 71-94.
    4. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    5. Nie, Xiaofeng, 2019. "The impact of conditional dependence on checked baggage screening," European Journal of Operational Research, Elsevier, vol. 278(3), pages 883-893.
    6. Amorim da Cunha, Duarte & Macário, Rosário & Reis, Vasco, 2017. "Keeping cargo security costs down: A risk-based approach to air cargo airport security in small and medium airports," Journal of Air Transport Management, Elsevier, vol. 61(C), pages 115-122.
    7. Bier, Vicki & Gutfraind, Alexander, 2019. "Risk analysis beyond vulnerability and resilience – characterizing the defensibility of critical systems," European Journal of Operational Research, Elsevier, vol. 276(2), pages 626-636.
    8. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    9. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
    10. Robin L. Dillon & Robert M. Liebe & Thomas Bestafka, 2009. "Risk‐Based Decision Making for Terrorism Applications," Risk Analysis, John Wiley & Sons, vol. 29(3), pages 321-335, March.
    11. Baycik, N. Orkun & Sharkey, Thomas C. & Rainwater, Chase E., 2020. "A Markov Decision Process approach for balancing intelligence and interdiction operations in city-level drug trafficking enforcement," Socio-Economic Planning Sciences, Elsevier, vol. 69(C).
    12. Han, Lin & Zhao, Xudong & Chen, Zhilong & Gong, Huadong & Hou, Benwei, 2021. "Assessing resilience of urban lifeline networks to intentional attacks," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    13. M. Elisabeth Paté-Cornell, 2012. "Games, Risks, and Analytics: Several Illustrative Cases Involving National Security and Management Situations," Decision Analysis, INFORMS, vol. 9(2), pages 186-203, June.
    14. Terje Aven, 2012. "Foundational Issues in Risk Assessment and Risk Management," Risk Analysis, John Wiley & Sons, vol. 32(10), pages 1647-1656, October.
    15. Kenneth C. Fletcher & Ali E. Abbas, 2018. "A Value Measure for Public‐Sector Enterprise Risk Management: A TSA Case Study," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 991-1008, May.
    16. Tobias Mueller & Steven Gronau, 2023. "Fostering Macroeconomic Research on Hydrogen-Powered Aviation: A Systematic Literature Review on General Equilibrium Models," Energies, MDPI, vol. 16(3), pages 1-33, February.
    17. Henry H. Willis & Tom LaTourrette, 2008. "Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 325-339, April.
    18. Sai Ho Chung & Hoi Lam Ma & Hing Kai Chan, 2017. "Cascading Delay Risk of Airline Workforce Deployments with Crew Pairing and Schedule Optimization," Risk Analysis, John Wiley & Sons, vol. 37(8), pages 1443-1458, August.
    19. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    20. Kirschenbaum, Alan (Avi), 2013. "The cost of airport security: The passenger dilemma," Journal of Air Transport Management, Elsevier, vol. 30(C), pages 39-45.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:jtrsec:v:17:y:2024:i:1:d:10.1007_s12198-024-00290-8. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.