IDEAS home Printed from https://ideas.repec.org/a/spr/jtrsec/v17y2024i1d10.1007_s12198-024-00290-8.html
   My bibliography  Save this article

Aviation security screening optimizer for risk and throughput (ASSORT)

Author

Listed:
  • Robert Brigantic

    (Pacific Northwest National Laboratory (PNNL))

  • Jennifer Willis

    (Pacific Northwest National Laboratory (PNNL))

  • Rachel Pulliam

    (Pacific Northwest National Laboratory (PNNL))

  • Brian Lewis

    (Noblis, Inc.)

  • Julianna Puccio

    (Pacific Northwest National Laboratory (PNNL))

  • Kathryn Otte

    (Pacific Northwest National Laboratory (PNNL))

  • Emily Bonus

    (Pacific Northwest National Laboratory (PNNL))

  • Brenda Forland

    (Pacific Northwest National Laboratory (PNNL))

  • Nick Betzsold

    (Pacific Northwest National Laboratory (PNNL))

  • Atithi Bharth

    (Pacific Northwest National Laboratory (PNNL))

  • Jonathan Mills

    (Pacific Northwest National Laboratory (PNNL))

  • Casey Perkins

    (Pacific Northwest National Laboratory (PNNL))

Abstract

The increasing number of air travelers each year presents a challenge as many airports are near their capacity in terms of resources and space for passenger screening. Fortunately, advancements in technologies like next-generation millimeter wave scanning offer solutions to ease this strain. The focus remains on managing risk while enhancing the passenger experience for the traveling public. The risk model presented in this paper known as the Aviation Security Screening Optimizer for Risk and Throughput (ASSORT) is designed to assess risk-based approaches for passenger screening and checkpoint operations. Additionally, ASSORT is exploring various traveler categories — general, trusted, and trusted-plus — along with different checkpoint screening Concept of Operations tailored to each traveler type. For instance, travelers with a higher trust level may experience fewer screening technologies, resulting in quicker processing times at the checkpoint. The output of ASSORT provides a risk score for predefined threat scenarios, as well as the overall risk to the checkpoint, aircraft, and airport by traveler type. Benefits of using this tool include assessing the trade-offs between the overall risk associated with checkpoints and the throughput rate of passengers screened. We show for example the impact that different passenger volumes at the checkpoint can have on risk.

Suggested Citation

  • Robert Brigantic & Jennifer Willis & Rachel Pulliam & Brian Lewis & Julianna Puccio & Kathryn Otte & Emily Bonus & Brenda Forland & Nick Betzsold & Atithi Bharth & Jonathan Mills & Casey Perkins, 2024. "Aviation security screening optimizer for risk and throughput (ASSORT)," Journal of Transportation Security, Springer, vol. 17(1), pages 1-26, December.
  • Handle: RePEc:spr:jtrsec:v:17:y:2024:i:1:d:10.1007_s12198-024-00290-8
    DOI: 10.1007/s12198-024-00290-8
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s12198-024-00290-8
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s12198-024-00290-8?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Adam Rose & Misak Avetisyan & Heather Rosoff & William J. Burns & Paul Slovic & Oswin Chan, 2017. "The Role of Behavioral Responses in the Total Economic Consequences of Terrorist Attacks on U.S. Air Travel Targets," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1403-1418, July.
    2. Cole, Mara, 2014. "Towards proactive airport security management: Supporting decision making through systematic threat scenario assessment," Journal of Air Transport Management, Elsevier, vol. 35(C), pages 12-18.
    3. Laura A. McLay & Adrian J. Lee & Sheldon H. Jacobson, 2010. "Risk-Based Policies for Airport Security Checkpoint Screening," Transportation Science, INFORMS, vol. 44(3), pages 333-349, August.
    4. Henry H. Willis, 2007. "Guiding Resource Allocations Based on Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 597-606, June.
    5. Abdollah Shafieezadeh & Eun J. Cha & Bruce R. Ellingwood, 2015. "A Decision Framework for Managing Risk to Airports from Terrorist Attack," Risk Analysis, John Wiley & Sons, vol. 35(2), pages 292-306, February.
    6. Danijela Vukadinovic & Miguel Ruiz Osés & David Anderson, 2023. "Automated detection of inorganic powders in X-ray images of airport luggage," Journal of Transportation Security, Springer, vol. 16(1), pages 1-28, December.
    7. Laura A. Albert & Alexander Nikolaev & Adrian J. Lee & Kenneth Fletcher & Sheldon H. Jacobson, 2020. "A review of risk-based security and its impact on TSA PreCheck," IISE Transactions, Taylor & Francis Journals, vol. 53(6), pages 657-670, October.
    8. Adrian J. Lee & Sheldon H. Jacobson, 2012. "Addressing Passenger Risk Uncertainty for Aviation Security Screening," Transportation Science, INFORMS, vol. 46(2), pages 189-203, May.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    2. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    3. Yan, Xihong & Nie, Xiaofeng, 2016. "Optimal placement of multiple types of detectors under a small vessel attack threat to port security," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 93(C), pages 71-94.
    4. Nie, Xiaofeng, 2019. "The impact of conditional dependence on checked baggage screening," European Journal of Operational Research, Elsevier, vol. 278(3), pages 883-893.
    5. Amorim da Cunha, Duarte & Macário, Rosário & Reis, Vasco, 2017. "Keeping cargo security costs down: A risk-based approach to air cargo airport security in small and medium airports," Journal of Air Transport Management, Elsevier, vol. 61(C), pages 115-122.
    6. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    7. Terje Aven, 2012. "Foundational Issues in Risk Assessment and Risk Management," Risk Analysis, John Wiley & Sons, vol. 32(10), pages 1647-1656, October.
    8. Kenneth C. Fletcher & Ali E. Abbas, 2018. "A Value Measure for Public‐Sector Enterprise Risk Management: A TSA Case Study," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 991-1008, May.
    9. Tobias Mueller & Steven Gronau, 2023. "Fostering Macroeconomic Research on Hydrogen-Powered Aviation: A Systematic Literature Review on General Equilibrium Models," Energies, MDPI, vol. 16(3), pages 1-33, February.
    10. Kirschenbaum, Alan (Avi), 2013. "The cost of airport security: The passenger dilemma," Journal of Air Transport Management, Elsevier, vol. 30(C), pages 39-45.
    11. Jon T Selvik & Eirik B Abrahamsen, 2017. "On the meaning of accuracy and precision in a risk analysis context," Journal of Risk and Reliability, , vol. 231(2), pages 91-100, April.
    12. Gregory S. Parnell & Christopher M. Smith & Frederick I. Moxley, 2010. "Intelligent Adversary Risk Analysis: A Bioterrorism Risk Management Model," Risk Analysis, John Wiley & Sons, vol. 30(1), pages 32-48, January.
    13. Ivano Bongiovanni & Cameron Newton, 2019. "Toward an Epidemiology of Safety and Security Risks: An Organizational Vulnerability Assessment in International Airports," Risk Analysis, John Wiley & Sons, vol. 39(6), pages 1281-1297, June.
    14. J. S. Busby & B. Green & D. Hutchison, 2017. "Analysis of Affordance, Time, and Adaptation in the Assessment of Industrial Control System Cybersecurity Risk," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1298-1314, July.
    15. Belhadi, Amine & Kamble, Sachin & Jabbour, Charbel Jose Chiappetta & Gunasekaran, Angappa & Ndubisi, Nelson Oly & Venkatesh, Mani, 2021. "Manufacturing and service supply chain resilience to the COVID-19 outbreak: Lessons learned from the automobile and airline industries," Technological Forecasting and Social Change, Elsevier, vol. 163(C).
    16. Zhe George Zhang & Hsing Paul Luh & Chia-Hung Wang, 2011. "Modeling Security-Check Queues," Management Science, INFORMS, vol. 57(11), pages 1979-1995, November.
    17. Michael Greenberg, 2011. "Risk analysis and port security: some contextual observations and considerations," Annals of Operations Research, Springer, vol. 187(1), pages 121-136, July.
    18. Yacov Y. Haimes & Kenneth Crowther & Barry M. Horowitz, 2008. "Homeland security preparedness: Balancing protection with resilience in emergent systems," Systems Engineering, John Wiley & Sons, vol. 11(4), pages 287-308, December.
    19. Mark G. Stewart & John Mueller, 2018. "Risk and economic assessment of U.S. aviation security for passenger-borne bomb attacks," Journal of Transportation Security, Springer, vol. 11(3), pages 117-136, December.
    20. Sumitra Sri Bhashyam & Gilberto Montibeller, 2016. "In the Opponent's Shoes: Increasing the Behavioral Validity of Attackers’ Judgments in Counterterrorism Models," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 666-680, April.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:jtrsec:v:17:y:2024:i:1:d:10.1007_s12198-024-00290-8. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.