IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v30y2010i4p663-673.html
   My bibliography  Save this article

Deceptive Detection Methods for Effective Security with Inadequate Budgets: The Testing Power Index

Author

Listed:
  • Paul Kantor
  • Endre Boros

Abstract

Detection of contraband depends on countermeasures, some of which involve examining cargo containers and/or their associated documents. Document screening is the least expensive, physical methods, such as gamma ray detection are more expensive, and definitive manual unpacking is most expensive. We cannot apply the full array of methods to all incoming cargoes, for budgetary reasons. We study the problem using principles of game theory, and find that best detection rates are achieved when the available budget is allocated between screening and definitive unpacking using a mixture of strategies that maximize detection rate and, further, serve to deceive opponents as to the specific tests to which contraband will be subjected. This yields increases of as much as 100% in detection, with essentially no increase in inspection cost.

Suggested Citation

  • Paul Kantor & Endre Boros, 2010. "Deceptive Detection Methods for Effective Security with Inadequate Budgets: The Testing Power Index," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 663-673, April.
  • Handle: RePEc:wly:riskan:v:30:y:2010:i:4:p:663-673
    DOI: 10.1111/j.1539-6924.2010.01370.x
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/j.1539-6924.2010.01370.x
    Download Restriction: no

    File URL: https://libkey.io/10.1111/j.1539-6924.2010.01370.x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Susan E. Martonosi & Arnold Barnett, 2006. "How Effective Is Security Screening of Airline Passengers?," Interfaces, INFORMS, vol. 36(6), pages 545-552, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Martina de Gramatica & Fabio Massacci & Woohyun Shim & Uğur Turhan & Julian Williams, 2017. "Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 372-395, February.
    2. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
    3. Stuart Van Weele & Jose Emmanuel Ramirez-Marquez, 2012. "Optimization of inspection for dual contraband using a genetic algorithm," Journal of Risk and Reliability, , vol. 226(5), pages 508-525, October.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. David Anderson, 2021. "Optimising multi-layered security screening," Journal of Transportation Security, Springer, vol. 14(3), pages 249-273, December.
    2. Stewart, Mark G., 2010. "Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 29-40.
    3. Mark G. Stewart & John Mueller, 2013. "Terrorism Risks and Cost‐Benefit Analysis of Aviation Security," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 893-908, May.
    4. Bell, John E. & Griffis, Stanley E. & Cunningham III, William A. & Eberlan, Jon A., 2011. "Location optimization of strategic alert sites for homeland defense," Omega, Elsevier, vol. 39(2), pages 151-158, April.
    5. Alexander G. Nikolaev & Sheldon H. Jacobson & Laura A. McLay, 2007. "A Sequential Stochastic Security System Design Problem for Aviation Security," Transportation Science, INFORMS, vol. 41(2), pages 182-194, May.
    6. Carlos Martí Sempere, 2011. "A Survey of the European Security Market," Economics of Security Working Paper Series 43, DIW Berlin, German Institute for Economic Research.
    7. Xiaofeng Nie & Rajan Batta & Colin G. Drury & Li Lin, 2009. "The Impact of Joint Responses of Devices in an Airport Security System," Risk Analysis, John Wiley & Sons, vol. 29(2), pages 298-311, February.
    8. Mark G. Stewart & John Mueller, 2018. "Risk and economic assessment of U.S. aviation security for passenger-borne bomb attacks," Journal of Transportation Security, Springer, vol. 11(3), pages 117-136, December.
    9. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    10. Nie, Xiaofeng & Parab, Gautam & Batta, Rajan & Lin, Li, 2012. "Simulation-based Selectee Lane queueing design for passenger checkpoint screening," European Journal of Operational Research, Elsevier, vol. 219(1), pages 146-155.
    11. Mark G. Stewart & John Mueller, 2017. "Risk and economic assessment of expedited passenger screening and TSA PreCheck," Journal of Transportation Security, Springer, vol. 10(1), pages 1-22, June.
    12. Nitin Bakshi & Noah Gans, 2010. "Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment," Management Science, INFORMS, vol. 56(2), pages 219-233, February.
    13. Laura A. McLay & Adrian J. Lee & Sheldon H. Jacobson, 2010. "Risk-Based Policies for Airport Security Checkpoint Screening," Transportation Science, INFORMS, vol. 44(3), pages 333-349, August.
    14. Nie, Xiaofeng & Batta, Rajan & Drury, Colin G. & Lin, Li, 2009. "Passenger grouping with risk levels in an airport security system," European Journal of Operational Research, Elsevier, vol. 194(2), pages 574-584, April.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:30:y:2010:i:4:p:663-673. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.