IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v34y2014i4p765-770.html
   My bibliography  Save this article

Perceptions of Randomized Security Schedules

Author

Listed:
  • Nicholas Scurich
  • Richard S. John

Abstract

Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed.

Suggested Citation

  • Nicholas Scurich & Richard S. John, 2014. "Perceptions of Randomized Security Schedules," Risk Analysis, John Wiley & Sons, vol. 34(4), pages 765-770, April.
  • Handle: RePEc:wly:riskan:v:34:y:2014:i:4:p:765-770
    DOI: 10.1111/risa.12126
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/risa.12126
    Download Restriction: no

    File URL: https://libkey.io/10.1111/risa.12126?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Manish Jain & Jason Tsai & James Pita & Christopher Kiekintveld & Shyamsunder Rathi & Milind Tambe & Fernando Ordóñez, 2010. "Software Assistants for Randomized Patrol Planning for the LAX Airport Police and the Federal Air Marshal Service," Interfaces, INFORMS, vol. 40(4), pages 267-290, August.
    2. repec:cup:judgdm:v:5:y:2010:i:5:p:411-419 is not listed on IDEAS
    3. Gerd Gigerenzer, 2006. "Out of the Frying Pan into the Fire: Behavioral Reactions to Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 347-351, April.
    4. Viscusi, W Kip & Zeckhauser, Richard J, 2003. "Sacrificing Civil Liberties to Reduce Terrorism Risks," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 99-120, March-May.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Ian G. J. Dawson, 2018. "Assessing the Effects of Information About Global Population Growth on Risk Perceptions and Support for Mitigation and Prevention Strategies," Risk Analysis, John Wiley & Sons, vol. 38(10), pages 2222-2241, October.
    2. Ian G. J. Dawson & Johnnie E. V. Johnson & Michelle A. Luke, 2017. "One Too Many? Understanding the Influence of Risk Factor Quantity on Perceptions of Risk," Risk Analysis, John Wiley & Sons, vol. 37(6), pages 1157-1169, June.
    3. Angela Bearth & Franziska Hofer & Tamara Stotz & Signe Ghelfi, 2021. "Increasing the deterrence of airport security checks by managing expectations through communication: a hypothetical scenario experiment," Journal of Transportation Security, Springer, vol. 14(3), pages 275-289, December.
    4. Stotz, Tamara & Bearth, Angela & Ghelfi, Signe Maria & Siegrist, Michael, 2022. "The perceived costs and benefits that drive the acceptability of risk-based security screenings at airports," Journal of Air Transport Management, Elsevier, vol. 100(C).
    5. Garret Ridinger & Richard S. John & Michael McBride & Nicholas Scurich, 2016. "Attacker Deterrence and Perceived Risk in a Stackelberg Security Game," Risk Analysis, John Wiley & Sons, vol. 36(8), pages 1666-1681, August.
    6. Tamara Stotz & Angela Bearth & Signe Maria Ghelfi & Michael Siegrist, 2020. "Evaluating the Perceived Efficacy of Randomized Security Measures at Airports," Risk Analysis, John Wiley & Sons, vol. 40(7), pages 1469-1480, July.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Kenneth D. Nguyen & Heather Rosoff & Richard S. John, 2017. "Valuing Equal Protection in Aviation Security Screening," Risk Analysis, John Wiley & Sons, vol. 37(12), pages 2405-2419, December.
    2. W. Kip Viscusi & Richard J. Zeckhauser, 2017. "Recollection Bias and Its Underpinnings: Lessons from Terrorism Risk Assessments," Risk Analysis, John Wiley & Sons, vol. 37(5), pages 969-981, May.
    3. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    4. Jean Spinks & Son Nghiem & Joshua Byrnes, 2021. "Risky business, healthy lives: how risk perception, risk preferences and information influence consumer’s risky health choices," The European Journal of Health Economics, Springer;Deutsche Gesellschaft für Gesundheitsökonomie (DGGÖ), vol. 22(5), pages 811-831, July.
    5. Beck, Yasmine & Ljubić, Ivana & Schmidt, Martin, 2023. "A survey on bilevel optimization under uncertainty," European Journal of Operational Research, Elsevier, vol. 311(2), pages 401-426.
    6. Farrow Scott & Shapiro Stuart, 2009. "The Benefit-Cost Analysis of Security Focused Regulations," Journal of Homeland Security and Emergency Management, De Gruyter, vol. 6(1), pages 1-22, April.
    7. Bruno Frey & Simon Luechinger & Alois Stutzer, 2009. "The life satisfaction approach to valuing public goods: The case of terrorism," Public Choice, Springer, vol. 138(3), pages 317-345, March.
    8. Bruno S. Frey & Simon Luechinger & Alois Stutzer, 2007. "Calculating Tragedy: Assessing The Costs Of Terrorism," Journal of Economic Surveys, Wiley Blackwell, vol. 21(1), pages 1-24, February.
    9. Ian G. J. Dawson & Johnnie E. V. Johnson, 2017. "Does Size Matter? A Study of Risk Perceptions of Global Population Growth," Risk Analysis, John Wiley & Sons, vol. 37(1), pages 65-81, January.
    10. Tilman Brück & Marie Karaisl & Friedrich Schneider, 2008. "A Survey of the Economics of Security," Economics of Security Working Paper Series 1, DIW Berlin, German Institute for Economic Research.
    11. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    12. Friedrich Schneider & Tilman Brück & Daniel Meierrieks, 2010. "The Economics of Terrorism and Counter-Terrorism: A Survey (Part II)," Discussion Papers of DIW Berlin 1050, DIW Berlin, German Institute for Economic Research.
    13. John Garvey & Martin Mullins, 2008. "Contemporary Terrorism: Risk Perception in the London Options Market," Risk Analysis, John Wiley & Sons, vol. 28(1), pages 151-160, February.
    14. Christopher L Ambrey & Christopher M Fleming & Matthew Manning, 2013. "The life satisfaction approach to estimating the cost of crime: An individual's willingness-to-pay for crime reduction," Discussion Papers in Economics economics:201301, Griffith University, Department of Accounting, Finance and Economics.
    15. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    16. Bruno S. Frey & Simon Luechinger, 2005. "Measuring terrorism," Chapters, in: Alain Marciano & Jean-Michel Josselin (ed.), Law and the State, chapter 6, Edward Elgar Publishing.
    17. Bruno S. Frey & Simon Luechinger & Alois Stutzer, "undated". "Valuing Public Goods: The Life Satisfaction Approach," IEW - Working Papers 184, Institute for Empirical Research in Economics - University of Zurich.
    18. Nishizaki, Ichiro & Hayashida, Tomohiro & Sekizaki, Shinya & Okabe, Junya, 2022. "Data envelopment analysis approaches for two-level production and distribution planning problems," European Journal of Operational Research, Elsevier, vol. 300(1), pages 255-268.
    19. Tilman Brück & Marie Karaisl & Friedrich Schneider, 2008. "A Survey on the Economics of Security: Final Report for the European Commission, Directorate-General for Justice, Freedom and Security," DIW Berlin: Politikberatung kompakt, DIW Berlin, German Institute for Economic Research, volume 41, number pbk41.
    20. Ralph L. Keeney, 2007. "Modeling Values for Anti‐Terrorism Analysis," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 585-596, June.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:34:y:2014:i:4:p:765-770. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.