Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training
Author
Abstract
Suggested Citation
DOI: 10.1111/risa.12607
Download full text from publisher
References listed on IDEAS
- Russ Garber & Elisabeth Paté‐Cornell, 2012. "Shortcuts in Complex Engineering Systems: A Principal‐Agent Approach to Risk Management," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 836-854, May.
- Gerald G. Brown & Louis Anthony (Tony) Cox, Jr., 2011. "How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts," Risk Analysis, John Wiley & Sons, vol. 31(2), pages 196-204, February.
- Gary S. Becker, 1962.
"Investment in Human Capital: A Theoretical Analysis,"
NBER Chapters, in: Investment in Human Beings, pages 9-49,
National Bureau of Economic Research, Inc.
- Gary S. Becker, 1962. "Investment in Human Capital: A Theoretical Analysis," Journal of Political Economy, University of Chicago Press, vol. 70(5), pages 1-9.
- Jean Tirole & Roland Bénabou, 2006.
"Incentives and Prosocial Behavior,"
American Economic Review, American Economic Association, vol. 96(5), pages 1652-1678, December.
- Bénabou, Roland & Tirole, Jean, 2003. "Incentives and Prosocial Behavior," IDEI Working Papers 389, Institut d'Économie Industrielle (IDEI), Toulouse, revised Jan 2006.
- Roland Bénabou & Jean Tirole, 2006. "Incentives and Prosocial Behavior," Post-Print hal-00173700, HAL.
- Roland Bénabou & Jean Tirole, 2005. "Incentives and Prosocial Behavior," NBER Working Papers 11535, National Bureau of Economic Research, Inc.
- Roland Benabou & Jean Tirole, 2004. "Incentives and Prosocial Behavior," Working Papers 137, Princeton University, School of Public and International Affairs, Discussion Papers in Economics.
- Tirole, Jean & Bénabou, Roland, 2004. "Incentives and Prosocial Behaviour," CEPR Discussion Papers 4633, C.E.P.R. Discussion Papers.
- Benabou, Roland & Tirole, Jean, 2005. "Incentives and Prosocial Behavior," IZA Discussion Papers 1695, Institute of Labor Economics (IZA).
- Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
- David Fitoussi & Vijay Gurbaxani, 2012. "IT Outsourcing Contracts and Performance Measurement," Information Systems Research, INFORMS, vol. 23(1), pages 129-143, March.
- Andrea Patacconi, 2009. "Coordination and delay in hierarchies," RAND Journal of Economics, RAND Corporation, vol. 40(1), pages 190-208, March.
- Erik Canton, 2005. "Power of Incentives in Public Organizations When Employees Are Intrinsically Motivated," Journal of Institutional and Theoretical Economics (JITE), Mohr Siebeck, Tübingen, vol. 161(4), pages 664-680, December.
- Kevin Murdock, 2002. "Intrinsic Motivation and Optimal Incentive Contracts," RAND Journal of Economics, The RAND Corporation, vol. 33(4), pages 650-671, Winter.
- Louis Eeckhoudt & Harris Schlesinger, 2006.
"Putting Risk in Its Proper Place,"
American Economic Review, American Economic Association, vol. 96(1), pages 280-289, March.
- Louis Eeckhoudt & Harris Schlesinger, 2005. "Putting Risk in its Proper Place," CESifo Working Paper Series 1462, CESifo.
- EECKHOUDT, Louis & SCHLESINGER, Harris, 2006. "Putting risk in its proper place," LIDAM Reprints CORE 1871, Université catholique de Louvain, Center for Operations Research and Econometrics (CORE).
- L. Eeckhoudt & H. Schlesinger, 2006. "Putting risk in its proper place," Post-Print hal-00283170, HAL.
- Nicholas Bloom & John Van Reenen, 2010.
"New Approaches to Surveying Organizations,"
American Economic Review, American Economic Association, vol. 100(2), pages 105-109, May.
- Bloom, Nick & Van Reenen, John, 2010. "New approaches to surveying organizations," LSE Research Online Documents on Economics 28612, London School of Economics and Political Science, LSE Library.
- Paul Kantor & Endre Boros, 2010. "Deceptive Detection Methods for Effective Security with Inadequate Budgets: The Testing Power Index," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 663-673, April.
- Elisabeth Paté‐Cornell & Louis Anthony Cox, 2014. "Improving Risk Management: From Lame Excuses to Principled Practice," Risk Analysis, John Wiley & Sons, vol. 34(7), pages 1228-1239, July.
- Holmstrom, Bengt & Milgrom, Paul, 1987.
"Aggregation and Linearity in the Provision of Intertemporal Incentives,"
Econometrica, Econometric Society, vol. 55(2), pages 303-328, March.
- Bengt Holmstrom & Paul R. Milgrom, 1985. "Aggregation and Linearity in the Provision of Intertemporal Incentives," Cowles Foundation Discussion Papers 742, Cowles Foundation for Research in Economics, Yale University.
- Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
- Nitin Bakshi & Noah Gans, 2010. "Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment," Management Science, INFORMS, vol. 56(2), pages 219-233, February.
- Michael H. Belzer & Peter F. Swan, 2011. "Supply Chain Security: Agency Theory and Port Drayage Drivers," The Economic and Labour Relations Review, , vol. 22(1), pages 41-63, May.
- Mattias J. Viklund, 2003. "Trust and Risk Perception in Western Europe: A Cross‐National Study," Risk Analysis, John Wiley & Sons, vol. 23(4), pages 727-738, August.
- Kjell Hausken, 2002. "Probabilistic Risk Analysis and Game Theory," Risk Analysis, John Wiley & Sons, vol. 22(1), pages 17-27, February.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
- Donze, Jocelyn & Gunnes, Trude, 2018.
"Becoming “We” instead of “I”, identity management and incentives in the workplace,"
Journal of Economic Behavior & Organization, Elsevier, vol. 148(C), pages 105-120.
- Donze, Jocelyn & Gunnes, Trude, 2013. "Becoming "We" Instead of "I", Identity Management and Incentives in the Workplace," MPRA Paper 44769, University Library of Munich, Germany.
- Jocelyn Donze & Trude Gunnes, 2015. "Becoming “We” Instead of “I”, Identity Management and Incentives in the Workplace," Working Papers of BETA 2015-09, Bureau d'Economie Théorique et Appliquée, UDS, Strasbourg.
- Jocelyn Donze & Trude Gunnes, 2013. "Becoming "We" instead of "I". Identity management and incentives in the workplace," Discussion Papers 760, Statistics Norway, Research Department.
- Jocelyn Donze & Trude Gunnes, 2013. "Becoming “We” Instead of “I”, Identity Management and Incentives in the Workplace," Working Papers of BETA 2013-17, Bureau d'Economie Théorique et Appliquée, UDS, Strasbourg.
- Lamantia, Fabio & Pezzino, Mario, 2016.
"Evolutionary efficacy of a Pay for Performance scheme with motivated agents,"
Journal of Economic Behavior & Organization, Elsevier, vol. 125(C), pages 107-119.
- Fabio Lamantia & Mario Pezzino, 2014. "Evolutionary efficacy of a Pay for Performance scheme with motivated agents," Economics Discussion Paper Series 1408, Economics, The University of Manchester.
- Beckmann, Michael & Cornelissen, Thomas & Kräkel, Matthias, 2017.
"Self-managed working time and employee effort: Theory and evidence,"
Journal of Economic Behavior & Organization, Elsevier, vol. 133(C), pages 285-302.
- Michael Beckmann & Thomas Cornelissen & Matthias Kräkel, 2015. "Self-Managed Working Time and Employee Effort: Theory and Evidence," SOEPpapers on Multidisciplinary Panel Data Research 768, DIW Berlin, The German Socio-Economic Panel (SOEP).
- Antonio Sánchez Soliño, 2019. "Sustainability of Public Services: Is Outsourcing the Answer?," Sustainability, MDPI, vol. 11(24), pages 1-12, December.
- Inés Macho-Stadler & David Pérez-Castrillo, 2018.
"Moral hazard: Base models and two extensions,"
Chapters, in: Luis C. Corchón & Marco A. Marini (ed.), Handbook of Game Theory and Industrial Organization, Volume I, chapter 16, pages 453-485,
Edward Elgar Publishing.
- Inés Macho-Stadler & David Pérez-Castrillo, 2016. "Moral Hazard: Base Models and Two Extensions," Working Papers 883, Barcelona School of Economics.
- Ines Macho-Stadler & David Pérez-Castrillo, 2016. "Moral Hazard: Base Models and Two Extensions," CESifo Working Paper Series 5851, CESifo.
- Grund, Christian, 2011. "Job Preferences as Revealed by Employee Initiated Job Changes," IZA Discussion Papers 6127, Institute of Labor Economics (IZA).
- Ramalingam, Abhijit, 2009. ""Endogenous" Relative Concerns: The Impact of Workers' Characteristics on Status and Pro ts in the Firm," MPRA Paper 18759, University Library of Munich, Germany.
- Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
- Brookman, Jeffrey T. & Thistle, Paul D., 2013. "Managerial compensation: Luck, skill or labor markets?," Journal of Corporate Finance, Elsevier, vol. 21(C), pages 252-268.
- Hausken, Kjell, 2024. "Fifty Years of Operations Research in Defense," European Journal of Operational Research, Elsevier, vol. 318(2), pages 355-368.
- Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
- Jason J Sandvik & Richard E Saouma & Nathan T Seegert & Christopher T Stanton, 2020.
"Workplace Knowledge Flows,"
The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 135(3), pages 1635-1680.
- Jason Sandvik & Richard Saouma & Nathan Seegert & Christopher T. Stanton, 2020. "Workplace Knowledge Flows," NBER Working Papers 26660, National Bureau of Economic Research, Inc.
- Stanton, Christopher T. & Sandvik, Jason & Saouma, Richard & Seegert, Nathan, 2020. "Workplace Knowledge Flows," CEPR Discussion Papers 14299, C.E.P.R. Discussion Papers.
- Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
- Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
- repec:eee:labchp:v:3:y:1999:i:pb:p:2373-2437 is not listed on IDEAS
- Sang-Hyun Kim & Brian Tomlin, 2013. "Guilt by Association: Strategic Failure Prevention and Recovery Capacity Investments," Management Science, INFORMS, vol. 59(7), pages 1631-1649, July.
- Kyota Eguchi, 2017. "Guilty Conscience And Incentives With Performance Assessment Errors," Economic Inquiry, Western Economic Association International, vol. 55(1), pages 434-450, January.
- Dongryul Lee & Byung Kim, 2013. "Motivations for Open Source Project Participation and Decisions of Software Developers," Computational Economics, Springer;Society for Computational Economics, vol. 41(1), pages 31-57, January.
- Galina Besstremyannaya & Sergei Golovan, 2019. "Physician’s altruism in incentive contracts: Medicare’s quality race," CINCH Working Paper Series 1903, Universitaet Duisburg-Essen, Competent in Competition and Health.
- Edmans, Alex & Gosling, Tom & Jenter, Dirk, 2023.
"CEO compensation: Evidence from the field,"
Journal of Financial Economics, Elsevier, vol. 150(3).
- Alex Edmans & Tom Gosling & Dirk Jenter, 2021. "CEO Compensation: Evidence from the Field," CESifo Working Paper Series 9162, CESifo.
- Edmans, Alex & Gosling, Tom & Jenter, Dirk, 2023. "CEO compensation: evidence from the field," LSE Research Online Documents on Economics 120546, London School of Economics and Political Science, LSE Library.
- Edmans, Alex & Gosling, Tom & Jenter, Dirk, 2021. "CEO compensation: evidence from the field," LSE Research Online Documents on Economics 118860, London School of Economics and Political Science, LSE Library.
- Edmans, Alex & Gosling, Tom & Jenter, Dirk, 2021. "CEO Compensation: Evidence From the Field," CEPR Discussion Papers 16315, C.E.P.R. Discussion Papers.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:37:y:2017:i:2:p:372-395. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.