Operating characteristics of passenger screening processes and the development of a paced inspection system
Author
Abstract
Suggested Citation
DOI: 10.22004/ag.econ.207254
Download full text from publisher
References listed on IDEAS
- Leone, Kelly & (Rachel) Liu, Rongfang, 2005. "The key design parameters of checked baggage security screening systems in airports," Journal of Air Transport Management, Elsevier, vol. 11(2), pages 69-78.
- P. Daniel Wright & Matthew J. Liberatore & Robert L. Nydick, 2006. "A Survey of Operations Research Models and Applications in Homeland Security," Interfaces, INFORMS, vol. 36(6), pages 514-529, December.
- Olapiriyakul, Sun & Das, Sanchoy, 2007. "Design and analysis of a two-stage security screening and inspection system," Journal of Air Transport Management, Elsevier, vol. 13(2), pages 67-74.
- Ronald R. Gilliam, 1979. "An Application of Queueing Theory to Airport Passenger Security Screening," Interfaces, INFORMS, vol. 9(4), pages 117-123, August.
- Yoo, Kwang Eui & Choi, Youn Chul, 2006. "Analytic hierarchy process approach for identifying relative importance of factors to improve passenger security checks at airports," Journal of Air Transport Management, Elsevier, vol. 12(3), pages 135-142.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Zachary A. Marshall & John H. Mott & Adam J. Gottwald & Caleb A. Patrick & Luigi Raphael I. Dy, 2022. "Expediting airport security queues through advanced lane assignment," Journal of Transportation Security, Springer, vol. 15(3), pages 245-262, December.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Olapiriyakul, Sun & Das, Sanchoy, 2007. "Design and analysis of a two-stage security screening and inspection system," Journal of Air Transport Management, Elsevier, vol. 13(2), pages 67-74.
- Skorupski, Jacek & Uchroński, Piotr, 2018. "Evaluation of the effectiveness of an airport passenger and baggage security screening system," Journal of Air Transport Management, Elsevier, vol. 66(C), pages 53-64.
- Skorupski, Jacek & Uchroński, Piotr, 2017. "A fuzzy model for evaluating metal detection equipment at airport security screening checkpoints," International Journal of Critical Infrastructure Protection, Elsevier, vol. 16(C), pages 39-48.
- Zhonghua Wei & Sinan Chu & Zhengde Huang & Shi Qiu & Qixuan Zhao, 2020. "Optimization Design of X-ray Conveyer Belt Length for Subway Security Check Systems in Beijing, China," Sustainability, MDPI, vol. 12(5), pages 1-14, March.
- Nagarajan, Magesh & Shaw, Duncan & Albores, Pavel, 2012. "Disseminating a warning message to evacuate: A simulation study of the behaviour of neighbours," European Journal of Operational Research, Elsevier, vol. 220(3), pages 810-819.
- David Anderson, 2021. "Optimising multi-layered security screening," Journal of Transportation Security, Springer, vol. 14(3), pages 249-273, December.
- Jacobson, Sheldon H. & Kobza, John E. & Nakayama, Marvin K., 2000. "A sampling procedure to estimate risk probabilities in access-control security systems," European Journal of Operational Research, Elsevier, vol. 122(1), pages 123-132, April.
- P. Daniel Wright & Matthew J. Liberatore & Robert L. Nydick, 2006. "A Survey of Operations Research Models and Applications in Homeland Security," Interfaces, INFORMS, vol. 36(6), pages 514-529, December.
- Stuart Weele & Jose Ramirez-Marquez, 2011. "Optimization of container inspection strategy via a genetic algorithm," Annals of Operations Research, Springer, vol. 187(1), pages 229-247, July.
- Justin Yates & Sujeevraja Sanjeevi, 2012. "Assessing the impact of vulnerability modeling in the protection of critical infrastructure," Journal of Geographical Systems, Springer, vol. 14(4), pages 415-435, October.
- Salter, Mark B., 2007. "SeMS and sensibility: Security management systems and the management of risk in the Canadian Air Transport Security Authority," Journal of Air Transport Management, Elsevier, vol. 13(6), pages 389-398.
- Svetlana N Yanushkevich & Shawn C Eastwood & Martin Drahansky & Vlad P Shmerko, 2018. "Understanding and taxonomy of uncertainty in modeling, simulation, and risk profiling for border control automation," The Journal of Defense Modeling and Simulation, , vol. 15(1), pages 95-109, January.
- Blanquero, Rafael & Carrizosa, Emilio & G.-Tóth, Boglárka, 2016. "Maximal Covering Location Problems on networks with regional demand," Omega, Elsevier, vol. 64(C), pages 77-85.
- Lai, Po‐Lin & Potter, Andrew & Beynon, Malcolm & Beresford, Anthony, 2015. "Evaluating the efficiency performance of airports using an integrated AHP/DEA-AR technique," Transport Policy, Elsevier, vol. 42(C), pages 75-85.
- Leone, Kelly & Liu, Rongfang (Rachel), 2011. "Improving airport security screening checkpoint operations in the US via paced system design," Journal of Air Transport Management, Elsevier, vol. 17(2), pages 62-67.
- Li, Yongli & Gao, Xin & Xu, Zhiwei & Zhou, Xuanrui, 2018. "Network-based queuing model for simulating passenger throughput at an airport security checkpoint," Journal of Air Transport Management, Elsevier, vol. 66(C), pages 13-24.
- Nicole Adler & Alfred Hakkert & Jonathan Kornbluth & Tal Raviv & Mali Sher, 2014. "Location-allocation models for traffic police patrol vehicles on an interurban network," Annals of Operations Research, Springer, vol. 221(1), pages 9-31, October.
- de Lange, Robert & Samoilovich, Ilya & van der Rhee, Bo, 2013. "Virtual queuing at airport security lanes," European Journal of Operational Research, Elsevier, vol. 225(1), pages 153-165.
- Rodríguez-Espíndola, Oscar & Ahmadi, Hossein & Gastélum-Chavira, Diego & Ahumada-Valenzuela, Omar & Chowdhury, Soumyadeb & Dey, Prasanta Kumar & Albores, Pavel, 2023. "Humanitarian logistics optimization models: An investigation of decision-maker involvement and directions to promote implementation," Socio-Economic Planning Sciences, Elsevier, vol. 89(C).
- Ismail Cenk Demirkol & Mahesh K. Nalla, 2017. "Sustaining police officers’ motivation in aviation security," Journal of Transportation Security, Springer, vol. 10(3), pages 171-187, December.
More about this item
Keywords
Research and Development/Tech Change/Emerging Technologies; Research Methods/ Statistical Methods; Resource /Energy Economics and Policy;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ags:ndtr10:207254. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: AgEcon Search (email available below). General contact details of provider: http://www.trforum.org/journal/ .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.