IDEAS home Printed from https://ideas.repec.org/a/inm/ordeca/v10y2013i1p63-81.html
   My bibliography  Save this article

Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers

Author

Listed:
  • Huseyin Cavusoglu

    (Jindal School of Management, University of Texas at Dallas, Richardson, Texas 75080)

  • Young Kwark

    (Jindal School of Management, University of Texas at Dallas, Richardson, Texas 75080)

  • Bin Mai

    (College of Business, Bowie State University, Bowie, Maryland 20715)

  • Srinivasan Raghunathan

    (Jindal School of Management, University of Texas at Dallas, Richardson, Texas 75080)

Abstract

Passenger profiling enables the Transportation Security Administration to target costly inspection effort toward passengers that have an incentive to attack. On the other hand, critics point out that attackers may game the profiler by manipulating their attributes and behavior, making the profiler ineffective. We examine how passenger profiling impacts airport security operations when the profiler is vulnerable to gaming by attackers. We consider the no-profiling setup and two profiling setups. In the no-profiling setup, all passengers are sent through a screening device, and those that raise an alarm are physically inspected. In the first profiling setup, all classified attackers are physically inspected and classified normal passengers are sent through a screening device, and those that raise an alarm are physically inspected. In the second profiling setup, every passenger, regardless of the profiler's classification, is sent through a screening device and those that raise an alarm are inspected, but the screening devices are configured differently for classified attackers and classified normal passengers. We find that, regardless of the profiling setup, the optimal profiling setup performs at least as good as the no-profiling setup on key performance measures such as total expected security cost, inspection rate of normal passengers, and attacker detection rate even when the profiler is vulnerable to attackers' gaming. The benefit from profiling increases if the profiler becomes less vulnerable. Although neither profiling setup dominates the other on these performance measures, we find that each setup has different desirable properties.

Suggested Citation

  • Huseyin Cavusoglu & Young Kwark & Bin Mai & Srinivasan Raghunathan, 2013. "Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers," Decision Analysis, INFORMS, vol. 10(1), pages 63-81, March.
  • Handle: RePEc:inm:ordeca:v:10:y:2013:i:1:p:63-81
    DOI: 10.1287/deca.1120.0258
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/deca.1120.0258
    Download Restriction: no

    File URL: https://libkey.io/10.1287/deca.1120.0258?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Huseyin Cavusoglu & Byungwan Koh & Srinivasan Raghunathan, 2010. "An Analysis of the Impact of Passenger Profiling for Transportation Security," Operations Research, INFORMS, vol. 58(5), pages 1287-1302, October.
    2. Gary S. Becker, 1974. "Crime and Punishment: An Economic Approach," NBER Chapters, in: Essays in the Economics of Crime and Punishment, pages 1-54, National Bureau of Economic Research, Inc.
    3. Ravich, Timothy M., 2005. "Airline Passenger Profiling Systems After 9/11: Personal Privacy Versus National Security," 46th Annual Transportation Research Forum, Washington, D.C., March 6-8, 2005 208191, Transportation Research Forum.
    4. Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
    5. Laura A. McLay & Adrian J. Lee & Sheldon H. Jacobson, 2010. "Risk-Based Policies for Airport Security Checkpoint Screening," Transportation Science, INFORMS, vol. 44(3), pages 333-349, August.
    6. Ravich, Timothy M., 2005. "Industry Issue Paper: Airline Passenger Profiling Systems after 9/11: Personal Privacy versus National Security," Journal of the Transportation Research Forum, Transportation Research Forum, vol. 44(2).
    7. Gustav Feichtinger, 1983. "A Differential Games Solution to a Model of Competition Between a Thief and the Police," Management Science, INFORMS, vol. 29(6), pages 686-699, June.
    8. Charles F. Manski, 2006. "Profiling: Introduction to the Feature," Economic Journal, Royal Economic Society, vol. 116(515), pages 347-350, November.
    9. George J. Stigler, 1974. "The Optimum Enforcement of Laws," NBER Chapters, in: Essays in the Economics of Crime and Punishment, pages 55-67, National Bureau of Economic Research, Inc.
    10. Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
    11. Shavell, Steven, 1991. "Specific versus General Enforcement of Law," Journal of Political Economy, University of Chicago Press, vol. 99(5), pages 1088-1108, October.
    12. Arnold Barnett & Mary K. Higgins, 1989. "Airline Safety: The Last Decade," Management Science, INFORMS, vol. 35(1), pages 1-21, January.
    13. Vicki Bier & Naraphorn Haphuriwat, 2011. "Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks," Annals of Operations Research, Springer, vol. 187(1), pages 137-158, July.
    14. Alexander G. Nikolaev & Sheldon H. Jacobson & Laura A. McLay, 2007. "A Sequential Stochastic Security System Design Problem for Aviation Security," Transportation Science, INFORMS, vol. 41(2), pages 182-194, May.
    15. Jacob W. Ulvila & John E. Gaffney, 2004. "A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems," Decision Analysis, INFORMS, vol. 1(1), pages 35-50, March.
    16. Huseyin Cavusoglu & Srinivasan Raghunathan, 2004. "Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches," Decision Analysis, INFORMS, vol. 1(3), pages 131-148, September.
    17. Julie L. Virta & Sheldon H. Jacobson & John E. Kobza, 2003. "Analyzing the Cost of Screening Selectee and Non‐Selectee Baggage," Risk Analysis, John Wiley & Sons, vol. 23(5), pages 897-908, October.
    18. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
    19. Polinsky, Mitchell & Shavell, Steven, 1979. "The Optimal Tradeoff between the Probability and Magnitude of Fines," American Economic Review, American Economic Association, vol. 69(5), pages 880-891, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    2. Guang Zhu & Hu Liu & Mining Feng, 2018. "Sustainability of Information Security Investment in Online Social Networks: An Evolutionary Game-Theoretic Approach," Mathematics, MDPI, vol. 6(10), pages 1-19, September.
    3. Nie, Xiaofeng, 2019. "The impact of conditional dependence on checked baggage screening," European Journal of Operational Research, Elsevier, vol. 278(3), pages 883-893.
    4. Guang Zhu & Hu Liu & Mining Feng, 2018. "An Evolutionary Game-Theoretic Approach for Assessing Privacy Protection in mHealth Systems," IJERPH, MDPI, vol. 15(10), pages 1-27, October.
    5. Ajay Sudharshan Satish & Akul Mangal & Prathamesh Churi, 2023. "A systematic review of passenger profiling in airport security system: Taking a potential case study of CAPPS II," Journal of Transportation Security, Springer, vol. 16(1), pages 1-41, December.
    6. Yong Wu & Junlin Duan & Tao Dai & Dong Cheng, 2020. "Managing Security Outsourcing in the Presence of Strategic Hackers," Decision Analysis, INFORMS, vol. 17(3), pages 235-259, September.
    7. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    8. Katsikopoulos, Konstantinos V., 2016. "On the role of psychological heuristics in operational research; and a demonstration in military stability operationsAuthor-Name: Keller, Niklas," European Journal of Operational Research, Elsevier, vol. 249(3), pages 1063-1073.
    9. Rakesh K. Sarin & L. Robin Keller, 2013. "From the Editors: Probability Approximations, Anti-Terrorism Strategy, and Bull's-Eye Display for Performance Feedback," Decision Analysis, INFORMS, vol. 10(1), pages 1-5, March.
    10. Rakesh K. Sarin, 2013. "From the Editor ---Median Aggregation, Scoring Rules, Expert Forecasts, Choices with Binary Attributes, Portfolio with Dependent Projects, and Information Security," Decision Analysis, INFORMS, vol. 10(4), pages 277-278, December.
    11. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    12. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    13. Yael Deutsch & Boaz Golany, 2019. "Securing Gates of a Protected Area: A Hybrid Game and Queueing Theory Modeling Approach," Decision Analysis, INFORMS, vol. 16(1), pages 31-45, March.
    14. Yanling Chang & Alan Erera & Chelsea White, 2015. "A leader–follower partially observed, multiobjective Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 103-128, December.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Huseyin Cavusoglu & Byungwan Koh & Srinivasan Raghunathan, 2010. "An Analysis of the Impact of Passenger Profiling for Transportation Security," Operations Research, INFORMS, vol. 58(5), pages 1287-1302, October.
    2. Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
    3. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    4. Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
    5. Kantorowicz-Reznichenko Elena, 2015. "Day-Fines: Should the Rich Pay More?," Review of Law & Economics, De Gruyter, vol. 11(3), pages 481-501, November.
    6. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    7. Polinsky, A. Mitchell & Shavell, Steven, 2007. "The Theory of Public Enforcement of Law," Handbook of Law and Economics, in: A. Mitchell Polinsky & Steven Shavell (ed.), Handbook of Law and Economics, edition 1, volume 1, chapter 6, pages 403-454, Elsevier.
    8. Feess, Eberhard & Wohlschlegel, Ansgar, 2009. "Why higher punishment may reduce deterrence," Economics Letters, Elsevier, vol. 104(2), pages 69-71, August.
    9. Avner Bar-Ilan & Bruce Sacerdote, 2001. "The Response to Fines and Probability of Detection in a Series of Experiments," NBER Working Papers 8638, National Bureau of Economic Research, Inc.
    10. A. Mitchell Polinsky & Steven Shavell, 2009. "Public Enforcement of Law," Chapters, in: Nuno Garoupa (ed.), Criminal Law and Economics, chapter 1, Edward Elgar Publishing.
    11. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    12. Antonio Acconcia & Marcello D'Amato & Riccardo Martina, 2003. "Corruption and Tax Evasion with Competitive Bribes," CSEF Working Papers 112, Centre for Studies in Economics and Finance (CSEF), University of Naples, Italy.
    13. ÇakanyIldIrIm, Metin & Yue, Wei T. & Ryu, Young U., 2009. "The management of intrusion detection: Configuration, inspection, and investment," European Journal of Operational Research, Elsevier, vol. 195(1), pages 186-204, May.
    14. Jan Eeckhout & Nicola Persico & Petra E. Todd, 2010. "A Theory of Optimal Random Crackdowns," American Economic Review, American Economic Association, vol. 100(3), pages 1104-1135, June.
    15. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    16. Giovanni Immordino & Marco Pagano, 2010. "Legal Standards, Enforcement, and Corruption," Journal of the European Economic Association, MIT Press, vol. 8(5), pages 1104-1132, September.
    17. Steven Shavell, 1989. "A Note on Optimal Deterrence When Individuals Choose Among Harmful Acts," NBER Working Papers 3061, National Bureau of Economic Research, Inc.
    18. Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
    19. Isaac Ehrlich, 1996. "Crime, Punishment, and the Market for Offenses," Journal of Economic Perspectives, American Economic Association, vol. 10(1), pages 43-67, Winter.
    20. Marcel Boyer & Tracy R. Lewis & Wei Lin Liu, 2000. "Setting standards for credible compliance and law enforcement," Canadian Journal of Economics, Canadian Economics Association, vol. 33(2), pages 319-340, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:ordeca:v:10:y:2013:i:1:p:63-81. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.