IDEAS home Printed from https://ideas.repec.org/a/spr/annopr/v187y2011i1p137-15810.1007-s10479-009-0665-6.html
   My bibliography  Save this article

Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks

Author

Listed:
  • Vicki Bier
  • Naraphorn Haphuriwat

Abstract

In this paper, we investigate how many containers would need to be screened in order to deter attackers from attempting to smuggle weapons into a defending country in container freight. We hypothesize that with a sufficiently high probability of being detected, attackers might be deterred from smuggling attempts. Thus, our goal is to identify the optimal proportion of containers to inspect in order to minimize the defender’s expected loss, using game theory to reflect the fact that attackers are simultaneously trying to maximize their expected rewards. Moreover, our model recognizes that the container-screening policy must simultaneously protect against different types of threats (such as nuclear bombs, dirty bombs, and assault rifles). Finally, our model also suggests that threatening to retaliate against attacks may be beneficial to defenders, as long as the threat is credible. Copyright Springer Science+Business Media, LLC 2011

Suggested Citation

  • Vicki Bier & Naraphorn Haphuriwat, 2011. "Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks," Annals of Operations Research, Springer, vol. 187(1), pages 137-158, July.
  • Handle: RePEc:spr:annopr:v:187:y:2011:i:1:p:137-158:10.1007/s10479-009-0665-6
    DOI: 10.1007/s10479-009-0665-6
    as

    Download full text from publisher

    File URL: http://hdl.handle.net/10.1007/s10479-009-0665-6
    Download Restriction: Access to full text is restricted to subscribers.

    File URL: https://libkey.io/10.1007/s10479-009-0665-6?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. D. Marc Kilgour & Steven J. Brams, 1992. "Putting the Other Side “On Notice†Can Induce Compliance in Arms Control," Journal of Conflict Resolution, Peace Science Society (International), vol. 36(3), pages 395-414, September.
    2. R. Harrison Wagner, 1982. "Deterrence and Bargaining," Journal of Conflict Resolution, Peace Science Society (International), vol. 26(2), pages 329-358, June.
    3. Vicki M. Bier & Naraphorn Haphuriwat & Jaime Menoyo & Rae Zimmerman & Alison M. Culpen, 2008. "Optimal Resource Allocation for Defense of Targets Based on Differing Measures of Attractiveness," Risk Analysis, John Wiley & Sons, vol. 28(3), pages 763-770, June.
    4. Avenhaus, Rudolf & Canty, Morton & Marc Kilgour, D. & von Stengel, Bernhard & Zamir, Shmuel, 1996. "Inspection games in arms control," European Journal of Operational Research, Elsevier, vol. 90(3), pages 383-394, May.
    5. Joseph G. Haubrich, 1995. "Vagueness, credibility, and government policy," Economic Review, Federal Reserve Bank of Cleveland, issue Q I, pages 13-19.
    6. Rudolf Avenhaus & D. Marc Kilgour, 2004. "Efficient distributions of arms‐control inspection effort," Naval Research Logistics (NRL), John Wiley & Sons, vol. 51(1), pages 1-27, February.
    7. Todd Sandler, 2003. "Collective Action and Transnational Terrorism," The World Economy, Wiley Blackwell, vol. 26(6), pages 779-802, June.
    8. Peter Gordon & James E. Moore II & Harry W. Richardson & Qisheng Pan, 2005. "The Economic Impact of a Terrorist Attack on the Twin Ports of Los Angeles–Long Beach," Chapters, in: Harry W. Richardson & Peter Gordon & James E. Moore II (ed.), The Economic Impacts of Terrorist Attacks, chapter 14, Edward Elgar Publishing.
    9. Lawrence M. Wein & Alex H. Wilkins & Manas Baveja & Stephen E. Flynn, 2006. "Preventing the Importation of Illicit Nuclear Materials in Shipping Containers," Risk Analysis, John Wiley & Sons, vol. 26(5), pages 1377-1393, October.
    10. Moffitt L. Joe & Stranlund John K. & Field Barry C., 2005. "Inspections to Avert Terrorism: Robustness Under Severe Uncertainty," Journal of Homeland Security and Emergency Management, De Gruyter, vol. 2(3), pages 1-19, September.
    11. Avenhaus, Rudolf & Canty, Morton John, 2005. "Playing for time: A sequential inspection game," European Journal of Operational Research, Elsevier, vol. 167(2), pages 475-492, December.
    12. Marek Thee, 1977. "Arms Control: The Retreat From Disarmament The Record to Date and the Search for Alternatives," Journal of Peace Research, Peace Research Institute Oslo, vol. 14(2), pages 95-114, June.
    13. Kilgour, D.M. & Brams, S.J., 1992. "Putting the Other Side "On Notice" Can Induce Compliance in Arms Control," Working Papers 92-07, C.V. Starr Center for Applied Economics, New York University.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    2. Yael Deutsch & Boaz Golany, 2016. "Multiple agents finitely repeated inspection game with dismissals," Annals of Operations Research, Springer, vol. 237(1), pages 7-26, February.
    3. Agarwal, Puneet & Aziz, Ridwan Al & Zhuang, Jun, 2022. "Interplay of rumor propagation and clarification on social media during crisis events - A game-theoretic approach," European Journal of Operational Research, Elsevier, vol. 298(2), pages 714-733.
    4. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    5. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.
    6. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    7. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    8. Jie Xu & Jun Zhuang & Zigeng Liu, 2016. "Modeling and mitigating the effects of supply chain disruption in a defender–attacker game," Annals of Operations Research, Springer, vol. 236(1), pages 255-270, January.
    9. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    10. Jie Xu & Jun Zhuang, 2016. "Modeling costly learning and counter-learning in a defender-attacker game with private defender information," Annals of Operations Research, Springer, vol. 236(1), pages 271-289, January.
    11. Hoogstrate, André J. & Klaassen, Chris A.J., 2015. "Information weighted sampling for detecting rare items in finite populations with a focus on security," European Journal of Operational Research, Elsevier, vol. 241(3), pages 880-887.
    12. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
    13. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    14. Yael Deutsch & Boaz Golany, 2016. "Multiple agents finitely repeated inspection game with dismissals," Annals of Operations Research, Springer, vol. 237(1), pages 7-26, February.
    15. Kjell Hausken, 2014. "Individual versus overarching protection and attack of assets," Central European Journal of Operations Research, Springer;Slovak Society for Operations Research;Hungarian Operational Research Society;Czech Society for Operations Research;Österr. Gesellschaft für Operations Research (ÖGOR);Slovenian Society Informatika - Section for Operational Research;Croatian Operational Research Society, vol. 22(1), pages 89-112, March.
    16. Kosanoglu, Fuat & Bier, Vicki M., 2020. "Target-oriented utility for interdiction of transportation networks," Reliability Engineering and System Safety, Elsevier, vol. 197(C).
    17. Huseyin Cavusoglu & Young Kwark & Bin Mai & Srinivasan Raghunathan, 2013. "Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers," Decision Analysis, INFORMS, vol. 10(1), pages 63-81, March.
    18. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    19. Musegaas, Marieke & Schlicher, Loe & Blok, Herman, 2022. "Stackelberg production-protection games: Defending crop production against intentional attacks," European Journal of Operational Research, Elsevier, vol. 297(1), pages 102-119.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Naraphorn Haphuriwat & Vicki M. Bier & Henry H. Willis, 2011. "Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation," Decision Analysis, INFORMS, vol. 8(2), pages 88-102, June.
    2. Puneet Agarwal & Kyle Hunt & Shivasubramanian Srinivasan & Jun Zhuang, 2020. "Fire Code Inspection and Compliance: A Game-Theoretic Model Between Fire Inspection Agencies and Building Owners," Decision Analysis, INFORMS, vol. 17(3), pages 208-226, September.
    3. Deutsch, Yael & Golany, Boaz & Rothblum, Uriel G., 2011. "Determining all Nash equilibria in a (bi-linear) inspection game," European Journal of Operational Research, Elsevier, vol. 215(2), pages 422-430, December.
    4. Vassili Kolokoltsov, 2017. "The Evolutionary Game of Pressure (or Interference), Resistance and Collaboration," Mathematics of Operations Research, INFORMS, vol. 42(4), pages 915-944, November.
    5. Nourinejad, Mehdi & Gandomi, Amir & Roorda, Matthew J., 2020. "Illegal parking and optimal enforcement policies with search friction," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 141(C).
    6. Niyazi Bakır, 2011. "A Stackelberg game model for resource allocation in cargo container security," Annals of Operations Research, Springer, vol. 187(1), pages 5-22, July.
    7. Avenhaus, Rudolf & Canty, Morton & Marc Kilgour, D. & von Stengel, Bernhard & Zamir, Shmuel, 1996. "Inspection games in arms control," European Journal of Operational Research, Elsevier, vol. 90(3), pages 383-394, May.
    8. Hohzaki, Ryusuke & Maehara, Hiroki, 2010. "A single-shot game of multi-period inspection," European Journal of Operational Research, Elsevier, vol. 207(3), pages 1410-1418, December.
    9. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    10. Rudolf Avenhaus & D. Marc Kilgour, 2004. "Efficient distributions of arms‐control inspection effort," Naval Research Logistics (NRL), John Wiley & Sons, vol. 51(1), pages 1-27, February.
    11. Laura McLay & Jamie Lloyd & Emily Niman, 2011. "Interdicting nuclear material on cargo containers using knapsack problem models," Annals of Operations Research, Springer, vol. 187(1), pages 185-205, July.
    12. Fandel, G. & Trockel, J., 2013. "Avoiding non-optimal management decisions by applying a three-person inspection game," European Journal of Operational Research, Elsevier, vol. 226(1), pages 85-93.
    13. Kjell Hausken, 2019. "Special versus general protection and attack of two assets," Operations Research and Decisions, Wroclaw University of Science and Technology, Faculty of Management, vol. 29(4), pages 53-93.
    14. Zoroa, N. & Fernández-Sáez, M.J. & Zoroa, P., 2011. "A foraging problem: Sit-and-wait versus active predation," European Journal of Operational Research, Elsevier, vol. 208(2), pages 131-141, January.
    15. Deutsch, Yael, 2021. "A polynomial-time method to compute all Nash equilibria solutions of a general two-person inspection game," European Journal of Operational Research, Elsevier, vol. 288(3), pages 1036-1052.
    16. Gary Gaukler & Chenhua Li & Rory Cannaday & Sunil Chirayath & Yu Ding, 2011. "Detecting nuclear materials smuggling: using radiography to improve container inspection policies," Annals of Operations Research, Springer, vol. 187(1), pages 65-87, July.
    17. Jacques Fontanel, 2019. "Sécurité économique, insécurité mondiale," Post-Print hal-02522556, HAL.
    18. Vicki Bier & Santiago Oliveros & Larry Samuelson, 2007. "Choosing What to Protect: Strategic Defensive Allocation against an Unknown Attacker," Journal of Public Economic Theory, Association for Public Economic Theory, vol. 9(4), pages 563-587, August.
    19. Jacques Fontanel, 2014. "Armements, Conflits et guerres du début du XXIe siècle," Post-Print hal-03344256, HAL.
    20. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:annopr:v:187:y:2011:i:1:p:137-158:10.1007/s10479-009-0665-6. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.