IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v37y2017i2p372-395.html
   My bibliography  Save this article

Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training

Author

Listed:
  • Martina de Gramatica
  • Fabio Massacci
  • Woohyun Shim
  • Uğur Turhan
  • Julian Williams

Abstract

We analyze the issue of agency costs in aviation security by combining results from a quantitative economic model with a qualitative study based on semi‐structured interviews. Our model extends previous principal‐agent models by combining the traditional fixed and varying monetary responses to physical and cognitive effort with nonmonetary welfare and potentially transferable value of employees' own human capital. To provide empirical evidence for the tradeoffs identified in the quantitative model, we have undertaken an extensive interview process with regulators, airport managers, security personnel, and those tasked with training security personnel from an airport operating in a relatively high‐risk state, Turkey. Our results indicate that the effectiveness of additional training depends on the mix of “transferable skills” and “emotional” buy‐in of the security agents. Principals need to identify on which side of a critical tipping point their agents are to ensure that additional training, with attached expectations of the burden of work, aligns the incentives of employees with the principals' own objectives.

Suggested Citation

  • Martina de Gramatica & Fabio Massacci & Woohyun Shim & Uğur Turhan & Julian Williams, 2017. "Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 372-395, February.
  • Handle: RePEc:wly:riskan:v:37:y:2017:i:2:p:372-395
    DOI: 10.1111/risa.12607
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/risa.12607
    Download Restriction: no

    File URL: https://libkey.io/10.1111/risa.12607?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Russ Garber & Elisabeth Paté‐Cornell, 2012. "Shortcuts in Complex Engineering Systems: A Principal‐Agent Approach to Risk Management," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 836-854, May.
    2. Gerald G. Brown & Louis Anthony (Tony) Cox, Jr., 2011. "How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts," Risk Analysis, John Wiley & Sons, vol. 31(2), pages 196-204, February.
    3. Gary S. Becker, 1962. "Investment in Human Capital: A Theoretical Analysis," NBER Chapters, in: Investment in Human Beings, pages 9-49, National Bureau of Economic Research, Inc.
    4. Jean Tirole & Roland Bénabou, 2006. "Incentives and Prosocial Behavior," American Economic Review, American Economic Association, vol. 96(5), pages 1652-1678, December.
    5. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    6. David Fitoussi & Vijay Gurbaxani, 2012. "IT Outsourcing Contracts and Performance Measurement," Information Systems Research, INFORMS, vol. 23(1), pages 129-143, March.
    7. Andrea Patacconi, 2009. "Coordination and delay in hierarchies," RAND Journal of Economics, RAND Corporation, vol. 40(1), pages 190-208, March.
    8. Erik Canton, 2005. "Power of Incentives in Public Organizations When Employees Are Intrinsically Motivated," Journal of Institutional and Theoretical Economics (JITE), Mohr Siebeck, Tübingen, vol. 161(4), pages 664-680, December.
    9. Kevin Murdock, 2002. "Intrinsic Motivation and Optimal Incentive Contracts," RAND Journal of Economics, The RAND Corporation, vol. 33(4), pages 650-671, Winter.
    10. Louis Eeckhoudt & Harris Schlesinger, 2006. "Putting Risk in Its Proper Place," American Economic Review, American Economic Association, vol. 96(1), pages 280-289, March.
    11. Nicholas Bloom & John Van Reenen, 2010. "New Approaches to Surveying Organizations," American Economic Review, American Economic Association, vol. 100(2), pages 105-109, May.
    12. Paul Kantor & Endre Boros, 2010. "Deceptive Detection Methods for Effective Security with Inadequate Budgets: The Testing Power Index," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 663-673, April.
    13. Elisabeth Paté‐Cornell & Louis Anthony Cox, 2014. "Improving Risk Management: From Lame Excuses to Principled Practice," Risk Analysis, John Wiley & Sons, vol. 34(7), pages 1228-1239, July.
    14. Holmstrom, Bengt & Milgrom, Paul, 1987. "Aggregation and Linearity in the Provision of Intertemporal Incentives," Econometrica, Econometric Society, vol. 55(2), pages 303-328, March.
    15. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    16. Nitin Bakshi & Noah Gans, 2010. "Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment," Management Science, INFORMS, vol. 56(2), pages 219-233, February.
    17. Michael H. Belzer & Peter F. Swan, 2011. "Supply Chain Security: Agency Theory and Port Drayage Drivers," The Economic and Labour Relations Review, , vol. 22(1), pages 41-63, May.
    18. Mattias J. Viklund, 2003. "Trust and Risk Perception in Western Europe: A Cross‐National Study," Risk Analysis, John Wiley & Sons, vol. 23(4), pages 727-738, August.
    19. Kjell Hausken, 2002. "Probabilistic Risk Analysis and Game Theory," Risk Analysis, John Wiley & Sons, vol. 22(1), pages 17-27, February.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
    2. Donze, Jocelyn & Gunnes, Trude, 2018. "Becoming “We” instead of “I”, identity management and incentives in the workplace," Journal of Economic Behavior & Organization, Elsevier, vol. 148(C), pages 105-120.
    3. Lamantia, Fabio & Pezzino, Mario, 2016. "Evolutionary efficacy of a Pay for Performance scheme with motivated agents," Journal of Economic Behavior & Organization, Elsevier, vol. 125(C), pages 107-119.
    4. Beckmann, Michael & Cornelissen, Thomas & Kräkel, Matthias, 2017. "Self-managed working time and employee effort: Theory and evidence," Journal of Economic Behavior & Organization, Elsevier, vol. 133(C), pages 285-302.
    5. Antonio Sánchez Soliño, 2019. "Sustainability of Public Services: Is Outsourcing the Answer?," Sustainability, MDPI, vol. 11(24), pages 1-12, December.
    6. Inés Macho-Stadler & David Pérez-Castrillo, 2018. "Moral hazard: Base models and two extensions," Chapters, in: Luis C. Corchón & Marco A. Marini (ed.), Handbook of Game Theory and Industrial Organization, Volume I, chapter 16, pages 453-485, Edward Elgar Publishing.
    7. Grund, Christian, 2011. "Job Preferences as Revealed by Employee Initiated Job Changes," IZA Discussion Papers 6127, Institute of Labor Economics (IZA).
    8. Ramalingam, Abhijit, 2009. ""Endogenous" Relative Concerns: The Impact of Workers' Characteristics on Status and Pro ts in the Firm," MPRA Paper 18759, University Library of Munich, Germany.
    9. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    10. Brookman, Jeffrey T. & Thistle, Paul D., 2013. "Managerial compensation: Luck, skill or labor markets?," Journal of Corporate Finance, Elsevier, vol. 21(C), pages 252-268.
    11. Mohammad E. Nikoofal & Mehmet Gümüs, 2015. "On the value of terrorist’s private information in a government’s defensive resource allocation problem," IISE Transactions, Taylor & Francis Journals, vol. 47(6), pages 533-555, June.
    12. Jason J Sandvik & Richard E Saouma & Nathan T Seegert & Christopher T Stanton, 2020. "Workplace Knowledge Flows," The Quarterly Journal of Economics, President and Fellows of Harvard College, vol. 135(3), pages 1635-1680.
    13. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    14. Levitin, Gregory & Hausken, Kjell, 2008. "Protection vs. redundancy in homogeneous parallel systems," Reliability Engineering and System Safety, Elsevier, vol. 93(10), pages 1444-1451.
    15. repec:eee:labchp:v:3:y:1999:i:pb:p:2373-2437 is not listed on IDEAS
    16. Sang-Hyun Kim & Brian Tomlin, 2013. "Guilt by Association: Strategic Failure Prevention and Recovery Capacity Investments," Management Science, INFORMS, vol. 59(7), pages 1631-1649, July.
    17. Kyota Eguchi, 2017. "Guilty Conscience And Incentives With Performance Assessment Errors," Economic Inquiry, Western Economic Association International, vol. 55(1), pages 434-450, January.
    18. Dongryul Lee & Byung Kim, 2013. "Motivations for Open Source Project Participation and Decisions of Software Developers," Computational Economics, Springer;Society for Computational Economics, vol. 41(1), pages 31-57, January.
    19. Galina Besstremyannaya & Sergei Golovan, 2019. "Physician’s altruism in incentive contracts: Medicare’s quality race," CINCH Working Paper Series 1903, Universitaet Duisburg-Essen, Competent in Competition and Health.
    20. Edmans, Alex & Gosling, Tom & Jenter, Dirk, 2023. "CEO compensation: Evidence from the field," Journal of Financial Economics, Elsevier, vol. 150(3).
    21. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:37:y:2017:i:2:p:372-395. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.