IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v40y2020i5p1001-1019.html
   My bibliography  Save this article

Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports

Author

Listed:
  • Gabriel Kuper
  • Fabio Massacci
  • Woohyun Shim
  • Julian Williams

Abstract

We study interdependent risks in security, and shed light on the economic and policy implications of increasing security interdependence in presence of reactive attackers. We investigate the impact of potential public policy arrangements on the security of a group of interdependent organizations, namely, airports. Focusing on security expenditures and costs to society, as assessed by a social planner, to individual airports and to attackers, we first develop a game‐theoretic framework, and derive explicit Nash equilibrium and socially optimal solutions in the airports network. We then conduct numerical experiments mirroring real‐world cyber scenarios, to assess how a change in interdependence impact the airports' security expenditures, the overall expected costs to society, and the fairness of security financing. Our study provides insights on the economic and policy implications for the United States, Europe, and Asia.

Suggested Citation

  • Gabriel Kuper & Fabio Massacci & Woohyun Shim & Julian Williams, 2020. "Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1001-1019, May.
  • Handle: RePEc:wly:riskan:v:40:y:2020:i:5:p:1001-1019
    DOI: 10.1111/risa.13454
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/risa.13454
    Download Restriction: no

    File URL: https://libkey.io/10.1111/risa.13454?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Gerald G. Brown & Louis Anthony (Tony) Cox, Jr., 2011. "How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts," Risk Analysis, John Wiley & Sons, vol. 31(2), pages 196-204, February.
    2. Ríos Insua, David & Cano, Javier & Pellot, Michael & Ortega, Ricardo, 2016. "Multithreat multisite protection: A security case study," European Journal of Operational Research, Elsevier, vol. 252(3), pages 888-899.
    3. Theresa Brown & Walt Beyeler & Dianne Barton, 2004. "Assessing infrastructure interdependencies: the challenge of risk analysis for complex adaptive systems," International Journal of Critical Infrastructures, Inderscience Enterprises Ltd, vol. 1(1), pages 108-117.
    4. Geoffrey Heal & Howard Kunreuther, 2003. "You Only Die Once: Managing Discrete Interdependent Risks," NBER Working Papers 9885, National Bureau of Economic Research, Inc.
    5. Zhang, Pengcheng & Peeta, Srinivas, 2011. "A generalized modeling framework to analyze interdependencies among infrastructure systems," Transportation Research Part B: Methodological, Elsevier, vol. 45(3), pages 553-579, March.
    6. M.‐Elisabeth Paté‐Cornell & Marshall Kuypers & Matthew Smith & Philip Keller, 2018. "Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 226-241, February.
    7. Zhang, Pengcheng & Peeta, Srinivas, 2014. "Dynamic and disequilibrium analysis of interdependent infrastructure systems," Transportation Research Part B: Methodological, Elsevier, vol. 67(C), pages 357-381.
    8. Kjell Hausken & Fei He, 2016. "On the Effectiveness of Security Countermeasures for Critical Infrastructures," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 711-726, April.
    9. Alexander A. Ganin & Phuoc Quach & Mahesh Panwar & Zachary A. Collier & Jeffrey M. Keisler & Dayton Marchese & Igor Linkov, 2020. "Multicriteria Decision Framework for Cybersecurity Risk Assessment and Management," Risk Analysis, John Wiley & Sons, vol. 40(1), pages 183-199, January.
    10. Pu Jiang & Yacov Y. Haimes, 2004. "Risk Management for Leontief‐Based Interdependent Systems," Risk Analysis, John Wiley & Sons, vol. 24(5), pages 1215-1229, October.
    11. Chopra, Shauhrat S. & Khanna, Vikas, 2015. "Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 436(C), pages 865-877.
    12. Joanna Resurreccion & Joost Santos, 2013. "Uncertainty modeling of hurricane-based disruptions to interdependent economic and infrastructure systems," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 69(3), pages 1497-1518, December.
    13. Michael J. North, 2001. "Multi-Agent Social and Organizational Modeling of Electric Power and Natural Gas Markets," Computational and Mathematical Organization Theory, Springer, vol. 7(4), pages 331-337, December.
    14. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    15. Vicki Bier & Hoa Han & Lorna Zack, 2008. "Models of Interdependent Security along the Milk Supply Chain," American Journal of Agricultural Economics, Agricultural and Applied Economics Association, vol. 90(5), pages 1265-1271.
    16. Abdollah Shafieezadeh & Eun J. Cha & Bruce R. Ellingwood, 2015. "A Decision Framework for Managing Risk to Airports from Terrorist Attack," Risk Analysis, John Wiley & Sons, vol. 35(2), pages 292-306, February.
    17. Kjell Hausken, 2019. "Defence and attack of complex interdependent systems," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 70(3), pages 364-376, March.
    18. Flage, R. & Aven, T., 2015. "Emerging risk – Conceptual definition and a relation to black swan type of events," Reliability Engineering and System Safety, Elsevier, vol. 144(C), pages 61-67.
    19. Geoffrey Heal & Howard Kunreuther, 2007. "Modeling Interdependent Risks," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 621-634, June.
    20. Kunreuther, Howard & Heal, Geoffrey, 2003. "Interdependent Security," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 231-249, March-May.
    21. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    22. Sandler, Todd & Lapan, Harvey E., 1988. "The Calculus of Dissent: An Analysis of Terrorists' Choice of Targets," Staff General Research Papers Archive 10818, Iowa State University, Department of Economics.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Chih-Hung Hsu & An-Yuan Chang & Ting-Yi Zhang & Wei-Da Lin & Wan-Ling Liu, 2021. "Deploying Resilience Enablers to Mitigate Risks in Sustainable Fashion Supply Chains," Sustainability, MDPI, vol. 13(5), pages 1-24, March.
    2. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Li, Qing & Li, Mingchu & Gong, Zhongqiang & Tian, Yuan & Zhang, Runfa, 2022. "Locating and protecting interdependent facilities to hedge against multiple non-cooperative limited choice attackers," Reliability Engineering and System Safety, Elsevier, vol. 223(C).
    2. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    3. Rui Peng & Di Wu & Mengyao Sun & Shaomin Wu, 2021. "An attack-defense game on interdependent networks," Journal of the Operational Research Society, Taylor & Francis Journals, vol. 72(10), pages 2331-2341, October.
    4. Simon, Jay & Omar, Ayman, 2020. "Cybersecurity investments in the supply chain: Coordination and a strategic attacker," European Journal of Operational Research, Elsevier, vol. 282(1), pages 161-171.
    5. Wang, Shuliang & Gu, Xifeng & Luan, Shengyang & Zhao, Mingwei, 2021. "Resilience analysis of interdependent critical infrastructure systems considering deep learning and network theory," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).
    6. Chen, Shun & Zhao, Xudong & Chen, Zhilong & Hou, Benwei & Wu, Yipeng, 2022. "A game-theoretic method to optimize allocation of defensive resource to protect urban water treatment plants against physical attacks," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    7. Ghorbani-Renani, Nafiseh & González, Andrés D. & Barker, Kash & Morshedlou, Nazanin, 2020. "Protection-interdiction-restoration: Tri-level optimization for enhancing interdependent network resilience," Reliability Engineering and System Safety, Elsevier, vol. 199(C).
    8. Bose, Gautam & Konrad, Kai A., 2020. "Devil take the hindmost: Deflecting attacks to other defenders," Reliability Engineering and System Safety, Elsevier, vol. 204(C).
    9. Bandyopadhyay, Subhayu & Sandler, Todd, 2021. "Counterterrorism policy: Spillovers, regime solidity, and corner solutions," Journal of Economic Behavior & Organization, Elsevier, vol. 188(C), pages 811-827.
    10. Seyed Alireza Hasheminasab & Behrouz Tork Ladani, 2018. "Security Investment in Contagious Networks," Risk Analysis, John Wiley & Sons, vol. 38(8), pages 1559-1575, August.
    11. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Politically influenced counterterrorism policy and welfare efficiency," European Journal of Political Economy, Elsevier, vol. 76(C).
    12. Lu, Qing-Chang & Xu, Peng-Cheng & Zhao, Xiangmo & Zhang, Lei & Li, Xiaoling & Cui, Xin, 2022. "Measuring network interdependency between dependent networks: A supply-demand-based approach," Reliability Engineering and System Safety, Elsevier, vol. 225(C).
    13. Zio, Enrico, 2016. "Challenges in the vulnerability and risk analysis of critical infrastructures," Reliability Engineering and System Safety, Elsevier, vol. 152(C), pages 137-150.
    14. Ouyang, Min & Pan, ZheZhe & Hong, Liu & He, Yue, 2015. "Vulnerability analysis of complementary transportation systems with applications to railway and airline systems in China," Reliability Engineering and System Safety, Elsevier, vol. 142(C), pages 248-257.
    15. Bandyopadhyay, Subhayu & Sandler, Todd, 2023. "Voluntary participation in a terror group and counterterrorism policy," Journal of Economic Behavior & Organization, Elsevier, vol. 215(C), pages 500-513.
    16. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    17. J. S. Busby & B. Green & D. Hutchison, 2017. "Analysis of Affordance, Time, and Adaptation in the Assessment of Industrial Control System Cybersecurity Risk," Risk Analysis, John Wiley & Sons, vol. 37(7), pages 1298-1314, July.
    18. Li, Qing & Li, Mingchu & Zhang, Runfa & Gan, Jianyuan, 2021. "A stochastic bilevel model for facility location-protection problem with the most likely interdiction strategy," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    19. Baraldi, Piero & Castellano, Andrea & Shokry, Ahmed & Gentile, Ugo & Serio, Luigi & Zio, Enrico, 2020. "A Feature Selection-based Approach for the Identification of Critical Components in Complex Technical Infrastructures: Application to the CERN Large Hadron Collider," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    20. Wang, Shuliang & Sun, Jingya & Zhang, Jianhua & Dong, Qiqi & Gu, Xifeng & Chen, Chen, 2023. "Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes," International Journal of Critical Infrastructure Protection, Elsevier, vol. 40(C).

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:40:y:2020:i:5:p:1001-1019. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.