IDEAS home Printed from https://ideas.repec.org/a/eee/reensy/v165y2017icp292-301.html
   My bibliography  Save this article

N-stage security screening strategies in the face of strategic applicants

Author

Listed:
  • Song, Cen
  • Zhuang, Jun

Abstract

From one perspective, tighter security screening has the benefit of deterring adversary passengers and enhancing safety. However, this approach can also produce congestion problems for normal passengers. Adapting to screening policies, both adversary and normal passengers decide their application strategies to the security system to maximize their payoffs, which in turn affects the security agent's payoff. This paper integrates game theory and queueing theory to analyze an N-stage imperfect screening model that considers reject or pass decisions, in which applicants have the chance to be passed or rejected at each stage of the system. An imperfect three-stage screening model is numerically illustrated. Furthermore, the application probabilities, screening probabilities and approver's payoff as functions of the number of screening stages are analyzed. This paper provides some novel insights on screening policies and the optimal number of screening stages which would help security screening policy makers.

Suggested Citation

  • Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
  • Handle: RePEc:eee:reensy:v:165:y:2017:i:c:p:292-301
    DOI: 10.1016/j.ress.2017.04.019
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0951832016304173
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ress.2017.04.019?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Hausken, Kjell, 2008. "Strategic defense and attack for series and parallel reliability systems," European Journal of Operational Research, Elsevier, vol. 186(2), pages 856-881, April.
    2. Golany, Boaz & Kaplan, Edward H. & Marmur, Abraham & Rothblum, Uriel G., 2009. "Nature plays with dice - terrorists do not: Allocating resources to counter strategic versus probabilistic risks," European Journal of Operational Research, Elsevier, vol. 192(1), pages 198-208, January.
    3. Gary Gaukler & Chenhua Li & Rory Cannaday & Sunil Chirayath & Yu Ding, 2011. "Detecting nuclear materials smuggling: using radiography to improve container inspection policies," Annals of Operations Research, Springer, vol. 187(1), pages 65-87, July.
    4. Lazar Babu, Vellara L. & Batta, Rajan & Lin, Li, 2006. "Passenger grouping under constant threat probability in an airport security system," European Journal of Operational Research, Elsevier, vol. 168(2), pages 633-644, January.
    5. Zhuang, Jun & Bier, Vicki M. & Alagoz, Oguzhan, 2010. "Modeling secrecy and deception in a multiple-period attacker-defender signaling game," European Journal of Operational Research, Elsevier, vol. 203(2), pages 409-418, June.
    6. Lin, Lei & Wang, Qian & Sadek, Adel W., 2014. "Border crossing delay prediction using transient multi-server queueing models," Transportation Research Part A: Policy and Practice, Elsevier, vol. 64(C), pages 65-91.
    7. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    8. Atin Basuchoudhary & Laura Razzolini, 2006. "Hiding in plain sight – using signals to detect terrorists," Public Choice, Springer, vol. 128(1), pages 245-255, July.
    9. Huseyin Cavusoglu & Young Kwark & Bin Mai & Srinivasan Raghunathan, 2013. "Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers," Decision Analysis, INFORMS, vol. 10(1), pages 63-81, March.
    10. Nitin Bakshi & Noah Gans, 2010. "Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment," Management Science, INFORMS, vol. 56(2), pages 219-233, February.
    11. Gkritza, Konstantina & Niemeier, Debbie & Mannering, Fred, 2006. "Airport security screening and changing passenger satisfaction: An exploratory assessment," Journal of Air Transport Management, Elsevier, vol. 12(5), pages 213-219.
    12. Guikema, Seth D., 2007. "Formulating informative, data-based priors for failure probability estimation in reliability analysis," Reliability Engineering and System Safety, Elsevier, vol. 92(4), pages 490-502.
    13. Hausken, Kjell & Bier, Vicki M., 2011. "Defending against multiple different attackers," European Journal of Operational Research, Elsevier, vol. 211(2), pages 370-384, June.
    14. Tsai, Hsin-Nan & Sheu, Shey-Huei & Zhang, Zhe George, 2017. "A trivariate optimal replacement policy for a deteriorating system based on cumulative damage and inspections," Reliability Engineering and System Safety, Elsevier, vol. 160(C), pages 122-135.
    15. Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
    16. Zhe George Zhang, 2009. "Performance Analysis of a Queue with Congestion-Based Staffing Policy," Management Science, INFORMS, vol. 55(2), pages 240-251, February.
    17. Bier, Vicki M. & Kosanoglu, Fuat, 2015. "Target-oriented utility theory for modeling the deterrent effects of counterterrorism," Reliability Engineering and System Safety, Elsevier, vol. 136(C), pages 35-46.
    18. Lins, Isis Didier & Rêgo, Leandro Chaves & Moura, Márcio das Chagas & Droguett, Enrique López, 2013. "Selection of security system design via games of imperfect information and multi-objective genetic algorithm," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 59-66.
    19. Hausken, Kjell, 2008. "Strategic defense and attack for reliability systems," Reliability Engineering and System Safety, Elsevier, vol. 93(11), pages 1740-1750.
    20. Zhe George Zhang & Hsing Paul Luh & Chia-Hung Wang, 2011. "Modeling Security-Check Queues," Management Science, INFORMS, vol. 57(11), pages 1979-1995, November.
    21. Balachandran, K. R. & Schaefer, Mark E., 1980. "Public and private optimization at a service facility with approximate information on congestion," European Journal of Operational Research, Elsevier, vol. 4(3), pages 195-202, March.
    22. Hausken, Kjell, 2010. "Defense and attack of complex and dependent systems," Reliability Engineering and System Safety, Elsevier, vol. 95(1), pages 29-42.
    23. Alexander G. Nikolaev & Sheldon H. Jacobson & Laura A. McLay, 2007. "A Sequential Stochastic Security System Design Problem for Aviation Security," Transportation Science, INFORMS, vol. 41(2), pages 182-194, May.
    24. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    25. Tsai, Hsin-Nan & Sheu, Shey-Huei & Zhang, Zhe George, 2017. "A trivariate optimal replacement policy for a deteriorating system based on cumulative damage and inspections," Reliability Engineering and System Safety, Elsevier, vol. 160(C), pages 74-88.
    26. Jason R. W. Merrick & Laura A. McLay, 2010. "Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?," Decision Analysis, INFORMS, vol. 7(2), pages 155-171, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Carr, Amelia & Biswas, Tania & Wheeler, Jane V., 2020. "Airport operations and security screening: An examination of social justice," Journal of Air Transport Management, Elsevier, vol. 85(C).
    2. Zhang, Jing & Wang, Yan & Zhuang, Jun, 2021. "Modeling multi-target defender-attacker games with quantal response attack strategies," Reliability Engineering and System Safety, Elsevier, vol. 205(C).
    3. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    4. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    5. Liu, Zhongyi & Liu, Jingchen & Zhai, Xin & Wang, Guanying, 2019. "Police staffing and workload assignment in law enforcement using multi-server queueing models," European Journal of Operational Research, Elsevier, vol. 276(2), pages 614-625.
    6. Yael Deutsch & Boaz Golany, 2019. "Securing Gates of a Protected Area: A Hybrid Game and Queueing Theory Modeling Approach," Decision Analysis, INFORMS, vol. 16(1), pages 31-45, March.
    7. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    2. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    3. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    4. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    5. Mo, Huadong & Xie, Min & Levitin, Gregory, 2015. "Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks," European Journal of Operational Research, Elsevier, vol. 243(1), pages 200-210.
    6. Shan, Xiaojun & Zhuang, Jun, 2013. "Hybrid defensive resource allocations in the face of partially strategic attackers in a sequential defender–attacker game," European Journal of Operational Research, Elsevier, vol. 228(1), pages 262-272.
    7. Gallice, Andrea, 2017. "An approximate solution to rent-seeking contests with private information," European Journal of Operational Research, Elsevier, vol. 256(2), pages 673-684.
    8. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    9. Shan, Xiaojun & Zhuang, Jun, 2018. "Modeling cumulative defensive resource allocation against a strategic attacker in a multi-period multi-target sequential game," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 12-26.
    10. Ye, Zhi-Sheng & Peng, Rui & Wang, Wenbin, 2017. "Defense and attack of performance-sharing common bus systemsAuthor-Name: Zhai, Qingqing," European Journal of Operational Research, Elsevier, vol. 256(3), pages 962-975.
    11. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    12. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    13. Wenzel, Lars & Wolf, André, 2013. "Protection against major catastrophes: An economic perspective," HWWI Research Papers 137, Hamburg Institute of International Economics (HWWI).
    14. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    15. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    16. Dan Kovenock & Brian Roberson, 2012. "Strategic Defense And Attack For Series And Parallel Reliability Systems: Comment," Defence and Peace Economics, Taylor & Francis Journals, vol. 23(5), pages 507-515, October.
    17. Hausken, Kjell, 2017. "Defense and attack for interdependent systems," European Journal of Operational Research, Elsevier, vol. 256(2), pages 582-591.
    18. Hausken, Kjell & Zhuang, Jun, 2013. "The impact of disaster on the strategic interaction between company and government," European Journal of Operational Research, Elsevier, vol. 225(2), pages 363-376.
    19. Zhang, Chi & Ramirez-Marquez, José Emmanuel & Wang, Jianhui, 2015. "Critical infrastructure protection using secrecy – A discrete simultaneous game," European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221.
    20. Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:reensy:v:165:y:2017:i:c:p:292-301. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/reliability-engineering-and-system-safety .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.