IDEAS home Printed from https://ideas.repec.org/a/eee/soceps/v101y2025ics0038012125001235.html

Vulnerability assessment and decision analysis of airport unlawful interference emergency disposal based on complex network in China: Take regional airports for example

Author

Listed:
  • Wu, Yu
  • He, Shiting

Abstract

Since airports are vulnerable to unlawful interference, it is necessary to conduct a model-based vulnerability analysis to quantify the robustness and failure resilience of airport security systems. Therefore, this work establishes a fusion model that combines attack-defense games with complex networks to systematically analyze the airport emergency disposal network. Firstly, an attack-defense game model is constructed based on emergency disposal process of unlawful interference incidents. Introducing cost-benefit analysis to broaden the game model. Then the complex network of airport unlawful interference emergency disposal is constructed based on the attack-defense relationship. The method proposed in this study is applicable to regional airports. A simulation analysis is conducted using Zhangjiajie Hehua International Airport in China as an example. Through in-depth analyses of the network topology and vulnerability, this study finds that the airport unlawful interference emergency disposal network has small-world network characteristics, which ensures efficient information dissemination and resource allocation during emergency disposal. Airport security plays a key intermediary role in the defense network, and the strategy sets of public police form a tight sub-network. These characteristics enhance the overall emergency disposal capability of the network. The results of the vulnerability assessment show that although the network is able to withstand random attacks, it is highly vulnerable to deliberate attacks. Therefore, it is necessary to enhance the resilience of the emergency disposal network. Optimize the network based on the results of the vulnerability assessment. The results showed that the resilience of the network increased by 10.98 %. It will help airport security to respond more effectively to incidents of unlawful interference, thus contributing to the broader understanding of decision-making under risk and uncertainty in complex socio-economic systems.

Suggested Citation

  • Wu, Yu & He, Shiting, 2025. "Vulnerability assessment and decision analysis of airport unlawful interference emergency disposal based on complex network in China: Take regional airports for example," Socio-Economic Planning Sciences, Elsevier, vol. 101(C).
  • Handle: RePEc:eee:soceps:v:101:y:2025:i:c:s0038012125001235
    DOI: 10.1016/j.seps.2025.102274
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0038012125001235
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.seps.2025.102274?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to

    for a different version of it.

    References listed on IDEAS

    as
    1. Biancardo, Salvatore Antonio & Gesualdi, Michele & Savastano, Davide & Intignano, Mattia & Henke, Ilaria & Pagliara, Francesca, 2023. "An innovative framework for integrating Cost-Benefit Analysis (CBA) within Building Information Modeling (BIM)," Socio-Economic Planning Sciences, Elsevier, vol. 85(C).
    2. Adrian J. Lee & Sheldon H. Jacobson, 2012. "Identifying Changing Aviation Threat Environments Within an Adaptive Homeland Security Advisory System," Risk Analysis, John Wiley & Sons, vol. 32(2), pages 319-329, February.
    3. John A. Major, 2002. "Advanced Techniques for Modeling Terrorism Risk," Journal of Risk Finance, Emerald Group Publishing Limited, vol. 4(1), pages 15-24, April.
    4. Eugene Pik, 2024. "Airport security: the impact of AI on safety, efficiency, and the passenger experience," Journal of Transportation Security, Springer, vol. 17(1), pages 1-13, December.
    5. Yu Wu & Shiting He & Qingsong Zhang & Jinxin Shi & Jiang Xie, 2023. "Evolution Game and Simulation Analysis of Disturbance Emergency Disposal of In-Flight Cabin: China Civil Aviation Security Strategy Study," Sustainability, MDPI, vol. 15(11), pages 1-24, June.
    6. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).
    7. Sandler, Todd & Tschirhart, John T. & Cauley, Jon, 1983. "A Theoretical Analysis of Transnational Terrorism," American Political Science Review, Cambridge University Press, vol. 77(1), pages 36-54, March.
    8. R. Mechler, 2016. "Reviewing estimates of the economic efficiency of disaster risk management: opportunities and limitations of using risk-based cost–benefit analysis," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 81(3), pages 2121-2147, April.
    9. Lin, Tao & Guan, Xiaodong & Wang, Donggen, 2024. "How does social network mediate/moderate the effects of the built environment on travel behavior?," Transportation Research Part A: Policy and Practice, Elsevier, vol. 187(C).
    10. Samanta, Sukanya & Sen, Goutam & Uniyal, Jatin & Ghosh, Soumya Kanti, 2024. "Assessing vehicle interdiction strategies on a complex transportation network: A simulation-based study," Socio-Economic Planning Sciences, Elsevier, vol. 95(C).
    11. Yangyang Lv & Lili Wan & Naizhong Zhang & Zhan Wang & Yong Tian & Wenjing Ye, 2024. "Research on the Green Transition Path of Airport Development under the Mechanism of Tripartite Evolutionary Game Model," Sustainability, MDPI, vol. 16(18), pages 1-28, September.
    12. Abdollah Shafieezadeh & Eun J. Cha & Bruce R. Ellingwood, 2015. "A Decision Framework for Managing Risk to Airports from Terrorist Attack," Risk Analysis, John Wiley & Sons, vol. 35(2), pages 292-306, February.
    13. Liu, Gang & He, Jing & Luo, Zhiyong & Yao, Xiaobai & Fan, Qinjin, 2024. "Understanding route choice behaviors' impact on traffic throughput in a dynamic transportation network," Chaos, Solitons & Fractals, Elsevier, vol. 181(C).
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Hunt, Kyle & Zhuang, Jun, 2024. "A review of attacker-defender games: Current state and paths forward," European Journal of Operational Research, Elsevier, vol. 313(2), pages 401-417.
    2. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    3. Sandler, Todd & Enders, Walter, 2004. "An economic perspective on transnational terrorism," European Journal of Political Economy, Elsevier, vol. 20(2), pages 301-316, June.
    4. Khusrav Gaibulloev & Todd Sandler, 2013. "Determinants of the Demise of Terrorist Organizations," Southern Economic Journal, John Wiley & Sons, vol. 79(4), pages 774-792, April.
    5. Sylvain Baumann, 2019. "Intelligence Service for a Better Information: Application to a Terrorist Threat," Post-Print hal-02949075, HAL.
    6. Paschalis Arvanitidis & Athina Economou & Christos Kollias, 2016. "Terrorism’s effects on social capital in European countries," Public Choice, Springer, vol. 169(3), pages 231-250, December.
    7. Brandt, Patrick T. & George, Justin & Sandler, Todd, 2016. "Why concessions should not be made to terrorist kidnappers," European Journal of Political Economy, Elsevier, vol. 44(C), pages 41-52.
    8. Kjell Hausken & Dipak K. Gupta, 2016. "Determining the ideological orientation of terrorist organisations: the effects of government repression and organised crime," International Journal of Public Policy, Inderscience Enterprises Ltd, vol. 12(1/2), pages 71-97.
    9. Meierrieks, Daniel & Renner, Laura, 2021. "Islamist terrorism and the role of women," Discussion Paper Series 2021-02, University of Freiburg, Wilfried Guth Endowed Chair for Constitutional Political Economy and Competition Policy.
    10. Jan Schnellenbach, 2006. "Appeasing nihilists? Some economic thoughts on reducing terrorist activity," Public Choice, Springer, vol. 129(3), pages 301-313, December.
    11. José de Sousa & Daniel Mirza & Thierry Verdier, 2010. "Terrorism Networks and Trade: Does the Neighor Hurt?," Working Papers 2010-04, CEPII research center.
    12. Paul Hudson & W. J. Wouter Botzen & Jennifer Poussin & Jeroen C. J. H. Aerts, 2019. "Impacts of Flooding and Flood Preparedness on Subjective Well-Being: A Monetisation of the Tangible and Intangible Impacts," Journal of Happiness Studies, Springer, vol. 20(2), pages 665-682, February.
    13. Liang, Liang & Chen, Jingxian & Siqueira, Kevin, 2020. "Revenge or continued attack and defense in defender–attacker conflicts," European Journal of Operational Research, Elsevier, vol. 287(3), pages 1180-1190.
    14. Rehman, Faiz Ur & Nasir, Muhammad & Shahbaz, Muhammad, 2017. "What have we learned? Assessing the effectiveness of counterterrorism strategies in Pakistan," Economic Modelling, Elsevier, vol. 64(C), pages 487-495.
    15. repec:bpj:pepspp:v:18:y:2012:i:3:p:3:n:9 is not listed on IDEAS
    16. Walter Enders & Todd Sandler, 2000. "Is Transnational Terrorism Becoming More Threatening?," Journal of Conflict Resolution, Peace Science Society (International), vol. 44(3), pages 307-332, June.
    17. Yang, Jinling & Chen, Zhiwei & Criado, Regino & Zhang, Shenggui, 2024. "A mathematical framework for shortest path length computation in multi-layer networks with inter-edge weighting and dynamic inter-edge weighting: The case of the Beijing bus network, China," Chaos, Solitons & Fractals, Elsevier, vol. 182(C).
    18. Alan B. Krueger & Jitka Maleckova, 2002. "Education, Poverty, Political Violence and Terrorism: Is There a Causal Connection?," NBER Working Papers 9074, National Bureau of Economic Research, Inc.
    19. Sylvain Baumann, 2018. "Protection, Technological Transfer and Alliance against Terrorist Conflict," Post-Print hal-02949083, HAL.
    20. Gries, Thomas & Haake, Claus-Jochen, 2016. "An Economic Theory of 'Destabilization War' '- Compromise for Peace versus Conventional, Guerilla, or Terrorist Warfare," VfS Annual Conference 2016 (Augsburg): Demographic Change 145617, Verein für Socialpolitik / German Economic Association.
    21. Karen Pittel & Dirk Rübbelke, 2011. "Characteristics of Terrorism," Chapters, in: Derek L. Braddon & Keith Hartley (ed.), Handbook on the Economics of Conflict, chapter 7, Edward Elgar Publishing.

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:soceps:v:101:y:2025:i:c:s0038012125001235. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/seps .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.