IDEAS home Printed from https://ideas.repec.org/a/inm/orinte/v36y2006i6p545-552.html
   My bibliography  Save this article

How Effective Is Security Screening of Airline Passengers?

Author

Listed:
  • Susan E. Martonosi

    (Department of Mathematics, Harvey Mudd College, 301 Platt Boulevard, Claremont, California 91711)

  • Arnold Barnett

    (Operations Research Center, Sloan School of Management, Massachusetts Institute of Technology, E53-379, 77 Massachusetts Avenue, Cambridge, Massachusetts 02139)

Abstract

With a simple mathematical model, we explored the antiterrorist effectiveness of airport passenger prescreening systems. Supporters of these systems often emphasize the need to identify the most suspicious passengers, but they ignore the point that such identification does little good unless dangerous items can actually be detected. Critics often focus on terrorists’ ability to probe the system and thereby thwart it, but ignore the possibility that the very act of probing can deter attempts at sabotage that would have succeeded. Using the model to make some preliminary assessments about security policy, we find that an improved baseline level of screening for all passengers might lower the likelihood of attack more than would improved profiling of high-risk passengers.

Suggested Citation

  • Susan E. Martonosi & Arnold Barnett, 2006. "How Effective Is Security Screening of Airline Passengers?," Interfaces, INFORMS, vol. 36(6), pages 545-552, December.
  • Handle: RePEc:inm:orinte:v:36:y:2006:i:6:p:545-552
    DOI: 10.1287/inte.1060.0231
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/inte.1060.0231
    Download Restriction: no

    File URL: https://libkey.io/10.1287/inte.1060.0231?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Arnold Barnett, 2004. "CAPPS II: The Foundation of Aviation Security?," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 909-916, August.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. David Anderson, 2021. "Optimising multi-layered security screening," Journal of Transportation Security, Springer, vol. 14(3), pages 249-273, December.
    2. Mark G. Stewart & John Mueller, 2013. "Terrorism Risks and Cost‐Benefit Analysis of Aviation Security," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 893-908, May.
    3. Carlos Martí Sempere, 2011. "A Survey of the European Security Market," Economics of Security Working Paper Series 43, DIW Berlin, German Institute for Economic Research.
    4. Nie, Xiaofeng & Batta, Rajan & Drury, Colin G. & Lin, Li, 2009. "Passenger grouping with risk levels in an airport security system," European Journal of Operational Research, Elsevier, vol. 194(2), pages 574-584, April.
    5. Alexander G. Nikolaev & Sheldon H. Jacobson & Laura A. McLay, 2007. "A Sequential Stochastic Security System Design Problem for Aviation Security," Transportation Science, INFORMS, vol. 41(2), pages 182-194, May.
    6. Laura A. McLay & Adrian J. Lee & Sheldon H. Jacobson, 2010. "Risk-Based Policies for Airport Security Checkpoint Screening," Transportation Science, INFORMS, vol. 44(3), pages 333-349, August.
    7. Bell, John E. & Griffis, Stanley E. & Cunningham III, William A. & Eberlan, Jon A., 2011. "Location optimization of strategic alert sites for homeland defense," Omega, Elsevier, vol. 39(2), pages 151-158, April.
    8. Mark G. Stewart & John Mueller, 2017. "Risk and economic assessment of expedited passenger screening and TSA PreCheck," Journal of Transportation Security, Springer, vol. 10(1), pages 1-22, June.
    9. Mark G. Stewart & John Mueller, 2018. "Risk and economic assessment of U.S. aviation security for passenger-borne bomb attacks," Journal of Transportation Security, Springer, vol. 11(3), pages 117-136, December.
    10. Stewart, Mark G., 2010. "Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 29-40.
    11. Nitin Bakshi & Noah Gans, 2010. "Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment," Management Science, INFORMS, vol. 56(2), pages 219-233, February.
    12. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    13. Xiaofeng Nie & Rajan Batta & Colin G. Drury & Li Lin, 2009. "The Impact of Joint Responses of Devices in an Airport Security System," Risk Analysis, John Wiley & Sons, vol. 29(2), pages 298-311, February.
    14. Paul Kantor & Endre Boros, 2010. "Deceptive Detection Methods for Effective Security with Inadequate Budgets: The Testing Power Index," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 663-673, April.
    15. Nie, Xiaofeng & Parab, Gautam & Batta, Rajan & Lin, Li, 2012. "Simulation-based Selectee Lane queueing design for passenger checkpoint screening," European Journal of Operational Research, Elsevier, vol. 219(1), pages 146-155.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Huseyin Cavusoglu & Byungwan Koh & Srinivasan Raghunathan, 2010. "An Analysis of the Impact of Passenger Profiling for Transportation Security," Operations Research, INFORMS, vol. 58(5), pages 1287-1302, October.
    2. Nie, Xiaofeng & Parab, Gautam & Batta, Rajan & Lin, Li, 2012. "Simulation-based Selectee Lane queueing design for passenger checkpoint screening," European Journal of Operational Research, Elsevier, vol. 219(1), pages 146-155.
    3. Thomas F. Sanquist & Heidi Mahy & Frederic Morris, 2008. "An Exploratory Risk Perception Study of Attitudes Toward Homeland Security Systems," Risk Analysis, John Wiley & Sons, vol. 28(4), pages 1125-1133, August.
    4. Ajay Sudharshan Satish & Akul Mangal & Prathamesh Churi, 2023. "A systematic review of passenger profiling in airport security system: Taking a potential case study of CAPPS II," Journal of Transportation Security, Springer, vol. 16(1), pages 1-41, December.
    5. Laura A. McLay & Adrian J. Lee & Sheldon H. Jacobson, 2010. "Risk-Based Policies for Airport Security Checkpoint Screening," Transportation Science, INFORMS, vol. 44(3), pages 333-349, August.
    6. Alexander G. Nikolaev & Sheldon H. Jacobson & Laura A. McLay, 2007. "A Sequential Stochastic Security System Design Problem for Aviation Security," Transportation Science, INFORMS, vol. 41(2), pages 182-194, May.
    7. Nie, Xiaofeng & Batta, Rajan & Drury, Colin G. & Lin, Li, 2009. "Passenger grouping with risk levels in an airport security system," European Journal of Operational Research, Elsevier, vol. 194(2), pages 574-584, April.
    8. Sheldon H. Jacobson, 2020. "Using Risk-Based Security to Quantify the Number of Firearms Missed at Airport Security Checkpoints," Interfaces, INFORMS, vol. 50(3), pages 190-196, May.
    9. Sheldon H. Jacobson & Tamana Karnani & John E. Kobza & Lynsey Ritchie, 2006. "A Cost‐Benefit Analysis of Alternative Device Configurations for Aviation‐Checked Baggage Security Screening," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 297-310, April.
    10. Laura A. McLay & Sheldon H. Jacobson & John E. Kobza, 2006. "A multilevel passenger screening problem for aviation security," Naval Research Logistics (NRL), John Wiley & Sons, vol. 53(3), pages 183-197, April.
    11. Xiaofeng Nie & Rajan Batta & Colin G. Drury & Li Lin, 2009. "The Impact of Joint Responses of Devices in an Airport Security System," Risk Analysis, John Wiley & Sons, vol. 29(2), pages 298-311, February.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:orinte:v:36:y:2006:i:6:p:545-552. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.