IDEAS home Printed from https://ideas.repec.org/a/inm/oropre/v58y2010i5p1287-1302.html
   My bibliography  Save this article

An Analysis of the Impact of Passenger Profiling for Transportation Security

Author

Listed:
  • Huseyin Cavusoglu

    (School of Management, The University of Texas at Dallas, Richardson, Texas 75083)

  • Byungwan Koh

    (School of Management, The University of Texas at Dallas, Richardson, Texas 75083)

  • Srinivasan Raghunathan

    (School of Management, The University of Texas at Dallas, Richardson, Texas 75083)

Abstract

The proponents of airline passenger profiling claim that profiling will reduce the cost of security, improve the detection of attackers, increase the reliability of signals from screening devices, and reduce the inconvenience to normal passengers. In this paper we show that if the Transportation Security Administration (TSA) manually inspects all those passengers classified as likely attackers and sends others through a screening system, as it did when it deployed the Computer Assisted Passenger Prescreening System (CAPPS), then it is superior to no profiling on all four performance measures if and only if the quality of the profiler vis-à-vis that of the screening system is sufficiently high. If the quality of the screening device is sufficiently high, profiling could be detrimental on all four performance measures. On the other hand, if the TSA deploys two screening devices along with the profiler---each screening device optimally configured for each of the two groups of passengers---then profiling improves the reliability of screening device signals, reduces the inconvenience caused to normal passengers, and improves the social welfare even when quality of the screening device is high. One of the implications of our findings is that the security architecture used by the TSA when it deployed CAPPS could provide a strong support to the arguments by some against the use of profiling; however, if the TSA deploys a two-screening device architecture, it might not only blunt the criticism that profiling is discriminatory but also benefit normal passengers and overall society economically.

Suggested Citation

  • Huseyin Cavusoglu & Byungwan Koh & Srinivasan Raghunathan, 2010. "An Analysis of the Impact of Passenger Profiling for Transportation Security," Operations Research, INFORMS, vol. 58(5), pages 1287-1302, October.
  • Handle: RePEc:inm:oropre:v:58:y:2010:i:5:p:1287-1302
    DOI: 10.1287/opre.1090.0793
    as

    Download full text from publisher

    File URL: http://dx.doi.org/10.1287/opre.1090.0793
    Download Restriction: no

    File URL: https://libkey.io/10.1287/opre.1090.0793?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Arnold Barnett & Mary K. Higgins, 1989. "Airline Safety: The Last Decade," Management Science, INFORMS, vol. 35(1), pages 1-21, January.
    2. Jeff Dominitz & John Knowles, 2006. "Crime minimisation and racial bias: what can we learn from police search data?," Economic Journal, Royal Economic Society, vol. 116(515), pages 368-384, November.
    3. Laura A. McLay & Sheldon H. Jacobson & John E. Kobza, 2006. "A multilevel passenger screening problem for aviation security," Naval Research Logistics (NRL), John Wiley & Sons, vol. 53(3), pages 183-197, April.
    4. Gary S. Becker, 1974. "Crime and Punishment: An Economic Approach," NBER Chapters, in: Essays in the Economics of Crime and Punishment, pages 1-54, National Bureau of Economic Research, Inc.
    5. George J. Stigler, 1974. "The Optimum Enforcement of Laws," NBER Chapters, in: Essays in the Economics of Crime and Punishment, pages 55-67, National Bureau of Economic Research, Inc.
    6. John Knowles & Nicola Persico & Petra Todd, 2001. "Racial Bias in Motor Vehicle Searches: Theory and Evidence," Journal of Political Economy, University of Chicago Press, vol. 109(1), pages 203-232, February.
    7. Steven N. Durlauf, 2006. "Assessing Racial Profiling," Economic Journal, Royal Economic Society, vol. 116(515), pages 402-426, November.
    8. Nicola Persico & Petra Todd, 2006. "Generalising the Hit Rates Test for Racial Bias in Law Enforcement, With an Application to Vehicle Searches in Wichita," Economic Journal, Royal Economic Society, vol. 116(515), pages 351-367, November.
    9. Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
    10. Maschler, Michael, 1976. "An advantage of the bargaining set over the core," Journal of Economic Theory, Elsevier, vol. 13(2), pages 184-192, October.
    11. Arnold Barnett, 2004. "CAPPS II: The Foundation of Aviation Security?," Risk Analysis, John Wiley & Sons, vol. 24(4), pages 909-916, August.
    12. Young U. Ryu & Hyeun-Suk Rhee, 2008. "Improving Intrusion Prevention Models: Dual-Threshold and Dual-Filter Approaches," INFORMS Journal on Computing, INFORMS, vol. 20(3), pages 356-367, August.
    13. Jacob W. Ulvila & John E. Gaffney, 2004. "A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems," Decision Analysis, INFORMS, vol. 1(1), pages 35-50, March.
    14. Gustav Feichtinger, 1983. "A Differential Games Solution to a Model of Competition Between a Thief and the Police," Management Science, INFORMS, vol. 29(6), pages 686-699, June.
    15. Shavell, Steven, 1991. "Specific versus General Enforcement of Law," Journal of Political Economy, University of Chicago Press, vol. 99(5), pages 1088-1108, October.
    16. Mishra, Birendra K. & Paul Newman, D. & Stinson, Christopher H., 1997. "Environmental regulations and incentives for compliance audits," Journal of Accounting and Public Policy, Elsevier, vol. 16(2), pages 187-214.
    17. Lazar Babu, Vellara L. & Batta, Rajan & Lin, Li, 2006. "Passenger grouping under constant threat probability in an airport security system," European Journal of Operational Research, Elsevier, vol. 168(2), pages 633-644, January.
    18. Huseyin Cavusoglu & Srinivasan Raghunathan, 2004. "Configuration of Detection Software: A Comparison of Decision and Game Theory Approaches," Decision Analysis, INFORMS, vol. 1(3), pages 131-148, September.
    19. Hulisi Ogut & Huseyin Cavusoglu & Srinivasan Raghunathan, 2008. "Intrusion-Detection Policies for IT Security Breaches," INFORMS Journal on Computing, INFORMS, vol. 20(1), pages 112-123, February.
    20. Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
    21. Viscusi, W Kip & Zeckhauser, Richard J, 2003. "Sacrificing Civil Liberties to Reduce Terrorism Risks," Journal of Risk and Uncertainty, Springer, vol. 26(2-3), pages 99-120, March-May.
    22. Polinsky, Mitchell & Shavell, Steven, 1979. "The Optimal Tradeoff between the Probability and Magnitude of Fines," American Economic Review, American Economic Association, vol. 69(5), pages 880-891, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Nie, Xiaofeng, 2019. "The impact of conditional dependence on checked baggage screening," European Journal of Operational Research, Elsevier, vol. 278(3), pages 883-893.
    2. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    3. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    4. Hoogstrate, André J. & Klaassen, Chris A.J., 2015. "Information weighted sampling for detecting rare items in finite populations with a focus on security," European Journal of Operational Research, Elsevier, vol. 241(3), pages 880-887.
    5. Kirschenbaum, Alan (Avi), 2013. "The cost of airport security: The passenger dilemma," Journal of Air Transport Management, Elsevier, vol. 30(C), pages 39-45.
    6. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    7. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    8. Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
    9. Huseyin Cavusoglu & Young Kwark & Bin Mai & Srinivasan Raghunathan, 2013. "Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers," Decision Analysis, INFORMS, vol. 10(1), pages 63-81, March.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Huseyin Cavusoglu & Young Kwark & Bin Mai & Srinivasan Raghunathan, 2013. "Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers," Decision Analysis, INFORMS, vol. 10(1), pages 63-81, March.
    2. Huseyin Cavusoglu & Birendra Mishra & Srinivasan Raghunathan, 2005. "The Value of Intrusion Detection Systems in Information Technology Security Architecture," Information Systems Research, INFORMS, vol. 16(1), pages 28-46, March.
    3. Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.
    4. Jan Eeckhout & Nicola Persico & Petra E. Todd, 2010. "A Theory of Optimal Random Crackdowns," American Economic Review, American Economic Association, vol. 100(3), pages 1104-1135, June.
    5. Kantorowicz-Reznichenko Elena, 2015. "Day-Fines: Should the Rich Pay More?," Review of Law & Economics, De Gruyter, vol. 11(3), pages 481-501, November.
    6. Huseyin Cavusoglu & Srinivasan Raghunathan & Hasan Cavusoglu, 2009. "Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems," Information Systems Research, INFORMS, vol. 20(2), pages 198-217, June.
    7. Polinsky, A. Mitchell & Shavell, Steven, 2007. "The Theory of Public Enforcement of Law," Handbook of Law and Economics, in: A. Mitchell Polinsky & Steven Shavell (ed.), Handbook of Law and Economics, edition 1, volume 1, chapter 6, pages 403-454, Elsevier.
    8. Feess, Eberhard & Wohlschlegel, Ansgar, 2009. "Why higher punishment may reduce deterrence," Economics Letters, Elsevier, vol. 104(2), pages 69-71, August.
    9. Avner Bar-Ilan & Bruce Sacerdote, 2001. "The Response to Fines and Probability of Detection in a Series of Experiments," NBER Working Papers 8638, National Bureau of Economic Research, Inc.
    10. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    11. Georgiou, Georgios, 2022. "Do correctional authorities treat all offenders equally? Evaluating the use of a risk assessment instrument," International Review of Law and Economics, Elsevier, vol. 69(C).
    12. A. Mitchell Polinsky & Steven Shavell, 2009. "Public Enforcement of Law," Chapters, in: Nuno Garoupa (ed.), Criminal Law and Economics, chapter 1, Edward Elgar Publishing.
    13. Xing Gao & Weijun Zhong & Shue Mei, 2015. "Security investment and information sharing under an alternative security breach probability function," Information Systems Frontiers, Springer, vol. 17(2), pages 423-438, April.
    14. Chuanxi Cai & Shue Mei & Weijun Zhong, 2019. "Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems," Information Technology and Management, Springer, vol. 20(2), pages 55-71, June.
    15. Alain Bensoussan & Vijay Mookerjee & Wei T. Yue, 2020. "Managing Information System Security Under Continuous and Abrupt Deterioration," Production and Operations Management, Production and Operations Management Society, vol. 29(8), pages 1894-1917, August.
    16. Antonio Acconcia & Marcello D'Amato & Riccardo Martina, 2003. "Corruption and Tax Evasion with Competitive Bribes," CSEF Working Papers 112, Centre for Studies in Economics and Finance (CSEF), University of Naples, Italy.
    17. ÇakanyIldIrIm, Metin & Yue, Wei T. & Ryu, Young U., 2009. "The management of intrusion detection: Configuration, inspection, and investment," European Journal of Operational Research, Elsevier, vol. 195(1), pages 186-204, May.
    18. Giovanni Immordino & Marco Pagano, 2010. "Legal Standards, Enforcement, and Corruption," Journal of the European Economic Association, MIT Press, vol. 8(5), pages 1104-1132, September.
    19. Steven Shavell, 1989. "A Note on Optimal Deterrence When Individuals Choose Among Harmful Acts," NBER Working Papers 3061, National Bureau of Economic Research, Inc.
    20. Isaac Ehrlich, 1996. "Crime, Punishment, and the Market for Offenses," Journal of Economic Perspectives, American Economic Association, vol. 10(1), pages 43-67, Winter.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:inm:oropre:v:58:y:2010:i:5:p:1287-1302. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Asher (email available below). General contact details of provider: https://edirc.repec.org/data/inforea.html .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.