IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v23y2003i5p897-908.html
   My bibliography  Save this article

Analyzing the Cost of Screening Selectee and Non‐Selectee Baggage

Author

Listed:
  • Julie L. Virta
  • Sheldon H. Jacobson
  • John E. Kobza

Abstract

Determining how to effectively operate security devices is as important to overall system performance as developing more sensitive security devices. In light of recent federal mandates for 100% screening of all checked baggage, this research studies the trade‐offs between screening only selectee checked baggage and screening both selectee and non‐selectee checked baggage for a single baggage screening security device deployed at an airport. This trade‐off is represented using a cost model that incorporates the cost of the baggage screening security device, the volume of checked baggage processed through the device, and the outcomes that occur when the device is used. The cost model captures the cost of deploying, maintaining, and operating a single baggage screening security device over a one‐year period. The study concludes that as excess baggage screening capacity is used to screen non‐selectee checked bags, the expected annual cost increases, the expected annual cost per checked bag screened decreases, and the expected annual cost per expected number of threats detected in the checked bags screened increases. These results indicate that the marginal increase in security per dollar spent is significantly lower when non‐selectee checked bags are screened than when only selectee checked bags are screened.

Suggested Citation

  • Julie L. Virta & Sheldon H. Jacobson & John E. Kobza, 2003. "Analyzing the Cost of Screening Selectee and Non‐Selectee Baggage," Risk Analysis, John Wiley & Sons, vol. 23(5), pages 897-908, October.
  • Handle: RePEc:wly:riskan:v:23:y:2003:i:5:p:897-908
    DOI: 10.1111/1539-6924.00367
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/1539-6924.00367
    Download Restriction: no

    File URL: https://libkey.io/10.1111/1539-6924.00367?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Qianmei Feng, 2007. "On Determining Specifications and Selections of Alternative Technologies for Airport Checked‐Baggage Security Screening," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1299-1310, October.
    2. Mark G. Stewart & John Mueller, 2013. "Terrorism Risks and Cost‐Benefit Analysis of Aviation Security," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 893-908, May.
    3. Huseyin Cavusoglu & Young Kwark & Bin Mai & Srinivasan Raghunathan, 2013. "Passenger Profiling and Screening for Aviation Security in the Presence of Strategic Attackers," Decision Analysis, INFORMS, vol. 10(1), pages 63-81, March.
    4. Nie, Xiaofeng, 2019. "The impact of conditional dependence on checked baggage screening," European Journal of Operational Research, Elsevier, vol. 278(3), pages 883-893.
    5. Sheldon H. Jacobson & Tamana Karnani & John E. Kobza & Lynsey Ritchie, 2006. "A Cost‐Benefit Analysis of Alternative Device Configurations for Aviation‐Checked Baggage Security Screening," Risk Analysis, John Wiley & Sons, vol. 26(2), pages 297-310, April.
    6. Laura A. McLay & Sheldon H. Jacobson & John E. Kobza, 2006. "A multilevel passenger screening problem for aviation security," Naval Research Logistics (NRL), John Wiley & Sons, vol. 53(3), pages 183-197, April.
    7. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    8. Xiaofeng Nie & Rajan Batta & Colin G. Drury & Li Lin, 2009. "The Impact of Joint Responses of Devices in an Airport Security System," Risk Analysis, John Wiley & Sons, vol. 29(2), pages 298-311, February.
    9. Yonghua Ji & Subodha Kumar & Vijay Mookerjee, 2016. "When Being Hot Is Not Cool: Monitoring Hot Lists for Information Security," Information Systems Research, INFORMS, vol. 27(4), pages 897-918, December.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:23:y:2003:i:5:p:897-908. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.