IDEAS home Printed from https://ideas.repec.org/a/wly/riskan/v33y2013i5p893-908.html
   My bibliography  Save this article

Terrorism Risks and Cost‐Benefit Analysis of Aviation Security

Author

Listed:
  • Mark G. Stewart
  • John Mueller

Abstract

We evaluate, for the U.S. case, the costs and benefits of three security measures designed to reduce the likelihood of a direct replication of the 9/11 terrorist attacks. To do so, we assess risk reduction, losses, and security costs in the context of the full set of security layers. The three measures evaluated are installed physical secondary barriers (IPSB) to restrict access to the hardened cockpit door during door transitions, the Federal Air Marshal Service (FAMS), and the Federal Flight Deck Officer (FFDO) Program. In the process, we examine an alternate policy measure: doubling the budget of the FFDO program to $44 million per year, installing IPSBs in all U.S. aircraft at a cost of $13.5 million per year, and reducing funding for FAMS by 75% to $300 million per year. A break‐even cost‐benefit analysis then finds the minimum probability of an otherwise successful attack required for the benefit of each security measures to equal its cost. We find that the IPSB is costeffective if the annual attack probability of an otherwise successful attack exceeds 0.5% or one attack every 200 years. The FFDO program is costeffective if the annual attack probability exceeds 2%. On the other hand, more than two otherwise successful attacks per year are required for FAMS to be costeffective. A policy that includes IPSBs, an increased budget for FFDOs, and a reduced budget for FAMS may be a viable policy alternative, potentially saving hundreds of millions of dollars per year with consequences for security that are, at most, negligible.

Suggested Citation

  • Mark G. Stewart & John Mueller, 2013. "Terrorism Risks and Cost‐Benefit Analysis of Aviation Security," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 893-908, May.
  • Handle: RePEc:wly:riskan:v:33:y:2013:i:5:p:893-908
    DOI: 10.1111/j.1539-6924.2012.01905.x
    as

    Download full text from publisher

    File URL: https://doi.org/10.1111/j.1539-6924.2012.01905.x
    Download Restriction: no

    File URL: https://libkey.io/10.1111/j.1539-6924.2012.01905.x?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Gerald G. Brown & Louis Anthony (Tony) Cox, Jr., 2011. "How Probabilistic Risk Assessment Can Mislead Terrorism Risk Analysts," Risk Analysis, John Wiley & Sons, vol. 31(2), pages 196-204, February.
    2. Susan E. Martonosi & Arnold Barnett, 2006. "How Effective Is Security Screening of Airline Passengers?," Interfaces, INFORMS, vol. 36(6), pages 545-552, December.
    3. Farrow Scott & Shapiro Stuart, 2009. "The Benefit-Cost Analysis of Security Focused Regulations," Journal of Homeland Security and Emergency Management, De Gruyter, vol. 6(1), pages 1-22, April.
    4. Robinson Lisa A & Hammitt James K. & Aldy Joseph E. & Krupnick Alan & Baxter Jennifer, 2010. "Valuing the Risk of Death from Terrorist Attacks," Journal of Homeland Security and Emergency Management, De Gruyter, vol. 7(1), pages 1-27, February.
    5. Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
    6. Blomberg S. Brock & Rose Adam Z., 2009. "Editor's Introduction to the Economic Impacts of the September 11, 2001, Terrorist Attacks," Peace Economics, Peace Science, and Public Policy, De Gruyter, vol. 15(2), pages 165-178, July.
    7. Stewart, Mark G. & Netherton, Michael D., 2008. "Security risks and probabilistic risk assessment of glazing subject to explosive blast loading," Reliability Engineering and System Safety, Elsevier, vol. 93(4), pages 627-638.
    8. Jason Bram & James A. Orr & Carol Rapaport, 2002. "Measuring the effects of the September 11 attack on New York City," Economic Policy Review, Federal Reserve Bank of New York, vol. 8(Nov), pages 5-20.
    9. Detlof von Winterfeldt & Terrence M. O'Sullivan, 2006. "Should We Protect Commercial Airplanes Against Surface-to-Air Missile Attacks by Terrorists?," Decision Analysis, INFORMS, vol. 3(2), pages 63-75, June.
    10. Stewart, Mark G., 2010. "Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 29-40.
    11. Qianmei Feng, 2007. "On Determining Specifications and Selections of Alternative Technologies for Airport Checked‐Baggage Security Screening," Risk Analysis, John Wiley & Sons, vol. 27(5), pages 1299-1310, October.
    12. Henry H. Willis & Tom LaTourrette, 2008. "Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment," Risk Analysis, John Wiley & Sons, vol. 28(2), pages 325-339, April.
    13. Julie L. Virta & Sheldon H. Jacobson & John E. Kobza, 2003. "Analyzing the Cost of Screening Selectee and Non‐Selectee Baggage," Risk Analysis, John Wiley & Sons, vol. 23(5), pages 897-908, October.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. David Anderson, 2021. "Optimising multi-layered security screening," Journal of Transportation Security, Springer, vol. 14(3), pages 249-273, December.
    2. repec:cup:judgdm:v:14:y:2019:i:3:p:280-287 is not listed on IDEAS
    3. Peter Ayton & Samantha Murray & James A. Hampton, 2019. "Terrorism, dread risk and bicycle accidents," Judgment and Decision Making, Society for Judgment and Decision Making, vol. 14(3), pages 280-287, May.
    4. Kjell Hausken, 2018. "A cost–benefit analysis of terrorist attacks," Defence and Peace Economics, Taylor & Francis Journals, vol. 29(2), pages 111-129, February.
    5. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    6. Knol, Arthur & Sharpanskykh, Alexei & Janssen, Stef, 2019. "Analyzing airport security checkpoint performance using cognitive agent models," Journal of Air Transport Management, Elsevier, vol. 75(C), pages 39-50.
    7. Papa, Stephen & Casper, William & Moore, Tyler, 2013. "Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis," International Journal of Critical Infrastructure Protection, Elsevier, vol. 6(2), pages 96-106.
    8. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2021. "Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game," Reliability Engineering and System Safety, Elsevier, vol. 207(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Stewart, Mark G., 2010. "Risk-informed decision support for assessing the costs and benefits of counter-terrorism protective measures for infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 3(1), pages 29-40.
    2. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
    3. Mark G. Stewart & John Mueller, 2018. "Risk and economic assessment of U.S. aviation security for passenger-borne bomb attacks," Journal of Transportation Security, Springer, vol. 11(3), pages 117-136, December.
    4. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    5. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    6. Thöns, Sebastian & Stewart, Mark G., 2019. "On decision optimality of terrorism risk mitigation measures for iconic bridges," Reliability Engineering and System Safety, Elsevier, vol. 188(C), pages 574-583.
    7. Anthony M. Barrett, 2010. "Cost Effectiveness of On-Site Chlorine Generation for Chlorine Truck Attack Prevention," Decision Analysis, INFORMS, vol. 7(4), pages 366-377, December.
    8. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    9. Robin L. Dillon & William J. Burns & Richard S. John, 2018. "Insights for Critical Alarm-Based Warning Systems from a Risk Analysis of Commercial Aviation Passenger Screening," Decision Analysis, INFORMS, vol. 15(3), pages 154-173, September.
    10. Gerstenfeld, Arthur & Berger, Paul D., 2011. "A decision-analysis approach for optimal airport security," International Journal of Critical Infrastructure Protection, Elsevier, vol. 4(1), pages 14-21.
    11. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
    12. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    13. Stef Janssen & Alexei Sharpanskykh & Richard Curran, 2019. "AbSRiM: An Agent‐Based Security Risk Management Approach for Airport Operations," Risk Analysis, John Wiley & Sons, vol. 39(7), pages 1582-1596, July.
    14. Dogucan Mazicioglu & Jason R. W. Merrick, 2018. "Behavioral Modeling of Adversaries with Multiple Objectives in Counterterrorism," Risk Analysis, John Wiley & Sons, vol. 38(5), pages 962-977, May.
    15. Rongchen Zhu & Xiaofeng Hu & Xin Li & Han Ye & Nan Jia, 2020. "Modeling and Risk Analysis of Chemical Terrorist Attacks: A Bayesian Network Method," IJERPH, MDPI, vol. 17(6), pages 1-23, March.
    16. Xiaofeng Nie & Rajan Batta & Colin G. Drury & Li Lin, 2009. "The Impact of Joint Responses of Devices in an Airport Security System," Risk Analysis, John Wiley & Sons, vol. 29(2), pages 298-311, February.
    17. L. Elbakidze & Y. H. Jin, 2015. "Are Economic Development and Education Improvement Associated with Participation in Transnational Terrorism?," Risk Analysis, John Wiley & Sons, vol. 35(8), pages 1520-1535, August.
    18. Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
    19. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
    20. Jiaqi Ren & Jin Liu & Yibo Dong & Zhe Li & Weili Li, 2024. "NIGA: A Novel Method for Investigating the Attacker–Defender Model within Critical Infrastructure Networks," Mathematics, MDPI, vol. 12(16), pages 1-24, August.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:riskan:v:33:y:2013:i:5:p:893-908. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1111/(ISSN)1539-6924 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.