2015
DOI: 10.1007/s10479-015-2043-x
|View full text |Cite
|
Sign up to set email alerts
|

Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors

Abstract: In a security screening system, a tighter screening policy not only increases the security level, but also causes congestion for normal people, which may deter their use and decrease the approver's payoff. Adapting to the screening policies, adversary and normal applicants choose whether to enter the screening system. Security managers could use screening policies to deter adversary applicants, but could also lose the benefits of admitting normal applicants when they are deterred, which generates a tradeoff. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…The most contrasting feature of contemporary checkpoint R&D is the conceptual-level embedded intelligent technologies [31], [34] such as cognitive agent models [40], [44], [45], [46], human-machine interactions [19], traveler deep screening [34], and border control technologies [31], [47]. Biometric authentication and screening support multi-state, multi-feedback processes, with deep learning being the most promising approach [33], [34].…”
Section: Contemporary Checkpointmentioning
confidence: 99%
“…The most contrasting feature of contemporary checkpoint R&D is the conceptual-level embedded intelligent technologies [31], [34] such as cognitive agent models [40], [44], [45], [46], human-machine interactions [19], traveler deep screening [34], and border control technologies [31], [47]. Biometric authentication and screening support multi-state, multi-feedback processes, with deep learning being the most promising approach [33], [34].…”
Section: Contemporary Checkpointmentioning
confidence: 99%
“…They investigated the strategic interaction between the U.S. Bureau of Customs and Border Protection, trading firms, and terrorists in a game‐theoretic framework to reduce system congestion, where a M / G /1 queueing model is applied for the secondary inspections. Song and Zhuang (2017) developed a game‐theoretical model, with the application of queueing theory, for analyzing an imperfect two‐stage screening system, to balance security and congestion levels. Pala and Zhuang (2018) also integrated game theory and queueing theory to investigate optimal screening strategies that consider the trade‐offs between security risk and average waiting time (of a M / M /1 queue).…”
Section: Literature Reviewmentioning
confidence: 99%
“…The proposed multi-level weighted-alarm checked-baggage screening system is then integrated with the passenger prescreening in a setting of a two-stage screening system, which is more effective than a one-stage system without passenger prescreening. 22 Passenger prescreening classifies the passengers into multiple classes, which allows the model to tailor airport security resources for its passengers. Secure Flight quantifies and divides the threat levels of passengers into three classes: TSA PreCheck, Standard, and Selectee.…”
Section: Literature Reviewmentioning
confidence: 99%