1,155
Views
6
CrossRef citations to date
0
Altmetric
Operations Engineering & Analytics

A review of risk-based security and its impact on TSA PreCheck

, , , & ORCID Icon
Pages 657-670 | Received 07 Aug 2020, Accepted 11 Sep 2020, Published online: 30 Oct 2020

References

  • Babu, V.L.L., Batta, R. and Lin, L. (2006) Passenger grouping under constant threat probability in an airport security system. European Journal of Operational Research, 168(2), 633–644.
  • Brown, M., Sinha, A., Schlenker, A. and Tambe, M. (2016) One size does not fit all: A game-theoretic approach for dynamically and effectively screening for threats. Proceedings of the 30th AAAI Conference on Artificial Intelligence (AAAI), Phoenix, Arizona, USA, 2016 February 12–17, Research Collection School Of Information Systems, pp. 425–431. https://ink.library.smu.edu.sg/sis_research/4786.
  • Cavusoglu, H., Koh, B. and Raghunathan, S. (2010) An analysis of the impact of passenger profiling for transportation security. Operations Research, 58(5), 1287–1302.
  • Cavusoglu, H., Kwark, Y., Mai, B. and Raghunathan, S. (2013) Passenger profiling and screening for aviation security in the presence of strategic attackers. Decision Analysis, 10(1), 63–81.
  • Chakrabarti, S. and Strauss, A. (2002) Carnival booth: An algorithm for defeating the computer-assisted passenger screening system. First Monday, 7(10). https://doi.org/10.5210/fm.v7i10.992
  • Da Cunha, D.A., Macário, R. and Reis, V. (2017) Keeping cargo security costs down: A risk-based approach to air cargo airport security in small and medium airports. Journal of Air Transport Management, 61, 115–122.
  • DeGrave, M.J. (2004) Airline passenger profiling and the fourth amendment: Will CAPPS II be cleared for takeoff. Boston University Journal of Science and Technology Review, 10, 125–151.
  • Department of Homeland Security Office of Inspector General (2014) Transportation Security Administration’s deployment and use of advanced imaging technology. OIG-13-120 Revised, Department of Homeland Security, Washington, DC.
  • Derman, C., Lieberman, G.J. and Ross, S.M. (1972) A sequential stochastic assignment problem. Management Science, 18(7), 349–355.
  • Deutsch, Y. and Golany, B. (2019) Securing gates of a protected area: A hybrid game and queueing theory modeling approach. Decision Analysis, 16(1), 31–45.
  • Elias, B. (2012) Airport body scanners: The role of advanced imaging technology in airline passenger screening. Report R42750, Congressional Research Service, Washington, DC.
  • Feng, Q., Sahin, H. and Karson, M.J. (2009) Bayesian analysis models for aviation baggage screening. IIE Transactions, 41(11), 995–1006.
  • Fiske, I.D. (2010) Failing to secure the skies: Why America has struggled to protect itself and how it can change. Virginia Journal of Law and Technology, 15, 172–173.
  • Fletcher, K. and Abbas, A. (2018) A value measure for public – sector enterprise risk management: A TSA case study. Risk Analysis, 38(5), 991–1008.
  • Fletcher, K.C. (2011) Aviation security: A case for risk-based passenger screening. Master’s thesis, Naval Postgraduate School, Monterey, CA.
  • Hanumantha, G.J., Arici, B.T., Sefair, J.A. and Askin, R. (2020) Demand prediction and dynamic workforce allocation to improve airport screening operations. IISE Transactions, 52(12), 1324–1342.
  • Hardy, G.H., Littlewood, J.E. and Polya, G. (1952) Inequalities, Cambridge University Press, Cambridge, UK.
  • INFORMS (2018) Institute for operations research and the management sciences (informs) impact prize, 2018 awardees. https://www.informs.org/Recognizing-Excellence/INFORMS-Prizes/Impact-Prize, accessed August 4, 2020.
  • Jackson, B.A. (2008) Marrying prevention and resiliency. Rand Report, Rand Corporation, Santa Monica, CA.
  • Jackson, B.A. and Frelinger, D. (2009) Emerging threats and security planning: How should we decide what hypothetical threats to worry about? Rand Report, Rand Corporation, Santa Monica, CA.
  • Jacobson, S.H. (2020) Airport security in a post-COVID-19 world. The Hill. https://thehill.com/opinion/national-security/494479-airport-security-in-a-post-covid-19-world
  • Jacobson, S.H., Khatibi, A. and Yu, G. (2017) When should TSA precheck be offered at no cost to travelers? Journal of Transportation Security, 10(1-2), 23–29.
  • Jacobson, S.H., Lee, A.J. and Nikolaev, A.G. (2009) Designing for flexibility in aviation security systems. Journal of Transportation Security, 2(1-2), 1–8.
  • Jain, M., Kardes, E., Kiekintveld, C., Ordónez, F. and Tambe, M. (2010) Security games with arbitrary schedules: A branch and price approach. Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, July 2010, AAAI-10, Atlanta, Georgia, AAAI Press, pp. 792–797.
  • Jain, M., Tsai, J., Pita, J., Kiekintveld, C., Rathi, S., Tambe, M. and Ordónez, F. (2010) Software assistants for randomized patrol planning for the LAX airport police and the Federal Air Marshal Service. Interfaces, 40(4), 267–290.
  • Kar, D., Nguyen, T.H., Fang, F., Brown, M., Sinha, A., Tambe, M. and Jiang, A.X. (2018) Trends and applications in Stackelberg security games, in Başar T., Zaccour G. (eds.), Handbook of Dynamic Game Theory, Springer, Cham, pp. 1–47.
  • Kean, T.H., Hamilton, L., Ben-Veniste, B., Kerrey, B., Fielding, F.F., Lehman, J.F., Gorelock, J., Roemer, T.J., Gorton, S. and Thompson, J. (2004) The 9/11 commission report: Final report of the National Commission on Terrorist Attacks upon the United States. https://www.9-11commission.gov/report/
  • Kite, L.A. (2004) Red flagging civil liberties and due process rights of airline passengers: Will a redesigned CAPPS II system meet the constitutional challenge. Washington and Lee Law Review, 61, 1385–1436.
  • Kravitz, D. (2010) Airport ‘pat-downs’ cause growing passenger backlash. Washington Post, November 13. http://www.washingtonpost.com/wp-dyn/content/article/2010/11/12/AR2010111206580.html
  • Lee, A.J. and Jacobson, S.H. (2011a) The impact of aviation checkpoint queues on optimizing security screening effectiveness. Reliability Engineering & System Safety, 96(8), 900–911.
  • Lee, A.J. and Jacobson, S.H. (2011b) Evaluating the effectiveness of sequential aviation security screening policies. IIE Transactions, 43(8), 547–565.
  • Lee, A.J. and Jacobson, S.H. (2012) Addressing passenger risk uncertainty for aviation security screening. Transportation Science, 46(2), 189–203.
  • Lee, A.J., McLay, L.A. and Jacobson, S.H. (2009) Designing aviation security passenger screening systems using nonlinear control.SIAM Journal on Control and Optimization, 48(4), 2085–2105.
  • Lee, A.J., Nikolaev, A.G. and Jacobson, S.H. (2008) Protecting air transportation: A survey of operations research applications to aviation security. Journal of Transportation Security, 1(3), 160–184.
  • Mai, B. and Raghunathan, S. (2006) Economics of user segmentation, profiling, and detection in security. Profiling, and Detection in Security (July 2006).
  • Martonosi, S.E. (2011) Dynamic server allocation at parallel queues.IIE Transactions, 43(12), 863–877.
  • Martonosi, S.E. and Barnett, A. (2006) How effective is security screening of airline passengers? Interfaces, 36(6), 545–552.
  • McLay, L.A. (2011) Risk-based resource allocation models for aviation security, in Safety and Risk Modeling and Its Applications, London, Springer, pp. 243–261.
  • McLay, L.A., Jacobson, S.H. and Kobza, J.E. (2006) A multilevel passenger screening problem for aviation security. Naval Research Logistics, 53(3), 183–197.
  • McLay, L.A., Jacobson, S.H. and Kobza, J.E. (2007) Integer programming models and analysis for a multilevel passenger screening problem. IIE Transactions, 39(1), 73–81.
  • McLay, L.A., Jacobson, S.H. and Kobza, J.E. (2008) The tradeoff between technology and prescreening intelligence in checked baggage screening for aviation security. Journal of Transportation Security, 1(2), 107–126.
  • McLay, L.A., Jacobson, S.H. and Nikolaev, A.G. (2009) A sequential stochastic passenger screening problem for aviation security. IIE Transactions, 41(6), 575–591.
  • McLay, L.A., Lee, A.J. and Jacobson, S.H. (2010) Risk-based policies for airport security checkpoint screening. Transportation Science, 44(3), 333–349.
  • Naji, M., Abdelhalim, S., Al-Ani, A. and Al-Kilidar, H. (2018) Airport security screening process: A review. CICTP 2017: Transportation Reform and Change–Equity, Inclusiveness, Sharing, and Innovation, American Society of Civil Engineers, Reston, VA, pp. 3978–3988.
  • Nie, X. (2011) Risk-based grouping for checked baggage screening systems. Reliability Engineering & System Safety, 96(11), 1499–1506.
  • Nie, X. (2019) The impact of conditional dependence on checked baggage screening. European Journal of Operational Research, 278(3), 883–893.
  • Nie, X., Batta, R., Drury, C.G. and Lin, L. (2009) Passenger grouping with risk levels in an airport security system. European Journal of Operational Research, 194(2), 574–584.
  • Nikolaev, A.G., Jacobson, S.H. and McLay, L.A. (2007) A sequential stochastic security system design problem for aviation security. Transportation Science, 41(2), 182–194.
  • Nikolaev, A.G., Lee, A.J. and Jacobson, S.H. (2011) Optimal aviation security screening strategies with dynamic passenger risk updates. IEEE Transactions on Intelligent Transportation Systems, 13(1), 203–212.
  • Sahin, H. and Feng, Q. (2009) A mathematical framework for sequential passenger and baggage screening to enhance aviation security. Computers & Industrial Engineering, 57(1), 148–155.
  • Schlenker, A., Brown, M., Sinha, A., Tambe, M. and Mehta, R. (2016) Get me to my gate on time: Efficiently solving general-sum Bayesian threat screening games, in Proceedings of the Twenty-second European Conference on Artificial Intelligence, pp. 1476–1484.
  • Sinha, A., Fang, F., An, B., Kiekintveld, C. and Tambe, M. (2018) Stackelberg security games: Looking beyond a decade of success, in Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence (IJCAI-18), Stockholm, Sweden, July 13–19, Research Collection School of Information Systems, pp. 5494–5501. https://ink.library.smu.edu.sg/sis_research/4792.
  • Song, C. and Zhuang, J. (2017a) Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors. Annals of Operations Research, 258(2), 237–262.
  • Song, C. and Zhuang, J. (2017b) N-stage security screening strategies in the face of strategic applicants. Reliability Engineering & System Safety, 165, 292–301.
  • Song, C. and Zhuang, J. (2018) Modeling precheck parallel screening process in the face of strategic applicants with incomplete information and screening errors. Risk Analysis, 38(1), 118–133.
  • Stewart, M.G. and Mueller, J. (2011) Cost-benefit analysis of advanced imaging technology full body scanners for airline passenger security screening. Journal of Homeland Security and Emergency Management, 8(1), 1–18.
  • Stewart, M.G. and Mueller, J. (2013) Terrorism risks and cost-benefit analysis of aviation security. Risk Analysis, 33(5), 893–908.
  • Stewart, M.G. and Mueller, J. (2017) Risk and economic assessment of expedited passenger screening and TSA PreCheck. Journal of Transportation Security, 10(1-2), 1–22.
  • TSA (2006) Registered Traveler Program: Business model, Version 2.1, November 28, 2006. Department of Homeland Security, Arlington, VA.
  • TSA (2020a) TSA checkpoint travel numbers for 2020 and 2019. https://www.tsa.gov/coronavirus/passenger-throughput, accessed August 4, 2020.
  • TSA (2020b) Coronavirus (COVID-19) information. https://www.tsa.gov/coronavirus, accessed August 4, 2020.
  • Von Rochow-Leuschner, D. (2004) CAPPS II and the fourth amendment: Does it fly. Journal of Air Law and Commerce, 69, 139–176.
  • Zheng, Y.J., Sheng, W.G., Sun, X.M. and Chen, S.Y. (2016) Airline passenger profiling based on fuzzy deep machine learning. IEEE Transactions on Neural Networks and Learning Systems, 28(12), 2911–2923.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.