Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors

被引:0
|
作者
Cen Song
Jun Zhuang
机构
[1] China University of Petroleum,School of Business Administration
[2] University at Buffalo,Department of Industrial and System Engineering
来源
关键词
Security screening policy; Two-stage queueing network ; Waiting time; Game theory; Imperfect screening;
D O I
暂无
中图分类号
学科分类号
摘要
In a security screening system, a tighter screening policy not only increases the security level, but also causes congestion for normal people, which may deter their use and decrease the approver’s payoff. Adapting to the screening policies, adversary and normal applicants choose whether to enter the screening system. Security managers could use screening policies to deter adversary applicants, but could also lose the benefits of admitting normal applicants when they are deterred, which generates a tradeoff. This paper analyzes the optimal screening policies in an imperfect two-stage screening system with potential screening errors at each stage, balancing security and congestion in the face of strategic normal and adversary applicants. We provide the optimal levels of screening strategies for the approver and the best-response application strategies for each type of applicant. This paper integrates game theory and queueing theory to study the optimal two-stage policies under discriminatory and non-discriminatory screening policies. We extend the basic model to the optimal allocation of total service rate to the assumed two types of applicants at the second stage and find that most of the total service rate are assigned to the service rate for the assumed “Bad” applicants. This paper provides some novel policy insights which may be useful for security screening practices.
引用
收藏
页码:237 / 262
页数:25
相关论文
共 50 条
  • [1] Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors
    Song, Cen
    Zhuang, Jun
    [J]. ANNALS OF OPERATIONS RESEARCH, 2017, 258 (02) : 237 - 262
  • [2] N-stage security screening strategies in the face of strategic applicants
    Song, Cen
    Zhuang, Jun
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2017, 165 : 292 - 301
  • [3] Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors
    Song, Cen
    Zhuang, Jun
    [J]. RISK ANALYSIS, 2018, 38 (01) : 118 - 133
  • [4] Design and analysis of a two-stage security screening and inspection system
    Olapiriyakul, Sun
    Das, Sanchoy
    [J]. JOURNAL OF AIR TRANSPORT MANAGEMENT, 2007, 13 (02) : 67 - 74
  • [5] Classification in two-stage screening
    Longford, Nicholas T.
    [J]. STATISTICS IN MEDICINE, 2015, 34 (25) : 3281 - 3297
  • [6] Maximally efficient two-stage screening
    Berger, T
    Mandell, JW
    Subrahmanya, P
    [J]. BIOMETRICS, 2000, 56 (03) : 833 - 840
  • [7] A two-stage bipodal screening model for universal neonatal hearing screening
    Govaerts, PJ
    Yperman, M
    De Ceulaer, G
    Daemers, K
    Van Driessche, K
    Somers, T
    Offeciers, FE
    [J]. OTOLOGY & NEUROTOLOGY, 2001, 22 (06) : 850 - 854
  • [8] Genomic newborn screening: Proposal of a two-stage approach
    Schaaf, Christian P.
    Koelker, Stefan
    Hoffmann, Georg F.
    [J]. JOURNAL OF INHERITED METABOLIC DISEASE, 2021, 44 (03) : 518 - 520
  • [9] Two-Stage Breast Cancer Screening in the Developing World
    Batsis, Charalabos
    [J]. WORLD JOURNAL OF SURGERY, 2011, 35 (03) : 698 - 699
  • [10] Two-Stage Breast Cancer Screening in the Developing World
    Charalabos Batsis
    [J]. World Journal of Surgery, 2011, 35 : 698 - 699