Security screening queues with impatient applicants: A new model with a case study

Security screening policies are critical in military contexts, airports, ports, and visa issuance processes in order to minimize risks from terrorists, smugglers, fugitives, and others. However, such screening procedures also increase congestion and inconvenience for normal applicants, which may create a trade-off for the authorities balancing between risk and congestion. In this paper, we develop a game-theoretical model to investigate optimal screening policies that acknowledges the trade-offs between risk, congestion, and abandonment behavior of the applicants. To calculate the average waiting time in the screening queue with heterogeneous impatient applicants, we use a two-dimensional Markov chain model. As a case study, we tackle the security screening process of US visa applications by conducting an online survey. Collected data shows some key aspects of applicant preferences such as abandonment behavior. We conduct sensitivity analysis for our model. We show that if the authorities take the abandonment behavior of the applicants into account beforehand, they may achieve higher utility depending on the characteristics of applicants.

[1]  Ragab Omarah Al-Seedy,et al.  A matrix approach for the transient solution of an M/M/1/N queue with discouraged arrivals and reneging , 2012, Int. J. Comput. Math..

[2]  Marcel F. Neuts,et al.  Matrix-geometric solutions in stochastic models - an algorithmic approach , 1982 .

[3]  Young H. Chun Designing repetitive screening procedures with imperfect inspections: An empirical Bayes approach , 2016, Eur. J. Oper. Res..

[4]  William J. Stewart,et al.  Introduction to the numerical solution of Markov Chains , 1994 .

[5]  D. Y. Barrer Queuing with Impatient Customers and Ordered Service , 1957 .

[6]  Rebecca A. Dreiding,et al.  Multilevel, threshold-based policies for cargo container security screening systems , 2012, Eur. J. Oper. Res..

[7]  Ariel Rubinstein,et al.  Experience from a Course in Game Theory: Pre- and Post-class Problem Sets as a Didactic Device , 1999 .

[8]  Ryoichi Sakano,et al.  Airport security and screening satisfaction: A case study of U.S. , 2016 .

[9]  Winfried K. Grassmann,et al.  Regenerative Analysis and Steady State Distributions for Markov Chains , 1985, Oper. Res..

[10]  Phillip Swagel,et al.  The Impact of Post-9/11 Visa Policies on Travel to the United States , 2009 .

[11]  Hendrik Baumann,et al.  Multi-server tandem queue with Markovian arrival process, phase-type service times, and finite buffers , 2017, Eur. J. Oper. Res..

[12]  Roman M. Sheremeta,et al.  The Paradox of Misaligned Profiling: Theory and Experimental Evidence , 2014 .

[13]  Roman M. Sheremeta,et al.  The Paradox of Misaligned Profiling , 2016 .

[14]  Noah Gans,et al.  Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment , 2010, Manag. Sci..

[15]  Robert Kurzban,et al.  Experiments investigating cooperative types in humans: a complement to evolutionary theory and simulations. , 2005, Proceedings of the National Academy of Sciences of the United States of America.

[16]  Wenqing Wu,et al.  Individually and socially optimal joining rules for an egalitarian processor-sharing queue under different information scenarios , 2014, Comput. Ind. Eng..

[17]  Che Soong Kim,et al.  Tandem queueing system with infinite and finite intermediate buffers and generalized phase-type service time distribution , 2014, Eur. J. Oper. Res..

[18]  Robert M. O'Keefe,et al.  Experimental behavioural research in operational research: What we know and what we might come to know , 2016, Eur. J. Oper. Res..

[19]  Edward G. Coffman,et al.  Waiting Time Distributions for Processor-Sharing Systems , 1970, JACM.

[20]  Jun Zhuang,et al.  Balancing congestion and security in the presence of strategic applicants with private information , 2011, Eur. J. Oper. Res..

[21]  Hai Le Vu,et al.  A strategic timing of arrivals to a linear slowdown processor sharing system , 2016, Eur. J. Oper. Res..

[22]  M. Haviv Strategic Customer Behavior in a Single Server Queue , 2011 .

[23]  C. J. Ancker,et al.  Some Queuing Problems with Balking and Reneging. I , 1963 .

[24]  Joshua M. Epstein Agent-based computational models and generative social science , 1999 .

[25]  Avishai Mandelbaum,et al.  Designing a Call Center with Impatient Customers , 2002, Manuf. Serv. Oper. Manag..

[26]  Gunter Bolch,et al.  Steady‐State Solutions of Markov Chains , 2001 .

[27]  Refael Hassin,et al.  Equilibrium strategies for queues with impatient customers , 1995, Oper. Res. Lett..

[28]  Moshe Haviv,et al.  Mean sojourn times for phase-type discriminatory processor sharing systems , 2008, Eur. J. Oper. Res..

[29]  Sunggon Kim Approximate queue length distribution of a discriminatory processor sharing queue with impatient customers , 2014 .

[30]  Jomon Aliyas Paul,et al.  Optimal Allocation of Resources in Airport Security: Profiling vs. Screening , 2014, Oper. Res..

[31]  Ward Whitt,et al.  Engineering Solution of a Basic Call-Center Model , 2005, Manag. Sci..