Technology adoption for airport security: Modeling public disclosure and secrecy in an attacker-defender game

[1]  Jun Zhuang,et al.  Modelling ‘contracts’ between a terrorist group and a government in a sequential game , 2012, J. Oper. Res. Soc..

[2]  L. Lave,et al.  The Economic Implications of Terrorist Attack on Commercial Aviation in the USA , 2014 .

[3]  Kjell Hausken and Gregory Levitin Review of Systems Defense and Attack Models , 2012, International Journal of Performability Engineering.

[4]  Jun Zhuang,et al.  N-stage security screening strategies in the face of strategic applicants , 2017, Reliab. Eng. Syst. Saf..

[5]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[6]  Robert Powell,et al.  Allocating Defensive Resources with Private Information about Vulnerability , 2007, American Political Science Review.

[7]  Larry Samuelson,et al.  Choosing What to Protect: Strategic Defensive Allocation Against an Unknown Attacker , 2005 .

[8]  Jing Zhang,et al.  Modeling multi-target defender-attacker games with quantal response attack strategies , 2021, Reliab. Eng. Syst. Saf..

[9]  V. Bier,et al.  Reasons for Secrecy and Deception in Homeland‐Security Resource Allocation , 2010, Risk analysis : an official publication of the Society for Risk Analysis.

[10]  Alois Stutzer,et al.  Calculating Tragedy: Assessing the Costs of Terrorism , 2004, SSRN Electronic Journal.

[11]  Kjell Hausken,et al.  Choosing what to protect when attacker resources and asset valuations are uncertain , 2014 .

[12]  Canan Ulu,et al.  Risk Aversion, Information Acquisition, and Technology Adoption , 2017, Oper. Res..

[13]  V. Bier,et al.  SECRECY AND DECEPTION AT EQUILIBRIUM, WITH APPLICATIONS TO ANTI‐TERRORISM RESOURCE ALLOCATION , 2011 .

[14]  Peter Gordon,et al.  The Economic Impacts of a Terrorist Attack on the U.S. Commercial Aviation System , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[15]  Donghyun Park,et al.  The economic impact of terrorism: A new model and its application to Pakistan , 2015 .

[16]  Todd Sandler,et al.  Chapter 25 Terrorism: A Game-Theoretic Approach⁎ , 2007 .

[17]  Gregory Levitin,et al.  Intelligence and impact contests in systems with redundancy, false targets, and partial protection , 2009, Reliab. Eng. Syst. Saf..

[18]  Abdollah Shafieezadeh,et al.  A decision framework for managing risk to airports from terrorist attack. , 2015, Risk analysis : an official publication of the Society for Risk Analysis.

[19]  Jennifer F. Reinganum On the diffusion of new technology: A game theoretic approach , 1981 .

[20]  Peter J. Phillips,et al.  The End Of Al-Qa`ida: Rationality, Survivability and Risk Aversion , 2013 .

[21]  Sheldon H. Jacobson,et al.  Risk-Based Policies for Airport Security Checkpoint Screening , 2010, Transp. Sci..

[22]  James E. Smith,et al.  Uncertainty, Information Acquisition, and Technology Adoption , 2009, Oper. Res..

[23]  David A. Siegel,et al.  Is this Paper Dangerous? Balancing Secrecy and Openness in Counterterrorism , 2010 .

[24]  Vineet M. Payyappalli,et al.  Deterrence and Risk Preferences in Sequential Attacker–Defender Games with Continuous Efforts , 2017, Risk analysis : an official publication of the Society for Risk Analysis.

[25]  Jun Zhuang,et al.  Security screening queues with impatient applicants: A new model with a case study , 2018, Eur. J. Oper. Res..

[26]  Qianmei Feng On determining specifications and selections of alternative technologies for airport checked-baggage security screening. , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[27]  Michael Freeman The Sources of Terrorist Financing: Theory and Typology , 2011 .

[28]  Vu Ekhosuehi,et al.  Determination of the optimal exchange rate via control of the domestic interest rate in Nigeria , 2014 .

[29]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..

[30]  John Mueller,et al.  Terrorism Risks and Cost‐Benefit Analysis of Aviation Security , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[31]  Solomon Wong,et al.  Evolving risk-based security: A review of current issues and emerging trends impacting security screening in the aviation industry , 2015 .

[32]  Sheldon H. Jacobson,et al.  The impact of aviation checkpoint queues on optimizing security screening effectiveness , 2011, Reliab. Eng. Syst. Saf..

[33]  Andrea Maurizio,et al.  A survey of New Yorkers after the Sept. 11, 2001, terrorist attacks. , 2003, The American journal of psychiatry.

[34]  Gregory Levitin,et al.  Separation in homogeneous systems with independent identical elements , 2010, Eur. J. Oper. Res..

[35]  Victor Richmond R. Jose,et al.  Technology Adoption, Accumulation, and Competition in Multiperiod Attacker-Defender Games , 2013 .

[36]  J. Zhuang,et al.  Technology Evolutionary Games in Complex Transportation Systems in the Face of Adaptive Adversaries , 2011 .

[37]  Kevin Zhu,et al.  Strategic Decisions of New Technology Adoption Under Asymmetric Information: A Game Theoretic Model , 2003, Decis. Sci..

[38]  Micaela Demichela,et al.  Risk assessment techniques for civil aviation security , 2011, Reliab. Eng. Syst. Saf..

[39]  Jomon Aliyas Paul,et al.  Optimal Allocation of Resources in Airport Security: Profiling vs. Screening , 2014, Oper. Res..

[40]  Jun Zhuang,et al.  European Journal of Operational Research on the Value of Exposure and Secrecy of Defense System: First-mover Advantage vs. Robustness , 2022 .

[41]  Brian A. Jackson,et al.  Assessing the Effectiveness of Layered Security for Protecting the Aviation System Against Adaptive Adversaries , 2015 .

[42]  Jing Zhang,et al.  The role of risk preferences in a multi-target defender-attacker resource allocation game , 2018, Reliab. Eng. Syst. Saf..

[43]  Kailash C. Kapur,et al.  Designing airport checked-baggage-screening strategies considering system capability and reliability , 2009, Reliab. Eng. Syst. Saf..

[44]  Sheldon H Jacobson,et al.  A Cost‐Benefit Analysis of Alternative Device Configurations for Aviation‐Checked Baggage Security Screening , 2006, Risk analysis : an official publication of the Society for Risk Analysis.

[45]  Todd R. LaPorte,et al.  Airport Security, High Reliability, and the Problem of Rationality , 2002 .

[46]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[47]  Detlof von Winterfeldt,et al.  Comparative Analysis of Terrorists' Objectives Hierarchies , 2020, Decis. Anal..

[48]  Jun Zhuang,et al.  Modeling Precheck Parallel Screening Process in the Face of Strategic Applicants with Incomplete Information and Screening Errors , 2018, Risk analysis : an official publication of the Society for Risk Analysis.

[49]  Heather Rosoff,et al.  Valuing Equal Protection in Aviation Security Screening , 2017, Risk analysis : an official publication of the Society for Risk Analysis.