×

Optimizing airline passenger prescreening systems with Bayesian decision models. (English) Zbl 1251.90265

Summary: The Transportation Security Agency provides airline security in the United States using a variety of measures including a computer based passenger prescreening system. This paper develops Bayesian decision models of two prescreening systems: one that places ticketed passengers into two classifications (fly and no-fly), and a three classification system that includes potential flight. Using a parameterized cost structure, and the expected monetary value decision criteria, this paper develops optimal levels of undesirable personal characteristics that should place people into the various categories. The models are explored from both the government perspective and the passenger’s perspective.

MSC:

90B90 Case-oriented studies in operations research
62P30 Applications of statistics in engineering and industry; control charts
62C10 Bayesian problems; characterization of Bayes procedures
91B06 Decision theory

Software:

SMOTEBoost; SMOTE
Full Text: DOI

References:

[1] Crenshaw, W. A., Civil aviation: target for terrorism, Annals of the American Academy of Political and Social Science, 498, 60-69 (1988)
[2] Cauley, J.; Im, E. I., Intervention policy analysis of skyjackings and other terrorist incidents, American Economic Review, 78, 2, 27-31 (1988)
[3] Federal Aviation Administration. Aviation security advisory meeting minutes July 23, 1997. Available from: 〈http://www.tsa.gov/assets/pdf/ASAC_Meeting_Transcripts_07231997.pdf; Federal Aviation Administration. Aviation security advisory meeting minutes July 23, 1997. Available from: 〈http://www.tsa.gov/assets/pdf/ASAC_Meeting_Transcripts_07231997.pdf
[4] Dempsey, P. S., Aviation security: the role of law in the war against terrorism, Columbia Journal of Transnational Law, 41, 3, 649-733 (2003)
[5] Salter, M. B., SeMS and sensibility: security management systems and the management of risk in the Canadian air transport security authority, Journal of Air Transport Management, 19, 6, 389-398 (2007)
[6] Oum, T. H.; Fu, X., Air transport security user charge pricing: an investigation of flat per-passenger charge vs. ad valorem user charge schemes, Transportation Research Part E, 43, 3, 283-293 (2007)
[7] Von Rochow-Leuschner, D., CAPS II and the fourth amendment: does it really fly?, Journal of Air Law and Commerce, 69, 1, 139-173 (2004)
[8] United States Government Accountability Office. Computer-assisted passenger prescreening security system faces significant implementation challenges. US Government Accountability Office Report GAO-04-385 2004. Available from: 〈http://www.gao.gov/new.items/d04385.pdf; United States Government Accountability Office. Computer-assisted passenger prescreening security system faces significant implementation challenges. US Government Accountability Office Report GAO-04-385 2004. Available from: 〈http://www.gao.gov/new.items/d04385.pdf
[9] Rosen, J., The silver bullet: protecting privacy and security through law and technology, Proceedings of the American Philosophical Society, 151, 3, 291-299 (2007)
[10] United States Government Accountability Office. Secure flight development and testing underway, but risks should be managed as system is further developed. US Government Accountability Office Report GAO-05-356 2005. Available from: 〈http://www.gao.gov/new.items/d05356.pdf; United States Government Accountability Office. Secure flight development and testing underway, but risks should be managed as system is further developed. US Government Accountability Office Report GAO-05-356 2005. Available from: 〈http://www.gao.gov/new.items/d05356.pdf
[11] Transportation Security Administration. Secure Flight—notice of proposed rule making. Department of Homeland Security Report RIN 1652-AA45 2007. Available from: 〈http://www.tsa.gov/assets/pdf/secureflight_nprm.pdf; Transportation Security Administration. Secure Flight—notice of proposed rule making. Department of Homeland Security Report RIN 1652-AA45 2007. Available from: 〈http://www.tsa.gov/assets/pdf/secureflight_nprm.pdf
[12] National Commission on Terrorists Attacks Upon The United States. The 9/11 commission report. Washington DC: US Government Printing Office; 2004.; National Commission on Terrorists Attacks Upon The United States. The 9/11 commission report. Washington DC: US Government Printing Office; 2004.
[13] Meserve J. Terrorist watch lists shorter than previously reported, CNN.com/travel, October 22, 2008. Available from: 〈http://edition.cnn.com/2008/TRAVEL/10/22/no.fly.lists/index.html#cnnSTCText; Meserve J. Terrorist watch lists shorter than previously reported, CNN.com/travel, October 22, 2008. Available from: 〈http://edition.cnn.com/2008/TRAVEL/10/22/no.fly.lists/index.html#cnnSTCText
[14] Transportation Security Administration. Secure flight system of records. Department of Homeland Security Report RIN 1652-ZA14 2007. Available from: 〈http://www.tsa.gov/assets/pdf/sorn_secureflight.pdf; Transportation Security Administration. Secure flight system of records. Department of Homeland Security Report RIN 1652-ZA14 2007. Available from: 〈http://www.tsa.gov/assets/pdf/sorn_secureflight.pdf
[15] Hosein, I., Transforming travel and border controls: checkpoints in the open society, Government Information Quarterly, 22, 4, 594-622 (2005)
[16] O’Harrow, R., No place to hide (2005), Free Press: Free Press New York
[17] Transportation Security Administration. Secure Flight Program—November 1 Changes. Available from: 〈http://www.tsa.gov/what_we_do/layers/secureflight/; Transportation Security Administration. Secure Flight Program—November 1 Changes. Available from: 〈http://www.tsa.gov/what_we_do/layers/secureflight/
[18] Kircher, J. C.; Raskin, D. C., Comment: base rates and the statistical precision of polygraph tests in various applications, Statistical Science, 2, 3, 226-228 (1987)
[19] Chawla, N. V.; Bowyer, K. W.; Hall, L. O.; Kegelmeyer, W. P., SMOTE: synthetic minority over-sampling technique, Journal of Artificial Intelligence Research, 16, 1, 321-357 (2002) · Zbl 0994.68128
[20] Han H, Wang, WY, Mao BH. Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. In: Proceedings of the international conference on intelligent computing (ICIC), 2005. p. 878-87.; Han H, Wang, WY, Mao BH. Borderline-SMOTE: a new over-sampling method in imbalanced data sets learning. In: Proceedings of the international conference on intelligent computing (ICIC), 2005. p. 878-87.
[21] Chawla, N. V.; Lazarevic, A.; Bowyer, K. W.; Hall, L. O.; Bowyer, K. W., SMOTEBoost: improving prediction of the minority class in boosting, Proceedings of the Principles and Practice of Knowledge Discovery in Databases (PKDD), 107-119 (2003)
[22] Alhammady H, Ramamohanarao K. Using emerging patterns and decision trees in rare-class classification. In: Proceedings of the fourth IEEE international conference on data mining (ICDM’04), 2004. p. 315-8.; Alhammady H, Ramamohanarao K. Using emerging patterns and decision trees in rare-class classification. In: Proceedings of the fourth IEEE international conference on data mining (ICDM’04), 2004. p. 315-8.
[23] Alhammady H. A novel approach for mining emerging patterns in rare-class datasets. In: Tarek Sobh, editor. Innovations and advanced techniques in computer and information sciences and engineering. Netherlands: Springer; 2007. p. 207-11.; Alhammady H. A novel approach for mining emerging patterns in rare-class datasets. In: Tarek Sobh, editor. Innovations and advanced techniques in computer and information sciences and engineering. Netherlands: Springer; 2007. p. 207-11.
[24] Carvalho, D. R.; Freitas, A. A., A hybrid decision tree/genetic algorithm method for data mining, Information Sciences, 163, 1, 13-35 (2004)
[25] Frederickson GH, LaPorte TR. Airport security, high reliability, and the problem of rationality. Public Administration Review 2002;62:33-43 (Special Issue: Democratic Governance in the Aftermath of September 11, 2001).; Frederickson GH, LaPorte TR. Airport security, high reliability, and the problem of rationality. Public Administration Review 2002;62:33-43 (Special Issue: Democratic Governance in the Aftermath of September 11, 2001).
[26] Babu, V. L.L.; Batta, R.; Lin, L., Passenger grouping under constant threat probability in an airport security system, European Journal of Operational Research, 168, 2, 633-644 (2006) · Zbl 1101.90375
[27] Nie X, Batta R, Drury CG, Lin L. Passenger grouping with risk levels in an airport security system. European Journal of Operational Research, in press, doi:10.1016/j.ejor.2007.12.027; Nie X, Batta R, Drury CG, Lin L. Passenger grouping with risk levels in an airport security system. European Journal of Operational Research, in press, doi:10.1016/j.ejor.2007.12.027 · Zbl 1154.90553
[28] Olapiriyakul, S.; Das, S., Design and analysis of a two-stage security screening and inspection system, Journal of Air Transport Management, 13, 2, 67-74 (2007)
[29] Yarnold, P. R.; Soltysik, R. C., Refining two-group multivariable classification models using univariate optimal discriminate analysis, Decision Sciences, 22, 5, 1158-1164 (1991)
[30] Banks, W. J.; Abad, P. L., An efficient optimal solution algorithm for the classification problem, Decision Sciences, 22, 5, 1008-1023 (1991)
[31] Lam, K. F.; Moy, J. W., A simple weighting scheme for classification in two-group discriminate problems, Computers and Operations Research, 30, 1, 155-164 (2006) · Zbl 1118.90310
[32] Patuwo, E.; Hu, M. Y.; Hung, M. S., Two-group classification using neural networks, Decision Sciences, 24, 4, 825-845 (1993)
[33] Archer, N. P.; Wang, S., Application of the back propagation neural network algorithm with monotonicity constraints for two-group classification problems, Decision Sciences, 24, 1, 60-75 (1993)
[34] Zobel, C. W.; Cook, D. F.; Ragsdale, C. T., Data-driven classification using boundary observations, Decision Sciences, 37, 2, 247-262 (2006)
[35] Zhou, Y.; Hahn, J.; Mannan, M. S., Process monitoring based on classification tree and discriminant analysis, Reliability Engineering and System Safety, 91, 5, 546-555 (2006)
[36] US Department of Homeland Security. One Team, One Mission, Securing our Homeland—US Department of Homeland Security Strategic Plan Fiscal Years 2008-2013, September 16, 2008. Available from: 〈http://www.dhs.gov/xlibrary/assets/DHS_StratPlan_FINAL_spread.pdf; US Department of Homeland Security. One Team, One Mission, Securing our Homeland—US Department of Homeland Security Strategic Plan Fiscal Years 2008-2013, September 16, 2008. Available from: 〈http://www.dhs.gov/xlibrary/assets/DHS_StratPlan_FINAL_spread.pdf
[37] Risk Steering Committee. DHS Risk Lexicon 2010 Edition. US Department of Homeland Security, September 2010. Available from: 〈http://www.dhs.gov/xlibrary/assets/dhs-risk-lexicon-2010.pdf; Risk Steering Committee. DHS Risk Lexicon 2010 Edition. US Department of Homeland Security, September 2010. Available from: 〈http://www.dhs.gov/xlibrary/assets/dhs-risk-lexicon-2010.pdf
[38] Office of Risk Management and Analysis. Mission Statement. Available from: 〈http://www.dhs.gov/xabout/structure/gc_1287674114373.shtm; Office of Risk Management and Analysis. Mission Statement. Available from: 〈http://www.dhs.gov/xabout/structure/gc_1287674114373.shtm
[39] O’Hagan, A.; Buck, C. E.; Daneshkhah, K.; Eiser, J. R.; Garthwaite, P. H.; Jenkinson, D. J., Uncertain judgements: eliciting experts’ probabilities (2006), Wiley: Wiley New York · Zbl 1269.62009
[40] Power, D. J.; Sharda, R., Model-driven decision support systems: concepts and research directions, Decision Support Systems, 43, 3, 1044-1061 (2005)
[41] Zhu, H.; Beling, P. A.; Overstreet, G. A., A Bayesian framework for the combination of classifier outputs, Journal of the Operational Research Society, 53, 7, 719-727 (2002) · Zbl 1130.90352
[42] Herguth, R. C., Air travelers will be color coded by threat, Chicago Sun Times (2004), January 13
[43] National Research Council, Protecting individual privacy in the struggle against terrorists: a framework for program assessment (2008), The National Academies Press: The National Academies Press Washington, DC
[44] Hsu, C.; Wallace, W., An industrial network flow information integration model for supply chain management and intelligent transportation, Enterprise Information Systems, 1, 3, 327-351 (2007)
[45] Li, H.; Bao, Y.; Ou, J., Structural damage identification based on integration of information fusion and shannon entropy, Mechanical Systems and Signal Processing, 22, 6, 1427-1440 (2008)
[46] Wang, K.; Bai, X.; Li, J.; Ding, C., A service-based framework for pharmacogenomics data integration, Enterprise Information Systems, 4, 3, 225-245 (2010)
[47] Nunnally, J. C., Psychometric theory (1978), McGraw Hill: McGraw Hill New York
[48] Pawlowski A. TSA boosts ‘behavior detection’, mulls other changes, CNN.com/travel, November 19, 2008. Available from: 〈http://edition.cnn.com/2008/TRAVEL/11/19/airport.security.holiday.season/index.html?iref=newssearch; Pawlowski A. TSA boosts ‘behavior detection’, mulls other changes, CNN.com/travel, November 19, 2008. Available from: 〈http://edition.cnn.com/2008/TRAVEL/11/19/airport.security.holiday.season/index.html?iref=newssearch
[49] Schneier, B., Beyond fear—thinking sensibly about security in an uncertain world (2003), Springer: Springer New York
[50] Yan, Q., A security evaluation approach for information systems in telecommunication enterprises, Enterprise Information Systems, 2, 3, 309-324 (2008)
[51] PlaneCrashInfo.com. Available from: 〈http://www.planecrashinfo.com/; PlaneCrashInfo.com. Available from: 〈http://www.planecrashinfo.com/
[52] Gibb G. Concern Remains over Airline Wiring, LawyersandSettlement.com, September 3, 2008. Available from: 〈http://www.lawyersandsettlements.com/features/plane-crash-airplane-peggys-cove-anniversary.html; Gibb G. Concern Remains over Airline Wiring, LawyersandSettlement.com, September 3, 2008. Available from: 〈http://www.lawyersandsettlements.com/features/plane-crash-airplane-peggys-cove-anniversary.html
[53] Simpson, C. T.S. A., Budget boost may benefit makers of screening gear, Wall Street Journal (2009), May 7. Available from: 〈http://online.wsj.com/article_email/SB124173067938597777-lMyQjAxMTIxNDIxNTcyMzUwWj.html〉
[54] Strom C. Budget analysts put price tag on TSA pay overhaul. Congress Daily, September 2, 2009. Available from: 〈http://www.govexec.com/dailyfed/0909/090909cdpm1.htm; Strom C. Budget analysts put price tag on TSA pay overhaul. Congress Daily, September 2, 2009. Available from: 〈http://www.govexec.com/dailyfed/0909/090909cdpm1.htm
[55] Spiring, F. A., The reflected normal loss function, Canadian Journal of Statistics, 21, 3, 321-330 (1993) · Zbl 0788.62089
[56] Sun, F.-B.; Laramee, J.-Y.; Ramberg, J. S., On Spiring’s normal loss function, Canadian Journal of Statistics, 24, 2, 241-249 (1996) · Zbl 0858.62092
[57] Tsikriktsis, N.; Heineke, J., The impact of process variation on customer dissatisfaction: evidence from the US domestic airline industry, Decision Sciences, 35, 10, 129-142 (2004)
[58] Schneier, B., Schneier on security (2008), Wiley: Wiley New York
[59] Xu, L., Toward escape from the limitations of systems analysis: introduction of dimensionality, Systems Research, 4, 243-250 (1987)
[60] Slobogin, C., Privacy at risk: the new government surveillance and the fourth amendment (2007), University of Chicago Press: University of Chicago Press Chicago, Illinois
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.