The role of customs in securing containerized global supply chains

The role of customs in securing containerized global supply chains

Accepted Manuscript The Role of Customs in Securing Containerized Global Supply Chains M. Pourakbar, R. Zuidwijk PII: DOI: Reference: S0377-2217(18)...

1002KB Sizes 4 Downloads 74 Views

Accepted Manuscript

The Role of Customs in Securing Containerized Global Supply Chains M. Pourakbar, R. Zuidwijk PII: DOI: Reference:

S0377-2217(18)30406-5 10.1016/j.ejor.2018.05.012 EOR 15125

To appear in:

European Journal of Operational Research

Received date: Revised date: Accepted date:

9 October 2016 3 April 2018 8 May 2018

Please cite this article as: M. Pourakbar, R. Zuidwijk, The Role of Customs in Securing Containerized Global Supply Chains, European Journal of Operational Research (2018), doi: 10.1016/j.ejor.2018.05.012

This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.

ACCEPTED MANUSCRIPT

Highlights • Container inspection rate is optimized using a game between Customs and antagonist. • The trade-off is economic impact on public and private parties and security.

CR IP T

• Containers Informational and physical inspection rates are functions of risk levels.

AC

CE

PT

ED

M

AN US

• Incentive mechanisms to build public private partnership for security are developed.

1

ACCEPTED MANUSCRIPT

Supply Chains

CR IP T

The Role of Customs in Securing Containerized Global

M. Pourakbar, R. Zuidwijk

Rotterdam School of Management, Erasmus University

AN US

Burgemeester Oudlaan 50, 3000DR Rotterdam, The Netherlands [email protected], [email protected]

AC

CE

PT

ED

M

Corresponding author: Morteza Pourakbar, [email protected], Phone: (+31) 10 - 40 82775

2

ACCEPTED MANUSCRIPT

Abstract Customs has to deal with a massive number of containers arriving at ports. This massive flow of cargo provides an opportunity for organized crime infiltration. Risk management and the security of the supply chain has become a top priority for Customs administrations and for

CR IP T

private firms. In this paper, we develop models that allow Customs to optimize its inspection process to target high-risk containers without hindering the flow of safe containers with extra delays at ports. The model characterizes optimal informational and physical inspection rates as a function of the risk factors attributed to containers. We use this model to analyze how an effective public-private partnership for risk and security management can be established

AN US

between Customs and private firms.

Key words: supply chain management; security management; public-private partnership; cus-

AC

CE

PT

ED

M

toms; game theory

3

ACCEPTED MANUSCRIPT

1

Introduction

Seaports handle billions of metric tons of import/export cargo annually. This massive flow of cargo provides a huge opportunity for antagonists (including smugglers, traffickers, terrorists, and fraudsters) to infiltrate this channel. Customs plays a prominent but challenging role in stopping the

CR IP T

flow of illicit products. The operating environment of Customs administrations is characterized by a constantly changing risk landscape. Customs antagonists are dynamic enemies who review and reshape their operations constantly. These illicit operators seek high profits and low-risk business opportunities, much as their legal counterparts do, while adopting new ways to conceal illicit

AN US

items, forge trading documents, or solicit Customs officers. Customs is concerned with all the risks related to the cross-border movement of goods, with the following characteristics: 1) Belong to Customs responsibilities as stated in the Customs law; 2) Have negative impacts on citizens and/or nations such as security, safety, health, and economics etc.; 3) Cause problems in costs, liabilities and reputational issues of supply chains (Hintsa et al. [2011]).

M

Transport security is largely dependent on Customs efforts. Prior to September 11, 2001 most

ED

discussions on transportation security focused on controlling theft and reducing contraband. After September 11, the highest-order definition of freight security changed from theft-proof to tamperproof. Suddenly, intermodal containers became potential weapon delivery systems. Since then,

PT

security issues have become one of the primary concerns for both Customs and supply chains.

CE

Customs efforts to secure supply chains, society and the public are not limited to anti-terrorist activities. A high level of attention is paid to trafficking (both human and drug), smuggling, and

AC

counterfeiting. Customs main approach towards preventing illicit and threatful shipments from entering society is informational or physical inspection. Cargo inspections might take place at the time of stuffing the container at the point of origin. Accordingly, for some countries carriers are required to submit manifest information even before cargo is loaded onto a vessel. Customs then performs a background screen on the manifest, carrier, and shipper to determine if the shipment poses a risk to society. Customs performs additional screening prior to shipment arrival via a computerized targeting system. Physical inspections also take place at the port of destination. 4

ACCEPTED MANUSCRIPT

Given the capacity limitations of Customs, a percentage of incoming containers are selected for additional scrutiny. It consists of scanning via an X-ray or a gamma-ray scanner. Inspectors examine the scanned images for discrepancies with the manifest and for other signs of risk. In some cases, physical inspection is required in which the container is opened and its contents unloaded

CR IP T

and examined (Moore [2007]). Inspections are time-consuming and therefore costly for both Customs and supply chains. Bakshi and Gans [2010] report that unanticipated container delays at an inspection facility can cause costly supply chain disruptions equal to 0.5% of the value of a container per day. One of the main challenges for Customs is to design an inspection policy so that the positive impact of mitigating

AN US

the risk of a threatful container escaping Customs inspection outweighs the negative impact of extra delays, costs, and inefficiencies imposed on supply chain parties. Any changes in inspection policy raises several issues such as purchasing, operating, and maintaining additional facilities, as well as possible changes in container delivery time. Therefore, the main trade-off for Customs, given its

M

limited resources, is how to balance the cost of inspection incurred by both Customs and firms and to mitigate security risks. In order to address these concerns, we develop an optimal inspection

ED

policy, which addresses the trade-off between cost efficiency and security. Such a policy should utilize Customs’ limited resources to target containers with high-risk profiles and to prevent them

PT

from entering legitimate supply chains. This should be done effectively and efficiently without creating an operational obstacle for supply chain firms. As the first contribution of this paper, we

CE

model this as a sequential game between Customs and the antagonist, in which the antagonist sets the rate of infiltration and Customs reacts accordingly and sets inspection policies. In this setting,

AC

we consider the impact of Customs information and physical inspection policies on the possible cost incurred by business firms and on the mitigation of security risks. We show that the optimal inspection policy should take into account the containers’ risk profile and allocate resources accordingly. More specifically, we find the optimal percentage of containers with a specific risk factor that should be inspected through informational and physical inspection processes. We show that, as intuition dictates, containers with higher risk factors should be inspected more frequently.

5

ACCEPTED MANUSCRIPT

These results are formulated in theorems 4 and 5 in Section 5. We also examine, as the second contribution of this paper, how a public-private partnership for security enhancement between Customs and business firms can be established. Even though Customs administrations are in the front-line of battling illicit activities, the physical flow of goods

CR IP T

and its related information is in the hands of private companies that own the shipments, containers, and ships. Therefore, Customs needs private sector information on the containers’ histories to assess how secure these containers are, and private companies need the benefits of the intelligence and enforcement resources owned by government to reduce the probability of disruptions in their supply chains. Moreover, private parties need to be assured that Customs inspections will

AN US

not cause major disruptions in the flow of containers, and might be even willing to invest in facilitating Customs inspections. This explains why public-private partnerships (PPP) have become a major point of discussion in businesses and government agencies concerned with homeland security (Busch and Givens [2012]). Furthermore, PPP is a significant and enduring part of critical

M

infrastructure protection initiatives and plays a paramount role in achieving supply chain resilience (Sheffi [2007]). There have been various mechanisms for establishing a public-private partner-

ED

ship between Customs and business firms to enhance security. Some private companies invest in Customs’ inspection facilities to ensure a smooth flow of their own cargo. For example, APM

PT

Terminals has invested in a $10 million container inspection facility in Nigeria for the physical examination of containers by Customs operatives. This facility introduces measures to aid prompt

CE

service delivery at the port (APM-Terminals [2011]). There are also other forms of partnerships aiming at sharing information between Customs and private firms. They are mainly based on

AC

the fact that firms have access to valuable sources of information that Customs can use to target high-risk containers. In addition, private firms can also piggyback on Customs’ risk management systems to improve their security. For example, the EU 7th Framework Program project CASSANDRA - Common Assessment and Analysis of Risk in Global Supply Chains - aims at introducing a data pipeline for the exchange of required information along the entire supply chain. This enables open, flexible and standardized communication amongst all partners (CASSANDRA [2013]). An-

6

ACCEPTED MANUSCRIPT

other example of PPP through data and information sharing is Interface Public Member (IPM), which is a global anti-counterfeiting tool currently used by one third of WCO Members (WCO [2012]). Using this platform, Customs officers can access IPM anywhere in the world via a simple and secure interface available in their national language. Customs officers can log on at any time

CR IP T

to learn about a variety of products, brands, and the distinguishing features between counterfeit and genuine products. IPM is freely available to all of member Customs administrations. Sharing counterfeit related information by both Customs and supply chains through IPM can help both parties in implementing an effective anti-counterfeiting strategy. Using a principal-agent modeling approach, we model two viable scenarios, namely, investment in physical inspection facilities and

AN US

information technology enhancements. We are able to characterize efficient investment thresholds that could lead to collaboration and partnership between public and private firms resulting in

2

Literature Review

M

improved security management.

ED

Although governments and governmental agencies play a significant role in securing supply chains, and their actions impact supply chains’ performance significantly, their role has not received the at-

PT

tention it deserves in the operations management/supply chain management literature. Few papers have studied the role of government’s security initiatives on the operational aspects of cross-border

CE

supply chains. Lee and Whang [2005] describe how the principles of total quality management can actually be used to design and operate processes to assure supply chain security. They argue

AC

that higher quality can be attained at lower cost by proper management and operational design, and that this central theme of the quality movement is also applicable in supply chain security. They consider the Smart and Secure Trade-lanes initiative (SST) and show how supply chain security can be obtained at lower cost by using simple quantitative tools. They show that real time information of containers while in transit can be utilized to significantly lower inventory costs. Wein et al. [2006] develop a mathematical model to find the optimal inspection strategy for the detection of an

7

ACCEPTED MANUSCRIPT

illicit nuclear weapon. Considering an 11-layer security system, the study suggests that employing high-energy x-ray radiography and elongating passive neutron tests at overseas ports may provide cost savings. Kantor and Boros [2010] argue that the best detection rates are achieved when the available budget is allocated between screening and unpacking using a mixture of strategies that

CR IP T

maximize detection rate. They show that this yield increases as much as 100% in detection, without a significant increase in inspection costs. Bakshi et al. [2011], using discrete event simulation based on actual data, empirically show that the current screening regime is not effective, and a twostep screening process (with a rapid primary screening of all cargo, followed by a more detailed screening of those containers that failed the first test) might be better. The most related paper to

AN US

ours is the one by Bakshi and Gans [2010] that develops an economic model in which the government provides incentives to firms in the form of reduced inspections if the firms decide to comply with Customs-Trade Partnership Against terrorism (C-TPAT) security initiative. Our paper differs from [Bakshi and Gans, 2010] as we consider a sequential multi-level inspection process and we

M

characterize the optimal inspection rate at each level as a function of risk levels. Additionally, we develop incentive mechanisms to initiate public private partnership (PPP) between customs and

ED

supply chain firms. Moreover, we find investment thresholds to establish an effective partnership. Research in the area of homeland security has also examined how government strategies can

PT

directly impact adversary’s actions such as terrorist attacks. For example, Haphuriwat et al. [2011] study the 100% inspection policy imposed by the US government at either US or foreign ports.

CE

They quantify a game-theoretical model of terrorist decision making to understand the role of nuclear detection technologies in deterring nuclear terrorism. Based on the level of retaliation

AC

imposed by the terrorist, they are able to determine whether a 100% inspection should be conducted or whether partial inspection is sufficient. This stream of research is broadly categorized as defender-attacker problems and explores the efficiency of government risk mitigation strategies against terrorist infiltration risk (Zhuang and Bier [2007], Bier [2007], Pinker [2007], Bakir [2011], Wang and Zhuang [2011], Nikoofal and Zhuang [2012], and Rios and Insua [2012] ). Given that this paper focuses on finding an optimal inspection policy taking into account se-

8

ACCEPTED MANUSCRIPT

curity considerations, another relevant body of literature concerns the passengers airline security inspection. After September 11 attacks, there has been a growing body of literature on designing and optimizing passengers security inspections at airports. There is a number of inspections done on passengers as well as on baggages to check if there are any threats entering the system. Some

CR IP T

of the studies investigate the advantages of classifying passengers into different groups and find the degree of inspection required for each group such that the security risks are minimized. Using queuing theory, Babu et al. [2006] develop a model determining the number of groups, the fraction of passengers and their assignment to check points such that the passenger inconvenience is minimized. Nie et al. [2009] extend this work by relaxing the assumption that the threat probability is

AN US

constant across all passengers. They assume that passengers are classified into several risk classes via a pre-screening system. Additionally, the staffing level at each check point is considered in the model. McLay et al. [2010] develop a model to sequentially and optimally assign passengers to airport security checkpoints. In their setting, the authors assume that risk levels are determined

M

through a pre-screening system and these levels are used to optimally assign passengers to inspection resources such that the total security is maximized subject to capacity and assignment

ED

constraints. The problem is modeled as a Markov decision process and the assignment policy is found using dynamic programming. Nie et al. [2012] explain that there are two kinds of screening

PT

lanes in a typical US airport, namely, a normal lane and a selectee lane. They argue that a selectee lane is not effectively utilized and only a small number of passengers are selected to go through

CE

it. They develop a simulation based model to assign passengers from different risk classes to the selectee lane based on the number of passengers already waiting in the selectee lane.

AC

What differentiates our work from the previous studies are as follows: First it develops a holis-

tic view integrating all Customs’ inspection processes. The proposed model includes all primary informational, secondary informational, and physical inspections and their inherent errors such as the risk of false detention of safe containers as well as false release of risky containers. Second, this model does not focus on a specific risk and it can be used to address several categories of risks be it terrorist, counterfeiting, or smuggling, because it incorporates the impact of risk mitigation

9

ACCEPTED MANUSCRIPT

strategies on both society and business firms. Third, we quantify the impact of the delay caused by increased inspections on business firms. We consider the trade-off between inefficiency due to delays and improved risk and security status. Fourth, we also model real-world public private partnership mechanisms for enhancing the security of maritime logistics. Using this modeling

CR IP T

framework, we obtain investment thresholds to promote the establishment of an effective PPP. As previously emphasized, it has been advocated that maritime security management requires a high level of collaboration between governments and supply chain firms and our model helps to identify and signify the efficient collaboration mechanisms.

The rest of this paper is structured as follows: We describe the problem in the next section

AN US

and model Customs’ and the antagonist’s problems in Section 3. In Section 4, we develop optimal inspection policies for both primary informational and physical inspections. Section 5 presents a numerical analysis of the base case and Section 6 extends the model to account for public-private

Problem definition

ED

3

M

partnership mechanisms. Section 7 concludes the paper.

Essentially, all Customs inspections are done in two stages, as outlined in Figure 1. The first stage

PT

is about informational inspection of the data and documents of the containers and at the second stage, if needed, the contents of the containers are physically inspected. The first stage consists

CE

of two substages, namely, primary informational and secondary informational inspection. Once a preliminary declaration is placed and prior to the arrival of a container, a container undergoes

AC

primary informational inspection. This inspection is based on processing container related data including manifest documents, and bill of lading, etc. Some containers belonging to trusted parties are considered to be low-risk. These are green-flagged and are not subject to further inspection. The output of inspection assigns a risk score z to each container. This risk score signifies the level of risk associated with the container and is defined as P{no alarm | threat}. Hence, 1 − z signifies the discovery of a threat immediately after primary informational inspection. According

10

ACCEPTED MANUSCRIPT

release α2, β2

no signal

First stage: secondary informational inspection

flag green

𝑧 no alarm

alarm 1−𝑧 detain

release

PR{z} flag red

P{y}

CR IP T

threat assign risk score 𝑧 no threat

First stage: primary informational inspection

alarm 1−𝑦

detain

1-PR{z}

1-P{y}

𝛼,𝛽

Second stage: physical inspection

AN US

ℎ(𝑧)

assign risk score 𝑦

signal

flag orange α1, β1

no alarm 𝑦

𝑔(𝑦)

release

detain

Figure 1: Customs inspection processes

M

to the value of z, Customs might identify some high-risk containers. These are red-flagged and

ED

must undergo physical inspection. However, the value of z might not be decisive enough and further informational inspection might be required. In such a case, the container is medium-risk and is orange-flagged. This is time-consuming and therefore costly for both Customs and business

PT

firms because the containers need to wait at Customs until the authorities decide on further action.

CE

Depending on the attributed risk score, z, the authorities decide which percentage of containers with a risk score of z, are to be sent for further secondary informational inspection (orange-flagged)

AC

and which percentage are to be physically inspected (red-flagged). These percentages are denoted by PO {z} and PR {z}, where PO {z} = 1 − PR {z}. Moreover, h(z) and H(z) are defined as the density and cumulative functions of risk levels after primary informational inspection. Orange-flagged containers are sent for a more sensitive secondary informational inspection,

where further documentation screening takes place. If the container triggers an alarm signal after the secondary informational inspection, the container is detained. If no alarm signal is triggered, a risk factor y is attributed to the container. y basically means that secondary informational inspec11

ACCEPTED MANUSCRIPT

Table 1: Table of notaion

CR IP T

Definition Risk level assigned after primary informational inspection Risk level assigned after secondary informational inspection Density and cumulative functions of risk levels at primary informational inspection Density and cumulative functions of risk levels at secondary informational inspection Type I errors of, respectively, primary informational, secondary informational and physical inspections Type II errors of, respectively, primary informational, secondary informational and physical inspections Percentage of containers sent for physical inspection after primary informational inspection Percentage of containers sent for physical inspection after secondary informational inspection Antagonist’s penalty if a threat is detected The delay cost of a safe container caused by a false detention The waiting cost of a safe container while undergoing physical inspection Antagonist’s profit if a risky container escapes inspections Customs cost of inspecting a container per time unit Customs cost of detaining a container per time unit Arrival rate of containers at primary informational inspection Rate of antagonist’s container infiltration

AN US

Notation z y h(z) and H(z) g(y) and G(y) α1 , α2 and α β1 , β2 and β PR {z} P{y} Lf Ld Lw Le ws wd µ γ

tion does not raise any alarm, even though the container might carry a threat. Thus (1 − y) signifies

M

the discovery of a threat. Similar to primary informational inspection, g(y) and G(y) are defined as the density and cumulative functions of risk levels after secondary informational inspection.

ED

According to the output of secondary informational inspection, the system decides whether to send the container for physical inspection or to release it. The higher the risk factor attributed to the

PT

container, the more likely it is to be flagged for physical inspection. P{y} denotes the percentage of containers with risk factor y flagged for physical inspection.

CE

We assume that the antagonist’s affordability to penetrate in legitimate channels is limited. This is denoted by γ as a fraction of the total number of containers. The antagonist has to choose which

AC

containers with a certain risk level to infiltrate. We model the interaction between the antagonist and Customs as a Stackelberg game and use backward induction to determine the optimal inspection policies. From the antagonist’s perspective, it is optimal to infiltrate containers that offer the highest profit. If a container is detained by Customs, a penalty Lf (Lf < 0) applies depending

on the type of risk. If a container escapes Customs inspections, the antagonist gains a benefit that amounts to Le . Moreover, it is worth noting that some adversaries such as counterfeiters, do not 12

ACCEPTED MANUSCRIPT

only benefit from diluting the stream of legitimate cargo, but also take advantage of perturbing the stream of licit cargo. This is because any delay in the delivery of genuine products might provide opportunities for counterfeiters to sell counterfeit products in the market. Thus, we incorporate the cost of detention delays, Ld , and the waiting cost of safe containers while undergoing physical

CR IP T

inspection, Lw , in the profit function of the antagonist. In our setting, during primary informational inspection the authorities need to set PR {z} and consequently PO {z}. For physical inspection, P{y}, the rate of containers flagged for physical inspection with a risk level y has to be decided. We also assume that there are inspection error inherent to each inspection process. The errors included in the model are type I and II errors.

AN US

Type I error happens when a safe container is detained and type II error occurs once a risky container is released after inspection. For primary and secondary informational inspections we define αi and βi where i ∈ {1, 2} as the type I and II errors, respectively. They are defined as αi = P{threat detected | safe} and βi = P{no threat detected | threat}. For physical inspection,

Modeling Customs’ and Antagonist’s Problems

ED

4

M

we similarly define these error terms as α and β. All notation are summarized in Table 1.

PT

First, we model the antagonist’s profit function associated with primary informational inspection. Given a stream of containers with risk score z and inspection probability PR {z}, the antagonist’s

CE

profit function, if she decides to infiltrate these containers, is expressed by Π1a = (1 − z) [(1 − γ)α1 E{Ld } + γ(1 − β1 )Lf ] 

AC h



+z PR {z} α1 (1 − γ)(E{Lw } + αE{Ld }) + (1 − β1 )γ(βLe + (1 − β)Lf ) + (1 − PR {z})Π2a (1)

The first term in relation (1) expresses the antagonist’s profit if a container with risk score z is detained with probability (1 − z). If the antagonist is, for example, a counterfeiter she gains an expected benefit of (1 − γ)α1 E{Ld } from the delay caused in the flow of legitimate containers but 13

i

ACCEPTED MANUSCRIPT

incurs a cost if containers are found to be counterfeit. This cost is equal to γ(1 − β1 )Lf . A risky container will not trigger an alarm signal with probability z. This leads to a fraction of containers with risk score z, PR {z}, to be flagged for physical inspection. If the container is legitimate but is flagged for physical inspection because of an error during primary informational inspection,

CR IP T

α1 , the expected profit for the antagonist equals α1 (1 − γ)(E{Lw } + αE{Ld }). However, if an infiltrated container is not red-flagged, because of a type II error during primary informational inspection, β1 , it will be detected during physical inspection with probability (1 − β) and the antagonist incurs a cost of Lf . Otherwise, it escapes physical inspection and the antagonist gains a profit of Le . A container with risk score z is flagged for secondary informational inspection with

AN US

probability (1 − PR {z}) and the antagonist gains a profit of Π2a . The antagonist’s profit is Π2a after the container is flagged orange for secondary informational inspection. Π2a will be modeled later in this section. For the sake of simplicity, we assume that the profit of the antagonist is equal to the collective loss of Customs and business firms. Thus, the government decides on PR {z} such that

M

expected total cost for Customs and business firm is minimized as follows: min Π1a = (1 − z) [(1 − γ)α1 E{Ld } + γ(1 − β1 )Lf ]

ED

PR {z}

  i 2 +z PR {z} α1 (1 − γ)(E{Lw } + αE{Ld }) + (1 − β1 )γ(βLe + (1 − β)Lf ) + (1 − PR {z})Πa (2)

PT

h

Customs decides on PR {z} such that the benefits for the antagonist is minimized. We now calculate

CE

the benefits for the antagonist after physical inspection. Depending on the risk factors attributed to the containers, y, distributed according to g(y), and inspection errors α2 and β2 , the expected

AC

benefit for the antagonist by targeting γ percent of containers is as follows  Π2a = (1 − y)[γ(1 − β2 )Lf + (1 − γ)α2 E{Ld }] + y (1 − P{y})γβ2 Le

   i h  +P{y} γβ2 (1 − β)Lf + βLe + (1 − γ)(1 − α2 ) αE{Ld } + E{Lw }

14

(3)

ACCEPTED MANUSCRIPT

α2 and β2 denote errors associated with secondary informational inspection. The profit function of the antagonist after physical inspection (3) follows the same rationale as that of (1). If the container triggers an alarm signal during inspection, with probability (1−y), the antagonist benefits (1 − γ)α2 E{Ld } if it is a safe container because of a type I error, α2 , during the inspection process.

CR IP T

However, if it is a risky container, the antagonist will incur a cost of γ(1−β1 )Lf . If no alarm signal is triggered, with probability y, then a percentage of (1 − P{y}) is released and the antagonist gains γβ2 Le which is proportional to a type II error during secondary informational inspection, β2 . P{y} percent of containers with a risk score of y are flagged for physical inspection after the secondary informational inspection. If the container is safe and flagged for physical inspection

AN US

because of a type I error during secondary informational inspection, the antagonist’s expected benefit is (1 − γ)(1 − α2 )[αE{Ld } + E{Lw }]. Similarly, if a container is infiltrated and flagged for physical inspection, the antagonist’s expected profit is γβ2 [(1 − β)Lf + βLe ]. In order to determine Customs equilibrium strategy, given capacity limitations, the admin-

minimized. The expected total cost is

M

istration sets P{y} such that the expected loss to the society and the legitimate supply chain is

ED

 minΠ2a = (1 − y)[γ(1 − β2 )Lf + (1 − γ)α2 E{Ld }] + y (1 − P{y})γβ2 Le P{y}

(4)

PT

   i h  +P{y} γβ2 (1 − β)Lf + βLe + (1 − γ)(1 − α2 ) αE{Ld } + E{Lw }

CE

Inspections are costly for business firms. They are willing to participate as long as the cost incurred by the antagonist due to inspections outweighs the cost incurred by them because of perturbations

AC

in the legitimate channel due to increased levels of inspections. In other words, to avoid trivial solutions, we assume that the benefits of avoiding a threat should exceed the inspection costs incurred by firms. The non-triviality assumptions are stated for all physical, secondary and primary informational inspections, respectively, as follows:

γβ2 (1 − β)(Le − Lf ) ≥ (1 − γ)(1 − α2 )(αE{Ld } + E{Lw }) 15

(5)

ACCEPTED MANUSCRIPT

, γ(1 − βi )(−Lf ) ≥ (1 − γ)(αi E{Ld } + E{Lw }), i ∈ {1, 2}

(6)

γ(1 − β1 )(1 − β)(Le − Lf ) ≥ (1 − γ)α1 (αE{Ld } + E{Lw })

(7)

and

CR IP T

These constraints, corresponding to physical, secondary informational, and primary informational inspections, respectively, basically mean that the direct benefits of seizing a risky container should outweigh the indirect costs caused by increased inspections. The left-hand side of expression (5) indicates the expected benefits of detaining a threatful container flagged for physical inspection af-

AN US

ter secondary informational inspection. Customs benefits from penalizing the antagonist and from not allowing the antagonist to benefit from Le . The right-hand side of this expression indicates the costs of such a secondary informational inspection policy. The cost includes the waiting, delay and false detention costs imposed on business firms. As indicated in the inspection process diagram

M

in Figure 1, both primary and secondary informational inspections can lead to an immediate detention, (6) can ensure that the benefits of detention of rightly detected threat outweighs the cost

ED

of false detention of safe containers during both primary and secondary informational inspections. Relation (7) is similar to relation (5) expressed for primary informational inspection.

PT

However, we should note it is practically impossible for Customs to detect all risks. Eventually, counterfeiters, smugglers, and other adversaries are able to conceal some parts of their activities

CE

from Customs inspection. We assume that the antagonist determines her activities so that the gains through orange stream is non-negative. i.e., (Π2a ≥ 0). It is highly unlikely that a container

AC

flagged for physical inspection leaves the inspection facility undetected. The antagonist’s main profit comes from orange-flagged containers released before being sent for physical inspection.

4.1

Inspection Processes

The effectiveness of inspection procedures highly depends on the time and care with which they are conducted. For example, the amount of time and care spent on analyzing the data associated 16

ACCEPTED MANUSCRIPT

with containers, interpreting X-ray images or physically inspecting containers play a vital role in identifying threat. Following the same approach as Bakshi and Gans [2010] we define Si as the time spent during the inspection procedure, and we model inspection time as a function of errors

Si = ψ(κi , αi , βi ) + φi

CR IP T

and inspection capacity as follows:

(8)

where φi is a random variable to incorporate the randomness involved in the procedure. An instance for ψ(κi , αi , βi ) to model the physical inspection process is ln(α) ln(β) − . κ κ

AN US

ψ(κ, α, β) = −

(9)

κ ≥ 1 indicates the inspection capacity i.e. the number of staff conducting inspection or the number or capacity of machines used in the process. We assume that the inspection process is

M

rigorous and as a measure for rigorousness we assume that error terms are not very high and are

Congestion at Physical Inspection Facility

PT

4.2

ED

such that α, α1 , α2 , β, β1 and β2 ≤ 0.5.

To make the problem analytically tractable, we assume that orange-flagged containers arrive at the

CE

physical inspection facility according to a Poisson process. Thus, the inspection process can be modeled as an M/G/1 queue. Additionally, we assume that there is only one inspection facility.

AC

These assumptions allow us to include an analytical expression for the number of containers at the inspection facility. θ defined as follows indicates the fraction of orange-flagged containers, which

are subject to physical inspection.

θ=

Z

0

1

P{y}h(y)dy

17

(10)

ACCEPTED MANUSCRIPT

Similarly, the fraction of containers flagged red after primary informational inspection and are subject to physical inspection is calculated according to

θR =

Z

1

0

PR {z}g(z)dz.

(11)

CR IP T

Assuming that containers arrive for primary informational inspection according to a Poisson process with arrival rate µ, the arrival rate at the physical inspection facility, for tractability reasons, is also assumed to follow a Poisson process with mean λ = (θ + θR )µ. Using the properties of M/G/1 queue, the expected number of containers either undergoing inspection or waiting to be processed

AN US

is given according to

Expected # of containers in physical inspection = N{S p } = λE{S} + (λ)2 where ρ2 is the utilization rate of the inspection facility and is defined as

E{S 2 } 2(1 − ρ2 )

λ . E{S}

(12)

Although the

M

objective functions in (2 and 4) incentivize Customs to keep the error terms as small as possible, concern for the viability of its own administration prevent it from simply setting them equal to

ED

zero. Specifically, Customs is willing to reduce errors as long as inspection induced congestion

E{S } λE{S} + (λ)2 2(1−ρ ≤n 2) 2

(13)

CE

PT

does not surpass a certain threshold given by the following:

This can be interpreted as Customs’ physical and capacity constraints. For example, it might have

AC

limited capacity that can only process up to n containers in a certain time period. Customs by setting PR {z} and P{y} influences θ and θR and accordingly λ. Thus, Customs has to set PR {z}

and P{y} such that (13) holds.

18

ACCEPTED MANUSCRIPT

4.3

Congestion at Primary informational Inspection

Assuming that containers arrive at the primary informational inspection facility according to a Poisson process, we can follow the same approach as physical inspection. However, in this case, the expected time a container undergoes primary informational inspection should not exceed a

CR IP T

certain threshold.

Expected waiting time of a container for primary informational inspection = E{S1 }+µ Thus, we have 2

AN US

E{S1 } ≤τ E{S1 } + µ 2(1−ρ 1)

E{S1 2 } 2(1 − ρ1 ) (14)

(15)

Given the vast number of containers arriving at port, a speedy processing of information is required.

Analysis of the Base Case

M

5

In order to determine the optimal percentage of containers sent to physical inspection after primary

ED

and secondary informational inspections, we use a backward dynamic programming approach with two stages, namely, primary informational and secondary informational inspections. We start back-

PT

ward and first find optimal decision variables for the secondary informational inspection. We can then characterize the optimal primary informational inspection policy. First, we show some prop-

CE

erties that are used to determine the optimal inspection policies.

AC

Lemma 1 We define ` = {y|y offers the maximum benefit to the antagonist} with y ∗ = inf ` and ξ = {z|z offers the maximum benefit to the antagonist} with z ∗ = inf ξ, then • P{y} is strictly increasing over y in ` • PR {z} is strictly increasing over z in ξ. Lemma 1 shows that the riskier the containers are, the higher the percentage that should be flagged for physical inspection. Thus, Customs should allocate a bigger share of its inspection capacity to 19

ACCEPTED MANUSCRIPT

high-risk containers. Moreover, from the antagonist’s perspective, setting higher inspection levels for high-risk containers makes all containers equally likely to be infiltrated. Besides inspection frequency, inspection rigour also plays a key role in establishing an effective inspection process. The more time spent on rigorously inspecting the containers, the less likely it becomes that a risky

CR IP T

container can escape detection or that a safe container is falsely detained. In this model, we do not optimize for inspection errors, but the following lemma states that despite the fact that Customs seeks to minimize these errors, it would never be optimal to set them equal to zero. Lemma 2 If ∃ α, β, α1 , β1 such that ψ(κ, α, β) < ∞ and ψ1 (k, α1 , β1 ) < ∞ then

AN US

• It is never optimal to have α = 0 or β = 0

• It is never optimal to have α1 = 0 or β1 = 0 • It is never optimal to have θ = 0 or θR = 0.

M

The main intuition behind Lemma 2 is that Customs avoids setting very low values for error terms as this imposes huge operational inefficiencies through excessive delays. Moreover, as long as

flagged containers to zero.

ED

there is a threat from an antagonist, Customs should never set the rate of orange-flagged or red-

PT

Lemma 3 Customs space availability constraint is binding in the optimal solution provided that

CE

antagonist benefits, Π1∗ a > 0.

Moreover, Customs processing time constraint for primary informational inspection is binding

AC

in the optimal solution provided that antagonist benefits, Π2∗ a > 0. As intuition dictates, Lemma 3 shows that as long as the antagonist’s profit is positive, Customs

should utilize its capacity to the fullest. Using these properties, we can characterize the optimal physical inspection policy as follows: Theorem 4 P{y}, the percentage of container with risk factor y sent for physical inspection right after secondary informational inspection, can be characterized as follows: 20

ACCEPTED MANUSCRIPT

• if 0 ≤ y ≤ y ∗ then P{y} = 0 • if y ∗ ≤ y < 1 then y∗ γ(1 − β2 )Lf + (1 − γ)α2 E{Ld } − γβ2 Le (1 − ) γ(1 − β2 )[(1 − β)Lf + βLe ] + (1 − γ)α2 [αE{Ld } + E{Lw }] − γβ2 Le y (16)

CR IP T

P{y} =

Theorem 4 states that there is a threshold, y ∗ , on the risk score. As long as a container’s estimated risk is below this threshold, it should not be subject to physical inspection but once the risk score goes beyond this threshold, it should be inspected with a probability P{y}, which is strictly in-

AN US

creasing in y. Similar to physical inspection, we can determine the optimal primary informational inspection as follows:

Theorem 5 Optimal primary informational inspection policy, PR {z}, can be characterized as

• if 0 ≤ z ≤ z ∗ then PR {z} = 0

M

follows:

ED

• if z ∗ ≤ z < 1 then PR {z} is strictly increasing in z and PR {z} should be found such that

CE

PT

the following equation holds

Γ1 − E[Π2a ] z∗ PR {z} = (1 − ) Γ2 − E[Π2a ] z

(17)

AC

where

Γ1 = (1 − γ)α1 E{Ld } + γ(1 − β1 )Lf

and

Γ2 = α1 (1 − γ)(E{Lw } + αE{Ld }) + (1 − β1 )γ(βLe + (1 − β)Lf )

As observed in relations (16) and (17), further characterization of the optimal PR {z} and P{y} is very cumbersome. It is because the choice of PR {z} and P{y} affects waiting and congestion

21

ACCEPTED MANUSCRIPT

Table 2: Parameter setting of the base case scenario Definition Antagonist’s penalty if a threat is detected Antagonist’s profit if a risky container escapes inspections Customs cost of inspecting a container per time unit Customs cost of detaining a container per time unit Arrival rate of containers at primary informational inspection Rate of container infiltration

Value -100 200 15 15 5 0.1

CR IP T

Notation Lf Le ws wd µ γ

related costs in equations (3) and (4). Therefore, for analytical tractability, using Lemma 1, we assume that PR {z} and P{y} are both linear and strictly increasing functions in z and y, respectively.

AN US

More particularly, we define PR {z} = δ1 (z − z ∗ ), z ≥ z ∗ , and P{y} = δ2 (y − y ∗ ), y ≥ y ∗ where δ1 and δ2 > 0 are slopes of lines corresponding to primary and secondary informational inspection policies. We try to find the optimal values for δ1 , δ2 and z ∗ , y ∗ such that the profit for the antagonist

6 Numerical Analysis

M

is minimized.

ED

In this section, we conduct a numerical analysis to achieve a better understanding of the role of costs and other parameters on optimal inspection policies. The parameter setting of the base case

PT

is shown in Table 2.

First, we study the impact of the antagonist’s infiltration rate. When this increases, Customs

CE

expects to detain more high-risk containers. But Customs faces space availability and capacity restrictions and would rather allocate available space to high-risk containers only. As a consequence,

AC

when the infiltration rate increases, the inspection rate of low-risk containers decreases. This can be observed in Figure 2 for both primary informational and secondary informational inspections. An increase in the magnitude of type I and II errors during inspection makes the process more

costly and accordingly less attractive. Therefore, if errors increase sharply, Customs is better off decreasing inspection levels to avoid the costs incurred due to inspection inherent errors. This result is depicted and observable in Figure 3 for primary informational inspection. 22

AN US

CR IP T

ACCEPTED MANUSCRIPT

AC

CE

PT

ED

M

Figure 2: Impact of γ on inspection policies

Figure 3: Impact of changing α1 and β1 on primary inspection policy

23

ACCEPTED MANUSCRIPT

7

Extensions: Public-Private Partnership Models to Enhance Customs Security Management

As discussed in the introduction section, enhancing containerized supply chain security requires

CR IP T

effort and investment by both private firms and public administrations. In this section, we extend the results of the base setting to model two common and viable public-private partnership mechanisms. The first one models a private firm’s investment in public physical inspection facilities to speed up the inspection process. Examples of such investments are training Customs ground officers to improve the detection efficiency of high-risk containers or investing in Customs inspection

AN US

equipment and state-of-the-art technologies. The second case models a private firm’s investment in supply chain visibility, by providing Customs with more accurate and quality container-related information. This allows Customs to piggyback on business data and private firms to benefit from

7.1

M

Customs’ risk management expertise.

Investment in Customs Physical Inspection Facilities

ED

In this section, we model the interaction between supply chain actors and Customs as a sequential game. We assume that the antagonist always decides to infiltrate γ percent of containers with

PT

a specific risk factor. Then, incorporating the antagonist’s decision, the interaction between the private firm and Customs is modeled as a Stackelberg game in which the firm acts as the leader

CE

and decides whether to invest in Customs inspection facilities. First, Customs decides on the level of capacity increase k, k > 1 and investment requirement by firms Ik . In return for this investment,

AC

inspection error terms are also updated to αp and βp . The contract offered by Customs is denoted

by {Ik , k, αp , βp }. The firm’s decision of whether to accept the proposal depends on the cost of executing the

program. The firm faces two choices: Whether to reject the offer and incur the same inspection induced costs as before or to invest in inspection facilities and benefit from an enhanced inspection process. 24

ACCEPTED MANUSCRIPT

7.1.1 The Agent’s Problem The business firm decides to accept the offer if the operational efficiencies gained through enhanced inspection compensates the investment requested. An enhanced inspection process will affect the inspection and detention rate of Customs, and consequently the inspection induced costs incurred

CR IP T

by the firm. The condition that must be satisfied for the firm to accept the offer is as follows:

Ik + ws N{Snp } + wd N{Dnp } ≤ ws N{S p } + wd N{Dp }

(18)

N{Snp } and N{S p } are, respectively, the expected number of containers per time unit either waiting

AN US

for or under inspection after investment in inspection facilities and before that. Similarly, N{Dnp } and N{Dp } denote the expected number of containers in detention per time unit after and before investment. Customs incurs inspection costs but the firm incurs other costs including labor, instruments and facilities. ws and wd are, respectively, inspection and detention cost per container per

M

time unit. Ik denotes the investment on a per time unit basis. It is an increasing function in k, meaning that higher levels of capacity require higher investment levels. The following proposition

ED

formulates a threshold for the investment level.

Proposition 6 If Customs inspection procedure follows α and β errors, there is a threshold for the

PT

firm to accept the principal’s offer {Ik , k, αp , βp }, and invest in increasing inspection facilities (κ)

CE

by a factor k, which is unique and given by

(19)

AC

ζp = ws (N{S p } − N{Snp }) + wd (N{Dp } − N{Dnp })

7.1.2

The Principal’s Problem

The principal tries to minimize the expected costs of the antagonist’s activities. The solution to the principal’s problem should be to provide the appropriate incentives for the firm to participate. The capacity constraint for Customs remains similar to (13), meaning that the total number of containers being processed should not exceed Customs’ space availability and capacity. 25

ACCEPTED MANUSCRIPT

7.2

Customs’ Improvement on Business Data Availability

If supply chain business actors decide to invest in their supply chain visibility, Customs can benefit by using business information systems to piggyback on both business data and business risk management systems. This implies that Customs would have a better risk assessment and therefore the

CR IP T

risk scoring mechanism would be improved. As a result, the number of orange-flagged containers would decrease.

The contract offered by Customs is denoted by {Iν , η} where Iν denotes the investment that supply chain firms need to make on their own and in Customs information infrastructures to allow Customs access to supply chain databases. η is the new rate of data availability. The motivation

AN US

behind this setting is as follows: If the firm decides to invest in data acquisition infrastructures, it can offer Customs more business data. As a result, Customs can access various data sources from several supply chain stakeholders and can therefore make a better risk assessment. Better risk assessment is reflected in the definition of g(z) and h(y) functions. After investing in data

M

availability, the risk density function is altered by gv (z) and hv (y) where Gv (z) ≥ G(z) and Hv (y) ≥ H(y), i.e. the risk after investment is stochastically dominated by the risk before invest-

ED

ment. As a result, Customs can enhance its risk assessment mechanism and target risky containers

PT

more accurately and efficiently 7.2.1 The Agent’s Problem

CE

The firm would accept the offer if the congestion cost reduced through improved container targeting outweighs the investment required. If such investment is made, primary informational inspec-

AC

tion processing might take longer because of higher levels of information availability, but arrival rates to secondary informational inspection will decrease. It should be noted that improving supply chain visibility through data sharing not only affects Customs’ primary informational inspection but also directly influences the arrival rate to the physical inspection facility. Therefore, we need to consider the effect of inspection and detention costs in both inspection processes. Denoting the investment on supply chain visibility per time unit by Iν and letting subscript ν denote the cost 26

ACCEPTED MANUSCRIPT

parameters and decision variables after making the supply chain visible, the condition that should be met to induce the firm’s investment in visibility is stated as follows:

Iν + ws (N{Sνi } + N{Sνp }) + wd (N{Dνi } + N{Dνp }) ≤ ws (N{S i } + N{S p }) + wd (N{Di } + N{Dp }) (20)

CR IP T

ws and wd are defined similar to the previous case. N{Sνi } and N{Sνp } denote the number of containers either waiting for or undergoing primary informational inspection and physical inspection, respectively, after investment in the supply chain visibility has taken place. N{S i } and N{S p } denote the same measures but before investment in supply chain information sharing infrastructure.

AN US

N{Dνi } and N{Dνp } denote the number of containers in detention after primary informational and physical inspections after investment. Similarly, we define N{Di } and N{Dp } as the same measures but before investment. This constraint basically ensures that the firm’s investment compensates for the additional operational costs caused by improved inspection and detention processes.

M

Proposition 7 If Customs inspection procedure follows α1 and β1 errors, there is a threshold for the firm to accept the principal’s offer {Iν , η, α1n , β1n }, and increase data sharing by a factor η,

ED

which is unique and given by

The Principal’s Problem

CE

7.2.2

PT

ζi = ws (N{Sνi } + N{Sνp } − N{S i } − N{S p }) + wd (N{Dp } + N{Dnp } − N{Di } − N{Dp }) (21)

The principal’s problem remains similar to the previous case. The solution to the principal’s prob-

AC

lem should incentivize the firm to participate.

7.3 Analysis We first analyze the investment thresholds developed in Section 6 to induce PPP for security improvement. The first PPP mechanism discussed earlier is investment in physical inspection facilities. As observed in Figure 4.a, the firm’s investment threshold increases for a higher level of 27

CR IP T

ACCEPTED MANUSCRIPT

Figure 4: Investment in physical inspection facility vs. business data availability

AN US

inspection capacity. The intuition is that increasing capacity imposes higher investment cost, but results in higher operational efficiency for firms. With more inspection facilities, Customs can handle containers more quickly and efficiently, which reduces congestion related costs for firms. As mentioned earlier, if business parties share business data and information with Customs, the

M

administration can improve risk assessment and as a result the pdf of risk score would change to gν (z) such that Gν (z) ≥ G(z). An example of this is shown in Figure 5, where the pdf of z is a

ED

discrete function. η = 1 represents the status quo of the probability distribution function. As η increases, the pdf of z also changes such that Gν (z) ≥ G(z). As a result of the higher level of

PT

supply chain visibility provided by business firms, the risk score attributed to containers decreases. According to Figure 4.b, corresponding to the second PPP mechanism, if supply chain visibility

CE

increases and higher levels of data and information are provided to Customs, the firm’s investment threshold increases. This is because even though such a higher load of information might require

AC

extra processing, it allows Customs to target high-risk containers more effectively and efficiently. Better targeting of high-risk containers results in less congestion in the flow of licit containers. Therefore, the firm would be willing to make a higher level of investment in IT infrastructure in order to provide Customs with more supply chain visibility.

28

CR IP T

ACCEPTED MANUSCRIPT

Figure 5: g(z) for different values of η

Summary and Conclusion

AN US

8

Massive flows of containers provide an opportunity for terrorists, smugglers, and counterfeiters to infiltrate this mode of transport. Customs is in the front-line of battling antagonists. The ad-

M

ministration’s main weapon against the antagonists is inspection, either informational or physical. However, inspections are costly not only to Customs but also to firms and supply chains as delays

ED

can have a detrimental economic impact on firms. Moreover, Customs has limited resources and their utilization should be optimized. Even though the decisions of Customs can have a significant

PT

impact on public and private parties, its role has not been extensively investigated in the academic literature. In this paper, we develop models that can be used to determine Customs’ optimal in-

CE

spection policies considering its resource constraints and the cost incurred on firms because of inspection related delays. We show that Customs need to take into account container risk factors,

AC

and that high-risk containers should be assigned more inspection capacity. The model can be exploited to address different categories of risks faced by Customs. Securing containerized supply chains is the joint responsibility of private firms and public agencies because information is owned by private firms, whereas intelligence is owned by Customs. An effective public-private partnership model could enhance Customs’ risk and security management and benefit both public and private firms. In this paper, we consider two common practices in the real world, namely, private

29

ACCEPTED MANUSCRIPT

investment in Customs’ inspection facilities and the creation of supply chain visibility by allowing Customs to have access to business data. Using our model, we are able to find the optimal investment threshold for private firms in order to develop an effective public-private partnership.

CR IP T

References APM-Terminals. APM terminals apapa berth productivity up 50%. Technical report, 2011. URL www.apmterminals.com/media/Files/Corporate/News/PressReleases. V. L. L. Babu, R. Batta, and L. Lin. Passenger grouping under constant threat probability in an

AN US

airport security system. European Journal of Operational Research, 168(2):633–634, 2006. N. O. Bakir. A stackelberg game model for resource allocation in cargo container security. Annals of Operations Research, 187(1):5–22, 2011.

M

N. Bakshi and N. Gans. Securing the containerized supply chain: Analysis of government incen-

ED

tives for private investment. Management Science, 56(2):219–233, 2010. N. Bakshi, S. E. Flynn, and N. Gans. Estimating the operational impact of container inspections at

PT

international ports. Management Science, 57(1):1–20, 2011. V. Bier. Choosing what to protect. Risk Analysis, 27(3), 2007.

CE

N. E. Busch and A. D. Givens. Public-private partnerships in homeland security opportunities and

AC

challenges. Homeland Security Affairs, 8(1), 2012. CASSANDRA. risk

in

global

Cassandra supply

=

common

chains.

assessment

Technical

report,

and

analysis

2013.

of URL

http://www.cassandra-project.eu/mainmenu/home.html. N. Haphuriwat, V. M. Bier, and H. H. Willis. Deterring the smuggling of nuclear weapons in container freight through detection and retaliation. Decision Analysis, 8(2):88–102, 2011. 30

ACCEPTED MANUSCRIPT

J. Hintsa, T. Mannisto, A.P. Hameri, C. Thibedeau, J. Sahlstedt, V. Tsikolenko, M. Finger, and M. Granqvist. Customs risk management (crim): A survey of 24 wco member adminstrations. Technical report, World Customs Organization and Cross-Border.org, 2011.

gets: The testing power index. Risk Analysis, 30(4), 2010.

CR IP T

P. Kantor and E. Boros. Deceptive detection methods for effective security with inadequate bud-

H. Lee and S. Whang. Higher supply chain security with lower cost: Lessons from total quality management. International Journal of Production Economics, 96(3):289–300, 2005.

L. A. McLay, A. J. Lee, and S. H. Jacobson. Risk-based policies for airport security checkpoint

AN US

screening. Transportation Science, 44(3):333–349, 2010.

J.E. Moore. The economic impacts of terrorist attacks. Edward Elgar Publishing, 2007. X. Nie, R. Batta, C. J. Drury, and L. Lin. Passenger grouping with risk levels in an airport security

M

system. European Journal of Operational Research, 194(2):574–584, 2009.

ED

X. Nie, G. Parab, R. Batta, and L. Lin. Simulation-based selectee lane queueing design for passenger checkpoint screening. European Journal of Operational Research, 219(1):146–155, 2012.

PT

M. E. Nikoofal and J. Zhuang. Robust allocation of a defensive budget considering an attacker’s private information. Risk Analysis, 32(5):930–943, 2012.

CE

E. J. Pinker. An analysis of short-term responses to threats of terrorism. Management Science, 53

AC

(6):865–880, 2007.

J. Rios and D. R. Insua. Adversarial risk analysis for counterterrorism modeling. Risk Analysis, 32(5), 2012.

Y. Sheffi. The resilient enterprise: overcoming vulnerability for competitive advantage. The MIT Press, paperback edition, 2007.

31

ACCEPTED MANUSCRIPT

X. Wang and J. Zhuang. Balancing congestion and security in the presence of strategic applicants with private information. European Journal of Operational Research, 212(1):100–111, 2011. WCO. Interface public members. Technical report, 2012. URL http://www.wcoipm.org/.

materials in shipping containers. Risk Analysis, 26(5), 2006.

CR IP T

L. M. Wein, A. H. Wilkins, M. Baveja, and S. E. Flynn. Preventing the importation of ilicit nuclear

J. Zhuang and V. M. Bier. Balancing terrorism and natural disasters-defensive strategy with en-

AC

CE

PT

ED

M

AN US

dogenous attacker effort. Operations Research, 55(5):976–991, 2007.

32