Homeland Security Models: Screening, Patrolling, and Information Sharing
MetadataShow full item record
The security levels applied in the port of entries and borders have tightened significantly after September 11, 2001. This presumably have increased safety and reduced risk. In the meantime, however, some problems have arisen such as congestion and inconvenience at the port of entries due to limited government resources, which jeopardize the countries' economy and popularity. Another serious threat to homeland security that the country recently suffers is cyber-attacks launched by sophisticated cyber-adversaries. Due to the attribution and asymmetry nature, it is extremely difficult to prevent and mitigate the cyber-attacks. This led the government to realize the need for a comprehensive collaboration between governmental and non-governmental organizations. However, this move also has brought along some problems such as privacy. First, we analyze abandonment behavior of the potential applicants during security screening process. We investigate how the applicants change their submission strategy when they become impatient and how the visa officials should alter their strategies to reduce risk and increase normal applicants' welfare. To accomplish this, we develop (1) a game model to capture strategic interactions with approver and potential applicants, (2) a 2-dimensional Markov chain to calculate average waiting times in the face of abandonments. Then, we support our model with a case study of the United States visa application process. Second, we investigate the relation between illegal fishery behavior and environmental factors in the Gulf of Mexico. This chapter develops a model to provide useful insights to the United States Coast Guard that will help to interdict and stop illegal activities. The model includes the analysis of provided illegal sight and collected environmental data and developing a prediction model. Third, we review the recent developments in cybersecurity information sharing literature by analyzing identified papers based on their ascertained main focus and methodological approaches implemented. We reveal the certain considerations and behaviors of the cyber-adversaries and targets when it comes to sharing cyber-attack information. These considerations include (1) benefits and risks of sharing cyber-incident data from targets' perspective, and (2) competition and motivation from adversaries' perspective.