Economic aspects of airport security measures
Santos, Alvaro K.
David R. Henderson.
MetadataShow full item record
Airport security measures use very expensive equipment, and may keep passengers in line for several minutes. The time passengers spend in those lines can add up, and must be understood as time opportunity cost. In the 1970s, several airport security measures were adopted to help stop aircraft hijackings. In 1978, William M. Landes wrote the paper "An Economic Study of the U.S. Aircraft Hijacking, 1961-1976", in which he analyzed the expenditures associated with airport security measures. He concluded that the costs of the adopted measures were very high. While Landes concentrated on the monetary costs of airport security, this thesis concentrates on the estimating the opportunity costs of airport security measures for passengers -- their losses in terms of their time value. This thesis estimates that the hijacking-preventing impact of airport screening measures is insignificant, but the opportunity costs these measures impose on airline passengers are significant and greatly exceed the benefits produced.
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2009-01);January 2009. In this issue of Homeland Security Affairs we offer one essay that outlines some of the important homeland security issues of 2008 and a set of essays that describes a potentially significant change in the ...
Sheo, Boon Chew Winson (Monterey, California: Naval Postgraduate School, 2013-09);The aviation industry is a large network of agglomerated systems that connects people and places. Since the 9/11 attacks, aviation security in the United States has undergone tremendous changes and improvements. Nonetheless, ...
Schneidewind, Norman F. (IEEE, 2005-11);This model provides a framework for helping to understand and analyze the airport security problem. By modeling the security process, and identifying the weak points, we were able to make recommendations for possible ...