skip to main content
10.5555/1218112.1218212acmconferencesArticle/Chapter ViewAbstractPublication PageswscConference Proceedingsconference-collections
Article

A simulation-based approach to trade-off analysis of port security

Published: 03 December 2006 Publication History

Abstract

Motivated by the September 11 attacks, we are addressing the problem of policy analysis of supply-chain security. Considering the potential economic and operational impacts of inspection together with the inherent difficulty of assigning a reasonable cost to an inspection failure call for a policy analysis methodology in which stakeholders can understand the trade-offs between the diverse and potentially conflicting objectives. To obtain this information, we used a simulation-based methodology to characterize the set of Pareto optimal solutions with respect to the multiple objectives represented in the decision problem. Our methodology relies on simulation and the response surface method (RSM) to model the relationships between inspection policies and relevant stakeholder objectives in order to construct a set of Pareto optimal solutions. The approach is illustrated with an application to a real-world supply chain.

References

[1]
Bier, V., Y. Haimes, J. Lambert, N. Matalas, and R. Zimmerman. 1999. A survey of approaches for assessing and managing the risk of extremes. Risk Analysis 19 (1): 83--94.
[2]
Duffuaa, S., and H. Al-Najjar. 1997. A general inspection plan for critical multicharacteristic components. International Journal of Production Research 35 (10): 2723--2736.
[3]
Duffuaa, S., and H. Al-Najjar. 1995. An optimal complete inspection plan for critical multicharacteristic components. The Journal of the Operational Research Society 46 (8): 930.
[4]
Giddings, A. P., T. Bailey, and M. J. T. 2001. Optimality analysis for facility location problems using response surface methodology. International Journal of Physical Distribution & Logistics 31 (1): 38.
[5]
Harrald, J. 2005. Sea trade and security: An assessment of the post-9/11 reaction. Journal of International Affairs 59 (FALL/WINTER 2005): 157--178.
[6]
Harrald, J., S. Hugh, and R. vanDorp. 2004. A framework for sustainable port security. Journal of Homeland Security and Emergency Management 1 (2): Article 12.
[7]
Hwang, C., and K. Yoon. 1981. Multiple attribute decision making, methods and applications: a state-of-the-art survey. Springer-Verlag.
[8]
Kaio, N., and S. Osaki. 1989. Comparison of inspection policies. The Journal of the Operational Research Society 40 (5): 499--503.
[9]
Khuri, A., and J. Cornell. 1996. Response surfaces: design and analyses. 2nd Edition ed. New Yourk: Marcel Dekker, Inc.
[10]
Lahdelma, R., S. Makkonen, and P. Salminen. 2002, July, 31. Modelling dependent uncertainties. Stochastic Multicriteria Acceptability Analysis.
[11]
Lambert, J., N. Matalas, C. Ling, Y. Haimes, and D. Li. 1994. Selection of probability distributions in characterizing risk of extreme events. Risk Analysis 14 (5): 731--742.
[12]
Lindley, D. V. 1994. Making decisions. Second Edition ed. John Wiley & Sons Ltd.
[13]
Looney, R. 2002, August. Economic costs to the United States stemming from the 9/11 attacks. Technical Report, the Center for Contemporary Conflict (CCC).
[14]
McCarter, M. 2005. The programs of 2005. HSToday 2 (1): 20--23.
[15]
Nakayama, M. 1980. Nash equilibria and Pareto optimal income redistribution. Econometrica 48 (5): 1257--1264.
[16]
Qi, C., K. Tang, and A. Sivakumar. 2002. Simulation based cause and effect analysis of cycle time and WIP in semiconductor wafer fabrication. In Winter Simulation Conference 2002. San Diego, CA.
[17]
Raouf, A., J. Jain, and P. Sathe. 1983. A cost-minimization model for multicharacteristic component inspection. IIE Transactions 15 (3): 187.
[18]
Reese, A. 2003, June-July. Building the secure supply chain. iSource Business (site accessed on April 2, 2005).
[19]
Rosoff, H., and D. von Winterfeldt. 2005, October. A risk and economic analysis of dirty bomb attacks on the ports of Los Angeles and Long Beach. Technical Report N00014-05-0630, Center for Risk and Economic Analysis of Terrorism Events (CREATE) University of Southern California.
[20]
Secretariat-UNCTAD 2004. UNCTAD report - container security: Major initiatives and related international developments. Technical Report ISO/TC N 997.
[21]
Shang, J., S. Li, and P. Tadikamalla. 2004. Operational design of a supply chain system using Taguchi method, response surface methodology, simulation, and optimization. International Journal of Production Research 42 (18): 3823--3849.
[22]
Soland, R. 1979. Multicriteria optimization: A general characterization of efficient solutions. Decision Science 10: 26--38.
[23]
Srivastava, A., K. Hacker, and K. Lewis. 1999. Development of a kriging based surrogate approximation method for large scale systems. Design Optimization: International Journal for Product and Process Improvement.
[24]
Stana, R. 2004. Summary of challenges faced in targeting oceangoing cargo containers for inspection. Technical Report 17, U.S. General Accounting Office.
[25]
Tulsiani, V., Y. Haimes, and D. Li. 1990. Distribution analyzer and risk evaluator (dare) using fault trees. Risk Analysis 10 (4): 521--538.
[26]
U.S. Custom and Border Protection 2004, November. Securing the global supply chain - custom-trade partnership against terrorism (C-TPAT) strategic plan. Technical Report, U.S. Custom and Border Protection.
[27]
U.S. Customs and Border Protection 2006. Fact sheet: When was the container security initiative developed and why?
[28]
U.S. Department of Transportation 1999, September. An assessment of the marine transportation system: A report to congress. Technical Report, U.S. Department of Transportation.
[29]
Welch, P. D. 1981. On the problem of the initial transient in steady-state simulation. IBM Watson Research Center.
[30]
Wilson, R. 1967. A Pareto-Optimal dividend policy. Management Science 13 (9): 756--764.
[31]
World Trade Organization 2004. World trade report 2004. Technical Report, World Trade Organization.
  1. A simulation-based approach to trade-off analysis of port security

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WSC '06: Proceedings of the 38th conference on Winter simulation
    December 2006
    2429 pages
    ISBN:1424405017

    Sponsors

    • IIE: Institute of Industrial Engineers
    • ASA: American Statistical Association
    • IEICE ESS: Institute of Electronics, Information and Communication Engineers, Engineering Sciences Society
    • IEEE-CS\DATC: The IEEE Computer Society
    • SIGSIM: ACM Special Interest Group on Simulation and Modeling
    • NIST: National Institute of Standards and Technology
    • (SCS): The Society for Modeling and Simulation International
    • INFORMS-CS: Institute for Operations Research and the Management Sciences-College on Simulation

    Publisher

    Winter Simulation Conference

    Publication History

    Published: 03 December 2006

    Check for updates

    Qualifiers

    • Article

    Conference

    WSC06
    Sponsor:
    • IIE
    • ASA
    • IEICE ESS
    • IEEE-CS\DATC
    • SIGSIM
    • NIST
    • (SCS)
    • INFORMS-CS
    WSC06: Winter Simulation Conference 2006
    December 3 - 6, 2006
    California, Monterey

    Acceptance Rates

    WSC '06 Paper Acceptance Rate 177 of 252 submissions, 70%;
    Overall Acceptance Rate 3,413 of 5,075 submissions, 67%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 299
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media