OPEN ACCESS
Security managers must always be on guard to prevent terrorist and criminal attacks against their organi-zations. This paper presents a comprehensive methodology for organizational security decision-making process and security system design. It builds on the house of quality (HOQ) (a customer-requirements planning matrix) by developing a house of security (HOS) that can translate the likelihood and sever-ity of attack scenarios against organizations into a structure comprising security system components ranked according to their likely effectiveness in preventing an attack. We assume that correlations between the system components might be changed for each scenario, i.e. several roofs, corresponding to the number of rows in the HOS matrix. For comparing different security systems designed to prevent the same threats, a measure of effectiveness is proposed. The analysis of variance method is utilized to select the vital security components by dividing the security components into two groups: vital few and trivial many.
The HOS method is implemented for hotel protection from a terrorist attack, revealing five compo-nents as dominant for security: Operating procedures, TV cameras, internal personnel, entry control, and visual information analysis. A partial analysis to identify the most important component for pro-tecting a specific place (parking area) shows that the number of the vital components decreases and the dominant components for preventing parking area threats are operating procedures and internal personnel.
Decision making, quality functional deployment (QFD), security system
[1] Stewart, M.G. & Mueller, J., Cost-benefit analysis of advanced imaging technology full body scanners for airline passenger security screening. Journal of Homeland Security and Emergency Management, 8(1), 2011. doi: http://dx.doi.org/10.2202/1547-7355.1837
[2] Majeske, K.D. & Lauer, T.W., Optimizing airline passenger prescreening systems with Bayesian decision models. Computers & Operations Research, 39(8), pp. 1827–1836, 2012. doi: http://dx.doi.org/10.1016/j.cor.2011.04.008
[3] Xiaofeng N.Risk-based grouping for checked baggage screening systems. Reliability Engineering & System Safety, 96(11), pp. 1499–1506, 2012.
[4] Lee, A.J. & Jacobson, S.H., The impact of aviation checkpoint queues on optimizing security screening effectiveness. Reliability Engineering & System Safety, 96(8), pp. 900–911, 2011. doi: http://dx.doi.org/10.1016/j.ress.2011.03.011
[5] Hassoun, M., Rabinowitz, G. & Reshef, N., Security agent allocation to partially observable heterogeneous frontier segments. IIE Transactions, 43(8), pp. 566–574, 2011. doi: http://dx.doi.org/10.1080/0740817X.2010.532852
[6] Niyazi O.B., A Stackelberg game model for resource allocation in cargo container security. Annals of Operations Research, 187, pp. 5–22, 2011. doi: http://dx.doi.org/ 10.1007/s10479-010-0793-z
[7] Keeney, R.L. & Von Winterfeldt, D., A value model for evaluating homeland security decisions. Risk Analysis, 31(9), pp. 1470–1487, 2011. doi: http://dx.doi.org/10.1111/ j.1539-6924.2011.01597.x
[8] ISO 28000, Specification for security management systems for the supply chain, 2007.
[9] Bashkansky, E., Dror, S., Ravid, R. & Grabov, P., Effectiveness of a product quality classifier. Quality Engineering, 19(3), pp. 235–244, 2007. doi: http://dx.doi. org/10.1080/08982110701334577
[10] Akao, Y. & Mazur, G.H., The leading edge in QFD: past, present and future. Interna-tional Journal of Quality & Reliability Management, 20(1), pp. 20–35, 2003. doi: http:// dx.doi.org/10.1108/02656710310453791
[11] Chan, L.K. & Wu, M.L., Quality function deployment: a literature review. European Journal of Operational Research, 143(3), pp. 463–497, 2002. doi: http://dx.doi.org/ 10.1016/S0377-2217(02)00178-9
[12] Montgomery, D., Introduction to Statistical Quality Control, 5th edn., John Wiley & Sons: New York, 2004.
[13] Dror, S. & Barad, M., House of Strategy (HOS) – From strategic objectives to competitive priorities. International Journal of Production Research, 44(18–19), pp. 3879–3895, 2006. doi: http://dx.doi.org/10.1080/00207540600575779
[14] Dror, S., A methodology for realignment of quality cost elements. Journal of Modelling in Management, 5(2), pp. 142–157, 2010. doi: http://dx.doi.org/10.1108/ 17465661011060998
[15] Linstone, H.A. & Turoff, M., The Delphi Method: Techniques and Applications, Addison-Wesley: Boston, MA, 1975.