University of California—Irvine

Slides:



Advertisements
Similar presentations
The Department of Energy Enterprise Risk Management Model
Advertisements

Developing a Successful Integrated Audit Approach September 14, 2010.
Study Objectives and Questions for Observational Comparative Effectiveness Research Prepared for: Agency for Healthcare Research and Quality (AHRQ)
TITLE OF PROJECT PROPOSAL NUMBER Principal Investigator PI’s Organization ESTCP Selection Meeting DATE.
TITLE OF PROJECT PROPOSAL NUMBER Principal Investigator PI’s Organization ESTCP Selection Meeting DATE.
Presented By: Thelma Ameyaw Security Management TEL2813 4/18/2008Thelma Ameyaw TEL2813.
ECM Project Roles and Responsibilities
Runway Safety Teams (RSTs) described Session 5 Presentation 1.
Runway Safety Teams (RSTs) Description and Processes Session 5 Presentation 1.
Change Request Management
Enterprise Architecture
Chapter : Software Process
How To Apply Quality Management
Annual SERC Research Review, October 5-6, By Jennifer Bayuk Annual SERC Research Review October 5-6, 2011 University of Maryland Marriott Inn and.
NIST Special Publication Revision 1
Unit 3. demonstrate the ability to use subprograms within computer programs; use a variety of problem-solving strategies to solve different types of.
PhD Proposal Texas A&M University 05/11/10 JAMES HALIBURTON AIA LEED AP CONTENTS Building Information Modeling and Small Architectural Firms: An Analysis.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
BPK Strategic Planning: Briefing for Denpasar Regional Office Leadership Team Craig Anderson Ahmed Fajarprana August 11-12, 2005.
IT Requirements Management Balancing Needs and Expectations.
United States Department of Agriculture Food Safety and Inspection Service 1 National Advisory Committee on Meat and Poultry Inspection August 8-9, 2007.
Analyzing Current and Future Catastrophic Risks from Emerging-Threat Technologies Kickoff Template Submission Date: 5 Jan 2014 Anthony M. Barrett: PI and.
Start Presentation. A Boeing Company The role of Simulation in installation of Explosive Detection Systems Auckland June 03 Helping our customers increase.
1 Introduction to Software Engineering Lecture 1.
Info-Tech Research Group1 Requirements Gathering World Class Operations - Impact Workshop.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
Supporting Researchers and Institutions in Exploiting Administrative Databases for Statistical Purposes: Istat’s Strategy G. D’Angiolini, P. De Salvo,
Professional Certificate in Electoral Processes Understanding and Demonstrating Assessment Criteria Facilitator: Tony Cash.
Business Analysis. Business Analysis Concepts Enterprise Analysis ► Identify business opportunities ► Understand the business strategy ► Identify Business.
Human Factors and SMS? Presentation By Eddie Rogan Aviation Solutions Director Superstructure Group.
Jen-Tzung Chien, Meng-Sung Wu Minimum Rank Error Language Modeling.
Evaluate Phase Pertemuan Matakuliah: A0774/Information Technology Capital Budgeting Tahun: 2009.
Ensuring the Safety of Future Developments
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
JMFIP Financial Management Conference
Principal Investigator ESTCP Selection Meeting
Change Request Management
Knowledge Translation for Policymakers
Sample Fit-Gap Kick-off
Project Planning: Scope and the Work Breakdown Structure
An Overview on Risk Management
How To Apply Quality Management
Operational Assessment of Service Delivery
Requirements Analysis Scenes
DOCUMENTATION DEVELOPMENT LIFE CYCLE (DDLC)
MUHC Innovation Model.
Runway Safety Teams (RSTs) described
Principal Investigator ESTCP Selection Meeting
Session 7: Face Detection (cont.)
TechStambha PMP Certification Training
Project Title Kelvin Cheu(PI), Ron Askin (co-I)
Project Roles and Responsibilities
University at Albany (State University of New York)
An Application in Analyzing Isolated Malicious Activities
Guy W. Wallace Pursuing Performance EPPIC Inc.
1Georgia Institute of Technology 2Chicago Booth School of Business
Risk Detection, Operations Efficiency & Economic Analysis Eva K Lee
Developing & implementing business strategy
ISO management systems
Runway Safety Teams (RSTs) described
Portfolio, Programme and Project
Principal Investigator ESTCP Selection Meeting
Building Valid, Credible, and Appropriately Detailed Simulation Models
Principal Investigator ESTCP Selection Meeting
Dairy Subgroup #1: Fostering Markets for Non-Digester Projects
(Insert Title of Project Here) Kickoff Meeting
Technology Bob Dohrer, Technology Working Group Chair
Unit IV – Chapter 2 V-Test Model.
Presentation transcript:

University of California—Irvine Enhancing Aviation Security through the use of Signal Detection Theory Nicholas Scurich University of California—Irvine Irvine, CA Problem Statement and Objective: The TSA uses Secure Flight ™ to assess the risk of aviation passengers and classify each passenger into one of three risk groups: high risk; low risk; unknown risk. Little is known about how risk estimates are translated into a risk classification. This project will systematically investigate the decision making process, integrate the value tradeoffs of multiple different stakeholder groups, and ultimately create a software tool that can be used to establish cut-points that are appropriate, systematic, and acceptable across stakeholder groups. Methodology and Data Requirements: The methodology involves an innovative application of Signal Detection Theory. Inputs for the model will be determined from TSA documents (i.e., the discriminability of the Secure Flight algorithm) and value tradeoffs will be elicited from relevant stakeholders. Impact Statement and Relevance to DHS Roles and Responsibilities: Systematically studying the cut-points used by the TSA is vital to security as they determine the relative rates of false negative and positive misclassifications. We simply do not know what these tradeoffs currently are, nor whether they are in accord with what different stakeholder groups believe are acceptable. The project addresses these lacunas. Depending on the findings, it is possible that TSA precheck could be expanded to include more individuals, which would reduce overcrowding at airport checkpoints. Both Scurich and John (Co-PI) will be responsible for all aspects of this project. Timeline and Deliverables: Year 1: Report demonstrating the application of Signal Detection Theory to aviation security, along with analyses that reveal the implicit value-tradeoffs of the de facto decision thresholds for low, high, unknown risk. 30 days: refine proposal; speak with subject matter experts (SMEs) at TSA. 60 days: submit IRB application; conduct literature review. 90 days: begin to formulate model; continue working with SMEs. Year 2: Travel to conduct in-person value elicitations from relevant stakeholders regarding acceptable levels of false positive/negative errors. These values will be integrated into a model to elucidate optimal decision thresholds – a customized solution. A software tool will be delivered so that the methodology and findings can be easily implemented and ported to different security contexts and applications.