{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:27:29Z","timestamp":1754155649656,"version":"3.41.2"},"reference-count":39,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2014,3,4]],"date-time":"2014-03-04T00:00:00Z","timestamp":1393891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3,4]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 Terrorist attacks have generated interests among practitioners and researchers on transportation security enhancement. This study investigates the role that rationality play in government funding on this important aspect of homeland security. In particular, it examines how environmental changes and project characteristics influence the allocation of security-related Airport Improvement Program (AIP) grants in the aviation industry. The paper aims to discuss these issues. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 The central hypothesis is that rationality regulates transportations security investment through the dynamic balancing between type I error and type II error concerns. To empirically validate it, this study conducts various analyses on AIP history data. In particular, it uses text mining to identify the security-related AIP grants and their coverage, trend analysis to compare the trends of security funding and other transportation investment, and classification tree analysis to determine the factors that influence the allocation of security-related grants. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The longitudinal distribution of security-related grants differs from other types of transportation funding in terms of their distinct responses to terrorist and economic events. Project characteristics including project coverage and facility location have secondary yet consistent effects on the allocation of security-related grants. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 This study empirically validates the concept of rationality in transportation security investment. In particular, the findings support that it in constant moves along both longitudinal and cross-sectional dimensions. The dynamic and multi-facet nature of rationality provides the key for researchers and practitioners to understand security funding in aviation industry.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/imds-04-2013-0176","type":"journal-article","created":{"date-parts":[[2014,1,24]],"date-time":"2014-01-24T04:51:21Z","timestamp":1390539081000},"page":"276-291","source":"Crossref","is-referenced-by-count":7,"title":["Security investment in aviation industry: a longitudinal analysis"],"prefix":"10.1108","volume":"114","author":[{"given":"Ying","family":"Wang","sequence":"first","affiliation":[]},{"given":"Francis","family":"Kofi Andoh-Baidoo","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Sun","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2021010220125123800_b1","unstructured":"Associte Press\n                (2012), \u201cTSA pats down 4-year-old after she hugs grandmother\u201d, April 26, available at: www.nbcnews.com\/travel\/tsa-pats-down-4-year-old-after-she-hugs-grandmother-732776."},{"key":"key2021010220125123800_b2","doi-asserted-by":"crossref","unstructured":"Buchanan, J.M.\n                (1952), \u201cFederal grants and resource allocation\u201d, The Journal of Political Economy, Vol. 60 No. 3, pp. 208-217.","DOI":"10.1086\/257209"},{"key":"key2021010220125123800_b3","unstructured":"DHS\n                (2011), Implementing 9\/11 Commission Recommendations: Progress Report 2011, US Department of Homeland Security, Washington, DC."},{"key":"key2021010220125123800_b10","unstructured":"DHS\n                (2012), Budget-in-Brief: Fiscal Year 2012, Department of Homeland Security, Washington, DC, available at: www.dhs.gov\/xlibrary\/assets\/budget-bib-fy2012.pdf."},{"key":"key2021010220125123800_b4","unstructured":"Fayyad, U.\n               , \n                  Piatetsky-Shapiro, G.\n                and \n                  Smyth, P.\n                (1996), \u201cFrom data mining to knowledge discovery in databases\u201d, AI Magazine, Fall, pp. 37-54."},{"key":"key2021010220125123800_b5","doi-asserted-by":"crossref","unstructured":"Field, M.A.\n                (2004), \u201cHighway security and terrorism\u201d, The Review of Policy Research, Vol. 21 No. 3, pp. 317-328.","DOI":"10.1111\/j.1541-1338.2004.00078.x"},{"key":"key2021010220125123800_b6","doi-asserted-by":"crossref","unstructured":"Frederickson, H.G.\n                and \n                  LaPorte, T.R.\n                (2002), \u201cAirport security, high reliability, and the problem of rationality\u201d, Public Administration Review, Vol. 62, pp. 33-43.","DOI":"10.1111\/1540-6210.62.s1.7"},{"key":"key2021010220125123800_b7","unstructured":"GAO\n                (2002), Review of Studies of the Economic Impact of the September 11, 2001, Terrorist Attacks on the World Trade Center, Government Accountability Office, Washington, DC."},{"key":"key2021010220125123800_b8","unstructured":"GAO\n                (2007), Applying Risk Management Principles to Guide Federal Investments, Government Accountability Office, Washington, DC."},{"key":"key2021010220125123800_b9","unstructured":"GAO\n                (2009), Transit Security Grant Program: DHS Allocates Grants Based on Risk, But Its Risk Methodology, Management Controls, and Grant Oversight Can Be Strengthened, GAO-09-491, Government Accountability Office, Washington, DC."},{"key":"key2021010220125123800_b11","doi-asserted-by":"crossref","unstructured":"Goodwin, R.\n               , \n                  Willson, M.\n                and \n                  Stanley, G.\n                (2005), \u201cTerror threat perception and its consequences in contemporary Britain\u201d, British Journal of Psychology, Vol. 96 No. 4, pp. 389-406.","DOI":"10.1348\/000712605X62786"},{"key":"key2021010220125123800_b12","doi-asserted-by":"crossref","unstructured":"Haynes, W.\n                (2004), \u201cSeeing around corners: crafting the new department of homeland security\u201d, The Review of Policy Research, Vol. 21 No. 3, pp. 369-395.","DOI":"10.1111\/j.1541-1338.2004.00081.x"},{"key":"key2021010220125123800_b13","doi-asserted-by":"crossref","unstructured":"Huang, S.-M.\n               , \n                  Lee, C.-L.\n                and \n                  Kao, A.-C.\n                (2006), \u201cBalancing performance measures for information security management: a balanced scorecard framework\u201d, Industrial Management & Data Systems, Vol. 106 No. 2, pp. 242-255.","DOI":"10.1108\/02635570610649880"},{"key":"key2021010220125123800_b14","doi-asserted-by":"crossref","unstructured":"Indurkhya, N.\n                and \n                  Damerau, F.\n                (2010), Handbook of Natural Language Processing, 2nd ed., CRC Press, Boca Raton, FL.","DOI":"10.1201\/9781420085938"},{"key":"key2021010220125123800_b15","doi-asserted-by":"crossref","unstructured":"Johnston, V.R.\n                (2004), \u201cTerrorism and transportation policy and administration: balancing the model and equations for optimal security\u201d, The Review of Policy Research, Vol. 21 No. 3, pp. 263-274.","DOI":"10.1111\/j.1541-1338.2004.00074.x"},{"key":"key2021010220125123800_b16","doi-asserted-by":"crossref","unstructured":"Landoll, D.J.\n                (2006), The Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Auerbach Publications, Boca Raton, FL.","DOI":"10.1201\/9781420031232"},{"key":"key2021010220125123800_b17","unstructured":"Lieberman, J.\n                (2006), \u201cLieberman urges DHS to explain why new haven, SW connecticut are ineligible for high risk homeland security grants\u201d, available at: www.lieberman.senate.gov\/index.cfm\/news-events\/news\/2006\/2\/lieberman-urges-dhs-to-explain-why-new-haven-sw-connecticut-are-ineligible-for-high-risk-homeland-security-grants."},{"key":"key2021010220125123800_b19","unstructured":"McCartney, S.\n                (2013), \u201cTSA pulls plug on X-ray body scanners amid privacy, health concerns\u201d, The Wall Streat Journal Blogs, January 22, available at: http:\/\/blogs.wsj.com\/middleseat\/2013\/01\/22\/tsa-pulls-plug-on-x-ray-body-scanners-amid-privacy-health-concerns\/."},{"key":"key2021010220125123800_b18","unstructured":"Mayer, M.A.\n                and \n                  Carafano, J.J.\n                (2007), \u201cAfter the 9\/11 Act: homeland security grants still moving in the wrong direction\u201d, No. 2059, Heritage Foundation Backgrounder, Washington, DC."},{"key":"key2021010220125123800_b20","unstructured":"Mead, K.M.\n                (2003), Aviation Security Costs, Transportation Security Administration, Report Number CC-2003, 66, Office of Inspector General, Department of Transportation, Washington, DC, available at: www.oig.dot.gov\/sites\/dot\/files\/pdfdocs\/cc2003066.pdf."},{"key":"key2021010220125123800_b21","doi-asserted-by":"crossref","unstructured":"OHS\n                (2002), National Strategy for Homeland Security, Office of Homeland Security, The White House, Washington, DC, July.","DOI":"10.1016\/S1353-4858(02)08004-2"},{"key":"key2021010220125123800_b22","doi-asserted-by":"crossref","unstructured":"Plant, J.F.\n                (2004), \u201cTerrorism and the railroads: redefining security in the wake of 9\/11\u201d, The Review of Policy Research, Vol. 21 No. 3, pp. 293-305.","DOI":"10.1111\/j.1541-1338.2004.00076.x"},{"key":"key2021010220125123800_b23","unstructured":"Poole, R.W.\n                (2008), \u201cToward risk-based aviation security policy\u201d, OECD\/ITF Joint Transport Research Centre Discussion Paper No. 2008-23, available at: http:\/\/hdl.handle.net\/10419\/68797."},{"key":"key2021010220125123800_b24","doi-asserted-by":"crossref","unstructured":"Prabhakar, S.\n               , \n                  Pankanti, S.\n                and \n                  Jain, A.K.\n                (2003), \u201cBiometric recognition: security and privacy concerns\u201d, IEEE Security & Privacy, Vol. 1 No. 2, pp. 33-42.","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"key2021010220125123800_b25","doi-asserted-by":"crossref","unstructured":"Prante, T.\n                and \n                  Bohara, A.K.\n                (2008), \u201cWhat determines homeland security spending? An econometric analysis of the homeland security grant program\u201d, Policy Studies Journal, Vol. 36 No. 2, pp. 243-256.","DOI":"10.1111\/j.1541-0072.2008.00264.x"},{"key":"key2021010220125123800_b26","doi-asserted-by":"crossref","unstructured":"Price, W.\n                (2004), \u201cReducing the risk of terror events at seaports\u201d, The Review of Policy Research, Vol. 21 No. 3, pp. 329-349.","DOI":"10.1111\/j.1541-1338.2004.00079.x"},{"key":"key2021010220125123800_b27","unstructured":"Priest, D.\n                and \n                  Arkin, W.M.\n                (2011), Top Secret America: The Rise of the New American Security State, Little, Brown and Company, New York, NY."},{"key":"key2021010220125123800_b28","doi-asserted-by":"crossref","unstructured":"Rich, M.J.\n                (1989), \u201cDistributive politics and the allocation of federal grants\u201d, The American Political Science Review, Vol. 83 No. 1, pp. 193-213.","DOI":"10.2307\/1956440"},{"key":"key2021010220125123800_b29","doi-asserted-by":"crossref","unstructured":"Schuster, M.A.\n               , \n                  Stein, B.D.\n               , \n                  Jaycox, L.H.\n               , \n                  Collins, R.L.\n               , \n                  Marshall, G.N.\n               , \n                  Elliott, M.N.\n               , \n                  Zhou, A.J.\n               , \n                  Kanouse, D.E.\n               , \n                  Morrison, J.L.\n                and \n                  Berry, S.H.\n                (2001), \u201cA national survey of stress reactions after the September 11, 2001, terrorist attacks\u201d, The New England Journal of Medicine, Vol. 345 No. 20, pp. 1507-1512.","DOI":"10.1056\/NEJM200111153452024"},{"key":"key2021010220125123800_b31","doi-asserted-by":"crossref","unstructured":"Seidenstat, P.\n                (2004), \u201cTerrorism, airport security, and the private sector\u201d, Review of Policy Research, Vol. 21 No. 3, pp. 275-291.","DOI":"10.1111\/j.1541-1338.2004.00075.x"},{"key":"key2021010220125123800_b30","doi-asserted-by":"crossref","unstructured":"Senellart, P.P.\n                and \n                  Blondel, V.D.\n                (2004), \u201cAutomatic discovery of similar words\u201d, in \n                  Berry, M.W.\n                (Ed.), Survey of Text Mining Clustering, Classification, and Retrieval, Springer, New York, NY, pp. 25-43.","DOI":"10.1007\/978-1-4757-4305-0_2"},{"key":"key2021010220125123800_b32","doi-asserted-by":"crossref","unstructured":"Sindhav, B.\n               , \n                  Holland, J.\n               , \n                  Rodie, A.R.\n               , \n                  Adidam, P.T.\n                and \n                  Pol, L.G.\n                (2006), \u201cThe impact of perceived fairness on satisfaction: are airport security measures fair? Does it matter?\u201d, The Journal of Marketing Theory and Practice, Vol. 14 No. 4, pp. 323-335.","DOI":"10.2753\/MTP1069-6679140406"},{"key":"key2021010220125123800_b34","unstructured":"Slovic, P.\n                and \n                  Weber, E.U.\n                (2002), \u201cPerception of risk posed by extreme events\u201d, Proceedings of Risk Management Strategies in an Uncertain World Conference, Palisades, New York, NY, April, pp. 12-13."},{"key":"key2021010220125123800_b33","doi-asserted-by":"crossref","unstructured":"Slovic, P.\n               , \n                  Fischhoff, B.\n                and \n                  Lichtenstein, S.\n                (1982), \u201cWhy study risk perception?\u201d, Risk Analysis, Vol. 2 No. 2, pp. 83-93.","DOI":"10.1111\/j.1539-6924.1982.tb01369.x"},{"key":"key2021010220125123800_b35","doi-asserted-by":"crossref","unstructured":"Sun, J.\n               , \n                  Ahluwalia, P.\n                and \n                  Koong, K.S.\n                (2011), \u201cThe more secure the better? A study of information security readiness\u201d, Industrial Management & Data Systems, Vol. 111 No. 4, pp. 570-588.","DOI":"10.1108\/02635571111133551"},{"key":"key2021010220125123800_b36","doi-asserted-by":"crossref","unstructured":"Szyliowicz, J.S.\n                (2004), \u201cInternational transportation security\u201d, The Review of Policy Research, Vol. 21 No. 3, pp. 351-368.","DOI":"10.1111\/j.1541-1338.2004.00080.x"},{"key":"key2021010220125123800_b37","doi-asserted-by":"crossref","unstructured":"Thomas, A.R.\n                (2008), \u201cRecent transportation security developments\u201d, Journal of Transportation Security, Vol. 1 No. 2, pp. 140-141.","DOI":"10.1007\/s12198-008-0012-1"},{"key":"key2021010220125123800_b38","doi-asserted-by":"crossref","unstructured":"Waugh, W.L.\n                (2004), \u201cSecuring mass transit: a challenge for homeland security\u201d, Review of Policy Research, Vol. 21 No. 3, pp. 307-316.","DOI":"10.1111\/j.1541-1338.2004.00077.x"},{"key":"key2021010220125123800_b39","doi-asserted-by":"crossref","unstructured":"Witten, I.H.\n               , \n                  Frank, E.\n                and \n                  Hall, M.A.\n                (2011), Data Mining: Practical Machine Learning Tools and Techniques, 3rd ed., Elsevier, New York, NY.","DOI":"10.1016\/B978-0-12-374856-0.00001-8"}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-04-2013-0176\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IMDS-04-2013-0176\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:51:45Z","timestamp":1753393905000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/114\/2\/276-291\/176103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,4]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,3,4]]}},"alternative-id":["10.1108\/IMDS-04-2013-0176"],"URL":"https:\/\/doi.org\/10.1108\/imds-04-2013-0176","relation":{},"ISSN":["0263-5577"],"issn-type":[{"type":"print","value":"0263-5577"}],"subject":[],"published":{"date-parts":[[2014,3,4]]}}}