The Design of a Benefit-Cost Architecture for Homeland Security Policy Analysis V. Kerry Smith (Arizona State University, RFF, NBER) Carol Mansfield (RTI International) Prepared for Estimating the Benefits of Homeland Security Policies September 23 & 24, 2010 Funded by CREATE@USC 4/13/2015 www.rti.org 1 Analysis is Especially Important in Challenging Economic Times “Regulations must be designed in a way that promotes, and does not undermine, the continuing recovery. A transparent accounting of consequences – of costs and benefits – is indispensable. If we look before we leap, with a commitment to openness, we are going to be finding unprecedented opportunities for improving and even extending people’s lives.” (pp23-24) Sunstein, Cass R., 2010. “Humanizing cost benefit analysis” Remarks prepared for the Administrative Law Review Conference, American University, Washington College of Law, Washington, D.C. 4/13/2015 www.rti.org Objectives Measuring benefits for benefit-cost analysis Steps to define benefits Use Secure Flight as example Tradeoffs from revealed and stated preference work VSL and Opportunity Cost Choice Experiments Describing Architecture for Policy Analysis and relation to defining benefits Need to consider who are the affected economic agents 4/13/2015 www.rti.org Steps to Define and Measure Benefits Rule or policy has list of actions or tasks Link tasks to expected outcomes for individuals Expected outcomes to objects of choice Quantitative or qualitative measures for objects of choice Baseline, change if rule implemented, define affected groups Evaluate trade-offs individuals would make to get changes (value) and the extent of the market 4/13/2015 www.rti.org 4 4/13/2015 www.rti.org Example: Secure Flight RIA General Description Transfer, from aircraft operators to federal agencies, the tasks associated with conducting pre-flight comparisons of airline passenger information with the Federal Government’s watch lists Allows for access to gate area by some nontraveling individuals (for example, escorting a minor or passenger with disabilities) 4/13/2015 www.rti.org 6 Actions Listed in Secure Flight (examples) TSA will assume the domestic watch list matching function from aircraft operators TSA will assume from the U.S. Customs and Border Protection the responsibility for comparing passenger information to government watch lists for certain domestic and foreign aircraft operators Airlines transmit information on passengers and nontravelers to TSA TSA can ask airlines to require additional 4/13/2015identification from passenger www.rti.org 7 Actions to Expected Outcomes (from RIA) • Improved security in airports and on airlines • Greater access for non-traveling individuals • Reduced false positives or misidentification of travelers as potential security threats • Increased watch list security • Boarding pass authentication 4/13/2015 www.rti.org Expected Outcomes to Objects of Choice Objects of choice are the set of things over which people have preferences From microeconomic theory to provide a general description for the relationship between consumers’ choices and the observed patterns of demand People can have preferences for anything less tangible goods like “peace of mind when risks are reduced” 4/13/2015 www.rti.org 9 Objects of Choice, con’t For many (most?) DHS rules, the objects of choice will not be market goods Objects of choice will be risk reductions, opportunity cost of time, level of privacy, amount of hassle These objects of choice can be complements with decisions we observe the individual making like purchasing tickets 4/13/2015 www.rti.org 10 Objects of Choice for Secure Flight, Example Household production function one way to think about less tangible objects of choice: U(Leisure time activities) Leisure travel = f(equipment, transportation, lodging, activities, time) Transportation = f(cost of tickets, time, fear of terrorist attack on an airplane). Objects of choice for Secure Flight might be “fear of a terrorist attack” and “time spent waiting in security”. 4/13/2015 www.rti.org 11 Example, con’t Risk of terrorist attack on airplanes and tickets are complements Demand for airline tickets will increase as risk decreases, will provide some information about preferences for risk 4/13/2015 www.rti.org 12 Total Focus V (m W TP, p, q q) V (m, p, q) (1) q baseline(objectof choice) q change W TP tradeoff Incremental Focus Vm dm Vqdq 0 Vq dm dq Vm 4/13/2015 www.rti.org (save resources if q desirable) (2) (3) Heterogeneity in WTP and in demand for complement WTP for change in object of choice affected by How the rule is implemented (mechanism for achieving risk reduction) Baseline level Size of change Demand for complement (airline tickets) will vary across individuals Differences across individuals in elasticity of demand (business travelers vs. leisure travelers) 4/13/2015 www.rti.org 14 VSL ( p, r1 ,.. . ., rJ ) (4) EU (1 ( p, r1 , . . ., rJ ))U D (W ) ( p, r1 , . . ., rJ )U A (W ) (5) ( / p )[U A (W ) U D (W )] dW 0 dp U A (W ) (1 )U D (W ) (6) VSL dw VSL is measured by considering dp from the number (N) of people willing to pay this amount so risk change and N imply fatalities reduce by one. 4/13/2015 www.rti.org Opportunity Cost of Time Max: Subject to: u(x, H, M ) y= income x= numeraire (price=unity) H= leisure M = household work (pre-determined time) T= total time (net work) y = x+ps [ M - f (T-H)] Issues: 1) Do we define y in terms of earnings W.TW so T=Tt-Tw 2) If the answer is no then what margin do we use to get value of time 4/13/2015 www.rti.org UH shadowvalueof time p s f ' Ux Extent of the Market Extent of the market: defining who is affected by the rule Need to assign objects of choice to each group Travelers: reduced risk of attack, reduced risk of being mistakenly identified as on the watch list Parents of traveling children: greater security for children traveling alone, reduced risk of attack 4/13/2015 www.rti.org 17 Example from Biometric Exit RIA (Table 5-2 in RIA) Exit Objective Exit Benefit Measure Biometrically verify alien identity Increased Qualitative: reduction of National Security terrorism costs due to border security, unquantified security benefits Mechanism to identify visa overstays Improved detection of visa overstays Percentage of visa overstays detected, Cost savings from identifying visa over-stayer before reentry to US 4/13/2015 www.rti.org 18 Defining and Measuring Benefits: Examples from our work 5 years ago we initiated a modest program of research to design and implement three stated preference surveys measuring the benefits of some security programs The surveys were exploratory, not clear whether we could describe the “goods” and people could answer the questions 4/13/2015 www.rti.org 19 Threat of Shoulder-Mounted Missile Attack on Airplanes Plans MANPADS (missile defense technology) Training for pilots if plane hit Patrol airport perimeter Attributes varied: Waiting time in security, cost Payment vehicles: Gasoline tax, income tax Link for benefit transfer: opportunity cost of time, (risk of attack not specified) 4/13/2015 www.rti.org 20 Food Safety Plans More FDA inspectors Home test kit for use before cooking Medicine if get sick Varied: risk of illness, severity of illness, cost, time to use test kit when cooking Payment vehicle: income tax, cost of kit or medicine Link for benefit transfer: risk and severity of illness, opportunity cost of time 4/13/2015 www.rti.org 21 Dirty Bombs Plans Build facilities to shelter in place Monitors and cameras to detect radioactive material Plan and practice evacuating the city Varied map showing example of dirty bomb (40 maps), leave days used to practice evacuation Payment vehicle: income tax Link to benefit transfer: opportunity cost of time, geographic variation across metro areas 4/13/2015 www.rti.org 22 Policy Analysis Architecture A framework to link the regulations to the consequences for people, firms, and other institutions in ways that allow the benefits and costs of each change to be clearly articulated and assessed. Must be general enough to accommodate a wide variety of rules EPA uses risk management, their policy analysis centers around risk assessment 4/13/2015 www.rti.org 23 Passengers Maintenance Operations Outset of Travel Cargo Shoulder Mounted Missiles Disrupt Air Traffic Control Small Planes As Weapon During Travel •Take Off •Landing Composite Perception of Security and “Cost” of Travel Risk of Travel Time Required and Cost of Security Overhead Cost of the System Viability of Airline System 4/13/2015 www.rti.org Threat Point Source of Threat Analysis Framework Organized Around Preparedness May, Michael, Lynn Eden, Patrick Roberts, and Jacob N. Shapiro. 2006. An Analytic Approach to Preparedness for Homeland Security. Stanford CA: Center for International Security and Cooperation; Freeman Spogli Institute for International Studies. 4/13/2015 www.rti.org 25 Events: What are the consequences in terms of capabilities based planning? Prevention and Protection: What capabilities are needed to prevent and protect? What performance measures are needed to assess these capabilities? Response and Recovery: What capabilities are needed to respond and recover? What performance measures are needed to assess these capabilities? Crosscutting elements of Preparedness: •Allocating finite resources under conditions of uncertainty •Prioritizing what to protect •Structuring incentives for complementary private action •Recognizing the endogeneity in the responses to some threats 4/13/2015 •Identifying ancillary benefits from policies not related to www.rti.org security homeland 26 Potential Complementarities in Protection Activity that can also be exploited for analysis a 1. Prevention to stop attacks 2. Prevention to deter attacks 3. Prevention to eliminate natural or industrial disasters 4. Protection to reduce damage 5. Protection by physical separation 4/13/2015 www.rti.org Terrorist attack X Natural disaster Industrial disaster X X X X X X X X X a Source: May et. al. [2006] Moving to Architecture for Analysis What will be the Focus of Rules? •Ex ante risk reduction •Ex ante consequence reduction •Ex post response •Composite—need to consider different benefit concepts (certainty equivalent, option price, etc.) 4/13/2015 www.rti.org Importance of Feedback Evaluation should include reviewing economic analysis for past rules What did the analysis capture and what did it miss? In the decision-making process, how was the analysis used? Which parts were most useful? What methods provided most information? 4/13/2015 www.rti.org 29 Conclusion The development of an organization’s analysis capacity takes place within the context of the group’s goals Benefit-cost analysis provides policy makers a systematic evaluation based on economic theory of what policies that restrict private activities or manage resources held in public trust are expected to accomplish The structure, methods and outcomes evaluated will be shaped by the policy architecture that evolves in DHS 4/13/2015 www.rti.org 30