Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research

被引:33
作者
Linkov, Vaclav [1 ]
Zamecnik, Petr [1 ]
Havlickova, Darina [1 ]
Pai, Chih-Wei [2 ]
机构
[1] CDV Transport Res Ctr, Dept Traff Psychol, Brno, Czech Republic
[2] Taipei Med Univ, Grad Inst Injury Prevent & Control, Coll Publ Hlth, Taipei, Taiwan
来源
FRONTIERS IN PSYCHOLOGY | 2019年 / 10卷
关键词
autonomous vehicle; cybersecurity; human factor; cyberattack; hackers; CYBER SECURITY; DECISION-MAKING; STYLES; IMPACT; POLICY; THREAT; ATTACK;
D O I
10.3389/fpsyg.2019.00995
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
The cybersecurity of autonomous vehicles (AVs) is an important emerging area of research in traffic safety. Because human failure is the most common reason for a successful cyberattack, human-factor researchers and psychologists might improve AV cybersecurity by researching how to decrease the probability of a successful attack. We review some areas of research connected to the human factor in cybersecurity and find many potential issues. Psychologists might research the characteristics of people prone to cybersecurity failure, the types of scenarios they fail in and the factors that influence this failure or over-trust of AV. Human behavior during a cyberattack might be researched, as well as how to educate people about cybersecurity. Multitasking has an effect on the ability to defend against a cyberattack and research is needed to set the appropriate policy. Human-resource researchers might investigate the skills required for personnel working in AV cybersecurity and how to detect potential defectors early. The psychological profile of cyber attackers should be investigated to be able to set policies to decrease their motivation. Finally, the decrease of driver's driving skills as a result of using AV and its connection to cybersecurity skills is also worth of research.
引用
收藏
页数:7
相关论文
共 69 条
  • [1] Al Mamun A., 2018, P 2018 INT C EL EL T
  • [2] [Anonymous], 2011, USENIX SEC S
  • [3] Gender difference and employees' cybersecurity behaviors
    Anwar, Mohd
    He, Wu
    Ash, Ivan
    Yuan, Xiaohong
    Li, Ling
    Xu, Li
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2017, 69 : 437 - 443
  • [4] Axelrod C. W., 2017, P 2017 IEEE LONG ISL
  • [5] Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool
    Bashir, Masooda
    Wee, Colin
    Memon, Nasir
    Guo, Boyi
    [J]. COMPUTERS & SECURITY, 2017, 65 : 153 - 165
  • [6] Cyber-attack and defense simulation framework
    Bergin, Dennis Lee
    [J]. JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 383 - 392
  • [7] Costly but effective: Comparing the factors that influence employee anti-malware behaviours
    Blythe, John M.
    Coventry, Lynne
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2018, 87 : 87 - 97
  • [8] Bordoff Samantha, 2017, International Journal of Cyber Behavior, Psychology and Learning, V7, P68, DOI 10.4018/IJCBPL.2017100106
  • [9] Do Different Mental Models Influence Cybersecurity Behavior? Evaluations via Statistical Reasoning Performance
    Brase, Gary L.
    Vasserman, Eugene Y.
    Hsu, William
    [J]. FRONTIERS IN PSYCHOLOGY, 2017, 8
  • [10] Cyber Teaming and Role Specialization in a Cyber Security Defense Competition
    Buchler, Norbou
    La Fleur, Claire Genevieve
    Hoffman, Blaine
    Rajivan, Prashanth
    Marusich, Laura
    Lightner, Lewis
    [J]. FRONTIERS IN PSYCHOLOGY, 2018, 9