The Effects of Cyber Readiness and Response on Human Trust in Self Driving Cars

Victoria Marcinkiewicz, Qiyuan Zhang, Phillip Morgan
{"title":"The Effects of Cyber Readiness and Response on Human Trust in Self Driving Cars","authors":"Victoria Marcinkiewicz, Qiyuan Zhang, Phillip Morgan","doi":"10.54941/ahfe1003719","DOIUrl":null,"url":null,"abstract":"Self driving cars (SDC) are potentially set to revolutionise the automotive industry. Despite the promise of a plethora of purported benefits (e.g. fewer road traffic accidents, better traffic flow; lower emissions), one key concern relates to the potential for SDCs and their connected infrastructure to be cyber attacked. Aside from material losses, an adverse cyber experience is likely to undermine human trust – with trust being a key contributing factor to the uptake and use of automated technology such as SDCs.Many studies have projected the different types of cyber attacks an SDC could fall victim to [1]. Concerns about the consequences of cyber attacks for e.g. users, other road users, manufacturers, legislators, legal experts, and governments have also been raised. Procedural and technical solutions have been proposed to tackle the SDC-cyber security challenge, which includes the proposition of rankings for SDCs GPS system vulnerabilities [2].Nonetheless, it is inevitable that threat actors will compromise an SDC system(s) through either exploited vulnerabilities and/or user error. It is crucial that such an event(s) does not erode trust (e.g. leading to misuse or even disuse) if the long-term benefits of this technology are to be reaped. Therefore, the study explores whether the capability and obligation from a SDC company (who are most likely to be blamed when an attack happens) to manage a cyber attack – with regards to its readiness and response activities – impacts trust in SDC technology.Using a cutting-edge AV Simulation Driving Simulator and simulation software generated animations (SCANeR Studio) embedded into an online survey, participants watch a futuristic driving scenario where the SDC executes a variety of successful driving manoeuvres before the system falls victim to an unspecified cyber-attack. Self-reported trust is measured after each successful manoeuvre as well as following the cyber attack. The experiment follows a 3x2 – 6 condition design – manipulated between participants. In each condition, all participants are shown the same driving scenario. The independent variables (IVs) consist of the information given to the participant before and after watching the scenario: IV1 being the SDCs cyber readiness (low/medium/high) and IV2, the SDCs company’s response to the incident (positive/negative). Before watching the scenario, information about cars status (including its cyber readiness) is provided. After watching the scenario and experiencing the cyber attack, participants are provided with text detailing how the SDC company responded to the cyber attack. The key prediction is that a company with higher cyber maturity (i.e. has a high level of cyber readiness and responds positively to the incident) will be trusted more than a company/companies with lower cyber security considerations. Currently the experiment is in progress and findings and details on the implications will be presented in the paper. Future research will involve exploring the boundary conditions of the effects and extending to physiological as well as subjective measures of trust.References: [1] Phama, M. & Xiongb, K. (2021) A survey on security attacks and defense techniques for connected and autonomous vehicles, Computers & Security, 109(1), 1-29. https://doi.org/10.1016/j.cose.2021.102269[2] Sheehan, B., Murphy, F., Mullins, M., Ryan, C. (2019) Connected and autonomous vehicles: A cyber-risk classification framework. Transportation Research Part A: Policy and Practice. 124(1), 523-536. https://doi.org/10.1016/j.tra.2018.06.033The work is part of a PhD funded project by the EPSRC IDTH in Cyber Security Analytics. It is also part of an ESRC-JST (Economic & Social Research Council - Japan Science & Technology Agency) project grant reference: ES/T007079/1, Prof Morgan is UK PI : Rule of Law in the Age of AI: Principles of Distributive Liability for Multi-Agent Societies.","PeriodicalId":373044,"journal":{"name":"Human Factors in Cybersecurity","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Human Factors in Cybersecurity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54941/ahfe1003719","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Self driving cars (SDC) are potentially set to revolutionise the automotive industry. Despite the promise of a plethora of purported benefits (e.g. fewer road traffic accidents, better traffic flow; lower emissions), one key concern relates to the potential for SDCs and their connected infrastructure to be cyber attacked. Aside from material losses, an adverse cyber experience is likely to undermine human trust – with trust being a key contributing factor to the uptake and use of automated technology such as SDCs.Many studies have projected the different types of cyber attacks an SDC could fall victim to [1]. Concerns about the consequences of cyber attacks for e.g. users, other road users, manufacturers, legislators, legal experts, and governments have also been raised. Procedural and technical solutions have been proposed to tackle the SDC-cyber security challenge, which includes the proposition of rankings for SDCs GPS system vulnerabilities [2].Nonetheless, it is inevitable that threat actors will compromise an SDC system(s) through either exploited vulnerabilities and/or user error. It is crucial that such an event(s) does not erode trust (e.g. leading to misuse or even disuse) if the long-term benefits of this technology are to be reaped. Therefore, the study explores whether the capability and obligation from a SDC company (who are most likely to be blamed when an attack happens) to manage a cyber attack – with regards to its readiness and response activities – impacts trust in SDC technology.Using a cutting-edge AV Simulation Driving Simulator and simulation software generated animations (SCANeR Studio) embedded into an online survey, participants watch a futuristic driving scenario where the SDC executes a variety of successful driving manoeuvres before the system falls victim to an unspecified cyber-attack. Self-reported trust is measured after each successful manoeuvre as well as following the cyber attack. The experiment follows a 3x2 – 6 condition design – manipulated between participants. In each condition, all participants are shown the same driving scenario. The independent variables (IVs) consist of the information given to the participant before and after watching the scenario: IV1 being the SDCs cyber readiness (low/medium/high) and IV2, the SDCs company’s response to the incident (positive/negative). Before watching the scenario, information about cars status (including its cyber readiness) is provided. After watching the scenario and experiencing the cyber attack, participants are provided with text detailing how the SDC company responded to the cyber attack. The key prediction is that a company with higher cyber maturity (i.e. has a high level of cyber readiness and responds positively to the incident) will be trusted more than a company/companies with lower cyber security considerations. Currently the experiment is in progress and findings and details on the implications will be presented in the paper. Future research will involve exploring the boundary conditions of the effects and extending to physiological as well as subjective measures of trust.References: [1] Phama, M. & Xiongb, K. (2021) A survey on security attacks and defense techniques for connected and autonomous vehicles, Computers & Security, 109(1), 1-29. https://doi.org/10.1016/j.cose.2021.102269[2] Sheehan, B., Murphy, F., Mullins, M., Ryan, C. (2019) Connected and autonomous vehicles: A cyber-risk classification framework. Transportation Research Part A: Policy and Practice. 124(1), 523-536. https://doi.org/10.1016/j.tra.2018.06.033The work is part of a PhD funded project by the EPSRC IDTH in Cyber Security Analytics. It is also part of an ESRC-JST (Economic & Social Research Council - Japan Science & Technology Agency) project grant reference: ES/T007079/1, Prof Morgan is UK PI : Rule of Law in the Age of AI: Principles of Distributive Liability for Multi-Agent Societies.
网络准备和反应对人类对自动驾驶汽车信任的影响
自动驾驶汽车(SDC)可能会给汽车行业带来革命性的变化。尽管有很多所谓的好处(例如,减少道路交通事故,改善交通流量;更低的排放),一个关键的担忧涉及到可持续发展国家及其连接的基础设施受到网络攻击的可能性。除了物质损失之外,不良的网络体验可能会破坏人与人之间的信任——信任是采用和使用SDCs等自动化技术的关键因素。许多研究预测了SDC可能遭受的不同类型的网络攻击[1]。人们还对网络攻击对用户、其他道路使用者、制造商、立法者、法律专家和政府等造成的后果表示关切。已经提出了解决sdc网络安全挑战的程序和技术解决方案,其中包括对sdc GPS系统漏洞进行排名的提议[2]。尽管如此,威胁行为者不可避免地会通过利用漏洞和/或用户错误来破坏SDC系统。如果要获得这项技术的长期利益,至关重要的是,这样的事件不会侵蚀信任(例如导致误用甚至废弃)。因此,本研究探讨了SDC公司(攻击发生时最有可能受到指责的公司)管理网络攻击的能力和义务——就其准备就绪和响应活动而言——是否会影响对SDC技术的信任。参与者使用先进的自动驾驶模拟驾驶模拟器和嵌入到在线调查中的模拟软件生成动画(SCANeR Studio),观看未来驾驶场景,其中自动驾驶系统在系统遭受未指定的网络攻击之前执行各种成功的驾驶动作。自我报告的信任是在每次成功操作之后以及在网络攻击之后进行测量的。实验遵循3x2 - 6条件设计,在参与者之间进行操纵。在每种情况下,所有参与者都被展示了相同的驾驶场景。自变量(IVs)由在观看场景之前和之后提供给参与者的信息组成:IV1是SDCs的网络准备情况(低/中/高),IV2是SDCs公司对事件的反应(积极/消极)。在观看场景之前,提供有关汽车状态的信息(包括其网络准备情况)。在观看了场景并体验了网络攻击之后,参与者将获得详细介绍SDC公司如何应对网络攻击的文本。关键预测是,网络成熟度较高的公司(即具有高水平的网络准备并积极响应事件)将比网络安全考虑较低的公司更受信任。目前,该实验正在进行中,有关结果和影响的细节将在论文中提出。未来的研究将包括探索影响的边界条件,并扩展到生理和主观的信任措施。[1]王晓明,王晓明。基于网络的自动驾驶汽车安全攻击与防御技术研究进展[j] .计算机科学与技术,2016,31(1):1-29。[2]李建军,李建军,李建军,李建军。基于网络安全的汽车网络风险分类研究[j]。交通运输研究与发展,2014,(1),523-536。https://doi.org/10.1016/j.tra.2018.06.033The的工作是EPSRC IDTH网络安全分析博士资助项目的一部分。它也是ESRC-JST(经济与社会研究委员会-日本科学技术机构)项目资助的一部分,参考文献:ES/T007079/1,摩根教授是英国PI:人工智能时代的法治:多主体社会的分配责任原则。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信