Human-Centered Design Approaches for Cybersecurity Training in Autonomous Vehicle Operations: Explores human-centered design approaches for cybersecurity training in autonomous vehicle operations
Published 14-05-2023
Keywords
- Human-Centered Design (HCD),
- Cybersecurity Training,
- Autonomous Vehicles (AVs)
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
How to Cite
Abstract
The increasing reliance on autonomous vehicles (AVs) necessitates a robust cybersecurity posture. Human operators play a critical role in ensuring the security of these complex systems. However, traditional cybersecurity training approaches often fail to consider the unique needs and cognitive limitations of human operators in AV operations. This research paper explores human-centered design (HCD) approaches for developing effective cybersecurity training programs for AV personnel.
The paper begins by highlighting the evolving landscape of autonomous vehicles and the growing cybersecurity threats they face. It emphasizes the critical role of human operators in identifying and responding to cyberattacks. Next, the paper explores the limitations of traditional cybersecurity training methods, which often rely on technical jargon and rote memorization. These methods can be ineffective in engaging learners and equipping them with the skills needed to make real-time decisions in complex cybersecurity scenarios.
Downloads
References
- Abbas, Ahmad, et al. "A Survey on Cybersecurity for Autonomous Vehicles." IEEE Communications Surveys & Tutorials , vol. 21, no. 1, Feb. 2019, pp. 440-467. doi: 10.1109/COMST.2018.2884523
- Tatineni, Sumanth. "Ethical Considerations in AI and Data Science: Bias, Fairness, and Accountability." International Journal of Information Technology and Management Information Systems (IJITMIS) 10.1 (2019): 11-21.
- Vemoori, V. “Towards Secure and Trustworthy Autonomous Vehicles: Leveraging Distributed Ledger Technology for Secure Communication and Exploring Explainable Artificial Intelligence for Robust Decision-Making and Comprehensive Testing”. Journal of Science & Technology, vol. 1, no. 1, Nov. 2020, pp. 130-7, https://thesciencebrigade.com/jst/article/view/224.
- Shaik, Mahammad, et al. "Granular Access Control for the Perpetually Expanding Internet of Things: A Deep Dive into Implementing Role-Based Access Control (RBAC) for Enhanced Device Security and Privacy." British Journal of Multidisciplinary and Advanced Studies 2.2 (2018): 136-160.
- Vemori, Vamsi. "Human-in-the-Loop Moral Decision-Making Frameworks for Situationally Aware Multi-Modal Autonomous Vehicle Networks: An Accessibility-Focused Approach." Journal of Computational Intelligence and Robotics 2.1 (2022): 54-87.
- Clark, Laura, et al. "Usability Testing in Cybersecurity Education." 2017 IEEE Frontiers in Education Conference (FIE) , Oct. 2017, pp. 1-9. doi: 10.1109/FIE.2017.8190622
- Conti, Mauro, et al. "A Survey of Methods for Effective Security Training." IEEE Transactions on Dependable and Secure Computing , vol. 13, no. 1, Jan.-Feb. 2016, pp. 52-70. doi: 10.1109/TDSC.2014.2384502
- Dhawan, Aditya, and Aniket S. Vulgaris. "A Framework for Human-Centered Design in Cybersecurity Education." Journal of Information Security Education , vol. 25, no. 4, Dec. 2017, pp. 375-390.
- Edwards, Stephanie A., et al. "Learning from Mistakes: A Multi-Method Investigation of User Experiences in Cybersecurity Training." Proceedings of the 2017 ACM Conference on Computer and Communications Security , Association for Computing Machinery, 2017, pp. 2021-2032. doi: 10.1145/3097287.3122822
- Egelman, Serge, et al. "What Makes Password Guessing Attacks Effective?" Proceedings of the 2008 ACM SIGCHI Conference on Human Factors in Computing Systems , Association for Computing Machinery, 2008, pp. 483-492. doi: 10.1145/1357054.1357122
- Fahl, Stefan, et al. "Why Users Fail to Patch Their Systems: The Psychology of Security Patching." Proceedings of the 2012 ACM SIGCHI Conference on Human Factors in Computing Systems , Association for Computing Machinery, 2012, pp. 541-549. doi: 10.1145/2208876.2208938
- Gonzalez-Córdova, Carlos A., et al. "A Systematic Review of Cybersecurity Education." Computers & Security , vol. 77, Dec. 2018, pp. 101-124. doi: 10.1016/j.cose.2018.02.010
- Grundy, John, et al. "User-Centered Design and Evaluation of Security Features." Future of Software Engineering (FOSE '08) , Association for Computing Machinery, 2008, pp. 105-114. doi: 10.1145/1368000.1368016
- Halawi, Rami, and Refik Molnar. "Human Factors in Autonomous Vehicles: Review of Literature." Transportation Research Part C: Emerging Technologies , vol. 103, Oct. 2019, pp. 24-45. doi: 10.1016/j.trc.2019.04.0