Vol. 3 No. 1 (2023): African Journal of Artificial Intelligence and Sustainable Development
Articles

Human-Centered Design Approaches for Cybersecurity Training in Autonomous Vehicle Operations: Explores human-centered design approaches for cybersecurity training in autonomous vehicle operations

Dr. Evelyn Figueroa
Professor of Industrial Engineering, University of Chile
Cover

Published 14-05-2023

Keywords

  • Human-Centered Design (HCD),
  • Cybersecurity Training,
  • Autonomous Vehicles (AVs)

How to Cite

[1]
Dr. Evelyn Figueroa, “Human-Centered Design Approaches for Cybersecurity Training in Autonomous Vehicle Operations: Explores human-centered design approaches for cybersecurity training in autonomous vehicle operations”, African J. of Artificial Int. and Sust. Dev., vol. 3, no. 1, pp. 120–130, May 2023, Accessed: Nov. 24, 2024. [Online]. Available: https://africansciencegroup.com/index.php/AJAISD/article/view/64

Abstract

The increasing reliance on autonomous vehicles (AVs) necessitates a robust cybersecurity posture. Human operators play a critical role in ensuring the security of these complex systems. However, traditional cybersecurity training approaches often fail to consider the unique needs and cognitive limitations of human operators in AV operations. This research paper explores human-centered design (HCD) approaches for developing effective cybersecurity training programs for AV personnel.

The paper begins by highlighting the evolving landscape of autonomous vehicles and the growing cybersecurity threats they face. It emphasizes the critical role of human operators in identifying and responding to cyberattacks. Next, the paper explores the limitations of traditional cybersecurity training methods, which often rely on technical jargon and rote memorization. These methods can be ineffective in engaging learners and equipping them with the skills needed to make real-time decisions in complex cybersecurity scenarios.

Downloads

Download data is not yet available.

References

  1. Abbas, Ahmad, et al. "A Survey on Cybersecurity for Autonomous Vehicles." IEEE Communications Surveys & Tutorials , vol. 21, no. 1, Feb. 2019, pp. 440-467. doi: 10.1109/COMST.2018.2884523
  2. Tatineni, Sumanth. "Ethical Considerations in AI and Data Science: Bias, Fairness, and Accountability." International Journal of Information Technology and Management Information Systems (IJITMIS) 10.1 (2019): 11-21.
  3. Vemoori, V. “Towards Secure and Trustworthy Autonomous Vehicles: Leveraging Distributed Ledger Technology for Secure Communication and Exploring Explainable Artificial Intelligence for Robust Decision-Making and Comprehensive Testing”. Journal of Science & Technology, vol. 1, no. 1, Nov. 2020, pp. 130-7, https://thesciencebrigade.com/jst/article/view/224.
  4. Shaik, Mahammad, et al. "Granular Access Control for the Perpetually Expanding Internet of Things: A Deep Dive into Implementing Role-Based Access Control (RBAC) for Enhanced Device Security and Privacy." British Journal of Multidisciplinary and Advanced Studies 2.2 (2018): 136-160.
  5. Vemori, Vamsi. "Human-in-the-Loop Moral Decision-Making Frameworks for Situationally Aware Multi-Modal Autonomous Vehicle Networks: An Accessibility-Focused Approach." Journal of Computational Intelligence and Robotics 2.1 (2022): 54-87.
  6. Clark, Laura, et al. "Usability Testing in Cybersecurity Education." 2017 IEEE Frontiers in Education Conference (FIE) , Oct. 2017, pp. 1-9. doi: 10.1109/FIE.2017.8190622
  7. Conti, Mauro, et al. "A Survey of Methods for Effective Security Training." IEEE Transactions on Dependable and Secure Computing , vol. 13, no. 1, Jan.-Feb. 2016, pp. 52-70. doi: 10.1109/TDSC.2014.2384502
  8. Dhawan, Aditya, and Aniket S. Vulgaris. "A Framework for Human-Centered Design in Cybersecurity Education." Journal of Information Security Education , vol. 25, no. 4, Dec. 2017, pp. 375-390.
  9. Edwards, Stephanie A., et al. "Learning from Mistakes: A Multi-Method Investigation of User Experiences in Cybersecurity Training." Proceedings of the 2017 ACM Conference on Computer and Communications Security , Association for Computing Machinery, 2017, pp. 2021-2032. doi: 10.1145/3097287.3122822
  10. Egelman, Serge, et al. "What Makes Password Guessing Attacks Effective?" Proceedings of the 2008 ACM SIGCHI Conference on Human Factors in Computing Systems , Association for Computing Machinery, 2008, pp. 483-492. doi: 10.1145/1357054.1357122
  11. Fahl, Stefan, et al. "Why Users Fail to Patch Their Systems: The Psychology of Security Patching." Proceedings of the 2012 ACM SIGCHI Conference on Human Factors in Computing Systems , Association for Computing Machinery, 2012, pp. 541-549. doi: 10.1145/2208876.2208938
  12. Gonzalez-Córdova, Carlos A., et al. "A Systematic Review of Cybersecurity Education." Computers & Security , vol. 77, Dec. 2018, pp. 101-124. doi: 10.1016/j.cose.2018.02.010
  13. Grundy, John, et al. "User-Centered Design and Evaluation of Security Features." Future of Software Engineering (FOSE '08) , Association for Computing Machinery, 2008, pp. 105-114. doi: 10.1145/1368000.1368016
  14. Halawi, Rami, and Refik Molnar. "Human Factors in Autonomous Vehicles: Review of Literature." Transportation Research Part C: Emerging Technologies , vol. 103, Oct. 2019, pp. 24-45. doi: 10.1016/j.trc.2019.04.0