29,079 research outputs found

    Governing autonomous vehicles: emerging responses for safety, liability, privacy, cybersecurity, and industry risks

    Full text link
    The benefits of autonomous vehicles (AVs) are widely acknowledged, but there are concerns about the extent of these benefits and AV risks and unintended consequences. In this article, we first examine AVs and different categories of the technological risks associated with them. We then explore strategies that can be adopted to address these risks, and explore emerging responses by governments for addressing AV risks. Our analyses reveal that, thus far, governments have in most instances avoided stringent measures in order to promote AV developments and the majority of responses are non-binding and focus on creating councils or working groups to better explore AV implications. The US has been active in introducing legislations to address issues related to privacy and cybersecurity. The UK and Germany, in particular, have enacted laws to address liability issues, other countries mostly acknowledge these issues, but have yet to implement specific strategies. To address privacy and cybersecurity risks strategies ranging from introduction or amendment of non-AV specific legislation to creating working groups have been adopted. Much less attention has been paid to issues such as environmental and employment risks, although a few governments have begun programmes to retrain workers who might be negatively affected.Comment: Transport Reviews, 201

    Moving data down the road: a systematic review of information privacy concerns in Internet-of-Vehicles (IoV) literature

    Get PDF
    Internet-of-Things (IoT) technology reaches far and wide in the modern world. Many consumer products are now capable of connecting to networks in order to manage and move data that is created through their various capabilities. Automobiles are now being manufactured with the ability to connect to wireless networks. This capability allows these vehicles to transmit and receive data to and from their manufacturers. IoT technology implemented in automobiles and their accompanying infrastructure is considered the Internet-of-Vehicles (IoV) technology. The goal of this paper is to better understand the association between privacy concern and IoV through a systematic literature review with suggestions for future research. Through a systematic screening process, 7 articles were identified which studied the relationship between privacy and IoV technologies. All but one article found that privacy concern or perceived risk associated with data privacy was significant in IoV technologies. These findings suggest that privacy may play an important role in users’ decisions to adopt and use IoV technology. This article contributes to the growing knowledge of IoV technologies as they emerge in the automobile market

    Listening to users’ personal privacy concerns. The implication of trust and privacy concerns on the user's adoption of a MaaS-pilot

    Get PDF
    Mobility as a Service (MaaS) refers to the concept of integrating new mobility services electronically, thereby enabling users to access various public and private transport services via a single digital platform. Through MaaS, service providers aim at developing an integrated service that caters to various demands by mobility users. Personal data such as travel behavior is key in this context, because it allows the development, customization, and personalization of mobility services. Hence, for MaaS to become successful, service providers need to collect users' personal information, and users need to accept data collection. In turn, privacy concerns represent a potential hurdle for the success of MaaS. Therefore, understanding privacy concerns from the users' side can help MaaS providers to increase the users' willingness to share their information. This study aims to add on to earlier research findings on privacy concerns by shedding light on new dimensions emerging from the MaaS service. Understanding privacy concerns from the users' side is key in that regard, as it may enable improved service and system development. A sequential mixed-methods approach is used to collect, analyze, and “mix” both quantitative and qualitative research methods. The primary findings are as follows: (1) Privacy concerns specific to the mobility data collection context exist; (2) users are not necessarily personally worried about their privacy even though they claim privacy is an issue; (3) in contrast to traditional privacy thinking, users' trust in mobility service providers may override their privacy concerns. The study’s results indicate trust is the key to MaaS adoption. Policy recommendations are explored in the end.publishedVersio

    "This isn't the road I want to go down" Young people's perceptions and experiences of secure care

    Get PDF
    The consultation sought to map young people's secure journey ie. their experiences and views of secure care from admission through to final discharge, including the transition from secure care and the services they received to assist them in that transition. It centred on four broad themes intended to elicit young people's individual experiences and perceptions regarding: admission to secure care, time in secure care, exit from secure care, and reflections once left secure care

    Sound based social networks

    Get PDF
    The sound environment is an eco of the activity and character of each place, often carrying additional information to that made available to the eyes (both new and redundant). It is, therefore, an intangible and volatile acoustic fingerprint of the place, or simply an acoustic snapshot of a single event. Such rich resource, full of meaning and subtleness, Schaeffer called Soundscape. The exploratory research project presented here addresses the Soundscape in the context of Mobile Online Social Networking, aiming at determining the extent of its applicability regarding the establishment and/or strengthening of new and existing social links. Such research goal demanded an interdisciplinary approach, which we have anchored in three main stems: Soundscapes, Mobile Sound and Social Networking. These three areas pave the scientific ground for this study and are introduced during the first part of the thesis. An extensive survey of the state-of-the-arte projects related with this research is also presented, gathering examples from different but adjacent areas such as mobile sensing, wearable computing, sonification, social media and contextaware computing. This survey validates that our approach is scientifically opportune and unique, at the same time. Furthermore, in order to assess the role of Soundscapes in the context of Social Networking, an experimental procedure has been implemented based on an Online Social Networking mobile application, enriched with environmental sensing mechanisms, able to capture and analyze the surrounding Soundscape and users' movements. Two main goals guided this prototypal research tool: collecting data regarding users' activity (both sonic and kinetic) and providing users with a real experience using a Sound-Based Social Network, in order to collect informed opinions about this unique type of Social Networking. The application – Hurly-Burly – senses the surrounding Soundscape and analyzes it using machine audition techniques, classifying it according to four categories: speech, music, environmental sounds and silence. Additionally, it determines the sound pressure level of the sensed Soundscape in dB(A)eq. This information is then broadcasted to the entire online social network of the user, allowing each element to visualize and audition a representation of the collected data. An individual record for each user is kept available in a webserver and can be accessed through an online application, displaying the continuous acoustic profile of each user along a timeline graph. The experimental procedure included three different test groups, forming each one a social network with a cluster coefficient equal to one. After the implementation and result analysis stages we concluded that Soundscapes can have a role in the Online Social Networking paradigm, specially when concerning mobile applications. Has been proven that current offthe- shelf mobile technology is a promising opportunity for accomplishing this kind of tasks (such as continuous monitoring, life logging and environment sensing) but battery limitations and multitasking's constraints are still the bottleneck, hindering the massification of successful applications. Additionally, online privacy is something that users are not enthusiastic in letting go: using captured sound instead of representations of the sound would abstain users from utilizing such applications. We also demonstrated that users who are more aware of the Soundscape concept are also more inclined to assume it as playing an important role in OSN. This means that more pedagogy towards the acoustic phenomenon is needed and this type of research gives a step further in that direction.O ambiente sonoro de um lugar é um eco da sua atividade e carácter, transportando, na maior parte da vezes, informação adicional àquela que é proporcionada à visão (quer seja redundante ou complementar). É, portanto, uma impressão digital acústica - tangível e volátil - do lugar a que pertence, ou simplesmente uma fotografia acústica de um evento pontual. A este opulento recurso, carregado de significados e subtilezas, Schafer chamou de Paisagem-Sonora. O projeto de investigação de carácter exploratório que aqui apresentamos visa o estudo da Paisagem-Sonora no contexto das Redes Sociais Móveis Em-Linha, procurando entender os moldes e limites da sua aplicação, tendo em vista o estabelecimento e/ou reforço de novos ou existente laços sociais, respectivamente. Para satisfazer este objectivo foi necessária uma abordagem multidisciplinar, ancorada em três pilares principais: a Paisagem-Sonora, o Som Móvel e as Redes Sociais. Estas três áreas determinaram a moldura científica de referência em que se enquadrou esta investigação, sendo explanadas na primeira parte da tese. Um extenso levantamento do estado-da-arte referente a projetos relacionados com este estudo é também apresentado, compilando exemplos de áreas distintas mas adjacentes, tais como: Computação Sensorial Móvel, Computação Vestível, Sonificação, Média Social e Computação Contexto-Dependente. Este levantamento veio confirmar quer a originalidade quer a pertinência científica do projeto apresentado. Posteriormente, a fim de avaliar o papel da Paisagem-Sonora no contexto das Redes Sociais, foi posto em prática um procedimento experimental baseado numa Rede Social Sonora Em-Linha, desenvolvida de raiz para dispositivos móveis e acrescida de mecanismos sensoriais para estímulos ambientais, capazes de analisar a Paisagem-Sonora envolvente e os movimentos do utilizador. Dois objectivos principais guiaram a produção desta ferramenta de investigação: recolher dados relativos à atividade cinética e sonora dos utilizadores e proporcionar a estes uma experiência real de utilização uma Rede Social Sonora, de modo a recolher opiniões fundamentadas sobre esta tipologia específica de socialização. A aplicação – Hurly-Burly – analisa a Paisagem-Sonora através de algoritmos de Audição Computacional, classificando- a de acordo com quatro categorias: diálogo (voz), música, sons ambientais (“ruídos”) e silêncio. Adicionalmente, determina o seu nível de pressão sonora em dB(A)eq. Esta informação é então distribuída pela rede social dos utilizadores, permitindo a cada elemento visualizar e ouvir uma representação do som analisado. É mantido num servidor Web um registo individual da informação sonora e cinética captada, o qual pode ser acedido através de uma aplicação Web que mostra o perfil sonoro de cada utilizador ao longo do tempo, numa visualização ao estilo linha-temporal. O procedimento experimental incluiu três grupos de teste distintos, formando cada um a sua própria rede social com coeficiente de aglomeração igual a um. Após a implementação da experiência e análise de resultados, concluímos que a Paisagem- Sonora pode desempenhar um papel no paradigma das Redes Sociais Em- Linha, em particular no que diz respeito à sua presença nos dispositivos móveis. Ficou provado que os dispositivos móveis comerciais da atualidade apresentam-se com uma oportunidade promissora para desempenhar este tipo de tarefas (tais como: monitorização contínua, registo quotidiano e análise sensorial ambiental), mas as limitações relacionadas com a autonomia energética e funcionamento em multitarefa representam ainda um constrangimento que impede a sua massificação. Além disso, a privacidade no mundo virtual é algo que os utilizadores atuais não estão dispostos a abdicar: partilhar continuamente a Paisagem-Sonora real em detrimento de uma representação de alto nível é algo que refrearia os utilizadores de usar a aplicação. Também demonstrámos que os utilizadores que mais conhecedores do fenómeno da Paisagem-Sonora são também os que consideram esta como importante no contexto das Redes Sociais Em-Linha. Isso significa que uma atitude pedagógica em relação ao fenómeno sonoro é essencial para obter dele o maior ganho possível. Esta investigação propõe-se a dar um passo em frente nessa direção

    Towards a Framework for Preserving Privacy in VANET

    Get PDF
    Vehicular Ad-hoc Network (VANET) is envisioned as an integral part of the Intelligent Transportation Systems as it promises various services and benefits such as road safety, traffic efficiency, navigation and infotainment services. However, the security and privacy risks associated with the wireless communication are often overlooked. Messages exchanged in VANET wireless communication carry inferable Personally Identifiable Information(PII). This introduces several privacy threats that could limit the adoption of VANET. The quantification of these privacy threats is an active research area in VANET security and privacy domains. The Pseudonymisation technique is currently the most preferred solution for critical privacy threats in VANET to provide conditional anonymous authentication. In the existing literature, several Pseudonym Changing Schemes(PCS) have been proposed as effective de-identification approaches to prevent the inference of PII. However, for various reasons, none of the proposed schemes received public acceptance. Moreover, one of the open research challenges is to compare different PCSs under varying circumstances with a set of standardized experimenting parameters and consistent metrics. In this research, we propose a framework to assess the effectiveness of PCSs in VANET with a systematic approach. This comprehensive equitable framework consists of a variety of building blocks which are segmented into correlated sub-domains named Mobility Models, Adversary Models, and Privacy Metrics. Our research introduces a standard methodology to evaluate and compare VANET PCSs using a generic simulation setup to obtain optimal, realistic and most importantly, consistent results. This road map for the simulation setup aims to help the research \& development community to develop, assess and compare the PCS with standard set of parameters for proper analysis and reporting of new PCSs. The assessment of PCS should not only be equitable but also realistic and feasible. Therefore, the sub-domains of the framework need coherent as well as practically applicable characteristics. The Mobility Model is the layout of the traffic on the road which has varying features such as traffic density and traffic scenarios based on the geographical maps. A diverse range of Adversary Models is important for pragmatic evaluation of the PCSs which not only considers the presence of global passive adversary but also observes the effect of intelligent and strategic \u27local attacker\u27 placements. The biggest challenge in privacy measurement is the fact that it is a context-based evaluation. In the literature, the PCSs are evaluated using either user-oriented or adversary-oriented metrics. Under all circumstances, the PCSs should be assessed from both user and adversary perspectives. Using this framework, we determined that a local passive adversary can be strong based on the attacking capabilities. Therefore, we propose two intelligent adversary placements which help in privacy assessment with realistic adversary modelling. When the existing PCSs are assessed with our systematic approach, consistent models and metrics, we identified the privacy vulnerabilities and the limitations of existing PCSs. There was a need for comprehensive PCS which consider the context of the vehicles and the changing traffic patterns in the neighbourhood. Consequently, we developed a Context-Aware \& Traffic Based PCS that focuses on increasing the overall rate of confusion for the adversary and to reduce deterministic information regarding the pseudonym change. It is achieved by increasing the number of dynamic attributes in the proposed PCS for inference of the changing pattern of the pseudonyms. The PCS increases the anonymity of the vehicle by having the synchronized pseudonym changes. The details given under the sub-domains of the framework solidifies our findings to strengthen the privacy assessment of our proposed PCS

    Mobility is the Message: Experiments with Mobile Media Sharing

    Get PDF
    This thesis explores new mobile media sharing applications by building, deploying, and studying their use. While we share media in many different ways both on the web and on mobile phones, there are few ways of sharing media with people physically near us. Studied were three designed and built systems: Push!Music, Columbus, and Portrait Catalog, as well as a fourth commercially available system – Foursquare. This thesis offers four contributions: First, it explores the design space of co-present media sharing of four test systems. Second, through user studies of these systems it reports on how these come to be used. Third, it explores new ways of conducting trials as the technical mobile landscape has changed. Last, we look at how the technical solutions demonstrate different lines of thinking from how similar solutions might look today. Through a Human-Computer Interaction methodology of design, build, and study, we look at systems through the eyes of embodied interaction and examine how the systems come to be in use. Using Goffman’s understanding of social order, we see how these mobile media sharing systems allow people to actively present themselves through these media. In turn, using McLuhan’s way of understanding media, we reflect on how these new systems enable a new type of medium distinct from the web centric media, and how this relates directly to mobility. While media sharing is something that takes place everywhere in western society, it is still tied to the way media is shared through computers. Although often mobile, they do not consider the mobile settings. The systems in this thesis treat mobility as an opportunity for design. It is still left to see how this mobile media sharing will come to present itself in people’s everyday life, and when it does, how we will come to understand it and how it will transform society as a medium distinct from those before. This thesis gives a glimpse at what this future will look like
    corecore