Research Article | | Peer-Reviewed

Perception and Trust in Autonomous Vehicles Post Cyber Security Incidents

Received: 9 August 2024     Accepted: 2 September 2024     Published: 18 October 2024
Views:       Downloads:
Abstract

The integration of Autonomous Vehicles (AVs) into modern systems of transportation brings with it a new and transformative era. Central to the successful realisation of this transformation is the public’s trust in these vehicles and their safety, particularly in the aftermath of cyber security breaches. The following research therefore explores the various factors underpinning this trust in the context of cyber security incidents. A dual-methodological approach was used in the study. Quantitative data was gathered from structured questionnaires distributed to and completed by a cohort of 151 participants and qualitative data, from comprehensive semi-structured interviews with AV technology and cyber security experts. Rigorous Structural Equation Modelling of the quantitative data then allowed for the identification of the key factors influencing public trust from the standpoint of the research participants including the perceived safety of AV technology, the severity of cyber security incidents, the historic cyber security track record of companies and the frequency of successful cyber security breaches. The role of government regulations, though also influential, emerged as less so. The qualitative data, processed via thematic analysis, resonated with the findings from the quantitative data. This highlighted the importance of perceived safety, incident severity, regulatory frameworks and corporate legacy in shaping public trust. Whilst cyber incidents no doubt erode trust in AVs, a combination of technological perception, regulatory scaffolding and corporate history critically impacts this. These insights are instrumental for stakeholders, from policymakers to AV manufacturers, in charting the course of AV assimilation successfully in future.

Published in American Journal of Computer Science and Technology (Volume 7, Issue 4)
DOI 10.11648/j.ajcst.20240704.11
Page(s) 122-138
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Autonomous Vehicles, Cyber Attacks, Public Trust, Perceived Safety, Regulatory Frameworks

References
[1] Braun, V. and Clarke, V. (2006). Using Thematic Analysis in Psychology. Qualitative Research in Psychology, 3(2), pp.77–101.
[2] Nastjuk, I., Herrenkind, B., Marrone, M., Brendel, A. B. and Kolbe, L. M. (2020). What drives the acceptance of autonomous Driving? An investigation of acceptance factors from an end-user's perspective. Technological Forecasting and Social Change, 161, p. 120319.
[3] Biswas, A. and Wang, H. C (2023). Autonomous Vehicles Enabled by the Integration of IoT, Edge Intelligence, 5G, and Blockchain, Sensor, 23(4), p. 1963.
[4] Synopsys (2019). What is an autonomous car? How are self-driving cars? Available at:
[5] Tempo Automation (2019). Features of Today's BestAutonomous Cars. Tempo. Available at:
[6] Broeck, J. V. den, Cunningham, S. A., Eeckels, R. and Herbst, K. (2005). Data Cleaning: Detecting, Diagnosing, and Editing Data Abnormalities. PLoS Medicine, [online] 2(10), p. e267.
[7] Serban, A. et al. (2020). A Standard Driven SoftwareArchitecture for Fully Autonomous Vehicles. Journal ofAutomotive Software Engineering Vol. 00(0), Feb 2020, pp. 1-14. Available at:
[8] Taeihagh, A. and Lim, H. S. M. (2018). Governing Autonomous vehicles: Emerging Responses for Safety, liability, privacy, cybersecurity, and Industry Risks. Transport Reviews, 39(1), pp. 103–128.
[9] SAE International (2021). SAE Levels of DrivingAutomationTM Refined for Clarity and International Audience. Available at:
[10] Giordani, J. (2021). Cyberattacks On Vehicles Pose A Threat To Drivers And Manufacturers. Available at:
[11] Colombo, D. (2022). How I got access to 25+ Tesla's around the world. By accident. And curiosity. [online] Medium. Available at:
[12] Truong, J. (2021). How to Hack Self-Driving Cars: Vulnerabilities in Autonomous Vehicles | HackerNoon. Available at:
[13] Seetharaman, A., Patwa, N., Jadhav, V., Saravanan, AS andSangeeth, D. (2020). Impact of Factors Influencing Cyber Threatson Autonomous Vehicles. Applied Artificial Intelligence, pp. 1–28.
[14] Kaur, K. and Rampersad, G. (2018). Trust in driverless cars: Investigating key factors influencing the adoption of driverless cars. Journal of Engineering and Technology Management, 48, pp. 87–96.
[15] Luo, X., Li, H., Zhang, J. and Shim, J. P. (2010). Examining multi-dimensional Trust and multi-faceted risk in initial acceptance of emerging technologies: An empirical study of mobile banking services. Decision Support Systems, 49(2), pp. 222–234.
[16] Mayer, R. C., Davis, J. H. and Schoorman, F. D. (1995). An Integrative Model of Organizational Trust. The Academy of Management Review, 20(3), pp. 709–734.
[17] Lee, J. D. and See, K. A. (2004). Trust in Automation: Designing for Appropriate Reliance. Human Factors: The Journal of the Human Factors and Ergonomics Society, 46(1), pp. 50–80.
[18] Kaplan, A. D., Kessler, T. T., Brill, J. C. and Hancock, P. A., 2023. Trust in artificial intelligence: Meta-analytic findings. Human factors, 65(2), pp. 337-359.
[19] Tenhundfeld, N., Demir, M. and de Visser, E. (2022). Assessment of Trust in Automation in the ‘Real World’: Requirements for New Trust in Automation Measurement Techniques for Use by Practitioners.
[20] Hoff, K. A. and Bashir, M. (2014). Trust in Automation: Integrating Empirical Evidence on Factors That Influence Trust. Human Factors: The Journal of the Human Factors and Ergonomics Society, 57(3), pp. 407–434.
[21] Zmud, J. P. and Sener, I. N. (2017). Towards an Understandingof the Travel Behavior Impact of Autonomous Vehicles. Transportation Research Procedia, 25, pp. 2500–2519.
[22] Klein, U., Depping, J., Wohlfahrt, L. and Fassbender, P. (2023). Application of artificial intelligence: risk perception andTrust in the work context with different impact levels andtask types.
[23] Mármol, F. G., Pérez, M. G. and Pérez, G. M. (2016). I Don't Trust ICT: Research Challenges in Cyber Security. Trust Management X, pp. 129–136.
[24] Choi, J. K. and Ji, Y. G. (2015). Investigating the Importance of Trust on Adopting an Autonomous Vehicle. International Journal of Human-Computer Interaction, 31(10), pp. 692–702.
[25] Byrne, B. M. (2016). Structural Equation Modeling with AMOS: Basic Concepts, Applications, and Programming. 3rd Edition New York: Routledge.
[26] Buckbee, M. (2020). Analysing Company Reputation After a Data Breach. [online] Available at:
[27] Lazányi, K. (2023). Perceived Risks of Autonomous Vehicles. Risks, 11(2), p. 26.
[28] Winkelman, Z., Buenaventura, M., Anderson, J. M., Beyene, N. M., Katkar, P. and Baumann, G. C. (2019). When AutonomousVehicles Are Hacked, Who Is Liable? Available at:
[29] Rainie, L., Funk, C., Anderson, M. and Tyson, A. (2022). Americans cautious about the deployment ofdriverless cars. Pew Research Center: Internet, Science &Tech. Available at:
[30] Saunders, M., Lewis, P. and Thornhill, A. (2019). Research Methods for Business Students. 8th ed. United Kingdom: Pearson.
[31] Creswell, J. W. and Creswell, J. D. (2018). Research design: Qualitative, quantitative, and mixed methods approaches. Thousand Oaks, California: Sage Publications, Inc.
[32] Turner, D. (2010). Qualitative Interview Design: a PracticalGuide for Novice Investigators. The Qualitative Report, 15(3), pp. 754–760.
[33] Hair, J., Black, W. C., Babin, B. J., and Anderson, R. E. (2010). Multivariate data analysis: A Global Perspective. 7th ed. Upper Saddle River: Pearson Education, Cop.
[34] Marsh, H. W., & Yeung, A. S. (1998). Longitudinal Structural Equation Models of Academic Self-Concept and Achievement: Gender Differences in the Development of Math and English Constructs. American Educational Research Journal, 35, 705-738.
[35] Khan, S. K, Shiwakoti, N., Stasinopoulos, P. and M. Warren, M. "Cybersecurity Readiness for Automated Vehicles," 2022 International Conference on Frontiers of Artificial Intelligence and Machine Learning (FAIML), Hangzhou, China, 2022, pp. 7-12.
[36] Dutton, W. H., & Shepherd, A. (2006). Trust in the Internet as an experience technology: Challenges for governance and policy. Journal of Information Technology, 21(3), 195–207.
Cite This Article
  • APA Style

    Gorine, A., Khan, S. A. (2024). Perception and Trust in Autonomous Vehicles Post Cyber Security Incidents. American Journal of Computer Science and Technology, 7(4), 122-138. https://doi.org/10.11648/j.ajcst.20240704.11

    Copy | Download

    ACS Style

    Gorine, A.; Khan, S. A. Perception and Trust in Autonomous Vehicles Post Cyber Security Incidents. Am. J. Comput. Sci. Technol. 2024, 7(4), 122-138. doi: 10.11648/j.ajcst.20240704.11

    Copy | Download

    AMA Style

    Gorine A, Khan SA. Perception and Trust in Autonomous Vehicles Post Cyber Security Incidents. Am J Comput Sci Technol. 2024;7(4):122-138. doi: 10.11648/j.ajcst.20240704.11

    Copy | Download

  • @article{10.11648/j.ajcst.20240704.11,
      author = {Adam Gorine and Sana Abid Khan},
      title = {Perception and Trust in Autonomous Vehicles Post Cyber Security Incidents
    },
      journal = {American Journal of Computer Science and Technology},
      volume = {7},
      number = {4},
      pages = {122-138},
      doi = {10.11648/j.ajcst.20240704.11},
      url = {https://doi.org/10.11648/j.ajcst.20240704.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajcst.20240704.11},
      abstract = {The integration of Autonomous Vehicles (AVs) into modern systems of transportation brings with it a new and transformative era. Central to the successful realisation of this transformation is the public’s trust in these vehicles and their safety, particularly in the aftermath of cyber security breaches. The following research therefore explores the various factors underpinning this trust in the context of cyber security incidents. A dual-methodological approach was used in the study. Quantitative data was gathered from structured questionnaires distributed to and completed by a cohort of 151 participants and qualitative data, from comprehensive semi-structured interviews with AV technology and cyber security experts. Rigorous Structural Equation Modelling of the quantitative data then allowed for the identification of the key factors influencing public trust from the standpoint of the research participants including the perceived safety of AV technology, the severity of cyber security incidents, the historic cyber security track record of companies and the frequency of successful cyber security breaches. The role of government regulations, though also influential, emerged as less so. The qualitative data, processed via thematic analysis, resonated with the findings from the quantitative data. This highlighted the importance of perceived safety, incident severity, regulatory frameworks and corporate legacy in shaping public trust. Whilst cyber incidents no doubt erode trust in AVs, a combination of technological perception, regulatory scaffolding and corporate history critically impacts this. These insights are instrumental for stakeholders, from policymakers to AV manufacturers, in charting the course of AV assimilation successfully in future.
    },
     year = {2024}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Perception and Trust in Autonomous Vehicles Post Cyber Security Incidents
    
    AU  - Adam Gorine
    AU  - Sana Abid Khan
    Y1  - 2024/10/18
    PY  - 2024
    N1  - https://doi.org/10.11648/j.ajcst.20240704.11
    DO  - 10.11648/j.ajcst.20240704.11
    T2  - American Journal of Computer Science and Technology
    JF  - American Journal of Computer Science and Technology
    JO  - American Journal of Computer Science and Technology
    SP  - 122
    EP  - 138
    PB  - Science Publishing Group
    SN  - 2640-012X
    UR  - https://doi.org/10.11648/j.ajcst.20240704.11
    AB  - The integration of Autonomous Vehicles (AVs) into modern systems of transportation brings with it a new and transformative era. Central to the successful realisation of this transformation is the public’s trust in these vehicles and their safety, particularly in the aftermath of cyber security breaches. The following research therefore explores the various factors underpinning this trust in the context of cyber security incidents. A dual-methodological approach was used in the study. Quantitative data was gathered from structured questionnaires distributed to and completed by a cohort of 151 participants and qualitative data, from comprehensive semi-structured interviews with AV technology and cyber security experts. Rigorous Structural Equation Modelling of the quantitative data then allowed for the identification of the key factors influencing public trust from the standpoint of the research participants including the perceived safety of AV technology, the severity of cyber security incidents, the historic cyber security track record of companies and the frequency of successful cyber security breaches. The role of government regulations, though also influential, emerged as less so. The qualitative data, processed via thematic analysis, resonated with the findings from the quantitative data. This highlighted the importance of perceived safety, incident severity, regulatory frameworks and corporate legacy in shaping public trust. Whilst cyber incidents no doubt erode trust in AVs, a combination of technological perception, regulatory scaffolding and corporate history critically impacts this. These insights are instrumental for stakeholders, from policymakers to AV manufacturers, in charting the course of AV assimilation successfully in future.
    
    VL  - 7
    IS  - 4
    ER  - 

    Copy | Download

Author Information
  • Sections