2021
DOI: 10.1016/j.tele.2021.101646
|View full text |Cite
|
Sign up to set email alerts
|

Consumers’ attitudes toward information security threats against connected and autonomous vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…The diversification of the rapidly increasing research in the field of AVs is reviewed by Sciaccaluga and Delponte, who recommend the use of new instruments such as gamification to analyze users' sensations, perceptions, and fears about using AVs in a new way [76]. Another barrier to the adoption of AV technology is cyber and information security threats which were investigated by Maeng et al; they found that consumers are highly sensitive about their personal data privacy and communication failures in AVs [77].…”
Section: Adoption Of Avsmentioning
confidence: 99%
“…The diversification of the rapidly increasing research in the field of AVs is reviewed by Sciaccaluga and Delponte, who recommend the use of new instruments such as gamification to analyze users' sensations, perceptions, and fears about using AVs in a new way [76]. Another barrier to the adoption of AV technology is cyber and information security threats which were investigated by Maeng et al; they found that consumers are highly sensitive about their personal data privacy and communication failures in AVs [77].…”
Section: Adoption Of Avsmentioning
confidence: 99%
“…However, its failure is also a cause for worry. Maeng, et al 5 found that customers see communication failure (connectivity) as the most significant hazard to the safe functioning of AV. Similarly, ITS infrastructure, such as machine-readable road signs, smart roadway markings, or sensors, is required to function AV 6 .…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, by one single personal information leakage that occurs by firms (Eom & Kim, 2016), attacking from hackers or during unexpected process (Guri et al, 2016), may bring about unallowed access to whole IoT devices that use identical personal information. A paradigm shift caused by the development of ICT such as the Internet of Things (IoT) is inevitable, but consumers’ concerns about personal information infringement and security breach may act as a deterrent to spread of new technology such as e-commerce (Dinev et al, 2006; Dinev & Hart, 2005), healthcare (Chacko & Hayajneh, 2018), and connected automated vehicles (Bansal & Kockelman, 2017; Choi & Ji, 2015) as pointed out by Atzori et al (2010) and Maeng et al (2021). However, consumers are willing to provide personal information if they think it is more beneficial than the cost of the damage (Dinev & Hart, 2006; Al-Jabri et al, 2019; Kim et al, 2019).…”
Section: Introductionmentioning
confidence: 99%