Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Consumer Protection Law

2020

Cybersecurity

Articles 1 - 2 of 2

Full-Text Articles in Engineering

As The Role Of The Driver Changes With Autonomous Vehicle Technology, So, Too, Must The Law Change, Nanci K. Carr Sep 2020

As The Role Of The Driver Changes With Autonomous Vehicle Technology, So, Too, Must The Law Change, Nanci K. Carr

St. Mary's Law Journal

Getting a driver’s license is a highly anticipated rite of passage for most teenagers. Being alone behind the wheel, in control of a 3,000-pound machine, is an honor, a privilege, and a sign of adult responsibility. How will that change when driver’s licenses become licenses “to cause technology to engage” with the increased use of autonomous cars? Will driver’s education courses, with their focus on safety rules and defensive driving techniques, be eliminated if all a vehicle operator needs to do is push a button and the vehicle does the rest? While arguably autonomous cars are safer, they will not …


Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam Jan 2020

Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam

Faculty Publications

In the sustainability IoT, the cybersecurity risks to things, sensors, and monitoring systems are distinct from the conventional networking systems in many aspects. The interaction of sustainability IoT with the physical world phenomena (e.g., weather, climate, water, and oceans) is mostly not found in the modern information technology systems. Accordingly, actuation, the ability of these devices to make changes in real world based on sensing and monitoring, requires special consideration in terms of privacy and security. Moreover, the energy efficiency, safety, power, performance requirements of these device distinguish them from conventional computers systems. In this chapter, the cybersecurity approaches towards …