Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles

2021 ◽  
Author(s):  
Jennifer Dukarski ◽  

Modern automobiles collect around 25 gigabytes of data per hour and autonomous vehicles are expected to generate more than 100 times that number. In comparison, the Apollo Guidance Computer assisting in the moon launches had only a 32-kilobtye hard disk. Without question, the breadth of in-vehicle data has opened new possibilities and challenges. The potential for accessing this data has led many entrepreneurs to claim that data is more valuable than even the vehicle itself. These intrepid data-miners seek to explore business opportunities in predictive maintenance, pay-as-you-drive features, and infrastructure services. Yet, the use of data comes with inherent challenges: accessibility, ownership, security, and privacy. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles examines some of the pressing questions on the minds of both industry and consumers. Who owns the data and how can it be used? What are the regulatory regimes that impact vehicular data use? Is the US close to harmonizing with other nations in the automotive data privacy? And will the risks of hackers lead to the “zombie car apocalypse” or to another avenue for ransomware? This report explores a number of these legal challenges and the unsettled aspects that arise in the world of automotive data.

2016 ◽  
Vol 7 (2) ◽  
pp. 295-296
Author(s):  
Thomas Burri ◽  
Isabelle Wildhaber

This special issue assembles five articles ensuing from a conference on “The Man and the Machine: When Systems Take Decisions Autonomously”, which took place on June 26 and 27, 2015, at the University of St. Gallen in Switzerland.The aim of the conference was to explore the broader implications of artificial intelligence, machine learning and autonomous robots and vehicles. Alphabet's Deep Mind is just one example about Whom we know, at least a little, and who, we are told, will be good. Autonomous vehicles are also about to enter the market and our phones have begun to verbalize at us. Private drones are being regulated by the US Federal Aviation Administration. The five papers in this special issue address some of the legal issues the broader development raises.The first article is on “The Implications of Modern Business-Entity Law for the Regulation of Autonomous Systems” and is written by Shawn Bayern.


Author(s):  
Jenila Livingston L. M. ◽  
Ashutosh Satapathy ◽  
Agnel Livingston L. G. X. ◽  
Merlin Livingston L. M.

In secure multi-party computation (SMC), multiple distributed parties jointly carry out the computation over their confidential data without compromising data security and privacy. It is a new emerging cryptographic technique used in huge applications such as electronic auction bidding, electronic voting, protecting personal information, secure transaction processing, privacy preserving data mining, and privacy preserving cooperative control of connected autonomous vehicles. This chapter presents two model paradigms of SMC (i.e., ideal model prototype and real model prototype). It also deals with the type and applications of adversaries, properties, and the techniques of SMC. The three prime types of SMC techniques such as randomization, cryptographic techniques using oblivious transfer, and anonymization methods are discussed and illustrated by protective procedures with suitable examples. Finally, autonomous vehicle interaction leveraged with blockchain technology to store and use vehicle data without any human interaction is also discussed.


2021 ◽  
Vol 8 (1) ◽  
pp. 31-40
Author(s):  
Mohammed Al Omari

The use of data in medical research that was originally collected for different purposes, known as secondary data, is an effective way to conduct reliable and cost-effective studies so as to progress knowledge in medicine. A number of serious practical, ethical and legal issues and concerns about this process exist, however. Ensuring a high level of data quality is imperative to produce reliable results, and researchers may face accessibility problems. Projects designed to alleviate these issues are underway, however, lowering the cost and increasing the access to secondary data even further. Although secondary data is de-identified to protect the confidentiality, ethical problems of individual rights versus the benefit of society persist, leading some to call for a new ‘macroethics’ surrounding data use. Legislation to this end has been introduced in many countries, but issues relating to the exemptions it offers and its interpretability remain. To ensure that the use of secondary data in medical research can continue to accelerate the pace of development in medicine, a global effort involving technological and ethical standardization needs to be developed.  


Author(s):  
Mingfu Huang ◽  
Rushit Dave ◽  
Nyle Siddiqui ◽  
Naeem Seliya

A fully automated, self-driving car can perceive its environment, determine the optimal route, and drive unaided by human intervention for the entire journey. Connected autonomous vehicles (CAVs) have the potential to drastically reduce accidents, travel time, and the environmental impact of road travel. Such technology includes the use of several sensors, various algorithms, interconnected network connections, and multiple auxiliary systems. CAVs have been subjected to attacks by malicious users to gain/deny control of one or more of its various systems. Data security and data privacy is one such area of CAVs that has been targeted via different types of attacks. The scope of this study is to present a good background knowledge of issues pertaining to different attacks in the context of data security and privacy, as well present a detailed review and analysis of eight very recent studies on the broad topic of security and privacy related attacks. Methodologies including Blockchain, Named Data Networking, Intrusion Detection System, Cognitive Engine, Adversarial Objects, and others have been investigated in the literature and problem- and context-specific models have been proposed by their respective authors.


Emerging technologies have always played an important role in armed conflict. From the crossbow to cyber capabilities, technology that could be weaponized to create an advantage over an adversary has inevitably found its way into military arsenals for use in armed conflict. The weaponization of emerging technologies, however, raises challenging legal issues with respect to the law of armed conflict. As States continue to develop and exploit new technologies, how will the law of armed conflict address the use of these technologies on the battlefield? Is existing law sufficient to regulate new technologies, such as cyber capabilities, autonomous weapons systems, and artificial intelligence? Have emerging technologies fundamentally altered the way we should understand concepts such as law-of-war precautions and the principle of distinction? How can we ensure compliance and accountability in light of technological advancement? This book explores these critical questions while highlighting the legal challenges—and opportunities—presented by the use of emerging technologies on the battlefield.


Laws ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 46
Author(s):  
Esther Salmerón-Manzano

New technologies and so-called communication and information technologies are transforming our society, the way in which we relate to each other, and the way we understand the world. By a wider extension, they are also influencing the world of law. That is why technologies will have a huge impact on society in the coming years and will bring new challenges and legal challenges to the legal sector worldwide. On the other hand, the new communications era also brings many new legal issues such as those derived from e-commerce and payment services, intellectual property, or the problems derived from the use of new technologies by young people. This will undoubtedly affect the development, evolution, and understanding of law. This Special Issue has become this window into the new challenges of law in relation to new technologies.


Author(s):  
Sean Oesch ◽  
Ruba Abu-Salma ◽  
Oumar Diallo ◽  
Juliane Krämer ◽  
James Simmons ◽  
...  

2021 ◽  
Vol 3 (2) ◽  
pp. 28-45
Author(s):  
Young B. Choi ◽  
Christopher E. Williams

Data breaches have a profound effect on businesses associated with industries like the US healthcare system. This task extends more pressure on healthcare providers as they continue to gain unprecedented access to patient data, as the US healthcare system integrates further into the digital realm. Pressure has also led to the creation of the Health Insurance Portability and Accountability Act, Omnibus Rule, and Health Information Technology for Economic and Clinical Health laws. The Defense Information Systems Agency also develops and maintains security technical implementation guides that are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures. The objective is to design a network (physician's office) in order to meet the complexity standards and unpredictable measures posed by attackers. Additionally, the network must adhere to HIPAA security and privacy requirements required by law. Successful implantation of network design will articulate comprehension requirements of information assurance security and control.


Although the IoT opens the door to endless possibilities, but it is also associated with many risks because all devices connected to the internet involve the use of data points. Therefore, it is essential to ensure IoT security and privacy. A review of existing research works highlights the usage of traditional security scheme based on cryptography for data transmission among IoT nodes and gateways. The proposed system proposes an integrated model that combines lightweight encryption technique with robust and cost-efficient authentication mechanism. The proposed system introduces digital signature-based authentication and complexity minimization in order to resist the involvement of any kind of unknown attacks. The simulation outcome of this model exhibits reliable security, faster response times and energy savings for IoT nodes.


2022 ◽  
Author(s):  
Farkhanda Zafar ◽  
Hasan Ali Khattak ◽  
Moayad Aloqaily ◽  
Rasheed Hussain

Owing to the advancements in communication and computation technologies, the dream of commercialized connected and autonomous cars is becoming a reality. However, among other challenges such as environmental pollution, cost, maintenance, security, and privacy, the ownership of vehicles (especially for Autonomous Vehicles (AV)) is the major obstacle in the realization of this technology at the commercial level. Furthermore, the business model of pay-as-you-go type services further attracts the consumer because there is no need for upfront investment. In this vein, the idea of car-sharing ( aka carpooling) is getting ground due to, at least in part, its simplicity, cost-effectiveness, and affordable choice of transportation. Carpooling systems are still in their infancy and face challenges such as scheduling, matching passengers interests, business model, security, privacy, and communication. To date, a plethora of research work has already been done covering different aspects of carpooling services (ranging from applications to communication and technologies); however, there is still a lack of a holistic, comprehensive survey that can be a one-stop-shop for the researchers in this area to, i) find all the relevant information, and ii) identify the future research directions. To fill these research challenges, this paper provides a comprehensive survey on carpooling in autonomous and connected vehicles and covers architecture, components, and solutions, including scheduling, matching, mobility, pricing models of carpooling. We also discuss the current challenges in carpooling and identify future research directions. This survey is aimed to spur further discussion among the research community for the effective realization of carpooling.


Sign in / Sign up

Export Citation Format

Share Document