Fill This Form To Receive Instant Help
Homework answers / question archive / CSIA 459: Evaluating Emerging Technologies Technology Evaluation Study Plan – Detailed Assignment Description The technology selection for this paper is AUTONOMOUS VEHICLES Read your chosen Technology Selection paper to learn more about the selected technology
CSIA 459: Evaluating Emerging Technologies Technology Evaluation Study Plan – Detailed Assignment Description The technology selection for this paper is AUTONOMOUS VEHICLES Read your chosen Technology Selection paper to learn more about the selected technology. Next, consider what type of formal evaluation study could be used to learn more about this technology and how it is likely to interact with people, processes, and technologies. Then, design a formal evaluation study which could be used to obtain more information about one or more of the following: o o o o characteristics (features and capabilities) of the technology interactions among technologies, people, environments, and processes (use cases or scenarios) risks or vulnerabilities associated with adoption of this technology costs and benefits associated with adoption of this technology Choose Your Evaluation Method Your evaluation study design must use one of the following: o o o o Case Study Delphi Study (panel of subject matter experts) Quasi-Experiment (e.g. penetration testing or pilot testing in a controlled environment) Pilot Implementation (in a demonstration environment) See the Technology Evaluation Methods module in the Week 2 conference for detailed descriptions of each of these types of evaluation methods. Design Your Study Identify the specific questions that your formal evaluation study will address. These questions must be security-focused and should address: threats, vulnerabilities, attacks, countermeasures, risks, risk mitigations, etc. Your design should include a description of the specific security issues which will be tested or security capabilities which will be evaluated. Use standard terminology when writing about security issues (see the rubric). Develop Your Evaluation Study Plan Use your study design to prepare a high-level plan for your evaluation study. Your plan must include the following: o o Introduction ? description of the emerging technology and justification for including it in an evaluation study Research Question(s) Copyright © 2021 by University of Maryland Global Campus. All rights reserved. CSIA 459: Evaluating Emerging Technologies ? o o o These must be security focused (i.e. focused on cybersecurity objectives such as confidentiality, integrity, availability, etc.) and should address: threats, vulnerabilities, attacks, countermeasures, risks, risk mitigations, etc. ? Use “how” or “what” questions (writing good “why” questions is beyond the scope of this course). ? Examples ? What vulnerabilities exist that could be attacked to compromise confidentiality? ? How could an attacker compromise availability? ? For each research question, provide a brief description of a scenario or use case which could be used to answer the question. Your description should be one paragraph (no longer). Methods ? high level design of the study (focus upon the evaluation model and your research questions) ? description of how the technology will be incorporated or used in the study (including specific security issues which will be tested or security capabilities which will be evaluated) ? notional system or network architecture diagram showing the pilot test environment (only if you are doing a pilot study) Limitations or Special Considerations ? any special considerations or security concerns which must be addressed (e.g. “clean room,” test data sanitization, or isolation environment to prevent the pilot study from causing harm to operational systems) Timeline of Events (Notional) ? A notional timeline (expressed in days or months after start date) for your study Notional Timeline of Events The notional timeline of events (stated in days or months after start) that provides an estimate of how long you expect your evaluation study to take. For a Delphi Method study, your study could take as little as a day or two. For a Delphi Method Study, include the number of “rounds” and how long each round will be (the time allotted for experts to consider information and reply back with their opinion on the questions or issues). For a case study, quasi-experimental, or pilot implementation design, your study may span several months; in this case, divide your timeline into phases (setup, testing, reporting). Cost Estimate Is Not Required Normally, an evaluation study plan will include a cost estimate. For this course, we will NOT be including cost elements in our evaluation study plans as the information required to develop these items is not readily available to students. If you wish to address this area of a study plan, limit your discussion to a brief listing of the cost elements (people, technologies, facilities) and state that a cost estimate will be provided separately. Copyright © 2021 by University of Maryland Global Campus. All rights reserved. CSIA 459: Evaluating Emerging Technologies Document Your Plan Your Technology Evaluation Study Plan should be at least three pages in length but no more than ten pages (excluding the title page and references page). This should be a high level design that can be read quickly. Your study plan must contain the five major sections defined above and comply with the formatting guidance provided by your instructor. Additional Information 1. Consult the grading rubric for specific content and formatting requirements for this assignment. 2. Your 5 to 10 page study plan document should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. 3. Your paper should use standard terms and definitions for cybersecurity. 4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx. 5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count. 6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs. 7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.). Copyright © 2021 by University of Maryland Global Campus. All rights reserved. Running Head: AUTONOMOUS CARS Technology Selection Study Recommendation Paper-Autonomous cars 1 AUTONOMOUS CARS 2 Technology Selection Study Recommendation Paper-Autonomous cars Introduction The changes in technology are connected with the advancement of various sectors. The evolution of the vehicle manufacturing sector has not been left behind. Here, the sector's future has been boosted with the introduction of autonomous vehicles that leads toi entirely new experiences. According to Al-Qizwini (2017), the technology applied in the manufacture of autonomous vehicles utilizes the deep learning algorithms that promote the communication aspect within the vehicles: it offers an environmental scanning that will then communicate to lead to a response. Generally, this comes with a high level of artificial intelligence that makes the cars desirable. In the 21st century, such technology has a high level of desirability as humans target to make their work easier, including during and another form so transportation. The ability to detect surrounding makes autonomous vehicles unique compared to the old technology. Generally, when the vehicle is in motion, it automatically requires no human control to operate without any human intervention. A fully autonomous vehicle is expected to perceive the surrounding environment, choose the path to take and drive on the road. Generally, it will notify the vehicle of the destination, and it will leave the rest to its decisions, which makes it interesting. The autonomous nature of the vehicle makes it interesting to have abilities to detect and move with its instructions and decisions. Generally, it holds a combination of software and hardware designated to offer it with the set capacities that will make the movement successful in the manner it is designed; the ability of any technology to lead toi the needed outcome is desirable. The car will collect big data and make decisions after the vision analyzing system works to make navigation. The car will only react to the findings that occur. AUTONOMOUS CARS 3 Technology overview The changes in autonomous technology make it practical for the technology to be highly preferred. For this reason, the vehicle comes with a high level of independence to the users. Here, it makes choices in a similar way that a human would do. However, it is more effective that no distraction can affect the vehicles, unlike humans who are ever on phones, thinking about other things and being distracted by the environment. It chooses the path to take to a particular destination offered. The choice is backed by the application of sensors, navigation tools and many other aspects. Generally, it holds a navigation tool similar to that of Mars Rover (Guan et al., 2017). Hence, this promotes its navigation processes. The need to have such tools makes its efficiency levels high and promotes mission achievement. The need to have such milestones being achieved is set by the features that control the movement. Also, it receives data coming from the rest of the vehicles sharing the same network with it. Hence, it is made aware of the environment. It is ahead of it. To make the best choices, including a path to take. People, environment and process People The people are users of autonomous vehicles. They are subject to enjoy the services offered by the vehicle. Thus, they are considered in the analysis. Autonomous vehicles promote the safety of people carried in them. The self-driven carts are highly effective in coalition avoidance and hence making lives safer on the roads. Its ability to detect dangers and evade them makes it an efficient and safe vehicle of the modern world. The autonomous vehicles are effective such that they hold better information from the network and satellite that leads to significant decisions hence making them efficient to users. AUTONOMOUS CARS 4 Processes The process involved with the use of autonomous cars is entirely computer associated. The vehicles will operate with a high level; of intelligence that makes them effective in their mandate. The manufacturers of the systems applied in the car are aware of the Cybersecurity issues that can arise and affect its movement. Thus, the vehicles are equipped with protective software that includes antivirus software that detects and deal with a virus attack. It also comes with intrusion detection and protection system that deals with attacks as they occur (Amanatiadis et al., 2019). Here, the car is secured from incoming attacks once detected; they are dealt with and prevented from entering the system. Then, the system will create documentation of the attack to promote analysis of the issue. The information is shared on the network. As a result, the other autonomous vehicles will use the data to make decisions that lead to more certain vehicles. Interestingly, before the software is incorporated into the vehicles, they undergo the assurance process to ensure that they will have effective performance and security support mechanisms. It is recommendable that the software comes with more inbuilt security capabilities as they can pose a significant risk to life if there is no successful cyber-attack process. For instance, a car would be hacked and controlled by the attacker. Environment As targeted, the autonomous vehicles are supposed to operate in any form of environment that they are subjected to at any time. This includes the different temperature requirements, including hot and cold surroundings (Persaud, Varde & Robila, 2017). The issues may arise if the car develops an inability to sense dangers in some environments that can lead to accidents. In four instances, in areas that experience snow, it has to have a high AUTONOMOUS CARS 5 capacity to support its effectiveness. The car must be able to detect despite the show hindrance for safety support. Costs and benefits Costs The costs associated with autonomous are high initially. Here, the installation of security systems will even make it more experience. However, it will serve as the basis of saving other cists that come with what it prevents. For instance, while a car becomes more efficient to evade collisions, the maintenance costs become minimal. The same case applied to ease of facing the reacted issues that further lowers the costs. Companies implementing the technology will enjoy lower operating costs as they do not need the drivers to operate the vehicles. Benefits Autonomous cars technology offers a significant benefit to the manufacturing sector. Here, it has set a shift in technology that supports autonomous productions within the market. The ability of the vehicle to control traffic makes it efficient in operation. Hence, with autonomous vehicles, traffic jams on the highways could be significantly reduced by autonomous cars. While a critical issue comes with road accidents, autonomous cars can detect their environment using inbuilt sensors. Hence, it is effective in its mandate to ensure the safety of people being transported. The carts could efficiently serve in various ways (Chowdhury, Gawande & Wang, 2017). For instance, it can effectively deliver and pick things where the user will send them to a specific location. Its ability to navigate the road networks and reach the set destination makes it an ideal car technology of the modern era. Risks and vulnerabilities AUTONOMOUS CARS 6 Despite its effectiveness in many ways, it still faces the risk of losing property, life and the entire vehicle. It is possible that some collisions might not be avoidable as predicted. Similarly, it is affected by lots of vulnerabilities as a critical technology. Here, Cybersecurity issues could affect the car in a significant market such that users are up suffering. The prevention of issues becomes a necessity (Wyglinski, 2018). A case example could include a hacking process that locks the car doors or engine not to make any movement. Similarly, the car could be hacked and misdirected to a different direction that the attacker wants to reach. If the car sensors are affected, then its safety aspect will be gone. As a result, depending on attackers' intentions, it leads to adverse effects on the users. These issues must be taken seriously by the manufacture s so that they can factor them while making new models and enhancements to the other older ones. Recommendations Autonomous technology has a great future in car manufacturing. However, it must consider the issues associated with risks and vulnerabilities to make it more ideal. A vehicle needs to be equipped with more secure technologies that will ensure no hacking other cybersecurity aspects affect the effectiveness and efficiency of the vehicles. The same case applies to the supportive network that's prone to attacks. For instance, an attacker may use the DOS attack to deny the services of the vehicle. Hence, the network will also need proper security. Considering Cybersecurity as a critical aspect during the car making process will be a necessary and urgent need. References AUTONOMOUS CARS 7 Al-Qizwini, M., Barjasteh, I., Al-Qassab, H., & Radha, H. (2017, June). A deep learning algorithm for autonomous driving using googlenet. In 2017 IEEE Intelligent Vehicles Symposium (IV) (pp. 89-96). IEEE. Chowdhury, M., Gawande, A., & Wang, L. (2017). Secure information sharing among autonomous vehicles in NDN. In 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI) (pp. 15-26). IEEE. Persaud, P., Varde, A. S., & Robila, S. (2017). Enhancing autonomous vehicles with commonsense: Smart mobility in smart cities. In 2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI) (pp. 1008-1012). IEEE. Amanatiadis, A., Karakasis, E., Bampis, L., Ploumpis, S., & Gasteratos, A. (2019). VIP: Onroad vehicle passenger detection for autonomous vehicles. Robotics and Autonomous Systems, 112, 282-290. Wyglinski, X. H. (2018). Security of Autonomous Systems Employing Embedded Computing and Sensors. Retrieved from PROLEGOMENA: http://www.computer.org.ezproxy.umuc.edu/csdl/mags/mi/2013/01/mmi2013010080. pdf Guan, X., Wang, X., Fang, J., & Feng, S. (2014). An innovative high accuracy autonomous navigation method for the Mars rovers. Acta Astronautica, 266-275Wee Lit Koh, S. Z. (2011). An Extensible Collision Avoidance Model for Realistic Self-Driven Autonomous Agents. Real-Time Applications, IEEE/ACM International Symposium, pp: 7-14.