AUTOMOTIVE CUSTOMER EXPERIENCES: CYBERSECURITY CONSIDERATIONS IN CONNECTED VEHICLES

Authors

  • Bhargav Reddy Piduru Customer Experience Architect, Irvine, CA, USA. Author

Keywords:

Customer Experiences, Cybersecurity, Connected Vehicles, Objectives, Methodologies, Key Findings, Implications, Industry, Literature Review, Case Studies, Expert Interviews, Intrusion Detection Systems, Secure Communication Protocols, Over-the-Air Updates, Cybersecurity Awareness, Research And Development, Security

Abstract

As the automotive industry continues its rapid evolution towards connected vehicles, ensuring robust cybersecurity measures becomes paramount to safeguarding customer experiences. This research paper aims to explore the critical intersection of customer satisfaction and cybersecurity within the context of connected vehicles. The primary objective of this study is to investigate the various cybersecurity challenges facing connected vehicles and to discern their impact on customer experiences. To achieve this, a comprehensive review of existing literature, case studies, and expert interviews were conducted to gather insights into the methodologies and strategies employed by automotive companies to enhance cybersecurity while delivering exceptional customer experiences. Key findings from this research reveal that the automotive industry is actively acknowledging the significance of cybersecurity in customer satisfaction. Cutting-edge technologies such as intrusion detection systems, secure communication protocols, and over-the-air updates are being adopted to mitigate cybersecurity risks and maintain seamless customer experiences. Moreover, fostering a culture of cybersecurity awareness and education among both customers and automotive professionals is emerging as a crucial aspect of ensuring a safe and satisfying connected vehicle experience. The implications of this study for the automotive industry are profound. First and foremost, it underscores the imperative of integrating cybersecurity as an integral part of the customer experience strategy. Automakers should prioritize investments in cybersecurity technologies and practices to build trust and loyalty among their customer base. Additionally, this research highlights the need for ongoing research and development efforts to stay ahead of evolving cyber threats in the connected vehicle landscape. This research paper illuminates the intricate relationship between cybersecurity and customer experiences in the context of connected vehicles. It emphasizes the importance of proactively addressing cybersecurity challenges to deliver safer and more satisfying experiences for automotive customers, thereby guiding the industry towards a future where connectivity and security coexist harmoniously.

 

References

Anderson, R., & Moore, T. (2009). Information security economics – and beyond. In Security and Usability (pp. 13-22).

Balebako, R., Jung, J., Cranor, L. F., Wetherall, D., & Hong, J. I. (2014). Improving SSL certificate warnings: Comprehension and adherence. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2893-2902).

Kounelis, I., Stergiopoulos, G., & Kambourakis, G. (2019). A survey of vehicle-ICT attacks and defenses: A review of recent advances and the road ahead. IEEE Transactions on Intelligent Transportation Systems, 20(9), 3339-3357.

Zhang, Y., & Wang, C. (2017). Security and privacy in smart cities: Challenges and solutions. IEEE Access, 5, 14423-14432.

Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., & Koscher, K. (2011). Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium (pp. 6-6).

ISO/SAE. (2020). ISO/SAE 21434 - Road vehicles – Cybersecurity engineering.

EU General Data Protection Regulation (GDPR). (2018). Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016.

California Consumer Privacy Act (CCPA). (2018). California Civil Code §§ 1798.100-1798.199.

Kalra, N., & Paddock, S. M. (2016). Driving to safety: How many miles of driving would it take to demonstrate autonomous vehicle reliability?. Transportation Research Part A: Policy and Practice, 94, 182-193.

Bartlett, M. A., & Marjoram, D. (2016). Over-the-air software updates for vehicles: A survey. IEEE Internet of Things Journal, 3(5), 828-841.

Yang, R., Zhang, Y., Li, Y., & Shen, X. (2013). Security and privacy in vehicular networks. IEEE Wireless Communications, 20(6), 10-16.

Checkoway, S., Fredrikson, M., Niederhagen, R., Everspaugh, A., Green, M., Lange, T., ... & Ristenpart, T. (2014). A systematic analysis of the Juniper Dual EC incident. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 468-479).

Sun, J., Zhang, K., & Chen, H. H. (2018). A comprehensive survey on secure autonomous vehicle. IEEE Internet of Things Journal, 5(1), 199-219.

Al-Shammari, F. A., Al-Ani, B. Z., & Zedan, H. (2015). Internet of Things and its security. In 2015 International Conference on Cloud Computing and Internet of Things (pp. 288-293).

Martin, K. M., Watson, A. T., & Brady, R. J. (2015). How the Internet of Things is transforming business. IBM Institute for Business Value, 7.

Downloads

Published

2023-10-17

How to Cite

AUTOMOTIVE CUSTOMER EXPERIENCES: CYBERSECURITY CONSIDERATIONS IN CONNECTED VEHICLES. (2023). INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (IJMLC), 1(1), 46-57. https://lib-index.com/index.php/IJMLC/article/view/IJMLC_01_01_005