Affiliation:
1. Taylor's University, Malaysia
2. Universiti Malaysia Sarawak, Malaysia
Abstract
The rapid proliferation of drones across various industries necessitates a comprehensive examination of the privacy and ethical implications in their cybersecurity landscape. This chapter aims to dissect and address these concerns, providing a valuable resource for scholars, policymakers, and industry practitioners. The objectives are clearly outlined, emphasizing the exploration of privacy challenges and ethical considerations within the context of drone cybersecurity. The chapter begins by delving into the privacy challenges associated with drone operations, focusing on surveillance concerns and the responsible collection and storage of sensitive data. Ethical considerations in drone cybersecurity are then scrutinized, highlighting the dual-use nature of drones and the ethical intricacies of autonomous decision-making. A critical evaluation of the existing regulatory landscape governing drone operations and privacy frameworks is presented, shedding light on their effectiveness and limitations.
Reference162 articles.
1. Autonomous Vehicles: Sophisticated Attacks, Safety Issues, Challenges, Open Topics, Blockchain, and Future Directions
2. Abir, R. (n.d.). Machine learning based spectrum fingerprinting of drones for defensive cyber operations - ProQuest. https://www.proquest.com/openview/aaf6f2c731449ff9eca7369ae90f066d/1?casa_token=o8_AEbK0_0UAAAAA:apNEvG8Paiw_u2fphUYQEdoQnn8gKTY251kgSyo7_2Bmle-cVrw4OfQQ9xccyKvtK_FvO7l83NA&cbl=18750&diss=y&pq-origsite=gscholar&parentSessionId=oiyp2%2BvxNh9b7wVzgiUwNtMMPihYVrRHZltJHCCAkEY%3D
3. Ensemble and Deep-Learning Methods for Two-Class and Multi-Attack Anomaly Intrusion Detection: An Empirical Study
4. Defining Organizational AI Governance and Ethics
5. AgEagle. (2023, November 7). European Union drone regulations explained - AgEagle Aerial Systems Inc. AgEagle Aerial Systems Inc. https://ageagle.com/blog/european-union-drone-regulations-explained/
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Generative AI for Threat Hunting and Behaviour Analysis;Advances in Digital Crime, Forensics, and Cyber Terrorism;2024-09-13
2. Generative AI for Threat Intelligence and Information Sharing;Advances in Digital Crime, Forensics, and Cyber Terrorism;2024-09-13
3. Risk Assessment and Mitigation With Generative AI Models;Advances in Digital Crime, Forensics, and Cyber Terrorism;2024-09-13
4. Ethics and Transparency in Secure Web Model Generation;Advances in Information Security, Privacy, and Ethics;2024-07-26
5. Security Considerations in Generative AI for Web Applications;Advances in Information Security, Privacy, and Ethics;2024-07-26