skip to content
When autonomous vehicles are hacked, who is liable? Preview this item
ClosePreview this item
Checking...

When autonomous vehicles are hacked, who is liable?

Author: Zev WinkelmanMaya BuenaventuraJames M AndersonNahom M BeyenePavan KatkarAll authors
Publisher: Santa Monica, Calif. : RAND Corporation, 2019. ©2019
Edition/Format:   eBook : EnglishView all editions and formats
Summary:
Who might face civil liability if autonomous vehicles (AVs) are hacked to steal data or inflict mayhem, injuries, and damage? How will the civil justice and insurance systems adjust to handle such claims? RAND researchers addressed these questions to help those in the automotive, technology, legal, and insurance industries prepare for the shifting roles and responsibilities that the era of AVs may bring. Using four  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Zev Winkelman; Maya Buenaventura; James M Anderson; Nahom M Beyene; Pavan Katkar; Gregory Cyril Baumann; Rand Corporation,
ISBN: 9781977403230 1977403239
OCLC Number: 1109958508
Description: 1 online resource (xviii, 150 pages)
Contents: Preface. --
Summary. --
Chapter One, Introduction - Understanding the context. --
Chapter two, Autonomous vehicles and future roadways. --
Chapter three, How can hackers exploit autonomous vehicles? --
Chapter four, Hacked autonomous vehicles and the harms they can cause. --
Chapter five, Shifting roles and responsibilities for information assurance for autonomous vehicle cybersecurity. --
Chapter six, Civil liability and cyberattacks: general legal framework. --
Chapter seven, Legal analysis of hypothetical risk scenarious. --
Chapter eight, Conclusions. --
Appendixes. --
Bibliography.
Responsibility: Zev Winkelman, Maya Buenaventura, James M. Anderson, Nahom M. Beyene, Pavan Katkar, Gregory Cyril Baumann.

Abstract:

Who might face civil liability if autonomous vehicles (AVs) are hacked to steal data or inflict mayhem, injuries, and damage? How will the civil justice and insurance systems adjust to handle such claims? RAND researchers addressed these questions to help those in the automotive, technology, legal, and insurance industries prepare for the shifting roles and responsibilities that the era of AVs may bring. Using four scenarios (a ransomware attack, a hacked vehicle damaging government property, hacks on a connected roadway that cause damage, and theft of information through hacking of AVs), the authors explored the civil legal theories that may come into play when real-world damages result from AVs being hacked. They also examined how those theories may affect various parties, including car manufacturers, component makers, dealers, and both corporate and individual owners. Existing civil legal structures appear flexible enough to adapt to cases involving hacked AVs except in the case of large-scale cyberattacks, but it may be useful to clarify both liability and insurance coverages.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1109958508<\/a>> # When autonomous vehicles are hacked, who is liable?<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1109958508<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/cau<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Topic\/automated_vehicles_moral_and_ethical_aspects<\/a>> ; # Automated vehicles--Moral and ethical aspects<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Topic\/computer_crimes_moral_and_ethical_aspects<\/a>> ; # Computer crimes--Moral and ethical aspects<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Topic\/social_responsibility_of_business<\/a>> ; # Social responsibility of business<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Topic\/automated_vehicles_law_and_legislation<\/a>> ; # Automated vehicles--Law and legislation<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Topic\/torts<\/a>> ; # Torts<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Topic\/computer_crimes_law_and_legislation<\/a>> ; # Computer crimes--Law and legislation<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Person\/katkar_pavan<\/a>> ; # Pavan Katkar<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Person\/baumann_gregory_cyril<\/a>> ; # Gregory Cyril Baumann<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Person\/beyene_nahom_m<\/a>> ; # Nahom M. Beyene<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Person\/anderson_james_m<\/a>> ; # James M. Anderson<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Person\/winkelman_zev<\/a>> ; # Zev Winkelman<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Person\/buenaventura_maya<\/a>> ; # Maya Buenaventura<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:copyrightYear<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Who might face civil liability if autonomous vehicles (AVs) are hacked to steal data or inflict mayhem, injuries, and damage? How will the civil justice and insurance systems adjust to handle such claims? RAND researchers addressed these questions to help those in the automotive, technology, legal, and insurance industries prepare for the shifting roles and responsibilities that the era of AVs may bring. Using four scenarios (a ransomware attack, a hacked vehicle damaging government property, hacks on a connected roadway that cause damage, and theft of information through hacking of AVs), the authors explored the civil legal theories that may come into play when real-world damages result from AVs being hacked. They also examined how those theories may affect various parties, including car manufacturers, component makers, dealers, and both corporate and individual owners. Existing civil legal structures appear flexible enough to adapt to cases involving hacked AVs except in the case of large-scale cyberattacks, but it may be useful to clarify both liability and insurance coverages.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Preface. -- Summary. -- Chapter One, Introduction - Understanding the context. -- Chapter two, Autonomous vehicles and future roadways. -- Chapter three, How can hackers exploit autonomous vehicles? -- Chapter four, Hacked autonomous vehicles and the harms they can cause. -- Chapter five, Shifting roles and responsibilities for information assurance for autonomous vehicle cybersecurity. -- Chapter six, Civil liability and cyberattacks: general legal framework. -- Chapter seven, Legal analysis of hypothetical risk scenarious. -- Chapter eight, Conclusions. -- Appendixes. -- Bibliography.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/9416576354<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"When autonomous vehicles are hacked, who is liable?<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1109958508<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Organization\/rand_corporation<\/a>> ; # Rand Corporation,<\/span>\n\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/www.rand.org\/content\/dam\/rand\/pubs\/research_reports\/RR2600\/RR2654\/RAND_RR2654.pdf<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781977403230<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1109958508<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Organization\/rand_corporation<\/a>> # Rand Corporation,<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Organization<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Rand Corporation,<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Person\/anderson_james_m<\/a>> # James M. Anderson<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Anderson<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"James M.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"James M. Anderson<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Person\/baumann_gregory_cyril<\/a>> # Gregory Cyril Baumann<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Baumann<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Gregory Cyril<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Gregory Cyril Baumann<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Person\/beyene_nahom_m<\/a>> # Nahom M. Beyene<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Beyene<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Nahom M.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Nahom M. Beyene<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Person\/buenaventura_maya<\/a>> # Maya Buenaventura<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Buenaventura<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Maya<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Maya Buenaventura<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Person\/katkar_pavan<\/a>> # Pavan Katkar<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Katkar<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Pavan<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Pavan Katkar<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Person\/winkelman_zev<\/a>> # Zev Winkelman<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Winkelman<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Zev<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Zev Winkelman<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Topic\/automated_vehicles_law_and_legislation<\/a>> # Automated vehicles--Law and legislation<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Automated vehicles--Law and legislation<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Topic\/automated_vehicles_moral_and_ethical_aspects<\/a>> # Automated vehicles--Moral and ethical aspects<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Automated vehicles--Moral and ethical aspects<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Topic\/computer_crimes_law_and_legislation<\/a>> # Computer crimes--Law and legislation<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer crimes--Law and legislation<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Topic\/computer_crimes_moral_and_ethical_aspects<\/a>> # Computer crimes--Moral and ethical aspects<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer crimes--Moral and ethical aspects<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Topic\/social_responsibility_of_business<\/a>> # Social responsibility of business<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Social responsibility of business<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/9416576354#Topic\/torts<\/a>> # Torts<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Torts<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/cau<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"cau<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781977403230<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1977403239<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781977403230<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n