skip to main content
opinion
Free Access

Risks of automation: a cautionary total-system perspective of our cyberfuture

Published:22 September 2016Publication History
Skip Abstract Section

Abstract

Where automation is inevitable, let's do it right.

References

  1. Abelson, H. et al. Journal of Cybersecurity 1, 1 (Nov. 2015), Oxford University Press; http://bit.ly/2bcj1drGoogle ScholarGoogle Scholar
  2. Beurdouche, B. et al. A messy state of the union: Taming the composite state machines of TLS. In Proceedings of the 36th IEEE Symposium on Security and Privacy, San Jose, CA, May 18--20, 2015; http://bit.ly/2bndXGz Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Casner, S.M., Hutchinson, E.L., and Norman, D. The challenges of partially automated driving: Car automation promises to free our hands from the steering wheel, but might demand more from our minds. Commun. ACM 59, 5 (May 2016). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Neumann, P.G. Automated car woes---Whoa there! ACM Ubiquity, July 2016; http://bit.ly/2aYKDoT Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Neumann, P.G. Computer-Related Risks. Addison-Wesley and ACM Press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Norman, D.A. The human side of automation. Road Vehicle Automation 2, Springer, 2015.Google ScholarGoogle Scholar
  7. Quain, J.B. The autonomous car vs. human nature, a driver behind the wheel may not be ready to take it. The New York Times (July 8, 2016).Google ScholarGoogle Scholar
  8. Watson, R.N.M. et al. CHERI: A hybrid capability-system architecture for scalable software compartmentalization. In Proceedings of the 37th IEEE Symposium on Security and Privacy (San Jose, CA, May 18--20, 2015). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Risks of automation: a cautionary total-system perspective of our cyberfuture

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 59, Issue 10
      October 2016
      85 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/3001840
      • Editor:
      • Moshe Y. Vardi
      Issue’s Table of Contents

      Copyright © 2016 Copyright is held by the owner/author(s)

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 September 2016

      Check for updates

      Qualifiers

      • opinion
      • Popular
      • Un-reviewed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format