{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T02:46:29Z","timestamp":1774320389473,"version":"3.50.1"},"reference-count":53,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2142888"],"award-info":[{"award-number":["2142888"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Hum Factors"],"published-print":{"date-parts":[[2025,5]]},"abstract":"<jats:sec>\n            <jats:title>Objective<\/jats:title>\n            <jats:p>This study examines the extent to which cybersecurity attacks on autonomous vehicles (AVs) affect human trust dynamics and driver behavior.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Background<\/jats:title>\n            <jats:p>Human trust is critical for the adoption and continued use of AVs. A pressing concern in this context is the persistent threat of cyberattacks, which pose a formidable threat to the secure operations of AVs and consequently, human trust.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Method<\/jats:title>\n            <jats:p>A driving simulator experiment was conducted with 40 participants who were randomly assigned to one of two groups: (1) Experience and Feedback and (2) Experience-Only. All participants experienced three drives: Baseline, Attack, and Post-Attack Drive. The Attack Drive prevented participants from properly operating the vehicle in multiple incidences. Only the \u201cExperience and Feedback\u201d group received a security update in the Post-Attack drive, which was related to the mitigation of the vehicle\u2019s vulnerability. Trust and foot positions were recorded for each drive.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Results<\/jats:title>\n            <jats:p>Findings suggest that attacks on AVs significantly degrade human trust, and remains degraded even after an error-less drive. Providing an update about the mitigation of the vulnerability did not significantly affect trust repair.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Conclusion<\/jats:title>\n            <jats:p>Trust toward AVs should be analyzed as an emergent and dynamic construct that requires autonomous systems capable of calibrating trust after malicious attacks through appropriate experience and interaction design.<\/jats:p>\n          <\/jats:sec>\n          <jats:sec>\n            <jats:title>Application<\/jats:title>\n            <jats:p>The results of this study can be applied when building driver and situation-adaptive AI systems within AVs.<\/jats:p>\n          <\/jats:sec>","DOI":"10.1177\/00187208241283321","type":"journal-article","created":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T00:54:05Z","timestamp":1726707245000},"page":"485-502","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":8,"title":["The Impact of Cybersecurity Attacks on Human Trust in Autonomous Vehicle Operations"],"prefix":"10.1177","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3331-9574","authenticated-orcid":false,"given":"Cherin","family":"Lim","sequence":"first","affiliation":[{"name":"University of Washington, USA"}]},{"given":"David","family":"Prendez","sequence":"additional","affiliation":[{"name":"University of Washington, USA"}]},{"given":"Linda Ng","family":"Boyle","sequence":"additional","affiliation":[{"name":"New York University, USA"}]},{"given":"Prashanth","family":"Rajivan","sequence":"additional","affiliation":[{"name":"University of Washington, USA"}]}],"member":"179","published-online":{"date-parts":[[2024,9,18]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-019-03049-4"},{"key":"e_1_3_4_3_1","article-title":"Will we trust what we don\u2019t understand? Impact of model interpretability and outcome feedback on trust in AI","author":"Ahn D.","year":"2021","unstructured":"Ahn D., Almaatouq A., Gulabani M., Hosanagar K. (2021). Will we trust what we don\u2019t understand? Impact of model interpretability and outcome feedback on trust in AI. arXiv preprint arXiv:2111.08222.","journal-title":"arXiv preprint arXiv:2111.08222"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2807385"},{"key":"e_1_3_4_5_1","volume-title":"Technical report","author":"Blanco M.","year":"2015","unstructured":"Blanco M., Atwood J., Vasquez H., Trimble T., Fitchett V., Radlbeck J., Fitch G., Russell S., Green C., Cullinane B., Morgan J. (2015). Human factors evaluation of level 2 and level 3 automated driving concepts. In Technical report. NHTSA."},{"key":"e_1_3_4_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359616"},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-022-01598-6"},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872007X249956"},{"key":"e_1_3_4_9_1","doi-asserted-by":"crossref","unstructured":"Desai M. Kaniarasu P. Medvedev M. Steinfeld A. Yanco H. (2013). Impact of robot failures and feedback on real-time trust. In 2013 8th ACM\/IEEE international conference on human-robot interaction (HRI) (pp. 251\u2013258). IEEE.","DOI":"10.1109\/HRI.2013.6483596"},{"key":"e_1_3_4_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139.2018.1457725"},{"key":"e_1_3_4_11_1","doi-asserted-by":"crossref","unstructured":"Dikmen M. Burns C. (2017). Trust in autonomous vehicles: The case of Tesla Autopilot and summon. In 2017 IEEE international conference on systems man and cybernetics (SMC) (pp. 1093\u20131098). IEEE.","DOI":"10.1109\/SMC.2017.8122757"},{"key":"e_1_3_4_12_1","unstructured":"Driving Safety Research Institute. (2023). ISAT user guide table of contents. Retrieved from. https:\/\/www.nads-sc.uiowa.edu\/minisim\/wiki\/index.php?title=ISAT_User_Guide_Table_of_Contents"},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00038-7"},{"key":"e_1_3_4_14_1","doi-asserted-by":"crossref","unstructured":"Eykholt K. Evtimov I. Fernandes E. Li B. Rahmati A. Xiao C. Prakash A. Kohno T. Song D. (2018). Robust physical-world attacks on deep learning visual classification. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 1625\u20131634). IEEE.","DOI":"10.1109\/CVPR.2018.00175"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trip.2022.100545"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hrmr.2017.03.006"},{"key":"e_1_3_4_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2009.09.004"},{"key":"e_1_3_4_18_1","doi-asserted-by":"crossref","unstructured":"Holthausen B. E. Wintersberger P. Walker B. N. Riener A. (2020). Situational trust scale for automated driving (STS-AD): Development and initial validation. In 12th international conference on automotive user interfaces and interactive vehicular applications (pp. 40\u201347). ACM.","DOI":"10.1145\/3409120.3410637"},{"key":"e_1_3_4_19_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327566IJCE0401_04"},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aap.2021.106515"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541931218621254"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-021-09515-9"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720819853686"},{"key":"e_1_3_4_24_1","doi-asserted-by":"crossref","unstructured":"Kundinger T. Wintersberger P. Riener A. (2019). (Over)Trust in automated driving: The sleeping pill of tomorrow? In Extended abstracts of the 2019 CHI conference on human factors in computing systems (Glasgow Scotland UK) (CHI EA \u201919). Association for Computing Machinery.","DOI":"10.1145\/3290607.3312869"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/00140139208967392"},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.1518\/hfes.46.1.50_30392"},{"key":"e_1_3_4_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018720819879585"},{"key":"e_1_3_4_28_1","doi-asserted-by":"crossref","unstructured":"Lim C. Rajivan P. (2023). Who hacked my car? Designing autonomous vehicles to support driver response to security threats. In Proceedings of the human factors and ergonomics society annual meeting (p. 21695067231192217). Sage Publications Sage CA.","DOI":"10.1177\/21695067231192217"},{"key":"e_1_3_4_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503461"},{"key":"e_1_3_4_30_1","article-title":"Hacking the Mitsubishi Outlander PHEV hybrid","author":"Lodge D.","year":"2016","unstructured":"Lodge D. (2016). Hacking the Mitsubishi Outlander PHEV hybrid. PenTestPartners, June 5.","journal-title":"PenTestPartners"},{"key":"e_1_3_4_31_1","doi-asserted-by":"crossref","unstructured":"Mackay A. Fortes I. Santos C. Machado D. Barbosa P. Vilas Boas V. Ferreira J. P. Costa N. Silva C. Sousa E. (2020). The impact of autonomous vehicles\u2019 active feedback on trust. In Advances in safety management and human factors: Proceedings of the AHFE 2019 international conference on safety management and human factors 24\u201328 July 2019 Washington DC USA (pp. 342\u2013352). Springer.","DOI":"10.1007\/978-3-030-20497-6_32"},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/14639220500337708"},{"key":"e_1_3_4_33_1","doi-asserted-by":"crossref","unstructured":"Malik S. Sun W. (2020). Analysis and simulation of cyber attacks against connected and autonomous vehicles. In 2020 international conference on connected and autonomous driving (MetroCAD) (pp. 62\u201370). IEEE.","DOI":"10.1109\/MetroCAD48866.2020.00018"},{"key":"e_1_3_4_34_1","doi-asserted-by":"crossref","unstructured":"McNeese N. Demir M. Chiou E. Cooke N. Yanikian G. (2019). Understanding the role of trust in human-autonomy teaming.","DOI":"10.24251\/HICSS.2019.032"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2021.1846854"},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2021.102348"},{"key":"e_1_3_4_37_1","unstructured":"Miller C. Valasek C. (2015). Remote exploitation of an unaltered passenger vehicle. In Black Hat USA 2015 S 91 (pp. 1\u201391)."},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/014233129902100408"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2933601"},{"key":"e_1_3_4_40_1","unstructured":"Nielsen J. (2024). Usability heuristics for user interface design."},{"key":"e_1_3_4_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trf.2017.02.001"},{"issue":"2","key":"e_1_3_4_42_1","first-page":"546","article-title":"Potential cyberattacks on automated vehicles","volume":"16","author":"Petit J.","year":"2015","unstructured":"Petit J., Shladover S. E. (2015). Potential cyberattacks on automated vehicles. IEEE Transactions on Intelligent Transportation Systems, 16(2), 546\u2013556. https:\/\/doi.org\/10.1109\/TITS.2014.2342271","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_3_4_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102269"},{"key":"e_1_3_4_44_1","doi-asserted-by":"crossref","unstructured":"Sato T. Hayakawa Y. Suzuki R. Shiiki Y. Yoshioka K. Chen Q. A. (2024 February). LiDAR spoofing meets the new-gen: Capability improvements broken assumptions and new attack strategies. In ISOC network and distributed system security symposium (NDSS). ISOC.","DOI":"10.14722\/ndss.2024.23350"},{"key":"e_1_3_4_45_1","doi-asserted-by":"crossref","unstructured":"Schneider T. Hois J. Rosenstein A. Ghellal S. Theofanou-F\u00fclbier D. Gerlicher A. R. S. (2021). Explain yourself! Transparency for positive ux in autonomous driving. In Proceedings of the 2021 CHI conference on human factors in computing systems. CHI.","DOI":"10.1145\/3411764.3446647"},{"key":"e_1_3_4_46_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-017-0202-6"},{"key":"e_1_3_4_47_1","doi-asserted-by":"crossref","unstructured":"Shen J. Won J. Y. Chen Z. Chen Q. A. (2020). Drift with devil: Security of {Multi-Sensor} fusion based localization in {High-Level} autonomous driving under {GPS} spoofing. In 29th USENIX security symposium (USENIX Security 20) (pp. 931\u2013948). USENIX.","DOI":"10.14722\/autosec.2021.23010"},{"key":"e_1_3_4_48_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118131350.ch34"},{"key":"e_1_3_4_49_1","doi-asserted-by":"crossref","unstructured":"Thing V. L. L. Wu J. (2016). Autonomous vehicle security: A taxonomy of attacks and defences. In 2016 IEEE international conference on internet of things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber physical and social computing (CPSCom) and IEEE smart data (SmartData) (pp. 164\u2013170). IEEE.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2016.52"},{"key":"e_1_3_4_50_1","volume-title":"Cruise pauses all driverless operations after collisions, suspensions","author":"Wayland M.","year":"2023","unstructured":"Wayland M., Kolodny L. (2023, October 26). Cruise pauses all driverless operations after collisions, suspensions. CNBC. https:\/\/www.cnbc.com\/2023\/10\/26\/cruise-pauses-all-driverless-operations-after-collisions-suspensions.html"},{"key":"e_1_3_4_51_1","doi-asserted-by":"crossref","unstructured":"Wright T. J. Horrey W. J. Lesch M. F. Rahman M. M. (2016). Drivers\u2019 trust in an autonomous system: Exploring a covert video-based measure of trust. In Proceedings of the human factors and ergonomics society annual meeting (Vol. 60 pp. 1334\u20131338). Sage Publications Sage CA.","DOI":"10.1177\/1541931213601308"},{"key":"e_1_3_4_52_1","doi-asserted-by":"publisher","DOI":"10.1037\/bul0000115"},{"key":"e_1_3_4_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.trc.2020.102957"},{"key":"e_1_3_4_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2022.100455"}],"container-title":["Human Factors: The Journal of the Human Factors and Ergonomics Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/00187208241283321","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/00187208241283321","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/00187208241283321","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/00187208241283321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T07:19:34Z","timestamp":1748243974000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/00187208241283321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,18]]},"references-count":53,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["10.1177\/00187208241283321"],"URL":"https:\/\/doi.org\/10.1177\/00187208241283321","relation":{},"ISSN":["0018-7208","1547-8181"],"issn-type":[{"value":"0018-7208","type":"print"},{"value":"1547-8181","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,18]]}}}