How CS875: Futuring and Innovation Applies to Combating Cybercrime
This course, Futuring and Innovation, covered several
concepts about how to approach and plan for innovation. It also provided some case
studies to determine how innovation failures occur, and how they can be learned
from/used to benefit the overall project. During this course, I took a look
into Dedicated Short-Range Communication (DSRC) and Cellular Vehicle-to-Everything
(C-V2X), as it has many cybersecurity and technical considerations (Everything
RF, 2019; Faludi, 2022). My dissertation is centered around capturing cybercriminals
and/or reducing cybercrime.
I
decided to look into whether it is technically possible (without serious restrictions)
to determine the exact real-person identification of a cybercriminal. I have
had a lot of security incidents, personally and professionally. The means to
recover are infuriating, especially with the government-based entities
designated to do so, the penalties imposed for breaches, the overwhelming continued
rise in costs, and pure curiosity. Since V2X technologies will inherently carry
some basic privacy and most likely malicious attackers, V2X technologies already
will continue to provide another market for cybercriminals to target.
Synopsis
Vehicle-to-Vehicle (V2V; DSRC; 5G), Vehicle-to-Infrastructure
(V2I; DSRC; 5G), Vehicle-to-Person (V2P; C-V2X; LTE/5G), Vehicle-to-Network
(V2N; C-V2X; LTE/5G), and Vehicle-to-Everything (V2X; DSRC/C-V2X; 5G/LTE) are
really fancy ways to say that our world and the Internet-of-Things (IoT) is
rapidly advancing, which is a great sign. At some point, society will have
technology interwoven into every aspect of their lives, that universal
IDs/fingerprints will never be escapable. Some future predictions show negative
outcomes in the next 20-100 years, but as long as each stakeholder takes a
systematic and ethical/moral sociotechnical approach, trust and reliance should
grow. However, should the technology be seriously abused, it could lead to an
untechnical revolution.
There
are well-founded concerns and issues with the Vehicle-to-Everything (V2X)
technologies, but the overall benefit would probably outweigh those
Summary
Capturing
cybercriminals is an ongoing battle. When one this is fixed, the need for
another exploit is imminent/in high demand. Since attacks are not completely
preventable, the best approach is a systems design approach. By leveraging the structured
design process (SDP; top-down, systematic, and modular) into Vehicle-to-Everything’s
(V2X’s) design, resilient technology should emerge. Incorporating analytics,
user-feedback, projections, and continuously innovating, V2X technologies will
eventually become the norm. I am personally interested in the many additional capabilities
I will have, but I am concerned that constant monitoring data will be captured:
both by agencies and criminals.
References
Everything RF. (2019, May 22). What is DSRC
(Dedicated Short Range Communication)? Retrieved from Everythingrf.com:
https://www.Everythingrf.com/community/what-is-dsrc
Faludi, R. (2022, October 28). Wireless
Communication: Comparing RF and Cellular. Retrieved from digi.com:
https://www.digi.com/blog/post/wireless-communication-comparing-rf-and-cellular
Ribaud, A. (2025, February 20). Comparing
the Delphi method & nominal group technique | Triducive. Retrieved
from triducive.com:
https://triducive.com/2024/09/27/comparing-the-delphi-method-and-the-nominal-group-technique-ngt/
U.S. Department of Transportation
& National Highway Traffic Safety Administration. (n.d.). Vehicle-to-Vehicle
Communication Technology. Retrieved March 2, 2025, from nhtsa.gov:
https://www.nhtsa.gov/sites/nhtsa.gov/files/documents/v2v_fact_sheet_101414_v2a.pdf
No comments:
Post a Comment