Pages

Thursday, March 13, 2025

Blog Post 15 - Unit 10 Discussion Board II - CS875: Futuring and Innovation - Colorado Technical University (CTU)

 How CS875: Futuring and Innovation Applies to Combating Cybercrime

               This course, Futuring and Innovation, covered several concepts about how to approach and plan for innovation. It also provided some case studies to determine how innovation failures occur, and how they can be learned from/used to benefit the overall project. During this course, I took a look into Dedicated Short-Range Communication (DSRC) and Cellular Vehicle-to-Everything (C-V2X), as it has many cybersecurity and technical considerations (Everything RF, 2019; Faludi, 2022). My dissertation is centered around capturing cybercriminals and/or reducing cybercrime.

I decided to look into whether it is technically possible (without serious restrictions) to determine the exact real-person identification of a cybercriminal. I have had a lot of security incidents, personally and professionally. The means to recover are infuriating, especially with the government-based entities designated to do so, the penalties imposed for breaches, the overwhelming continued rise in costs, and pure curiosity. Since V2X technologies will inherently carry some basic privacy and most likely malicious attackers, V2X technologies already will continue to provide another market for cybercriminals to target.

Synopsis

               Vehicle-to-Vehicle (V2V; DSRC; 5G), Vehicle-to-Infrastructure (V2I; DSRC; 5G), Vehicle-to-Person (V2P; C-V2X; LTE/5G), Vehicle-to-Network (V2N; C-V2X; LTE/5G), and Vehicle-to-Everything (V2X; DSRC/C-V2X; 5G/LTE) are really fancy ways to say that our world and the Internet-of-Things (IoT) is rapidly advancing, which is a great sign. At some point, society will have technology interwoven into every aspect of their lives, that universal IDs/fingerprints will never be escapable. Some future predictions show negative outcomes in the next 20-100 years, but as long as each stakeholder takes a systematic and ethical/moral sociotechnical approach, trust and reliance should grow. However, should the technology be seriously abused, it could lead to an untechnical revolution.

There are well-founded concerns and issues with the Vehicle-to-Everything (V2X) technologies, but the overall benefit would probably outweigh those (U.S. Department of Transportation & National Highway Traffic Safety Administration, n.d.). Autonomous driving, while I am not certain I would want it at all times, seems like a great feature to have. It will take some time for end-users to get acquainted with the technologies, their use, and to build trust. However, many new jobs will be created. More technology will be built and sold. Drivers that have long trips may be able to take a nap without having to sacrifice safety, costly lodging, or their friends/relatives. Auto accidents should decrease, while situational awareness while driving will increase. In 2025, Colorado implemented a new handsfree cell-phone penalty/law. While the type of law is not really new, I see this as more of a push towards newer Vehicles. Bluetooth/handsfree speakers, headphones, and controls exist, but most of that is built into the newer Vehicles today. I have not reviewed the data, but I assume that this implementation was partly sociotechnical, in that the state wants to improve users’ experience and usage of technologies.

Summary

Capturing cybercriminals is an ongoing battle. When one this is fixed, the need for another exploit is imminent/in high demand. Since attacks are not completely preventable, the best approach is a systems design approach. By leveraging the structured design process (SDP; top-down, systematic, and modular) into Vehicle-to-Everything’s (V2X’s) design, resilient technology should emerge. Incorporating analytics, user-feedback, projections, and continuously innovating, V2X technologies will eventually become the norm. I am personally interested in the many additional capabilities I will have, but I am concerned that constant monitoring data will be captured: both by agencies and criminals.

References

Everything RF. (2019, May 22). What is DSRC (Dedicated Short Range Communication)? Retrieved from Everythingrf.com: https://www.Everythingrf.com/community/what-is-dsrc

Faludi, R. (2022, October 28). Wireless Communication: Comparing RF and Cellular. Retrieved from digi.com: https://www.digi.com/blog/post/wireless-communication-comparing-rf-and-cellular

Ribaud, A. (2025, February 20). Comparing the Delphi method & nominal group technique | Triducive. Retrieved from triducive.com: https://triducive.com/2024/09/27/comparing-the-delphi-method-and-the-nominal-group-technique-ngt/

U.S. Department of Transportation & National Highway Traffic Safety Administration. (n.d.). Vehicle-to-Vehicle Communication Technology. Retrieved March 2, 2025, from nhtsa.gov: https://www.nhtsa.gov/sites/nhtsa.gov/files/documents/v2v_fact_sheet_101414_v2a.pdf

No comments:

Post a Comment