References
- Anderson, R., and S. Fuloria. 2009, September 22–25. “Certification and Evaluation: A Security Economics Perspective.” IEEE Conference on Emerging Technologies and Factory Automation, 1–7, Palma de Mallorca, Spain. IEEE.
- BBC. 2015. “Fiat Chrysler recalls 1.4 million cars after Jeep hack” https://www.bbc.co.uk/news/technology-33650491.
- Beall, A. 2016. “Self-driving cars to be targeted by hackers: Cyber criminals could infect vehicles and hold them to ransom until the owner pays” Daily mail. https://www.dailymail.co.uk/sciencetech/article-3491452/Self-driving-cars-targeted-hackers-Cyber-criminals-infect-vehicles-hold-ransom-owner-pays.html.
- Bevin, E. 2019. “Man pleads guilty to stalking and controlling ex-girlfriend’s car with his computer” https://www.abc.net.au/news/2019-11-06/ract-employee-pleads-guilty-to-using-app-to-stalk-ex-girlfriend/11678980.
- Brock, D. C. 2019. “Our Censors, Ourselves: Commercial Content Moderation” Los Angeles Review of Books. https://lareviewofbooks.org/article/our-censors-ourselves-commercial-content-moderation/.
- Buckl, C., A. Camek, G. Kainz, C. Simon, L. Mercep, H. Stahle, and A. Knoll. 2012. “The software car: Building ICT architectures for future electric vehicles” IEEE International Electric Vehicle Conference. https://mediatum.ub.tum.de/doc/1285769/591565.pdf.
- Burke, J. G. 1966. “Bursting Boilers and the Federal Power.” Technology and Culture 7 (1): 1–23.
- Buttgereit, W., C. Voges, and C. Schilter. 1968. “Exhaust Emission Control by Fuel Injection: The VW 1600 with Electronically Controlled Fuel Injection System.” Society of Automotive Engineers (680192), 1–8. doi:https://doi.org/10.4271/680192.
- CAR. 2016. “Potential Cost Savings and Additional Benefits of Convergence of Safety Regulations between the United States and the European Union” https://www.cargroup.org/wp-content/uploads/2017/02/Potential-Cost-Savings-and-Additional-Benefits-of-Convergence-of-Safety-Regulations-between-the-United-States-and-the-European-Union.pdf.
- Charette, R. 2009. “This car runs on code.” IEEE Spectrum. https://spectrum.ieee.org/this-car-runs-on-code.
- De Bruyne, J., and J. Werbrouck. 2018. “Merging Self-Driving Cars with the law.” Computer Law & Security Review 34 (5): 1150–1153.
- Dexter, J. 2002. “The Cyber Security Management System: A Conceptual Mapping” https://www.sans.org/reading-room/whitepapers/basics/cyber-security-management-system-conceptual-mapping-591.
- ECSO. “WG 1: Standardization certification labelling and supply chain management” https://www.ecs-org.eu/documents/publications/5a3112ec2c891.pdf.
- ENISA. 2019. “GOOD PRACTICES FOR SECURITY OF SMART CARS” https://www.enisa.europa.eu/publications/smart-cars
- Enriques, L., and D. Zetzsche. 2015. “Quack Corporate Governance, Round III? Bank Board Regulation Under the new European Capital Requirement Directive.” Theoretical Inquiries in law 16 (1): 211–244.
- Framework for Improving. Critical Infrastructure Cybersecurity, Version 1.1 Technical Report. 2018. https://doi.org/10.6028/nist.cswp.04162018.
- Fraser-King, G. 2020. “Cyber Threats to the European Automotive Industry Part Two: Cyber Espionage Campaigns” https://www.fireeye.com/blog/products-and-services/2020/01/cyber-threats-to-the-european-automotive-industry-part-two.html.
- Fressoz, J. 2007. “Beck Back in the 19th Century: Towards a Genealogy of Risk Society.” History and Technology 23 (4): 333–350.
- Gerla, M., E. Lee, G. Pau, and U. Lee. 2014. “Internet of vehicles: From intelligent grid to autonomous cars and vehicular clouds” 2014 IEEE world forum on internet of things (WF-IoT) 241–246.
- Greenberg, A. 2013. “Hackers Reveal Nasty New Car Attacks – With Me Behind The Wheel” Forbes. https://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video/
- Greenberg, A. 2015. “Hackers Remotely Kill a Jeep on the Highway – With Me in It”. Wired. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/.
- House of Commons. 1817. Select Committee on Steam Boats https://hdl.handle.net/2027/nyp.33433010754467.
- Hunte, J., N. E. Fenton, and M. Neil. 2020. “Product risk assessment: a Bayesian network approach” https://arxiv.org/abs/2010.06698.
- Huzar, E. 1855. La fin du Monde par la Science. Paris: Dentu. 40
- Kiss, J. 2016. “Your next car will be hacked. Will autonomous vehicles be worth it?” The Guardian. https://www.theguardian.com/technology/2016/mar/13/autonomous-cars-self-driving-hack-mikko-hypponen-sxsw.
- Kreindler, D. 2013. “How Much Does Homologation Really Cost?” https://www.thetruthaboutcars.com/2013/12/how-much-does-homologation-really-cost/.
- Lee, S. 2019. “Hackers on the Highway: Are We Prepared?” Chicago Policy Review. https://chicagopolicyreview.org/2019/01/11/hackers-on-the-highway-are-we-prepared/.
- Levi, M., Y. Allouche, and A. Kontorovich. 2018. “Advanced analytics for connected car cybersecurity” 2018 IEEE 87th Vehicular Technology Conference (VTC Spring) 1–7.
- Macher, G., C. Schmittner, O. Veledar and E. Brenner. 2020, September. “ISO/SAE DIS 21434 Automotive Cybersecurity Standard – In a Nutshell” In International Conference on Computer Safety, Reliability, and Security, 123–135. Cham: Springer.
- Martins, H. 2010. “Type approval homologation and self-certification” https://www.researchgate.net/publication/311949142_Overview_of_Type_Approval_Homologation_and_Self-Certification/link/58641d5308aebf17d3974310/download.
- Miller, C. 2019. “Lessons Learned from Hacking a car.” IEEE Design & Test 36 (6): 7–9.
- Mortimer, C. 2015. “Hackers now able to take control of cars to cause deliberate accidents, scientists warn” https://www.independent.co.uk/life-style/gadgets-and-tech/news/computer-hackers-control-car-deliberate-accidents-national-security-issue-a8066466.html.
- Oliver, T. 2020. “LDRA to Support New ISO/SAE 21434 Automotive Cybersecurity Standard” https://www.embeddedcomputing.com/technology/security/iec-iso-other-standards/ldra-to-support-new-iso-sae-21434-automotive-cybersecurity-standard.
- Ozawa, M., M. Urata, and M. Honda. 2021. “Boiler Explosion and Inspection.” Advances in Power Boilers, 427–460. Elsevier.
- Payne, B. 2019. “Car Hacking: Accessing and Exploiting the Can Bus Protocol.” Journal of Cybersecurity Education, Research and Practice 2019 (1): 5.
- Pearah, P. J 2017. “Opening the Door to Self-Driving Cars: How Will This Change the Rules of the Road.” Journal of High Technology Law 18: 38.
- Pelliccione, P., E. Knauss, R. Heldal, S. Agren, P. Mallozzi, A. Alminger, and D. Borgentun. 2017. “Automotive Architecture Framework: The Experience of Volvo Cars.” Journal of Systems Architecture 77: 83–100.
- Poulsen, K. 2010. “Hacker Disables More Than 100 Cars Remotely” https://www.wired.com/2010/03/hacker-bricks-cars/.
- Reddy, B. 2019. “Thinking Outside the box – Eliminating the Perniciousness of box-Ticking in the new Corporate Governance Code.” Modern Law Review 82 (4): 692–726.
- Regulation (EU). 2012. No 1025/2012 of the European Parliament and of the Council of 25 October 2012 on European Standardisation. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32012R1025
- Ryan, M. 2020. “The Future of Transportation: Ethical, Legal, Social and Economic Impacts of Self-Driving Vehicles in the Year 2025.” Science and Engineering Ethics 26: 1185–1208.
- SAE. 2016. “Cybersecurity Guidebook for Cyber-Physical Vehicle Systems” https://www.sae.org/standards/content/j3061/.
- Sobers, R. 2021. “Cybersecurity Statistics and Trends for 2021” https://www.varonis.com/blog/cybersecurity-statistics/.
- Statista. 2020. “Average annual costs caused by global cyber crime in 2018, by industry sector” https://www.statista.com/statistics/474928/average-annual-costs-caused-by-cyber-crime-worldwide/.
- Suffolk Police. 2021. “Man jailed for more than five years after conspiracy to steal over 100 vehicles” https://www.suffolk.police.uk/news/latest-news/man-jailed-more-five-years-after-conspiracy-steal-over-100-vehicles.
- Tengler, S. 2020. “Top 25 Auto Cybersecurity Hacks: Too Many Glass Houses To Be Throwing Stones” https://www.forbes.com/sites/stevetengler/2020/06/30/top-25-auto-cybersecurity-hacks-too-many-glass-houses-to-be-throwing-stones/.
- Tschofenig, H., M. Volkamer, N. Jentzsch, S. Fischer-Hübner, S. Schiffner, and R. Tirtea. 2013. “On the security, privacy and usability of online seals: An overview” https://www.enisa.europa.eu/publications/on-the-security-privacy-and-usability-of-online-seals.
- UNECE. 1995. “UNECE Transport Vehicle Regulations” https://unece.org/faq.
- UNECE. 2016. “The Revision 3 of the 1958 Agreement – Questions and Answers” https://unece.org/DAM/trans/doc/2016/wp29/WP29-170-21e.pdf.
- Upstream. 2019. “Upstream Security Global Automotive Cybersecurity Report 2019” https://upstream.auto/upstream-security-global-automotive-cybersecurity-report-2019/.
- Veale, M., and F. Z. Borgesius. 2021. “Demystifying the Draft EU Artificial Intelligence Act – Analysing the Good, the bad, and the Unclear Elements of the Proposed Approach.” Computer Law Review International 22 (4): 97–112.
- Vivek, S., D. Yanni, P. Yunker, and J. Silverberg. 2019. “Cyberphysical Risks of Hacked Internet-Connected Vehicles.” Physical Review E 100 (1), 012316.
- Wagner, M., and P. Koopman. 2015. “A Philosophy for Developing Trust in Self-Driving Cars.” In Road Vehicle Automation 2, 163–171. Cham: Springer.
- Welch, D., and M. Cheok. 2020. “GM to Exit Australia, Retire Holden Brand in $1.1 Billion Overhaul” Bloomberg. https://www.bloomberg.com/news/articles/2020-02-17/gm-to-record-1-1b-charges-restructuring-international-ops.
- Wolk, J. 2018. “The fast and the fictional” Automotive News. https://www.autonews.com/article/20181001/SHIFT/181009996/the-fast-and-the-fictional.