Background
According to the authors’ argument, the topic of the paper is pilots’ vigilance toward cyber-attacks by applying human factors to evaluate the behaviors of pilots. The writers claim to add knowledge to the audience by presenting technology-centric elements that have brought affected aviation frameworks (Gontar et al., 2018). The key finding that contributes to the body of knowledge is increased incidents of cyber-attacks using cell phones and computers in private and public perspectives. The authors want to enlighten the reader about cyber-crime that has affected many aircraft due to pilots’ faultiness in their duties. The research objectives include exploring whether cyber-attack relate certainly to pilots’ tasks. The other objective is to investigate whether cyber-attack cautions attenuate the attack’s effects on pilot workload.
Summary Leading to Conclusion
The author’s make their arguments based from the data about the increased rates of attacks on civil aircraft by distracting adversary computer systems and networks in aviation during fly-by-wire management systems. The article is an empirical study since the study uses direct and indirect observation and experience to test the hypotheses. As depicted in the introduction, the theoretical background is majorly influenced by the rise of attacks on civil aircraft by distracting adversary computer systems and networks in aviation during fly-by-wire management systems. The hypotheses are listed and follow the literature review since they discuss cyber-attack influence on pilot’s visual information and acquisition of data through effective and secure strategies (Verleye, 2019). Methods used in this paper include the test design and the use of samples and dependent measures to satisfy the study’s objectives. A sample of 22 pilots aged 25-63 years participated in the study to ensure there is effective accumulation of information to the area of study.
The models used follow the theory discussed since authors have discussed scenarios basis, eye-tracking systems, and flight information procedures, all being elements that have contributed to the possibility of cyberattacks. The findings from statistics showed significant effects of the cyber-attacks in all perspectives, but the notable one being strong interaction (Gontar et al., 2018). Additionally, cyber-attacks increase pilots’ workload, such as alarms and engaging activity that lead to an eased environment in manipulating aircraft data. Conclusions follow the findings due to allegiance to cyber-attacks influence on pilots’ workload, system trust, and acquisition strategies that show pilots’ behavior while working.
Critical Evaluation
The strengths of the article are that authors attributed most of their points to various sources. The paper is well-organized in paragraphs and shows transition to the new ideas. Their work has conceptual advantage to the reader due to the focus on aviation security. The article’s sample used is phenomenal towards getting enough information. However, their study lacked a literature review that could be a basis of the argument from the gaps left. Many people have written about aviation security by specifically touching on techno-centric variables contributing to the attacks. The article has many citations, which questions the reader about the authenticity of reviewing all the sources and getting relevant information (Verleye, 2019). Despite the authors alleging that researchers have ignored human workers’ reaction behaviors to the cyber security methodology, they have not given clear indication to on the available gaps for further study.
The sample used does not represent all the required targets. Thus, the sample number is low as it should have included other people in the cabin crew serving in various technical areas for aircraft (Gontar et al., 2018). Additionally, the sample does not give the roles under which the population used worked, making the study have reliability issues. There are sensitive issues such as system management of aircraft that need to be analyzed in length to navigate other possible traits that help the reader understand the pilots’ behavior while on duty. There should be mention of protective strategies that use modern applications in securing aircraft while in operation. Thus, the paper is enriching in terms of aviation security matters but requires further exploration to reduce research gaps.
References
Gontar, P., Homans, H., Rostalski, M., Behrend, J., Dehais, F., & Bengler, K. (2018). Are pilots prepared for a cyber-attack? A human factors approach the experimental evaluation of pilots’ behavior. Journal of Air Transport Management, 69(8), 26-37.
Verleye, K. (2019). Designing, writing-up and reviewing case study research: An equifinality perspective. Journal of Service Management, 30(5), 549-576.