Are Pilots Prepared for a Cyber-Attack? Essay

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Background

According to the authors’ argument, the topic of the paper is pilots’ vigilance toward cyber-attacks by applying human factors to evaluate the behaviors of pilots. The writers claim to add knowledge to the audience by presenting technology-centric elements that have brought affected aviation frameworks (Gontar et al., 2018). The key finding that contributes to the body of knowledge is increased incidents of cyber-attacks using cell phones and computers in private and public perspectives. The authors want to enlighten the reader about cyber-crime that has affected many aircraft due to pilots’ faultiness in their duties. The research objectives include exploring whether cyber-attack relate certainly to pilots’ tasks. The other objective is to investigate whether cyber-attack cautions attenuate the attack’s effects on pilot workload.

Summary Leading to Conclusion

The author’s make their arguments based from the data about the increased rates of attacks on civil aircraft by distracting adversary computer systems and networks in aviation during fly-by-wire management systems. The article is an empirical study since the study uses direct and indirect observation and experience to test the hypotheses. As depicted in the introduction, the theoretical background is majorly influenced by the rise of attacks on civil aircraft by distracting adversary computer systems and networks in aviation during fly-by-wire management systems. The hypotheses are listed and follow the literature review since they discuss cyber-attack influence on pilot’s visual information and acquisition of data through effective and secure strategies (Verleye, 2019). Methods used in this paper include the test design and the use of samples and dependent measures to satisfy the study’s objectives. A sample of 22 pilots aged 25-63 years participated in the study to ensure there is effective accumulation of information to the area of study.

The models used follow the theory discussed since authors have discussed scenarios basis, eye-tracking systems, and flight information procedures, all being elements that have contributed to the possibility of cyberattacks. The findings from statistics showed significant effects of the cyber-attacks in all perspectives, but the notable one being strong interaction (Gontar et al., 2018). Additionally, cyber-attacks increase pilots’ workload, such as alarms and engaging activity that lead to an eased environment in manipulating aircraft data. Conclusions follow the findings due to allegiance to cyber-attacks influence on pilots’ workload, system trust, and acquisition strategies that show pilots’ behavior while working.

Critical Evaluation

The strengths of the article are that authors attributed most of their points to various sources. The paper is well-organized in paragraphs and shows transition to the new ideas. Their work has conceptual advantage to the reader due to the focus on aviation security. The article’s sample used is phenomenal towards getting enough information. However, their study lacked a literature review that could be a basis of the argument from the gaps left. Many people have written about aviation security by specifically touching on techno-centric variables contributing to the attacks. The article has many citations, which questions the reader about the authenticity of reviewing all the sources and getting relevant information (Verleye, 2019). Despite the authors alleging that researchers have ignored human workers’ reaction behaviors to the cyber security methodology, they have not given clear indication to on the available gaps for further study.

The sample used does not represent all the required targets. Thus, the sample number is low as it should have included other people in the cabin crew serving in various technical areas for aircraft (Gontar et al., 2018). Additionally, the sample does not give the roles under which the population used worked, making the study have reliability issues. There are sensitive issues such as system management of aircraft that need to be analyzed in length to navigate other possible traits that help the reader understand the pilots’ behavior while on duty. There should be mention of protective strategies that use modern applications in securing aircraft while in operation. Thus, the paper is enriching in terms of aviation security matters but requires further exploration to reduce research gaps.

References

Gontar, P., Homans, H., Rostalski, M., Behrend, J., Dehais, F., & Bengler, K. (2018). . Journal of Air Transport Management, 69(8), 26-37.

Verleye, K. (2019). . Journal of Service Management, 30(5), 549-576.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2023, March 17). Are Pilots Prepared for a Cyber-Attack? https://ivypanda.com/essays/are-pilots-prepared-for-a-cyber-attack/

Work Cited

"Are Pilots Prepared for a Cyber-Attack?" IvyPanda, 17 Mar. 2023, ivypanda.com/essays/are-pilots-prepared-for-a-cyber-attack/.

References

IvyPanda. (2023) 'Are Pilots Prepared for a Cyber-Attack'. 17 March.

References

IvyPanda. 2023. "Are Pilots Prepared for a Cyber-Attack?" March 17, 2023. https://ivypanda.com/essays/are-pilots-prepared-for-a-cyber-attack/.

1. IvyPanda. "Are Pilots Prepared for a Cyber-Attack?" March 17, 2023. https://ivypanda.com/essays/are-pilots-prepared-for-a-cyber-attack/.


Bibliography


IvyPanda. "Are Pilots Prepared for a Cyber-Attack?" March 17, 2023. https://ivypanda.com/essays/are-pilots-prepared-for-a-cyber-attack/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1