Are Pilots Prepared for a Cyber-Attack? Essay

Exclusively available on IvyPanda Available only on IvyPanda

Background

According to the authors’ argument, the topic of the paper is pilots’ vigilance toward cyber-attacks by applying human factors to evaluate the behaviors of pilots. The writers claim to add knowledge to the audience by presenting technology-centric elements that have brought affected aviation frameworks (Gontar et al., 2018). The key finding that contributes to the body of knowledge is increased incidents of cyber-attacks using cell phones and computers in private and public perspectives. The authors want to enlighten the reader about cyber-crime that has affected many aircraft due to pilots’ faultiness in their duties. The research objectives include exploring whether cyber-attack relate certainly to pilots’ tasks. The other objective is to investigate whether cyber-attack cautions attenuate the attack’s effects on pilot workload.

We will write a custom essay on your topic a custom Essay on Are Pilots Prepared for a Cyber-Attack?
808 writers online

Summary Leading to Conclusion

The author’s make their arguments based from the data about the increased rates of attacks on civil aircraft by distracting adversary computer systems and networks in aviation during fly-by-wire management systems. The article is an empirical study since the study uses direct and indirect observation and experience to test the hypotheses. As depicted in the introduction, the theoretical background is majorly influenced by the rise of attacks on civil aircraft by distracting adversary computer systems and networks in aviation during fly-by-wire management systems. The hypotheses are listed and follow the literature review since they discuss cyber-attack influence on pilot’s visual information and acquisition of data through effective and secure strategies (Verleye, 2019). Methods used in this paper include the test design and the use of samples and dependent measures to satisfy the study’s objectives. A sample of 22 pilots aged 25-63 years participated in the study to ensure there is effective accumulation of information to the area of study.

The models used follow the theory discussed since authors have discussed scenarios basis, eye-tracking systems, and flight information procedures, all being elements that have contributed to the possibility of cyberattacks. The findings from statistics showed significant effects of the cyber-attacks in all perspectives, but the notable one being strong interaction (Gontar et al., 2018). Additionally, cyber-attacks increase pilots’ workload, such as alarms and engaging activity that lead to an eased environment in manipulating aircraft data. Conclusions follow the findings due to allegiance to cyber-attacks influence on pilots’ workload, system trust, and acquisition strategies that show pilots’ behavior while working.

Critical Evaluation

The strengths of the article are that authors attributed most of their points to various sources. The paper is well-organized in paragraphs and shows transition to the new ideas. Their work has conceptual advantage to the reader due to the focus on aviation security. The article’s sample used is phenomenal towards getting enough information. However, their study lacked a literature review that could be a basis of the argument from the gaps left. Many people have written about aviation security by specifically touching on techno-centric variables contributing to the attacks. The article has many citations, which questions the reader about the authenticity of reviewing all the sources and getting relevant information (Verleye, 2019). Despite the authors alleging that researchers have ignored human workers’ reaction behaviors to the cyber security methodology, they have not given clear indication to on the available gaps for further study.

The sample used does not represent all the required targets. Thus, the sample number is low as it should have included other people in the cabin crew serving in various technical areas for aircraft (Gontar et al., 2018). Additionally, the sample does not give the roles under which the population used worked, making the study have reliability issues. There are sensitive issues such as system management of aircraft that need to be analyzed in length to navigate other possible traits that help the reader understand the pilots’ behavior while on duty. There should be mention of protective strategies that use modern applications in securing aircraft while in operation. Thus, the paper is enriching in terms of aviation security matters but requires further exploration to reduce research gaps.

References

Gontar, P., Homans, H., Rostalski, M., Behrend, J., Dehais, F., & Bengler, K. (2018). . Journal of Air Transport Management, 69(8), 26-37.

Verleye, K. (2019). . Journal of Service Management, 30(5), 549-576.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper
Print
Need an custom research paper on Are Pilots Prepared for a Cyber-Attack? written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2023, March 17). Are Pilots Prepared for a Cyber-Attack? https://ivypanda.com/essays/are-pilots-prepared-for-a-cyber-attack/

Work Cited

"Are Pilots Prepared for a Cyber-Attack?" IvyPanda, 17 Mar. 2023, ivypanda.com/essays/are-pilots-prepared-for-a-cyber-attack/.

References

IvyPanda. (2023) 'Are Pilots Prepared for a Cyber-Attack'. 17 March.

References

IvyPanda. 2023. "Are Pilots Prepared for a Cyber-Attack?" March 17, 2023. https://ivypanda.com/essays/are-pilots-prepared-for-a-cyber-attack/.

1. IvyPanda. "Are Pilots Prepared for a Cyber-Attack?" March 17, 2023. https://ivypanda.com/essays/are-pilots-prepared-for-a-cyber-attack/.


Bibliography


IvyPanda. "Are Pilots Prepared for a Cyber-Attack?" March 17, 2023. https://ivypanda.com/essays/are-pilots-prepared-for-a-cyber-attack/.

Powered by CiteTotal, the best reference maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1