Autonomous Vehicles (4)

View options:

Find narratives by ethical themes or by technologies.

FILTERreset filters
Themes
  • Privacy
  • Accountability
  • Transparency and Explainability
  • Human Control of Technology
  • Professional Responsibility
  • Promotion of Human Values
  • Fairness and Non-discrimination
Show more themes
Technologies
  • AI
  • Big Data
  • Bioinformatics
  • Blockchain
  • Immersive Technology
Show more technologies
Additional Filters:
  • Media Type
  • Availability
  • Year
    • 1916 - 1966
    • 1968 - 2018
    • 2019 - 2069
  • Duration
  • 5 min
  • MIT Technology Review
  • 2019
image description
When algorithms mess up, the nearest human gets the blame

Humans take the blame for failures of AI automated systems, protecting the integrity of the technological system and becoming a “liability sponge.” It is necessary to redefine the role of humans in sociotechnical systems.

  • MIT Technology Review
  • 2019
  • 7 min
  • MIT Technology Review
  • 2019
image description
Hackers Are the Real Obstacle for Self-Driving Vehicles

Autonomous vehicles could be subject to hacks by adversarial machine-learning, possibly perpetrated by out-of-work truck/Uber drivers and “adversarial machine learning”. The fact that vehicle algorithms can already be fairly easily tricked also raises concerns.

  • MIT Technology Review
  • 2019
  • 3 min
  • Kinolab
  • 2020
image description
Self-Driving Vehicles and Drone Traffic Stops

Nathan, a computer programmer, lives in an imagined version of 2033 in which all cars are equipped with a vocal assistant and an autonomous drive program. When he takes control of his own car and drives recklessly, he is pulled over by a police drone. Eventually, he meets his demise when the autonomous drive in his car fails to recognize a parked truck in the middle of the road.

  • Kinolab
  • 2020
  • 3 min
  • Cyber Security News
  • 2025
image description
Tesla Wall Connector Hacked in 18 Minute Attack

Tesla’s famous wall charger, which is installed in homes and businesses worldwide, gets hacked through the charging cable on the adapter. The adapter had a previously undocumented feature that allowed Tesla vehicles to update it through the charging cable, and hackers were able to exploit this vulnerability. After being able to execute arbitrary code on the device, hackers may gain access to the local network that the charger is connected to—among other things.

  • Cyber Security News
  • 2025