Bibliography

Graphics

  1. Desktop Computer Vector Vector Art & Graphics. (n.d.). FreeVector.com. Retrieved October 18, 2021, from https://www.freevector.com/desktop-computer-vector

  2. Lee, T. B. (2017, September 9). Lyft’s strategy: Be the Android of the self-driving car business. Ars Technica. Retrieved October 19, 2021, from https://arstechnica.com/cars/2017/09/lyfts-ambitious-plans-to-win-the-self-driving-wars/

  3. Newswire, M.-P. (2015). volvo cars presents the world’s first complete self-driving car system. Multivu. Retrieved October 19, 2021, from https://www.multivu.com/players/English/7443851-volvo-first-self-driving-car-system/

Works Cited

  1. Marco, d. C. (2016, Jun 08). Mitsubishi SUV hacked through in-car wi-fi: As in-car tech becomes increasingly sophisticated; security is a concern. Waterloo Region Record. Retrieved September 4, 2021, from https://www.proquest.com/docview/1794304561?accountid=14541

  2. This type of source is a newspaper article. It details an occurrence of different models of smart cars and autonomous vehicles being hacked into by security experts as to show their flaws. This provides vital information for the security aspects of self-driving cars, as the newspaper also details how automakers are cracking down on the security systems in place because of these test hackings. The source provides information about how to make more effective security as well. So, this source is obviously the best for the “Safety and Security” section of the research paper.


  3. Mircică, N. (2019). The design, implementation, and operation of self-driving cars: Ethical, security, safety, and privacy issues. Contemporary Readings in Law and Social Justice, 11(2), 43-48. Retrieved September 4, 2021, from http://dx.doi.org.mutex.gmu.edu/10.22381/CRLSJ11220196

  4. This source type is a scholarly journal article. The source touches on ethical, security, and privacy issues, which are three of the main aspects of the research paper. It is information necessary to complete the requirements of the paper. More specifically, it also details the conceptual framework, methodology, and implications of self-driving cars. Therefore, it would be useful mostly for the “Ethical, Legal, and Social Implications” section of the research paper.


  5. Ropert, S. (2017). Connected cars. Digiworld Yearbook, 134-135. Institut de l'Audiovisuel et de Telecommunications en Europe (IDATE). Retrieved September 4, 2021, from https://www-proquest-com.mutex.gmu.edu/central/docview/2445995166/fulltext/408b626b665b4e80pq/4

  6. This source is a book source type. It touches on the concept of self-driving cars becoming an economic investment. Further, the source refers to autonomous vehicles as being another device that should be targeted by internet companies. The source is good for the “Future Use” and possibly the “Ethical, Legal, and Social Implications” sections of the research paper. It could provide information necessary to expand on the idea of a network of connected self-driving cars becoming the new normal mode of public transportation.


  7. Ryan, M. (2020). The future of transportation: Ethical, legal, social, and economic impacts of self-driving vehicles in the year 2025. Science and Engineering Ethics, 26(3), 1185-1208. Retrieved September 4, 2021, from http://dx.doi.org.mutex.gmu.edu/10.1007/s11948-019-00130-2

  8. This source is a scholarly journal/research article. The article provides information on ethical and social implications as well as future use. It specifically details future use posed as a sort of hypothesis of what the impact of self-driving cars will be by the year 2025. Counterarguments to claims of possible security issues with self-driving cars are also provided in this article. So, this article provides a lot of information needed for the “Future Use”, “Ethical, Legal, and Social Implications”, and “Safety and Security” sections of this research paper.


  9. Self-driving car. (2003, June 14). Wikipedia, the free encyclopedia. Retrieved September 4, 2021, from https://en.wikipedia.org/wiki/Self-driving_car

  10. This source type is a website/wiki page/encyclopedia source. The source provides general information regarding self-driving cars. It was simply utilized at the beginning of research in providing a base of knowledge for information for the topic. Providing a background of the history of the development of autonomous vehicles made it easier to understand the workings of self-driving cars now and how they could be utilized in the future. Not much information will be used from this source, but if it is, it would be best for the Introduction and the “Current Use and Key Components” sections of this paper.


  11. Vdovin, D. S., & Khrenov, I. O. (2019). Systems of the self-driving vehicle. IOP Conference Series. Materials Science and Engineering, 534(1). Retrieved September 4, 2021, from http://dx.doi.org.mutex.gmu.edu/10.1088/1757-899X/534/1/012016

  12. This source type is a scholarly journal article. It dives into the systems of autonomous vehicles but goes more in-depth about them as the other sources. This is crucial for providing as much information as possible about it in the research paper. Some examples of information included are the vehicle internal systems control, and the vehicle positioning system. It is useful for the “Current Use and Key Components” section and possibly the “Safety and Security” section as well.


  13. Zhao, J., Liang, B., & Chen, Q. (2018). The key technology toward the self-driving car. International Journal of Intelligent Unmanned Systems, 6(1), 2-20. Retrieved September 4, 2021, from http://dx.doi.org.mutex.gmu.edu/10.1108/IJIUS-08-2017-0008

  14. This source type is a scholarly journal article. It specifically details the technologies that have gone into the self-driving car’s creation. Additionally, it details the systems that uphold them and allow them to function. This includes technology such as improvements in artificial intelligence, car navigation systems, location systems, electronic mapping, and more. Thus, the source is mainly useful for the “Safety and Security” section of the research paper.