Cybersecurity Challenges in the Era of Chinese Electric Passenger Vehicles

A Qualitative Study Investigating Data Security Measures in the European Union

doi: 10.32565/aarms.2024.2.5

Abstract

The present research focuses on investigating the security of data transmitted by electric passenger vehicles originating from the People’s Republic of China, particularly when sent for remote processing. Initially, the study examines the factors contributing to the widespread presence of Chinese vehicles in the European market. Additionally, it explores the measures undertaken by the European Union to safeguard the information and data security of its member states. Following this investigation, an in-depth qualitative research method involving semi-structured interviews was conducted. Ten experts in information security were interviewed, and their insights were analysed concerning the identified challenges. The primary objective of this publication is to draw attention to the conceptual deficiencies that impede the protection of data and information, highlighting how a large volume of data collected from a third country, in this case, electric passenger vehicles, may pose national security risks.

Keywords:

qualitative research cybersecurity passenger car information security data security

How to Cite

Hegyi, H. (2024) “Cybersecurity Challenges in the Era of Chinese Electric Passenger Vehicles: A Qualitative Study Investigating Data Security Measures in the European Union”, AARMS – Academic and Applied Research in Military and Public Management Science. Budapest, 23(2), pp. 63–75. doi: 10.32565/aarms.2024.2.5.

References

BABBIE, Earl (2020): A társadalomtudományi kutatás gyakorlata. Budapest: Balassi.

China Mobile Limited (2020): Digitalized and Intelligent New Power for All. China Mobile Limited Sustainability Report. Online: https://www.chinamobileltd.com/en/ir/reports/ar2020/sd2020.pdf

CYBENKO, George – LANDWEHR, Carl (2012): Security Analytics and Measurements. IEEE Security & Privacy, 10(3), 5–8. Online: http://dx.doi.org/10.1109/MSP.2012.75

DEIBERT, Ron (2015): The Geopolitics of Cyberspace after Snowden. Current History, 114(768), 9–15. Online: http://dx.doi.org/10.1525/curh.2015.114.768.9

European Union Agency for Cybersecurity (ENISA) (2018): Good practices for security of Internet of Things in the context of smart manufacturing. 19 November 2018. Online: https://www.enisa.europa.eu/publications/good-practices-for-security-of-iot

European Union Agency for Cybersecurity (ENISA) (2020): Guidelines for securing the Internet of Things. 9 November 2020. Online: https://www.enisa.europa.eu/publications/guidelines-for-securing-the-internet-of-things

HEGYI, Henrietta – ERDŐDI, László (2023): Személygépjárművek adatforgalmának megfigyelési célú felhasználási lehetőségei. Biztonságtudományi Szemle, 5(1), 53–67.

KRIPPENDORFF, Klaus (2018): Content Analysis. An Introduction to Its Methodology. Thousand Oaks: SAGE.

NICHOLS, Elizabeth A. – PETERSON, Gunnar (2007): A Metrics Framework to Drive Application Security Improvement. IEEE Security & Privacy, 5(2), 88–91. Online: http://dx.doi.org/10.1109/MSP.2007.26

OMOYIOLA, Bayo Olushola (2020): The Evolution of Information Security Measurement and Testing. IOSR Journal of Computer Engineering, 22(3), 50–54. Online: http://dx.doi.org/10.9790/0661-2203025054

PERRIG, Adrian – CANETTI, Ran – TYAR, J. D. – SONG, Dawn (2002): The Tesla Broadcast Authentication Protocol. CryptoBytes, 5(2), 2–13.

PFLEEGER, Shari L. (2012): Security Measurement Steps, Missteps, and Next Steps. IEEE Security & Privacy, 10(4), 5–9. Online: https://doi.org/10.1109/MSP.2012.106

PFLEEGER, Shari L. – CUNNINGHAM, Robert (2010): Why Measuring Security Is Hard. IEEE Security & Privacy, 8(4), 46–54. Online: http://dx.doi.org/10.1109/MSP.2010.60

RYAN, J. C. H. – RYAN, D. J. (2008): Performance Metrics for Information Security Risk Management. IEEE Security & Privacy, 6(5), 38–44.

SCHWAB, Klaus (2023): The Fourth Industrial Revolution. Encyclopedia Britannica, 31 May 2023. Online: https://www.britannica.com/topic/The-Fourth-Industrial-Revolution-2119734

SNOWDEN, Edward (2019): Rendszerhiba. Trans. Tomori Gábor. Budapest: XXI. Század.

STOLFO, Salvatore – BELLOVIN, Steven M. – EVANS, David (2011): Measuring Security. IEEE Security & Privacy, 9(3), 60–65. Online: http://dx.doi.org/10.1109/MSP.2011.56

The Central People’s Government of the People’s Republic of China (2010): Decision on Accelerating the Cultivation and Development of Strategic Emerging Industries Released in October 2010. Online: http://www.gov.cn/zwgk/2010-10/18/content_1724848.htm

VENKAT, Subbu (2020): Evolving Automotive Gateways for Next-Generation Vehicles, Texas Instruments. Online: https://www.ti.com/lit/wp/spry333b/spry333b.pdf?ts=1712501484924

WANG, Ning – PAN, Huizhong – ZHENG, Wenhui (2017): Assessment of the Incentives on Electric Vehicle Promotion in China. Transportation Research Part A: Policy and Practice, 101, 177–189. https://ideas.repec.org/a/eee/transa/v101y2017icp177-189.html

WU, Yang Andrew – NG, Artie W. – YU, Zichao – HUANG, Jie – MENG, Ke – DONG, Z. Y. (2021): A Review of Evolutionary Policy Incentives for Sustainable Development of Electric Vehicles in China: Strategic Implications. Energy Policy, 148. Online: https://doi.org/10.1016/j.enpol.2020.111983

ZHANG, Xingping – LIANG, Yanni – YU, Enhai – JIAN XIE, Rao Rao (2017): Review of Electric Vehicle Policies in China: Content Summary and Effect Analysis. Renewable and Sustainable Energy Reviews, 70, 698–714. Online: https://doi.org/10.1016/j.rser.2016.11.250

ZORZ, Zeljka (2018): Researchers Hack BMW Cars, Discover 14 Vulnerabilities. Help Net Security, 23 May 2018. Online: https://www.helpnetsecurity.com/2018/05/23/hack-bmw-cars/

Downloads

Download data is not yet available.