SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • High-Security Wedge Barriers By Delta Scientific
    • SCD Wins Major Contract For HD MWIR Detectors
    • ASSA ABLOY And Honeywell Discuss Security Innovation
    • VIVOTEK's Role In Ecological Restoration & Safety
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

ASIS Foundation Releases New Research Unveiling Complexities And Opportunities In Autonomous Vehicles For Security Industry

23 Apr 2024

ASIS Foundation Releases New Research Unveiling Complexities And Opportunities In Autonomous Vehicles For Security Industry
Contact company
Contact ASIS International
icon Add as a preferred source Download PDF version

The ASIS Foundation announces its findings of a comprehensive research endeavor led by esteemed researchers Ishmael Bhila, Peter Lee, and Alison Wakefield, shedding light on the multifaceted landscape of autonomous vehicles (AVs) within security contexts.

The report, titled "Autonomous Vehicles: Threats, Risks & Opportunities," serves as a beacon for security practitioners, offering invaluable insights into the challenges and opportunities presented by the rapid advancement of AV technologies.

New challenges and considerations

Autonomous vehicles are rapidly proliferating across land, sea, and air domains, revolutionizing various sectors and impacting markets, user behavior, and service attitudes. While uncrewed aerial system (UAS) technologies have matured significantly, there is a surge in investment towards autonomous ground vehicles (AGVs) capable of carrying passengers and cargo. Simultaneously, countries with advanced expertise and infrastructure are actively developing autonomous weapons systems, presenting new challenges and ethical considerations.

There is a surge in investment towards AGVs capable of carrying passengers and cargo 

At the heart of the report lies a meticulous examination of the threats, risks, challenges, and opportunities posed by AVs within security operations. From logistical and operational benefits to the technical prowess they offer, AV technologies promise unprecedented advancements. However, they also introduce a plethora of vulnerabilities and implications that demand careful consideration from security practitioners. 

Advancement of AV technology

"We've witnessed the evolution of autonomous vehicle technology since the 1990s,” said principal researcher Alison Wakefield, Co-Director of the Cybersecurity and Criminology Center at the University of West London. “While these advancements hold immense potential across various sectors, including commercial, military, and security, they also bring a myriad of risks and challenges. Our report aims to provide security practitioners with valuable insights and recommendations to navigate this complex landscape effectively."

Governments and global bodies are grappling with regulatory frameworks to balance social 

The continued advancement of AV technology hinges upon artificial intelligence (AI), which faces intense political, legal, and ethical scrutiny. Governments and international bodies are grappling with regulatory frameworks to balance social, economic, and military benefits against potential risks. However, regulations remain fragmented and evolving, alongside emerging ethical and legal dilemmas. Technical hurdles, coupled with substantial liability costs for system errors, underscore the complex landscape of AV deployment. The report highlights the intricate regulatory landscape surrounding AVs, emphasizing the need for practitioners to navigate national and international regulations, industry frameworks, and emerging standards effectively.

Recommendations for security practitioners 

"Ishmael Bhila, Peter Lee, and Alison Wakefield's research is a testament to their dedication to understanding the complexities of AV technologies within security applications," said Martin Gill, Ph.D., Chair, ASIS Foundation. "Their findings provide invaluable guidance for security practitioners seeking to harness the transformative potential of AVs while safeguarding against potential risks." 

The report offers useful advice for security practitioners to leverage AV technologies

Security practitioners must navigate this intricate environment to effectively harness AV technologies while ensuring responsible and secure utilization. They must comprehend varying regulatory landscapes, public sentiments, and security requirements across jurisdictions, while addressing risks to critical infrastructure from both malicious and unintentional actors. Anticipated trends include heightened security concerns as criminal and terrorist groups adapt commercial AVs, challenges posed by affordable surveillance capabilities, and the interconnectedness of AVs across domains. The report offers practical recommendations for security practitioners to leverage AV technologies effectively while mitigating risks and challenges. From training and regulation compliance to cybersecurity measures, the guidance outlined in the report empowers practitioners to embrace AV technologies responsibly.

Territory of AV technologies

The report emphasizes the pivotal role of organizations like ASIS International in facilitating collaboration among stakeholders, sharing expertise, and driving best practices to harmonize service provision in alignment with multisectoral needs, national and international guidelines, and public perceptions. Embracing emerging technologies while remaining vigilant to security implications is paramount for security practitioners to adapt and thrive in this dynamic landscape. 

As the security landscape continues to evolve, the insights offered by Bhila, Lee, and Wakefield's research serve as a compass for navigating the uncharted territory of AV technologies. Their work underscores the importance of staying informed and proactive in harnessing the transformative potential of AVs within security operations.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Security cameras
  • Covert cameras
  • Security camera systems
  • Radio frequency Identification
  • Vehicle tracking
  • Video analytics
  • Institute security
  • Cargo security
  • IP security solutions
  • Covert Surveillance
  • Integration software
  • Artificial intelligence (AI)
  • Machine Learning
  • Related categories
  • Power supplies & batteries
  • Bollards
  • Video servers (IP transmission)
  • Barricades
  • Gates
  • Storage
  • Barriers
Related white papers
The 4 Pillars Of AI In Managing High-Stakes Critical Events

The 4 Pillars Of AI In Managing High-Stakes Critical Events

Download
How Biometrics Are Reshaping Security In A Connected World

How Biometrics Are Reshaping Security In A Connected World

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
Related articles
Suprema BioStation 3 Sets Sales Record In Security Market

Suprema BioStation 3 Sets Sales Record In Security Market

A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design

A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design

Leuze AI Boosts Optical Distance Sensor Accuracy

Leuze AI Boosts Optical Distance Sensor Accuracy

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Corporate news
About this page

"Discover opportunities and challenges the security industry faces with autonomous vehicles (AVs) as per a comprehensive report by the ASIS Foundation. Gain insight into threat management, safe utilization, and the technological impact of AVs."

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec