SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • FARx fights AI voice fraud with new biometrics
    • Al Abdulghani Motors: DIMDEX 2026 Platinum Sponsor
    • CSA's direct ECC dispatch boosts public safety
    • Security-Net expands with Digitronics integration
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

ASIS Foundation releases new research unveiling complexities and opportunities in autonomous vehicles for security industry

23 Apr 2024

ASIS Foundation releases new research unveiling complexities and opportunities in autonomous vehicles for security industry
Contact company
Contact ASIS International
icon Add as a preferred source Download PDF version

The ASIS Foundation announces its findings of a comprehensive research endeavour led by esteemed researchers Ishmael Bhila, Peter Lee, and Alison Wakefield, shedding light on the multifaceted landscape of autonomous vehicles (AVs) within security contexts.

The report, titled "Autonomous Vehicles: Threats, Risks & Opportunities," serves as a beacon for security practitioners, offering invaluable insights into the challenges and opportunities presented by the rapid advancement of AV technologies.

New challenges and considerations

Autonomous vehicles are rapidly proliferating across land, sea, and air domains, revolutionising various sectors and impacting markets, user behaviour, and service attitudes. While uncrewed aerial system (UAS) technologies have matured significantly, there is a surge in investment towards autonomous ground vehicles (AGVs) capable of carrying passengers and cargo. Simultaneously, countries with advanced expertise and infrastructure are actively developing autonomous weapons systems, presenting new challenges and ethical considerations.

There is a surge in investment towards AGVs capable of carrying passengers and cargo 

At the heart of the report lies a meticulous examination of the threats, risks, challenges, and opportunities posed by AVs within security operations. From logistical and operational benefits to the technical prowess they offer, AV technologies promise unprecedented advancements. However, they also introduce a plethora of vulnerabilities and implications that demand careful consideration from security practitioners. 

Advancement of AV technology

"We've witnessed the evolution of autonomous vehicle technology since the 1990s,” said principal researcher Alison Wakefield, Co-Director of the Cybersecurity and Criminology Centre at the University of West London. “While these advancements hold immense potential across various sectors, including commercial, military, and security, they also bring a myriad of risks and challenges. Our report aims to provide security practitioners with valuable insights and recommendations to navigate this complex landscape effectively."

Governments and global bodies are grappling with regulatory frameworks to balance social 

The continued advancement of AV technology hinges upon artificial intelligence (AI), which faces intense political, legal, and ethical scrutiny. Governments and international bodies are grappling with regulatory frameworks to balance social, economic, and military benefits against potential risks. However, regulations remain fragmented and evolving, alongside emerging ethical and legal dilemmas. Technical hurdles, coupled with substantial liability costs for system errors, underscore the complex landscape of AV deployment. The report highlights the intricate regulatory landscape surrounding AVs, emphasising the need for practitioners to navigate national and international regulations, industry frameworks, and emerging standards effectively.

Recommendations for security practitioners 

"Ishmael Bhila, Peter Lee, and Alison Wakefield's research is a testament to their dedication to understanding the complexities of AV technologies within security applications," said Martin Gill, Ph.D., Chair, ASIS Foundation. "Their findings provide invaluable guidance for security practitioners seeking to harness the transformative potential of AVs while safeguarding against potential risks." 

The report offers useful advice for security practitioners to leverage AV technologies

Security practitioners must navigate this intricate environment to effectively harness AV technologies while ensuring responsible and secure utilisation. They must comprehend varying regulatory landscapes, public sentiments, and security requirements across jurisdictions, while addressing risks to critical infrastructure from both malicious and unintentional actors. Anticipated trends include heightened security concerns as criminal and terrorist groups adapt commercial AVs, challenges posed by affordable surveillance capabilities, and the interconnectedness of AVs across domains. The report offers practical recommendations for security practitioners to leverage AV technologies effectively while mitigating risks and challenges. From training and regulation compliance to cybersecurity measures, the guidance outlined in the report empowers practitioners to embrace AV technologies responsibly.

Territory of AV technologies

The report emphasises the pivotal role of organisations like ASIS International in facilitating collaboration among stakeholders, sharing expertise, and driving best practices to harmonise service provision in alignment with multisectoral needs, national and international guidelines, and public perceptions. Embracing emerging technologies while remaining vigilant to security implications is paramount for security practitioners to adapt and thrive in this dynamic landscape. 

As the security landscape continues to evolve, the insights offered by Bhila, Lee, and Wakefield's research serve as a compass for navigating the uncharted territory of AV technologies. Their work underscores the importance of staying informed and proactive in harnessing the transformative potential of AVs within security operations.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Security cameras
  • Covert cameras
  • Security camera systems
  • Radio frequency Identification
  • Vehicle tracking
  • Video analytics
  • Institute security
  • Cargo security
  • IP security solutions
  • Covert Surveillance
  • Integration software
  • Artificial intelligence (AI)
  • Machine Learning
  • Related categories
  • Power supplies & batteries
  • Bollards
  • Video servers (IP transmission)
  • Barricades
  • Gates
  • Storage
  • Barriers
Related white papers
Elevating security through multi-sensing solutions and large-scale AI

Elevating security through multi-sensing solutions and large-scale AI

Download
The 4 pillars of AI in managing high-stakes critical events

The 4 pillars of AI in managing high-stakes critical events

Download
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Related articles
FARx fights AI voice fraud with new biometrics

FARx fights AI voice fraud with new biometrics

Suprema BioStation 3 sets global sales record

Suprema BioStation 3 sets global sales record

A landmark gathering shaping the future of real estate, investment, sustainability & design

A landmark gathering shaping the future of real estate, investment, sustainability & design

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Corporate news
About this page

"Learn about the threats and opportunities in the rapidly evolving autonomous vehicles (AVs) sector with ASIS Foundation's research. Essential read for security industry professionals navigating this complex landscape."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec