Search results for "Aviation"
showing 9 items of 69 documents
Does airlines’ eco-friendliness matter? Customer satisfaction towards an environmentally responsible airline
2022
The looming climate crisis requires an immediate response, also on an individual level. Consumers are being asked to reduce and replace their carbon-intensive consumption behaviors. One of the consumption behaviors with the largest impact is air travel. The growing awareness among consumers has led to the advent of flight shaming, which could seriously endanger airlines' existing business models. One way for airlines to respond to this threat is by becoming more eco-friendly. We therefore wanted to study whether the environmental responsibility of an airline could be positively associated with customer satisfaction and whether that could translate into more customer loyalty towards an eco-f…
Transportation in the Philippines
2017
Linking the islands of the archipelago was traditionally done by boat. Today, ships are still used by millions of people to cross straits between the major islands, since there are no bridges except from Leyte to Samar. Cebu lies at the center of the ferries network, while small bangkas bring people to remote islets or through river mouths and harbors. The implementation of the Strong Republic Nautical Highway aims at speeding up and smoothing transfers from island to island. The port of Manila, a small player in the dynamic West Pacific rim, may be relieved from congestion with the rise of Batangas and Subic. Aviation, centered at the saturated Manila airport, has grown quickly since dereg…
Using the Electronics Development Advantage in Creating a Buzz for the Airline Passengers
2013
More and more airlines are trying to show their customers their ability to understand their needs, the market trends and the importance of technology in their lives. In response to the rapid development of the consumer electronics, the airline companies focus their attention on offering their customers the possibility to book a flight or check-in using a smartphone, spend time watching movies or be connected to the internet during the flight. Customers search for airlines who are more ”tech-geek” and opened to new technologies, which allows them to rate the airline companies through apps or connect more often with the airline through social-media. Technology has become an important part in …
Cyber security challenges in aviation and maritime
2021
Climate change influences on aviation: A literature review
2020
While the aviation sector has long been referenced as contributing to the causes of climate change, the need for aviation to adapt to the consequences of climate change has not been as well researched or considered. The paper is a systematic quantitative literature review on climate change and aviation, which aims to explicate significant issues affecting aviation in a changing climate and to identify the aviation industry responses on climate change and adaptation. There are 46 references involved in the detailed assessment, selected according to variables such as methodology, paper outcomes and industry stakeholder. This emergent aviation and climate change adaptation literature could be …
On Apache Log4j2 Exploitation in Aeronautical, Maritime, and Aerospace Communication
2022
Apache Log4j2 is a prevalent logging library for Java-based applications. In December 2021, several critical and high-impact software vulnerabilities, including CVE-2021-44228, were publicly disclosed, enabling remote code execution (RCE) and denial of service (DoS) attacks. To date, these vulnerabilities are considered critical and the consequences of their disclosure far-reaching. The vulnerabilities potentially affect a wide range of internet of things (IoT) devices, embedded devices, critical infrastructure (CI), and cyber-physical systems (CPSs). In this paper, we study the effects and feasibility of exploiting these vulnerabilities in mission-critical aviation and maritime environment…
Recurrent On-Duty Sleepiness and Alertness Management Strategies in Long-Haul Airline Pilots
2018
Introduction We examined whether long-haul airline pilots without recurrent on-duty sleepiness obtain more prior sleep and use more effective in-flight alertness management strategies than their colleagues with recurrent on-duty sleepiness. Methods There were 51 pilots who flew at least twice from Helsinki to Asia. Of them, 44 flew at least twice back to Helsinki following 1 local night. On-duty sleepiness was measured by the Karolinska Sleepiness Scale (KSS), alertness management strategies by a diary, and sleep by a diary and activity monitor. Pilots who rated KSS ≥ 7 on each, some, or none of the flights were classified as "regularly", "sometimes", and "never" sleepy, respectively. This …
Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems
2022
In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. peerReviewed
Cybersecurity Attacks on Software Logic and Error Handling Within ADS-B Implementations: Systematic Testing of Resilience and Countermeasures
2022
Automatic Dependent Surveillance-Broadcast (ADS-B) is a cornerstone of the next-generation digital sky and is now mandated in several countries. However, there have been many reports of serious security vulnerabilities in the ADS-B architecture. In this paper, we demonstrate and evaluate the impact of multiple cyberattacks on ADS-B via remote radio frequency links that affected various network, processing, and display subsystems used within the ADS-B ecosystem. Overall we implemented and tested 12 cyberattacks on ADS-B in a controlled environment, out of which 5 attacks were presented or implemented for the first time. For all these attacks, we developed a unique testbed that consisted of 1…