{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T23:16:24Z","timestamp":1775517384800,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,4,16]],"date-time":"2016-04-16T00:00:00Z","timestamp":1460764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10676-016-9398-9","type":"journal-article","created":{"date-parts":[[2016,4,16]],"date-time":"2016-04-16T04:51:07Z","timestamp":1460782267000},"page":"117-129","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":159,"title":["Hacking the brain: brain\u2013computer interfacing technology and the ethics of neurosecurity"],"prefix":"10.1007","volume":"18","author":[{"given":"Marcello","family":"Ienca","sequence":"first","affiliation":[]},{"given":"Pim","family":"Haselager","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,16]]},"reference":[{"issue":"4","key":"9398_CR1","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1586\/17434440.4.4.463","volume":"4","author":"BZ Allison","year":"2007","unstructured":"Allison, B. Z., Wolpaw, E. W., & Wolpaw, J. R. (2007). Brain\u2013computer interface systems: Progress and prospects. Expert Review of Medical Devices, 4(4), 463\u2013474. doi: 10.1586\/17434440.4.4.463 .","journal-title":"Expert Review of Medical Devices"},{"key":"9398_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, J. (2013). Autonomy. In\u00a0The International Encyclopedia of Ethics. Blackwell Publishing Ltd. http:\/\/dx.doi.org\/10.1002\/9781444367072.wbiee716","DOI":"10.1002\/9781444367072.wbiee716"},{"key":"9398_CR3","volume-title":"Principles of biomedical ethics","author":"TL Beauchamp","year":"2001","unstructured":"Beauchamp, T. L., & Childress, J. F. (2001). Principles of biomedical ethics. New York: Oxford University Press."},{"key":"9398_CR4","doi-asserted-by":"crossref","unstructured":"Bonaci, T., Calo, R., & Chizeck, H. J. (2014). App stores for the brain: Privacy & security in brain\u2013computer interfaces. In IEEE international symposium on ethics in science, technology and engineering, 2014.","DOI":"10.1109\/ETHICS.2014.6893415"},{"issue":"3","key":"9398_CR5","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1016\/j.brs.2011.03.002","volume":"5","author":"AR Brunoni","year":"2012","unstructured":"Brunoni, A. R., Nitsche, M. A., Bolognini, N., Bikson, M., Wagner, T., Merabet, L., et al. (2012). Clinical research with transcranial direct current stimulation (tDCS): Challenges and future directions. Brain Stimulation, 5(3), 175\u2013195. doi: 10.1016\/j.brs.2011.03.002 .","journal-title":"Brain Stimulation"},{"key":"9398_CR6","unstructured":"Buss, S. (2002). Personal autonomy.\u00a0In E. N. Zalta\u00a0(Ed.), The Stanford Encyclopedia of Philosophy\u00a0(Winter 2014 Edition). http:\/\/plato.stanford.edu\/archives\/win2014\/entries\/personal-autonomy\/ ."},{"key":"9398_CR7","first-page":"103","volume-title":"Problems in the economic appraisal of new health technology: The evaluation of heart transplants in the UK","author":"M Buxton","year":"1987","unstructured":"Buxton, M. (1987). Problems in the economic appraisal of new health technology: The evaluation of heart transplants in the UK (pp. 103\u2013118). Oxford, England: Oxford Medical Publications."},{"key":"9398_CR8","unstructured":"Chizeck, H. J., & Bonaci, T. (2014). Brain\u2013computer interface anonymizer. Google Patents."},{"issue":"6","key":"9398_CR9","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1097\/YCO.0b013e32834bb8ca","volume":"24","author":"J Clausen","year":"2011","unstructured":"Clausen, J. (2011). Conceptual and ethical issues with brain\u2013hardware interfaces. Current Opinion in Psychiatry, 24(6), 495\u2013501.","journal-title":"Current Opinion in Psychiatry"},{"issue":"22","key":"9398_CR10","first-page":"30","volume":"55","author":"M Conner","year":"2010","unstructured":"Conner, M. (2010). Hacking the brain: Brain-to-computer interface hardware moves from the realm of research. EDN, 55(22), 30\u201335.","journal-title":"EDN"},{"issue":"1","key":"9398_CR11","doi-asserted-by":"crossref","first-page":"E7","DOI":"10.3171\/2009.4.FOCUS0985","volume":"27","author":"T Denning","year":"2009","unstructured":"Denning, T., Matsuoka, Y., & Kohno, T. (2009). Neurosecurity: Security and privacy for neural devices. Neurosurgical Focus, 27(1), E7.","journal-title":"Neurosurgical Focus"},{"issue":"7","key":"9398_CR12","doi-asserted-by":"crossref","first-page":"6","DOI":"10.22215\/timreview\/700","volume":"3","author":"B Dupont","year":"2013","unstructured":"Dupont, B. (2013). Cybersecurity futures: How can we regulate emergent risks? Technology Innovation Management Review,\u00a03(7), 6\u201311.","journal-title":"Technology Innovation Management Review"},{"key":"9398_CR13","unstructured":"Evans, D. (2011). The internet of things: How the next evolution of the internet is changing everything. CISCO white paper, 1."},{"issue":"14","key":"9398_CR14","first-page":"14","volume":"5","author":"R Fazel-Rezai","year":"2012","unstructured":"Fazel-Rezai, R., Allison, B. Z., Guger, C., Sellers, E. W., Kleih, S. C., & K\u00fcbler, A. (2012). P300 brain computer interface: Current challenges and emerging trends. Frontiers in Neuroengineering,\u00a05(14), 14.","journal-title":"Frontiers in Neuroengineering"},{"key":"9398_CR15","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/bs.pbr.2015.01.001","volume":"218","author":"EE Fetz","year":"2015","unstructured":"Fetz, E. E. (2015). Restoring motor function with bidirectional neural interfaces. Progress in Brain Research, 218, 241\u2013252.","journal-title":"Progress in Brain Research"},{"key":"9398_CR16","unstructured":"Godfrey-Smith, P., & Sterelny, K. (2007). Biological information.\u00a0In E. N. Zalta\u00a0(Ed.), The Stanford Encyclopedia of Philosophy\u00a0(Summer 2016 Edition). http:\/\/plato.stanford.edu\/archives\/sum2016\/entries\/information-biological\/ ."},{"key":"9398_CR17","isbn-type":"print","volume-title":"Cyber crime and the victimization of women: Laws, rights, and regulations","author":"D Halder","year":"2011","unstructured":"Halder, D., & Jaishankar, K. (2011). Cyber crime and the victimization of women: Laws, rights, and regulations. Hershey, PA: IGI Global. ISBN 978-1-60960-830-9.","ISBN":"https:\/\/id.crossref.org\/isbn\/9781609608309"},{"key":"9398_CR18","doi-asserted-by":"crossref","unstructured":"Halperin, D., Heydt-Benjamin, T. S., Ransford, B., Clark, S. S., Defend, B., Morgan, W., et al. (2008). Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE symposium on security and privacy, 2008, SP 2008.","DOI":"10.1109\/SP.2008.31"},{"issue":"3","key":"9398_CR19","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s11023-012-9298-7","volume":"23","author":"P Haselager","year":"2013","unstructured":"Haselager, P. (2013). Did I do that? Brain\u2013computer interfacing and the sense of agency. Minds and Machines, 23(3), 405\u2013418.","journal-title":"Minds and Machines"},{"key":"9398_CR20","doi-asserted-by":"crossref","DOI":"10.1515\/9781626370074","volume-title":"Negotiating privacy: The European Union, the United States, and personal data protection","author":"D Heisenberg","year":"2005","unstructured":"Heisenberg, D. (2005). Negotiating privacy: The European Union, the United States, and personal data protection. Boulder, CO: Lynne Rienner Publishers."},{"issue":"5","key":"9398_CR21","doi-asserted-by":"crossref","first-page":"E25","DOI":"10.3171\/2010.2.FOCUS1027","volume":"28","author":"IS Kotchetkov","year":"2010","unstructured":"Kotchetkov, I. S., Hwang, B. Y., Appelboom, G., Kellner, C. P., & Connolly, E. S, Jr. (2010). Brain\u2013computer interfaces: Military, neurosurgical, and ethical perspective. Neurosurgical Focus, 28(5), E25.","journal-title":"Neurosurgical Focus"},{"key":"9398_CR22","unstructured":"Li, Q., Ding, D., & Conti, M. (2015). Brain\u2013computer interface applications: Security and privacy challenges. In IEEE conference on communications and network security (CNS), 2015."},{"key":"9398_CR23","unstructured":"Martinovic, I., Davies, D., Frank, M., Perito, D., Ros, T., & Song, D. (2012). On the feasibility of side-channel attacks with brain\u2013computer interfaces. In USENIX security symposium."},{"key":"9398_CR24","volume-title":"On liberty","author":"JS Mill","year":"1869","unstructured":"Mill, J. S. (1869). On liberty. London: Longmans, Green, Reader, and Dyer."},{"key":"9398_CR25","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.jneumeth.2014.07.019","volume":"244","author":"RA Miranda","year":"2015","unstructured":"Miranda, R. A., Casebeer, W. D., Hein, A. M., Judy, J. W., Krotkov, E. P., Laabs, T. L., et al. (2015). DARPA-funded efforts in the development of novel brain\u2013computer interface technologies. Journal of Neuroscience Methods, 244, 52\u201367.","journal-title":"Journal of Neuroscience Methods"},{"key":"9398_CR26","doi-asserted-by":"crossref","unstructured":"Powell, C., Munetomo, M., Schlueter, M., & Mizukoshi, M. (2013). Towards thought control of next-generation wearable computing devices. In K. Imamura, S. Usui, T. Shirao, T. Kasamatsu, L. Schwabe & N. Zhong (Eds.), Brain and Health Informatics (pp. 427\u2013438).\u00a0Springer.","DOI":"10.1007\/978-3-319-02753-1_43"},{"issue":"1","key":"9398_CR28","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s11948-008-9086-1","volume":"16","author":"SV Pustovit","year":"2010","unstructured":"Pustovit, S. V., & Williams, E. D. (2010). Philosophical aspects of dual use technologies. Science and Engineering Ethics, 16(1), 17\u201331.","journal-title":"Science and Engineering Ethics"},{"key":"9398_CR29","doi-asserted-by":"crossref","unstructured":"Rosenfeld, J. P. (2011). P300 in detecting concealed information.\u00a0In Verschuere, B., Ben-Shakhar, G., & Meijer, E. (Eds.),\u00a0Memory detection: Theory and application of the concealed information test (pp. 63\u201389).\u00a0Cambridge University Press.","DOI":"10.1017\/CBO9780511975196.005"},{"issue":"3","key":"9398_CR30","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1016\/j.ijpsycho.2005.06.002","volume":"60","author":"JP Rosenfeld","year":"2006","unstructured":"Rosenfeld, J. P., Biroschak, J. R., & Furedy, J. J. (2006). P300-based detection of concealed autobiographical versus incidentally acquired information in target and non-target paradigms. International Journal of Psychophysiology, 60(3), 251\u2013259.","journal-title":"International Journal of Psychophysiology"},{"key":"9398_CR31","first-page":"1","volume-title":"The mathematical theory of environments. The mathematical theory of communication","author":"C Shannon","year":"1949","unstructured":"Shannon, C. (1949). The mathematical theory of environments. The mathematical theory of communication (pp. 1\u201393). Urbana: University of Illinois Press."},{"issue":"5","key":"9398_CR32","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/MSPEC.2014.6808452","volume":"51","author":"E Strickland","year":"2014","unstructured":"Strickland, E. (2014). Brain hacking: Self-experimenters are zapping their heads. IEEE Spectrum, 51(5), 23\u201325. doi: 10.1109\/mspec.2014.6808452 .","journal-title":"IEEE Spectrum"},{"key":"9398_CR33","doi-asserted-by":"crossref","unstructured":"Tronnier, V. M., & Rasche, D. (2015). Deep brain stimulation. In\u00a0Textbook of Neuromodulation (pp. 61\u201372). New York: Springer.","DOI":"10.1007\/978-1-4939-1408-1_6"},{"key":"9398_CR34","doi-asserted-by":"crossref","unstructured":"Vallabhaneni, A., Wang, T., & He, B. (2005). Brain\u2013computer interface. In\u00a0Neural Engineering (pp. 85\u2013121). New York: Springer.","DOI":"10.1007\/0-306-48610-5_3"},{"issue":"4","key":"9398_CR35","doi-asserted-by":"crossref","first-page":"041001","DOI":"10.1088\/1741-2560\/6\/4\/041001","volume":"6","author":"M Gerven van","year":"2009","unstructured":"van Gerven, M., Farquhar, J., Schaefer, R., Vlek, R., Geuze, J., Nijholt, A., & Gielen, S. (2009). The brain\u2013computer interface cycle. Journal of Neural Engineering, 6(4), 041001.","journal-title":"Journal of Neural Engineering"},{"key":"9398_CR36","doi-asserted-by":"crossref","unstructured":"van Vliet, M., M\u00fchl, C., Reuderink, B., & Poel, M. (2010). Guessing what\u2019s on your mind: using the N400 in Brain Computer Interfaces. In Y. Yao, R. Sun, T. Poggio, J. Liu, N. Zhong, J. Huang (Eds.), Brain Informatics (pp. 180\u2013191). Berlin Heidelberg: Springer.","DOI":"10.1007\/978-3-642-15314-3_17"},{"issue":"3","key":"9398_CR37","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/s11019-006-9000-z","volume":"9","author":"J Varelius","year":"2006","unstructured":"Varelius, J. (2006). The value of autonomy in medical ethics. Medicine, Health Care and Philosophy, 9(3), 377\u2013388.","journal-title":"Medicine, Health Care and Philosophy"},{"issue":"8","key":"9398_CR38","doi-asserted-by":"crossref","first-page":"1425","DOI":"10.2307\/1121103","volume":"68","author":"H Wechsler","year":"1968","unstructured":"Wechsler, H. (1968). Codification of criminal law in the United States: The model penal code. Columbia Law Review,\u00a068(8), 1425\u20131456.","journal-title":"Columbia Law Review"},{"key":"9398_CR27","unstructured":"Westby, J. R. (2004). International guide to privacy. American Bar Association, Privacy & Computer Crime Committee, and American Bar Association, Section of Science & Technology Law."},{"issue":"1","key":"9398_CR39","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1504\/IJFIP.2010.032663","volume":"6","author":"BJ Yuan","year":"2010","unstructured":"Yuan, B. J., Hsieh, C.-H., & Chang, C.-C. (2010). National technology foresight research: A literature review from 1984 to 2005. International Journal of Foresight and Innovation Policy, 6(1), 5\u201335.","journal-title":"International Journal of Foresight and Innovation Policy"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9398-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-016-9398-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-016-9398-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T23:40:23Z","timestamp":1655509223000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-016-9398-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,16]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["9398"],"URL":"https:\/\/doi.org\/10.1007\/s10676-016-9398-9","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,16]]}}}