{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T22:19:39Z","timestamp":1762899579733,"version":"3.37.3"},"reference-count":115,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,6,19]],"date-time":"2018-06-19T00:00:00Z","timestamp":1529366400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10676-018-9453-9","type":"journal-article","created":{"date-parts":[[2018,6,19]],"date-time":"2018-06-19T06:58:13Z","timestamp":1529391493000},"page":"267-280","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Democratizing cognitive technology: a proactive approach"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8835-5444","authenticated-orcid":false,"given":"Marcello","family":"Ienca","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,19]]},"reference":[{"unstructured":"Beynon, M., Nehaniv, C. L., & Dautenhahn, K. (2003). Cognitive Technology. Instruments of Mind. In 4th International Conference, CT 2001 Coventry, UK, August 6\u20139, 2001 Proceedings (Vol. 2117), Springer.","key":"9453_CR1"},{"key":"9453_CR2","volume-title":"Superintelligence: Paths, dangers, strategies","author":"N Bostrom","year":"2014","unstructured":"Bostrom, N. (2014). Superintelligence: Paths, dangers, strategies. Oxford: OUP"},{"issue":"2","key":"9453_CR3","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1111\/1758-5899.12403","volume":"8","author":"N Bostrom","year":"2017","unstructured":"Bostrom, N. (2017). Strategic implications of openness in AI development. Global Policy, 8(2), 135\u2013148.","journal-title":"Global Policy"},{"issue":"3","key":"9453_CR4","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s11948-009-9142-5","volume":"15","author":"N Bostrom","year":"2009","unstructured":"Bostrom, N., & Sandberg, A. (2009). Cognitive enhancement: Methods, ethics, regulatory challenges. Science and Engineering Ethics, 15(3), 311\u2013341. https:\/\/doi.org\/10.1007\/s11948-009-9142-5 .","journal-title":"Science and Engineering Ethics"},{"issue":"3","key":"9453_CR5","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1161\/STROKEAHA.107.505313","volume":"39","author":"E Buch","year":"2008","unstructured":"Buch, E., Weber, C., Cohen, L. G., Braun, C., Dimyan, M. A., Ard, T., \u2026 Fourkas, A. (2008). Think to move: a neuromagnetic brain-computer interface (BCI) system for chronic stroke. Stroke, 39(3), 910\u2013917.","journal-title":"Stroke"},{"issue":"3","key":"9453_CR6","first-page":"122","volume":"18","author":"A Callam","year":"2015","unstructured":"Callam, A. (2015). Drone wars: Armed unmanned aerial vehicles. International Affairs Review, 18(3), 122\u2013132.","journal-title":"International Affairs Review"},{"unstructured":"Cavuoto, J. (2012). Regulatory efficacy. Neurotech Report. Retrieved on December 12, 2017 from http:\/\/www.neurotechreports.com\/pages\/publishersletterOct12.html .","key":"9453_CR7"},{"doi-asserted-by":"crossref","unstructured":"Chacko, P., & Jayasuriya, K. (2017). Trump, the authoritarian populist revolt and the future of the rules-based order in Asia. Australian Journal of International Affairs, 1\u20137.","key":"9453_CR8","DOI":"10.1080\/10357718.2016.1266463"},{"key":"9453_CR9","first-page":"173","volume-title":"Social choice and democracy. The idea of democracy","author":"T Christiano","year":"1993","unstructured":"Christiano, T. (1993). Social choice and democracy. The idea of democracy (pp.\u00a0173\u2013195). Cambridge: Cambridge University Press."},{"issue":"3","key":"9453_CR10","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1111\/j.1467-9760.2004.00200.x","volume":"12","author":"T Christiano","year":"2004","unstructured":"Christiano, T. (2004). The authority of democracy. Journal of Political Philosophy, 12(3), 266\u2013290.","journal-title":"Journal of Political Philosophy"},{"issue":"2","key":"9453_CR11","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1111\/1468-0017.00162","volume":"16","author":"A Clark","year":"2001","unstructured":"Clark, A. (2001). Reasons, robots and the extended mind. Mind & Language, 16(2), 121\u2013145.","journal-title":"Mind & Language"},{"key":"9453_CR12","volume-title":"Natural-Born Cyborgs: Minds, technologies, and the future of human intelligence","author":"A Clark","year":"2003","unstructured":"Clark, A. (2003). Natural-Born Cyborgs: Minds, technologies, and the future of human intelligence. Oxford: Oxford University Press."},{"key":"9453_CR13","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1093\/analys\/58.1.7","volume":"58","author":"A Clark","year":"1998","unstructured":"Clark, A., & Chalmers, D. (1998). The extended mind. Analysis, 58, 7\u201319.","journal-title":"Analysis"},{"key":"9453_CR14","first-page":"93","volume":"103","author":"A Collomb","year":"2016","unstructured":"Collomb, A., & Sok, K. (2016). Blockchain\/Distributed Ledger Technology (DLT): What Impact on the Financial Sector? Communications & Strategies, 103, 93.","journal-title":"Communications & Strategies"},{"issue":"3","key":"9453_CR200","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1075\/pc.13.3.03das","volume":"13","author":"M Dascal","year":"2005","unstructured":"Dascal, M., & Dror, I. E. (2005). The impact of cognitive technologies: Towards a pragmatic approach. Pragmatics & Cognition, 13(3), 451\u2013457.","journal-title":"Pragmatics & Cognition"},{"issue":"3","key":"9453_CR15","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1097\/NCN.0b013e31819f7c7c","volume":"27","author":"A Vito Dabbs De","year":"2009","unstructured":"De Vito Dabbs, A., Myers, B. A., Curry, M., Dunbar-Jacob, K. R., Hawkins, J., Begey, R. P. A., & Dew, M. A. (2009). User-centered design and interactive health technologies for patients. Computers, Informatics, Nursing: CIN, 27(3), 175. https:\/\/doi.org\/10.1097\/NCN.0b013e31819f7c7c .","journal-title":"Computers, Informatics, Nursing: CIN"},{"issue":"768","key":"9453_CR16","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1525\/curh.2015.114.768.9","volume":"114","author":"R Deibert","year":"2015","unstructured":"Deibert, R. (2015). The geopolitics of cyberspace after Snowden. Current History, 114(768), 9.","journal-title":"Current History"},{"issue":"7","key":"9453_CR17","doi-asserted-by":"crossref","first-page":"6","DOI":"10.22215\/timreview\/700","volume":"3","author":"B Dupont","year":"2013","unstructured":"Dupont, B. (2013). Cybersecurity futures: How can we regulate emergent risks? Technology Innovation Management Review, 3(7), 6.","journal-title":"Technology Innovation Management Review"},{"issue":"7","key":"9453_CR18","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/s10916-017-0752-1","volume":"41","author":"JM Ehrenfeld","year":"2017","unstructured":"Ehrenfeld, J. M. (2017). Wannacry, cybersecurity and health information technology: A time to act. Journal of Medical Systems, 41(7), 104.","journal-title":"Journal of Medical Systems"},{"unstructured":"Europol. (2016). 2016 Internet Organised Crime Threat Assessment (IOCTA) (pp.\u00a00890\u20138044). Retrieved from https:\/\/www.europol.europa.eu\/activities-services\/main-reports\/internet-organised-crime-threat-assessment-iocta-2016 .","key":"9453_CR19"},{"issue":"5","key":"9453_CR20","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1038\/nrn1390","volume":"5","author":"MJ Farah","year":"2004","unstructured":"Farah, M. J., Illes, J., Cook-Deegan, R., Gardner, H., Kandel, E., King, P., \u2026 Wolpe, P. R. (2004). Neurocognitive enhancement: what can we do and what should we do? Nature Reviews Neuroscience, 5(5), 421.","journal-title":"Nature Reviews Neuroscience"},{"key":"9453_CR21","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/978-1-4471-1774-2_2","volume-title":"A pathology of computer viruses","author":"D Ferbrache","year":"1992","unstructured":"Ferbrache, D. (1992). Historical perspectives. In A pathology of computer viruses (pp.\u00a05\u201330). London: Springer."},{"key":"9453_CR22","volume-title":"Pervasive neurotechnology","author":"A Fernandez","year":"2015","unstructured":"Fernandez, A., & Nikhil, S. (2015). Pervasive neurotechnology. San Francisco: SharpBrains."},{"issue":"7592","key":"9453_CR23","doi-asserted-by":"publisher","first-page":"S9S9","DOI":"10.1038\/531S9a","volume":"531","author":"NS Fitz","year":"2016","unstructured":"Fitz, N. S., & Reiner, P. B. (2016). Perspective: Time to expand the mind. Nature, 531(7592), S9\u2013S9. https:\/\/doi.org\/10.1038\/531S9a .","journal-title":"Nature"},{"key":"9453_CR24","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511845239","volume-title":"The Cambridge handbook of information and computer ethics","author":"L Floridi","year":"2010","unstructured":"Floridi, L. (2010). The Cambridge handbook of information and computer ethics. Cambridge: Cambridge University Press."},{"key":"9453_CR25","volume-title":"The fourth revolution: How the infosphere is reshaping human reality","author":"L Floridi","year":"2014","unstructured":"Floridi, L. (2014a). The fourth revolution: How the infosphere is reshaping human reality. Oxford: OUP."},{"key":"9453_CR26","doi-asserted-by":"crossref","first-page":"17","DOI":"10.5840\/tpm201467106","volume":"67","author":"L Floridi","year":"2014","unstructured":"Floridi, L. (2014b). The latent nature of global information warfare. The Philosophers\u2019 Magazine, 67, 17\u201319.","journal-title":"The Philosophers\u2019 Magazine"},{"issue":"1","key":"9453_CR27","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s11948-009-9159-9","volume":"16","author":"J Forge","year":"2010","unstructured":"Forge, J. (2010). A note on the definition of \u201cDual Use\u201d. Science and Engineering Ethics, 16(1), 111\u2013118. https:\/\/doi.org\/10.1007\/s11948-009-9159-9 .","journal-title":"Science and Engineering Ethics"},{"issue":"10","key":"9453_CR29","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1038\/nmeth.3969","volume":"13","author":"T-M Fu","year":"2016","unstructured":"Fu, T.-M., Hong, G., Zhou, T., Schuhmann, T. G., Viveros, R. D., & Lieber, C. M. (2016). Stable long-term chronic brain mapping at the single-neuron level. Nature Methods, 13(10), 875\u2013882. https:\/\/doi.org\/10.1038\/nmeth.3969 .","journal-title":"Nature Methods"},{"key":"9453_CR30","first-page":"947004","volume-title":"Display technologies and applications for defense, security, and avionics IX; and head-and helmet-mounted displays XX","author":"E Gans","year":"2015","unstructured":"Gans, E., Roberts, D., Bennett, M., Towles, H., Menozzi, A., Cook, J., & Sherrill, T. (2015). Augmented reality technology for day\/night situational awareness for the dismounted Soldier. In Display technologies and applications for defense, security, and avionics IX; and head-and helmet-mounted displays XX (Vol. 9470, p. 947004). Bellingham: International Society for Optics and Photonics"},{"unstructured":"Gent, E. (2017). Brain-hacking tech gets real: 5 companies leading the charge. Retrieved on August 2, 2017 from https:\/\/www.livescience.com\/59326-companies-investing-in-brain-hacking-tech.html .","key":"9453_CR31"},{"unstructured":"Gershgorn, D. (2016). The US government seriously wants to weaponize artificial intelligence. Quartz. Retrieved from https:\/\/qz.com\/767648\/weaponized-artificial-intelligence-us-military\/ .","key":"9453_CR32"},{"issue":"7553","key":"9453_CR33","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1038\/nature14541","volume":"521","author":"Z Ghahramani","year":"2015","unstructured":"Ghahramani, Z. (2015). Probabilistic machine learning and artificial intelligence. Nature, 521(7553), 452\u2013459. https:\/\/doi.org\/10.1038\/nature14541 .","journal-title":"Nature"},{"issue":"2","key":"9453_CR34","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1038\/nature14541","volume":"11","author":"F Gilbert","year":"2017","unstructured":"Gilbert, F. (2017). Deep brain stimulation: Inducing self-estrangement. Neuroethics, 11(2), 157\u2013165.","journal-title":"Neuroethics"},{"issue":"1","key":"9453_CR35","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1080\/19331680903316742","volume":"7","author":"H GilZ\u00fa\u00f1iga de","year":"2010","unstructured":"Gil de Z\u00fa\u00f1iga, H., Veenstra, A., Vraga, E., & Shah, D. (2010). Digital democracy: Reimagining pathways to political participation. Journal of Information Technology & Politics, 7(1), 36\u201351.","journal-title":"Journal of Information Technology & Politics"},{"key":"9453_CR36","doi-asserted-by":"crossref","DOI":"10.1201\/b17454","volume-title":"Neurotechnology in National Security and Defense: Practical Considerations","author":"J Giordano","year":"2014","unstructured":"Giordano, J. (2014). Neurotechnology in National Security and Defense: Practical Considerations. Neuroethical Concerns: CRC Press."},{"issue":"4","key":"9453_CR37","doi-asserted-by":"crossref","first-page":"882","DOI":"10.1016\/j.cell.2016.10.029","volume":"167","author":"S Goering","year":"2016","unstructured":"Goering, S., & Yuste, R. (2016). On the necessity of ethical guidelines for novel neurotechnologies. Cell, 167(4), 882\u2013885.","journal-title":"Cell"},{"key":"9453_CR38","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/978-3-642-33932-5_37","volume":"12","author":"D G\u00f6hring","year":"2013","unstructured":"G\u00f6hring, D., Latotzky, D., Wang, M., & Rojas, R. (2013). Semi-autonomous car control using brain computer interfaces. Intelligent autonomous Systems, 12, 393\u2013408.","journal-title":"Intelligent autonomous Systems"},{"key":"9453_CR39","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/978-1-4471-3249-3_18","volume-title":"Information society: New Media, ethics and postmodernism","author":"B Gorayska","year":"1996","unstructured":"Gorayska, B., & Mey, J. L. (1996). Cognitive technology. In K. S. Gill (Ed.), Information society: New Media, ethics and postmodernism (pp.\u00a0287\u2013294). London: Springer."},{"issue":"3","key":"9453_CR40","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1016\/j.neubiorev.2010.07.006","volume":"35","author":"JM Halperin","year":"2011","unstructured":"Halperin, J. M., & Healey, D. M. (2011). The influences of environmental enrichment, cognitive enhancement, and physical exercise on brain development: Can we alter the developmental trajectory of ADHD? Neuroscience and Biobehavioral Reviews, 35(3), 621\u2013634. https:\/\/doi.org\/10.1016\/j.neubiorev.2010.07.006 .","journal-title":"Neuroscience and Biobehavioral Reviews"},{"unstructured":"Helbing, D., Frey, B. S., Gigerenzer, G., Hafen, E., Hagner, M., Hofstetter, Y., \u2026 Zwitter, A. (2017). Will democracy survive big data and artificial intelligence. Scientific American. p.\u00a025.","key":"9453_CR41"},{"issue":"7576","key":"9453_CR42","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1038\/527033a","volume":"527","author":"D Helbing","year":"2015","unstructured":"Helbing, D., & Pournaras, E. (2015). Build digital democracy: Open sharing of data that are collected with smart devices would empower citizens and create jobs. Nature, 527(7576), 33\u201335.","journal-title":"Nature"},{"key":"9453_CR43","doi-asserted-by":"crossref","DOI":"10.1515\/9781400844975","volume-title":"Alan Turing: the enigma","author":"A Hodges","year":"2012","unstructured":"Hodges, A. (2012). Alan Turing: the enigma. New York: Random House."},{"issue":"7287","key":"9453_CR44","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1038\/464340a","volume":"464","author":"V Hughes","year":"2010","unstructured":"Hughes, V. (2010). Head case. Nature, 464(7287), 340.","journal-title":"Nature"},{"unstructured":"IBM-THINK. (2017). Transparency and trust in the cognitive era. Retrieved on August, 2017 from https:\/\/www.ibm.com\/blogs\/think\/2017\/01\/ibm-cognitive-principles\/ .","key":"9453_CR45"},{"unstructured":"Ienca, M. (2016). Meet tomorrow\u2019s world: A meeting on the ethics of emerging technologies. Retrieved on March 26, 2017 from http:\/\/www.theneuroethicsblog.com\/2016\/12\/meet-tomorrows-worlda-meeting-on-ethics.html .","key":"9453_CR46"},{"unstructured":"Ienca, M. (2018). Cognitive technology and human-machine interaction: The contribution of externalism to the theoretical foundations of machine and cyborg ethics. Annals of the University of Bucharest-Philosophy Series","key":"#cr-split#-9453_CR47.1"},{"unstructured":"Vol\u00a066 No 2 (2017): Annals of the University of Bucharest: Philosophy Series.","key":"#cr-split#-9453_CR47.2"},{"issue":"4","key":"9453_CR48","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.3233\/jad-161037","volume":"56","author":"M Ienca","year":"2017","unstructured":"Ienca, M., Fabrice, J., Elger, B., Caon, M., Pappagallo, A. S., Kressig, R. W., & Wangmo, T. (2017). Intelligent assistive technology for Alzheimer\u2019s disease and other dementias: A systematic review. Journal of Alzheimer\u2019s Disease, 56(4), 1301\u20131340. https:\/\/doi.org\/10.3233\/jad-161037 .","journal-title":"Journal of Alzheimer\u2019s Disease"},{"issue":"117","key":"9453_CR49","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s10676-016-9398-9","volume":"18","author":"M Ienca","year":"2016","unstructured":"Ienca, M., & Haselager, P. (2016). Hacking the brain: Brain\u2013computer interfacing technology and the ethics of neurosecurity. Ethics and Information Technology, 18(117), 117\u2013129.","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9453_CR50","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.neuron.2017.12.017","volume":"97","author":"M Ienca","year":"2018","unstructured":"Ienca, M., Jotterand, F., & Elger, B. S. (2018). From healthcare to warfare and reverse: How should we regulate dual-use neurotechnology? Neuron, 97(2), 269\u2013274. https:\/\/doi.org\/10.1016\/j.neuron.2017.12.017 .","journal-title":"Neuron"},{"key":"9453_CR51","doi-asserted-by":"publisher","DOI":"10.1007\/s12369-016-0366-7","author":"M Ienca","year":"2016","unstructured":"Ienca, M., Jotterand, F., Vic\u0103, C., & Elger, B. (2016). Social and assistive robotics in dementia care: Ethical recommendations for research and practice. International Journal of Social Robotics. https:\/\/doi.org\/10.1007\/s12369-016-0366-7 .","journal-title":"International Journal of Social Robotics"},{"issue":"5","key":"9453_CR52","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1016\/j.clinph.2010.08.021","volume":"122","author":"S Ikegami","year":"2011","unstructured":"Ikegami, S., Takano, K., Saeki, N., & Kansaku, K. (2011). Operation of a P300-based brain\u2013computer interface by individuals with cervical spinal cord injury. Clinical Neurophysiology, 122(5), 991\u2013996.","journal-title":"Clinical Neurophysiology"},{"issue":"9","key":"9453_CR53","doi-asserted-by":"crossref","first-page":"511","DOI":"10.1016\/j.tins.2006.07.002","volume":"29","author":"J Illes","year":"2006","unstructured":"Illes, J., & Bird, S. J. (2006). Neuroethics: A modern context for ethics in neuroscience. Trends in neurosciences, 29(9), 511\u2013517.","journal-title":"Trends in neurosciences"},{"doi-asserted-by":"publisher","unstructured":"Inglehart, R., & Norris, P. (2016). Trump, Brexit, and the rise of Populism: Economic have-nots and cultural backlash.\u00a0KS Working Paper No. RWP16-026. Available at SSRN:\u00a0 https:\/\/ssrn.com\/abstract=2818659 or https:\/\/doi.org\/10.2139\/ssrn.2818659 . Retrieved on April 12, 2017 from http:\/\/wotantue.us\/Trump-Brexit-Populism.pdf .","key":"9453_CR54","DOI":"10.2139\/ssrn.2818659"},{"issue":"3\u20134","key":"9453_CR55","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1080\/09602011.2013.825632","volume":"24","author":"M Jamieson","year":"2014","unstructured":"Jamieson, M., Cullen, B., McGee-Lennon, M., Brewster, S., & Evans, J. J. (2014). The efficacy of cognitive prosthetic technology for people with memory impairments: A systematic review and meta-analysis. Neuropsychological Rehabilitation, 24(3\u20134), 419\u2013444.","journal-title":"Neuropsychological Rehabilitation"},{"key":"9453_CR56","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1007\/978-3-319-54651-3_17","volume-title":"Debates about neuroethics: perspectives on its development, focus, and future","author":"F Jotterand","year":"2017","unstructured":"Jotterand, F., & Ienca, M. (2017). The Biopolitics of neuroethics. In E. Racine & J. Aspler (Eds.), Debates about neuroethics: perspectives on its development, focus, and future (pp.\u00a0247\u2013261). Cham: Springer."},{"key":"9453_CR57","doi-asserted-by":"publisher","DOI":"10.3389\/fnins.2012.00072","author":"T Kaufmann","year":"2012","unstructured":"Kaufmann, T., V\u00f6lker, S., Gunesch, L., & K\u00fcbler, A. (2012). Spelling is just a click away \u2013 a user-centered brain-computer interface including auto-calibration and predictive text entry. Frontiers in Neuroscience. https:\/\/doi.org\/10.3389\/fnins.2012.00072 .","journal-title":"Frontiers in Neuroscience"},{"unstructured":"Kiger, P. J. (2017). 5 Ways society will be affected by cognitive technology. Retrieved on December 12, 2017 from http:\/\/electronics.howstuffworks.com\/future-tech\/5-ways-society-will-be-affected-by-cognitive-technology.htm .","key":"9453_CR58"},{"unstructured":"Kirkpatrick, D. (2007). Cognitive technology threat warning systems (CT2WS). Retrieved on August 2, 2017 from https:\/\/web.archive.org\/web\/20080204203721\/http:\/\/www.darpa.mil\/baa\/BAA07-25.html .","key":"9453_CR59"},{"issue":"10","key":"9453_CR60","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/2983270","volume":"59","author":"K Kirkpatrick","year":"2016","unstructured":"Kirkpatrick, K. (2016). Battling algorithmic bias: How do we ensure algorithms treat us fairly? Communications of the ACM, 59(10), 16\u201317.","journal-title":"Communications of the ACM"},{"issue":"6","key":"9453_CR61","doi-asserted-by":"publisher","first-page":"1789","DOI":"10.1109\/TIFS.2012.2214212","volume":"7","author":"BF Klare","year":"2012","unstructured":"Klare, B. F., Burge, M. J., Klontz, J. C., Bruegge, R. W. V., & Jain, A. K. (2012). Face recognition performance: Role of demographic information. IEEE Transactions on Information Forensics and Security, 7(6), 1789\u20131801. https:\/\/doi.org\/10.1109\/TIFS.2012.2214212 .","journal-title":"IEEE Transactions on Information Forensics and Security"},{"doi-asserted-by":"crossref","unstructured":"Kosmyna, N., Tarpin-Bernard, F., & Rivet, B. (2015). Towards brain computer interfaces for recreational activities: Piloting a drone. Paper presented at the Human-Computer Interaction.","key":"9453_CR62","DOI":"10.1007\/978-3-319-22701-6_37"},{"issue":"12","key":"9453_CR63","doi-asserted-by":"publisher","first-page":"e112392","DOI":"10.1371\/journal.pone.0112392","volume":"9","author":"A K\u00fcbler","year":"2014","unstructured":"K\u00fcbler, A., Holz, E. M., Riccio, A., Zickler, C., Kaufmann, T., Kleih, S. C., \u2026 Mattia, D. (2014). The user-centered design as novel perspective for evaluating the usability of BCI-controlled applications. PLoS ONE, 9(12), e112392. https:\/\/doi.org\/10.1371\/journal.pone.0112392 .","journal-title":"PLoS ONE"},{"issue":"10","key":"9453_CR64","doi-asserted-by":"crossref","first-page":"1775","DOI":"10.1212\/01.WNL.0000158616.43002.6D","volume":"64","author":"A K\u00fcbler","year":"2005","unstructured":"K\u00fcbler, A., Nijboer, F., Mellinger, J., Vaughan, T. M., Pawelzik, H., Schalk, G., \u2026 Wolpaw, J. R. (2005). Patients with ALS can use sensorimotor rhythms to operate a brain-computer interface. Neurology, 64(10), 1775\u20131777.","journal-title":"Neurology"},{"issue":"1","key":"9453_CR65","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1080\/23269995.2017.1415082","volume":"8","author":"M Lacy","year":"2018","unstructured":"Lacy, M., & Prince, D. (2018). Securitization and the global politics of cybersecurity. Global Discourse, 8(1), 100\u2013115.","journal-title":"Global Discourse"},{"key":"9453_CR66","first-page":"40","volume":"29","author":"F Langfitt","year":"2013","unstructured":"Langfitt, F. (2013). China beware: A camera may be watching you. NPR, 29, 40.","journal-title":"NPR"},{"issue":"10","key":"9453_CR67","doi-asserted-by":"crossref","first-page":"1372","DOI":"10.4088\/JCP.15m09785","volume":"77","author":"DD Langleben","year":"2016","unstructured":"Langleben, D. D., Hakun, J. G., Seelig, D., Wang, A.-L., Ruparel, K., Bilker, W. B., & Gur, R. C. (2016). Polygraphy and functional magnetic resonance imaging in lie detection: A controlled blind comparison using the concealed information test. The Journal of Clinical Psychiatry, 77(10), 1372\u20131380.","journal-title":"The Journal of Clinical Psychiatry"},{"issue":"4","key":"9453_CR68","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1002\/hbm.20191","volume":"26","author":"DD Langleben","year":"2005","unstructured":"Langleben, D. D., Loughead, J. W., Bilker, W. B., Ruparel, K., Childress, A. R., Busch, S.\u00a0I., & Gur, R. C. (2005). Telling truth from lie in individual subjects with fast event-related fMRI. Human Brain Mapping, 26(4), 262\u2013272. https:\/\/doi.org\/10.1002\/hbm.20191 .","journal-title":"Human Brain Mapping"},{"issue":"11","key":"9453_CR69","doi-asserted-by":"crossref","first-page":"e79419","DOI":"10.1371\/journal.pone.0079419","volume":"8","author":"T-S Lee","year":"2013","unstructured":"Lee, T.-S., Goh, S. J. A., Quek, S. Y., Phillips, R., Guan, C., Cheung, Y. B., ... Chin, Z. Y. (2013). A brain-computer interface based cognitive training system for healthy elderly: A randomized control pilot study for usability and preliminary efficacy. PLoS ONE, 8(11), e79419.","journal-title":"PLoS ONE"},{"issue":"Suppl 3","key":"9453_CR70","doi-asserted-by":"publisher","first-page":"211","DOI":"10.3233\/jad-2012-112129","volume":"31","author":"G Liberati","year":"2012","unstructured":"Liberati, G., Dalboni da Rocha, J. L., van der Heiden, L., Raffone, A., Birbaumer, N., Belardinelli, O. M., & Sitaram, R. (2012). Toward a brain-computer interface for Alzheimer\u2019s disease patients by combining classical conditioning and brain state classification. Journal of Alzheimer\u2019s Disease, 31(Suppl 3), 211\u2013220. https:\/\/doi.org\/10.3233\/jad-2012-112129 .","journal-title":"Journal of Alzheimer\u2019s Disease"},{"unstructured":"Limited, C. T. C. (2014). China telecom 2014 annual work conference highlights [Press release]. Retrieved on August 2, 2017 from http:\/\/www.irasia.com\/listco\/hk\/chinatelecom\/press\/p140103.htm .","key":"9453_CR71"},{"issue":"7","key":"9453_CR72","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1038\/nnano.2015.115","volume":"10","author":"J Liu","year":"2015","unstructured":"Liu, J., Fu, T.-M., Cheng, Z., Hong, G., Zhou, T., Jin, L., \u2026 Lieber, C. M. (2015). Syringe-injectable electronics. Nature Nanoelectronics, 10(7), 629\u2013636. https:\/\/doi.org\/10.1038\/nnano.2015.115 .","journal-title":"Nature Nanoelectronics"},{"issue":"2","key":"9453_CR73","doi-asserted-by":"crossref","first-page":"205395171454186","DOI":"10.1177\/2053951714541861","volume":"1","author":"D Lyon","year":"2014","unstructured":"Lyon, D. (2014). Surveillance, Snowden, and big data: Capacities, consequences, critique. Big Data & Society, 1(2), 2053951714541861.","journal-title":"Big Data & Society"},{"key":"9453_CR74","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-319-60210-3_2","volume-title":"Digital HR: A critical management approach to the digitilization of organizations","author":"A Manuti","year":"2018","unstructured":"Manuti, A., & de Palma, P. D. (2018). The cognitive technology revolution: A new identity for workers. In A. Manuti & P. D. de Palma (Eds.), Digital HR: A critical management approach to the digitilization of organizations (pp.\u00a021\u201337). Cham: Springer."},{"key":"9453_CR75","doi-asserted-by":"crossref","first-page":"663","DOI":"10.1007\/978-3-319-41685-4_58","volume-title":"Advances in ergonomics modeling, usability & special populations: Proceedings of the AHFE 2016 international conference on ergonomics modeling, usability & special populations, July 27\u201331, 2016, Walt Disney World\u00ae, Florida, USA","author":"C-C Mao","year":"2017","unstructured":"Mao, C.-C., Chen, C.-H., & Sun, C.-C. (2017). Impact of an augmented reality system on learning for army military decision-making process (MDMP) course. In M. Soares, C. Falc\u00e3o, & T. Z. Ahram (Eds.), Advances in ergonomics modeling, usability & special populations: Proceedings of the AHFE 2016 international conference on ergonomics modeling, usability & special populations, July 27\u201331, 2016, Walt Disney World\u00ae, Florida, USA (pp.\u00a0663\u2013671). Cham: Springer."},{"unstructured":"Martinovic, I., Davies, D., Frank, M., Perito, D., Ros, T., & Song, D. (2012). On the feasibility of side-channel attacks with brain-computer interfaces. Paper presented at the USENIX Security Symposium.","key":"9453_CR76"},{"unstructured":"Mascarenhas, H. (2016). Elon Musk\u2019s $1bn non-profit launches \u2018gym\u2019 to train AI with Atari games. International Business Times.","key":"9453_CR77"},{"issue":"2","key":"9453_CR78","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1080\/10803920590935376","volume":"27","author":"J Matusitz","year":"2005","unstructured":"Matusitz, J. (2005). Cyberterrorism: How can American foreign policy be strengthened in the Information Age? American Foreign Policy Interests, 27(2), 137\u2013147.","journal-title":"American Foreign Policy Interests"},{"issue":"11","key":"9453_CR79","doi-asserted-by":"crossref","first-page":"2124","DOI":"10.1016\/j.clinph.2015.01.013","volume":"126","author":"LM McCane","year":"2015","unstructured":"McCane, L. M., Heckman, S. M., McFarland, D. J., Townsend, G., Mak, J. N., Sellers, E. W., \u2026 Vaughan, T. M. (2015). P300-based brain-computer interface (BCI) event-related potentials (ERPs): People with amyotrophic lateral sclerosis (ALS) vs. age-matched controls. Clinical Neurophysiology, 126(11), 2124\u20132131.","journal-title":"Clinical Neurophysiology"},{"key":"9453_CR80","first-page":"161","volume":"4","author":"JdR Mill\u00e1n","year":"2010","unstructured":"Mill\u00e1n, J. d. R., Rupp, R., Mueller-Putz, G., Murray-Smith, R., Giugliemma, C., Tangermann, M., \u2026 Leeb, R. (2010). Combining brain\u2013computer interfaces and assistive technologies: state-of-the-art and challenges. Frontiers in Neuroscience, 4, 161.","journal-title":"Frontiers in Neuroscience"},{"key":"9453_CR81","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1016\/j.jneumeth.2014.07.019","volume":"244","author":"RA Miranda","year":"2015","unstructured":"Miranda, R. A., Casebeer, W. D., Hein, A. M., Judy, J. W., Krotkov, E. P., Laabs, T. L., \u2026 Sanchez, J. C. (2015). DARPA-funded efforts in the development of novel brain\u2013computer interface technologies. Journal of Neuroscience Methods, 244, 52\u201367.","journal-title":"Journal of Neuroscience Methods"},{"key":"9453_CR82","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-1-4939-1028-1_8","volume-title":"Cyber-Democracy and Cybercrime: Two Sides of the Same Coin. Cyber-Development, Cyber-Democracy and Cyber-Defense","author":"B Mitterlehner","year":"2014","unstructured":"Mitterlehner, B. (2014). Cyber-Democracy and Cybercrime: Two Sides of the Same Coin. Cyber-Development, Cyber-Democracy and Cyber-Defense (pp.\u00a0207\u2013230). New York: Springer."},{"issue":"3","key":"9453_CR83","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/s10676-006-0008-0","volume":"7","author":"JH Moor","year":"2005","unstructured":"Moor, J. H. (2005). Why we need better ethics for emerging technologies. Ethics and Information Technology, 7(3), 111\u2013119.","journal-title":"Ethics and Information Technology"},{"key":"9453_CR84","doi-asserted-by":"crossref","DOI":"10.21236\/AD1018886","volume-title":"The brain computer interface future: time for a strategy","author":"BE Moore","year":"2013","unstructured":"Moore, B. E. (2013). The brain computer interface future: time for a strategy. Alabama: Air University."},{"issue":"1","key":"9453_CR85","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1016\/j.jneumeth.2007.09.022","volume":"167","author":"K-R M\u00fcller","year":"2008","unstructured":"M\u00fcller, K.-R., Tangermann, M., Dornhege, G., Krauledat, M., Curio, G., & Blankertz, B. (2008). Machine learning for real-time single-trial EEG-analysis: From brain\u2013computer interfacing to mental state monitoring. Journal of Neuroscience Methods, 167(1), 82\u201390.","journal-title":"Journal of Neuroscience Methods"},{"key":"9453_CR86","volume-title":"The safety promise and challenge of automotive electronics insights from unintended acceleration","author":"National Academies of Sciences, E., and Medicine","year":"2012","unstructured":"National Academies of Sciences, E., and Medicine. (2012). The safety promise and challenge of automotive electronics insights from unintended acceleration. Washington, DC: The National Academies Press."},{"issue":"2","key":"9453_CR87","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s10676-005-4582-3","volume":"7","author":"H Nissenbaum","year":"2005","unstructured":"Nissenbaum, H. (2005). Where computer security meets national security. Ethics and Information Technology, 7(2), 61\u201373.","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9453_CR88","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.giq.2017.09.007","volume":"34","author":"S \u00d8lnes","year":"2017","unstructured":"\u00d8lnes, S., Ubacht, J., & Janssen, M. (2017). Blockchain in government: Benefits and implications of distributed ledger technology for information sharing. Government Information Quarterly, 34(3), 355\u2013364. https:\/\/doi.org\/10.1016\/j.giq.2017.09.007 .","journal-title":"Government Information Quarterly"},{"unstructured":"Open, A. I. (2016). Retrieved from https:\/\/openai.com\/about\/ .","key":"9453_CR89"},{"unstructured":"Paganini, P. (2014). New powers for the Russian surveillance system SORM-2. Security Affairs. Retrieved on August 2, 2017 from http:\/\/securityaffairs.co\/wordpress\/27611\/digital-id\/new-powers-sorm-2.html .","key":"9453_CR90"},{"unstructured":"Posner, R. A. (2009). Antitrust law: University of Chicago Press.","key":"9453_CR91"},{"doi-asserted-by":"crossref","unstructured":"Powell, C., Munetomo, M., Schlueter, M., & Mizukoshi, M. (2013). Towards thought control of next-generation wearable computing devices. Paper presented at the International Conference on Brain and Health Informatics.","key":"9453_CR92","DOI":"10.1007\/978-3-319-02753-1_43"},{"key":"9453_CR93","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1016\/j.wneu.2016.05.010","volume":"92","author":"L Pycroft","year":"2016","unstructured":"Pycroft, L., Boccard, S. G., Owen, S. L. F., Stein, J. F., Fitzgerald, J. J., Green, A. L., & Aziz, T. Z. (2016). Brainjacking: Implant Security Issues in Invasive Neuromodulation. World Neurosurgery, 92, 454\u2013462. https:\/\/doi.org\/10.1016\/j.wneu.2016.05.010 .","journal-title":"World Neurosurgery"},{"issue":"4","key":"9453_CR94","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1609\/aimag.v36i4.2577","volume":"36","author":"S Russell","year":"2015","unstructured":"Russell, S., Dewey, D., & Tegmark, M. (2015). Research priorities for robust and beneficial artificial intelligence. AI Magazine, 36(4), 105\u2013114.","journal-title":"AI Magazine"},{"issue":"4","key":"9453_CR95","first-page":"9","volume":"4","author":"P Sapaty","year":"2015","unstructured":"Sapaty, P. (2015). Military robotics: Latest trends and spatial grasp solutions. International Journal of Advanced Research in Artificial Intelligence, 4(4), 9\u201318.","journal-title":"International Journal of Advanced Research in Artificial Intelligence"},{"doi-asserted-by":"crossref","unstructured":"Sarewitz, D., & Karas, T. H. (2007). Policy implications of technologies for cognitive enhancement. SAND2006-7909. Sandia National Laboratories Albuquerque, New Mexico 87185.\u00a0Retrieved from http:\/\/prod.sandia.gov\/techlib\/access-control.cgi\/2006\/067909.pdf .","key":"9453_CR96","DOI":"10.2172\/901973"},{"key":"9453_CR97","first-page":"115","volume":"16","author":"D Schatsky","year":"2015","unstructured":"Schatsky, D., Muraskin, C., & Gurumurthy, R. (2015). Cognitive technologies: The real opportunities for business. Deloitte Review, 16, 115\u2013129.","journal-title":"Deloitte Review"},{"issue":"9","key":"9453_CR98","doi-asserted-by":"crossref","first-page":"720","DOI":"10.2471\/BLT.08.051383","volume":"87","author":"MJ Selgelid","year":"2009","unstructured":"Selgelid, M. J. (2009). Governance of dual-use research: an ethical dilemma. Bulletin of the World Health Organization, 87(9), 720\u2013723.","journal-title":"Bulletin of the World Health Organization"},{"issue":"1","key":"9453_CR99","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1196\/annals.1305.014","volume":"1013","author":"W Sententia","year":"2004","unstructured":"Sententia, W. (2004). Neuroethical considerations: cognitive liberty and converging technologies for improving human cognition. Annals of the New York Academy of Sciences, 1013(1), 221\u2013228.","journal-title":"Annals of the New York Academy of Sciences"},{"unstructured":"Statt, N. (2017). Elon Musk launches Neuralink, a venture to merge the human brain with AI. The Verge. Retrieved on August 2, 2017 from http:\/\/www.theverge.com\/2017\/3\/27\/15077864\/elon-musk-neuralink-brain-computer-interface-ai-cyborgs .","key":"9453_CR100"},{"doi-asserted-by":"crossref","unstructured":"Stewart, I. I. I. C. (2017). Electoral Vulnerabilities in the United States: Past, Present, and Future. MIT Political Science Department Research Paper(5).","key":"9453_CR101","DOI":"10.2139\/ssrn.2908509"},{"issue":"4","key":"9453_CR102","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1037\/0022-0663.81.4.457","volume":"81","author":"J Sweller","year":"1989","unstructured":"Sweller, J. (1989). Cognitive technology: Some procedures for facilitating learning and problem solving in mathematics and science. Journal of Educational Psychology, 81(4), 457.","journal-title":"Journal of Educational Psychology"},{"unstructured":"Taddeo, M. (2017). Cyberwar: How to regulate nation state warfare on the internet. Retrieved on February 12, 2018 from http:\/\/www.scienceviewsthenews.com\/cyberwar-how-to-regulate-nation-state-warfare-on-the-internet\/ .","key":"9453_CR103"},{"issue":"7701","key":"9453_CR104","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1038\/d41586-018-04602-6","volume":"556","author":"M Taddeo","year":"2018","unstructured":"Taddeo, M., & Floridi, L. (2018). Regulate artificial intelligence to avert cyber arms race. Nature, 556(7701), 296\u2013298. https:\/\/doi.org\/10.1038\/d41586-018-04602-6 .","journal-title":"Nature"},{"issue":"3","key":"9453_CR105","doi-asserted-by":"publisher","first-page":"e1001289","DOI":"10.1371\/journal.pbio.1001289","volume":"10","author":"MN Tennison","year":"2012","unstructured":"Tennison, M. N., & Moreno, J. D. (2012). Neuroscience, ethics, and national security: The state of the art. PLoS Biology, 10(3), e1001289. https:\/\/doi.org\/10.1371\/journal.pbio.1001289 .","journal-title":"PLoS Biology"},{"doi-asserted-by":"crossref","unstructured":"Tonin, L., Carlson, T., Leeb, R., & Mill\u00e1n, J. d. R. (2011). Brain-controlled telepresence robot by motor-disabled people. Paper presented at the Engineering in Medicine and Biology Society, EMBC, 2011 Annual International Conference of the IEEE.","key":"9453_CR106","DOI":"10.1109\/IEMBS.2011.6091049"},{"doi-asserted-by":"crossref","unstructured":"Tonin, L., Leeb, R., Tavella, M., Perdikis, S., & Mill\u00e1n, J. d. R. (2010). The role of shared-control in BCI-based telepresence. Paper presented at the Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on.","key":"9453_CR107","DOI":"10.1109\/ICSMC.2010.5642338"},{"unstructured":"Vincent, J. (2018). Badly implemented AI could \u2018jeopardize democracy\u2019. The Verge.","key":"9453_CR108"},{"key":"9453_CR109","volume-title":"Cognitive technology: Essays on the transformation of thought and society","author":"WR Walker","year":"2004","unstructured":"Walker, W. R., & Herrmann, D. J. (2004). Cognitive technology: Essays on the transformation of thought and society. Jefferson, NC: McFarland."},{"unstructured":"WEF (2016).\u00a0The global risks report 2016 (11th ed.). World Economic Forum. Retrieved from https:\/\/www.weforum.org\/reports\/the-global-risks-report-2016 .","key":"9453_CR28"},{"issue":"12","key":"9453_CR110","first-page":"70","volume":"38","author":"A White","year":"2014","unstructured":"White, A. (2014). Future special operations protection systems (tactical assault light operator suit). Military Technology, 38(12), 70\u201373.","journal-title":"Military Technology"},{"issue":"303","key":"9453_CR111","first-page":"184","volume":"1","author":"E Yudkowsky","year":"2008","unstructured":"Yudkowsky, E. (2008). Artificial intelligence as a positive and negative factor in global risk. Global Catastrophic Risks, 1(303), 184.","journal-title":"Global Catastrophic Risks"},{"issue":"7679","key":"9453_CR112","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1038\/551159a","volume":"551","author":"R Yuste","year":"2017","unstructured":"Yuste, R., Goering, S., Bi, G., Carmena, J. M., Carter, A., Fins, J. J., \u2026 Illes, J. (2017). Four ethical priorities for neurotechnologies and AI. Nature News, 551(7679), 159.","journal-title":"Nature News"},{"issue":"2","key":"9453_CR113","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.artmed.2013.08.003","volume":"59","author":"C Zickler","year":"2013","unstructured":"Zickler, C., Halder, S., Kleih, S. C., Herbert, C., & K\u00fcbler, A. (2013). Brain painting: Usability testing according to the user-centered design in end users with severe motor paralysis. Artificial Intelligence in Medicine, 59(2), 99\u2013110. https:\/\/doi.org\/10.1016\/j.artmed.2013.08.003 .","journal-title":"Artificial Intelligence in Medicine"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9453-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-018-9453-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-018-9453-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T07:16:17Z","timestamp":1693725377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-018-9453-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,19]]},"references-count":115,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["9453"],"URL":"https:\/\/doi.org\/10.1007\/s10676-018-9453-9","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2018,6,19]]},"assertion":[{"value":"19 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The author declares no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}]}}