{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:17:44Z","timestamp":1757618264526,"version":"3.44.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T00:00:00Z","timestamp":1749513600000},"content-version":"vor","delay-in-days":9,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In this study, we explore the complexities and implications of connecting quantum computers. This connection is in the literature seen as an obvious and fast way forward to arrive at a large quantum computer that can deliver the promises of quantum computing. We explore this option by understanding the conditions and contexts under which different scenarios of connecting these computers are most beneficial for quantum computer owners, be it for practical gains or moral considerations. \u201cIntroduction\u201d and \u201cQuantum Computing\u201d Sections introduce quantum computing, laying out the broader framework of our study. Then \u201cConnecting Quantum Computers\u201d Section delineates three scenarios for connecting quantum computers: no connection, a connection that is \u201cblind\u201d for the uses of the linked systems, and a \u201cgoverned connection\u201d in which these uses are subjected to rules. These scenarios are evaluated against five criteria: the ability of computer owners to leverage quantum strengths (quantum advantage), the benefits of cooperative efforts for owners (collaboration gain), ensuring equitable benefits between owners (equality), maintaining clarity and openness about the connection to the owners (transparency), and preserving the independence and self-direction of the computer owners (autonomy). The evaluation does not single out a scenario as the clear winner. Rather, it reveals two significant moral trade-offs, showing that no one scenario is best for all situations. As a result, the choice of which trade-offs to accept and which scenario to choose depends greatly on the context. To highlight this, \u201cEthical Analysis of Scenarios\u201d Section offers a detailed example for each of the three scenarios, explaining the reasons for choosing a particular option for each trade-off given the specific situation.<\/jats:p>","DOI":"10.1007\/s10676-025-09840-7","type":"journal-article","created":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T10:25:15Z","timestamp":1749551115000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The rationality and morality of connecting quantum computers"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7110-6107","authenticated-orcid":false,"given":"Luca M.","family":"Possati","sequence":"first","affiliation":[]},{"given":"Pieter","family":"Vermaas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,10]]},"reference":[{"key":"9840_CR1","doi-asserted-by":"crossref","unstructured":"Aaronson, S., & Hung, S. H. 2023. \u201cCertified randomness from quantum supremacy\u201d arXiv preprint arXiv:2303.01625.","DOI":"10.1145\/3564246.3585145"},{"key":"9840_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.inffus.2022.08.003","volume":"89","author":"G Acampora","year":"2023","unstructured":"Acampora, G., Di Martino, F., Massa, A., Schiattarella, R., & Vitiello, A. (2023). D-NISQ: A reference model for distributed noisy intermediate-scale quantum computers. Information Fusion, 89, 16\u201328.","journal-title":"Information Fusion"},{"issue":"2","key":"9840_CR3","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1136\/amiajnl-2013-002079","volume":"21","author":"IT Agaku","year":"2014","unstructured":"Agaku, I. T., Adisa, A. O., Ayo, C. K., & Connolly, G. N. (2014). Concern about security and privacy, and perceived control over collection and use of health information are related to withholding of health information from healthcare providers. Journal of the American Medical Informatics Association, 21(2), 374\u2013378.","journal-title":"Journal of the American Medical Informatics Association"},{"key":"9840_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2025.100747","volume":"57","author":"D Barral","year":"2025","unstructured":"Barral, D., Cardama, F. J., D\u00edaz-Camacho, G., Fa\u00edlde, D., Llovo, I. F., Mussa-Juane, M., V\u00e1zquez-P\u00e9rez, J., Villasuso, J., Pi\u00f1eiro, C., Costas, N., Pichel, J. C., Pena, T. F., & G\u00f3mez, A. (2025). Review of distributed quantum computing: From single QPU to high performance quantum computing. Computer Science Review, 57, Article 100747.","journal-title":"Computer Science Review"},{"key":"9840_CR5","doi-asserted-by":"crossref","unstructured":"Broadbent, A., Fitzsimons, J., & Kashefi, E. 2009. \"Universal Blind Quantum Computation.\" 50th annual IEEE symposium on foundations of computer science (517\u2013526).","DOI":"10.1109\/FOCS.2009.36"},{"key":"9840_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110672","volume":"254","author":"M Caleffi","year":"2022","unstructured":"Caleffi, M., Amoretti, M., Ferrari, D., Illiano, J., Manzalini, A., & Cacciapuoti, A. S. (2022). Distributed quantum computing: A survey. Computer Networks, 254, Article 110672.","journal-title":"Computer Networks"},{"key":"9840_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110672","volume":"254","author":"M Caleffi","year":"2024","unstructured":"Caleffi, M., Amoretti, M., Ferrari, D., Illiano, J., Manzalini, A., & Cacciapuoti, A. S. (2024). Distributed quantum computing: A survey. Computer Networks, 254, Article 110672.","journal-title":"Computer Networks"},{"issue":"1","key":"9840_CR8","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1186\/s40580-024-00418-5","volume":"11","author":"E Chae","year":"2024","unstructured":"Chae, E., Choi, J., & Kim, J. (2024). An elementary review on basic principles and developments of qubits for quantum computing. Nano Convergence, 11(1), 11\u201321.","journal-title":"Nano Convergence"},{"issue":"2","key":"9840_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3579367","volume":"4","author":"D Cuomo","year":"2023","unstructured":"Cuomo, D., Caleffi, M., Krsulich, K., Tramonto, F., Agliardi, G., Prati, E., & Cacciapuoti, A. S. (2023). Optimized compiler for distributed quantum computing. ACM Transactions on Quantum Computing, 4(2), 1\u201329.","journal-title":"ACM Transactions on Quantum Computing"},{"issue":"5234","key":"9840_CR10","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1126\/science.270.5234.255","volume":"270","author":"DP Di Vincenzo","year":"1995","unstructured":"Di Vincenzo, D. P. (1995). Quantum computation. Science, 270(5234), 255\u2013261.","journal-title":"Science"},{"key":"9840_CR11","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1007\/978-94-015-8839-3_18","volume-title":"Mesoscopic electron transport","author":"DP Di Vincenzo","year":"1997","unstructured":"Di Vincenzo, D. P. (1997). Topics in quantum computers. In L. L. Sohn, L. P. Kouwenhoven, & G. Sch\u00f6n (Eds.), Mesoscopic electron transport (pp. 657\u2013677). Springer. https:\/\/doi.org\/10.1007\/978-94-015-8839-3_18"},{"issue":"4","key":"9840_CR12","doi-asserted-by":"publisher","first-page":"040501","DOI":"10.1088\/2058-9565\/ab4472","volume":"4","author":"AK Fedorov","year":"2019","unstructured":"Fedorov, A. K., Akimov, A. V., Biamonte, J. D., Kavokin, A. V., Khalili, F. Y., Kiktenko, E. O., Kolachevsky, N. N., Kurochkin, Y. V., Lvovsky, A. I., Rubtsov, A. N., & Shlyapnikov, G. V. (2019). Quantum technologies in Russia. Quantum Science and Technology, 4(4), 040501.","journal-title":"Quantum Science and Technology"},{"issue":"3","key":"9840_CR13","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","volume":"46","author":"JL Fern\u00e1ndez-Alem\u00e1n","year":"2013","unstructured":"Fern\u00e1ndez-Alem\u00e1n, J. L., Se\u00f1or, I. C., Lozoya, P. \u00c1. O., & Toval, A. (2013). Security and privacy in electronic health records: A systematic literature review. Journal of Biomedical Informatics, 46(3), 541\u2013562.","journal-title":"Journal of Biomedical Informatics"},{"issue":"4","key":"9840_CR14","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.ajog.2020.01.002","volume":"222","author":"WA Grobman","year":"2020","unstructured":"Grobman, W. A., Sandoval, G., Reddy, U. M., Tita, A. T., Silver, R. M., Mallett, G., Hill, K., Rice, M. M., El-Sayed, Y. Y., Wapner, R. J., & Rouse, D. J. (2020). Health resource utilization of labor induction versus expectant management. American Journal of Obstetrics and Gynecology, 222(4), 369-e1.","journal-title":"American Journal of Obstetrics and Gynecology"},{"issue":"1","key":"9840_CR15","doi-asserted-by":"publisher","first-page":"354","DOI":"10.2196\/jmir.7.1.e3","volume":"7","author":"TD Gunter","year":"2005","unstructured":"Gunter, T. D., & Terry, N. P. (2005). The emergence of national electronic health record architectures in the United States and Australia: Models, costs, and questions. Journal of Medical Internet Research, 7(1), 354\u2013365.","journal-title":"Journal of Medical Internet Research"},{"key":"9840_CR16","doi-asserted-by":"crossref","unstructured":"He, B., Zhang, D., Loke, S. W., Lin, S., Lu, L. 2024. \u201cBuilding a hierarchical architecture and communication model for the quantum internet\u201d. arXiv:2402.11806","DOI":"10.1109\/JSAC.2024.3380103"},{"key":"9840_CR17","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10676-024-09756-8","volume":"26","author":"D Helbing","year":"2024","unstructured":"Helbing, D., & Ienca, M. (2024). Why converging technologies need converging international regulation. Ethics and Information Technology, 26, 15. https:\/\/doi.org\/10.1007\/s10676-024-09756-8","journal-title":"Ethics and Information Technology"},{"key":"9840_CR18","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/s10676-023-09712-y","volume":"25","author":"G Hull","year":"2023","unstructured":"Hull, G. (2023). Dirty data labeled dirt cheap: Epistemic injustice in machine learning systems. Ethics and Information Technology, 25, 38. https:\/\/doi.org\/10.1007\/s10676-023-09712-y","journal-title":"Ethics and Information Technology"},{"issue":"7","key":"9840_CR19","doi-asserted-by":"publisher","first-page":"1900","DOI":"10.1109\/JSAC.2024.3380091","volume":"42","author":"J Jiang","year":"2024","unstructured":"Jiang, J., Luo, M., & Ma, S. (2024). Quantum network capacity of entangled quantum internet. IEEE Journal on Selected Areas in Communications, 42(7), 1900\u20131918.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"9840_CR20","doi-asserted-by":"publisher","unstructured":"Kiesow, C., Bambauer, E., Y. 2023. \u201cA Quantum Policy and Ethics Roadmap\u201d Available at SSRN: https:\/\/ssrn.com\/abstract=4507090 or https:\/\/doi.org\/10.2139\/ssrn.4507090","DOI":"10.2139\/ssrn.4507090"},{"key":"9840_CR21","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/s44206-023-00050-6","volume":"2","author":"M Kop","year":"2023","unstructured":"Kop, M. (2023). Quantum-ELSPI: A novel field of research. Digital Society, 2, 20. https:\/\/doi.org\/10.1007\/s44206-023-00050-6","journal-title":"Digital Society"},{"issue":"1","key":"9840_CR22","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Zheng, Y., Ren, K., & Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Transactions on Parallel and Distributed Systems, 24(1), 131\u2013143.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"3","key":"9840_CR23","doi-asserted-by":"publisher","first-page":"1606","DOI":"10.1109\/COMST.2024.3361662","volume":"26","author":"Y Li","year":"2024","unstructured":"Li, Y., Zhang, H., Zhang, C., Huang, T., & Yu, F. R. (2024). A survey of quantum internet protocols from a layered perspective. IEEE Communications Surveys & Tutorials, 26(3), 1606\u20131634.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"9840_CR24","doi-asserted-by":"crossref","unstructured":"Narayanan, V., & Shmatikov, V. 2008. \u201cRobust de-anonymization of large sparse datasets.\u201d In 2008 IEEE Symposium on Security and Privacy (sp 2008) (pp. 111\u2013125). IEEE.","DOI":"10.1109\/SP.2008.33"},{"key":"9840_CR25","doi-asserted-by":"crossref","unstructured":"Ngoenriang, N., Xu, M., Kang, J., Niyato, D., Yu, H., & Shen, X. S. 2023. \u201cDQC2O: Distributed quantum computing for collaborative optimization in future networks.\u201d\u00a0IEEE Communications Magazine. https:\/\/ieeexplore.ieee.org\/xpl\/RecentIssue.jsp?punumber=35","DOI":"10.1109\/MCOM.003.2200573"},{"key":"9840_CR26","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/s10676-023-09721-x","volume":"25","author":"M Pruski","year":"2023","unstructured":"Pruski, M. (2023). Ethics framework for predictive clinical AI model updating. Ethics and Information Technology, 25, 48. https:\/\/doi.org\/10.1007\/s10676-023-09721-x","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9840_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1049\/qtc2.12072","volume":"5","author":"A Purohit","year":"2023","unstructured":"Purohit, A., Kaur, M., Seskir, Z. C., Posner, M. T., & Venegas-Gomez, A. (2023). Building a quantum-ready ecosystem. IET Quantum Communication, 5(1), 1\u201318.","journal-title":"IET Quantum Communication"},{"key":"9840_CR28","unstructured":"Scholten, T. L., Williams, C. J., Moody, D., Mosca, M., Hurley, W., Zeng, W. J., Gambetta, J. M. 2024. \u201cAssessing the benefits and risks of quantum computers.\u201d arXiv preprint arXiv:2401.16317."},{"issue":"10","key":"9840_CR29","first-page":"123","volume":"15","author":"M Shams","year":"2023","unstructured":"Shams, M., Choudhari, J., Reyes, K., Prentzas, S., Gapizov, A., Shehryar, A., & Gasim, R. (2023). The quantum-medical nexus: Understanding the impact of quantum technologies on healthcare. Cureus, 15(10), 123\u2013134.","journal-title":"Cureus"},{"issue":"5","key":"9840_CR30","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P. W. (1997). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing, 26(5), 1484\u20131509.","journal-title":"SIAM Journal on Computing"},{"issue":"1","key":"9840_CR31","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/s11831-022-09809-5","volume":"30","author":"J Singh","year":"2023","unstructured":"Singh, J., & Bhangu, K. S. (2023). Contemporary quantum computing use cases: Taxonomy, review and challenges. Archives of Computational Methods in Engineering, 30(1), 615\u2013638.","journal-title":"Archives of Computational Methods in Engineering"},{"issue":"03","key":"9840_CR32","first-page":"448","volume":"10","author":"S Singh","year":"2024","unstructured":"Singh, S., & Kumar, D. (2024). Enhancing cyber security using quantum computing and artificial intelligence: A review. International Journal of Advanced Research in Science Communication and Technology, 10(03), 448\u2013456.","journal-title":"International Journal of Advanced Research in Science Communication and Technology"},{"key":"9840_CR33","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/s10676-022-09675-6","volume":"25","author":"H Veluwenkamp","year":"2023","unstructured":"Veluwenkamp, H., & van den Hoven, J. (2023). Design for values and conceptual engineering. Ethics and Information Technology, 25, 2. https:\/\/doi.org\/10.1007\/s10676-022-09675-6","journal-title":"Ethics and Information Technology"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-025-09840-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-025-09840-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-025-09840-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T19:09:56Z","timestamp":1757185796000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-025-09840-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":33,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["9840"],"URL":"https:\/\/doi.org\/10.1007\/s10676-025-09840-7","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"type":"print","value":"1388-1957"},{"type":"electronic","value":"1572-8439"}],"subject":[],"published":{"date-parts":[[2025,6]]},"assertion":[{"value":"3 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"This article does not contain any studies with human participants performed by any of the authors.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"30"}}