{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:19:42Z","timestamp":1761581982681,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T00:00:00Z","timestamp":1589500800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,5,15]]},"DOI":"10.1145\/3404663.3404664","type":"proceedings-article","created":{"date-parts":[[2020,7,10]],"date-time":"2020-07-10T22:10:11Z","timestamp":1594419011000},"page":"77-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Inventory of Existing Neuroprivacy Controls"],"prefix":"10.1145","author":[{"given":"Dustin","family":"Steinhagen","sequence":"first","affiliation":[{"name":"The Beacom College of Computer and Cyber Sciences Dakota State University, Madison, South Dakota, USA"}]},{"given":"Houssain","family":"Kettani","sequence":"additional","affiliation":[{"name":"The Beacom College of Computer and Cyber Sciences Dakota State University, Madison, South Dakota, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621861"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSRE.2019.2926965"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWW-BCI.2019.8737260"},{"key":"e_1_3_2_1_4_1","first-page":"03536","article-title":"Cybersecurity in brain-computer interfaces: state-of-the-art, opportunities, and future challenges","volume":"1908","author":"Bernal S. L.","year":"2019","unstructured":"Bernal , S. L. , Celdr\u00e1n , A. H. , P\u00e9rez , G. M. , Barros , M. T. , Balasubramaniam , S. ( 2019 ). Cybersecurity in brain-computer interfaces: state-of-the-art, opportunities, and future challenges . ArXiv : 1908 . 03536 . Bernal, S. L., Celdr\u00e1n, A. H., P\u00e9rez, G. M., Barros, M. T., Balasubramaniam, S. (2019). Cybersecurity in brain-computer interfaces: state-of-the-art, opportunities, and future challenges. ArXiv:1908.03536.","journal-title":"ArXiv"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/NORBERT.2014.6893912"},{"key":"e_1_3_2_1_6_1","volume-title":"Security and Privacy of Biomedical Cyber-Physical Systems","author":"Bonaci T.","year":"2015","unstructured":"Bonaci , T. ( 2015 ). Security and Privacy of Biomedical Cyber-Physical Systems . University of Washington , ProQuest Dissertations and Theses. Bonaci, T. (2015). Security and Privacy of Biomedical Cyber-Physical Systems. University of Washington, ProQuest Dissertations and Theses."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBBE.2010.5515807"},{"key":"e_1_3_2_1_8_1","volume-title":"Privacy in Technology: Standards and Practices for Engineers and Security and IT Professionals","author":"Cannon JC.","year":"2014","unstructured":"Cannon , JC. ( 2014 ). Privacy in Technology: Standards and Practices for Engineers and Security and IT Professionals . Portsmouth, NH : International Association of Privacy Professionals . Cannon, JC. (2014). Privacy in Technology: Standards and Practices for Engineers and Security and IT Professionals. Portsmouth, NH: International Association of Privacy Professionals."},{"issue":"14","key":"e_1_3_2_1_9_1","first-page":"818","author":"Chizeck H. J.","year":"2014","unstructured":"Chizeck , H. J. , & Bonaci , T. ( 2014 ). U.S. Patent Application No. 14\/174 , 818 . Chizeck, H. J., & Bonaci, T. (2014). U.S. Patent Application No. 14\/174,818.","journal-title":"U.S. Patent Application"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.23"},{"key":"e_1_3_2_1_11_1","volume-title":"Strategic privacy by design","author":"Cronk J.","year":"2018","unstructured":"Cronk , J. ( 2018 ). Strategic privacy by design . Portsmouth, NH : International Association of Privacy Professionals . Cronk, J. (2018). Strategic privacy by design. Portsmouth, NH: International Association of Privacy Professionals."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6356-2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3171\/2009.4.FOCUS0985"},{"key":"e_1_3_2_1_14_1","volume-title":"Life-span changes in EEG spectral amplitude, amplitude variability and mean frequency. Clinical neurophysiology, 110(8), 1399--1409. https:\/\/doi.org\/10.1016\/s1388-2457(99)00102-9","author":"Dustman R. E.","year":"1999","unstructured":"Dustman , R. E. , Shearer , D. E. , & Emmerson , R. Y. ( 1999 ). Life-span changes in EEG spectral amplitude, amplitude variability and mean frequency. Clinical neurophysiology, 110(8), 1399--1409. https:\/\/doi.org\/10.1016\/s1388-2457(99)00102-9 10.1016\/s1388-2457(99)00102-9 Dustman, R. E., Shearer, D. E., & Emmerson, R. Y. (1999). Life-span changes in EEG spectral amplitude, amplitude variability and mean frequency. Clinical neurophysiology, 110(8), 1399--1409. https:\/\/doi.org\/10.1016\/s1388-2457(99)00102-9"},{"key":"e_1_3_2_1_15_1","unstructured":"Emotiv. (2018 May 25). EMOTIV privacy policy. EMOTIV. https:\/\/id.emotivcloud.com\/eoidc\/privacy\/privacy_policy\/  Emotiv. (2018 May 25). EMOTIV privacy policy. EMOTIV. https:\/\/id.emotivcloud.com\/eoidc\/privacy\/privacy_policy\/"},{"key":"e_1_3_2_1_16_1","volume-title":"Mobile and Secure EEG Cloud Database. EMOTIV. https:\/\/www.emotiv.com\/emotiv-eeg-cloud\/","author":"Emotiv","year":"2019","unstructured":"Emotiv . ( 2019 ). Mobile and Secure EEG Cloud Database. EMOTIV. https:\/\/www.emotiv.com\/emotiv-eeg-cloud\/ Emotiv. (2019). Mobile and Secure EEG Cloud Database. EMOTIV. https:\/\/www.emotiv.com\/emotiv-eeg-cloud\/"},{"key":"e_1_3_2_1_17_1","volume-title":"Seven types of privacy. European data protection: coming of age, 3--32","author":"Finn R. L.","year":"2013","unstructured":"Finn , R. L. , Wright , D. , & Friedewald , M. ( 2013 ). Seven types of privacy. European data protection: coming of age, 3--32 . Dordrecht : Springer . https:\/\/doi.org\/10.1007\/978-94-007-5170-5_1 10.1007\/978-94-007-5170-5_1 Finn, R. L., Wright, D., & Friedewald, M. (2013). Seven types of privacy. European data protection: coming of age, 3--32. Dordrecht: Springer. https:\/\/doi.org\/10.1007\/978-94-007-5170-5_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139559"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/3153297"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v12i1.4500"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55415-5_38"},{"key":"e_1_3_2_1_22_1","volume-title":"Privacy design strategies (the little blue book). Groningen: De Privacy Coach. https:\/\/www.cs.ru.nl\/J.H.Hoepman\/publications\/pds-booklet.pdf","author":"Hoepman J.-H.","year":"2019","unstructured":"Hoepman , J.-H. ( 2019 ). Privacy design strategies (the little blue book). Groningen: De Privacy Coach. https:\/\/www.cs.ru.nl\/J.H.Hoepman\/publications\/pds-booklet.pdf Hoepman, J.-H. (2019). Privacy design strategies (the little blue book). Groningen: De Privacy Coach. https:\/\/www.cs.ru.nl\/J.H.Hoepman\/publications\/pds-booklet.pdf"},{"issue":"2","key":"e_1_3_2_1_23_1","first-page":"51","article-title":"Neuroprivacy, neurosecurity and brain-hacking: Emerging issues in neural engineering","volume":"8","author":"Ienca M.","year":"2015","unstructured":"Ienca , M. ( 2015 ). Neuroprivacy, neurosecurity and brain-hacking: Emerging issues in neural engineering . Bioethica Forum. 8 ( 2 ), 51 -- 53 . Schwabe. Ienca, M. (2015). Neuroprivacy, neurosecurity and brain-hacking: Emerging issues in neural engineering. Bioethica Forum. 8(2), 51--53. Schwabe.","journal-title":"Bioethica Forum."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-016-9398-9"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2009.02305.x"},{"key":"e_1_3_2_1_26_1","volume-title":"Privacy policy. Kokoon. https:\/\/kokoon.io\/policies\/privacy-policy","author":"Kokoon","year":"2019","unstructured":"Kokoon . ( 2019 ). Privacy policy. Kokoon. https:\/\/kokoon.io\/policies\/privacy-policy Kokoon. (2019). Privacy policy. Kokoon. https:\/\/kokoon.io\/policies\/privacy-policy"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 2015 IEEE Conference on Communications and Network Security (CNS)","author":"Li Q.","year":"2015","unstructured":"Li , Q. , Ding , D. , & Conti , M. ( 2015 ). Brain-computer interface applications: Security and privacy challenges . Proceedings of the 2015 IEEE Conference on Communications and Network Security (CNS) , Florence, Italy. https:\/\/doi.org\/10.1109\/CNS. 2015.7346884 10.1109\/CNS.2015.7346884 Li, Q., Ding, D., & Conti, M. (2015). Brain-computer interface applications: Security and privacy challenges. Proceedings of the 2015 IEEE Conference on Communications and Network Security (CNS), Florence, Italy. https:\/\/doi.org\/10.1109\/CNS.2015.7346884"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362827"},{"key":"e_1_3_2_1_29_1","unstructured":"Muse. (2019 April 27). Privacy policy. muse. https:\/\/choosemuse.com\/legal\/  Muse. (2019 April 27). Privacy policy. muse. https:\/\/choosemuse.com\/legal\/"},{"key":"e_1_3_2_1_30_1","unstructured":"NeuroSky. (2018 May 25). Effective learner privacy policy. Effective Learner Cloud. https:\/\/effectivelearnercloud.com\/el\/policies\/?privacy  NeuroSky. (2018 May 25). Effective learner privacy policy. Effective Learner Cloud. https:\/\/effectivelearnercloud.com\/el\/policies\/?privacy"},{"key":"e_1_3_2_1_31_1","volume-title":"Are your thoughts your own? Neuroprivacy and the legal implications of brain imaging","author":"The Committee on Science and Law.","year":"2005","unstructured":"The Committee on Science and Law. ( 2005 ). Are your thoughts your own? Neuroprivacy and the legal implications of brain imaging . New York, NY : New York City Bar Association . The Committee on Science and Law. (2005). Are your thoughts your own? Neuroprivacy and the legal implications of brain imaging. New York, NY: New York City Bar Association."},{"key":"e_1_3_2_1_32_1","unstructured":"Github. (2018 June 27). Open brain consent. Github Blob. https:\/\/github.com\/con\/open-brain-consent\/blob\/master\/docs\/source\/ultimate.rst  Github. (2018 June 27). Open brain consent. Github Blob. https:\/\/github.com\/con\/open-brain-consent\/blob\/master\/docs\/source\/ultimate.rst"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139032803"},{"key":"e_1_3_2_1_34_1","first-page":"06077","article-title":"Privacy, security and trust in the internet of neurons","volume":"1807","author":"Sempreboni D.","year":"2018","unstructured":"Sempreboni , D. , & Vigan\u00f2 , L. ( 2018 ). Privacy, security and trust in the internet of neurons . ArXiv : 1807 . 06077 . Sempreboni, D., & Vigan\u00f2, L. (2018). Privacy, security and trust in the internet of neurons. ArXiv:1807.06077.","journal-title":"ArXiv"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"e_1_3_2_1_37_1","unstructured":"Stopczynski A. Greenwood D. Hansen L. K. & Pentland A. (2014 April 21). Privacy for personal neuroinformatics. SSRN Electronic Journal. https:\/\/doi.org\/10.2139\/ssm.2427564    10.2139\/ssm.2427564\nStopczynski A. Greenwood D. Hansen L. K. & Pentland A. (2014 April 21). Privacy for personal neuroinformatics. SSRN Electronic Journal. https:\/\/doi.org\/10.2139\/ssm.2427564"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860516"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2016.026"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2016.2633379"},{"key":"e_1_3_2_1_41_1","volume-title":"Human mind control of rat cyborg's continuous locomotion with wireless brain-to-brain interface. Scientific reports, 9(1), 1--12. https:\/\/doi.org\/10.1038\/s41598-018-36885-0","author":"Zhang S.","year":"2019","unstructured":"Zhang , S. , Yuan , S. , Huang , L. , Zheng , X. , Wu , Z. , Xu , K. , & Pan , G. ( 2019 ). Human mind control of rat cyborg's continuous locomotion with wireless brain-to-brain interface. Scientific reports, 9(1), 1--12. https:\/\/doi.org\/10.1038\/s41598-018-36885-0 10.1038\/s41598-018-36885-0 Zhang, S., Yuan, S., Huang, L., Zheng, X., Wu, Z., Xu, K., & Pan, G. (2019). Human mind control of rat cyborg's continuous locomotion with wireless brain-to-brain interface. Scientific reports, 9(1), 1--12. https:\/\/doi.org\/10.1038\/s41598-018-36885-0"}],"event":{"name":"ICISDM 2020: 2020 the 4th International Conference on Information System and Data Mining","acronym":"ICISDM 2020","location":"Hawaii HI USA"},"container-title":["Proceedings of the 2020 the 4th International Conference on Information System and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404664","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404663.3404664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:18Z","timestamp":1750199898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404663.3404664"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,15]]},"references-count":41,"alternative-id":["10.1145\/3404663.3404664","10.1145\/3404663"],"URL":"https:\/\/doi.org\/10.1145\/3404663.3404664","relation":{},"subject":[],"published":{"date-parts":[[2020,5,15]]},"assertion":[{"value":"2020-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}