IEEE Technology and Society Magazine - June 2015 - 39
Author Information
Tamara Bonaci and Howard Jay Chizeck are with the
Department of Electrical Engineering, University of Washington, Seattle, WA, U.S.A. Email: tbonaci@uw.edu;
chizeck@uw.edu.
Ryan Calo is with the School of Law, University of
Washington, Seattle, WA, U.S.A. Email: rcalo@uw.edu.
References
[1] Nielsen, "Nielsen acquires Neurofocus," press release, May 26,
2011, http://www.nielsen.com/us/en/press-room/2011/nielsenacquires-neurofocus.html.
[2] S. Young Rojahn, "Samsung demos a tablet controlled by your brain,"
M.I.T. Technology Rev., Apr. 19, 2013; http://www.technologyreview.
com/news/513861/samsung-demos-a-tablet-controlled-by-yourbrain/.
[3] "NeuroGaming 2013 Conference and Expo: game industry meets
consumer BCI's at biggest event to date," Neurogadget,com, Jan.
18, 2013; http://neurogadget.com/2013/01/18/neurogaming-2013conference-andexpo-game-industry-meets-consumer-bcis-at-biggestevent-to-date/6853.
[4] "Neurocam," Neurowear.com; http://neurowear.com/projects_
detail/neurocam.html, accessed Jan. 19, 2014.
[5] Emotiv Systems; http://emotiv.com/, accessed Jan. 19, 2014.
[6] NeuroSky, http://neurosky.com/, accessed Jan.19, 2014.
[7] I. Martinovic, D. Davies, M. Frank, D. Perito, T. Ros, and D. Song,
"On the feasibility of side-channel attacks with brain-computer
interfaces," in Proc.21st USENIX Security Symp., USENIX, 2012.
[8] M. Pessiglione, L.Schmidt, B.Draganski, R.Kalisch, H. Lau, R. J.
Dolan, and C.D. Frith, "How the brain translates money into force: A
neuroimaging study of subliminal motivation," Science, vol. 316, no.
5826, pp. 904-906, May 11, 2007.
[9] Y.-T. Chiu, "Mind reading to predict the success of online games,"
IEEE Spectrum,Feb. 5, 2013; http://spectrum.ieee.org/consumer-electronics/gaming/mind-reading-to-predict-the-success-of-online-games..
[10] M. Inzlicht, I. McGregor, J.B. Hirsh, and K. Nash, "Neural markers of
religious conviction," Psychological Sci., vol. 20, no. 3, pp. 385-392, 2009.
[11] J.P. Rosenfeld, J.R. Biroschak, and J.J. Furedy, "P300-based
detection of concealed autobiographical versus incidentally
acquired information in target and non-target paradigms," Int. J.
Psychophysiology, vol. 60, no. 3, pp. 251-259, 2006.
[12] The Health Insurance Portability and Accountability Act of 1996
(HIPAA) Privacy and Security Rules, cms.gov; http://www.cms.gov/
Regulations-and-Guidance/Regulations-and-Guidance.html, HIPAAAdministrative-Simplification/HIPAAGenInfo/Downloads/HIPAALaw.
pdf, accessed Apr. 12, 2015.
[13] U.S. Federal Trade Commission, Federal Trade Commission Act,
https://www.ftc.gov/enforcement/statutes/federal-trade-commission-act, accessed Apr. 12, 2015.
[14] J.R. Wolpaw, N. Birbaumer, W.J. Heetderks, D.J. McFarland, P.H.
Peckham, G. Schalk, E. Donchin, L.A. Quatrano, C.J. Robinson, and
T.M. Vaughan, "Brain-computer interface technology: A review of
the First International Meeting," IEEE Trans. Rehabilitation Engineering, vol. 8, no. 2, pp. 164-173, 2000.
[15] J.R. Wolpaw, N. Birbaumer, D.J. McFarland, G. Pfurtscheller, and
T.M. Vaughan, "Brain-computer interfaces for communication and control," Clinical Neurophysiology, vol. 113, no. 6, pp. 767-791, 2002.
[16] J.R. Wolpaw and E.W. Wolpaw. Brain-Computer Interfaces: Principles and Practice. OUP USA, 2012.
[17] g-tec Medical Engineering, gtec.at; http://www.gtec.at/, accessed
Jan. 19, 2014.
[18] B. Popper, "Brain Bats: Learning to play Pong with your mind," The
Verge, Jul. 11, 2012; http://www.theverge.com/2012/7/11/3149858/
brain-bats-play-pong-with-your-mind-neurosky-eeg.
[19] M.-S. Yoh, J. Kwon, and S. Kim. "NeuroWander: A BCI game in the
form of interactive fairy tale," in Proc. 12th ACM Int. Conf. Adjunct
Papers on Ubiquitous Computing. ACM, 2010, pp. 389-390.
[20] J. Contreras-Vidal, "Ethical considerations behind brain-computer interface research," Aug. 2012; http://www.oandp.com/
articles/2012-08_12.asp.
june 2015
∕
[21] N. Farahany, "Incriminating thoughts," Stanford Law Rev., vol.
64, pp. 11-17, 2011.
[22] J. Illes, M.P. Kirschen, J.D.E. Gabrieli et al., "From neuroimaging to
neuroethics," Nature Neuroscience, vol. 6, no. 3, pp. 205-205, 2003.
[23] J. Illes and E. Racine, "Imaging or imagining? A neuroethics challenge
informed by genetics," Amer. J. Bioethics, vol. 5, no. 2, pp. 5-18, 2005.
[24] A. R. Jonsen, The Birth of Bioethics. U.S.A.: Oxford Univ. Press,
2003.
[25] The Committee on Science and Law, "Are your thoughts your
own?: Neuroprivacy and the legal implications of brain imaging,"
nycbar.org, 2005; http://www.nycbar.org/pdf/report/Neuroprivacyrevisions.pdf.
[26] N. Lee, A.J. Broderick, and L. Chamberlain, "What is 'neuromarketing'? A discussion and agenda for future research," Int. J. Psychophysiol., vol. 63, pp. 199-204, 2007.
[27] K. Wahlstrom, N.B. Fairweather, and H. Ashman, "Brain-computer
interfaces: A technical approach to supporting privacy," in Proc. 12th
Int. Ethicomp Conf.: The Social Impact of Social Computing, 2011.
[28] S. Marcel and J.R. Millán, "Person authentication using brainwaves
(EEG) and maximum a posteriori model adaptation, IEEE Trans. Pattern
Analysis and Machine Intelligence, vol. 29, no. 4, pp. 743-752, 2007.
[29] R. Palaniappan and K.V.R. Ravi, "A new method to identify
individuals using signals from the brain," in Proc. 4th Joint Conf.
on Information, Communications and Signal Processing, vol. 3,
2003, pp. 1442-1445.
[30] R.B. Paranjape, J. Mahovsky, L. Benedicenti, and Z. Koles, "The
electroencephalogram as a biometric," in Proc. Canadian Conf. on
Electrical and Computer Engineering, vol. 2, 2001, pp. 1363-1366.
[31] M. Poulos, M. Rangoussi, V. Chrissikopoulos, and A. Evangelou, "Person
identification based on parametric processing EEG," in Proc. 66th IEEE Int.
Conf. on Electronics, Circuits and Systems, vol. 1, pp. 283-286, 1999.
[32] A. Riera, A. Soria-Frisch, M. Caparrini, C. Grau, and G. Ruffini,
"Unobtrusive biometric system based on electroencephalogram
analysis," EURASIP J. Advances in Signal Processing, 2008, 2007.
[33] K. Revett and S.T. de Magalhães, "Cognitive biometrics: challenges for the future," in Global Security, Safety, and Sustainability. Springer, 2010, pp. 79-86.
[34] H. Bojinov, D. Sanchez, P. Reber, D. Boneh, and P. Lincoln, "Neuroscience meets cryptography: Designing crypto primitives secure against rubber hose attacks," in Proc. 21st USENIX Security Symp., USENIX, 2012.
[35] T. Denning, Y. Matsuoka, and T. Kohno, "Neurosecurity: Security
and privacy for neural devices," Neurosurgical Focus, vol. 27, no. 1,
pp. 1-4, 2009.
[36] B. Luber, C. Fisher, P.S. Appelbaum, M. Ploesser, and S.H. Lisanby, "Non-invasive brain stimulation in the detection of deception:
Scientific challenges and ethical consequences," Behavioral Sciences and the Law, vol. 27, no. 2, pp. 191-208, 2009.
[37] S.A. Huettel and G. McCarthy, "What is odd in the oddball task?
Prefrontal cortex is activated by dynamic changes in response strategy," Neuropsychologia, vol. 42, no. 3, pp. 379-386, 2004.
[38] P.R. Wolpe, K.R. Foster, and D.D. Langleben, "Emerging neurotechnologies for lie-detection: Promises and perils," Amer. J. Bioethics, vol. 10, no. 10, pp. 40-48, 2010.
[39] M. van Vliet, C. Mühl, B. Reuderink, and M. Poel, "Guessing
what's on your mind: Using the N400 in brain computer interfaces," Brain Informatics, pp. 180-191, 2010.
[40] R. B. Baldwin, "Kinetic art: On the use of subliminal stimulation
of visual perception," Leonardo, vol. 7, no. 1, pp. 1-5, Wint., 1974.
[41] United Nations, The Universal Declaration of Human Rights;
http://www.un.org/en/documents/udhr/, accessed Jan. 26, 2014.
[42] P. Schaar, "Privacy by design," Identity in the Information
Society, vol. 3, no. 2, pp. 267-274, 2010.
[43]. H. J. Chizeck, and T. Bonaci, "Brain-computer interface anonymizer," Application Number: US 14/174,818, Feb. 2014.
[44] B.-G. Chun and P. Maniatis, "Augmented smartphone applications through clone cloud execution," in Proc. 12th Conf.on Hot
Topics in Operating Systems, USENIX Association, 2009.
[45] C. Marforio, A. Francillon, and S. Capkun, "Application collusion attack
on the permission-based security model and its implications for modern
smartphone systems," Dept. of Computer Science, ETH Zurich, 2011.
IEEE Technology and Society Magazine
39
http://www.nycbar.org
http://www.nycbar.org/pdf/report/Neuroprivacy
http://www.nielsen.com/us/en/press-room/2011/nielsen
http://www.technologyreview
http://www.neurogadget.com/2013/01/18/neurogaming-2013
http://www.Neurowear.com
http://www.neurowear.com/projects_
http://www.emotiv.com/
http://www.neurosky.com/
http://spectrum.ieee.org/consumer-elec
http://www.cms.gov
http://www.cms.gov/
https://www.ftc.gov/enforcement/statutes/federal-trade-commis
http://www.un.org/en/documents/udhr/
http://www.gtec.at
http://www.gtec.at/
http://www.theverge.com/2012/7/11/3149858/
http://www.oandp.com/
Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - June 2015
IEEE Technology and Society Magazine - June 2015 - Cover1
IEEE Technology and Society Magazine - June 2015 - Cover2
IEEE Technology and Society Magazine - June 2015 - 1
IEEE Technology and Society Magazine - June 2015 - 2
IEEE Technology and Society Magazine - June 2015 - 3
IEEE Technology and Society Magazine - June 2015 - 4
IEEE Technology and Society Magazine - June 2015 - 5
IEEE Technology and Society Magazine - June 2015 - 6
IEEE Technology and Society Magazine - June 2015 - 7
IEEE Technology and Society Magazine - June 2015 - 8
IEEE Technology and Society Magazine - June 2015 - 9
IEEE Technology and Society Magazine - June 2015 - 10
IEEE Technology and Society Magazine - June 2015 - 11
IEEE Technology and Society Magazine - June 2015 - 12
IEEE Technology and Society Magazine - June 2015 - 13
IEEE Technology and Society Magazine - June 2015 - 14
IEEE Technology and Society Magazine - June 2015 - 15
IEEE Technology and Society Magazine - June 2015 - 16
IEEE Technology and Society Magazine - June 2015 - 17
IEEE Technology and Society Magazine - June 2015 - 18
IEEE Technology and Society Magazine - June 2015 - 19
IEEE Technology and Society Magazine - June 2015 - 20
IEEE Technology and Society Magazine - June 2015 - 21
IEEE Technology and Society Magazine - June 2015 - 22
IEEE Technology and Society Magazine - June 2015 - 23
IEEE Technology and Society Magazine - June 2015 - 24
IEEE Technology and Society Magazine - June 2015 - 25
IEEE Technology and Society Magazine - June 2015 - 26
IEEE Technology and Society Magazine - June 2015 - 27
IEEE Technology and Society Magazine - June 2015 - 28
IEEE Technology and Society Magazine - June 2015 - 29
IEEE Technology and Society Magazine - June 2015 - 30
IEEE Technology and Society Magazine - June 2015 - 31
IEEE Technology and Society Magazine - June 2015 - 32
IEEE Technology and Society Magazine - June 2015 - 33
IEEE Technology and Society Magazine - June 2015 - 34
IEEE Technology and Society Magazine - June 2015 - 35
IEEE Technology and Society Magazine - June 2015 - 36
IEEE Technology and Society Magazine - June 2015 - 37
IEEE Technology and Society Magazine - June 2015 - 38
IEEE Technology and Society Magazine - June 2015 - 39
IEEE Technology and Society Magazine - June 2015 - 40
IEEE Technology and Society Magazine - June 2015 - 41
IEEE Technology and Society Magazine - June 2015 - 42
IEEE Technology and Society Magazine - June 2015 - 43
IEEE Technology and Society Magazine - June 2015 - 44
IEEE Technology and Society Magazine - June 2015 - 45
IEEE Technology and Society Magazine - June 2015 - 46
IEEE Technology and Society Magazine - June 2015 - 47
IEEE Technology and Society Magazine - June 2015 - 48
IEEE Technology and Society Magazine - June 2015 - 49
IEEE Technology and Society Magazine - June 2015 - 50
IEEE Technology and Society Magazine - June 2015 - 51
IEEE Technology and Society Magazine - June 2015 - 52
IEEE Technology and Society Magazine - June 2015 - 53
IEEE Technology and Society Magazine - June 2015 - 54
IEEE Technology and Society Magazine - June 2015 - 55
IEEE Technology and Society Magazine - June 2015 - 56
IEEE Technology and Society Magazine - June 2015 - 57
IEEE Technology and Society Magazine - June 2015 - 58
IEEE Technology and Society Magazine - June 2015 - 59
IEEE Technology and Society Magazine - June 2015 - 60
IEEE Technology and Society Magazine - June 2015 - 61
IEEE Technology and Society Magazine - June 2015 - 62
IEEE Technology and Society Magazine - June 2015 - 63
IEEE Technology and Society Magazine - June 2015 - 64
IEEE Technology and Society Magazine - June 2015 - 65
IEEE Technology and Society Magazine - June 2015 - 66
IEEE Technology and Society Magazine - June 2015 - 67
IEEE Technology and Society Magazine - June 2015 - 68
IEEE Technology and Society Magazine - June 2015 - 69
IEEE Technology and Society Magazine - June 2015 - 70
IEEE Technology and Society Magazine - June 2015 - 71
IEEE Technology and Society Magazine - June 2015 - 72
IEEE Technology and Society Magazine - June 2015 - 73
IEEE Technology and Society Magazine - June 2015 - 74
IEEE Technology and Society Magazine - June 2015 - 75
IEEE Technology and Society Magazine - June 2015 - 76
IEEE Technology and Society Magazine - June 2015 - 77
IEEE Technology and Society Magazine - June 2015 - 78
IEEE Technology and Society Magazine - June 2015 - 79
IEEE Technology and Society Magazine - June 2015 - 80
IEEE Technology and Society Magazine - June 2015 - Cover3
IEEE Technology and Society Magazine - June 2015 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com