1
|
Soldado-Magraner J, Antonietti A, French J, Higgins N, Young MJ, Larrivee D, Monteleone R. Applying the IEEE BRAIN neuroethics framework to intra-cortical brain-computer interfaces. J Neural Eng 2024; 21:022001. [PMID: 38537269 DOI: 10.1088/1741-2552/ad3852] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/17/2023] [Accepted: 03/27/2024] [Indexed: 04/05/2024]
Abstract
Objective. Brain-computer interfaces (BCIs) are neuroprosthetic devices that allow for direct interaction between brains and machines. These types of neurotechnologies have recently experienced a strong drive in research and development, given, in part, that they promise to restore motor and communication abilities in individuals experiencing severe paralysis. While a rich literature analyzes the ethical, legal, and sociocultural implications (ELSCI) of these novel neurotechnologies, engineers, clinicians and BCI practitioners often do not have enough exposure to these topics.Approach. Here, we present the IEEE Neuroethics Framework, an international, multiyear, iterative initiative aimed at developing a robust, accessible set of considerations for diverse stakeholders.Main results. Using the framework, we provide practical examples of ELSCI considerations for BCI neurotechnologies. We focus on invasive technologies, and in particular, devices that are implanted intra-cortically for medical research applications.Significance. We demonstrate the utility of our framework in exposing a wide range of implications across different intra-cortical BCI technology modalities and conclude with recommendations on how to utilize this knowledge in the development and application of ethical guidelines for BCI neurotechnologies.
Collapse
Affiliation(s)
- Joana Soldado-Magraner
- Department of Electrical and Computer Engineering and the Department of Biomedical Engineering, Carnegie Mellon University, Pittsburgh, PA 15213, United States of America
| | - Alberto Antonietti
- Department of Electronics, Information and Bioengineering, Politecnico di Milano, Milano 20131, Italy
| | - Jennifer French
- Neurotech Network, St. Petersburg, FL 33733, United States of America
| | - Nathan Higgins
- School of Psychological Sciences, Monash University, Clayton, VIC 3800, Australia
| | - Michael J Young
- Department of Neurology, Massachusetts General Hospital and Harvard Medical School, Boston, MA 02114, United States of America
| | - Denis Larrivee
- Mind and Brain Institute, University of Navarra Medical School, Pamplona, Navarra 31008, Spain
- Loyola University, Chicago, IL 60611, United States of America
| | - Rebecca Monteleone
- Disability Studies Program, University of Toledo, Toledo, OH 43606, United States of America
| |
Collapse
|
2
|
Livanis E, Voultsos P, Vadikolias K, Pantazakos P, Tsaroucha A. Understanding the Ethical Issues of Brain-Computer Interfaces (BCIs): A Blessing or the Beginning of a Dystopian Future? Cureus 2024; 16:e58243. [PMID: 38745805 PMCID: PMC11091939 DOI: 10.7759/cureus.58243] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Accepted: 04/14/2024] [Indexed: 05/16/2024] Open
Abstract
In recent years, scientific discoveries in the field of neuroscience combined with developments in the field of artificial intelligence have led to the development of a range of neurotechnologies. Advances in neuroimaging systems, neurostimulators, and brain-computer interfaces (BCIs) are leading to new ways of enhancing, controlling, and "reading" the brain. In addition, although BCIs were developed and used primarily in the medical field, they are now increasingly applied in other fields (entertainment, marketing, education, defense industry). We conducted a literature review following the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines to provide background information about ethical issues related to the use of BCIs. Among the ethical issues that emerged from the thematic data analysis of the reviewed studies included questions revolving around human dignity, personhood and autonomy, user safety, stigma and discrimination, privacy and security, responsibility, research ethics, and social justice (including access to this technology). This paper attempts to address the various aspects of these concerns. A variety of distinct ethical issues were identified, which, for the most part, were in line with the findings of prior research. However, we identified two nuances, which are related to the empirical research on ethical issues related to BCIs and the impact of BCIs on international relationships. The paper also highlights the need for the cooperation of all stakeholders to ensure the ethical development and use of this technology and concludes with several recommendations. The principles of bioethics provide an initial guiding framework, which, however, should be revised in the current artificial intelligence landscape so as to be responsive to challenges posed by the development and use of BCIs.
Collapse
Affiliation(s)
- Efstratios Livanis
- Department of Accounting and Finance, University of Macedonia, Thessaloniki, GRC
- Postgraduate Program on Bioethics, School of Medicine, Democritus University of Thrace, Alexandroupoli, GRC
| | - Polychronis Voultsos
- Laboratory of Forensic Medicine & Toxicology (Medical Law and Ethics) School of Medicine, Faculty of Health Sciences, Aristotle University of Thessaloniki, Thessaloniki, GRC
- Postgraduate Program on Bioethics, School of Medicine, Democritus University of Thrace, Alexandroupoli, GRC
| | - Konstantinos Vadikolias
- Postgraduate Program on Bioethics, School of Medicine, Democritus University of Thrace, Alexandroupoli, GRC
- Department of Neurology, University Hospital of Alexandroupolis, Alexandroupoli, GRC
| | - Panagiotis Pantazakos
- Department of Philosophy, School of Philosophy, National and Kapodistrian University of Athens, Athens, GRC
- Postgraduate Program on Bioethics, School of Medicine, Democritus University of Thrace, Alexandroupoli, GRC
| | - Alexandra Tsaroucha
- Postgraduate Program on Bioethics, School of Medicine, Democritus University of Thrace, Alexandroupoli, GRC
| |
Collapse
|
3
|
Meng L, Jiang X, Huang J, Li W, Luo H, Wu D. User Identity Protection in EEG-Based Brain-Computer Interfaces. IEEE Trans Neural Syst Rehabil Eng 2023; 31:3576-3586. [PMID: 37651476 DOI: 10.1109/tnsre.2023.3310883] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
Abstract
A brain-computer interface (BCI) establishes a direct communication pathway between the brain and an external device. Electroencephalogram (EEG) is the most popular input signal in BCIs, due to its convenience and low cost. Most research on EEG-based BCIs focuses on the accurate decoding of EEG signals; however, EEG signals also contain rich private information, e.g., user identity, emotion, and so on, which should be protected. This paper first exposes a serious privacy problem in EEG-based BCIs, i.e., the user identity in EEG data can be easily learned so that different sessions of EEG data from the same user can be associated together to more reliably mine private information. To address this issue, we further propose two approaches to convert the original EEG data into identity-unlearnable EEG data, i.e., removing the user identity information while maintaining the good performance on the primary BCI task. Experiments on seven EEG datasets from five different BCI paradigms showed that on average the generated identity-unlearnable EEG data can reduce the user identification accuracy from 70.01% to at most 21.36%, greatly facilitating user privacy protection in EEG-based BCIs.
Collapse
|
4
|
A Hybrid Lightweight System for Early Attack Detection in the IoMT Fog. SENSORS 2021; 21:s21248289. [PMID: 34960384 PMCID: PMC8708644 DOI: 10.3390/s21248289] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/11/2021] [Revised: 11/29/2021] [Accepted: 12/02/2021] [Indexed: 11/16/2022]
Abstract
Cyber-attack detection via on-gadget embedded models and cloud systems are widely used for the Internet of Medical Things (IoMT). The former has a limited computation ability, whereas the latter has a long detection time. Fog-based attack detection is alternatively used to overcome these problems. However, the current fog-based systems cannot handle the ever-increasing IoMT’s big data. Moreover, they are not lightweight and are designed for network attack detection only. In this work, a hybrid (for host and network) lightweight system is proposed for early attack detection in the IoMT fog. In an adaptive online setting, six different incremental classifiers were implemented, namely a novel Weighted Hoeffding Tree Ensemble (WHTE), Incremental K-Nearest Neighbors (IKNN), Incremental Naïve Bayes (INB), Hoeffding Tree Majority Class (HTMC), Hoeffding Tree Naïve Bayes (HTNB), and Hoeffding Tree Naïve Bayes Adaptive (HTNBA). The system was benchmarked with seven heterogeneous sensors and a NetFlow data infected with nine types of recent attack. The results showed that the proposed system worked well on the lightweight fog devices with ~100% accuracy, a low detection time, and a low memory usage of less than 6 MiB. The single-criteria comparative analysis showed that the WHTE ensemble was more accurate and was less sensitive to the concept drift.
Collapse
|
5
|
Cyberbiosecurity: An Emerging Field that has Ethical Implications for Clinical Neuroscience. Camb Q Healthc Ethics 2021; 30:662-668. [PMID: 34702413 DOI: 10.1017/s096318012100013x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/06/2022]
Abstract
Cyberbiosecurity is an emerging field that relates to the intersection of cybersecurity and the clinical and research practice in the biosciences. Beyond the concerns that usually arise in the areas of genomics, this paper highlights ethical concerns raised by cyberbiosecurity in clinical neuroscience. These concerns relate not only to the privacy of the data collected by imaging devices, but also the concern that patients using various stimulatory devices can be harmed by a hacker who either obfuscates the outputs or who interferes with the stimulatory process. The paper offers some suggestions as to how to rectify these increasingly dire concerns.
Collapse
|
6
|
Quiles Pérez M, Martínez Beltrán ET, López Bernal S, Huertas Celdrán A, Martínez Pérez G. Breaching Subjects' Thoughts Privacy: A Study with Visual Stimuli and Brain-Computer Interfaces. JOURNAL OF HEALTHCARE ENGINEERING 2021; 2021:5517637. [PMID: 34413969 PMCID: PMC8370826 DOI: 10.1155/2021/5517637] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/02/2021] [Revised: 04/29/2021] [Accepted: 08/02/2021] [Indexed: 11/17/2022]
Abstract
Brain-computer interfaces (BCIs) started being used in clinical scenarios, reaching nowadays new fields such as entertainment or learning. Using BCIs, neuronal activity can be monitored for various purposes, with the study of the central nervous system response to certain stimuli being one of them, being the case of evoked potentials. However, due to the sensitivity of these data, the transmissions must be protected, with blockchain being an interesting approach to ensure the integrity of the data. This work focuses on the visual sense, and its relationship with the P300 evoked potential, where several open challenges related to the privacy of subjects' information and thoughts appear when using BCI. The first and most important challenge is whether it would be possible to extract sensitive information from evoked potentials. This aspect becomes even more challenging and dangerous if the stimuli are generated when the subject is not aware or conscious that they have occurred. There is an important gap in this regard in the literature, with only one work existing dealing with subliminal stimuli and BCI and having an unclear methodology and experiment setup. As a contribution of this paper, a series of experiments, five in total, have been created to study the impact of visual stimuli on the brain tangibly. These experiments have been applied to a heterogeneous group of ten subjects. The experiments show familiar visual stimuli and gradually reduce the sampling time of known images, from supraliminal to subliminal. The study showed that supraliminal visual stimuli produced P300 potentials about 50% of the time on average across all subjects. Reducing the sample time between images degraded the attack, while the impact of subliminal stimuli was not confirmed. Additionally, younger subjects generally presented a shorter response latency. This work corroborates that subjects' sensitive data can be extracted using visual stimuli and P300.
Collapse
Affiliation(s)
- Mario Quiles Pérez
- Departamento de Ingeniería de la Información y las Comunicaciones, University of Murcia, Murcia 30100, Spain
| | | | - Sergio López Bernal
- Departamento de Ingeniería de la Información y las Comunicaciones, University of Murcia, Murcia 30100, Spain
| | - Alberto Huertas Celdrán
- Communication Systems Group (CSG), Department of Informatics (IfI), University of Zürich UZH, CH-8050 Zürich, Switzerland
| | - Gregorio Martínez Pérez
- Departamento de Ingeniería de la Información y las Comunicaciones, University of Murcia, Murcia 30100, Spain
| |
Collapse
|
7
|
Abstract
With the advent of the pandemic (e.g., novel corona virus disease 2019 (COVID-19)), a tremendous amount of data about individuals are collected by the health authorities on daily basis for curbing the disease’s spread. The individuals’ data collection/processing at a massive scale for community well-being with the help of digital solutions (e.g., mobile apps for mobility and proximity analysis, contact tracing through credit card usage history, facial recognition through cameras, and crowd analysis using cellular networks data etc.) raise several privacy concerns. Furthermore, the privacy concerns that are arising mainly due to the fine-grained data collection has hindered the response to tackle this pandemic in many countries. Hence, acquiring/handling individuals data with privacy protection has become a vibrant area of research in these pandemic times. This paper explains the shift in privacy paradigm due to the pandemic (e.g., COVID-19) which involves more and detailed data collection about individuals including locations and demographics. We explain technical factors due to which the people’s privacy is at higher risk in the COVID-19 time. In addition, we discuss privacy concerns in different epidemic control measures (ECMs) (e.g., contact tracing, quarantine monitoring, and symptoms reporting etc.) employed by the health authorities to tackle this disease. Further, we provide an insight on the data management in the ECMs with privacy protection. Finally, the future prospects of the research in this area tacking into account the emerging technologies are discussed. Through this brief article, we aim to provide insights about the vulnerability to user’s privacy in pandemic times, likely privacy issues in different ECMs adopted by most countries around the world, how to preserve user’s privacy effectively in all phases of the ECMs considering relevant data in loop, and conceptual foundations of ECMs to fight with future pandemics in a privacy preserving manner.
Collapse
|
8
|
Hameed SS, Hassan WH, Abdul Latiff L, Ghabban F. A systematic review of security and privacy issues in the internet of medical things; the role of machine learning approaches. PeerJ Comput Sci 2021; 7:e414. [PMID: 33834100 PMCID: PMC8022640 DOI: 10.7717/peerj-cs.414] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/16/2020] [Accepted: 02/04/2021] [Indexed: 05/27/2023]
Abstract
BACKGROUND The Internet of Medical Things (IoMTs) is gradually replacing the traditional healthcare system. However, little attention has been paid to their security requirements in the development of the IoMT devices and systems. One of the main reasons can be the difficulty of tuning conventional security solutions to the IoMT system. Machine Learning (ML) has been successfully employed in the attack detection and mitigation process. Advanced ML technique can also be a promising approach to address the existing and anticipated IoMT security and privacy issues. However, because of the existing challenges of IoMT system, it is imperative to know how these techniques can be effectively utilized to meet the security and privacy requirements without affecting the IoMT systems quality, services, and device's lifespan. METHODOLOGY This article is devoted to perform a Systematic Literature Review (SLR) on the security and privacy issues of IoMT and their solutions by ML techniques. The recent research papers disseminated between 2010 and 2020 are selected from multiple databases and a standardized SLR method is conducted. A total of 153 papers were reviewed and a critical analysis was conducted on the selected papers. Furthermore, this review study attempts to highlight the limitation of the current methods and aims to find possible solutions to them. Thus, a detailed analysis was carried out on the selected papers through focusing on their methods, advantages, limitations, the utilized tools, and data. RESULTS It was observed that ML techniques have been significantly deployed for device and network layer security. Most of the current studies improved traditional metrics while ignored performance complexity metrics in their evaluations. Their studies environments and utilized data barely represent IoMT system. Therefore, conventional ML techniques may fail if metrics such as resource complexity and power usage are not considered.
Collapse
Affiliation(s)
- Shilan S. Hameed
- Malaysia-Japan International Institute of Technology (MJIIT), Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia
- Directorate of Information Technology, Koya University, Koya, Kurdistan Region, Iraq
| | - Wan Haslina Hassan
- Malaysia-Japan International Institute of Technology (MJIIT), Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia
| | - Liza Abdul Latiff
- Razak Faculty of Technology and Informatics, Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia
| | - Fahad Ghabban
- Information Systems Department, College of Computer Sciences and Engineering, Taibah University, Medina, Saudi Arabia
| |
Collapse
|
9
|
Abstract
The prospect and potentiality of interfacing minds with machines has long captured human imagination. Recent advances in biomedical engineering, computer science, and neuroscience are making brain–computer interfaces a reality, paving the way to restoring and potentially augmenting human physical and mental capabilities. Applications of brain–computer interfaces are being explored in applications as diverse as security, lie detection, alertness monitoring, gaming, education, art, and human cognition augmentation. The present tutorial aims to survey the principal features and challenges of brain–computer interfaces (such as reliable acquisition of brain signals, filtering and processing of the acquired brainwaves, ethical and legal issues related to brain–computer interface (BCI), data privacy, and performance assessment) with special emphasis to biomedical engineering and automation engineering applications. The content of this paper is aimed at students, researchers, and practitioners to glimpse the multifaceted world of brain–computer interfacing.
Collapse
|
10
|
Rathi N, Singla R, Tiwari S. Authentication framework for security application developed using a pictorial P300 speller. BRAIN-COMPUTER INTERFACES 2020. [DOI: 10.1080/2326263x.2020.1860520] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
Affiliation(s)
- Nikhil Rathi
- ICE Department, Dr. B. R. Ambedkar NIT Jalandhar , Jalandhar, Punjab, India
| | - Rajesh Singla
- ICE Department, Dr. B. R. Ambedkar NIT Jalandhar , Jalandhar, Punjab, India
| | - Sheela Tiwari
- ICE Department, Dr. B. R. Ambedkar NIT Jalandhar , Jalandhar, Punjab, India
| |
Collapse
|