Consider an example model of an attacker who uses
BCIs to extract private information about users. We assume
this will involve non-invasive BCI devices, mostly intended
for consumer use. Manufacturers of non-invasive EEG-based
BCIs generally distribute software development kits and guides
with their products, as well as technical support. Their intention
is to promote application development, but such “opendevelopment”
platforms may compromise user privacy and security,
since there is currently no review process, standards and
guidelines in place to protect users, nor technical protection to
restrict inappropriate or malicious BCI use.
Consider an example model of an attacker who usesBCIs to extract private information about users. We assumethis will involve non-invasive BCI devices, mostly intendedfor consumer use. Manufacturers of non-invasive EEG-basedBCIs generally distribute software development kits and guideswith their products, as well as technical support. Their intentionis to promote application development, but such “opendevelopment”platforms may compromise user privacy and security,since there is currently no review process, standards andguidelines in place to protect users, nor technical protection torestrict inappropriate or malicious BCI use.
การแปล กรุณารอสักครู่..
