Show simple item record

dc.contributor.authorLahtinen, Tuomo
dc.contributor.authorCostin, Andrei
dc.contributor.editorShishkov, Boris
dc.date.accessioned2024-01-12T08:26:13Z
dc.date.available2024-01-12T08:26:13Z
dc.date.issued2023
dc.identifier.citationLahtinen, T., & Costin, A. (2023). Linking Computers to the Brain : Overview of Cybersecurity Threats and Possible Solutions. In B. Shishkov (Ed.), <i>Business Modeling and Software Design : 13th International Symposium, BMSD 2023, Utrecht, The Netherlands, July 3-5, 2023, Proceedings</i> (pp. 383-392). Springer Nature Switzerland. Lecture Notes in Business Information Processing, 483. <a href="https://doi.org/10.1007/978-3-031-36757-1_29" target="_blank">https://doi.org/10.1007/978-3-031-36757-1_29</a>
dc.identifier.otherCONVID_183766706
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/92756
dc.description.abstractThe brain-computer interface (BCI) is a growing field of technology, and it has become clear that BCI systems’ cybersecurity needs amelioration. When BCI devices are developed with wireless connection capabilities, more often than not, this creates more surface area for attackers to concentrate their attacks. The more invasive BCI technology is used, the greater the threat to the users’ physical health. In this paper, we summarize and outline the main cybersecurity threats and challenges that BCI systems may face now and in the future. Furthermore, we present avenues for the future BCI systems including cybersecurity solutions and requirements. We emphasize the importance of the health layer to be considered as important as technical layers in BCI systems as people cannot endure life-threatening situations where attackers could cause permanent brain damage to the BCI user.en
dc.format.extent394
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherSpringer Nature Switzerland
dc.relation.ispartofBusiness Modeling and Software Design : 13th International Symposium, BMSD 2023, Utrecht, The Netherlands, July 3-5, 2023, Proceedings
dc.relation.ispartofseriesLecture Notes in Business Information Processing
dc.rightsIn Copyright
dc.subject.otherbrain-computer interface
dc.subject.otherdeep brain stimulation
dc.subject.othercybersecurity
dc.subject.othervulnerability
dc.subject.otherprivacy
dc.titleLinking Computers to the Brain : Overview of Cybersecurity Threats and Possible Solutions
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202401121257
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingfi
dc.contributor.oppiaineTekniikkafi
dc.contributor.oppiaineSecure Communications Engineering and Signal Processingen
dc.contributor.oppiaineEngineeringen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-3-031-36756-4
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange383-392
dc.relation.issn1865-1348
dc.type.versionacceptedVersion
dc.rights.copyright© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceInternational Symposium on Business Modeling and Software Design
dc.subject.ysosyväaivostimulaatio
dc.subject.ysoyksityisyys
dc.subject.ysohaavoittuvuus
dc.subject.ysokyberturvallisuus
dc.subject.ysotietosuoja
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p38675
jyx.subject.urihttp://www.yso.fi/onto/yso/p10909
jyx.subject.urihttp://www.yso.fi/onto/yso/p25011
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p3636
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.relation.doi10.1007/978-3-031-36757-1_29
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

In Copyright
Except where otherwise noted, this item's license is described as In Copyright