Show simple item record

dc.contributor.authorLahtinen, Tuomo
dc.contributor.authorCostin, Andrei
dc.contributor.authorSuarez-Tangil, Guillermo
dc.contributor.editorLehto, Martti
dc.contributor.editorKarjalainen, Mika
dc.date.accessioned2024-06-27T12:23:37Z
dc.date.available2024-06-27T12:23:37Z
dc.date.issued2024
dc.identifier.citationLahtinen, T., Costin, A., & Suarez-Tangil, G. (2024). Brain-Computer Interface Integration With Extended Reality (XR) : Future, Privacy And Security Outlook. In M. Lehto, & M. Karjalainen (Eds.), <i>Proceedings of the 23rd European Conference on Cyber Warfare and Security</i> (23, pp. 265-271). Academic Conferences International Ltd. Proceedings of the European Conference on Cyber Warfare and Security. <a href="https://doi.org/10.34190/eccws.23.1.2284" target="_blank">https://doi.org/10.34190/eccws.23.1.2284</a>
dc.identifier.otherCONVID_220852062
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/96209
dc.description.abstractThe Brain-Computer Interface (BCI) is a rapidly evolving technology set to revolutionize our perception of the Internet of Things (IoT). BCI facilitates direct communication between the brain and external devices, enabling the control or interaction of devices without physical intervention. BCI technology is becoming more sophisticated, allowing third-party software embedded in emerging technologies such as Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR) to access sensors that read brain activity. These can be grouped under the umbrella term Extended Reality (XR). While BCI technology is disrupting the way data is collected, interpreted, and utilized within IoT networks, it is important to consider the potential privacy and security threats that it poses. Previous and not-so-recent cybersecurity research only scratched the surface in terms of security and privacy aspects of the then-emerging neural and brain-connecting technologies. However, recent advances in reconstructing language, music tracks, and imagery solely based on decoding neural signals pose a significant risk of mental privacy invasion and cybersecurity abuse. In this paper, we present an analysis of the potential threats posed by the integration of BCI with VR, AR, and MR. We analyze the involvement of major technological players in shaping BCI and XR advancements, examining the potential for these technologies to create detailed user profiles and reshape the monetization of user data in the ever-more-aggressive data-driven economy. We also outline a position view on the cybersecurity aspects that are not related to privacy and profiling per se, for example, cybersecurity attacks on the brain (e.g., ``brain rewriting'' attacks) facilitated by potentially vulnerable XR-BCI devices and software. The paper concludes by emphasizing the need for further research on the privacy and security implications of XR-BCI integration and inviting deeper exploration of the topic beyond theoretical papers and toward a more applied experimental setup.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International Ltd
dc.relation.ispartofProceedings of the 23rd European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European Conference on Cyber Warfare and Security
dc.rightsCC BY-NC-ND 4.0
dc.subject.otherbrain-computer interface
dc.subject.otherextended reality
dc.subject.otherprivacy
dc.subject.otherbig tech
dc.subject.othercybersecurity
dc.subject.othermetaverse
dc.titleBrain-Computer Interface Integration With Extended Reality (XR) : Future, Privacy And Security Outlook
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202406275051
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange265-271
dc.relation.issn2048-8602
dc.relation.numberinseries1
dc.relation.volume23
dc.type.versionpublishedVersion
dc.rights.copyright© 2024 European Conference on Cyber Warfare and Security
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysokyberturvallisuus
dc.subject.ysolisätty todellisuus
dc.subject.ysoyksityisyys
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p25016
jyx.subject.urihttp://www.yso.fi/onto/yso/p10909
dc.rights.urlhttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.relation.doi10.34190/eccws.23.1.2284
jyx.fundinginformationTuomo Lahtinen was supported by a grant from the Doctoral School, Faculty of Information Technology at the University of Jyväskylä. G. Suarez-Tangil was supported by INCIBE’s strategic project CIBERSEGURIDAD EINA UNIZAR, RYC-2020-029401-I, and TED2021-132900A-I00 funded by MCIN/AEI/10.13039/ 501100011033, NextGenerationEU/PRTR (Plan de Recuperación, Transformación y Resiliencia) and ESF.
dc.type.okmA4


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC BY-NC-ND 4.0
Except where otherwise noted, this item's license is described as CC BY-NC-ND 4.0