dc.contributor.author | Lahtinen, Tuomo | |
dc.contributor.author | Costin, Andrei | |
dc.contributor.author | Suarez-Tangil, Guillermo | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Karjalainen, Mika | |
dc.date.accessioned | 2024-06-27T12:23:37Z | |
dc.date.available | 2024-06-27T12:23:37Z | |
dc.date.issued | 2024 | |
dc.identifier.citation | Lahtinen, T., Costin, A., & Suarez-Tangil, G. (2024). Brain-Computer Interface Integration With Extended Reality (XR) : Future, Privacy And Security Outlook. In M. Lehto, & M. Karjalainen (Eds.), <i>Proceedings of the 23rd European Conference on Cyber Warfare and Security</i> (23, pp. 265-271). Academic Conferences International Ltd. Proceedings of the European Conference on Cyber Warfare and Security. <a href="https://doi.org/10.34190/eccws.23.1.2284" target="_blank">https://doi.org/10.34190/eccws.23.1.2284</a> | |
dc.identifier.other | CONVID_220852062 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/96209 | |
dc.description.abstract | The Brain-Computer Interface (BCI) is a rapidly evolving technology set to revolutionize our perception of the Internet of Things (IoT). BCI facilitates direct communication between the brain and external devices, enabling the control or interaction of devices without physical intervention. BCI technology is becoming more sophisticated, allowing third-party software embedded in emerging technologies such as Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR) to access sensors that read brain activity. These can be grouped under the umbrella term Extended Reality (XR). While BCI technology is disrupting the way data is collected, interpreted, and utilized within IoT networks, it is important to consider the potential privacy and security threats that it poses. Previous and not-so-recent cybersecurity research only scratched the surface in terms of security and privacy aspects of the then-emerging neural and brain-connecting technologies. However, recent advances in reconstructing language, music tracks, and imagery solely based on decoding neural signals pose a significant risk of mental privacy invasion and cybersecurity abuse. In this paper, we present an analysis of the potential threats posed by the integration of BCI with VR, AR, and MR. We analyze the involvement of major technological players in shaping BCI and XR advancements, examining the potential for these technologies to create detailed user profiles and reshape the monetization of user data in the ever-more-aggressive data-driven economy. We also outline a position view on the cybersecurity aspects that are not related to privacy and profiling per se, for example, cybersecurity attacks on the brain (e.g., ``brain rewriting'' attacks) facilitated by potentially vulnerable XR-BCI devices and software. The paper concludes by emphasizing the need for further research on the privacy and security implications of XR-BCI integration and inviting deeper exploration of the topic beyond theoretical papers and toward a more applied experimental setup. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Academic Conferences International Ltd | |
dc.relation.ispartof | Proceedings of the 23rd European Conference on Cyber Warfare and Security | |
dc.relation.ispartofseries | Proceedings of the European Conference on Cyber Warfare and Security | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | brain-computer interface | |
dc.subject.other | extended reality | |
dc.subject.other | privacy | |
dc.subject.other | big tech | |
dc.subject.other | cybersecurity | |
dc.subject.other | metaverse | |
dc.title | Brain-Computer Interface Integration With Extended Reality (XR) : Future, Privacy And Security Outlook | |
dc.type | conferenceObject | |
dc.identifier.urn | URN:NBN:fi:jyu-202406275051 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | |
dc.type.coar | http://purl.org/coar/resource_type/c_5794 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 265-271 | |
dc.relation.issn | 2048-8602 | |
dc.relation.numberinseries | 1 | |
dc.relation.volume | 23 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2024 European Conference on Cyber Warfare and Security | |
dc.rights.accesslevel | openAccess | fi |
dc.relation.conference | European Conference on Cyber Warfare and Security | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | lisätty todellisuus | |
dc.subject.yso | yksityisyys | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25016 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p10909 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.34190/eccws.23.1.2284 | |
jyx.fundinginformation | Tuomo Lahtinen was supported by a grant from the Doctoral School, Faculty of Information Technology at the University of Jyväskylä. G. Suarez-Tangil was supported by INCIBE’s strategic project CIBERSEGURIDAD EINA UNIZAR, RYC-2020-029401-I, and TED2021-132900A-I00 funded by MCIN/AEI/10.13039/ 501100011033, NextGenerationEU/PRTR (Plan de Recuperación, Transformación y Resiliencia) and ESF. | |
dc.type.okm | A4 | |