Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • Correspondence
  • Published:

Separating neuroethics from neurohype

This is a preview of subscription content, access via your institution

Relevant articles

Open Access articles citing this article.

Access options

Buy this article

Prices may be subject to local taxes which are calculated during checkout

References

  1. Ienca, M., Haselager, P. & Emanuel, E. J. Nat. Biotechnol. 36, 805–810 (2018).

    Article  CAS  Google Scholar 

  2. Ariely, D. & Berns, G. S. Nat. Rev. Neurosci. 11, 284–292 (2010).

    Article  CAS  Google Scholar 

  3. Boto, E. et al. Nature 555, 657–661 (2018).

    Article  CAS  Google Scholar 

  4. Price, M. Science https://doi.org/10.1126/science.aat6570 (2018).

  5. Bonaci, T., Herron, J., Libey, T., Mogen, B. & Chizeck, H. AJOB Neurosci. 6, 82–83 (2015).

    Google Scholar 

  6. Martinovic, I. et al. On the feasibility of side-channel attacks with brain-computer interfaces. Security ’12 Proceedings of the 21st USENIX Conference on Security Symposium (USENIX Association, 2012); https://www.usenix.org/conference/usenixsecurity12/technicalsessions/presentation/martinovic

  7. Farwell, L. A. & Donchin, E. Electroencephalogr. Clin. Neurophysiol. 70, 510–523 (1988).

    Article  CAS  Google Scholar 

  8. Chen, Y., Li, T., Zhang, R., Zhang, Y. & Hedgpeth, T. EyeTell: video-assisted touchscreen keystroke inference from eye movements. in 2018 IEEE Symposium on Security and Privacy 144–160 (2018); https://doi.org/10.1109/SP.2018.00010

  9. Wang, C., Guo, X., Wang, Y., Chen, Y. & Liu, B. Friend or foe?: your wearable devices reveal your personal PIN. in ASIA CCS ’16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security 189–200 (ACM Press, 2016); https://doi.org/10.1145/2897845.2897847

  10. Cai, L. & Chen, H. TouchLogger: inferring keystrokes on touch screen from smartphone motion. https://www.usenix.org/legacy/events/hotsec11/tech/final_files/Cai.pdf (2011).

  11. Shukla, D., Kumar, R., Serwadda, A. & Phoha, V.V. Beware, your hands reveal your secrets! in CCS ’14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 904–917 (ACM, 2014); https://doi.org/10.1145/2660267.2660360

  12. Lange, J., Massart, C., Mouraux, A. & Standaert, F.-X. in Constructive Side-Channel Analysis and Secure Design 10348, 171–189 (Springer, 2017).

  13. Widge, A. S. et al. Am. J. Psychiatry 176, 44–56 (2018).

    Article  Google Scholar 

  14. Sweeney, L. J. Law Med. Ethics 25, 98–110, 82 (1997).

  15. Wexler, A. & Thibault, R. J. Cogn. Enhanc. 3, 131–137 (2018).

    Article  Google Scholar 

  16. Racine, E., Martin Rubio, T., Chandler, J., Forlini, C. & Lucke, J. Med. Health Care Philos. 17, 325–337 (2014).

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anna Wexler.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wexler, A. Separating neuroethics from neurohype. Nat Biotechnol 37, 988–990 (2019). https://doi.org/10.1038/s41587-019-0230-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1038/s41587-019-0230-z

This article is cited by

Search

Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing