{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T10:53:37Z","timestamp":1726224817522},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031377440"},{"type":"electronic","value":"9783031377457"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37745-7_12","type":"book-chapter","created":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T21:01:48Z","timestamp":1690578108000},"page":"166-178","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Ethical Discussion on\u00a0BCI-Based Authentication"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6806-9691","authenticated-orcid":false,"given":"Tyree","family":"Lewis","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3764-1931","authenticated-orcid":false,"given":"Rupal","family":"Agarwal","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6233-9593","authenticated-orcid":false,"given":"Marvin","family":"Andujar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,29]]},"reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-017-0110-7","volume":"5","author":"K Abouelmehdi","year":"2018","unstructured":"Abouelmehdi, K., Beni-Hessane, A., Khaloufi, H.: Big healthcare data: preserving security and privacy. J. Big Data 5(1), 1\u201318 (2018). https:\/\/doi.org\/10.1186\/s40537-017-0110-7","journal-title":"J. Big Data"},{"key":"12_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2019.100003","volume":"1","author":"S Aggarwal","year":"2019","unstructured":"Aggarwal, S., Chugh, N.: Signal processing techniques for motor imagery brain computer interface: a review. Array 1, 100003 (2019)","journal-title":"Array"},{"key":"12_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2020.102172","volume":"63","author":"A Al-Saegh","year":"2021","unstructured":"Al-Saegh, A., Dawwd, S.A., Abdul-Jabbar, J.M.: Deep learning for motor imagery EEG-based classification: a review. Biomed. Signal Process. Control 63, 102172 (2021)","journal-title":"Biomed. Signal Process. Control"},{"issue":"4","key":"12_CR4","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3390\/philosophies5040031","volume":"5","author":"A Coin","year":"2020","unstructured":"Coin, A., Mulder, M., Dubljevi\u0107, V.: Ethical aspects of BCI technology: what is the state of the art? Philosophies 5(4), 31 (2020)","journal-title":"Philosophies"},{"issue":"5","key":"12_CR5","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1080\/00140139.2012.662527","volume":"55","author":"JI Ekandem","year":"2012","unstructured":"Ekandem, J.I., Davis, T.A., Alvarez, I., James, M.T., Gilbert, J.E.: Evaluating the ergonomics of BCI devices for research and experimentation. Ergonomics 55(5), 592\u2013598 (2012)","journal-title":"Ergonomics"},{"issue":"9","key":"12_CR6","doi-asserted-by":"publisher","first-page":"1426","DOI":"10.1111\/j.1528-1167.2005.31405.x","volume":"46","author":"RS Fisher","year":"2005","unstructured":"Fisher, R.S., Harding, G., Erba, G., Barkley, G.L., Wilkins, A.: Photic-and pattern-induced seizures: a review for the epilepsy foundation of America working group. Epilepsia 46(9), 1426\u20131441 (2005)","journal-title":"Epilepsia"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Gembler, F., Stawicki, P., Volosyak, I.: Exploring the possibilities and limitations of multitarget SSVEP-based BCI applications. In: 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), pp. 1488\u20131491. IEEE (2016)","DOI":"10.1109\/EMBC.2016.7590991"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"60","DOI":"10.3389\/fnins.2012.00060","volume":"6","author":"C Guger","year":"2012","unstructured":"Guger, C., Krausz, G., Allison, B.Z., Edlinger, G.: Comparison of dry and gel based electrodes for p300 brain-computer interfaces. Front. Neurosci. 6, 60 (2012)","journal-title":"Front. Neurosci."},{"issue":"9","key":"12_CR9","doi-asserted-by":"publisher","first-page":"1352","DOI":"10.1016\/j.neunet.2009.06.046","volume":"22","author":"P Haselager","year":"2009","unstructured":"Haselager, P., Vlek, R., Hill, J., Nijboer, F.: A note on ethical aspects of BCI. Neural Netw. 22(9), 1352\u20131357 (2009)","journal-title":"Neural Netw."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Marcel, S., Mill\u00e1n, J.d.R.: Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 743\u2013752 (2007)","DOI":"10.1109\/TPAMI.2007.1012"},{"issue":"6","key":"12_CR11","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.3390\/s19061423","volume":"19","author":"N Padfield","year":"2019","unstructured":"Padfield, N., Zabalza, J., Zhao, H., Masero, V., Ren, J.: EEG-based brain-computer interfaces using motor-imagery: techniques and challenges. Sensors 19(6), 1423 (2019)","journal-title":"Sensors"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"5994","DOI":"10.1109\/ACCESS.2018.2889996","volume":"7","author":"Z Rui","year":"2018","unstructured":"Rui, Z., Yan, Z.: A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access 7, 5994\u20136009 (2018)","journal-title":"IEEE Access"},{"issue":"5","key":"12_CR13","doi-asserted-by":"publisher","first-page":"3729","DOI":"10.3906\/elk-1805-32","volume":"27","author":"S Sadeghi","year":"2019","unstructured":"Sadeghi, S., Maleki, A.: Adaptive canonical correlation analysis for harmonic stimulation frequencies recognition in SSVEP-based BCIS. Turkish J. Elect. Eng. Comput. Sci. 27(5), 3729\u20133740 (2019)","journal-title":"Turkish J. Elect. Eng. Comput. Sci."},{"issue":"2","key":"12_CR14","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1097\/NPT.0b013e31825064cc","volume":"36","author":"RJ Vlek","year":"2012","unstructured":"Vlek, R.J., et al.: Ethical issues in brain-computer interface research, development, and dissemination. J. Neurol. Phys. Ther. 36(2), 94\u201399 (2012)","journal-title":"J. Neurol. Phys. Ther."},{"issue":"5","key":"12_CR15","doi-asserted-by":"publisher","DOI":"10.1088\/1741-2552\/aaca6e","volume":"15","author":"R Zerafa","year":"2018","unstructured":"Zerafa, R., Camilleri, T., Falzon, O., Camilleri, K.P.: To train or not to train? A survey on training of feature extraction methods for SSVEP-based BCIS. J. Neural Eng. 15(5), 051001 (2018)","journal-title":"J. Neural Eng."}],"container-title":["Lecture Notes in Computer Science","Pattern Recognition, Computer Vision, and Image Processing. ICPR 2022 International Workshops and Challenges"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37745-7_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T21:07:09Z","timestamp":1690578429000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37745-7_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031377440","9783031377457"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37745-7_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montr\u00e9al, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpr2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iapr.org\/icpr2022","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}