Ethical implications of visual neuroprostheses—A systematic review

EAM Van Velthoven… - Journal of neural …, 2022 - iopscience.iop.org
Objective. The aim of this review was to systematically identify the ethical implications of
visual neuroprostheses. Approach. A systematic search was performed in both PubMed and …

Research philosophy, design and methodology

UM Mbanaso, L Abrahams, KC Okafor - Research Techniques for …, 2023 - Springer
This chapter emphasizes that the researcher must be grounded in a clearly stated research
philosophy, early in the research process. The chapter discusses ontology, epistemology …

Cyberneurosecurity

N Liv, D Greenbaum - … , Identity, and Neurotechnology: The Neuroethics of …, 2023 - Springer
Cyberbiosecurity is an emerging field that brings together diverse professionals, including
biologists, computer scientists, anti-terrorism experts, and policy makers to research the …

Memory enhancement and brain–computer Interface devices: technological possibilities and constitutional challenges

MJ Blitz, W Barfield - … , identity, and Neurotechnology: The Neuroethics of …, 2023 - Springer
The most well-known example of brain–computer interface technology (BCI) is a device that
allows a direct communication pathway to occur between the brain's electrical activity and …

Mapping the emerging legal landscape for neuroprostheses: human interests and legal resources

TB Akmazoglu, JA Chandler - Developments in neuroethics and bioethics, 2021 - Elsevier
We are now within a rapidly advancing wave of innovation in neurotechnology integrated
with artificial intelligence. Among the innovations are neuroprosthetic devices such as …

The Upper Limit: An Essay on Mental Integrity and Mental Enhancement

HMG Martins - Medicine, Law & Society, 2022 - journals.um.si
Brain Computer Interface (BCI) technology is currently used for therapeutic ends but can
also be used for enhancing human mental capacities. This essay focuses on non …

[图书][B] The Views of Information Security Professionals Toward Information Security Objectives: Confidentiality, Integrity, and Availability Triad

M Unigwe - 2022 - search.proquest.com
The views of information security (IS) professionals toward CIA (confidentiality, integrity, and
availability) security objectives in the organization highlighted an area of critical research …

[PDF][PDF] Royal Netherlands Academy of Arts and Sciences (KNAW)

EAM van Velthoven, OC van Stuijvenberg… - pure.knaw.nl
Objective. The aim of this review was to systematically identify the ethical implications of
visual neuroprostheses. Approach. A systematic search was performed in both PubMed and …

[图书][B] Calculating the Scientific Values of Cybersecurity: A Mixed Methods Study

ME Worman - 2019 - search.proquest.com
This exploratory, sequential mixed method study examined axiological characteristics of a
small sample (n= 3) of well-known and widely published cybersecurity models. The three …