Skip to main content

Thank you for visiting You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Separating neuroethics from neurohype

Access options

Rent or Buy article

Get time limited or full article access on ReadCube.


All prices are NET prices.


  1. 1.

    Ienca, M., Haselager, P. & Emanuel, E. J. Nat. Biotechnol. 36, 805–810 (2018).

    CAS  Article  Google Scholar 

  2. 2.

    Ariely, D. & Berns, G. S. Nat. Rev. Neurosci. 11, 284–292 (2010).

    CAS  Article  Google Scholar 

  3. 3.

    Boto, E. et al. Nature 555, 657–661 (2018).

    CAS  Article  Google Scholar 

  4. 4.

    Price, M. Science (2018).

  5. 5.

    Bonaci, T., Herron, J., Libey, T., Mogen, B. & Chizeck, H. AJOB Neurosci. 6, 82–83 (2015).

    Google Scholar 

  6. 6.

    Martinovic, I. et al. On the feasibility of side-channel attacks with brain-computer interfaces. Security ’12 Proceedings of the 21st USENIX Conference on Security Symposium (USENIX Association, 2012);

  7. 7.

    Farwell, L. A. & Donchin, E. Electroencephalogr. Clin. Neurophysiol. 70, 510–523 (1988).

    CAS  Article  Google Scholar 

  8. 8.

    Chen, Y., Li, T., Zhang, R., Zhang, Y. & Hedgpeth, T. EyeTell: video-assisted touchscreen keystroke inference from eye movements. in 2018 IEEE Symposium on Security and Privacy 144–160 (2018);

  9. 9.

    Wang, C., Guo, X., Wang, Y., Chen, Y. & Liu, B. Friend or foe?: your wearable devices reveal your personal PIN. in ASIA CCS ’16 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security 189–200 (ACM Press, 2016);

  10. 10.

    Cai, L. & Chen, H. TouchLogger: inferring keystrokes on touch screen from smartphone motion. (2011).

  11. 11.

    Shukla, D., Kumar, R., Serwadda, A. & Phoha, V.V. Beware, your hands reveal your secrets! in CCS ’14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 904–917 (ACM, 2014);

  12. 12.

    Lange, J., Massart, C., Mouraux, A. & Standaert, F.-X. in Constructive Side-Channel Analysis and Secure Design 10348, 171–189 (Springer, 2017).

  13. 13.

    Widge, A. S. et al. Am. J. Psychiatry 176, 44–56 (2018).

    Article  Google Scholar 

  14. 14.

    Sweeney, L. J. Law Med. Ethics 25, 98–110, 82 (1997).

  15. 15.

    Wexler, A. & Thibault, R. J. Cogn. Enhanc. 3, 131–137 (2018).

    Article  Google Scholar 

  16. 16.

    Racine, E., Martin Rubio, T., Chandler, J., Forlini, C. & Lucke, J. Med. Health Care Philos. 17, 325–337 (2014).

    Article  Google Scholar 

Download references

Author information



Corresponding author

Correspondence to Anna Wexler.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Wexler, A. Separating neuroethics from neurohype. Nat Biotechnol 37, 988–990 (2019).

Download citation

Further reading


Quick links

Nature Briefing

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing