Human Enhancement: Could you become infected with a computer virus?
@article{Gasson2010HumanEC, title={Human Enhancement: Could you become infected with a computer virus?}, author={Mark Gasson}, journal={2010 IEEE International Symposium on Technology and Society}, year={2010}, pages={61-68} }
Experiments demonstrating human enhancement through the implantation of technology in healthy humans have been performed for over a decade by some academic research groups. More recently, technology enthusiasts have begun to realize the potential of implantable technology such as glass capsule RFID transponders. In this paper it is argued that implantable RFID devices have evolved to the point whereby we should consider the devices themselves as simple computers. Presented here is the infection…
Figures from this paper
17 Citations
Attacking Human Implants: A New Generation of Cybercrime
- Computer Science
- 2013
Attacks on human implants are not only a new generation in the evolution of cybercrime, but also raise fundamental questions on how criminal law conceives of attacks.
Science Fiction Twenty Years Ago, a Nanotechnology Reality Today: Human Microchip Implants
- Computer Science
- 2018
The history of RFID chip and how it has evolved overtime will be examined, along with views from scientists and possible uses of the technology in different fields will be discussed.
Human ICT Implants: From Restorative Application to Human Enhancement
- Medicine
- 2012
This chapter makes the case that with the desire of technology enthusiasts and self-experimenters to push boundaries, increasing familiarity driving cultural and societal changes, advances in medical technology and the inevitable drift of medical technology to non-medical application, this is clearly just the beginning for human enhancement using ICT implants.
RFID in Healthcare – Current Trends and the Future
- Computer ScienceMobile Health
- 2015
RFID technology is deployed in a wide range of industries such as supply chain management, inventory control, farming, farming (to track animals), e-Passports, the tracking of humans (in prisons and hospitals) and in healthcare.
Implantable Medical Devices : Device security and emergency access
- Computer Science
- 2016
A novel seizure-detection algorithm that may be used by IMDs for the treatment of epilepsy is discussed and how such an IMD could benefit from wireless data exchange is described, based on a heterogeneous system-on-chip architecture and a lightweight security protocol.
A system architecture, processor, and communication protocol for secure implants
- Computer ScienceACM Trans. Archit. Code Optim.
- 2013
A new implant system architecture is proposed, where security and main-implant functionality are made completely decoupled by running the tasks onto two separate cores, achieving high security levels at 56% energy savings and at an area overhead of less than 15%.
Go 'Get Chipped': A Brief Overview of Non-Medical Implants between 1997-2013 (Part 1)
- ArtIEEE Technol. Soc. Mag.
- 2017
The social implications of microchipping people and how this technology could be used for everyday banking and telecommunications applications as a blackbox implant able in the arm or upper torso are researched.
Cheating with implants : Implications of the hidden information advantage of bionic ears and eyes
- Computer Science
- 2011
The normative implications of this hypothetical form of human enhancement are discussed, focusing on aspects that are particularly relevant to this type of enhancement as compared to existing and well-discussed other forms of enhancement.
Is Human Enhancement also a Personal Matter?
- PsychologySci. Eng. Ethics
- 2013
It is suggested that a comprehensive approach to define human enhancement could constitute a useful premise to appropriately address the complexity of the ethical and social issues it generates.
Mapping the emerging legal landscape for neuroprostheses: Human interests and legal resources
- LawRegulating Neuroscience: Transnational Legal Challenges
- 2021
References
SHOWING 1-10 OF 33 REFERENCES
Is your cat infected with a computer virus?
- Computer ScienceFourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06)
- 2006
This paper presents the first self-replicating RFID virus, which uses RFID tags as a vector to compromise backend RFID middleware systems, via a SQL injection attack.
Hands On
- Computer ScienceIEEE Spectrum
- 2007
The idea of a hobbyist having a radiofrequency identification (RFID) tag implanted in him is discussed.
The Disappearing Computer
- Computer Science
- 2007
Model-driven development of embedded systems is needed to achieve the required product quality in a cost-effective way because of a lack of appropriate modeling abstractions to predict system properties of embedded system properties early during development.
Becoming Borg to Become Immortal: Regulating Brain Implant Technologies
- ArtCambridge Quarterly of Healthcare Ethics
- 2007
Describing advances in hybrid brain–machine interfaces, offers some likely hypotheses concerning future developments, reflects on the implications of combining cloning and transplanted brain chips, and suggests some potential methods of regulating these technologies.
Security and Privacy for Implantable Medical Devices
- MedicineIEEE Pervasive Computing
- 2008
The latest IMDs support delivery of telemetry for remote monitoring over long-range, high-bandwidth wireless links, and emerging devices will communicate with other interoperating IMDs.
The application of implant technology for cybernetic systems.
- MedicineArchives of neurology
- 2003
The response to stimulation improved considerably during the trial, suggesting that the subject learned to process the incoming information more effectively, and may allow recipients to have abilities they would otherwise not possess.
The basis of the FDA's decision on breast implants.
- MedicineThe New England journal of medicine
- 1992
On April 16, 1992, the Food and Drug Administration announced that breast implants filled with silicone gel would be available only through controlled clinical studies and that women who need such…
Invasive neural prosthesis for neural signal detection and nerve stimulation
- Engineering
- 2004
The aim of the study was to assess the efficacy, compatibility, and long term operability of the neural implant in allowing the subject to perceive feedback stimulation and for neural activity to be detected and processed such that the subject could interact with remote technologies.
Wearable Computing: A First Step Toward Personal Imaging
- ArtComputer
- 1997
The wearable personal imaging system was designed and built to explore new concepts in imaging and lighting, and differed from present-day laptops and personal digital assistants in that it could keep an eye on the screen while walking around and doing other things.
Innovative Automatic Identification and Location-Based Services: From Bar Codes to Chip Implants
- Computer Science
- 2009
Recording the history of automatic identification, this book discusses the social, cultural, and ethical implications of the technological possibilities with respect to national security initiatives.