2010 IEEE International Symposium on Technology and Society 2010
DOI: 10.1109/istas.2010.5514651
|View full text |Cite
|
Sign up to set email alerts
|

Human Enhancement: Could you become infected with a computer virus?

Abstract: Experiments demonstrating human enhancement through the implantation of technology in healthy humans have been performed for over a decade by some academic research groups. More recently, technology enthusiasts have begun to realize the potential of implantable technology such as glass capsule RFID transponders. In this paper it is argued that implantable RFID devices have evolved to the point whereby we should consider the devices themselves as simple computers. Presented here is the infection with a computer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…Suppose that at 50 Gasson 2010. some point retinal implants will allow blind or poor-sighted patients to retrieve a substantial part of their eyesight, while at the same time enhancing some sightrelated functionality such as eye-hand co-ordination. Somewhat more directly relevant-although the technology is still embryonic-is the case when the prospect of bionic sensors implanted for medical purposes could provide some sort of compensatory advantage.…”
Section: Legal Issuesmentioning
confidence: 99%
“…Suppose that at 50 Gasson 2010. some point retinal implants will allow blind or poor-sighted patients to retrieve a substantial part of their eyesight, while at the same time enhancing some sightrelated functionality such as eye-hand co-ordination. Somewhat more directly relevant-although the technology is still embryonic-is the case when the prospect of bionic sensors implanted for medical purposes could provide some sort of compensatory advantage.…”
Section: Legal Issuesmentioning
confidence: 99%
“…It should be noted that these implants may also be used for therapeutic reasons, e.g., after a mastectomy. While not everyone agrees with cosmetic surgery, nor would personally choose to undergo such a procedure, the practice itself is widely accepted at a societal level ( Gasson, 2010 ). This extended to a paradigm of choice with wearable and implantable/insertable versions of many items being available based on personal preferences and conveniences.…”
Section: Introductionmentioning
confidence: 99%
“…Similar to RFID, various countermeasures can be taken to protect MIs from attacks (Huo, 2014). Various protocols have been proposed to avoid known vulnerabilities (Gasson, 2010) and to provide a higher level of security (Guo et al., 2014). Practical experience shows that RFID technology and short‐range data transmission do not have inherent security issues, yet messages exchanged between NFC devices can be intercepted by an attacker (Masyuk, 2019).…”
Section: Introductionmentioning
confidence: 99%