Attacking Human Implants: A New Generation of Cybercrime

Gasson, Mark N.; Koops, Bert-Jaap
December 2013
Law, Innovation & Technology;Dec2013, Vol. 5 Issue 2, p248
Academic Journal
The article discusses the results of a research study on the effectivity of human information and communication technology (ICT) implants in common clinical use for links between technology and the human body. It mentions the vulnerability of human implants in crime victimisation and foreign technology. It also emphasizes on the challenges in preventing cybercrimes among targeted technology implants in human body.


Related Articles

  • PRESIDENT'S MESSAGE. Keefe, Joe // American Intelligence Journal;Sep2011, Vol. 29 Issue 2, p1 

    An introduction is presented in which the editor discusses an article on counterintelligence, information assurance, and tools for cyber defense.

  • ¿Cómo prevenir conductas abusivas y delitos tecnológicos en la empresa? Agustina, Jose R. // IDP: Revista de Internet, Derecho y Politica;jun2013, Issue 16, p7 

    The study of improper behaviour of employees in the use of the computer resources that a company provides them (PC, email, mobile telephone, PDA, etc.) represents an area of research of growing interest, in great part due to the financial impact, both direct and indirect, it can have on profits....

  • Pakistan faces legal vacuum as cybercrimes ordinance lapsed.  // Flare (Pakistan);10/15/2012, p37 

    The article focuses on the legal operations of the users of information and communication technology (ICT) in Pakistan following the lapse of the Prevention and Control of Cyber Crimes Ordinance in 2009. It states that the improvement in ICT led to advantages and opportunities as well as threats...

  • Centre of Excellence to thwart cyber attacks.  // FICCI Business Digest;Nov2013, Vol. 10 Issue 8, p35 

    The article focuses on the partnership between Internet Corp. for Assign Names and Numbers (ICANN), Center for Development of Advanced Computing (CDAC), and the Center of Excellence for project to prevent cyber attack. Topics discussed include the signing of the letter of the intent in the...

  • ICTs and China: An Introduction. Law, Pui-lam; Chu, Wai-chi // Knowledge, Technology & Policy;Mar2008, Vol. 21 Issue 1, p3 

    The article discusses various reports published within the issue, including one by Boxu Yang on social consequences of the use of information and communication technology (ICT) in China and another by Jinqiu Zhao on internet users in rural China.

  • Editorial: Emergent Research from Southern Africa. Carr, Tony; Czerniewicz, Laura // International Journal of Education & Development using Informati;2007, Vol. 3 Issue 4, p2 

    The article discusses various reports published within the issue, including one by Joanne Hardman on the implications of the use of object-oriented activity in teaching mathematics lessons, one by Raymond Kekwaletswe on the opportunities provided by information and communication technology (ICT)...

  • Editorial. Pritchard, Chris // Mathematics in School;Sep2009, Vol. 38 Issue 4, p1 

    The article discusses various reports related to education published within the issue, including one by Alison Clark-Wilson and Adrian Oldknow on the use of information communications technology (ICT) and another by John Hudson on applied mathematics.

  • Thais at it again...  // Telecom Asia;Jan/Feb2010, Vol. 21 Issue 1, p46 

    The article focuses on the uncertainty of Thailand's Information and Communications Technology Ministry to launch legally its next bird, Thaicom 6.

  • Editorial: ICT and the capability approach. Oosterlaken, Ilse; den Hoven, Jeroen // Ethics & Information Technology;Jun2011, Vol. 13 Issue 2, p65 

    An introduction is presented in which the editors discuss various reports within the issue on topics including theoretical reflections and some applications on information and communication technology (ICT), global justice outlook, and the positive contribution of the mobile phone to the...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics