2.74M
Category: informaticsinformatics

Cyber Implants

1.

Cyber Implants
A D I L E T Z H A K S Y LY K S E - 0 7

2.

• History of cyber
Outline
implants
• How cyber implants
work and where
used?
• Limitations and
weaknesses of
cyberimplants
• Recomendations for
invantion
• Conclusion

3.

History of cyber implants
• Cyber implants or cyberware is a hardware
or software made for improve human's body,
its functionality. People with cyber cyber
implants are called cyborgs and cyberware
help them in daily life or moreover, save their
lives. History of cyborgs starts in 19th
century when writers fantazied about people
modified with iron devices and in 1960 the
term "cyborg" was coined by Manfred E.
Clynes and Nathan S. Kline. (Pickering,
1995). In 20th and 21st centuries, cyber
implants started a rapid development, due to
new technologies that allowed to creat tiny
mechanisms. After that, pacemakers,
artificial pancreas and other implants were
invented(Rehman et al., 2020).

4.

How it works and
where used for?
• Nowadays, cyber implants have a vital role
in some people lifes'. For instance,
pacemakers helps people with violation of
the heart rythm and heart diseases. By DC
pulses pacemaker saves a hundred
thousand people around the world
everytime. (Mulpuru et al., 2017)
• There are also a huge number of chips
that are implanted in body and works such
mini devices, that with people everytime, to
illustrate, bank chips, admission control
chips and e.t.c. Such cyber implants help
people in thier daily life (Rehman et al.,
2020).

5.

Limitations of cyber implants
• First of all, cyber implants are vulnerable for physical damage and some environment.
For instance, pacemakers have many limitations, such as they are sensetive for
magnit influence and temperature (Mulpuru et al., 2017)
• Secondly, advanced cyber implants are vulnerable for cyber attacks, for example,
smart artificial pancreas can be hacked and the system of insulin control have risk to be
violated (Rehman et al., 2020)

6.

• Moreover, implants can not heal diseases, but for a time relieves the patient of
symptomes. After implementation of implants some patients forget about diseases and
this aspect can be fatal for them. For instance, after implementation of pacemakers, it is
neccessary for patient to limit their lifestyle. For them it is not allowed to do hard work,
sports should be also limited(Mulpuru et al., 2017).
• Last but not least, current cyber implants have many technological limitations. Most of
them depended from charge and it is neccessary to manage charge level of implant
everytime. In addition, some implants have too big sizes and often it interfere people in
daily life (Rehman et al., 2020).

7.

Solutions
• To solve first problem, it is can be offered to inject implants in such way to make
them one with the body. If implants become part of the human body, then it can not be
damaged easily
• Second problem fully related to cybersecurity and to solve this limitations it is
neccessary to improve security of implants system, otherwise, it can threat a people's
life.
• Thirdly, to make implants more efficient and let them heal diseases it needed to make
researches among patients and improve implants' system
• Lastly, to solve last problem its referred to first solution. If the implants become one with
human's body, it will give an opportunity to charge them from body and the problem
about size will also disappear.

8.

Conclusion
• Taking everything into
consideration, cyber implants is a
new technology and has many
limitations. On the other hand, this
invention nowadays helps
thousands of people
and even saves someone's life. In
future, this technology will develop
rapidly and as it was predicted by
20th century's writters, will become
a daily equipment for everyone.

9.

References
• Mulpuru, S. K., Madhavan, M., McLeod, C. J., Cha, Y.-M., & Friedman, P. A. (2017). Cardiac
pacemakers: Function, troubleshooting, and management. Journal of the American College
of Cardiology, 69(2), 189–210. https://doi.org/10.1016/j.jacc.2016.10.061
• Pickering, A. (1995). Cyborg history and the World War II regime. Perspectives on Science,
3(1), 1–48. https://doi.org/10.1162/posc_a_00472
• Rehman, M. M., Rehman, H. Z., & Khan, Z. H. (2020). Cyber-attacks on medical implants: A
case study of cardiac pacemaker vulnerability. International Journal of Computing and Digital
Systems, 09(6), 1229–1235. https://doi.org/10.12785/ijcds/0906020
English     Русский Rules