Resource Review-5 Sources
G.Nikhita Reddy#1, G. R. (2013). Effects of Wireless Electricity on Human Bodies. International Journal Of Engineering Trends And Technology, (6), 2567
In this part of the report I will be researching the ethical concerns society has with the introduction of wireless electricity. One of the main ethical concerns we have about wireless electricity is how will it affect the human body. This article details the different resistant levels men and women have to wireless electricity, as well as the difference resistant each body part may or may not have.
Weckert, J., & Hoven, J. d. (2008). Information Technology and Moral Philosophy. Cambridge: ...view middle of the document...
(2010) ―Mobile communication and ethics: implications of everyday actions on social order‖, Nordic Journal of Applied Ethics - Special issue on mobile/ubiquitous computing, Norway, Vol 4, No 2.
This article will be used as a point of reference for how the morals of mobile technology have changed social norms. The majority of the population has cell phones and now as a society we have reached an impasse on how to interact in the public space with this abundance of technology and connectivity at our fingertips. Wireless electricity would make it so we do not even have to take a break to charge our devices, this raises some moral concern on how the societal norms will shift.
McGee, S. (2011). Mobile contact tracing and counseling for STI's: There's not an app for that. American Journal of Bioethics, 3-4.
This journal deals with the possible security issues that can arise from this new mobile and wireless technology. The article talks about an app that allows the user the test themselves for STI’s using a mobile device. The user would urinate or deposit saliva on a microchip and the app would tell them if they are infected. They would then go and securely get their results offline without ever having to see a doctor. This raises so many ethical and moral concerns, not to mention the security issues of having your DNA uploaded to a database.
Cache, J., Wright, J., & Liu, V. (2010). Hacking Exposed Wireless : Wireless Security Secrets & Solutions. New York: McGraw-Hill.
This article is almost a how to guide on hacking. With new wireless technology we leave ourselves extremely vulnerable to electronic attackers via hackers and terrorists. What is so scary about this is that the hacker can attack in an instant from across the world.