Over a billion years of evolution has gifted us with DNA that is very well adapted to the environment. Each strand of DNA is like a bit of computer code, and surprisingly, they are open source code. The easiest way to modify the code is through viruses, which have evolved specifically to splice new genes into the host’s DNA. The question is: does mankind have the right to tamper with this code? The answer lies in the nature of mankind; humans are explorers who have pushed beyond every boundary we have encountered. While the genetic engineering of viruses has obvious risks, they are outweighed by the potential gain in medical and technological advances and in the sheer thrill of going into the unknown.
Viruses evolved in cells to modify the cell’s DNA; that is their purpose, so is natural to try to manipulate them in an organic setting with the goal of curing disease. The hard part of getting DNA into a cell is that one has to cut the DNA, put in the desired strands, and close it all back up, without killing the cell. As Joe Palca a science specialist says, Viruses are a cheaper way to provide gene therapy. The virus can be transfused into the patient’s blood where they will deliver the new genes to the cells. After the virus is injected it will do all the work. Someday genetic therapy will be as easy as modifying a virus and injecting it into the patient. Indeed, as Andrea Pavirani, a molecular biologist, says, "Viruses exist to remake themselves. The way they do this is by infecting cells and taking over their genetic machinery. Thus a virus is an ideal delivery truck for a new gene" (qtd. in Palca). Viruses are the perfect tool to modify DNA, as they have naturally evolved this ability. To find or cre...
... middle of paper ...
...Genetically-modified virus explodes cancer cells." NewScientist. N.p., 1
June 2004. Web. 30 Apr. 2014.
Latham, Jonathan, and Allison Wilson. "Regulators Discover a Hidden Viral Gene in Commercial
GMO Crops." Independant Science News (2013): 30 pars. Web. 11 May 2014.
Montgomery, Geoffrey. "The Ultimate Medicine." Discover. March 1990: 60-68. SIRS Issues
Researcher. Web. 30 Apr. 2014.
Oh, Dahyun, Jifa Qi, Yi-Chun Lu, Yong Zhang, and Yang Shoa-Horn. "Biologically enhanced
cathode design for improved capacity and cycle life for lithium-oxygen batteries." Nature
Communications. (2013): 1-4. Web. 11 May 2014.
Palca, Joe. "The Promise of a Cure." Discover. June 1994: 76+. SIRS Issues Researcher. Web. 30
Pollack, Andrew. "Researchers Report Breakthrough in Creating Artificial Genetic Code." The
New York Times 7 May 2014. Web. 10 May 2014.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Hackers “...they are still hardly criminal in nature. The intention of most of these individuals is not to destroy or exploit systems but to learn in minute detail how they are used and what they are used for. The quest is purely intellectual, but the drive to learn is so overwhelming that any obstacle blocking its course will be circumvented. Unfortunately the obstacles are usually state and federal laws on unauthorized computer access...” This is a quote from Chris Goggans who was once a member of the hacker Legion of Doom club.... [tags: social issues]
972 words (2.8 pages)
- What is the definition of the term “hacker?” Is it someone that terrorizes companies by shutting down computers and satellites otherwise rendering them helpless. Or is it merely someone that is curious as to how technology works. The United States Government doesn’t agree at all with the latter of the two. It is almost frightful that the Government of the United States, the most powerful force in the world, can be so discriminative. You think that they would be the ones with some sort of understanding.... [tags: essays research papers]
1548 words (4.4 pages)
- IntroductionIn the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it's coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), unauthorized access into classified government computer files, phone card and credit card fraud, and electronic embezzlement.... [tags: essays research papers fc]
4571 words (13.1 pages)
- Cyber Security It seems like everyone in today’s society has access to a computer, a cell phone, or some other type of technology that allows information to be passed from one person to another through space. With your private information out there in cyberspace, clever thieves are finding ways to access your personal informational and to steal from you without you even knowing about it until it is too late. The thieves are taking your personal data and using it to gain access to your accounts. In fact, there are many different ways thieves are threatening your safety in cyberspace.... [tags: security, computer, hackers]
1034 words (3 pages)
- ... External Security While having keyed entry so only employees have access is a good practice and current access to the server room is adequate overall physical security can be enhanced by implementing an access control system that is centrally manageable and provides logging of access attempts. A number of building security solutions are on the market that make use of magnetic key cards and card readers that are controlled by a central management and logging system. This allows the organization to easily control access to the whole or parts of the facility while logging access attempts for security audits.... [tags: internet safety, spyware, viruses]
1220 words (3.5 pages)
- Hackers have a multitude of tools and techniques to accomplish their goals, and as old tools and techniques become obsolete, new ones are created. Three questions regarding hacker tools and techniques are addressed here. What are the common tools used to conduct a denial of service attack (DoS). What is a buffer overflow attack, and how does a SQL injection attack take place. Tools for a DoS Attack Unlike many other attack types used by hackers, DoS attacks do not seek to steal information, break into systems or escalate privileges.... [tags: internet, viruses, victims]
781 words (2.2 pages)
- Solutions to Computer Viruses Table Of Contents I Intro II Computer Virus Components a.Worms b.Trojan horses c.Logic bombs III Types of Viruses a.Boot sector virus b.File virus c.Macro virus d.Multipartite virus e.Polymorphic virus f.Stealth virus IV How Viruses Work a.Virus introduced to system b.Trojan activated c.Logic bomb activated d.Destructive part of virus activated V Most Common Viruses a.Jerusalem virus b.Cascade virus c.Brain virus d.Italian virus e.New Zealand virus VI Macro Virus a.What are they.... [tags: Computer Viruses Software Technology Essays]
2603 words (7.4 pages)
- HACKERS My paper is on hackers, who they are, what they do, and my personal view on the rights or wrongs of hacking. According to the Merriam-Webster Web dictionary, a hacker is 1: one who hacks, 2: a person who is inexperienced or unskilled at a particular activity, 3: an expert at programming and solving problems with a computer, and 4: a person who illegally gains access to and sometimes tampers with information in a computer system. The definition that is most associated with computer hackers in society today would be a person who illegally gains access to and sometimes tampers with information in a computer system.... [tags: essays research papers]
349 words (1 pages)
- Hackers It is the weekend you have nothing to do so you decide to play around on your computer . You turn it and than start up , calling people with your modem , conneciting to another world with people. This is all fine but what happens when you start getting into other people’s computer files , then it becomes a crime and who are the criminals. To begin i will start with hacking and hackers. Hacking is the act of breaking into computers and network of other poeple’s with out any permission .... [tags: Hacking Computers Technology Security Essays]
3691 words (10.5 pages)
- Computers have become much more important and popular to our society in recent decades. The computer’s ability to perform so many tasks speedily and reliably makes it useful for a wide variety of purposes. Therefore much important information is stored on computers. Because people and organisations depend on computers every day for a variety of significant tasks, it is imperative that the systems which are used are protected from loss, damage and misuse. This essay identifies some potential risks to computer systems and software and the safeguards that can be taken to minimise these risks.... [tags: essays research papers]
2617 words (7.5 pages)