{"id":412,"date":"2025-04-29T03:25:35","date_gmt":"2025-04-29T03:25:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/?page_id=412"},"modified":"2025-04-29T03:30:29","modified_gmt":"2025-04-29T03:30:29","slug":"ethical-considerations-of-crispr-gene-editing","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/ethical-considerations-of-crispr-gene-editing\/","title":{"rendered":"Ethical Considerations of CRISPR Gene Editing"},"content":{"rendered":"\n<p>Question: Based on your readings related to the BioCybersecurity section of this course, identify possible ethical considerations and explain your position.<br><br>Reply: <br><br>DNA\u00a0digitization\u00a0presents\u00a0both\u00a0opportunities\u00a0and\u00a0risks.\u00a0It\u00a0improves\u00a0forensic\u00a0science\u00a0and\u00a0medicine,\u00a0but\u00a0it\u00a0also\u00a0poses\u00a0significant\u00a0privacy\u00a0and\u00a0security\u00a0issues.\u00a0DNA\u00a0cannot\u00a0be\u00a0altered\u00a0once\u00a0compromised,\u00a0in\u00a0contrast\u00a0to\u00a0passwords.\u00a0Sensitive\u00a0genetic\u00a0information\u00a0may\u00a0be\u00a0compromised,\u00a0allowing\u00a0employers\u00a0and\u00a0insurers\u00a0to\u00a0misuse\u00a0it\u00a0or\u00a0steal\u00a0identities\u00a0(Rizkallah,\u00a02018).\u00a0The\u00a0growing\u00a0cyberthreat\u00a0of\u00a0malicious\u00a0code\u00a0embedded\u00a0in\u00a0DNA\u00a0is\u00a0another\u00a0concerning\u00a0issue.\u00a0According\u00a0to\u00a0research,\u00a0computers\u00a0that\u00a0process\u00a0genetic\u00a0data\u00a0can\u00a0be\u00a0compromised\u00a0by\u00a0manipulating\u00a0DNA\u00a0sequences\u00a0(Coldewey,\u00a02017).\u00a0This\u00a0draws\u00a0attention\u00a0to\u00a0weaknesses\u00a0in\u00a0bioinformatics\u00a0systems\u00a0that,\u00a0if\u00a0security\u00a0measures\u00a0aren&#8217;t\u00a0reinforced,\u00a0could\u00a0be\u00a0exploited.\u00a0Although\u00a0these\u00a0risks\u00a0are\u00a0alarming,\u00a0I\u00a0think\u00a0we\u00a0can\u00a0safely\u00a0reap\u00a0the\u00a0benefits\u00a0of\u00a0DNA\u00a0digitization\u00a0with\u00a0the\u00a0right\u00a0laws\u00a0and\u00a0cybersecurity\u00a0improvements.\u00a0But\u00a0more\u00a0stringent<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Question: Based on your readings related to the BioCybersecurity section of this course, identify possible ethical considerations and explain your position. Reply: DNA\u00a0digitization\u00a0presents\u00a0both\u00a0opportunities\u00a0and\u00a0risks.\u00a0It\u00a0improves\u00a0forensic\u00a0science\u00a0and\u00a0medicine,\u00a0but\u00a0it\u00a0also\u00a0poses\u00a0significant\u00a0privacy\u00a0and\u00a0security\u00a0issues.\u00a0DNA\u00a0cannot\u00a0be\u00a0altered\u00a0once\u00a0compromised,\u00a0in\u00a0contrast\u00a0to\u00a0passwords.\u00a0Sensitive\u00a0genetic\u00a0information\u00a0may\u00a0be\u00a0compromised,\u00a0allowing\u00a0employers\u00a0and\u00a0insurers\u00a0to\u00a0misuse\u00a0it\u00a0or\u00a0steal\u00a0identities\u00a0(Rizkallah,\u00a02018).\u00a0The\u00a0growing\u00a0cyberthreat\u00a0of\u00a0malicious\u00a0code\u00a0embedded\u00a0in\u00a0DNA\u00a0is\u00a0another\u00a0concerning\u00a0issue.\u00a0According\u00a0to\u00a0research,\u00a0computers\u00a0that\u00a0process\u00a0genetic\u00a0data\u00a0can\u00a0be\u00a0compromised\u00a0by\u00a0manipulating\u00a0DNA\u00a0sequences\u00a0(Coldewey,\u00a02017).\u00a0This\u00a0draws\u00a0attention\u00a0to\u00a0weaknesses\u00a0in\u00a0bioinformatics\u00a0systems\u00a0that,\u00a0if\u00a0security\u00a0measures\u00a0aren&#8217;t\u00a0reinforced,\u00a0could\u00a0be\u00a0exploited.\u00a0Although\u00a0these\u00a0risks\u00a0are\u00a0alarming,\u00a0I\u00a0think\u00a0we\u00a0can\u00a0safely\u00a0reap\u00a0the\u00a0benefits\u00a0of\u00a0DNA\u00a0digitization\u00a0with\u00a0the\u00a0right\u00a0laws\u00a0and\u00a0cybersecurity\u00a0improvements.\u00a0But\u00a0more\u00a0stringent<\/p>\n","protected":false},"author":29366,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/pages\/412"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/users\/29366"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/comments?post=412"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/pages\/412\/revisions"}],"predecessor-version":[{"id":422,"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/pages\/412\/revisions\/422"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mohammadsaleh\/wp-json\/wp\/v2\/media?parent=412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}