Featured Post

Hacking Health in Hamilton Ontario - Let's hear that pitch!

What compelled me to register for a weekend Health Hackathon? Anyway, I could soon be up to my ears in it. A pubmed search on Health Hack...

Showing posts with label Ethics. Show all posts
Showing posts with label Ethics. Show all posts

Tuesday, April 1, 2014

Coursera, Health Hacking, Diagnosis Apps, and Interoperability

There has been a lot happening and this is just briefly some of the things I have been tracking. A lot of my time is being spent taking a Coursera online course taught by Dr. Peter Singer (the Australian, not the U. of T. Ethicist) called "Practical Ethics". It is a 12 week course and there are about 25,000 people taking this MOOC. There are writing assignments, peer evaluations of such, video lessons, guest lecturers, discussion forums, essential background readings - I am very impressed and at the same time, very busy just trying to hang on.

COACH recently had a webinar on Health Hacking, facilitated by some of the founders of this fascinating organization. I would strongly recommend that anyone with an interest in healthcare technology and informatics, take a serious look at their website, and / or attend one of their hackathons. It is becoming so popular the next eHealth conference will have a Hackathon. During the webinar they mention how even the Canadian Medical Association thought highly of the concept. I was trying to find the article the CMA wrote about it but could only find this one:

We all know what happened to Google Health, and I am not sure today where Microsoft Healthvault is these days, so I am skeptical about any buzz we might hear about Apple Healthbook.

The Kuzweil Accelerating Intelligence news reported on a new Do It Yourself Medical Diagnosis App.  I have not had time to look into the details of this, but it might be a software candidate for an integrated Tricorder project.

The last item is really a gem, and it is the keynote talk given at HIMISS interoperability showcase, by Malcolm Gladwell. Malcolm uses 3 examples in the evolution of technology to make comparison to how new standards in interoperability can transform healthcare technology: shipping containers, Israeli military technology example called the Bekaa Valley Turkey Shoot, mp3 players.




Tuesday, February 25, 2014

The "sousveillance" world of Steve Mann

When I studied the use of RFID in healthcare I was amazed at the possibilities for this technology and it's essential humanness. An RFID barcode is much safer for an infirm patient because the identification or drug dosage on the RFID signal can be picked up without having to move the patient. A barcode, on the other hand, might be on a wrist under a sleeping patient, so they would have to be turned over in order to scan the bar code in line of sight. RFID technology was also great for keeping track of physical assets like infusion pumps, and inventory replenishment systems. On the other hand, keeping track of people presented some ethical and privacy concerns because people would be under the impression that they would be constantly under surveillance. When the word "surveillance" is used, Big Brother rears its ugly head.

Surveillance needn't be a fearful word even though it has a strong presence in security organizations and anti-terrorism. There are forms of surveillance in public health that can be beneficial for the health and welfare of society, such as syndromic surveillance, even though that too may have had some origins in state security, i.e. finding out where that anthrax threat was.

One thing I like about the wearable computer work of Steve Mann is his bold claim that the eye-tap or video glasses he created and wears present to society a form of what he calls "sousveillance", which is a much more nuanced, benign or human form of it's evil cousin - mentioned above. Sousveillance is an understated way of trying to balance the power of who is watching who. For some totally unknown reason it reminds me of the anti-sus dub poetry of Linton Kwesi Johnson. The anti-sus laws, or suspected person vagrancy laws in 19th century Britain might have nothing to do with sousveillance, but I am sure Steve Mann has had that feeling of being considered a suspicious and unwelcome person. Racial profiling for cyborgs? His McVeillance experience is indicative of that.

Now try to imagine a year in the future when everyone is wearing eye-tap video devices of that type Steve Mann and then Google developed. Maybe this is in 2020,( appropriate for seeing perfectly), and maybe it is not, but won't this mean that everyone we see on the street, and their dog, will be the equivalent of a Google Street View with a 24/7 refresh rate? And then ask yourself what does this do for for privacy laws, and you will have to wonder why the privacy commissioner of Canada wrote a letter to the lawyers at Google in 2007 to say that Google Street View would break all of Canada's privacy laws if it was implemented! It is interesting to try and imagine this future and one science fiction book I read by Charles Stross, called Halting State did exactly that. It was a murder mystery inside a video game but the real life police all had video recording visors they were obligated and/or controlled to wear on the job, recording all the visual details of their day to day investigations. Surveillance technology may not have been extended to all citizenry, but now the details are slipping away on me - read it a few years ago.

Notions of privacy will be changing beyond a doubt. Even now in different cultures there are different notions of privacy and proxemics. I think it was Iceland that lists your tax return information in the phone book or something like that. Imagine if we all started using Augmented Reality eye-tap devices, like the ones on the veillance.org website which are tied into redundantly backed-up servers. Imagine people walking through hospitals with such wearable devices scanning people sitting in the STD clinic waiting rooms. Personal space is being violated in terms of personal health information (PHI). The technology is wonderful though. As Personal Health Records are being developed (even with HL7 standards) a problem area is how to capture and store personal information submitted by the patient, not the physician, and how to make that information intelligible. Streams of data from daily blood tests, BP, and now possibly wearable computer video images, needs to managed and made relevant somehow. On the other hand, IT and policy specialists in healthcare have mostly normalized the Bring Your Own Device (BYOD) phenomenon.

Another notion of privacy that might need to change is the idea that PHI is always private. Some people are already posting their PHI on facebook and they don't care if it is public. In rare cases we have even heard that this has saved lives. I have personally heard research participants with rare and chronic health conditions who are posting their personal health records as widely on the internet as possible in order to obtain possible help or insight for future research. It is technologically possible I suppose to put PHI and other forms of identification into Augmented Reality "fields of vision" for other persons with wearable devices to readily pick up. The only thing stopping people from doing that is the notions of privacy and their willingness to consent to have that out there in the public domain.

I like Steve's distinction (on wikipedia - or brilliant IEEE article ) between surveillance and sousveillance:

Personal sousveillance is the art, science, and technology of personal experience capture, processing, storage, retrieval, and transmission, such as lifelong audiovisual recording by way of cybernetic prosthetics, such as seeing-aids, visual memory aids, and the like. Even today's personal sousveillance technologies like camera phones and weblogs tend to build a sense of community, in contrast to surveillance that some have said is corrosive to community.[29]
The legal, ethical, and policy issues surrounding personal sousveillance are largely yet to be explored, but there are close parallels to the social and legal norms surrounding recording of telephone conversations. When one or more parties to the conversation record it, we call that sousveillance, whereas when the conversation is recorded by a person who is not a party to the conversation (such as a prison guard violating a client-lawyer relationship), we call the recording "surveillance".

It is within this realm of "personal sousveillance" that the work of Steve Mann as applied to health informatics, is really to going to shine. Steve  was one of the original group who helped secure funding for the Centre for Global eHealth Innovation at the University of Toronto, which is a world leading health informatics incubator. Steve has also done some research using sousveillance on hand hygiene to reduce hospital infections. There are other more bold applications, of course, like using google glass in surgeries or dentistries for training and/or assisted learning.

In my own small way I am also trying to think through the "legal, ethical and policy issues", as Steve says, here on this blog. Those at the Institute for Ethics of Emerging Technology are also doing that "in spades", and there is a recent article about Steve Mann and sousveillance on it (here). Steve has recently argued for "legal" rights for sousveillance in an editorial for MIT technology review. Veilliance has become a study in itself, in all it's various forms, as Steve leads a Veillance conference and research group, which it would appear I made a blog post about last year< here >.

I could also blend in here a discussion related to the ethics of self-experimentation (and hat tip again to the folks on the CAREB Linkedin group for that article). Mostly we have known about clinical self-experimentation, and in social sciences/humanities there are '"autoethnographies", but now with the development of new technologies people are trying their own DYI experiments.  I saw an TVO Agenda program (Mysteries of the Mind - Tomorrow's Brain ) that discussed the health benefits for improving cognitive function and mental health using Transcranial Magnetic Stimulation (TMS)  where the panel experts played a youtube video they had discovered and discussed the guy in it who hooked his brain up to his own home-made TMS device. In the video we see the guy, when he turns on the electricity, explaining: "Just saw a white flash". So don't do this at home kids!

Steve Mann is not a guinea pig. He isn't a research subject. He is the subject of his own research. Developing and wearing computers is something he has done since he was a kid, so he is just using evolutionary momentum for whatever agile developments that improve his cybernetic state of well being. An oversight committee at his place of employment might recommend a technology ethics review, but we have to think that Steve is largely "self-employed" with this system, "dug in like a tick", and there ain't no separating him from this life experiment with digitally enhanced awareness. Anyway, Steve would fight back against anything "oversight". The dangers of any research involving humans is that researchers to a certain extent "have blinders on" and are biased towards their own methodologies and perceptions of risk, and thus lose objectivity.

I don't know who said "the pull of the future is greater than the push from the past", but I do remember the person who I heard it from. Whoever it was must have imagined some strange and distant world waiting to be born. That is the sousveillance world of Steve Mann.






Tuesday, February 11, 2014

Ethics boards for Google/Deepmind: The end of computer programming?

Hat tip to the folks on the LinkedIn CAREB group who posted this story from Forbes "Inside Google's Mysterious Ethics Board". OK. Here is my initial impression. The ethics surrounding new technology is becoming as serious as stem cell bioethics. One of the authors of Forbes article also contributes to the Institute for Ethics and Emerging Technology - appropriately.

It was actually an Artificial Intelligence (AI) company that Google bought called Deepmind, that insisted on the technology ethics board as a condition of the sale. More about the founder of that company, Demis Hassabis is interesting to follow. This "technology ethics board" is not, I think, at all the same as an Institutional Review Board, or Research Ethics Board. It is more of an internal ethics review committee, probably examining agile developments of new technology. Might just be corporate whitewash, or it might actually be driven by social and moral responsibility, as well as a dash of liability insurance, to paraphrase the IEET author.

Deepmind, which has the most minimalistic website I have ever seen, is advancing AI into computers that can learn and program themselves. Must be the vanguard to the end of programming, as current Brain research is predicting. Try reading this paper about how Deepmind programmed a computer to win Atari games "Playing Atari with Deep Reinforcement Learning". Understand now why programming might come to an end when computers learn how to program themselves?

What possible relevance could this have for ehealth, as is the primary purpose of this blog? Well, as this article on Recode says about the founder of Deepmind: "(Demis) Hassabis has closely studied how the brain functions — particularly the hippocampus, which is associated with memory — and worked on algorithms that closely model these natural processes." Apparently, the Journal Science says this research was one of the top scientific breakthroughs one year (this from Wikipedia):

Hassabis then left the video game industry, switching to cognitive neuroscience. Working in the field of autobiographical memory and amnesia he authored several influential papers.[14] The paper argued that patients with damage to their hippocampus, known to cause amnesia, were also unable to imagine themselves in new experiences. Importantly this established a link between the constructive process of imagination and the reconstructive process of episodic memory recall. Based on these findings and a follow-up fMRI study,[15] Hassabis developed his ideas into a new theoretical account of the episodic memory system identifying scene construction, the generation and online maintenance of a complex and coherent scene, as a key process underlying both memory recall and imagination.[16] This work was widely covered in the mainstream media[17] and was listed in the top 10 scientific breakthroughs of the year (at number 9) in any field by the journal Science.[1

Still, that really isn't about health informatics really. Sorry. Except if the ethics of new technology in health and medicine is important? There is a real intersection I believe between health informatics and health technology assessment.








Wednesday, December 25, 2013

eHealth tricorder fraudster - impersonating Canadian Deputy Minister of Health

There is a really bizarre story reported by CBC and sundry other new services that has a decidedly eHealth angle. A person named Howard Levanthal in the US impersonated a Canadian Deputy Health Minister to fraudulently win loans from an investment bank. The guy doesn't look remotely like Glenda Yeates, but her signature appears on his million dollar contract with Health Canada. Revolving around these expenses was a supposed medical device his company Neovision had developed called the Heltheo's McCoy Home Health Tablet, named after Dr. McCoy of Star Trek and Tricorder medical device fame.

Tricorder-like devices are actually being developed by the Qualcomm Tricorder XPrize. There are are now 3 Canadian teams in the competition.  I blogged about the XPrize Tricorder competition before and continue to be interested in it. This story was picked up by a delightful science fiction/science fact blog called Giant Freaking Robot. The Robot had the wherewithal to know that there are quickly evolving attempts to develop tricorder like medical diagnostic and assistive devices, and even posted to his story a youtube video to one of the contestants for the Xprize - Scanadu.

It makes me wonder if eHealth is being over-hyped these days ("Healthcare Hullabaloo", as Giant Freaking Robot says) and people are readily responding to new developments. Not that this blog is helping to over-hype eHealth or anything... Anyway, I really like the quote in the CBC news story that: "His actions were the stuff of fantasy and science fiction, valid only in another dimension"

Howard Leventhal pleads guilty to posing as Canadian deputy health minister

Pleads guilty to aggravated identity theft for impersonating Glenda Yeates


The FBI says an Illinois man accused of impersonating a Canadian deputy health minister as part of a fraud scheme has pleaded guilty to wire fraud and identity theft charges.
Howard Leventhal, 56, of Long Grove, Ill., was accused of trying to defraud a number of individuals and entities of millions of dollars by falsely claiming his company, Neovision, had a lucrative contract with the Canadian Health Department.
'His actions were the stuff of fantasy and science fiction, valid only in another dimension.'
- United States Attorney Loretta Lynch
Leventhal pleaded guilty to aggravated identity theft, which carries a mandatory two-year term of imprisonment, for stealing the identity of Glenda Yeates.
When sentenced on April 3, 2014, Leventhal faces up to 22 years in prison, $1,050,819.78 in forfeiture and restitution, and a fine of more than $2 million.

Tablet named after Star Trek's Dr.Leonard McCoy

Court in Brooklyn, N.Y. heard Leventhal told potential investors Neovision had written agreements with Health Canada, whereby Neovision would provide Health Canada with Heltheo's McCoy Home Health Tablet.
yeates_glenda050608
Leventhal pleaded guilty to aggravated identity theft, which carries a mandatory two-year term of imprisonment, for stealing the identity of Glenda Yeates, pictured above.
The device — named after the fictional Dr. Leonard McCoy of TV's Star Trek series — purportedly delivers instantaneous and detailed patient data to physicians and other licensed health-care providers.
Prosecutors alleged earlier this year that Leventhal scammed Paragon Financial Group for $800,000 by claiming it could collect money he said Health Canada owed to his company.
Leventhal also used the purported agreement with Health Canada to solicit more than $25 million from other potential investors, including an undercover law enforcement agent. RCMP allege Leventhal tried to get a $2.5-million line of credit from TD Bank in Toronto in July.
"In Leventhal's world, the truth was cloaked by his web of lies and impersonation. Within this alternate reality, Leventhal marketed non-existent technology, fabricated an online presence, and impersonated a government official, all to defraud investors out of very real money," said United States Attorney Loretta Lynch in a statement.
"His actions were the stuff of fantasy and science fiction, valid only in another dimension."







Thursday, December 5, 2013

Data in Electronic Health Records for Medical Research

The Institute for Ethics and Emerging Technology had an excellent article by Donna Hanrahan entitled "Data Mining, Meaningful Use, Secondary Use, & Potential Misuse of Electronic Health Records". It has an excellent synopsis of what many clinical researchers, ethicists, and privacy experts have been saying for many years, about how data in the EHR can be used for medical research purposes.

There are ways to do that, like consent management, audit record logs, and increasingly better means to de-identify data and prevent it from being re-identifed. This latter work is really being pioneered by Dr. Khalid El-Emam. That is, before one would be able donate the data in the EHR to science, post-mortem.

I will copy in here just the section on how data in EHR can be used for medical research:

Beneficence of Electronic Data in Medical Research
Despite the ethical concerns addressed above, the use of electronic health data is critical to ensuring patient health, improving our healthcare system, and making new scientific discoveries in this technological age. Critics may question whether EHRs are truly meaningful or whether it is an “excessive bureaucratic requirement to spend public dollars on doctors’ computer systems.”xxxii This answer to this question can be discussed through the principle of justice. It is ethical, one could argue, to expend public funds for EHR systems that provides for the greater good and benefits for the public as a whole. Having data that is structured and easily retrievable benefits clinicians, patients, and the greater population. These benefits include safer prescribing, prevention of medication errors, epidemiological tracking to protect population health, and public medical error reporting. Furthermore, there is a clear need to switch from outdated, burdensome, and inefficient clinical charting traditions to electronic format.
EHR adoption aims to reduce cost, which is a primary goal of health reform in the United States. The increase in information available to clinicians can help prevent redundant or unnecessary tests and imaging. Furthermore, EHRs can provide point-of-care clinical decision support (CDS) as doctors prescribe tests, medications, and imaging requests, which can also help reduce costs. Lastly, “shared savings,” or “gain-sharing,” allows hospitals and healthcare providers to collaborate to reach quality metrics.xxxiiiAccordingly, EHRs enable users to measure desired outcomes and report this data more quickly and easily, saving both time and money. With regard to the costs associated with EHRs, studies have documented the strong return on financial investment that may be achieved following EHR implementation.xxxiv Other financial benefits include increased revenues due to improved care coordination, averted costs of paperwork, chart pulls, and billing errors, and fee-for-service savings including the rate of new procedures and charge capture. Furthermore, the secondary use of health record information is anticipated to become one of the healthcare industry’s greatest assets and the key to greater quality and cost savings over the next five years.xxxv In fact, a recent report by the McKinsey Global Institute, estimates the potential annual value to the healthcare industry at over 300 billion dollars.xxxvi These savings in cost benefit both the patient and provider.
There are also several patient-centered benefits that result from the “meaningful use” EHR data. Perhaps one of the most promising results of EHR data mining is the use of predictive modeling techniques to identify medical conditions and promote interventions before the onset of symptoms. Furthermore, retrospective analysis of the health data mined from EHRs could expedite scientific discovery in medicine by providing valuable information for research. In addition, physicians’ access to data and analysis could demonstrate the efficacy of different treatment options across large populations, which could help treat and prevent chronic conditions. Lastly, such data can be used to identify evidence-based best practices, identify potential patients for clinical trials, and monitor patient compliance and drug safety. These measures show beneficence towards the patient by providing better more individualized care.



Thursday, August 22, 2013

Perception ethics and machine brain interfaces

Melanie Swan, aka, "La Blogga", has a great article/video on her blog which was also listed on the Institute for Ethics of Emerging Technology website entitled "Killer Apps of Cognitive Nanorobotics". The title alone is enough to suggest what is out there these days and what is someday possible, and thus having a remote semblance to ehealth and the purpose of my blog. She made the video in French and Spanish as well. The YouTube talk is called the "Introduction to Ethics of Perception in Nanocognition".  There is a longer, and I think much greater, version < here >.

The YouTube video is kind of fun because if you don't want to try and listen to the lecture in the different languages, you can also click the Icon for Transcript on the youtube dashboard (beside Statistics and Reports) and see a line number machine translation output of it, which is almost accurate. I say almost because the machine algorithms pick up "epic" instead of "ethic" frequently. It also transcribed "Azimovs Robotic Laws" as "Mom's Law of Robotics" (in the shorter Introduction video).

I liked the references to philosopher Henri Bergson who's ideas about creativity I have always valued. "Machine Ethics Interfaces"? In the realm of Brain Computer Interfaces (BCI), the nanorobotic and perception technology is a little advanced or science fiction-like. You need to get some background in nanomedicine or reading Ray Kuzweil's articles about how nanorobotics injected into the brain will be able to alter perception, if not entirely create alternative virtual realities. On the other hand, current BCI (Emotiv, Personal Neuro, Muse, etc.) might be able to augment a kind of ethical space. My 2 bit intellectual comments on the article and the video lecture would be a waste of your time (and probably a challenge to your wit) so I recommend going to the source.

Wednesday, November 21, 2012

Ethical hacking to prevent health records held for ransom




A story about hacking that had a different angle was of interest to our privacy and security group. In this scenario, the hackers did not maliciously penetrate a system to cause chaos and destruction, but to virtually hold for a ransom a huge store of health records and personal health information.



Hacker holds patient health information for ransom

A Virginia hacker is asking for $10 million in exchange for the safe return of the personal health and prescription drug information of 8.3 million patients, HealthLeaders Media reported on May 5.

The hacker allegedly stole the information from the Virginia Prescription Monitoring Program’s (VPMP) Web site, which tracks prescription drug abuse and contains 35.5 million prescriptions in addition to enrollees’ personal information, including names, social security numbers, and addresses.

The hacker, who replaced the VPMP site with a ransom note, claims to have deleted the original back-up file for the information and created a new password-protected back-up file.

The VPMP site and the Virginia Department of Health Professions site are both temporarily disabled and the incident is under federal investigation.

This is when I realized that healthcare institutions need certified ethical hackers. These are the "white hat" hackers, who have a code of ethics, who know how to find the flaws in system security and work to prevent the "black hat" hackers from gaining admission.  In fact one in our group who works in healthcare said "oh, we do that." It is good to know there are ethical hackers in healthcare.  One of my earlier posts on this blog was about a computer security expert who hacked his way into an insulin pump, which fortunately was his own.

The White Hat Ethical Hacker Code of Ethics:


This CODE OF ETHICS expresses the consensus of the profession on ethical issues and is a means to educate both the public and those who are entering the field about the ethical obligations of all e-commerce consultants. By joining EC-Council each member agrees to:
Privacy:
Keep private any confidential information gained in her/his professional work, (in particular as it pertains to client lists and client personal information). Not collect, give, sell, or transfer any personal information (such as name, e-mail address, Social Security number, or other unique identifier) to a third party without client prior consent.
Intellectual Property:
Protect the intellectual property of others by relying on her/his own innovation and efforts, thus ensuring that all benefits vest with its originator.
Disclosure:
Disclose to appropriate persons or authorities potential dangers to any e-commerce clients, the Internet community, or the public, that she/he reasonably believes to be associated with a particular set or type of electronic transactions or related software or hardware.
Areas of Expertise:
Provide service in their areas of competence, being honest and forthright about any limitations of her/his experience and education. Ensure that she/he is qualified for any project on which he/she works or proposes to work by an appropriate combination of education, training, and experience.
Unauthorized Usage:
Never knowingly use software or process that is obtained or retained either illegally or unethically.
Illegal Activities:
Not engage in deceptive financial practices such as bribery, double billing, or other improper financial practices.
Authorization:
Use the property of a client or employer only in ways properly authorized, and with the owner’s knowledge and consent.
Disclosure:
Disclose to all concerned parties those conflicts of interest that cannot reasonably be avoided or escaped.
Management:
Ensure good management for any project he/she leads, including effective procedures for promotion of quality and full disclosure of risk. 
Knowledge Sharing:
Add to the knowledge of the e-commerce profession by constant study, share the lessons of her/his experience with fellow EC-Council members, and promote public awareness of benefits of electronic commerce.
Confidence:
Conduct herself/himself in the most ethical and competent manner when soliciting professional service or seeking employment, thus meriting confidence in her/his knowledge and integrity.
Extreme Care:
Ensure ethical conduct and professional care at all times on all professional assignments without prejudice.
Malicious Activities:
Not associate with malicious hackers nor engage in any malicious activities.
No Compromise:
Not purposefully compromise or cause to be compromised the client organization’s systems in the course of your professional dealings.
Legal Limits:
Ensure all penetration testing activities are authorized and within legal limits.

Involvement:
Not partake in any black hat activity or be associated with any black hat community that serves to endanger networks.
Underground Communities:
Not be part of any underground hacking community for purposes of preaching and expanding black hat activities.

Monday, April 16, 2012

Trying a Dyson Sphere on for Size

Futurist and ethicist George Dvorsky wrote this article about how to build a Dyson Sphere. He makes nanotechnology robots building solar panels in the solar system by totally mining Mercury (and then Venus) for materials sound simple. I like the comment on the article by the guy who asks if mining Mercury - every last bit of it - is ethical. This reminds me to try and find a post on nanomedicine and ehealth - another subject to be considered by futurists and ethicists.
The wireless transmission of electricity from the solar arrays is a vision Nicholas Tesla would be proud of. How better to get the electricity to the Nissan Leafs we will all be driving, without waiting to plug in and recharge.

Monday, March 26, 2012

The Panic Virus

Books! I am reading the Panic Virus by Seth Mnookin. Might even see him at a conference next month where he is the key speaker at the Canadian Association of Research Ethics Board. The first 70 pages or so about vaccines and those in the public who advocate AGAiNST them, reminded me of another book I read recently by Michael Bliss on the smallpox epidemic in Montreal in the last century. The role the media plays with science stories is huge, but so is the role parents play who advocate for their kids. This book is not about ehealth or technology. It is mostly about Autism and how bad science created the impression that vaccinations were responsible for causing it.

Wednesday, March 21, 2012

Institute for Ethics and Emerging Technologies

Just joined the website < Institute for Ethics and Emerging Technologies >. Was happy to see they have a Cyborg Buddhist. Very interesting. Bioethics should be looking at transhumanism more, from many different perspectives and realms of experience. This site reminded me of the work of Dr. Nick Bostrom, and I just found out he is mentioned on the site, which in fact is how I remembered him. More digging around, I find out Bostrom founded the IEET! His group at Oxford university is looking at the future of humanity. I don't think they are that optimistic. I would highly recommend reading some of his papers, even if you don't have a scholarly bent. Here is his website: http://www.nickbostrom.com/