Литмир - Электронная Библиотека
Содержание  
A
A

75. T. Klosowski, "Lots of Health Apps Are Selling Your Data. Here's Why," Lifehacker, May 9, 2014, http://lifehacker.com/lots-of-health-apps-are-selling-your-data-heres-why-1574001899.

76. C. Rubin, "Your Trainer Saw That," New York Times, April 17, 2014, http://www.nytimes.com/2014/04/17/fashion/devices-like-fitbit-and-up24-being-used-by-gyms-to-track-clients-fitness-activity.html.

77. T. Lee, "Hackers Break into Networks of 3 Big Medical Device Makers," SF Gate, February 8, 2014, http://m.sfgate.com/news/article/Hackers-break-into-networks-of-3-big-medical-5217780.php

78. R. Pierson, "FDA Urges Protection of Medical Devices from Cyber Threats," Medscape, 2013, http://www.medscape.com/viewarticle/806269_print.

79. A. Sarvestani, "Boston Children's Hospital Faces Cyber Threats – Are the Medical Devices Safe?" Mass Device, April 24, 2014, http://www.massdevice.com/news/boston-childrens-hospital-faces-cyber-threats-are-medical-devices-safe?page=show.

80. D. Talbot, "Encrypted Heartbeats Keep Hackers from Medical Implants," MIT Technology Re– view, September 16, 2013, http://www.technologyreview.com/news/519266/encrypted-heartbeats-keep-hackers-from-medical-implants/.

81. K. Zetter, "It's Insanely Easy to Hack Hospital Equipment," Wired, April 25, 2014, http://www.wired.com/2014/04/hospital-equipment-vulnerable/.

82. L. Hood, "Your Body Is the Next Frontier in Cybercrime," The Conversation, October 1, 2013, https://theconversation.com/your-body-is-the-next-frontier-in-cybercrime-18771.

83. J. A. Finkle, "A Security Firm Has Hired the Diabetic Who Hacked into His Own Insulin Pump to Show How It Could Be Used to Kill People," Business Insider, May 30, 2014, http://www.businessinsider.com/r-rapid7-hires-jay-radcliffe-diabetic-who-hacked-his-insulin-pump-2014-29.

84. N. Perlroth, "Heartbleed Highlights a Contradiction in the Web," New York Times, April 19, 2014, http://www.nytimes.com/2014/04/19/technology/heartbleed-highlights-a-contradiction-in-the-web.html.

85. N. Perlroth and Q. Hardy, "Heartbleed Flaw Could Reach Beyond Websites to Digital Devices, Experts Say," New York Times, April 11, 2014, http://www.nytimes.com/2014/04/11/business/security-flaw-could-reach-beyond-websites-to-digital-devices-experts-say.html.

86. R. Merkel, "How the Heartbleed Bug Reveals a Flaw in Online Security," The Conversation, April 11, 2014, https://theconversation.com/how-the-heartbleed-bug-reveals-a-flaw-in-online-security-25536.

87. "CyberR x Health Industry Cyber Threat Exercise, Spring 2014," HITRUST Alliance Inc., April 21, 2014, http://hitrustalliance.net/content/uploads/ 2014/05/CyberRX _Preliminary_Report.pdf.

88a. J. Conn, "Cybersecurity Test Finds Healthcare Communications Weak Links," Modern Health– care, April 21, 2014, http://www.modernhealthcare.com/article/ 20140421/NEWS/304219940/.

88b. E. D. Perakslis, "Cybersecurity in Health Care," New England Journal of Medicine 371, no. 5 (2014): 395–397.

88c. D. J. Nigrin, "When 'Hacktivists' Target Your Hospital," New England Journal of Medicine 371, no. 5 (2014): 393–395.

88d. N. Perlroth, "Hack of Community Health Systems Affects 4.5 Million Patients," New York Times, August 18, 2014, http://bits.blogs.nytimes.com/2014/08/18/hack-of-community-health-systems-affects-4-5-million-patients/?ref=health.

89. C. Wiltz, "Report: Healthcare Cybersecurity Appalling, Legislation Not Enough," MDDI, April 7, 2014, http://www.mddionline.com/article/report-healthcare-cybersecurity-legislation-not-enough.

90. L. Miller, "The Google of Spit," New York Magazine, April 22, 2014, http://nymag.com/news/features/23andme-2014-4/.

91. Y. Erlich and A. Narayanan, "Routes for Breaching and Protecting Genetic Privacy," Nature Reviews Genetics 15 (2014): 409–421.

92. K. Peikoff, "Fearing Punishment for Bad Genes," New York Times, April 8, 2014, http://www.nytimes.com/2014/04/08/science/fearing-punishment-for-bad-genes.html.

93. B. M. Knoppers, "It's Yet to Be Shown That Discrimination Exists," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/its-yet-to-be-shown-that-genetic-discrimination-exists.

94. Y. Joly, I. N. Feze, and J. Simard, "Genetic Discrimination and Life Insurance: A Systematic Review of the Evidence," BMC Medicine 11 (2013): 25.

95. A. S. Macdonald, "Risks Are Too Small for Insurers to Worry," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/risks-are-too-small-for-insurers-to-worry.

96. G. Gruber, "Guarantee Privacy to Ensure Proper Treatment," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/guarantee-privacy-to-ensure-proper-genetic-treatment.

97. M. Gymrek et al., "Identifying Personal Genomes by Surname Inference," Science 339 (2013):321–324.

98. P. Aldhous, "Genetic Mugshot Recreates Faces from Nothing but DNA," New Scientist, March 20, 2014, http://www.newscientist.com/article/mg22129613.600-genetic-mugshot-recreates-faces-from-nothing-but-dna.html.

99. O. Solon, "Algorithm Identifies Rare Genetic Disorders from Family Pics," Wired, June 24, 2014, http://www.wired.co.uk/news/archive/2014-06/24/facial-identification-genetic-disorders.

100. M. Angrist, "Open Window: When Easily Identifiable Genomes and Traits Are in the Public Domain," PLoS One 9, no. 3 (2014): e92060.

101. S. E. Brenner, "Be Prepared for the Big Genome Leak," Nature 498 (2013): 139.

102. D. Hernandez, "Selling Your Most Personal Item: You," Wired, March 27, 2013, http://www.wired.com/business/2013/03/miinome-genetic-marketplace/.

103. J. E. Lunshof, G. M. Church, and B. Prainsack, "Raw Personal Data: Providing Access," Science 343 (2014): 373–374.

104. B. Dolan, "In-Depth: Consumer Health and Data Privacy Issues Beyond HIPA A," MobiHealth– News, May 23, 2014, http://mobihealthnews.com/33393/in-depth-consumer-health-and-data-privacy-issues-beyond-hipaa/.

105. S. Fairclough, "Physiological Data Must Remain Confidential," Nature 505 (2014): 263.

Глава 13

1. E. Brynjolfsson and A. McAfee, The Second Machine Age (New York, NY: W.W. Norton & Co., 2013).

2. D. Hardawar, "Predictive Tech Is Getting Smarter and More Pervasive – but More Controversial, Too," Venture Beat, March 15, 2014, http://venturebeat.com/2014/03/15/predictive-tech-is-getting-smarter-and-more-pervasive-but-more-controversial-too/.

3. V. K hosla, "Do We Need Doctors Or A lgorithms?" TechCrunch, January 10, 2012, http://techcrunch.com/2012/01/10/doctors-or-algorithms/.

4. M. Kinsley, "Have You Lost Your Mind?" New Yorker, April 28, 2014, http://www.newyorker.com/reporting/2014/04/28/140428fa_fact_kinsley.

5. "A Survey of the Future of Medicine," The Economist, March 19, 1994, http://www.highbeam.com/doc/1G1-15236568.html.

6. E. Topol, "Individualized Medicine from Prewomb to Tomb," Cell 157 (2014): 241–253.

7a. M. Petronzio, "How One Woman Hid Her Pregnancy from Big Data," Mashable, April 26, 2014, http://mashable.com/2014/04/26/big-data-pregnancy/.

7b. D. Harris, "How Machine Learning is Saving Lives While Saving Hospitals Money," Gigaom, July 14, 2014, http://gigaom.com/2014/07/14/how-machine-learning-is-saving-lives-while-saving-hospitals-money/.

107
{"b":"549432","o":1}