78. R. Pierson, "FDA Urges Protection of Medical Devices from Cyber Threats," Medscape, 2013, http://www.medscape.com/viewarticle/806269_print.
79. A. Sarvestani, "Boston Children's Hospital Faces Cyber Threats – Are the Medical Devices Safe?" Mass Device, April 24, 2014, http://www.massdevice.com/news/boston-childrens-hospital-faces-cyber-threats-are-medical-devices-safe?page=show.
80. D. Talbot, "Encrypted Heartbeats Keep Hackers from Medical Implants," MIT Technology Re– view, September 16, 2013, http://www.technologyreview.com/news/519266/encrypted-heartbeats-keep-hackers-from-medical-implants/.
81. K. Zetter, "It's Insanely Easy to Hack Hospital Equipment," Wired, April 25, 2014, http://www.wired.com/2014/04/hospital-equipment-vulnerable/.
82. L. Hood, "Your Body Is the Next Frontier in Cybercrime," The Conversation, October 1, 2013, https://theconversation.com/your-body-is-the-next-frontier-in-cybercrime-18771.
83. J. A. Finkle, "A Security Firm Has Hired the Diabetic Who Hacked into His Own Insulin Pump to Show How It Could Be Used to Kill People," Business Insider, May 30, 2014, http://www.businessinsider.com/r-rapid7-hires-jay-radcliffe-diabetic-who-hacked-his-insulin-pump-2014-29.
84. N. Perlroth, "Heartbleed Highlights a Contradiction in the Web," New York Times, April 19, 2014, http://www.nytimes.com/2014/04/19/technology/heartbleed-highlights-a-contradiction-in-the-web.html.
85. N. Perlroth and Q. Hardy, "Heartbleed Flaw Could Reach Beyond Websites to Digital Devices, Experts Say," New York Times, April 11, 2014, http://www.nytimes.com/2014/04/11/business/security-flaw-could-reach-beyond-websites-to-digital-devices-experts-say.html.
86. R. Merkel, "How the Heartbleed Bug Reveals a Flaw in Online Security," The Conversation, April 11, 2014, https://theconversation.com/how-the-heartbleed-bug-reveals-a-flaw-in-online-security-25536.
87. "CyberR x Health Industry Cyber Threat Exercise, Spring 2014," HITRUST Alliance Inc., April 21, 2014, http://hitrustalliance.net/content/uploads/ 2014/05/CyberRX _Preliminary_Report.pdf.
88a. J. Conn, "Cybersecurity Test Finds Healthcare Communications Weak Links," Modern Health– care, April 21, 2014, http://www.modernhealthcare.com/article/ 20140421/NEWS/304219940/.
88b. E. D. Perakslis, "Cybersecurity in Health Care," New England Journal of Medicine 371, no. 5 (2014): 395–397.
88c. D. J. Nigrin, "When 'Hacktivists' Target Your Hospital," New England Journal of Medicine 371, no. 5 (2014): 393–395.
88d. N. Perlroth, "Hack of Community Health Systems Affects 4.5 Million Patients," New York Times, August 18, 2014, http://bits.blogs.nytimes.com/2014/08/18/hack-of-community-health-systems-affects-4-5-million-patients/?ref=health.
89. C. Wiltz, "Report: Healthcare Cybersecurity Appalling, Legislation Not Enough," MDDI, April 7, 2014, http://www.mddionline.com/article/report-healthcare-cybersecurity-legislation-not-enough.
90. L. Miller, "The Google of Spit," New York Magazine, April 22, 2014, http://nymag.com/news/features/23andme-2014-4/.
91. Y. Erlich and A. Narayanan, "Routes for Breaching and Protecting Genetic Privacy," Nature Reviews Genetics 15 (2014): 409–421.
92. K. Peikoff, "Fearing Punishment for Bad Genes," New York Times, April 8, 2014, http://www.nytimes.com/2014/04/08/science/fearing-punishment-for-bad-genes.html.
93. B. M. Knoppers, "It's Yet to Be Shown That Discrimination Exists," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/its-yet-to-be-shown-that-genetic-discrimination-exists.
94. Y. Joly, I. N. Feze, and J. Simard, "Genetic Discrimination and Life Insurance: A Systematic Review of the Evidence," BMC Medicine 11 (2013): 25.
95. A. S. Macdonald, "Risks Are Too Small for Insurers to Worry," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/risks-are-too-small-for-insurers-to-worry.
96. G. Gruber, "Guarantee Privacy to Ensure Proper Treatment," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/guarantee-privacy-to-ensure-proper-genetic-treatment.
97. M. Gymrek et al., "Identifying Personal Genomes by Surname Inference," Science 339 (2013):321–324.
98. P. Aldhous, "Genetic Mugshot Recreates Faces from Nothing but DNA," New Scientist, March 20, 2014, http://www.newscientist.com/article/mg22129613.600-genetic-mugshot-recreates-faces-from-nothing-but-dna.html.
99. O. Solon, "Algorithm Identifies Rare Genetic Disorders from Family Pics," Wired, June 24, 2014, http://www.wired.co.uk/news/archive/2014-06/24/facial-identification-genetic-disorders.
100. M. Angrist, "Open Window: When Easily Identifiable Genomes and Traits Are in the Public Domain," PLoS One 9, no. 3 (2014): e92060.
101. S. E. Brenner, "Be Prepared for the Big Genome Leak," Nature 498 (2013): 139.
102. D. Hernandez, "Selling Your Most Personal Item: You," Wired, March 27, 2013, http://www.wired.com/business/2013/03/miinome-genetic-marketplace/.
103. J. E. Lunshof, G. M. Church, and B. Prainsack, "Raw Personal Data: Providing Access," Science 343 (2014): 373–374.
104. B. Dolan, "In-Depth: Consumer Health and Data Privacy Issues Beyond HIPA A," MobiHealth– News, May 23, 2014, http://mobihealthnews.com/33393/in-depth-consumer-health-and-data-privacy-issues-beyond-hipaa/.
105. S. Fairclough, "Physiological Data Must Remain Confidential," Nature 505 (2014): 263.
Глава 13
1. E. Brynjolfsson and A. McAfee, The Second Machine Age (New York, NY: W.W. Norton & Co., 2013).
2. D. Hardawar, "Predictive Tech Is Getting Smarter and More Pervasive – but More Controversial, Too," Venture Beat, March 15, 2014, http://venturebeat.com/2014/03/15/predictive-tech-is-getting-smarter-and-more-pervasive-but-more-controversial-too/.
3. V. K hosla, "Do We Need Doctors Or A lgorithms?" TechCrunch, January 10, 2012, http://techcrunch.com/2012/01/10/doctors-or-algorithms/.
4. M. Kinsley, "Have You Lost Your Mind?" New Yorker, April 28, 2014, http://www.newyorker.com/reporting/2014/04/28/140428fa_fact_kinsley.
5. "A Survey of the Future of Medicine," The Economist, March 19, 1994, http://www.highbeam.com/doc/1G1-15236568.html.
6. E. Topol, "Individualized Medicine from Prewomb to Tomb," Cell 157 (2014): 241–253.