Глава 12

1. L. Fox, «Snowden and His Accomplices,» Wall Street Journal, April 14, 2014, http://online.wsj.com/news/articles/SB100 01424052702303603904579495391321958008.

2. N. Bilton, "Entering the Era of Private and Semi-Anonymous Apps," New York Times, February 7, 2014, http://bits.blogs.nytimes.com/2014/02/07/entering-the-era-of-private-and-semi-anonymous-apps/?ref=technology.

3. S. Halpern, "Partial Disclosure," New York Review of Books, July 10, 2014, http://www.nybooks.com/articles/archives/2014/jul/10/glenn-greenwald-partial-disclosure/?pagination=false&printpage=true.

4. D. Frum, "We Need More Secrecy," The Atlantic, May 2014, http://www.theatlantic.com/magazine/print/2014/05/we-need-more-secrecy/359820/.

5. "A Robust Health Data Infrastructure," Agency for Health Care Research and Quality, April 2014, http://healthit.gov/sites/default/files/ptp13-700hhs_white.pdf.

6. H. Kahn, "Who Really Owns Your Personal Data?" Details, May 1, 2013, http://www.details.com/culture-trends/critical-eye/201305/sharing-biodata-on-apps-and-devices?printable=true.

7. L. Mearian, "How Big Data Will Save Your Life," Computer World, April 25, 2013, http://www.computer world.com/s/article/print/9238593/How_big _data _will _ save _your_life?ta xonomyName=Big+Data&taxonomyId=221.

8. E. B. Larson, "Building Trust in the Power of 'Big Data' Research to Serve the Public Good," Journal of the American Medical Association 309, no. 23 (2013): 2443–2444.

9. J. Ball and S. Ackerman, "NSA Loophole Allows Warrantless Search for US Citizens' Emails and Phone Calls," The Guardian, August 9, 2013, http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls/print.

10. J. Glanz, J.

Larson, and A. W. Lehren, "Spy Agencies Tap Data Streaming from Phone Apps," New York Times, January 28, 2014, http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html.

11. J. Angwin, Dragnet Nation: A Quest for Privacy, Security, and Freedom In a World of Relentless Surveillance (New York, NY: Henry Holt and Co., 2014).

12. J. Angwin, "Has Privacy Become a Luxury Good?" New York Times, March 4, 2014, http://www.nytimes.com/2014/03/04/opinion/has-privacy-become-a-luxury-good.html.

13. M. Wood, "Sweeping Away a Search History," New York Times, April 3, 2014, http://www.nytimes.com/2014/04/03/technology/personaltech/sweeping-away-a-search-history.html.

14. T. Gara, "What Google Knows About You," Wall Street Journal, April 27, 2014, http://blogs.wsj.com/indiarealtime/2014/04/27/googles-all-seeing-eye-does-it-see-into-me-clearly-or-darkly/tab/print/.

15. M. Sopfner, "Why We Fear Google," Frankfurter Allgemeine Feuilleton, April 17, 2014, http://www.faz.net/-gsf-7oid8.

16. D. Talbot, "Ultraprivate Smartphones: New Models Built with Security and Privacy in Mind Reflect the Zeitgeist of the Snowden Era," MIT Technolog y Review, April 23, 2014, http://www.technologyreview.com/featuredstory/526496/ultraprivate-smartphones/.

17. G. Schmidt, "Cellphone Cases to Prepare You for Anything, Even a Flat Tire," New York Times, April 24, 2014, http://www.nytimes.com/2014/04/24/technolog y/personaltech/cellphone-cases-to-prepare-you-for-anything-even-a-flat-tire.html.

18. K. Wagstaff, "Anonymous, Inc.: The Corporate Set Embraces Digital Ephemerality," Wall Street Journal, May 29, 2014, http://online.wsj.com/articles/anonymous-inc-the-corporate-set-embraces-digital-ephemerality-1401378250.

19. E. Mills, "Obama Unveils Consumer Privacy Bill of Rights," CNET, February 22, 2012, http://www.cnet.com/news/obama-unveils-consumer-privacy-bill-of-rights/.

20. S. Lohr, "White House Tech Advisers: Online Privacy Is a 'Market Failure,'" New York Times, May 5, 2014, http://bits.blogs.nytimes.com/2014/05/05/white-house-tech-advisers-online-privacy-is-a-market-failure/.

21. S. Lyon, "Obama's Orwellian Image Control," New York Times, December 12, 2013, http://www.nytimes.com/2013/12/12/opinion/obamas-orwellian-image-control.html.

22. T. Simonite, "Five Things Obama's Big Data Experts Warned Him About," MIT Technology Review, May 1, 2014, http://www.technolog yreview.com/view/527071/five-things-obamas-big-data-experts-warned-him-about/.

23. "Report to the President: Big Data and Privacy: A Technological Perspective," President's Council of Advisors on Science and Technolog y, May 2014, http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf.

24. "Big Data: Seizing Opportunities, Preserving Values," Executive Office of the President, May 1, 2014, http://www.whitehouse.gov/sites/default/files/docs/big _data _privacy_report _may_1_2014.pdf.

25. A. C. Madrigal, "I'm Being Followed: How Google – and 104 Other Companies – Are Tracking Me on the Web," The Atlantic, February 2014, http://www.theatlantic.com/technology/print/2012/02/ im-being-foll%C951-and-104-other-companies-151-are-tracking-me-on-the-web/253758/.

26. S. Wolfram, "Data Science of the Facebook World," Stephen Wolfram Blog, April 24, 2014, http://blog.stephenwolfram.com/2013/04/data-science-of-the-facebook-world/.

27. D. Mann, "1984 in 2014," EP Studios Software, April 21, 2014, http://www.epstudiossoftware.com/?p=1411.

28. H. Kelly, "After Boston: The Pros and Cons of Surveillance Cameras," CNN, April 26, 2013, http://www.cnn.com/2013/04/26/tech/innovation/security-cameras-boston-bombings/.

29. S. Clifford and Q. Hardy, "Attention, Shoppers: Store Is Tracking Your Cell," New York Times, July 15, 2013, http://www.nytimes.com/2013/07/15/business/attention-shopper-stores-are-tracking-your-cell.html.

30. C. Duhigg, "How Companies Learn Your Secrets," New York Times, February 19, 2012, http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html.

31. K. Hill, "How Target Figured Out a Teen Girl Was Pregnant Before Her Father Did," Forbes, February 16, 2014, http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/print/.

32. C. C. Miller and S. Sengupta, "Selling Secrets of Phone Users to Advertisers," New York Times, October 6, 2013, http://www.nytimes.com/2013/10/06/technology/selling-secrets-of-phone-users-to-advertisers.html.

33a. D. Talbot, "Now Your Phone's Tilt Sensor Can Identify You," MIT Technology Review, May 1, 2014, http://www.technologyreview.com/news/527031/now-your-phones-tilt-sensor-can-identify-you/.

33b. Q. Hardy, "How Urban Anonymity Disappears When All Data Is Tracked," New York Times Bits, April 19, 2014, http://bits.blogs.nytimes.com/2014/04/19/how-urban-anonymity-disappears-when-all-data-is-tracked/?_php=true&_type=blogs&_r=0.

34. B. Morais, "Through a Face Scanner Darkly," New Yorker, January 31, 2014, http://www.newyorker.com/online/blogs/elements/2014/02/through-a-face-scanner-darkly.html?printable=true¤tPage=all.

35. N. Singer, "When No One Is Just a Face in the Crowd," New York Times, February 2, 2014, http://www.nytimes.com/2014/02/02/technology/when-no-one-is-just-a-face-in-the-crowd.html.

36. "The Face Recognition Algorithm That Finally Outperforms Humans," Medium, April 22, 2014, https://medium.com/the-physics-arxiv-blog/2c567adbf 7fc.

37. D. Cardwell, "At Newark Airport, the Lights Are On, and They're Watching You," New York Times, February 18, 2014, http://www.nytimes.com/2014/02/18/business/at-newark-airport-the-lights-are-on-and-theyre-watching-you.html.

38. "Clever Cities: The Multiplexed Metropolis," The Economist, September 15, 2014, http://www.economist.com/node/21585002/print.

39. "Biometric Technology Identifies One of the Boston Marathon Bombers," Homeland Security News Wire, May 28, 2013, http://www.homelandsecurit ynewswire.com/dr20130527-biometric-technology-identifies-one-of-the-boston-marathon-bombers.

40. D. Eggers, The Circle (San Francisco, CA: McSweeney's Books, 2013).

41. M. Atwood, "When Privacy Is Theft," New York Review of Books, November 21, 2013, http://www.nybooks.com/articles/archives/2013/nov/21/eggers-circle-when-privacy-is-theft/?pagination=false&printpage=true.

42. J. Nocera, "A World Without Privacy," New York Times, October 15, 2013, http://www.nytimes.com/2013/10/15/opinion/nocera-a-world-without-privacy.html.

43. A. Townsend, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia (New York, NY: W. W. Norton & Co., 2013).

44. S. Kroft, "The Data Brokers: Selling Your Personal Information," CBS News, March 9, 2014, http://www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/.

45. A. E. Marwick, "How Your Data Are Being Deeply Mined," New York Review of Books, January 9, 2014, http://www.nybooks.com/articles/archives/2014/jan/09/how-your-data-are-being-deeply-mined/?pagination=false&printpage=true.

46. N. Singer, "A Student-Data Collector Drops Out," New York Times, April 27, 2014, http://www.nytimes.com/2014/04/27/technology/a-student-data-collector-drops-out.html.

47. J. Lanier, "How Should We Think About Privacy?" Scientific American 309, no. 5 (2013):64–71.

48. D. M. Jackson, "When Meta Met Data," New York Times, October 4, 2013, http://www.nytimes.com/2013/10/06/magazine/when-meta-met-data.html?pagewanted=all.

49. R. J. Rosen, "Stanford Researchers: It Is Trivially Easy to Match Metadata to Real People," The Atlantic, December 2013, http://www.theatlantic.com/technology/print/2013/12/stanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people/282642/.

50. T. Lahey, "A Watchful Eye in Hospitals," New York Times, February 17, 2014, http://www.nytimes.com/2014/02/17/opinion/a-watchful-eye-in-hospitals.html.

51. S. D. Hall, "Medical Identity Theft Up 20 % Since 2012," Fierce Health IT, September 12, 2013, http://www.fiercehealthit.com/story/how-to-prevent-medical-identity-theft/2013-09-12.

52. M. Ollove, "The Rise of Medical Identity Theft in Healthcare," Kaiser Health News, February 7, 2014, http://www.kaiserhealthnews.org/Stories/2014/February/07/Rise-of-indentity-theft.aspx.

53. M. Madden, "More Online Americans Say They've Experienced a Personal Data Breach," Pew Research, April 14, 2014, http://www.pewresearch.org/fact-tank/2014/04/14/more-online-americans-say-theyve-experienced-a-personal-data-breach/.

54. "Better Information Means Better Care," NHS, January 14, 2014, http://www.england.nhs.uk/wp-content/uploads/2014/01/cd-leaflet-01-14.pdf.

55. "Careless.data," Nature 507 (2014): 7.

56. B. Goldacre, "Care.data Is in Chaos. It Breaks My Heart," The Guardian, February 28, 2014, http://www.theguardian.com/commentisfree/2014/feb/28/care-data-is-in-chaos/print.

57. E. Callaway, "UK Push to Open Up Patients' Data," Nature 502 (2013): 283.

58. L. Donnelly, "Patient Records Should Not Have Been Sold, NHS Admits," Telegraph, February 24, 2014, http://www.telegraph.co.uk/health/nhs/10659147/Patient-records-should-not-have-been-sold-NHS-admits.html.

59. R. Ramesh, "NHS Patient Data to Be Made Available for Sale to Drug and Insurance Firms," The Guardian, January 19, 2014, http://www.theguardian.com/society/2014/jan/19/nhs-patient-data-available-companies-buy/print.

60. J. Best, "Big Doubts on Big Data: Why I Won't Be Sharing My Medical Data with Anyone – yet," ZDNet, February 19, 2014, http://www.zdnet.com/uk/big-doubts-on-big-data-why-i-wont-be-sharing-my-medical-data-with-anyone-yet-7000026497/.

61. S. Knapton, "Health Records of Every NHS Patient to Be Shared in Vast Database," Telegraph, January 10, 2014, http://www.telegraph.co.uk/news/10565160/Health-records-of-every-NHS-patient-to-be-shared-in-vast-database.html.

62. C. Manson, "Could Controversial Data Sharing Be Good for Patient Health?" The Guardian, April 22, 2014, http://www.theguardian.com/healthcare-net work/2014/apr/22/controversial-data-sharing-good-patient-health/print.

63. J. Comstock, "Health App Makers Face Privacy and Security Regulation from Many Quarters," MobiHealthNews, January 28, 2014, http://mobihealthnews.com/29336/health-app-makers-face-privacy-and-security-regulation-from-many-quarters/.

64. H. Smith, "mHealth and HIPA A Breaches – Where Are They?" What's Harold In, February 16, 2014, http://whats.harold.in/2014/02/mhealth-and-hipaa-breaches-where-are.html.

65. J. L. Hall, and D. McGraw, "For Telehealth to Succeed, Privacy and Security Risks Must Be Identified and Addressed," Health Affairs 33, no. 2 (2014): 216–221.

66. "Privacy Rights Clearinghouse Releases Study: Mobile Health and Fitness Apps: What Are the Privacy R isks?" Privacy R ights Clearinghouse, July 15, 2013, http://www.privacyrights.org/mobile-medical-apps-privacy-alert.

67. A. Carrns, "Free Apps for Nearly Every Health Problem, but What About Privacy?" New York Times, September 12, 2013, http://www.nytimes.com/2013/09/12/your-money/free-apps-for-nearly-every-health-problem-but-what-about-privacy.html.

68. A. Campbell, "Dispatch Software for Trucking: How GPS Tracking Systems Affect Performance," Trucking Office, August 21, 2013, http://www.truckingoffice.com/2013/dispatch-software-for-trucking-how-gps-tracking-systems-affect-performance.

69. N. Greenfieldboyce, "Indie Truckers: Keep Big Brother Out of My Cab," NPR, April 20, 2011, http://www.npr.org/2011/04/20/135507979/indie-truckers-keep-big-brother-out-of-my-cab.

70. B. Greene, "How Your Boss Can Keep You on a Leash," CNN, February 2, 2014, http://www.cnn.com/2014/02/02/opinion/greene-corporate-surveillance/index.html?iref=allsearch.

71. H. J. Wilson, "Wearable Gadgets Transform How Companies Do Business," Wall Street Journal, October 20, 2013, http://online.wsj.com/news/articles/SB1000 1424052702303796404579099203059125112.

72. T. Simonite, "Using a Smartphone's Eyes and Ears to Log Your Every Move," MIT Technolog y Review, July 4, 2013, http://www.technologyreview.com/news/516566/using-a-smartphones-eyes-and-ears-to-log-your-every-move/.

73. L. Eadicicco, "What Fitbit and Nest Are Doing with Your Data," Slate, April 19, 2014, http://www.slate.com/blogs/business_insider/2014/04/19/fitbit_nest_data_how_the_companies_are_making_money_off_you.html.

74. A. Pai, "Nielsen: 46 Million People Used Fitness Apps in January," in MobiHealthNews, April 17, 2014, http://mobihealthnews.com/32183/nielsen-46-million-people-used-fitness-apps-in-january/.

75. T. Klosowski, "Lots of Health Apps Are Selling Your Data. Here's Why," Lifehacker, May 9, 2014, http://lifehacker.com/lots-of-health-apps-are-selling-your-data-heres-why-1574001899.

76. C. Rubin, "Your Trainer Saw That," New York Times, April 17, 2014, http://www.nytimes.com/2014/04/17/fashion/devices-like-fitbit-and-up24-being-used-by-gyms-to-track-clients-fitness-activity.html.

77. T. Lee, "Hackers Break into Networks of 3 Big Medical Device Makers," SF Gate, February 8, 2014, http://m.sfgate.com/news/article/Hackers-break-into-networks-of-3-big-medical-5217780.php

78. R. Pierson, "FDA Urges Protection of Medical Devices from Cyber Threats," Medscape, 2013, http://www.medscape.com/viewarticle/806269_print.

79. A. Sarvestani, "Boston Children's Hospital Faces Cyber Threats – Are the Medical Devices Safe?" Mass Device, April 24, 2014, http://www.massdevice.com/news/boston-childrens-hospital-faces-cyber-threats-are-medical-devices-safe?page=show.

80. D. Talbot, "Encrypted Heartbeats Keep Hackers from Medical Implants," MIT Technology Re– view, September 16, 2013, http://www.technologyreview.com/news/519266/encrypted-heartbeats-keep-hackers-from-medical-implants/.

81. K. Zetter, "It's Insanely Easy to Hack Hospital Equipment," Wired, April 25, 2014, http://www.wired.com/2014/04/hospital-equipment-vulnerable/.

82. L. Hood, "Your Body Is the Next Frontier in Cybercrime," The Conversation, October 1, 2013, https://theconversation.com/your-body-is-the-next-frontier-in-cybercrime-18771.

83. J. A. Finkle, "A Security Firm Has Hired the Diabetic Who Hacked into His Own Insulin Pump to Show How It Could Be Used to Kill People," Business Insider, May 30, 2014, http://www.businessinsider.com/r-rapid7-hires-jay-radcliffe-diabetic-who-hacked-his-insulin-pump-2014-29.

84. N. Perlroth, "Heartbleed Highlights a Contradiction in the Web," New York Times, April 19, 2014, http://www.nytimes.com/2014/04/19/technology/heartbleed-highlights-a-contradiction-in-the-web.html.

85. N. Perlroth and Q. Hardy, "Heartbleed Flaw Could Reach Beyond Websites to Digital Devices, Experts Say," New York Times, April 11, 2014, http://www.nytimes.com/2014/04/11/business/security-flaw-could-reach-beyond-websites-to-digital-devices-experts-say.html.

86. R. Merkel, "How the Heartbleed Bug Reveals a Flaw in Online Security," The Conversation, April 11, 2014, https://theconversation.com/how-the-heartbleed-bug-reveals-a-flaw-in-online-security-25536.

87. "CyberR x Health Industry Cyber Threat Exercise, Spring 2014," HITRUST Alliance Inc., April 21, 2014, http://hitrustalliance.net/content/uploads/ 2014/05/CyberRX _Preliminary_Report.pdf.

88a. J. Conn, "Cybersecurity Test Finds Healthcare Communications Weak Links," Modern Health– care, April 21, 2014, http://www.modernhealthcare.com/article/ 20140421/NEWS/304219940/.

88b. E. D. Perakslis, "Cybersecurity in Health Care," New England Journal of Medicine 371, no. 5 (2014): 395–397.

88c. D. J. Nigrin, "When 'Hacktivists' Target Your Hospital," New England Journal of Medicine 371, no. 5 (2014): 393–395.

88d. N. Perlroth, "Hack of Community Health Systems Affects 4.5 Million Patients," New York Times, August 18, 2014, http://bits.blogs.nytimes.com/2014/08/18/hack-of-community-health-systems-affects-4-5-million-patients/?ref=health.

89. C. Wiltz, "Report: Healthcare Cybersecurity Appalling, Legislation Not Enough," MDDI, April 7, 2014, http://www.mddionline.com/article/report-healthcare-cybersecurity-legislation-not-enough.

90. L. Miller, "The Google of Spit," New York Magazine, April 22, 2014, http://nymag.com/news/features/23andme-2014-4/.

91. Y. Erlich and A. Narayanan, "Routes for Breaching and Protecting Genetic Privacy," Nature Reviews Genetics 15 (2014): 409–421.

92. K. Peikoff, "Fearing Punishment for Bad Genes," New York Times, April 8, 2014, http://www.nytimes.com/2014/04/08/science/fearing-punishment-for-bad-genes.html.

93. B. M. Knoppers, "It's Yet to Be Shown That Discrimination Exists," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/its-yet-to-be-shown-that-genetic-discrimination-exists.

94. Y. Joly, I. N. Feze, and J. Simard, "Genetic Discrimination and Life Insurance: A Systematic Review of the Evidence," BMC Medicine 11 (2013): 25.

95. A. S. Macdonald, "Risks Are Too Small for Insurers to Worry," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/risks-are-too-small-for-insurers-to-worry.

96. G. Gruber, "Guarantee Privacy to Ensure Proper Treatment," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/guarantee-privacy-to-ensure-proper-genetic-treatment.

97. M. Gymrek et al., "Identifying Personal Genomes by Surname Inference," Science 339 (2013):321–324.

98. P. Aldhous, "Genetic Mugshot Recreates Faces from Nothing but DNA," New Scientist, March 20, 2014, http://www.newscientist.com/article/mg22129613.600-genetic-mugshot-recreates-faces-from-nothing-but-dna.html.

99. O. Solon, "Algorithm Identifies Rare Genetic Disorders from Family Pics," Wired, June 24, 2014, http://www.wired.co.uk/news/archive/2014-06/24/facial-identification-genetic-disorders.

100. M. Angrist, "Open Window: When Easily Identifiable Genomes and Traits Are in the Public Domain," PLoS One 9, no. 3 (2014): e92060.

101. S. E. Brenner, "Be Prepared for the Big Genome Leak," Nature 498 (2013): 139.

102. D. Hernandez, "Selling Your Most Personal Item: You," Wired, March 27, 2013, http://www.wired.com/business/2013/03/miinome-genetic-marketplace/.

103. J. E. Lunshof, G. M. Church, and B. Prainsack, "Raw Personal Data: Providing Access," Science 343 (2014): 373–374.

104. B. Dolan, "In-Depth: Consumer Health and Data Privacy Issues Beyond HIPA A," MobiHealth– News, May 23, 2014, http://mobihealthnews.com/33393/in-depth-consumer-health-and-data-privacy-issues-beyond-hipaa/.

105. S. Fairclough, "Physiological Data Must Remain Confidential," Nature 505 (2014): 263.

<< | >>
Источник: Эрик Тополь. Будущее медицины: Ваше здоровье в ваших руках. 2016

Еще по теме Глава 12:

  1. Глава 11
  2. Глава 6
  3. Глава 3
  4. Глава 1
  5. Глава 2
  6. Глава 4
  7. Глава 5
  8. Глава 7
  9. Глава 8
  10. Глава 9
  11. Глава 10
  12. Глава 12
  13. Глава 13