Читать «Будущее медицины: Ваше здоровье в ваших руках» онлайн - страница 282

Эрик Тополь

88b. E. D. Perakslis, "Cybersecurity in Health Care," New England Journal of Medicine 371, no. 5 (2014): 395–397.

88c. D. J. Nigrin, "When 'Hacktivists' Target Your Hospital," New England Journal of Medicine 371, no. 5 (2014): 393–395.

88d. N. Perlroth, "Hack of Community Health Systems Affects 4.5 Million Patients," New York Times, August 18, 2014, http://bits.blogs.nytimes.com/2014/08/18/hack-of-community-health-systems-affects-4-5-million-patients/?ref=health.

89. C. Wiltz, "Report: Healthcare Cybersecurity Appalling, Legislation Not Enough," MDDI, April 7, 2014, http://www.mddionline.com/article/report-healthcare-cybersecurity-legislation-not-enough.

90. L. Miller, "The Google of Spit," New York Magazine, April 22, 2014, http://nymag.com/news/features/23andme-2014-4/.

91. Y. Erlich and A. Narayanan, "Routes for Breaching and Protecting Genetic Privacy," Nature Reviews Genetics 15 (2014): 409–421.

92. K. Peikoff, "Fearing Punishment for Bad Genes," New York Times, April 8, 2014, http://www.nytimes.com/2014/04/08/science/fearing-punishment-for-bad-genes.html.

93. B. M. Knoppers, "It's Yet to Be Shown That Discrimination Exists," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/its-yet-to-be-shown-that-genetic-discrimination-exists.

94. Y. Joly, I. N. Feze, and J. Simard, "Genetic Discrimination and Life Insurance: A Systematic Review of the Evidence," BMC Medicine 11 (2013): 25.

95. A. S. Macdonald, "Risks Are Too Small for Insurers to Worry," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/risks-are-too-small-for-insurers-to-worry.

96. G. Gruber, "Guarantee Privacy to Ensure Proper Treatment," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/guarantee-privacy-to-ensure-proper-genetic-treatment.

97. M. Gymrek et al., "Identifying Personal Genomes by Surname Inference," Science 339 (2013):321–324.

98. P. Aldhous, "Genetic Mugshot Recreates Faces from Nothing but DNA," New Scientist, March 20, 2014, http://www.newscientist.com/article/mg22129613.600-genetic-mugshot-recreates-faces-from-nothing-but-dna.html.

99. O. Solon, "Algorithm Identifies Rare Genetic Disorders from Family Pics," Wired, June 24, 2014, http://www.wired.co.uk/news/archive/2014-06/24/facial-identification-genetic-disorders.

100. M. Angrist, "Open Window: When Easily Identifiable Genomes and Traits Are in the Public Domain," PLoS One 9, no. 3 (2014): e92060.

101. S. E. Brenner, "Be Prepared for the Big Genome Leak," Nature 498 (2013): 139.

102. D. Hernandez, "Selling Your Most Personal Item: You," Wired, March 27, 2013, http://www.wired.com/business/2013/03/miinome-genetic-marketplace/.

103. J. E. Lunshof, G. M. Church, and B. Prainsack, "Raw Personal Data: Providing Access," Science 343 (2014): 373–374.