Читать «Будущее медицины: Ваше здоровье в ваших руках» онлайн - страница 282
Эрик Тополь
88b. E. D. Perakslis, "Cybersecurity in Health Care,"
88c. D. J. Nigrin, "When 'Hacktivists' Target Your Hospital,"
88d. N. Perlroth, "Hack of Community Health Systems Affects 4.5 Million Patients,"
89. C. Wiltz, "Report: Healthcare Cybersecurity Appalling, Legislation Not Enough," MDDI, April 7, 2014, http://www.mddionline.com/article/report-healthcare-cybersecurity-legislation-not-enough.
90. L. Miller, "The Google of Spit,"
91. Y. Erlich and A. Narayanan, "Routes for Breaching and Protecting Genetic Privacy,"
92. K. Peikoff, "Fearing Punishment for Bad Genes,"
93. B. M. Knoppers, "It's Yet to Be Shown That Discrimination Exists,"
94. Y. Joly, I. N. Feze, and J. Simard, "Genetic Discrimination and Life Insurance: A Systematic Review of the Evidence,"
95. A. S. Macdonald, "Risks Are Too Small for Insurers to Worry,"
96. G. Gruber, "Guarantee Privacy to Ensure Proper Treatment,"
97. M. Gymrek et al., "Identifying Personal Genomes by Surname Inference,"
98. P. Aldhous, "Genetic Mugshot Recreates Faces from Nothing but DNA,"
99. O. Solon, "Algorithm Identifies Rare Genetic Disorders from Family Pics,"
100. M. Angrist, "Open Window: When Easily Identifiable Genomes and Traits Are in the Public Domain,"
101. S. E. Brenner, "Be Prepared for the Big Genome Leak,"
102. D. Hernandez, "Selling Your Most Personal Item: You,"
103. J. E. Lunshof, G. M. Church, and B. Prainsack, "Raw Personal Data: Providing Access,"