Эрик Тополь - Будущее медицины: Ваше здоровье в ваших руках
- Название:Будущее медицины: Ваше здоровье в ваших руках
- Автор:
- Жанр:
- Издательство:Альпина нон-фикшн
- Год:2016
- Город:Москва
- ISBN:978-5-9614-4338-7
- Рейтинг:
- Избранное:Добавить в избранное
-
Отзывы:
-
Ваша оценка:
Эрик Тополь - Будущее медицины: Ваше здоровье в ваших руках краткое содержание
Известный врач, ученый, первопроходец передовых технологий в медицине Эрик Тополь считает, что традиционная субординация в отношениях врача и пациента уходит в прошлое, человек сам становится хозяином своего здоровья, и неизбежная демократизация медицины обещает нам ее эффективность и доступность.
Будущее медицины: Ваше здоровье в ваших руках - читать онлайн бесплатно ознакомительный отрывок
Интервал:
Закладка:
44. S. Kroft, "The Data Brokers: Selling Your Personal Information," CBS News, March 9, 2014, http://www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/.
45. A. E. Marwick, "How Your Data Are Being Deeply Mined," New York Review of Books , January 9, 2014, http://www.nybooks.com/articles/archives/2014/jan/09/how-your-data-are-being-deeply-mined/?pagination=false&printpage=true.
46. N. Singer, "A Student-Data Collector Drops Out," New York Times, April 27, 2014, http://www.nytimes.com/2014/04/27/technology/a-student-data-collector-drops-out.html.
47. J. Lanier, "How Should We Think About Privacy?" Scientific American 309, no. 5 (2013):64–71.
48. D. M. Jackson, "When Meta Met Data," New York Times , October 4, 2013, http://www.nytimes.com/2013/10/06/magazine/when-meta-met-data.html?pagewanted=all.
49. R. J. Rosen, "Stanford Researchers: It Is Trivially Easy to Match Metadata to Real People," The Atlantic , December 2013, http://www.theatlantic.com/technology/print/2013/12/stanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people/282642/.
50. T. Lahey, "A Watchful Eye in Hospitals," New York Times , February 17, 2014, http://www.nytimes.com/2014/02/17/opinion/a-watchful-eye-in-hospitals.html.
51. S. D. Hall, "Medical Identity Theft Up 20 % Since 2012," Fierce Health IT, September 12, 2013, http://www.fiercehealthit.com/story/how-to-prevent-medical-identity-theft/2013-09-12.
52. M. Ollove, "The Rise of Medical Identity Theft in Healthcare," Kaiser Health News , February 7, 2014, http://www.kaiserhealthnews.org/Stories/2014/February/07/Rise-of-indentity-theft.aspx.
53. M. Madden, "More Online Americans Say They've Experienced a Personal Data Breach," Pew Research , April 14, 2014, http://www.pewresearch.org/fact-tank/2014/04/14/more-online-americans-say-theyve-experienced-a-personal-data-breach/.
54. "Better Information Means Better Care," NHS, January 14, 2014, http://www.england.nhs.uk/wp-content/uploads/2014/01/cd-leaflet-01-14.pdf.
55. "Careless.data," Nature 507 (2014): 7.
56. B. Goldacre, "Care.data Is in Chaos. It Breaks My Heart," The Guardian , February 28, 2014, http://www.theguardian.com/commentisfree/2014/feb/28/care-data-is-in-chaos/print.
57. E. Callaway, "UK Push to Open Up Patients' Data," Nature 502 (2013): 283.
58. L. Donnelly, "Patient Records Should Not Have Been Sold, NHS Admits," Telegraph, February 24, 2014, http://www.telegraph.co.uk/health/nhs/10659147/Patient-records-should-not-have-been-sold-NHS-admits.html.
59. R. Ramesh, "NHS Patient Data to Be Made Available for Sale to Drug and Insurance Firms," The Guardian , January 19, 2014, http://www.theguardian.com/society/2014/jan/19/nhs-patient-data-available-companies-buy/print.
60. J. Best, "Big Doubts on Big Data: Why I Won't Be Sharing My Medical Data with Anyone – yet," ZDNet, February 19, 2014, http://www.zdnet.com/uk/big-doubts-on-big-data-why-i-wont-be-sharing-my-medical-data-with-anyone-yet-7000026497/.
61. S. Knapton, "Health Records of Every NHS Patient to Be Shared in Vast Database," Telegraph, January 10, 2014, http://www.telegraph.co.uk/news/10565160/Health-records-of-every-NHS-patient-to-be-shared-in-vast-database.html.
62. C. Manson, "Could Controversial Data Sharing Be Good for Patient Health?" The Guardian, April 22, 2014, http://www.theguardian.com/healthcare-net work/2014/apr/22/controversial-data-sharing-good-patient-health/print.
63. J. Comstock, "Health App Makers Face Privacy and Security Regulation from Many Quarters," MobiHealthNews , January 28, 2014, http://mobihealthnews.com/29336/health-app-makers-face-privacy-and-security-regulation-from-many-quarters/.
64. H. Smith, "mHealth and HIPA A Breaches – Where Are They?" What's Harold In , February 16, 2014, http://whats.harold.in/2014/02/mhealth-and-hipaa-breaches-where-are.html.
65. J. L. Hall, and D. McGraw, "For Telehealth to Succeed, Privacy and Security Risks Must Be Identified and Addressed," Health Affairs 33, no. 2 (2014): 216–221.
66. "Privacy Rights Clearinghouse Releases Study: Mobile Health and Fitness Apps: What Are the Privacy R isks?" Privacy R ights Clearinghouse, July 15, 2013, http://www.privacyrights.org/mobile-medical-apps-privacy-alert.
67. A. Carrns, "Free Apps for Nearly Every Health Problem, but What About Privacy?" New York Times , September 12, 2013, http://www.nytimes.com/2013/09/12/your-money/free-apps-for-nearly-every-health-problem-but-what-about-privacy.html.
68. A. Campbell, "Dispatch Software for Trucking: How GPS Tracking Systems Affect Performance," Trucking Office , August 21, 2013, http://www.truckingoffice.com/2013/dispatch-software-for-trucking-how-gps-tracking-systems-affect-performance.
69. N. Greenfieldboyce, "Indie Truckers: Keep Big Brother Out of My Cab," NPR , April 20, 2011, http://www.npr.org/2011/04/20/135507979/indie-truckers-keep-big-brother-out-of-my-cab.
70. B. Greene, "How Your Boss Can Keep You on a Leash," CNN , February 2, 2014, http://www.cnn.com/2014/02/02/opinion/greene-corporate-surveillance/index.html?iref=allsearch.
71. H. J. Wilson, "Wearable Gadgets Transform How Companies Do Business," Wall Street Journal , October 20, 2013, http://online.wsj.com/news/articles/SB1000 1424052702303796404579099203059125112.
72. T. Simonite, "Using a Smartphone's Eyes and Ears to Log Your Every Move," MIT Technolog y Review , July 4, 2013, http://www.technologyreview.com/news/516566/using-a-smartphones-eyes-and-ears-to-log-your-every-move/.
73. L. Eadicicco, "What Fitbit and Nest Are Doing with Your Data," Slate , April 19, 2014, http://www.slate.com/blogs/business_insider/2014/04/19/fitbit_nest_data_how_the_companies_are_making_money_off_you.html.
74. A. Pai, "Nielsen: 46 Million People Used Fitness Apps in January," in MobiHealthNews, April 17, 2014, http://mobihealthnews.com/32183/nielsen-46-million-people-used-fitness-apps-in-january/.
75. T. Klosowski, "Lots of Health Apps Are Selling Your Data. Here's Why," Lifehacker, May 9, 2014, http://lifehacker.com/lots-of-health-apps-are-selling-your-data-heres-why-1574001899.
76. C. Rubin, "Your Trainer Saw That," New York Times , April 17, 2014, http://www.nytimes.com/2014/04/17/fashion/devices-like-fitbit-and-up24-being-used-by-gyms-to-track-clients-fitness-activity.html.
77. T. Lee, "Hackers Break into Networks of 3 Big Medical Device Makers," SF Gate, February 8, 2014, http://m.sfgate.com/news/article/Hackers-break-into-networks-of-3-big-medical-5217780.php
78. R. Pierson, "FDA Urges Protection of Medical Devices from Cyber Threats," Medscape, 2013, http://www.medscape.com/viewarticle/806269_print.
79. A. Sarvestani, "Boston Children's Hospital Faces Cyber Threats – Are the Medical Devices Safe?" Mass Device , April 24, 2014, http://www.massdevice.com/news/boston-childrens-hospital-faces-cyber-threats-are-medical-devices-safe?page=show.
80. D. Talbot, "Encrypted Heartbeats Keep Hackers from Medical Implants," MIT Technology Re– view , September 16, 2013, http://www.technologyreview.com/news/519266/encrypted-heartbeats-keep-hackers-from-medical-implants/.
81. K. Zetter, "It's Insanely Easy to Hack Hospital Equipment," Wired, April 25, 2014, http://www.wired.com/2014/04/hospital-equipment-vulnerable/.
82. L. Hood, "Your Body Is the Next Frontier in Cybercrime," The Conversation, October 1, 2013, https://theconversation.com/your-body-is-the-next-frontier-in-cybercrime-18771.
83. J. A. Finkle, "A Security Firm Has Hired the Diabetic Who Hacked into His Own Insulin Pump to Show How It Could Be Used to Kill People," Business Insider, May 30, 2014, http://www.businessinsider.com/r-rapid7-hires-jay-radcliffe-diabetic-who-hacked-his-insulin-pump-2014-29.
84. N. Perlroth, "Heartbleed Highlights a Contradiction in the Web," New York Times, April 19, 2014, http://www.nytimes.com/2014/04/19/technology/heartbleed-highlights-a-contradiction-in-the-web.html.
85. N. Perlroth and Q. Hardy, "Heartbleed Flaw Could Reach Beyond Websites to Digital Devices, Experts Say," New York Times , April 11, 2014, http://www.nytimes.com/2014/04/11/business/security-flaw-could-reach-beyond-websites-to-digital-devices-experts-say.html.
86. R. Merkel, "How the Heartbleed Bug Reveals a Flaw in Online Security," The Conversation, April 11, 2014, https://theconversation.com/how-the-heartbleed-bug-reveals-a-flaw-in-online-security-25536.
87. "CyberR x Health Industry Cyber Threat Exercise, Spring 2014," HITRUST Alliance Inc., April 21, 2014, http://hitrustalliance.net/content/uploads/ 2014/05/CyberRX _Preliminary_Report.pdf.
88a. J. Conn, "Cybersecurity Test Finds Healthcare Communications Weak Links," Modern Health– care , April 21, 2014, http://www.modernhealthcare.com/article/ 20140421/NEWS/304219940/.
88b. E. D. Perakslis, "Cybersecurity in Health Care," New England Journal of Medicine 371, no. 5 (2014): 395–397.
88c. D. J. Nigrin, "When 'Hacktivists' Target Your Hospital," New England Journal of Medicine 371, no. 5 (2014): 393–395.
88d. N. Perlroth, "Hack of Community Health Systems Affects 4.5 Million Patients," New York Times , August 18, 2014, http://bits.blogs.nytimes.com/2014/08/18/hack-of-community-health-systems-affects-4-5-million-patients/?ref=health.
89. C. Wiltz, "Report: Healthcare Cybersecurity Appalling, Legislation Not Enough," MDDI, April 7, 2014, http://www.mddionline.com/article/report-healthcare-cybersecurity-legislation-not-enough.
90. L. Miller, "The Google of Spit," New York Magazine, April 22, 2014, http://nymag.com/news/features/23andme-2014-4/.
91. Y. Erlich and A. Narayanan, "Routes for Breaching and Protecting Genetic Privacy," Nature Reviews Genetics 15 (2014): 409–421.
92. K. Peikoff, "Fearing Punishment for Bad Genes," New York Times , April 8, 2014, http://www.nytimes.com/2014/04/08/science/fearing-punishment-for-bad-genes.html.
93. B. M. Knoppers, "It's Yet to Be Shown That Discrimination Exists," New York Times , April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/its-yet-to-be-shown-that-genetic-discrimination-exists.
94. Y. Joly, I. N. Feze, and J. Simard, "Genetic Discrimination and Life Insurance: A Systematic Review of the Evidence," BMC Medicine 11 (2013): 25.
95. A. S. Macdonald, "Risks Are Too Small for Insurers to Worry," New York Times , April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/risks-are-too-small-for-insurers-to-worry.
96. G. Gruber, "Guarantee Privacy to Ensure Proper Treatment," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/guarantee-privacy-to-ensure-proper-genetic-treatment.
97. M. Gymrek et al., "Identifying Personal Genomes by Surname Inference," Science 339 (2013):321–324.
98. P. Aldhous, "Genetic Mugshot Recreates Faces from Nothing but DNA," New Scientist , March 20, 2014, http://www.newscientist.com/article/mg22129613.600-genetic-mugshot-recreates-faces-from-nothing-but-dna.html.
99. O. Solon, "Algorithm Identifies Rare Genetic Disorders from Family Pics," Wired, June 24, 2014, http://www.wired.co.uk/news/archive/2014-06/24/facial-identification-genetic-disorders.
Читать дальшеИнтервал:
Закладка: