Будущее медицины: Ваше здоровье в ваших руках Тополь Эрик
113. M. Herper, "No More Secrets: Medtronic Shows How Open Science Might Work in the Real World," Forbes, June 19, 2013, http://www.forbes.com/sites/matthewherper/2013/06/19/no-more-secrets-medtronic-shows-how-open-science-might-work-in-the-real-world/.
114. J. S. Ross and H. M. Krumholz, "Ushering in a New Era of Open Science Through Data Sharing," Journal of the American Medical Association 309, no. 13 (2013): 1355–1356.
115. H. M. Krumholz, "Give the Data to the People," New York Times, February 3, 2014, http://www.nytimes.com/2014/02/03/opinion/give-the-data-to-the-people.html.
116. R. E. Kuntz, "The Changing Structure of Industry-Sponsored Clinical Research: Pioneering Data Sharing and Transparency," Annals of Internal Medicine 158, no. 12 (2013): 914–915.
117. R. Winslow and J. D. Rockoff, "J&J to Share Drug Research Data in Pact with Yale," Wall Street Journal, January 30, 2014, http://online.wsj.com/news/articles/SB1000 1424052702303743604579351261144315256.
118. "Discussion Framework for Clinical Trial Data Sharing Guiding Principles, Elements, and Ac– tivities," Institute of Medicine, Januar y 22, 2014, http://www.iom.edu/Reports/2014/Discussion-Framework-for-Clinical-Trial-Data-Sharing.aspx.
119. L. Marsa, "Health Care's Big Data Mandate," The Atlantic, December 16, 2013, http://www.theatlantic.com/sponsored/cvs-innovation-care/2013/12/health-cares-big-data-mandate/78/?sr_source=linkedin.
120. M. Langley and J. D. Rockoff, "Drug Companies Join NIH in Study of Alzheimer's, Diabetes, Rheumatoid Arthritis, Lupus," Wall Street Journal, February 3, 2014, http://online.wsj.com/news/articles/SB100 01424052702303519404579353442155924498-printMode.
121. J. Comstock, "UCLA Pilots Mobile Vision Testing App for Patients with Diabetes," MobiHealth-News, April 23, 2014, http://mobihealthnews.com/32369/ucla-pilots-mobile-vision-testing-app-for-patients-with-diabetes/.
122. V. Marx, "My Data Are Your Data," Nature Biotechnology 30, no. 6 (2012): 509–511.
123. P. Cameron et al., "Crowdfunding Genomics and Bioinformatics," Genome Biolog y 14 (2013):134.
124. K. Murphy, "Crowdfunding Tips for Turning Inspiration into Reality," New York Times, January 23, 2014, http://www.nytimes.com/2014/01/23/technology/ personaltech/crowdfunding-tips-for-turning-inspiration-into-reality.html.
125. B. L. Ranard et al., "Crowdsourcing – Harnessing the Masses to Advance Health and Medicine, a Systematic Review," Journal of General Internal Medicine 29, no. 1 (2013): 187–203.
126. S. Novella, "CureCrowd – Crowdsourcing Science," Science Based Medicine, May 7, 2014, http://www.sciencebasedmedicine.org/curecrowd-crowdsourcing-science/.
127. "Open-Source Medical Devices: When Code Can Kill or Cure," The Economist, May 31, 2012, http://www.economist.com/node/21556098.
Глава 12
1. L. Fox, «Snowden and His Accomplices,» Wall Street Journal, April 14, 2014, http://online.wsj.com/news/articles/SB100 01424052702303603904579495391321958008.
2. N. Bilton, "Entering the Era of Private and Semi-Anonymous Apps," New York Times, February 7, 2014, http://bits.blogs.nytimes.com/2014/02/07/entering-the-era-of-private-and-semi-anonymous-apps/?ref=technology.
3. S. Halpern, "Partial Disclosure," New York Review of Books, July 10, 2014, http://www.nybooks.com/articles/archives/2014/jul/10/glenn-greenwald-partial-disclosure/?pagination=false&printpage=true.
4. D. Frum, "We Need More Secrecy," The Atlantic, May 2014, http://www.theatlantic.com/magazine/print/2014/05/we-need-more-secrecy/359820/.
5. "A Robust Health Data Infrastructure," Agency for Health Care Research and Quality, April 2014, http://healthit.gov/sites/default/files/ptp13-700hhs_white.pdf.
6. H. Kahn, "Who Really Owns Your Personal Data?" Details, May 1, 2013, http://www.details.com/culture-trends/critical-eye/201305/sharing-biodata-on-apps-and-devices?printable=true.
7. L. Mearian, "How Big Data Will Save Your Life," Computer World, April 25, 2013, http://www.computer world.com/s/article/print/9238593/How_big _data _will _ save _your_life?ta xonomyName=Big+Data&taxonomyId=221.
8. E. B. Larson, "Building Trust in the Power of 'Big Data' Research to Serve the Public Good," Journal of the American Medical Association 309, no. 23 (2013): 2443–2444.
9. J. Ball and S. Ackerman, "NSA Loophole Allows Warrantless Search for US Citizens' Emails and Phone Calls," The Guardian, August 9, 2013, http://www.theguardian.com/world/2013/aug/09/nsa-loophole-warrantless-searches-email-calls/print.
10. J. Glanz, J. Larson, and A. W. Lehren, "Spy Agencies Tap Data Streaming from Phone Apps," New York Times, January 28, 2014, http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html.
11. J. Angwin, Dragnet Nation: A Quest for Privacy, Security, and Freedom In a World of Relentless Surveillance (New York, NY: Henry Holt and Co., 2014).
12. J. Angwin, "Has Privacy Become a Luxury Good?" New York Times, March 4, 2014, http://www.nytimes.com/2014/03/04/opinion/has-privacy-become-a-luxury-good.html.
13. M. Wood, "Sweeping Away a Search History," New York Times, April 3, 2014, http://www.nytimes.com/2014/04/03/technology/personaltech/sweeping-away-a-search-history.html.
14. T. Gara, "What Google Knows About You," Wall Street Journal, April 27, 2014, http://blogs.wsj.com/indiarealtime/2014/04/27/googles-all-seeing-eye-does-it-see-into-me-clearly-or-darkly/tab/print/.
15. M. Sopfner, "Why We Fear Google," Frankfurter Allgemeine Feuilleton, April 17, 2014, http://www.faz.net/-gsf-7oid8.
16. D. Talbot, "Ultraprivate Smartphones: New Models Built with Security and Privacy in Mind Reflect the Zeitgeist of the Snowden Era," MIT Technolog y Review, April 23, 2014, http://www.technologyreview.com/featuredstory/526496/ultraprivate-smartphones/.
17. G. Schmidt, "Cellphone Cases to Prepare You for Anything, Even a Flat Tire," New York Times, April 24, 2014, http://www.nytimes.com/2014/04/24/technolog y/personaltech/cellphone-cases-to-prepare-you-for-anything-even-a-flat-tire.html.
18. K. Wagstaff, "Anonymous, Inc.: The Corporate Set Embraces Digital Ephemerality," Wall Street Journal, May 29, 2014, http://online.wsj.com/articles/anonymous-inc-the-corporate-set-embraces-digital-ephemerality-1401378250.
19. E. Mills, "Obama Unveils Consumer Privacy Bill of Rights," CNET, February 22, 2012, http://www.cnet.com/news/obama-unveils-consumer-privacy-bill-of-rights/.
20. S. Lohr, "White House Tech Advisers: Online Privacy Is a 'Market Failure,'" New York Times, May 5, 2014, http://bits.blogs.nytimes.com/2014/05/05/white-house-tech-advisers-online-privacy-is-a-market-failure/.
21. S. Lyon, "Obama's Orwellian Image Control," New York Times, December 12, 2013, http://www.nytimes.com/2013/12/12/opinion/obamas-orwellian-i-control.html.
22. T. Simonite, "Five Things Obama's Big Data Experts Warned Him About," MIT Technology Review, May 1, 2014, http://www.technolog yreview.com/view/527071/five-things-obamas-big-data-experts-warned-him-about/.
23. "Report to the President: Big Data and Privacy: A Technological Perspective," President's Council of Advisors on Science and Technolog y, May 2014, http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf.
24. "Big Data: Seizing Opportunities, Preserving Values," Executive Office of the President, May 1, 2014, http://www.whitehouse.gov/sites/default/files/docs/big _data _privacy_report _may_1_2014.pdf.
25. A. C. Madrigal, "I'm Being Followed: How Google – and 104 Other Companies – Are Tracking Me on the Web," The Atlantic, February 2014, http://www.theatlantic.com/technology/print/2012/02/ im-being-foll%C951-and-104-other-companies-151-are-tracking-me-on-the-web/253758/.
26. S. Wolfram, "Data Science of the Facebook World," Stephen Wolfram Blog, April 24, 2014, http://blog.stephenwolfram.com/2013/04/data-science-of-the-facebook-world/.
27. D. Mann, "1984 in 2014," EP Studios Software, April 21, 2014, http://www.epstudiossoftware.com/?p=1411.
28. H. Kelly, "After Boston: The Pros and Cons of Surveillance Cameras," CNN, April 26, 2013, http://www.cnn.com/2013/04/26/tech/innovation/security-cameras-boston-bombings/.
29. S. Clifford and Q. Hardy, "Attention, Shoppers: Store Is Tracking Your Cell," New York Times, July 15, 2013, http://www.nytimes.com/2013/07/15/business/attention-shopper-stores-are-tracking-your-cell.html.
30. C. Duhigg, "How Companies Learn Your Secrets," New York Times, February 19, 2012, http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html.
31. K. Hill, "How Target Figured Out a Teen Girl Was Pregnant Before Her Father Did," Forbes, February 16, 2014, http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/print/.
32. C. C. Miller and S. Sengupta, "Selling Secrets of Phone Users to Advertisers," New York Times, October 6, 2013, http://www.nytimes.com/2013/10/06/technology/selling-secrets-of-phone-users-to-advertisers.html.
33a. D. Talbot, "Now Your Phone's Tilt Sensor Can Identify You," MIT Technology Review, May 1, 2014, http://www.technologyreview.com/news/527031/now-your-phones-tilt-sensor-can-identify-you/.
33b. Q. Hardy, "How Urban Anonymity Disappears When All Data Is Tracked," New York Times Bits, April 19, 2014, http://bits.blogs.nytimes.com/2014/04/19/how-urban-anonymity-disappears-when-all-data-is-tracked/?_php=true&_type=blogs&_r=0.
34. B. Morais, "Through a Face Scanner Darkly," New Yorker, January 31, 2014, http://www.newyorker.com/online/blogs/elements/2014/02/through-a-face-scanner-darkly.html?printable=true¤tPage=all.
35. N. Singer, "When No One Is Just a Face in the Crowd," New York Times, February 2, 2014, http://www.nytimes.com/2014/02/02/technology/when-no-one-is-just-a-face-in-the-crowd.html.
36. "The Face Recognition Algorithm That Finally Outperforms Humans," Medium, April 22, 2014, https://medium.com/the-physics-arxiv-blog/2c567adbf 7fc.
37. D. Cardwell, "At Newark Airport, the Lights Are On, and They're Watching You," New York Times, February 18, 2014, http://www.nytimes.com/2014/02/18/business/at-newark-airport-the-lights-are-on-and-theyre-watching-you.html.
38. "Clever Cities: The Multiplexed Metropolis," The Economist, September 15, 2014, http://www.economist.com/node/21585002/print.
39. "Biometric Technology Identifies One of the Boston Marathon Bombers," Homeland Security News Wire, May 28, 2013, http://www.homelandsecurit ynewswire.com/dr20130527-biometric-technology-identifies-one-of-the-boston-marathon-bombers.
40. D. Eggers, The Circle (San Francisco, CA: McSweeney's Books, 2013).
41. M. Atwood, "When Privacy Is Theft," New York Review of Books, November 21, 2013, http://www.nybooks.com/articles/archives/2013/nov/21/eggers-circle-when-privacy-is-theft/?pagination=false&printpage=true.
42. J. Nocera, "A World Without Privacy," New York Times, October 15, 2013, http://www.nytimes.com/2013/10/15/opinion/nocera-a-world-without-privacy.html.
43. A. Townsend, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia (New York, NY: W. W. Norton & Co., 2013).
44. S. Kroft, "The Data Brokers: Selling Your Personal Information," CBS News, March 9, 2014, http://www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/.
45. A. E. Marwick, "How Your Data Are Being Deeply Mined," New York Review of Books, January 9, 2014, http://www.nybooks.com/articles/archives/2014/jan/09/how-your-data-are-being-deeply-mined/?pagination=false&printpage=true.
46. N. Singer, "A Student-Data Collector Drops Out," New York Times, April 27, 2014, http://www.nytimes.com/2014/04/27/technology/a-student-data-collector-drops-out.html.
47. J. Lanier, "How Should We Think About Privacy?" Scientific American 309, no. 5 (2013):64–71.
48. D. M. Jackson, "When Meta Met Data," New York Times, October 4, 2013, http://www.nytimes.com/2013/10/06/magazine/when-meta-met-data.html?pagewanted=all.
49. R. J. Rosen, "Stanford Researchers: It Is Trivially Easy to Match Metadata to Real People," The Atlantic, December 2013, http://www.theatlantic.com/technology/print/2013/12/stanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people/282642/.
50. T. Lahey, "A Watchful Eye in Hospitals," New York Times, February 17, 2014, http://www.nytimes.com/2014/02/17/opinion/a-watchful-eye-in-hospitals.html.
51. S. D. Hall, "Medical Identity Theft Up 20 % Since 2012," Fierce Health IT, September 12, 2013, http://www.fiercehealthit.com/story/how-to-prevent-medical-identity-theft/2013-09-12.
52. M. Ollove, "The Rise of Medical Identity Theft in Healthcare," Kaiser Health News, February 7, 2014, http://www.kaiserhealthnews.org/Stories/2014/February/07/Rise-of-indentity-theft.aspx.
53. M. Madden, "More Online Americans Say They've Experienced a Personal Data Breach," Pew Research, April 14, 2014, http://www.pewresearch.org/fact-tank/2014/04/14/more-online-americans-say-theyve-experienced-a-personal-data-breach/.
54. "Better Information Means Better Care," NHS, January 14, 2014, http://www.england.nhs.uk/wp-content/uploads/2014/01/cd-leaflet-01-14.pdf.
55. "Careless.data," Nature 507 (2014): 7.
56. B. Goldacre, "Care.data Is in Chaos. It Breaks My Heart," The Guardian, February 28, 2014, http://www.theguardian.com/commentisfree/2014/feb/28/care-data-is-in-chaos/print.
57. E. Callaway, "UK Push to Open Up Patients' Data," Nature 502 (2013): 283.
58. L. Donnelly, "Patient Records Should Not Have Been Sold, NHS Admits," Telegraph, February 24, 2014, http://www.telegraph.co.uk/health/nhs/10659147/Patient-records-should-not-have-been-sold-NHS-admits.html.
59. R. Ramesh, "NHS Patient Data to Be Made Available for Sale to Drug and Insurance Firms," The Guardian, January 19, 2014, http://www.theguardian.com/society/2014/jan/19/nhs-patient-data-available-companies-buy/print.
60. J. Best, "Big Doubts on Big Data: Why I Won't Be Sharing My Medical Data with Anyone – yet," ZDNet, February 19, 2014, http://www.zdnet.com/uk/big-doubts-on-big-data-why-i-wont-be-sharing-my-medical-data-with-anyone-yet-7000026497/.
61. S. Knapton, "Health Records of Every NHS Patient to Be Shared in Vast Database," Telegraph, January 10, 2014, http://www.telegraph.co.uk/news/10565160/Health-records-of-every-NHS-patient-to-be-shared-in-vast-database.html.
62. C. Manson, "Could Controversial Data Sharing Be Good for Patient Health?" The Guardian, April 22, 2014, http://www.theguardian.com/healthcare-net work/2014/apr/22/controversial-data-sharing-good-patient-health/print.
63. J. Comstock, "Health App Makers Face Privacy and Security Regulation from Many Quarters," MobiHealthNews, January 28, 2014, http://mobihealthnews.com/29336/health-app-makers-face-privacy-and-security-regulation-from-many-quarters/.
64. H. Smith, "mHealth and HIPA A Breaches – Where Are They?" What's Harold In, February 16, 2014, http://whats.harold.in/2014/02/mhealth-and-hipaa-breaches-where-are.html.
65. J. L. Hall, and D. McGraw, "For Telehealth to Succeed, Privacy and Security Risks Must Be Identified and Addressed," Health Affairs 33, no. 2 (2014): 216–221.
66. "Privacy Rights Clearinghouse Releases Study: Mobile Health and Fitness Apps: What Are the Privacy R isks?" Privacy R ights Clearinghouse, July 15, 2013, http://www.privacyrights.org/mobile-medical-apps-privacy-alert.
67. A. Carrns, "Free Apps for Nearly Every Health Problem, but What About Privacy?" New York Times, September 12, 2013, http://www.nytimes.com/2013/09/12/your-money/free-apps-for-nearly-every-health-problem-but-what-about-privacy.html.
68. A. Campbell, "Dispatch Software for Trucking: How GPS Tracking Systems Affect Performance," Trucking Office, August 21, 2013, http://www.truckingoffice.com/2013/dispatch-software-for-trucking-how-gps-tracking-systems-affect-performance.
69. N. Greenfieldboyce, "Indie Truckers: Keep Big Brother Out of My Cab," NPR, April 20, 2011, http://www.npr.org/2011/04/20/135507979/indie-truckers-keep-big-brother-out-of-my-cab.
70. B. Greene, "How Your Boss Can Keep You on a Leash," CNN, February 2, 2014, http://www.cnn.com/2014/02/02/opinion/greene-corporate-surveillance/index.html?iref=allsearch.
71. H. J. Wilson, "Wearable Gadgets Transform How Companies Do Business," Wall Street Journal, October 20, 2013, http://online.wsj.com/news/articles/SB1000 1424052702303796404579099203059125112.
72. T. Simonite, "Using a Smartphone's Eyes and Ears to Log Your Every Move," MIT Technolog y Review, July 4, 2013, http://www.technologyreview.com/news/516566/using-a-smartphones-eyes-and-ears-to-log-your-every-move/.
73. L. Eadicicco, "What Fitbit and Nest Are Doing with Your Data," Slate, April 19, 2014, http://www.slate.com/blogs/business_insider/2014/04/19/fitbit_nest_data_how_the_companies_are_making_money_off_you.html.
74. A. Pai, "Nielsen: 46 Million People Used Fitness Apps in January," in MobiHealthNews, April 17, 2014, http://mobihealthnews.com/32183/nielsen-46-million-people-used-fitness-apps-in-january/.
75. T. Klosowski, "Lots of Health Apps Are Selling Your Data. Here's Why," Lifehacker, May 9, 2014, http://lifehacker.com/lots-of-health-apps-are-selling-your-data-heres-why-1574001899.
76. C. Rubin, "Your Trainer Saw That," New York Times, April 17, 2014, http://www.nytimes.com/2014/04/17/fashion/devices-like-fitbit-and-up24-being-used-by-gyms-to-track-clients-fitness-activity.html.
77. T. Lee, "Hackers Break into Networks of 3 Big Medical Device Makers," SF Gate, February 8, 2014, http://m.sfgate.com/news/article/Hackers-break-into-networks-of-3-big-medical-5217780.php
78. R. Pierson, "FDA Urges Protection of Medical Devices from Cyber Threats," Medscape, 2013, http://www.medscape.com/viewarticle/806269_print.
79. A. Sarvestani, "Boston Children's Hospital Faces Cyber Threats – Are the Medical Devices Safe?" Mass Device, April 24, 2014, http://www.massdevice.com/news/boston-childrens-hospital-faces-cyber-threats-are-medical-devices-safe?page=show.
80. D. Talbot, "Encrypted Heartbeats Keep Hackers from Medical Implants," MIT Technology Re– view, September 16, 2013, http://www.technologyreview.com/news/519266/encrypted-heartbeats-keep-hackers-from-medical-implants/.
81. K. Zetter, "It's Insanely Easy to Hack Hospital Equipment," Wired, April 25, 2014, http://www.wired.com/2014/04/hospital-equipment-vulnerable/.
82. L. Hood, "Your Body Is the Next Frontier in Cybercrime," The Conversation, October 1, 2013, https://theconversation.com/your-body-is-the-next-frontier-in-cybercrime-18771.
83. J. A. Finkle, "A Security Firm Has Hired the Diabetic Who Hacked into His Own Insulin Pump to Show How It Could Be Used to Kill People," Business Insider, May 30, 2014, http://www.businessinsider.com/r-rapid7-hires-jay-radcliffe-diabetic-who-hacked-his-insulin-pump-2014-29.
84. N. Perlroth, "Heartbleed Highlights a Contradiction in the Web," New York Times, April 19, 2014, http://www.nytimes.com/2014/04/19/technology/heartbleed-highlights-a-contradiction-in-the-web.html.
85. N. Perlroth and Q. Hardy, "Heartbleed Flaw Could Reach Beyond Websites to Digital Devices, Experts Say," New York Times, April 11, 2014, http://www.nytimes.com/2014/04/11/business/security-flaw-could-reach-beyond-websites-to-digital-devices-experts-say.html.
86. R. Merkel, "How the Heartbleed Bug Reveals a Flaw in Online Security," The Conversation, April 11, 2014, https://theconversation.com/how-the-heartbleed-bug-reveals-a-flaw-in-online-security-25536.
87. "CyberR x Health Industry Cyber Threat Exercise, Spring 2014," HITRUST Alliance Inc., April 21, 2014, http://hitrustalliance.net/content/uploads/ 2014/05/CyberRX _Preliminary_Report.pdf.
88a. J. Conn, "Cybersecurity Test Finds Healthcare Communications Weak Links," Modern Health– care, April 21, 2014, http://www.modernhealthcare.com/article/ 20140421/NEWS/304219940/.
88b. E. D. Perakslis, "Cybersecurity in Health Care," New England Journal of Medicine 371, no. 5 (2014): 395–397.
88c. D. J. Nigrin, "When 'Hacktivists' Target Your Hospital," New England Journal of Medicine 371, no. 5 (2014): 393–395.
88d. N. Perlroth, "Hack of Community Health Systems Affects 4.5 Million Patients," New York Times, August 18, 2014, http://bits.blogs.nytimes.com/2014/08/18/hack-of-community-health-systems-affects-4-5-million-patients/?ref=health.
89. C. Wiltz, "Report: Healthcare Cybersecurity Appalling, Legislation Not Enough," MDDI, April 7, 2014, http://www.mddionline.com/article/report-healthcare-cybersecurity-legislation-not-enough.
90. L. Miller, "The Google of Spit," New York Magazine, April 22, 2014, http://nymag.com/news/features/23andme-2014-4/.
91. Y. Erlich and A. Narayanan, "Routes for Breaching and Protecting Genetic Privacy," Nature Reviews Genetics 15 (2014): 409–421.
92. K. Peikoff, "Fearing Punishment for Bad Genes," New York Times, April 8, 2014, http://www.nytimes.com/2014/04/08/science/fearing-punishment-for-bad-genes.html.
93. B. M. Knoppers, "It's Yet to Be Shown That Discrimination Exists," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/its-yet-to-be-shown-that-genetic-discrimination-exists.
94. Y. Joly, I. N. Feze, and J. Simard, "Genetic Discrimination and Life Insurance: A Systematic Review of the Evidence," BMC Medicine 11 (2013): 25.
95. A. S. Macdonald, "Risks Are Too Small for Insurers to Worry," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/risks-are-too-small-for-insurers-to-worry.
96. G. Gruber, "Guarantee Privacy to Ensure Proper Treatment," New York Times, April 14, 2014, http://www.nytimes.com/roomfordebate/2014/04/14/dna-and-insurance-fate-and-risk/guarantee-privacy-to-ensure-proper-genetic-treatment.
97. M. Gymrek et al., "Identifying Personal Genomes by Surname Inference," Science 339 (2013):321–324.
98. P. Aldhous, "Genetic Mugshot Recreates Faces from Nothing but DNA," New Scientist, March 20, 2014, http://www.newscientist.com/article/mg22129613.600-genetic-mugshot-recreates-faces-from-nothing-but-dna.html.
99. O. Solon, "Algorithm Identifies Rare Genetic Disorders from Family Pics," Wired, June 24, 2014, http://www.wired.co.uk/news/archive/2014-06/24/facial-identification-genetic-disorders.
100. M. Angrist, "Open Window: When Easily Identifiable Genomes and Traits Are in the Public Domain," PLoS One 9, no. 3 (2014): e92060.
101. S. E. Brenner, "Be Prepared for the Big Genome Leak," Nature 498 (2013): 139.
102. D. Hernandez, "Selling Your Most Personal Item: You," Wired, March 27, 2013, http://www.wired.com/business/2013/03/miinome-genetic-marketplace/.
103. J. E. Lunshof, G. M. Church, and B. Prainsack, "Raw Personal Data: Providing Access," Science 343 (2014): 373–374.
104. B. Dolan, "In-Depth: Consumer Health and Data Privacy Issues Beyond HIPA A," MobiHealth– News, May 23, 2014, http://mobihealthnews.com/33393/in-depth-consumer-health-and-data-privacy-issues-beyond-hipaa/.
105. S. Fairclough, "Physiological Data Must Remain Confidential," Nature 505 (2014): 263.
Глава 13
1. E. Brynjolfsson and A. McAfee, The Second Machine Age (New York, NY: W.W. Norton & Co., 2013).
2. D. Hardawar, "Predictive Tech Is Getting Smarter and More Pervasive – but More Controversial, Too," Venture Beat, March 15, 2014, http://venturebeat.com/2014/03/15/predictive-tech-is-getting-smarter-and-more-pervasive-but-more-controversial-too/.
3. V. K hosla, "Do We Need Doctors Or A lgorithms?" TechCrunch, January 10, 2012, http://techcrunch.com/2012/01/10/doctors-or-algorithms/.
4. M. Kinsley, "Have You Lost Your Mind?" New Yorker, April 28, 2014, http://www.newyorker.com/reporting/2014/04/28/140428fa_fact_kinsley.
5. "A Survey of the Future of Medicine," The Economist, March 19, 1994, http://www.highbeam.com/doc/1G1-15236568.html.
6. E. Topol, "Individualized Medicine from Prewomb to Tomb," Cell 157 (2014): 241–253.
7a. M. Petronzio, "How One Woman Hid Her Pregnancy from Big Data," Mashable, April 26, 2014, http://mashable.com/2014/04/26/big-data-pregnancy/.
7b. D. Harris, "How Machine Learning is Saving Lives While Saving Hospitals Money," Gigaom, July 14, 2014, http://gigaom.com/2014/07/14/how-machine-learning-is-saving-lives-while-saving-hospitals-money/.
7c. M. Evans, "Data Collection Could Stump Next Phase of Predictive Analytics," Modern Health– care, July 12, 2014, http://www.modernhealthcare.com/article/20140712/M AGA ZINE/307129969/?template=printpicart.
8. A. Pandey, K. Abdullah, and M. H. Drazner, "Impact of Vice President Cheney on Public Interest in Left Ventricular Assist Devices and Heart Transplantation," American Journal of Cardiolog y 113 (2014): 1529–1531.
9. C. Anderson, "The End of Theory: The Data Deluge Makes the Scientific Method Obsolete," Wired, June 23, 2008, http://archive.wired.com/science/discoveries/magazine/16-07/pb_theory.
10. D. Butler, "Web Data Predict Flu," Nature 456 (2008): 287–288.
11. S. Cook et al., "Assessing Google Flu Trends Performance in the United States During the 2009 Influenza Virus A (H1N1) Pandemic," PLoS One 6, no. 8 (2011): e23610.
12. J. Ginsberg et al., "Detecting Influenza Epidemics Using Search Engine Query Data," Nature 457 (2009): 1012–1015.
13. D. Lazer et al., "The Parable of Google Flu: Traps in Big Data Analysis," Science 343 (2014):1203–1205.
14. A. C. Madrigal, "In Defense of Google Flu Trends," The Atlantic, March 2014, http://www.theatlantic.com/technology/print/2014/03/in-defense-of-google-flu-trends/359688/.
15. S. Lohr, "Google Flu Trends: The Limits of Big Data," New York Times, March 28, 2014, http://bits.blogs.nytimes.com/2014/03/28/google-flu-trends-the-limits-of-big-data/.
16. B. Schiller, "Predicting Contagious Outbreaks Using Your Most Popular Friends," Fast Company, April 25, 2014, http://www.fastcoexist.com/3029058/predicting-contagious-outbreaks-using-your-most-popular-friends.
17. D. Butler, "When Google Got Flu Wrong," Nature 494 (2013): 155–156.
18. T. Harford, "Big Data: Are We Making a Big Mistake?" Financial Times, March 28, 2014, http://www.ft.com/intl/cms/s/2/21a6e7d8-b479-11e3-a09a-00144feabdc0.html-axzz2yJNfSGDx.
19. M. Krenchel and C. Madsbjerg, "Your Big Data Is Worthless If You Don't Bring It Into the Real World," Wired, April 11, 2014, http://www.wired.com/2014/04/your-big-data-is-worthless-if-you-dont-bring-it-into-the-real-world/.
20. G. Marcus and E. Davis, "Eight (No, Nine!) Problems With Big Data," New York Times, April 7, 2014, http://www.nytimes.com/2014/04/07/opinion/eight-no-nine-problems-with-big-data.html.
21a. M. Garcia-Herranz et al., "Using Friends as Sensors to Detect Global-Scale Contagious Out– breaks," PLoS One 9, no. 4 (2014): e92413.
21b. "How A Computer A lgorithm Predicted West A frica's Ebola Outbreak Before It Was Announced," Public Health Watch, August 10, 2014, http://publichealthwatch.wordpress.com/2014/08/10/how-a-computer-algorithm-predicted-west-africas-ebola-outbreak-before-it-was-announced/.
21c. D. Spiegelhalter, "The Future Lies in Uncertainty," Science 345, no. 6194 (2014): 264–265.
22. N. Singer, "Listen to Pandora, and It Listens Back," New York Times, January 5, 2014, http://www.nytimes.com/2014/01/05/technology/pandora-mines-users-data-to-better-target-ads.html.
23. N. Singer, "When a Health Plan Knows How You Shop," New York Times, June 29, 2014, http://www.nytimes.com/2014/06/29/technology/when-a-health-plan-knows-how-you-shop.html.
24. S. Pettypiece and J. Robertson, "Hospitals Are Mining Patients' Credit Card Data to Predict Who Will Get Sick," Businessweek, July 3, 2014, http://www.businessweek.com/printer/articles/211245-hospitals-are-mining-patients-credit-card-data-to-predict-who-will-get-sick.
25. B. Molen, "Her Name Is Cortana. Her Attitude Is Almost Human," Engadget, June 4, 2014, http://www.engadget.com/2014/06/04/cortana-microsoft-windows-phone/.
26. M. Scott, "A Smartphone Keyboard App That Anticipates What You Want to Type," New York Times, June 16, 2014, http://www.nytimes.com/2014/06/16/technology/a-smartphone-keyboard-app-that-anticipates-what-you-want-to-type.html.
27. O. Malik, "The Coming Era of Magical Computing," Fast Company, November 18, 2013, http://www.fastcompany.com/3021153/technovore/om-malik-the-coming-era-of-magical-computing.
28. D. Nosowitz, "Can Gadgets Really Tell The Future?" Fast Co. Design, February 27, 2014, http://www.fastcodesign.com/3026853/can-gadgets-really-tell-the-future.
29. "Move Over, Siri," The Economist, November 30, 2013, http://www.economist.com/news/technolog y-quarterly/21590760 -predictive-intelligence-new-breed-personal-assistant-software-tries/print.
30. "A Cure for the Big Blues," The Economist, January 11, 2014, http://www.economist.com/node/21593489/print.
31. S. E. Ante, "IBM Struggles to Turn Watson Computer into Big Business," Wall Street Journal, January 7, 2014, http://online.wsj.com/news/articles/SB100 01424052702304887104579306881917668654.
32. J. Hempel, "IBM's Massive Bet on Watson," CNN Money, September 19, 2013, http://money.cnn.com/2013/09/19/technology/ibm-watson.pr.fortune/index.html?pw_log=in.
33. A. Bari, M. Chaouchi, and T. Jong, Predictive Analytics for Dummies (Hoboken, NJ: John Wiley & Sons, 2014), 129.
34. M. van Rijmenam, "How Machine Learning Could Result in Great Applications for Your Business," Big Data-Startups Blog, January 10, 2014, http://www.bigdata-startups.com/machine-learning-result-great-applications-business/.
35. N. Jones, "The Learning Machines," Nature 505 (2014): 146–148.
36. J. Markoff, "Scientists See Promise in Deep-Learning Programs," New York Times, November 24, 2012, http://www.nytimes.com/2012/11/24/science/scientists-see-advances-in-deep-learning-a-part-of-artificial-intelligence.html.
37. "Don't Be Evil, Genius," The Economist, February 1, 2014, http://www.economist.com/node/21595462/print.
38. J. Pearson, "Superintelligent AI Could Wipe Out Humanity, If We're Not Ready for It," Motherboard, April 23, 2014, http://motherboard.vice.com/read/super-intelligent-ai-could-wipe-out-humanity-if-were-not-ready-for-it.
39. E. Brynjolfsson and A. McAfee, "The Dawn of the Age of Artificial Intelligence," The Atlantic, February 2014, http://www.theatlantic.com/business/print/2014/02/the-dawn-of-the-age-of-artificial-intelligence/283730/.
40. S. Schneider, "The Philosophy of 'Her,'" New York Times, March 2, 2014, http://opinionator.blogs.nytimes.com/2014/03/02/the-philosophy-of-her/?ref=opinion.
41. A. Vance, "The Race to Buy the Human Brains Behind Deep Learning Machines," Bloomberg Businessweek, January 27, 2014, http://www.businessweek.com/printer/articles/180155-the-race-to-buy-the-human-brains-behind-deep-learning-machines.
42. G. Satell, "Why the Future of Technology Is All Too Human," Forbes, February 23, 2014, http://www.forbes.com/sites/gregsatell/2014/02/23/why-the-future-of-technology-is-all-too-human/.
43. D. Auerbach, "A.I. Has Grown Up and Left Home," Nautilus, December 19, 2013, http://nautil.us/issue/8/home/ai-has-grown-up-and-left-home.
44. D. Rowinski, "Google's Game of Moneyball in the Age of Artificial Intelligence," Read Write, Januar y 29, 2014, http://readwrite.com/2014/01/29/google-artificial-intelligence-robots-cognitive-computing-moneyball-awesm=~our3BQPIj4IPFE.
45. T. Simonite, "An AI Chip to Help Computers Understand Images," MIT Technology Review, January 2, 2014, http://m.technologyreview.com/news/523181/an-ai-chip-to-help-computers-understand-is/.
46. D. Brooks, "What Machines Can't Do," New York Times, February 4, 2014, http://www.nytimes.com/2014/02/04/opinion/brooks-what-machines-cant-do.html.
47. S. Fletcher, "Machine Learning," Scientific American 309 (2013): 62–68.
48. G. Marcus, "Why Can't My Computer Understand Me?" New Yorker, August 14, 2013, http://www.new yorker.com/online/blogs/elements/2013/08/why-cant-my-computer-understand-me.html?printable=true¤tPage=all.
49a. D. Tweney, "Scientists Exploring Computers That Can Learn and Adapt," Venture Beat, December 29, 2013, http://venturebeat.com/2013/12/29/scientists-exploring-computers-that-can-learn-and-adapt/.
49b. J. Markhoff, "Computer Eyesight Gets A Lot More Accurate," New York Times, August 18, 2014, http://bits.blogs.nytimes.com/2014/08/18/computer-eyesight-gets-a-lot-more-accurate/?ref=technology.
50. M. M. Waldrop, "Smart Connections," Nature 503 (2013): 22–24.
51. "Supercomputers, The Human Brain and the Advent of Computational Biology," Antisense Science, March 29, 2014, http://antisensescienceblog.wordpress.com/2014/03/29/supercomputers-the-human-brain-and-the-advent-of-computational-biology/.
52. M. Starr, "Brain-Inspired Circuit Board 9000 Times Faster Than an Average PC," CNET, May 1, 2014, http://m.cnet.com.au/brain-inspired-circuit-board-9000-times-faster-than-an-average-pc-339347168.htm?redir=1.
53. J. Markoff, "Brainlike Computers, Learning from Experience," New York Times, December 29, 2013, http://www.nytimes.com/2013/12/29/science/brainlike-computers-learning-from-experience.html.
54. E. M. Rusli, "Attempting to Code the Human Brain," Wall Street Journal, February 3, 2014, http://online.wsj.com/news/articles/SB100 01424052702304851104579361191171330498.
55. N. B. Turk-Browne, "Functional Interactions as Big Data in the Human Brain," Science 342, no. 6158 (2013): 580–584.
56. D. M. Wenger and A. F. Ward, "The Internet Has Become the External Hard Drive for Our Memories," Scientific American, November 19, 2013, http://www.scientificamerican.com/article/the-internet-has-become-the-external-hard-drive-for-our-memories/.
57. "Neuromorphic Computing: The Machine of a New Soul," The Economist, August 1, 2013, http://www.economist.com/news/science-and-technology/21582495-computers-will-help-people-understand-brains-better-and-understanding-brains.
58. G. Marcus, "Hyping Artificial Intelligence, Yet Again," New Yorker, December 31, 2014, http://www.newyorker.com/online/blogs/elements/2014/01/the-new-york-times-artificial-intelligence-hype-machine.html.
59. D. Basulto, "Artificial Intelligence Is the Next Big Tech Trend. Here's Why," Washington Post, Ma rch 25, 2014, http://www.washingtonpost.com/blogs/innovations/wp/ 2014/03/25/artificial-intelligence-is-the-next-big-tech-trend-heres-why//?print=1.
60. L. Dormehl, "Facial Recognition: Is the Technology Taking Away Your Identity?" The Guardian,May 4, 2014, http://www.theguardian.com/technology/2014/may/04/facial-recognition-technology-identity-tesco-ethical-issues/print.
61. M. S. Bartlett et al., "Automatic Decoding of Facial Movements Reveals Deceptive Pain Expressions," Current Biology 24 (2014): 738–743.
62. J. Hoffman, "Reading Pain in a Human Face," New York Times, April 28, 2014, http://well.blogs.nytimes.com/2014/04/28/reading-pain-in-a-human-face/.
63. S. Du, Y. Tao, and A. M. Martinez, "Compound Facial Expressions of Emotion," PNAS Early Edition, March 31, 2014, http://www.pnas.org/cgi/doi/10.1073/pnas.1322355111.
64. H. Ledford, "The Computer Will See You Now," Nature News, November 9, 2011, http://www.nature.com/news/the-computer-will-see-you-now-1.9324.
65. F. Manjoo, "Conjuring Images of a Bionic Future," New York Times, April 24, 2014, http://www.nytimes.com/2014/04/24/technology/personaltech/app-controlled-hearing-aid-improves-even-normal-hearing.html.
66. "What Is Bothering You Today?" Symptom Checker, the Award-winning Symcat App, accessed August 13, 2014, http://www.symcat.com/.
67a. P. Marks, "Watson in Your Pocket: Supercomputer Gets Own Apps," New Scientist, April 28, 2014, http://www.newscientist.com/article/dn25476-watson-in-your-pocket-supercomputer-gets-own-apps.html?full=true&print=true-.U1-0°17KR4E.
67b. H. Singh, "The Battle Against Misdiagnosis," Wall Street Journal, August 7, 2014, http://online.wsj.com/articles/hardeep-singh-the-battle-against-misdiagnosis-1407453373#printMode.
67c. J. Frieden, "Misdiagnosis. Can It Be Remedied?" MedPage Today, August 17, 2014, http://www.medpagetoday.com/PublicHealthPolicy/ GeneralProfessionalIssues/47232.