MyBooks.club
Все категории

Эрик Тополь - Будущее медицины: Ваше здоровье в ваших руках

На сайте mybooks.club вы можете бесплатно читать книги онлайн без регистрации, включая Эрик Тополь - Будущее медицины: Ваше здоровье в ваших руках. Жанр: Прочая научная литература издательство -,. Доступна полная версия книги с кратким содержанием для предварительного ознакомления, аннотацией (предисловием), рецензиями от других читателей и их экспертным мнением.
Кроме того, на сайте mybooks.club вы найдете множество новинок, которые стоит прочитать.

Название:
Будущее медицины: Ваше здоровье в ваших руках
Издательство:
-
ISBN:
-
Год:
-
Дата добавления:
29 январь 2019
Количество просмотров:
220
Читать онлайн
Эрик Тополь - Будущее медицины: Ваше здоровье в ваших руках

Эрик Тополь - Будущее медицины: Ваше здоровье в ваших руках краткое содержание

Эрик Тополь - Будущее медицины: Ваше здоровье в ваших руках - описание и краткое содержание, автор Эрик Тополь, читайте бесплатно онлайн на сайте электронной библиотеки mybooks.club
Мир медицины проходит в наши дни революционную трансформацию. Цифровой мониторинг информационных потоков, повсеместное распространение компьютеров, новейшие молекулярные и генетические разработки, направленные на предотвращение болезней, всевозможные медицинские датчики, исследования и анализы, а главное – доступ к данным о собственном здоровье – в корне меняют систему здравоохранения.Известный врач, ученый, первопроходец передовых технологий в медицине Эрик Тополь считает, что традиционная субординация в отношениях врача и пациента уходит в прошлое, человек сам становится хозяином своего здоровья, и неизбежная демократизация медицины обещает нам ее эффективность и доступность.

Будущее медицины: Ваше здоровье в ваших руках читать онлайн бесплатно

Будущее медицины: Ваше здоровье в ваших руках - читать книгу онлайн бесплатно, автор Эрик Тополь

18. K. Wagstaff, "Anonymous, Inc.: The Corporate Set Embraces Digital Ephemerality," Wall Street Journal, May 29, 2014, http://online.wsj.com/articles/anonymous-inc-the-corporate-set-embraces-digital-ephemerality-1401378250.

19. E. Mills, "Obama Unveils Consumer Privacy Bill of Rights," CNET, February 22, 2012, http://www.cnet.com/news/obama-unveils-consumer-privacy-bill-of-rights/.

20. S. Lohr, "White House Tech Advisers: Online Privacy Is a 'Market Failure,'" New York Times, May 5, 2014, http://bits.blogs.nytimes.com/2014/05/05/white-house-tech-advisers-online-privacy-is-a-market-failure/.

21. S. Lyon, "Obama's Orwellian Image Control," New York Times, December 12, 2013, http://www.nytimes.com/2013/12/12/opinion/obamas-orwellian-image-control.html.

22. T. Simonite, "Five Things Obama's Big Data Experts Warned Him About," MIT Technology Review, May 1, 2014, http://www.technolog yreview.com/view/527071/five-things-obamas-big-data-experts-warned-him-about/.

23. "Report to the President: Big Data and Privacy: A Technological Perspective," President's Council of Advisors on Science and Technolog y, May 2014, http://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy_-_may_2014.pdf.

24. "Big Data: Seizing Opportunities, Preserving Values," Executive Office of the President, May 1, 2014, http://www.whitehouse.gov/sites/default/files/docs/big _data _privacy_report _may_1_2014.pdf.

25. A. C. Madrigal, "I'm Being Followed: How Google – and 104 Other Companies – Are Tracking Me on the Web," The Atlantic, February 2014, http://www.theatlantic.com/technology/print/2012/02/ im-being-foll%C951-and-104-other-companies-151-are-tracking-me-on-the-web/253758/.

26. S. Wolfram, "Data Science of the Facebook World," Stephen Wolfram Blog, April 24, 2014, http://blog.stephenwolfram.com/2013/04/data-science-of-the-facebook-world/.

27. D. Mann, "1984 in 2014," EP Studios Software, April 21, 2014, http://www.epstudiossoftware.com/?p=1411.

28. H. Kelly, "After Boston: The Pros and Cons of Surveillance Cameras," CNN, April 26, 2013, http://www.cnn.com/2013/04/26/tech/innovation/security-cameras-boston-bombings/.

29. S. Clifford and Q. Hardy, "Attention, Shoppers: Store Is Tracking Your Cell," New York Times, July 15, 2013, http://www.nytimes.com/2013/07/15/business/attention-shopper-stores-are-tracking-your-cell.html.

30. C. Duhigg, "How Companies Learn Your Secrets," New York Times, February 19, 2012, http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html.

31. K. Hill, "How Target Figured Out a Teen Girl Was Pregnant Before Her Father Did," Forbes, February 16, 2014, http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/print/.

32. C. C. Miller and S. Sengupta, "Selling Secrets of Phone Users to Advertisers," New York Times, October 6, 2013, http://www.nytimes.com/2013/10/06/technology/selling-secrets-of-phone-users-to-advertisers.html.

33a. D. Talbot, "Now Your Phone's Tilt Sensor Can Identify You," MIT Technology Review, May 1, 2014, http://www.technologyreview.com/news/527031/now-your-phones-tilt-sensor-can-identify-you/.

33b. Q. Hardy, "How Urban Anonymity Disappears When All Data Is Tracked," New York Times Bits, April 19, 2014, http://bits.blogs.nytimes.com/2014/04/19/how-urban-anonymity-disappears-when-all-data-is-tracked/?_php=true&_type=blogs&_r=0.

34. B. Morais, "Through a Face Scanner Darkly," New Yorker, January 31, 2014, http://www.newyorker.com/online/blogs/elements/2014/02/through-a-face-scanner-darkly.html?printable=true&currentPage=all.

35. N. Singer, "When No One Is Just a Face in the Crowd," New York Times, February 2, 2014, http://www.nytimes.com/2014/02/02/technology/when-no-one-is-just-a-face-in-the-crowd.html.

36. "The Face Recognition Algorithm That Finally Outperforms Humans," Medium, April 22, 2014, https://medium.com/the-physics-arxiv-blog/2c567adbf 7fc.

37. D. Cardwell, "At Newark Airport, the Lights Are On, and They're Watching You," New York Times, February 18, 2014, http://www.nytimes.com/2014/02/18/business/at-newark-airport-the-lights-are-on-and-theyre-watching-you.html.

38. "Clever Cities: The Multiplexed Metropolis," The Economist, September 15, 2014, http://www.economist.com/node/21585002/print.

39. "Biometric Technology Identifies One of the Boston Marathon Bombers," Homeland Security News Wire, May 28, 2013, http://www.homelandsecurit ynewswire.com/dr20130527-biometric-technology-identifies-one-of-the-boston-marathon-bombers.

40. D. Eggers, The Circle (San Francisco, CA: McSweeney's Books, 2013).

41. M. Atwood, "When Privacy Is Theft," New York Review of Books, November 21, 2013, http://www.nybooks.com/articles/archives/2013/nov/21/eggers-circle-when-privacy-is-theft/?pagination=false&printpage=true.

42. J. Nocera, "A World Without Privacy," New York Times, October 15, 2013, http://www.nytimes.com/2013/10/15/opinion/nocera-a-world-without-privacy.html.

43. A. Townsend, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia (New York, NY: W. W. Norton & Co., 2013).

44. S. Kroft, "The Data Brokers: Selling Your Personal Information," CBS News, March 9, 2014, http://www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/.

45. A. E. Marwick, "How Your Data Are Being Deeply Mined," New York Review of Books, January 9, 2014, http://www.nybooks.com/articles/archives/2014/jan/09/how-your-data-are-being-deeply-mined/?pagination=false&printpage=true.

46. N. Singer, "A Student-Data Collector Drops Out," New York Times, April 27, 2014, http://www.nytimes.com/2014/04/27/technology/a-student-data-collector-drops-out.html.

47. J. Lanier, "How Should We Think About Privacy?" Scientific American 309, no. 5 (2013):64–71.

48. D. M. Jackson, "When Meta Met Data," New York Times, October 4, 2013, http://www.nytimes.com/2013/10/06/magazine/when-meta-met-data.html?pagewanted=all.

49. R. J. Rosen, "Stanford Researchers: It Is Trivially Easy to Match Metadata to Real People," The Atlantic, December 2013, http://www.theatlantic.com/technology/print/2013/12/stanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people/282642/.

50. T. Lahey, "A Watchful Eye in Hospitals," New York Times, February 17, 2014, http://www.nytimes.com/2014/02/17/opinion/a-watchful-eye-in-hospitals.html.

51. S. D. Hall, "Medical Identity Theft Up 20 % Since 2012," Fierce Health IT, September 12, 2013, http://www.fiercehealthit.com/story/how-to-prevent-medical-identity-theft/2013-09-12.

52. M. Ollove, "The Rise of Medical Identity Theft in Healthcare," Kaiser Health News, February 7, 2014, http://www.kaiserhealthnews.org/Stories/2014/February/07/Rise-of-indentity-theft.aspx.

53. M. Madden, "More Online Americans Say They've Experienced a Personal Data Breach," Pew Research, April 14, 2014, http://www.pewresearch.org/fact-tank/2014/04/14/more-online-americans-say-theyve-experienced-a-personal-data-breach/.

54. "Better Information Means Better Care," NHS, January 14, 2014, http://www.england.nhs.uk/wp-content/uploads/2014/01/cd-leaflet-01-14.pdf.

55. "Careless.data," Nature 507 (2014): 7.

56. B. Goldacre, "Care.data Is in Chaos. It Breaks My Heart," The Guardian, February 28, 2014, http://www.theguardian.com/commentisfree/2014/feb/28/care-data-is-in-chaos/print.

57. E. Callaway, "UK Push to Open Up Patients' Data," Nature 502 (2013): 283.

58. L. Donnelly, "Patient Records Should Not Have Been Sold, NHS Admits," Telegraph, February 24, 2014, http://www.telegraph.co.uk/health/nhs/10659147/Patient-records-should-not-have-been-sold-NHS-admits.html.

59. R. Ramesh, "NHS Patient Data to Be Made Available for Sale to Drug and Insurance Firms," The Guardian, January 19, 2014, http://www.theguardian.com/society/2014/jan/19/nhs-patient-data-available-companies-buy/print.

60. J. Best, "Big Doubts on Big Data: Why I Won't Be Sharing My Medical Data with Anyone – yet," ZDNet, February 19, 2014, http://www.zdnet.com/uk/big-doubts-on-big-data-why-i-wont-be-sharing-my-medical-data-with-anyone-yet-7000026497/.

61. S. Knapton, "Health Records of Every NHS Patient to Be Shared in Vast Database," Telegraph, January 10, 2014, http://www.telegraph.co.uk/news/10565160/Health-records-of-every-NHS-patient-to-be-shared-in-vast-database.html.

62. C. Manson, "Could Controversial Data Sharing Be Good for Patient Health?" The Guardian, April 22, 2014, http://www.theguardian.com/healthcare-net work/2014/apr/22/controversial-data-sharing-good-patient-health/print.

63. J. Comstock, "Health App Makers Face Privacy and Security Regulation from Many Quarters," MobiHealthNews, January 28, 2014, http://mobihealthnews.com/29336/health-app-makers-face-privacy-and-security-regulation-from-many-quarters/.

64. H. Smith, "mHealth and HIPA A Breaches – Where Are They?" What's Harold In, February 16, 2014, http://whats.harold.in/2014/02/mhealth-and-hipaa-breaches-where-are.html.

65. J. L. Hall, and D. McGraw, "For Telehealth to Succeed, Privacy and Security Risks Must Be Identified and Addressed," Health Affairs 33, no. 2 (2014): 216–221.

66. "Privacy Rights Clearinghouse Releases Study: Mobile Health and Fitness Apps: What Are the Privacy R isks?" Privacy R ights Clearinghouse, July 15, 2013, http://www.privacyrights.org/mobile-medical-apps-privacy-alert.

67. A. Carrns, "Free Apps for Nearly Every Health Problem, but What About Privacy?" New York Times, September 12, 2013, http://www.nytimes.com/2013/09/12/your-money/free-apps-for-nearly-every-health-problem-but-what-about-privacy.html.

68. A. Campbell, "Dispatch Software for Trucking: How GPS Tracking Systems Affect Performance," Trucking Office, August 21, 2013, http://www.truckingoffice.com/2013/dispatch-software-for-trucking-how-gps-tracking-systems-affect-performance.

69. N. Greenfieldboyce, "Indie Truckers: Keep Big Brother Out of My Cab," NPR, April 20, 2011, http://www.npr.org/2011/04/20/135507979/indie-truckers-keep-big-brother-out-of-my-cab.

70. B. Greene, "How Your Boss Can Keep You on a Leash," CNN, February 2, 2014, http://www.cnn.com/2014/02/02/opinion/greene-corporate-surveillance/index.html?iref=allsearch.

71. H. J. Wilson, "Wearable Gadgets Transform How Companies Do Business," Wall Street Journal, October 20, 2013, http://online.wsj.com/news/articles/SB1000 1424052702303796404579099203059125112.

72. T. Simonite, "Using a Smartphone's Eyes and Ears to Log Your Every Move," MIT Technolog y Review, July 4, 2013, http://www.technologyreview.com/news/516566/using-a-smartphones-eyes-and-ears-to-log-your-every-move/.

73. L. Eadicicco, "What Fitbit and Nest Are Doing with Your Data," Slate, April 19, 2014, http://www.slate.com/blogs/business_insider/2014/04/19/fitbit_nest_data_how_the_companies_are_making_money_off_you.html.

74. A. Pai, "Nielsen: 46 Million People Used Fitness Apps in January," in MobiHealthNews, April 17, 2014, http://mobihealthnews.com/32183/nielsen-46-million-people-used-fitness-apps-in-january/.

75. T. Klosowski, "Lots of Health Apps Are Selling Your Data. Here's Why," Lifehacker, May 9, 2014, http://lifehacker.com/lots-of-health-apps-are-selling-your-data-heres-why-1574001899.

76. C. Rubin, "Your Trainer Saw That," New York Times, April 17, 2014, http://www.nytimes.com/2014/04/17/fashion/devices-like-fitbit-and-up24-being-used-by-gyms-to-track-clients-fitness-activity.html.

77. T. Lee, "Hackers Break into Networks of 3 Big Medical Device Makers," SF Gate, February 8, 2014, http://m.sfgate.com/news/article/Hackers-break-into-networks-of-3-big-medical-5217780.php

78. R. Pierson, "FDA Urges Protection of Medical Devices from Cyber Threats," Medscape, 2013, http://www.medscape.com/viewarticle/806269_print.

79. A. Sarvestani, "Boston Children's Hospital Faces Cyber Threats – Are the Medical Devices Safe?" Mass Device, April 24, 2014, http://www.massdevice.com/news/boston-childrens-hospital-faces-cyber-threats-are-medical-devices-safe?page=show.

80. D. Talbot, "Encrypted Heartbeats Keep Hackers from Medical Implants," MIT Technology Re– view, September 16, 2013, http://www.technologyreview.com/news/519266/encrypted-heartbeats-keep-hackers-from-medical-implants/.

81. K. Zetter, "It's Insanely Easy to Hack Hospital Equipment," Wired, April 25, 2014, http://www.wired.com/2014/04/hospital-equipment-vulnerable/.

82. L. Hood, "Your Body Is the Next Frontier in Cybercrime," The Conversation, October 1, 2013, https://theconversation.com/your-body-is-the-next-frontier-in-cybercrime-18771.

83. J. A. Finkle, "A Security Firm Has Hired the Diabetic Who Hacked into His Own Insulin Pump to Show How It Could Be Used to Kill People," Business Insider, May 30, 2014, http://www.businessinsider.com/r-rapid7-hires-jay-radcliffe-diabetic-who-hacked-his-insulin-pump-2014-29.

84. N. Perlroth, "Heartbleed Highlights a Contradiction in the Web," New York Times, April 19, 2014, http://www.nytimes.com/2014/04/19/technology/heartbleed-highlights-a-contradiction-in-the-web.html.

85. N. Perlroth and Q. Hardy, "Heartbleed Flaw Could Reach Beyond Websites to Digital Devices, Experts Say," New York Times, April 11, 2014, http://www.nytimes.com/2014/04/11/business/security-flaw-could-reach-beyond-websites-to-digital-devices-experts-say.html.

86. R. Merkel, "How the Heartbleed Bug Reveals a Flaw in Online Security," The Conversation, April 11, 2014, https://theconversation.com/how-the-heartbleed-bug-reveals-a-flaw-in-online-security-25536.

87. "CyberR x Health Industry Cyber Threat Exercise, Spring 2014," HITRUST Alliance Inc., April 21, 2014, http://hitrustalliance.net/content/uploads/ 2014/05/CyberRX _Preliminary_Report.pdf.

88a. J. Conn, "Cybersecurity Test Finds Healthcare Communications Weak Links," Modern Health– care, April 21, 2014, http://www.modernhealthcare.com/article/ 20140421/NEWS/304219940/.


Эрик Тополь читать все книги автора по порядку

Эрик Тополь - все книги автора в одном месте читать по порядку полные версии на сайте онлайн библиотеки mybooks.club.


Будущее медицины: Ваше здоровье в ваших руках отзывы

Отзывы читателей о книге Будущее медицины: Ваше здоровье в ваших руках, автор: Эрик Тополь. Читайте комментарии и мнения людей о произведении.

Прокомментировать
Подтвердите что вы не робот:*
Подтвердите что вы не робот:*
Все материалы на сайте размещаются его пользователями.
Администратор сайта не несёт ответственности за действия пользователей сайта..
Вы можете направить вашу жалобу на почту librarybook.ru@gmail.com или заполнить форму обратной связи.