38. "Clever Cities: The Multiplexed Metropolis," The Economist, September 15, 2014, http://www.economist.com/node/21585002/print.
39. "Biometric Technology Identifies One of the Boston Marathon Bombers," Homeland Security News Wire, May 28, 2013, http://www.homelandsecurit ynewswire.com/dr20130527-biometric-technology-identifies-one-of-the-boston-marathon-bombers.
40. D. Eggers, The Circle (San Francisco, CA: McSweeney's Books, 2013).
41. M. Atwood, "When Privacy Is Theft," New York Review of Books , November 21, 2013, http://www.nybooks.com/articles/archives/2013/nov/21/eggers-circle-when-privacy-is-theft/?pagination=false&printpage=true.
42. J. Nocera, "A World Without Privacy," New York Times , October 15, 2013, http://www.nytimes.com/2013/10/15/opinion/nocera-a-world-without-privacy.html.
43. A. Townsend, Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia (New York, NY: W. W. Norton & Co., 2013).
44. S. Kroft, "The Data Brokers: Selling Your Personal Information," CBS News, March 9, 2014, http://www.cbsnews.com/news/the-data-brokers-selling-your-personal-information/.
45. A. E. Marwick, "How Your Data Are Being Deeply Mined," New York Review of Books , January 9, 2014, http://www.nybooks.com/articles/archives/2014/jan/09/how-your-data-are-being-deeply-mined/?pagination=false&printpage=true.
46. N. Singer, "A Student-Data Collector Drops Out," New York Times, April 27, 2014, http://www.nytimes.com/2014/04/27/technology/a-student-data-collector-drops-out.html.
47. J. Lanier, "How Should We Think About Privacy?" Scientific American 309, no. 5 (2013):64–71.
48. D. M. Jackson, "When Meta Met Data," New York Times , October 4, 2013, http://www.nytimes.com/2013/10/06/magazine/when-meta-met-data.html?pagewanted=all.
49. R. J. Rosen, "Stanford Researchers: It Is Trivially Easy to Match Metadata to Real People," The Atlantic , December 2013, http://www.theatlantic.com/technology/print/2013/12/stanford-researchers-it-is-trivially-easy-to-match-metadata-to-real-people/282642/.
50. T. Lahey, "A Watchful Eye in Hospitals," New York Times , February 17, 2014, http://www.nytimes.com/2014/02/17/opinion/a-watchful-eye-in-hospitals.html.
51. S. D. Hall, "Medical Identity Theft Up 20 % Since 2012," Fierce Health IT, September 12, 2013, http://www.fiercehealthit.com/story/how-to-prevent-medical-identity-theft/2013-09-12.
52. M. Ollove, "The Rise of Medical Identity Theft in Healthcare," Kaiser Health News , February 7, 2014, http://www.kaiserhealthnews.org/Stories/2014/February/07/Rise-of-indentity-theft.aspx.
53. M. Madden, "More Online Americans Say They've Experienced a Personal Data Breach," Pew Research , April 14, 2014, http://www.pewresearch.org/fact-tank/2014/04/14/more-online-americans-say-theyve-experienced-a-personal-data-breach/.
54. "Better Information Means Better Care," NHS, January 14, 2014, http://www.england.nhs.uk/wp-content/uploads/2014/01/cd-leaflet-01-14.pdf.
55. "Careless.data," Nature 507 (2014): 7.
56. B. Goldacre, "Care.data Is in Chaos. It Breaks My Heart," The Guardian , February 28, 2014, http://www.theguardian.com/commentisfree/2014/feb/28/care-data-is-in-chaos/print.
57. E. Callaway, "UK Push to Open Up Patients' Data," Nature 502 (2013): 283.
58. L. Donnelly, "Patient Records Should Not Have Been Sold, NHS Admits," Telegraph, February 24, 2014, http://www.telegraph.co.uk/health/nhs/10659147/Patient-records-should-not-have-been-sold-NHS-admits.html.
59. R. Ramesh, "NHS Patient Data to Be Made Available for Sale to Drug and Insurance Firms," The Guardian , January 19, 2014, http://www.theguardian.com/society/2014/jan/19/nhs-patient-data-available-companies-buy/print.
60. J. Best, "Big Doubts on Big Data: Why I Won't Be Sharing My Medical Data with Anyone – yet," ZDNet, February 19, 2014, http://www.zdnet.com/uk/big-doubts-on-big-data-why-i-wont-be-sharing-my-medical-data-with-anyone-yet-7000026497/.
61. S. Knapton, "Health Records of Every NHS Patient to Be Shared in Vast Database," Telegraph, January 10, 2014, http://www.telegraph.co.uk/news/10565160/Health-records-of-every-NHS-patient-to-be-shared-in-vast-database.html.
62. C. Manson, "Could Controversial Data Sharing Be Good for Patient Health?" The Guardian, April 22, 2014, http://www.theguardian.com/healthcare-net work/2014/apr/22/controversial-data-sharing-good-patient-health/print.
63. J. Comstock, "Health App Makers Face Privacy and Security Regulation from Many Quarters," MobiHealthNews , January 28, 2014, http://mobihealthnews.com/29336/health-app-makers-face-privacy-and-security-regulation-from-many-quarters/.
64. H. Smith, "mHealth and HIPA A Breaches – Where Are They?" What's Harold In , February 16, 2014, http://whats.harold.in/2014/02/mhealth-and-hipaa-breaches-where-are.html.
65. J. L. Hall, and D. McGraw, "For Telehealth to Succeed, Privacy and Security Risks Must Be Identified and Addressed," Health Affairs 33, no. 2 (2014): 216–221.
66. "Privacy Rights Clearinghouse Releases Study: Mobile Health and Fitness Apps: What Are the Privacy R isks?" Privacy R ights Clearinghouse, July 15, 2013, http://www.privacyrights.org/mobile-medical-apps-privacy-alert.
67. A. Carrns, "Free Apps for Nearly Every Health Problem, but What About Privacy?" New York Times , September 12, 2013, http://www.nytimes.com/2013/09/12/your-money/free-apps-for-nearly-every-health-problem-but-what-about-privacy.html.
68. A. Campbell, "Dispatch Software for Trucking: How GPS Tracking Systems Affect Performance," Trucking Office , August 21, 2013, http://www.truckingoffice.com/2013/dispatch-software-for-trucking-how-gps-tracking-systems-affect-performance.
69. N. Greenfieldboyce, "Indie Truckers: Keep Big Brother Out of My Cab," NPR , April 20, 2011, http://www.npr.org/2011/04/20/135507979/indie-truckers-keep-big-brother-out-of-my-cab.
70. B. Greene, "How Your Boss Can Keep You on a Leash," CNN , February 2, 2014, http://www.cnn.com/2014/02/02/opinion/greene-corporate-surveillance/index.html?iref=allsearch.
71. H. J. Wilson, "Wearable Gadgets Transform How Companies Do Business," Wall Street Journal , October 20, 2013, http://online.wsj.com/news/articles/SB1000 1424052702303796404579099203059125112.
72. T. Simonite, "Using a Smartphone's Eyes and Ears to Log Your Every Move," MIT Technolog y Review , July 4, 2013, http://www.technologyreview.com/news/516566/using-a-smartphones-eyes-and-ears-to-log-your-every-move/.
73. L. Eadicicco, "What Fitbit and Nest Are Doing with Your Data," Slate , April 19, 2014, http://www.slate.com/blogs/business_insider/2014/04/19/fitbit_nest_data_how_the_companies_are_making_money_off_you.html.
74. A. Pai, "Nielsen: 46 Million People Used Fitness Apps in January," in MobiHealthNews, April 17, 2014, http://mobihealthnews.com/32183/nielsen-46-million-people-used-fitness-apps-in-january/.
75. T. Klosowski, "Lots of Health Apps Are Selling Your Data. Here's Why," Lifehacker, May 9, 2014, http://lifehacker.com/lots-of-health-apps-are-selling-your-data-heres-why-1574001899.
76. C. Rubin, "Your Trainer Saw That," New York Times , April 17, 2014, http://www.nytimes.com/2014/04/17/fashion/devices-like-fitbit-and-up24-being-used-by-gyms-to-track-clients-fitness-activity.html.
77. T. Lee, "Hackers Break into Networks of 3 Big Medical Device Makers," SF Gate, February 8, 2014, http://m.sfgate.com/news/article/Hackers-break-into-networks-of-3-big-medical-5217780.php
78. R. Pierson, "FDA Urges Protection of Medical Devices from Cyber Threats," Medscape, 2013, http://www.medscape.com/viewarticle/806269_print.
Читать дальше
Конец ознакомительного отрывка
Купить книгу