National Academies Press: OpenBook
« Previous: 4 Conclusions and Recommendations
Suggested Citation:"References." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×

References

AAAS (American Association for the Advancement of Science). 2003. NIH Budget Growth Slows to 2 Percent in FY 2004. February 25, 2003. [Online]. Available: http://www.aaas.org/spp/rd/nih04p.pdf

Adu-Bobie, J., B. Capecchi, D. Serruto, R. Rappuoli, and M. Pizza. 2003. Two years into reverse vaccinology. Vaccine 21(7): 605-610.

Amsellem, Z., B.A. Cohen, and J. Gressel. 2002. Engineering hypervirulence in a mycoherbicidal fungus for efficient weed control. Nature Biotechnology 20(10): 1035-1040. Atlas, R.M. 2002. National security and the biological research community. Science 298: 753-754.

Atlas, R.M., P. Campbell, N.R. Cozarelli, G. Curfman, L. Enquist, G. Fink, A. Flanagin, J. Fletcher, E. George, G. Hammes, D. Heyman, T. Inglesby, S. Kaplan, D. Kennedy, J. Krug, R. Levinson, E. Marcus, H. Metzger, S.S. Morse, A. O’Brien, A. Onderdonk, G. Poste, B. Renault, R. Rich, A. Rosengard, S. Salzburg, M. Scanlan, T. Shenk, H. Tabor, H. Varmus, E. Wimmer, and K. Yamamoto. 2003a. Uncensored exchange of scientific results. Proceedings of the National Academy of Sciences 100(4): 1464.

Atlas, R.M., P. Campbell, N.R. Cozarelli, G. Curfman, L. Enquist, G. Fink, A. Flanagin, J. Fletcher, E. George, G. Hammes, D. Heyman, T. Inglesby, S. Kaplan, D. Kennedy, J. Krug, R. Levinson, E. Marcus, H. Metzger, S.S. Morse, A. O’Brien, A. Onderdonk, G. Poste, B. Renault, R. Rich, A. Rosengard, S. Salzburg, M. Scanlan, T. Shenk, H. Tabor, H. Varmus, E. Wimmer, and K. Yamamoto. 2003b. Statement on the consideration of biodefence and biosecurity. Nature 421: 771.

Atlas, R.M., P. Campbell, N.R. Cozarelli, G. Curfman, L. Enquist, G. Fink, A. Flanagin, J. Fletcher, E. George, G. Hammes, D. Heyman, T. Inglesby, S. Kaplan, D. Kennedy, J. Krug, R. Levinson, E. Marcus, H. Metzger, S.S. Morse, A. O’Brien, A. Onderdonk, G. Poste, B. Renault, R. Rich, A. Rosengard, S. Salzburg, M. Scanlan, T. Shenk, H. Tabor, H. Varmus, E. Wimmer, and K. Yamamoto. 2003c. Statement on scientific publication and security. Science 299: 1149.


Carlson, R. 2003. The pace and proliferation of biological technologies. Biosecurity and Bioterrorism 1(3): 203-214.

Suggested Citation:"References." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×

Check, E. 2002. Biologists apprehensive over U.S. moves to censor information flow. Nature 415(6874): 821.


Duggan, D.J., M. Bittner, Y. Cheng, P. Meltzer, and J.M. Trent. 1999. Expression profiling using cDNA microarrays. Nature Genetics 21(supplement): 10-14.


Epstein, G.L. 2001. Controlling biological warfare threats: resolving potential tensions among the research community, industry, and the national security community. Critical Reviews in Microbiology 27(4): 321-354.


Fiers, W., R. Contreras, F. Duerinck, G. Haegeman, D. Iserentant, J. Merregaert, W. Min Jou, F. Molemans, A. Raeymaekers, A. Van den Berghe, G. Volckaert, and M. Ysebaert. 1976. Complete nucleotide sequence of bacteriophage MS2 RNA: primary and secondary structure of the replicase gene. Nature 260(5551): 500-507.

Fleischmann, R.D., M.D. Adams, O. White, R.A. Clayton, E.F. Kirkness, A.R. Kerlavage, C.J. Bult, J.-F. Tomb, B.A. Dougherty, J.M. Merrick, K. McKenney, G. Sutton, W. FitzHugh, C. Fields, J.D. Gocyne, J. Scott, R. Shirley, L.-I. Liu, A. Glodek, J.M. Kelley, J.F. Weidman, C.A. Phillips, T. Spriggs, E. Hedblom, M.D. Cotton, T.R. Utterback, M.C. Hanna, D.T. Nguyen, D.M. Saudek, R.C. Brandon, L.D. Fine, J.L. Fritchman, J.L. Fuhrmann, N.S.M. Geoghagen, C.L. Gnehm, L.A. McDonald, K.V. Small, C.M. Fraser, H.O. Smith, and J.C. Venter. 1995. Whole-genome sequencing and assembly of Haemophilus influenza Rd. Science 269(5223): 496-512.

Fraser, C.M. 2004. A genomics-based approach to biodefence preparedness. Nature Reviews Genetics 5(1): 23-33.

Frazer, K.A., L. Elnitski, D.M. Church, I. Dubchak, and R.C. Hardison. 2003. Cross-species sequence comparisons: a review of methods and available resources. Genome Research 13: 1-12.


Gordon, D.F. 2000. Importation of Infectious Diseases into U.S. Testimony before House Committee on International Relations. June 29, 2000.

Grifantini, R., E. Bartolini, A. Muzzi, M. Draghi, E. Frigimelica, J. Berger, G. Ratti, R. Petracca, G. Galli, M. Agnusdei, M.M. Giuliani, L. Santini, B. Brunelli, H. Tettelin, R. Rappuoli, F. Randazzo, and G. Grandi. 2002. Previously unrecognized vaccine candidates against group B meningococcus identified by DNA microarrays. Nature Biotechnology 20(9): 914-921.


Hood, L., and D. Galas. 2003. The digital code of DNA. Nature 421: 444-448.


Isberg, R.R., and S. Falkow. 1985. A single genetic locus encoded by Yersinia pseudotuberculosis permits invasion of cultured animal cells by Escherichia coli K-12. Nature 317(6034): 262-264.


Kanehisa, M., and P. Bork. 2003. Bioinformatics in the post-sequence era. Nature Genetics 33(supplement): 305.

Kaplan, D.E. 2000. Aum Shinrikyo. Pp. 207-220 in Toxic Terror: Assessing Terrorist Use of Chemical and Biological Weapons. J.B. Tucker, ed. Cambridge, MA: MIT Press.

Kennedy, D. 2003. Two cultures. Science 299(5610): 1148.

Kwik, G., J. Fitzgerald, T.V. Inglesby, and T. O’Toole. 2003. Biosecurity: responsible stewardship of bioscience in an age of catastrophic terrorism. Biosecurity and Bioterrorism 1(1): 27-35.


Lifton, R.J. 1999. Destroying the World to Save It: Aum Shinrikyo, Apocalyptic Violence, and the New Global Terrorism. New York: Henry Holt.


Miller, J., W. Broad, and S. Engelberg. 2002. Germs: Biological Weapons and America’s Secret War. New York: Simon and Schuster, Inc.

Mora, M., D. Veggi, L. Santini, M. Pizza, and R. Rappuoli. 2003. Reverse vaccinology. Drug Discovery Today 8(10): 459-464.

Moxon, R., and R. Rappuoli. 2002. Bacterial pathogen genomics and vaccines. British Medical Bulletin 62: 45-58.

Suggested Citation:"References." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×

NRC (National Research Council). 2003a. Biotechnology Research in an Age of Terrorism. Washington, DC: The National Academies Press.

NRC (National Research Council). 2003b. Countering Agricultural Bioterrorism. Washington, DC: The National Academies Press.


Parkhill, J., and C. Berry. 2003. Relative pathogenic values. Nature 423: 23-25.

Petro, J.B., and D.A. Relman. 2003. Understanding threats to scientific openness. Science 302(5652): 1898.

Pizza, M., V. Scarlato, V. Masignani, M.M. Giuliani, B. Arico, M. Comanducci, G.T. Jennings, L. Baldi, E. Bartolini, B. Capecchi, C.L. Galeotti, E. Luzzi, R. Manetti, E. Marchetti, M. Mora, S. Nuti, G. Ratti, L. Santini, S. Savino, M. Scarselli, E. Storni, P. Zuo, M. Broeker, E. Hundt, B. Knapp, E. Blair, T. Mason, H. Tettelin, D.W. Hood, A.C. Jeffries, N.J. Saunders, D.M. Granoff, J.C. Venter, E.R. Moxon, G. Grandi, and R. Rappuoli. 2000. Identification of vaccine candidates against serogroup B meningococcus by whole-genome sequencing. Science 287: 1816-1820.


Rappuoli, R., and A. Covacci. 2003. Reverse vaccinology and genomics. Science 302: 602.

Rosqvist, R., M. Skurnik, and H. Wolf-Watz. 1988. Increased virulence of Yersinia pseudotuberculosis by two independent mutations. Nature 334(6182): 522-524.


Salyers, A. 2002. Science, censorship, and public health. Science 296(5568): 617.

Schrage, M. 2003. Hobbyists play a critical role in the design and diffusion of technology. MIT Technology Review. June, 2003. [Online]. Available: http://www.technologyreview.com/articles/schrage0603.asp


Tettelin, H., N.J. Saunders, J. Heidelberg, A.C. Jeffries, K.E. Nelson, J.A. Eisen, K.A. Ketchum, D.W. Hood, J.F. Peden, R.J. Dodson, W.C. Nelson, M.L. Gwinn, R. DeBoy, J.D. Peterson, E.K. Hickey, D.H. Haft, S.L. Salzberg, O. White, R.D. Fleischmann, B.A. Dougherty, T. Mason, A. Ciecko, D.S. Parksey, E. Blair, H. Cittone, E.B. Clark, M.D. Cotton, T.R. Utterback, H. Khouri, H. Qin, J. Vamathevan, J. Gill, V. Scarlato, V. Masignani, M. Pizza, G. Grandi, L. Sun, H.O. Smith, C.M. Fraser, E.R. Moxon, R. Rappuoli, and J.C. Venter. 2000. Complete genome sequence of Neisseria meningitides serogroup B strain MC58. Science 287: 1809-1815.

Torok, T.J. R.V. Tauxe, R.P. Wise, J.R. Livengood, R. Sokolow, S. Mauvais, K.A. Birkness, M.R. Skeels, J.M. Horan, and L.R. Foster. 1997. A large community outbreak of salmonellosis caused by intentional contamination of restaurant salad bars. Journal of the American Medical Association 278(5): 389-395.


Venter, J.C., S. Levy, T. Stockwell, K. Remington, and A. Halpern. 2003. Massive parallelism, randomness, and genomic advances. Nature Genetics 33(supplement): 219-227.

Vastag, B. 2003. Openness in biomedical research collides with heightened security concerns. Journal of the American Medical Association 289: 686-690.

Voorhis, D.L., S. Dillon, S.B. Formal, and R.R. Isberg. 1991. An O antigen can interfere with the function of the Yersinia pseudotuberculosis invasin protein. Molecular Microbiology 5(2): 317-325.


Weiss, R. 2003. Engineered Virus Related to Smallpox Evades Vaccine. The Washington Post. November 1, 2003.

Suggested Citation:"References." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×

This page intentionally left blank.

Suggested Citation:"References." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×
Page 65
Suggested Citation:"References." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×
Page 66
Suggested Citation:"References." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×
Page 67
Suggested Citation:"References." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×
Page 68
Next: Appendix A: Statement of Task »
Seeking Security: Pathogens, Open Access, and Genome Databases Get This Book
×
Buy Paperback | $21.00 Buy Ebook | $16.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Within the last 30 years, the genomes of thousands of organisms, from viruses, to bacteria, to humans, have been sequenced or partially sequenced and deposited in databases freely accessible to scientists around the world. This information is accelerating scientists' ability to fight disease and make other medical advances, but policymakers must consider the possibility that the information could also be used for destructive purposes in acts of bioterrorism or war. Based in part on views from working biological scientists, the report concludes that current policies that allow scientists and the public unrestricted access to genome data on microbial pathogens should not be changed. Because access improves our ability to fight both bioterrorism and naturally occurring infectious diseases, security against bioterrorism is better served by policies that facilitate, not limit, the free flow of this information.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!