Académique Documents
Professionnel Documents
Culture Documents
Surveillance
Authors:
IIT Kharagpur
Abstract
This paper introduces the reader to the term Bioterrorism and its
threat on civilian populations. Further, it delves into the need, usage
and application of data warehousing in Bioterrorist attacks and its
surveillance. It also describes the features and technical challenges in
developing an effective bioterrorism surveillance system.
A demonstration of a Bioterrorism surveillance system in the State of
Florida further showcases these ideas.
2
Survey of Literature
[2]
Carol C. Diamond et al in their paper on Health IT systems
emphasize that Technology should enable researchers, practitioners,
and public health officials to share data across networks, while
protecting patients’ privacy. Health information technology (IT) has
great potential to transform health care and inform population health
goals in clinical research, quality measurement, and public safety. But
to fully realize the benefits of health IT for population health, focus
must be on new models that maximize efficiency, encourage rapid
learning. In this paper the authors explore the advantages of a
networked model for analysing population health information and
provide several examples.
3
Lori Uscher-Pines et al [3] in their research on public health surveillance
systems studied 8 US states. Their objective was to describe current
syndromic surveillance system response protocols and develop a
framework for health departments to use as a guide in initial design
and/or enhancement of response protocols. The research was carried
out by conducting in depth interviews with health department staff.
The conclusion from the research was that health departments had
not prioritized the development and refinement of response protocols
due to reasons like lack of guidance, limited resources for
development of response protocols, and few examples of syndromic
surveillance detecting previously unknown events of public health
significance. The authors have proposed a framework which can guide
health departments in creating protocols that will be standardized,
tested, and relevant given their goals with such systems.
[4]
Pascal Cre´pey et al in their paper develop a method of detecting
correlations between epidemic patterns in different regions that are
due to human movement and introduce a null model in which the
travel-induced correlations are cancelled. This method is then applied
to cases of seasonal influenza outbreaks in the United States and
France. This paper basically tells how to interpret data statistically.
[5]
Madjid et al in their paper elaborate that natural outbreak of
emerging infections or release of biologic agents during a bioterrorism
attack could have a considerable impact on the cardiovascular systems
of those exposed to the agents. The authors discuss issues
4
surrounding basic, clinical, and population science research and
training needs with regards to emerging infectious diseases and
biological threats. They describe the need for surveillance systems
that might increase our ability to quickly identify disease outbreaks
and track their course.
[6]
Buehler et al in their paper describe that the detection of a
bioterrorism-related epidemic depends on population characteristics,
availability and use of health services, the nature of an attack,
epidemiologic features of individual diseases, surveillance methods,
and the capacity of health departments to respond to alerts. The
authors emphasize that understanding their effect on epidemic
detection should help define the usefulness of syndromic surveillance
and identify approaches to increasing the likelihood that clinicians
recognize and report an epidemic.
The article by Brian C Lein [8] has drawn the attention towards the risk
assessment of bioterrorism. It discusses the detection and prevention
of the population from bioterrorism. It discusses evaluation of threat
5
and risk assessment. It also recommends consolidating all biological
defense funding, research, and coordination.
[9]
The research paper by Howard Kirk Mardis discusses the threat of
bioterrorism and how to make the system more dynamic and efficient
to cater to threats of Bioterrorism. It covers the need to adopt better
information management and human resources systems to fight
bioterrorism. It mentions the trends in bioterrorism and how the
bioterrorist group is different from the rest of the groups. It focuses on
information management and Information structure and how they
help in countering terrorism. The paper mentions the need of special
information managers and information broker to manage information
related to bioterrorism. The paper mentions about analytics and the
human resources also.
[10]
The article by Dana A Shea and Sarah A Lister discusses the
biowatch program. It gives insight as what the program is and which
all US cities are covered under it. It discusses the technical issues
about the issues regarding sensors which can detect bioterrorism. It
also stated bioterrorism analytical issues. The paper also covers the
future of biowatch program and also the concerns regarding the policy
which is in place. It mentions the distributed detection networks to be
used under the biowatch program.
[11]
The paper by Farzad Mostashari and Jessica Hartman covers the
early warning for bioterrorist attack and bio surveillance. The paper
highlights new uses of analytical techniques. It highlights the
6
challenges of evaluation of early warning of bioterroism. It also
discusses what all is required to make surveillance to reach its full
potential data standardization, data flow, data security etc.
The paper by Amanda Hodges and Rick Sapp covers the threat of bio
terrorism and agroterrorism to the state of floirda. The paper
examines vulnerability of various industries to bio attacks with special
focus on plant and animal industries. The paper further examines the
national diagnostic network.
7
8
Section 1: Introduction
They result in high death rates and have the potential for
major public health impact
Examples:
10
2001. The anthrax was in a powder form and it was delivered
by the mail.
2) Smallpox: Smallpox is a highly contagious virus. It is
transmitted easily through the atmosphere and has a
high mortality rate (20-40%). Smallpox was eradicated in the
world in the 1970s. However, some virus samples are still
available in Russian and American laboratories. As a biological
weapon smallpox is dangerous because of the highly
contagious nature of both the infected and their pox. Also, the
infrequency with which vaccines are administered among the
general population since the eradication of the disease would
leave most people unprotected in the event of an outbreak.
Smallpox occurs only in humans, and has no external hosts or
vectors.
11
They are easily available
They have potential for high morbidity and mortality rates and
major health impact
12
of patients with similar symptoms and/or presence of an unusual
infection.
14
In Europe, disease surveillance is beginning to be organized on the
continent-wide scale needed to track a biological emergency. The
system not only monitors infected persons, but attempts to discern
the origin of the outbreak. Researchers are experimenting with
devices to detect the existence of a threat:
The health sector should be adequately prepared, that is, not only
stocked with necessary supplies for treatment (vaccines, antibiotics)
but also aware of existing dangers so as to be able to detect a covert
biological attack.
15
Section 2: Bioterrorism Surveillance System
16
Data Sources: The data is gathered from databases of peer-reviewed
articles, government reports, and web sites of relevant government
and commercial entities. Social media sites data is also incorporated.
Government agencies most likely to fund, develop, or use bioterrorism
systems should be identified.. We searched the Web sites of these
government agencies and other academic and commercial sites.
Finally, we identified additional articles from the bibliographies of
included articles and from conference proceedings. Data can also be
gathered from programs like MATRIX (Multi-state Anti-terrorism
Information Exchange system) in USA. . This program helps to facilitate
collaborative information sharing and factual data analysis.
17
Data Synthesis:
The data gathered from the various sources should be analyzed
through various tools and techniques and appropriate patterns should
be identified. Meaningful conclusions should be derived from the data
gathered for further action.
19
Section 3: Live case example: State of Florida
The state of Florida has its own surveillance system using data
warehousing to detect early signs of bio terrorist attacks. The
demonstration surveillance system in Florida uses the flash data
warehouse architecture.
22
Section 4: Conclusions
23
References
24
Robertson, MD, FACC, FAHA, Cardiovascular Effects of
Emerging Infectious Diseases and Biological Terrorism
Threats, March 27, JACC Vol. 49, No. 12, 2007
6. James W. Buehler, Ruth L. Berkelman, David M. Hartley, and
Clarence J. Peters, Syndromic Surveillance and Bioterrorism-
related Epidemics, Emerging Infectious Diseases, Vol. 9, No.
10, October 2003
7. Arnold F. Kaufmann, Martin I. Meltzer, and George P. Schmid,
The Economic Impact of a Bioterrorist Attack: Are Prevention
and Post attack intervention Programs Justifiable, Centers for
Disease Control and Prevention, Atlanta, Georgia, USA
8. Brian C. Lein, A Bioterrorism Prevention Strategy for the 21st
Century
9. Howard Kirk Mardis, Lt Col, Counter Bioterrorism US
intelligence challenges, USAF
10. The Biowatch by Dana A Shea and Sarah A Lister
11. Farzad Mostashari and Jessica Hartman, Syndromic
Surveillance: a Local Perspective
12. Amanda Hodges, Rick Sapp ,The Threat of Agroterrorism and
Bioterrorism in Florida- Prevention and a Coordinated
Response,Florida Department of Agriculture and Consumer
Services, October 2006
13. Donald J. Berndt, Sunil Bhat, John W. Fisher, Alan R Hevner
and James Studnicki ,Data Analytics for Bioterrorism
Surveillance, University of South Florida
14. Fu – Chiang Tsui, Jeremy U Espino, Virginia M. Dato, Per H.
Gesteland, Judith Hutman, and Michael M. Wagner , Technical
description of RODS: a real time public health surveillance
25
system , Journal of the American Medical Informatics
Association, Volume 10 issue 5 , October 2003
15. Parsa Mirhaji , Public Health Surveillance Meets Translational
Informatics : A Desiderata , Journal of the Association for
Laboratory Automation, Volume 14 Issue 3, June 2009
16. Ray R. Arthur, James W. Leduc, James M. Hughes,
Surveillance for Emerging Infectious Diseases and
Bioterrorism Threats, Tropical Infectious Diseases , 2006
26