DW For Bio Terrorism Surveillance
DW For Bio Terrorism Surveillance
DW For Bio Terrorism Surveillance
Authors:
Abstract
This paper introduces the reader to the term Bioterrorism and its
threat on civilian populations. Further, it delves into the need, usage
and application of data warehousing in Bioterrorist attacks and its
surveillance. It also describes the features and technical challenges in
developing an effective bioterrorism surveillance system.
A demonstration of a Bioterrorism surveillance system in the State of
Florida further showcases these ideas.
Survey of Literature
[2] v
Carol C. Diamond et al in their paper on Health IT systems
emphasize that Technology should enable researchers, practitioners,
and public health officials to share data across networks, while
protecting patients’ privacy. Health information technology (IT) has
great potential to transform health care and inform population health
goals in clinical research, quality measurement, and public safety. But
to fully realize the benefits of health IT for population health, focus
must be on new models that maximize efficiency, encourage rapid
learning. In this paper the authors explore the advantages of a
networked model for analysing population health information and
provide several examples.
2
significance. The authors have proposed a framework which can guide
health departments in creating protocols that will be standardized,
tested, and relevant given their goals with such systems.
[4]
Pascal Cre´pey et al in their paper develop a method of detecting
correlations between epidemic patterns in different regions that are
due to human movement and introduce a null model in which the
travel-induced correlations are cancelled. This method is then applied
to cases of seasonal influenza outbreaks in the United States and
France. This paper basically tells how to interpret data statistically.
[5]
Madjid et al in their paper elaborate that natural outbreak of
emerging infections or release of biologic agents during a bioterrorism
attack could have a considerable impact on the cardiovascular systems
of those exposed to the agents. The authors discuss issues
surrounding basic, clinical, and population science research and
training needs with regards to emerging infectious diseases and
biological threats. They describe the need for surveillance systems
that might increase our ability to quickly identify disease outbreaks
and track their course.
[6]
Buehler et al in their paper describe that the detection of a
bioterrorism-related epidemic depends on population characteristics,
availability and use of health services, the nature of an attack,
epidemiologic features of individual diseases, surveillance methods,
and the capacity of health departments to respond to alerts. The
3
authors emphasize that understanding their effect on epidemic
detection should help define the usefulness of syndromic surveillance
and identify approaches to increasing the likelihood that clinicians
recognize and report an epidemic.
The article by Brian C Lein [8] has drawn the attention towards the risk
assessment of bioterrorism. It discusses the detection and prevention
of the population from bioterrorism. It discusses evaluation of threat
and risk assessment. It also recommends consolidating all biological
defense funding, research, and coordination.
[9]
The research paper by Howard Kirk Mardis discusses the threat of
bioterrorism and how to make the system more dynamic and efficient
to cater to threats of Bioterrorism. It covers the need to adopt better
information management and human resources systems to fight
bioterrorism. It mentions the trends in bioterrorism and how the
bioterrorist group is different from the rest of the groups. It focuses on
information management and Information structure and how they
help in countering terrorism. The paper mentions the need of special
4
information managers and information broker to manage information
related to bioterrorism. The paper mentions about analytics and the
human resources also.
[10]
The article by Dana A Shea and Sarah A Lister discusses the
biowatch program. It gives insight as what the program is and which
all US cities are covered under it. It discusses the technical issues
about the issues regarding sensors which can detect bioterrorism. It
also stated bioterrorism analytical issues. The paper also covers the
future of biowatch program and also the concerns regarding the policy
which is in place. It mentions the distributed detection networks to be
used under the biowatch program.
[11]
The paper by Farzad Mostashari and Jessica Hartman covers the
early warning for bioterrorist attack and bio surveillance. The paper
highlights new uses of analytical techniques. It highlights the
challenges of evaluation of early warning of bioterroism. It also
discusses what all is required to make surveillance to reach its full
potential data standardization, data flow, data security etc.
The paper by Amanda Hodges and Rick Sapp covers the threat of bio
terrorism and agroterrorism to the state of floirda. The paper
examines vulnerability of various industries to bio attacks with special
focus on plant and animal industries. The paper further examines the
national diagnostic network.
5
data warehouse. Further the paper examines the surveillance system
at the state of florida using data analytics.
Section 1: Introduction
6
A bioterrorism attack is the deliberate release of viruses, bacteria, or
other germs (agents) used to cause illness or death in people, animals,
or plants. These agents are typically found in nature, but it is possible
that they could be changed to increase their ability to cause disease,
make them resistant to current medicines, or to increase their ability
to be spread into the environment. Biological agents can be spread
through the air, through water, or in food. Terrorists may use
biological agents because they can be extremely difficult to detect and
do not cause illness for several hours to several days. Some
bioterrorism agents, like the smallpox virus, can be spread from
person to person and some, like anthrax, cannot.
Examples:
8
Category B: These agents are the second highest priority because:
They have potential for high morbidity and mortality rates and
major health impact
11
In 1999, the University of Pittsburgh's Centre
for Biomedical Informatics deployed the first automated bioterrorism
detection system, called RODS (Real-Time Outbreak Disease
Surveillance). RODS is designed to draw collect data from many data
sources and use them to perform signal detection, that is, to detect a
possible bioterrorism event at the earliest possible moment.
12
The health sector should be adequately prepared, that is, not only
stocked with necessary supplies for treatment (vaccines, antibiotics)
but also aware of existing dangers so as to be able to detect a covert
biological attack.
13
Data Sources: The data is gathered from databases of peer-reviewed
articles, government reports, and web sites of relevant government
and commercial entities. Social media sites data is also incorporated.
Government agencies most likely to fund, develop, or use bioterrorism
systems should be identified.. We searched the Web sites of these
government agencies and other academic and commercial sites.
Finally, we identified additional articles from the bibliographies of
included articles and from conference proceedings. Data can also be
gathered from programs like MATRIX (Multi-state Anti-terrorism
Information Exchange system) in USA. . This program helps to facilitate
collaborative information sharing and factual data analysis.
14
Data Synthesis:
The data gathered from the various sources should be analyzed
through various tools and techniques and appropriate patterns should
be identified. Meaningful conclusions should be derived from the data
gathered for further action.
16
Section 3: Live case example: State of Florida
The state of Florida has its own surveillance system using data
warehousing to detect early signs of bio terrorist attacks. The
demonstration surveillance system in Florida uses the flash data
warehouse architecture.
Data collected from all the mentioned resources are analysed. They
are coupled with real time data from the hospitals for the
17
demonstration system. Potential threat indicators that can be defined
based on International Classification of Diseases (ICD) codes and
derived from hospital admission/discharge data.
18
Pattern Recognition and Alarm Thresholds
Section 4: Conclusions
19
become one of the major challenges of the 21st century. It identifies
the need for data warehousing to tackle bioterrorism. The paper
covers current response to bioterrorism. Factors incorporated in a
surveillance system used to prevent bioterrorism are identified and
systems needed for collecting various sources of data are identified. A
case of state of Florida is included as a live case study at the end of the
paper.
References
20
4. Pascal Cre´pey and Marc Barthe´lemy, Detecting Robust
Patterns in the Spread of Epidemics: A Case Study of
Influenza in the United States and France, American Journal
of Epidemiology, Advance Access publication October 15,
2007,Vol. 166, No. 11
5. Mohammad Madjid, MD, Russell V. Luepker, MD, MS, FACC,
FAHA, Co-Chairs Kurt J. Greenlund, PHD, Kathryn A. Taubert,
PHD, FAHA, Michael J. Roy, MD, MPH, FACP, Rose Marie
Robertson, MD, FACC, FAHA, Cardiovascular Effects of
Emerging Infectious Diseases and Biological Terrorism
Threats, March 27, JACC Vol. 49, No. 12, 2007
6. James W. Buehler, Ruth L. Berkelman, David M. Hartley, and
Clarence J. Peters, Syndromic Surveillance and Bioterrorism-
related Epidemics, Emerging Infectious Diseases, Vol. 9, No.
10, October 2003
7. Arnold F. Kaufmann, Martin I. Meltzer, and George P. Schmid,
The Economic Impact of a Bioterrorist Attack: Are Prevention
and Post attack intervention Programs Justifiable, Centers for
Disease Control and Prevention, Atlanta, Georgia, USA
8. Brian C. Lein, A Bioterrorism Prevention Strategy for the 21st
Century
9. Howard Kirk Mardis, Lt Col, Counter Bioterrorism US
intelligence challenges, USAF
10. The Biowatch by Dana A Shea and Sarah A Lister
11. Farzad Mostashari and Jessica Hartman, Syndromic
Surveillance: a Local Perspective
21
12. Amanda Hodges, Rick Sapp ,The Threat of Agroterrorism and
Bioterrorism in Florida- Prevention and a Coordinated
Response,Florida Department of Agriculture and Consumer
Services, October 2006
13. Donald J. Berndt, Sunil Bhat, John W. Fisher, Alan R Hevner
and James Studnicki ,Data Analytics for Bioterrorism
Surveillance, University of South Florida
14. Fu – Chiang Tsui, Jeremy U Espino, Virginia M. Dato, Per H.
Gesteland, Judith Hutman, and Michael M. Wagner , Technical
description of RODS: a real time public health surveillance
system , Journal of the American Medical Informatics
Association, Volume 10 issue 5 , October 2003
15. Parsa Mirhaji , Public Health Surveillance Meets Translational
Informatics : A Desiderata , Journal of the Association for
Laboratory Automation, Volume 14 Issue 3, June 2009
16. Ray R. Arthur, James W. Leduc, James M. Hughes,
Surveillance for Emerging Infectious Diseases and
Bioterrorism Threats, Tropical Infectious Diseases , 2006
17.
22