Advertisement

Combating Terrorism: A New Role for Health Information Systems

  • John S. Silva
  • Edward N. Barthell
Part of the Health Informatics Series book series (HI)

Abstract

Global terrorists have declared a “holy” war on the American homeland. The destruction they have caused and could cause in the future exceeds the capacity of our existing health systems to respond and treat casualties. This chapter addresses this issue and proposes how health systems need to be integrated within a homeland security response network.

Keywords

Terrorist Attack Health Information System Future Technology Syndromic Surveillance Material Safety Data Sheet 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Newsweek 2001 Oct 8.Google Scholar
  2. 2.
    Silva JS. This tool was developed under a DARPA program called ENCOMPASS. Dr. Gene McClellan from Veridian was the principal investigator.Google Scholar
  3. 3.
    Silva JS. Fighting cancer in the information age. An architecture for national scale clinical trials. MD Comput 1999; 16 (3): 43–44.PubMedGoogle Scholar
  4. 4.
    ComCARE Alliance ACN Data Set Working Group. www.comcare.org/research/news/releases/011205acnstandard.html.Google Scholar
  5. 5.
    ANSER. Dark Winter: Summary; 2001. www.homelandsecurity.org/darkwinter/index.cfm.Google Scholar
  6. 6.
    Rosen J, Gougelet R, Mughal M, Hutchinson R. Conference report of the Medical Disaster Conference, June 13–15,2001. Hanover, NH: Dartmouth College; http://thayer.dartmouth.edu/~engg005/MedDisaster/.Google Scholar
  7. 7.
    Rosen J, Koop EC, Grigg EB. Cybercare 2002 July. www.homelandsecurity.org/journal/Articles/cybercare.html.Google Scholar
  8. 8.
    Kaufman AF, Meltzer ML, Schmid, GP. The economic impact of a bioterrorist attack: are prevention and postattack intervention programs justifiable? Emerg Infect Dis 1997; 3: 83–94.CrossRefGoogle Scholar
  9. 9.
    Teich JM, Wagner MM, Mackenzie CF, et al. The informatics response in disaster, terrorism and war. J Am Med Inform Assoc 2002; 9: 97–104.PubMedCrossRefGoogle Scholar
  10. 10.
    Green MS, Cohen D, Kaufman Z, et al. Use of simulated bioterrorist attacks to evaluate syndromic surveillance systems based on multiple data sources. Presented at National Syndromic Surveillance Conference, September 2002. New York Academy of Medicine, New York, NY.Google Scholar
  11. 11.
    Silva JS. Global Expeditionary Medical Surveillance (GEMS) support of domestic preparedness. In: Ramsaroop P, Ball MJ, Beaulieu D, Douglas JV, editors. Advancing federal sector health care: a model for technology transfer. New York: Springer-Verlag; 2001. p. 316–324.Google Scholar
  12. 12.
    Lober W, Bryant T, Wagner M, et al. Roundtable on bioterrorism detection. J Am Med Inform Assoc 2002; 9: 105–115PubMedCrossRefGoogle Scholar
  13. 13.
    National Syndromic Surveillance Conference, September 2002, New York, NY. www.nyam.org/events/syndromicconference/.Google Scholar

Copyright information

© Springer Science+Business Media New York 2004

Authors and Affiliations

  • John S. Silva
    • 1
  • Edward N. Barthell
    • 2
  1. 1.EldersburgUSA
  2. 2.MequonUSA

Personalised recommendations