Abstract
This paper discusses several technical challenges in the development of an effective bioterrorism surveillance system. Three factors are critical:
-
1.
It must be multidimensional.
-
2.
It must accelerate the transmission of findings and data to most closely approximate real time surveillance so as to provide sufficient warning.
-
3.
It must have the capability for pattern recognition that will quickly identify an alarm or alert threshold value.
We build on our on-going health care data warehousing research to provide solutions to these challenges. The innovative use of flash data warehousing provides the essential ability to compare real-time healthcare data with historical patterns of key surveillance indicators. A comprehensive architecture of a bioterrorism surveillance system is presented. A demonstration project in Florida showcases these ideas.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ackelsberg, J., Balter, S., et al. Syndromic Surveillance for Bioterrorism Following the Attacks on the WTC-NYC, 2001. Morbidity & Mortality Weekly Report (September 19, 2002), Center for Disease Control and Prevention.
Barthell, E., Cordell, W., et al. The Frontlines of Medicine Project: A Proposal for the Standardized Communication of Emergency Department Data for Public Health Uses including Syndromic Surveillance for Biological and Chemical Terrorism. Annals of Emergency Medicine 39 4 (April 2002), 422–429.
Berndt, D., Fisher, J., Hevner, A., and Studnicki, J. Healthcare Data Warehousing and Quality Assurance. IEEE Computer 34 12 (December 2001), 33–42.
Berndt, D., Hevner, A., and Studnicki, J. The CATCH Data Warehouse: Support for Community Health Care Decision Making. To appear in Decision Support Systems (2003).
Kaufmann et al. The Economic Impact of a Bioterrorist Attack: Are Prevention and Postattack Intervention Programs Justifiable? Emerging Infectious Diseases 3 (1997), 83–94.
Kimball, R. Realtime Partitions. Intelligent Enterprise, (February 1, 2002).
Lampel, J. and Shapira, Z. Judgmental Errors, Interactive Norms, and the Difficulty of Detecting Strategic Surprises. Organizational Science (2001).
Lazarus, R., Kleinman, K., et al. Use of Automated Ambulatory-Care Encounter Records for Detection of Acute Illness Clusters, Including Potential Bioterrorism Events. Emerging Infectious Diseases 8 8 (August 2002), 753–760.
Lober, W., Karras, B., et al. Roundtable on Bioterrorism Detection: Information System-Based Surveillance. Journal of the American Medical Informatics Association 9 2 (March–April 2002), 105–115.
NEDSS Working Group. National Electronic Disease Surveillance System (NEDSS): A Standards-Based Approach to Connect Public Health and Clinical Medicine. Journal of Public Health Management and Practice 7 6 (November 2001), 43–50.
Overhage et al. Electronic Laboratory Reporting: Barriers, Solutions and Findings. Journal of Public Health Management and Practice 7 6 (November 2001), 60–66.
Relman, D. and Olson, J. Bioterrorism Preparedness: What Practitioners Need to Know. Infectious Medicine 18 11 (November 2001), 497–515.
Rotz, L., Khan, A., et al. Public Health Assessment of Potential Biological Terrorism Agents. Emerging Infectious Diseases 8 2 (February 2002).
Shapira, Z., Risk Taking: A Managerial Perspective. New York: Russell Sage Foundation (1995).
Wagner et al. The Emerging Science of Very Early Detection of Disease Outbreaks. Journal of Public Health Management and Practice 7 6 (November 2001), 51–59.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Berndt, D.J., Hevner, A.R., Studnicki, J. (2003). Bioterrorism Surveillance with Real-Time Data Warehousing. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C., Schroeder, J., Madhusudan, T. (eds) Intelligence and Security Informatics. ISI 2003. Lecture Notes in Computer Science, vol 2665. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44853-5_24
Download citation
DOI: https://doi.org/10.1007/3-540-44853-5_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40189-6
Online ISBN: 978-3-540-44853-2
eBook Packages: Springer Book Archive