Verified Document

Bioterrorism Surveillance Challenges To Bioterrorism Challenges To Essay

¶ … Bioterrorism Surveillance Challenges to bioterrorism

Challenges to surveillance

Having noted the surveillance methods that can be used in the monitoring of the bioterrorism and the possible intentional infection, there are some challenges that these surveillance systems might encounter. Bearing the nature of the agents that are used in bioterrorism, the challenges that might be experienced by both the syndromic surveillance and cell phone surveillance may have several similarities.

The syndromic surveillance challenges

Bearing the fact that syndromic surveillance depends on the general survey of the trend of a bioterrorism agent, the information that is generated from such a surveillance is quite general and in effect whenever such a surveillance systems comes across an anomalous trend in the health of the public, it would be hard for those implementing it to immediately propose a mass measure like issuance of antibiotics...

Parts of this document are hidden

View Full Document
svg-one

There will therefore be a need to move from the nonspecific information and data to individual confirmation that such a trend is caused by anthrax or any other agents. This surveillance is therefore noted to be only a cue to the physicians to be keener to bioterrorism agents and the diseases that they cause before the attack is confirmed or otherwise.
There are chances that this kind of surveillance as well could lead to false alarm among the citizens. This false alarm may be both ways in that due to the nonspecific nature of the data that it presents, it can issue an alert of a bioterrorism act where there is actually none, or on the other hand it can fail to issue an alert where there is actually a case of bioterrorism.

The surveillance also depended on the zip codes in receiving the reports. His is a presumption that the infection and the reporting will occur in the morning or late in the evening when the residents…

Sources used in this document:
References

Adam Szpiro et.al., (2007). Health Surveillance and Diagnosis for Mitigatinga Bio-terror Attack. Lincoln Laboratory Journal. Vol.17 No.1. Retrieved March 7, 2012 from http://www.ll.mit.edu/publications/journal/pdf/vol17_no1/17_1_5Szpiro.pdf

Tener Godwin, (2006). Early Detection and Surveillance for Biopreparedness and Emerging Infectious Diseases. Retrieved March 8, 2012 from http://nursingworld.org/MainMenuCategories/ANAMarketplace/ANAPeriodicals/OJIN/TableofContents/Volume112006/No1Jan06/tpc29_2c16059.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Bioterrorism Is "The Use, or Threatened Use,
Words: 1816 Length: 4 Document Type: Research Paper

Bioterrorism is "the use, or threatened use, of biological agents to promote or spread fear or intimidation upon an individual, a specific group, or the population as a whole for religious, political, ideological, financial, or personal purposes" (Arizona Department of Health Services, 2005). Bioterrorism is the weaponization of biological agents or material; as such, it poses a huge potential risk to the United States, given the relative affordability and accessibility

Bioterrorism Has Been Noted As the Use
Words: 538 Length: 2 Document Type: Essay

Bioterrorism has been noted as the use of any kind of organism such as the bacteria, fungi or viruses, or any toxin (poisonous compounds that are produced by organisms) to eliminate the host. These elements are known to exist naturally within our environment. This then presents a legal loophole into who is supposed to posses these elements and what quantities would be termed as enough to be considered a weapon.

Management Project in the Health Care Organization
Words: 2486 Length: 8 Document Type: Case Study

Management Project in the Health Care Organization Setting This study describes the implementation of a syndromic surveillance system. The syndromic surveillance system collects and analyzes prediagnostic and nonclinical disease indicators, drawing on preexisting electronic data that can be found in systems such as electronic health records, school absenteeism records and pharmacy systems. The systems are utilized to identify specific symptoms within a population that may indicate a public health event

2001 There Was an Anthrax Attack Which
Words: 2227 Length: 7 Document Type: Research Paper

2001 there was an Anthrax attack which created an alert of how bioterrorism had an impact on the public health emergencies. These types of emergencies can not only spread illnesses but also cause several deaths. The can also affect government operations which include the economic growth, creating fear which can cause International crisis. There has been an alert on illnesses that have previously been curbed reappearing with most of

Air Traffic
Words: 28110 Length: 102 Document Type: Thesis

Air traffic has continued to increase and it now constitutes a considerable proportion of the travelling public. The amount of long-hour flights has increased significantly. Based on the International Civil Aviation authority, air traffic can be anticipated to double amid till 2020. Airline travel, especially over longer distances, makes air travelers vulnerable to numerous facets that will impact their health and well-being. Particularly, the speed with which influenza spreads and

Biological Warfare By Homeland Security
Words: 1259 Length: 5 Document Type: Essay

Introduction The Threat of Biological Warfare by Homeland Security Biological warfare, also known as germ warfare, is the deliberate use of biological agents such as viruses, bacteria, fungi, or toxins to cause harm to people, animals, or plants. In recent years, there has been an increasing concern about the potential use of biological warfare by terrorist organizations or rogue states. The Department of Homeland Security (DHS) plays a crucial role in protecting

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now