Verified Document

Public Health Officials Using Computers To Manage Outbreaks Essay

Related Topics:

Introduction

Digital Disease Detection, commonly referred to as digital epidemiology provided strategies and methods for allowing digital-technology users to monitor infectious disease and conduct surveillance. These strategies help in the understanding of concerns and attitudes regarding infectious diseases. The process begins with the basics, such as the availability of internet access, online sharing platforms and other digital devices. These sources offer huge amounts of data. It is important to note that while these sources collect data, they do not, do so, with public health objectives in focus (Denecke, 2017).

The past few decades have seen tremendous changes in the world. There have been many and varied threats; from bioterrorism, influenza pandemics and the emergence of infectious diseases. There is also the issue of unforeseen population mobility which is among the reasons that triggered the development of public health surveillance systems. Such systems are invaluable tools in the detection and response to infectious disease outbreaks. However, the systems frequently fail to avail the required lead time promptly to enable response for the best outcome (Signorini, 2014).

It is important to conduct monitoring of emerging infectious disease in order to detect health threats to the public in good time. Emergence of new infections is connected to the upsurge in human population density, trade, travel and ecological issues such as change of climate and agricultural practice. New molecular technologies are now available for identifying pathogens. They also help in accurately monitoring activity of infectious disease. Surveillance tools that are web based along with other epidemic intelligence approaches applied by most big hospitals are meant to provide assessment of risk and detection of outbreak in a timely way (Christaki, 2015).

Background



The rising concerns regarding the spread of influenza of pandemic proportion, bioterrorism and an upsurge of new infectious diseases have triggered efforts to improve surveillance and increase capacity for detecting infections early and controlling them to prevent outbreaks. Significant resources have been directed at developing advanced electronic reporting infrastructure. These are guided by non-specific syndromic symptoms. There is still debate on the effectiveness of these systems. Also, it has been established that informal digital systems have the ability to run several activities and processing information including mining, filtering, categorizing and visualizing information online with regard to epidemics. Some common examples of such resources include ProMED-mail, BioCaster and HealthMap (Digital Resources for Disease Detection, 2013).

The use of digital resources has become common. They have been used to monitor infectious diseases using both informal and informal methods. One of the driving forces that informed the evolution of such technologies was the need to reduce the time taken to detect outbreaks of infectious diseases. There is scarce evidence to demonstrate that the resources indeed help in detecting outbreaks faster than traditional...
Nevertheless, it is evident that the resources help in availing important information for managing these outbreaks through an increased level of situational awareness. The resources help in boosting risk communication information (Digital Resources for Disease Detection, 2013).
Although computer technologies also come with their problems, they have added an important element in the development of public health monitoring. For instance, in the US in 1991, the National Electronics Telecommunications Systems for Surveillance had connected all state health facilities and departments for regular collection, analysis and dissemination of processed data on conditions categorized as notifiable. The country’s CDC started implementing the National Electronic Disease Surveillance Systems in 2001, to manage the huge number of the existing systems for surveillance, and enable the Public Health Services to respond in a faster way to emerging threats. By 2007, 35 states had integrated their public health monitoring systems following the vision by NEDDS. Once NEDDS is implemented fully in the USA, officials from the Public Health section and other professionals in related disciplines will recognize and respond to public health threats faster (Choi, 2012).

France’s Minitel system has sown that office based surveillance is effective in public health matters. Monitoring of public health depends on information systems that include a range of data sources important to influence public health action (Choi, 2012).

According to Chowell et al (2016) news reports from the internet and health bulletins should be used to gather information on cohorts of patients and reconstruct transmission trees and reproduction figures by making use the lessons learnt from Middle East respiratory syndrome as well as the Ebola outbreak. Sources data from the news media can be a fast way to come up with accurate and timely assessment of the chains of transmission; an essential aspect, given the absence of surveillance data with sufficient details. This is the scenario that was witnessed in the Ebola outbreak of 2014. Although the authors used a manual search method, to extract and model information that is relevant, they state that the method can be expanded by scanning internet news and the creation of tools for language processing meant to point out transmission that is sequential. It is evident that the method that uses HealthMap (Harvard School of Public Health, 2016) approaches along with others on the internet could be the lead towards a productive channel for surveillance purposes in middle income and low-income countries. This is particularly true and most warranted in locations with scarce studies on transmission or when there is limited time to act. The apparent undeterred antimicrobial resistance and failure by the global medical experts to monitor the issue in good time has been cited by McFadden et al. The authors talk of Resistance Open, which is an online bacterial drug resistance monitoring platform. It is based on aggregation, analysis and dissemination of local and regional index reports for resistance. The method is a direct offshoot of…

Cite this Document:
Copy Bibliography Citation

Related Documents

American History Influenza Pandemic That
Words: 1505 Length: 5 Document Type: Thesis

References Brownlee, C. "The Bad Fight: Immune Systems Harmed 1918 Flu Patients." Science News, 30 September 2006, 211+. Grist, N.R. Pandemic Influenza 1918. 2009. Cape Town, South Africa: University of Cape Town. Online. Available from the Internet: http://web.uct.ac.za/depts/mmi/jmoodie/influen2.html, accessed 17 April 2009. Imperato, Pascal James. "America's Forgotten Pandemic. The Influenza of 1918." Journal of Community Health 29, no. 1 (2004): 100+. Irwin, Julia F. "An Epidemic without Enmity: Explaining the Missing Ethnic Tensions in

PTSD for War Veterans and
Words: 5589 Length: 12 Document Type: Research Paper

Findings showed that 95% of the respondents' overall health status was slightly higher compared to that of the general U.S. population of the same age and sex. Factors identified with the favorable health status were male gender, married state, higher educational attainment, higher military rank and inclusion in the Air Force service. Lower quality of health was associated with increased use of health care, PTSD, disability, behavioral risk factors

Biological Weapons How Real Is
Words: 4788 Length: 11 Document Type: Term Paper

Having known the mounting dangers, many public health and bio-terrorism experts, members of Congress and some well-positioned Bush administration officials convey increasing discomfort about what they think are flaws in the country's bio-defenses. Over the earlier years, awareness steps have been made, mainly in the large cities. But most of necessary equipments are not available. The federal government's standard answer to the anthrax assaults of 2001 and the warning of

Water in the Middle East
Words: 22307 Length: 75 Document Type: Term Paper

While on one hand, the Nile gets the highest discharge from rainfall on the highlands of Ethiopia and upland plateau of East Africa, located well outside the Middle East region; on the other hand, discharge points of the other two rivers, Euphrates and Tigris, are positioned well within the Middle East region, prevailing mostly in Turkey, Syria along with Iraq. In other areas, recurrent river systems are restricted to

Forest Fire Management Systems and
Words: 17324 Length: 63 Document Type: Term Paper

It was then important to see the degree at which technology and training played a role in combating each fire. 1.2.4.Rationale of the Study What is that can be gained from this study? The reasoning behind such a study is born out of a need to provide better training for fire fighters so that fire management systems will improve and reduce the amount of loss due to the fire. By studying

Automating Compliance With Federal Information
Words: 2485 Length: 9 Document Type: Case Study

The Act also demanded that agency heads to ensure that the process of implementation of information security plan in the various life cycles of each and every federal system. The significant differences between FISMA and GISRA are the fact that its provisions are stronger and more permanent. It also includes the minimum mandatory standards for information security (OIG, 2003). The suitability of the eight FISMA requirements model for business information security

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now