dw for bio terrorism surveillance

Upload: shiprasingal

Post on 30-May-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 DW for Bio Terrorism Surveillance

    1/23

    Data Warehousing for Bioterrorism

    Surveillance

    Authors:

    Shipra Singal 08BM8055

    Piyush Kumar 08BM8048

    Ankit Maheshwari 08BM8083

    Abstract

    This paper introduces the reader to the term

    Bioterrorism and its threat on civilian populations.

    Further, it delves into the need, usage and application of

    data warehousing in Bioterrorist attacks and its

    surveillance. It also describes the features and technical

    challenges in developing an effective bioterrorism

    surveillance system.

    A demonstration of a Bioterrorism surveillance system in

    the State of Florida further showcases these ideas.

    Survey of Literature

    Donald J. Berndt et al [1] in their paper have discussed

    several technical challenges in the development of an

    effective bioterrorism surveillance system. They have

    used health care data warehousing research as the basis

  • 8/9/2019 DW for Bio Terrorism Surveillance

    2/23

    to try to resolve these challenges. The difference

    between the health care data warehousing and

    bioterrorism data warehousing as described in this paper

    is that surveillance systems for bioterrorism require

    more timely data and real-time data warehousing

    approaches. They have introduced the concept of flash

    data warehousing to compare real-time healthcare data

    with historical patterns of key surveillance indicators.

    Carol C. Diamond et al [2] v in their paper on Health IT

    systems emphasize that Technology should enable

    researchers, practitioners, and public health officials to

    share data across networks, while protecting patients

    privacy. Health information technology (IT) has great

    potential to transform health care and inform population

    health goals in clinical research, quality measurement,

    and public safety. But to fully realize the benefits of

    health IT for population health, focus must be on new

    models that maximize efficiency, encourage rapid

    learning. In this paper the authors explore the

    advantages of a networked model for analysing

    population health information and provide several

    examples.

    Lori Uscher-Pines et al [3] in their research on public

    health surveillance systems studied 8 US states. Their

    objective was to describe current syndromic surveillance

    system response protocols and develop a framework for

    2

  • 8/9/2019 DW for Bio Terrorism Surveillance

    3/23

    health departments to use as a guide in initial design

    and/or enhancement of response protocols. The research

    was carried out by conducting in depth interviews with

    health department staff. The conclusion from the

    research was that health departments had not prioritized

    the development and refinement of response protocols

    due to reasons like lack of guidance, limited resources

    for development of response protocols, and few

    examples of syndromic surveillance detecting previouslyunknown events of public health significance. The

    authors have proposed a framework which can guide

    health departments in creating protocols that will be

    standardized, tested, and relevant given their goals with

    such systems.

    Pascal Crepey et al [4] in their paper develop a method

    of detecting correlations between epidemic patterns in

    different regions that are due to human movement and

    introduce a null model in which the travel-induced

    correlations are cancelled. This method is then applied

    to cases of seasonal influenza outbreaks in the United

    States and France. This paper basically tells how to

    interpret data statistically.

    Madjid et al [5] in their paper elaborate that natural

    outbreak of emerging infections or release of biologic

    agents during a bioterrorism attack could have a

    considerable impact on the cardiovascular systems of

    3

  • 8/9/2019 DW for Bio Terrorism Surveillance

    4/23

    those exposed to the agents. The authors discuss issues

    surrounding basic, clinical, and population science

    research and training needs with regards to emerging

    infectious diseases and biological threats. They describe

    the need for surveillance systems that might increase

    our ability to quickly identify disease outbreaks and

    track their course.

    Buehleret al[6]

    in their paper describe that the detectionof a bioterrorism-related epidemic depends on

    population characteristics, availability and use of health

    services, the nature of an attack, epidemiologic features

    of individual diseases, surveillance methods, and the

    capacity of health departments to respond to alerts. The

    authors emphasize that understanding their effect on

    epidemic detection should help define the usefulness of

    syndromic surveillance and identify approaches to

    increasing the likelihood that clinicians recognize and

    report an epidemic.

    The article by Arnold F. Kaufmann et al [7] covers the

    economic impact of a bioterrorist attack. It estimates the

    cost assumes a suburban city of population 100,000

    when attacked by Bacillus anthracis, Brucella melitensis,

    and Francisella tularensis. The paper takes into account

    the cost of hospitalization based on various parameters

    like days a patient need to be in the hospital etc. It also

    4

  • 8/9/2019 DW for Bio Terrorism Surveillance

    5/23

    evaluates the economic preparedness to fight

    bioterrorism.

    The article by Brian C Lein [8] has drawn the attention

    towards the risk assessment of bioterrorism. It discusses

    the detection and prevention of the population from

    bioterrorism. It discusses evaluation of threat and risk

    assessment. It also recommends consolidating all

    biological defense funding, research, and coordination.

    The research paper by Howard Kirk Mardis[9]

    discussesthe threat of bioterrorism and how to make the system

    more dynamic and efficient to cater to threats of

    Bioterrorism. It covers the need to adopt better

    information management and human resources systems

    to fight bioterrorism. It mentions the trends in

    bioterrorism and how the bioterrorist group is different

    from the rest of the groups. It focuses on information

    management and Information structure and how they

    help in countering terrorism. The paper mentions the

    need of special information managers and information

    broker to manage information related to bioterrorism.

    The paper mentions about analytics and the human

    resources also.

    The article by Dana A Shea and Sarah A Lister [10]

    discusses the biowatch program. It gives insight as what

    the program is and which all US cities are covered under

    it. It discusses the technical issues about the issues

    regarding sensors which can detect bioterrorism. It also

    stated bioterrorism analytical issues. The paper also

    5

  • 8/9/2019 DW for Bio Terrorism Surveillance

    6/23

    covers the future of biowatch program and also the

    concerns regarding the policy which is in place. It

    mentions the distributed detection networks to be used

    under the biowatch program.

    The paper by Farzad Mostashari and Jessica Hartman [11]

    covers the early warning for bioterrorist attack and bio

    surveillance. The paper highlights new uses of analytical

    techniques. It highlights the challenges of evaluation of

    early warning of bioterroism. It also discusses what all isrequired to make surveillance to reach its full potential

    data standardization, data flow, data security etc.

    The paper by Amanda Hodges and Rick Sapp covers the

    threat of bio terrorism and agroterrorism to the state of

    floirda. The paper examines vulnerability of various

    industries to bio attacks with special focus on plant and

    animal industries. The paper further examines the

    national diagnostic network.

    The paper by Donald J. Berndt, Sunil Bhat, John W.

    Fisher, Alan R Hevner and James Studnicki discusses use

    of data analytics for bioterrorism surveillance. The paper

    also explains the use of catch data warehouse. Further

    the paper examines the surveillance system at the stateof florida using data analytics.

    The Paper by Fu Chiang Tsui, Jeremy U Espino, Virginia

    M. Dato, Per H. Gesteland, Judith Hutman, and Michael

    M. Wagner defines the design and implementation of the

    Real time outbreak and disease surveillance (RODS)

    system, a computer based public health surveillancesystem for early detection of disease outbreaks.

    6

  • 8/9/2019 DW for Bio Terrorism Surveillance

    7/23

    The Paper by Parsha Mirhaji examines the current state

    of the conceptualization, design, analysis, and

    implementation of PHS systems from a translational

    informatics perspective. The paper applies conceptsfrom cognitive science and knowledge engineering to

    suggest directions for improvement and further

    research.

    The book by Ray R. Arthur, James W. Leduc, James M.

    Hughes looks into the various infectious diseases which

    spread rapidly. It examines various surveillance and

    response networks. It also examines the critical role of

    the laboratory in surveillance of bio terrorism.

    Section 1: Introduction

    Bioterrorism and the Threat

    Bioterrorism is terrorism by intentional release or

    dissemination of biological agents such as

    bacteria, viruses, or toxins which may be in a naturally-

    occurring or in a human-modified form.

    According to the US-based Centres for Disease Control

    and Prevention:

    A bioterrorism attack is the deliberate release of viruses,

    bacteria, or other germs (agents) used to cause illness

    or death in people, animals, or plants. These agents are

    typically found in nature, but it is possible that they

    could be changed to increase their ability to cause

    7

  • 8/9/2019 DW for Bio Terrorism Surveillance

    8/23

    disease, make them resistant to current medicines, or to

    increase their ability to be spread into the environment.

    Bioterrorism Agents: A biological agent is a disease-

    causing organism or toxin produced from a biological

    source. These can be separated into three categories,

    depending on how easily they can be spread and the

    severity of illness or death they cause.

    Category A: These include organisms or toxins that

    pose the highest risk to the public and national security

    because of:

    Ease of their spread or transmission from person

    to person

    Result in high death rates and potential for major

    public health impact

    May cause public panic and social disruption

    Require special action for public health

    preparedness

    Examples:

    1) Anthrax: It is a non-contagious disease whose

    vaccine does exist but requires many injections

    for stable use. When discovered early, it can be

    cured by administering antibiotics. Anthrax in

    powder form delivered by mail was used in

    8

    http://en.wikipedia.org/wiki/Anthrax_diseasehttp://en.wikipedia.org/wiki/Anthrax_disease
  • 8/9/2019 DW for Bio Terrorism Surveillance

    9/23

    a series of attacks on the offices of several United

    States Senators in late 2001.

    2) Smallpox: It is a highly contagious virus

    transmitted easily through the atmosphere and

    has a high mortality rate.

    Category B: These agents are the second highest

    priority because:

    They are moderately easy to spread

    Result in moderate illness rates and low death

    rates

    Require enhanced disease monitoring

    Example: cholera

    Category C: These third highest priority agents include

    emerging pathogens that could be engineered for mass

    spread in the future because of:

    Ease of availability, production and spread

    Potential for high mortality rates and major health

    impact

    Example: multiple drug-resistant tuberculosis strains

    It is easy and inexpensive to obtain or produce thesebiological agents; can be easily disseminated, and can

    also lead to widespread fear and panic. Thus,

    9

    http://en.wikipedia.org/wiki/Virushttp://en.wikipedia.org/wiki/Virus
  • 8/9/2019 DW for Bio Terrorism Surveillance

    10/23

    bioterrorism has become an attractive weapon as a

    threat to civilian populations.

    Need for Data Warehousing

    Unlike other types of attacks, responsibility for

    bioterrorism acts is rarely claimed by terrorist groups.

    Because of this, such an attack may take a very long

    time to get detected unless some visible symptoms or

    usual infection is observed in a large number of patients.

    The effects of a bio terrorist attack are visible on a

    number of levels:

    Physical - actual diseases, unusual or usual

    symptoms;

    Psychological - fear, mass panic;

    Economic - travel restrictions, business shut-

    down;

    Environmental visible on animals and Plants

    There is a difficulty associated with the detection of suchsignals as it requires medical field people to

    continuously look around and the general public to be

    constantly vigilant. Because of this difficulty in detection,

    Data warehousing can be used to facilitate rapid

    detection of a future bioterrorist attack. Surveillance

    systems based on Data warehousing that can target the

    early manifestations of bioterrorism-related diseases

    would be helpful. Data Warehousing could help in

    10

  • 8/9/2019 DW for Bio Terrorism Surveillance

    11/23

    analyzing the situation and collection of data in an error-

    free and prompt way. If these surveillance systems are

    in place, they can enable earlier detection of bio terrorist

    attacks (prevention plan) and more importantly, a

    timelier public health response (contingency plan). The

    diagnosis obtained from these surveillance systems will

    guide the use of vaccinations and medications which are

    critical to the public health.

    Current response to Bioterrorism

    Strengthening its area of bio defence, the US senate had

    passed the Bioterrorism Act of 2002 according to

    which, there is an essential element of national

    preparedness against bioterrorism and the focus is on

    safety of drugs, food and water from biological agents

    and toxins. However, India is still lacking any such kind

    of law on bioterrorism. Though, the Defence Research

    and Development Organization (DRDO), the arm of the

    Department of Defence, has put efforts forward by the

    way of developing laboratories for research to develop

    counter measures against bioterrorism.

    The first automated bioterrorism detection system

    called RODS (Real-Time Outbreak Disease Surveillance)

    was deployed by the University of Pittsburgh's Centre

    for Biomedical Informatics in the year 1999. This system

    collects data from many data sources and uses it to

    11

  • 8/9/2019 DW for Bio Terrorism Surveillance

    12/23

    perform detection of possible bioterrorism event at the

    earliest possible moment.

    Researchers are still experimenting with various devices

    to form a system that will monitor infected persons and

    also try to find the origin of the outbreak.

    Thus, Bioterrorism poses challenges for both the civilian

    authorities. To prepare for a biological threat on the

    population, there should be co-operation between the

    civilian authorities from different sectors like public

    health, law enforcement, prosecution and customs. The

    health sector also needs to be adequately prepared with

    the stock of necessary supplies for treatment i.e.

    vaccines and antibiotics and also should be aware ofexisting dangers so as to be able to detect a covert

    biological attack.

    Section 2: Bioterrorism Surveillance

    System

    In recent times bioterrorism has emerges as a major

    threat to the world and hence a new research area to

    develop systems to detect bioterrorism accurately and

    swiftly is coming up.

    12

  • 8/9/2019 DW for Bio Terrorism Surveillance

    13/23

    A surveillance system which can be used for early

    detection should include the following

    Data Sources:Data sources for the systems will include

    the information on web sites of relevant government and

    nongovernment agencies.

    Data Abstraction: For analyzing and collecting

    surveillance data for bioterrorism systems should haveprograms to identify this type of data.

    Data Extraction: The system should have data

    collection and analytics capabilities which would be used

    on surveillance data.

    Data Synthesis: The data gathered is reviewed. The

    systems collecting surveillance data and detection

    system data should be designed. Surveillance systems

    should be deployed for event-based and for continuous

    bioterrorism surveillance.

    Data Sources: The data is gathered from various

    databases of articles, government reports, and web sites

    of government and commercial enterprises. Social media

    sites data is also incorporated. Government agencies

    most likely to fund, develop, or use bioterrorism systems

    should be identified. Data can also be gathered from

    programs like MATRIX (Multi-state Anti-terrorism

    13

  • 8/9/2019 DW for Bio Terrorism Surveillance

    14/23

    Information Exchange system) in USA. It helps in

    information sharing and data analysis.

    Data Abstraction: To identify relevant articles system

    should review titles, abstracts, and full-length articles.

    An example of diagnostic decision support systems can

    be - If the system has bioterrorism-related illnesses in

    the knowledge base, the system updates the probability

    of bioterrorism-related illness.

    Data Extraction: Extraction is the operation of

    extracting data from a source system for further use in a

    data warehouse environment. This is the first step of the

    ETL process. After the extraction, this data can be

    transformed and loaded into the data warehouse.The

    source systems for a data warehouse are typically

    transaction processing applications and in this case

    would be the data source system which gives the input

    of the terrorists.

    Data Synthesis [17]:

    The data gathered from the various sources should be

    analyzed through various tools and techniques and

    appropriate patterns should be identified. Meaningful

    conclusions should be derived from the data gathered

    for further action.

    14

  • 8/9/2019 DW for Bio Terrorism Surveillance

    15/23

    Surveillance Systems should be installed for monitoring

    various scenarios. The systems should be developed for

    identification of the scenarios discussed below.

    Surveillance Systems for Collecting Environmental

    Detection Data: Detection Systems should be deployed

    which transmit data collected from environment. These

    systems differ in the type and location of sample

    collected (for example, aerosol samples continuously

    taken from locations in fixed sites). If a peak increase in

    any chemical is detected, the instrument automatically

    collects a sample and alerts the control center.

    Surveillance Systems Collecting Clinical Reports:

    Systems that collect clinical information from networks

    of sentinel clinicians. These systems will keep track of

    the supplies of some chemicals which can be used by

    bioterrorist groups. Monitoring system which will track

    the people who are purchasing these chemicals will also

    be a part of the surveillance system.

    Surveillance Systems Collecting Laboratory Data:

    Data from the lab should be collected in order to access

    what all developments are going on and in which

    direction. Potential people who are doing critical

    developments on vaccines and biotechnology should betracked as these people can develop certain compounds

    which might be of use for bioterrorists.

    15

  • 8/9/2019 DW for Bio Terrorism Surveillance

    16/23

    Surveillance Systems Collecting Illness Data:

    Systems which collect the data related to illness relating

    to food items, chemicals or illness which have been or

    have the potential to be widespread should be kept an

    eye on. Systems should take into account data related to

    any incidence which can be a test incidence for

    bioterrorist group.

    Surveillance Systems Collecting Animal Disease

    Data: Systems which collect animal disease data should

    be under surveillance as these data can be a test data

    for bioterrorist testing hazardous chemicals.

    Evaluation of Reports of Surveillance Systems: All

    the surveillance systems need to be integrated. The

    reports generated by theses surveillance systems need

    to be analyzed and proper meaning from the data needs

    to be derived.

    Section 3: Live case example: State of

    Florida

    The state of Florida has its own surveillance system

    using data warehousing to detect early signs of bio

    16

  • 8/9/2019 DW for Bio Terrorism Surveillance

    17/23

    terrorist attacks. The demonstration surveillance system

    in Florida uses the flash data warehouse architecture.

    The following section provides a brief description of thesurveillance system deployed in Florida

    Bio Terrorism Threat Indicators

    In any bio terrrorism surveillance system it is most

    important that the threats are recognised at an early

    stage. This will help in controlling the effect of the attack

    or the threat.The surveillance system in Florida uses

    their expertise in CATCH health care data sets and

    biological agents to key bio terrorism threat indicators.

    Large Volume of data are collected from the following

    resources

    Air Quality Monitors

    Water Quality Monitors

    ER Signs and symptoms Hospital Admissions

    State Laboratories

    Pharmacy Data

    Practitioners office

    Data collected from all the mentioned resources are

    analysed. They are coupled with real time data from the

    hospitals for the demonstration system. Potential threat

    17

  • 8/9/2019 DW for Bio Terrorism Surveillance

    18/23

    indicators that can be defined based on International

    Classification of Diseases (ICD) codes and derived from

    hospital admission/discharge data.

    Real-Time Data Feeds

    The system will lay initial focus on the following data to

    get readl time data feed

    Hostipal Discharge Data

    Clinical Electronic Laboratory

    Efforts from Merlin and Epicom

    The CATCH data warehouse already incorporates the

    hospital dischareg data for a variety of health status

    indicator, which provides a very good assessment of

    health indicators of the community. In addition, somepreliminary experiments with real-time reporting from

    local hospitals have been conducted with great success.

    It has been proved by various study and research that

    the existing hospital admission and discharge data

    warehouse components lays a sloide foundation for theexperiments.

    Electronic laboratory reporting is the second area of

    focus for data collection.This area of research has

    received a good deal of attention, with several

    successful efforts around the country. The successful

    application of the HL7 messaging standards, laboratory

    test standards such as Logical Observation Identifiers,

    18

  • 8/9/2019 DW for Bio Terrorism Surveillance

    19/23

    Names, and Codes (LOINC), and vocabularies like the

    Systematized Nomenclature of Human and Veterinary

    Medicine (SNOMED) make this an appropriate area for

    the demonstration of surveillance systems.

    Pattern Recognition and Alarm Thresholds

    Development of pattern recognition algorithm will be the

    most challenging aspect of the development of the

    demonstration system.

    Defining the nature of abnormal patterns in the threat

    indicator is also a challenging job. Extreme timeliness of

    detection is very important for early detection of the

    disease outbreak, this area is the most emerging area

    for the researchers in the field of medical science. It is of

    utmost importance to respond to public health

    threats.There has been a surge of interest in such early

    warning systems and corresponding attention to some

    fundamental questions.

    Which data are useful for early detection?

    What are the timeliness requirements for outbreaks

    caused by different agents?

    How do we measure timeliness of a detection system

    for a specific type of outbreak and especially for

    outbreaks such as large-scale inhalation anthrax that

    19

  • 8/9/2019 DW for Bio Terrorism Surveillance

    20/23

    have not occurred in areas monitored by the new

    systems?

    Solutions to these complex pattern recognition and early

    detection problems will only come from sustained

    research and development. There is no silver bullet here.

    Section 4: Conclusions

    This paper identifies bioterrorism and its threats. Itclassifies the agents of bioterrorism and establishes the

    fact that Bioterrorism has become one of the major

    challenges of the 21st century. It identifies the need for

    data warehousing to tackle bioterrorism. The paper

    covers current response to bioterrorism. Factors

    incorporated in a surveillance system used to prevent

    bioterrorism are identified and systems needed for

    collecting various sources of data are identified. A case

    of state of Florida is included as a live case study at the

    end of the paper.

    References

    1. Donald J. Berndt, Alan R. Hevner, and James

    Studnicki, Bioterrorism Surveillance with

    Real-Time Data Warehousing, University of

    South Florida, Tampa, FL 33620

    20

  • 8/9/2019 DW for Bio Terrorism Surveillance

    21/23

    2. Carol C. Diamond, Farzad Mostashari, and Clay

    Shirky, Collecting And Sharing Data For

    Population Health: A New Paradigm, H e a l t

    h I T S y s t e m s,Health Aff (Millwood) March 1,

    2009 28:454-466

    3. Lori Uscher-Pines, PhD, Corey L. Farrell, MPH,

    Steven M. Babin, MD, PhD, Jacqueline Cattani,

    PhD, Charlotte A. Gaydos, DrPH, Yu-Hsiang Hsieh,

    PhD, Michael D. Moskal, MBA, and Richard E.Rothman, MD, PhD, Framework for the

    Development of Response Protocols for Public

    Health Syndromic Surveillance Systems: Case

    Studies of 8 US States, Disaster Medicine and

    Public Health Preparedness, 2009, 3 VOL.

    /SUPPL. 1

    4. Pascal Crepey and Marc Barthelemy, Detecting

    Robust Patterns in the Spread of Epidemics:

    A Case Study of Influenza in the United

    States and France, American Journal of

    Epidemiology, Advance Access publication

    October 15, 2007,Vol. 166, No. 11

    5. Mohammad Madjid, MD, Russell V. Luepker, MD,

    MS, FACC, FAHA, Co-Chairs Kurt J. Greenlund,

    PHD, Kathryn A. Taubert, PHD, FAHA, Michael J.

    Roy, MD, MPH, FACP, Rose Marie Robertson, MD,

    FACC, FAHA, Cardiovascular Effects of

    Emerging Infectious Diseases and Biological

    21

  • 8/9/2019 DW for Bio Terrorism Surveillance

    22/23

    Terrorism Threats, March 27,JACC Vol. 49, No.

    12, 2007

    6. James W. Buehler, Ruth L. Berkelman, David M.

    Hartley, and Clarence J. Peters, Syndromic

    Surveillance and Bioterrorism-related

    Epidemics, Emerging Infectious Diseases, Vol. 9,

    No. 10, October 2003

    7. Arnold F. Kaufmann, Martin I. Meltzer, and George

    P. Schmid, The Economic Impact of aBioterrorist Attack: Are Prevention and Post

    attack intervention Programs Justifiable,

    Centers for Disease Control and Prevention,

    Atlanta, Georgia, USA

    8. Brian C. Lein, A Bioterrorism Prevention

    Strategy for the 21st Century

    9. Howard Kirk Mardis, Lt Col, Counter

    Bioterrorism US intelligence challenges,

    USAF

    10.The Biowatch by Dana A Shea and Sarah A Lister

    11.Farzad Mostashari and Jessica Hartman,

    Syndromic Surveillance: a Local Perspective

    12.Amanda Hodges, Rick Sapp ,The Threat of

    Agroterrorism and Bioterrorism in Florida-

    Prevention and a Coordinated

    Response,Florida Department of Agriculture and

    Consumer Services, October 2006

    13.Donald J. Berndt, Sunil Bhat, John W. Fisher, AlanR Hevner and James Studnicki ,Data Analytics for

    Bioterrorism Surveillance, University of South

    Florida

    22

  • 8/9/2019 DW for Bio Terrorism Surveillance

    23/23

    14.Fu Chiang Tsui, Jeremy U Espino, Virginia M.

    Dato, Per H. Gesteland, Judith Hutman, and

    Michael M. Wagner , Technical description of

    RODS: a real time public health surveillancesystem , Journal of the American Medical

    Informatics Association, Volume 10 issue 5 ,

    October 2003

    15.Parsa Mirhaji , Public Health Surveillance Meets

    Translational Informatics : A Desiderata , Journal

    of the Association for Laboratory Automation,

    Volume 14 Issue 3, June 2009

    16.Ray R. Arthur, James W. Leduc, James M. Hughes,

    Surveillance for Emerging Infectious

    Diseases and Bioterrorism Threats, Tropical

    Infectious Diseases , 2006

    17.Dena M. Bravata, Kathryn M. McDonald, Wendy M.

    Smith, Chara Rydzak, Herbert Szeto, David L.

    Buckeridge, Corinna Haberland, Douglas K.

    Owens, Systematic Review: SurveillanceSystems for Early Detection of Bioterrorism-

    Related Diseases

    http://www.annals.org/search?author1=Chara+Rydzak&sortspec=date&submit=Submithttp://www.annals.org/search?author1=Chara+Rydzak&sortspec=date&submit=Submit