Symptom-Based, Algorithmic Approach for Handling the Initial Encounter with Victims of a Potential Terrorist Attack
Identifieur interne : 004962 ( Main/Exploration ); précédent : 004961; suivant : 004963Symptom-Based, Algorithmic Approach for Handling the Initial Encounter with Victims of a Potential Terrorist Attack
Auteurs : Italo Subbarao [États-Unis] ; Christopher Johnson [États-Unis] ; William F. Bond [États-Unis] ; Howard A. Schwid [États-Unis] ; Thomas E. Wasser [États-Unis] ; Greg A. Deye [Allemagne] ; Keith K. Burkhart [États-Unis]Source :
- Prehospital and Disaster Medicine [ 1049-023X ] ; 2005-10.
Abstract
AbstractObjectives: This study intended to create symptom-based triage algorithms for the initial encounter with terror-attack victims. The goals of the triage algorithms include: (1) early recognition; (2) avoiding contamination; (3) early use of antidotes; (4) appropriate handling of unstable, contaminated victims; and (5) provisions of force protection. The algorithms also address industrial accidents and emerging infections, which have similar clinical presentations and risks for contamination as weapons of mass destruction (WMD). Methods: The algorithms were developed using references from military and civilian sources. They were tested and adjusted using a series of theoretical patients from a CD-ROM chemical, biological, radiological/nuclear, and explosive victim simulator. Then, the algorithms were placed into a card format and sent to experts in relevant fields for academic review. Results: Six inter-connected algorithms were created, described, and presented in figure form. The “attack” algorithm, for example, begins by differentiating between overt and covert attack victims (A covert attack is defined by epidemiological criteria adapted from the Centers for Disease Control and Prevention (CDC) recommendations). The attack algorithm then categorizes patients either as stable or unstable. Unstable patients flow to the “Dirty Resuscitation” algorithm, whereas, stable patients flow to the “Chemical Agent” and “Biological Agent” algorithms. The two remaining algorithms include the “Suicide Bomb/Blast/Explosion” and the “Radiation Dispersal Device” algorithms, which are inter-connected through the overt pathway in the “Attack” algorithm. Conclusion: A civilian, symptom-based, algorithmic approach to the initial encounter with victims of terrorist attacks, industrial accidents, or emerging infections was created. Future studies will address the usability of the algorithms with theoretical cases and utility in prospective, announced and unannounced, field drills. Additionally, future studies will assess the effectiveness of teaching modalities used to reinforce the algorithmic approach.
Url:
DOI: 10.1017/S1049023X00002752
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 000E76
- to stream Istex, to step Curation: 000E76
- to stream Istex, to step Checkpoint: 001823
- to stream Main, to step Merge: 004C90
- to stream Main, to step Curation: 004962
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title>Symptom-Based, Algorithmic Approach for Handling the Initial Encounter with Victims of a Potential Terrorist Attack</title>
<author><name sortKey="Subbarao, Italo" sort="Subbarao, Italo" uniqKey="Subbarao I" first="Italo" last="Subbarao">Italo Subbarao</name>
</author>
<author><name sortKey="Johnson, Christopher" sort="Johnson, Christopher" uniqKey="Johnson C" first="Christopher" last="Johnson">Christopher Johnson</name>
</author>
<author><name sortKey="Bond, William F" sort="Bond, William F" uniqKey="Bond W" first="William F." last="Bond">William F. Bond</name>
</author>
<author><name sortKey="Schwid, Howard A" sort="Schwid, Howard A" uniqKey="Schwid H" first="Howard A." last="Schwid">Howard A. Schwid</name>
</author>
<author><name sortKey="Wasser, Thomas E" sort="Wasser, Thomas E" uniqKey="Wasser T" first="Thomas E." last="Wasser">Thomas E. Wasser</name>
</author>
<author><name sortKey="Deye, Greg A" sort="Deye, Greg A" uniqKey="Deye G" first="Greg A." last="Deye">Greg A. Deye</name>
</author>
<author><name sortKey="Burkhart, Keith K" sort="Burkhart, Keith K" uniqKey="Burkhart K" first="Keith K." last="Burkhart">Keith K. Burkhart</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:4C8ACE2FDD0022EBCD4881F44889DEB9881B2F9D</idno>
<date when="2005" year="2005">2005</date>
<idno type="doi">10.1017/S1049023X00002752</idno>
<idno type="url">https://api.istex.fr/ark:/67375/6GQ-6CBNNHLQ-L/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000E76</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">000E76</idno>
<idno type="wicri:Area/Istex/Curation">000E76</idno>
<idno type="wicri:Area/Istex/Checkpoint">001823</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">001823</idno>
<idno type="wicri:doubleKey">1049-023X:2005:Subbarao I:symptom:based:algorithmic</idno>
<idno type="wicri:Area/Main/Merge">004C90</idno>
<idno type="wicri:Area/Main/Curation">004962</idno>
<idno type="wicri:Area/Main/Exploration">004962</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a">Symptom-Based, Algorithmic Approach for Handling the Initial Encounter with Victims of a Potential Terrorist Attack</title>
<author><name sortKey="Subbarao, Italo" sort="Subbarao, Italo" uniqKey="Subbarao I" first="Italo" last="Subbarao">Italo Subbarao</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Emergency Medicine, Lehigh Valley Hospital and Health Network, Allentown, Pennsylvania</wicri:regionArea>
<placeName><region type="state">Pennsylvanie</region>
</placeName>
</affiliation>
<affiliation></affiliation>
</author>
<author><name sortKey="Johnson, Christopher" sort="Johnson, Christopher" uniqKey="Johnson C" first="Christopher" last="Johnson">Christopher Johnson</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Emergency Medicine, Lehigh Valley Hospital and Health Network, Allentown, Pennsylvania</wicri:regionArea>
<placeName><region type="state">Pennsylvanie</region>
</placeName>
</affiliation>
</author>
<author><name sortKey="Bond, William F" sort="Bond, William F" uniqKey="Bond W" first="William F." last="Bond">William F. Bond</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Emergency Medicine, Lehigh Valley Hospital and Health Network, Allentown, Pennsylvania</wicri:regionArea>
<placeName><region type="state">Pennsylvanie</region>
</placeName>
</affiliation>
</author>
<author><name sortKey="Schwid, Howard A" sort="Schwid, Howard A" uniqKey="Schwid H" first="Howard A." last="Schwid">Howard A. Schwid</name>
<affiliation wicri:level="4"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Anesthesiology, University of Washington, Seattle, Washington</wicri:regionArea>
<placeName><region type="state">Washington (État)</region>
<settlement type="city">Seattle</settlement>
</placeName>
<orgName type="university">Université de Washington</orgName>
</affiliation>
</author>
<author><name sortKey="Wasser, Thomas E" sort="Wasser, Thomas E" uniqKey="Wasser T" first="Thomas E." last="Wasser">Thomas E. Wasser</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Health Studies, Lehigh Valley Hospital and Health Network, Allentown, Pennsylvania</wicri:regionArea>
<placeName><region type="state">Pennsylvanie</region>
</placeName>
</affiliation>
</author>
<author><name sortKey="Deye, Greg A" sort="Deye, Greg A" uniqKey="Deye G" first="Greg A." last="Deye">Greg A. Deye</name>
<affiliation wicri:level="1"><country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Division of Infectious Disease, Department of Internal Medicine, Landstuh Regional Medical Center</wicri:regionArea>
<wicri:noRegion>Landstuh Regional Medical Center</wicri:noRegion>
<wicri:noRegion>Landstuh Regional Medical Center</wicri:noRegion>
</affiliation>
</author>
<author><name sortKey="Burkhart, Keith K" sort="Burkhart, Keith K" uniqKey="Burkhart K" first="Keith K." last="Burkhart">Keith K. Burkhart</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Agency for Toxic Substances and Disease Registry, Harrisburg, Pennsylvania</wicri:regionArea>
<placeName><region type="state">Pennsylvanie</region>
</placeName>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="j">Prehospital and Disaster Medicine</title>
<title level="j" type="abbrev">Prehosp. Disaster med.</title>
<idno type="ISSN">1049-023X</idno>
<idno type="eISSN">1945-1938</idno>
<imprint><publisher>Cambridge University Press</publisher>
<pubPlace>New York, USA</pubPlace>
<date type="published" when="2005-10">2005-10</date>
<biblScope unit="volume">20</biblScope>
<biblScope unit="issue">5</biblScope>
<biblScope unit="page" from="301">301</biblScope>
<biblScope unit="page" to="308">308</biblScope>
</imprint>
<idno type="ISSN">1049-023X</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">1049-023X</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract">AbstractObjectives: This study intended to create symptom-based triage algorithms for the initial encounter with terror-attack victims. The goals of the triage algorithms include: (1) early recognition; (2) avoiding contamination; (3) early use of antidotes; (4) appropriate handling of unstable, contaminated victims; and (5) provisions of force protection. The algorithms also address industrial accidents and emerging infections, which have similar clinical presentations and risks for contamination as weapons of mass destruction (WMD). Methods: The algorithms were developed using references from military and civilian sources. They were tested and adjusted using a series of theoretical patients from a CD-ROM chemical, biological, radiological/nuclear, and explosive victim simulator. Then, the algorithms were placed into a card format and sent to experts in relevant fields for academic review. Results: Six inter-connected algorithms were created, described, and presented in figure form. The “attack” algorithm, for example, begins by differentiating between overt and covert attack victims (A covert attack is defined by epidemiological criteria adapted from the Centers for Disease Control and Prevention (CDC) recommendations). The attack algorithm then categorizes patients either as stable or unstable. Unstable patients flow to the “Dirty Resuscitation” algorithm, whereas, stable patients flow to the “Chemical Agent” and “Biological Agent” algorithms. The two remaining algorithms include the “Suicide Bomb/Blast/Explosion” and the “Radiation Dispersal Device” algorithms, which are inter-connected through the overt pathway in the “Attack” algorithm. Conclusion: A civilian, symptom-based, algorithmic approach to the initial encounter with victims of terrorist attacks, industrial accidents, or emerging infections was created. Future studies will address the usability of the algorithms with theoretical cases and utility in prospective, announced and unannounced, field drills. Additionally, future studies will assess the effectiveness of teaching modalities used to reinforce the algorithmic approach.</div>
</front>
</TEI>
<affiliations><list><country><li>Allemagne</li>
<li>États-Unis</li>
</country>
<region><li>Pennsylvanie</li>
<li>Washington (État)</li>
</region>
<settlement><li>Seattle</li>
</settlement>
<orgName><li>Université de Washington</li>
</orgName>
</list>
<tree><country name="États-Unis"><region name="Pennsylvanie"><name sortKey="Subbarao, Italo" sort="Subbarao, Italo" uniqKey="Subbarao I" first="Italo" last="Subbarao">Italo Subbarao</name>
</region>
<name sortKey="Bond, William F" sort="Bond, William F" uniqKey="Bond W" first="William F." last="Bond">William F. Bond</name>
<name sortKey="Burkhart, Keith K" sort="Burkhart, Keith K" uniqKey="Burkhart K" first="Keith K." last="Burkhart">Keith K. Burkhart</name>
<name sortKey="Johnson, Christopher" sort="Johnson, Christopher" uniqKey="Johnson C" first="Christopher" last="Johnson">Christopher Johnson</name>
<name sortKey="Schwid, Howard A" sort="Schwid, Howard A" uniqKey="Schwid H" first="Howard A." last="Schwid">Howard A. Schwid</name>
<name sortKey="Wasser, Thomas E" sort="Wasser, Thomas E" uniqKey="Wasser T" first="Thomas E." last="Wasser">Thomas E. Wasser</name>
</country>
<country name="Allemagne"><noRegion><name sortKey="Deye, Greg A" sort="Deye, Greg A" uniqKey="Deye G" first="Greg A." last="Deye">Greg A. Deye</name>
</noRegion>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Sante/explor/SrasV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 004962 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 004962 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Sante |area= SrasV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:4C8ACE2FDD0022EBCD4881F44889DEB9881B2F9D |texte= Symptom-Based, Algorithmic Approach for Handling the Initial Encounter with Victims of a Potential Terrorist Attack }}
This area was generated with Dilib version V0.6.33. |