Serveur d'exploration SRAS

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Symptom-Based, Algorithmic Approach for Handling the Initial Encounter with Victims of a Potential Terrorist Attack

Identifieur interne : 004962 ( Main/Exploration ); précédent : 004961; suivant : 004963

Symptom-Based, Algorithmic Approach for Handling the Initial Encounter with Victims of a Potential Terrorist Attack

Auteurs : Italo Subbarao [États-Unis] ; Christopher Johnson [États-Unis] ; William F. Bond [États-Unis] ; Howard A. Schwid [États-Unis] ; Thomas E. Wasser [États-Unis] ; Greg A. Deye [Allemagne] ; Keith K. Burkhart [États-Unis]

Source :

RBID : ISTEX:4C8ACE2FDD0022EBCD4881F44889DEB9881B2F9D

Abstract

AbstractObjectives: This study intended to create symptom-based triage algorithms for the initial encounter with terror-attack victims. The goals of the triage algorithms include: (1) early recognition; (2) avoiding contamination; (3) early use of antidotes; (4) appropriate handling of unstable, contaminated victims; and (5) provisions of force protection. The algorithms also address industrial accidents and emerging infections, which have similar clinical presentations and risks for contamination as weapons of mass destruction (WMD). Methods: The algorithms were developed using references from military and civilian sources. They were tested and adjusted using a series of theoretical patients from a CD-ROM chemical, biological, radiological/nuclear, and explosive victim simulator. Then, the algorithms were placed into a card format and sent to experts in relevant fields for academic review. Results: Six inter-connected algorithms were created, described, and presented in figure form. The “attack” algorithm, for example, begins by differentiating between overt and covert attack victims (A covert attack is defined by epidemiological criteria adapted from the Centers for Disease Control and Prevention (CDC) recommendations). The attack algorithm then categorizes patients either as stable or unstable. Unstable patients flow to the “Dirty Resuscitation” algorithm, whereas, stable patients flow to the “Chemical Agent” and “Biological Agent” algorithms. The two remaining algorithms include the “Suicide Bomb/Blast/Explosion” and the “Radiation Dispersal Device” algorithms, which are inter-connected through the overt pathway in the “Attack” algorithm. Conclusion: A civilian, symptom-based, algorithmic approach to the initial encounter with victims of terrorist attacks, industrial accidents, or emerging infections was created. Future studies will address the usability of the algorithms with theoretical cases and utility in prospective, announced and unannounced, field drills. Additionally, future studies will assess the effectiveness of teaching modalities used to reinforce the algorithmic approach.

Url:
DOI: 10.1017/S1049023X00002752


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title>Symptom-Based, Algorithmic Approach for Handling the Initial Encounter with Victims of a Potential Terrorist Attack</title>
<author>
<name sortKey="Subbarao, Italo" sort="Subbarao, Italo" uniqKey="Subbarao I" first="Italo" last="Subbarao">Italo Subbarao</name>
</author>
<author>
<name sortKey="Johnson, Christopher" sort="Johnson, Christopher" uniqKey="Johnson C" first="Christopher" last="Johnson">Christopher Johnson</name>
</author>
<author>
<name sortKey="Bond, William F" sort="Bond, William F" uniqKey="Bond W" first="William F." last="Bond">William F. Bond</name>
</author>
<author>
<name sortKey="Schwid, Howard A" sort="Schwid, Howard A" uniqKey="Schwid H" first="Howard A." last="Schwid">Howard A. Schwid</name>
</author>
<author>
<name sortKey="Wasser, Thomas E" sort="Wasser, Thomas E" uniqKey="Wasser T" first="Thomas E." last="Wasser">Thomas E. Wasser</name>
</author>
<author>
<name sortKey="Deye, Greg A" sort="Deye, Greg A" uniqKey="Deye G" first="Greg A." last="Deye">Greg A. Deye</name>
</author>
<author>
<name sortKey="Burkhart, Keith K" sort="Burkhart, Keith K" uniqKey="Burkhart K" first="Keith K." last="Burkhart">Keith K. Burkhart</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:4C8ACE2FDD0022EBCD4881F44889DEB9881B2F9D</idno>
<date when="2005" year="2005">2005</date>
<idno type="doi">10.1017/S1049023X00002752</idno>
<idno type="url">https://api.istex.fr/ark:/67375/6GQ-6CBNNHLQ-L/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000E76</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">000E76</idno>
<idno type="wicri:Area/Istex/Curation">000E76</idno>
<idno type="wicri:Area/Istex/Checkpoint">001823</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">001823</idno>
<idno type="wicri:doubleKey">1049-023X:2005:Subbarao I:symptom:based:algorithmic</idno>
<idno type="wicri:Area/Main/Merge">004C90</idno>
<idno type="wicri:Area/Main/Curation">004962</idno>
<idno type="wicri:Area/Main/Exploration">004962</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a">Symptom-Based, Algorithmic Approach for Handling the Initial Encounter with Victims of a Potential Terrorist Attack</title>
<author>
<name sortKey="Subbarao, Italo" sort="Subbarao, Italo" uniqKey="Subbarao I" first="Italo" last="Subbarao">Italo Subbarao</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Emergency Medicine, Lehigh Valley Hospital and Health Network, Allentown, Pennsylvania</wicri:regionArea>
<placeName>
<region type="state">Pennsylvanie</region>
</placeName>
</affiliation>
<affiliation></affiliation>
</author>
<author>
<name sortKey="Johnson, Christopher" sort="Johnson, Christopher" uniqKey="Johnson C" first="Christopher" last="Johnson">Christopher Johnson</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Emergency Medicine, Lehigh Valley Hospital and Health Network, Allentown, Pennsylvania</wicri:regionArea>
<placeName>
<region type="state">Pennsylvanie</region>
</placeName>
</affiliation>
</author>
<author>
<name sortKey="Bond, William F" sort="Bond, William F" uniqKey="Bond W" first="William F." last="Bond">William F. Bond</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Emergency Medicine, Lehigh Valley Hospital and Health Network, Allentown, Pennsylvania</wicri:regionArea>
<placeName>
<region type="state">Pennsylvanie</region>
</placeName>
</affiliation>
</author>
<author>
<name sortKey="Schwid, Howard A" sort="Schwid, Howard A" uniqKey="Schwid H" first="Howard A." last="Schwid">Howard A. Schwid</name>
<affiliation wicri:level="4">
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Anesthesiology, University of Washington, Seattle, Washington</wicri:regionArea>
<placeName>
<region type="state">Washington (État)</region>
<settlement type="city">Seattle</settlement>
</placeName>
<orgName type="university">Université de Washington</orgName>
</affiliation>
</author>
<author>
<name sortKey="Wasser, Thomas E" sort="Wasser, Thomas E" uniqKey="Wasser T" first="Thomas E." last="Wasser">Thomas E. Wasser</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Department of Health Studies, Lehigh Valley Hospital and Health Network, Allentown, Pennsylvania</wicri:regionArea>
<placeName>
<region type="state">Pennsylvanie</region>
</placeName>
</affiliation>
</author>
<author>
<name sortKey="Deye, Greg A" sort="Deye, Greg A" uniqKey="Deye G" first="Greg A." last="Deye">Greg A. Deye</name>
<affiliation wicri:level="1">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>Division of Infectious Disease, Department of Internal Medicine, Landstuh Regional Medical Center</wicri:regionArea>
<wicri:noRegion>Landstuh Regional Medical Center</wicri:noRegion>
<wicri:noRegion>Landstuh Regional Medical Center</wicri:noRegion>
</affiliation>
</author>
<author>
<name sortKey="Burkhart, Keith K" sort="Burkhart, Keith K" uniqKey="Burkhart K" first="Keith K." last="Burkhart">Keith K. Burkhart</name>
<affiliation wicri:level="2">
<country xml:lang="fr">États-Unis</country>
<wicri:regionArea>Agency for Toxic Substances and Disease Registry, Harrisburg, Pennsylvania</wicri:regionArea>
<placeName>
<region type="state">Pennsylvanie</region>
</placeName>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="j">Prehospital and Disaster Medicine</title>
<title level="j" type="abbrev">Prehosp. Disaster med.</title>
<idno type="ISSN">1049-023X</idno>
<idno type="eISSN">1945-1938</idno>
<imprint>
<publisher>Cambridge University Press</publisher>
<pubPlace>New York, USA</pubPlace>
<date type="published" when="2005-10">2005-10</date>
<biblScope unit="volume">20</biblScope>
<biblScope unit="issue">5</biblScope>
<biblScope unit="page" from="301">301</biblScope>
<biblScope unit="page" to="308">308</biblScope>
</imprint>
<idno type="ISSN">1049-023X</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">1049-023X</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract">AbstractObjectives: This study intended to create symptom-based triage algorithms for the initial encounter with terror-attack victims. The goals of the triage algorithms include: (1) early recognition; (2) avoiding contamination; (3) early use of antidotes; (4) appropriate handling of unstable, contaminated victims; and (5) provisions of force protection. The algorithms also address industrial accidents and emerging infections, which have similar clinical presentations and risks for contamination as weapons of mass destruction (WMD). Methods: The algorithms were developed using references from military and civilian sources. They were tested and adjusted using a series of theoretical patients from a CD-ROM chemical, biological, radiological/nuclear, and explosive victim simulator. Then, the algorithms were placed into a card format and sent to experts in relevant fields for academic review. Results: Six inter-connected algorithms were created, described, and presented in figure form. The “attack” algorithm, for example, begins by differentiating between overt and covert attack victims (A covert attack is defined by epidemiological criteria adapted from the Centers for Disease Control and Prevention (CDC) recommendations). The attack algorithm then categorizes patients either as stable or unstable. Unstable patients flow to the “Dirty Resuscitation” algorithm, whereas, stable patients flow to the “Chemical Agent” and “Biological Agent” algorithms. The two remaining algorithms include the “Suicide Bomb/Blast/Explosion” and the “Radiation Dispersal Device” algorithms, which are inter-connected through the overt pathway in the “Attack” algorithm. Conclusion: A civilian, symptom-based, algorithmic approach to the initial encounter with victims of terrorist attacks, industrial accidents, or emerging infections was created. Future studies will address the usability of the algorithms with theoretical cases and utility in prospective, announced and unannounced, field drills. Additionally, future studies will assess the effectiveness of teaching modalities used to reinforce the algorithmic approach.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Allemagne</li>
<li>États-Unis</li>
</country>
<region>
<li>Pennsylvanie</li>
<li>Washington (État)</li>
</region>
<settlement>
<li>Seattle</li>
</settlement>
<orgName>
<li>Université de Washington</li>
</orgName>
</list>
<tree>
<country name="États-Unis">
<region name="Pennsylvanie">
<name sortKey="Subbarao, Italo" sort="Subbarao, Italo" uniqKey="Subbarao I" first="Italo" last="Subbarao">Italo Subbarao</name>
</region>
<name sortKey="Bond, William F" sort="Bond, William F" uniqKey="Bond W" first="William F." last="Bond">William F. Bond</name>
<name sortKey="Burkhart, Keith K" sort="Burkhart, Keith K" uniqKey="Burkhart K" first="Keith K." last="Burkhart">Keith K. Burkhart</name>
<name sortKey="Johnson, Christopher" sort="Johnson, Christopher" uniqKey="Johnson C" first="Christopher" last="Johnson">Christopher Johnson</name>
<name sortKey="Schwid, Howard A" sort="Schwid, Howard A" uniqKey="Schwid H" first="Howard A." last="Schwid">Howard A. Schwid</name>
<name sortKey="Wasser, Thomas E" sort="Wasser, Thomas E" uniqKey="Wasser T" first="Thomas E." last="Wasser">Thomas E. Wasser</name>
</country>
<country name="Allemagne">
<noRegion>
<name sortKey="Deye, Greg A" sort="Deye, Greg A" uniqKey="Deye G" first="Greg A." last="Deye">Greg A. Deye</name>
</noRegion>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Sante/explor/SrasV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 004962 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 004962 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Sante
   |area=    SrasV1
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:4C8ACE2FDD0022EBCD4881F44889DEB9881B2F9D
   |texte=   Symptom-Based, Algorithmic Approach for Handling the Initial Encounter with Victims of a Potential Terrorist Attack
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Tue Apr 28 14:49:16 2020. Site generation: Sat Mar 27 22:06:49 2021