Skip to main content
Journal of the American Medical Informatics Association: JAMIA logoLink to Journal of the American Medical Informatics Association: JAMIA
. 2002 Mar-Apr;9(2):116–119. doi: 10.1197/jamia.M1054

The Contributions of Biomedical Informatics to the Fight Against Bioterrorism

Isaac S Kohane 1
PMCID: PMC344565  PMID: 11861623

Abstract

A comprehensive and timely response to current and future bioterrorist attacks requires a data acquisition, threat detection, and response infrastructure with unprecedented scope in time and space. Fortunately, biomedical informaticians have developed and implemented architectures, methodologies, and tools at the local and the regional levels that can be immediately pressed into service for the protection of our populations from these attacks. These unique contributions of the discipline of biomedical informatics are reviewed here.


Current outbreaks of anthrax exposure and cases test our health care delivery and public health systems with threats of large spatial scope—the entire nation—that demand a very short temporal latency in our responses. Other potential bioterrorist attacks only increase the dimensions of this unprecedented challenge. The dimensions, however, are not unprecedented; rather, they are quite familiar to many researchers in biomedical informatics over the last 40 years. The task of comprehensive real-time monitoring on the regional and national scale has been the subject of full-fledged design and large-scale implementations led by biomedical informaticians.

Nonetheless, we run the risk that the knowledge gained in the decades of informatics research will not, in the appropriate haste to safeguard the population of the United States from the threats of bioterrorism, be reflected in the national public health information infrastructure. And that may result not only in wasteful expenditures but also in ineffective measures to prevent future attacks on the health of the U.S. population. This is, therefore, a timely juncture to review some of the most germane contributions from the biomedical informatics armamentarium to the tasks at hand, particularly data acquisition, threat detection, and response.

Data Acquisition

Among the necessary requisites for a national monitoring infrastructure is a set of standardized vocabularies with which to describe the events of interest. The National Library of Medicine and other societies have already supported the construction of several important vocabularies and, furthermore, have created a framework—the Unified Medical Language System1–3—to share descriptions across vocabularies and even link a new bioterrorism-monitoring vocabulary to other terminologies (such as the billing codes generated by most U.S. health care institutions4). Furthermore, the development of a sound and sufficient terminology itself requires an understanding of the design choices implicit in pre-coordinated and post-coordinated vocabularies and the requirements entailed by cataloguing vs. indexing of events.

Sharing reporting of clinical events across multiple institution requires a standardized means for describing the organization of that data; that is, a shared data model. Poorly designed data models lead to difficulty in deployment across institutions, errors in the collation of events, and problems in adapting the data model to new requirements and will not help prevent inconsistencies in the reports. In the course of the last three decades, standardized models for describing clinical events in general5,6 and emergency department information in particular7,8 have been developed, and the general guidelines for a safe and efficient approach to such modeling has been articulated.9,10 Ignorance of such efforts is wasteful and risks rediscovery of all the mistakes already perpetrated by informaticians during the development of the discipline.

Electronic medical record systems are the specific hardware and software implementations through which primary care health care providers11 and hospital systems12–15 gather, store, and report clinical information. To do so, they have been engineered with user interfaces matched to clinical tasks and clinical workflow16,17 and built on top of very high availability systems with redundant and secure storage.

The particulars of clinical data entry have proved refractory to most naïve attempts to use interfaces borrowed simplistically from other application domains and have required judicious application of ethnography18 to the workflow and the mandates of safe and effective health care. The synergism between standardized clinical data models and electronic medical record systems has allowed informaticians to leverage the advent of a widely available networking infrastructure, the Internet, to rapidly implement large-scale multi-institutional clinical data gathering and integration.19,20

An underused component of the public health system is the general population. Individuals at risk can provide the most rapid and comprehensive reporting of exposures, symptomatology, and compliance with and side effects of therapies, particularly when treated individuals number in the tens of thousands, as they do today. Biomedical informaticians have studied since the 1960s21 how best to enable patients to effectively communicate their symptoms and medical histories in their own terms and in a timely fashion.

In the Internet age, the study of consumer informatics22–28 has demonstrated that a wide swathe of our population can effectively use technologic means (developed by informaticians) to report a wide range of clinically relevant information. The application of these techniques with the same breadth and energy as those expended for far more mundane financial applications can help provide even earlier and more sensitive warnings than any solely institution-based activities.

Broad monitoring of health status and delivery presents well-described risks to the privacy of individuals, particularly when it involves regional or nationwide reporting.29–31 Consequently, biomedical informaticians have developed a range of technologic solutions,32–34 like name matching,35,36 that minimize disclosure while preserving the intended health service and health monitoring functionality.

Threat Detection

Once raw clinical data are acquired, the detection of signatures of bioterrorism requires sophisticated and prompt interpretation of monitored health care data across time37–40 and geography41,42—this in the context of many diseases with early clinical presentations overlapping those of the bioterrorist infectious agents. The uncertainty associated with this overlap and the variation of the degree of the overlap require the probabilistic inference techniques43–47 developed by informaticians for distinguishing subtle signals or diseases from the background of events or findings of lesser import.

The costs of missing the detection of a bioterrorist incident are obviously great, as are the costs and risks of misdiagnosing and treating thousands of unaffected individuals. The interactions between the sensitivity and specificity of the detection algorithms and these various costs are of the same type that have been the subject of clinical decision support systems grounded in a formal decision-theoretic framework.48–50 Naïve bioterrorism detection implementations that have suboptimal specificity and sensitivity and that ride roughshod over the complex tradeoffs of competing utilities will result in surprising and unacceptable outcomes. Furthermore, the explicit nature of these decision models makes the implications of any detection strategy much clearer to the decision makers in our public health and law enforcement agencies.

Response

Even when the correct treatments, isolation methods, and testing protocols are known by experts, it is clear that, as in so many other clinical disciplines, the knowledge and implementation of the normative, prescribed responses to exposure and disease from bioterrorist attack are uneven at best. Clinicians throughout the country have only partial and often out-of-date knowledge of appropriate procedures. This is all the more problematic because of our rapidly changing understanding of what constitutes an effective (and an age- and health-status-specific) response to each of the infectious agents that could potentially be used against our populations. To this end, the large complement of methodologies and implemented systems engineered by biomedical informaticians to effectively design guidelines,51 disseminate guidelines,52–54 direct reminders to clinicians for particular or worrisome cases,55–59 and educate clinicians in the application of these guidelines60,61 is directly relevant to ensuring that all clinicians are able to deliver state-of-the-art diagnostic “work-ups” and treatments to potential and actual bioterrorist victims.

In summary, the challenges that bioterrorism brings to bear to our health care system are not novel from the perspectives of the biomedical informatics research community. Swift and judicious deployments of the existing biomedical informatics tools and implementations will rapidly improve the readiness and responsiveness of our health care and public health system to acts of bioterrorism. Sustained development of the more advanced medical informatics techniques will result in our populations‘ receiving the best possible and most timely protection.

This paper was supported by AHRQ contract 290-00-0020.

References

  • 1.Lindberg DA, Humphreys BL, McCray AT. The Unified Medical Language System. Methods Inf Med. 1993;32(4):281–91. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 2.Nelson SJ, Fuller LF, Erlbaum MS, Tuttle MS, Sherertz DD, Olson NE. The semantic structure of the UMLS Metathesaurus. Proc Annu Symp Comput Appl Med Care. 1992:649–53. [PMC free article] [PubMed]
  • 3.Campbell JR, Kallenberg GA, Sherrick RC. The clinical utility of META: an analysis for hypertension. Proc Annu Symp Comput Appl Med Care. 1992:397-401. [PMC free article] [PubMed]
  • 4.Cimino JJ, Johnson SB, Peng P, Aguirre A. From ICD9-CM to MeSH using the UMLS: a how-to guide. Proc Annu Symp Comput Appl Med Care. 1993:730–4. [PMC free article] [PubMed]
  • 5.Health Level Seven: An Application Protocol for Electronic Sata Exchange in Healthcare Environments, v 2.2. Chicago, Ill.: HL7, 1990.
  • 6.Quinn J. An HL7 (Health Level Seven) overview. J Ahima 1999;70(7):32–4, 35–6. [PubMed] [Google Scholar]
  • 7.Pollock DA, Adams DL, Bernardo LM, et al. Data elements for emergency department systems (DEEDS), release 1.0: a summary report. DEEDS Writing Committee. Ann Emerg Med. 1998;31(2):264–73. [PubMed] [Google Scholar]
  • 8.Kohane IS, Wingerde FJv, Fackler J, et al. Sharing electronic medical records across multiple heterogeneous and competing institutions. Proc AMIA Annu Fall Symp. 1996:608–12. [PMC free article] [PubMed]
  • 9.Friedman C, Hripcsak G, Johnson SB, Cimino JJ, Clayton PD. A generalized relational schema for an integrated clinical patient database. Proc Annu Symp Comput Appl Med Care. 1990:335–9.
  • 10.Johnson SB. Generic data modeling for clinical repositories. J Am Med Inform Assoc. 1996;3(5):328–9. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 11.van der Lei J, Duisterhout JS, Westerhof HP, et al. The introduction of computer-based patient records in The Netherlands. Ann Intern Med. 1993;119(10):1036–41. [DOI] [PubMed] [Google Scholar]
  • 12.Barnett GO. Computer-stored ambulatory record (COSTAR). NCHSR Research Digest. 1976. DHEW publication HRA 76-3145.
  • 13.McDonald CJ, Tierney WM, Overhage JM, Martin DK, Wilson GA. The Regenstrief Medical Record System: 20 years of experience in hospitals, clinics and neighborhood health centers. MD Comput. 1992;9:206–17. [PubMed] [Google Scholar]
  • 14.Pryor TA, Gardner RM, Clayton PD, Warner HR. The HELP system. J Med Syst. 1983;7:87–102. [DOI] [PubMed] [Google Scholar]
  • 15.Hammond WE, Stead WW. Adopting TMR for physician/nurse use. Proc Annu Symp Comput Appl Med Care.1991:833–7. [PMC free article] [PubMed]
  • 16.Patel VL, Arocha JF, Kaufman DR. A primer on aspects of cognition for medical informatics. J Am Med Inform Assoc. 2001; 8(4):324–43. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 17.Patel VL, Kaufman DR, Arocha JA, Kushniruk AW. Bridging theory and practice: cognitive science and medical informatics. MedInfo. 1995;8(pt 2):1278–82. [PubMed] [Google Scholar]
  • 18.Coiera E, Tombs V. Communication behaviours in a hospital setting: an observational study. Br Med J. 1998;316(7132): 673–6. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 19.Kohane IS, Greenspun P, Fackler J, Cimino C, Szolovits P. Building national electronic medical record systems via the World Wide Web. J Am Med Inform Assoc. 1996;3(3):191–207. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 20.Halamka JD, Safran C. Virtual consolidation of Boston's Beth Israel and New England Deaconess Hospitals via the World Wide Web. Proc AMIA Annu Fall Symp. 1997:349–53. [PMC free article] [PubMed]
  • 21.Slack WV, Hicks P, Reed CE, Cura LJv. A computer-based medical-history system. New Engl J Med. 1966;274(4):194–8. [DOI] [PubMed] [Google Scholar]
  • 22.Slack WV, Leviton A, Bennett SE, Fleischmann KH, Lawrence RS. Relation between age, education, and time to respond to questions in a computer-based medical interview. Comput Biomed Res. 1988;21:78–84. [DOI] [PubMed] [Google Scholar]
  • 23.Gustafson DH, Hawkins R, Boberg E, et al. Impact of a patient-centered, computer-based health information/support system. Am J Prev Med. 1999;16(1):1–9. [DOI] [PubMed] [Google Scholar]
  • 24.Szolovits P, Doyle J, Long WJ, Kohane I, Pauker SG. Guardian Angel: patient-centered health information systems. Cambridge, Mass.: MIT Laboratory for Computer Science, May 1994. Technical report TR-604.
  • 25.Gustafson DH, Robinson TN, Ansley D, Adler L, Brennan PF. Consumers and evaluation of interactive health communication applications. The Science Panel on Interactive Communication and Health. Am J Prev Med. 1999;16(1):23–9. [DOI] [PubMed] [Google Scholar]
  • 26.Brennan PF. Health informatics and community health: support for patients as collaborators in care. Methods Inf Med. 1999;38(4–5):274–8. [PubMed] [Google Scholar]
  • 27.Mandl KD, Szolovits P, Kohane IS. Public standards and patients' control: how to keep electronic medical records accessible but private. Br Med J. 2001;322(7281):283–7. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 28.Porter SC, Silvia MT, Fleisher GR, Kohane IS, Homer CJ, Mandl KD. Parents as direct contributors to the medical record: validation of their electronic input. Ann Emerg Med. 2000;35(4):346–52. [DOI] [PubMed] [Google Scholar]
  • 29.Clayton PD, Boebert WE, Defriese GH, et al. For the Record: Protecting Electronic Health Information. Washington, DC: National Academy Press, 1997. [PubMed]
  • 30.Sweeney L. Three computational systems for disclosing medical data in the year 1999. MedInfo. 1998;9(pt 2):1124–9. [PubMed] [Google Scholar]
  • 31.Sweeney L. Guaranteeing anonymity when sharing medical data: the Datafly System. Proc AMIA Annu Fall Symp. 1997:51–5. [PMC free article] [PubMed]
  • 32.Masys DR, Baker DB. Patient-centered Access to Secure Systems Online (PCASSO): a secure approach to clinical data access via the World Wide Web. Proc AMIA Annu Fall Symp. 1997:340–3. [PMC free article] [PubMed]
  • 33.Meux E. Encrypting personal identifiers. Health Serv Res. 1994;29(2):247–56. [PMC free article] [PubMed] [Google Scholar]
  • 34.Baker DB, Masys DR. PCASSO: a design for secure communication of personal health information via the internet. Int J Med Inf. 1999;54(2):97–104. [DOI] [PubMed] [Google Scholar]
  • 35.Kohane IS, Dong H, Szolovits P. Health information odentification and de-identification toolkit. Proc AMIA Annu Fall Symp. 1998:356–60. [PMC free article] [PubMed]
  • 36.Anderson RJ. Information technology in medical practice: safety and privacy lessons from the United Kingdom. Med J Aust. 1999;170(4):181–4. [DOI] [PubMed] [Google Scholar]
  • 37.Fagan L. Ventilator Manager: a program to provide online consultative advice in the intensive care unit [PhD thesis]. Palo Alto, Calif.: Stanford University. 1980.
  • 38.Kahn MG, Fagan LM, Sheiner LB. Model-based interpretation of time-varying medical data. Proc Annu Symp Comput Appl Med Care. 1989:28–32.
  • 39.Haimowitz IJ, Le PP, Kohane IS. Clinical monitoring using regression-based trend templates. Artif Intell Med. 1995;7:471–2. [DOI] [PubMed] [Google Scholar]
  • 40.Berzuini C, Bellazzi R, Quaglini S. Temporal reasoning with probabilities. Proceedings of the Fifth Conference on Uncertainty in Artificial Intelligence (Aug 1989; Windsor, Ontario, Canada). New York: Elsevier Science. 1990:14–21.
  • 41.Berger SA. gideon: a computer program for diagnosis, simulation, and informatics in the fields of geographic medicine and emerging diseases. Emerg Infect Dis. 2001;7(3 suppl):550. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 42.Riise T, Gronning M, Klauber MR, Barrett-Connor E, Nyland H, Albrektsen G. Clustering of residence of multiple sclerosis patients at age 13 to 20 years in Hordaland, Norway. Am J Epidemiol. 1991;133(9):932–9. [DOI] [PubMed] [Google Scholar]
  • 43.Szolovits P, Pauker SG. Categorical and probabilistic reasoning in medical diagnosis. Artif Intell Med. 1978;11:115–44. [Google Scholar]
  • 44.Yu VL, Buchanan BG, Shortliffe EH, et al. Evaluating the performance of a computer-based consultant. Comput Prog Biomed. 1979;9(1):95–102. [DOI] [PubMed] [Google Scholar]
  • 45.Wraith SM, Aikins JS, Buchanan BG, et al. Computerized consultation system for selection of antimicrobial therapy. Am J Hosp Pharm. 1976;33(12):1304–8. [PubMed] [Google Scholar]
  • 46.Heckerman DE, Nathwani BN. An evaluation of the diagnostic accuracy of Pathfinder. Comput Biomed Res. 1992;25(1):56–74. [DOI] [PubMed] [Google Scholar]
  • 47.Heckerman DE, Horvitz EJ, Nathwani BN. Toward normative expert systems, part I: the Pathfinder project. Methods Inf Med. 1992;31(2):90–105. [PubMed] [Google Scholar]
  • 48.Pauker SG, Kassirer JP. Decision analysis. N Engl J Med. 1987;316(5):250–8. [DOI] [PubMed] [Google Scholar]
  • 49.Kassirer JP, Moskowitz AJ, Lau J, Pauker SG. Decision analysis: a progress report. Ann Intern Med. 1987;106(2):275–91. [DOI] [PubMed] [Google Scholar]
  • 50.Koplan JP, Schoenbaum SC, Weinstein MC, Fraser DW. Pertussis vaccine: an analysis of benefits, risks and costs. N Engl J Med. 1979;301(17):906–11. [DOI] [PubMed] [Google Scholar]
  • 51.Puerta AR, Egar JW, Tu SW, Musen MA. A multiple-method knowledge-acquisition shell for the automatic generation of knowledge-acquisition tools. Knowledge Acquisition. 1992;4: 171–96. [Google Scholar]
  • 52.Shahar Y, Miksch S, Johnson P. The Asgaard project: a task-specific framework for the application and critiquing of time-oriented clinical guidelines. Artif Intell Med. 1998;14(1–2):29–51. [DOI] [PubMed] [Google Scholar]
  • 53.Goldmann DA, Weinstein RA, Wenzel RP, et al. Strategies to prevent and control the emergence and spread of antimicrobial-resistant microorganisms in hospitals: a challenge to hospital leadership. JAMA. 1996;275(3):234–40. [PubMed] [Google Scholar]
  • 54.Miller PL, Frawley SJ, Sayward FG. Informatics issues in the national dissemination of a computer-based clinical guideline: a case study in childhood immunization. Proc AMIA Annu Symp. 2000:580–4. [PMC free article] [PubMed]
  • 55.Kuperman GJ, Teich JM, Bates DW, et al. Detecting alerts, notifying the physician, and offering action items: a comprehensive alerting system. Proc AMIA Annu Fall Symp. 1996:704–8. [PMC free article] [PubMed]
  • 56.Nilasena DS, Lincoln MJ. A computer-generated reminder system improves physician compliance with diabetes preventive care guidelines. Proc Annu Symp Comput Appl Med Care. 1995:640–5. [PMC free article] [PubMed]
  • 57.Rind DM, Safran C, Phillips RS, et al. Effect of computer-base alerts on the treatment and outcomes of hospitalize patients. Arch Intern Med. 1994;154:1511–7. [PubMed] [Google Scholar]
  • 58.Ornstein SM, Garr DR, Jenkins RG, Rust PF, Arnon A. Computer-generated physician and patient reminders. J Fam Pract. 1991;32:82–90. [PubMed] [Google Scholar]
  • 59.McDonald CJ, Hui SL, Smith DM, et al. Reminders to physicians from an introspective computer medical record: a two-year randomized trial. Ann Intern Med. 1984;100:130–8. [DOI] [PubMed] [Google Scholar]
  • 60.Tsui FC, Wagner M, Thompson ME. Implementing NCEP guidelines in a Web-based disease-management system. Proc AMIA Annu Fall Symp. 1997:764–8. [PMC free article] [PubMed]
  • 61.Teich JM, Spurr CD, Schmiz JL, O'Connell EM, Thomas D. Enhancement of clinician workflow with computer order entry. Proc Annu Symp Comput Appl Med Care. 1995:459–63. [PMC free article] [PubMed]

Articles from Journal of the American Medical Informatics Association : JAMIA are provided here courtesy of Oxford University Press

RESOURCES