THE INTEGRAL ASSESSMENT OF BIOTERRORISM THREAT Episode II. OBJECTIVES, METHOD, TASKS Glushkov Institute of Cybernetics National Academy of Sciences of.

Slides:



Advertisements
Similar presentations
Hazard and Risk Analysis What are the socio-economic and political trends? Consider recent assessment / reviews / baseline studies / analytical exercises.
Advertisements

Risk Analysis Fundamentals and Application Robert L. Griffin International Plant Protection Convention Food and Agriculture Organization of the UN.
T HE ROLE OF GOVERNMENTS AND STAKEHOLDERS IN THE ICT PROMOTION DEVELOPMENT.
Risk Management Introduction Risk Management Fundamentals
ECONOMIC ASSESSMENT OF IMPLEMENTATION TREATMENT GUIDELINES OF HYPERTENSION IN OUT-PATIENT PRACTICE Kulmagambetov IR Karaganda State Medical Academy, Kazakhstan.
-NEW EDUCATIONAL PATWAY FOR GLOBAL PUBLIC HEALTH SECURITY- (2) South Eastern Europe (SEE) PUBLIC HEALTH PREPAREDNESS SUPERCOURSE NETWORK Elisaveta Stikova,
UN Inter-Agency Secretariat for the ISDR
Health Aspect of Disaster Risk Assessment Dr AA Abubakar Department of Community Medicine Ahmadu Bello University Zaria Nigeria.
Principles of Information System Security: Text and Cases
The Effect of Climate on Infectious Disease
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
1 Enviromatics Decision support systems Decision support systems Вонр. проф. д-р Александар Маркоски Технички факултет – Битола 2008 год.
Principles of Public Health- The Mission, Core Functions and Ten Essential Services Virginia M. Dato MD MPH.
Introduction to Molecular Epidemiology Jan Dorman, PhD University of Pittsburgh School of Nursing
Education and Training Required of IPM Practitioners Norm Leppla University of Florida.
Evaluation and Policy in Transforming Nursing
Role and Components of Project Evaluation
Environmental Risk Analysis
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Copyright © 2012 Wolters Kluwer Health | Lippincott Williams & Wilkins Chapter 7: Gathering Evidence for Practice.
Incident Response Mechanism for Chemical Facilities By Stephen Fortier and Greg Shaw George Washington University, Institute for Crisis, Disaster and Risk.
1 DHS Bioterrorism Risk Assessment Background, Requirements, and Overview DHS Bioterrorism Risk Assessment Background, Requirements, and Overview Steve.
Academy of Sciences of the Republic of Uzbekistan Institute of Seismology Registration number of the project: VII. Ecology. №5. Development and mapping.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Chapter 17 Life Cycle Financial Risks
MULTICRITERIAL REASONING of PRIORITIES1 THE PRINCIPLES OF MULTICRITERIAL REASONING OF THE DEVELOPMENT PRIORITIES Buracas & Zvirblis
Chapter 3 ORGANIZATIONAL CULTURE AND ENVIRONMENT: THE CONSTRAINTS
New Approaches to Epidemiological Risk Assessment Management Konstantyn Atoyev Cybernetics Center of National Academy of Sciences. Kiev. Ukraine.
Risk Management Project Management Digital Media Department Unit Credit Value : 4 Essential Learning time : 120 hours.
LESSON 9.5: TYPES OF STUDIES Module 9: Epidemiology Obj. 9.5: Compare & contrast different types of epidemiological studies.
Impacts, uncertainties and non-linearities of extreme events (heavy precipitation and floods) in a changing climate Luis J. Mata Center for Development.
TASHKENT MEDICAL ACADEMY GENERAL AND RADIATION HYGIENE CONTEMPORARY PROBLEMS OF THE MEDICAL ECOLOGY.
Lecture Topics covered CMMI- - Continuous model -Staged model PROCESS PATTERNS- -Generic Process pattern elements.
TSN "insight into the activities of department" Ecology "
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Tom Vander Beken – Anticipating.
Gile Sampling1 Sampling. Fundamental principles. Daniel Gile
11th International Symposium Loss Prevention 2004 Prague Ľudovít JELEMENSKÝ Department of Chemical and Biochemical Engineering, STU BRATISLAVA, SLOVAKIA.
Agricultural and environmental indicators and models por Rubén De la Sierra Rosario Peyrot.
Using Informatics to Promote Community/Population Health
Screen 1 of 20 Vulnerability Vulnerability Assessment LEARNING OBJECTIVES Define the purpose and scope of vulnerability assessment. Understand how vulnerability.
Evidence Based Practice RCS /9/05. Definitions  Rosenthal and Donald (1996) defined evidence-based medicine as a process of turning clinical problems.
Is it Strategic Defense Initiative (SDI) – "Star War» ? No it is New Epi- demiological World- wide Strategic De- fense Initiative - (NEWSDI)
Group Science J. Marc Overhage MD, PhD Regenstrief Institute Indiana University School of Medicine.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
Lecture № 4  Political system of society. Ethnopolitics and international relationships.
Part 1d: Exposure Assessment and Modeling Thomas Robins, MD, MPH.
Chapter 3 ORGANIZATIONAL CULTURE AND ENVIRONMENT: THE CONSTRAINTS
1 DISASTER DATA BASE: A New Experimental Model Dr. A. Rossodivita San Raffaele Foundation Italy Scientific Networking and the Global Health Supercourse.
Adaptive Integrated Framework (AIF): a new methodology for managing impacts of multiple stressors in coastal ecosystems A bit more on AIF, project components.
CENTER FOR PREVENTION AND EARLY INTERVENTION  A COLLABORATION BETWEEN THE JHU BLOOMBERG SCHOOL OF PUBLIC HEALTH, BLOOMBERG SCHOOL OF PUBLIC HEALTH, THE.
“Ukraine” Health Profile Konstantyn Atoyev National Supercourse Director for Ukraine Kiev, Ukraine for Supercourse’s Program, Pittsburgh, USASupercourse’s.
Technology Forecasting. Forecasting predict or estimate a future event or trend. "rain is forecast for Lahore“ The use of historic data to determine the.
Types of Studies. Aim of epidemiological studies To determine distribution of disease To examine determinants of a disease To judge whether a given exposure.
IDEV 624 – Monitoring and Evaluation Evaluating Program Outcomes Elke de Buhr, PhD Payson Center for International Development Tulane University.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Prof. Dr. T. Vander Beken.
Integrated pest management (IPM) : 1.As the practice of preventing or suppressing damaging populations of insect pests by application of the comprehensive.
© 2010 Jones and Bartlett Publishers, LLC. Chapter 12 Clinical Epidemiology.
THE "COST – BENEFIT" ANALYSIS IN THE MODERN CITY ENVIRONMENT QUALITY MANAGEMENT Prof. Dr. Elena Lazareva, Prof. Dr. Tatiana Anopchenko South Federal University,
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
 Exists to serve the community’s interests by providing social conditions in which people maintain health  Describes epidemics and the spread of disease,
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Chapter 3 ORGANIZATIONAL CULTURE AND ENVIRONMENT: THE CONSTRAINTS
Framework Programme : 7th Research Framework Programme : Some aspects.
Hazards Planning and Risk Management Risk Analysis and Assessment
Information Security Risk Management
“Ukraine” Health Profile National Supercourse Director
Introduction to Public Health Nutrition
Assessing organised crime: threat, anticipation and future
Using Informatics to Promote Community/Population Health
State University of Telecommunications
Presentation transcript:

THE INTEGRAL ASSESSMENT OF BIOTERRORISM THREAT Episode II. OBJECTIVES, METHOD, TASKS Glushkov Institute of Cybernetics National Academy of Sciences of Ukraine Konstantyn Atoyev

New Testment St Luka 10:19 «Behold, I give unto you power to tread on serpents and scorpions, and over all the power of the enemy; and nothing shall by any means hurt you.»

OBJECTIVES The Tragedy in the USA has illuminated Two Problems:

The problem of early recognition of risks and identification and ran- king of critical factors, which deter- mine rare events realisation. The problem of minimizing the effects of terrorist acts on civilian population.

The therrorist attack and mass outbreak of anthrax spreading through the letters have shown that even the events with negligible value of risk can indeed occur. Moreover even if the realization of rare events causes by oneself local hazard, its combination with media hypes leads to a strong multiple effect.

September, 11 Chernobyl, 1986 Even the events with negligible value of risk can indeed occur Problems Early risk recognition Identification and ranking of critical factors, determining rare events realisation Minimizing the effects of terrorist acts on civilian population Rare Events

It can cause essential damage such as public fear, undermining of public trust to regulators up to collapse of economics, depending on its state. So now we have the principle new threats for society connected with rare event realization.

In this case the task of early recognition of risks and identification and ranking of critical factors, which determine rare events, took one of the central place in modern risk analysis.

One of the most distinctive features in the study of such events is difficulty in choice of adequate mathematical appa- ratus for their investigation.

Indeed, the traditional methods or risk estimation were elaborated on the basis of theory of probability. For instance the risk of some disease is determined as ratio of total amount of patients with this diseases to total population.

CATASTROPHES’s THEORYSTATISTICS Mathematical Methods RISK ASSESSMENT Probability Approximation to the bifur- cation values of parameters RESTRICTIONS Sample’s completeness Unique character of event UNITS

However, the theory of probability can- not be correctly utilized for risk assess- ment in some cases, especially with the absence or incompleteness of data due to unique character of event.

The bioterrorism as phenomena is con- nected not only with bio-medical and epidemiological threats, but also deter- mined by complex ecological, econo- mical, mental and social peculiarities of concrete country and time. METHOD

Each bioterrorist act and all problems associated with its consequences have individual features.

That is why it is not correctly to utilize for risk assessment of bioterrorist act in one country the statistical data received under other conditions in various countries.

In this case widespread gets under- standing that the unique and single character of so sophisticated subject as bioterrotist attack and its consequences does not allow in some cases to use correctly the theory of probability for risk assessment.

There is another approach to risk assessment, which may prove to be more useful here. It allows not only risk estimation, but also description of the quantitative characteristic of reserve possibilities of the system and its components [10-14].

Risk estimation is carried out using the theory of smooth functions [15] allowing the determination of critical parameter values which describe the levels of control system intensities and reserve possibilities. The risk is estimated on a degree of the system parameter approximation of the bifurcation values, which characterize the system’s transition from one steady state (norm), to another (catastrophe).

APPLICATIONS FORECASTING CONTROLCONTROL OPTIMIZATION ANALYSISANALYSIS MICRO- BIOLOGY ECONO MICS SOCIAL POLITICS BIOTER- RORISM EPIDEMI- OLOGY HEALTH CARE ECOSYSTEMS DECIGN MAKING DANGEROUS OBJECTS This approach was utili- zed for following tasks: TASKS: FIELDS RISK ASSES- SMENT

Norm The threat of bioterrorsm The shit of high risk The shit of middle risk Economical index Bio-medical index

The state of society is examined as complex interrelations in “hexagon of security”, which is determined by following factors: epidemiological, social, medico-biological, ecological, mental, economical

Economical threats Ecological threats Social threats Mental threats Epidemiological threats Medico-biolo- gical threats

All arsenal of threats, including bioterrorism, have the potential to upset intricate balance that exist within the “hexagon of security” by either altering the environment, economics social and epidemiological situation or upsetting mental and medico-biological spheres.

The disbalance within the hexagon of security is the most formidable threat, that we all must do our best to prevent, as it leads to transition from one system’s steady state (norm), to another (crisis or catastrophe). The dynamics of these system parameters is determined with the help of dynamic modeling.

The main advantage of this approach is the determination of risk dynamics as the function of dynamic variables of the investigated system. It also allows to identify the weakest link of system and the areas that need improvement [10-14].

1. Information characterizing interre- lations in “hexagon of security” is inputted from Data Bases. ALGORITHM OF RISK ASSESSMENT 2. The indices characterizing these interrelations are estimated by means of developed mathematical models with the help of inputted data.

4. Restoration possibilities of each of considered systems are estimated by remoteness of parameter characterizing appropriate index from its bifurcation value. 3. The bifurcation values of the para- meters, characterizing the balance dis- turbanses in the “hexagon of security” are calculated.

MAIN TASKS The computer technology for assessment of bioterrorism threat and minimization the effects of terrorist acts on civilian populations, including the risk of various epidemic spreading. should allow to solve the following tasks:

Investigation of bioterrorist threat dynamics on the basis of risk assessment of bioterrorist attack and forecasting of the terrorist act consequences depending on interrelations “hexagon of security” TASK 1.

Determination of impacts, minimizing the effects of terrorist acts on civilian population, specifically the optimal means redistribution to increase the efficacy of bioterrorist acts prevention and elaboration the recommendations for their consequence liquidation. TASK 2.

The ranking of different world regions on the degree of bioterrorist threat and damage after potential bioterrorist attacks. TASK 3.

MAIN ADVANTAGE The main advantage of this approach is the determination of bioterrorist attack risk dynamics as the function of dynamic variables, characterizing the interrelations in the “hexagon of security” (social, economical, political, ecological, epidemiological and biomedical).

1. Identification of the weakest link under various scenarios of bioterrorist attacks and means redistribution for help to national services responsible for bioterrorist attacks prevention and liquidation of their consequences. It allows to solve the following tasks:

2. Identification of the weakest link and area of needed improvement and ranking countries on their weakness and vulnerability to possible bioterrorist attack and evaluation of capability to respond effectively to the threat of bioterrorism and to deal with consequences of terrorist attack.

3. Investigation of bioterrorist threat dynamics on the basis of risk assessment of bioterrorist attack and forecasting of the terrorist act consequences depending on economical, social and ecological situation.

4. Determination of effective impacts (controls), minimizing the effects of terrorist acts on civilian populations.

This lecture is based on 10. Atoyev K. Risk Assessment in Ukraine: New Approaches and Strategy of Development // Asses- sment and management of environmental risks: methods and applications in eastern European and developing countries-,Kluwer, 2001, pp Atoyev K., Rykhtovsky V. Computer technology for health risk estimation and mana- gement // “Foresight and Precaution” ESREL 2000 and SRAEurope ANNUAL CONFERENCE (Edinburg 2000), Belcema Publishers, 2000, Rotterdam, Netherlands, pp

12.Atoyev K. Risk Assessment in Ukraine: New Approaches and Strategy of Development // Asses- sment and management of environmental risks: methods and applications in eastern European and developing countries-,Kluwer, 2001, pp Аtoyev K., Slesarev Yu. Epidemiological Risk Management in Ukraine: New Approaches and Strategy of Development// Proc. SRA-2001 Annual Meeting, “Risk Analysis in an Interconnected World” Seattle, WA

14. Atoyev K. New Approaches to Epidemiological Risk Assessment Management // Supercourse: Epidemiology, the Internet and Global Health.- Pittsburgh: Disease Monitoring and Telecommunication WHO Collaborating Center, Guastello, S.J. (1988) The organizational security subsystem: some potentially catastrophic events, Behavioral Science 33,