SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
Texting4Health Conference
February 29, 2008           InSTEDD Proprietary Level I
…that you will help build a global
system to detect each new
disease or disaster as quickly as it
emerges…
Specificity                             Urge frequent
                                          reporting


                                    50 Shigella notifications (5%)
                     Report

                  Pos. specimen

                Clinical specimen

              Seek medical attention

                    Symptoms

                     Infected                     1000 Shigella infections (100%)
                    Exposed
                                                            Get as close to the
Sensitivity                                                bottom of the pyramid
                                                                as possible
  2/29/2008         InSTEDD Proprietary Level I                                     3
To address these challenges by adopting a social 
  network and cognitive model approach in order to 
  facilitate
  early identification of potential health threats 
  their verification, assessment and investigation 
  in order to recommend  measures (public health 
  and others) to control them.

                  Prototyped for MDBS
        Generalized to other regions and conditions
2/29/2008        InSTEDD Proprietary Level I          4
Indicator‐based surveillance
      computation of indicators upon which unusual 
      disease patterns to investigate are detected  
      (number of cases, rates, proportion of strains…)

  Event‐based surveillance
      the detection of public health events based on the 
      capture of ad‐hoc unstructured reports issued by 
      formal or informal sources.

2/29/2008        InSTEDD Proprietary Level I                5
Multiple data streams               Alert and Health           Time Series Visualization      Spatio-Temporal Analysis
(structured and unstructured)       Events Board
• Moderated Lists, News
   Feeds, Articles, Blogs,
   Emails, wikis (e.g., fluwiki),                                                       Time Slider
                                                                                                        Signal
   Videos, Audios
• Human health, animal health,
   plant health, water quality,
   Internet traffic, utilities,                                    Data Visualization
                                    Asset Status and
   intelligence. etc.
                                    Readiness
• SMS, SMS Geo-Chat

Contact Tracing and
                                                                                                 Remote Sensing
Network Modeling



                                                                                 Response
                                             User Alerts

                                                                                                Risk Visualization, Simulation
                                                                                                and Modeling


    Riff


                               Biosurveillance Tags
    2/29/2008                        InSTEDD Proprietary Level I                                                             6
InSTEDD Platform
Open source applications, services, and frameworks
Field Lab and Platform Synergy
            Learning at the edge, building for the future




                                 Component                      New Features
                                 Integration                    & Services
                  Emerging                     Design
                  Requirements                 Validation




2/29/2008                                             InSTEDD Proprietary Level I   8
Serious
infectious
disease
hotspot.
  2/29/2008   InSTEDD Proprietary Level I   9
2/29/2008   InSTEDD Proprietary Level I   10
Steung Treng Province
EWARN database                             Northern Cambodia
SYNCHRONIZES via SMS. 
Cell phones to laptops.

 The outbreak, the lab 
 confirmation, and the 
 contact tracking, can all be 
 done over SMS.




2/29/2008         InSTEDD Proprietary Level I                     11
The Golden Shadow Demonstration
Community Disaster
                                         Network
First Responders   Community  Orgs      Neighborhoods
Emergency
          Command Center




GeoChat             GeoBlogging   GeoForms
Cell phone SMS messages show up on Google 
     Earth
     Time, date, person, location, text
     Reply directly from Google Earth
     See movements as paths over time
     The status display ages (colors…)




2/29/2008          InSTEDD Proprietary Level I    15
2/29/2008   InSTEDD Proprietary Level I   16
2/29/2008   InSTEDD Proprietary Level I   17
Creating a collaborative environment where 
     human epidemiologists decision makers and 
     responders interact with automated systems, 
     using their existing tools and services when 
     possible

     Application of Social Network Model 
     approach and Collaborative decision making 
     technology into the process
2/29/2008      InSTEDD Proprietary Level I           18
Taha Kass-Hout, MD, MS
Director, Health Informatics
InSTEDD
kasshout@instedd.org
                                                      400 Hamilton Avenue, Suite 120
Mary Jane Marcus, MSW                                 Palo Alto, CA 94301
Program Manager                                       USA
InSTEDD                                               +1.650.353.4440
415-269-9079                                          +1.877.650.4440 (toll-free in the US)
marcus@instedd.org




  2/29/2008             InSTEDD Proprietary Level I                                      19
The likelihood of disasters and disease outbreaks is 
     growing
        According to a recent Oxfam report, there has been a four‐
        fold increase in the annual number of natural disasters
                                          http://www.oxfam.org/en/policy/briefingpapers/bp108_climate_change_alarm_0711



        30 infectious diseases identified since 1973

     Potential impact is getting greater
        Impact on health, economies & security
        Capable of spreading faster than ever before

2/29/2008          InSTEDD Proprietary Level I                                                                            20
Current systems design, analysis and evaluation has been 
     geared towards specific data sources and detection 
     algorithms – not humans
            Much less has been towards interaction with responders and domain 
            experts across agencies and at multiple levels
            Often provide contradictory interpretations of ongoing events

     We have systems in place for those threats we have been 
     faced with before
            We are more vulnerable to those we know about, but have not faced 
            on a major scale
            Even more vulnerable to those that we don’t know about

2/29/2008                InSTEDD Proprietary Level I                             21
Research Triangle International


     Harvard MIT – Healthmap


     NASA Goddard Space Flight 
     Center

     IBM: Public Health Information 
     Affinity Domain (PHIAD)

     ProMed


2/29/2008            InSTEDD Proprietary Level I   22
Those who had not used text messaging before the 
     demonstration (mainly seniors) reverted to their 
     preferred methods (FRS radio) during the 
     emergency.   It is hard to say what would have 
     happened if they only had text messaging as an 
     option

     Those who were experienced with text messaging 
     loved using it for reporting


2/29/2008       InSTEDD Proprietary Level I              23
Those who had failures in all other forms of 
     communication (their FRS radios failed) reverted to 
     SMS text messaging and used it for their internal 
     communication

     The lack of responses to text messaging (and all 
     forms of comm.) was very difficult

     All of the other things we learned around how info 
     needs to be meaningful…triaging at the field level…
2/29/2008        InSTEDD Proprietary Level I                24

Mais conteúdo relacionado

Destaque

Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdfManu M
 
causes of plant disease
causes of plant diseasecauses of plant disease
causes of plant diseaseAlia Najiha
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammerharrynik
 
Plant Disease Detection Using I.T.
Plant Disease Detection Using I.T.Plant Disease Detection Using I.T.
Plant Disease Detection Using I.T.Pruthvi7396
 
2011 course on Molecular Diagnostic Automation - Part 2 - Amplification
2011 course on Molecular Diagnostic Automation - Part 2 - Amplification2011 course on Molecular Diagnostic Automation - Part 2 - Amplification
2011 course on Molecular Diagnostic Automation - Part 2 - AmplificationPatrick Merel
 
Principles of plant disease management
Principles of plant disease managementPrinciples of plant disease management
Principles of plant disease managementRanjan Kumar
 
Power point presentation plant diseases
Power point presentation   plant diseasesPower point presentation   plant diseases
Power point presentation plant diseasesroshni17890
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt Sameer Gupta
 
Biological Control of Plant Diseases
Biological Control of Plant DiseasesBiological Control of Plant Diseases
Biological Control of Plant DiseasesSubham Dwivedi
 

Destaque (20)

Pcr aysin
Pcr aysinPcr aysin
Pcr aysin
 
Cell phone jammer pdf
Cell phone jammer pdfCell phone jammer pdf
Cell phone jammer pdf
 
causes of plant disease
causes of plant diseasecauses of plant disease
causes of plant disease
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Plant Disease Detection Using I.T.
Plant Disease Detection Using I.T.Plant Disease Detection Using I.T.
Plant Disease Detection Using I.T.
 
2011 course on Molecular Diagnostic Automation - Part 2 - Amplification
2011 course on Molecular Diagnostic Automation - Part 2 - Amplification2011 course on Molecular Diagnostic Automation - Part 2 - Amplification
2011 course on Molecular Diagnostic Automation - Part 2 - Amplification
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Plant Diseases
Plant DiseasesPlant Diseases
Plant Diseases
 
Principles of plant disease management
Principles of plant disease managementPrinciples of plant disease management
Principles of plant disease management
 
Plant diseases
Plant diseasesPlant diseases
Plant diseases
 
Power point presentation plant diseases
Power point presentation   plant diseasesPower point presentation   plant diseases
Power point presentation plant diseases
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Cell phone jammer ppt
Cell phone jammer ppt Cell phone jammer ppt
Cell phone jammer ppt
 
Principle of PCR
Principle of PCR Principle of PCR
Principle of PCR
 
Biological Control of Plant Diseases
Biological Control of Plant DiseasesBiological Control of Plant Diseases
Biological Control of Plant Diseases
 
PLANT DISEASE CONTROL
PLANT DISEASE CONTROLPLANT DISEASE CONTROL
PLANT DISEASE CONTROL
 
Elisa ppt
Elisa pptElisa ppt
Elisa ppt
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Semelhante a Technologies for Early Disease Detection and Rapid Disaster Response

Nomadeyes Brochure01 31oct08
Nomadeyes Brochure01 31oct08Nomadeyes Brochure01 31oct08
Nomadeyes Brochure01 31oct08martindudziak
 
1 Environmental Sustainability Ws Tony Vetter
1   Environmental Sustainability Ws   Tony Vetter1   Environmental Sustainability Ws   Tony Vetter
1 Environmental Sustainability Ws Tony Vetterguest17df6
 
Rethinking Technology Edge - Valgeo 2011
Rethinking Technology Edge - Valgeo 2011Rethinking Technology Edge - Valgeo 2011
Rethinking Technology Edge - Valgeo 2011Elena Rapisardi
 
Valgeo2011 rethinking tech edge
Valgeo2011 rethinking tech edgeValgeo2011 rethinking tech edge
Valgeo2011 rethinking tech edgeMassimo Lanfranco
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploitsecarrow
 
Extreme deep learning in biosecurity the case of machine hearing for marine s...
Extreme deep learning in biosecurity the case of machine hearing for marine s...Extreme deep learning in biosecurity the case of machine hearing for marine s...
Extreme deep learning in biosecurity the case of machine hearing for marine s...Konstantinos Demertzis
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)Manuel Mejías
 
The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208Manuel Mejías
 
A Case Study on Face Spoof Detection
A Case Study on Face Spoof DetectionA Case Study on Face Spoof Detection
A Case Study on Face Spoof DetectionIRJET Journal
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
A Cloud-Based Prototype Implementation of a Disease Outbreak Notification System
A Cloud-Based Prototype Implementation of a Disease Outbreak Notification SystemA Cloud-Based Prototype Implementation of a Disease Outbreak Notification System
A Cloud-Based Prototype Implementation of a Disease Outbreak Notification SystemIJCSEA Journal
 
Data Integrity Protection
Data Integrity ProtectionData Integrity Protection
Data Integrity Protectionproitsolutions
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceRui M. Barreira
 
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...IRJET Journal
 

Semelhante a Technologies for Early Disease Detection and Rapid Disaster Response (20)

Nomadeyes Brochure01 31oct08
Nomadeyes Brochure01 31oct08Nomadeyes Brochure01 31oct08
Nomadeyes Brochure01 31oct08
 
1 Environmental Sustainability Ws Tony Vetter
1   Environmental Sustainability Ws   Tony Vetter1   Environmental Sustainability Ws   Tony Vetter
1 Environmental Sustainability Ws Tony Vetter
 
A3 12jul05 V01
A3 12jul05 V01A3 12jul05 V01
A3 12jul05 V01
 
Rethinking Technology Edge - Valgeo 2011
Rethinking Technology Edge - Valgeo 2011Rethinking Technology Edge - Valgeo 2011
Rethinking Technology Edge - Valgeo 2011
 
Valgeo2011 rethinking tech edge
Valgeo2011 rethinking tech edgeValgeo2011 rethinking tech edge
Valgeo2011 rethinking tech edge
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Extreme deep learning in biosecurity the case of machine hearing for marine s...
Extreme deep learning in biosecurity the case of machine hearing for marine s...Extreme deep learning in biosecurity the case of machine hearing for marine s...
Extreme deep learning in biosecurity the case of machine hearing for marine s...
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
Hawaii Pacific GIS Conference 2012: Disaster Management and Emergency Respons...
 
ICT Resilience in EU
ICT Resilience in EUICT Resilience in EU
ICT Resilience in EU
 
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)The OK! technology - Exposé v3.26 20170208 (LinkedIn)
The OK! technology - Exposé v3.26 20170208 (LinkedIn)
 
The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208The OK! technology - Exposé v3.26 20170208
The OK! technology - Exposé v3.26 20170208
 
A Case Study on Face Spoof Detection
A Case Study on Face Spoof DetectionA Case Study on Face Spoof Detection
A Case Study on Face Spoof Detection
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
A Cloud-Based Prototype Implementation of a Disease Outbreak Notification System
A Cloud-Based Prototype Implementation of a Disease Outbreak Notification SystemA Cloud-Based Prototype Implementation of a Disease Outbreak Notification System
A Cloud-Based Prototype Implementation of a Disease Outbreak Notification System
 
Data Integrity Protection
Data Integrity ProtectionData Integrity Protection
Data Integrity Protection
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
NEW CORONA VIRUS DISEASE 2022: SOCIAL DISTANCING IS AN EFFECTIVE MEASURE (COV...
 

Mais de InSTEDD

Pandemic Preparedness COVID-19 Update – Citizens Guide
Pandemic Preparedness COVID-19 Update – Citizens GuidePandemic Preparedness COVID-19 Update – Citizens Guide
Pandemic Preparedness COVID-19 Update – Citizens GuideInSTEDD
 
Disease Reporting Hotline Launches to Stop Outbreaks in Cambodia
Disease Reporting Hotline Launches to Stop Outbreaks in Cambodia Disease Reporting Hotline Launches to Stop Outbreaks in Cambodia
Disease Reporting Hotline Launches to Stop Outbreaks in Cambodia InSTEDD
 
EpiHack Rio Photo Essay
EpiHack Rio Photo EssayEpiHack Rio Photo Essay
EpiHack Rio Photo EssayInSTEDD
 
mHealth tech and implementation
mHealth tech and implementationmHealth tech and implementation
mHealth tech and implementationInSTEDD
 
Wildlife Sickness Reporting
Wildlife Sickness ReportingWildlife Sickness Reporting
Wildlife Sickness ReportingInSTEDD
 
Animalhealthparticipatorysurveillance-140311023459-phpapp02
Animalhealthparticipatorysurveillance-140311023459-phpapp02Animalhealthparticipatorysurveillance-140311023459-phpapp02
Animalhealthparticipatorysurveillance-140311023459-phpapp02InSTEDD
 
Mobile technologies landscape and opportunity for civil society organizations...
Mobile technologies landscape and opportunity for civil society organizations...Mobile technologies landscape and opportunity for civil society organizations...
Mobile technologies landscape and opportunity for civil society organizations...InSTEDD
 
Routine infectious disease reporting using SMS at Kean Svay operational distr...
Routine infectious disease reporting using SMS at Kean Svay operational distr...Routine infectious disease reporting using SMS at Kean Svay operational distr...
Routine infectious disease reporting using SMS at Kean Svay operational distr...InSTEDD
 
Verboice - Voice based platform and impact to grassroots Cambodia
Verboice - Voice based platform and impact to grassroots CambodiaVerboice - Voice based platform and impact to grassroots Cambodia
Verboice - Voice based platform and impact to grassroots CambodiaInSTEDD
 
Google Map Maker
Google Map MakerGoogle Map Maker
Google Map MakerInSTEDD
 
"Technology with a Purpose" - Eduardo Jezierski speaks at Ignite Health Foo 2...
"Technology with a Purpose" - Eduardo Jezierski speaks at Ignite Health Foo 2..."Technology with a Purpose" - Eduardo Jezierski speaks at Ignite Health Foo 2...
"Technology with a Purpose" - Eduardo Jezierski speaks at Ignite Health Foo 2...InSTEDD
 
mHealth for HIV/AIDS
mHealth for HIV/AIDSmHealth for HIV/AIDS
mHealth for HIV/AIDSInSTEDD
 
mHealth and Community Health Workers
mHealth and Community Health WorkersmHealth and Community Health Workers
mHealth and Community Health WorkersInSTEDD
 
InSTEDD Focus Areas
InSTEDD Focus AreasInSTEDD Focus Areas
InSTEDD Focus AreasInSTEDD
 
TEDxPhnom Penh Presentation by Channe Suy
TEDxPhnom Penh Presentation by Channe SuyTEDxPhnom Penh Presentation by Channe Suy
TEDxPhnom Penh Presentation by Channe SuyInSTEDD
 
Introduction to InSTEDD
Introduction to InSTEDD Introduction to InSTEDD
Introduction to InSTEDD InSTEDD
 
Rio 2.0 Demo Alley Presentation
Rio 2.0 Demo Alley PresentationRio 2.0 Demo Alley Presentation
Rio 2.0 Demo Alley PresentationInSTEDD
 
About InSTEDD
About InSTEDDAbout InSTEDD
About InSTEDDInSTEDD
 
InSTEDD Technologies
InSTEDD TechnologiesInSTEDD Technologies
InSTEDD TechnologiesInSTEDD
 
InSTEDD PMTCT - M-E Health Tool Belt
InSTEDD PMTCT - M-E Health Tool BeltInSTEDD PMTCT - M-E Health Tool Belt
InSTEDD PMTCT - M-E Health Tool BeltInSTEDD
 

Mais de InSTEDD (20)

Pandemic Preparedness COVID-19 Update – Citizens Guide
Pandemic Preparedness COVID-19 Update – Citizens GuidePandemic Preparedness COVID-19 Update – Citizens Guide
Pandemic Preparedness COVID-19 Update – Citizens Guide
 
Disease Reporting Hotline Launches to Stop Outbreaks in Cambodia
Disease Reporting Hotline Launches to Stop Outbreaks in Cambodia Disease Reporting Hotline Launches to Stop Outbreaks in Cambodia
Disease Reporting Hotline Launches to Stop Outbreaks in Cambodia
 
EpiHack Rio Photo Essay
EpiHack Rio Photo EssayEpiHack Rio Photo Essay
EpiHack Rio Photo Essay
 
mHealth tech and implementation
mHealth tech and implementationmHealth tech and implementation
mHealth tech and implementation
 
Wildlife Sickness Reporting
Wildlife Sickness ReportingWildlife Sickness Reporting
Wildlife Sickness Reporting
 
Animalhealthparticipatorysurveillance-140311023459-phpapp02
Animalhealthparticipatorysurveillance-140311023459-phpapp02Animalhealthparticipatorysurveillance-140311023459-phpapp02
Animalhealthparticipatorysurveillance-140311023459-phpapp02
 
Mobile technologies landscape and opportunity for civil society organizations...
Mobile technologies landscape and opportunity for civil society organizations...Mobile technologies landscape and opportunity for civil society organizations...
Mobile technologies landscape and opportunity for civil society organizations...
 
Routine infectious disease reporting using SMS at Kean Svay operational distr...
Routine infectious disease reporting using SMS at Kean Svay operational distr...Routine infectious disease reporting using SMS at Kean Svay operational distr...
Routine infectious disease reporting using SMS at Kean Svay operational distr...
 
Verboice - Voice based platform and impact to grassroots Cambodia
Verboice - Voice based platform and impact to grassroots CambodiaVerboice - Voice based platform and impact to grassroots Cambodia
Verboice - Voice based platform and impact to grassroots Cambodia
 
Google Map Maker
Google Map MakerGoogle Map Maker
Google Map Maker
 
"Technology with a Purpose" - Eduardo Jezierski speaks at Ignite Health Foo 2...
"Technology with a Purpose" - Eduardo Jezierski speaks at Ignite Health Foo 2..."Technology with a Purpose" - Eduardo Jezierski speaks at Ignite Health Foo 2...
"Technology with a Purpose" - Eduardo Jezierski speaks at Ignite Health Foo 2...
 
mHealth for HIV/AIDS
mHealth for HIV/AIDSmHealth for HIV/AIDS
mHealth for HIV/AIDS
 
mHealth and Community Health Workers
mHealth and Community Health WorkersmHealth and Community Health Workers
mHealth and Community Health Workers
 
InSTEDD Focus Areas
InSTEDD Focus AreasInSTEDD Focus Areas
InSTEDD Focus Areas
 
TEDxPhnom Penh Presentation by Channe Suy
TEDxPhnom Penh Presentation by Channe SuyTEDxPhnom Penh Presentation by Channe Suy
TEDxPhnom Penh Presentation by Channe Suy
 
Introduction to InSTEDD
Introduction to InSTEDD Introduction to InSTEDD
Introduction to InSTEDD
 
Rio 2.0 Demo Alley Presentation
Rio 2.0 Demo Alley PresentationRio 2.0 Demo Alley Presentation
Rio 2.0 Demo Alley Presentation
 
About InSTEDD
About InSTEDDAbout InSTEDD
About InSTEDD
 
InSTEDD Technologies
InSTEDD TechnologiesInSTEDD Technologies
InSTEDD Technologies
 
InSTEDD PMTCT - M-E Health Tool Belt
InSTEDD PMTCT - M-E Health Tool BeltInSTEDD PMTCT - M-E Health Tool Belt
InSTEDD PMTCT - M-E Health Tool Belt
 

Último

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Technologies for Early Disease Detection and Rapid Disaster Response

  • 1. Texting4Health Conference February 29, 2008 InSTEDD Proprietary Level I
  • 2. …that you will help build a global system to detect each new disease or disaster as quickly as it emerges…
  • 3. Specificity Urge frequent reporting 50 Shigella notifications (5%) Report Pos. specimen Clinical specimen Seek medical attention Symptoms Infected 1000 Shigella infections (100%) Exposed Get as close to the Sensitivity bottom of the pyramid as possible 2/29/2008 InSTEDD Proprietary Level I 3
  • 4. To address these challenges by adopting a social  network and cognitive model approach in order to  facilitate early identification of potential health threats  their verification, assessment and investigation  in order to recommend  measures (public health  and others) to control them. Prototyped for MDBS Generalized to other regions and conditions 2/29/2008 InSTEDD Proprietary Level I 4
  • 5. Indicator‐based surveillance computation of indicators upon which unusual  disease patterns to investigate are detected   (number of cases, rates, proportion of strains…) Event‐based surveillance the detection of public health events based on the  capture of ad‐hoc unstructured reports issued by  formal or informal sources. 2/29/2008 InSTEDD Proprietary Level I 5
  • 6. Multiple data streams Alert and Health Time Series Visualization Spatio-Temporal Analysis (structured and unstructured) Events Board • Moderated Lists, News Feeds, Articles, Blogs, Emails, wikis (e.g., fluwiki), Time Slider Signal Videos, Audios • Human health, animal health, plant health, water quality, Internet traffic, utilities, Data Visualization Asset Status and intelligence. etc. Readiness • SMS, SMS Geo-Chat Contact Tracing and Remote Sensing Network Modeling Response User Alerts Risk Visualization, Simulation and Modeling Riff Biosurveillance Tags 2/29/2008 InSTEDD Proprietary Level I 6
  • 8. Field Lab and Platform Synergy Learning at the edge, building for the future Component New Features Integration & Services Emerging Design Requirements Validation 2/29/2008 InSTEDD Proprietary Level I 8
  • 9. Serious infectious disease hotspot. 2/29/2008 InSTEDD Proprietary Level I 9
  • 10. 2/29/2008 InSTEDD Proprietary Level I 10
  • 11. Steung Treng Province EWARN database  Northern Cambodia SYNCHRONIZES via SMS.  Cell phones to laptops. The outbreak, the lab  confirmation, and the  contact tracking, can all be  done over SMS. 2/29/2008 InSTEDD Proprietary Level I 11
  • 13. Community Disaster Network First Responders Community  Orgs Neighborhoods
  • 14. Emergency Command Center GeoChat GeoBlogging GeoForms
  • 15. Cell phone SMS messages show up on Google  Earth Time, date, person, location, text Reply directly from Google Earth See movements as paths over time The status display ages (colors…) 2/29/2008 InSTEDD Proprietary Level I 15
  • 16. 2/29/2008 InSTEDD Proprietary Level I 16
  • 17. 2/29/2008 InSTEDD Proprietary Level I 17
  • 18. Creating a collaborative environment where  human epidemiologists decision makers and  responders interact with automated systems,  using their existing tools and services when  possible Application of Social Network Model  approach and Collaborative decision making  technology into the process 2/29/2008 InSTEDD Proprietary Level I 18
  • 19. Taha Kass-Hout, MD, MS Director, Health Informatics InSTEDD kasshout@instedd.org 400 Hamilton Avenue, Suite 120 Mary Jane Marcus, MSW Palo Alto, CA 94301 Program Manager USA InSTEDD +1.650.353.4440 415-269-9079 +1.877.650.4440 (toll-free in the US) marcus@instedd.org 2/29/2008 InSTEDD Proprietary Level I 19
  • 20. The likelihood of disasters and disease outbreaks is  growing According to a recent Oxfam report, there has been a four‐ fold increase in the annual number of natural disasters http://www.oxfam.org/en/policy/briefingpapers/bp108_climate_change_alarm_0711 30 infectious diseases identified since 1973 Potential impact is getting greater Impact on health, economies & security Capable of spreading faster than ever before 2/29/2008 InSTEDD Proprietary Level I 20
  • 21. Current systems design, analysis and evaluation has been  geared towards specific data sources and detection  algorithms – not humans Much less has been towards interaction with responders and domain  experts across agencies and at multiple levels Often provide contradictory interpretations of ongoing events We have systems in place for those threats we have been  faced with before We are more vulnerable to those we know about, but have not faced  on a major scale Even more vulnerable to those that we don’t know about 2/29/2008 InSTEDD Proprietary Level I 21
  • 22. Research Triangle International Harvard MIT – Healthmap NASA Goddard Space Flight  Center IBM: Public Health Information  Affinity Domain (PHIAD) ProMed 2/29/2008 InSTEDD Proprietary Level I 22
  • 23. Those who had not used text messaging before the  demonstration (mainly seniors) reverted to their  preferred methods (FRS radio) during the  emergency.   It is hard to say what would have  happened if they only had text messaging as an  option Those who were experienced with text messaging  loved using it for reporting 2/29/2008 InSTEDD Proprietary Level I 23
  • 24. Those who had failures in all other forms of  communication (their FRS radios failed) reverted to  SMS text messaging and used it for their internal  communication The lack of responses to text messaging (and all  forms of comm.) was very difficult All of the other things we learned around how info  needs to be meaningful…triaging at the field level… 2/29/2008 InSTEDD Proprietary Level I 24