Information-Sharing in Out-of-Hospital Disaster Response: The Future Role of Information Technology

Numerous examples exist of the benefits of the timely access to information in emergencies and disasters. Information technology (IT) is playing an increasingly important role in information-sharing during emergencies and disasters. The effective use of IT in out-of-hospital (OOH) disaster response is accompanied by numerous challenges at the human, applications, communication, and security levels. Most reports of IT applications to emergencies or disasters to date, concern applications that are hospital-based or occur during non-response phases of events (i.e., mitigation, planning and preparedness, or recovery phases). Few reports address the application of IT to OOH disaster response. Wireless peer networks that involve ad hoc wireless routing networks and peer-to-peer application architectures offer a promising solution to the many challenges of information-sharing in OOH disaster response. These networks offer several services that are likely to improve information-sharing in OOH emergency response, including needs and capacity assessment databases, victim tracking, event logging, information retrieval, and overall incident management system support.

[1]  Jonathan M. Teich,et al.  Brief Review: The Informatics Response in Disaster, Terrorism, and War , 2002, J. Am. Medical Informatics Assoc..

[2]  María Teresa Arredondo,et al.  Mobile technologies in the management of disasters: the results of a telemedicine solution , 2001, AMIA.

[3]  C P Chandrasekhar,et al.  Information and communication technologies and health in low income countries: the potential and the constraints. , 2001, Bulletin of the World Health Organization.

[4]  R E LaPorte,et al.  The need for a global health disaster network. , 1997, Prehospital and disaster medicine.

[5]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[6]  L. Bourque The Public Health Consequences of Disasters , 1997 .

[7]  Jeff Hamilton,et al.  An Internet-based bar code tracking system: coordination of confusion at mass casualty incidents. , 2003, Disaster management & response : DMR : an official publication of the Emergency Nurses Association.

[9]  G. Noordergraaf,et al.  Development of computer-assisted patient control for use in the hospital setting during mass casualty incidents. , 1996, The American journal of emergency medicine.

[10]  Brian D. Noble,et al.  Protecting applications with transient authentication , 2003, MobiSys '03.

[11]  R Stephenson,et al.  Disasters and the information technology revolution. , 1997, Disasters.

[12]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[13]  E. Noji,et al.  The Public Health Consequences of Disasters , 2000, Prehospital and Disaster Medicine.

[14]  Julia H. Allen The CERT Guide to System and Network Security Practices , 2001 .