Scoping Review of Sabotage and/or Tampering in the NHS

A scoping review on sabotage or tampering (within the NHS) with intent to injure was commissioned by the National Patient Safety Agency (NPSA). This followed reports of blocked anaesthetic tubing during surgical procedures, which could have been the result of deliberate sabotage. OBJECTIVES: To undertake a scoping review of the literature relating to: 1. sabotage or tampering, with intent to injure, of equipment or medical products by staff, patients, carers or anyone else with access. 2. solutions that help to minimise the risk of sabotage or tampering. Literature from fields other than healthcare were considered relevant. The aim of the scoping review was to map the literature relating to sabotage or tampering.

[1]  G. B. Varnado,et al.  Fault tree analysis for vital area identification , 1978 .

[2]  D. Engi,et al.  Simulation of personnel control systems with the Insider Safeguards Effectiveness Model (ISEM) , 1977 .

[3]  M. Sanz,et al.  Prick-prick with fresh foods in patients with latex allergy. , 2000, Journal of investigational allergology & clinical immunology.

[4]  S. J. Motowidlo,et al.  Behaviorally Anchored Scales for Measuring Morale in Military Units , 1977 .

[5]  W. Thompson Hanging tongues: A sociological encounter with the assembly line , 1983 .

[6]  W. F. Huang,et al.  Adulteration by Synthetic Therapeutic Substances of Traditional Chinese Medicines in Taiwan , 1997, Journal of clinical pharmacology.

[7]  F. Hank Grant,et al.  Safeguard systems at nuclear facilities: A SNAP application , 1979, WSC '79.

[8]  D. Crockett,et al.  Nitrite adulteration of workplace urine drug-testing specimens. I. Sources and associated concentrations of nitrite in urine and distinction between natural sources and adulteration. , 1998, Journal of analytical toxicology.

[9]  D. A. Moul Security during safety-related emergencies at nuclear power plants , 1984 .

[10]  James H. R. Tucker Everyday forms of employee resistance , 1993 .

[11]  David P. H. Jones,et al.  Outcome of psychiatric intervention in factitious illness by proxy (Munchausen's syndrome by proxy) , 1999, Archives of disease in childhood.

[12]  J. Giesberg The Role of Communication in Preventing Workplace Sabotage , 2001 .

[13]  M S Simon BEWARE OF IMPLIED MALICE: CONTRACTOR LIABLE FOR PUNITIVE DAMAGES TO INJURED MOTORIST , 1992 .

[14]  C. Moore,et al.  Comparison of point-of-collection screening of drugs of abuse in oral fluid with a laboratory-based urine screen. , 2001, Forensic science international.

[15]  Edward W. Sieh GARMENT WORKERS: PERCEPTIONS OF INEQUITY AND EMPLOYEE THEFT , 1987 .

[16]  D. R. Harris,et al.  Monte Carlo modeling of the neutronics of a lead slowing down time assay device , 1982 .

[17]  C. Chapman,et al.  Use of patient-controlled analgesia for pain control for children receiving bone marrow transplant. , 1995, Journal of pain and symptom management.

[18]  B. A. Boughton Prediction of radiological dispersal from sabotage incidents involving high explosive , 1986 .

[19]  M. Das,et al.  Estimation of menthol in Pan Masala samples by a spectrophotometric method. , 1997, Food Additives and Contaminants.

[20]  V. Nagarajan,et al.  A simple and specific method for detection of adulteration with Lathyrus sativus. , 1967, The Indian journal of medical research.

[21]  Chun-Shien Lu,et al.  Mean-quantization-based fragile watermarking for image authentication , 2001 .

[22]  E. Ernst Toxic heavy metals and undeclared drugs in Asian herbal medicines. , 2002, Trends in pharmacological sciences.

[23]  D. Cohen,et al.  Patient-controlled analgesia for sickle-cell-related pain. , 1993, Journal of pain and symptom management.

[24]  F. Esposito,et al.  An assay evaluation of the methylene blue method for the detection of anionic surfactants in urine. , 2000, Journal of analytical toxicology.

[25]  B. Lindner,et al.  Hypochlorite Adulteration of Urine Causing Decreased Concentration of Δ9-THC-COOH by GC/MS , 1994 .

[26]  Maureen L. Ambrose,et al.  Sabotage in the workplace: The role of organizational injustice , 2002 .

[27]  Paul E. Spector Relationships of organizational frustration with reported behavioral reactions of employees , 1975 .

[28]  I. G. Waddoups,et al.  Tamper-indicating devices and safeguards seals evaluation test report. Volume 1 , 1993 .

[29]  S. Bailey,et al.  One hundred girls in care referred to an adolescent forensic mental health service , 1998 .

[30]  Steven Hornik,et al.  Passive resistance misuse: overt support and covert recalcitrance in IS implementation , 1996 .

[31]  G. Downey,et al.  Detecting and quantifying sunflower oil adulteration in extra virgin olive oils from the eastern mediterranean by visible and near-infrared spectroscopy. , 2002, Journal of agricultural and food chemistry.

[32]  D. L. Berry Fires: what plant locations should we really protect , 1980 .

[33]  E. Cone,et al.  In vivo adulteration: excess fluid ingestion causes false-negative marijuana and cocaine urine test results. , 1998, Journal of analytical toxicology.

[34]  Kenneth F Schulz,et al.  Allocation concealment in randomised trials: defending against deciphering , 2002, The Lancet.

[35]  A. L. Camp,et al.  Level III probabilistic risk assessment for N Reactor , 1990 .

[36]  G. Cherix,et al.  Adulteration of soluble coffee with coffee husks and parchments. , 1995, Journal of AOAC International.

[37]  R. Hoffman,et al.  A Descriptive Study of an Epidemic of Poisoning Caused by Heroin Adulterated with Scopolamine , 2000, Journal of toxicology. Clinical toxicology.

[38]  B. L. Hulme,et al.  POST: a subroutine for Path Ordering of Sabotage Targets , 1980 .

[39]  R. S. Strait,et al.  Technology transfer - insider protection workshop (Safeguards Evaluation Method - Insider Threat) , 1986 .

[40]  D. R. Bronowski,et al.  Radioactive material package closures with the use of shape memory alloys , 1997 .

[41]  G. B. Varnado,et al.  Status report on nuclear power plant design concepts for sabotage protection , 1982 .

[42]  K. Robards,et al.  Detection of adulteration in Australian orange juices by stable carbon isotope ratio analysis (SCIRA). , 2001, Journal of agricultural and food chemistry.

[43]  D. Engi,et al.  Use of ISEM in studying the impact of guard tactics on facility safeguards system effectiveness. [Insider Safeguards Effectiveness Model] , 1977 .

[44]  C Anderson,et al.  REVIEW AND INTEGRATION OF EXISTING LITERATURE CONCERNING POTENTIAL SOCIAL IMPACTS OF TRANSPORTATION OF RADIOACTIVE MATERIALS IN URBAN AREAS , 1980 .

[45]  Victoria E. Look,et al.  Assessment of foodservice managers' awareness of food tampering hazards and evaluation of a food tampering risk reduction program for managers of foodservice facilities , 1993 .

[46]  W. Horton,et al.  Measures of safeguards risk employing PRA (MOSREP): a methodology for estimating risk impacts of safeguards measures , 1985 .

[47]  Ron A. Dibattista,et al.  Forecasting Sabotage Events in the Workplace , 1996 .

[48]  A. Sicherman,et al.  Structured Assessment Approach: a microcomputer-based insider-vulnerability analysis tool , 1986 .

[49]  D. L. Caskey Sandia's experience in designing and implementing integrated high security physical protection systems , 1986 .

[50]  N. P. Cassells,et al.  The effects of commonly used adulterants on the detection of spiked LSD by an enzyme immunoassay. , 1998, Science & justice : journal of the Forensic Science Society.

[51]  Paul E. Spector,et al.  Relationships of organizational frustration with reported behavioural reactions: The moderating effect of locus of control , 1987 .

[52]  J. J. Tawil,et al.  Ranking of sabotage/tampering avoidance technology alternatives , 1986 .

[53]  E. Ernst Adulteration of Chinese herbal medicines with synthetic drugs: a systematic review , 2002, Journal of internal medicine.

[54]  A. J. Sheppard,et al.  Detection of vegetable oil adulteration in ice cream. , 1985, Journal of dairy science.

[55]  Marvin Resnikoff Analysis of RADTRAN Transportation Model , 1990 .

[56]  R. Durant,et al.  The association between health risk behaviors and sexual orientation among a school-based sample of adolescents. , 1998, Pediatrics.

[57]  R. Uebel,et al.  Toxicological screening for drugs of abuse in samples adulterated with household chemicals. , 2002, South African medical journal = Suid-Afrikaanse tydskrif vir geneeskunde.

[58]  Ron A. Dibattista Creating New Approaches to Recognize and Deter Sabotage , 1991 .

[59]  R. E. Luna Comparison Of Results From Two Spent Fuel Sabotage Source Term Experiments , 2000 .

[60]  C. D’ercole,et al.  Laparoscopic management of malignant ovarian cysts: a 78-case national survey. Part 2: Follow-up and final treatment. , 1995, European journal of obstetrics, gynecology, and reproductive biology.

[61]  H. Koh,et al.  HPLC and GC-MS screening of Chinese proprietary medicine for undeclared therapeutic substances. , 2001, Journal of pharmaceutical and biomedical analysis.

[62]  Differentiation of Malicious and Non-Malicious Fire-Alarm Calls Using Multidimensional Scaling , 1983, Perceptual and motor skills.

[63]  G. B. Varnado,et al.  Vulnerability analysis of manufacturing systems: A systematic method for protecting industrial production from disruption , 1991 .

[64]  Emmanuel Okechukwu Ogbonna,et al.  Exploring Service Sabotage , 2002 .

[65]  R. P. Sandoval,et al.  Experimental data base for estimating the consequences from a hypothetical sabotage attack on a spent fuel shipping cask , 1986 .

[66]  S. Valtier,et al.  Effects of Stealth adulterant on immunoassay testing for drugs of abuse. , 2001, Journal of analytical toxicology.

[67]  W. L. Delvin,et al.  Effectiveness evaluation of insider protection programs , 1990 .

[68]  L. Graham Inside a Japanese Transplant , 1993 .

[69]  C. B. Stunkel,et al.  Target assignment for security officers to K targets (TASK) , 1983 .

[70]  F. L. Fricke,et al.  Analysis of glass in product tampering investigations by inductively coupled plasma atomic emission spectrometry with a hydrofluoric acid resistant torch , 1989 .

[71]  J. Cody,et al.  The effects of adulterating agents on FPIA analysis of urine for drugs of abuse. , 1993, Journal of analytical toxicology.

[72]  W. K. Paulus Vulnerability assessment using two complementary analysis tools , 1993 .

[73]  J. J. Lim,et al.  Modeling adversary tampering of accounts and records in a material accounting system , 1979 .

[74]  A. Wu,et al.  Adulteration of urine by "Urine Luck". , 1999, Clinical chemistry.

[75]  Use of fourier transform near-infrared reflectance spectroscopy for rapid quantification of castor bean meal in a selection of flour-based products. , 2000, Journal of agricultural and food chemistry.

[76]  L. D. Chapman Application of SAFE to an operating reactor , 1979 .

[77]  T. J. Connolly,et al.  Analyzing the reprocessing decision: plutonium recycle and nuclear proliferation. Final report , 1977 .

[78]  N. Sbirrazzuoli,et al.  Use of differential scanning calorimetry (DSC) as a new technique for detection of adulteration in honeys. 1. Study of adulteration effect on honey thermal behavior. , 2002, Journal of agricultural and food chemistry.

[79]  U. Taitelman,et al.  Postmortem digoxin-like immunoreactive substances (DLIS) in patients not treated with digoxin , 1999, Human & experimental toxicology.

[80]  J. Maltby,et al.  Use of refractometry to identify opioid-containing solutions , 1994, Canadian journal of anaesthesia = Journal canadien d'anesthesie.

[81]  J. M. Boudreau,et al.  Reactor sabotage vulnerability and vital-equipment identification , 1982 .

[82]  H. Fung,et al.  Use of refractometers to detect controlled-substance tampering. , 1991, American journal of hospital pharmacy.

[83]  S. Salamone,et al.  Determination of five abused drugs in nitrite-adulterated urine by immunoassays and gas chromatography-mass spectrometry. , 1998, Journal of analytical toxicology.

[84]  M. Ashburn,et al.  Respiratory-related critical events with intravenous patient-controlled analgesia. , 1994, The Clinical journal of pain.

[85]  C. A. Russell,et al.  Nuclear plant security in the 1980's and 1990's: threat reality and consequence , 1979 .

[86]  C. Rieffe,et al.  Handelen op basis van Theory of Mind-kennis bij kinderen uit het autisme-spectrum , 2001 .

[87]  J. Foesch,et al.  Insider protection technology developments , 1994 .

[88]  S. Valtier,et al.  Analysis of morphine and codeine in samples adulterated with Stealth. , 2001, Journal of analytical toxicology.

[89]  D. Engi,et al.  Safeguards Automated Facility Evaluation (SAFE) methodology , 1978 .

[90]  Judy L. Walker,et al.  SNAP operating system reference manual , 1982 .

[91]  R. P. Sandoval Improved safety assessment of spent fuel transportation in extreme environments , 1981 .

[92]  Narang Ap,et al.  Arsenic adulteration in Indian tobacco , 1995 .

[93]  G. B. Varnado,et al.  A systematic method for protecting industrial production from sabotage , 1988 .

[94]  R. P. Sandoval An assessment of the response of spent fuel transports to malevolent acts , 1984 .

[95]  C. Barbas,et al.  Development and validation of a capillary electrophoresis method for direct measurement of isocitric, citric, tartaric and malic acids as adulteration markers in orange juice. , 2000, Journal of chromatography. A.

[96]  K. Ash,et al.  Adulterants causing false negatives in illicit drug testing. , 1988, Clinical chemistry.

[97]  Leon D. Chapman Fixed-Site Physical Protection System Modeling , 1975 .

[98]  L. Arnold,et al.  Assessing Professional Behavior: Yesterday, Today, and Tomorrow , 2002, Academic medicine : journal of the Association of American Medical Colleges.

[99]  Anthony G Heyes PRA in the nuclear sector: Quantifying human error and human malice , 1995 .

[100]  G. Williams,et al.  Continuous Intravenous Insulin Infusion in the Management of Brittle Diabetes: Etiologic and Therapeutic Implications , 1985, Diabetes Care.

[101]  Employee sabotage in the workplace: a biopsychosocial model. , 1996, Journal of forensic sciences.

[102]  D. Jack UNDERSTANDING WOMEN'S ANGER: A DESCRIPTION OF RELATIONAL PATTERNS , 2001, Health care for women international.

[103]  S. H. Scott Evaluation of physical protection elements for interior applications , 1983 .

[104]  Lih-Jenn Shyr,et al.  Projected Consequence for Potential Sabotage Events Related to Spent Fuel Shipments , 1999 .

[105]  K. Anchor,et al.  Psychotherapy sabotage revisited: the better half of individual psychotherapy. , 1976, Journal of clinical psychology.

[106]  R. C. Hall Path enumeration program (ENUMPTH) for physical protection effectiveness evaluation , 1978 .

[107]  H. A. Bennett A Security Force-Adversary Engangement Simulation , 1975 .

[108]  W. Diven,et al.  Adult respiratory distress syndrome associated with epidural fentanyl infusion , 1994, Critical Care Medicine.

[109]  L. D. Chapman Assessment of methods for evaluating adequacy of physical protection systems , 1980 .

[110]  W. K. Paulus Neutralization and system effectiveness , 1988 .

[111]  N. Ogrinc,et al.  Determination of authenticity, regional origin, and vintage of Slovenian wines using a combination of IRMS and SNIF-NMR analyses. , 2001, Journal of agricultural and food chemistry.

[112]  M. Phillips,et al.  Evaluation of the Alcopatch, a transdermal dosimeter for monitoring alcohol consumption. , 1995, Alcoholism, clinical and experimental research.

[113]  A. E. Winblad The SAVI vulnerability assessment model , 1987 .

[114]  Paul E. Spector,et al.  Relationships of Work Stressors with Aggression, Withdrawal, Theft and Substance Use: An Exploratory Study , 1992 .

[115]  Robin J. Miner,et al.  A network modeling and analysis technique for the evaluation of nuclear safeguards systems effectiveness , 1978, SIML.

[116]  I. G. Waddoups,et al.  Safeguards and security benefits of project straight-line , 1995 .

[117]  Xin Yao,et al.  Why more choices cause less cooperation in iterated prisoner's dilemma , 2001, Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No.01TH8546).

[118]  S. D. Davidson Ward,et al.  Frequency, causes, and outcome of home ventilator failure. , 1998, Chest.

[119]  D. J. Huberty,et al.  Sabotaging siblings: an overlooked aspect of family therapy with drug dependent adolescents. , 1986, Journal of psychoactive drugs.

[120]  E. Domínguez,et al.  Metal contamination in illicit samples of heroin. , 1999, Journal of forensic sciences.

[121]  Roger G. Johnston,et al.  Vulnerability assessment of passive tamper-indicating seals , 1995 .

[122]  Barrett B. Parsons,et al.  Tamper and Radiation Resistant Instrumentation for Safeguarding Special Nuclear Material , 1977, IEEE Transactions on Nuclear Science.

[123]  G. Govindan,et al.  A convenient method for the determination of the quality of goldenseal. , 2000, Fitoterapia.

[124]  T. Murphy,et al.  Investigation of nitrite adulteration on the immunoassay and GC-MS analysis of cannabinoids in urine specimens. , 2000, Journal of analytical toxicology.

[125]  D. D. Wilkey Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities , 1995 .

[126]  G. B. Varnado,et al.  Safeguards system effectiveness modeling , 1976 .

[127]  K. Ferslew,et al.  Capillary ion electrophoresis of endogenous anions and anionic adulterants in human urine. , 2001, Journal of forensic sciences.

[128]  I. J. Sacks,et al.  Procedure for the assessment of material control and accounting systems , 1978 .