• Prehosp Disaster Med · Sep 2005

    Symptom-based, algorithmic approach for handling the initial encounter with victims of a potential terrorist attack.

    • Italo Subbarao, Christopher Johnson, William F Bond, Howard A Schwid, Thomas E Wasser, Greg A Deye, and Keith K Burkhart.
    • Department of Emergency Medicine, Lehigh Valley Hospital and Health Network, Allentown, Pennsylvania, USA. italo_subbarao@yahoo.com
    • Prehosp Disaster Med. 2005 Sep 1;20(5):301-8.

    ObjectivesThis study intended to create symptom-based triage algorithms for the initial encounter with terror-attack victims. The goals of the triage algorithms include: (1) early recognition; (2) avoiding contamination; (3) early use of antidotes; (4) appropriate handling of unstable, contaminated victims; and (5) provisions of force protection. The algorithms also address industrial accidents and emerging infections, which have similar clinical presentations and risks for contamination as weapons of mass destruction (WMD).MethodsThe algorithms were developed using references from military and civilian sources. They were tested and adjusted using a series of theoretical patients from a CD-ROM chemical, biological, radiological/nuclear, and explosive victim simulator. Then, the algorithms were placed into a card format and sent to experts in relevant fields for academic review.ResultsSix inter-connected algorithms were created, described, and presented in figure form. The "attack" algorithm, for example, begins by differentiating between overt and covert attack victims (A covert attack is defined by epidemiological criteria adapted from the Centers for Disease Control and Prevention (CDC) recommendations). The attack algorithm then categorizes patients either as stable or unstable. Unstable patients flow to the "Dirty Resuscitation" algorithm, whereas, stable patients flow to the "Chemical Agent" and "Biological Agent" algorithms. The two remaining algorithms include the "Suicide Bomb/Blast/Explosion" and the "Radiation Dispersal Device" algorithms, which are inter-connected through the overt pathway in the "Attack" algorithm.ConclusionA civilian, symptom-based, algorithmic approach to the initial encounter with victims of terrorist attacks, industrial accidents, or emerging infections was created. Future studies will address the usability of the algorithms with theoretical cases and utility in prospective, announced and unannounced, field drills. Additionally, future studies will assess the effectiveness of teaching modalities used to reinforce the algorithmic approach.

      Pubmed     Copy Citation     Plaintext  

      Add institutional full text...

    Notes

     
    Knowledge, pearl, summary or comment to share?
    300 characters remaining
    help        
    You can also include formatting, links, images and footnotes in your notes
    • Simple formatting can be added to notes, such as *italics*, _underline_ or **bold**.
    • Superscript can be denoted by <sup>text</sup> and subscript <sub>text</sub>.
    • Numbered or bulleted lists can be created using either numbered lines 1. 2. 3., hyphens - or asterisks *.
    • Links can be included with: [my link to pubmed](http://pubmed.com)
    • Images can be included with: ![alt text](https://bestmedicaljournal.com/study_graph.jpg "Image Title Text")
    • For footnotes use [^1](This is a footnote.) inline.
    • Or use an inline reference [^1] to refer to a longer footnote elseweher in the document [^1]: This is a long footnote..

    hide…