Chapter Overview
Infectious disease informatics is an emerging field that studies data collection, sharing, modeling, and management issues in the domain of infectious diseases. This chapter provides an overview of this field with specific emphasis on the following two sets of topics: (a) the design and main system components of an infectious disease information infrastructure, and (b) spatio-temporal data analysis and modeling techniques used to identify possible disease outbreaks. Several case studies involving real-world applications and research prototypes are presented to illustrate the application context and relevant system design and data modeling issues.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ben-Hur, A., Horn, D., Siegelmann, H.T., and Vapnik, V. (2001). “Support Vector Clustering,” Journal of Machine Learning Research, 2, 125–137.
Bennett, K.P. and Campbell, C. (2000). “Support Vector Machines: Hype or Hallelujah?” SIGKDD Explorations, 2(2), 1–13.
Brauer, F. and Castillo-Chàvez, C. (2001). Mathematical Models in Population Biology and Epidemiology, Springer.
Bravata, D., McDonald, K., Smith, W., Rydzak, C., Szeto, H., and Buckerdge, D. (2004). “Systematic review: Surveillance Systems for Early Detection of Bioterrorism-Related Diseases,” Annals of Internal Medicine, 140, 910–922.
Buehler, J., Hopkins, R., Overhage, J., Sosin, D., and Tong, V. (2004). “Framework for Evaluating Public Health Surveillance Systems for Early Detection of Outbreaks: Recommendations from the CDC Working Group,” Morbidity and Mortality Weekly Report, 53(RR–5), 1–13.
Chang, M., Glynn, M., and Groseclose, S. (2003). “Endemic, Notifiable Bioterrorism-related Diseases, United States, 1992–1999,” Emerging Infectious Diseases, 9(5), 556–564.
Chau, P. and Hu, P. (2004). “Technology Implementation for Telemedicine Programs,” Communications of the ACM, 47(2), 87–92.
Clemons, E. and Row, M. (1993). “Limits to Interfirm Coordination Through Information Technology: Results of a Field Study in Consumer Packaged Goods Distribution,” Journal of Management Information Systems, 10(1), 73–95.
Damianos, L., Ponte, J., Wohlever, S., Reeder, F., Day, D., Wilson, G., and Hirschman, L. (2002). “MiTAP for Bio-Security: A Case Study,” AI Magazine, 23(4), 13–29.
Delone, W. and Mclean, E. (1992). “Information Systems Success: the Quest for the Dependent Variable,” Information Systems Research, 3(1), 60–95.
Eidson, M. (2001). “Neon Needles in A Haystack: The Advantages of Passive Surveillance for West Nile Virus,” in White, D.J. and Morse, D.L., (Ed.), West Nile Virus: Detection, Surveillance, and Control, pages 38–53. New York Academy of Sciences, New York.
Eidson, M., Miller, J., Kramer, L., Cherry, B., and Hagiwara, Y. (2001). “Dead Crow Densities and Human Cases of West Nile Virus, New York State, 2000,” Emerging Infectious Diseases, 7, 662–664.
Fichman, R. and Kemerer, C. (1999). “The Illusory Diffusion of Innovation: An Examination of Assimilation Gaps,” Information Systems Research, 10(3), 255–275.
Goldsmith, J., Blumenthal, D., and Rishel, W. (2003). “Federal Health Insurance Policy: A Case of Arrested Development,” Health Affairs, 22(4), 44–55.
Gotham, I., Eidson, M., White, D., Wallace, B., Chang, H., Johnson, G., Napoli, J., Sottolano, D., Birkhead, G., Morse, D., and Smith, P. (2001). “West Nile virus: A Case Study in How New York State Health Information Infrastructure Facilitates Preparation and Response to Disease Outbreaks,” Journal of Public Health Management and Practice, 7(5), 75–86.
Gotham, I.J., Smith, P.S., Birkhead, G.S., and Davisson, M.C. (2002). “Policy Issues in Modern Surveillance,” in O’Carroll, P., Yasnoff, W.A., Ward, M.E., Rubin, R., and Ripp, L., (Ed.), Public Health Informatics and Information Systems, chapter 25. Springer-Verlag.
Guptill, S.C., Julian, K.G., Campbell, G.L., Price, S.D., and Marfin, A.A. (2003). “Early-season Avian Deaths from West Nile Virus as Warnings of Human Infection,” Emerging Infectious Diseases, 9, 483–484.
Hyman, J. and LaForce, T. (2003). “Modeling the Spread of Influenza among Cities,” in Banks, H. and Castillo-Chàvez, C, (Ed.), Bioterrorism: Mathematical Modeling Applications in Homeland Security, chapter 10, pages 211–236. Society for Industrial and Applied Mathematics.
Jacquez, G.M., Grimson, R., Waller, L.A., and Wartenberg, D. (1996). “The Analysis of Disease Clusters, Part II: Introduction to techniques,” Infection Control and Hospital Epidemiology, 17(6), 385–397.
Jain, A., Murty, M., and Flynn, P. (1999). “Data Clustering: A Review,” ACM Computing Surveys, 31(3), 264–323.
Johnson, G.D., Eidson, M., Schmit, S., Kulldorff, M., and Ellis, A. (2004). “Geographic Prediction of Human Onset of West Nile Virus Using Dead Crow Clusters: A Quantitative Assessment of Year 2002 Data in New York State,” Technical Report (in submission), New York State Department of Health.
Julian, K.G., Eidson, M., Kipp, A.M., Weiss, E., Petersen, L.R., and Miller, J.R. (2002). “Early Season Crow Mortality as A Sentinel for West Nile Virus Disease in Humans, Northeastern United States,” Vector Borne Zoonotic Disease, 2, 145–155.
Kargupta, H., Liu, K., and Ryan, J. (2003). “Privacy Sensitive Distributed Data Mining from Multi-Party Data,” in Proceedings of the first NSF/NIJ Symposium on Intelligence and Security Informatics, Springer LNCS 2665, pages 336–342.
Kay, B., Timperi, R., Morse, S., Forslund, D., McGowan, J., and O’Brien, T. (1998). “Innovative Information-Sharing Strategies,” Emerging Infectious Diseases, 4(3), 465–466.
Kulldorff, M. (1997). “A Spatial Scan Statistic,” Communications in Statistics: Theory and Methods, 26(6), 1481–1496.
Kulldorff, M. (2001). “Prospective Time Periodic Geographical Disease Surveillance Using A Scan Statistic,” Journal of the Royal Statistical Society: Series A, 166(1), 61–72.
Levine, N. (2002). CrimeStat: A Spatial Statistics Program for the Analysis of Crime Incident Locations (v 2.0). Ned Levine & Associates, Houston, TX, and the National Institute of Justice, Washington, DC.
Mazumdar, J. (1999). An Introduction to Mathematical Physiology and Biology, second edition, Cambridge University Press.
McNeill, W.H. (1976). Plagues and Peoples, Doubleday, New York.
Mostashari, R, Kulldorff, M., Hartman, J., Miller, J., and Kulasekera, V. (2003). “Dead Bird Clusters as an Early Warning System for West Nile Virus Activity,” Emerging Infectious Diseases, 9(6), 641–646.
Ohno-Machado, L., PS, P.S. Silveira, and Vinterbo, S. (2004). “Protecting Patient Privacy by Quantifiable Control of Disclosures in Disseminated Databases,” International Journal of Medical Informatics, 73(7–8), 599–606.
Patil, G.P. and Tailie, C. (2004). “Upper Level Set Scan Statistics for Deteching Arbitrarily Shaped Hotspots,” Environmental and Econological Statistics, 11(2), 183–197.
Pinner, R., Rebmann, C., Schuchat, A., and Hughes, J. (2003). “Disease Surveillance and the Academic, Clinical, and Public Health Communities,” Emerging Infectious Diseases, 9(7), 781–787.
Rogcrson, P. (1997). “Surveillance Systems for Monitoring the Development of Spatial Patterns,” Statistics in Medicine, 16, 2081–2093.
Ruiz, M.O., Tedesco, C., McTighe, T.J., Austin, C., and Kitron, U. (2004). “Environmental and Social Determinants of Human Risk During a West Nile Virus Outbreak in the Greater Chicago Area,” International Journal of Health Geographics, 3(8).
Siegrist, D. (1999). “The Threat of Biological Attack: Why Concern Now?,” Emerging Infectious Diseases, 5(4), 505–508.
Sonesson, C. and Bock, D. (2003). “A Review and Discussion of Prospective Statistical Surveillance in Public Health,” Journal of the Royal Statistical Society Series A, 166, 5–12.
Tax, D. and Duin, R. (2004). “Supper Vector Data Description,” Machine Learning, 54, 45–66.
Vapnik, V. (1998). Statistical Learning Theory, John Wiley and Sons, Inc.
Wonham, M., de Camino-Beck, T., and Lewis, M. (2004). “An Epidemiological Model for West Nile Virus: Invasion Analysis and Control Applications,” Proceedings of Royal Society: Biological Sciences, 271(1538), 501–507.
Wylie, J.E. and Mineau, G.P. (2003). “Biomedical Databases: Protecting Privacy and Promoting Research,” Trends in Biotechnology, 21(3), 113–116.
Zeng, D., Chang, W., and Chen, H. (2004). “A Comparative Study of Spatio-Temporal Data Analysis Techniques in Security Informatics,” in Proceedings of the 7th IEEE International Conference on Intelligent Transportation Systems, pages 106–111.
Zhu, B., Ramsey, M., and Chen, H. (2000). “Creating a Large-scale Content-based Airphoto Image Digital Library,” IEEE Transactions on Image Processing, Special Issue on Image and Video Processing for Digital Libraries, 9(1), 163–167.
Suggested Readings
P. O’Carroll, W. Yasnoff, E. Ward, L. Ripp, and E. Martin, eds. 2002. Public Health Informatics and Information Systems. Springer. 824 pages.
H.T. Banks and C. Castillo-Chavez, eds. 2003. Bioterrorism: Mathematical Modeling Applica-tions in Homeland Security. The Society for Industrial and Applied Mathematics. 240 pages.
F. Brauer and C. Castillo-Chàvez. 2001. Mathematical Models in Population Biology and Epidemiology. Springer. 416 pages.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
Zeng, D., Chen, H., Lynch, C., Eidson, M., Gotham, I. (2005). Infectious Diseaxe Informatics and Outbreak detection. In: Chen, H., Fuller, S.S., Friedman, C., Hersh, W. (eds) Medical Informatics. Integrated Series in Information Systems, vol 8. Springer, Boston, MA. https://doi.org/10.1007/0-387-25739-X_13
Download citation
DOI: https://doi.org/10.1007/0-387-25739-X_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24381-8
Online ISBN: 978-0-387-25739-6
eBook Packages: MedicineMedicine (R0)