Assessing and Addressing US Health Security Risks

نویسنده

  • Crystal R. Watson
چکیده

T here are a range of worrisome threats to US health and national security—worrisome because they have the potential to cause widespread disruption and damage to the public's health and to the US and global economies. These threats include major natural hazards like large earthquakes and hurricanes and infectious disease pandemics ; accidental threats, including technological failures, such as nuclear power plant disasters like Three Mile Island and Fukushima; and intentional attacks by thinking adversaries , including terrorist use of biological, chemical, or nuclear/radiological weapons. Securing the United States against threats to health and security inherently involves tradeoffs. Not every health security–related threat carries the same level of risk to the country, and not every government program addressing those threats can have top priority. So, with many and varied health security threats and with limited resources to address them, it is important for the United States to have a clear process for determining risks and tradeoffs in a way that affords the public the most protection we can offer. Utilizing our best risk assessment methodologies is an important part of determining risk and setting national priorities. Risk assessment is useful both for understanding the range of possible health security challenges the country might face (eg, possible disaster/outbreak scenarios) and for gathering data and knowledge about threats, which may help security and public health experts prepare and respond if something does occur. It involves a systematic evaluation of the likelihood (probability) of an event occurring, as well as of the consequences that result when a disaster does happen (eg, illnesses, injuries, deaths, and economic disruption). A purposeful risk assessment process can help leaders compare the severity of different types of health security risk and can inform decisions about where funding and resources are most needed. Risk assessment allows decision makers to view a wider range of risk scenarios and examine them systematically. Without a formal process to assess risk, decision makers often rely on personal experience, which is inherently limited (we are only human after all). Conducting a risk assessment that systematically compares likelihood, vulnerability, and consequences for different scenarios helps reduce individual and group biases, which can prevent decision makers from seeing the full picture of risk before decisions are made. Risk assessment is currently carried out by a variety of federal, state, and local government agencies for important but varied and delimited purposes. For example, the Department of Homeland …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Assessing Long-term Security of Electricity Supply and the Role of Renewable Energy: A Probabilistic Generation Portfolio Analysis Approach

A modelling tool is applied to assess long-term energy security in the Australian National Electricity Market (NEM). The potential role of renewable energy in increasing the security of electricity supply is examined, with a focus on two aspects: price risk and physical supply risk. Optimised portfolios with no renewable energy (RE) are found to have a diversity index suggestive of a highly con...

متن کامل

Community Health Centers in an Era of Health System Reform and Economic Downturn: Prospects and Challenges

This Policy Brief examines the role of health centers in the U.S. health care system, assessing their current and future roles in an era of both great promise and challenge. On one hand, government is poised perhaps more sharply than any time in nearly a generation to undertake a comprehensive effort at national health reform, addressing not only coverage but also access, quality, prevention, a...

متن کامل

MetaStar Security Risk Assessments: HIPAA and Meaningful Use.

• Vulnerability identification—Identify system’s weaknesses. • Control analysis—Analyze controls in place to prevent vulnerabilities from being exploited. • Likelihood determination—Determine probability of a vulnerability being exploited. • Impact analysis—Analyze impact on organization should a vulnerability be exploited. • Risk determination—Develop prioritized listing of risks (ie, gaps in ...

متن کامل

One Health – a strategy for resilience in a changing arctic

The circumpolar north is uniquely vulnerable to the health impacts of climate change. While international Arctic collaboration on health has enhanced partnerships and advanced the health of inhabitants, significant challenges lie ahead. One Health is an approach that considers the connections between the environment, plant, animal and human health. Understanding this is increasingly critical in...

متن کامل

Online Social Media Networking and Assessing Its Security Risks

Over the past several years, we have seen the emergence of new paradigm in the Internet, online social media networking, which provide Internet users to communicate and collaborate with family, friends, social groups, and other community by using social media tools (i.e., Twitter, Facebook, MySpace, and Youtube). The use of social media for communication is becoming more prevalent worldwide, wi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2017