0% found this document useful (0 votes)
65 views5 pages

Surveillance DSC 1

Uploaded by

reenarai0009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
65 views5 pages

Surveillance DSC 1

Uploaded by

reenarai0009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 5
ow ys of survaitance The use of epidemiological toc 1 t pic c s in confli cted «es» Populations: c makers Table of Contents Introduction pldericiogy in ehica eevee in data D. Need for spidenvlogic E.Sunveys- Introduction Descristion of ‘sampling methods 6. Suneye = Samptirg fervor bias, accuracy, Precision, & sample H. Surveys «Resources required fo surveys Surveys - Crtieuing survey reports Surveitance - when 0.do surveilonce K. Survetiance - Method 1. Comparison with otner cate calection metiode 2. Meroiity survellance 3. Morality survelance 4. Types of surveillance 5. Case Sefintions 5. Data ow Surveliance - ‘Common problems M. Programme data N, Rapid assessment ©. Mortality ~ Indicators and ther Mortality Data Q. Mortality - Interpretation and ‘action ‘oniictIshim.ac.ukipage_75.him Types of surveillance (go to Outline) Passive surveillance Passive surveillance often gathers disease data from all potential reporting health care workers, Health authorities do not stimulate reporting by reminding health care wor to report disease nor providing feedback to individual health workers, Passive surveillance is the most common type of surveillance in humanitarian emergencies, Most surveillance for communicable diseases is passive. The surveillance coordinator may provide training to health workers in how to complete the surveillance forms, and may even send someone to periodically collect forms from health facil-ies, But litte attention is given to individual health workers who report the information. ‘The data requested of each health worker is minimal. Nonetheless, passive surveillance is often incomplete because there are few incentives for health workers to report. This figure is an example of data gathered by passive surveillance from the hospitals run by one organization: Number of landmine victims per week, presenting to ICRC supported hospitals in Kosovo, June 2000 - March 2001 Number of victims es 8ee8 June July Aug. Sept Oct Nov. Dec Jan Feb. 2000 eee 2001 Itis clear that the number of cases declined between July 2000 and February 2001. Active surveillance ‘An active surveillance system provides stimulus to health care workers in the form of individual feedback or other incentives. Often reporting frequency by individual health workers is monitored; health workers who consistently fail to report or complete the forms incorrectly are provided specific feedback to improve their performance. There may also be incentives provided for complete reporting. Active surveillance requires substantially more time and resources and Is therefore less ‘commonly used in emergencies. But it is often more complete than passive surveillance. It is often used if an outbreak has begun or is suspected to keep close track of the rr 5, 10060 A, Formulating {AB, Dissemination ane nicl Jehim ac. ukipage_75.him numba yP9s of surveltance of cases. Community health workers may be asked to do active case finding in the community in order to detect those patients who may not come to health faci for treatment, Sentinel surveillance Instead of attemating to gather surveillance data from all health care workers, # sentinel! Surveillance system selects, either randomly or intentionally, a small group of health workers from whom to gather data. These health workers then receive greater attention from health authorities than would be possible with universal surveillance Sentinel surveillance also requires more time and resources, but can often produce more Getailed data on cases of illness because the health care workers have agreed to participate and may receive incentives. It may be the 5 of surveillance more intensive Investigation of each case is necessary to collect the necessary data. For example, sentinel influenza surveillance in the United States collects nasopharyng ‘swabs from each patient at selected sites to identify the type of influenza virus. Collection of such data from all health workers would not be possible This figure is an example of data gathered by sentinel sites in Afghanistan Sentinel surveillance - measles cases from 328 WHO sentinel sites in Afghanistan, January —December 2001 From this figure, we can see that measles cases were distributed throughout Afghanistan in 2003. (6) 2009 - London School of Hygiene and Tropical Medicine 22 ® Study.com € Business Courses / Business Law: Help and Review / The Legal Environment: Help and Rev What is Surveillance? video # Quit ‘ourse 29K views Author Instructor Jack Woerner Janell Blanco View bic View bio Explore surveillance, Learn the definition of surveillance and understand its rent techniques with examples, Discover the various methods of surveillance. Updated: 02/24/2022 Table of Contents > What is Surveill > Methods of Surveillance > Surveillance Techniques > Lesson Summary What is Surveillance? What is surveillance? A general surveillance definition is the monitoring of individuals or observing something in order to gain information. Surveillance is used for a number of reasons and by numerous objectives. The surveillance meaning can be different depending on who Is employing surveillance methods. Surveillance can be used to protect private property, gain information on a certain objective, or find evidence on a person or organization. Surveillance is most commonly used in law enforcement forcement and government agencies use operations or in the military. Law er surveillance to detect, prevent, and investigate crimes, Individuals or agencies can use sophisticated technology to conduct surveillance or surveillance can be as basic as physical observation. Surveillance technology can include high-tech cameras, audio equipment, veillance, One of the most ‘computer hacking, or it can involve in-person common, and traditional, methods of surveillance is to physically follow and watch a target ps /istuy,comearnlesson!survellance-overiew techniques Nin! 25, 010M Survetiance | Defiton, och (Observation rowers can he used to monitor ‘tity other than criminal actity such as fre towers con be used to survey for wid forest fires, Surveillance Techniques There are different surveillance techniques that people or organizations can Utilize to investigate suspicious activities Direct Surveillance Direct surveillance monitors targets and individuals in a covert fashion in public places. This does not include any surveillance done on private property. This technique can utilize a wide range of technology in order to observe individual activity, record private information, and track their movements, Direct surveillance can also include gathering evidence from public areas or interviewing people to gain more information on a suspect. For example, police detectives listen and record a conversation between suspects at a local park Preconstructive Surveillance Preconstructive surveillance involves the observation of the general public to scan for suspicious activity. A common preconstructive surveillance tool in today's world is the use of multiple closed-circuit televisions (CCTVs). This style of surveillance is very public and not covert which is one of the drawbacks because suspects can frame activity to avoid public surveillance. However, this technique can also monitor a wide range of public areas and gather information from a large amount of population. Preconstructive surveillance can also serve more than just as a surveillance technique but act as a deterrent for future crime or malicious activity ‘ntos/study.comearnesson/survellance-overvew-techniques him! ‘econstructive Surveillance Cer ee aaetunnes vetoes rete fee investigati on investigators wil record data, information, ard evheanoe _nroush a Preconstrucive surveilance technique, Later vin investigators believe seme level of suspicious activity occurred, they can look over the had sare tN® data to See if anything was missed. For example, ira suspect had stolen something from a gas station store and Investigators could not find enough information through reconstructive methods they can go back to Iateh footage captive ol thaixas station's CCtY Gini gras Fed WIGHT criminal fouched or missing inventory to link the suspect tothe crime Methods of Surveillance in the world of advanced technology and fast information, there are countless methods of surveillance to support investigations. Satellites Today, satellites are arguably the most advanced surveilance technology, Satellites are launched into Earth's orbit to capture images anywhere on Earth and send the information back to Earth, Satellites can be used to monitor large areas with very specific details, They can detect body heat signatures, weapon depots, drug storage, or a large movement of humans. The drawback of satellites is that they are very expensive and can only capture a certain area for 50 long before the Earth rotates, or inclement weather blocks their visual Video Cameras Video cameras are one of the most common forms of technology to conduct surveillance, Cameras can be in a fixed position to capture a certain area over a long period of time, or they can be mobile so investigators can use them If their target is on the move. Video cameras record the entire scene and save the data on a hard drive that can be used as direct evidence linking a suspect toa crime in the court of law. Video cameras can be public like CCTVs or Covert such as hidden cameras, ‘ntps fst comesrvesson/surveltance-overew techniques. nim!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy