Back to Journals » Journal of Multidisciplinary Healthcare » Volume 16

Insights from Evidence-Based Medicine Method for Building Security Systems Against Terrorist Attacks in Hospitals

Authors Chen G, Jin G

Received 17 October 2023

Accepted for publication 8 December 2023

Published 19 December 2023 Volume 2023:16 Pages 4133—4137

DOI https://doi.org/10.2147/JMDH.S426166

Checked for plagiarism Yes

Review by Single anonymous peer review

Peer reviewer comments 3

Editor who approved publication: Dr Scott Fraser



Guochen Chen, Gaofeng Jin

School of Criminology, People’s Public Security University of China, Beijing, People’s Republic of China

Correspondence: Guochen Chen, School of Criminology, People’s Public Security University of China, Beijing, People’s Republic of China, Email [email protected]

Abstract: Hospitals have become soft targets for terrorism, with increasing terrorist attacks observed in the last two decades. Not only the counter-terrorism and law enforcement agencies but the hospitals also need to be actively involved and undertake the responsibility of safeguarding hospital security by establishing an effective security system. Evidence-based medicine emphasizes the significance of scientific evidence, and in practice, research methods for the generation, collection, and utilization of evidence may offer new insights to overcome the issue of terrorism. The present study discusses the potential application of methods in evidence-based medicine for developing security systems against terrorist attacks in hospitals. First, hospitals can use simulated scenarios of terrorist attacks to generate evidence. For example, combining virtual technology with virtual reality technology and selecting appropriate algorithms or models to generate evidence. Second, they can apply tabletop exercises to propose measures, as a means of collecting evidence. The collection of data can be obtained through questionnaires or interviews. Some biological methods, such as collecting salivary markers of acute stress (α-amylase and secretory immunoglobulin A), can also be used to assess emotional states. Third, they can use the collected evidence to practically test and refine the implemented measures. To verify the effectiveness and feasibility of the formulated solutions in real-life scenarios, simulations, models, drills, and similar methods can be used. This approach may provide new perspectives for the development of hospital security systems.

Keywords: hospital security against terrorist attacks, security system development, evidence-based medicine method

Introduction

Hospitals are instrumental in providing emergency medical assistance in the face of terrorist attacks.1 However, their counter-terrorism security systems exhibit inherent limitations, making them soft targets of an increasing number of terrorist attacks.2 In a terrorist attack on a maternity hospital in Kabul, the capital city of Afghanistan, in May 2020, 16 pregnant women, two newborns, and one healthcare worker were killed and over 100 people were injured, sparking international protests and condemnation.3 Moreover, terrorist attacks cause fear and anxiety, disrupt essential healthcare services, and subsequently attract global media attention, making hospitals and medical facilities potential targets for terrorism.4

A review of data from the Global Terrorism Database (GTD) for the period 1970–2020 with “hospital” as the search term revealed the total number of terrorist attacks against hospitals as 1371. Recent studies indicate a significant increase in the number of terrorist attacks on medical facilities in the last two decades. Although relatively rare, secondary attacks on hospitals should also be taken seriously.5 Hospitals have been targeted by terrorists in every inhabited continent except Australia, and approximately 61 countries have witnessed terrorist attacks against hospitals, making the protection of hospitals an international security concern.6 To counter the increasing threat of terrorism,7 hospitals must establish security systems for safeguarding patients, healthcare personnel, and their facilities.

Although preventing terrorist attacks is the responsibility of counter-terrorism and law enforcement agencies, some countries have started establishing security systems for hospitals to prevent such attacks, which is a giant step forward. Dutch law requires hospitals to have a prevention plan for terrorist attacks, and some scholars have started to focus on the level of threat awareness and counter-terrorism preparedness in Dutch hospitals, providing specific recommendations.8 In the Philadelphia area of the United States, hospitals have developed an Incident Command System to combat terrorist attacks,9 formulated legal and policy measures against biological terrorism attacks,10 and started using analytical methods for terrorism risk prevention and control.11 Similarly, medical institutions in China have begun conducting emergency drills for preventing terrorist attacks.12,13 In Sichuan Province, a working mechanism for the “Specification for Anti-Terrorism Precaution has been established at Medical and Health Institutions”,14 and anti-terrorism emergency management models are being proposed.15

Everything flows and nothing stays. Despite the increasing awareness of security in medical institutions, the use of “Trojan horse” vehicles, such as trustworthy ambulances, to transport an improvised explosive device has emerged as a threat.16 The ever-changing methods of terrorist attacks make it challenging to strengthen hospital security systems for combating such attacks. Evidence-based medicine (EBM) method may offer a new perspective to the improvement of hospital security system construction.

EBM is a paradigm introduced in the 1990s,17 which emphasizes the significance of scientific evidence.18 This paradigm asserts that all medical interventions should be based on the latest and best scientific research results. It represents a set of research, methods, principles for the algorithms for clinical medicine, management guidelines, and sources of evidence.19 EBM paradigm aims to bring scientific rigor to clinical medical decision-making. Typically, EBM method involves three consecutive stages:20 The first stage is the generation of evidence through medical research, especially clinical trials. In the second stage, evidence is collected to develop clinical guidelines. The third stage involves the use of evidence in medical practice through the implementation of recommended guidelines.

These three stages offer valuable insights for establishing hospital counter-terrorism systems. Hospitals can create simulated scenarios of terrorist attacks to observe the response of healthcare professionals, thus generating evidence. Evidence generated in the real-world context is subjected to tabletop exercises to formulate solutions, which corresponds to the process of evidence collection. Finally, the solutions are placed back into the scenario system to validate whether they are effective in practice and can be transformed into policies, indicating the use of evidence.

Discussion

Generate Evidence: Creating Virtual Terrorist Attack Scenarios

Virtual terrorist attack scenarios can be established using virtual reality technology, which has been demonstrated to have strong potential for use in the medical field.21–23 Hospitals can create virtual terrorist attack scenarios and generate evidence using the following steps and methods:

  1. Clearly defining objectives and scenarios: A. The type of terrorist attack to be simulated should be identified (eg, the spread of anthrax in a biological terrorist attack). B. The location for the simulation, such as specific areas or rooms within the hospital, and the personnel prone to be affected should be determined.
  2. Developing simulation tools and materials: A. The virtual environment required for simulating the terrorist attack should be created using simulation software or virtual reality technology. B. Simulators, artificial wound models, special effects makeup, and other elements needed for the chosen attack scenario should be established. These scenarios can be based on data from the GTD or created to cater specific needs.
  3. Recruiting participants and conducting simulations: A. Healthcare professionals and other relevant personnel should be recruited to participate in the simulation. B. The virtual terrorist attack scenario should be established in the simulation environment, and the actual response and behavior of the healthcare professionals should be observed.

At this stage, it is necessary to integrate virtual technology with virtual reality technology in order to achieve more accurate simulation results. Regarding the selection of algorithms and models, existing relevant research can serve as a guide and be adjusted according to one’s own needs. Such as, it includes a model with three different situations: simulation, safety training, and preventive maintenance training.24 A framework called INTERVALES. This model aims to facilitate virtual and augmented environments and coordinate complex operations.25

This immersive virtual environment can provide evidence that is difficult to obtain in real-life scenarios—generating evidence.

Collecting Evidence: Analyzing and Deducting Data Generated

Once evidence is generated through the virtual scenarios, the first step is to simulate it by organizing, categorizing, and conducting desktop exercises on the data, observation records, and other information generated in the simulated terrorist attack scenarios. The collection of data can be done by administering a survey questionnaire to participants after the experiment in order to gather their feedback. Semi-structured interviews can also be conducted with participants to understand the challenges they face while navigating virtual environments.26 Some biological methods, such as collecting salivary markers of acute stress (α-amylase and secretory immunoglobulin A),27 can also be used to assess emotional states.

Evidence generated from the simulated scenarios is then compared with actual medical institutions or specific situations. In the real-world context, factors including the allocation of resources, personnel, equipment, and systems are considered to ensure that the solutions are applicable to real-life scenarios. Specific requirements of real-world scenarios, such as geographic location, population density, and the distribution of medical facilities, must also be considered because they can influence the selection and applicability of solutions. Finally, targeted measures should be developed, which should be practical, actionable, and directive. Undoubtedly, the adoption and analysis of all the aforementioned data require approval from medical ethics committees.

Using Evidence: Testing Effectiveness and Feasibility

To verify the effectiveness and feasibility of the formulated solutions in real-life scenarios, simulations, models, drills, and similar methods can be used. Counter-terrorism experts and scholars can be invited to analyze the validation results, identify potential weaknesses in the solutions, and make necessary adjustments and improvements.

The adjusted measures should be reintroduced into the virtual scenarios to confirm their effectiveness and feasibility. Response strategies should be frequently updated to ensure that they align with the evolving real-world requirements and conform to the latest and best scientific research results.

The above statement highlights the valuable insights gained from evidence-based medicine methods in developing a system to prevent terrorist attacks on hospitals. The selection and utilization of algorithms or models in each step, as well as data collection and the methods employed, should be thoroughly discussed in future research. In future research, the key and challenging aspect is to select and optimize models and algorithms in order to efficiently develop a set of equipment that can be readily utilized. This article presents inspiring viewpoints for discussion, aiming to provide guidance for future research.

Conclusions

Inspired by EBM methods, some hospitals have already started using virtual technologies and have achieved positive results.28,29 Security measures against terrorist attacks that are being used include equipping hospital entrances with metal detectors to prevent explosives from being carried inside, establishing police stations within hospitals, installing alarm systems in critical locations within hospitals to ensure rapid reinforcement notification during emergencies,30 radiological testing of the hospital’s air environment, and chemical testing of domestic water supplies; these measure can prevent terrorists from launching nuclear or biochemical attacks.31 While military-style protection for hospitals may pose logistical and financial challenges, proactively establishing hospital security systems32 is imperative to mitigate the risk of terrorist attacks. These practices may have a positive impact on the development of hospital security systems and serve as a valuable reference for other medical institutions worldwide to build security systems for combating terrorism.

Funding

This study was supported by the Fundamental Research Funds for the Central Universities, specifically the project titled “Research on Security Technology Systems and Applications for Preventing Terrorist Attacks in Key Units Based on Risk Assessment” (No. 2019JKF110).

Disclosure

Neither author had any personal, financial, commercial, or academic conflicts of interest in this work.

References

1. Cavaliere GA, Alfalasi R, Jasani GN, et al. Terrorist attacks against healthcare facilities: a review. Health Secu. 2021;5:546–550. doi:10.1089/hs.2021.0004

2. De Cauwer HG, Somville F. Health care organizations: soft target during COVID-19 pandemic. Prehosp Disaster Med. 2021;3:344–347. doi:10.1017/S1049023X2100025X

3. NetEase News. Afghanistan obstetrics and gynecology hospital attacked, 16 pregnant women shoot. Available from: https://www.163.com/dy/article/FCMF8IJ20515CLKO.html. Accessed October 3, 2023.

4. Britannica. History & Society, terrorism. Available from: https://www.britannica.com/topic/terrorism. Accessed October 1, 2023.

5. Schmeitz CTJ, Barten DG, van Barneveld KWY, et al. Terrorist attacks against emergency medical services: secondary attacks are an emerging risk. Prehosp Disaster Med. 2022;2:185–191. doi:10.1017/S1049023X22000140

6. McNeilly B, Jasani G, Cavaliere G, et al. The rising threat of terrorist attacks against hospitals. Prehosp Disaster Med. 2022;2:223–229. doi:10.1017/S1049023X22000413

7. Ulmer N, Barten DG, De Cauwer H, et al. Terrorist attacks against hospitals: world-wide trends and attack types. Prehosp Disaster Med. 2022;1:25–32. doi:10.1017/S1049023X22000012

8. Dennis GB, Maud J, Harald DC, et al. Threat awareness and counter-terrorism preparedness of Dutch hospitals: a cross-sectional survey [Preprint]. medRxiv. 2023. doi:10.1101/2023.10.14.23297038

9. Parrillo SJ, Baker MD. hospital response to terror: implementing the incident command system and NIMS in US hospitals. Med Res Terror Threats. 2010;65:31–36. doi:10.3233/978-1-60750-503-7-31

10. Addicott JF. Bioterrorism: examining American legal and policy readiness. Med Res Terror Threats. 2010;65:5–17. doi:10.3233/978-1-60750-503-7-5

11. Kaivo-Oja J. Systemic aspects of security technology in hospitals: combining STEEPVSWOT methodologies in risk analysis of hospitals. Med Res Terror Threats. 2010;65:97–116. doi:10.3233/978-1-60750-503-7-97

12. China Daily. Nan’an district people’s hospital conducts counter-terrorism emergency exercise in 2023. Available from: https://caijing.chinadaily.com.cn/a/202310/12/WS652786f3a310d5acd8769954.html. Accessed October 5, 2023.

13. China Daily. Standardizing hospital counter-terrorism emergency. Available from: https://ln.chinadaily.com.cn/a/202010/15/WS5f88115aa3101e7ce97297f3.html. Accessed October 5, 2023.

14. National public service platform for standards information. Anti-terrorism prevention standards for medical and health institutions. Available from: https://std.samr.gov.cn/db/search/stdDBDetailed?id=DF55C2967E8DD24BE05397BE0A0A5C25. Accessed October 5, 2023.

15. Shupeng L. Research of contingency management of Urban NBC terrorism in current situation. J Rail Police Coll. 2021;1:64–68. doi:10.19536/j.cnki.411439.2021.01.009

16. Jasani GN, Alfalasi R, Cavaliere GA, et al. Terrorists use of ambulances for terror attacks: a review. Prehosp Disaster Med. 2021;1:14–17. doi:10.1017/S1049023X20001260

17. Crawford JM. Evidence-based interpretation of liver biopsies. Lab Invest. 2006;4:326–334. doi:10.1038/labinvest.3700403

18. Wang Xiaoqin. Correct understanding of evidence-based medicine. Geriat Health Care. 2022;2:221–222.

19. Blanco-Teherán C, Quintana-Pájaro L, Narvaez-Rojas A, et al. Evidence-based medicine in neurosurgery: why and how? J Neurosurg Sci. 2022;1:49–53. doi:10.23736/S0390-5616.21.05331-5

20. Bal R. Evidence-based policy as reflexive practice. What can we learn from evidence-based medicine? J Health Serv Res Policy. 2017;2:113–119. doi:10.1177/1355819616670680

21. Javaid M, Haleem A. Virtual reality applications toward medical field. Clin Epidemiol Glob Health. 2020;2:600–605. doi:10.1016/j.cegh.2019.12.010

22. Elliman J, Loizou M, Loizides F. Virtual reality simulation training for student nurse education. 2016 8th International Conference On Games And Virtual Worlds For Serious Applications (VS-GAMES); 2016.

23. Franc-Law JM, Bullard M, Corte FD. Simulation of a hospital disaster plan: a virtual, live exercise. Prehosp Disaster Med. 2008;4:346–353. doi:10.1017/S1049023X00005999

24. Saunier J, Barange M, Blandin B, et al. Designing adaptable virtual reality learning environments. VRIC’16: Proceedings Of The 2016 Virtual Reality International Conference; 2016. doi:10.1145/2927929.2927937.

25. Richard K, Havard V, Baudry D. Authoring-by-doing: an event-based interaction module for virtual reality scenario authoring framework. 8th International Conference on Augmented Reality, Virtual Reality, and Computer Graphics (SALENTO AVR); 2021. doi:10.1007/978-3-030-87595-4_38.

26. Seo M, Lee H, Choi S, et al. Exploring experiences of virtual reality among young and older adults in a subway fire scenario: a pilot study. 25th ACM Symposium On Virtual Reality Software and Technology; 2019. doi:10.1145/3359996.3364788.

27. Martaindale MH, Sandel WL, Duron A, et al. Can a virtual reality training scenario elicit similar stress response as a realistic scenario-based training scenario? Police Quart. 2023:109861112311827. doi:10.1177/10986111231182729

28. NanFang Media. High-end medical simulation training center activated. Available from: https://static.nfapp.southcn.com/content/201906/29/c2373876.html. Accessed October 6, 2023.

29. Central South University News. Xiangya Second Hospital of Central South University has officially launched the first integrated virtual reality medical education and training platform in China. Available from: https://news.csu.edu.cn/info/1003/143942.htm. Accessed October 6, 2023.

30. CN-Healthcare News. Eight departments issued a document stating that hospitals should implement security checks to ensure the personal safety of medical personnel. Available from: https://www.cn-healthcare.com/articlewm/20210929/content-1269004.html. Accessed October 6, 2023.

31. Baoping W, Junqing L, Ming J, et al. Strategies for preventing terrorist attacks in military hospitals in Southern Xinjiang under the new situation. Jie Fang Jun Yi. 2016;4:425–427. doi:10.14010/j.cnki.wjyx.2016.04.032

32. Tin D, Hart A, Ciottone GR. Hardening hospital defences as a counter-terrorism medicine measure. Am J Emerg Med. 2021;45:667–668. doi:10.1016/j.ajem.2020.10.051

Creative Commons License © 2023 The Author(s). This work is published and licensed by Dove Medical Press Limited. The full terms of this license are available at https://www.dovepress.com/terms.php and incorporate the Creative Commons Attribution - Non Commercial (unported, v3.0) License. By accessing the work you hereby accept the Terms. Non-commercial uses of the work are permitted without any further permission from Dove Medical Press Limited, provided the work is properly attributed. For permission for commercial use of this work, please see paragraphs 4.2 and 5 of our Terms.