Strengths, Weaknesses, Opportunities and Threats of Telehealth in Bioterrorism: A Systematic Review

Document Type : Review

Authors

1 Student Research Committee, Saveh University of Medical Sciences, Saveh, Iran

2 Saveh University of Medical Sciences, Saveh, Iran

3 Student Research Committee, Tehran University of Medical Sciences, Saveh, Iran

4 Health Information Technology Department, Saveh University of Medical Sciences, Saveh, Iran

Abstract

Background and Aim: Telehealth is one of the technologies that can help us in the prevention, diagnosis, and treatment of diseases caused by bioterrorism. This research aims to introduce the applications of this tool and examine its strengths, weaknesses, opportunities, and threats in bioterrorist attacks.
Methods: We searched in Scopus, PubMed, and Google Scholar from 2001 to 2021. By applying the inclusion and exclusion criteria and checking the title, abstract, and full text, we selected articles to enter the analysis. Finally, we extracted and saved data based on the Excel form.
Results: A total of articles were retrieved through the search, and 15 studies remained for final analysis. Based on the findings, we categorized telehealth applications into four general categories. Tele-consultation, e-learning, tele-prevention, tele-monitoring, and tele-diagnosis were the most common applications. Also, SWOT analysis showed that practical tools in bioterrorism have more strengths than weaknesses. Early identification of bioterrorism attacks and control of their spread is one of the significant strengths of this field. Also, one of its considerable weaknesses is the incompatibility of these systems.
Conclusion: Considering the many applications of telehealth and the positive impact of this tool during bioterrorism incidents, its use is suggested by various organizations, especially the Red Crescent and military organizations. But considering the weaknesses and threats like the lack of appropriate technical, organizational, legal, and insurance infrastructure and security and confidentiality issues, it is necessary to measure to deal with these cases.

Keywords