Surgical site infections after elective craniotomy for brain tumor: a study on potential risk factors and related treatments

择期开颅治疗脑肿瘤后手术部位感染:潜在危险因素及相关治疗研究

阅读:2

Abstract

BACKGROUND: Surgical site infection (SSI) is a common complication following craniotomy that increases morbidity, mortality, and medical expenses. The objectives of this study were to determine the relevant risk factors associated with SSI after elective craniotomy for brain tumor and analyse the treatments for SSI. METHODS: A retrospective nested case‒control study was conducted using data from patients who underwent craniotomy for brain tumor resection at the Neurosurgical Oncology Department No. 6 of Beijing Tiantan Hospital, Capital Medical University, between January 2019 and December 2021. Risk factors for SSI were determined using multivariate logistic regression analysis. We analyzed microbiological and related treatment data for different SSI types. RESULTS: Among 2061 patients who underwent craniotomy for brain tumor, 31 had SSI (1.50%). In the multivariate logistic regression analysis, body mass index (BMI) and operative duration were identified as independent risk factors for SSI. The most common microorganism isolated from SSIs was Staphylococcus epidermidis (22.9%), and drug sensitivity results showed that gram-positive bacteria were sensitive to linezolid, vancomycin and tigecycline, whereas gram-negative bacteria were sensitive to meropenem, cefepime and ceftazidime. Six of the seven patients who underwent bone flap removal due to osteomyelitis were infected with gram-negative bacteria. CONCLUSIONS: BMI and operative duration were identified as independent risk factors for SSI. Diabetes mellitus, previous ratio therapy, type of incision, recurrence tumor and other risk factors were not found to be associated with the occurrence of SSI in this study.

特别声明

1、本页面内容包含部分的内容是基于公开信息的合理引用;引用内容仅为补充信息,不代表本站立场。

2、若认为本页面引用内容涉及侵权,请及时与本站联系,我们将第一时间处理。

3、其他媒体/个人如需使用本页面原创内容,需注明“来源:[生知库]”并获得授权;使用引用内容的,需自行联系原作者获得许可。

4、投稿及合作请联系:info@biocloudy.com。