2009
DOI: 10.1016/j.drugalcdep.2008.06.010
|View full text |Cite
|
Sign up to set email alerts
|

Feasibility and validity of computerized ambulatory monitoring in drug-dependent women

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
30
1
1

Year Published

2009
2009
2021
2021

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 44 publications
(33 citation statements)
references
References 20 publications
1
30
1
1
Order By: Relevance
“…Of these different methods, only signal-contingent recording (repeated over a short time frame) constitutes an experience sampling procedure. Nonetheless, the feasibility and validity of EMA has been demonstrated in individuals with many types of addiction (Freedman et al, 2006;Johnson et al, 2009;Serre et al, 2012), and it is particularly well-suited to explore craving as a function of a wide range of environmental determinants. Repeated within-day assessments capture the rapid fluctuations of these variables (Shiyko and Ram, 2011) and inform researchers about prospective (and potentially causal) relationships.…”
Section: Introductionmentioning
confidence: 99%
“…Of these different methods, only signal-contingent recording (repeated over a short time frame) constitutes an experience sampling procedure. Nonetheless, the feasibility and validity of EMA has been demonstrated in individuals with many types of addiction (Freedman et al, 2006;Johnson et al, 2009;Serre et al, 2012), and it is particularly well-suited to explore craving as a function of a wide range of environmental determinants. Repeated within-day assessments capture the rapid fluctuations of these variables (Shiyko and Ram, 2011) and inform researchers about prospective (and potentially causal) relationships.…”
Section: Introductionmentioning
confidence: 99%
“…User anonymity 13 (38.2% a ) BinDhim et al, 2014;Borland et al, 2013;Freedman et al, 2006;Gajecki et al, 2014;Haug et al, 2014;Matsumura et al, 2009;Renner, 2012;) Data encryption 11 (32.3% b ) BinDhim et al, 2014;Boyer et al, 2012;Gajecki et al, 2014;Gamito et al, 2014;Haug et al, 2014;Meredith et al, 2014;Renner, 2012;) Password protection 7 (24.1% c ) Hasin et al, 2014;Haug et al, 2014;Hertzberg et al, 2013;Renner, 2012;) User control 20 (69.0% d ) (Bendtsen & Bendtsen, 2014;BinDhim et al, 2014;Bricker et al, 2014;Campling, 2011;Gajecki et al, 2014;Haug et al, 2014;Hertzberg et al, 2013;Ingersoll et al, 2014;Kauer et al, 2009;Ploderer et al, 2014;Reitzel et al, 2014;Renner, 2012;Whittaker, 2011;Yu et al, 2012 Dulin et al, 2014;Epstein et al, 2009;Freedman et al, 2006;Gamito et al, 2014;Hasin et al, 2014;Ingersoll et al, 2014;Johnson et al, 2009;Kauer et al, 2009;…”
Section: Ethical Consideration N (%) References Privacyunclassified
“…For example, alerts employed by smartphones to collect research data may attract the attention of third parties (B. L. Carter et al, 2008;Dulin et al, 2014;Johnson et al, 2009). Such approaches may increase the privacy and control a participant has over their data and the intrusiveness of the app, but at the cost of reducing its research value if data are missed.…”
Section: User Anonymitymentioning
confidence: 99%
See 1 more Smart Citation
“…While studies have documented both the feasibility (11)(12)(13)(14) and acceptability (6) of using EMA to study drug use, discussions regarding the ethics of using technologydriven data collection modalities common to EMA are just beginning to emerge. Thus far, concerns have been raised about the potential harms of capturing data about illicit and stigmatized behaviors of vulnerable populations (15) especially since EMA often includes geolocation of the risk activity of interest, and the provision of valuable mobile devices to collect EMA data may expose participants to physical targeting for theft (16).…”
Section: Introductionmentioning
confidence: 99%