US20140011178A1 - Prevention and intervention assistance system - Google Patents

Prevention and intervention assistance system Download PDF

Info

Publication number
US20140011178A1
US20140011178A1 US13/934,181 US201313934181A US2014011178A1 US 20140011178 A1 US20140011178 A1 US 20140011178A1 US 201313934181 A US201313934181 A US 201313934181A US 2014011178 A1 US2014011178 A1 US 2014011178A1
Authority
US
United States
Prior art keywords
individual
message
recipient
addiction
questionnaire
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/934,181
Inventor
Mark Neil Rapparport
Rial Allen Barnett
Behnmam Shah-Hosseini
Daniel Albert Cossack
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ePreventions LLC
Original Assignee
ePreventions LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ePreventions LLC filed Critical ePreventions LLC
Priority to US13/934,181 priority Critical patent/US20140011178A1/en
Assigned to ePreventions, LLC reassignment ePreventions, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: COSSACK, DANIEL ALBERT, RAPPARPORT, MARK NEIL, SHAH-HOSSEINI, BEHNMAM, BARNETT, RIAL ALLEN
Publication of US20140011178A1 publication Critical patent/US20140011178A1/en
Assigned to Knobbe, Martens, Olson & Bear, LLP reassignment Knobbe, Martens, Olson & Bear, LLP SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ePreventions, LLC
Priority to US14/569,355 priority patent/US10037710B2/en
Assigned to ePreventions, LLC reassignment ePreventions, LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: Knobbe, Martens, Olson & Bear, LLP
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B19/00Teaching not covered by other main groups of this subclass
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B7/00Electrically-operated teaching apparatus or devices working with questions and answers
    • G09B7/02Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B5/00Electrically-operated educational appliances
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H10/00ICT specially adapted for the handling or processing of patient-related medical or healthcare data
    • G16H10/20ICT specially adapted for the handling or processing of patient-related medical or healthcare data for electronic clinical trials or questionnaires
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H20/00ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance
    • G16H20/30ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to physical therapies or activities, e.g. physiotherapy, acupressure or exercising

Definitions

  • Addiction can have a crippling and harmful effect not only to an individual suffering from the addiction, but also to loved ones such as family, friends, and co-workers who care for the afflicted individual.
  • Addiction can take on many forms ranging from physical addiction (e.g., substance abuse, alcoholism, etc.) to behavioral or psychological addiction (e.g., compulsive behavior, gambling, etc.).
  • Confronting and dealing with addiction-related problems is often a significant undertaking which may require the guidance or counseling of a trained professional.
  • Concerned loved ones may decide to take action by conducting an intervention, which can be stressful for those involved as well as costly when a trained interventionist is used. In some cases by the time an intervention is conducted, the afflicted individual is so consumed by the addiction that recovery may be prolonged, difficult, and costly.
  • This disclosure describes a customized prevention system and methods for intervention assistance to enable family, friends, and/or loved ones of an afflicted individual suffering from, or at risk of an addiction or related disorder (e.g., alcoholism, drug abuse, gambling, or other harmful addictions), to create a personal, customized support forum and messaging system for the individual in order to motivate the individual to take the first step towards recovery.
  • the design of this forum is to encourage, motivate, or otherwise cause the individual (e.g., “a recipient”) to recognize that there is a problem and gain the courage to take the first step towards recovery. This may ultimately be in the form of entering a rehabilitation facility or program, or recognizing the problem and how it is affecting those around them and recommending an action plan to take steps towards recovery.
  • This forum empowers the loved ones of the suffering individual to take action in showing their love and support, and enables them to feel like they are doing their part in assisting the at-risk individual towards eventual recovery.
  • the goal of the system described in the present disclosure is to help persons create an effective customized digital message of love and care to plant a seed of healing and initiate the process of recovery in the life of someone afflicted with an addictive disorder, helping to lead the message recipient into treatment.
  • the prevention system and methods described herein generally involve an individualized and customized web-based prevention or “pre-intervention” system that enables the relatives, friends, and/or loved ones of an afflicted individual to help motivate the individual to take the first step towards recovery (e.g., entering a recovery program and/or entering a rehabilitation facility, such as before a full-scale intervention becomes necessary, or when financial constraints don't make an intervention feasible).
  • the prevention system facilitates the creation and delivery of pre-configured and approved messages sent on behalf of the concerned individuals to the afflicted individual.
  • the prevention system also enables the creation and delivery of customized written, audio, and/or video messages that have obtained the input and support of a trained professional (e.g., a “preventionist”).
  • a “host” e.g., a loved one seeking to help an at-risk individual
  • invite other guests e.g., family/relatives, friends, and co-workers
  • the host first creates an account with the prevention system and, in some embodiments, pays for the “prevention.”
  • the Host then goes through the process of answering a series of questions that are provided to the prevention system and entered into an expert rules engine.
  • the expert rules engine may include or have access to, for example, a rules based knowledge database that is configured to gain intelligence as it receives input from the host and participants. As they describe the circumstances necessitating the prevention, providing further details about the intended recipient's specific situation, sharing their personal thoughts and feelings about the circumstances and the recipient, the prevention system generates a motivational message based on the various input criteria.
  • a customized and personal message is generated for delivery to the recipient via a variety of means including for example delivery and/or presentation via email, text message/SMS, mobile application (e.g., for iOS, Android, Windows Mobile, and other mobile operating systems), as well as via desktop and laptop computers.
  • the host may recruit additional co-hosts to create their own support messages and/or make donations for the recipient to attend a treatment program which may be accessed, for example, via a website or service provided by the prevention system.
  • Each co-host may follow a similar procedure to create written, audio, or video message.
  • the host and a trained professional counselor may review all customized messages before the final message and/or invitation to join the prevention is delivered to the recipient. The message and/or invitation may then be sent to the recipient.
  • the message may be generated and provided in a variety of different formats and contain a variety of different levels of content.
  • the message can range from a simple wall of pre-configured and semi-customized letters/cards to an entire customized room where the person can listen to and watch the personalized audio and video messages from his loved ones.
  • the prevention computing system may deliver the invitation to the person via email, text, and/or voicemail.
  • the recipient receives the message and accepts the notice to join the prevention he/she may be greeted by the host, who will be the first point of contact.
  • the host's customized message may be delivered first, and the recipient may be presented an opportunity to read, watch, and listen to the other personalized messages of love, support, and concern. The message recipient will then have the opportunity to say “Yes” to accept help and begin the recovery process.
  • a prevention may be generally thought of as a “pre-intervention”.
  • One purpose of the prevention is to reach out to a loved one to express concern over his/her addiction (e.g., drug and/or alcohol use).
  • the prevention computing system enables users to reach out before it becomes time for a full intervention, and to plant the seed of healing when for whatever reason an intervention may not be feasible.
  • the purpose is to support a loved one getting the necessary help to start recovery from the disease of substance abuse.
  • the prevention system allows users to notify the recipient in a warm, non-threatening, caring way with messages created and sent from friends and loved ones who have taken the time because they care.
  • a prevention may be initiated via the prevention system when it is evident that a person needs help (e.g., participation in some form of in-patient treatment, sober living, or meetings) but has not taken the action on his/her own.
  • help e.g., participation in some form of in-patient treatment, sober living, or meetings
  • an actual professional intervention may be more appropriate, and the preventions system may provide such a recommendation after an initial qualifying questionnaire is responded to by a user who wishes to initiate a prevention.
  • the prevention system may offer an upgraded version that utilizes the support and advisory services of a trained professional with the equivalent training and expertise of an Interventionist.
  • the prevention system differs from a traditional intervention.
  • the prevention system utilizes an expert system to advise the participants on how to create an effective message, follow established protocol in dealing with addictive disorders (e.g., via a web site or application) as an effective method of helping their loved one and/or as a helpful preparation for a potentially necessary engagement by a team or professionals in a more traditional treatment setting.
  • the purpose of an Intervention is generally to get the recipient into a treatment program or sober living environment-as either a first step towards a full blown intervention, or as a step to reach out to a person again after they may have relapsed.
  • the digital tools offered by the prevention system can enable an interventionist to utilize all of the information gathered during a prevention to save time and increase the efficacy of the intervention, should that step be needed in the eventual treatment of the disease.
  • a prevention can directly assist in the important fact gathering for an intervention, setting up and preparing for this more involved and time consuming alternative.
  • the prevention is not intended to supplant the intervention. Rather, a prevention can be either a lower cost alternative, a source of re-enforcement, or provide an important bridge to an intervention.
  • Embodiments of the prevention system as described herein can provide a number of benefits.
  • the prevention system leverages the latest technology tools to provide a safe, effective, and customized forum so that afflicted individuals who are or may be suffering from an addictive disorder, such as alcoholism or drug addiction, can begin the process of recovery and gain a sense of control and power over what might otherwise be an out of control situation.
  • video mapping may be used to filter content from input about an individual suffering from an addiction and match it to content in a specific video or video library.
  • the prevention system creates a healthy environment where an afflicted individual (e.g., a recipient) suffering from alcoholism and/or other unhealthy addictions can receive a pre-intervention message (e.g., a “Prevention”) and know that he/she is not alone and that there is a support group sending personalized messages of love, support, and concern, from people who are willing to do their part in helping the afflicted individual recognize the problem and help motivate him/her to take the first step toward recovery.
  • the prevention system also enables the afflicted individual to start the process of healing by planting the seed and progressing to taking the all important first step towards recovery. This also enables caring people (e.g., a host and participants) to feel they are doing something positive to help, giving them a sense satisfaction and self-empowerment of knowing they are doing something to help the loved one threatened or consumed by addiction.
  • the prevention system may be a web based system that enables a host customer (such as an individual motivated to help a friend or loved one suffering from alcohol, drug abuse or other addiction disorders) to create a message of love and caring to a recipient (such as the friend or loved one suffering from the addiction disorder), and then deliver the message via the internet in a format optimized for a variety of viewing platforms, including but not limited to, for example, cell/smart phone, tablet, portable/mobile computing device, desktop, laptop, or personal computer.
  • a host customer such as an individual motivated to help a friend or loved one suffering from alcohol, drug abuse or other addiction disorders
  • a recipient such as the friend or loved one suffering from the addiction disorder
  • FIG. 1 is a block diagram which illustrates an exemplary data flow between an individual's computing device and a prevention computing system, according to one embodiment.
  • FIG. 2 schematically illustrates a logical flow diagram of a process for an individual, such as a host, to initiate a prevention campaign for a recipient, involving an embodiment of a prevention computing system, such as the prevention computing system of FIG. 1 .
  • FIG. 3 is a logical flow diagram of a process 300 for beginning a campaign process on behalf of a host and/or participants, involving an embodiment of a prevention computing system, such as the prevention computing system of FIG. 1 .
  • FIG. 4 is a logical flow diagram of a process 400 involving an expert engine to generate questions and/or actions for a prevention campaign, involving an embodiment of a prevention computing system, such as the prevention computing system of FIG. 1 .
  • FIG. 5 is a logical flow diagram of a process 500 for generating one or more messages for a recipient as part of a prevention campaign, involving an embodiment of a prevention computing system, such as the prevention computing system of FIG. 1 .
  • FIG. 6 is a logical flow diagram of a process 600 for providing one or more messages for a recipient as part of a prevention campaign, involving an embodiment of a prevention computing system, such as the prevention computing system of FIG. 1 .
  • FIG. 7 is a block diagram showing an embodiment in which a prevention computing system is in communication with a network, and various systems, such as user computing devices, are also in communication with the network.
  • a prevention computing system enables and facilitates a pre-intervention “prevention” campaign on behalf of one or more individuals who wish to provide help for an afflicted loved one.
  • a host is the person/individual who initiates a campaign, identifies a recipient of the message, and invites other participants to join. The host controls the campaign and makes the final approval to deliver the message to the recipient.
  • the recipient is the person to whom the message is intended for, and whom the host has identified as the target of the campaign.
  • a participant is a person invited by the host to join the campaign. The participant can be, for example, a friend, a relative, a co-worker, or other individual concerned for the well-being of the recipient.
  • a preventionist may be, for example, a professional counselor who may get involved in a campaign to assist the host and participants in the creation of the message.
  • a campaign refers generally to the process of a specific prevention.
  • a campaign starts with the host creating an account with the prevention system and identifying the recipient.
  • a campaign may end with the final delivery of the message to the recipient.
  • the campaign process may involve viewing a video on a subject related to a disorder and/or the intervention and prevention processes, filling out a questionnaire, inviting other participants to the campaign, creating a message for the recipient, and delivering the message to the recipient.
  • a campaign definition may define what is included in a particular campaign for a specific problem (e.g., an illness, addiction/disorder, disease, or similar issue to be addressed in the prevention).
  • the campaign may include a questionnaire comprising one or more question sets, each question set comprising one or more questions that are part of the questionnaire.
  • a page group may be defined as part of the questionnaire, wherein the page group is identified as a group of questions that can be displayed on a single page or user interface screen.
  • FIG. 1 is a block diagram which illustrates an exemplary process and data flow between a host (e.g., via a computing device 162 A), one or more participants (e.g., via one or more computing devices 162 B), an optional preventionist (e.g., via a computing device 162 C), a recipient (e.g., via a computing device 162 D), and a prevention computing system 100 , according to one embodiment.
  • the data flow of FIG. 1 illustrates how the host can initiate a prevention campaign, via the prevention computing system 100 , to generate and deliver a customized message to the recipient.
  • initiating the prevention campaign may involve, for example, providing responses to a qualifying questionnaire and/or inviting one or more participants to participate in the prevention campaign.
  • the qualifying questionnaire may contain certain key questions which are asked to initialize a campaign and verify an appropriateness of a message to be generated.
  • the qualifying questionnaire may also be used to qualify the worthiness and need for treatment of the message recipient in accordance with applicable Health Insurance Portability and Accountability Act (“HIPPA”) laws and regulations and professional industry guidelines and practice for the treatment of persons with particular addiction symptoms.
  • HIPSA Health Insurance Portability and Accountability Act
  • the prevention computing system 100 generates a questionnaire for the host and/or for the participants.
  • the questionnaire may be generated iteratively using a variety of machine-based learning techniques and/or knowledge-based rules, such that responses or answers to a first question (or question set) received from the host and/or the participants may be used to determine the next question (or question set) that may be provided as part of the questionnaire, and so on until the questionnaire has been completed.
  • the questions provided in the questionnaires may be based on data accessed, for example, from a preventions data source 156 .
  • the preventions data 156 may store, for example, subject matter data for a variety of disorders, expert or knowledge-based rules related to the subject matter data, and/or predefined questions.
  • the prevention computing system 100 may access the prevention data 156 and, via an expert rules engine 150 , determine and/or generate questions to be provided as part of the questionnaire based at least in part on the accessed prevention data (e.g., subject matter data for disorders and/or related knowledge-based rules for the subject matter). This process is illustrated and described in more detail with reference to FIG. 4 herein.
  • the accessed prevention data e.g., subject matter data for disorders and/or related knowledge-based rules for the subject matter.
  • the questionnaire is provided to the host and/or participants, who then provide responses to the prevention computing system 100 .
  • the questionnaire may be provided, for example via a user interface generated by a user interface module 152 of the prevention computing system 100 .
  • the user interface may be configured for display on computing devices 162 A and 162 B.
  • a profile for the recipient may be created and updated based on the questions and received responses.
  • the profile may be stored for example in a campaign and/or profile data source 158 , along with other data related to the campaign, the host, and/or the participants of the campaign.
  • the process and data flow at steps ( 2 ) and ( 3 ) may be repeated an indefinite number of times until the questionnaires have been completed by the host and/or participants.
  • the length and type of questionnaire provided may vary depending on a type of disorder, the nature of the recipient's condition as indicated by the received responses, and other factors.
  • the system may use the information to determine and provide relevant questions to the other participants.
  • the prevention computing system 100 may utilize what it has learned through the questionnaire process and express the knowledge it has already gained from the previous questions asked.
  • the prevention computing system 100 utilizes the data collected through the questionnaire/input process to generate a customized message to the recipient.
  • the message may be generated, for example via a messaging module 154 , based on a series of pre-established recommendations and/or prompted preloaded information, which may be stored and accessed from the prevention data source 156 .
  • the message may be a basic message which is restricted to content that the prevention system generates because the host and/or participants may not necessarily be qualified to make decisions about important variables and appropriate content.
  • a unique and personal message may be generated for each of the host and participants, and the host may have access to view each of the messages and decide to use or not use any of the messages for delivery to the recipient. According to one embodiment, the host will make the final decision to begin the delivery process.
  • the prevention computing system 100 provides the customized message to the recipient.
  • the customized message may be provided to the recipient in a variety of formats including electronic mail (“email”), text message (Short Message Service (“SMS”) or Multimedia Message Service (“MMS”)), HTML 5.0 optimized messages for smartphones/tables, and so forth.
  • the customized message may include an option or invitation for the recipient to view the message on a web page provided by the prevention computing system 100 .
  • the customized message may also provide an option for the recipient to agree to accept help, which may prompt the prevention computing system 100 to create an account for the recipient.
  • the prevention computing system 100 may repeat step ( 6 ) an indefinite number of times by periodically sending additional customized messages generated by the prevention computing system 100 and selected by the host.
  • the prevention data source 156 and campaign and/or profile data source 158 are shown as stand-alone data stores accessible by the prevention computing system 100 . In some embodiments, such as the embodiment of the prevention computing system 100 shown in FIG. 7 , the prevention data source 156 and campaign and/or profile data source 158 may be included as part of the prevention computing system 100 .
  • the prevention computing system 100 of FIG. 1 includes an expert rules engine 152 (also referred to as a knowledge based rules engine herein) which gathers information about a person afflicted with an addictive disorder, stores it in a digital format (e.g., in the campaign and/or profile data store 158 ), and then processes the inputs through a series of detailed questions that become more specific and tailored to the individual as the system accumulates knowledge about the person.
  • the purpose of this questioning is to gather information about a person suffering from an addictive disorder, rendering intelligent advice and then making specific recommendations of actions for treatment based on expert rationale on how and where to get help that is based on established treatment protocols and extensive industry knowledge.
  • the rules engine may implement knowledge engineering techniques which involve learning to ask more specific and appropriate questions as a profile on the person is built and/or updated as information is provided to it, allowing it to further refine the specificity, appropriateness, and accuracy of its output based on the intelligence in the system.
  • the expert rules engine 152 may also be contributed by a “subject matter expert” (“SME”) which establishes the extensive rule sets.
  • SME subject matter expert
  • the expert rules engine 152 may be configured to recognize fact patterns and preferences so that it can match the input criteria with specific output actions including, treatment recommendations, suggested action steps to be taken, as well offer advice and recommendations for the usage of specific experiential content during the message creation process.
  • the prevention computing system 100 may use “circumstantial questioning” to ask questions in order to identify the degree of disease progression and barriers established by the recipient to deny the existence of the disease. Thus, the prevention computing system 100 learns from the last question as it formulates the next one to ask. This may be thought of as a conversational inference engine which gathers pertinent information necessary to begin processing an output (e.g., a message and/or an action plan for the recipient), using a combination of chaining methods (e.g., mixed chaining, backward chaining, etc.) such that an ultimate determination can be made about the exact condition of the person's disease progression and the best recommendation that can be made to treat it.
  • an output e.g., a message and/or an action plan for the recipient
  • chaining methods e.g., mixed chaining, backward chaining, etc.
  • input process implemented by prevention computing system 100 may involve a standard fault diagnosis method to accumulate information that is later utilized to establish an output.
  • simple confirmations may be made. For example, once certain questions are answered in the affirmative, the prevention computing system 100 may conclude or presume that the disease is present, and therefore the expert rules engine 152 may focus on quantifying to what extent the disease has progressed, instead of asking questions to confirm its existence. The expert rules engine 152 can then try to determine how much of the disease is present, and the questioning may begin to follow a pattern to quantify the manifest effects.
  • the system uses past answers to process the next questions, based on rules sets that are pre-established for the questions.
  • the prevention system accumulates knowledge and domain expertise with the data provided from questioning. The system gathers data as it goes along to gain intelligence, which is derived from the information given to it, and then it utilizes this knowledge to develop and make recommendations, offer solutions based on the fact patterns given to it and render effective advice and opinions.
  • the expert rules engine 152 of the prevention computing system 100 may be enhanced by a body of knowledge in the treatment of addiction disorders. This knowledge may be accessed, for example, from the prevention data source 156 or from other third-party data sources (e.g., data sources 166 described with reference to FIG. 7 ).
  • Each addiction disorder presents unique and differing circumstances across many variables, yet in many ways the disease follows a pattern that can be mapped and quantified. While circumstances vary to a great degree, the disease itself can be broken down into progress segments and categorized based on type and the degrees of severity.
  • the prevention computing system 100 and/or prevention data store 156 stores detailed experiential knowledge and treatment responses which the system accesses.
  • the expert rules engine 152 may also be configured to implement fault detection techniques. For example, the expert rules engine 152 may evaluate answers and infer intent in order to determine if the answer likely to be authentic. If individual responses vary from expected behavior the expert rules engine 152 can ascertain that the response is not genuine or is a hoax. This is especially important in circumstances where third parties may be reporting about a person that appears to be at high risk. The expert rules engine 152 may also be able to measure the acuteness of certain responses to key questions, so that high-risk situations and other variations can be flagged for recommended action that is specific and appropriate to the circumstances.
  • FIG. 2 is a logical flow diagram of a process 200 for an individual, such as a host, to initiate a prevention campaign for a recipient, involving an embodiment of a prevention computing system, such as the prevention computing system 100 of FIG. 1 .
  • the method of FIG. 2 will be described herein as being performed by the prevention computing system 100 and/or its components, but in other embodiments the method may be performed by one or more other computing systems, possibly in cooperation with the prevention computing system 100 .
  • the process or routine can be dynamic, with some procedures omitted and others added.
  • the prevention computing system 100 may provide a qualifying questionnaire to a host, for example via a web-based user interface as generated by user interface module 152 , to acquire initial information about a recipient and the recipient's condition.
  • the prevention computing system 100 receives responses to the qualifying questionnaire from the host.
  • the prevention computing system 100 determines whether a prevention is qualified, based at least in part on the received responses to the qualifying questionnaire. For example, based on the responses, the prevention computing system 100 may determine that the recipient's condition is too serious for a prevention.
  • the prevention computing system 100 may, in response to a determination that the prevention is not qualified, provide a recommendation to the host to seek professional help. This in itself may be of significant value to the host, who might not otherwise suspect that the intended recipient's condition has progressed to the point at which professional help is the preferred or recommended solution.
  • the process 200 may proceed to block 225 where the prevention computing system 100 determines whether it has received a request to invite participants to the prevention. For example, the host may provide the request to invite participants before, during, or at the conclusion of the qualifying questionnaire process.
  • the request to invite participants may include the necessary contact information (e.g., name, email address, phone number, etc.) to enable the prevention computing system 100 to send invitations to the participants. If the prevention computing system 100 determines that a request to invite participants has been received, then at block 230 prevention computing system 100 may invite the participants, for example by sending an invitation email or similar communication to the participant(s) inviting them to join the prevention and create an account with the prevention computing system 100 .
  • the prevention computing system 100 initializes accounts for the host and/or any invited participants. Account information may be stored, for example, in the campaign and/or profile data store 158 .
  • the prevention computing system 100 may initialize the campaign on behalf of the host and/or participants. The campaign process is illustrated and described in more detail with reference to FIG. 3 herein.
  • FIG. 3 is a logical flow diagram of a process 300 for beginning a campaign process on behalf of a host and/or participants, involving an embodiment of a prevention computing system, such as the prevention computing system 100 of FIG. 1 .
  • the method of FIG. 3 will be described herein as being performed by the prevention computing system 100 and/or its components, but in other embodiments the method may be performed by one or more other computing systems, possibly in cooperation with the prevention computing system 100 .
  • the process or routine can be dynamic, with some procedures omitted and others added.
  • the prevention computing system 100 determines a campaign (or type of campaign) based on a qualifying questionnaire (e.g., such as the qualifying questionnaire as described with reference to the process 200 in FIG. 2 ).
  • a qualifying questionnaire e.g., such as the qualifying questionnaire as described with reference to the process 200 in FIG. 2 .
  • This process involves, for example, determining which, if any, campaign definition is suitable for the host, and establishing any keyword filters to be applied to the detailed questionnaire and question sets in the campaign definition. Keyword filters in question sets may be used to tailor the detailed questionnaire to the specific conditions of the campaign. For example, if the qualifying questionnaire reveals that the recipient is not working, then questions asking about employment or co-workers may not be presented in subsequent detailed questionnaire and/or question sets.
  • the prevention computing system 100 generates an initial profile for the intended recipient.
  • the profile may be stored and accessed from, for example, the campaign and/or profile data store 158 , and may be linked to the host and/or participant accounts and/or profiles.
  • the prevention computing system 100 may optionally provide video content to the host and/or participants related to the campaign.
  • video content may be provided based on an initial assessment about the recipient's condition or problem, including education and background information about the condition or problem, possible treatments for the condition or problem, concerns and cautions to be aware of during a prevention and/or intervention process, and other related information.
  • the video content may be stored and accessed from, for example, the prevention data source 156 , or from another data source.
  • the video content may be provided to the host and/or recipients at earlier stages of the prevention campaign, such as before, during, or after completion of the qualifying questionnaire, before the host and/or participants create accounts, or any other time before, during, or after the prevention campaign which may be appropriate.
  • the prevention computing system 100 generates and provides a detailed questionnaire (e.g., questions and/or question sets) based on the determined campaign.
  • the questions presented in the detailed questionnaire may depend on factors that are determined during the qualifying questionnaire, including for example (1) the campaign type or type of problem/condition (e.g., alcohol abuse, drug abuse, etc.); (2) the relationship between the host and/or participants and the recipient (e.g., family member, friend, co-worker, etc.); and (3) character traits of the participant (e.g., serious, casual, religious, authoritative, etc.). Additional detail about the question generation process, as driven by, for example, the expert rules engine 150 , is illustrated and described with reference to FIG. 4 herein.
  • Presentation of the questionnaire can vary depending on the implementation. For example, questions may be grouped together in a question set.
  • a question set may include one or more questions that are related to a specific line of thought. Questions may also be further divided into page groups.
  • a page group can be used to designate a series of questions that can be placed together on a single page (e.g., a web page displayed as part of a user interface for the questionnaire, generated for example by the user interface module 152 ).
  • Data related to the questionnaires, questions, question sets, and/or page group may be stored and accessed, for example, in the prevention data source 156 .
  • the prevention computing system 100 receives responses to the questionnaire from the host and/or participants.
  • the questionnaire does not need to be completed in one sitting.
  • the host/participant may leave and return at any time during the questionnaire and resume where he/she left off.
  • the user may go back to a previously asked question and change an answer if needed at any time during the questionnaire.
  • the host and participant may communicate with each other via a messaging and chat system on the site.
  • participants may only communicate with the host, but not with each other.
  • the prevention computing system 100 may process and use the responses to generate subsequent questions in the questionnaire.
  • the process 300 may return to block 320 and repeat blocks 320 and 325 an indeterminate number of times to determine and provide subsequent questions in the questionnaire which are appropriate based on prior received responses. Additional detail about how the responses may be used to inform the question generation process, as driven by, for example, the expert rules engine 150 , is illustrated and described with reference to FIG. 4 herein.
  • the prevention computing system 100 builds or updates a profile for the intended recipient based, for example, on the received responses.
  • the responses received by the prevention computing system 100 may be stored in the campaign and/or profile data source 158 , for example, as part of the prevention campaign associated with the host or recipient.
  • the responses may then be accessed for use in either the questionnaire process and/or the message generation process.
  • the prevention computing system 100 can generate one or more messages for the intended recipient.
  • the messages may be generated, for example, once the host and/or participants have completed the questionnaire process and the prevention computing system 100 has received the responses. Additional detail about the message generation process, as driven by, for example, the expert rules engine 150 and/or messaging module 154 , is illustrated and described with reference to FIG. 5 herein.
  • the host may select one or more messages (see, e.g., FIG. 5 herein) for the prevention computing system 100 to provide or send to the recipient (see, e.g., FIG. 6 herein).
  • FIG. 4 is a logical flow diagram of a process 400 involving an expert engine to generate questions and/or actions for a prevention campaign, involving an embodiment of a prevention computing system, such as the prevention computing system 100 of FIG. 1 .
  • the method of FIG. 4 will be described herein as being performed by the prevention computing system 100 and/or its components, but in other embodiments the method may be performed by one or more other computing systems, possibly in cooperation with the prevention computing system 100 .
  • the process or routine can be dynamic, with some procedures omitted and others added.
  • the following listing provides one example implementation of the structure of a question which may be used to facilitate the dynamic generation of questions and/or actions for a detailed questionnaire according to one embodiment:
  • the prevention computing system 100 determines one or more initial questions for the detailed questionnaire to be provided to a host and/or participants.
  • the initial questions may be determined based on a campaign definition associated with the prevention campaign.
  • the expert rules engine 152 may implement a tag table technique to generate filtered questions, messages, and actions.
  • Each campaign may include a tag table per host and/or participant.
  • the campaign tag table includes a list of tag or key words which may be used during the campaign. Each tag word contains a weight value that accumulates during the campaign.
  • the tag table may be used to help determine or select which questions are included during the questionnaire, and also to help select message snippets to be included in the final message.
  • the prevention computing system 100 may use the responses from qualifying questionnaire is to build the initial tag table.
  • the tag table may then be used to select the campaign type and question sets for further questioning.
  • the prevention computing system 100 receives user input responses to the questions presented via the questionnaire (e.g., as provided as part of the process 300 at block 325 ).
  • each question response adds to the campaign tag table, such that over time the weight value accumulates.
  • the prevention computing system 100 generates a weighted list of potential questions, message snippets, and/or actions, for example based on the received user input responses.
  • the tag table may be used to filter questions in subsequent question sets based on tag weights associated with certain questions
  • the prevention computing system 100 selects questions, message snippets, and/or actions based on the weighted list.
  • one or more messages can be generated by accessing message snippets from a database (e.g., the prevention data store 156 ) based on the highest thresholds for matching tags in the campaign tag table.
  • a question may be asked regarding smoking (or, e.g., any other addiction-related illness or disorder, such as alcoholism, gambling, compulsive behavior, etc.).
  • the affirmative option for the question may define a tag-weight for the tag “smoking” with a weight of “5.” If answered in the affirmative, the “smoking” tag with weight “5” is added to the campaign tag table.
  • a follow-up question may ask about the frequency of smoking. This question may include multiple select options with varying weights for the “smoking” tag.
  • the prevention computing system 100 can produce a set of well written messages that appear to have been written by the host and/or participants and express the host and/or participants' wishes.
  • the messages may be professionally designed to encourage the recipient to seek help.
  • Message variety may be obtained by drawing from a pool of message snippets to formulate the message.
  • Message snippets may be stored in a database (e.g., the prevention data source 156 ) and may include attributes that categorize the snippet by campaign type, relationship of participant to recipient, character of participant, and component of the message which determines the order the snippet is placed in the message.
  • a message may include several components, including for example a salutation, an introduction, a position, evidence, counter arguments, a call to action, and a signature.
  • Each snippet may have multiple versions, each version using different words to say the same thing.
  • the prevention computing system 100 and messaging module 154 may be configured to ensure that any snippet is used only once in a campaign, such that every message in the campaign
  • the prevention computing system 100 offers myriad choices of output messages based on the many input criteria provided during the input questioning process described above.
  • the host may also able to customize the messages with style choices and confirm fact patterns that have been established by the previously provided data during the questionnaire process. Details about the relationships from the host and each of the participants enable the system to tailor the messages to the recipient with the appropriate vernacular that would be customary to that relationship.
  • the prevention computing system 100 can differentiate, and generate different messages from, a child to a recipient that has a distant relationship with the child (e.g., because of a divorce and subsequent separation from the child) versus a child that has had a close relationship with a fully engaged parent.
  • the prevention computing system 100 can differentiate recommendations based on relationship, gender characteristics, age, marital status, relationship history, experiential facts, as well as circumstantial and social dynamics. The prevention computing system 100 further differentiates such details as the history of the destructive activity, the family history with the disease, the current living dynamics and relationship dynamics, addiction history, treatment history, severity assessment, financial evaluations, etc.
  • the prevention computing system 100 can detect personal fact patterns about the recipient's circumstances and risk features, and then identify correlating content in its messaging data store (e.g., as stored in prevention data source 156 ) as well as its video testimonial content library (e.g., as stored in prevention data source 156 ) to match the recipient's circumstances with an appropriate message or video to achieve the optimum impact.
  • the prevention computing system 100 follows a message output pattern that mirrors effective methods and processes in addiction treatment. For example, the process establishes the place of love and care that the host and participants are coming from, offers a sympathetic connection to establish trust and to disarm the recipient, clarifies the problems that the disease is causing, in certain instances recalls better times to establish a key reference point for the recipient, addresses how the disease has taken a hold of the person, provides examples of how this has happened, and genuinely asks the person to accept the gift of help.
  • the prevention computing system 100 enables the host to create an action plan that recommends to the recipient the next step to take if they agree to get help.
  • the messaging module 154 may combine the extensive information gathered about the recipient from the questioning, and then gives the senders a series of choices from drop down menu options based on the input provided and knowledge the system has gained to enable them to create a truly customized and personal message that is impactful.
  • FIG. 5 is a logical flow diagram of a process 500 for generating one or more messages for a recipient as part of a prevention campaign, involving an embodiment of a prevention computing system, such as the prevention computing system 100 of FIG. 1 .
  • the method of FIG. 5 will be described herein as being performed by the prevention computing system 100 and/or its components, but in other embodiments the method may be performed by one or more other computing systems, possibly in cooperation with the prevention computing system 100 .
  • the process or routine can be dynamic, with some procedures omitted and others added.
  • the prevention computing system 100 generates one or more customized messages based on the received questionnaire responses and/or a recipient profile.
  • the messages may be generated dynamically, for example by the expert rules engine 150 , using similar techniques or algorithms as described with reference to FIG. 4 .
  • the tag-weighting approach described above may be used to retrieve message snippets (e.g., from the prevention data source 156 ) for matching tags from a tag table for the campaign and selected by their highest threshold value that is not higher than the tag weight.
  • the prevention computing system 100 provides the customized messages to the host for selection.
  • the host may also be prompted to provide an indication of the order and/or frequency of which the customized messages are to be delivered to the recipient.
  • the order and/or frequency may also be determined based on a service level for which the host is subscribed. For example, a basic subscription level may allow the host to select up to three messages (or any other number) to be delivered once per week (or any other periodic basis), while an advanced subscription level may allow the host to select all customized messages with a preferred order and delivery schedule. Any variation on the subscription level may be possible.
  • the order and frequency may be determined as part of the campaign definition or as determined by a preventionist involved in the prevention campaign.
  • the host may be subscribed to or otherwise have access to a preventionist as part of the prevention campaign.
  • the host and/or participants may be provided the option to provide additional personal content to be included in the customized message(s) to the recipient.
  • audio and/or video recordings, personal notes, and the like may be received by the prevention computing system 100 to be included with the customized messages.
  • the preventionist involved in the prevention campaign may then assist the host in determining whether any such personal content should be included with the messages.
  • the prevention computing system 100 receives the selection of message(s) from the host.
  • the prevention computing system 100 may also receive with the selection delivery preferences (e.g., order, frequency) as described above.
  • the prevention computing system 100 provides the selected message(s) to the recipient. Additional detail about how the messages may be provided to the recipient, as driven by, for example, the messaging module 154 , is illustrated and described with reference to FIG. 6 herein.
  • FIG. 6 is a logical flow diagram of a process 500 for providing one or more messages for a recipient as part of a prevention campaign, involving an embodiment of a prevention computing system, such as the prevention computing system 100 of FIG. 1 .
  • the method of FIG. 6 will be described herein as being performed by the prevention computing system 100 and/or its components, but in other embodiments the method may be performed by one or more other computing systems, possibly in cooperation with the prevention computing system 100 .
  • the process or routine can be dynamic, with some procedures omitted and others added.
  • the prevention computing system 100 provides the selected message(s) to the intended recipient of a prevention campaign.
  • the message(s) may be provided for example, by an email or text message sent to the recipient.
  • the email or text message may direct the recipient to a web site and not include any personal information in the message itself. Once the recipient accesses the web site, he/she may be prompted to verify their identity by answering a personal question arranged by the host. If the identity is verified, the prepared message may be viewed by the recipient.
  • the message(s) may include, for example, customized messages generated as part of the process 500 described with reference to FIG. 5 herein.
  • the prevention computing system 100 may also provide a notification to the host, participant, and/or preventionist that the message has been provided or delivered to the recipient. In some embodiments, prevention computing system 100 may detect whether the recipient has read the message and provide such indication to the host, participant, and/or preventionist as well.
  • the prevention computing system 100 may prompt the recipient to agree to receive help.
  • the prompt to agree to receive help may be provided as part of the message content itself.
  • the message may include an actionable option or link to agree to receive help, which may direct the recipient viewing the message to a prevention website, for example as provided by the prevention computing system 100 .
  • the message may direct the recipient to a web site to view more information and/or additional messages, at which time the prompt to agree to receive help may be provided as part of a web page presented to the recipient.
  • the message(s) provided to recipient may also include an action plan (or a first step of an action plan) that recommends to the recipient the next step to take if they agree to get help. In other instances, the action plan may not be provided to the recipient until after they agree to get help.
  • the prevention computing system 100 determines whether the recipient has agreed to accept help. The determination might be made after the recipient expressly agrees or refuses to accept help (e.g., by some action, such as clicking on a link or option presented as described at block 610 ), or after a specified period of time has elapsed without receiving any kind of response or indication from the recipient to agree to accept help.
  • the prevention computing system 100 may initialize an account for the recipient and/or update the recipient profile associated with the prevention campaign and/or host or participant profiles. Once the recipient creates an account he/she may join the campaign to follow-up and report progress. In one embodiment, the prevention computing system 100 may then provide or display an action plan (or a first step of an action plan) that recommends to the recipient the next step to take. For example, information may be provided to help the recipient find the necessary resources in his/her local area, or the recipient may be connected with a counselor to receive help. In some embodiments, the prevention computing system 100 may trigger a confidential message to the host, participant, and/or preventionist indicating that the recipient has agreed to get help.
  • the prevention computing system 100 may determine whether there are additional messages to send to the recipient.
  • the prevention computing system 100 may also provide a notification to the host, participant, and/or preventionist that the recipient has read the message but has not agreed to accept help. If there are additional messages to send to the recipient, the process 600 may return to block 605 and continue making attempts to reach the recipient by sending additional message(s), repeating blocks 605 , 610 , 615 , and 620 an indefinite number of times until there are no more messages to provide to the recipient.
  • the prevention computing system 100 may first send a message from the host, followed by one or more messages from the participants and/or preventionist, or followed by additional messages from the host, in any order and/or frequency as determined by the host and/or preventionist during the message selection process (see, e.g., FIG. 5 ) or as determined by the host's subscription level.
  • the initial message that is delivered may be sent again with formatting adjustments to accommodate for the appearance of uniqueness.
  • the frequency of delivery may be established based on the parameters identified in the input criteria (e.g., as part of the questionnaire process) and the recipient's circumstances, with the goal of an increased success rate from the call to action.
  • the process 600 may proceed to block 630 , where the prevention computing system 100 may end the campaign. Ending the campaign may trigger the prevention computing system 100 to provide a notification to the host, participants, and/or preventionist that the recipient has not agreed to receive help (e.g., either by ignoring all messages sent or by actively refusing to receive help).
  • FIG. 7 is a block diagram showing an embodiment in which a prevention computing system 100 is in communication with a network 160 , and various systems, such as user computing device(s) 162 are also in communication with the network 160 .
  • the prevention computing system 100 may be used to implement systems and methods described herein.
  • the prevention computing system 100 includes an expert rules engine 150 , a user interface module 152 , and a messaging module 154 , a prevention data source 156 , and/or a campaign and/or profile data source 158 .
  • the expert rules engine 150 may be configured to implement the processes for dynamic questionnaire and message generation as described herein, for example with reference to FIGS. 2-4 .
  • the messaging module 154 may be configured to implement the processes for message generation and delivery to recipients as described herein, for example with reference to FIGS. 4-6 .
  • the prevention data source 156 may store, for example, subject matter data for a variety of disorders, expert or knowledge-based rules related to the subject matter data, and/or predefined questions.
  • the campaign and/or profile data source 158 may store, for example, data related to campaigns, hosts, participants, recipients, including questions and answers/responses to questionnaire and related data.
  • the prevention data source 156 and campaign and/or profile data source 158 may be a stand-alone data stores.
  • the prevention computing system 100 includes a user interface module 152 configured to generate and provide user interfaces described herein for an individual (e.g., a host, a participant, a prevention specialist, and/or a recipient) accessing a prevention computing system, such as via a web browser or standalone application.
  • the dashboard/user interface module 152 may also be configured to generate user interfaces for alerts and/or mobile user interfaces provided to the user such as a host, participant, and/or recipient in communication with the prevention computing system 100 .
  • the computing system 100 includes, for example, a personal computer that is IBM, Macintosh, or Linux/Unix compatible or a server or workstation.
  • the prevention computing system 100 comprises a server, a laptop computer, a smart phone, a personal digital assistant, a kiosk, or an media player, for example.
  • the exemplary computing system 100 includes one or more central processing unit (“CPU”) 105 , which may each include a conventional or proprietary microprocessor.
  • the prevention computing system 100 further includes one or more memory 130 , such as random access memory (“RAM”) for temporary storage of information, one or more read only memory (“ROM”) for permanent storage of information, and one or more mass storage device 120 , such as a hard drive, diskette, solid state drive, or optical media storage device.
  • RAM random access memory
  • ROM read only memory
  • mass storage device 120 such as a hard drive, diskette, solid state drive, or optical media storage device.
  • the modules of the prevention computing system 100 are connected to the computer using a standard based bus system.
  • the standard based bus system could be implemented in Peripheral Component Interconnect (“PCI”), Microchannel, Small Computer System Interface (“SCSI”), Industrial Standard Architecture (“ISA”) and Extended ISA (“EISA”) architectures, for example.
  • PCI Peripheral Component Interconnect
  • SCSI Microchannel, Small Computer System Interface
  • ISA Industrial Standard Architecture
  • EISA Extended ISA
  • the functionality provided for in the components and modules of computing system 100 may be combined into fewer components and modules or further separated into additional components and modules.
  • the prevention computing system 100 is generally controlled and coordinated by operating system software, such as Windows XP, Windows Vista, Windows 7, Windows 8, Windows Server, Unix, Linux, SunOS, Solaris, iOS, Blackberry OS, or other compatible operating systems.
  • operating system software such as Windows XP, Windows Vista, Windows 7, Windows 8, Windows Server, Unix, Linux, SunOS, Solaris, iOS, Blackberry OS, or other compatible operating systems.
  • the operating system may be any available operating system, such as MAC OS X.
  • the prevention computing system 100 may be controlled by a proprietary operating system.
  • Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface, such as a graphical user interface (“GUI”), among other things.
  • GUI graphical user interface
  • the exemplary computing system 100 may include one or more commonly available input/output (I/O) devices and interfaces 110 , such as a keyboard, mouse, touchpad, and printer.
  • the I/O devices and interfaces 110 include one or more display devices, such as a monitor, that allows the visual presentation of data to a user. More particularly, a display device provides for the presentation of GUIs, application software data, and multimedia presentations, for example.
  • the prevention computing system 100 may also include one or more multimedia devices 140 , such as speakers, video cards, graphics accelerators, and microphones, for example.
  • the I/O devices and interfaces 110 provide a communication interface to various external devices.
  • the prevention computing system 100 is electronically coupled to the network 160 , which comprises one or more of a LAN, WAN, and/or the Internet, for example, via a wired, wireless, or combination of wired and wireless, communication link 115 .
  • the network 160 communicates with various computing devices and/or other electronic devices via wired or wireless communication links.
  • information may be provided to and/or accessed by the prevention computing system 100 over the network 160 from one or more data sources 166 (add to FIG. 7 ?).
  • the data sources 166 may include one or more internal and/or external data sources.
  • the data sources 166 may include internal and external data sources which store, for example, health and/or medical subject matter data (e.g., addiction/disorder/disease data), addiction and/or other intervention data, and the like.
  • one or more of the databases or data sources 156 , 158 , and/or 166 may be implemented using a relational database, such as Sybase, Oracle, CodeBase and Microsoft® SQL Server as well as other types of databases such as, for example, a flat file database, an entity-relationship database, and object-oriented database, and/or a record-based database.
  • a relational database such as Sybase, Oracle, CodeBase and Microsoft® SQL Server
  • other types of databases such as, for example, a flat file database, an entity-relationship database, and object-oriented database, and/or a record-based database.
  • module refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, Java, Lua, C or C++.
  • a software module may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts.
  • Software modules configured for execution on computing devices may be provided on a computer readable medium, such as a compact disc, digital video disc, flash drive, or any other tangible medium.
  • Such software code may be stored, partially or fully, on a memory device of the executing computing device, such as the prevention computing system 100 , for execution by the computing device.
  • Software instructions may be embedded in firmware, such as an EPROM.
  • hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors.
  • the modules described herein are preferably implemented as software modules, but may be represented in hardware or firmware. Generally, the modules described herein refer to logical modules that may be combined with other modules or divided into sub-modules despite their physical organization or storage.
  • Each of the processes, methods, and algorithms described in the preceding sections may be embodied in, and fully or partially automated by, code modules executed by one or more computer systems or computer processors comprising computer hardware.
  • the code modules may be stored on any type of non-transitory computer-readable medium or computer storage device, such as hard drives, solid state memory, optical disc, and/or the like.
  • the systems and modules may also be transmitted as generated data signals (for example, as part of a carrier wave or other analog or digital propagated signal) on a variety of computer-readable transmission mediums, including wireless-based and wired/cable-based mediums, and may take a variety of forms (for example, as part of a single or multiplexed analog signal, or as multiple discrete digital packets or frames).
  • the processes and algorithms may be implemented partially or wholly in application-specific circuitry.
  • the results of the disclosed processes and process steps may be stored, persistently or otherwise, in any type of non-transitory computer storage such as, for example, volatile or non-volatile storage
  • Conditional language such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.
  • All of the methods and processes described above may be embodied in, and partially or fully automated via, software code modules executed by one or more general purpose computers.
  • the methods described herein may be performed by the prevention computing system 100 and/or any other suitable computing device.
  • the methods may be executed on the computing devices in response to execution of software instructions or other executable code read from a tangible computer readable medium.
  • a tangible computer readable medium is a data storage device that can store data that is readable by a computer system. Examples of computer readable mediums include read-only memory, random-access memory, other volatile or non-volatile memory devices, CD-ROMs, magnetic tape, flash drives, and optical data storage devices.

Abstract

Systems and methods for online assisted pre-intervention or “prevention” are described. A prevention system may provide the ability to initiate a prevention campaign in order to create a customized support forum for persons who may be afflicted by a harmful addiction. The prevention system can receive a request to initiate a campaign for a recipient from a host and facilitate the invitation of other participants to the campaign. Knowledge-based questionnaires may be dynamically generated for the host and participants, and a profile built for the recipient based on received responses. Customized messages may be generated by the prevention system using expert knowledge-based rules, and delivered to the recipient. The messages may be unique to the recipient based on the recipient's circumstances and relationship to the host and participants. Support services provided by the prevention system encourage the recipient to agree to accept help and provide action plan recommendations.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims priority from provisional U.S. Pat. App. No. 61/667,878, filed on Jul. 3, 2012, which is hereby incorporated by reference in its entirety.
  • BACKGROUND
  • Addiction can have a crippling and harmful effect not only to an individual suffering from the addiction, but also to loved ones such as family, friends, and co-workers who care for the afflicted individual. Addiction can take on many forms ranging from physical addiction (e.g., substance abuse, alcoholism, etc.) to behavioral or psychological addiction (e.g., compulsive behavior, gambling, etc.). Confronting and dealing with addiction-related problems is often a significant undertaking which may require the guidance or counseling of a trained professional. Concerned loved ones may decide to take action by conducting an intervention, which can be stressful for those involved as well as costly when a trained interventionist is used. In some cases by the time an intervention is conducted, the afflicted individual is so consumed by the addiction that recovery may be prolonged, difficult, and costly.
  • SUMMARY
  • This disclosure describes a customized prevention system and methods for intervention assistance to enable family, friends, and/or loved ones of an afflicted individual suffering from, or at risk of an addiction or related disorder (e.g., alcoholism, drug abuse, gambling, or other harmful addictions), to create a personal, customized support forum and messaging system for the individual in order to motivate the individual to take the first step towards recovery. The design of this forum is to encourage, motivate, or otherwise cause the individual (e.g., “a recipient”) to recognize that there is a problem and gain the courage to take the first step towards recovery. This may ultimately be in the form of entering a rehabilitation facility or program, or recognizing the problem and how it is affecting those around them and recommending an action plan to take steps towards recovery. This forum empowers the loved ones of the suffering individual to take action in showing their love and support, and enables them to feel like they are doing their part in assisting the at-risk individual towards eventual recovery. To enable a person that has a friend or loved one who is suffering from a curable disease to break the cycle of the disease and to get help. The goal of the system described in the present disclosure is to help persons create an effective customized digital message of love and care to plant a seed of healing and initiate the process of recovery in the life of someone afflicted with an addictive disorder, helping to lead the message recipient into treatment.
  • The prevention system and methods described herein generally involve an individualized and customized web-based prevention or “pre-intervention” system that enables the relatives, friends, and/or loved ones of an afflicted individual to help motivate the individual to take the first step towards recovery (e.g., entering a recovery program and/or entering a rehabilitation facility, such as before a full-scale intervention becomes necessary, or when financial constraints don't make an intervention feasible). The prevention system facilitates the creation and delivery of pre-configured and approved messages sent on behalf of the concerned individuals to the afflicted individual. The prevention system also enables the creation and delivery of customized written, audio, and/or video messages that have obtained the input and support of a trained professional (e.g., a “preventionist”). A “host” (e.g., a loved one seeking to help an at-risk individual) may begin the prevention process, and invite other guests (e.g., family/relatives, friends, and co-workers) to participate in the prevention.
  • The host first creates an account with the prevention system and, in some embodiments, pays for the “prevention.” The Host then goes through the process of answering a series of questions that are provided to the prevention system and entered into an expert rules engine. The expert rules engine may include or have access to, for example, a rules based knowledge database that is configured to gain intelligence as it receives input from the host and participants. As they describe the circumstances necessitating the prevention, providing further details about the intended recipient's specific situation, sharing their personal thoughts and feelings about the circumstances and the recipient, the prevention system generates a motivational message based on the various input criteria. Through the prevention system, a customized and personal message is generated for delivery to the recipient via a variety of means including for example delivery and/or presentation via email, text message/SMS, mobile application (e.g., for iOS, Android, Windows Mobile, and other mobile operating systems), as well as via desktop and laptop computers. In some embodiments, the host may recruit additional co-hosts to create their own support messages and/or make donations for the recipient to attend a treatment program which may be accessed, for example, via a website or service provided by the prevention system. Each co-host may follow a similar procedure to create written, audio, or video message. In some embodiments involving added personal content, the host and a trained professional counselor (e.g., a “preventionist”) may review all customized messages before the final message and/or invitation to join the prevention is delivered to the recipient. The message and/or invitation may then be sent to the recipient.
  • The message may be generated and provided in a variety of different formats and contain a variety of different levels of content. The message can range from a simple wall of pre-configured and semi-customized letters/cards to an entire customized room where the person can listen to and watch the personalized audio and video messages from his loved ones. The prevention computing system may deliver the invitation to the person via email, text, and/or voicemail. When the recipient receives the message and accepts the notice to join the prevention he/she may be greeted by the host, who will be the first point of contact. In some embodiments, the host's customized message may be delivered first, and the recipient may be presented an opportunity to read, watch, and listen to the other personalized messages of love, support, and concern. The message recipient will then have the opportunity to say “Yes” to accept help and begin the recovery process.
  • As described herein, a prevention (sometimes referred to as a “prevention campaign) may be generally thought of as a “pre-intervention”. One purpose of the prevention is to reach out to a loved one to express concern over his/her addiction (e.g., drug and/or alcohol use). The prevention computing system enables users to reach out before it becomes time for a full intervention, and to plant the seed of healing when for whatever reason an intervention may not be feasible. The purpose is to support a loved one getting the necessary help to start recovery from the disease of substance abuse. The prevention system allows users to notify the recipient in a warm, non-threatening, caring way with messages created and sent from friends and loved ones who have taken the time because they care. Friends and loved ones are hopeful that the recipient will acknowledge that the problem will only get worse and to accept help before that happens. The emphasis is on planting a seed, dispelling denial, and inspiring the recipient to take the first step to accept help. A prevention may be initiated via the prevention system when it is evident that a person needs help (e.g., participation in some form of in-patient treatment, sober living, or meetings) but has not taken the action on his/her own. In some cases an actual professional intervention may be more appropriate, and the preventions system may provide such a recommendation after an initial qualifying questionnaire is responded to by a user who wishes to initiate a prevention. In some instances, the prevention system may offer an upgraded version that utilizes the support and advisory services of a trained professional with the equivalent training and expertise of an Interventionist.
  • One benefit of the prevention system is that it differs from a traditional intervention. The prevention system utilizes an expert system to advise the participants on how to create an effective message, follow established protocol in dealing with addictive disorders (e.g., via a web site or application) as an effective method of helping their loved one and/or as a helpful preparation for a potentially necessary engagement by a team or professionals in a more traditional treatment setting. The purpose of an Intervention is generally to get the recipient into a treatment program or sober living environment-as either a first step towards a full blown intervention, or as a step to reach out to a person again after they may have relapsed. The digital tools offered by the prevention system can enable an interventionist to utilize all of the information gathered during a prevention to save time and increase the efficacy of the intervention, should that step be needed in the eventual treatment of the disease. Generally there are higher costs associated with interventions, which combined with other factors can make them not feasible for certain persons. Thus, a prevention can directly assist in the important fact gathering for an intervention, setting up and preparing for this more involved and time consuming alternative. The prevention is not intended to supplant the intervention. Rather, a prevention can be either a lower cost alternative, a source of re-enforcement, or provide an important bridge to an intervention.
  • Embodiments of the prevention system as described herein can provide a number of benefits. First, the prevention system leverages the latest technology tools to provide a safe, effective, and customized forum so that afflicted individuals who are or may be suffering from an addictive disorder, such as alcoholism or drug addiction, can begin the process of recovery and gain a sense of control and power over what might otherwise be an out of control situation. For example, video mapping may be used to filter content from input about an individual suffering from an addiction and match it to content in a specific video or video library. Second, the prevention system creates a healthy environment where an afflicted individual (e.g., a recipient) suffering from alcoholism and/or other unhealthy addictions can receive a pre-intervention message (e.g., a “Prevention”) and know that he/she is not alone and that there is a support group sending personalized messages of love, support, and concern, from people who are willing to do their part in helping the afflicted individual recognize the problem and help motivate him/her to take the first step toward recovery. The prevention system also enables the afflicted individual to start the process of healing by planting the seed and progressing to taking the all important first step towards recovery. This also enables caring people (e.g., a host and participants) to feel they are doing something positive to help, giving them a sense satisfaction and self-empowerment of knowing they are doing something to help the loved one threatened or consumed by addiction.
  • In one embodiment, the prevention system may be a web based system that enables a host customer (such as an individual motivated to help a friend or loved one suffering from alcohol, drug abuse or other addiction disorders) to create a message of love and caring to a recipient (such as the friend or loved one suffering from the addiction disorder), and then deliver the message via the internet in a format optimized for a variety of viewing platforms, including but not limited to, for example, cell/smart phone, tablet, portable/mobile computing device, desktop, laptop, or personal computer.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram which illustrates an exemplary data flow between an individual's computing device and a prevention computing system, according to one embodiment.
  • FIG. 2 schematically illustrates a logical flow diagram of a process for an individual, such as a host, to initiate a prevention campaign for a recipient, involving an embodiment of a prevention computing system, such as the prevention computing system of FIG. 1.
  • FIG. 3 is a logical flow diagram of a process 300 for beginning a campaign process on behalf of a host and/or participants, involving an embodiment of a prevention computing system, such as the prevention computing system of FIG. 1.
  • FIG. 4 is a logical flow diagram of a process 400 involving an expert engine to generate questions and/or actions for a prevention campaign, involving an embodiment of a prevention computing system, such as the prevention computing system of FIG. 1.
  • FIG. 5 is a logical flow diagram of a process 500 for generating one or more messages for a recipient as part of a prevention campaign, involving an embodiment of a prevention computing system, such as the prevention computing system of FIG. 1.
  • FIG. 6 is a logical flow diagram of a process 600 for providing one or more messages for a recipient as part of a prevention campaign, involving an embodiment of a prevention computing system, such as the prevention computing system of FIG. 1.
  • FIG. 7 is a block diagram showing an embodiment in which a prevention computing system is in communication with a network, and various systems, such as user computing devices, are also in communication with the network.
  • DETAILED DESCRIPTION Overview
  • As described herein, a prevention computing system (or simply “prevention system”) enables and facilitates a pre-intervention “prevention” campaign on behalf of one or more individuals who wish to provide help for an afflicted loved one. As used herein, a host is the person/individual who initiates a campaign, identifies a recipient of the message, and invites other participants to join. The host controls the campaign and makes the final approval to deliver the message to the recipient. The recipient is the person to whom the message is intended for, and whom the host has identified as the target of the campaign. A participant is a person invited by the host to join the campaign. The participant can be, for example, a friend, a relative, a co-worker, or other individual concerned for the well-being of the recipient. A preventionist may be, for example, a professional counselor who may get involved in a campaign to assist the host and participants in the creation of the message.
  • A campaign refers generally to the process of a specific prevention. A campaign starts with the host creating an account with the prevention system and identifying the recipient. A campaign may end with the final delivery of the message to the recipient. The campaign process may involve viewing a video on a subject related to a disorder and/or the intervention and prevention processes, filling out a questionnaire, inviting other participants to the campaign, creating a message for the recipient, and delivering the message to the recipient. A campaign definition may define what is included in a particular campaign for a specific problem (e.g., an illness, addiction/disorder, disease, or similar issue to be addressed in the prevention). The campaign may include a questionnaire comprising one or more question sets, each question set comprising one or more questions that are part of the questionnaire. In some embodiments involving the presentation or display of a user interface to the host and/or participants completing the questionnaire, a page group may be defined as part of the questionnaire, wherein the page group is identified as a group of questions that can be displayed on a single page or user interface screen.
  • Each campaign may be targeted toward a specific problem. For example, one type of campaign may be designed to address alcoholism, another type of campaign may be designed to address drug addiction (or multiple types of campaigns for each of multiple types of drug addictions), another type of campaign for gambling addiction, and so on. The campaign definition may include a list of items that are needed to fulfill a specific type of campaign. The items listed may include questionnaire sets, videos and other media, action definitions, and other reference material. A campaign container may be created at the start of any new campaign and configured to store the progress and results of the campaign as it progresses. For example, this may include a list of participants, and questions and answers to questions asked of the participants.
  • Embodiments of the disclosure will now be described with reference to the accompanying figures, wherein like numerals refer to like elements throughout. The terminology used in the description presented herein is not intended to be interpreted in any limited or restrictive manner, simply because it is being utilized in conjunction with a detailed description of certain specific embodiments of the disclosure. Furthermore, embodiments of the disclosure may include several novel features, no single one of which is solely responsible for its desirable attributes or which is essential to practicing the embodiments of the disclosure herein described.
  • High Level Process and Data Flow
  • FIG. 1 is a block diagram which illustrates an exemplary process and data flow between a host (e.g., via a computing device 162A), one or more participants (e.g., via one or more computing devices 162B), an optional preventionist (e.g., via a computing device 162C), a recipient (e.g., via a computing device 162D), and a prevention computing system 100, according to one embodiment. The data flow of FIG. 1 illustrates how the host can initiate a prevention campaign, via the prevention computing system 100, to generate and deliver a customized message to the recipient.
  • Beginning at step (1), the host initiates a prevention campaign with the prevention computing system 100. This process may include creating an account for the host and presenting a short orientation video to the host. The host may invite other participants to the campaign, such as family members, friends, or co-workers. In one embodiment, only the host may invite other participants.
  • In one embodiment, initiating the prevention campaign may involve, for example, providing responses to a qualifying questionnaire and/or inviting one or more participants to participate in the prevention campaign. The qualifying questionnaire may contain certain key questions which are asked to initialize a campaign and verify an appropriateness of a message to be generated. The qualifying questionnaire may also be used to qualify the worthiness and need for treatment of the message recipient in accordance with applicable Health Insurance Portability and Accountability Act (“HIPPA”) laws and regulations and professional industry guidelines and practice for the treatment of persons with particular addiction symptoms.
  • At step (2), the prevention computing system 100 generates a questionnaire for the host and/or for the participants. As will be further described, in some embodiments the questionnaire may be generated iteratively using a variety of machine-based learning techniques and/or knowledge-based rules, such that responses or answers to a first question (or question set) received from the host and/or the participants may be used to determine the next question (or question set) that may be provided as part of the questionnaire, and so on until the questionnaire has been completed. The questions provided in the questionnaires may be based on data accessed, for example, from a preventions data source 156. The preventions data 156 may store, for example, subject matter data for a variety of disorders, expert or knowledge-based rules related to the subject matter data, and/or predefined questions. The prevention computing system 100 may access the prevention data 156 and, via an expert rules engine 150, determine and/or generate questions to be provided as part of the questionnaire based at least in part on the accessed prevention data (e.g., subject matter data for disorders and/or related knowledge-based rules for the subject matter). This process is illustrated and described in more detail with reference to FIG. 4 herein.
  • At step (3) the questionnaire is provided to the host and/or participants, who then provide responses to the prevention computing system 100. The questionnaire may be provided, for example via a user interface generated by a user interface module 152 of the prevention computing system 100. The user interface may be configured for display on computing devices 162A and 162B. As the prevention computing system 100 receives the questionnaire responses, a profile for the recipient may be created and updated based on the questions and received responses. The profile may be stored for example in a campaign and/or profile data source 158, along with other data related to the campaign, the host, and/or the participants of the campaign.
  • The process and data flow at steps (2) and (3) may be repeated an indefinite number of times until the questionnaires have been completed by the host and/or participants. The length and type of questionnaire provided may vary depending on a type of disorder, the nature of the recipient's condition as indicated by the received responses, and other factors. In some embodiments, as information about the recipient is received and collected by the prevention computing system 100, the system may use the information to determine and provide relevant questions to the other participants. Thus the prevention computing system 100 may utilize what it has learned through the questionnaire process and express the knowledge it has already gained from the previous questions asked.
  • At step (4), the prevention computing system 100 utilizes the data collected through the questionnaire/input process to generate a customized message to the recipient. The message may be generated, for example via a messaging module 154, based on a series of pre-established recommendations and/or prompted preloaded information, which may be stored and accessed from the prevention data source 156. In one embodiment, the message may be a basic message which is restricted to content that the prevention system generates because the host and/or participants may not necessarily be qualified to make decisions about important variables and appropriate content. In some embodiments, a unique and personal message may be generated for each of the host and participants, and the host may have access to view each of the messages and decide to use or not use any of the messages for delivery to the recipient. According to one embodiment, the host will make the final decision to begin the delivery process.
  • In another embodiment, the host may also choose or enroll in an enhanced service to access help from a professional counselor (e.g., a “preventionist”). Thus, at step (5) the preventionist may get involved in the campaign to, for example, assist the host and participants in the creation of the message. The preventionist may provide an assisted delivery option by providing input for the customized message. In some embodiments, when the host has enrolled to access the services of the preventionist, the prevention system may grant the host to with administrative access and/or additional privileges which may allow the host to make changes to be made to the message, including allowing the host and/or participants to add personal letters, photos, videos, and other content. The preventionist may be involved in this process to ensure that any additional, personalized content is still appropriate for the recipient's particular disorder or circumstances.
  • At step (6), the prevention computing system 100 provides the customized message to the recipient. The customized message may be provided to the recipient in a variety of formats including electronic mail (“email”), text message (Short Message Service (“SMS”) or Multimedia Message Service (“MMS”)), HTML 5.0 optimized messages for smartphones/tables, and so forth. In some embodiments, the customized message may include an option or invitation for the recipient to view the message on a web page provided by the prevention computing system 100. The customized message may also provide an option for the recipient to agree to accept help, which may prompt the prevention computing system 100 to create an account for the recipient. In some embodiments, the prevention computing system 100 may repeat step (6) an indefinite number of times by periodically sending additional customized messages generated by the prevention computing system 100 and selected by the host.
  • In FIG. 1, the prevention data source 156 and campaign and/or profile data source 158 are shown as stand-alone data stores accessible by the prevention computing system 100. In some embodiments, such as the embodiment of the prevention computing system 100 shown in FIG. 7, the prevention data source 156 and campaign and/or profile data source 158 may be included as part of the prevention computing system 100.
  • Examples of Question Generation and Data Gathering Methods Performed by a Prevention Computing System
  • The prevention computing system 100 of FIG. 1 includes an expert rules engine 152 (also referred to as a knowledge based rules engine herein) which gathers information about a person afflicted with an addictive disorder, stores it in a digital format (e.g., in the campaign and/or profile data store 158), and then processes the inputs through a series of detailed questions that become more specific and tailored to the individual as the system accumulates knowledge about the person. The purpose of this questioning is to gather information about a person suffering from an addictive disorder, rendering intelligent advice and then making specific recommendations of actions for treatment based on expert rationale on how and where to get help that is based on established treatment protocols and extensive industry knowledge. It is a type of inference engine that utilizes mixed chaining methodologies to build an output recommendation based on the processing of various input data. The rules engine may implement knowledge engineering techniques which involve learning to ask more specific and appropriate questions as a profile on the person is built and/or updated as information is provided to it, allowing it to further refine the specificity, appropriateness, and accuracy of its output based on the intelligence in the system. The expert rules engine 152 may also be contributed by a “subject matter expert” (“SME”) which establishes the extensive rule sets. The expert rules engine 152 may be configured to recognize fact patterns and preferences so that it can match the input criteria with specific output actions including, treatment recommendations, suggested action steps to be taken, as well offer advice and recommendations for the usage of specific experiential content during the message creation process.
  • The prevention computing system 100 may use “circumstantial questioning” to ask questions in order to identify the degree of disease progression and barriers established by the recipient to deny the existence of the disease. Thus, the prevention computing system 100 learns from the last question as it formulates the next one to ask. This may be thought of as a conversational inference engine which gathers pertinent information necessary to begin processing an output (e.g., a message and/or an action plan for the recipient), using a combination of chaining methods (e.g., mixed chaining, backward chaining, etc.) such that an ultimate determination can be made about the exact condition of the person's disease progression and the best recommendation that can be made to treat it.
  • In some instances, input process implemented by prevention computing system 100 may involve a standard fault diagnosis method to accumulate information that is later utilized to establish an output. Using an underlying backward chaining technique, simple confirmations may be made. For example, once certain questions are answered in the affirmative, the prevention computing system 100 may conclude or presume that the disease is present, and therefore the expert rules engine 152 may focus on quantifying to what extent the disease has progressed, instead of asking questions to confirm its existence. The expert rules engine 152 can then try to determine how much of the disease is present, and the questioning may begin to follow a pattern to quantify the manifest effects. The system uses past answers to process the next questions, based on rules sets that are pre-established for the questions. Thus, the prevention system accumulates knowledge and domain expertise with the data provided from questioning. The system gathers data as it goes along to gain intelligence, which is derived from the information given to it, and then it utilizes this knowledge to develop and make recommendations, offer solutions based on the fact patterns given to it and render effective advice and opinions.
  • In some embodiments, the expert rules engine 152 of the prevention computing system 100 may be enhanced by a body of knowledge in the treatment of addiction disorders. This knowledge may be accessed, for example, from the prevention data source 156 or from other third-party data sources (e.g., data sources 166 described with reference to FIG. 7). Each addiction disorder presents unique and differing circumstances across many variables, yet in many ways the disease follows a pattern that can be mapped and quantified. While circumstances vary to a great degree, the disease itself can be broken down into progress segments and categorized based on type and the degrees of severity. The prevention computing system 100 and/or prevention data store 156 stores detailed experiential knowledge and treatment responses which the system accesses. As various details are provided through the input process, the expert rules engine 152 learns about the recipient and finds correlations with established standards of disease progression. The expert rules engine 152 can then create and recommend conclusions based on its knowledge and input received from, for example, the host and/or participants. As it receives input the prevention computing system 100 learns, and determines and/or generates the way to solve the problem. The expert rules engine 152 assess what missing information to request so that it can complete its intake process and then formulate a response that is appropriate and yet custom and specific to the person. The expert rules engine 152 utilizes if-then reasoning and logic to gather input and know which questions to ask and not to ask. Thus, the expert rules engine 152 can decipher important personal data and match it with corresponding action solutions.
  • The expert rules engine 152 may also be configured to implement fault detection techniques. For example, the expert rules engine 152 may evaluate answers and infer intent in order to determine if the answer likely to be authentic. If individual responses vary from expected behavior the expert rules engine 152 can ascertain that the response is not genuine or is a hoax. This is especially important in circumstances where third parties may be reporting about a person that appears to be at high risk. The expert rules engine 152 may also be able to measure the acuteness of certain responses to key questions, so that high-risk situations and other variations can be flagged for recommended action that is specific and appropriate to the circumstances.
  • FIG. 2 is a logical flow diagram of a process 200 for an individual, such as a host, to initiate a prevention campaign for a recipient, involving an embodiment of a prevention computing system, such as the prevention computing system 100 of FIG. 1. The method of FIG. 2 will be described herein as being performed by the prevention computing system 100 and/or its components, but in other embodiments the method may be performed by one or more other computing systems, possibly in cooperation with the prevention computing system 100. In one embodiment, the process or routine can be dynamic, with some procedures omitted and others added.
  • Beginning at block 205, the prevention computing system 100 may provide a qualifying questionnaire to a host, for example via a web-based user interface as generated by user interface module 152, to acquire initial information about a recipient and the recipient's condition. At block 210, the prevention computing system 100 receives responses to the qualifying questionnaire from the host. At block 215, the prevention computing system 100 determines whether a prevention is qualified, based at least in part on the received responses to the qualifying questionnaire. For example, based on the responses, the prevention computing system 100 may determine that the recipient's condition is too serious for a prevention. Thus, at block 220, the prevention computing system 100 may, in response to a determination that the prevention is not qualified, provide a recommendation to the host to seek professional help. This in itself may be of significant value to the host, who might not otherwise suspect that the intended recipient's condition has progressed to the point at which professional help is the preferred or recommended solution.
  • If the prevention computing system 100 determines that the prevention is qualified, the process 200 may proceed to block 225 where the prevention computing system 100 determines whether it has received a request to invite participants to the prevention. For example, the host may provide the request to invite participants before, during, or at the conclusion of the qualifying questionnaire process. The request to invite participants may include the necessary contact information (e.g., name, email address, phone number, etc.) to enable the prevention computing system 100 to send invitations to the participants. If the prevention computing system 100 determines that a request to invite participants has been received, then at block 230 prevention computing system 100 may invite the participants, for example by sending an invitation email or similar communication to the participant(s) inviting them to join the prevention and create an account with the prevention computing system 100.
  • At block 235, the prevention computing system 100 initializes accounts for the host and/or any invited participants. Account information may be stored, for example, in the campaign and/or profile data store 158. At block 240, the prevention computing system 100 may initialize the campaign on behalf of the host and/or participants. The campaign process is illustrated and described in more detail with reference to FIG. 3 herein.
  • FIG. 3 is a logical flow diagram of a process 300 for beginning a campaign process on behalf of a host and/or participants, involving an embodiment of a prevention computing system, such as the prevention computing system 100 of FIG. 1. The method of FIG. 3 will be described herein as being performed by the prevention computing system 100 and/or its components, but in other embodiments the method may be performed by one or more other computing systems, possibly in cooperation with the prevention computing system 100. In one embodiment, the process or routine can be dynamic, with some procedures omitted and others added.
  • At block 305, the prevention computing system 100 determines a campaign (or type of campaign) based on a qualifying questionnaire (e.g., such as the qualifying questionnaire as described with reference to the process 200 in FIG. 2). This process involves, for example, determining which, if any, campaign definition is suitable for the host, and establishing any keyword filters to be applied to the detailed questionnaire and question sets in the campaign definition. Keyword filters in question sets may be used to tailor the detailed questionnaire to the specific conditions of the campaign. For example, if the qualifying questionnaire reveals that the recipient is not working, then questions asking about employment or co-workers may not be presented in subsequent detailed questionnaire and/or question sets.
  • At block 310, the prevention computing system 100 generates an initial profile for the intended recipient. The profile may be stored and accessed from, for example, the campaign and/or profile data store 158, and may be linked to the host and/or participant accounts and/or profiles.
  • At block 315, the prevention computing system 100 may optionally provide video content to the host and/or participants related to the campaign. For example, video content may be provided based on an initial assessment about the recipient's condition or problem, including education and background information about the condition or problem, possible treatments for the condition or problem, concerns and cautions to be aware of during a prevention and/or intervention process, and other related information. The video content may be stored and accessed from, for example, the prevention data source 156, or from another data source. In some embodiments the video content may be provided to the host and/or recipients at earlier stages of the prevention campaign, such as before, during, or after completion of the qualifying questionnaire, before the host and/or participants create accounts, or any other time before, during, or after the prevention campaign which may be appropriate.
  • At block 320, the prevention computing system 100 generates and provides a detailed questionnaire (e.g., questions and/or question sets) based on the determined campaign. For example, the questions presented in the detailed questionnaire may depend on factors that are determined during the qualifying questionnaire, including for example (1) the campaign type or type of problem/condition (e.g., alcohol abuse, drug abuse, etc.); (2) the relationship between the host and/or participants and the recipient (e.g., family member, friend, co-worker, etc.); and (3) character traits of the participant (e.g., serious, casual, religious, authoritative, etc.). Additional detail about the question generation process, as driven by, for example, the expert rules engine 150, is illustrated and described with reference to FIG. 4 herein.
  • Presentation of the questionnaire can vary depending on the implementation. For example, questions may be grouped together in a question set. A question set may include one or more questions that are related to a specific line of thought. Questions may also be further divided into page groups. A page group can be used to designate a series of questions that can be placed together on a single page (e.g., a web page displayed as part of a user interface for the questionnaire, generated for example by the user interface module 152). Data related to the questionnaires, questions, question sets, and/or page group may be stored and accessed, for example, in the prevention data source 156.
  • At block 325, the prevention computing system 100 receives responses to the questionnaire from the host and/or participants. In one embodiment, the questionnaire does not need to be completed in one sitting. The host/participant may leave and return at any time during the questionnaire and resume where he/she left off. In some embodiments, the user may go back to a previously asked question and change an answer if needed at any time during the questionnaire. In some embodiments, the host and participant may communicate with each other via a messaging and chat system on the site. In one embodiment, participants may only communicate with the host, but not with each other.
  • As the responses are received, the prevention computing system 100 may process and use the responses to generate subsequent questions in the questionnaire. Thus, for example, the process 300 may return to block 320 and repeat blocks 320 and 325 an indeterminate number of times to determine and provide subsequent questions in the questionnaire which are appropriate based on prior received responses. Additional detail about how the responses may be used to inform the question generation process, as driven by, for example, the expert rules engine 150, is illustrated and described with reference to FIG. 4 herein.
  • At block 330, the prevention computing system 100 builds or updates a profile for the intended recipient based, for example, on the received responses. For example, the responses received by the prevention computing system 100 may be stored in the campaign and/or profile data source 158, for example, as part of the prevention campaign associated with the host or recipient. The responses may then be accessed for use in either the questionnaire process and/or the message generation process.
  • At block 335, the prevention computing system 100 can generate one or more messages for the intended recipient. The messages may be generated, for example, once the host and/or participants have completed the questionnaire process and the prevention computing system 100 has received the responses. Additional detail about the message generation process, as driven by, for example, the expert rules engine 150 and/or messaging module 154, is illustrated and described with reference to FIG. 5 herein. Once the messages have been generated, the host may select one or more messages (see, e.g., FIG. 5 herein) for the prevention computing system 100 to provide or send to the recipient (see, e.g., FIG. 6 herein).
  • FIG. 4 is a logical flow diagram of a process 400 involving an expert engine to generate questions and/or actions for a prevention campaign, involving an embodiment of a prevention computing system, such as the prevention computing system 100 of FIG. 1. The method of FIG. 4 will be described herein as being performed by the prevention computing system 100 and/or its components, but in other embodiments the method may be performed by one or more other computing systems, possibly in cooperation with the prevention computing system 100. In one embodiment, the process or routine can be dynamic, with some procedures omitted and others added.
  • With reference to the process 400 described below, the following listing provides one example implementation of the structure of a question which may be used to facilitate the dynamic generation of questions and/or actions for a detailed questionnaire according to one embodiment:
      • ID: a unique identifier for the question
      • Order: a numeric value which determines the order in which the question is presented during the questionnaire. Questions with lower order numbers are presented before questions with higher order numbers. It is possible for questions to have equal order numbers in which case the order is not defined.
      • Question Tag-Weights: The tag-weight is a keyword and weight value pair that is assigned to the question. In this case, the weight acts as a threshold value. The question is activated if the campaign tag table contains the tag weighted at or higher than this threshold. If the campaign tag table does not contain the tag, or is weighted lower than the threshold, then the question is not activated for the campaign.
      • Type: A question type may be one of, for example, TEXT, TEXTBOX, RADIO, CHECKBOX, SELECTION.
      • Question: Contains the question text presented to the user.
      • Options: For question types that require options (e.g., RADIO, CHECKBOX, SELECT, etc.), these are the list of options. Each option contains a text and key parameter. For TEXT and TEXTBOX question types, the options contain a list of keywords. If a keyword matches any of the input text, the option is considered selected. In this case, multiple option selections are possible.
      • Option Tag-Weights: The option tag-weight is a keyword and weight value pair that is assigned to an option value. Options can have more than one tag-weight pair. If the option is selected, the tag is added to the campaign tag table. If the tag already exists in the campaign tag table, then the weight is added to the previous weight. Weights can be positive or negative.
      • Rule Condition: One of IS, ISNOT, CONTAINS, DOESNOTCONTAIN, LESSTHAN, LESSTHANEQUAL, MORETHAN, MORETHANEQUAL. Each question may have zero or more rules (condition/action pairs). Each rule condition is tested by comparing the rule parameter with the selected option or matching keyword. If the test succeeds, then the rule action is applied
      • Rule Parameter: This text/numeric value is used to match the rule condition with the selected answer.
      • Rule Action: If the tested rule condition is successful, this action is applied. Actions are defined as needed and may be as simple “skip to question id#”, or trigger a response event. Use cases for this would be to skip questions that don't apply to the current situation, or trigger events to activate programmed responses.
  • With reference now to FIG. 4, beginning at block 405, the prevention computing system 100 determines one or more initial questions for the detailed questionnaire to be provided to a host and/or participants. For example, the initial questions may be determined based on a campaign definition associated with the prevention campaign. For example, in one embodiment, the expert rules engine 152 may implement a tag table technique to generate filtered questions, messages, and actions. Each campaign may include a tag table per host and/or participant. The campaign tag table includes a list of tag or key words which may be used during the campaign. Each tag word contains a weight value that accumulates during the campaign. The tag table may be used to help determine or select which questions are included during the questionnaire, and also to help select message snippets to be included in the final message. The prevention computing system 100 may use the responses from qualifying questionnaire is to build the initial tag table. The tag table may then be used to select the campaign type and question sets for further questioning.
  • At block 410, the prevention computing system 100 receives user input responses to the questions presented via the questionnaire (e.g., as provided as part of the process 300 at block 325). Continuing the tag table example, each question response adds to the campaign tag table, such that over time the weight value accumulates.
  • At block 415, the prevention computing system 100 generates a weighted list of potential questions, message snippets, and/or actions, for example based on the received user input responses. Continuing the tag table example, the tag table may be used to filter questions in subsequent question sets based on tag weights associated with certain questions
  • At block 420, the prevention computing system 100 selects questions, message snippets, and/or actions based on the weighted list. Continuing the tag table example, one or more messages can be generated by accessing message snippets from a database (e.g., the prevention data store 156) based on the highest thresholds for matching tags in the campaign tag table.
  • As one example of how the tag table may be implemented to inform the expert rule engine 152, during a questionnaire, a question may be asked regarding smoking (or, e.g., any other addiction-related illness or disorder, such as alcoholism, gambling, compulsive behavior, etc.). The affirmative option for the question may define a tag-weight for the tag “smoking” with a weight of “5.” If answered in the affirmative, the “smoking” tag with weight “5” is added to the campaign tag table. A follow-up question may ask about the frequency of smoking. This question may include multiple select options with varying weights for the “smoking” tag. If the respondent selects “Two packs a day” this may add a weight of “50” to the “smoking” tag in the campaign tag table, so the “smoking” tag is now weighted at “55.” For subsequent question sets, questions that contain a question tag-weight tag for “smoking” are only activated if the tag-weight threshold is below “55.” These question sets may add additional tags to the campaign tag table such as “hospitalization”, “cancer risk,” or “overdosed” each with an accumulated weight. When the message is generated, snippets are queried (e.g., from the prevention data source 156) for matching tags from the campaign tag table and selected by their highest threshold value that is not higher than the tag weight.
  • Examples of Message Generation, Delivery, and Follow-Up Methods Performed by a Prevention Computing System
  • One benefit of the prevention computing system 100 is that it can produce a set of well written messages that appear to have been written by the host and/or participants and express the host and/or participants' wishes. The messages may be professionally designed to encourage the recipient to seek help. Message variety may be obtained by drawing from a pool of message snippets to formulate the message. Message snippets may be stored in a database (e.g., the prevention data source 156) and may include attributes that categorize the snippet by campaign type, relationship of participant to recipient, character of participant, and component of the message which determines the order the snippet is placed in the message. A message may include several components, including for example a salutation, an introduction, a position, evidence, counter arguments, a call to action, and a signature. Each snippet may have multiple versions, each version using different words to say the same thing. The prevention computing system 100 and messaging module 154 may be configured to ensure that any snippet is used only once in a campaign, such that every message in the campaign is unique.
  • The prevention computing system 100 offers myriad choices of output messages based on the many input criteria provided during the input questioning process described above. The host may also able to customize the messages with style choices and confirm fact patterns that have been established by the previously provided data during the questionnaire process. Details about the relationships from the host and each of the participants enable the system to tailor the messages to the recipient with the appropriate vernacular that would be customary to that relationship. For example the prevention computing system 100 can differentiate, and generate different messages from, a child to a recipient that has a distant relationship with the child (e.g., because of a divorce and subsequent separation from the child) versus a child that has had a close relationship with a fully engaged parent. The prevention computing system 100 can differentiate recommendations based on relationship, gender characteristics, age, marital status, relationship history, experiential facts, as well as circumstantial and social dynamics. The prevention computing system 100 further differentiates such details as the history of the destructive activity, the family history with the disease, the current living dynamics and relationship dynamics, addiction history, treatment history, severity assessment, financial evaluations, etc. The prevention computing system 100 can detect personal fact patterns about the recipient's circumstances and risk features, and then identify correlating content in its messaging data store (e.g., as stored in prevention data source 156) as well as its video testimonial content library (e.g., as stored in prevention data source 156) to match the recipient's circumstances with an appropriate message or video to achieve the optimum impact.
  • In some embodiments, the prevention computing system 100 follows a message output pattern that mirrors effective methods and processes in addiction treatment. For example, the process establishes the place of love and care that the host and participants are coming from, offers a sympathetic connection to establish trust and to disarm the recipient, clarifies the problems that the disease is causing, in certain instances recalls better times to establish a key reference point for the recipient, addresses how the disease has taken a hold of the person, provides examples of how this has happened, and genuinely asks the person to accept the gift of help.
  • In some embodiments, the prevention computing system 100 enables the host to create an action plan that recommends to the recipient the next step to take if they agree to get help. The messaging module 154 may combine the extensive information gathered about the recipient from the questioning, and then gives the senders a series of choices from drop down menu options based on the input provided and knowledge the system has gained to enable them to create a truly customized and personal message that is impactful.
  • FIG. 5 is a logical flow diagram of a process 500 for generating one or more messages for a recipient as part of a prevention campaign, involving an embodiment of a prevention computing system, such as the prevention computing system 100 of FIG. 1. The method of FIG. 5 will be described herein as being performed by the prevention computing system 100 and/or its components, but in other embodiments the method may be performed by one or more other computing systems, possibly in cooperation with the prevention computing system 100. In one embodiment, the process or routine can be dynamic, with some procedures omitted and others added.
  • At block 505, the prevention computing system 100 generates one or more customized messages based on the received questionnaire responses and/or a recipient profile. The messages may be generated dynamically, for example by the expert rules engine 150, using similar techniques or algorithms as described with reference to FIG. 4. For example, the tag-weighting approach described above may be used to retrieve message snippets (e.g., from the prevention data source 156) for matching tags from a tag table for the campaign and selected by their highest threshold value that is not higher than the tag weight.
  • At block 510, the prevention computing system 100 provides the customized messages to the host for selection. The host may also be prompted to provide an indication of the order and/or frequency of which the customized messages are to be delivered to the recipient. The order and/or frequency may also be determined based on a service level for which the host is subscribed. For example, a basic subscription level may allow the host to select up to three messages (or any other number) to be delivered once per week (or any other periodic basis), while an advanced subscription level may allow the host to select all customized messages with a preferred order and delivery schedule. Any variation on the subscription level may be possible. In some embodiments the order and frequency may be determined as part of the campaign definition or as determined by a preventionist involved in the prevention campaign.
  • In some embodiments, the host may be subscribed to or otherwise have access to a preventionist as part of the prevention campaign. At block 515, as part of such a service, the host and/or participants may be provided the option to provide additional personal content to be included in the customized message(s) to the recipient. For example, audio and/or video recordings, personal notes, and the like may be received by the prevention computing system 100 to be included with the customized messages. In some embodiments, the preventionist involved in the prevention campaign may then assist the host in determining whether any such personal content should be included with the messages.
  • At block 520, the prevention computing system 100 receives the selection of message(s) from the host. The prevention computing system 100 may also receive with the selection delivery preferences (e.g., order, frequency) as described above. At block 525, the prevention computing system 100 provides the selected message(s) to the recipient. Additional detail about how the messages may be provided to the recipient, as driven by, for example, the messaging module 154, is illustrated and described with reference to FIG. 6 herein.
  • FIG. 6 is a logical flow diagram of a process 500 for providing one or more messages for a recipient as part of a prevention campaign, involving an embodiment of a prevention computing system, such as the prevention computing system 100 of FIG. 1. The method of FIG. 6 will be described herein as being performed by the prevention computing system 100 and/or its components, but in other embodiments the method may be performed by one or more other computing systems, possibly in cooperation with the prevention computing system 100. In one embodiment, the process or routine can be dynamic, with some procedures omitted and others added.
  • At block 605, the prevention computing system 100 provides the selected message(s) to the intended recipient of a prevention campaign. The message(s) may be provided for example, by an email or text message sent to the recipient. In some embodiments, the email or text message may direct the recipient to a web site and not include any personal information in the message itself. Once the recipient accesses the web site, he/she may be prompted to verify their identity by answering a personal question arranged by the host. If the identity is verified, the prepared message may be viewed by the recipient. The message(s) may include, for example, customized messages generated as part of the process 500 described with reference to FIG. 5 herein. The prevention computing system 100 may also provide a notification to the host, participant, and/or preventionist that the message has been provided or delivered to the recipient. In some embodiments, prevention computing system 100 may detect whether the recipient has read the message and provide such indication to the host, participant, and/or preventionist as well.
  • At block 610, the prevention computing system 100 may prompt the recipient to agree to receive help. In some embodiments, the prompt to agree to receive help may be provided as part of the message content itself. For example, the message may include an actionable option or link to agree to receive help, which may direct the recipient viewing the message to a prevention website, for example as provided by the prevention computing system 100. In other embodiments, the message may direct the recipient to a web site to view more information and/or additional messages, at which time the prompt to agree to receive help may be provided as part of a web page presented to the recipient. In some embodiments, the message(s) provided to recipient may also include an action plan (or a first step of an action plan) that recommends to the recipient the next step to take if they agree to get help. In other instances, the action plan may not be provided to the recipient until after they agree to get help.
  • At block 615, the prevention computing system 100 determines whether the recipient has agreed to accept help. The determination might be made after the recipient expressly agrees or refuses to accept help (e.g., by some action, such as clicking on a link or option presented as described at block 610), or after a specified period of time has elapsed without receiving any kind of response or indication from the recipient to agree to accept help.
  • If the prevention computing system 100 determines that the recipient has agreed to accept help, then at block 625 the prevention computing system 100 may initialize an account for the recipient and/or update the recipient profile associated with the prevention campaign and/or host or participant profiles. Once the recipient creates an account he/she may join the campaign to follow-up and report progress. In one embodiment, the prevention computing system 100 may then provide or display an action plan (or a first step of an action plan) that recommends to the recipient the next step to take. For example, information may be provided to help the recipient find the necessary resources in his/her local area, or the recipient may be connected with a counselor to receive help. In some embodiments, the prevention computing system 100 may trigger a confidential message to the host, participant, and/or preventionist indicating that the recipient has agreed to get help.
  • If the prevention computing system 100 determines that the recipient has not agreed to accept help, then at block 620 the prevention computing system 100 may determine whether there are additional messages to send to the recipient. The prevention computing system 100 may also provide a notification to the host, participant, and/or preventionist that the recipient has read the message but has not agreed to accept help. If there are additional messages to send to the recipient, the process 600 may return to block 605 and continue making attempts to reach the recipient by sending additional message(s), repeating blocks 605, 610, 615, and 620 an indefinite number of times until there are no more messages to provide to the recipient. For example, the prevention computing system 100 may first send a message from the host, followed by one or more messages from the participants and/or preventionist, or followed by additional messages from the host, in any order and/or frequency as determined by the host and/or preventionist during the message selection process (see, e.g., FIG. 5) or as determined by the host's subscription level. In some embodiments the initial message that is delivered may be sent again with formatting adjustments to accommodate for the appearance of uniqueness. The frequency of delivery may be established based on the parameters identified in the input criteria (e.g., as part of the questionnaire process) and the recipient's circumstances, with the goal of an increased success rate from the call to action.
  • Once the prevention computing system 100 determines that there are no additional messages to send to the recipient, the process 600 may proceed to block 630, where the prevention computing system 100 may end the campaign. Ending the campaign may trigger the prevention computing system 100 to provide a notification to the host, participants, and/or preventionist that the recipient has not agreed to receive help (e.g., either by ignoring all messages sent or by actively refusing to receive help).
  • Example System Implementation and Architecture
  • FIG. 7 is a block diagram showing an embodiment in which a prevention computing system 100 is in communication with a network 160, and various systems, such as user computing device(s) 162 are also in communication with the network 160. The prevention computing system 100 may be used to implement systems and methods described herein.
  • In the embodiment of FIG. 7, the prevention computing system 100 includes an expert rules engine 150, a user interface module 152, and a messaging module 154, a prevention data source 156, and/or a campaign and/or profile data source 158. The expert rules engine 150 may be configured to implement the processes for dynamic questionnaire and message generation as described herein, for example with reference to FIGS. 2-4. The messaging module 154 may be configured to implement the processes for message generation and delivery to recipients as described herein, for example with reference to FIGS. 4-6. The prevention data source 156 may store, for example, subject matter data for a variety of disorders, expert or knowledge-based rules related to the subject matter data, and/or predefined questions. The campaign and/or profile data source 158 may store, for example, data related to campaigns, hosts, participants, recipients, including questions and answers/responses to questionnaire and related data. In some embodiments, such as the embodiment of the prevention computing system 100 shown in FIG. 1, the prevention data source 156 and campaign and/or profile data source 158 may be a stand-alone data stores.
  • In the particular embodiment of FIG. 7, the prevention computing system 100 includes a user interface module 152 configured to generate and provide user interfaces described herein for an individual (e.g., a host, a participant, a prevention specialist, and/or a recipient) accessing a prevention computing system, such as via a web browser or standalone application. In some embodiments the dashboard/user interface module 152 may also be configured to generate user interfaces for alerts and/or mobile user interfaces provided to the user such as a host, participant, and/or recipient in communication with the prevention computing system 100.
  • The computing system 100 includes, for example, a personal computer that is IBM, Macintosh, or Linux/Unix compatible or a server or workstation. In one embodiment, the prevention computing system 100 comprises a server, a laptop computer, a smart phone, a personal digital assistant, a kiosk, or an media player, for example. In one embodiment, the exemplary computing system 100 includes one or more central processing unit (“CPU”) 105, which may each include a conventional or proprietary microprocessor. The prevention computing system 100 further includes one or more memory 130, such as random access memory (“RAM”) for temporary storage of information, one or more read only memory (“ROM”) for permanent storage of information, and one or more mass storage device 120, such as a hard drive, diskette, solid state drive, or optical media storage device. Typically, the modules of the prevention computing system 100 are connected to the computer using a standard based bus system. In different embodiments, the standard based bus system could be implemented in Peripheral Component Interconnect (“PCI”), Microchannel, Small Computer System Interface (“SCSI”), Industrial Standard Architecture (“ISA”) and Extended ISA (“EISA”) architectures, for example. In addition, the functionality provided for in the components and modules of computing system 100 may be combined into fewer components and modules or further separated into additional components and modules.
  • The prevention computing system 100 is generally controlled and coordinated by operating system software, such as Windows XP, Windows Vista, Windows 7, Windows 8, Windows Server, Unix, Linux, SunOS, Solaris, iOS, Blackberry OS, or other compatible operating systems. In Macintosh systems, the operating system may be any available operating system, such as MAC OS X. In other embodiments, the prevention computing system 100 may be controlled by a proprietary operating system. Conventional operating systems control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface, such as a graphical user interface (“GUI”), among other things.
  • The exemplary computing system 100 may include one or more commonly available input/output (I/O) devices and interfaces 110, such as a keyboard, mouse, touchpad, and printer. In one embodiment, the I/O devices and interfaces 110 include one or more display devices, such as a monitor, that allows the visual presentation of data to a user. More particularly, a display device provides for the presentation of GUIs, application software data, and multimedia presentations, for example. The prevention computing system 100 may also include one or more multimedia devices 140, such as speakers, video cards, graphics accelerators, and microphones, for example.
  • In the embodiment of FIG. 7, the I/O devices and interfaces 110 provide a communication interface to various external devices. In the embodiment of FIG. 7, the prevention computing system 100 is electronically coupled to the network 160, which comprises one or more of a LAN, WAN, and/or the Internet, for example, via a wired, wireless, or combination of wired and wireless, communication link 115. The network 160 communicates with various computing devices and/or other electronic devices via wired or wireless communication links.
  • According to FIG. 7, in some embodiments, information may be provided to and/or accessed by the prevention computing system 100 over the network 160 from one or more data sources 166 (add to FIG. 7?). The data sources 166 may include one or more internal and/or external data sources. The data sources 166 may include internal and external data sources which store, for example, health and/or medical subject matter data (e.g., addiction/disorder/disease data), addiction and/or other intervention data, and the like. In some embodiments, one or more of the databases or data sources 156, 158, and/or 166, may be implemented using a relational database, such as Sybase, Oracle, CodeBase and Microsoft® SQL Server as well as other types of databases such as, for example, a flat file database, an entity-relationship database, and object-oriented database, and/or a record-based database.
  • In general, the word “module,” as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, Java, Lua, C or C++. A software module may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts. Software modules configured for execution on computing devices may be provided on a computer readable medium, such as a compact disc, digital video disc, flash drive, or any other tangible medium. Such software code may be stored, partially or fully, on a memory device of the executing computing device, such as the prevention computing system 100, for execution by the computing device. Software instructions may be embedded in firmware, such as an EPROM. It will be further appreciated that hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors. The modules described herein are preferably implemented as software modules, but may be represented in hardware or firmware. Generally, the modules described herein refer to logical modules that may be combined with other modules or divided into sub-modules despite their physical organization or storage.
  • Other
  • Each of the processes, methods, and algorithms described in the preceding sections may be embodied in, and fully or partially automated by, code modules executed by one or more computer systems or computer processors comprising computer hardware. The code modules may be stored on any type of non-transitory computer-readable medium or computer storage device, such as hard drives, solid state memory, optical disc, and/or the like. The systems and modules may also be transmitted as generated data signals (for example, as part of a carrier wave or other analog or digital propagated signal) on a variety of computer-readable transmission mediums, including wireless-based and wired/cable-based mediums, and may take a variety of forms (for example, as part of a single or multiplexed analog signal, or as multiple discrete digital packets or frames). The processes and algorithms may be implemented partially or wholly in application-specific circuitry. The results of the disclosed processes and process steps may be stored, persistently or otherwise, in any type of non-transitory computer storage such as, for example, volatile or non-volatile storage.
  • The various features and processes described above may be used independently of one another, or may be combined in various ways. All possible combinations and subcombinations are intended to fall within the scope of this disclosure. In addition, certain method or process blocks may be omitted in some implementations. The methods and processes described herein are also not limited to any particular sequence, and the blocks or states relating thereto can be performed in other sequences that are appropriate. For example, described blocks or states may be performed in an order other than that specifically disclosed, or multiple blocks or states may be combined in a single block or state. The example blocks or states may be performed in serial, in parallel, or in some other manner. Blocks or states may be added to or removed from the disclosed example embodiments. The example systems and components described herein may be configured differently than described. For example, elements may be added to, removed from, or rearranged compared to the disclosed example embodiments.
  • Conditional language, such as, among others, “can,” “could,” “might,” or “may,” unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.
  • Conjunctive language such as the phrase “at least one of X, Y and Z,” unless specifically stated otherwise, is to be understood with the context as used in general to convey that an item, term, etc. may be either X, Y or Z, or a combination thereof. Thus, such conjunctive language is not generally intended to imply that certain embodiments require at least one of X, at least one of Y and at least one of Z to each be present.
  • Any process descriptions, elements, or blocks in the flow diagrams described herein and/or depicted in the attached figures should be understood as potentially representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps in the process. Alternate implementations are included within the scope of the embodiments described herein in which elements or functions may be deleted, executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those skilled in the art.
  • All of the methods and processes described above may be embodied in, and partially or fully automated via, software code modules executed by one or more general purpose computers. For example, the methods described herein may be performed by the prevention computing system 100 and/or any other suitable computing device. The methods may be executed on the computing devices in response to execution of software instructions or other executable code read from a tangible computer readable medium. A tangible computer readable medium is a data storage device that can store data that is readable by a computer system. Examples of computer readable mediums include read-only memory, random-access memory, other volatile or non-volatile memory devices, CD-ROMs, magnetic tape, flash drives, and optical data storage devices.
  • It should be emphasized that many variations and modifications may be made to the above-described embodiments, the elements of which are to be understood as being among other acceptable examples. All such modifications and variations are intended to be included herein within the scope of this disclosure. The foregoing description details certain embodiments of the invention. It will be appreciated, however, that no matter how detailed the foregoing appears in text, the invention can be practiced in many ways. As is also stated above, it should be noted that the use of particular terminology when describing certain features or aspects of the invention should not be taken to imply that the terminology is being re-defined herein to be restricted to including any specific characteristics of the features or aspects of the invention with which that terminology is associated. The scope of the invention should therefore be construed in accordance with the appended claims and any equivalents thereof.

Claims (20)

What is claimed is:
1. An automated addiction intervention method designed to assist individuals suffering from additions to begin a recovery process, the method comprising:
as implemented by a computer system comprising computer hardware and memory, the computer system configured with specific executable instructions,
providing a first questionnaire to a first individual, wherein the first questionnaire is designed to gather, from the first individual, intervention qualification data related to a second individual;
receiving, from the first individual, one or more responses to the first questionnaire;
determining whether addiction recovery assistance for the second individual is qualified, based at least in part on the one or more responses to the first questionnaire; and
in response to determining that the addiction recovery assistance for the second individual is qualified,
initializing a profile for the second individual based on the responses received based on the first questionnaire;
administering a second questionnaire for the first individual, wherein the second questionnaire is designed to gather addiction data related to the second individual, and wherein administering the second questionnaire comprises:
determining a series of sets of questions for the second questionnaire, wherein each set of questions in the series is selected dynamically based at least in part on responses received from the first individual to each preceding set of questions in the series provided in the second questionnaire;
providing each of the series of sets of questions for the second questionnaire to the first individual; and
receiving, from the first individual, responses to each of the series of sets of questions for the second questionnaire;
updating the profile for the second individual based on responses received for the second questionnaire; and
generating a message for the addiction recovery assistance on behalf of the first individual and intended for the second individual, wherein the message is customized for the second individual based at least in part on the profile for the second individual.
2. The computer-implemented method of claim 1, further comprising:
receiving, from the first individual, a request to invite a third individual to the addiction recovery assistance;
providing an invitation to the third individual based on the received request;
initializing a profile for the third individual in response to the third individual accepting the invitation;
administering a third questionnaire for the third individual, wherein the third questionnaire is designed to gather addiction data related to the second individual and the third individual;
updating the profile for the second individual based on responses received for the third questionnaire; and
generating a secondary message for the addiction recovery assistance on behalf of the third individual and intended for the second individual.
3. The computer-implemented method of claim 2, further comprising:
providing, to the first individual, the message and the secondary message; and
receiving, from the first individual, a selection of at least one of the message and the secondary message.
4. The computer-implemented method of claim 1, further comprising:
providing the message to the second individual, wherein the message further comprises an invitation to accept help;
in response to receiving, from the second individual, an indication that the second individual has accepted the invitation:
updating the profile for the second individual; and
initiating an action plan for the addiction recovery assistance for the second individual; or
in response to receiving an indication that the second individual has not accepted the invitation:
providing, on a periodic basis, one or more additional messages to the second individual, wherein each the one or more additional messages are distinct from each other and comprise an invitation to accept help.
5. The computer-implemented method of claim 1, further comprising:
receiving from the first individual an item of personalized content for inclusion in the message to the second individual.
6. The computer-implemented method of claim 5, wherein the item of personalized content is included in the message to the second individual in response to receiving approval from a trained addiction professional.
7. The computer-implemented method of claim 5, wherein the item of personalized content comprises one or more or a photograph, an audio recording, a video recording, or a personalized message.
8. The computer-implemented method of claim 1, wherein the message is customized based on at least a relationship between the first individual and the second individual, a type of addiction from which the second individual may be suffering, and a type of character associated with the first individual.
9. The computer-implemented method of claim 8, wherein the relationship between the first individual and the second individual is one of parent-child, husband-wife, friend, co-worker, boss, sibling, relative, religious affiliate, student-teacher, or other addiction sufferer.
10. The computer-implemented method of claim 1, wherein the second questionnaire is customized based on at least a relationship between the first individual and the second individual, a type of addiction from which the second individual may be suffering, and a type of character associated with the first individual.
11. An automated addiction intervention system designed to assist individuals suffering from additions to begin a recovery process, the system comprising:
one or more computer devices in communication with a physical data store storing addiction and prevention data, wherein the one or more computing devices are configured to:
provide a first questionnaire to a host individual, wherein the first questionnaire is designed to gather, from the host individual, intervention qualification data related to a recipient individual;
receive, from the host individual, one or more responses to the first questionnaire;
determine whether an addiction recovery assistance for the recipient individual is qualified, based at least in part on the one or more responses to the first questionnaire; and
in response to determining that the addiction recovery assistance for the recipient individual is qualified,
initialize, via the physical data store, a profile for the recipient individual based on the responses received for the first questionnaire;
administer a second questionnaire for the host individual, wherein the second questionnaire is designed to gather addiction data related to the recipient individual;
update, via the physical data store, the profile for the recipient individual based on responses received for the second questionnaire; and
generate a message for the addiction recovery assistance on behalf of the host individual and intended for the recipient individual, wherein the message is customized for the recipient individual based at least in part on the profile for the recipient individual.
12. The system of claim 11, wherein to administer the second questionnaire for the host individual, the one or more computing devices are configured to:
determine a series of sets of questions for the second questionnaire, wherein each set of questions in the series is selected dynamically based at least in part on responses received from the host individual to each preceding set of questions in the series provided in the second questionnaire;
provide each of the series of sets of questions for the second questionnaire to the host individual; and
receive, from the host individual, responses to each of the series of sets of questions for the second questionnaire.
13. The system of claim 11, wherein the message is customized based on at least a relationship between the participant individual and the recipient individual, a type of addiction from which the recipient individual may be suffering, and a type of character associated with the participant individual.
14. The system of claim 11, wherein the one or more computing devices are configured to:
provide, to the recipient individual, the message for the addiction recovery assistance.
15. The system of claim 14, wherein the message is provided to the recipient individual by text message, short message service, or email.
16. An automated addiction recovery assistance system designed to assist individuals suffering from additions to begin a recovery process, the system comprising:
one or more computer devices in communication with a physical data store storing addiction profile data, wherein the one or more computing devices are configured to:
determine an addiction profile for a recipient individual, the addiction profile determined by comparison with addiction profiles of a plurality of individuals accessed from the addiction profile data store, wherein the addiction profile comprises data for a possible addiction disorder from which the recipient individual may suffer and a plurality of participant individuals associated with the recipient individual; and
for each of the plurality of participant individuals:
retrieve, from the addiction profile, a keyword tag-weight table mapping an at least one keyword associated with the possible addiction disorder to a keyword weight indicative of a relative strength of association with the possible addiction disorder to the recipient individual;
access, from a second physical data store storing addiction disorder data, a plurality of potential message portions based on the recipient individual's profile;
select a message portion from the plurality of potential message portions, wherein the message portion is selected based on a comparison of the keyword weight to each of a respective plurality of tag-weights associated with the respective plurality of potential message portions; and
generate a message from the respective participant individual to the recipient individual, wherein the message includes at least the selected message portions.
17. The system of claim 16, wherein the message is customized based on at least a relationship between the respective participant individual and the recipient individual, a type of addiction from which the recipient individual may be suffering, or a type of character associated with the respective participant individual.
18. The system of claim 17, wherein the relationship between the respective participant individual and the recipient individual is one of parent-child, husband-wife, friend, co-worker, boss, sibling, relative, religious affiliate, student-teacher, or other addiction sufferer.
19. The system method of claim 17, wherein the relationship between the respective participant individual and the recipient individual is characterized by a relative age difference, a family relationship, a prior history of joint addiction or abuse, a prior history of treatment, a common genetic trait, a common marital status, or other degree of closeness factor.
20. The system of claim 16, wherein the one or more computing devices are configured to:
provide, to a host individual, each message from the respective participant individuals to the recipient individual;
receive, from the host individual, a selection of at least one of the messages from the respective participant individuals for delivery to the recipient individual; and
provide, to the recipient individual, the at least one selected message.
US13/934,181 2012-07-03 2013-07-02 Prevention and intervention assistance system Abandoned US20140011178A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/934,181 US20140011178A1 (en) 2012-07-03 2013-07-02 Prevention and intervention assistance system
US14/569,355 US10037710B2 (en) 2012-07-03 2014-12-12 Prevention and intervention assistance system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201261667878P 2012-07-03 2012-07-03
US13/934,181 US20140011178A1 (en) 2012-07-03 2013-07-02 Prevention and intervention assistance system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/569,355 Continuation US10037710B2 (en) 2012-07-03 2014-12-12 Prevention and intervention assistance system

Publications (1)

Publication Number Publication Date
US20140011178A1 true US20140011178A1 (en) 2014-01-09

Family

ID=49878779

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/934,181 Abandoned US20140011178A1 (en) 2012-07-03 2013-07-02 Prevention and intervention assistance system
US14/569,355 Active 2035-05-25 US10037710B2 (en) 2012-07-03 2014-12-12 Prevention and intervention assistance system

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/569,355 Active 2035-05-25 US10037710B2 (en) 2012-07-03 2014-12-12 Prevention and intervention assistance system

Country Status (1)

Country Link
US (2) US20140011178A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140143295A1 (en) * 2012-11-20 2014-05-22 Charles Girsch Framework for cross-platform collaboration of activities
US20140279579A1 (en) * 2013-03-15 2014-09-18 Darrell Huntsman System And Method for Preventing Retail Loss
US20150154880A1 (en) * 2013-12-02 2015-06-04 Aetna Inc. Healthcare management with a support network
US20150287342A1 (en) * 2014-04-04 2015-10-08 Christos Dimitriadis Database-driven computer-implemented methods and specifically programmed computer systems for analysis and/or feedback to achieve/control responsible gaming
US20180336528A1 (en) * 2017-05-17 2018-11-22 Hyphenai Llc Methods and apparatus for screening job candidates using a server with dynamic real-time context
US10560412B2 (en) * 2016-09-23 2020-02-11 Microsoft Technology Licensing, Llc Recipient verification
WO2021146073A1 (en) * 2020-01-17 2021-07-22 Match Group, Llc System and method for matching users based on selections made by third parties

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11875905B1 (en) 2023-03-08 2024-01-16 Laura Dabney Salubrity retention system using selective digital communications

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010001852A1 (en) * 1996-10-30 2001-05-24 Rovinelli Richard J. Computer architecture and process of patient generation, evolution, and simulation for computer based testing system
US20010013006A1 (en) * 1997-01-16 2001-08-09 Brown Stephen J. Personalized display of health information
US20010041329A1 (en) * 1997-06-24 2001-11-15 Legarda System and method for interactively simulating and discouraging drug use
US20020032581A1 (en) * 2000-07-17 2002-03-14 Reitberg Donald P. Single-patient drug trials used with accumulated database: risk of habituation
US20070061166A1 (en) * 2005-08-29 2007-03-15 Narayanan Ramasubramanian Techniques for improving loss ratios
US20070106127A1 (en) * 2005-10-11 2007-05-10 Alman Brian M Automated patient monitoring and counseling system
US20070213998A1 (en) * 2005-12-29 2007-09-13 Butler Stephen F National addictions vigilance, intervention and prevention program
US20080086325A1 (en) * 2006-10-04 2008-04-10 James Terry L System and method for managing health risks
US20080109251A1 (en) * 2006-11-08 2008-05-08 Schmitt Conrad V Method of providing integrated healthcare services
US20080177836A1 (en) * 2007-01-23 2008-07-24 Organizational Wellness & Learning Systems, Inc. Method and system for managing health and wellness programs
US20080177567A1 (en) * 2007-01-22 2008-07-24 Aetna Inc. System and method for predictive modeling driven behavioral health care management
US20110046978A1 (en) * 2008-03-12 2011-02-24 Brc Ip Pty Ltd Database driven rule based healthcare
US20120046964A1 (en) * 2007-10-30 2012-02-23 Papa Angelo A Method of coordinating professional services

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070168501A1 (en) 2002-03-29 2007-07-19 Cobb Nathan K Method and system for delivering behavior modification information over a network
CA2502887A1 (en) * 2002-10-21 2004-05-06 Medvance Solutions Inc. Method and system for medical communications
US20050246185A1 (en) * 2004-04-29 2005-11-03 Brown Richard L Business process for delivering health behavior prevention services
US20060229914A1 (en) 2005-04-12 2006-10-12 Armstrong Ronald K Ii Method of providing support for, and monitoring of, persons recovering from addictive behaviors, mental health issues, and chronic health concerns
US8566121B2 (en) 2005-08-29 2013-10-22 Narayanan Ramasubramanian Personalized medical adherence management system
US20090132284A1 (en) * 2005-12-16 2009-05-21 Fey Christopher T Customizable Prevention Plan Platform, Expert System and Method
WO2008008514A2 (en) 2006-07-12 2008-01-17 Limeade, Inc. Systems and methods for a holistic well-being assessment
US20090164917A1 (en) 2007-12-19 2009-06-25 Kelly Kevin M System and method for remote delivery of healthcare and treatment services
US20110046981A1 (en) * 2009-07-06 2011-02-24 Onerecovery, Inc. Goals and progress tracking for recovery based social networking
US9554754B2 (en) 2010-01-08 2017-01-31 Jeffrey Ruby System, method and computer program for weight, lifestyle and/or disease management integrating nutrition, exercise and behaviour management
US20110250576A1 (en) 2010-03-16 2011-10-13 Reid Kevin Hester System and method for recovering form addictions

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010001852A1 (en) * 1996-10-30 2001-05-24 Rovinelli Richard J. Computer architecture and process of patient generation, evolution, and simulation for computer based testing system
US20010013006A1 (en) * 1997-01-16 2001-08-09 Brown Stephen J. Personalized display of health information
US20010041329A1 (en) * 1997-06-24 2001-11-15 Legarda System and method for interactively simulating and discouraging drug use
US20020032581A1 (en) * 2000-07-17 2002-03-14 Reitberg Donald P. Single-patient drug trials used with accumulated database: risk of habituation
US20070061166A1 (en) * 2005-08-29 2007-03-15 Narayanan Ramasubramanian Techniques for improving loss ratios
US20070106127A1 (en) * 2005-10-11 2007-05-10 Alman Brian M Automated patient monitoring and counseling system
US20070213998A1 (en) * 2005-12-29 2007-09-13 Butler Stephen F National addictions vigilance, intervention and prevention program
US20080086325A1 (en) * 2006-10-04 2008-04-10 James Terry L System and method for managing health risks
US20080109251A1 (en) * 2006-11-08 2008-05-08 Schmitt Conrad V Method of providing integrated healthcare services
US20080177567A1 (en) * 2007-01-22 2008-07-24 Aetna Inc. System and method for predictive modeling driven behavioral health care management
US20080177836A1 (en) * 2007-01-23 2008-07-24 Organizational Wellness & Learning Systems, Inc. Method and system for managing health and wellness programs
US20120046964A1 (en) * 2007-10-30 2012-02-23 Papa Angelo A Method of coordinating professional services
US20110046978A1 (en) * 2008-03-12 2011-02-24 Brc Ip Pty Ltd Database driven rule based healthcare

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140143295A1 (en) * 2012-11-20 2014-05-22 Charles Girsch Framework for cross-platform collaboration of activities
US20140279579A1 (en) * 2013-03-15 2014-09-18 Darrell Huntsman System And Method for Preventing Retail Loss
US20150154880A1 (en) * 2013-12-02 2015-06-04 Aetna Inc. Healthcare management with a support network
US20150287342A1 (en) * 2014-04-04 2015-10-08 Christos Dimitriadis Database-driven computer-implemented methods and specifically programmed computer systems for analysis and/or feedback to achieve/control responsible gaming
US10560412B2 (en) * 2016-09-23 2020-02-11 Microsoft Technology Licensing, Llc Recipient verification
US20180336528A1 (en) * 2017-05-17 2018-11-22 Hyphenai Llc Methods and apparatus for screening job candidates using a server with dynamic real-time context
WO2021146073A1 (en) * 2020-01-17 2021-07-22 Match Group, Llc System and method for matching users based on selections made by third parties
US11294979B2 (en) 2020-01-17 2022-04-05 Match Group, Llc System and method for matching users based on selections made by third parties
CN114930370A (en) * 2020-01-17 2022-08-19 麦奇集团有限责任公司 System and method for matching users based on selection by third party
US11775600B2 (en) 2020-01-17 2023-10-03 Match Group, Llc System and method for matching users based on selections made by third parties

Also Published As

Publication number Publication date
US20150099250A1 (en) 2015-04-09
US10037710B2 (en) 2018-07-31

Similar Documents

Publication Publication Date Title
US10037710B2 (en) Prevention and intervention assistance system
Taylor et al. Internet‐based interventions for smoking cessation
Hull et al. A study of asynchronous mobile-enabled SMS text psychotherapy
Henshaw et al. Conceptualizing mental health care utilization using the health belief model.
US20180218289A1 (en) System and methods for a holistic well-being assessment
Mohr et al. Perceived barriers to psychological treatments and their relationship to depression
US20160086505A1 (en) System for assessing user knowledge about a healthcare system
US20150356701A1 (en) Monitoring and adapting a patient's medical regimen and facilitating communication with a caregiver
Van et al. General practitioner–pharmacist interactions in professional pharmacy services
US20140156293A1 (en) Methods and Systems for Providing a Customized Virtual Health Care Solution for a User
US20160042133A1 (en) System and method for behavioral health case management
CN115023763A (en) Digital therapy system and method
Battaglia et al. Building a tobacco cessation telehealth care management program for veterans with posttraumatic stress disorder
Bhattacharya et al. Lessons from practice: designing tools to facilitate individualized support for quitting smoking
Gurtner et al. Conceptual understanding and applicability of shared decision‐making in psychiatric care: an integrative review
Myers et al. Evaluating commercially available mobile apps for depression self-management
Allen et al. Preparing African American men to make informed prostate cancer screening decisions: development and pilot testing of an interactive online decision aid
Heesacker et al. Computer‐assisted psychological assessment and psychotherapy for collegians
Bertilsson et al. Pharmacists experience of and perspectives about recruiting patients into a community pharmacy asthma service trial
Park et al. Use of video-based telehealth services using a mobile app for workers in underserved areas during the COVID-19 pandemic: A prospective observational study
Impala et al. To what extent are cognitive behaviour therapy competencies incorporated into clinical psychology training? A national survey of Australian universities
Vowels et al. Are digital interventions the next frontier in sex therapy? A mixed methods study examining attitudes toward digital sex therapy
Campbell et al. Policy and Practice Changes Associated with a Tobacco-Free Initiative in Residential Substance Use Disorder Treatment
Schaeffer et al. A smartphone app for parental management of adolescent conduct problems: randomized clinical trial of iKinnect
Wand et al. A qualitative study of multiple voices to inform aftercare services for older persons following self‐harm

Legal Events

Date Code Title Description
AS Assignment

Owner name: EPREVENTIONS, LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RAPPARPORT, MARK NEIL;BARNETT, RIAL ALLEN;SHAH-HOSSEINI, BEHNMAM;AND OTHERS;SIGNING DATES FROM 20130701 TO 20130702;REEL/FRAME:031300/0409

AS Assignment

Owner name: KNOBBE, MARTENS, OLSON & BEAR, LLP, CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNOR:EPREVENTIONS, LLC;REEL/FRAME:034002/0977

Effective date: 20140731

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: EPREVENTIONS, LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:KNOBBE, MARTENS, OLSON & BEAR, LLP;REEL/FRAME:040970/0736

Effective date: 20170105