WO2015047110A1 - Method, device, and system for supporting behavioural change - Google Patents

Method, device, and system for supporting behavioural change Download PDF

Info

Publication number
WO2015047110A1
WO2015047110A1 PCT/NZ2014/000210 NZ2014000210W WO2015047110A1 WO 2015047110 A1 WO2015047110 A1 WO 2015047110A1 NZ 2014000210 W NZ2014000210 W NZ 2014000210W WO 2015047110 A1 WO2015047110 A1 WO 2015047110A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
behavioural
processor
indicators
strategy
Prior art date
Application number
PCT/NZ2014/000210
Other languages
French (fr)
Inventor
Rehina ROLLESTON
Original Assignee
Rolleston Rehina
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rolleston Rehina filed Critical Rolleston Rehina
Publication of WO2015047110A1 publication Critical patent/WO2015047110A1/en

Links

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16HHEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
    • G16H50/00ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics
    • G16H50/30ICT specially adapted for medical diagnosis, medical simulation or medical data mining; ICT specially adapted for detecting, monitoring or modelling epidemics or pandemics for calculating health indices; for individual health risk assessment

Definitions

  • the present invention relates to a method, device, and system for supporting behavioural change.
  • Relapse prevention is a therapeutic approach with the aim to identify and prevent harmful situations such as substance abuse, obsessive-compulsive behaviour, sexual or violent offending, medication adherence, obesity, and depression.
  • Relapse is seen as both an outcome and a transgression in the process of behaviour change.
  • An initial lapse may either translate into a return to the previous problematic behaviour, known as relapse, or into the individual turning again towards positive change, called prolapse.
  • a person's behaviour may be tracked through 'stages', with particular thoughts, feelings, and behaviour associated with each stage. For example, the process may progress from early warning signs of relapse, to triggers, to high risk situations, to a one-off lapse, to full relapse.
  • coping strategies appropriate to that stage may be applied to encourage them to make correct choices.
  • a relapse plan will be developed for an individual in consultation with a trained professional.
  • one of the challenges to preventing relapse is not in developing an effective plan, but ensuring adherence to that plan.
  • individuals most susceptible to relapse to destructive behaviour are not sufficiently motivated to initiate such programs or strategies.
  • a method for supporting behavioural change by a user including the steps of: receiving current behavioural indicators associated with the user; determining a relapse risk status of the user based at least in part on the current behavioural indicators, and issuing a notification to a support user device in the event that the determined relapse risk status is such that the user requires assistance from a support person.
  • a user device including: a processor configured to: receive current behavioural indicators associated with a user; determine a relapse risk status of the user based at least in part on the current behavioural indicators, and issue a notification to a support user device in the event that the determined relapse risk status is such that the user requires assistance from a support person.
  • non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a processor cause the processor to: receive current behavioural indicators associated with a user; determine a relapse risk status of the user based at least in part on the current behavioural indicators, and issue a notification to a support user device in the event that the determined relapse risk status is such that the user requires assistance from a support person.
  • Reference to a behavioural indicator should be understood to mean any factor from which a person's physical, emotional, or mental state may be determined.
  • behavioural indicators may include information as to the user's location, people with the user (both in terms of identity and number), the user's feelings, and current activity.
  • This information may be input into a device carried by the user - for example a mobile telecommunications device.
  • the input of information may be achieved by any means known in the art - for example the entry of text, recording of audio, or selection of options presented by the device.
  • this information may be entered in response to prompts issued by the device, as will be discussed further below.
  • At least one behavioural indicator may be a physical parameter of the user. These may be measured using any physical parameter measurement device known in the art, for example: a heart rate monitor, a blood oxygen monitor, a satellite positioning device (e.g. a Global Positioning Satellite (GPS) navigation device) or other location determination system, a device for measuring the electrical activity of the user (e.g. an EKG monitor), pedometer, or any other device.
  • a physical parameter measurement device known in the art, for example: a heart rate monitor, a blood oxygen monitor, a satellite positioning device (e.g. a Global Positioning Satellite (GPS) navigation device) or other location determination system, a device for measuring the electrical activity of the user (e.g. an EKG monitor), pedometer, or any other device.
  • GPS Global Positioning Satellite
  • physical parameters may be measured by one or more devices separate to the user's handheld device.
  • these sensors may be incorporated into a watch or bracelet to be worn by the user.
  • Such devices may communicate with the handheld device via any suitable means known in the art - preferable via wireless communications means, although it is envisaged that the user may be required to physically connect the physical parameter measurement device to the handheld device at prompted times.
  • one or more of the physical parameters may be determined by the handheld device rather than (or in addition to) the device worn by the user. For example: many handheld devices have GPS functionality to determine location. Alternatively, location may be approximated using the cell of the communications network in which the device is operating or derived using techniques such as triangulation or Wi-Fi hotspots.
  • At least one behavioural indicator may be environmental conditions of the user.
  • devices may be used to detect the presence of undesirable substances in the vicinity of the user, such as alcohol or prohibited drugs. It should be appreciated that such devices may also be used to collect samples from the user themselves, not simply their surrounding environment.
  • breath alcohol sensors are well known. It is envisaged that the accuracy of the device need not be to evidential standards, as simply indicating the presence of alcohol may sufficient to indicate a breach in predetermined conditions for the user.
  • an electronic sensor may be used to identify gaseous substances.
  • Such sensors may operate through various mechanisms to react when in contact with volatile compounds, experiencing a measurable change in electrical properties from which the target compound may be identified.
  • behavioural indicators may include factors such as failure to respond to prompts or queries issued by the user device - whether active rejection or total unresponsiveness. It is envisaged that baseline behavioural indicators may be established during a setup phase.
  • the setup phase may include consultation with a trained professional to map problematic behaviour associated with each stage, and determine appropriate risk management strategies for each relapse risk status.
  • Reference to a relapse risk status should be understood to mean the current stage of the user in a relapse cycle, with each stage having an associated risk of the user's behaviour deteriorating towards relapse, and strategies for de-escalating the risk level. It should be appreciated that the user being identified as not on the process to relapse may also be considered a relapse risk status.
  • the setup phase may be conducted by presenting a series of queries and prompts to the user via an automated process. This may be particularly suited to situations in which the behavioural change is self-initiated (for example, to encourage a lifestyle change as opposed to compliance such as meeting parole conditions).
  • Setting baseline behavioural indicators may include establishing factors such as:
  • the strategies are recorded or entered by the user in a format personalised to them, and using their own language. In doing so, the likelihood of the user adhering to the strategy in the heat of the moment may be increased.
  • Preventative impact material to be presented to the user with the strategy may also be recorded or input during setup - whether imagery, audio, video, or a combination thereof.
  • the preventative impact material may be images or audio recordings of the user's partner and/or children.
  • the user may be prompted to enter behavioural indicators in response to prompts at predetermined times.
  • parameters surrounding this may be established during the setup phase - for example the timing of issuing prompts to the user, and waking hours of the user.
  • Such prompts may be initiated in response to a number of conditions, for example when the user is detected as being within a predetermined distance from a particular location, physical or environmental triggers, or non-responsiveness to previous promptings.
  • the user may also voluntarily initiate the entry of behavioural indicators should they identify the potential for their current situation to escalate relapse risk status, and desire guidance as to appropriate action.
  • a method for supporting behavioural change by a user including the steps of: receiving current behavioural indicators associated with the user; determining a relapse risk status of the user based at least in part on the current behavioural indicators, and presenting a risk management strategy to the user based at least in part on the determined relapse risk status.
  • the user is notified of the currently determined relapse risk status prior to presentation of the risk management strategy.
  • the user may be presented with the option to confirm agreement or disagreement with the determined relapse risk status. In doing so, the user is provided with the opportunity to advance to a more severe relapse risk status if needed.
  • the user is prompted to confirm that the risk management strategy has been implemented.
  • the user may be presented with prompts to enter current behavioural indicators.
  • current behavioural indicators indicate that the relapse risk status has de-escalated the user may be congratulated, and the process exited.
  • the next strategy in the hierarchy of relapse risk status may be presented. If the strategy is confirmed as being implemented, the process above may be applied. If all strategies are exhausted, a notification to a support user device may be issued indicating that the user requires assistance from a support person.
  • the notification may be issued via any suitable means known in the art - for example SMS, email, VoIP, phone call. It is envisaged that notifications may be sent to a series of support people in a hierarchical order until confirmation of the notification being received is issued. However, in another embodiment support persons may be selected at random to avoid the same person becoming overwhelmed or unnecessarily burdened by notifications.
  • a monitoring centre may receive all notifications. Notifications which have exhausted options for support people, or have an associated priority which require certain people within the hierarchy, may be flagged as requiring intervention by monitoring centre personnel.
  • the form of the assistance required may be determined based at least in part on the determined relapse risk status. For example, assistance may initially be requested in the form of contacting the user to discuss the current situation. Alternatively, the relapse risk status may determine that the support person progress straight to visiting the user's location to extract them or de-escalate the situation.
  • the user may be prompted to capture images of the user's surroundings. It is envisaged that the images may be automatically analysed to recognise objects or people considered to be detrimental to adherence to the user's plan, and factored into determining the user's current stage. In another embodiment, the images may be reviewed by or with the user's supervisor or support person as part of evaluating adherence to the plan.
  • different types of behavioural indicators may be compared in order to verify the information input by the user.
  • the user's input location may not correlate with the location obtained via GPS.
  • the user's physical or environmental parameters may not align with the user's description of current activity or people in the vicinity.
  • the user may be queried on this discrepancy, and given the opportunity to re-enter the information.
  • a method for supporting behavioural change in a user including: prompting the user to input behavioural indicators in response to queries presented to them, wherein the queries are determined based, at least in part, on current physical parameters of the user. Further, certain parameters may be compared to determine relapse risk status without active input from the user.
  • an increased heart-rate without a corresponding change in movement may indicate a high-risk situation - particularly with regard to sexual or violent behaviour.
  • a change in location of the physical parameter device without a corresponding change in the location of the handheld device may indicate a higher hierarchy relapse risk status.
  • a method for supporting behavioural change in a user including: receiving information input by the user in response to queries presented to them; receiving current behavioural indicators from at least one behavioural indicator measurement device; and determining whether the information input by the user is accurate, based at least in part on the current behavioural indicators received from the behavioural indicator measurement device.
  • biometric identification of the user is required to validate behavioural indicators entered into the handheld device.
  • Biometric identification may include, for example:
  • Facial recognition using images (whether static or video) captured by a camera of the mobile device Many mobile devices now have cameras on the same face of the device as the screen, presenting an opportunity to initially, and/or continually, identify the user as they input data. While cameras are becoming a ubiquitous feature of mobile devices, it should be appreciated that this is not intended to be limiting, and that a standalone camera may be used to capture the image.
  • Iris recognition Similar to facial recognition, the camera of the mobile device may be used to capture images of the user's eye(s) and analysed to identify the user.
  • biometric identification is preferably conducted using data gathered from integrated components of the mobile device, external devices may be used.
  • biometric identification may occur during input of information by the user or gathering of behavioural. It is envisaged that this may be required for input of all data when the user has previously been identified as having a later stage relapse risk status.
  • the previously identified relapse risk status may determine the means by which the user inputs behavioural indicators. For example, levels of higher risk may require the user to input spoken answers to queries in order to verify that it is the user providing the answers.
  • a method for supporting behavioural change in a user including: prompting the user to input behavioural indicators in response to predetermined queries into a mobile device; and identifying the user using biometric identification prior to validating the user's responses.
  • the step of identifying the user may occur during the input of the behavioural indicators.
  • a camera may be used for facial recognition simultaneously to the entry of text or verbal answers, or fingerprint recognition used during the input of text into a touchscreen.
  • identification may be a seamless part of the experience for the user - reducing the likelihood of it contributing to a negative perception of the process, as well as assisting in minimising the time required.
  • the information and data collected by the devices may be collated as an activity log, for review by a support person or service, This may occur on a periodic basis, whether in anticipation of meeting with the user, in discussion with the user, or for monitoring purposes.
  • the activity log may be accessed remotely - whether via a mobile data plan associated with the user's device, or a wireless network device at the user's residence
  • Such an activity log is envisaged as providing a useful point of reference for comparison with the user's self-reporting as to how they adhered to the plan, and areas for improvement. Being faced with this data may prompt the client into taking more responsibility and accountability for their behaviour. Further, the activity log may be used to identify particular areas for evaluation of whether changes to the various strategies or baseline parameters are required. For instance, if the user has been in the lapse stage more than three times in the past week, their plan needs to reviewed to identify where things are going wrong and how these can be corrected.
  • Data from the activity log can be presented in a variety of ways, whether diagrammatic, textual, or numerical, in order to analyse progress.
  • notifications may be raised or issued in response to the occurrence of predetermined sequences of activity. For example, where a user has failed a predetermined number of times to enter current behavioural indicators in response to scheduled prompts - or if a predetermined number of instances of a particular relapse risk status have occurred - a notification may be generated for the support person's attention. Such sequences or patterns of activity may be indicative of an escalated relapse risk status requiring input from the support person, and the notification may provide guidance for a recommended action by the support person.
  • the notification may be transmitted to a support user device as discussed above, or within a user interface used to access the activity log (for example as a pop up box, or highlighted icon).
  • firmware and/or software also known as a computer program
  • the techniques of the present invention may be implemented as instructions (for example, procedures, functions, and so on) that perform the functions described. It should be appreciated that the present invention is not described with reference to any particular programming languages, and that a variety of programming languages could be used to implement the present invention.
  • the firmware and/or software codes may be stored in a memory, or embodied in any other processor readable medium, and executed by a processor or processors.
  • the memory may be implemented within the processor or external to the processor.
  • the method may be embodied in an application to be installed on a user device, where the application interacts with existing control functions and routines to implement the present invention.
  • a general purpose processor may be a microprocessor, but in the alternative, the processor may be any processor, controller, microcontroller, or state machine.
  • a processor may also be implemented as a combination of computing devices, for example, a combination of a digital signal processor (DSP) and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
  • DSP digital signal processor
  • the processors may function in conjunction with servers and network connections as known in the art.
  • steps of a method, process, or algorithm described in connection with the present invention may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two.
  • the various steps or acts in a method or process may be performed in the order shown, or may be performed in another order. Additionally, one or more process or method steps may be omitted or one or more process or method steps may be added to the methods and processes. An additional step, block, or action may be added in the beginning, end, or intervening existing elements of the methods and processes.
  • FIG 1A is a block diagram illustrating an exemplary user device for use with embodiments of the present invention
  • FIG 1 B is a block diagram illustrating an exemplary behavioural indicator measurement device for use with embodiments of the present invention
  • FIG. 2 is a diagram illustrating an exemplary system in which embodiments of the present invention may be implemented
  • FIG. 3 is a flow diagram illustrating an exemplary method for setting up a behavioural change program in accordance with embodiments of the present invention.
  • FIG. 4A-4F are views of an exemplary user device in operation according to embodiments of the present invention
  • FIG. 5A-5J are flow diagrams illustrating exemplary methods of for supporting behavioural change according to embodiments of the present invention.
  • FIG. 6 illustrates a webpage conveying an exemplary user interface for accessing and editing details of a behavioural management plan according to embodiments of the present invention
  • FIG. 7 illustrates an exemplary module for reviewing details of alerts associated with the behavioural management plan according to embodiments of the present invention
  • FIG. 8A-8B illustrate an exemplary module for reviewing details of check-in activity associated with the behavioural management plan according to embodiments of the present invention
  • FIG. 9 illustrates an exemplary module for reviewing and editing details of a behavioural management plan according to embodiments of the present invention.
  • FIG. 1A illustrates a handheld user device 100, such as a mobile telephone. It should be appreciated that the device 100 may have more or fewer components than shown, may combine two or more components, or may have a different configuration or arrangement of the components.
  • the device 100 includes a touch screen 101.
  • the device 100 includes a memory 102 (which may include one or more computer readable storage mediums), one or more processing units (CPU's) 103, a speaker 104, a microphone 105, RF circuitry 106, front-facing camera 107, rear- facing camera 108, accelerometer 109, and fingerprint reader 110.
  • a memory 102 which may include one or more computer readable storage mediums
  • CPU's processing units
  • speaker 104 includes a speaker 104, a microphone 105, RF circuitry 106, front-facing camera 107, rear- facing camera 108, accelerometer 109, and fingerprint reader 110.
  • RF circuitry 106 front-facing camera 107, rear- facing camera 108, accelerometer 109,
  • the one or more processors 103 run or execute various software programs and/or sets of instructions stored in memory 102 to perform various functions for the device 100 and to process data.
  • Software components stored in memory 102 may include an operating system and various modules or applications for controlling operation of the device 100.
  • the RF (radio frequency) circuitry 106 communicates with communications networks and other communications devices via electromagnetic signals - as well known in the art.
  • the touch screen 101 provides an input interface and an output interface between the device 100 and a user.
  • the visual output may include graphics, text, icons, video, and any combination thereof (collectively termed "graphics"). In some embodiments, some or all of the visual output may correspond to user-interface objects, further details of which are described below.
  • a touch screen 101 has a touch-sensitive surface, sensor or set of sensors that accepts input from the user based on contact.
  • the touch screen 101 detects contact and associated movement, and determines whether that contact to intended to be interaction with user- interface objects displayed on the touch screen 101.
  • FIG. 1 B illustrates a behavioural indicator measurement device in the form of a bracelet 111 to be worn by a user, configured to measure a range of physical and environmental parameters.
  • the bracelet 111 includes a memory 112 (which may include one or more computer readable storage mediums), one or more processing units (CPU's) 113, RF circuitry 114, heart rate monitor 115, a blood oxygen monitor 116, a satellite positioning device 117, an EKG monitor 118, pedometer 119, alcohol sensor 120, and electronic nose 121.
  • FIG. 1A and FIG. 1 B may be implemented in hardware, software, or a combination of both hardware and software, including one or more signal processing and/or application specific integrated circuits. It should be appreciated that a number of the devices illustrated as being part of the bracelet 111 may instead (or additionally) be integrated into the user device 100.
  • FIG. 2 illustrates a system (generally indicated by arrow 200) in which the present invention may be implemented.
  • the system 200 interacts over a network 201 over which various communication links between devices within the system 200.
  • the network 201 is illustrated as a single component, it should be appreciated that it may be composed of a number of sub-networks, potentially operating using distinct technologies - e.g. wired or wireless, fibre optic or radio.
  • a number of user devices may be connected through the network 201 , including handheld user device 100, bracelet 111 and a mobile phone 202.
  • a work station 203 may also connect to the network 201 , or directly to user device 100.
  • a server 204 is also connected to the network 201 , along with a storage unit 205.
  • FIG. 3 illustrates a method 300 of setting up the device 100 for implementing a behavioural management plan, particularly for relapse prevention.
  • a user and a designated adviser - such as a psychologist or probation officer - complete a relapse prevention plan: mapping problematic behaviour through progressive stages, and establishing strategies for addressing the issues at each stage.
  • the stages may be:
  • TRIGGERS TO OFFENDING/RELAPSE User encounters situation(s) that cue thoughts and feelings of committing a specific or similar offence/problematic behaviour for which he or she is currently serving a sentence or seeking help with; ⁇ HIGH RISK SITUATIONS: User has some access to means by which they can commit the specific or similar offence, or engage in the problematic behaviour, and exhibits behaviour where engagement is probable;
  • LASPE User has full access to means via which they can commit the specific or similar offence, or engage in the problematic behaviour, and exhibits behaviour where engagement is imminent;
  • RELAPSE User commits a specific or similar offence, or engages in the problematic behaviour.
  • step 302 the strategies are input into the device 100 - whether directly or via a user interface on work station 203. At least part of the strategy may be in the form of a voice recording by the user, voicing the strategy in their own words (appreciating that this does not exclude the use of visual cues such as text). Preventative impact material such as photographs, video, or messages of support are also loaded onto the device 101.
  • step 303 behavioural indicator parameters are entered for each stage, for example locations, names of individuals, words describing emotions and associated actions, activities etc.
  • step 304 the various biometric identification devices are calibrated to the user - for example voice recognition through microphone 105, facial and iris recognition through camera 107, and fingerprint recognition through fingerprint reader 110.
  • step 305 the physical and environmental parameter measurement devices 114-121 are calibrated to establish baseline parameters and ensure correct functioning.
  • FIG. 4A-4F illustrate the device 100 in use, which will herein be described with reference to the method 500 of FIG. 5A-5J.
  • additional steps or failsafes may be added. For example, while there are processes described as providing the user with the opportunity to enter or re-enter information without triggering an automatic alert, an overarching rule may be put in place to issue such an alert if a predetermined time has passed.
  • an application icon 400 is displayed on the touchscreen 101.
  • the user can select the icon 400 to initiate the application in step 501.
  • the application will start itself at predetermined times - such as at the start of the user's waking day, and at intervals within that day - in step 502.
  • the application may also be initiated in response to conditions such as the device being within a predetermined distance from a designated location, or triggered by physiological or environmental factors such as heart rate or the presence of undesirable substances.
  • the user will be presented with the loading option screen illustrated in FIG. 4B, with a "check in” soft key 401 , and "exit” soft key 402, in step 503. Selecting exit 402 will close the application in step 504 until the next timer initiated prompt to check in.
  • the exit key 402 is not presented when the loading screen is presented based on the timer, but an audible alert will issue to remind the user to check in. Selecting the exit key 402 will close the application if mistakenly opened.
  • a predetermined time for example, 5 minutes
  • step 506 the application will automatically proceed to issue an automatic alert in step 506 (discussed further below with reference to FIG. 5J).
  • step 503 the application presents the data entry screen illustrated in FIG. 4C, at step 507.
  • the data entry screen presents a series of prompts for the user to enter behavioural indicators. While these have been illustrated in a single view, it should be appreciated that the queries may be presented in any manner known in the art, for example on a scrolling screen, or over multiple screens.
  • the first query asks "WHERE ARE YOU?”, and provides a text entry field 403 for the entry of a description via soft-keyboard 404. It should be appreciated that the data input means illustrated are by way of example, and that any suitable data entry point known in the art may be implemented.
  • the second query asks "WHO'S THERE?".
  • a drop down menu 405 is illustrated, via which the user may select people they have previously entered into the system during the setup phase.
  • a text field (not illustrated) may also be provided to enter names not in the list.
  • the third query asks "HOW MANY THERE?", which may be selected from, for example, a checklist 406.
  • the fourth query asks "HOW ARE YOU THINKING AND FEELING?", providing a drop down menu 407a for selecting pre-entered thoughts and feelings, and a numerical drop down menu 407b for selecting an associated rating for the strength of that emotion (for example 1 out of 7, or 7 out of 7).
  • a text field (not illustrated) may also be provided to enter thoughts not in the menu.
  • the fifth query asks "WHAT'S GOING ON?” and provides a text field 408 to enter a description of current activity.
  • biometric identification may be required before permitting entry of responses to the query. In doing so, the ability of the user to have other parties complete the responses to avoid detection of a break from behavior is reduced.
  • the application waits for confirmation that all of the queries have been answered in step 508. If confirmation is not received within a predetermined time (for example, 5 minutes) the application checks to see whether confirmation has previously timed out, in step 509. If it has, an automatic alert is issued in step 506.
  • a predetermined time for example, 5 minutes
  • step 507 If not, the data entry screen of step 507 will be presented again.
  • step 508 the application checks the answers received against information received from the bracelet 111 in step 510.
  • the location information entered may be matched against GPS location, or heart- rate against number of people (or activity), to ensure that the information provided is correct.
  • step 511 If there is a mismatch for the first time, the application checks in step 511 whether the previous relapse risk status was at the TRIGGERS stage or above. If so, an automatic alert is issued at step 506. Otherwise the application checks in step 512 whether a predetermined time has occurred since check-in was initiated. If so, an automatic alert is issued at step 506; if not, the user is returned to the data entry screen at step 507. In the event that a mismatch is determined to have occurred previously at step 510, an automatic alert is issued at step 506.
  • the application proceeds to notify the user of the current stage in step 513 (discussed further below with reference to FIG. 5H).
  • FIG. 5B through FIG. 5G illustrate other processes through which the notification stage 513 may be reached.
  • step 5B if the user's location (of either the device 100 or bracelet 111) is identified as being associated with the HIGH RISK stage in step 514, the application determines that the current stage is HIGH RISK and proceeds to step 513.
  • the application determines that the current stage is HIGH RISK and proceeds to step 513.
  • step 5D if alcohol or drugs are detected by sensors 120 or 121 in step 516, the application determines that the current stage is HIGH RISK and proceeds to step 513.
  • step 5E if the user's location (of either the device 100 or bracelet 11 ) is identified as being associated with the LAPSE stage in step 517, the application determines that the current stage is LAPSE and proceeds to step 513.
  • the application determines that the current stage is LAPSE and proceeds to step 513.
  • step 5G if the user is currently determined to be in the HIGH RISK stage, alcohol or drugs are detected by sensors 120 or 121 in step 519, the application determines that the current stage is LAPSE and proceeds to step 513.
  • FIG. 5H illustrates the process following from step 513, in which the relapse risk status or stage is determined.
  • the determined stage is presented to the user as a notification 409.
  • the user is presented with soft keys accepting (YES key 410) or rejecting (NO key 41 ) the status in step 521.
  • step 522 the application determines whether the user also rejected the previously determined stage. If they have, an automatic alert is issued at step 506 - as the user is either progressing towards a greater risk of relapse, or requires assistance to complete the check in process. If the user has not rejected the previously determined stage, the process returns to the check in step 503.
  • step 521 if the user accepts the presented stage the application proceeds to step 523 to confirm that the current sensor inputs match the stage. If not, the process returns to the check in step 503.
  • step 524 the stage is checked. If the stage is NO STAGE, the user is presented with a complement for their progress in step 525, and the application exits. If the user is in another stage, the method progresses to step 526 in which strategies are presented to the user.
  • FIG. 5H illustrates the process for presenting strategies to the user from step 526. In step 527 the user is presented with the screen shown in FIG. 4E, in which the user is presented with the option to accept to carry out a strategy (via YES key 412), or reject it (via NO key 413).
  • step 528 the application determines whether a higher hierarchy strategy is available. If not, an automatic alert is issued in step 506. If a further strategy is available, the process returns to step 526 to propose this.
  • the strategy is presented to the user in step 529 - for example in text form, or a pre-recorded vocalisation by the user.
  • Preventative impact material may be simultaneous presented to the user to support implementation of the strategy.
  • the screen of FIG. 4F is presented to the user in step 530.
  • the screen includes soft keys for confirming that the strategy has been carried out (via YES key 414), or not (via NO key 415). If the strategy is not done, the process proceeds to check whether a further strategy is available at step 528.
  • a number of strategies may be presented to the user (for example, in a list) for selection therefrom.
  • the user may not be provided with the option to reject the presented strategies.
  • FIG. 5J illustrates the process for issuing automatic alerts at step 506.
  • the application determines the type of automatic alert required. For example, if the previously identified stage is low risk, but the automatic alert has been initiated by virtue of timing out with the check in process, the application may determine that the automatic alert is relatively low priority - and a text message to the support person will be sufficient.
  • the application determines the content for the alert.
  • the content may include details of the processes which have lead to the automatic alert being issued. Further, the content may be related to the suggested action by the support person - such as an address or GPS location if the support person is required to visit the user.
  • step 533 the application determines the highest level support person in a hierarchy to send the alert to, and in step 534 the alert is sent.
  • FIG. 6 illustrates a webpage 600 displayed by a browser application operated by a support user device - for example workstation 203 of FIG. 2.
  • the webpage 600 provides a user interface for accessing and editing details of a behavioural management plan, as well as data collected in the implementation of same.
  • the user interface includes a management module 601 , including details of plans 602 for individual users, and associated summaries 603 of those plans (for example indicating the number of check-ins set for that plan, and the number of strategies established).
  • the management module 601 enables access to data and a number of functions - for example by selecting an "alert” icon 604, an "activity” icon 605, a "manage plan” icon 606, and a “delete plan” icon 607 (selection of which removes the plan from the management module 601 display). On selecting the alert icon 604 for a particular user, an alert activity summary 700 (as seen in FIG. 7) may be displayed.
  • the alert activity summary 700 For each alert issued in relation to that user, the alert activity summary 700 displays time and date data 701 , recipient details (of the support person to whom the alert was sent) 702, and message details 703 summarising the content of the alert. Each line item may be provided with a "further alert detail" icon 704 - selection of which may display additional information associated with the alert.
  • selection of activity icon 605 causes a check-in activity summary 800 to be displayed, as seen in FIG. 8A.
  • the check-in activity summary 800 displays time and date data 801 , check-in type 802 (for example, location triggered, scheduled, or voluntarily initiated), and stage details 803 indicating the stage determined for that check-in.
  • Each line item may be provided with a "further check-in detail" icon 804 - selection of which may display additional information associated with the check-in.
  • FIG. 8B illustrates a detailed check-in summary 805, with the time and date data 801 and stage data 803 as before - but also including details of the questions and answers 806 involved in the check-in, displaying a photograph 807 taken at the time of check-in (if appropriate to the type of check-in), and displaying the strategy 808 presented to the user at the time.
  • plan editing module 900 causes a plan editing module 900 to be displayed, as seen in FIG. 9.
  • the plan editing module 900 includes an editable designation 901 of the user, and a check-in edit summary 902 displaying check-in identifiers 903, and a check-in summary 904 (for example, type of check-in and conditions associated with same).
  • Each line item in the check-in edit summary 902 may be provided with an "edit check-in" icon 905, selection of which allows for editing of the type of check-in, times and reoccurrence associated with initiation of the check-in if appropriate to the type, conditions such location/biometric status/environmental conditions, and questions and selectable answers if appropriate to be presented when the check-in occurs. Such answers may be linked to stages of the problematic behaviour, to establish the current stage during a check-in.
  • Each line item may also be provided with a "clone check-in” icon 906, selection of which replicates the associated check-in for modification.
  • a "delete check-in” icon 907 enables that check-in to be removed from the plan. Further, new check-ins may be generated on selection of an "add check-in” icon 908.
  • the plan editing module 900 also includes a strategy edit summary 910 displaying a description of the strategy 911.
  • Each line item in the summary 910 may be provided with an "edit strategy” icon 912, selection of which allows for editing of the strategy, and the stage(s) with which it is associated.
  • a "delete strategy” icon 913 enables that strategy to be removed from the plan. Further, new strategies may be generated on selection of an "add strategy” icon 914.
  • the plan editing module 900 also includes an alert edit summary 915 displaying alert identifiers 916, conditions 917 for issuing of the alert (for example a stage reached, check-ins ignored, location and/or biometric parameters breached), and the associated message 918 to be issued to the support person.
  • alert edit summary 915 displaying alert identifiers 916, conditions 917 for issuing of the alert (for example a stage reached, check-ins ignored, location and/or biometric parameters breached), and the associated message 918 to be issued to the support person.
  • Each line item in the summary 915 may be provided with an "edit alert” icon 919, selection of which allows for editing of the alert - for example the conditions for issuing the alert, the message, and the support person to send the message to (if more than one associated with the plan).
  • a "delete alert” icon 920 enables that alert to be removed from the plan. Further, new alerts may be generated on selection of an "add alert” icon 921.
  • the management module 601 and various sub-modules described herein provide a means for both obtaining a concise overview of recent activity for review by the adviser and discussion with the user to identify general trends in behaviour management and whether any modifications to the plan are required. It further provides a means for creating or readily modifying such a plan.

Landscapes

  • Health & Medical Sciences (AREA)
  • Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • Public Health (AREA)
  • Biomedical Technology (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Pathology (AREA)
  • Epidemiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Telephone Function (AREA)

Abstract

A method and device for supporting behavioural change by a user. Current behavioural indicators associated with the user are received at a processor. A relapse risk status of the user is determined based at least in part on the current behavioural indicators. The user is presented with at least one risk management strategy, which has been previously established by the user and associated with the determined relapse risk status.

Description

METHOD, DEVICE, AND SYSTEM FOR SUPPORTING BEHAVIOURAL CHANGE
TECHNICAL FIELD
The present invention relates to a method, device, and system for supporting behavioural change.
STATEMENT OF CORRESPONDING APPLICATIONS
This application is based on the specification filed in relation to New Zealand Patent Application Number 616145, and the specification filed in relation to New Zealand Patent Application Number 623747 the entire contents of which are incorporated herein by reference.
BACKGROUND ART
Relapse prevention is a therapeutic approach with the aim to identify and prevent harmful situations such as substance abuse, obsessive-compulsive behaviour, sexual or violent offending, medication adherence, obesity, and depression.
Relapse is seen as both an outcome and a transgression in the process of behaviour change. An initial lapse may either translate into a return to the previous problematic behaviour, known as relapse, or into the individual turning again towards positive change, called prolapse.
Relapse theory suggests that humans, unless presented by overwhelming circumstances which trigger an acute stress response, make choices about actions they carry out. However, most humans are not aware of the thought processes occurring before making such choices - potentially milliseconds before the associated action.
Further, it is suggested that a person's behaviour may be tracked through 'stages', with particular thoughts, feelings, and behaviour associated with each stage. For example, the process may progress from early warning signs of relapse, to triggers, to high risk situations, to a one-off lapse, to full relapse.
By identifying person's behaviour at each stage, coping strategies appropriate to that stage may be applied to encourage them to make correct choices.
Typically, a relapse plan will be developed for an individual in consultation with a trained professional. However, one of the challenges to preventing relapse is not in developing an effective plan, but ensuring adherence to that plan. In many cases, individuals most susceptible to relapse to destructive behaviour are not sufficiently motivated to initiate such programs or strategies.
It should be appreciated that while the present application may focus on the use of relapse theory in the prevention of high risk (i.e. criminal) behaviour, this is not intended to be limiting, as the general principles may be applied to any desired behavioural change.
It is an object of exemplary embodiments described herein to address the foregoing problems or at least to provide the public with a useful choice.
All references, including any patents or patent applications cited in this specification are hereby incorporated by reference. No admission is made that any reference constitutes prior art. The discussion of the references states what their authors assert, and the applicants reserve the right to challenge the accuracy and pertinency of the cited documents. It will be clearly understood that, although a number of prior art publications are referred to herein, this reference does not constitute an admission that any of these documents form part of the common general knowledge in the art, in New Zealand or in any other country.
Throughout this specification, the word "comprise", or variations thereof such as "comprises" or "comprising", will be understood to imply the inclusion of a stated element, integer or step, or group of elements integers or steps, but not the exclusion of any other element, integer or step, or group of elements, integers or steps. Further aspects and advantages of the present invention will become apparent from the ensuing description which is given by way of example only.
SUMMARY
According to an exemplary embodiment there is provided a method for supporting behavioural change by a user, the method including the steps of: receiving current behavioural indicators associated with the user; determining a relapse risk status of the user based at least in part on the current behavioural indicators, and issuing a notification to a support user device in the event that the determined relapse risk status is such that the user requires assistance from a support person.
According to another exemplary embodiment there is provided a user device, including: a processor configured to: receive current behavioural indicators associated with a user; determine a relapse risk status of the user based at least in part on the current behavioural indicators, and issue a notification to a support user device in the event that the determined relapse risk status is such that the user requires assistance from a support person.
According to another exemplary embodiment there is provided non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a processor cause the processor to: receive current behavioural indicators associated with a user; determine a relapse risk status of the user based at least in part on the current behavioural indicators, and issue a notification to a support user device in the event that the determined relapse risk status is such that the user requires assistance from a support person. Reference to a behavioural indicator should be understood to mean any factor from which a person's physical, emotional, or mental state may be determined.
For example, in an exemplary embodiment behavioural indicators may include information as to the user's location, people with the user (both in terms of identity and number), the user's feelings, and current activity. This information may be input into a device carried by the user - for example a mobile telecommunications device. The input of information may be achieved by any means known in the art - for example the entry of text, recording of audio, or selection of options presented by the device.
In an exemplary embodiment this information may be entered in response to prompts issued by the device, as will be discussed further below.
In an exemplary embodiment, at least one behavioural indicator may be a physical parameter of the user. These may be measured using any physical parameter measurement device known in the art, for example: a heart rate monitor, a blood oxygen monitor, a satellite positioning device (e.g. a Global Positioning Satellite (GPS) navigation device) or other location determination system, a device for measuring the electrical activity of the user (e.g. an EKG monitor), pedometer, or any other device.
It is envisaged that physical parameters may be measured by one or more devices separate to the user's handheld device. In particular, it is envisaged that these sensors may be incorporated into a watch or bracelet to be worn by the user. Such devices may communicate with the handheld device via any suitable means known in the art - preferable via wireless communications means, although it is envisaged that the user may be required to physically connect the physical parameter measurement device to the handheld device at prompted times. However, it should be appreciated that one or more of the physical parameters may be determined by the handheld device rather than (or in addition to) the device worn by the user. For example: many handheld devices have GPS functionality to determine location. Alternatively, location may be approximated using the cell of the communications network in which the device is operating or derived using techniques such as triangulation or Wi-Fi hotspots.
In an exemplary embodiment, at least one behavioural indicator may be environmental conditions of the user. In particular, it is envisaged that devices may be used to detect the presence of undesirable substances in the vicinity of the user, such as alcohol or prohibited drugs. It should be appreciated that such devices may also be used to collect samples from the user themselves, not simply their surrounding environment.
For example, breath alcohol sensors are well known. It is envisaged that the accuracy of the device need not be to evidential standards, as simply indicating the presence of alcohol may sufficient to indicate a breach in predetermined conditions for the user.
In another example, an electronic sensor may be used to identify gaseous substances. Such sensors may operate through various mechanisms to react when in contact with volatile compounds, experiencing a measurable change in electrical properties from which the target compound may be identified.
Other behavioural indicators may include factors such as failure to respond to prompts or queries issued by the user device - whether active rejection or total unresponsiveness. It is envisaged that baseline behavioural indicators may be established during a setup phase. In an exemplary embodiment the setup phase may include consultation with a trained professional to map problematic behaviour associated with each stage, and determine appropriate risk management strategies for each relapse risk status.
Reference to a relapse risk status should be understood to mean the current stage of the user in a relapse cycle, with each stage having an associated risk of the user's behaviour deteriorating towards relapse, and strategies for de-escalating the risk level. It should be appreciated that the user being identified as not on the process to relapse may also be considered a relapse risk status.
In other embodiments the setup phase may be conducted by presenting a series of queries and prompts to the user via an automated process. This may be particularly suited to situations in which the behavioural change is self-initiated (for example, to encourage a lifestyle change as opposed to compliance such as meeting parole conditions).
Setting baseline behavioural indicators may include establishing factors such as:
• locations which present a risk to relapse - whether address, geographical location, names of locations etc;
• names of individuals considered to have a negative impact on adherence to planned behavioural change;
• words describing emotions and associated actions;
• undesired activity; and · resting heart-rate, and recovery rates from exercise or other expected activity.
In an exemplary embodiment the strategies are recorded or entered by the user in a format personalised to them, and using their own language. In doing so, the likelihood of the user adhering to the strategy in the heat of the moment may be increased.
Preventative impact material to be presented to the user with the strategy may also be recorded or input during setup - whether imagery, audio, video, or a combination thereof. For example, the preventative impact material may be images or audio recordings of the user's partner and/or children.
In operation, the user may be prompted to enter behavioural indicators in response to prompts at predetermined times. As such, parameters surrounding this may be established during the setup phase - for example the timing of issuing prompts to the user, and waking hours of the user.
It should be appreciated that such prompts may be initiated in response to a number of conditions, for example when the user is detected as being within a predetermined distance from a particular location, physical or environmental triggers, or non-responsiveness to previous promptings.
The user may also voluntarily initiate the entry of behavioural indicators should they identify the potential for their current situation to escalate relapse risk status, and desire guidance as to appropriate action.
According to an exemplary embodiment there is provided a method for supporting behavioural change by a user, the method including the steps of: receiving current behavioural indicators associated with the user; determining a relapse risk status of the user based at least in part on the current behavioural indicators, and presenting a risk management strategy to the user based at least in part on the determined relapse risk status.
In an exemplary embodiment the user is notified of the currently determined relapse risk status prior to presentation of the risk management strategy.
It is envisaged that the user may be presented with the option to confirm agreement or disagreement with the determined relapse risk status. In doing so, the user is provided with the opportunity to advance to a more severe relapse risk status if needed.
Preferably the user is prompted to confirm that the risk management strategy has been implemented.
If the user confirms that the strategy has been implemented, they may be presented with prompts to enter current behavioural indicators. In the event that current behavioural indicators indicate that the relapse risk status has de-escalated the user may be congratulated, and the process exited.
If there is no response, or the user indicates that the strategy has not been implemented, the next strategy in the hierarchy of relapse risk status may be presented. If the strategy is confirmed as being implemented, the process above may be applied. If all strategies are exhausted, a notification to a support user device may be issued indicating that the user requires assistance from a support person.
It should be appreciated discussion of the strategies being presented individually in hierarchical order is not intended to be limiting. For example, a number of strategies may be presented for selection by the user.
The notification may be issued via any suitable means known in the art - for example SMS, email, VoIP, phone call. It is envisaged that notifications may be sent to a series of support people in a hierarchical order until confirmation of the notification being received is issued. However, in another embodiment support persons may be selected at random to avoid the same person becoming overwhelmed or unnecessarily burdened by notifications.
Further, a monitoring centre may receive all notifications. Notifications which have exhausted options for support people, or have an associated priority which require certain people within the hierarchy, may be flagged as requiring intervention by monitoring centre personnel.
In general, the form of the assistance required may be determined based at least in part on the determined relapse risk status. For example, assistance may initially be requested in the form of contacting the user to discuss the current situation. Alternatively, the relapse risk status may determine that the support person progress straight to visiting the user's location to extract them or de-escalate the situation.
In an exemplary embodiment, the user may be prompted to capture images of the user's surroundings. It is envisaged that the images may be automatically analysed to recognise objects or people considered to be detrimental to adherence to the user's plan, and factored into determining the user's current stage. In another embodiment, the images may be reviewed by or with the user's supervisor or support person as part of evaluating adherence to the plan.
In an exemplary embodiment, different types of behavioural indicators may be compared in order to verify the information input by the user. For example, the user's input location may not correlate with the location obtained via GPS. As another example, the user's physical or environmental parameters may not align with the user's description of current activity or people in the vicinity.
The user may be queried on this discrepancy, and given the opportunity to re-enter the information.
According to an exemplary embodiment, there is provided a method for supporting behavioural change in a user, including: prompting the user to input behavioural indicators in response to queries presented to them, wherein the queries are determined based, at least in part, on current physical parameters of the user. Further, certain parameters may be compared to determine relapse risk status without active input from the user.
For example, an increased heart-rate without a corresponding change in movement (whether tracked by the pedometer or change in location) may indicate a high-risk situation - particularly with regard to sexual or violent behaviour. As another example, a change in location of the physical parameter device without a corresponding change in the location of the handheld device may indicate a higher hierarchy relapse risk status.
According to an exemplary embodiment, there is provided a method for supporting behavioural change in a user, including: receiving information input by the user in response to queries presented to them; receiving current behavioural indicators from at least one behavioural indicator measurement device; and determining whether the information input by the user is accurate, based at least in part on the current behavioural indicators received from the behavioural indicator measurement device.
In an exemplary embodiment biometric identification of the user is required to validate behavioural indicators entered into the handheld device.
Numerous methodologies are known for biometric identification of an individual. In an exemplary embodiment, user identification may be achieved using data captured using technology typically integrated into a mobile device. In doing so, the complexity and cost of implementing the present invention may be reduced. Biometric identification may include, for example:
• Voice recognition using audio captured by a microphone of the mobile device.
• Facial recognition using images (whether static or video) captured by a camera of the mobile device. Many mobile devices now have cameras on the same face of the device as the screen, presenting an opportunity to initially, and/or continually, identify the user as they input data. While cameras are becoming a ubiquitous feature of mobile devices, it should be appreciated that this is not intended to be limiting, and that a standalone camera may be used to capture the image. · Iris recognition. Similar to facial recognition, the camera of the mobile device may be used to capture images of the user's eye(s) and analysed to identify the user.
• Fingerprint scanning - for example using the technology described in US Patent Publication No. 20130181949.
It should be appreciated that while biometric identification is preferably conducted using data gathered from integrated components of the mobile device, external devices may be used.
Further, it should be appreciated that calibration of the biometric identification devices or modules may be done during the setup phase previously discussed.
In an exemplary embodiment, biometric identification may occur during input of information by the user or gathering of behavioural. It is envisaged that this may be required for input of all data when the user has previously been identified as having a later stage relapse risk status.
Further, the previously identified relapse risk status may determine the means by which the user inputs behavioural indicators. For example, levels of higher risk may require the user to input spoken answers to queries in order to verify that it is the user providing the answers.
According to an exemplary embodiment, there is provided a method for supporting behavioural change in a user, including: prompting the user to input behavioural indicators in response to predetermined queries into a mobile device; and identifying the user using biometric identification prior to validating the user's responses.
It should be appreciated that the step of identifying the user may occur during the input of the behavioural indicators. For example, a camera may be used for facial recognition simultaneously to the entry of text or verbal answers, or fingerprint recognition used during the input of text into a touchscreen.
In doing so, identification may be a seamless part of the experience for the user - reducing the likelihood of it contributing to a negative perception of the process, as well as assisting in minimising the time required. The information and data collected by the devices may be collated as an activity log, for review by a support person or service, This may occur on a periodic basis, whether in anticipation of meeting with the user, in discussion with the user, or for monitoring purposes.
It is envisaged that the activity log may be accessed remotely - whether via a mobile data plan associated with the user's device, or a wireless network device at the user's residence
Such an activity log is envisaged as providing a useful point of reference for comparison with the user's self-reporting as to how they adhered to the plan, and areas for improvement. Being faced with this data may prompt the client into taking more responsibility and accountability for their behaviour. Further, the activity log may be used to identify particular areas for evaluation of whether changes to the various strategies or baseline parameters are required. For instance, if the user has been in the lapse stage more than three times in the past week, their plan needs to reviewed to identify where things are going wrong and how these can be corrected.
Data from the activity log can be presented in a variety of ways, whether diagrammatic, textual, or numerical, in order to analyse progress.
In an exemplary embodiment, notifications may be raised or issued in response to the occurrence of predetermined sequences of activity. For example, where a user has failed a predetermined number of times to enter current behavioural indicators in response to scheduled prompts - or if a predetermined number of instances of a particular relapse risk status have occurred - a notification may be generated for the support person's attention. Such sequences or patterns of activity may be indicative of an escalated relapse risk status requiring input from the support person, and the notification may provide guidance for a recommended action by the support person.
In exemplary embodiments the notification may be transmitted to a support user device as discussed above, or within a user interface used to access the activity log (for example as a pop up box, or highlighted icon).
For a firmware and/or software (also known as a computer program) implementation, the techniques of the present invention may be implemented as instructions (for example, procedures, functions, and so on) that perform the functions described. It should be appreciated that the present invention is not described with reference to any particular programming languages, and that a variety of programming languages could be used to implement the present invention. The firmware and/or software codes may be stored in a memory, or embodied in any other processor readable medium, and executed by a processor or processors. The memory may be implemented within the processor or external to the processor.
In particular, it is envisaged that the method may be embodied in an application to be installed on a user device, where the application interacts with existing control functions and routines to implement the present invention.
A general purpose processor may be a microprocessor, but in the alternative, the processor may be any processor, controller, microcontroller, or state machine. A processor may also be implemented as a combination of computing devices, for example, a combination of a digital signal processor (DSP) and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. The processors may function in conjunction with servers and network connections as known in the art.
The steps of a method, process, or algorithm described in connection with the present invention may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. The various steps or acts in a method or process may be performed in the order shown, or may be performed in another order. Additionally, one or more process or method steps may be omitted or one or more process or method steps may be added to the methods and processes. An additional step, block, or action may be added in the beginning, end, or intervening existing elements of the methods and processes.
BRIEF DESCRIPTION OF DRAWINGS
Further aspects of the present invention will become apparent from the following description which is given by way of example only and with reference to the accompanying drawings in which:
FIG 1A is a block diagram illustrating an exemplary user device for use with embodiments of the present invention;
FIG 1 B is a block diagram illustrating an exemplary behavioural indicator measurement device for use with embodiments of the present invention;
FIG. 2 is a diagram illustrating an exemplary system in which embodiments of the present invention may be implemented;
FIG. 3 is a flow diagram illustrating an exemplary method for setting up a behavioural change program in accordance with embodiments of the present invention, and
FIG. 4A-4F are views of an exemplary user device in operation according to embodiments of the present invention; FIG. 5A-5J are flow diagrams illustrating exemplary methods of for supporting behavioural change according to embodiments of the present invention;
FIG. 6 illustrates a webpage conveying an exemplary user interface for accessing and editing details of a behavioural management plan according to embodiments of the present invention;
FIG. 7 illustrates an exemplary module for reviewing details of alerts associated with the behavioural management plan according to embodiments of the present invention;
FIG. 8A-8B illustrate an exemplary module for reviewing details of check-in activity associated with the behavioural management plan according to embodiments of the present invention, and
FIG. 9 illustrates an exemplary module for reviewing and editing details of a behavioural management plan according to embodiments of the present invention.
DETAILED DESCRIPTION
FIG. 1A illustrates a handheld user device 100, such as a mobile telephone. It should be appreciated that the device 100 may have more or fewer components than shown, may combine two or more components, or may have a different configuration or arrangement of the components. The device 100 includes a touch screen 101. The device 100 includes a memory 102 (which may include one or more computer readable storage mediums), one or more processing units (CPU's) 103, a speaker 104, a microphone 105, RF circuitry 106, front-facing camera 107, rear- facing camera 108, accelerometer 109, and fingerprint reader 110.
The one or more processors 103 run or execute various software programs and/or sets of instructions stored in memory 102 to perform various functions for the device 100 and to process data. Software components stored in memory 102 may include an operating system and various modules or applications for controlling operation of the device 100.
The RF (radio frequency) circuitry 106 communicates with communications networks and other communications devices via electromagnetic signals - as well known in the art. The touch screen 101 provides an input interface and an output interface between the device 100 and a user. The visual output may include graphics, text, icons, video, and any combination thereof (collectively termed "graphics"). In some embodiments, some or all of the visual output may correspond to user-interface objects, further details of which are described below.
A touch screen 101 has a touch-sensitive surface, sensor or set of sensors that accepts input from the user based on contact. The touch screen 101 detects contact and associated movement, and determines whether that contact to intended to be interaction with user- interface objects displayed on the touch screen 101.
FIG. 1 B illustrates a behavioural indicator measurement device in the form of a bracelet 111 to be worn by a user, configured to measure a range of physical and environmental parameters. The bracelet 111 includes a memory 112 (which may include one or more computer readable storage mediums), one or more processing units (CPU's) 113, RF circuitry 114, heart rate monitor 115, a blood oxygen monitor 116, a satellite positioning device 117, an EKG monitor 118, pedometer 119, alcohol sensor 120, and electronic nose 121.
The various components shown in FIG. 1A and FIG. 1 B may be implemented in hardware, software, or a combination of both hardware and software, including one or more signal processing and/or application specific integrated circuits. It should be appreciated that a number of the devices illustrated as being part of the bracelet 111 may instead (or additionally) be integrated into the user device 100.
FIG. 2 illustrates a system (generally indicated by arrow 200) in which the present invention may be implemented. The system 200 interacts over a network 201 over which various communication links between devices within the system 200. While the network 201 is illustrated as a single component, it should be appreciated that it may be composed of a number of sub-networks, potentially operating using distinct technologies - e.g. wired or wireless, fibre optic or radio.
A number of user devices may be connected through the network 201 , including handheld user device 100, bracelet 111 and a mobile phone 202.
A work station 203 may also connect to the network 201 , or directly to user device 100.
A server 204 is also connected to the network 201 , along with a storage unit 205.
FIG. 3 illustrates a method 300 of setting up the device 100 for implementing a behavioural management plan, particularly for relapse prevention. In step 301 a user and a designated adviser - such as a psychologist or probation officer - complete a relapse prevention plan: mapping problematic behaviour through progressive stages, and establishing strategies for addressing the issues at each stage. For example, the stages may be:
• NO STAGE: the user exhibits no behaviour indicating a risk of relapse;
• EARLY WARNING SIGNS: entry level on the relapse process. User exhibits behaviour linked with a lifestyle that supports his or her trajectory to offending / problematic behaviour;
• TRIGGERS TO OFFENDING/RELAPSE: User encounters situation(s) that cue thoughts and feelings of committing a specific or similar offence/problematic behaviour for which he or she is currently serving a sentence or seeking help with; · HIGH RISK SITUATIONS: User has some access to means by which they can commit the specific or similar offence, or engage in the problematic behaviour, and exhibits behaviour where engagement is probable;
• LASPE: User has full access to means via which they can commit the specific or similar offence, or engage in the problematic behaviour, and exhibits behaviour where engagement is imminent;
• RELAPSE: User commits a specific or similar offence, or engages in the problematic behaviour.
In step 302 the strategies are input into the device 100 - whether directly or via a user interface on work station 203. At least part of the strategy may be in the form of a voice recording by the user, voicing the strategy in their own words (appreciating that this does not exclude the use of visual cues such as text). Preventative impact material such as photographs, video, or messages of support are also loaded onto the device 101.
In step 303, behavioural indicator parameters are entered for each stage, for example locations, names of individuals, words describing emotions and associated actions, activities etc.
In step 304, the various biometric identification devices are calibrated to the user - for example voice recognition through microphone 105, facial and iris recognition through camera 107, and fingerprint recognition through fingerprint reader 110.
In step 305, the physical and environmental parameter measurement devices 114-121 are calibrated to establish baseline parameters and ensure correct functioning. FIG. 4A-4F illustrate the device 100 in use, which will herein be described with reference to the method 500 of FIG. 5A-5J. Within the method 500, it should be appreciated additional steps or failsafes may be added. For example, while there are processes described as providing the user with the opportunity to enter or re-enter information without triggering an automatic alert, an overarching rule may be put in place to issue such an alert if a predetermined time has passed.
In FIG. 4A, an application icon 400 is displayed on the touchscreen 101. The user can select the icon 400 to initiate the application in step 501. Alternatively, the application will start itself at predetermined times - such as at the start of the user's waking day, and at intervals within that day - in step 502. The application may also be initiated in response to conditions such as the device being within a predetermined distance from a designated location, or triggered by physiological or environmental factors such as heart rate or the presence of undesirable substances.
If the application is user initiated, the user will be presented with the loading option screen illustrated in FIG. 4B, with a "check in" soft key 401 , and "exit" soft key 402, in step 503. Selecting exit 402 will close the application in step 504 until the next timer initiated prompt to check in. The exit key 402 is not presented when the loading screen is presented based on the timer, but an audible alert will issue to remind the user to check in. Selecting the exit key 402 will close the application if mistakenly opened. On initiation of the loading screen, if the user does not select the check in key 401 within a predetermined time (for example, 5 minutes), the user will be prompted in step 505 to do so with a voice message prompt.
Should the user fail to do so after a further predetermined time, the application will automatically proceed to issue an automatic alert in step 506 (discussed further below with reference to FIG. 5J).
If the user selects the check-in key 402 at either step 503 or step 505, the application presents the data entry screen illustrated in FIG. 4C, at step 507.
The data entry screen presents a series of prompts for the user to enter behavioural indicators. While these have been illustrated in a single view, it should be appreciated that the queries may be presented in any manner known in the art, for example on a scrolling screen, or over multiple screens.
The first query asks "WHERE ARE YOU?", and provides a text entry field 403 for the entry of a description via soft-keyboard 404. It should be appreciated that the data input means illustrated are by way of example, and that any suitable data entry point known in the art may be implemented.
The second query asks "WHO'S THERE?". A drop down menu 405 is illustrated, via which the user may select people they have previously entered into the system during the setup phase. A text field (not illustrated) may also be provided to enter names not in the list.
The third query asks "HOW MANY THERE?", which may be selected from, for example, a checklist 406.
The fourth query asks "HOW ARE YOU THINKING AND FEELING?", providing a drop down menu 407a for selecting pre-entered thoughts and feelings, and a numerical drop down menu 407b for selecting an associated rating for the strength of that emotion (for example 1 out of 7, or 7 out of 7). A text field (not illustrated) may also be provided to enter thoughts not in the menu.
The fifth query asks "WHAT'S GOING ON?" and provides a text field 408 to enter a description of current activity. Depending on the previously determined stage of the user, biometric identification may be required before permitting entry of responses to the query. In doing so, the ability of the user to have other parties complete the responses to avoid detection of a break from behavior is reduced.
The application waits for confirmation that all of the queries have been answered in step 508. If confirmation is not received within a predetermined time (for example, 5 minutes) the application checks to see whether confirmation has previously timed out, in step 509. If it has, an automatic alert is issued in step 506.
If not, the data entry screen of step 507 will be presented again.
If confirmation is received at step 508, the application checks the answers received against information received from the bracelet 111 in step 510.
For example, the location information entered may be matched against GPS location, or heart- rate against number of people (or activity), to ensure that the information provided is correct.
If there is a mismatch for the first time, the application checks in step 511 whether the previous relapse risk status was at the TRIGGERS stage or above. If so, an automatic alert is issued at step 506. Otherwise the application checks in step 512 whether a predetermined time has occurred since check-in was initiated. If so, an automatic alert is issued at step 506; if not, the user is returned to the data entry screen at step 507. In the event that a mismatch is determined to have occurred previously at step 510, an automatic alert is issued at step 506.
Where no mismatch is found, the application proceeds to notify the user of the current stage in step 513 (discussed further below with reference to FIG. 5H). FIG. 5B through FIG. 5G illustrate other processes through which the notification stage 513 may be reached.
Referring to FIG. 5B, if the user's location (of either the device 100 or bracelet 111) is identified as being associated with the HIGH RISK stage in step 514, the application determines that the current stage is HIGH RISK and proceeds to step 513. Referring to FIG. 5C, if the user is currently determined to be in the TRIGGERS stage, and increased heart-rate is detected by heart-rate monitor 115 at step 515, the application determines that the current stage is HIGH RISK and proceeds to step 513.
Referring to FIG. 5D, if alcohol or drugs are detected by sensors 120 or 121 in step 516, the application determines that the current stage is HIGH RISK and proceeds to step 513. Referring to FIG. 5E, if the user's location (of either the device 100 or bracelet 11 ) is identified as being associated with the LAPSE stage in step 517, the application determines that the current stage is LAPSE and proceeds to step 513.
Referring to FIG. 5F, if the user is currently determined to be in the HIGH RISK stage, and increased heart-rate is detected by heart-rate monitor 115 at step 518, the application determines that the current stage is LAPSE and proceeds to step 513.
Referring to FIG. 5G, if the user is currently determined to be in the HIGH RISK stage, alcohol or drugs are detected by sensors 120 or 121 in step 519, the application determines that the current stage is LAPSE and proceeds to step 513.
FIG. 5H illustrates the process following from step 513, in which the relapse risk status or stage is determined. As seen in FIG. 4D, in step 520, the determined stage is presented to the user as a notification 409. The user is presented with soft keys accepting (YES key 410) or rejecting (NO key 41 ) the status in step 521.
If the user rejects the determined stage, in step 522 the application determines whether the user also rejected the previously determined stage. If they have, an automatic alert is issued at step 506 - as the user is either progressing towards a greater risk of relapse, or requires assistance to complete the check in process. If the user has not rejected the previously determined stage, the process returns to the check in step 503.
Returning to step 521 , if the user accepts the presented stage the application proceeds to step 523 to confirm that the current sensor inputs match the stage. If not, the process returns to the check in step 503.
If the sensor information confirms the accepted stage, the method proceeds to step 524 in which the stage is checked. If the stage is NO STAGE, the user is presented with a complement for their progress in step 525, and the application exits. If the user is in another stage, the method progresses to step 526 in which strategies are presented to the user. FIG. 5H illustrates the process for presenting strategies to the user from step 526. In step 527 the user is presented with the screen shown in FIG. 4E, in which the user is presented with the option to accept to carry out a strategy (via YES key 412), or reject it (via NO key 413).
If the user rejects the strategy, in step 528 the application determines whether a higher hierarchy strategy is available. If not, an automatic alert is issued in step 506. If a further strategy is available, the process returns to step 526 to propose this.
If the user accepts the strategy, the strategy is presented to the user in step 529 - for example in text form, or a pre-recorded vocalisation by the user. Preventative impact material may be simultaneous presented to the user to support implementation of the strategy.
After a predetermined period of time (for example, 5 minutes) the screen of FIG. 4F is presented to the user in step 530. The screen includes soft keys for confirming that the strategy has been carried out (via YES key 414), or not (via NO key 415). If the strategy is not done, the process proceeds to check whether a further strategy is available at step 528.
In an alternative embodiment to that described in relation to FIG. 5H, a number of strategies may be presented to the user (for example, in a list) for selection therefrom. The user may not be provided with the option to reject the presented strategies.
If the strategy is completed, the user is directed to the check in screen at step 503. Alternatively, a follow up check-in prompt may be initiated following a predetermined time period to gauge whether the strategy has assisted in reducing the relapse risk status to a manageable level. FIG. 5J illustrates the process for issuing automatic alerts at step 506. In step 531 , the application determines the type of automatic alert required. For example, if the previously identified stage is low risk, but the automatic alert has been initiated by virtue of timing out with the check in process, the application may determine that the automatic alert is relatively low priority - and a text message to the support person will be sufficient.
In contrast, if the current status is HIGH RISK or LAPSE, then a call and text message may be required. In step 532, the application determines the content for the alert. For example, the content may include details of the processes which have lead to the automatic alert being issued. Further, the content may be related to the suggested action by the support person - such as an address or GPS location if the support person is required to visit the user.
In step 533 the application determines the highest level support person in a hierarchy to send the alert to, and in step 534 the alert is sent.
In step 535, the application awaits confirmation that the alert has been received - whether by return SMS, phone call, or through the application itself. If confirmation is not received, the application returns to step 533 to look up the next support person in the hierarchy. If confirmation is received, the process ends. FIG. 6 illustrates a webpage 600 displayed by a browser application operated by a support user device - for example workstation 203 of FIG. 2. The webpage 600 provides a user interface for accessing and editing details of a behavioural management plan, as well as data collected in the implementation of same.
The user interface includes a management module 601 , including details of plans 602 for individual users, and associated summaries 603 of those plans (for example indicating the number of check-ins set for that plan, and the number of strategies established).
The management module 601 enables access to data and a number of functions - for example by selecting an "alert" icon 604, an "activity" icon 605, a "manage plan" icon 606, and a "delete plan" icon 607 (selection of which removes the plan from the management module 601 display). On selecting the alert icon 604 for a particular user, an alert activity summary 700 (as seen in FIG. 7) may be displayed.
For each alert issued in relation to that user, the alert activity summary 700 displays time and date data 701 , recipient details (of the support person to whom the alert was sent) 702, and message details 703 summarising the content of the alert. Each line item may be provided with a "further alert detail" icon 704 - selection of which may display additional information associated with the alert. Returning to FIG. 6, selection of activity icon 605 causes a check-in activity summary 800 to be displayed, as seen in FIG. 8A.
For each check-in event for that user, the check-in activity summary 800 displays time and date data 801 , check-in type 802 (for example, location triggered, scheduled, or voluntarily initiated), and stage details 803 indicating the stage determined for that check-in.
Each line item may be provided with a "further check-in detail" icon 804 - selection of which may display additional information associated with the check-in. FIG. 8B illustrates a detailed check-in summary 805, with the time and date data 801 and stage data 803 as before - but also including details of the questions and answers 806 involved in the check-in, displaying a photograph 807 taken at the time of check-in (if appropriate to the type of check-in), and displaying the strategy 808 presented to the user at the time.
Returning to FIG. 6, selection of manage plan icon 606 causes a plan editing module 900 to be displayed, as seen in FIG. 9.
The plan editing module 900 includes an editable designation 901 of the user, and a check-in edit summary 902 displaying check-in identifiers 903, and a check-in summary 904 (for example, type of check-in and conditions associated with same).
Each line item in the check-in edit summary 902 may be provided with an "edit check-in" icon 905, selection of which allows for editing of the type of check-in, times and reoccurrence associated with initiation of the check-in if appropriate to the type, conditions such location/biometric status/environmental conditions, and questions and selectable answers if appropriate to be presented when the check-in occurs. Such answers may be linked to stages of the problematic behaviour, to establish the current stage during a check-in.
Each line item may also be provided with a "clone check-in" icon 906, selection of which replicates the associated check-in for modification. A "delete check-in" icon 907 enables that check-in to be removed from the plan. Further, new check-ins may be generated on selection of an "add check-in" icon 908.
As previously discussed, if a prompt to check-in is not responded to within a pre-determined time a follow-up prompt may issue. This time may be set using time selection drop down menu 909. The plan editing module 900 also includes a strategy edit summary 910 displaying a description of the strategy 911. Each line item in the summary 910 may be provided with an "edit strategy" icon 912, selection of which allows for editing of the strategy, and the stage(s) with which it is associated. A "delete strategy" icon 913 enables that strategy to be removed from the plan. Further, new strategies may be generated on selection of an "add strategy" icon 914.
The plan editing module 900 also includes an alert edit summary 915 displaying alert identifiers 916, conditions 917 for issuing of the alert (for example a stage reached, check-ins ignored, location and/or biometric parameters breached), and the associated message 918 to be issued to the support person.
Each line item in the summary 915 may be provided with an "edit alert" icon 919, selection of which allows for editing of the alert - for example the conditions for issuing the alert, the message, and the support person to send the message to (if more than one associated with the plan). A "delete alert" icon 920 enables that alert to be removed from the plan. Further, new alerts may be generated on selection of an "add alert" icon 921.
The management module 601 and various sub-modules described herein provide a means for both obtaining a concise overview of recent activity for review by the adviser and discussion with the user to identify general trends in behaviour management and whether any modifications to the plan are required. It further provides a means for creating or readily modifying such a plan.
Aspects of the present invention have been described by way of example only and it should be appreciated that modifications and additions may be made thereto without departing from the scope thereof as defined in the appended claims.

Claims

James & Wells ref: 134574/73 WHAT I CLAIM IS:
1. A computer-implemented method for supporting behavioural change by a user, the method including the steps of: receiving, at a processor, current behavioural indicators associated with the user; determining, using the processor, a relapse risk status of the user based at least in part on the current behavioural indicators; presenting at least one risk management strategy, which has been previously established by the user and associated with the determined relapse risk status, to the user; and issuing a notification to a support user device in the event that the determined relapse risk status is such that the user requires assistance from a support person.
2. A method as claimed in claim 1 , wherein receiving current behavioural indicators includes receiving information input into a device carried by the user.
3. A method as claimed in claim 2, wherein the information is input in response to a prompt issued by the device.
4. A method as claimed in claim 3, wherein the prompt is issued at a predetermined time.
5. A method as claimed in claim 3, wherein the prompt is issued in response to determining that the user is within a predetermined distance from a location.
6. A method as claimed in any one of claims 3 to 5, wherein the current behavioural indicators include failure to respond to a prompt issued by the user device.
7. A method as claimed in any one of claims 3 to 6, including verifying the information input by the user by comparing different types of behavioural indicators.
8. A method as claimed in any one of claims 1 to 7, wherein at least one behavioural indicator is a physical parameter of the user.
9. A method as claimed in claim 8, including issuing at least one query regarding current behavioural indicators to the user, wherein the query is determined based, at least in part, on the physical parameter of the user.
10. A method as claimed in any one of claims 1 to 7, wherein at least one behavioural indicator is an environmental condition of the user.
11. A method as claimed in claim 10, wherein the environment condition includes the presence of undesirable substances in the vicinity of the user. James & Wells ref: 134574/73
12. A method as claimed in any one of claims 1 to 11 , wherein the user is prompted to confirm that the risk management strategy has been implemented.
13. A method as claimed in claim 12, wherein if the user confirms that the strategy has been implemented, they are presented with prompts to enter current behavioural indicators.
14. A method as claimed in claim 12, wherein if there is no response, or the user indicates that the strategy has not been implemented, a next strategy in a hierarchy of strategies is presented.
15. A method as claimed in claim 14, wherein if all strategies are exhausted, a notification to a support user device may be issued indicating that the user requires assistance from a support person.
16. A method as claimed in any one of claims 1 to 15, wherein all notifications are received at a monitoring centre.
17. A method as claimed in any one of claims 1 to 16, including prompting the user to capture an image of the user's surroundings.
18. A method as claimed in claim 17, including analysing the image to recognise at least one object or person considered to be detrimental to achieving behavioural change, and factoring this into determination of the relapse risk status.
19. A method as claimed in any one of claims 1 to 18, including the step of biometrically identifying the user prior to validating the behavioural indicators.
20. A method as claimed in claim 19, wherein biometric identification of the user includes at least one of: voice recognition, facial recognition, iris recognition, and fingerprint scanning.
21. A user device, including: a processor configured to: receive current behavioural indicators associated with a user; determine a relapse risk status of the user based at least in part on the current behavioural indicators; present at least one risk management strategy, which has been previously established by the user and associated with the determined relapse risk status, to the user, and issue a notification to a support user device in the event that the determined relapse risk status is such that the user requires assistance from a support person. James & Wells ref: 134574/73
22. A device as claimed in claim 21 , wherein the processor is configured to issue a prompt for entry of information containing the current behavioural indicators.
23. A device as claimed in claim 22, wherein processor is configured to issue the prompt at a predetermined time.
24. A device as claimed in either claims 22 or claim 23, including verifying the information input by the user by comparing different types of behavioural indicators.
25. A device as claimed in claim 22, wherein processor is configured to issue the prompt in response to determining that the user is within a predetermined distance from a location.
26. A device as claimed in any one of claims 22 to 25, wherein the current behavioural indicators include failure to respond to a prompt.
27. A device as claimed in any one of claims 21 to 26, wherein at least one behavioural indicator is a physical parameter of the user.
28. A device as claimed in claim 27, wherein the processor is configured to issue at least one query regarding current behavioural indicators to the user, wherein the query is determined based, at least in part, on the physical parameter of the user.
29. A device as claimed in any one of claims 21 to 28, wherein at least one behavioural indicator is an environmental condition of the user.
30. A device as claimed in claim 29, wherein the processor is configured to receive input from a substance detection device, and an environment condition includes the presence of undesirable substances in the vicinity of the user.
31. A device as claimed in any one of claims 21 to 31 , wherein the processor is configured to prompt the user to confirm that the risk management strategy has been implemented.
32. A device as claimed in claim 31 , wherein if the user confirms that the strategy has been implemented, the processor is configured to present the user with prompts to enter current behavioural indicators.
33. A device as claimed in claim 31 , wherein if there is no response, or an indication from user is received which indicates that the strategy has not been implemented, the processor is configured to present a next strategy in a hierarchy of strategies.
34. A device as claimed in claim 33, wherein if all strategies are exhausted, the processor is configured to issue a notification to a support user device indicating that the user requires assistance from a support person. James & Wells ref: 134574/73
35. A device as claimed in any one of claims 21 to 34, wherein the processor is configured to prompt the user to capture an image of the user's surroundings.
36. A device as claimed in claim 35, wherein the processor is configured to analyse the image to recognise at least one object or person considered to be detrimental to achieving behavioural change, and factor this into determination of the relapse risk status.
37. A device as claimed in any one of claims 21 to 36, wherein the processor is configured to receive input from a biometric identification device to identify the user prior to validating the behavioural indicators.
38. A device as claimed in claim 37, wherein the biometric identification device is configured to capture information relating to at least one of: voice recognition, facial recognition, iris recognition, and fingerprint scanning.
39. A computer program including instructions, which when executed by a processor cause the processor to: receive current behavioural indicators associated with a user; determine a relapse risk status of the user based at least in part on the current behavioural indicators; present at least one risk management strategy, which has been previously established by the user and associated with the determined relapse risk status, to the user, and issue a notification to a support user device in the event that the determined relapse risk status is such that the user requires assistance from a support person.
PCT/NZ2014/000210 2013-09-30 2014-09-30 Method, device, and system for supporting behavioural change WO2015047110A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
NZ616145 2013-09-30
NZ61614513 2013-09-30
NZ623747 2014-04-11
NZ62374714 2014-04-11

Publications (1)

Publication Number Publication Date
WO2015047110A1 true WO2015047110A1 (en) 2015-04-02

Family

ID=52130761

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/NZ2014/000210 WO2015047110A1 (en) 2013-09-30 2014-09-30 Method, device, and system for supporting behavioural change

Country Status (1)

Country Link
WO (1) WO2015047110A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016178617A1 (en) 2015-05-04 2016-11-10 Kontigo Care Ab Method and device for estimating a risk of relapse of addictive behaviour

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090076335A1 (en) * 2007-09-18 2009-03-19 Sensei, Inc. System and method for increasing compliance with a health plan
US20120185419A1 (en) * 2011-01-13 2012-07-19 Qualcomm Incorporated Determining a dynamic user profile indicative of a user behavior context with a mobile device
US20130209972A1 (en) * 2012-02-09 2013-08-15 Abraham Carter Providing Diet and Exercise Plans with Real Time Tracking, Modification, and Notification

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090076335A1 (en) * 2007-09-18 2009-03-19 Sensei, Inc. System and method for increasing compliance with a health plan
US20120185419A1 (en) * 2011-01-13 2012-07-19 Qualcomm Incorporated Determining a dynamic user profile indicative of a user behavior context with a mobile device
US20130209972A1 (en) * 2012-02-09 2013-08-15 Abraham Carter Providing Diet and Exercise Plans with Real Time Tracking, Modification, and Notification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CHARLENE C. QUINN ET AL: "WellDoc (TM) Mobile Diabetes Management Randomized Controlled Trial: Change in Clinical and Behavioral Outcomes and Patient and Physician Satisfaction", DIABETES TECHNOLOGY & THERAPEUTICS, vol. 10, no. 3, 1 June 2008 (2008-06-01), pages 160 - 168, XP055168843, ISSN: 1520-9156, DOI: 10.1089/dia.2008.0283 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016178617A1 (en) 2015-05-04 2016-11-10 Kontigo Care Ab Method and device for estimating a risk of relapse of addictive behaviour
EP3292534A4 (en) * 2015-05-04 2018-12-26 Kontigo Care AB Method and device for estimating a risk of relapse of addictive behaviour

Similar Documents

Publication Publication Date Title
US11277588B2 (en) Monitoring process
US20180350455A1 (en) Sensor-enabled mobile health monitoring and diagnosis
AU2023201907A1 (en) System and method for detecting activation of a medical delivery device
KR101941273B1 (en) Method for coaching of life based on mobile terminal, system and computer-readable medium recording the method
US9955869B2 (en) System and method for supporting health management services
US10552581B2 (en) Evidence-based healthcare information management protocols
US10949519B2 (en) Verification system
US20130179188A1 (en) Evidence-based healthcare information management protocols
US20130124226A1 (en) Method and Apparatus for Coordinating Healthcare of Patients
US20130173285A1 (en) Evidence-based healthcare information management protocols
US20130173284A1 (en) Evidence-based healthcare information management protocols
WO2017218999A1 (en) Impairment detection system and method
Aranda et al. Collection and analysis of physiological data in smart environments: a systematic mapping
US20210343383A1 (en) Customizable communication platform with alert tags
US20130173299A1 (en) Evidence-based healthcare information management protocols
US10559380B2 (en) Evidence-based healthcare information management protocols
US20110106559A1 (en) Optimization of a clinical experience
WO2015047110A1 (en) Method, device, and system for supporting behavioural change
US20130173301A1 (en) Evidence-based healthcare information management protocols
US10679309B2 (en) Evidence-based healthcare information management protocols
US20210296009A1 (en) Machine Logic For Recommending Specialized First Aid Services
CN113593722A (en) System and method for patient to preset medical care plan communication
US20200350067A1 (en) Physiological measurement processing
Sathish et al. Blood Donors and Blood Banks Tracking Applications
US20230008561A1 (en) Software Platform And Integrated Applications For Alcohol Use Disorder (AUD), Substance Use Disorder (SUD), And Other Related Disorders, Supporting Ongoing Recovery Emphasizing Relapse Detection, Prevention, and Intervention

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14815451

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14815451

Country of ref document: EP

Kind code of ref document: A1