While literature reports people with serious mental illnesses can benefit from everyday technology, evidence supporting whether or not they are using it in their daily lives is limited. This study investigated what people with serious mental illness are using technology for, what they would like to use it for, and why they are currently not using particular features. Results indicated 97.1% of participants own or use a wireless device, 82.4% use text messaging, 64.7% use email, and 70.6% use voicemail. Implications for further research as well as implications for therapeutic interventions using technology are discussed. 相似文献
Persistent somatic symptoms of varying etiology are very common in emerging adults and can lead to distress and impairment. Internet-delivered interventions could help to prevent the burden and chronicity of persistent somatic symptoms. This study investigated the impact of therapist guidance on the effectiveness of a cognitive-behavioral Internet intervention for somatic symptom distress (iSOMA) in emerging adults, as a secondary analysis of a two-armed randomized controlled trial. We included 149 university students (83.2% female, 24.60 yrs) with varying degrees of somatic symptom distress who were either allocated to the 8-week intervention with regular, written therapeutic guidance (iSOMA guided) or to the control group (waitlist), which was afterwards crossed over to receive iSOMA with guidance-on-demand (iSOMA-GoD). Primary outcomes were somatic symptom distress (assessed by the PHQ-15) and psychobehavioral symptoms of the somatic symptom disorder (assessed by the SSD-12) at pre- and post-treatment. Secondary outcomes included depression, anxiety, and disability. Both treatments showed statistically significant pre-post improvements in primary (iSOMA-guided: d = 0.86–0.92, iSOMA-GoD: d = 0.55–0.63) and secondary outcomes. However, intention-to-treat analysis revealed non-significant between-group effects for all outcomes (ps ≥ .335), after controlling for confounding variables, and effect sizes were marginal (d = −0.06 to 0.12). Overall, our findings indicate that Internet-delivered cognitive behavioral therapy with regular guidance is not unequivocally superior to guidance-on-demand in alleviating somatic symptom distress and associated psychopathology in emerging adults. As a next step, non-inferiority studies are needed to test the robustness of these findings and their impact on clinical populations. 相似文献
Creating explanations is an important process for students, not only to make connections between novel information and background knowledge, but also to be able to communicate their understanding of any given topic. This article explores students’ explanations in the context of computational science and engineering, an important interdisciplinary field that enables scientists and engineers to solve complex problems. Specifically, this study explores: (a) students’ approaches to create written explanations of programing code and (b) the relationship between students’ explanations and their ability to do computer programing. Students wrote in-code comments for 3 MATLAB® worked-examples, which were qualitatively analyzed using a coding scheme. Different approaches to self-explain were identified using hierarchical cluster analysis, and differences in students’ ability to do computer programing were identified using analysis of variance. The resulting approaches to self-explain were: original solution, mechanistic, principle-based, limited, and goal-based. The findings suggest that experienced students wrote simple in-code comments to self-explain, but students with lower ability to do computer programing wrote more comprehensive explanations, as they may take this as a learning opportunity. 相似文献
In this research, we applied current theories of metacognition to study computer security and tested the idea that users' password selection is affected by the metacognitive belief that if a password is memorable, then it is not secure. In two experiments, different types of eight‐character passwords and longer, more secure sentences were presented. Participants rated perceived memorability and perceived security of the passwords and indicated whether they would use them in a critical and in a noncritical service. The results confirmed the belief. Sentences that are in fact highly secure and perceived as highly memorable were also perceived as weak passwords. The belief strongly affected password selection for critical services, but it had no effect on noncritical services. In sum, long sentences are a particularly interesting type of password because they meet both security and memorability criteria, but their use is limited by a false belief. 相似文献
Computerized cognitive batteries, such as CNS Vital Signs (CNSVS), can provide valuable information in clinical and research settings. However, psychometric properties, especially in children and adolescents, remain relatively understudied. The aim of this study was to investigate the factor structure of CNSVS in children and adolescents with neurological diagnoses.
Participants with neurological diagnoses (N = 280) age 7–19 years were assessed as part of their clinical care at a tertiary hospital. All participants received the full CNSVS computerized cognitive battery, which contains seven subtests designed to measure attention, executive functioning, psychomotor speed, and memory. Principal components analyses were used to examine factor structure.
Scores from CNSVS subtests loaded onto a three-component solution and accounted for 46% of the variance. The three components were deemed to best represent (1) speed, (2) memory, and (3) inhibition, with subtest scores loading differently than the original 11 primary and secondary domain scores would have suggested.
Although the CNSVS program generates numerous primary and secondary domain scores, a three-component solution represents a more parsimonious approach to interpreting performance on the CNSVS in youth with neurological diagnoses. Confirmation of this factor solution in other samples is warranted. 相似文献
This study replicated and extended the use of a web‐based multiple‐stimulus‐without‐replacement preference assessment (Curiel, Curiel, Li, Deochand, & Poling, 2018) by adding a web‐based single‐operant reinforcer assessment. Five adults diagnosed with autism spectrum disorder participated in this study. The web‐based program identified preference hierarchies for 4 of the 5 participants, and the single‐operant reinforcer assessment confirmed that the highly preferred videos functioned as reinforcers. Advantages of computer‐based stimulus preference and reinforcer assessments are discussed. 相似文献
We argue for community psychology to include digital communications technology in research on ways that the social environment shapes fundamental human experiences. We present a qualitative study that examined the narrative accounts of 20 young adults who experienced the death of a close friend to describe both traditional and digital forms of remembrance in coping with loss. Findings suggest that young adults' activities both online and offline were intended to acknowledge the loss, exchange social support, create and sustain memories of their deceased friend, and facilitate continued communication with the deceased. Participants described both costs and benefits to their real and virtual remembrance activities. Findings illustrate ways that the study of digital technology adds to our understanding of grief and bereavement and contributes to dominant cultural narratives about coping with death. Implications of findings for research in community psychology are discussed. 相似文献