<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.0" xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">ResProt</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Res Protoc</journal-id>
      <journal-title>JMIR Research Protocols</journal-title>
      <issn pub-type="epub">1929-0748</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v13i1e50241</article-id>
      <article-id pub-id-type="pmid">38578672</article-id>
      <article-id pub-id-type="doi">10.2196/50241</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Protocol</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Protocol</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>A Bluetooth-Based Smartphone App for Detecting Peer Proximity: Protocol for Evaluating Functionality and Validity</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Mavragani</surname>
            <given-names>Amaryllis</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Keusch</surname>
            <given-names>Florian</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Stach</surname>
            <given-names>Michael</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Wang</surname>
            <given-names>Shirlene</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Barnett</surname>
            <given-names>Nancy P</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Department of Behavioral and Social Sciences</institution>
            <institution>Brown University</institution>
            <addr-line>Box G-S121</addr-line>
            <addr-line>Providence, RI, 02912</addr-line>
            <country>United States</country>
            <phone>1 40189636649</phone>
            <email>Nancy_Barnett@brown.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9634-8287</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Sokolovsky</surname>
            <given-names>Alexander W</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-3545-5745</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Meisel</surname>
            <given-names>Matthew K</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2035-9291</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Forkus</surname>
            <given-names>Shannon R</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-3569-0967</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Jackson</surname>
            <given-names>Kristina M</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5449-5473</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Behavioral and Social Sciences</institution>
        <institution>Brown University</institution>
        <addr-line>Providence, RI</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Department of Psychiatry and Behavioral Sciences</institution>
        <institution>Medical University of South Carolina</institution>
        <addr-line>Charleston, SC</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Nancy P Barnett <email>Nancy_Barnett@brown.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2024</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>5</day>
        <month>4</month>
        <year>2024</year>
      </pub-date>
      <volume>13</volume>
      <elocation-id>e50241</elocation-id>
      <history>
        <date date-type="received">
          <day>25</day>
          <month>6</month>
          <year>2023</year>
        </date>
        <date date-type="rev-request">
          <day>2</day>
          <month>10</month>
          <year>2023</year>
        </date>
        <date date-type="rev-recd">
          <day>12</day>
          <month>12</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>20</day>
          <month>12</month>
          <year>2023</year>
        </date>
      </history>
      <copyright-statement>©Nancy P Barnett, Alexander W Sokolovsky, Matthew K Meisel, Shannon R Forkus, Kristina M Jackson. Originally published in JMIR Research Protocols (https://www.researchprotocols.org), 05.04.2024.</copyright-statement>
      <copyright-year>2024</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Research Protocols, is properly cited. The complete bibliographic information, a link to the original publication on https://www.researchprotocols.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.researchprotocols.org/2024/1/e50241" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>While ecological momentary assessment (EMA) is commonly used to study social contexts and social influence in the real world, EMA almost exclusively relies on participant self-report of present circumstances, including the proximity to influential peers. There is the potential for developing a proximity sensing approach that uses small Bluetooth beacons and smartphone-based detection and data collection to collect information about interactions between individuals passively in real time.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This paper aims to describe the methods for evaluating the functionality and validity of a Bluetooth-based beacon and a smartphone app to identify when ≥2 individuals are physically proximal.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We will recruit 20 participants aged 18 to 29 years with Android smartphones to complete a 3-week study during which beacon detection and self-report data will be collected using a smartphone app (MEI Research). Using an interviewer-administered social network interview, participants will identify up to 3 peers of the same age who are influential on health behavior (alcohol use in this study). These peers will be asked to carry a Bluetooth beacon (Kontakt asset tag) for the duration of the study; each beacon has a unique ID that, when detected, will be recorded by the app on the participant’s phone. Participants will be prompted to respond to EMA surveys (signal-contingent reports) when a peer beacon encounter meets our criteria and randomly 3 times daily (random reports) and every morning (morning reports) to collect information about the presence of peers. In all reports, the individualized list of peers will be presented to participants, followed by questions about peer and participant behavior, including alcohol use. Data from multiple app data sets, including beacon encounter specifications, notification, and app logs, participant EMA self-reports and postparticipation interviews, and peer surveys, will be used to evaluate project goals. We will examine the functionality of the technology, including the stability of the app (eg, app crashes and issues opening the app), beacon-to-app detection (ie, does the app detect proximal beacons?), and beacon encounter notification when encounter criteria are met. The validity of the technology will be defined as the concordance between passive detection of peers via beacon-to-app communication and the participant’s EMA report of peer presence. Disagreement between the beacon and self-report data (ie, false negatives and false positives) will be investigated in multiple ways (ie, to determine if the reason was technology-related or participant compliance-related) using encounter data and information collected from participants and peers.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Participant recruitment began in February 2023, and enrollment was completed in December 2023. Results will be reported in 2025.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>This Bluetooth-based technology has important applications and clinical implications for various health behaviors, including the potential for just-in-time adaptive interventions that target high-risk behavior in real time.</p>
        </sec>
        <sec sec-type="registered-report">
          <title>International Registered Report Identifier (IRRID)</title>
          <p>DERR1-10.2196/50241</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>Bluetooth technology</kwd>
        <kwd>passive sensing</kwd>
        <kwd>proximity detection</kwd>
        <kwd>ecological momentary assessment</kwd>
        <kwd>social influence</kwd>
        <kwd>alcohol use</kwd>
        <kwd>mobile phone</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Behavioral Influence in Social Contexts</title>
        <p>Social context, which refers to immediate temporal, situational, and intrapersonal factors, is important for many health behaviors [<xref ref-type="bibr" rid="ref1">1</xref>]. Understanding how context influences behavior is an essential first step toward the development of preventive interventions to reduce risk, as it provides essential information on why, with whom, where, and when a person engages in a particular behavior. For alcohol use, the health behavior we will focus on, the presence of peers is a highly influential contextual factor for all ages [<xref ref-type="bibr" rid="ref2">2</xref>-<xref ref-type="bibr" rid="ref6">6</xref>]. Recent studies have examined real-time information gathered about individuals and their environment [<xref ref-type="bibr" rid="ref7">7</xref>-<xref ref-type="bibr" rid="ref9">9</xref>] via purposeful, self-initiated reports or prompted reports [eg, ecological momentary assessment (EMA)]. Compared with retrospective recall, which can lead to error, EMA methods probe for participant reports in real time, leading to more accurate perceptions of behavior and allowing for the assessment of changes in the social context across a day [<xref ref-type="bibr" rid="ref10">10</xref>]. However, while EMA as a method can help advance our understanding of the social context, it requires individuals to be both aware of and able to report peer presence or influence. Thus, there is value in research that relies less on self-report and more on passive assessment of the social context.</p>
      </sec>
      <sec>
        <title>Use of Technology to Examine Social Contexts</title>
        <p>There has been a rapid rise in the passive ambulatory assessment of behavior [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>] using various technologies, including wearables for physical activity or heart rate [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref14">14</xref>] and alcohol biosensors [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref>]. In addition to wearable sensors, smartphones passively collect data from their built-in sensors in real time [<xref ref-type="bibr" rid="ref17">17</xref>], including information on location and movement [<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref20">20</xref>] and social interactions [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. A smartphone-based technology with potential applications for understanding social contexts is Bluetooth, which is a ubiquitous connectivity protocol embedded in mobile phones and other wearable devices. Designed to underlie communication between digital devices, the unique characteristics of Bluetooth have enabled the development of software that can identify nearby Bluetooth beacons (eg, Apple AirTags or other transmitters, including smartphones themselves), allowing smartphone apps to assess the duration and frequency of interpersonal interactions [<xref ref-type="bibr" rid="ref22">22</xref>-<xref ref-type="bibr" rid="ref24">24</xref>].</p>
        <p>Despite its promise, little research has applied Bluetooth technology to proximity sensing to study the social contexts of health behavior change. An epidemiological study used smartphone-based Bluetooth sensors to predict behavior change associated with disease spread [<xref ref-type="bibr" rid="ref25">25</xref>], and another used Bluetooth-based proximity sensing to assess the relationships among sociability, sleep, and mood [<xref ref-type="bibr" rid="ref26">26</xref>]. A recent study on alcohol use incorporated Bluetooth sensing to examine the social context of young adult drinking, in which the Bluetooth technology captured features such as the number of proximal devices and signal strengths [<xref ref-type="bibr" rid="ref27">27</xref>]. Recently, researchers have evaluated the performance of Bluetooth-integrated methods to understand disease spread during the COVID-19 pandemic [<xref ref-type="bibr" rid="ref28">28</xref>-<xref ref-type="bibr" rid="ref30">30</xref>]. Our goal is to develop and evaluate the stability of a smartphone app that leverages a Bluetooth-based wearable sensing protocol to study the real-world social context of alcohol use but could be applicable to other behaviors in which social contexts act as key determinants.</p>
      </sec>
      <sec>
        <title>Study Objective</title>
        <p>The objective of this research is to develop technology that will allow for the passive detection of contact between individuals, and specifically between participants and their close friends. In this paper, we describe a smartphone app, Bluetooth-based beacons, and our planned procedures for evaluating the <italic>functionality and validity</italic> of the developed technology. In a companion paper [<xref ref-type="bibr" rid="ref31">31</xref>], we describe our approach to evaluating participant responses to using the technology in a study on the social context of alcohol (ie, feasibility and acceptability). <italic>Functionality</italic> will be determined by evaluating the stability of the app (ie, low app crashes or other issues) and the success of the beacon detection protocol and app notifications across different devices and in different situations. We will collect data on functionality throughout the study, primarily using app-based data and secondarily using qualitative data from interviews with participants and peers at the completion of data collection. <italic>Validity</italic> will be determined by evaluating the concordance between beacon detection and participant EMA reports of peer presence data sources. Details of the project goals and methods for evaluating the goals are described in <xref ref-type="table" rid="table1">Table 1</xref>.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Project primary goals and methods for evaluating goals.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="160"/>
            <col width="0"/>
            <col width="270"/>
            <col width="0"/>
            <col width="230"/>
            <col width="0"/>
            <col width="310"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Goal</td>
                <td colspan="2">Definition</td>
                <td colspan="2">How determined</td>
                <td>Data source</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="8">
                  <bold>Functionality</bold>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Beacon detection</td>
                <td colspan="2">Whether the peer beacons are detected by the participant app consistent with app settings</td>
                <td colspan="2">Tested in participant orientation to confirm that beacons are detected by participant phone</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Beacon Encounter data set</p>
                    </list-item>
                    <list-item>
                      <p>App Log data set</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Beacon encounter notifications</td>
                <td colspan="2">Whether the app functions as expected, defined as delivering report notifications with the expected latency when beacon encounter criteria are met</td>
                <td colspan="2">An indication of notification sent by the server when actual encounters are identified</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>Beacon Encounter data set</p>
                    </list-item>
                    <list-item>
                      <p>Participant Event data set</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>App overall stability</td>
                <td colspan="2">Whether the app functions as expected with minimal errors</td>
                <td colspan="2">App error reports (crash and reinstall) and participant error reports</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>App Log data set</p>
                    </list-item>
                    <list-item>
                      <p>Participant EMA<sup>a</sup> report data set</p>
                    </list-item>
                    <list-item>
                      <p>Postparticipation interview</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Phone and operating system differences</td>
                <td colspan="2">Whether differences across Android phone and operating system versions are noted</td>
                <td colspan="2">Information about participant phones and operating systems</td>
                <td colspan="2">
                  <list list-type="bullet">
                    <list-item>
                      <p>App Log data set</p>
                    </list-item>
                    <list-item>
                      <p>Baseline survey</p>
                    </list-item>
                    <list-item>
                      <p>Participant postparticipation survey and interview</p>
                    </list-item>
                  </list>
                </td>
              </tr>
              <tr valign="top">
                <td colspan="3">Validity</td>
                <td colspan="2">Concordance between beacon detection and participant report of peer presence</td>
                <td colspan="2">Cross-classification of beacon encounter and participant self-report data</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Beacon Encounter data set</p>
                    </list-item>
                    <list-item>
                      <p>Participant EMA report data set</p>
                    </list-item>
                    <list-item>
                      <p>Participant postparticipation interview</p>
                    </list-item>
                    <list-item>
                      <p>Peer weekly surveys</p>
                    </list-item>
                  </list>
                </td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>EMA: ecological momentary assessment.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Design</title>
        <p>Young adults will participate in a 3-week protocol during which they will complete reports about interactions with peers, including (1) signal-contingent reports triggered by the presence of a Bluetooth beacon being carried by a participant-nominated peer, (2) random reports triggered in time blocks 3 times per day, and (3) a morning report. A baseline assessment will precede field data collection and will aid in identifying peers, and an interview at the end of the study will collect qualitative information and feedback about participant experiences.</p>
      </sec>
      <sec>
        <title>Participants</title>
        <p>We will recruit up to 5 participants for our pilot study, and we will recruit 20 participants in the main study, with a conservative estimate of 15 completing the full protocol. The inclusion criteria are as follows: (1) be able to read English, (2) own an Android smartphone with OS11 or newer and have it with them throughout the day (typical for the age group between 18 and 29 years), (3) have a data plan (limited or unlimited), (4) be willing to approach peers to participate, and (5) anticipate not deviating from their typical routine during the study period, including leaving the region (as this would likely reduce exposure to selected peers). Additional inclusion criteria related to our substantive research aims are as follows: (1) aged 18 to 29 years; (2) drinking alcohol with others at least once a week, including drinking &gt;4 (women) and &gt;5 drinks (men) per occasion at least once a week in the past month; and (3) not in or seeking treatment for substance use.</p>
        <p>We restricted our project to Android phones because there were several barriers that emerged with iOS. First, iOS places significantly more restrictions on apps that can be put on users’ phones and the methods by which those apps can be loaded onto devices. Relatedly, when provisional software is distributed via the developer side of the App Store, a very limited number of developer testing accounts are provided, limiting the ability to test the app. Second, iOS takes more control than Android over processes that run in the background of the phone, including notifications, which are critical to the functionality of the app. Third, with the availability of the Apple AirTag we were concerned that implementing an alternative Bluetooth Low Energy (BLE) signal detection network with a different beacon would appear in competition with first-party applications and thus our app would be precluded or significantly delayed in distribution via the App Store. Further, as app development for this project started during the COVID-19 pandemic, there was significant focus placed on using BLE for proximity detection by both Apple and Google, with Apple in particular restricting the use of some features. For these reasons, and given the available resources and time frame of the project, we decided early in the course of the project to exclusively develop for Android phones. We note, however, that while owning an Android phone is a requirement for participants, it is not a requirement for peers.</p>
      </sec>
      <sec>
        <title>Procedures</title>
        <sec>
          <title>Eligibility and Recruitment</title>
          <p>Young adults will be recruited from the community through flyers, email listserves, and social media advertisements. A brief web-based screener will establish their initial eligibility. Eligible participants will provide contact information, and a research assistant (RA) will schedule the in-person baseline session.</p>
        </sec>
        <sec>
          <title>Participant Orientation and Baseline Assessment</title>
          <p>A 90-minute in-person session will collect informed consent, demographic characteristics, and alcohol use data and identify possible peer participants. The RA will orient the participant to the project procedures, starting with installing the app on the participant’s phone and recording device characteristics (device manufacturer, model, and Android operating system version). The RA will assist participants in changing settings on their phones to ensure the app will work optimally, including setting Bluetooth, location, nearby devices, and notifications to <italic>on</italic> or <italic>allow</italic>, and checking that settings that pause activity (eg, pause app activity if unused) or remove permissions are <italic>off</italic>. The RA will demonstrate the app interface, including showing the participants how to initiate reports and respond to notifications. The participants will navigate through each report, view examples of response types (radio buttons and text fields), and practice making entries. They will be instructed to respond as soon as possible after a prompt. We will explain that they are expected to keep their phone on, charged, and nearby. We will verify that the participants are not planning on traveling.</p>
        </sec>
        <sec>
          <title>Peer Eligibility and Recruitment</title>
          <p>The inclusion criteria for peers are as follows: (1) at least once a week in a typical week, having meaningful in-person social interaction with the participant. The alcohol-related inclusion criteria for peers are as follows: (2) between the ages of 18 and 29 years, and (3) drink with the participant at least twice a month in a typical month. While not all influential people with regard to alcohol use will be same-age peers, research indicates that same-age peers will most likely be present during drinking events (and in social interactions when drinking might occur) [<xref ref-type="bibr" rid="ref32">32</xref>-<xref ref-type="bibr" rid="ref34">34</xref>]. To identify possible peers, the RA will conduct a social network interview (SNI) that involves the participant nominating up to 10 people who they are close to, including friends, family members, or anyone they regularly spend time with in person who is close to their age [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]. The participants will report on the characteristics of these individuals, including their age, gender identity, whether they live together, relationship (friend, partner or significant other, casual acquaintance or coworker, sibling or cousin, other family member, and other), and frequency of meaningful social interaction (“How often in a typical month do you spend at least 15 consecutive minutes with this person?”). In line with the substantive study goals, we will also assess the frequency of the network member’s drinking (“How many times in the past month do you think this person drank alcohol?”) and the frequency of drinking with the person (“In the past month, how often did you drink with this person [while both of you were drinking]?”). For this protocol, we will ascertain the participant’s perception of the willingness of the peer to participate in this study.</p>
          <p>Working with the RA, the participants will identify 3 peers to be invited to participate in the study based on eligibility. During the baseline session, the participant will attempt to contact each of the 3 selected peers to invite them to participate. If the participant contacts the peer with the RA present and the peer agrees to hear more about the study, the participant will, with the peer’s agreement, share the peer’s contact information with the RA, who will then provide the peer with a web link to the study description and informed consent procedures and will communicate with the peer about their participation from that point forward. If the peer does not respond to the participant in the presence of the RA, the participant will send the peer a brief study description with the web link. If any peer who has received the project description does not respond after 3 days, we will move to the next person on the SNI list and ask the participant to make initial contact with the (new) peer. The participants will be given 5 days to recruit up to 3 peer participants.</p>
          <p>Once a peer participant has consented to participate, the RA will arrange a time to give them the beacon and answer any questions. The beacon is 4.4 cm square and 1 cm thick (<xref rid="figure1" ref-type="fig">Figure 1</xref>). We will provide a small adhesive patch to allow the peer to attach the beacon to their phone and a ring to facilitate attachment to their keys if they choose. Peers will carry their beacon for 3 weeks of the project. Each beacon is assigned a unique ID that associates the beacon with the participant and peer. The smartphone app reports will begin for the participants once the beacons are distributed to their peers. The peer participants will complete web-based surveys at the end of each of the 3 weeks of data collection, in which they will indicate the days and time of day in the prior week they did not have their Bluetooth beacon with them and times in the prior week they were with the participant. This information will be useful for determining why a beacon was not detected.</p>
          <fig id="figure1" position="float">
            <label>Figure 1</label>
            <caption>
              <p>The beacons used in this research were asset tags from Kontakt.io.</p>
            </caption>
            <graphic xlink:href="resprot_v13i1e50241_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>EMA Reports</title>
          <sec>
            <title>Overview</title>
            <p>Our project will use a custom smartphone app for data collection, developed in conjunction with our developer, MEI Research [<xref ref-type="bibr" rid="ref37">37</xref>]. The app, which is only available for Android phones, comprises 2 primary components: the participant-facing EMA report delivery component and a background process that continuously scans for the Bluetooth beacons. Researchers create EMA reports and adjust the settings using a web interface. Notification of random and beacon signal-contingent EMA reports is handled locally on-device, so internet connectivity is not needed for either report triggering or beacon detection to function. Content is delivered dynamically from the MEI Research server, which requires cellular or Wi-Fi connectivity. Data are synchronized with the server when the participant opens the app or activates the sync function.</p>
            <p>Before the 21-day EMA phase, the names of the SNI-identified peers and information about their associated beacons are uploaded using the researcher-facing web interface into the app so that the customized list of peers is presented to each participant on EMA reports (refer to the examples in <xref rid="figure2" ref-type="fig">Figure 2</xref>). This list of peers will have a maximum of 6 names from the SNI. All peers carrying the beacon will be on the list; others on the list may have declined to carry the beacon or may not have been asked. First, names, nicknames, or initials are presented to maximize confidentiality during data collection. Updating this list can occur in real time without involving the participant, thereby avoiding protocol disruptions. EMA reports begin with an item measuring <italic>peer proximity</italic>: “Yesterday/In the past hour, who were you around for any length of time?” The friend list is presented to the participant for them to choose from, with branching logic used to determine the presentation of subsequent questions. The names or nicknames of peers are not included in the researcher data set; numeric peer IDs (also associated with beacon data) ensure deidentification.</p>
            <fig id="figure2" position="float">
              <label>Figure 2</label>
              <caption>
                <p>Screenshots of 2 items in the morning survey, first presented without answers (A) followed by the item with friends selected (B). Note that image B presents only friends that were selected in question A.</p>
              </caption>
              <graphic xlink:href="resprot_v13i1e50241_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
            </fig>
            <p>The participants will provide 3 types of EMA reports, completed in 1 to 3 minutes each.</p>
          </sec>
          <sec>
            <title>Signal-Contingent</title>
            <p><italic>Signal-contingent</italic> reports are triggered by the app according to its detection of beacons carried by peer participants (refer to the subsequent section for details on beacon and trigger settings). We will not have constraints on times when these reports are prompted, and reports will expire (ie, will disappear from the app display) after 1 hour.</p>
          </sec>
          <sec>
            <title>Random</title>
            <p><italic>Random</italic> reports are intended to sample experiences outside of drinking events and those prompted by signal-contingent reports, including peer contact and influence. The participants will receive 3 random EMA reports per day between 12 PM and 12 AM (12 to 6 PM, 6 to 9 PM, and 9 PM to 12 AM). We chose these intervals to optimize the measurement of alcohol use and exposure to peers. The participants will be informed of these intervals; missing data because of going to sleep is of low concern. Notifications will be followed by reminders at 15 and 30 minutes and will expire after 1 hour. The notification and in-app display for signal-contingent and random reports appear identical on the EMA app interface to minimize unintentional awareness of peer presence. Although there is no basis on which to project a compliance rate with beacon-triggered surveys, we expect a 70% or higher compliance rate with random surveys [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref38">38</xref>].</p>
          </sec>
          <sec>
            <title>Morning</title>
            <p><italic>Morning</italic> reports will be completed by participants every day. The morning report is always available on the app, with a notification at 10 AM and reminders at 15 and 30 minutes thereafter. The EMA app prioritizes signal-contingent and random reports such that participants are not able to complete morning reports until any pending triggered reports are completed. The morning report items are identical to the signal-contingent and random reports but refer to <italic>yesterday</italic>, whereas the random and signal-contingent reports refer to <italic>in the past hour</italic>. In the morning reports, we also ask about prior-day app functionality related to participant experience (ie, <italic>participant-related functionality</italic>; “Were there times yesterday when you think our system was not working as you expected?”); those who indicate <italic>yes</italic> or <italic>maybe</italic> are asked to describe the issue in a text box. Items also identify possible missing data (eg, “Did you do any of the following yesterday?” with answers “You silenced your phone,” “You turned your phone off,” “You turned off notifications on your phone or for the EMA app,” and “You turned off Bluetooth detection”). During the 3-week EMA period, the study staff will contact the participants once a week to check in, encourage compliance, and address technical issues as needed. The participants can also email, call, or text study staff at any time they have issues or questions.</p>
          </sec>
        </sec>
        <sec>
          <title>Postparticipation Assessments</title>
          <p>After the 3-week data collection period, the participants will complete a modified 15-item System Usability Scale (SUS [<xref ref-type="bibr" rid="ref39">39</xref>]) with items adapted to our protocol that assess functionality (eg, “The app drained my battery” and “The app worked as expected”) with response options on a 5-point Likert scale from 1=strongly disagree to 5=strongly agree. We will also conduct a semistructured interview to clarify any reported functionality or validity issues. Before the interview, we will examine the participant’s beacon encounter data and reports of peer presence, and during the interview, we will clarify discrepant information, including reconciling signal-contingent reports (ie, indicating beacon detection) at times when the participant did not indicate that the peer was present. We will also probe the reasons for noncompliance and whether triggered report noncompletion appears to be systematically related to peer presence. In this final session, participants will be told how to delete the app from their phone.</p>
        </sec>
      </sec>
      <sec>
        <title>Ethical Considerations</title>
        <sec>
          <title>Human Subject Protections</title>
          <p>The procedures were approved by the Brown University Institutional Review Board (protocol number 2022003448).</p>
        </sec>
        <sec>
          <title>Informed Consent</title>
          <p>The participants and the peer participants will complete informed consent, which includes reviewing detailed consent forms, discussion with the researcher, and documentation of consent.</p>
        </sec>
        <sec>
          <title>Privacy and Confidentiality</title>
          <p>All information obtained during the assessments will be confidential and will be used solely for research purposes. To protect the data and prevent unauthorized access, all EMA data will be encrypted and will remain so until it is accessed by the project staff using a username and password specific to this project. All files with participant-identifying information will be password-protected and stored separately from the data on a server accessed only by the project staff. To preserve confidentiality, we will deidentify data for both peers and participants using a numeric code. The participants will have the researcher provide credentials for the smartphone app that will not include their names, and we will encourage the participants to use phone passwords.</p>
        </sec>
        <sec>
          <title>Compensation</title>
          <p>Participants will be paid US $50 for attending the first session, US $5 per day for answering the EMA reports (at least 2 of 4 of the morning and random reports per day), and US $40 for attending the second session. The participants will also receive a weekly bonus of US $20 if they complete at least 80% of the random and morning reports. The most they can receive for participation is US $255. Peer participants will be compensated US $30 for each week they carry the beacon and answer the weekly survey questions, and US $10 for returning the beacon to the research team, so the most they can receive is US $100. All compensation will be provided in the form of an Amazon e-gift card.</p>
        </sec>
      </sec>
      <sec>
        <title>Beacons and Parameters for Signal-Contingent Triggers</title>
        <sec>
          <title>Beacon Selection and Features</title>
          <p>We prioritized 4 criteria in the selection of the beacon used in this study: signal strength, robustness of the application programming interface, size and convenience of carrying, and battery life. The expected functionality of the beacon is primarily advertising (ie, one-way communication comprising transmission of small packets of data over fixed time intervals for detection and localization by a receiver—here, the EMA app used by the participants) [<xref ref-type="bibr" rid="ref40">40</xref>]. Given these requirements, we selected BLE, an extension of the traditional Bluetooth protocol. Using BLE facilitated the optimization of our first criterion, signal strength. The Bluetooth protocol includes a feature called Received Signal Strength Indication, an indicator of the signal power received by a device detecting BLE signals. This feature, together with the specifications of the transmission source hardware, enables the computation of approximate positioning in the natural environment, including the estimation of distance [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. Many hardware vendors provide these features; a subset of these vendors provides open, nonproprietary documentation of these values [<xref ref-type="bibr" rid="ref43">43</xref>] and the ability to interface directly with the beacons through a robust application programming interface, our second criterion. After reviewing options, conducting testing, and consulting with the app developer, we selected Kontakt.io, a company with beacons that met the first 2 criteria and have form factors that can be attached to a phone or keyring to ensure that it is carried consistently. We extensively tested the options available from Kontakt.io and determined that the asset tag was most reliably detected by our app and by generic BLE scanner apps. Its battery life is 6 to 12 months and can be monitored on the internet; therefore, even with reuse, there should be no missing data attributable to a depleted battery.</p>
          <p>We initially investigated whether we could build the system such that the Bluetooth on the peers’ phones would be detected by the app on the participant’s phone. For this, an app was needed that could use the BLE functionality within the participant phone to detect and identify the peer phone and prompt the participant to respond within the EMA app. One problem with using the peer phone as the BLE transmitter is that different Bluetooth hardware installed in different phones will report differing RSSI values for the same physical distance since this metric is contingent on the strength of the signal being sent out by the original device. This increases the complexity of the programming logic and would add error into what is a simple threshold check for beacons. Another issue is that we were unable to identify any phone-to-app software with an SDK available to use with our EMA app, whereas beacon detection SDKs were available. There were other considerations, including that in early developmental work concerns were raised by peers about installing an app on their phone, but the most critical were that the resources needed for phone-to-app detection were higher than the beacon-to-app model due to the initial development process, variability of operating systems and hardware, and required ongoing maintenance when relying on operating systems that evolve over time. The key benefits of beacon-to-app detection are the consistency of the technology and lower development costs when using an existing SDK.</p>
        </sec>
        <sec>
          <title>EMA Report Triggering by Beacon Proximity</title>
          <p>The protocol for peer proximity detection and subsequent triggering of reports involves the detection of <italic>transient encounters</italic> (ie, incidental, brief social interactions between the participant and a peer identified through signal detection), their conversion into <italic>actual encounters</italic> (ie, meaningful social interactions differentiated from incidental encounters using a time criterion), and their termination as <italic>end encounters</italic> (ie, discontinuation of meaningful social interaction; refer to <xref rid="figure3" ref-type="fig">Figure 3</xref> for a representation of the process). The EMA app continuously scans the participants’ environments for peer beacons. A transient encounter is recorded when the BLE proximity detection service integrated into our EMA app detects a beacon, defined as detecting a signal from a peer beacon that is at least as strong as the Received Signal Strength Indication criteria that correspond to our proximity criterion (ie, 15 ft, 4.6 m). The peer beacon advertising interval, which is the frequency at which beacons send out signals, was set to 1000 milliseconds (1 second) to ensure that the detection corresponds closely to real-world interactions. However, given that the detection of every signal from the peer beacon by the participants’ device during the initial encounter period is not guaranteed, a window of time for the detection of this signal is needed to ensure that detection occurs (ie, that it is not missed, resulting in a false negative); this window was set at 2 minutes for the transient encounter.</p>
          <p>A <italic>transient encounter</italic> is converted into an <italic>actual encounter</italic> when the beacon has been detected for at least 15 minutes (our definition of meaningful interaction) without being undetected (ie, gone) for &gt;2 minutes. A signal-contingent report will be triggered upon the conversion of a transient encounter to an actual encounter. Critically, the algorithm that determines triggering by beacon proximity runs separately for each peer participant, such that a transient and actual encounter with a peer beacon can be initiated even when the participant is in an actual encounter with another peer. Given that there will be 3 peers carrying beacons, it is possible that up to 3 reports could be triggered at a time, although we do not anticipate that this will happen frequently. In addition, given our encounter parameters that require 60 minutes of nondetection before another encounter with the same beacon would occur (refer to the subsequent section for explanation), we do not expect the number of signal-contingent reports to be overwhelming but will evaluate this closely.</p>
          <p>A separate criterion to end an actual encounter after 60 minutes of nondetection (vs 2 minutes for a transient encounter end) was selected. We selected 60 minutes to reduce spurious nondetection and accommodate behaviors such as going to the restroom or being in different rooms at a party (which may still be part of an ongoing meaningful interaction despite not meeting the proximity criterion). Although the duration of the time criteria (ie, 15 minutes for the actual encounter and 60 minutes for the end encounter) were somewhat arbitrary, the evaluation of the sensitivity and specificity of the criteria via concordance with self-report is a goal of the study. Subsequent work can trial different definitions based on study findings, as well as what contact is truly influential and whether the length of influential contact varies by relationship type. <xref ref-type="table" rid="table2">Table 2</xref> presents our initial criteria (far-right column) based on the best judgment, but the criteria are modifiable within the researcher-accessed interface.</p>
          <fig id="figure3" position="float">
            <label>Figure 3</label>
            <caption>
              <p>State flow diagram that incorporates the beacon detection, encounter definition, and notifications. PlotProjects is a service and application programming interface used by the app software for the Bluetooth beacon detection.</p>
            </caption>
            <graphic xlink:href="resprot_v13i1e50241_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <table-wrap position="float" id="table2">
            <label>Table 2</label>
            <caption>
              <p>Transient and actual beacon encounter terms, definitions, and criteria.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="150"/>
              <col width="590"/>
              <col width="260"/>
              <thead>
                <tr valign="top">
                  <td>Term</td>
                  <td>Definition</td>
                  <td>Criteria</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Encounter</td>
                  <td>Incidental or purposeful social interaction between the participant and a peer is identified through BLE<sup>a</sup> signal detection with a predefined proximity criterion.</td>
                  <td>15 ft (4.6 m)</td>
                </tr>
                <tr valign="top">
                  <td>Start of a transient encounter</td>
                  <td>Brief social interaction. A transient encounter begins but does not constitute meaningful interaction until it converts to an actual encounter.</td>
                  <td>1000 milliseconds</td>
                </tr>
                <tr valign="top">
                  <td>End of the transient encounter</td>
                  <td>End of a brief social interaction is defined by a given time criterion. Intended to ensure that very brief encounters do not prompt a notification.</td>
                  <td>2 minutes without beacon contact</td>
                </tr>
                <tr valign="top">
                  <td>Start of an actual encounter</td>
                  <td>Meaningful social interaction defined by a given criteria of time. A transient encounter is converted to an actual encounter. An actual encounter triggers a signal-contingent report.</td>
                  <td>15 minutes of beacon contact with no periods &gt;2 minutes without beacon contact</td>
                </tr>
                <tr valign="top">
                  <td>End of the actual encounter</td>
                  <td>Discontinuation of meaningful social interaction.</td>
                  <td>60 minutes without beacon contact</td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table2fn1">
                <p><sup>a</sup>BLE: Bluetooth Low Energy.</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
          <p>There are several technology-related considerations for the detection of meaningful interactions. First, an a priori definition of a meaningful social interaction had to balance sensitivity for detecting such events (addressing the <italic>feasibility</italic> of detecting social interactions) with specificity in excluding incidental, nonmeaningful interactions (and reducing the burden of responding to multiple signal-contingent reports). However, our a priori criterion of requiring 15 minutes for a transient encounter to be converted into an actual encounter will miss brief but meaningful interactions (eg, consuming a shot of hard alcohol together, offering alcohol). Importantly, we designed our protocol to minimize missing data associated with such events by including the assessment of past-hour peer presence in our random reports and past-day peer presence in our morning reports. This design will allow us to cross-tabulate the occurrence of self-reported interactions of even short duration (as recorded in the EMA report data set) with the occurrence of all beacon detections, including transient encounters (as recorded in the Beacon Encounter data set).</p>
        </sec>
      </sec>
      <sec>
        <title>Data Sets and Calculated Variables</title>
        <sec>
          <title>Overview</title>
          <p>Data produced by the app, including information about encounter events, participant self-reported data, and metadata, are stored in several data sets. These data sets are supplemented by postparticipation self-report data from (non-EMA) surveys and semistructured interviews. <xref ref-type="table" rid="table3">Table 3</xref> contains a description of the data sources; <xref ref-type="table" rid="table1">Table 1</xref> links the data sources with the study goals and methods to the evaluate goals.</p>
          <table-wrap position="float" id="table3">
            <label>Table 3</label>
            <caption>
              <p>Metadata and calculated variables and associated source data sets that will be used to evaluate research goals.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="340"/>
              <col width="90"/>
              <col width="90"/>
              <col width="130"/>
              <col width="140"/>
              <col width="60"/>
              <col width="150"/>
              <thead>
                <tr valign="top">
                  <td>Metadata or calculated variable</td>
                  <td colspan="6">Source data set</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>App log</td>
                  <td>Beacon <break/>Encounter</td>
                  <td>Participant events</td>
                  <td>Notification log<sup>a</sup></td>
                  <td>EMA<sup>b</sup> report</td>
                  <td>Postparticipation</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Participant ID</td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>✓</td>
                </tr>
                <tr valign="top">
                  <td>Peer ID (corresponds to beacon ID)</td>
                  <td>
                    <break/>
                  </td>
                  <td>✓</td>
                  <td>
                    <break/>
                  </td>
                  <td>
                    <break/>
                  </td>
                  <td>✓</td>
                  <td>✓</td>
                </tr>
                <tr valign="top">
                  <td>Event or Report timestamp</td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>✓</td>
                </tr>
                <tr valign="top">
                  <td>Event type (eg, action delivered, participant report started, report response, and app synced)<sup>c</sup></td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>
                    <break/>
                  </td>
                  <td>✓</td>
                  <td>
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>Session ID (helps link together events from different data sets)</td>
                  <td>
                    <break/>
                  </td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>Source of event (eg, morning or random report)</td>
                  <td>
                    <break/>
                  </td>
                  <td>
                    <break/>
                  </td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>✓</td>
                  <td>
                    <break/>
                  </td>
                </tr>
                <tr valign="top">
                  <td>Corroborative self-report</td>
                  <td>
                    <break/>
                  </td>
                  <td>
                    <break/>
                  </td>
                  <td>
                    <break/>
                  </td>
                  <td>
                    <break/>
                  </td>
                  <td>✓</td>
                  <td>✓</td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table3fn1">
                <p><sup>a</sup>Contains only notifications for morning and random reports.</p>
              </fn>
              <fn id="table3fn2">
                <p><sup>b</sup>EMA: ecological momentary assessment.</p>
              </fn>
              <fn id="table3fn3">
                <p><sup>c</sup>Metadata recorded by the app and stored.</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
          <p>Further information about the source data sets are presented in the <xref ref-type="supplementary-material" rid="app1">Multimedia Appendices 1</xref>-<xref ref-type="supplementary-material" rid="app5">5</xref>.</p>
        </sec>
        <sec>
          <title>App Log</title>
          <p>This data set contains information about the app version used and (morning, random, beacon-triggered) report items that are programmed into the app. It also contains event types (eg, app opened and app synced) and errors (eg, when the operating system denies permission to the app). We will use information from this data set to determine that the app was installed correctly and that it was functioning as expected during the study.</p>
        </sec>
        <sec>
          <title>Beacon Encounters</title>
          <p>Variables include participant ID, beacon ID, start and end timestamps of transient and actual encounters, the timestamp when the transient encounter was converted into an actual encounter, and the timestamp for when the report notification was sent. A unique session ID links the elements (start and end) of given (transient and actual) encounters.</p>
        </sec>
        <sec>
          <title>Participant Events</title>
          <p>Variables include participant ID and types of events (eg, report start, report submit, and report notification) with timestamps. The report start and submit timestamps are present for all reports, including random, morning, and signal-contingent reports. Report notification timestamps (1) duplicate the timestamp of the transient-to-actual conversion reported in the Beacon Encounter data set (which triggers a notification) and (2) indicate whether other notifications are for random or morning reports.</p>
        </sec>
        <sec>
          <title>Notification Log</title>
          <p>Variables include session ID, report type (ie, random and morning), and timestamps when timed notifications and reminders were scheduled to be sent.</p>
        </sec>
        <sec>
          <title>EMA Reports</title>
          <p>Data include participant responses to items in the signal-contingent, random, and morning reports, including indicators of who among their peers is or was present and self-reports about app functionality. For example, in each report, we ask, “Who did you interact with in person for at least 15 minutes?” The report type and timestamp will be used to ensure that data responses are aligned with information from other data sets and reports.</p>
        </sec>
        <sec>
          <title>Postparticipation Data</title>
          <p>Data from the postparticipation interviews and the SUS will be used to evaluate the app’s functionality. Participant interviews will also be used to investigate identified discrepancies between the beacon-derived data and participant reports (ie, validity) and will be supplemented with weekly survey day-level reports from peers about their proximity to participants.</p>
        </sec>
      </sec>
      <sec>
        <title>Data Analysis Plan</title>
        <sec>
          <title>Functionality of Beacon Detection by the Participant’s Smartphone</title>
          <p>We will confirm the detection of the 3 beacons by the participant’s phone during the orientation. We expect to observe smartphone notifications for each beacon when the transient encounter is converted into an actual encounter (after 15 minutes). If notifications are not observed, we will examine the Beacon Encounter data set to determine whether transient encounters are being recorded (ie, whether the beacon is detected by the app) without being converted into an actual encounter. Functionality will be evaluated with 3 metrics: (1) the proportion of participants whose phones detect all beacons during the orientation, (2) the proportion of beacons detected by participant phones, and (3) the latency between exposing the participant phones to the beacons and the start of a transient and actual encounter. These observations will be systematically recorded and aggregated across beacons and participants.</p>
        </sec>
        <sec>
          <title>Functionality of the Beacon Encounter Notifications</title>
          <p>Data from the Beacon Encounter data set will be used to evaluate functionality in two ways: (1) the proportion of actual encounters for which a signal-contingent notification was shown as sent by the server in the Beacon Encounter data set, and (2) the mean latency in minutes between the conversion to an actual encounter and the sending of the signal-contingent notification. The functionality of notifications for random and morning reports will not be evaluated, as these are commonly used in EMA and are fully functional in the app.</p>
        </sec>
        <sec>
          <title>Functionality Related to App Stability</title>
          <p>The app log, the EMA data, and the end-of-study interview and survey will be used to assess the participant-experienced functionality. The app log contains details about the events that have occurred within the app, including information about app crashes and app reinstalls. Using data provided by participants in the morning report, participant-related functionality will be determined as follows: (1) the total count (ie, person-days) of participant-reported suspected functionality problems, (2) the person-level proportion of days of suspected functionality problems, and (3) aggregated item-level and overall mean scores on the adapted SUS. Open-ended feedback will also be obtained in the morning report as well as in the end-of-study interviews.</p>
        </sec>
        <sec>
          <title>Functionality Related to the Phone and Operating System</title>
          <p>The manufacturer, model, and Android operating system of the participant devices will be examined as moderators of the above metrics of functionality. The variables will be evaluated using a series of Mann-Whitney <italic>U</italic> tests (for means and counts) and chi-square tests (for comparing proportions) for each metric. Considering the small sample size, the groups will be driven by the sample of the device itself. For instance, the manufacturer could be binned to <italic>Samsung</italic> (or potentially <italic>Google</italic>) versus <italic>all other manufacturers</italic>; the model could be binned to <italic>currently supported</italic> (ie, receiving ongoing feature and compatibility updates) versus <italic>legacy</italic>; and the operating system could be binned to <italic>Android 13</italic> (the newest) versus <italic>Android 11 or 12</italic> (operating systems that were used during app development). Independent of group comparisons, descriptive findings on functionality will be aggregated for each manufacturer and operating system version.</p>
        </sec>
        <sec>
          <title>Validity</title>
          <p>We define validity as the concordance between encounters recorded in the Beacon Encounter data set and participant reports of peer presence recorded in the EMA reports (<xref ref-type="table" rid="table4">Table 4</xref>).</p>
          <table-wrap position="float" id="table4">
            <label>Table 4</label>
            <caption>
              <p>Beacon validity: cross-classification of beacon encounter and participant self-report data<sup>a</sup>.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="30"/>
              <col width="160"/>
              <col width="0"/>
              <col width="460"/>
              <col width="0"/>
              <col width="350"/>
              <thead>
                <tr valign="top">
                  <td colspan="3">
                    <break/>
                  </td>
                  <td colspan="3">Participant self-report data</td>
                </tr>
                <tr valign="top">
                  <td colspan="3">
                    <break/>
                  </td>
                  <td colspan="2">Positive (participant reports peer within 15 ft, 4.6 m for 15 minutes)</td>
                  <td>Negative (participant does not report peer nearby)</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td colspan="6">
                    <bold>Beacon detection</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Positive (signal-contingent trigger)</td>
                  <td colspan="2">
                    True positive: beacon detected and triggers signal-contingent report and participant reports peer presence in signal-contingent report (<italic>sensitivity</italic>)
                  </td>
                  <td colspan="2">
                    False positive<sup>b</sup>: beacon detected and triggers signal-contingent report but participant does not report peer presence in signal-contingent report (<italic>specificity; protocol criterion validation</italic>). This could happen if:
                    <list list-type="bullet"><list-item><p>delay or error in notification (<italic>technology failure</italic>)</p></list-item><list-item><p>peer is not actually present (<italic>technology failure</italic>)</p></list-item><list-item><p>peer is present with beacon but the index participant is not aware (<italic>inaccurate index participant self-report</italic>)</p></list-item><list-item><p>peer is present with beacon but not when the participant answers report (<italic>limitation of detection settings</italic>)</p></list-item></list>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Negative (no signal-contingent trigger)</td>
                  <td colspan="2">
                    False negative<sup>c</sup>:<break/>
                    <list list-type="order"><list-item><p>beacon never detected but participant reports peer presence on next EMA<sup>d</sup> random report (<italic>sensitivity</italic>). This could happen if:</p><list list-type="bullet"><list-item><p>peer is present with beacon but beacon is not detected (<italic>technology failure</italic>)</p></list-item><list-item><p>peer is present without beacon (<italic>peer noncompliance</italic>)</p></list-item><list-item><p>inaccurate index participant self-report</p></list-item></list></list-item><list-item><p>peer beacon is detected in transient encounter but criteria for actual encounter are not met so does not trigger signal-contingent report but participant reports peer presence on EMA random report (<italic>specificity; protocol criterion validation</italic>)</p></list-item></list>
                  </td>
                  <td colspan="2">
                    True negative:
                    <list list-type="order"><list-item><p>beacon never detected and no report of peer presence on EMA random report (<italic>sensitivity</italic>)</p></list-item><list-item><p>peer beacon is detected in transient encounter but does not trigger signal-contingent report (criteria for actual encounter are not met) and no report of peer presence on EMA random report or morning report (<italic>specificity; protocol criterion validation</italic>)</p></list-item></list>
                  </td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table4fn1">
                <p><sup>a</sup>Concordance will be evaluated only when self-report EMA data are available. Therefore, beacon data collected when index participants are not compliant with random or signal-contingent reports will not be usable in the evaluation of concordance, as no self-report of peer proximity will be available.</p>
              </fn>
              <fn id="table4fn2">
                <p><sup>b</sup>Reasons for false-positive signal-contingent triggers may not be known to the study team.</p>
              </fn>
              <fn id="table4fn3">
                <p><sup>c</sup>Reasons for false-negative signal-contingent triggers may not be known to the study team.</p>
              </fn>
              <fn id="table4fn4">
                <p><sup>d</sup>EMA: ecological momentary assessment.</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
          <p><italic>False negative</italic> beacon detections will be evaluated in a series of steps: First, we will compute the proportion of (1) days and (2) random reports in which a participant reported peer presence (from the EMA data set), but a corresponding transient or actual encounter does not exist (from the Beacon Encounter data set). If a transient encounter, but not an actual encounter, is recorded, we will compute (3) the proportion of these false negative events that occurred because of the a priori selection of 15 minutes as the threshold delineating a transient versus an actual encounter (based on timestamps of encounter events in the Beacon Encounter data set). For the false negative events that are not associated with a transient encounter, we will further attempt to delineate the reason underlying this false negative as either technology-related (the peer was carrying the beacon but the beacon was not detected) or compliance-related (the peer was not carrying the beacon) by integrating self-report data on compliance from the peer weekly surveys. If sample size and base rates allow, we will also fit a series of generalized linear mixed models [<xref ref-type="bibr" rid="ref44">44</xref>] regressing concordance at the person level (eg, sex and age) and proximal prior event level (eg, context and alcohol use) predictors to identify systematic factors associated with detection failure. <italic>False positive</italic> beacon detections, as indicated by the triggering of a signal-contingent report when the peer beacon is not present, have never occurred in preliminary testing. Given the factors needed to incur a false positive detection, which should only occur if beacon information was entered incorrectly by the research team, we believe that such events are highly unlikely. However, it is possible that a notification could be delayed by the operating system or other action (eg, if the index participant phone is off), which would result in the participant report being delayed, and thus the participant report would not confirm the peer presence. Beacon detection also could occur when a peer was present but the participant was not aware (eg, at a large party) or if the peer left the area before the participant answered the report. We will compute the proportion of signal-contingent reports in which participants deny a past-hour peer presence. We expect that the participant interviews and the peer surveys will be informative about the conditions under which false positives occur and will improve our understanding and measurement of peer proximity and influence. Ultimately, the detection of an encounter by the protocol when such an interaction did not occur from the participant’s perspective provides critical information necessary for the computation of the specificity and positive predictive value of our detection protocol.</p>
        </sec>
        <sec>
          <title>Anticipated Sources of Missing Data</title>
          <p>With various momentary assessment reports and passive data collection from multiple peers, the source of missing data is important to identify. We expect to have missing data owing to technical issues for the following reasons: (1) the beacons could stop sending a signal because of low battery or hardware failure; (2) the app could crash or be unable to send or receive data; (3) the phone operating system could update, resulting in the app or phone features not working as expected; or (4) the software detection algorithm may stop identifying encounter start and end signals. Missing data may also be because of participant or peer noncompliance, including the following: (1) participant nonresponse to EMA reports, (2) participant changing phone settings or status such that the detection of beacon signals or notifications is interrupted, or (3) peer failure to carry the beacon. Items in the morning report, postparticipation surveys and interviews, and the peer weekly survey will capture times when the participant or peer is aware of these issues occurring. While imperfect, this information should allow us to characterize situations in which the reason for missingness is known and thus maintain the missing-at-random assumption. Situations in which we are not confident about the reason for missing data will be investigated for systematicity using proximal prior predictors in the EMA data set to further maintain the missing-at-random assumption.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <p>Participant enrollment began in February, 2023. As of submission of the manuscript (June 2023), nine participants and 21 peers were enrolled, with data collection anticipated to finish in December, 2023. Data analysis will begin immediately upon completion of data collection.</p>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>The research described in this paper will advance the literature by developing and validating a passive detection system for situations in which social influence is important. While this Bluetooth-based technology could be applicable to many research, clinical, or community settings in which social contact is relevant, our substantive goal is to facilitate research characterizing the real-time social context of alcohol use and, in turn, to inform the timing and context of mobile-delivered interventions to reduce hazardous drinking [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. In this paper, we describe our planned procedures for evaluating the functionality and validity of the system, which incorporates multiple components of functionality and uses data from the app and reports from participants and up to 3 of their close peers. Our approach to collecting user-reported information along with passively recorded data is consistent with recommendations for identifying high-risk events and the timing of real-time intervention [<xref ref-type="bibr" rid="ref47">47</xref>].</p>
        <p>Just-in-time adaptive interventions target behavior in the natural environment at a time when behavior is opportune for modification [<xref ref-type="bibr" rid="ref48">48</xref>]. These tailored mobile-delivered interventions provide the right type and timing of intervention in response to real-time behavior, cognition, or context to prevent negative health outcomes [<xref ref-type="bibr" rid="ref48">48</xref>-<xref ref-type="bibr" rid="ref50">50</xref>]. Ideally, interventions could incorporate this BLE-based peer proximity approach to help people who are interested in changing behaviors by identifying contexts that confer greater risk (or alternatively, that protect against risk), alerting these people or others about the risk inherent in their present situation, and including encouragement and information about how to avoid the situation. This approach could be combined with other sensor technology, including location detection or geofencing using GPS to detect proximity to risky locations (eg, alcohol outlets), and other smartphone features (eg, the smartphone accelerometer to measure movement or engagement with messaging and texting apps) [<xref ref-type="bibr" rid="ref27">27</xref>]. This study will provide much-needed information about the appropriate timing and context for just-in-time adaptive interventions in a scenario that is highly characteristic of young adult drinkers: consuming alcohol with close peers.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Limitations related to technology include the need to build the system with a contracted app developer; to the best of our knowledge, there are no systems that researchers could use out of the box for person-proximity detection and EMA report triggering. The system only works with phones that use the Android operating system; iOS imposes barriers to the development of technologies and the distribution of test builds, whereas Android allows for the installation of third-party software outside of the context of Google Services (ie, sideloading). However, Android had multiple operating system updates while our project was under development; each update required a revision of the app and additional testing. This is an unavoidable element of app development that adds considerable time and resources to a project. We considered providing Android phones to participants who did not have them but had concerns that intermittent or limited use of a secondary phone would reduce both compliance and app functionality (eg, fewer notifications being sent to phones frequently in sleep mode). Another technology limitation is our inability to implement a minimum time interval between random and signal-contingent reports or to set a limit on the number of signal-contingent reports a participant receives. We will evaluate the average number of reports and intervals between reports and hope to include adjustments in future iterations.</p>
        <p>Our design will not detect influential peers who are not carrying a beacon; therefore, its success will rely largely on how well our SNI identifies influential peers and whether they participate. Our procedures will also poorly detect friends who are influential through interactions other than in-person contact (eg, via social media or text). Influence could also occur more quickly than the time duration estimate that we defined in the protocol; this influential interaction would be missed. During all EMA reports, we collect information about peers who are present but not carrying a beacon (identified a priori) and peers who are present but not on the participant’s selected peer list, which will help us to determine how successful our SNI selection process was and address some of the above limitations; we also expect that information collected in the postparticipation interviews will assist us in adjusting procedures for identifying influential peers.</p>
        <p>We are relying on self-report to a considerable extent in that we are using it as the ground truth for whether a beacon detection is accurate or not. Self-report can be inaccurate or missing, but it is the standard in the field for describing context and alcohol use, and there are no alternatives that we could use to compare to beacon detection. While we are confident that our informed consent procedure, the provision of a clear rationale to participants and peers, and confidentiality protections will minimize inaccurate reporting, it is possible that social desirability or other person-level or contextual effects in some situations will result in missing or inaccurate reports of peer presence or alcohol use [<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref52">52</xref>]. We expect that we will not be able to identify the reason for some disagreements between beacon detection and self-report, but the very robust data sets will allow for sensitivity analyses that will help us identify and understand discrepancies. For example, with morning reports and sensor data, we can compare the concordance between beacon detection and self-report on drinking versus nondrinking evenings. The weekly web-based surveying of peers was designed to minimize burden (and thus increase the likelihood of peer inclusion), but may produce unreliable data about the time spent with the participant.</p>
        <p>The success of this research relies on participant and peer compliance, as their reports are needed to evaluate every project goal. Although some degree of noncompliance with EMA is common [<xref ref-type="bibr" rid="ref38">38</xref>], poor compliance would limit our ability to evaluate functionality (refer to <xref ref-type="table" rid="table4">Table 4</xref> for details) independent of systematic bias owing to missingness in the data collected. Although our participant burden is consistent with the current practice in EMA research, our peers must consistently carry a small beacon. Our requirement that peers continuously carry a beacon will likely result in more missing data than if there were an app for peers to install on their phone (which would also be easier to do remotely). Finally, this type of work requires considerable staff time for participant and peer recruitment (up to 3 peers per participant), monitoring incoming EMA and beacon data, and data management and analysis.</p>
      </sec>
      <sec>
        <title>Future Work</title>
        <p>In addition to the evaluation described herein of functionality and validity, we are collecting participant feedback about our procedures, which will allow us to evaluate feasibility and acceptability. Together, this information will inform a large-scale study with a representative sample, a wider age span, and a broad representation of social context, permitting the study of dynamic intersections of multiple determinants of drinking behavior, including social context, location context, and individual factors (eg, craving, affect, and motivation) that underlie contextual influences [<xref ref-type="bibr" rid="ref53">53</xref>].</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Application (App) log data set.</p>
        <media xlink:href="resprot_v13i1e50241_app1.png" xlink:title="PNG File , 135 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Beacon encounter data set.</p>
        <media xlink:href="resprot_v13i1e50241_app2.png" xlink:title="PNG File , 206 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Participant events data set.</p>
        <media xlink:href="resprot_v13i1e50241_app3.png" xlink:title="PNG File , 280 KB"/>
      </supplementary-material>
      <supplementary-material id="app4">
        <label>Multimedia Appendix 4</label>
        <p>Notification log data set.</p>
        <media xlink:href="resprot_v13i1e50241_app4.png" xlink:title="PNG File , 298 KB"/>
      </supplementary-material>
      <supplementary-material id="app5">
        <label>Multimedia Appendix 5</label>
        <p>Ecological momentary assessment report data set.</p>
        <media xlink:href="resprot_v13i1e50241_app5.png" xlink:title="PNG File , 314 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">BLE</term>
          <def>
            <p>Bluetooth Low Energy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">EMA</term>
          <def>
            <p>ecological momentary assessment</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">RA</term>
          <def>
            <p>research assistant</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">SNI</term>
          <def>
            <p>social network interview</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">SUS</term>
          <def>
            <p>System Usability Scale</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This research was supported in part by grants (R21AA027329 [multiple principal investigators NPB and KMJ], K08DA048137 [principal investigator AWS], and K01AA025994 [principal investigator MKM]) from the National Institute on Alcohol Abuse and Alcoholism. The National Institutes of Health had no role in the study design, collection, analysis, or interpretation of the data, writing the manuscript, or the decision to submit the paper for publication.</p>
    </ack>
    <notes>
      <sec>
        <title>Data Availability</title>
        <p>Data sharing is not applicable to this paper as no data sets were generated or analyzed in this protocol. Once data are generated, data sets will be available from the corresponding author on reasonable request.</p>
      </sec>
    </notes>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thombs</surname>
              <given-names>DL</given-names>
            </name>
            <name name-style="western">
              <surname>Wolcott</surname>
              <given-names>BJ</given-names>
            </name>
            <name name-style="western">
              <surname>Farkash</surname>
              <given-names>LG</given-names>
            </name>
          </person-group>
          <article-title>Social context, perceived norms and drinking behavior in young people</article-title>
          <source>J Subst Abuse</source>
          <year>1997</year>
          <volume>9</volume>
          <fpage>257</fpage>
          <lpage>67</lpage>
          <pub-id pub-id-type="doi">10.1016/s0899-3289(97)90020-1</pub-id>
          <pub-id pub-id-type="medline">9494953</pub-id>
          <pub-id pub-id-type="pii">S0899-3289(97)90020-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Borsari</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Carey</surname>
              <given-names>KB</given-names>
            </name>
          </person-group>
          <article-title>Peer influences on college drinking: a review of the research</article-title>
          <source>J Subst Abuse</source>
          <year>2001</year>
          <month>12</month>
          <volume>13</volume>
          <issue>4</issue>
          <fpage>391</fpage>
          <lpage>424</lpage>
          <pub-id pub-id-type="doi">10.1016/s0899-3289(01)00098-0</pub-id>
          <pub-id pub-id-type="medline">11775073</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Trucco</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>Colder</surname>
              <given-names>CR</given-names>
            </name>
            <name name-style="western">
              <surname>Wieczorek</surname>
              <given-names>WF</given-names>
            </name>
          </person-group>
          <article-title>Vulnerability to peer influence: a moderated mediation study of early adolescent alcohol use initiation</article-title>
          <source>Addict Behav</source>
          <year>2011</year>
          <month>07</month>
          <volume>36</volume>
          <issue>7</issue>
          <fpage>729</fpage>
          <lpage>36</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/21420241"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.addbeh.2011.02.008</pub-id>
          <pub-id pub-id-type="medline">21420241</pub-id>
          <pub-id pub-id-type="pii">S0306-4603(11)00079-7</pub-id>
          <pub-id pub-id-type="pmcid">PMC3088763</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Leonard</surname>
              <given-names>KE</given-names>
            </name>
            <name name-style="western">
              <surname>Homish</surname>
              <given-names>GG</given-names>
            </name>
          </person-group>
          <article-title>Predictors of heavy drinking and drinking problems over the first 4 years of marriage</article-title>
          <source>Psychol Addict Behav</source>
          <year>2008</year>
          <month>03</month>
          <volume>22</volume>
          <issue>1</issue>
          <fpage>25</fpage>
          <lpage>35</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/18298228"/>
          </comment>
          <pub-id pub-id-type="doi">10.1037/0893-164X.22.1.25</pub-id>
          <pub-id pub-id-type="medline">18298228</pub-id>
          <pub-id pub-id-type="pii">2008-01797-003</pub-id>
          <pub-id pub-id-type="pmcid">PMC4075172</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reifman</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Watson</surname>
              <given-names>WK</given-names>
            </name>
            <name name-style="western">
              <surname>McCourt</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Social networks and college drinking: probing processes of social influence and selection</article-title>
          <source>Pers Soc Psychol Bull</source>
          <year>2006</year>
          <month>06</month>
          <day>02</day>
          <volume>32</volume>
          <issue>6</issue>
          <fpage>820</fpage>
          <lpage>32</lpage>
          <pub-id pub-id-type="doi">10.1177/0146167206286219</pub-id>
          <pub-id pub-id-type="medline">16648206</pub-id>
          <pub-id pub-id-type="pii">32/6/820</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jackson</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Merrill</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Barnett</surname>
              <given-names>NP</given-names>
            </name>
            <name name-style="western">
              <surname>Colby</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Abar</surname>
              <given-names>CC</given-names>
            </name>
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Hayes</surname>
              <given-names>KL</given-names>
            </name>
          </person-group>
          <article-title>Contextual influences on early drinking: characteristics of drinking and nondrinking days</article-title>
          <source>Psychol Addict Behav</source>
          <year>2016</year>
          <month>08</month>
          <volume>30</volume>
          <issue>5</issue>
          <fpage>566</fpage>
          <lpage>77</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/27269292"/>
          </comment>
          <pub-id pub-id-type="doi">10.1037/adb0000184</pub-id>
          <pub-id pub-id-type="medline">27269292</pub-id>
          <pub-id pub-id-type="pii">2016-27713-001</pub-id>
          <pub-id pub-id-type="pmcid">PMC5102807</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Berg</surname>
              <given-names>CJ</given-names>
            </name>
            <name name-style="western">
              <surname>Haardörfer</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Payne</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>Getachew</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Vu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Guttentag</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kirchner</surname>
              <given-names>TR</given-names>
            </name>
          </person-group>
          <article-title>Ecological momentary assessment of various tobacco product use among young adults</article-title>
          <source>Addict Behav</source>
          <year>2019</year>
          <month>05</month>
          <volume>92</volume>
          <fpage>38</fpage>
          <lpage>46</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/30579116"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.addbeh.2018.12.014</pub-id>
          <pub-id pub-id-type="medline">30579116</pub-id>
          <pub-id pub-id-type="pii">S0306-4603(18)30302-2</pub-id>
          <pub-id pub-id-type="pmcid">PMC6499639</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O'Donnell</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Richardson</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Fuller-Tyszkiewicz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Liknaitzky</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Arulkadacham</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Dvorak</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Staiger</surname>
              <given-names>PK</given-names>
            </name>
          </person-group>
          <article-title>Ecological momentary assessment of drinking in young adults: an investigation into social context, affect and motives</article-title>
          <source>Addict Behav</source>
          <year>2019</year>
          <month>11</month>
          <volume>98</volume>
          <fpage>106019</fpage>
          <pub-id pub-id-type="doi">10.1016/j.addbeh.2019.06.008</pub-id>
          <pub-id pub-id-type="medline">31247534</pub-id>
          <pub-id pub-id-type="pii">S0306-4603(18)30804-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Perski</surname>
              <given-names>O</given-names>
            </name>
            <name name-style="western">
              <surname>Keller</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Kale</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Asare</surname>
              <given-names>BY</given-names>
            </name>
            <name name-style="western">
              <surname>Schneider</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Powell</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Naughton</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Ten Hoor</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Verboon</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Kwasnicka</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Understanding health behaviours in context: a systematic review and meta-analysis of ecological momentary assessment studies of five key health behaviours</article-title>
          <source>Health Psychol Rev</source>
          <year>2022</year>
          <month>12</month>
          <day>15</day>
          <volume>16</volume>
          <issue>4</issue>
          <fpage>576</fpage>
          <lpage>601</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/35975950"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/17437199.2022.2112258</pub-id>
          <pub-id pub-id-type="medline">35975950</pub-id>
          <pub-id pub-id-type="pmcid">PMC9704370</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ebner-Priemer</surname>
              <given-names>UW</given-names>
            </name>
            <name name-style="western">
              <surname>Trull</surname>
              <given-names>TJ</given-names>
            </name>
          </person-group>
          <article-title>Ecological momentary assessment of mood disorders and mood dysregulation</article-title>
          <source>Psychol Assess</source>
          <year>2009</year>
          <month>12</month>
          <volume>21</volume>
          <issue>4</issue>
          <fpage>463</fpage>
          <lpage>75</lpage>
          <pub-id pub-id-type="doi">10.1037/a0017075</pub-id>
          <pub-id pub-id-type="medline">19947781</pub-id>
          <pub-id pub-id-type="pii">2009-22537-002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kuntsche</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Labhart</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>The future is now--using personal cellphones to gather data on substance use and related factors</article-title>
          <source>Addiction</source>
          <year>2014</year>
          <month>07</month>
          <volume>109</volume>
          <issue>7</issue>
          <fpage>1052</fpage>
          <lpage>3</lpage>
          <pub-id pub-id-type="doi">10.1111/add.12540</pub-id>
          <pub-id pub-id-type="medline">24754712</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>de Salas</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Lewis</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Schüz</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Developing smartphone apps for behavioural studies: the AlcoRisk app case study</article-title>
          <source>J Biomed Inform</source>
          <year>2017</year>
          <month>08</month>
          <volume>72</volume>
          <fpage>108</fpage>
          <lpage>19</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1532-0464(17)30163-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2017.07.007</pub-id>
          <pub-id pub-id-type="medline">28709856</pub-id>
          <pub-id pub-id-type="pii">S1532-0464(17)30163-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cheng</surname>
              <given-names>YC</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>YC</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>WL</given-names>
            </name>
          </person-group>
          <article-title>Heart rate variability as a potential biomarker for alcohol use disorders: a systematic review and meta-analysis</article-title>
          <source>Drug Alcohol Depend</source>
          <year>2019</year>
          <month>11</month>
          <day>01</day>
          <volume>204</volume>
          <fpage>107502</fpage>
          <pub-id pub-id-type="doi">10.1016/j.drugalcdep.2019.05.030</pub-id>
          <pub-id pub-id-type="medline">31494439</pub-id>
          <pub-id pub-id-type="pii">S0376-8716(19)30261-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ralevski</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Petrakis</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Altemus</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Heart rate variability in alcohol use: a review</article-title>
          <source>Pharmacol Biochem Behav</source>
          <year>2019</year>
          <month>01</month>
          <volume>176</volume>
          <fpage>83</fpage>
          <lpage>92</lpage>
          <pub-id pub-id-type="doi">10.1016/j.pbb.2018.12.003</pub-id>
          <pub-id pub-id-type="medline">30529588</pub-id>
          <pub-id pub-id-type="pii">S0091-3057(18)30344-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barnett</surname>
              <given-names>NP</given-names>
            </name>
          </person-group>
          <article-title>Alcohol sensors and their potential for improving clinical care</article-title>
          <source>Addiction</source>
          <year>2015</year>
          <month>01</month>
          <day>17</day>
          <volume>110</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>3</lpage>
          <pub-id pub-id-type="doi">10.1111/add.12764</pub-id>
          <pub-id pub-id-type="medline">25515824</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Paprocki</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Qassem</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Kyriacou</surname>
              <given-names>PA</given-names>
            </name>
          </person-group>
          <article-title>Review of ethanol intoxication sensing technologies and techniques</article-title>
          <source>Sensors (Basel)</source>
          <year>2022</year>
          <month>09</month>
          <day>09</day>
          <volume>22</volume>
          <issue>18</issue>
          <fpage>6819</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=s22186819"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/s22186819</pub-id>
          <pub-id pub-id-type="medline">36146167</pub-id>
          <pub-id pub-id-type="pii">s22186819</pub-id>
          <pub-id pub-id-type="pmcid">PMC9501510</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Trull</surname>
              <given-names>TJ</given-names>
            </name>
            <name name-style="western">
              <surname>Ebner-Priemer</surname>
              <given-names>U</given-names>
            </name>
          </person-group>
          <article-title>The role of ambulatory assessment in psychological science</article-title>
          <source>Curr Dir Psychol Sci</source>
          <year>2014</year>
          <month>12</month>
          <volume>23</volume>
          <issue>6</issue>
          <fpage>466</fpage>
          <lpage>70</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/25530686"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/0963721414550706</pub-id>
          <pub-id pub-id-type="medline">25530686</pub-id>
          <pub-id pub-id-type="pmcid">PMC4269226</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Byrnes</surname>
              <given-names>HF</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Wiebe</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Morrison</surname>
              <given-names>CN</given-names>
            </name>
            <name name-style="western">
              <surname>Remer</surname>
              <given-names>LG</given-names>
            </name>
            <name name-style="western">
              <surname>Wiehe</surname>
              <given-names>SE</given-names>
            </name>
          </person-group>
          <article-title>Tracking adolescents with global positioning system-enabled cell phones to study contextual exposures and alcohol and marijuana use: a pilot study</article-title>
          <source>J Adolesc Health</source>
          <year>2015</year>
          <month>08</month>
          <volume>57</volume>
          <issue>2</issue>
          <fpage>245</fpage>
          <lpage>7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/26206448"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jadohealth.2015.04.013</pub-id>
          <pub-id pub-id-type="medline">26206448</pub-id>
          <pub-id pub-id-type="pii">S1054-139X(15)00168-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC4515768</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wray</surname>
              <given-names>TB</given-names>
            </name>
            <name name-style="western">
              <surname>Pérez</surname>
              <given-names>AE</given-names>
            </name>
            <name name-style="western">
              <surname>Celio</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Carr</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Adia</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Monti</surname>
              <given-names>PM</given-names>
            </name>
          </person-group>
          <article-title>Exploring the use of smartphone geofencing to study characteristics of alcohol drinking locations in high-risk gay and bisexual men</article-title>
          <source>Alcohol Clin Exp Res</source>
          <year>2019</year>
          <month>05</month>
          <volume>43</volume>
          <issue>5</issue>
          <fpage>900</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/30802318"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/acer.13991</pub-id>
          <pub-id pub-id-type="medline">30802318</pub-id>
          <pub-id pub-id-type="pmcid">PMC6502660</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harari</surname>
              <given-names>GM</given-names>
            </name>
            <name name-style="western">
              <surname>Müller</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Aung</surname>
              <given-names>MS</given-names>
            </name>
            <name name-style="western">
              <surname>Rentfrow</surname>
              <given-names>PJ</given-names>
            </name>
          </person-group>
          <article-title>Smartphone sensing methods for studying behavior in everyday life</article-title>
          <source>Curr Opin Behav Sci</source>
          <year>2017</year>
          <month>12</month>
          <volume>18</volume>
          <fpage>83</fpage>
          <lpage>90</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.sciencedirect.com/science/article/abs/pii/S2352154617300505"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.cobeha.2017.07.018</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harari</surname>
              <given-names>GM</given-names>
            </name>
            <name name-style="western">
              <surname>Lane</surname>
              <given-names>ND</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Crosier</surname>
              <given-names>BS</given-names>
            </name>
            <name name-style="western">
              <surname>Campbell</surname>
              <given-names>AT</given-names>
            </name>
            <name name-style="western">
              <surname>Gosling</surname>
              <given-names>SD</given-names>
            </name>
          </person-group>
          <article-title>Using smartphones to collect behavioral data in psychological science: opportunities, practical considerations, and challenges</article-title>
          <source>Perspect Psychol Sci</source>
          <year>2016</year>
          <month>11</month>
          <volume>11</volume>
          <issue>6</issue>
          <fpage>838</fpage>
          <lpage>54</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/27899727"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1745691616650285</pub-id>
          <pub-id pub-id-type="medline">27899727</pub-id>
          <pub-id pub-id-type="pii">11/6/838</pub-id>
          <pub-id pub-id-type="pmcid">PMC5572675</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Deak</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Curran</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Condell</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>A survey of active and passive indoor localisation systems</article-title>
          <source>Comput Commun</source>
          <year>2012</year>
          <month>09</month>
          <volume>35</volume>
          <issue>16</issue>
          <fpage>1939</fpage>
          <lpage>54</lpage>
          <pub-id pub-id-type="doi">10.1016/j.comcom.2012.06.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eagle</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Pentland</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Reality mining: sensing complex social systems</article-title>
          <source>Pers Ubiquit Comput</source>
          <year>2005</year>
          <month>11</month>
          <day>3</day>
          <volume>10</volume>
          <issue>4</issue>
          <fpage>255</fpage>
          <lpage>68</lpage>
          <pub-id pub-id-type="doi">10.1007/s00779-005-0046-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Girolami</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Mavilia</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Delmastro</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Sensing social interactions through BLE beacons and commercial mobile devices</article-title>
          <source>Pervasive Mob Comput</source>
          <year>2020</year>
          <month>09</month>
          <volume>67</volume>
          <fpage>101198</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32834802"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.pmcj.2020.101198</pub-id>
          <pub-id pub-id-type="medline">32834802</pub-id>
          <pub-id pub-id-type="pii">S1574-1192(20)30067-5</pub-id>
          <pub-id pub-id-type="pmcid">PMC7305734</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Madan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Cebrian</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lazer</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Pentland</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Social sensing for epidemiological behavior change</article-title>
          <source>Proceedings of the 12th ACM international conference on Ubiquitous computing</source>
          <year>2010</year>
          <conf-name>UbiComp '10</conf-name>
          <conf-date>September 26-29, 2010</conf-date>
          <conf-loc>Copenhagen, Denmark</conf-loc>
          <fpage>291</fpage>
          <lpage>300</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dl.acm.org/doi/10.1145/1864349.1864394"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/1864349.1864394</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moturu</surname>
              <given-names>ST</given-names>
            </name>
            <name name-style="western">
              <surname>Khayal</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Aharony</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Pan</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Pentland</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Using social sensing to understand the links between sleep, mood, and sociability</article-title>
          <source>Proceedings of the IEEE 3rd International Conference on Privacy, Security, Risk and Trust and 2011 IEEE 3rd International Conference on Social Computing</source>
          <year>2011</year>
          <conf-name>PASSAT '11</conf-name>
          <conf-date>October 9-11, 2011</conf-date>
          <conf-loc>Boston, MA</conf-loc>
          <fpage>208</fpage>
          <lpage>14</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/6113116"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Meegahapola</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Labhart</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Phan</surname>
              <given-names>TT</given-names>
            </name>
            <name name-style="western">
              <surname>Gatica-Perez</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Examining the social context of alcohol drinking in young adults with smartphone sensing</article-title>
          <source>Proc ACM Interact Mob Wearable Ubiquitous Technol</source>
          <year>2021</year>
          <month>09</month>
          <day>14</day>
          <volume>5</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>26</lpage>
          <pub-id pub-id-type="doi">10.1145/3478126</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hatke</surname>
              <given-names>GF</given-names>
            </name>
            <name name-style="western">
              <surname>Montanari</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Appadwedula</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wentz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Meklenburg</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ivers</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Using Bluetooth low energy (ble) signal strength estimation to facilitate contact tracing for COVID-19</article-title>
          <source>arXiv Preprint posted online June 28, 2020</source>
          <year>2020</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/2006.15711#:~:text=version%2C%20v2)%5D-,Using%20Bluetooth%20Low%20Energy%20(BLE)%20Signal%20Strength%20Estimation%20to%20Facilitate,Contact%20Tracing%20for%20COVID%2D19&amp;text=The%20process%20of%20contact%20tracing,managed%20by%20public%20health%20entities"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Maghdid</surname>
              <given-names>HS</given-names>
            </name>
            <name name-style="western">
              <surname>Ghafoor</surname>
              <given-names>KZ</given-names>
            </name>
          </person-group>
          <article-title>A smartphone enabled approach to manage COVID-19 lockdown and economic crisis</article-title>
          <source>SN Comput Sci</source>
          <year>2020</year>
          <month>08</month>
          <day>14</day>
          <volume>1</volume>
          <issue>5</issue>
          <fpage>271</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33063052"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s42979-020-00290-0</pub-id>
          <pub-id pub-id-type="medline">33063052</pub-id>
          <pub-id pub-id-type="pii">290</pub-id>
          <pub-id pub-id-type="pmcid">PMC7427696</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Wei</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Bluetooth-based COVID-19 proximity tracing proposals: an overview</article-title>
          <source>arXiv. Preprint posted online August 28, 2020</source>
          <year>2020</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/2008.12469"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jackson</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Meisel</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Sokolovsky</surname>
              <given-names>AW</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Barnett</surname>
              <given-names>NP</given-names>
            </name>
          </person-group>
          <article-title>Study protocol for establishing feasibility and acceptability of a bluetooth-based sensor to detect and understand social influence during drinking situations</article-title>
          <source>JMIR Preprint posted online July 7, 2023</source>
          <year>2023</year>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://preprints.jmir.org/preprint/50650)"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/preprints.50650</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lau-Barraco</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Linden</surname>
              <given-names>AN</given-names>
            </name>
          </person-group>
          <article-title>Drinking buddies: who are they and when do they matter?</article-title>
          <source>Addict Res Theory</source>
          <year>2014</year>
          <month>03</month>
          <day>14</day>
          <volume>22</volume>
          <issue>1</issue>
          <fpage>57</fpage>
          <lpage>67</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/25429255"/>
          </comment>
          <pub-id pub-id-type="doi">10.3109/16066359.2013.772585</pub-id>
          <pub-id pub-id-type="medline">25429255</pub-id>
          <pub-id pub-id-type="pmcid">PMC4241859</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Meisel</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Kenney</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Barnett</surname>
              <given-names>NP</given-names>
            </name>
          </person-group>
          <article-title>Characteristics of prospectively identified negative alcohol-related events among college students</article-title>
          <source>Addict Behav</source>
          <year>2018</year>
          <month>03</month>
          <volume>78</volume>
          <fpage>138</fpage>
          <lpage>44</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/29172106"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.addbeh.2017.11.025</pub-id>
          <pub-id pub-id-type="medline">29172106</pub-id>
          <pub-id pub-id-type="pii">S0306-4603(17)30433-1</pub-id>
          <pub-id pub-id-type="pmcid">PMC5783764</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>DeMartini</surname>
              <given-names>KS</given-names>
            </name>
            <name name-style="western">
              <surname>Prince</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Carey</surname>
              <given-names>KB</given-names>
            </name>
          </person-group>
          <article-title>Identification of trajectories of social network composition change and the relationship to alcohol consumption and norms</article-title>
          <source>Drug Alcohol Depend</source>
          <year>2013</year>
          <month>09</month>
          <day>01</day>
          <volume>132</volume>
          <issue>1-2</issue>
          <fpage>309</fpage>
          <lpage>15</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/23523132"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.drugalcdep.2013.02.020</pub-id>
          <pub-id pub-id-type="medline">23523132</pub-id>
          <pub-id pub-id-type="pii">S0376-8716(13)00069-0</pub-id>
          <pub-id pub-id-type="pmcid">PMC3748204</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barnett</surname>
              <given-names>NP</given-names>
            </name>
            <name name-style="western">
              <surname>Clark</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Kenney</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>DiGuiseppi</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Meisel</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Balestrieri</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ott</surname>
              <given-names>MQ</given-names>
            </name>
            <name name-style="western">
              <surname>Light</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Enrollment and assessment of a first-year college class social network for a controlled trial of the indirect effect of a brief motivational intervention</article-title>
          <source>Contemp Clin Trials</source>
          <year>2019</year>
          <month>01</month>
          <volume>76</volume>
          <fpage>16</fpage>
          <lpage>23</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/30391343"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.cct.2018.10.015</pub-id>
          <pub-id pub-id-type="medline">30391343</pub-id>
          <pub-id pub-id-type="pii">S1551-7144(18)30313-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC6402826</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Longabaugh</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Wirtz</surname>
              <given-names>PW</given-names>
            </name>
            <name name-style="western">
              <surname>Zywiak</surname>
              <given-names>WH</given-names>
            </name>
            <name name-style="western">
              <surname>O'Malley</surname>
              <given-names>SS</given-names>
            </name>
          </person-group>
          <article-title>Network support as a prognostic indicator of drinking outcomes: the COMBINE Study</article-title>
          <source>J Stud Alcohol Drugs</source>
          <year>2010</year>
          <month>11</month>
          <volume>71</volume>
          <issue>6</issue>
          <fpage>837</fpage>
          <lpage>46</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/20946740"/>
          </comment>
          <pub-id pub-id-type="doi">10.15288/jsad.2010.71.837</pub-id>
          <pub-id pub-id-type="medline">20946740</pub-id>
          <pub-id pub-id-type="pmcid">PMC2965482</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
          <article-title>Ecological momentary assessment made simple</article-title>
          <source>PiLR Health</source>
          <access-date>2024-03-16</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://pilrhealth.com/">https://pilrhealth.com/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jones</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Remmerswaal</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Verveer</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Robinson</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Franken</surname>
              <given-names>IH</given-names>
            </name>
            <name name-style="western">
              <surname>Wen</surname>
              <given-names>CK</given-names>
            </name>
            <name name-style="western">
              <surname>Field</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Compliance with ecological momentary assessment protocols in substance users: a meta-analysis</article-title>
          <source>Addiction</source>
          <year>2019</year>
          <month>04</month>
          <day>21</day>
          <volume>114</volume>
          <issue>4</issue>
          <fpage>609</fpage>
          <lpage>19</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/30461120"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/add.14503</pub-id>
          <pub-id pub-id-type="medline">30461120</pub-id>
          <pub-id pub-id-type="pmcid">PMC6492133</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brooke</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Jordan</surname>
              <given-names>PW</given-names>
            </name>
            <name name-style="western">
              <surname>Thomas</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>McClelland</surname>
              <given-names>IL</given-names>
            </name>
            <name name-style="western">
              <surname>Weerdmeester</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Sus: A quick and dirty usability scale</article-title>
          <source>Usability Evaluation In Industry</source>
          <year>1996</year>
          <publisher-loc>London, UK</publisher-loc>
          <publisher-name>Taylor &amp; Francis</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dudhane</surname>
              <given-names>NA</given-names>
            </name>
            <name name-style="western">
              <surname>Pitambare</surname>
              <given-names>ST</given-names>
            </name>
          </person-group>
          <article-title>Location Based and Contextual Services Using Bluetooth Beacons: New Way to Enhance Customer Experience</article-title>
          <source>Lect Notes Inf Theory</source>
          <year>2015</year>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>31</fpage>
          <lpage>4</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.lnit.org/uploadfile/2016/0115/20160115052139243.pdf"/>
          </comment>
          <pub-id pub-id-type="doi">10.18178/lnit.3.1.31-34</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chai</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>An</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Du</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>An indoor positioning algorithm using bluetooth low energy RSSI</article-title>
          <source>Proceedings of the 2014 International Conference on Indoor Positioning and Indoor Navigation</source>
          <year>2014</year>
          <conf-name>IPIN '16</conf-name>
          <conf-date>October 27-30, 2014</conf-date>
          <conf-loc>Busan, South Korea</conf-loc>
          <fpage>526</fpage>
          <lpage>33</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/document/7275525"/>
          </comment>
          <pub-id pub-id-type="doi">10.2991/amsee-16.2016.72</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Zhao</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Cuthbert</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>editors. Bluetooth positioning using RSSI and triangulation methods</article-title>
          <source>proceedings of the 2013 IEEE 10th Consumer Communications and Networking Conference</source>
          <year>2013</year>
          <conf-name>CCNC '13</conf-name>
          <conf-date>January 11-14, 2013</conf-date>
          <conf-loc>Las Vegas, NV</conf-loc>
          <fpage>837</fpage>
          <lpage>42</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ieeexplore.ieee.org/abstract/document/6488558"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/ccnc.2013.6488558</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="web">
          <article-title>Beacon transmission power, range, and RSSI</article-title>
          <source>kontakt.io</source>
          <access-date>2024-01-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://support.kontakt.io/hc/en-gb/articles/4413258518930-Beacon-transmission-power-range-and-RSSI">https://support.kontakt.io/hc/en-gb/articles/4413258518930-Beacon-transmission-power-range-and-RSSI</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hedeker</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Hedeker</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Generalized linear mixed models</article-title>
          <source>Encyclopedia of Statistics in Behavioral Science</source>
          <year>2005</year>
          <publisher-loc>Hoboken, NJ</publisher-loc>
          <publisher-name>John Wiley &amp; Sons</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bendtsen</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>McCambridge</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Åsberg</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Bendtsen</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Text messaging interventions for reducing alcohol consumption among risky drinkers: systematic review and meta-analysis</article-title>
          <source>Addiction</source>
          <year>2021</year>
          <month>05</month>
          <day>25</day>
          <volume>116</volume>
          <issue>5</issue>
          <fpage>1021</fpage>
          <lpage>33</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33047865"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/add.15294</pub-id>
          <pub-id pub-id-type="medline">33047865</pub-id>
          <pub-id pub-id-type="pmcid">PMC8247265</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Berman</surname>
              <given-names>AH</given-names>
            </name>
            <name name-style="western">
              <surname>Gajecki</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sinadinovic</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Andersson</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Mobile interventions targeting risky drinking among university students: a review</article-title>
          <source>Curr Addict Rep</source>
          <year>2016</year>
          <volume>3</volume>
          <fpage>166</fpage>
          <lpage>74</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/27226948"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s40429-016-0099-6</pub-id>
          <pub-id pub-id-type="medline">27226948</pub-id>
          <pub-id pub-id-type="pii">99</pub-id>
          <pub-id pub-id-type="pmcid">PMC4856712</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beckjord</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Shiffman</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Background for real-time monitoring and intervention related to alcohol use</article-title>
          <source>Alcohol Res</source>
          <year>2014</year>
          <volume>36</volume>
          <issue>1</issue>
          <fpage>9</fpage>
          <lpage>18</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/26258996"/>
          </comment>
          <pub-id pub-id-type="medline">26258996</pub-id>
          <pub-id pub-id-type="pmcid">PMC4432861</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nahum-Shani</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>SN</given-names>
            </name>
            <name name-style="western">
              <surname>Spring</surname>
              <given-names>BJ</given-names>
            </name>
            <name name-style="western">
              <surname>Collins</surname>
              <given-names>LM</given-names>
            </name>
            <name name-style="western">
              <surname>Witkiewitz</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Tewari</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Murphy</surname>
              <given-names>SA</given-names>
            </name>
          </person-group>
          <article-title>Just-in-Time Adaptive Interventions (JITAIs) in mobile health: key components and design principles for ongoing health behavior support</article-title>
          <source>Ann Behav Med</source>
          <year>2018</year>
          <month>05</month>
          <day>18</day>
          <volume>52</volume>
          <issue>6</issue>
          <fpage>446</fpage>
          <lpage>62</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/27663578"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s12160-016-9830-8</pub-id>
          <pub-id pub-id-type="medline">27663578</pub-id>
          <pub-id pub-id-type="pii">10.1007/s12160-016-9830-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC5364076</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Heron</surname>
              <given-names>KE</given-names>
            </name>
            <name name-style="western">
              <surname>Smyth</surname>
              <given-names>JM</given-names>
            </name>
          </person-group>
          <article-title>Ecological momentary interventions: incorporating mobile technology into psychosocial and health behaviour treatments</article-title>
          <source>Br J Health Psychol</source>
          <year>2010</year>
          <month>02</month>
          <volume>15</volume>
          <issue>Pt 1</issue>
          <fpage>1</fpage>
          <lpage>39</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/19646331"/>
          </comment>
          <pub-id pub-id-type="doi">10.1348/135910709X466063</pub-id>
          <pub-id pub-id-type="medline">19646331</pub-id>
          <pub-id pub-id-type="pii">bjhp696</pub-id>
          <pub-id pub-id-type="pmcid">PMC2800172</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Spruijt-Metz</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Nilsen</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Dynamic models of behavior for just-in-time adaptive interventions</article-title>
          <source>IEEE Pervasive Comput</source>
          <year>2014</year>
          <month>7</month>
          <volume>13</volume>
          <issue>3</issue>
          <fpage>13</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1109/MPRV.2014.46</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sokolovsky</surname>
              <given-names>AW</given-names>
            </name>
            <name name-style="western">
              <surname>Mermelstein</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Hedeker</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Factors predicting compliance to ecological momentary assessment among adolescent smokers</article-title>
          <source>Nicotine Tob Res</source>
          <year>2014</year>
          <month>03</month>
          <volume>16</volume>
          <issue>3</issue>
          <fpage>351</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/24097816"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/ntr/ntt154</pub-id>
          <pub-id pub-id-type="medline">24097816</pub-id>
          <pub-id pub-id-type="pii">ntt154</pub-id>
          <pub-id pub-id-type="pmcid">PMC3920338</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kovalchik</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Martino</surname>
              <given-names>SC</given-names>
            </name>
            <name name-style="western">
              <surname>Collins</surname>
              <given-names>RL</given-names>
            </name>
            <name name-style="western">
              <surname>Shadel</surname>
              <given-names>WG</given-names>
            </name>
            <name name-style="western">
              <surname>D’Amico</surname>
              <given-names>EJ</given-names>
            </name>
            <name name-style="western">
              <surname>Becker</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Scaled inverse probability weighting: a method to assess potential bias due to event nonreporting in ecological momentary assessment studies</article-title>
          <source>J Educ Behav Stat</source>
          <year>2017</year>
          <month>10</month>
          <day>26</day>
          <volume>43</volume>
          <issue>3</issue>
          <fpage>354</fpage>
          <lpage>81</lpage>
          <pub-id pub-id-type="doi">10.3102/1076998617738241</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lau-Barraco</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Braitman</surname>
              <given-names>AL</given-names>
            </name>
            <name name-style="western">
              <surname>Leonard</surname>
              <given-names>KE</given-names>
            </name>
            <name name-style="western">
              <surname>Padilla</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Drinking buddies and their prospective influence on alcohol outcomes: alcohol expectancies as a mediator</article-title>
          <source>Psychol Addict Behav</source>
          <year>2012</year>
          <month>12</month>
          <volume>26</volume>
          <issue>4</issue>
          <fpage>747</fpage>
          <lpage>58</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/22732054"/>
          </comment>
          <pub-id pub-id-type="doi">10.1037/a0028909</pub-id>
          <pub-id pub-id-type="medline">22732054</pub-id>
          <pub-id pub-id-type="pii">2012-16651-001</pub-id>
          <pub-id pub-id-type="pmcid">PMC3588170</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
