Search6 Results

Searching for mobile technology topics can be challenging due to the varying terminology and the cross disciplinary nature of the search terms. This information seeking starter kit provides some basic, structured literature search strategies to get you started.  The strategies are not meant to be comprehensive, but are designed to be a flexible launching pad for literature discovery.
Selecting technology to manage a study remotely is a big decision. This article includes considerations for selecting technology and information on vendors that are (at the time of writing) approved for use in research at U-M.
This resource guide was developed for attendees of the MeTRIC Symposium at the University of Michigan held on November 1st, 2024. MeTRIC is a campus-wide collaboration designed to foster knowledge sharing and create a single access point for University of Michigan investigators who are looking to use wearables, apps, or other mobile technologies in their health research.
Hiring the right person for any position can be challenging, but this is especially true for research teams involved in mobile health (mHealth) studies. These projects often require a unique skill set to handle data management and technical hurdles that differ significantly from traditional research support roles. In this article, we explore the necessity of hiring the right technical support person for your research team, and what types of questions you should ask.
Understanding the technology elements for a study utilizing wearable and mobile technologies will assist researchers during the study planning process in several ways.

- Build a more accurate study budget.
- Develop a Data Management & Sharing Plan, which can be a requirement for funders and journal submissions.
- Prepare for regulatory and compliance processes, like an Information Assurance (IA) review, if needed
Information security is an important aspect of any study utilizing mobile technologies because these studies require data to be transferred from a 3rd party into the university computing environment. Transferring data through the firewall creates vulnerabilities that need to be managed appropriately. This article provides information and resources for investigators that will help them navigate the complex and ever-changing landscape of data security at Michigan.