{"id":4832,"date":"2021-01-13T12:17:30","date_gmt":"2021-01-13T19:17:30","guid":{"rendered":"https:\/\/nau.edu\/school-of-informatics-computing-and-cyber-systems\/?p=4832"},"modified":"2021-01-13T12:17:30","modified_gmt":"2021-01-13T19:17:30","slug":"nau-researchers-study-changing-substance-use-treatment-regulations-during-covid-19","status":"publish","type":"post","link":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/nau-researchers-study-changing-substance-use-treatment-regulations-during-covid-19\/","title":{"rendered":"NAU researchers study changing substance use treatment regulations during COVID-19"},"content":{"rendered":"<p>NAU researchers\u00a0<strong>Emery Eaves<\/strong>,\u00a0<strong>Regents\u2019 Professor\u00a0<\/strong>\u00a0<strong>Robert T Trotter II<\/strong>,\u00a0<strong>Eck Doerry<\/strong>, and\u00a0<strong>Julie Baldwin<\/strong> have been working on a one-year, $293,000 project, funded by the National Institute on Minority Health and Health Disparities, to use rapid assessment, response and evaluation (RARE) methods to document both barriers and facilitators to implementation of the temporary guidelines for SUD treatment during COVID-19. <a href=\"https:\/\/legacy.nau.edu\/cher\/covid-substance-use-treatment\/\">Read More.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NAU researchers\u00a0Emery Eaves,\u00a0Regents\u2019 Professor\u00a0\u00a0Robert T Trotter II,\u00a0Eck Doerry, and\u00a0Julie Baldwin have been working on a one-year, $293,000 project, funded by the National Institute on Minority Health and Health Disparities, to use rapid assessment, response and evaluation (RARE) methods to document both barriers and facilitators to implementation of the temporary guidelines for SUD treatment during COVID-19. [&hellip;]<\/p>\n","protected":false},"author":471,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-4832","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/posts\/4832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/users\/471"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/comments?post=4832"}],"version-history":[{"count":1,"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/posts\/4832\/revisions"}],"predecessor-version":[{"id":4833,"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/posts\/4832\/revisions\/4833"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/media?parent=4832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/categories?post=4832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/in.nau.edu\/school-informatics-computing-cyber-systems\/wp-json\/wp\/v2\/tags?post=4832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}