Skip to main content
. Author manuscript; available in PMC: 2012 Jan 1.
Published in final edited form as: Subst Use Misuse. 2011;46(1):10–22. doi: 10.3109/10826084.2011.521067

Figure 2.

Figure 2

Screenshot of what appeared when a participant logged onto the server. Each time a participant logged in a randomly determined, unique alphanumeric code was displayed on the screen. As verification, the server stored the time of the log in and the randomly generated code to match that shown by the participant in the video.