{"id":235,"date":"2019-12-04T17:31:08","date_gmt":"2019-12-04T17:31:08","guid":{"rendered":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/chapter\/ch-1-name-5\/"},"modified":"2020-12-07T16:56:29","modified_gmt":"2020-12-07T16:56:29","slug":"ch-1-name-5","status":"publish","type":"chapter","link":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/chapter\/ch-1-name-5\/","title":{"rendered":"Ch. 7.1: Theory Integration and Prevention"},"content":{"raw":"<div class=\"__UNKNOWN__\">\r\n<p class=\"import-Normal\">A wide range of biological, psychological, social and spiritual context theories and models concerning substance use, substance misuse, and substance use disorders can be integrated to inform intervention strategies and future research from a bio-psycho-social-spiritual perspective. A vulnerability, resilience, risk, and protective factors framework is presented here to help conceptualize and integrate multiple, diverse theories and evidence. This integrative framework reflects both a bio-psycho-social-spiritual and social work person-in-environment strengths perspective. Thus, it can inform interventions and policies that help change individuals, their environments, and the interface between individuals and their environments. The framework was derived from E. James Anthony\u2019s early work concerning the etiology of schizophrenia.<\/p>\r\n<p class=\"import-Normal\">The vulnerability, resilience, risk, and protective factors <em><strong>framework is applied at the group or population level for purposes of informing\/planning intervention strategies<\/strong><\/em> and research based on logic models and existing evidence. The state of evidence and assessment tools, at this time, is not sufficiently well-honed to predict individual outcomes, so the framework is not used to assess or predict what will happen for an individual person or family. Here, the framework\u2019s four steps are outlined.<\/p>\r\n<p class=\"import-Normal\" style=\"text-indent: 36pt\"><strong>Specify the problem.<\/strong> The more specific the problem definition, the easier the task of identifying and integrating varied theoretical models becomes (Begun, 1999). For example, \u201cpreventing adolescent initiation of alcohol misuse\u201d is reasonably specific, whereas \u201cpreventing substance use disorders\u201d is overly general. Specificity might include specifics of an addictive behavior (e.g., a specific substance, type of technology, or form of gambling) and\/or a target population (e.g., a specified age or developmental phase, racial\/ethnic group, self-defined gender identity, sexual orientation, co-occurring problems, or problem severity level). It is important, as well, to be specific as to the system level being addressed: individuals, family subsystems, family systems, neighborhoods\/communities, institutions, or geographical regions. Specificity about the prevention target hones your aim.<\/p>\r\n<p class=\"import-Normal\">2. <strong>Define the <\/strong><strong>relevant <\/strong><strong>vulnerability\/resilience continuum.<\/strong> Once a prevention problem is clearly specified, evidence concerning known vulnerability and resilience factors can be located and critically analyzed. The <a href=\"https:\/\/ohiostate.pressbooks.pub\/swk5805coursebook\/chapter\/module-6-key-terms\/\"><strong><em>vulnerability\/resilience continuum<\/em><\/strong><\/a> refers to factors <em>intrinsic<\/em> to individuals (or other system level specified in the first step). In other words, factors that individuals bring with them to any new situation or experience, such as those we studied in previous chapters (biological models and psychological models).<\/p>\r\n<p class=\"import-Normal\">These include the factors like:<\/p>\r\n\r\n<ul>\r\n \t<li class=\"import-Normal\">genetics, neurobiology, and other biological processes;<\/li>\r\n \t<li class=\"import-Normal\">temperament and personality characteristics;<\/li>\r\n \t<li class=\"import-Normal\">abilities and disabilities;<\/li>\r\n \t<li class=\"import-Normal\">co-occurring problems;<\/li>\r\n \t<li class=\"import-Normal\">past experiences and learning; and,<\/li>\r\n \t<li class=\"import-Normal\">current attitudes, beliefs, knowledge, and behavior patterns.<\/li>\r\n<\/ul>\r\n<p class=\"import-Normal\">Some factors reflect individuals\u2019 vulnerability to the specified problem, other factors reflect aspects of their resilience. Together evidence concerning these intrinsic factors help determine where along a vulnerability\/resilience continuum a group of individuals might be situated. For example, a recognized vulnerability\/resilience factor with a great deal of supporting evidence and clear mechanisms by which it happens is the age at substance initiation\u2014the earlier individuals begin using most types of substances, the greater the probability of developing a substance use disorder during their lifetime. Young age of initiation pushes the continuum toward vulnerability; delaying past emerging adulthood pushes the continuum toward resilience.<\/p>\r\n<p class=\"import-Normal\"><img class=\"aligncenter wp-image-232 \" src=\"https:\/\/pressbooks.ulib.csuohio.edu\/bestpracticesinsubstancemisusetreatment\/wp-content\/uploads\/sites\/106\/2020\/09\/vulnerability_resilience.png\" alt=\"2 arrows pointing away from each other, one labeled &quot;vulnerability&quot; and the other, &quot;resilience&quot;\" width=\"205\" height=\"102\" \/><\/p>\r\n<p class=\"import-Normal\">At this point, the task involves identifying the theory and evidence related to specific factors. For example, consider evidence related to the <a href=\"https:\/\/ohiostate.pressbooks.pub\/swk5805coursebook\/chapter\/module-6-key-terms\/\"><strong><em>gateway drug theory<\/em><\/strong><\/a>. If the identified problem is to prevent opioid\/heroin use among adolescents and emerging adults, multiple theories and pieces of evidence will need to be considered for integration. One of these concerns the conflicting evidence surrounding cannabis use as a \u201cgateway\u201d to use of other, \u201charder\u201d substances. Early evidence suggested a correlation between initiating heroin use and prior cannabis use\u2014a very large portion of individuals using heroin had this in their past history (a vulnerability factor). However, subsequent and more sophisticated research approaches have called this gateway conclusion into doubt. First, the vast majority of individuals who have used cannabis never progressed to heroin use. Second, the distinction between \u201cmild\u201d and \u201chard\u201d drugs is arbitrary and subjective. As we have discovered throughout the course so far, any psychoactive substance can be considered potentially addictive\u2014some may have a higher percent of use or faster progression to addiction than others, but placing them on a single, comparative \u201cseriousness\u201d continuum is not grounded in evidence. A third blow to the gateway drug theory is the tremendous diversity in substance use behavior observed across different geographical areas, ethnic and socio-economic groups, social networks, and cohorts over time. In the <span style=\"background-color: #ffffff\">2011<\/span> NSDUH survey, about 2\/3 of participants who initiated illicit substance use during the study year reported marijuana as the first illicit substance used. However, this means that 1\/3 started with something else: almost 25% started with prescription drug abuse instead, 7% started with inhalants, and just under 3% started with hallucinogens. This tremendous variability argues against a gateway drug theory\u2014there are too many openings or access points involved for any one substance to be confidently identified as a gateway drug.<\/p>\r\n<img class=\"aligncenter size-full wp-image-233\" src=\"https:\/\/pressbooks.ulib.csuohio.edu\/bestpracticesinsubstancemisusetreatment\/wp-content\/uploads\/sites\/106\/2020\/09\/type_illicit_drug.png\" alt=\"Type of illicit drug pie chart: 65% cannabis; 25% Rx abuse; 7% inhalants; 3% hallucinogens\" width=\"468\" height=\"377\" \/>\r\n<p class=\"import-Normal\">On the other hand, more recent events and evidence suggest that prescription abuse, particularly nonmedical use of opioid drugs, may represent a gateway to heroin use. Individuals entering treatment for an opioid use disorder (OUD) reported having \u201cprogressed\u201d from prescription opioid use and nonmedical use of opioids (NAS, 2017). This sequence was also, by far, the most common pattern observed among surveyed individuals in the general population who reported heroin use each year in analysis of 2003-2014 National Survey on Drug Use and Health data (NAS, 2017). Heroin, in many communities, is more easily accessed and less expensive since prescribing and dispensing restrictions have been introduced in response to the \u201copioid epidemic\u201d facing many parts of the nation. \u201cA number of studies have yielded evidence strongly supporting the conclusion that the recent prescription opioid epidemic has resulted in a significant increase in domestic heroin use and associated overdose death\u201d (NAS, 2017, p. 207). The gateway theory concerning the relationship between prescription opioid and heroin misuse is bolstered by the fact that these substances have similar psychoactive and pharmacologic effects, including the capacity for <a href=\"https:\/\/ohiostate.pressbooks.pub\/swk5805coursebook\/chapter\/module-6-key-terms\/\"><strong><em>cross-tolerance <\/em><\/strong><\/a>developing (NAS, 2017). Tolerance to a prescription opioid drug confers some degree of tolerance to heroin. Using higher doses of either\/both increases the risk of overdose.<\/p>\r\n<p class=\"import-Normal\">3. <strong>Risk\/protective factors continuum. <\/strong>As with the vulnerability\/resilience continuum, evidence concerning known risk and protective factors is identified and analyzed next. The <a href=\"https:\/\/ohiostate.pressbooks.pub\/swk5805coursebook\/chapter\/module-6-key-terms\/\"><strong><em>risk\/protective continuum<\/em><\/strong><\/a> refers to <em>extrinsic <\/em>factors. In other words, factors residing in current social and environmental contexts that we explored previously (social and physical environment contexts). The risk\/protective factors continuum relates to \u201chere and now\u201d contexts and experiences; past interactions with the social context become a part of the vulnerability and resilience continuum\u2014historical experiences of the environment become part of what is brought to new situations. For example, a history of <a href=\"https:\/\/ohiostate.pressbooks.pub\/swk5805coursebook\/chapter\/module-6-key-terms\/\"><strong><em>adverse childhood events (ACES)<\/em><\/strong><\/a> becomes a vulnerability factor related to substance misuse; currently living in a traumatizing environment is a risk factor. Current risk\/protective factors might include the presence (or absence) of alcohol, tobacco\/vaping, or cannabis advertising in the neighborhood\/community, ease of access to substances of concern, and social norms about substance use\/misuse.<\/p>\r\n<p class=\"import-Normal\"><img class=\"aligncenter wp-image-234\" src=\"https:\/\/pressbooks.ulib.csuohio.edu\/bestpracticesinsubstancemisusetreatment\/wp-content\/uploads\/sites\/106\/2020\/09\/risk_protection.png\" alt=\"2 arrows pointing away from each other, one labeled &quot;risk&quot; and the other, &quot;protection&quot;\" width=\"223\" height=\"107\" \/><\/p>\r\n<p class=\"import-Normal\">4. <strong>Integration<\/strong>. Consider now how the two continua intersect: bringing together the vulnerability\/resilience continuum with the risk\/protection continuum. This is conceptually diagrammed as a 2 x 2 grid specifying the general probability (low, moderate, high) for developing the specified problem under these complex circumstances (see Figure below).<\/p>\r\n\r\n<table style=\"height: 342px\">\r\n<tbody>\r\n<tr class=\"TableGrid-R\" style=\"height: 29px\">\r\n<td class=\"TableGrid-C\" style=\"border: 0pt none windowtext;height: 29px;width: 110.95587921142578px\">\r\n<p class=\"import-NoSpacing\"><\/p>\r\n<\/td>\r\n<td class=\"TableGrid-C\" style=\"border: 0pt none windowtext;height: 29px;width: 97.7573471069336px\">\r\n<p class=\"import-NoSpacing\"><\/p>\r\n<\/td>\r\n<td class=\"TableGrid-C\" style=\"border: 0pt none windowtext;height: 29px;width: 252.3345489501953px\" colspan=\"2\">\r\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>Vulnerability\/Resilience<\/strong><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableGrid-R\" style=\"height: 59px\">\r\n<td class=\"TableGrid-C\" style=\"border: 0pt none windowtext;height: 297px;width: 110.95587921142578px\" rowspan=\"3\">\r\n<p class=\"import-NoSpacing\"><strong>Risk\/Protection<\/strong><\/p>\r\n<\/td>\r\n<td class=\"TableGrid-C\" style=\"border: 0pt none windowtext;height: 59px;width: 97.7573471069336px\">\r\n<p class=\"import-NoSpacing\"><\/p>\r\n<\/td>\r\n<td class=\"TableGrid-C\" style=\"border-width: 0pt 0pt 0.5pt;border-style: none none solid;border-color: windowtext;height: 59px;width: 117.00366973876953px\">\r\n<p class=\"import-Normal\" style=\"text-align: center\"><em>low vulnerability\/<\/em><\/p>\r\n<p class=\"import-Normal\" style=\"text-align: center\"><em>high resilience<\/em><\/p>\r\n<\/td>\r\n<td class=\"TableGrid-C\" style=\"border-width: 0pt 0pt 0.5pt;border-style: none none solid;border-color: windowtext;height: 59px;width: 122.38970184326172px\">\r\n<p class=\"import-Normal\" style=\"text-align: center\"><em>high vulnerability\/<\/em><\/p>\r\n<p class=\"import-Normal\" style=\"text-align: center\"><em>low resilience<\/em><\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableGrid-R\" style=\"height: 119px\">\r\n<td class=\"TableGrid-C\" style=\"border-width: 0pt 0.5pt 0pt 0pt;border-style: none solid none none;border-color: windowtext;height: 119px;width: 97.7573471069336px\">\r\n<p class=\"import-NoSpacing\"><em>low risk\/<\/em><\/p>\r\n<p class=\"import-NoSpacing\"><em>high protection<\/em><\/p>\r\n<\/td>\r\n<td class=\"TableGrid-C\" style=\"background-color: #92d050;border: 0.5pt solid windowtext;height: 119px;width: 115.82720184326172px\">\r\n<p class=\"import-Normal\" style=\"text-align: right\">I<\/p>\r\n<p class=\"import-Normal\" style=\"text-align: center\">low<\/p>\r\n<p class=\"import-Normal\" style=\"text-align: center\">probability<\/p>\r\n<p class=\"import-Normal\" style=\"text-align: center\"><\/p>\r\n<\/td>\r\n<td class=\"TableGrid-C\" style=\"background-color: #ffc000;border: 0.5pt solid windowtext;height: 119px;width: 121.2132339477539px\">\r\n<p class=\"import-Normal\">II<\/p>\r\n<p class=\"import-Normal\" style=\"text-align: center\">moderate<\/p>\r\n<p class=\"import-Normal\" style=\"text-align: center\">probability<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr class=\"TableGrid-R\" style=\"height: 119px\">\r\n<td class=\"TableGrid-C\" style=\"border-width: 0pt 0.5pt 0pt 0pt;border-style: none solid none none;border-color: windowtext;height: 119px;width: 97.7573471069336px\">\r\n<p class=\"import-NoSpacing\"><em>high risk\/<\/em><\/p>\r\n<p class=\"import-NoSpacing\"><em>low protection<\/em><\/p>\r\n<\/td>\r\n<td class=\"TableGrid-C\" style=\"background-color: #ffc000;border: 0.5pt solid windowtext;height: 119px;width: 115.82720184326172px\">\r\n<p class=\"import-Normal\" style=\"text-align: right\">III<\/p>\r\n<p class=\"import-Normal\" style=\"text-align: center\">moderate<\/p>\r\n<p class=\"import-Normal\" style=\"text-align: center\">probability<\/p>\r\n<p class=\"import-Normal\" style=\"text-align: center\"><\/p>\r\n<\/td>\r\n<td class=\"TableGrid-C\" style=\"background-color: #ff0000;border: 0.5pt solid windowtext;height: 119px;width: 121.2132339477539px\">\r\n<p class=\"import-Normal\">IV<\/p>\r\n<p class=\"import-Normal\" style=\"text-align: center\">high<\/p>\r\n<p class=\"import-Normal\" style=\"text-align: center\">probability<\/p>\r\n<\/td>\r\n<\/tr>\r\n<tr style=\"height: 16px\">\r\n<td style=\"height: 16px;width: 110.95587921142578px\"><\/td>\r\n<td style=\"height: 16px;width: 97.7573471069336px\"><\/td>\r\n<td style=\"height: 16px;width: 117.00366973876953px\"><\/td>\r\n<td style=\"height: 16px;width: 122.38970184326172px\"><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<p class=\"import-Normal\">The result is an integration of theory and evidence to inform the development of intervention and policy strategies and logic models. For example, the low probability group (I) needs little attention beyond universal preventive efforts to maintain healthful status\u2014maintaining both resilience and protective factors and minimizing new vulnerability and risk exposure. They are pretty much good to go (green light). On the other hand, the high probability group (IV) warrants a great deal of immediate attention with efforts designed to reduce both vulnerability and risk, as well as promote both resilience and protective factors. This group should stop us in our tracks, getting a great deal of our attention (red light). The two moderate probability groups (II and III) warrant attention in the form of selective or indicated prevention efforts to prevent their shifting into the high probability group (IV). They are the \u201ccaution\u201d group (yellow light). Ideally, group II and group III populations also can be helped to more closely come to resemble the low probability population (group I).<\/p>\r\n<p class=\"import-Normal\">This is where theoretical models and empirical evidence inform both specific interventions (including policy) and planning broader combined intervention strategies, whether the aim is prevention, treatment, or maintenance of gains achieved. A great deal of literature across many disciplines presents detailed and nuanced evidence related to vulnerability, risk, resilience, and protective factors surrounding different addictive behaviors. This framework provides a logical system for organizing the massive literature, only some of which appears in this handbook.<\/p>\r\n<em>*Note that portions of this chapter <\/em><em>were informed by content presented in Begun and Murray (in press), Begun (1993),<\/em><em> and<\/em><em> Begun (<\/em><em>199<\/em><em>9<\/em><em>).<\/em>\r\n\r\n<\/div>","rendered":"<div class=\"__UNKNOWN__\">\n<p class=\"import-Normal\">A wide range of biological, psychological, social and spiritual context theories and models concerning substance use, substance misuse, and substance use disorders can be integrated to inform intervention strategies and future research from a bio-psycho-social-spiritual perspective. A vulnerability, resilience, risk, and protective factors framework is presented here to help conceptualize and integrate multiple, diverse theories and evidence. This integrative framework reflects both a bio-psycho-social-spiritual and social work person-in-environment strengths perspective. Thus, it can inform interventions and policies that help change individuals, their environments, and the interface between individuals and their environments. The framework was derived from E. James Anthony\u2019s early work concerning the etiology of schizophrenia.<\/p>\n<p class=\"import-Normal\">The vulnerability, resilience, risk, and protective factors <em><strong>framework is applied at the group or population level for purposes of informing\/planning intervention strategies<\/strong><\/em> and research based on logic models and existing evidence. The state of evidence and assessment tools, at this time, is not sufficiently well-honed to predict individual outcomes, so the framework is not used to assess or predict what will happen for an individual person or family. Here, the framework\u2019s four steps are outlined.<\/p>\n<p class=\"import-Normal\" style=\"text-indent: 36pt\"><strong>Specify the problem.<\/strong> The more specific the problem definition, the easier the task of identifying and integrating varied theoretical models becomes (Begun, 1999). For example, \u201cpreventing adolescent initiation of alcohol misuse\u201d is reasonably specific, whereas \u201cpreventing substance use disorders\u201d is overly general. Specificity might include specifics of an addictive behavior (e.g., a specific substance, type of technology, or form of gambling) and\/or a target population (e.g., a specified age or developmental phase, racial\/ethnic group, self-defined gender identity, sexual orientation, co-occurring problems, or problem severity level). It is important, as well, to be specific as to the system level being addressed: individuals, family subsystems, family systems, neighborhoods\/communities, institutions, or geographical regions. Specificity about the prevention target hones your aim.<\/p>\n<p class=\"import-Normal\">2. <strong>Define the <\/strong><strong>relevant <\/strong><strong>vulnerability\/resilience continuum.<\/strong> Once a prevention problem is clearly specified, evidence concerning known vulnerability and resilience factors can be located and critically analyzed. The <a href=\"https:\/\/ohiostate.pressbooks.pub\/swk5805coursebook\/chapter\/module-6-key-terms\/\"><strong><em>vulnerability\/resilience continuum<\/em><\/strong><\/a> refers to factors <em>intrinsic<\/em> to individuals (or other system level specified in the first step). In other words, factors that individuals bring with them to any new situation or experience, such as those we studied in previous chapters (biological models and psychological models).<\/p>\n<p class=\"import-Normal\">These include the factors like:<\/p>\n<ul>\n<li class=\"import-Normal\">genetics, neurobiology, and other biological processes;<\/li>\n<li class=\"import-Normal\">temperament and personality characteristics;<\/li>\n<li class=\"import-Normal\">abilities and disabilities;<\/li>\n<li class=\"import-Normal\">co-occurring problems;<\/li>\n<li class=\"import-Normal\">past experiences and learning; and,<\/li>\n<li class=\"import-Normal\">current attitudes, beliefs, knowledge, and behavior patterns.<\/li>\n<\/ul>\n<p class=\"import-Normal\">Some factors reflect individuals\u2019 vulnerability to the specified problem, other factors reflect aspects of their resilience. Together evidence concerning these intrinsic factors help determine where along a vulnerability\/resilience continuum a group of individuals might be situated. For example, a recognized vulnerability\/resilience factor with a great deal of supporting evidence and clear mechanisms by which it happens is the age at substance initiation\u2014the earlier individuals begin using most types of substances, the greater the probability of developing a substance use disorder during their lifetime. Young age of initiation pushes the continuum toward vulnerability; delaying past emerging adulthood pushes the continuum toward resilience.<\/p>\n<p class=\"import-Normal\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-232\" src=\"https:\/\/pressbooks.ulib.csuohio.edu\/bestpracticesinsubstancemisusetreatment\/wp-content\/uploads\/sites\/106\/2020\/09\/vulnerability_resilience.png\" alt=\"2 arrows pointing away from each other, one labeled &quot;vulnerability&quot; and the other, &quot;resilience&quot;\" width=\"205\" height=\"102\" srcset=\"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/vulnerability_resilience.png 421w, https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/vulnerability_resilience-300x150.png 300w, https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/vulnerability_resilience-65x32.png 65w, https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/vulnerability_resilience-225x112.png 225w, https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/vulnerability_resilience-350x175.png 350w\" sizes=\"auto, (max-width: 205px) 100vw, 205px\" \/><\/p>\n<p class=\"import-Normal\">At this point, the task involves identifying the theory and evidence related to specific factors. For example, consider evidence related to the <a href=\"https:\/\/ohiostate.pressbooks.pub\/swk5805coursebook\/chapter\/module-6-key-terms\/\"><strong><em>gateway drug theory<\/em><\/strong><\/a>. If the identified problem is to prevent opioid\/heroin use among adolescents and emerging adults, multiple theories and pieces of evidence will need to be considered for integration. One of these concerns the conflicting evidence surrounding cannabis use as a \u201cgateway\u201d to use of other, \u201charder\u201d substances. Early evidence suggested a correlation between initiating heroin use and prior cannabis use\u2014a very large portion of individuals using heroin had this in their past history (a vulnerability factor). However, subsequent and more sophisticated research approaches have called this gateway conclusion into doubt. First, the vast majority of individuals who have used cannabis never progressed to heroin use. Second, the distinction between \u201cmild\u201d and \u201chard\u201d drugs is arbitrary and subjective. As we have discovered throughout the course so far, any psychoactive substance can be considered potentially addictive\u2014some may have a higher percent of use or faster progression to addiction than others, but placing them on a single, comparative \u201cseriousness\u201d continuum is not grounded in evidence. A third blow to the gateway drug theory is the tremendous diversity in substance use behavior observed across different geographical areas, ethnic and socio-economic groups, social networks, and cohorts over time. In the <span style=\"background-color: #ffffff\">2011<\/span> NSDUH survey, about 2\/3 of participants who initiated illicit substance use during the study year reported marijuana as the first illicit substance used. However, this means that 1\/3 started with something else: almost 25% started with prescription drug abuse instead, 7% started with inhalants, and just under 3% started with hallucinogens. This tremendous variability argues against a gateway drug theory\u2014there are too many openings or access points involved for any one substance to be confidently identified as a gateway drug.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-233\" src=\"https:\/\/pressbooks.ulib.csuohio.edu\/bestpracticesinsubstancemisusetreatment\/wp-content\/uploads\/sites\/106\/2020\/09\/type_illicit_drug.png\" alt=\"Type of illicit drug pie chart: 65% cannabis; 25% Rx abuse; 7% inhalants; 3% hallucinogens\" width=\"468\" height=\"377\" srcset=\"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/type_illicit_drug.png 468w, https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/type_illicit_drug-300x242.png 300w, https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/type_illicit_drug-65x52.png 65w, https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/type_illicit_drug-225x181.png 225w, https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/type_illicit_drug-350x282.png 350w\" sizes=\"auto, (max-width: 468px) 100vw, 468px\" \/><\/p>\n<p class=\"import-Normal\">On the other hand, more recent events and evidence suggest that prescription abuse, particularly nonmedical use of opioid drugs, may represent a gateway to heroin use. Individuals entering treatment for an opioid use disorder (OUD) reported having \u201cprogressed\u201d from prescription opioid use and nonmedical use of opioids (NAS, 2017). This sequence was also, by far, the most common pattern observed among surveyed individuals in the general population who reported heroin use each year in analysis of 2003-2014 National Survey on Drug Use and Health data (NAS, 2017). Heroin, in many communities, is more easily accessed and less expensive since prescribing and dispensing restrictions have been introduced in response to the \u201copioid epidemic\u201d facing many parts of the nation. \u201cA number of studies have yielded evidence strongly supporting the conclusion that the recent prescription opioid epidemic has resulted in a significant increase in domestic heroin use and associated overdose death\u201d (NAS, 2017, p. 207). The gateway theory concerning the relationship between prescription opioid and heroin misuse is bolstered by the fact that these substances have similar psychoactive and pharmacologic effects, including the capacity for <a href=\"https:\/\/ohiostate.pressbooks.pub\/swk5805coursebook\/chapter\/module-6-key-terms\/\"><strong><em>cross-tolerance <\/em><\/strong><\/a>developing (NAS, 2017). Tolerance to a prescription opioid drug confers some degree of tolerance to heroin. Using higher doses of either\/both increases the risk of overdose.<\/p>\n<p class=\"import-Normal\">3. <strong>Risk\/protective factors continuum. <\/strong>As with the vulnerability\/resilience continuum, evidence concerning known risk and protective factors is identified and analyzed next. The <a href=\"https:\/\/ohiostate.pressbooks.pub\/swk5805coursebook\/chapter\/module-6-key-terms\/\"><strong><em>risk\/protective continuum<\/em><\/strong><\/a> refers to <em>extrinsic <\/em>factors. In other words, factors residing in current social and environmental contexts that we explored previously (social and physical environment contexts). The risk\/protective factors continuum relates to \u201chere and now\u201d contexts and experiences; past interactions with the social context become a part of the vulnerability and resilience continuum\u2014historical experiences of the environment become part of what is brought to new situations. For example, a history of <a href=\"https:\/\/ohiostate.pressbooks.pub\/swk5805coursebook\/chapter\/module-6-key-terms\/\"><strong><em>adverse childhood events (ACES)<\/em><\/strong><\/a> becomes a vulnerability factor related to substance misuse; currently living in a traumatizing environment is a risk factor. Current risk\/protective factors might include the presence (or absence) of alcohol, tobacco\/vaping, or cannabis advertising in the neighborhood\/community, ease of access to substances of concern, and social norms about substance use\/misuse.<\/p>\n<p class=\"import-Normal\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-234\" src=\"https:\/\/pressbooks.ulib.csuohio.edu\/bestpracticesinsubstancemisusetreatment\/wp-content\/uploads\/sites\/106\/2020\/09\/risk_protection.png\" alt=\"2 arrows pointing away from each other, one labeled &quot;risk&quot; and the other, &quot;protection&quot;\" width=\"223\" height=\"107\" srcset=\"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/risk_protection.png 595w, https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/risk_protection-300x144.png 300w, https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/risk_protection-65x31.png 65w, https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/risk_protection-225x108.png 225w, https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-content\/uploads\/sites\/106\/2020\/09\/risk_protection-350x168.png 350w\" sizes=\"auto, (max-width: 223px) 100vw, 223px\" \/><\/p>\n<p class=\"import-Normal\">4. <strong>Integration<\/strong>. Consider now how the two continua intersect: bringing together the vulnerability\/resilience continuum with the risk\/protection continuum. This is conceptually diagrammed as a 2 x 2 grid specifying the general probability (low, moderate, high) for developing the specified problem under these complex circumstances (see Figure below).<\/p>\n<table style=\"height: 342px\">\n<tbody>\n<tr class=\"TableGrid-R\" style=\"height: 29px\">\n<td class=\"TableGrid-C\" style=\"border: 0pt none windowtext;height: 29px;width: 110.95587921142578px\">\n<p class=\"import-NoSpacing\">\n<\/td>\n<td class=\"TableGrid-C\" style=\"border: 0pt none windowtext;height: 29px;width: 97.7573471069336px\">\n<p class=\"import-NoSpacing\">\n<\/td>\n<td class=\"TableGrid-C\" style=\"border: 0pt none windowtext;height: 29px;width: 252.3345489501953px\" colspan=\"2\">\n<p class=\"import-Normal\" style=\"text-align: center\"><strong>Vulnerability\/Resilience<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableGrid-R\" style=\"height: 59px\">\n<td class=\"TableGrid-C\" style=\"border: 0pt none windowtext;height: 297px;width: 110.95587921142578px\" rowspan=\"3\">\n<p class=\"import-NoSpacing\"><strong>Risk\/Protection<\/strong><\/p>\n<\/td>\n<td class=\"TableGrid-C\" style=\"border: 0pt none windowtext;height: 59px;width: 97.7573471069336px\">\n<p class=\"import-NoSpacing\">\n<\/td>\n<td class=\"TableGrid-C\" style=\"border-width: 0pt 0pt 0.5pt;border-style: none none solid;border-color: windowtext;height: 59px;width: 117.00366973876953px\">\n<p class=\"import-Normal\" style=\"text-align: center\"><em>low vulnerability\/<\/em><\/p>\n<p class=\"import-Normal\" style=\"text-align: center\"><em>high resilience<\/em><\/p>\n<\/td>\n<td class=\"TableGrid-C\" style=\"border-width: 0pt 0pt 0.5pt;border-style: none none solid;border-color: windowtext;height: 59px;width: 122.38970184326172px\">\n<p class=\"import-Normal\" style=\"text-align: center\"><em>high vulnerability\/<\/em><\/p>\n<p class=\"import-Normal\" style=\"text-align: center\"><em>low resilience<\/em><\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableGrid-R\" style=\"height: 119px\">\n<td class=\"TableGrid-C\" style=\"border-width: 0pt 0.5pt 0pt 0pt;border-style: none solid none none;border-color: windowtext;height: 119px;width: 97.7573471069336px\">\n<p class=\"import-NoSpacing\"><em>low risk\/<\/em><\/p>\n<p class=\"import-NoSpacing\"><em>high protection<\/em><\/p>\n<\/td>\n<td class=\"TableGrid-C\" style=\"background-color: #92d050;border: 0.5pt solid windowtext;height: 119px;width: 115.82720184326172px\">\n<p class=\"import-Normal\" style=\"text-align: right\">I<\/p>\n<p class=\"import-Normal\" style=\"text-align: center\">low<\/p>\n<p class=\"import-Normal\" style=\"text-align: center\">probability<\/p>\n<p class=\"import-Normal\" style=\"text-align: center\">\n<\/td>\n<td class=\"TableGrid-C\" style=\"background-color: #ffc000;border: 0.5pt solid windowtext;height: 119px;width: 121.2132339477539px\">\n<p class=\"import-Normal\">II<\/p>\n<p class=\"import-Normal\" style=\"text-align: center\">moderate<\/p>\n<p class=\"import-Normal\" style=\"text-align: center\">probability<\/p>\n<\/td>\n<\/tr>\n<tr class=\"TableGrid-R\" style=\"height: 119px\">\n<td class=\"TableGrid-C\" style=\"border-width: 0pt 0.5pt 0pt 0pt;border-style: none solid none none;border-color: windowtext;height: 119px;width: 97.7573471069336px\">\n<p class=\"import-NoSpacing\"><em>high risk\/<\/em><\/p>\n<p class=\"import-NoSpacing\"><em>low protection<\/em><\/p>\n<\/td>\n<td class=\"TableGrid-C\" style=\"background-color: #ffc000;border: 0.5pt solid windowtext;height: 119px;width: 115.82720184326172px\">\n<p class=\"import-Normal\" style=\"text-align: right\">III<\/p>\n<p class=\"import-Normal\" style=\"text-align: center\">moderate<\/p>\n<p class=\"import-Normal\" style=\"text-align: center\">probability<\/p>\n<p class=\"import-Normal\" style=\"text-align: center\">\n<\/td>\n<td class=\"TableGrid-C\" style=\"background-color: #ff0000;border: 0.5pt solid windowtext;height: 119px;width: 121.2132339477539px\">\n<p class=\"import-Normal\">IV<\/p>\n<p class=\"import-Normal\" style=\"text-align: center\">high<\/p>\n<p class=\"import-Normal\" style=\"text-align: center\">probability<\/p>\n<\/td>\n<\/tr>\n<tr style=\"height: 16px\">\n<td style=\"height: 16px;width: 110.95587921142578px\"><\/td>\n<td style=\"height: 16px;width: 97.7573471069336px\"><\/td>\n<td style=\"height: 16px;width: 117.00366973876953px\"><\/td>\n<td style=\"height: 16px;width: 122.38970184326172px\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"import-Normal\">The result is an integration of theory and evidence to inform the development of intervention and policy strategies and logic models. For example, the low probability group (I) needs little attention beyond universal preventive efforts to maintain healthful status\u2014maintaining both resilience and protective factors and minimizing new vulnerability and risk exposure. They are pretty much good to go (green light). On the other hand, the high probability group (IV) warrants a great deal of immediate attention with efforts designed to reduce both vulnerability and risk, as well as promote both resilience and protective factors. This group should stop us in our tracks, getting a great deal of our attention (red light). The two moderate probability groups (II and III) warrant attention in the form of selective or indicated prevention efforts to prevent their shifting into the high probability group (IV). They are the \u201ccaution\u201d group (yellow light). Ideally, group II and group III populations also can be helped to more closely come to resemble the low probability population (group I).<\/p>\n<p class=\"import-Normal\">This is where theoretical models and empirical evidence inform both specific interventions (including policy) and planning broader combined intervention strategies, whether the aim is prevention, treatment, or maintenance of gains achieved. A great deal of literature across many disciplines presents detailed and nuanced evidence related to vulnerability, risk, resilience, and protective factors surrounding different addictive behaviors. This framework provides a logical system for organizing the massive literature, only some of which appears in this handbook.<\/p>\n<p><em>*Note that portions of this chapter <\/em><em>were informed by content presented in Begun and Murray (in press), Begun (1993),<\/em><em> and<\/em><em> Begun (<\/em><em>199<\/em><em>9<\/em><em>).<\/em><\/p>\n<\/div>\n","protected":false},"author":7,"menu_order":1,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[48],"contributor":[],"license":[],"class_list":["post-235","chapter","type-chapter","status-publish","hentry","chapter-type-numberless"],"part":230,"_links":{"self":[{"href":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-json\/pressbooks\/v2\/chapters\/235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-json\/wp\/v2\/users\/7"}],"version-history":[{"count":12,"href":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-json\/pressbooks\/v2\/chapters\/235\/revisions"}],"predecessor-version":[{"id":1016,"href":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-json\/pressbooks\/v2\/chapters\/235\/revisions\/1016"}],"part":[{"href":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-json\/pressbooks\/v2\/parts\/230"}],"metadata":[{"href":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-json\/pressbooks\/v2\/chapters\/235\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-json\/wp\/v2\/media?parent=235"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-json\/pressbooks\/v2\/chapter-type?post=235"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-json\/wp\/v2\/contributor?post=235"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.ulib.csuohio.edu\/substancemisusepart1\/wp-json\/wp\/v2\/license?post=235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}