Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

Using safe and ethical technology to prevent and respond to sexual and interpersonal violence during adolescence and young adulthood: Identifying evidence, best practices, and pathways forward—A global scoping review protocol

  • Mahboubeh Shirzad ,

    Roles Conceptualization, Formal analysis, Funding acquisition, Investigation, Methodology, Project administration, Supervision, Visualization, Writing – original draft, Writing – review & editing

    mshirza1@jh.edu

    Affiliation Department of Health, Behavior & Society, Bloomberg School of Public Health, Johns Hopkins University, Baltimore, Maryland, United States of America

  • Astha Ramaiya,

    Roles Writing – review & editing

    Affiliation Department of Health, Behavior & Society, Bloomberg School of Public Health, Johns Hopkins University, Baltimore, Maryland, United States of America

  • Katie Edwards,

    Roles Writing – review & editing

    Affiliation School of Social Work, University of Michigan, Ann Arbor, Michigan, United States of America

  • Meng Yuan,

    Roles Writing – review & editing

    Affiliation Department of Health, Behavior & Society, Bloomberg School of Public Health, Johns Hopkins University, Baltimore, Maryland, United States of America

  • Surabhi Bhanot,

    Roles Writing – review & editing

    Affiliation Department of International Health, Bloomberg School of Public Health, Johns Hopkins University, Baltimore, Maryland, United States of America

  • Michelle R. Kaufman

    Roles Supervision, Writing – review & editing

    Affiliations Department of Health, Behavior & Society, Bloomberg School of Public Health, Johns Hopkins University, Baltimore, Maryland, United States of America, Department of International Health, Bloomberg School of Public Health, Johns Hopkins University, Baltimore, Maryland, United States of America

Abstract

Background

Adolescents and young adults face elevated risks of sexual and interpersonal violence (SIV) compared to adults. Technology has been used to help mitigate this issue by mapping incidents, supporting victims, and promoting behavior change to prevent re-occurrence. However, there is a risk that technology could facilitate abuse. Ensuring technology use is safe and ethical in the context of SIV is critical.

Objective

This protocol provides a roadmap for a scoping review to synthesize global literature on how technology has been used to address SIV among adolescents and young adults. It aims to identify evidence and strategies for enhancing the safety, privacy, and effectiveness of technologies to prevent and respond to SIV. A scoping review was chosen because the evidence in this field is still emerging and fragmented. This approach allows us to map the breadth of existing research, highlight gaps, and make recommendations on the pathways forward.

Materials and methods

A search strategy was developed to identify English-language studies published since 2008, the year of the emergence of smartphones in the United States, in databases such as PubMed, EMBASE, Web of Science, and Scopus. We will include qualitative, quantitative, and mixed-methods studies that use technology (e.g., mobile apps, websites) to address SIV among youth. This scoping review protocol was prepared following the Joanna Briggs Institute guidelines and Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P), which will be adhered to during content analysis review process. Covidence, a web-based platform for systematic review management, will be used to manage screening and data extraction. Two independent reviewers will screen and extract data, with disagreements resolved by a third reviewer.

Discussion

The findings of the proposed scoping review have the potential to contribute to improving technology safety, data privacy, and ethical considerations in the context of reporting and tracking SIV, alongside informing future metrics, policies, guidelines, and platform designs, contributing to the creation of more secure and effective tools for SIV reporting and tracking.

Scoping review registration

This protocol has been registered in the Open Science Framework (OSF): https://doi.org/10.17605/OSF.IO/WUNT9

Background

Gender-based violence (GBV) refers to any harmful act or threat targeting an individual or group due to their actual or perceived sex, gender identity, gender expression, sexual orientation, or sex characteristics [1]. One major category of GBV is sexual and interpersonal violence (SIV), which includes a range of behaviors such as sexual assault (e.g., non-consensual sexual contact), dating violence (e.g., controlling or abusive behavior in romantic relationships), and intimate partner violence (e.g., physical or emotional abuse by a current or former partner) [2,3]. Globally, SIV affect one in three women and girls [4], and also impacts men and boys, often in less visible ways [5,6]. For instance, in India, a study revealed that 52.4% of men reported experiencing SIV in their lifetime, with contributing factors such as lower family income, limited education, and alcohol use by perpetrators [7]. The prevalence is even higher among gender-non-binary individuals who do not place themselves in the male/female categories and may include transgender, non-conforming, third gender, and other non-cisgender individuals [810]. These patterns reveal the broad and complex nature of SIV affecting diverse groups.Across population segments, adolescents and youth face unique risks of SIV. In comparison to adults, adolescents are 3–4 times more likely to experience sexual violence [1013], and approximately 10–20% adolescents become victims of sexual or physical dating violence [14]. Within the United States, 16–19 year old women are 4 times more likely to be sexually assaulted than women in other age groups [15]. Gender diverse adolescents and young adults experience violent victimization at rates four times higher than that of cisgender young people [11,12], driven by stigma, discrimination, social isolation, and absence of protective policies [13,14]. Sexual and dating violence among youth is particularly rampant on college campuses and in peer settings, with as many as one in five women and one in ten men experiencing on-campus sexual violence at least once in their academic journeys [1618].

The impact of technology on mitigating SIV is promising. Through the use of mobile phone applications and online platforms, crucial interventions and programs have been implemented, including mapping incidents of violence, providing information and support services to victims, conducting safety assessments, facilitating relationship support interventions, and promoting behavior change programs for perpetrators [15,19,20]. However, technology can sometimes serve as a conduit for perpetrating acts of violence. A study by the Australian Institute of Criminology indicates that approximately 75% of individuals using dating applications have encountered forms of sexual violence, such as harassment and stalking [21]. Adolescents and young adults are easy targets of technology facilitated abuse (TFA), both in partnered and non-partnered contexts. The prevalence of different forms of technology-assisted sexual assault (TASA), including image-based sexual abuse, non-consensual sexting, self-produced child sexual-abuse images, online grooming (manipulating minors for sexual purposes), revenge pornography (non-consensual sharing of intimate images), and sextortion (threats to release sexual content for more material), is as high as 15.6% among the adolescent and young adult population in the United States [17,22]. In fact, one study found that youth aged 13–17 were the age group at highest risk of being victimized by technology-assisted abuse, with most perpetrators being older than this group [17].

Safety concerns may also come up in the use of technology specifically created for addressing SIV, such as personal data misuse, breaches of personal information, and increased exposure to harm if discovered by the abusive partner [23]. Survivors may face tracking, unauthorized data sharing, or retaliation if technology is misused or insufficiently protected [24]. Ethical concerns in the use of technology are particularly relevant for young users, who may not fully understand the implications of sharing sensitive personal information or may not hold complete agency in technology use [18,25]. Developmentally inappropriate and unverified content on SIV circulating on digital platforms may further make adolescents susceptible to feelings of distress, re-traumatization, and developing incorrect perceptions of consent, victim-blaming, and healthy relationships [3,18]. Addressing these issues requires robust security, age-appropriate consent mechanisms for data collection and sharing and survivor-centered design, such as anonymized reporting and trauma-informed interfaces, to ensure protection and equitable access to digital support tools [15,26]. Hence, there is a pressing need for greater caution and deliberation in utilizing technology in safe ways to address SIV [27].

Technology-based approaches to SIV typically fall into two categories: prevention and response. Prevention efforts aim to stop violence before it occurs through strategies like public education, awareness campaigns, or behavior change tools [28]. Response strategies focus on supporting individuals after violence has occurred, including reporting systems, crisis services, and access to medical, legal, psychosocial, and recovery-oriented support [29,30]. This review considers both types of interventions to understand the full spectrum of technology’s role in addressing SIV.

Ethical considerations in using technology to address SIV apply to both developers and users. Developers must ensure privacy, transparency, consent, and data protection in the design of digital tools [31,32]. Users, particularly adolescents and young adults, must be informed of their data rights and able to provide meaningful consent [31,32]. These factors are especially critical given the sensitivity of SIV and the potential for technology to both help and harm.

To optimize the safety and effectiveness of these technologies, it is essential to understand how they have supported effective prevention, response, tracking, reporting, and service delivery in various settings [33,34]. Moreover, it is important to assess whether any ethical issues have been reported during the use of such technologies, given the sensitivity of SIV. For example, some platforms have lacked sufficient anonymization or security, resulting in the unintentional disclosure of survivor identities [15]. Prioritizing robust safety and privacy measures is critical to safeguarding individuals and preventing further harm [26].

There is insufficient systematically synthesized evidence in the area of safety, privacy, and ethics for technology that seeks to address SIV, resulting in a significant knowledge gap that remains inadequately explored despite its importance [35,36]. Although a few systematic and scoping reviews have been published in recent years on the use of e-health and various technologies in addressing sexual assault, most have focused on aspects such as effectiveness, acceptability, or user experience [21,3739]. However, no studies have systematically synthesized evidence on the safety, privacy, or ethical concerns of using technology in addressing these sensitive topics [15]. This oversight is particularly concerning given the increasing prevalence of technology-facilitated abuse, and the unintended consequences or risks associated with using technology to address SIV, posing unique challenges to survivors’ safety and privacy [40] Our study fills this gap by mapping how these safety and ethical elements are integrated into technology-based interventions targeting SIV among adolescents and young adults. Given the heterogeneous, still-emerging evidence on technology-based SIV interventions, a scoping review is an ideal method [41] to map global experiences and examine how safety and privacy issues have been considered for addressing SIV. This approach allows us to systematically explore existing literature, identify gaps in knowledge, and outline areas where further research is needed [41]. By synthesizing these insights, the review will provide a comprehensive overview of global knowledge to date and offer valuable guidance for future studies to address these critical issues effectively.

Study objectives

This scoping review protocol outlines the process for synthesizing literature, evidence, and best practices on using safe and ethical technology to address SIV. The primary objective is to examine whether safety and privacy considerations are integrated into technology for SIV prevention (e.g., awareness campaigns, educational programs) and response (e.g., survivor support services, forensic care, reporting systems). The secondary objectives are to explore how these concerns are addressed in practice, identify the types of technologies being used, assess which populations they serve, and highlight implementation challenges and opportunities to guide future research and policy.

Materials and methods

This study will follow the guidelines for conducting scoping reviews outlined by the Joanna Briggs Institute (JBI) and in the PRISMA-P (Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols) checklist (S1 Table) to ensure a structured approach, transparency, methodological rigor, and comprehensive reporting, increasing the reproducibility and reliability of research findings [4244]. A scoping review was chosen because the existing literature on technology-based prevention and responses to SIV among youth is highly diverse in design, scope, and quality. This approach allows for a comprehensive overview of the available evidence and identification of key concepts, gaps, and areas for future research, making it well suited to an emerging and interdisciplinary field.

Review questions

To explore pertinent studies and evidence, we will address the following research questions:

  1. I. How has technology (e.g., mobile apps, websites, or software) been utilized to respond to and prevent SIV?
  2. II. To what extent has technology been effective in facilitating incident reporting, enhancing survivor safety, and improving access to support services?
  3. III. What ethical and safety considerations are associated with the use of technology to address SIV, including privacy, traceability, consent requirements, data storage, and data protection?
  4. IV. How have these ethical and safety concerns been addressed in the use of technology for SIV prevention and response?

Inclusion criteria

To clearly define the inclusion criteria for the proposed scoping review, we followed the Participant, Concept, Context (PCC) framework outlined in the JBI guidelines.

Participants.

We will include published research studies focusing on adolescents and young adults, ages 10–24 of all genders, a pivotal age range when SIV rates are at their highest [39].

Concept.

This review will include studies examining the use of technology—such as mobile applications, websites, and digital platforms—designed for SIV prevention and response. Prevention focuses on strategies, interventions, or programs aimed at stopping SIV before it occurs, while response addresses actions taken after SIV has occurred. Eligible studies may include evaluations of prevention programs, technology-assisted interventions, support and response mechanisms, policy analyses, impact assessments, qualitative research, cross-cultural studies, or education initiatives related to SIV. Given that some technology-based interventions address both the mitigation of SIV’s effects and its prevention through education and awareness, this review aims to explore the full spectrum of technology’s role in addressing SIV, including preventive measures, response strategies, and efforts to reduce the impact of violence.

Context.

This review will take a global view, including studies from all countries and regions. Eligible studies must have been published in English and must cover the period from 2008 to the present, reflecting the rapid evolution of digital technologies following the launch of the first smartphones. This timeframe captures the rise of mobile and internet-based tools that have transformed how SIV is addressed. The review will consider all study designs, including qualitative, quantitative, and mixed-methods studies.

Exclusion criteria

We will exclude studies that: (1) are not published in English, (2) do not focus on adolescents or young adults aged 10–24, (3) do not involve a technology-based intervention for SIV prevention or response, or (4) are systematic reviews, scoping reviews, narrative reviews, commentaries, short communications, proposals, theses, dissertations, posters, books, or protocols.

Search strategy and information sources

An experienced librarian assisted in developing a comprehensive search strategy for this review (S2 Table). The strategy was designed to ensure an efficient and thorough collection of relevant literature across multiple databases. Advanced search techniques and database-specific tools were employed to capture a broad range of high-quality, credible studies.

The search, conducted in January 2025, incorporated a wide array of keywords related to SIV, such as “intimate partner violence,” “gender-based violence,” “interpersonal violence,” “sexual abuse,” “sexual assault,” “sexual harassment,” and “femicide.” Technology-related terms included “mobile app,” “mobile applications,” “smartphone apps,” “portable software application,” “eHealth,” “digital health,” “telemedicine,” and “technology-facilitated abuse.” The full list of search terms and database-specific queries is provided in S2 Table.

To ensure the inclusivity of the search, databases like PubMed/MEDLINE, EMBASE, Scopus, and Web of Science were used. In addition, relevant gray literature sources, including UN Women, United States Agency for International Development (USAID), and Open Archives Initiative (OAIster), were included. These sources can provide valuable reports, policy briefs, and other materials that may not be published in peer-reviewed journals. This multifaceted search strategy aimed to gather diverse and high-quality resources, drawing from both published peer-reviewed literature and grey literature.

Evidence screening and selection

After completing the database searches, all references will be imported into Covidence, a bibliographic management platform [45] to streamline the review process and enhance both the rigor and reliability of the analysis. Duplicate studies will be removed, and two independent reviewers (MS and SB) will screen the remaining studies by title and abstract, excluding those that do not meet the inclusion criteria. Studies meeting the criteria will advance to the full-text review stage, where they will undergo a thorough examination. During this stage, the two reviewers (MS and SB) will assess the full text of each study based on the study objectives and inclusion criteria individually. Interrater reliability will be assessed and discussed if disagreements arise between the reviewers and will be resolved through discussion or with a third reviewer (MRK). Any studies that do not align with the objectives or research questions will be excluded. The review team will also pilot this process to ensure consistency in the study selection approach. We will document the reasons for excluding sources of evidence and present them in a PRISMA-ScR flow diagram. Consistent with JBI guidance for scoping reviews, we will not conduct a critical appraisal, assess methodological limitations, or evaluate the risk of bias, as the purpose of a scoping review is to provide a broad overview of existing literature rather than evaluate the quality of individual studies [43].

Data extraction

We will extract key information and data from the selected sources of evidence based on our study aims and research questions. We developed a standardized data extraction form for this review using the JBI format to minimize bias [46] (S3 Table). The form will undergo a piloting stage, during which two reviewers (MS and SB) will test it on at least three studies to ensure accuracy, completeness, and consistency.

Extracted data will include study identification details (title, publication date, authors, location, and country), study characteristics (type and design), population characteristics (e.g., age, gender identity, sexual orientation), data collection methods (e.g., surveys, interviews), data analysis methods, the type of technology used (e.g., mobile apps, websites, software), type of violence addressed (e.g., sexual assault, dating violence), outcomes reported and type of data collected (e.g., personally identifiable information). We will also extract information on ethical and safety considerations (e.g., privacy, traceability, consent, data storage, and protection), facilitators (e.g., features or conditions that enabled effective implementation, such as usability, institutional support, or integration with services), and challenges (e.g., technical barriers, low user engagement). Summaries will emphasize limitations and recommendations for future research, policy, and practice.

Data analysis and presentation of results

We will use basic descriptive analysis both qualitatively and quantitatively. For qualitative data, we will use reflexive content analysis to identify patterns and develop key themes across studies [47]. This method allows for flexibility in interpreting diverse data and is suitable for scoping reviews that seek to map complex topics [47,48]. For quantitative data, we will summarize frequencies and proportions and use cross-tabulations to identify patterns across study characteristics (e.g., by population group, intervention type, or technology platform). Reflexivity will be integrated throughout the process by encouraging the team to document interpretations and analytical decisions using memos, which helps to ensure transparency and minimize bias. These reflective notes will guide discussions during coding and theme refinement, supporting consistent and credible synthesis [49]. Coding and synthesis will be conducted collaboratively by two reviewers (MS and SB), who will also reflect on their positionality, including their disciplinary background and relationship to the topic. The findings will be presented as a data map, using either tables, charts, or diagrams, or in a descriptive format that aligns with the review’s objectives and scope.

Deviations from the protocol

It is common for scoping reviews to occasionally deviate from their protocols [50]. If this occurs, we will document any deviations in the final report of the scoping review, along with an explanation for why these changes were made.

Status of the study & expected timeline

We confirm that our study is ongoing, and data collection is not yet complete as we submit this protocol. Our search strategy is finalized, and the database search is complete. We expect to finish screening and data extraction by April 2025, with final results available in July 2025.

Statements of ethical approval

This study is not human subjects research, as it utilizes only publicly available published papers.

Discussion

This scoping review protocol outlines the process for examining existing literature, evidence, and best practices on the use of safe and ethical technology in addressing SIV. It will investigate whether safety and privacy issues have been considered in technological approaches for SIV prevention and response, and how these concerns have been addressed. The findings will guide the development of tools tailored to the needs of diverse populations, offering actionable insights to inform policies, guidelines, and metrics for the ethical use of technology in SIV prevention and intervention. Recommendations will emphasize data safety, privacy, and usability, and promote technology-driven solutions that are inclusive of youth with diverse identities and experiences, and effective in both preventing SIV and supporting recovery. This includes addressing user safety and privacy concerns, enhancing access to digital tools, and ensuring that technological interventions not only provide support to survivors but also help prevent future occurrences of violence.

Additionally, the study results can help us to propose strategies to engage city, state, and national governments in improving SIV reporting protocols through education and advocacy. The review aims to support technology developers, researchers, and stakeholders in advancing digital innovations while identifying gaps in current research and implementations. By synthesizing global lessons, this review has the potential to drive more equitable, secure, and effective applications of technology in addressing SIV and supporting survivors.

Dissemination

To ensure the findings reach relevant audiences, we plan to disseminate the results through publication in a peer-reviewed journal and presentations at academic and public health conferences. Additionally, we will share tailored policy briefs with practitioners, technology developers, and national and local government agencies involved in violence prevention. We also plan to post a summary of findings on open-access platforms, practitioner networks, and social media channels (e.g., Twitter, LinkedIn) to promote digital safety and adolescent well-being.

Limitations

Given the comprehensive nature of these databases, the majority of relevant literature is expected to be captured, making these four databases the primary sources of data. Although relevant grey literature sources were also included, the search may still miss studies not indexed in these selected platforms, which could result in the exclusion of valuable but less visible evidence and introduce some publication or indexing bias. Moreover, only studies published in English will be considered, which may result in excluding other relevant research in other languages and introduce a potential language bias. Additionally, the expected heterogeneity in study designs, populations, technologies used, and outcomes measured may pose challenges for synthesis and may limit the comparability and generalizability of findings. Our search strategy may have missed relevant grey literature from key organizations such as ECPAT and the WeProtect Global Alliance, as the search was finalized prior to protocol submission.

Conclusions

This scoping review protocol outlines a framework for exploring the global use of technology in addressing SIV. By analyzing the effectiveness, challenges, and ethical considerations of digital tools, it seeks to identify best practices and highlight critical gaps in existing literature. The findings aim to inform the development of evidence-based policies, guidelines, and technology designs for the U.S. context that prioritize safety, privacy, and accessibility, ultimately enhancing support systems and interventions for SIV prevention and response.

Acknowledgments

We thank Donna Hesson, MLS, at the Welch Medical Library, Johns Hopkins University, for her support in developing the search strategy for this study.

References

  1. 1. White House Releases National Plan to End Gender–Based Violence | Office of Juvenile Justice and Delinquency Prevention. [cited November 17, 2024]. Available from: https://ojjdp.ojp.gov/news/juvjust/white-house-releases-national-plan-end-gender-based-violence
  2. 2. ELRHA. Inspiring change: Using digital tech to address gender-based violence (GBV) in humanitarian settings. ReliefWeb; March 8, 2024 [cited March 19, 2025. ]. Available from: https://reliefweb.int/report/world/inspiring-change-using-digital-tech-address-gender-based-violence-gbv-humanitarian-settings
  3. 3. Olsen EO, Vivolo-Kantor A, Kann L. Physical and Sexual Teen Dating Violence Victimization and Sexual Identity Among U.S. High School Students, 2015. J Interpers Violence. 2020;35(17–18):3581–600. pmid:29294763
  4. 4. Gender-Based Violence (Violence Against Women and Girls). [cited November 17, 2024]. Available from: https://www.worldbank.org/en/topic/socialsustainability/brief/violence-against-women-and-girls
  5. 5. A Hidden Reality: Data & Reporting on Sexual Violence Against Men & Boys - InterAction. [cited December 17, 2024]. Available from: https://www.interaction.org/blog/a-hidden-reality-data-reporting-on-sexual-violence-against-men-boys/?utm_source=chatgpt.com
  6. 6. Scott-Storey K, O’Donnell S, Ford-Gilboe M, Varcoe C, Wathen N, Malcolm J, et al. What About the Men? A Critical Review of Men’s Experiences of Intimate Partner Violence. Trauma Violence Abuse. 2023;24(2):858–72. pmid:35094633
  7. 7. Malik JS, Nadda A. A Cross-sectional Study of Gender-Based Violence against Men in the Rural Area of Haryana, India. Indian J Community Med. 2019;44(1):35–8. pmid:30983711
  8. 8. Hwahng S, Kaufman M. Global LGBTQ Health: Research, Policy, Practice, and Pathways. 2024 [cited April 22, 2024. ]. Available from: https://library.oapen.org/handle/20.500.12657/87612
  9. 9. Müller A, Daskilewicz K, Kabwe ML, Mmolai-Chalmers A, Morroni C, Muparamoto N, et al. Experience of and factors associated with violence against sexual and gender minorities in nine African countries: a cross-sectional study. BMC Public Health. 2021;21(1):357. pmid:33588818
  10. 10. Wirtz AL, Poteat TC, Malik M, Glass N. Gender-Based Violence Against Transgender People in the United States: A Call for Research and Programming. Trauma Violence Abuse. 2020;21(2):227–41. pmid:29439615
  11. 11. Flores AR, Langton L, Meyer IH, Romero AP. Victimization rates and traits of sexual and gender minorities in the United States: Results from the National Crime Victimization Survey, 2017. Sci Adv. 2020;6(40):eaba6910. pmid:33008905
  12. 12. Trans People Four Times as Likely to Face Violent Crime as Cis. [cited December 15, 2024]. Available from: https://www.advocate.com/crime/2021/3/23/trans-people-four-times-likely-face-violent-crime-cis
  13. 13. Rosenwohl-Mack A, Tamar-Mattis S, Baratz AB, Dalke KB, Ittelson A, Zieselman K, et al. A national study on the physical and mental health of intersex adults in the U.S. PLoS One. 2020;15(10):e0240088. pmid:33035248
  14. 14. Arayasirikul S, Turner C, Trujillo D, Sicro SL, Scheer S, McFarland W, et al. A global cautionary tale: discrimination and violence against trans women worsen despite investments in public resources and improvements in health insurance access and utilization of health care. Int J Equity Health. 2022;21(1):32. pmid:35241094
  15. 15. Jewkes R, Dartnall E. More research is needed on digital technologies in violence against women. Lancet Public Health. 2019;4(6):e270–1. pmid:31155215
  16. 16. Ferragut M, Ortiz-Tallo M, Blanca MJ. Prevalence of Child Sexual Abuse in Spain: A Representative Sample Study. J Interpers Violence. 2022;37(21–22):NP19358–77. pmid:34547951
  17. 17. Finkelhor D, Turner H, Colburn D. Prevalence of Online Sexual Offenses Against Children in the US. JAMA Netw Open. 2022;5(10):e2234471. pmid:36239942
  18. 18. The Technology Safety and Privacy Toolkit – Tech Safety Canada. [cited February 21, 2025]. Available from: https://techsafety.ca/resources/toolkits/the-technology-safety-and-privacy-toolkit?utm_source=chatgpt.com.
  19. 19. Tackling gender-based violence with technology - Case studies of mobile and internet technology interventions in developing contexts | GenderIT.org. [cited December 15, 2024]. Available from: https://www.genderit.org/resources/tackling-gender-based-violence-technology-case-studies-mobile-and-internet-technology
  20. 20. Inspiring change: Using digital tech to address gender-based violence (GBV) in humanitarian settings - World | ReliefWeb. [cited December 15, 2024]. Available from: https://reliefweb.int/report/world/inspiring-change-using-digital-tech-address-gender-based-violence-gbv-humanitarian-settings
  21. 21. New research shows prolific use of dating apps to facilitate sexual violence | Australian Institute of Criminology. [cited January 24, 2025]. Available from: https://www.aic.gov.au/media-centre/news/new-research-shows-prolific-use-dating-apps-facilitate-sexual-violence?utm_source=chatgpt.com
  22. 22. Ferragut M, Ortiz-Tallo M, Blanca MJ. Prevalence of Child Sexual Abuse in Spain: A Representative Sample Study. J Interpers Violence. 2022;37(21–22):NP19358–77. pmid:34547951
  23. 23. The Technology Safety and Privacy Toolkit – Tech Safety Canada. [cited December 19, 2024]. Available from: https://techsafety.ca/resources/toolkits/the-technology-safety-and-privacy-toolkit?utm_source=chatgpt.com
  24. 24. Technology-Facilitated Gender-Based Violence: A Growing Threat. [cited December 19, 2024]. Available from: https://www.unfpa.org/TFGBV?utm_source=chatgpt.com
  25. 25. Technology-Facilitated Gender-Based Violence: A Growing Threat. [cited February 21, 2025]. Available from: https://www.unfpa.org/TFGBV?utm_source=chatgpt.com
  26. 26. Ceia V, Nothwehr B, Wagner L. Gender and Technology: A rights-based and intersectional analysis of key trends. Published online 2021 [cited December 9, 2024]. Available from: https://oxfamilibrary.openrepository.com/handle/10546/621189
  27. 27. Six ways tech can help end gender-based violence | UNICEF East Asia and Pacific. [cited November 17, 2024]. Available from: https://www.unicef.org/eap/blog/six-ways-tech-can-help-end-gender-based-violence
  28. 28. Mercy JA, Hillis SD, Butchart A, Bellis MA, Ward CL, Fang X, et al. Interpersonal Violence: Global Impact and Paths to Prevention. In: Mock CN, Nugent R, Kobusingye O, Smith KR, editors. Disease Control Priorities: Injury Prevention and Environmental Health, Vol 7. 3rd ed. The World Bank; 2017. p. 71–96.
  29. 29. International Rescue Committee. Violence prevention and response at the International Rescue Committee. [cited April 8, 2025]. Available from: https://www.rescue.org/sites/default/files/document/1077/ircviolencepreventionandresponseinfo0317.pdf
  30. 30. Potter SJ, Moschella EA, Smith D, Draper N. Exploring the Usage of a Violence Prevention and Response App Among Community College Students. Health Educ Behav. 2020;47(1_suppl):44S-53S. pmid:32452252
  31. 31. Richards D, Vythilingam R, Formosa P. A principlist-based study of the ethical design and acceptability of artificial social agents. Int J Human Comput Stud. 2023;172:102980.
  32. 32. Jubero M, Krasnor E, Springer E, Katherine Baird S. Ensuring Rights and Choices for All since 1969 Guidance on the Safe and Ethical Use of Technology to Address Gender-Based Violence and Harmful Practices: Implementation Summary Creating a Pathway along Which Tech, Innovation and GBV/HP Practitioners Can Meet; 2023 [cited March 19, 2025]. Available from: https://www.unfpa.org/publications/implementation-summary-safe-ethical-use-technology-gbv-harmful-practices
  33. 33. Draughon Moret J, Todd A, Rose L, Pollitt E, Anderson J. Mobile Phone Apps for Intimate Partner and Sexual Violence Prevention and Response: Systematic Search on App Stores. JMIR Form Res. 2022;6(2):e28959. pmid:35133285
  34. 34. Marcolino MS, Oliveira JAQ, D’Agostino M, Ribeiro AL, Alkmim MBM, Novillo-Ortiz D. The Impact of mHealth Interventions: Systematic Review of Systematic Reviews. JMIR Mhealth Uhealth. 2018;6(1):e23. pmid:29343463
  35. 35. Draughon Moret J, Todd A, Rose L, Pollitt E, Anderson J. Mobile Phone Apps for Intimate Partner and Sexual Violence Prevention and Response: Systematic Search on App Stores. JMIR Form Res. 2022;6(2):e28959. pmid:35133285
  36. 36. Marcolino MS, Oliveira JAQ, D’Agostino M, Ribeiro AL, Alkmim MBM, Novillo-Ortiz D. The Impact of mHealth Interventions: Systematic Review of Systematic Reviews. JMIR Mhealth Uhealth. 2018;6(1):e23. pmid:29343463
  37. 37. El Morr C, Layal M. Effectiveness of ICT-based intimate partner violence interventions: a systematic review. BMC Public Health. 2020;20(1):1372. pmid:32894115
  38. 38. Doria N, Ausman C, Wilson S, Consalvo A, Sinno J, Boulos L, et al. Women’s experiences of safety apps for sexualized violence: a narrative scoping review. BMC Public Health. 2021;21(1):2330. pmid:34969403
  39. 39. Fraley HE, Chechel L, Varthala B. Mobile Applications Designed for Sexual or Dating Violence Prevention Targeting Adolescents and Emerging Adults: A Scoping Review. Clin Nurs Res. 2025;34(2):120–37. pmid:39725866
  40. 40. Henry N, Flynn A, Powell A. Technology-Facilitated Domestic and Sexual Violence: A Review. Violence Against Women. 2020;26(15–16):1828–54. pmid:32998673
  41. 41. Munn Z, Peters MDJ, Stern C, Tufanaru C, McArthur A, Aromataris E. Systematic review or scoping review? Guidance for authors when choosing between a systematic or scoping review approach. BMC Med Res Methodol. 2018;18(1):143. pmid:30453902
  42. 42. Peters MDJ, Godfrey C, McInerney P, Khalil H, Larsen P, Marnie C, et al. Best practice guidance and reporting items for the development of scoping review protocols. JBI Evid Synth. 2022;20(4):953–68. pmid:35102103
  43. 43. Peters MDJ, Marnie C, Tricco AC, Pollock D, Munn Z, Alexander L, et al. Updated methodological guidance for the conduct of scoping reviews. JBI Evid Synth. 2020;18(10):2119–26. pmid:33038124
  44. 44. PRISMA Extensions – PRISMA statement. [cited February 21, 2025]. Available from: https://www.prisma-statement.org/extensions
  45. 45. Covidence - Better systematic review management. [cited November 30, 2024]. Available from: https://www.covidence.org/
  46. 46. JBI Manual for Evidence Synthesis - JBI Global Wiki. [cited November 26, 2024]. Available from: https://jbi-global-wiki.refined.site/space/MANUAL
  47. 47. Erlingsson C, Brysiewicz P. A hands-on guide to doing content analysis. Afr J Emerg Med. 2017;7(3):93–9. pmid:30456117
  48. 48. Darawsheh W. Reflexivity in research: promoting rigour, reliability and validity in qualitative research. Int J Ther Rehabil. 2014;21(12):560–8.
  49. 49. Altheide DL. Reflections: ethnographic content analysis. Qual Sociol. 1987;10(1):65–77.
  50. 50. Tricco AC, Lillie E, Zarin W, O’Brien KK, Colquhoun H, Levac D, et al. PRISMA Extension for Scoping Reviews (PRISMA-ScR): Checklist and Explanation. Ann Intern Med. 2018;169(7):467–73. pmid:30178033