Technology Facilitated Gender Based Violence (TFGBV) is an act that is committed using information communication technologies or other digital tools which results in physical, sexual, psychological, social, political or economic harm or other infringements of rights and freedoms. Learn more about this topic by reading the resources provided on this page.
9542089
7DF3TGWW
1
apa
50
date
desc
5783
https://www.svri.org/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3Afalse%2C%22meta%22%3A%7B%22request_last%22%3A50%2C%22request_next%22%3A50%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%229W32DTQS%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Quayle%20et%20al.%22%2C%22parsedDate%22%3A%222024-03-28%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EQuayle%2C%20E.%2C%20Larkin%2C%20A.%2C%20Schwannauer%2C%20M.%2C%20Varese%2C%20F.%2C%20Cartwright%2C%20K.%2C%20Chitsabesan%2C%20P.%2C%20Green%2C%20V.%2C%20Radford%2C%20G.%2C%20Richards%2C%20C.%2C%20Shafi%2C%20S.%2C%20Whelan%2C%20P.%2C%20Chan%2C%20C.%2C%20Hewins%2C%20W.%2C%20Newton%2C%20A.%2C%20Niebauer%2C%20E.%2C%20Sandys%2C%20M.%2C%20Ward%2C%20J.%2C%20%26amp%3B%20Bucci%2C%20S.%20%282024%29.%20Experiences%20of%20a%20digital%20health%20intervention%20for%20young%20people%20exposed%20to%20technology%20assisted%20sexual%20abuse%3A%20a%20qualitative%20study.%20%3Ci%3EBMC%20Psychiatry%3C%5C%2Fi%3E%2C%20%3Ci%3E24%3C%5C%2Fi%3E%2C%20237.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1186%5C%2Fs12888-024-05605-6%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1186%5C%2Fs12888-024-05605-6%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Experiences%20of%20a%20digital%20health%20intervention%20for%20young%20people%20exposed%20to%20technology%20assisted%20sexual%20abuse%3A%20a%20qualitative%20study%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ethel%22%2C%22lastName%22%3A%22Quayle%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Amanda%22%2C%22lastName%22%3A%22Larkin%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Matthias%22%2C%22lastName%22%3A%22Schwannauer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Filippo%22%2C%22lastName%22%3A%22Varese%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kim%22%2C%22lastName%22%3A%22Cartwright%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Prathiba%22%2C%22lastName%22%3A%22Chitsabesan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Victoria%22%2C%22lastName%22%3A%22Green%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Gillian%22%2C%22lastName%22%3A%22Radford%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cathy%22%2C%22lastName%22%3A%22Richards%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sara%22%2C%22lastName%22%3A%22Shafi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Pauline%22%2C%22lastName%22%3A%22Whelan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cindy%22%2C%22lastName%22%3A%22Chan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22William%22%2C%22lastName%22%3A%22Hewins%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alice%22%2C%22lastName%22%3A%22Newton%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Erica%22%2C%22lastName%22%3A%22Niebauer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marina%22%2C%22lastName%22%3A%22Sandys%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jennifer%22%2C%22lastName%22%3A%22Ward%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sandra%22%2C%22lastName%22%3A%22Bucci%22%7D%5D%2C%22abstractNote%22%3A%22Background%5CnThere%20is%20growing%20evidence%20that%20Technology%20Assisted%20Sexual%20Abuse%20%28TASA%29%20represents%20a%20serious%20problem%20for%20large%20numbers%20of%20children.%20To%20date%2C%20there%20are%20very%20few%20evidence-based%20interventions%20available%20to%20young%20people%20%28YP%29%20after%20they%20have%20been%20exposed%20to%20this%20form%20of%20abuse%2C%20and%20access%20to%20support%20services%20remains%20a%20challenge.%20Digital%20tools%20such%20as%20smartphones%20have%20the%20potential%20to%20increase%20access%20to%20mental%20health%20support%20and%20may%20provide%20an%20opportunity%20for%20YP%20to%20both%20manage%20their%20distress%20and%20reduce%20the%20possibility%20of%20further%20victimization.%20The%20current%20study%20explores%20the%20acceptability%20of%20a%20digital%20health%20intervention%20%28DHI%3B%20the%20i-Minds%20app%29%20which%20is%20a%20theory-driven%2C%20co-produced%2C%20mentalization-based%20DHI%20designed%20for%20YP%20aged%2012%5Cu201318%20who%20have%20experienced%20TASA.%5Cn%5CnMethods%5CnSemi-structured%20interviews%20were%20conducted%20with%2015%20YP%20recruited%20through%20Child%20and%20Adolescent%20Mental%20Health%20Services%2C%20a%20Sexual%20Assault%20Referral%20Centre%20and%20an%20e-therapy%20provider%20who%20had%20access%20to%20the%20i-Minds%20app%20as%20part%20of%20a%20feasibility%20clinical%20trial.%20Interviews%20focused%20on%20the%20acceptability%20and%20usability%20of%20i-Minds%20and%20were%20coded%20to%20themes%20based%20on%20the%20Acceptability%20of%20Healthcare%20Interventions%20framework.%5Cn%5CnResults%5CnAll%20participants%20found%20the%20i-Minds%20app%20acceptable.%20Many%20aspects%20of%20the%20app%20were%20seen%20as%20enjoyable%20and%20useful%20in%20helping%20YP%20understand%20their%20abuse%2C%20manage%20feelings%2C%20and%20change%20behavior.%20The%20app%20was%20seen%20as%20usable%20and%20easy%20to%20navigate%2C%20but%20for%20some%20participants%20the%20level%20of%20text%20was%20problematic%20and%20aspects%20of%20the%20content%20was%2C%20at%20times%2C%20emotionally%20distressing%20at%20times.%5Cn%5CnConclusions%5CnThe%20i-Minds%20app%20is%20useful%20in%20the%20management%20of%20TASA%20and%20helping%20change%20some%20risk-related%20vulnerabilities.%20The%20app%20was%20designed%2C%20developed%20and%20evaluated%20with%20YP%20who%20had%20experienced%20TASA%20and%20this%20may%20account%20for%20the%20high%20levels%20of%20acceptability%20seen.%5Cn%5CnTrial%20registration%5CnThe%20trial%20was%20registered%20on%20the%20ISRCTN%20registry%20on%20the%2012%5C%2F04%5C%2F2022%20as%20i-Minds%3A%20a%20digital%20intervention%20for%20young%20people%20exposed%20to%20online%20sexual%20abuse%20%28ISRCTN43130832%29.%22%2C%22date%22%3A%222024-3-28%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1186%5C%2Fs12888-024-05605-6%22%2C%22ISSN%22%3A%221471-244X%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.ncbi.nlm.nih.gov%5C%2Fpmc%5C%2Farticles%5C%2FPMC10979588%5C%2F%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222024-04-05T11%3A56%3A57Z%22%7D%7D%2C%7B%22key%22%3A%22J6EPIURR%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Winkle%20and%20Mulvihill%22%2C%22parsedDate%22%3A%222024-03-11%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EWinkle%2C%20K.%2C%20%26amp%3B%20Mulvihill%2C%20N.%20%282024%29.%20Anticipating%20the%20Use%20of%20Robots%20in%20Domestic%20Abuse%3A%20A%20Typology%20of%20Robot%20Facilitated%20Abuse%20to%20Support%20Risk%20Assessment%20and%20Mitigation%20in%20Human-Robot%20Interaction.%20%3Ci%3EProceedings%20of%20the%202024%20ACM%5C%2FIEEE%20International%20Conference%20on%20Human-Robot%20Interaction%3C%5C%2Fi%3E%2C%20781%26%23x2013%3B790.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1145%5C%2F3610977.3634938%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1145%5C%2F3610977.3634938%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Anticipating%20the%20Use%20of%20Robots%20in%20Domestic%20Abuse%3A%20A%20Typology%20of%20Robot%20Facilitated%20Abuse%20to%20Support%20Risk%20Assessment%20and%20Mitigation%20in%20Human-Robot%20Interaction%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Katie%22%2C%22lastName%22%3A%22Winkle%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Natasha%22%2C%22lastName%22%3A%22Mulvihill%22%7D%5D%2C%22abstractNote%22%3A%22Domestic%20abuse%20research%20demonstrates%20that%20perpetrators%20are%20agile%20in%20finding%20new%20ways%20to%20coerce%20and%20to%20consolidate%20their%20control.%20They%20may%20leverage%20loved%20ones%20or%20cherished%20objects%2C%20and%20are%20increasingly%20exploiting%20and%20subverting%20what%20have%20become%20everyday%20%27smart%27%20technologies.%20Robots%20sit%20at%20the%20intersection%20of%20these%20categories%3A%20they%20bring%20together%20multiple%20digital%20and%20assistive%20functionalities%20in%20a%20physical%20body%2C%20often%20explicitly%20designed%20to%20take%20on%20a%20social%20companionship%20role.%20We%20present%20a%20typology%20of%20robot%20facilitated%20abuse%20based%20on%20these%20unique%20affordances%2C%20designed%20to%20support%20systematic%20risk%20assessment%2C%20mitigation%20and%20design%20work.%20Whilst%20most%20obviously%20relevant%20to%20those%20designing%20robots%20for%20in-home%20deployment%20or%20intrafamilial%20interactions%2C%20the%20ability%20to%20coerce%20can%20be%20wielded%20by%20those%20who%20have%20any%20form%20of%20social%20power%2C%20such%20that%20our%20typology%20and%20associated%20design%20reflections%20may%20also%20be%20salient%20for%20the%20design%20of%20robots%20to%20be%20used%20in%20the%20school%20or%20workplace%2C%20between%20carers%20and%20the%20vulnerable%2C%20elderly%20and%20disabled%20and%5C%2For%20in%20institutions%20which%20facilitate%20intimate%20relations%20of%20care.%22%2C%22date%22%3A%22March%2011%2C%202024%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%202024%20ACM%5C%2FIEEE%20International%20Conference%20on%20Human-Robot%20Interaction%22%2C%22conferenceName%22%3A%22%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1145%5C%2F3610977.3634938%22%2C%22ISBN%22%3A%229798400703225%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdl.acm.org%5C%2Fdoi%5C%2F10.1145%5C%2F3610977.3634938%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222024-04-03T06%3A40%3A14Z%22%7D%7D%2C%7B%22key%22%3A%22IUVW6AKS%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Jurasz%22%2C%22parsedDate%22%3A%222024-03%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EJurasz%2C%20O.%20%282024%2C%20March%29.%20%3Ci%3EOnline%20violence%20against%20women%3A%20A%20Four%20Nations%20study%3C%5C%2Fi%3E%20%5BOther%5D.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Foro.open.ac.uk%5C%2F96398%5C%2F%27%3Ehttps%3A%5C%2F%5C%2Foro.open.ac.uk%5C%2F96398%5C%2F%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Online%20violence%20against%20women%3A%20A%20Four%20Nations%20study%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Olga%22%2C%22lastName%22%3A%22Jurasz%22%7D%5D%2C%22abstractNote%22%3A%22The%20Online%20violence%20against%20women%3A%20A%20Four%20Nations%20study%20project%20is%20funded%20through%20the%20Open%20University%5Cu2019s%20Open%20Societal%20Challenges%20programme.%20The%20study%20was%20designed%20and%20led%20by%20Professor%20Olga%20Jurasz.%20%5CnThe%20project%20is%20the%20first%20comprehensive%2C%20large%20scale%20and%20empirical%20study%20examining%20the%20phenomenon%20of%20OVAW%20across%20the%20UK.%20It%20empirically%20examines%20the%20scale%2C%20impact%2C%20and%20societal%20attitudes%20towards%20OVAW%20across%20England%2C%20Scotland%2C%20Wales%20and%20Northern%20Ireland.%20%20It%20also%20investigates%20societal%20attitudes%20towards%20online%20safety%2C%20online%20behaviours%2C%20law%20and%20policy%20responses%20towards%20violence%20against%20women%20%28online%20and%20offline%29%20and%20public%20views%20on%20responsibilities%20for%20preventing%20and%20responding%20to%20OVAW.%20Uniquely%2C%20the%20project%20also%20looks%20into%20men%5Cu2019s%20experiences%20of%20witnessing%20and%20reacting%20to%20OVAW.%20%5CnThe%20aim%20of%20the%20project%20is%20to%20gather%20comprehensive%20and%20representative%20data%20on%20OVAW%20in%20the%20UK%20to%20better%20understand%20this%20pressing%20issue%20and%20for%20it%20to%20inform%20evidence-based%20law%20and%20policy%20responses.%22%2C%22date%22%3A%222024-03%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Foro.open.ac.uk%5C%2F96398%5C%2F%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222024-05-20T09%3A42%3A07Z%22%7D%7D%2C%7B%22key%22%3A%22ST72A2JM%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22UN%20Women%22%2C%22parsedDate%22%3A%222024%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EUN%20Women.%20%282024%29.%20%3Ci%3EAction%20Coalitions%20on%20Gender%20Based%20Violence%20%26amp%3B%20Technology%20and%20Innovation%20for%20Gender%20Equality%3A%20Addressing%20gaps%20to%20prevent%20and%20eliminate%20technology%20facilitated%20gender-based%20violence%20against%20women%20and%20girls%3C%5C%2Fi%3E.%20UN%20Women.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fforum.generationequality.org%5C%2Fsites%5C%2Fdefault%5C%2Ffiles%5C%2F2024-01%5C%2FGBV-TechnologyFacilitated_11JAN24.pdf%27%3Ehttps%3A%5C%2F%5C%2Fforum.generationequality.org%5C%2Fsites%5C%2Fdefault%5C%2Ffiles%5C%2F2024-01%5C%2FGBV-TechnologyFacilitated_11JAN24.pdf%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Action%20Coalitions%20on%20Gender%20Based%20Violence%20%26%20Technology%20and%20Innovation%20for%20Gender%20Equality%3A%20Addressing%20gaps%20to%20prevent%20and%20eliminate%20technology%20facilitated%20gender-based%20violence%20against%20women%20and%20girls%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22UN%20Women%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22UN%20Women%22%2C%22date%22%3A%222024%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fforum.generationequality.org%5C%2Fsites%5C%2Fdefault%5C%2Ffiles%5C%2F2024-01%5C%2FGBV-TechnologyFacilitated_11JAN24.pdf%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222024-02-23T09%3A56%3A45Z%22%7D%7D%2C%7B%22key%22%3A%22UQXAWRFR%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Equality%20Now%22%2C%22parsedDate%22%3A%222024%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EEquality%20Now.%20%282024%29.%20%3Ci%3EBriefing%20paper%3A%20Deepfake%20image-based%20sexual%20abuse%2C%20tech-facilitated%20sexual%20exploitation%20and%20the%20law%3C%5C%2Fi%3E.%20Alliance%20for%20Universal%20Digital%20Rights.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fequalitynow.storage.googleapis.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2024%5C%2F01%5C%2F17084238%5C%2FEN-AUDRi-Briefing-paper-deepfake-06.pdf%27%3Ehttps%3A%5C%2F%5C%2Fequalitynow.storage.googleapis.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2024%5C%2F01%5C%2F17084238%5C%2FEN-AUDRi-Briefing-paper-deepfake-06.pdf%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Briefing%20paper%3A%20Deepfake%20image-based%20sexual%20abuse%2C%20tech-facilitated%20sexual%20exploitation%20and%20the%20law%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22Equality%20Now%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22Alliance%20for%20Universal%20Digital%20Rights%22%2C%22date%22%3A%222024%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fequalitynow.storage.googleapis.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2024%5C%2F01%5C%2F17084238%5C%2FEN-AUDRi-Briefing-paper-deepfake-06.pdf%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222024-02-21T08%3A50%3A14Z%22%7D%7D%2C%7B%22key%22%3A%22SCJQCS6V%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Sheikh%20and%20Rogers%22%2C%22parsedDate%22%3A%222023-08-31%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ESheikh%2C%20M.%20M.%20R.%2C%20%26amp%3B%20Rogers%2C%20M.%20M.%20%282023%29.%20Technology-Facilitated%20Sexual%20Violence%20and%20Abuse%20in%20Low%20and%20Middle-Income%20Countries%3A%20A%20Scoping%20Review.%20%3Ci%3ETrauma%2C%20Violence%2C%20%26amp%3B%20Abuse%3C%5C%2Fi%3E%2C%2015248380231191188.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380231191189%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380231191189%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-Facilitated%20Sexual%20Violence%20and%20Abuse%20in%20Low%20and%20Middle-Income%20Countries%3A%20A%20Scoping%20Review%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Md%20Mamunur%20Rashid%22%2C%22lastName%22%3A%22Sheikh%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michaela%20M.%22%2C%22lastName%22%3A%22Rogers%22%7D%5D%2C%22abstractNote%22%3A%22Technology-facilitated%20sexual%20violence%20and%20abuse%20%28TFSVA%29%20is%20a%20pervasive%20phenomenon%20and%20a%20global%20problem.%20TFSVA%20refers%20to%20any%20form%20of%20sexual%20violence%2C%20exploitation%2C%20or%20harassment%20enacted%20through%20the%20misuse%20of%20digital%20technologies.%20This%20includes%2C%20but%20is%20not%20limited%20to%2C%20image-based%20sexual%20abuse%2C%20online%20sexual%20exploitation%20and%20harassment%2C%20sextortion%2C%20and%20the%20non-consensual%20sharing%20of%20sexual%20images.%20It%20has%20significant%20and%20long-lasting%20psychological%2C%20social%2C%20financial%2C%20and%20health%20impacts.%20TFSVA%20is%20on%20the%20rise%2C%20particularly%20in%20low%20and%20middle-income%20countries%20%28LMICs%29%2C%20where%20there%20has%20been%20an%20explosion%20in%20digital%20technology%20overall.%20This%20scoping%20review%20aimed%20to%20identify%20studies%20on%20TFSVA%20in%20LMICs%20to%20examine%20its%20types%2C%20impacts%2C%20victim-survivor%20coping%20strategies%2C%20and%20help-seeking.%20To%20identify%20peer-reviewed%20literature%2C%20six%20databases%20were%20searched%3A%20Applied%20Social%20Sciences%20Index%20%26%20Abstracts%2C%20ProQuest%2C%20PubMed%2C%20Scopus%2C%20Star%20Plus-University%20of%20Sheffield%20library%20search%2C%20and%20Web%20of%20Science.%20The%20review%20included%20empirical%20studies%20published%20in%20English%20between%201996%20and%202022%2C%20focusing%20on%20TFSVA%20among%20adults%20%28aged%2018%2B%29%20in%20LMICs.%20A%20total%20of%2014%20peer-reviewed%20studies%20were%20included%2C%20highlighting%20that%20scant%20empirical%20research%20is%20available%20on%20TFSVA%20in%20LMICs.%20This%20review%20found%20several%20types%20of%20TFSVA%20and%20their%20wide-ranging%20impacts%3B%20traditional%20patriarchal%20societal%20norms%20and%20values%20largely%20shape%20TFSVA%20for%20women%20in%20LMICs.%20It%20also%20found%20more%20social%20impacts%20linked%20to%20sociocultural%20factors.%20Survivors%20adopted%20various%20coping%20mechanisms%20and%20help-seeking%20behaviors%20primarily%20through%20informal%20family%20support.%20Studies%20highlighted%20the%20need%20for%20effective%20legislation%3B%20pro-victim-survivor%20policing%3B%20strong%20family%20support%3B%20increasing%20victim-survivors%5Cu2019%20knowledge%20about%20reporting%3B%20and%20more%20research.%22%2C%22date%22%3A%222023-08-31%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1177%5C%2F15248380231191189%22%2C%22ISSN%22%3A%221524-8380%2C%201552-8324%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F15248380231191189%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-09-22T08%3A34%3A57Z%22%7D%7D%2C%7B%22key%22%3A%22PD952EMI%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Douglas%20et%20al.%22%2C%22parsedDate%22%3A%222023-08-02%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EDouglas%2C%20H.%2C%20Tanczer%2C%20L.%2C%20McLachlan%2C%20F.%2C%20%26amp%3B%20Harris%2C%20B.%20%282023%29.%20Policing%20Technology-Facilitated%20Domestic%20Abuse%20%28TFDA%29%3A%20Views%20of%20Service%20Providers%20in%20Australia%20and%20the%20United%20Kingdom.%20%3Ci%3EJournal%20of%20Family%20Violence%3C%5C%2Fi%3E.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs10896-023-00619-2%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs10896-023-00619-2%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Policing%20Technology-Facilitated%20Domestic%20Abuse%20%28TFDA%29%3A%20Views%20of%20Service%20Providers%20in%20Australia%20and%20the%20United%20Kingdom%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Heather%22%2C%22lastName%22%3A%22Douglas%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Leonie%22%2C%22lastName%22%3A%22Tanczer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Freya%22%2C%22lastName%22%3A%22McLachlan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Bridget%22%2C%22lastName%22%3A%22Harris%22%7D%5D%2C%22abstractNote%22%3A%22Technology-facilitated%20domestic%20abuse%20%28TFDA%29%20is%20a%20prevalent%20form%20of%20domestic%20abuse.%20While%20police%20are%20recognized%20as%20critical%20first%20responders%20to%20intimate%20partner%20violence%2C%20there%20is%20limited%20research%20about%20what%20the%20challenges%20to%20policing%20TFDA%20are%20perceived%20to%20be%20and%20how%20they%20might%20be%20addressed.%20This%20article%20speaks%20to%20this%20issue.%22%2C%22date%22%3A%222023-08-02%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1007%5C%2Fs10896-023-00619-2%22%2C%22ISSN%22%3A%221573-2851%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs10896-023-00619-2%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-09-22T08%3A46%3A14Z%22%7D%7D%2C%7B%22key%22%3A%22BFQXS82R%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Halpin%20et%20al.%22%2C%22parsedDate%22%3A%222023-06-06%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EHalpin%2C%20M.%2C%20Richard%2C%20N.%2C%20Preston%2C%20K.%2C%20Gosse%2C%20M.%2C%20%26amp%3B%20Maguire%2C%20F.%20%282023%29.%20Men%20who%20hate%20women%3A%20The%20misogyny%20of%20involuntarily%20celibate%20men.%20%3Ci%3ENew%20Media%20%26amp%3B%20Society%3C%5C%2Fi%3E%2C%20146144482311767.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F14614448231176777%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F14614448231176777%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Men%20who%20hate%20women%3A%20The%20misogyny%20of%20involuntarily%20celibate%20men%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michael%22%2C%22lastName%22%3A%22Halpin%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Norann%22%2C%22lastName%22%3A%22Richard%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kayla%22%2C%22lastName%22%3A%22Preston%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Meghan%22%2C%22lastName%22%3A%22Gosse%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Finlay%22%2C%22lastName%22%3A%22Maguire%22%7D%5D%2C%22abstractNote%22%3A%22This%20article%20uses%20computational%20data%20and%20social%20science%20theories%20to%20analyze%20the%20misogynistic%20discourse%20of%20the%20involuntary%20celibate%20%28%5Cu201cincel%5Cu201d%29%20community.%20We%20analyzed%20every%20comment%20%28%20N%5Cu2009%3D%5Cu20093%2C686%2C110%29%20produced%20over%2042%5Cu2009months%20on%20a%20popular%20incel%20discussion%20board%20and%20found%20that%20nearly%20all%20active%20participants%20use%20misogynistic%20terms.%20Participants%20used%20misogynistic%20terms%20nearly%20one%20million%20times%20and%20at%20a%20rate%202.4%20times%20greater%20than%20their%20use%20of%20neutral%20terms%20for%20women.%20The%20majority%20of%20participants%5Cu2019%20use%20of%20misogynistic%20terms%20does%20not%20increase%20or%20decrease%20with%20post%20frequency%2C%20suggesting%20that%20members%20arrive%20%28rather%20than%20become%29%20misogynistic.%20We%20discuss%20these%20findings%20in%20relation%20to%20theories%20of%20intersectionality%2C%20masculinity%2C%20and%20sexism.%20We%20likewise%20discuss%20potential%20policies%20for%20mitigating%20incel%20misogyny%20and%20similar%20online%20discourse.%22%2C%22date%22%3A%222023-06-06%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1177%5C%2F14614448231176777%22%2C%22ISSN%22%3A%221461-4448%2C%201461-7315%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F14614448231176777%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-08-01T15%3A37%3A49Z%22%7D%7D%2C%7B%22key%22%3A%227ACACMB6%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Oliver%20et%20al.%22%2C%22parsedDate%22%3A%222023-06-04%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EOliver%2C%20C.%2C%20Cummings%2C%20S.%2C%20Puiras%2C%20E.%2C%20%26amp%3B%20Mazmanian%2C%20D.%20%282023%29.%20Technology-Facilitated%20Sexual%20Harassment%20Against%20Women%20and%20Psychological%20Dysfunction%3A%20A%20Test%20of%20Objectification%20Theory.%20%3Ci%3EViolence%20Against%20Women%3C%5C%2Fi%3E%2C%20107780122311779.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012231177998%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012231177998%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-Facilitated%20Sexual%20Harassment%20Against%20Women%20and%20Psychological%20Dysfunction%3A%20A%20Test%20of%20Objectification%20Theory%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Casey%22%2C%22lastName%22%3A%22Oliver%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shayna%22%2C%22lastName%22%3A%22Cummings%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Erika%22%2C%22lastName%22%3A%22Puiras%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Dwight%22%2C%22lastName%22%3A%22Mazmanian%22%7D%5D%2C%22abstractNote%22%3A%22Objectification%20theory%20was%20tested%20to%20examine%20the%20potential%20mediating%20role%20of%20self-objectification%20in%20the%20relationship%20between%20technology-facilitated%20sexual%20harassment%20%28TFSH%29%20and%20psychological%20functioning%20in%20a%20sample%20of%20women%20%28%20N%5Cu2009%3D%5Cu2009481%29.%20The%20results%20indicated%20that%20TFSH%20was%20associated%20with%20eating%20pathology%2C%20alcohol%20use%2C%20and%20sexual%20functioning.%20Furthermore%2C%20partial%20support%20for%20the%20objectification%20theory%20was%20achieved%2C%20with%20self-objectification%20potentially%20explaining%20the%20relationships%20between%20TFSH%20and%20eating%20pathology%2C%20and%20TFSH%20and%20alcohol%20use.%20This%20research%20may%20shed%20light%20on%20the%20role%20of%20objectification%20processes%20in%20the%20context%20of%20TFSH%20in%20women%2C%20as%20well%20as%20inform%20mental%20health%20interventions%20for%20women%20victims%20of%20TFSH.%22%2C%22date%22%3A%222023-06-04%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1177%5C%2F10778012231177998%22%2C%22ISSN%22%3A%221077-8012%2C%201552-8448%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F10778012231177998%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-07-26T15%3A12%3A11Z%22%7D%7D%2C%7B%22key%22%3A%22R3WSJY7T%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kim%20et%20al.%22%2C%22parsedDate%22%3A%222023-05-10%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EKim%2C%20S.%2C%20Choi%2C%20E.%2C%20%26amp%3B%20Champion%2C%20J.%20D.%20%282023%29.%20Technology-facilitated%20Sexual%20Violence%20in%20South%20Korea%3A%20A%20Content%20Analysis%20of%20a%20Website%20for%20Victims.%20%3Ci%3EViolence%20Against%20Women%3C%5C%2Fi%3E%2C%20107780122311727.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012231172712%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012231172712%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-facilitated%20Sexual%20Violence%20in%20South%20Korea%3A%20A%20Content%20Analysis%20of%20a%20Website%20for%20Victims%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Soojeong%22%2C%22lastName%22%3A%22Kim%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Eunju%22%2C%22lastName%22%3A%22Choi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jane%20Dimmitt%22%2C%22lastName%22%3A%22Champion%22%7D%5D%2C%22abstractNote%22%3A%22Technology-facilitated%20sexual%20violence%20%28TFSV%29%20is%20an%20emerging%20form%20of%20gender-based%20violence.%20An%20understanding%20regarding%20the%20circumstance%20of%20TFSV%20and%20related%20health%20outcomes%20is%20limited.%20This%20qualitative%20study%20analyzed%20postings%20from%20an%20anonymous%20Korean%20website%20on%20which%20women%20suffering%20from%20TFSV%20freely%20posted%20messages%20asking%20for%20help%20and%20voicing%20concerns.%20Victims%20made%20efforts%20to%20solve%20problems%20that%20remained%20unresolved%2C%20thereby%20creating%20difficulties%20in%20their%20daily%20lives%2C%20and%20compelling%20them%20to%20quit%20jobs%20or%20break%20social%20relationships.%20They%20reported%20mental%20health%20concerns%20including%20suicide%20ideation%2C%20anxiety%2C%20frustration%2C%20sleep%20disorders%2C%20and%20depression.%20Results%20infer%20the%20imperative%20nature%20of%20research%2C%20intervention%2C%20and%20political%20action.%22%2C%22date%22%3A%222023-05-10%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1177%5C%2F10778012231172712%22%2C%22ISSN%22%3A%221077-8012%2C%201552-8448%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F10778012231172712%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-08-12T16%3A43%3A06Z%22%7D%7D%2C%7B%22key%22%3A%22UDJYY6T2%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Cookson%20et%20al.%22%2C%22parsedDate%22%3A%222023-05-04%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ECookson%2C%20T.%20P.%2C%20Fuentes%2C%20L.%2C%20Zulver%2C%20J.%20M.%2C%20%26amp%3B%20Nelson%2C%20A.%20%282023%29.%20Fit%20for%20purpose%3F%20Assessing%20the%20accessibility%2C%20theory%20of%20action%2C%20and%20accountability%20of%20digital%20technology%20interventions%20for%20sexual%20and%20gender-based%20violence%20prevention%20and%20response.%20%3Ci%3EGender%2C%20Technology%20and%20Development%3C%5C%2Fi%3E%2C%20%3Ci%3E27%3C%5C%2Fi%3E%282%29%2C%20184%26%23x2013%3B206.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F09718524.2023.2182035%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F09718524.2023.2182035%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Fit%20for%20purpose%3F%20Assessing%20the%20accessibility%2C%20theory%20of%20action%2C%20and%20accountability%20of%20digital%20technology%20interventions%20for%20sexual%20and%20gender-based%20violence%20prevention%20and%20response%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tara%20Patricia%22%2C%22lastName%22%3A%22Cookson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lorena%22%2C%22lastName%22%3A%22Fuentes%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Julia%20Margaret%22%2C%22lastName%22%3A%22Zulver%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Austin%22%2C%22lastName%22%3A%22Nelson%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222023-05-04%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1080%5C%2F09718524.2023.2182035%22%2C%22ISSN%22%3A%220971-8524%2C%200973-0656%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.tandfonline.com%5C%2Fdoi%5C%2Ffull%5C%2F10.1080%5C%2F09718524.2023.2182035%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-07-21T08%3A09%3A35Z%22%7D%7D%2C%7B%22key%22%3A%22QJSCB5CE%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Afrouz%22%2C%22parsedDate%22%3A%222023-04%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EAfrouz%2C%20R.%20%282023%29.%20The%20Nature%2C%20Patterns%20and%20Consequences%20of%20Technology-Facilitated%20Domestic%20Abuse%3A%20A%20Scoping%20Review.%20%3Ci%3ETrauma%2C%20Violence%20%26amp%3B%20Abuse%3C%5C%2Fi%3E%2C%20%3Ci%3E24%3C%5C%2Fi%3E%282%29%2C%20913%26%23x2013%3B927.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380211046752%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380211046752%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22The%20Nature%2C%20Patterns%20and%20Consequences%20of%20Technology-Facilitated%20Domestic%20Abuse%3A%20A%20Scoping%20Review%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rojan%22%2C%22lastName%22%3A%22Afrouz%22%7D%5D%2C%22abstractNote%22%3A%22Women%20are%20increasingly%20at%20risk%20of%20gender-based%20violence%20through%20technology%20and%20digital%20tools.%20Some%20digital%20devices%20and%20apps%20such%20as%20GPS%20location%20tracking%2C%20spyware%2C%20mobile%20phones%20and%20social%20media%20platforms%20have%20become%20new%20tools%20for%20perpetrators%20to%20monitor%2C%20harass%20and%20abuse%20victims.%20However%2C%20the%20nature%20and%20impacts%20of%20technology%20on%20intimate%20partner%20violence%20%28IPV%29%20have%20remained%20perplexing%20and%20ambiguous.%20Hence%2C%20this%20scoping%20review%20was%20conducted%20to%20explore%20the%20nature%2C%20patterns%20and%20consequences%20of%20technology-facilitated%20domestic%20abuse%20%28TFDA%29.%20All%20journal%20articles%20and%20grey%20literature%20exploring%20the%20TFDA%20phenomenon%2C%20its%20nature%20and%20impacts%20on%20victims%20and%20services%20providers%20were%20scanned%2C%20and%20twenty-two%20papers%20were%20included%20in%20this%20scoping%20review.%20Overall%2C%20findings%20showed%20that%20digital%20devices%2C%20online%20applications%20and%20social%20media%20accounts%20facilitated%20IPV%20and%20exacerbated%20the%20consequences%20of%20abuse.%20Yet%2C%20many%20victims%20and%20frontline%20workers%20found%20understanding%20the%20nature%20and%20impacts%20of%20TFDA%20difficult.%20They%20faced%20many%20challenges%20addressing%20this%20form%20of%20abuse.%20Thus%2C%20several%20strategies%20are%20needed%20to%20adequately%20tackle%20TFDA%2C%20including%20conducting%20further%20research%20on%20the%20issue%2C%20developing%20appropriate%20policy%20and%20addressing%20gender%20inequality%20in%20the%20online%20environment.%22%2C%22date%22%3A%222023-04%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F15248380211046752%22%2C%22ISSN%22%3A%221552-8324%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A14%3A43Z%22%7D%7D%2C%7B%22key%22%3A%228B38UVHI%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22UNFPA%22%2C%22parsedDate%22%3A%222023-03-13%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EUNFPA.%20%282023%29.%20%3Ci%3EGuidance%20on%20the%20Safe%20and%20Ethical%20Use%20of%20Technology%20to%20Address%20Gender-based%20Violence%20and%20Harmful%20Practices%3A%20Implementation%20Summary%3C%5C%2Fi%3E.%20UNFPA.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2Fimplementation-summary-safe-ethical-use-technology-gbv-harmful-practices%27%3Ehttps%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2Fimplementation-summary-safe-ethical-use-technology-gbv-harmful-practices%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Guidance%20on%20the%20Safe%20and%20Ethical%20Use%20of%20Technology%20to%20Address%20Gender-based%20Violence%20and%20Harmful%20Practices%3A%20Implementation%20Summary%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22UNFPA%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22UNFPA%22%2C%22date%22%3A%2213%20March%202023%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2Fimplementation-summary-safe-ethical-use-technology-gbv-harmful-practices%22%2C%22collections%22%3A%5B%229Z4GDCHW%22%2C%227DF3TGWW%22%2C%225PQ9SW2W%22%5D%2C%22dateModified%22%3A%222023-09-12T12%3A08%3A52Z%22%7D%7D%2C%7B%22key%22%3A%22UCQW2II6%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Bansal%20et%20al.%22%2C%22parsedDate%22%3A%222023-03-04%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EBansal%2C%20V.%2C%20Rezwan%2C%20M.%2C%20Iyer%2C%20M.%2C%20Leasure%2C%20E.%2C%20Roth%2C%20C.%2C%20Pal%2C%20P.%2C%20%26amp%3B%20Hinson%2C%20L.%20%282023%29.%20A%20Scoping%20Review%20of%20Technology-Facilitated%20Gender-Based%20Violence%20in%20Low-%20and%20Middle-Income%20Countries%20Across%20Asia.%20%3Ci%3ETrauma%2C%20Violence%20%26amp%3B%20Abuse%3C%5C%2Fi%3E%2C%2015248380231154614.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380231154614%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380231154614%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22A%20Scoping%20Review%20of%20Technology-Facilitated%20Gender-Based%20Violence%20in%20Low-%20and%20Middle-Income%20Countries%20Across%20Asia%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vaiddehi%22%2C%22lastName%22%3A%22Bansal%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mayumi%22%2C%22lastName%22%3A%22Rezwan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mithila%22%2C%22lastName%22%3A%22Iyer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Erin%22%2C%22lastName%22%3A%22Leasure%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Connor%22%2C%22lastName%22%3A%22Roth%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Poulomi%22%2C%22lastName%22%3A%22Pal%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Laura%22%2C%22lastName%22%3A%22Hinson%22%7D%5D%2C%22abstractNote%22%3A%22Technology-facilitated%20gender-based%20violence%20%28GBV%29%20is%20a%20pervasive%20issue.%20Yet%2C%20most%20research%20focuses%20on%20high-income%20countries%20and%20few%20studies%20comprehensively%20summarize%20its%20prevalence%2C%20manifestations%2C%20and%20implications%20in%20the%20Global%20South.%20This%20scoping%20review%20sought%20to%20examine%20technology-facilitated%20GBV%20in%20low-%20and%20middle-income%20countries%20across%20Asia%2C%20specifically%20focusing%20on%20trends%2C%20common%20behaviors%2C%20and%20characteristics%20of%20perpetrators%20and%20survivors.%20A%20comprehensive%20search%20of%20peer-reviewed%20and%20gray%20literature%20published%20between%202006%20and%202021%20yielded%202%2C042%20documents%2C%20of%20which%2097%20articles%20were%20included%20in%20the%20review.%20Across%20South%20and%20Southeast%20Asia%2C%20findings%20indicate%20that%20technology-facilitated%20GBV%20is%20a%20widespread%20phenomenon%2C%20with%20increased%20incidence%20during%20the%20COVID-19%20pandemic.%20Technology-facilitated%20GBV%20comprises%20various%20forms%20of%20behaviors%20and%20prevalence%20varies%20by%20type%20of%20violence.%20Women%2C%20girls%2C%20and%20sexual%20and%20gender%20minorities%2C%20especially%20those%20with%20other%20intersecting%20marginalized%20identities%2C%20are%20often%20more%20vulnerable%20to%20experiencing%20online%20violence.%20Alongside%20these%20findings%2C%20the%20review%20revealed%20gaps%20in%20the%20literature%20including%20a%20lack%20of%20evidence%20from%20Central%20Asia%20and%20the%20Pacific%20Islands.%20There%20is%20also%20limited%20data%20on%20prevalence%20which%20we%20attribute%20to%20underreporting%2C%20in%20part%20due%20to%20disjointed%2C%20outdated%2C%20or%20nonexistent%20legal%20definitions.%20Findings%20from%20the%20study%20can%20be%20leveraged%20by%20key%20stakeholders%20such%20as%20researchers%2C%20practitioners%2C%20governments%2C%20and%20technology%20companies%20to%20develop%20prevention%2C%20response%2C%20and%20mitigation%20efforts.%22%2C%22date%22%3A%222023-03-04%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F15248380231154614%22%2C%22ISSN%22%3A%221552-8324%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A11%3A58Z%22%7D%7D%2C%7B%22key%22%3A%225E8LTUAD%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Srivastava%20et%20al.%22%2C%22parsedDate%22%3A%222023-02%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ESrivastava%2C%20A.%2C%20Rusow%2C%20J.%2C%20Schrager%2C%20S.%20M.%2C%20Stephenson%2C%20R.%2C%20%26amp%3B%20Goldbach%2C%20J.%20T.%20%282023%29.%20Digital%20Sexual%20Violence%20and%20Suicide%20Risk%20in%20a%20National%20Sample%20of%20Sexual%20Minority%20Adolescents.%20%3Ci%3EJournal%20of%20Interpersonal%20Violence%3C%5C%2Fi%3E%2C%20%3Ci%3E38%3C%5C%2Fi%3E%283%26%23x2013%3B4%29%2C%204443%26%23x2013%3B4458.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605221116317%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605221116317%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Digital%20Sexual%20Violence%20and%20Suicide%20Risk%20in%20a%20National%20Sample%20of%20Sexual%20Minority%20Adolescents%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ankur%22%2C%22lastName%22%3A%22Srivastava%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Joshua%22%2C%22lastName%22%3A%22Rusow%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sheree%20M.%22%2C%22lastName%22%3A%22Schrager%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rob%22%2C%22lastName%22%3A%22Stephenson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jeremy%20T.%22%2C%22lastName%22%3A%22Goldbach%22%7D%5D%2C%22abstractNote%22%3A%22This%20paper%20aimed%20to%20examine%20the%20association%20between%20digital%20sexual%20violence%20%28threat%20to%20post%20or%20nonconsensual%20posting%20of%20sexually%20explicit%20media%29%20and%20suicidal%20%28ideation%2C%20planning%2C%20and%20attempt%29%20and%20non-suicidal%20self-harm%20behavior.%20The%20data%20for%20the%20current%20analysis%20come%20from%20an%20online%20sample%20of%20sexual%20minority%20adolescents%20%28aged%2014-17%29%20recruited%20from%20across%20the%20United%20States%20%28n%5Cu2009%3D%5Cu2009970%29.%20Multivariate%20logistic%20regressions%20were%20used%20to%20examine%20the%20association%20between%20digital%20sexual%20violence%20with%20suicide%20%28ideation%2C%20planning%2C%20and%20attempt%29%20and%20self-harm.%20In%20the%20sample%2C%209.1%25%20of%20participants%20reported%20being%20threatened%20to%20have%20their%20sexually%20explicit%20media%20posted%20without%20their%20consent%2C%20while%206.5%25%20reported%20their%20sexually%20explicit%20media%20had%20been%20posted%20without%20their%20consent.%20Threat%20to%20post%20sexually%20explicit%20media%20without%20consent%20was%20associated%20with%20higher%20odds%20of%20reporting%20suicidal%20ideation%20%28odds%20ratio%20%5BOR%5D%5Cu2009%3D%5Cu20091.88%29%2C%20suicide%20plan%20%28OR%5Cu2009%3D%5Cu20092.12%29%2C%20suicide%20attempt%20%28OR%5Cu2009%3D%5Cu20093.56%29%2C%20and%20self-harm%20%28OR%5Cu2009%3D%5Cu20091.96%29.%20While%20nonconsensual%20posting%20of%20sexually%20explicit%20media%20was%20associated%20with%20higher%20odds%20of%20reporting%20suicidal%20ideation%20%28OR%5Cu2009%3D%5Cu20091.82%29%20and%20suicide%20attempt%20%28OR%5Cu2009%3D%5Cu20092.20%29.%20All%20models%20controlled%20for%20age%2C%20assigned%20sex%20at%20birth%2C%20sexual%20identity%2C%20and%20race%20and%20ethnicity.%20These%20findings%20underscore%20important%20considerations%20and%20future%20research%20directions.%20Given%20the%20associations%20between%20digital%20sexual%20violence%20and%20suicide%20risk%20among%20sexual%20minority%20adolescents%2C%20suicide%20prevention%20efforts%20with%20adolescents%20must%20be%20responsive%20to%20the%20needs%20of%20sexual%20minority%20adolescents%20and%20the%20changing%20landscape%20of%20sexual%20violence%20in%20digital%20spaces.%20Future%20research%20should%20examine%20the%20trajectories%20of%20digital%20sexual%20violence%20among%20adolescents%20and%20comparative%20analyses%20by%20demographic%20subgroups%20to%20better%20understand%20changes%20in%20these%20processes%20over%20time.%22%2C%22date%22%3A%222023-02%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F08862605221116317%22%2C%22ISSN%22%3A%221552-6518%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A11%3A17Z%22%7D%7D%2C%7B%22key%22%3A%22BUMFWGZQ%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Straw%20and%20Tanczer%22%2C%22parsedDate%22%3A%222023-01-04%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EStraw%2C%20I.%2C%20%26amp%3B%20Tanczer%2C%20L.%20%282023%29.%20Safeguarding%20patients%20from%20technology-facilitated%20abuse%20in%20clinical%20settings%3A%20A%20narrative%20review.%20%3Ci%3EPLOS%20Digital%20Health%3C%5C%2Fi%3E%2C%20%3Ci%3E2%3C%5C%2Fi%3E%281%29%2C%20e0000089.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1371%5C%2Fjournal.pdig.0000089%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1371%5C%2Fjournal.pdig.0000089%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Safeguarding%20patients%20from%20technology-facilitated%20abuse%20in%20clinical%20settings%3A%20A%20narrative%20review%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Isabel%22%2C%22lastName%22%3A%22Straw%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Leonie%22%2C%22lastName%22%3A%22Tanczer%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Yuan%22%2C%22lastName%22%3A%22Lai%22%7D%5D%2C%22abstractNote%22%3A%22Safeguarding%20vulnerable%20patients%20is%20a%20key%20responsibility%20of%20healthcare%20professionals.%20Yet%2C%20existing%20clinical%20and%20patient%20management%20protocols%20are%20outdated%20as%20they%20do%20not%20address%20the%20emerging%20threats%20of%20technology-facilitated%20abuse.%20The%20latter%20describes%20the%20misuse%20of%20digital%20systems%20such%20as%20smartphones%20or%20other%20Internet-connected%20devices%20to%20monitor%2C%20control%20and%20intimidate%20individuals.%20The%20lack%20of%20attention%20given%20to%20how%20technology-facilitated%20abuse%20may%20affect%20patients%20in%20their%20lives%2C%20can%20result%20in%20clinicians%20failing%20to%20protect%20vulnerable%20patients%20and%20may%20affect%20their%20care%20in%20several%20unexpected%20ways.%20We%20attempt%20to%20address%20this%20gap%20by%20evaluating%20the%20literature%20that%20is%20available%20to%20healthcare%20practitioners%20working%20with%20patients%20impacted%20by%20digitally%20enabled%20forms%20of%20harm.%20A%20literature%20search%20was%20carried%20out%20between%20September%202021%20and%20January%202022%2C%20in%20which%20three%20academic%20databases%20were%20probed%20using%20strings%20of%20relevant%20search%20terms%2C%20returning%20a%20total%20of%2059%20articles%20for%20full%20text%20review.%20The%20articles%20were%20appraised%20according%20to%20three%20criteria%3A%20%28a%29%20the%20focus%20on%20technology-facilitated%20abuse%3B%20%28b%29%20the%20relevance%20to%20clinical%20settings%3B%20and%20%28c%29%20the%20role%20of%20healthcare%20practitioners%20in%20safeguarding.%20Of%20the%2059%20articles%2C%2017%20articles%20met%20at%20least%20one%20criterion%20and%20only%20one%20article%20met%20all%20three%20criteria.%20We%20drew%20additional%20information%20from%20the%20grey%20literature%20to%20identify%20areas%20for%20improvement%20in%20medical%20settings%20and%20at-risk%20patient%20groups.%20Technology-facilitated%20abuse%20concerns%20healthcare%20professionals%20from%20the%20point%20of%20consultation%20to%20the%20point%20of%20discharge%2C%20as%20a%20result%20clinicians%20need%20to%20be%20equipped%20with%20the%20tools%20to%20identify%20and%20address%20these%20harms%20at%20any%20stage%20of%20the%20patient%5Cu2019s%20journey.%20In%20this%20article%2C%20we%20offer%20recommendations%20for%20further%20research%20within%20different%20medical%20subspecialities%20and%20highlight%20areas%20requiring%20policy%20development%20in%20clinical%20environments.%22%2C%22date%22%3A%222023-1-4%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1371%5C%2Fjournal.pdig.0000089%22%2C%22ISSN%22%3A%222767-3170%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdx.plos.org%5C%2F10.1371%5C%2Fjournal.pdig.0000089%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-07-28T14%3A45%3A17Z%22%7D%7D%2C%7B%22key%22%3A%22AWHKNZIY%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Sciacca%20et%20al.%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ESciacca%2C%20B.%2C%20Mazzone%2C%20A.%2C%20Loftsson%2C%20M.%2C%20O%26%23x2019%3BHiggins%20Norman%2C%20J.%2C%20%26amp%3B%20Foody%2C%20M.%20%282023%29.%20Nonconsensual%20Dissemination%20of%20Sexual%20Images%20Among%20Adolescents%3A%20Associations%20With%20Depression%20and%20Self-Esteem.%20%3Ci%3EJournal%20of%20Interpersonal%20Violence%3C%5C%2Fi%3E%2C%20%3Ci%3E38%3C%5C%2Fi%3E%2815%26%23x2013%3B16%29%2C%209438%26%23x2013%3B9464.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605231165777%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605231165777%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Nonconsensual%20Dissemination%20of%20Sexual%20Images%20Among%20Adolescents%3A%20Associations%20With%20Depression%20and%20Self-Esteem%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Beatrice%22%2C%22lastName%22%3A%22Sciacca%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Angela%22%2C%22lastName%22%3A%22Mazzone%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Magnus%22%2C%22lastName%22%3A%22Loftsson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22James%22%2C%22lastName%22%3A%22O%5Cu2019Higgins%20Norman%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mair%5Cu00e9ad%22%2C%22lastName%22%3A%22Foody%22%7D%5D%2C%22abstractNote%22%3A%22The%20nonconsensual%20dissemination%20of%20sexual%20images%20is%20a%20form%20of%20image-based%20sexual%20abuse%20that%20is%20relatively%20common%20among%20adolescents.%20However%2C%20literature%20on%20this%20issue%20with%20adolescent%20samples%20is%20relatively%20scarce.%20Therefore%2C%20this%20study%20is%20aimed%20at%20investigating%20how%20this%20phenomenon%20varies%20based%20on%20gender%20and%20sexual%20orientation%2C%20along%20with%20its%20association%20with%20depression%20and%20self-esteem.%20Participants%20were%20728%20secondary%20school%20students%20in%20Sweden%20%2850.4%25%20girls%20and%2046.4%25%20boys%3B%2014.4%25%20lesbian%2C%20gay%2C%20bisexual%20%5BLGB%2B%5D%29%20aged%20from%2012%20to%2019%5Cu2009years%20%28%20M%5Cu2009%3D%5Cu200914.35%2C%20SD%5Cu2009%3D%5Cu20091.29%29.%20A%20survey%20was%20administered%20during%20school%20hours%2C%20including%20a%20measure%20assessing%20the%20nonconsensual%20dissemination%20of%20sexual%20images%2C%20the%20short%20version%20of%20the%20Moods%20and%20Feelings%20Questionnaire%2C%20and%20the%20Rosenberg%5Cu2019s%20Self-Esteem%20Scale.%20Results%20showed%20that%20LGB%2B%20participants%20were%20more%20likely%20to%20indicate%20that%20they%20were%20victimized%20compared%20to%20their%20heterosexual%20peers%2C%20while%20no%20differences%20were%20observed%20for%20gender.%20Being%20the%20target%20of%20nonconsensual%20dissemination%20of%20sexual%20images%20was%20positively%20associated%20with%20depression%2C%20whereas%20no%20significant%20associations%20were%20yielded%20for%20self-esteem.%20Based%20on%20the%20findings%20from%20this%20study%2C%20we%20suggest%20raising%20adolescent%20awareness%20in%20relation%20to%20the%20nonconsensual%20dissemination%20of%20sexual%20images%20as%20a%20form%20of%20sexual%20abuse%20that%20can%20have%20detrimental%20effects%20on%20those%20who%20are%20targeted.%20Such%20educational%20programs%20should%20be%20inclusive%20of%20sexual%20minority%20adolescents%2C%20as%20they%20are%20at%20a%20particular%20risk%20of%20being%20the%20target%20of%20nonconsensual%20dissemination%20of%20sexual%20images.%20Psychological%20support%20should%20be%20provided%20to%20the%20targets%20of%20this%20form%20of%20abuse%2C%20through%20both%20school%20and%20online%20counseling.%20Future%20research%20should%20adopt%20longitudinal%20designs%20while%20recruiting%20diverse%20samples.%22%2C%22date%22%3A%2208%5C%2F2023%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1177%5C%2F08862605231165777%22%2C%22ISSN%22%3A%220886-2605%2C%201552-6518%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F08862605231165777%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-08-27T15%3A50%3A55Z%22%7D%7D%2C%7B%22key%22%3A%22Q9637KP5%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22UNFPA%20and%20Wilson%20Center%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EUNFPA%2C%20%26amp%3B%20Wilson%20Center.%20%282023%29.%20%3Ci%3E2022%20Global%20Symposium%20on%20Technology-facilitated%20Gender-based%20Violence%20Results%3A%20Building%20a%20Common%20Pathway%3C%5C%2Fi%3E.%20UNFPA.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2F2022-global-symposium-technology-facilitated-gender-based-violence-results-building%27%3Ehttps%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2F2022-global-symposium-technology-facilitated-gender-based-violence-results-building%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%222022%20Global%20Symposium%20on%20Technology-facilitated%20Gender-based%20Violence%20Results%3A%20Building%20a%20Common%20Pathway%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22UNFPA%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22Wilson%20Center%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22UNFPA%22%2C%22date%22%3A%222023%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2F2022-global-symposium-technology-facilitated-gender-based-violence-results-building%22%2C%22collections%22%3A%5B%227DF3TGWW%22%2C%22INNKXKUP%22%5D%2C%22dateModified%22%3A%222023-10-20T06%3A45%3A37Z%22%7D%7D%2C%7B%22key%22%3A%22JQQB8GY7%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22UNFPA%20et%20al.%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EUNFPA%2C%20Argentine%20Gender%20Editors%20Network%2C%20%26amp%3B%20Defensor%26%23xED%3Ba%20del%20P%26%23xFA%3Bblico.%20%282023%29.%20%3Ci%3EEl%20Abordaje%20Medi%26%23xE1%3Btico%20de%20la%20Violencia%20de%20G%26%23xE9%3Bnero%20Digital%3A%20Claves%20Para%20Una%20Comunicaci%26%23xF3%3Bn%20Responsable%3C%5C%2Fi%3E.%20UNFPA.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fargentina.unfpa.org%5C%2Fes%5C%2Fpublications%5C%2Fel-abordaje-medi%25C3%25A1tico-de-la-violencia-de-g%25C3%25A9nero-digital-claves-para-una-comunicaci%25C3%25B3n%27%3Ehttps%3A%5C%2F%5C%2Fargentina.unfpa.org%5C%2Fes%5C%2Fpublications%5C%2Fel-abordaje-medi%25C3%25A1tico-de-la-violencia-de-g%25C3%25A9nero-digital-claves-para-una-comunicaci%25C3%25B3n%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22El%20Abordaje%20Medi%5Cu00e1tico%20de%20la%20Violencia%20de%20G%5Cu00e9nero%20Digital%3A%20Claves%20Para%20Una%20Comunicaci%5Cu00f3n%20Responsable%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22UNFPA%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Argentine%20Gender%20Editors%20Network%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22Defensor%5Cu00eda%20del%20P%5Cu00fablico%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22UNFPA%22%2C%22date%22%3A%222023%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fargentina.unfpa.org%5C%2Fes%5C%2Fpublications%5C%2Fel-abordaje-medi%25C3%25A1tico-de-la-violencia-de-g%25C3%25A9nero-digital-claves-para-una-comunicaci%25C3%25B3n%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T10%3A05%3A40Z%22%7D%7D%2C%7B%22key%22%3A%22FUURE2NA%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22University%20of%20Melbourne%20and%20UNFPA%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EUniversity%20of%20Melbourne%2C%20%26amp%3B%20UNFPA.%20%282023%29.%20%3Ci%3EMeasuring%20technology-facilitated%20gender-based%20violence.%20A%20discussion%20paper%3C%5C%2Fi%3E.%20University%20of%20Melbourne%20and%20UNFPA.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2Fmeasuring-technology-facilitated-gender-based-violence-discussion-paper%27%3Ehttps%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2Fmeasuring-technology-facilitated-gender-based-violence-discussion-paper%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Measuring%20technology-facilitated%20gender-based%20violence.%20A%20discussion%20paper%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22University%20of%20Melbourne%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22UNFPA%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22University%20of%20Melbourne%20and%20UNFPA%22%2C%22date%22%3A%222023%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2Fmeasuring-technology-facilitated-gender-based-violence-discussion-paper%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A36%3A52Z%22%7D%7D%2C%7B%22key%22%3A%228LW3HW7E%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22UN%20Women%20and%20World%20Health%20Organization%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EUN%20Women%2C%20%26amp%3B%20World%20Health%20Organization.%20%282023%29.%20%3Ci%3ETechnology-facilitated%20violence%20against%20women%3A%20Taking%20stock%20of%20evidence%20and%20data%20collection%3C%5C%2Fi%3E.%20UN%20Women.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.unwomen.org%5C%2Fen%5C%2Fdigital-library%5C%2Fpublications%5C%2F2023%5C%2F04%5C%2Ftechnology-facilitated-violence-against-women-taking-stock-of-evidence-and-data-collection%27%3Ehttps%3A%5C%2F%5C%2Fwww.unwomen.org%5C%2Fen%5C%2Fdigital-library%5C%2Fpublications%5C%2F2023%5C%2F04%5C%2Ftechnology-facilitated-violence-against-women-taking-stock-of-evidence-and-data-collection%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Technology-facilitated%20violence%20against%20women%3A%20Taking%20stock%20of%20evidence%20and%20data%20collection%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22UN%20Women%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22World%20Health%20Organization%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22UN%20Women%22%2C%22date%22%3A%222023%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.unwomen.org%5C%2Fen%5C%2Fdigital-library%5C%2Fpublications%5C%2F2023%5C%2F04%5C%2Ftechnology-facilitated-violence-against-women-taking-stock-of-evidence-and-data-collection%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A26%3A40Z%22%7D%7D%2C%7B%22key%22%3A%223JLNMZA5%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22UN%20Women%20and%20World%20Health%20Organization%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EUN%20Women%2C%20%26amp%3B%20World%20Health%20Organization.%20%282023%29.%20%3Ci%3EThe%20state%20of%20evidence%20and%20data%20collection%20on%20technology-facilitated%20violence%20against%20women.%3C%5C%2Fi%3E%20UN%20Women.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.unwomen.org%5C%2Fen%5C%2Fdigital-library%5C%2Fpublications%5C%2F2023%5C%2F04%5C%2Fbrief-the-state-of-evidence-and-data-collection-on-technology-facilitated-violence-against-women%27%3Ehttps%3A%5C%2F%5C%2Fwww.unwomen.org%5C%2Fen%5C%2Fdigital-library%5C%2Fpublications%5C%2F2023%5C%2F04%5C%2Fbrief-the-state-of-evidence-and-data-collection-on-technology-facilitated-violence-against-women%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22The%20state%20of%20evidence%20and%20data%20collection%20on%20technology-facilitated%20violence%20against%20women.%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22UN%20Women%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22World%20Health%20Organization%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22UN%20Women%22%2C%22date%22%3A%222023%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.unwomen.org%5C%2Fen%5C%2Fdigital-library%5C%2Fpublications%5C%2F2023%5C%2F04%5C%2Fbrief-the-state-of-evidence-and-data-collection-on-technology-facilitated-violence-against-women%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A25%3A26Z%22%7D%7D%2C%7B%22key%22%3A%22NGZKC4MK%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Dolev-Cohen%20et%20al.%22%2C%22parsedDate%22%3A%222022-12-13%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EDolev-Cohen%2C%20M.%2C%20Nezer%2C%20I.%2C%20%26amp%3B%20Zumt%2C%20A.%20A.%20%282022%29.%20A%20Qualitative%20Examination%20of%20School%20Counselors%26%23x2019%3B%20Experiences%20of%20Sextortion%20Cases%20of%20Female%20Students%20in%20Israel.%20%3Ci%3ESexual%20Abuse%3C%5C%2Fi%3E%2C%20107906322211459.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10790632221145925%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10790632221145925%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22A%20Qualitative%20Examination%20of%20School%20Counselors%5Cu2019%20Experiences%20of%20Sextortion%20Cases%20of%20Female%20Students%20in%20Israel%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michal%22%2C%22lastName%22%3A%22Dolev-Cohen%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Inbar%22%2C%22lastName%22%3A%22Nezer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Anwar%20Abu%22%2C%22lastName%22%3A%22Zumt%22%7D%5D%2C%22abstractNote%22%3A%22Sextortion%20%28a%20portmanteau%20of%20%5Cu201csexual%5Cu201d%20and%20%5Cu201cextortion%5Cu201d%29%20is%20a%20relatively%20new%20phenomenon%20of%20sexual%20exploitation%2C%20which%20occurs%20when%20a%20person%20threatens%20another%20with%20the%20distribution%20of%20sexual%20content%20on%20the%20Internet%2C%20to%20obtain%20more%20pictures%20or%20videos%2C%20money%2C%20or%20have%20some%20other%20demand%20met.%20The%20current%20study%20examined%20how%20school%20counselors%20in%20Israel%20perceive%20the%20phenomenon%20of%20online%20sextortion.%20To%20this%20end%2C%20we%20conducted%20a%20qualitative%20study%20based%20on%2020%20semi-structured%20in-depth%20interviews%20with%20school%20counselors%20working%20in%20middle%20schools%20and%20high%20schools%20in%20Israel%2C%20who%20treated%20adolescent%20girls%20blackmailed%20over%20the%20Internet%20on%20sexual%20grounds.%20Findings%20indicate%20that%20the%20school%20counselors%20had%20difficulty%20in%20identifying%20and%20defining%20the%20cases%20they%20treated%20as%20instances%20of%20sextortion%2C%20and%20that%20in%20their%20view%20the%20harm%20was%20slight.%20Findings%20also%20indicate%20that%20school%20counselors%20associated%20the%20causes%20of%20sextortion%20with%20the%20victims%20and%20their%20backgrounds.%20We%20found%20differences%20between%20the%20Arab%20and%20secular%20and%20national-religious%20state%20education%20in%20the%20way%20Jewish%20counselors%20treated%20the%20victims%20and%20involved%20additional%20actors%20such%20as%20the%20victim%5Cu2019s%20parents%20and%20the%20police.%20This%20underscores%20the%20importance%20of%20providing%20educational%20staff%20with%20adequate%20knowledge%20and%20tools%20that%20are%20culturally%20suited%20to%20the%20victims.%22%2C%22date%22%3A%222022-12-13%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1177%5C%2F10790632221145925%22%2C%22ISSN%22%3A%221079-0632%2C%201573-286X%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F10790632221145925%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-08-28T12%3A07%3A53Z%22%7D%7D%2C%7B%22key%22%3A%22SA3CSEGE%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Dahlqvist%20et%20al.%22%2C%22parsedDate%22%3A%222022-12%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EDahlqvist%2C%20H.%2C%20Svensson%2C%20%26%23xC5%3B.%2C%20%26amp%3B%20Gillander%20G%26%23xE5%3Bdin%2C%20K.%20%282022%29.%20Co-occurrence%20of%20online%20and%20offline%20bullying%20and%20sexual%20harassment%20among%20youth%20in%20Sweden%3A%20Implications%20for%20studies%20on%20victimization%20and%20health%20a%20short%20communication.%20%3Ci%3EInternational%20Journal%20of%20Circumpolar%20Health%3C%5C%2Fi%3E%2C%20%3Ci%3E81%3C%5C%2Fi%3E%281%29%2C%202130362.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F22423982.2022.2130362%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F22423982.2022.2130362%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Co-occurrence%20of%20online%20and%20offline%20bullying%20and%20sexual%20harassment%20among%20youth%20in%20Sweden%3A%20Implications%20for%20studies%20on%20victimization%20and%20health%20a%20short%20communication%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Hel%5Cu00e9ne%22%2C%22lastName%22%3A%22Dahlqvist%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%5Cu00c5sa%22%2C%22lastName%22%3A%22Svensson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Katja%22%2C%22lastName%22%3A%22Gillander%20G%5Cu00e5din%22%7D%5D%2C%22abstractNote%22%3A%22Studies%20of%20co-occurrence%20of%20online%20and%20offline%20victimisation%20of%20bullying%20and%20sexual%20harassment%20and%20its%20associations%20to%20mental%20health%20outcomes%20among%20youth%20are%20scarce.%20To%20inform%20future%20study%20designs%2C%20the%20aim%20of%20this%20brief%20communication%20was%20to%20map%20co-occurrence%20of%20online%20and%20offline%20bullying%20and%20sexual%20harassment%20victimisation%20among%20adolescents.%20Data%20were%20collected%20in%202011%20in%20nine%20schools%20in%20Northern%20Sweden%2C%20n%20%3D%5Cu00a01193%20%28boys%5Cu00a0%3D%5Cu00a0566%3B%20girls%5Cu00a0%3D%5Cu00a0627%29.%20Absolute%20and%20relative%20frequencies%20were%20calculated%20to%20find%20combinations%20of%20victimisation%3A%20one%2C%20two%2C%20three%2C%20or%20four%20forms.%20Reflecting%20a%20picture%20of%20the%20early%20days%20of%20online%20victimisation%2C%20in%20total%20fifty%20seven%20percent%20%2857%25%29%20of%20adolescents%20were%20victimised.%20Single%20occurrence%20victimisation%20was%2021.2%25%20%28offline%20sexual%20harassment%20was%20most%20common%20irrespective%20of%20gender%29%2C%20showing%20that%20most%20youths%20were%20victimised%20in%20a%20co-occurrence%20of%20two%20or%20more%20forms.%20Seven%20percent%20%287%25%29%20were%20victimised%20by%20all%20four%20forms%20of%20victimisation.%20Offline%20sexual%20harassment%20victimisation%20was%20present%20in%20the%20most%20common%20co-occurrences.%20Directions%20for%20future%20studies%20of%20victimisation%20and%20its%20associations%20to%20mental%20health%20outcomes%20are%20discussed.%22%2C%22date%22%3A%222022-12%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1080%5C%2F22423982.2022.2130362%22%2C%22ISSN%22%3A%222242-3982%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A38%3A21Z%22%7D%7D%2C%7B%22key%22%3A%228LXJGELR%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Karasavva%20and%20Forth%22%2C%22parsedDate%22%3A%222022-11%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EKarasavva%2C%20V.%2C%20%26amp%3B%20Forth%2C%20A.%20%282022%29.%20Personality%2C%20Attitudinal%2C%20and%20Demographic%20Predictors%20of%20Non-consensual%20Dissemination%20of%20Intimate%20Images.%20%3Ci%3EJournal%20of%20Interpersonal%20Violence%3C%5C%2Fi%3E%2C%20%3Ci%3E37%3C%5C%2Fi%3E%2821%26%23x2013%3B22%29%2C%20NP19265%26%23x2013%3BNP19289.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605211043586%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605211043586%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Personality%2C%20Attitudinal%2C%20and%20Demographic%20Predictors%20of%20Non-consensual%20Dissemination%20of%20Intimate%20Images%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V.%22%2C%22lastName%22%3A%22Karasavva%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22A.%22%2C%22lastName%22%3A%22Forth%22%7D%5D%2C%22abstractNote%22%3A%22Non-consensual%20intimate%20image%20dissemination%20%28NCII%29%2C%20or%20else%20better%20known%20as%20%5C%22revenge%20pornography%5C%22%20is%20a%20form%20of%20technology-facilitated%20sexual%20violence%20that%20can%20have%20devastating%20effects%20on%20the%20victim.%20This%20is%20one%20of%20the%20first%20studies%20examining%20how%20demographic%20characteristics%20%28gender%2C%20sexual%20orientation%29%2C%20personality%20traits%20%28Dark%20Tetrad%29%2C%20and%20attitudes%20%28aggrieved%20entitlement%2C%20sexual%20entitlement%2C%20sexual%20image%20abuse%20myth%20acceptance%29%20predict%20NCII%20perpetration%20and%20victimization.%20In%20a%20sample%20of%20810%20undergraduate%20students%20%2872.7%25%20female%20and%2023.3%25%20male%29%2C%2013.7%25%20of%20the%20participants%20had%20at%20some%20point%20in%20their%20life%2C%20distributed%20nude%2C%20or%20sexual%20pictures%20of%20someone%20else%20without%20consent%20and%2028.5%25%20had%20experienced%20such%20victimization.%20NCII%20perpetration%20was%20predictive%20of%20NCII%20victimization%20and%20vice%20versa.%20Using%20binomial%20logistic%20regression%2C%20we%20found%20that%20women%2C%20members%20of%20the%20LGBQ%2B%20community%2C%20those%20scoring%20higher%20in%20sadism%2C%20and%20participants%20with%20a%20history%20of%20NCII%20perpetration%20were%20more%20likely%20to%20report%20that%20someone%20had%20distributed%20their%20nude%20or%20sexual%20image%20without%20consent.%20Further%2C%20we%20found%20that%20those%20scoring%20higher%20in%20narcissism%20and%20sadism%2C%20along%20with%20those%20with%20a%20history%20of%20NCII%20victimization%20were%20more%20likely%20to%20report%20they%20had%20distributed%20the%20nude%20or%20sexual%20image%20of%20someone%20else%20without%20consent.%20Finally%2C%20the%20findings%20suggest%20that%20the%20relationship%20between%20victims%20and%20perpetrators%20is%20quite%20a%20bit%20more%20varied%20than%20the%20term%20%5C%22revenge%20pornography%5C%22%20implies.%22%2C%22date%22%3A%222022-11%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F08862605211043586%22%2C%22ISSN%22%3A%221552-6518%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A15%3A34Z%22%7D%7D%2C%7B%22key%22%3A%22RZSKMKHF%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Chan%22%2C%22parsedDate%22%3A%222022-10-13%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EChan%2C%20E.%20%282022%29.%20Technology-Facilitated%20Gender-Based%20Violence%2C%20Hate%20Speech%2C%20and%20Terrorism%3A%20A%20Risk%20Assessment%20on%20the%20Rise%20of%20the%20Incel%20Rebellion%20in%20Canada.%20%3Ci%3EViolence%20Against%20Women%3C%5C%2Fi%3E%2C%2010778012221125496.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012221125495%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012221125495%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-Facilitated%20Gender-Based%20Violence%2C%20Hate%20Speech%2C%20and%20Terrorism%3A%20A%20Risk%20Assessment%20on%20the%20Rise%20of%20the%20Incel%20Rebellion%20in%20Canada%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Esli%22%2C%22lastName%22%3A%22Chan%22%7D%5D%2C%22abstractNote%22%3A%22With%20the%20proliferation%20of%20the%20internet%2C%20emerging%20groups%20such%20as%20the%20men%27s%20rights%20movement%20involuntary%20celibate%20%28incel%29%20community%20have%20new%20ways%20to%20reproduce%20real-world%20harm%20and%20gender-based%20violence%20%28GBV%29%20against%20women.%20This%20study%20conducts%20a%20critical%20discourse%20and%20semantic%20analysis%20of%20the%20incels.co%20webpage%20and%20the%20Alek%20Minassian%20van%20attack%20using%20the%20Violent%20Extremism%20Risk%20Assessment%20and%20the%20Cyber%20Extremism%20Risk%20Assessment%20tool.%20It%20reveals%20that%20Canadian%20violent%20extremism%20frameworks%20minimize%20online%20GBV%20as%20a%20form%20of%20extremism.%20GBV%2C%20which%20extends%20from%20online%20to%20offline%20realities%2C%20is%20not%20captured%20in%20theoretical%20frameworks%20for%20terrorism%20and%20hate%20speech.%22%2C%22date%22%3A%222022-10-13%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F10778012221125495%22%2C%22ISSN%22%3A%221552-8448%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A17%3A37Z%22%7D%7D%2C%7B%22key%22%3A%22T9RERCBT%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Schokkenbroek%20et%20al.%22%2C%22parsedDate%22%3A%222022-08%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ESchokkenbroek%2C%20J.%20M.%2C%20Ouytsel%2C%20J.%20V.%2C%20Hardyns%2C%20W.%2C%20%26amp%3B%20Ponnet%2C%20K.%20%282022%29.%20Adults%26%23x2019%3B%20Online%20and%20Offline%20Psychological%20Intimate%20Partner%20Violence%20Experiences.%20%3Ci%3EJournal%20of%20Interpersonal%20Violence%3C%5C%2Fi%3E%2C%20%3Ci%3E37%3C%5C%2Fi%3E%2815%26%23x2013%3B16%29%2C%20NP14656%26%23x2013%3BNP14671.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605211015217%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605211015217%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Adults%27%20Online%20and%20Offline%20Psychological%20Intimate%20Partner%20Violence%20Experiences%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Janneke%20M.%22%2C%22lastName%22%3A%22Schokkenbroek%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Joris%20Van%22%2C%22lastName%22%3A%22Ouytsel%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Wim%22%2C%22lastName%22%3A%22Hardyns%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Koen%22%2C%22lastName%22%3A%22Ponnet%22%7D%5D%2C%22abstractNote%22%3A%22Digital%20media%20offer%20ample%20possibilities%20for%20individuals%20to%20control%20and%20monitor%20their%20dating%20or%20romantic%20partner%20and%20to%20make%20hurtful%20comments.%20Although%20online%20psychological%20intimate%20partner%20violence%20has%20received%20increased%20research%20attention%20over%20the%20past%20few%20years%2C%20much%20remains%20unknown%20about%20its%20nature%20and%20its%20association%20with%20offline%20psychological%20intimate%20partner%20violence%2C%20especially%20among%20the%20adult%20population.%20Previous%20research%20remains%20inconclusive%20regarding%20the%20gendered%20nature%20of%20online%20intimate%20partner%20violence%2C%20and%20differences%20among%20various%20age%20groups%20have%20yet%20to%20be%20examined.%20The%20present%20study%20is%20intended%20to%20address%20these%20gaps%20in%20the%20literature%20by%20assessing%20the%20co-occurrence%20of%20psychological%20intimate%20partner%20violence%20victimization%20and%20perpetration%2C%20and%20the%20overlap%20between%20offline%20and%20online%20forms%20thereof.%20We%20conducted%20a%20large-scale%20survey%20study%20among%20a%20representative%20sample%20of%201%2C587%20adults%20between%20the%20ages%20of%2018%20and%2094%20%28M%20%3D%2048.1%2C%20SD%20%3D%2018.6%29%2C%20of%20which%201%2C144%20%28Mage%20%3D%2047.7%20years%2C%2051.3%25%20female%29%20were%20in%20relationships%20at%20the%20time%20of%20data%20collection%20%282019%29.%20Our%20study%20findings%20indicate%20that%20experiences%20of%20online%20and%20offline%20psychological%20intimate%20partner%20violence%20tend%20to%20co-occur%2C%20as%20do%20victimization%20and%20perpetration%20experiences.%20Furthermore%2C%20we%20found%20that%20men%20were%20more%20often%20victims%20of%20both%20online%20and%20offline%20psychological%20partner%20violence%20than%20women%2C%20and%20women%20were%20more%20often%20perpetrators%20of%20both%20forms%20of%20psychological%20intimate%20partner%20violence%20than%20men.%20Younger%20age%20groups%20reported%20more%20victimization%20and%20perpetration%20of%20online%20and%20offline%20psychological%20intimate%20partner%20violence%20than%20older%20respondents.%20The%20results%20of%20our%20study%20underscore%20the%20need%20for%20age-appropriate%20intimate%20partner%20violence%20prevention.%22%2C%22date%22%3A%222022-08%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F08862605211015217%22%2C%22ISSN%22%3A%221552-6518%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A39%3A04Z%22%7D%7D%2C%7B%22key%22%3A%22XN8T2FHY%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Alsawalqa%20and%20Alrawashdeh%22%2C%22parsedDate%22%3A%222022-06%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EAlsawalqa%2C%20R.%20O.%2C%20%26amp%3B%20Alrawashdeh%2C%20M.%20N.%20%282022%29.%20The%20role%20of%20patriarchal%20structure%20and%20gender%20stereotypes%20in%20cyber%20dating%20abuse%3A%20A%20qualitative%20examination%20of%20male%20perpetrators%20experiences.%20%3Ci%3EThe%20British%20Journal%20of%20Sociology%3C%5C%2Fi%3E%2C%20%3Ci%3E73%3C%5C%2Fi%3E%283%29%2C%20587%26%23x2013%3B606.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1111%5C%2F1468-4446.12946%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1111%5C%2F1468-4446.12946%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22The%20role%20of%20patriarchal%20structure%20and%20gender%20stereotypes%20in%20cyber%20dating%20abuse%3A%20A%20qualitative%20examination%20of%20male%20perpetrators%20experiences%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rula%20Odeh%22%2C%22lastName%22%3A%22Alsawalqa%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Maissa%20N.%22%2C%22lastName%22%3A%22Alrawashdeh%22%7D%5D%2C%22abstractNote%22%3A%22In%20Jordan%2C%20premarital%20romantic%20relationships%20are%20still%20socially%20unacceptable%20as%20they%20contradict%20traditional%20values%20and%20norms.%20Although%20previous%20studies%20have%20examined%20cyber%20dating%20abuse%20%28CDA%29%2C%20few%20have%20utilized%20an%20exploratory%20qualitative%20design%20to%20clarify%20male%20abusers%27%20perceptions%20of%20their%20motivations%2C%20particularly%20in%20Arabic%20and%20clan%20environments.%20Therefore%2C%20this%20study%20conducted%20a%20thematic%20qualitative%20analysis%20of%2047%20male%20university%20students%20aged%2019-26%20and%20asked%20about%20their%20experiences%20and%20beliefs%20regarding%20their%20engagement%20in%20CDA%20against%20female%20romantic%20partners%20via%20social%20media%20%28WhatsApp%2C%20Facebook%29%20and%20mobile%20phone.%20Two%20themes%20were%20identified%3A%20%281%29%20contexts%20and%20motivations%20for%20male%20perpetration%20of%20CDA%20%282%29%20consequences%20of%20CDA%20for%20the%20male%20perpetrators.%20The%20results%20revealed%20that%20control%20and%20direct%20aggression%20and%20sexual%20behaviors%20are%20common%20practices%20among%20male%20perpetrators%3B%20gender%20identity%20and%20male%20entitlement%20are%20related%20factors%2C%20enabling%20and%20normalizing%20male%20abusive%20behavior.%20Women%2C%20taught%20to%20be%20submissive%20by%20Jordanian%20society%2C%20are%20unable%20to%20defend%20themselves.%20Hence%2C%20CDA%20also%20predicts%20offline%20intimate%20partner%20violence-related%20behaviors.%20Moreover%2C%20the%20main%20motives%20for%20CDA%20from%20the%20perspective%20of%20male%20perpetrators%20are%20anger%2C%20jealousy%2C%20revenge%2C%20abandonment%2C%20feeling%20betrayed%20by%20female%20partners%2C%20earning%20money%2C%20sexual%20exploitation%2C%20and%20incitement%20by%20another%20woman.%20The%20results%20suggest%20that%20engaging%20in%20CDA%20behaviors%20can%20negatively%20impact%20perpetrators%27%20physical%20and%20psychological%20health%20as%20well%20as%20their%20social%20and%20academic%20behaviors.%20These%20results%20confirm%20that%20efforts%20to%20reduce%20CDA%20that%20may%20lead%20to%20domestic%20violence%20against%20women%20must%20address%20the%20social%20pressures%20and%20context%20of%20violence%2C%20including%20masculinity%20and%20patriarchal%20domination.%22%2C%22date%22%3A%222022-06%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1111%5C%2F1468-4446.12946%22%2C%22ISSN%22%3A%221468-4446%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%2C%22TZRYS8I8%22%5D%2C%22dateModified%22%3A%222023-09-12T12%3A08%3A04Z%22%7D%7D%2C%7B%22key%22%3A%228GC5TDR6%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Champion%20et%20al.%22%2C%22parsedDate%22%3A%222022-04%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EChampion%2C%20A.%20R.%2C%20Oswald%2C%20F.%2C%20Khera%2C%20D.%2C%20%26amp%3B%20Pedersen%2C%20C.%20L.%20%282022%29.%20Examining%20the%20Gendered%20Impacts%20of%20Technology-Facilitated%20Sexual%20Violence%3A%20A%20Mixed%20Methods%20Approach.%20%3Ci%3EArchives%20of%20Sexual%20Behavior%3C%5C%2Fi%3E%2C%20%3Ci%3E51%3C%5C%2Fi%3E%283%29%2C%201607%26%23x2013%3B1624.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs10508-021-02226-y%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs10508-021-02226-y%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Examining%20the%20Gendered%20Impacts%20of%20Technology-Facilitated%20Sexual%20Violence%3A%20A%20Mixed%20Methods%20Approach%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Amanda%20R.%22%2C%22lastName%22%3A%22Champion%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Flora%22%2C%22lastName%22%3A%22Oswald%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Devinder%22%2C%22lastName%22%3A%22Khera%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cory%20L.%22%2C%22lastName%22%3A%22Pedersen%22%7D%5D%2C%22abstractNote%22%3A%22Technology-facilitated%20sexual%20violence%20%28TFSV%29%20is%20defined%20broadly%20as%20unwanted%20or%20unwelcome%20sexual%20behavior%20involving%20the%20use%20of%20technology%2C%20including%20online%20sexual%20harassment%2C%20online%20gender%20or%20sexuality-based%20harassment%2C%20online%20image-based%20abuse%20%28colloquially%20known%20as%20%5C%22revenge%20porn%5C%22%29%2C%20and%20online%20sexual%20aggression%5C%2Fcoercion%20%28colloquially%20known%20as%20%5C%22sextortion%5C%22%29.%20The%20purpose%20of%20this%20study%20was%20to%20explore%20the%20victim%20impact%20of%20TFSV%20and%20to%20critically%20examine%20the%20positioning%20of%20TFSV%20as%20a%20gender-based%20harm%3B%20that%20is%2C%20a%20harm%20directed%20primarily%20towards%20women.%20This%20study%20employed%20a%20mixed%20methods%20approach%2C%20integrating%20quantitative%20online%20survey%20data%20%28N%5Cu2009%3D%5Cu2009333%3B%20Mage%5Cu2009%3D%5Cu200933.91%5Cu00a0years%3B%2063%25%20women%29%20with%20qualitative%20interview%20data%20%28N%5Cu2009%3D%5Cu200910%3B%20Agerange%5Cu2009%3D%5Cu200924-46%3B%2050%25%20women%29%20to%20gain%20a%20more%20comprehensive%20understanding%20of%20TFSV.%20We%20found%20that%20victims%20of%20TFSV%20experienced%20anxiety%2C%20stress%2C%20depression%2C%20loss%20of%20control%2C%20mistrust%2C%20multiple%20victimizations%2C%20poor%20academic%5C%2Foccupation%20functioning%2C%20problematic%20alcohol%20consumption%2C%20embarrassment%2C%20and%20online%20behavior%20changes%20%28e.g.%2C%20limiting%20personal%20information%20online%29%20due%20to%20TFSV%20victimization.%20Individuals%20who%20experienced%20online%20image-based%20abuse%20reported%20greater%20distress%20on%20items%20of%20depression%2C%20anxiety%2C%20and%20occupational%5C%2Facademic%20functioning%20than%20did%20victims%20of%20other%20types%20of%20TFSV.%20The%20current%20study%20provides%20partial%20support%20for%20the%20gender%20similarities%20hypothesis%20that%20TFSV%20is%20not%20exclusively%20a%20gender-based%20harm%3B%20our%20findings%20suggest%20that%20women%20and%20men%27s%20TFSV%20experiences%20are%20similar%20for%20most%20TFSV%20types.%20Overall%2C%20the%20present%20study%20demonstrates%20the%20negative%20impact%20TFSV%20has%20for%20both%20women%20and%20men%20and%20highlights%20the%20need%20for%20greater%20awareness%20and%20increased%20support%20for%20all%20victims%20of%20this%20form%20of%20sexual%20violence.%22%2C%22date%22%3A%222022-04%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1007%5C%2Fs10508-021-02226-y%22%2C%22ISSN%22%3A%221573-2800%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A10%3A46Z%22%7D%7D%2C%7B%22key%22%3A%22BNXUDIPP%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Lim%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ELim%2C%20S.%20%282022%29.%20%3Ci%3EThe%20Hidden%20Codes%20that%20Shape%20Our%20Expression%3A%20Understanding%20How%20Social%20Media%20Algorithms%20Obstruct%20Feminist%20Expression%20and%20How%20Malaysian%20Women%20Navigate%20the%20Challenges%3C%5C%2Fi%3E.%20KRYSS%20Network.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Ffirn.genderit.org%5C%2Fresearch%5C%2Fhidden-codes-shape-our-expression-understanding-how-social-media-algorithms-obstruct%27%3Ehttps%3A%5C%2F%5C%2Ffirn.genderit.org%5C%2Fresearch%5C%2Fhidden-codes-shape-our-expression-understanding-how-social-media-algorithms-obstruct%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22The%20Hidden%20Codes%20that%20Shape%20Our%20Expression%3A%20Understanding%20How%20Social%20Media%20Algorithms%20Obstruct%20Feminist%20Expression%20and%20How%20Malaysian%20Women%20Navigate%20the%20Challenges%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Serene%22%2C%22lastName%22%3A%22Lim%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22KRYSS%20Network%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Ffirn.genderit.org%5C%2Fresearch%5C%2Fhidden-codes-shape-our-expression-understanding-how-social-media-algorithms-obstruct%22%2C%22collections%22%3A%5B%229Z4GDCHW%22%2C%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-09-12T12%3A08%3A27Z%22%7D%7D%2C%7B%22key%22%3A%228VXT6NL8%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Venturini%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EVenturini%2C%20J.%20%282022%29.%20%3Ci%3ETechnology-facilitated%20Gender-based%20Violence%3A%20Rights-based%20Regulation%3C%5C%2Fi%3E.%20UNFPA%20and%20Wilson%20Center.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fresources%5C%2Ftechnology-facilitated-gender-based-violence-rights-based-regulation%27%3Ehttps%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fresources%5C%2Ftechnology-facilitated-gender-based-violence-rights-based-regulation%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Technology-facilitated%20Gender-based%20Violence%3A%20Rights-based%20Regulation%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22J%22%2C%22lastName%22%3A%22Venturini%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22UNFPA%20and%20Wilson%20Center%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fresources%5C%2Ftechnology-facilitated-gender-based-violence-rights-based-regulation%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T10%3A08%3A42Z%22%7D%7D%2C%7B%22key%22%3A%22DRKX9G2N%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Zagloul%20et%20al.%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EZagloul%2C%20N.%20M.%2C%20Farghaly%2C%20R.%20M.%2C%20ELKhatib%2C%20H.%2C%20Issa%2C%20S.%20Y.%2C%20%26amp%3B%20El-Zoghby%2C%20S.%20M.%20%282022%29.%20Technology%20facilitated%20sexual%20violence%3A%20a%20comparative%20study%20between%20working%20and%20non-working%20females%20in%20Egypt%20before%20and%20during%20the%20COVID-19%20pandemic.%20%3Ci%3EEgyptian%20Journal%20of%20Forensic%20Sciences%3C%5C%2Fi%3E%2C%20%3Ci%3E12%3C%5C%2Fi%3E%281%29%2C%2021.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1186%5C%2Fs41935-022-00278-2%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1186%5C%2Fs41935-022-00278-2%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology%20facilitated%20sexual%20violence%3A%20a%20comparative%20study%20between%20working%20and%20non-working%20females%20in%20Egypt%20before%20and%20during%20the%20COVID-19%20pandemic%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nancy%20M.%22%2C%22lastName%22%3A%22Zagloul%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rasha%20M.%22%2C%22lastName%22%3A%22Farghaly%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Hossam%22%2C%22lastName%22%3A%22ELKhatib%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sahar%20Y.%22%2C%22lastName%22%3A%22Issa%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Safaa%20M.%22%2C%22lastName%22%3A%22El-Zoghby%22%7D%5D%2C%22abstractNote%22%3A%22BACKGROUND%3A%20During%20the%20COVID-19%20pandemic%2C%20quarantine%20measures%20policies%20increased%20Internet%20usage%2C%20leading%20to%20technological%20hazards%20as%20technology%20facilitated%20sexual%20violence%20%28TFSV%29.%5CnAIM%3A%20The%20current%20work%20aimed%20to%20assess%20TFSV%20among%20working%20and%20non-working%20Egyptian%20females%20before%20and%20during%20COVID-19.%5CnMETHODS%3A%20The%20current%20work%20is%20a%20cross-sectional%20observational%20comparative%20study%20using%20an%20anonymous%20online%20questionnaire%20distributed%20through%20social%20platforms%20among%20working%20and%20non-working%20Egyptian%20females.%5CnRESULTS%3A%20TFSV%20was%20reported%20by%2050.3%25%20of%20the%20participants%3B%20however%2C%20regarding%20some%20forms%20of%20digital%20sexual%20violence%2C%20there%20was%20a%20significant%20decrease%20during%20COVID-19%20lockdown%20than%20before%20it%2C%20considering%3B%20threatened%20creation%20form%20%287.8%25%2C%2012.0%25%3B%20p%20%3D%200.017%29%3B%20non-consensual%20pornography%20%2831.4%25%2C%2051.9%25%3B%20p%20%3C%200.001%29%20and%20online%20sexual%20harassment%20and%20cyber-stalking%20types%20%2880.9%25%2C%2089.4%25%3B%20p%20%3C%200.001%29.%20Only%2017.3%25%20of%20the%20study%20participants%20knew%20the%20identity%20of%20the%20perpetrator.%20TFSV%20led%206.4%25%20to%20abstain%20from%20social%20media%2C%20and%203.9%25%20reported%20the%20incident%20to%20a%20law%20agency.%5CnCONCLUSIONS%3A%20The%20current%20study%20revealed%20that%20almost%20half%20of%20women%20experienced%20TFSV.%20Although%20time%20spent%20on%20the%20Internet%20by%20the%20whole%20participants%20during%20the%20pandemic%20was%20significantly%20higher%20than%20before%2C%20there%20was%20a%20significant%20decrease%20in%20some%20types%20of%20TFSV.%20The%20current%20study%20revealed%20that%20divorced%20females%20working%20in%20non-governmental%20sectors%20experienced%20harassment%20more%20significantly%20than%20others.%20There%20is%20crucial%20importance%20to%20set%20laws%20and%20penalties%20against%20perpetrators%20of%20TFSV%20to%20provide%20a%20safe%20technological%20environment%20for%20women.%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1186%5C%2Fs41935-022-00278-2%22%2C%22ISSN%22%3A%222090-536X%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A11%3A26Z%22%7D%7D%2C%7B%22key%22%3A%22SZXVN9CP%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Paudel%20and%20Shakya%22%2C%22parsedDate%22%3A%222021-12-01%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EPaudel%2C%20S.%2C%20%26amp%3B%20Shakya%2C%20S.%20%282021%2C%20December%201%29.%20Detection%20of%20online%20intimate%20partner%20violence%20in%20Nepali%20using%20artificial%20intelligence.%20%3Ci%3ESVRI%20Blog%3C%5C%2Fi%3E.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.svri.org%5C%2Fdetection-of-online-intimate-partner-violence-in-nepali-using-artificial-intelligence%5C%2F%27%3Ehttps%3A%5C%2F%5C%2Fwww.svri.org%5C%2Fdetection-of-online-intimate-partner-violence-in-nepali-using-artificial-intelligence%5C%2F%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22blogPost%22%2C%22title%22%3A%22Detection%20of%20online%20intimate%20partner%20violence%20in%20Nepali%20using%20artificial%20intelligence%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shreyasha%22%2C%22lastName%22%3A%22Paudel%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sagun%22%2C%22lastName%22%3A%22Shakya%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22blogTitle%22%3A%22SVRI%20Blog%22%2C%22date%22%3A%221%20December%202021%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.svri.org%5C%2Fdetection-of-online-intimate-partner-violence-in-nepali-using-artificial-intelligence%5C%2F%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%22SZUTGAHM%22%2C%22TKGUKPZ6%22%2C%2246NU5RU8%22%2C%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222024-05-20T09%3A55%3A08Z%22%7D%7D%2C%7B%22key%22%3A%22RHPXKWWE%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Walker%20et%20al.%22%2C%22parsedDate%22%3A%222021-09%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EWalker%2C%20K.%2C%20Sleath%2C%20E.%2C%20Hatcher%2C%20R.%20M.%2C%20Hine%2C%20B.%2C%20%26amp%3B%20Crookes%2C%20R.%20L.%20%282021%29.%20Nonconsensual%20Sharing%20of%20Private%20Sexually%20Explicit%20Media%20Among%20University%20Students.%20%3Ci%3EJournal%20of%20Interpersonal%20Violence%3C%5C%2Fi%3E%2C%20%3Ci%3E36%3C%5C%2Fi%3E%2817%26%23x2013%3B18%29%2C%20NP9078%26%23x2013%3BNP9108.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F0886260519853414%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F0886260519853414%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Nonconsensual%20Sharing%20of%20Private%20Sexually%20Explicit%20Media%20Among%20University%20Students%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kate%22%2C%22lastName%22%3A%22Walker%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Emma%22%2C%22lastName%22%3A%22Sleath%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ruth%20M.%22%2C%22lastName%22%3A%22Hatcher%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Benjamin%22%2C%22lastName%22%3A%22Hine%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rebecca%20L.%22%2C%22lastName%22%3A%22Crookes%22%7D%5D%2C%22abstractNote%22%3A%22This%20research%20was%20the%20first%20in%20the%20United%20Kingdom%20to%20examine%20the%20prevalence%20and%20nature%20of%20nonconsensual%20sharing%20of%20sexually%20explicit%20messages%2C%20pictures%2C%20and%20videos%20and%20to%20examine%20whether%20this%20varies%20according%20to%20gender%20and%20by%20role%20%28i.e.%2C%20perpetrator%2C%20victim%2C%20or%20as%20dual%20role%20of%20perpetrator%5C%2Fvictim%29.%20In%20a%20sample%20of%20391%20young%20adults%20%28aged%2018-25%20years%29%2C%20questionnaire%20data%20on%20subjective%20norms%2C%20consensual%20and%20nonconsensual%20sharing%2C%20and%20their%20motivations%20for%20these%20behaviors%20were%20collected.%20Perpetration%20of%20and%20victimization%20through%20nonconsensual%20sharing%20was%20experienced%20by%20a%20substantial%20number%20of%20individuals.%20There%20was%20an%20association%20between%20reporting%20perpetration%20of%20nonconsensual%20sharing%20and%20experiencing%20victimization.%20An%20association%20was%20also%20found%20between%20reporting%20being%20pressured%20%28i.e.%2C%20coerced%29%20to%20send%20sexually%20explicit%20material%20and%20experiencing%20victimization%20of%20nonconsensual%20sharing%2C%20which%20suggests%20that%20these%20behaviors%20may%20form%20part%20of%20a%20continuum%20of%20violence%20and%20abuse%2C%20potentially%20within%20intimate%20relationships.%20No%20association%20was%20found%20between%20gender%20and%20%28a%29%20perpetration%20or%20%28b%29%20victimization.%20However%2C%20from%20a%20gendered%20perspective%2C%20females%20perceived%20there%20was%20greater%20social%20pressure%20to%20post%20messages%2C%20pictures%2C%20and%20videos%2C%20compared%20with%20males.%20Motivations%20for%20nonconsensual%20sharing%20were%20commonly%20explained%20as%20for%20fun%5C%2Fa%20joke%2C%20and%20generally%20not%20thought%20of%20as%20problematic%2C%20although%20some%20victims%20perceived%20motivations%20to%20be%20more%20negative%20and%5C%2For%20related%20to%20revenge%5C%2Fcausing%20distress.%20Given%20that%20this%20research%20examined%20nonconsensual%20sharing%20across%20messages%2C%20pictures%2C%20and%20videos%20for%20both%20victimization%20and%20perpetration%20and%20found%20it%20was%20both%20perpetrated%20and%20experienced%20by%20females%20and%20males%2C%20this%20does%20not%20support%20the%20common%20perception%20that%20this%20is%20a%20male%20perpetrated%20behavior%20against%20women.%20This%20has%20implications%20for%20education%2C%20policy%2C%20intervention%2C%20and%20prevention%2C%20with%20approaches%20needing%20to%20be%20inclusive%20of%20both%20males%20and%20females%20when%20addressing%20perpetration%20and%20victimization.%22%2C%22date%22%3A%222021-09%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F0886260519853414%22%2C%22ISSN%22%3A%221552-6518%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A15%3A55Z%22%7D%7D%2C%7B%22key%22%3A%22GDCS7DCC%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Williams%20et%20al.%22%2C%22parsedDate%22%3A%222021-08%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EWilliams%2C%20D.%20J.%2C%20Arntfield%2C%20M.%2C%20Schaal%2C%20K.%2C%20%26amp%3B%20Vincent%2C%20J.%20%282021%29.%20Wanting%20sex%20and%20willing%20to%20kill%3A%20Examining%20demographic%20and%20cognitive%20characteristics%20of%20violent%20%26%23x201C%3Binvoluntary%20celibates.%26%23x201D%3B%20%3Ci%3EBehavioral%20Sciences%20%26amp%3B%20the%20Law%3C%5C%2Fi%3E%2C%20%3Ci%3E39%3C%5C%2Fi%3E%284%29%2C%20386%26%23x2013%3B401.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1002%5C%2Fbsl.2512%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1002%5C%2Fbsl.2512%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Wanting%20sex%20and%20willing%20to%20kill%3A%20Examining%20demographic%20and%20cognitive%20characteristics%20of%20violent%20%5C%22involuntary%20celibates%5C%22%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22D.%20J.%22%2C%22lastName%22%3A%22Williams%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michael%22%2C%22lastName%22%3A%22Arntfield%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kaleigh%22%2C%22lastName%22%3A%22Schaal%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jolene%22%2C%22lastName%22%3A%22Vincent%22%7D%5D%2C%22abstractNote%22%3A%22Over%20the%20past%20several%20years%2C%20an%20online%20community%20of%20self-described%20%5C%22incels%2C%5C%22%20referring%20to%20involuntary%20celibates%2C%20has%20emerged%20and%20gained%20increased%20public%20attention.%20Central%20to%20the%20guiding%20incel%20ideology%20and%20master%20narrative%20are%20violent%20misogynistic%20beliefs%20and%20an%20attitude%20of%20entitlement%2C%20based%20on%20male%20gender%20and%20social%20positioning%2C%20with%20respect%20to%20obtaining%20desired%20and%20often%20illusory%20sexual%20experiences.%20While%20violence%20and%20hate%20speech%20within%20the%20incel%20community%20are%20both%20common%2C%20there%20exists%20a%20notable%20subset%20of%20incels%20who%20have%20been%20willing%20to%20act%20on%20those%20violent%20beliefs%20through%20the%20commission%20of%20acts%20of%20multiple%20murder.%20This%20study%20explores%20the%20demographic%2C%20cognitive%2C%20and%20other%20characteristics%20of%20seven%20self-identified%20incels%20who%20have%20attempted%20and%5C%2For%20successfully%20completed%20homicide.%20The%20findings%20suggest%20that%20although%20self-perceptions%20tend%20to%20reflect%20either%20grandiosity%20or%20self-deprecation%2C%20homicidal%20incels%20share%20similar%20demographic%20characteristics%20and%20dense%20common%20clusters%20of%20neutralization%20techniques%2C%20cognitive%20distortions%2C%20and%20criminal%20thinking%20errors.%22%2C%22date%22%3A%222021-08%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1002%5C%2Fbsl.2512%22%2C%22ISSN%22%3A%221099-0798%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A18%3A11Z%22%7D%7D%2C%7B%22key%22%3A%229CJ22EQR%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Brown%20and%20Hegarty%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EBrown%2C%20C.%2C%20%26amp%3B%20Hegarty%2C%20K.%20%282021%29.%20Development%20and%20validation%20of%20the%20TAR%20Scale%3A%20A%20measure%20of%20technology-facilitated%20abuse%20in%20relationships.%20%3Ci%3EComputers%20in%20Human%20Behavior%20Reports%3C%5C%2Fi%3E%2C%20%3Ci%3E3%3C%5C%2Fi%3E%2C%20100059.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2Fhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.chbr.2021.100059%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2Fhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.chbr.2021.100059%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Development%20and%20validation%20of%20the%20TAR%20Scale%3A%20A%20measure%20of%20technology-facilitated%20abuse%20in%20relationships%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cynthia%22%2C%22lastName%22%3A%22Brown%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kelsey%22%2C%22lastName%22%3A%22Hegarty%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.chbr.2021.100059%22%2C%22ISSN%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.sciencedirect.com%5C%2Fscience%5C%2Farticle%5C%2Fpii%5C%2FS2451958821000075%3Fvia%253Dihub%22%2C%22collections%22%3A%5B%22P8RG6EUJ%22%2C%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-09-29T12%3A00%3A29Z%22%7D%7D%2C%7B%22key%22%3A%22WBEZDN4W%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Alsawalqa%22%2C%22parsedDate%22%3A%222021%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EAlsawalqa%2C%20R.%20O.%20%282021%29.%20Evaluating%20Female%20Experiences%20of%20Electronic%20Dating%20Violence%20in%20Jordan%3A%20Motivations%2C%20Consequences%2C%20and%20Coping%20Strategies.%20%3Ci%3EFrontiers%20in%20Psychology%3C%5C%2Fi%3E%2C%20%3Ci%3E12%3C%5C%2Fi%3E%2C%20719702.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.3389%5C%2Ffpsyg.2021.719702%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.3389%5C%2Ffpsyg.2021.719702%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Evaluating%20Female%20Experiences%20of%20Electronic%20Dating%20Violence%20in%20Jordan%3A%20Motivations%2C%20Consequences%2C%20and%20Coping%20Strategies%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rula%20Odeh%22%2C%22lastName%22%3A%22Alsawalqa%22%7D%5D%2C%22abstractNote%22%3A%22Gender%20stereotypes%20can%20influence%20electronic%20dating%20violence%20%28EDV%29%20because%20the%20victims%27%20experiences%20with%20abusers%20depict%20crucial%20social%20mechanisms%20concerning%20relational%20dependency%20and%20unequal%20power%20relations%20between%20men%20and%20women%2C%20making%20it%20difficult%20for%20women%20to%20resist%2C%20report%2C%20or%20escape%20cyber%20abuse.%20In%20the%20Arab%20context%2C%20cyber%20abuse%20in%20romantic%20relationships%20has%20not%20been%20sufficiently%20examined.%20This%20study%20investigated%20female%20experiences%20of%20EDV%20through%20a%20qualitative%20exploratory%20descriptive%20approach.%20Participants%20experienced%20several%20short-%20and%20long-term%20negative%20psychological%20and%20emotional%20behavioral%20responses.%20Our%20findings%20validate%20that%20EDV%20heightened%20the%20probability%20of%20intimate%20partner%20violence%20definitively%20via%20psychological%2C%20emotional%2C%20verbal%2C%20and%20physical%20abuse.%20Their%20resistance%20strategies%20differed%20according%20to%20the%20extent%20and%20nature%20of%20the%20abuse.%20None%20of%20the%20participants%20sought%20help%20from%20family%20due%20to%20fear%20of%20being%20killed%20or%20forced%20out%20of%20university%2C%20and%20realizing%20that%20they%20would%20continue%20to%20experience%20multiple%20forms%20of%20abuse.%20Rather%2C%20they%20either%20sought%20help%20from%20female%20professors%20at%20the%20university%20or%20paid%20the%20abuser%20to%20be%20left%20alone.%20Further%2C%20they%20engaged%20in%20protective%20behaviors%20to%20block%20their%20abusive%20partner%27s%20access%20to%20them%2C%20consulted%20an%20Information%20Technology%20expert%2C%20and%20secretly%20requested%20assistance%20from%20the%20police.%20Preference%20for%20controlling%20and%20dominant%20roles%2C%20gaining%20monetary%20benefits%2C%20sexual%20exploitation%2C%20peer%20pressure%2C%20and%20revenge%20and%20anger%20due%20to%20abandonment%20were%20the%20leading%20motivations%20for%20abuse.%20Female%20students%20in%20their%20first%20year%20of%20university%2C%20those%20who%20lived%20in%20a%20disjointed%20family%20environment%2C%20or%20those%20who%20suffered%20abuse%20from%20their%20families%20were%20particularly%20susceptible%20to%20being%20victimized.%20Moreover%2C%20passwords%20shared%20with%20others%20or%20accounts%20left%20open%20on%20others%27%20devices%20also%20enabled%20EDV.%20Hence%2C%20universities%20must%20conduct%20awareness%20sessions%2C%20for%20female%20students%2C%20on%20how%20to%20manage%20emotions%20and%20safe%20communication%20on%20social%20media%20and%20build%20healthy%20friendships%20and%20relationships.%20Curricula%2C%20seminars%2C%20workshops%2C%20and%20courses%20in%20the%20Jordanian%20educational%20sector%20should%20include%20programs%20and%20interventions%20that%20challenge%20perceived%20gender%20norms.%20These%20results%20have%20significant%20practical%20and%20clinical%20implications%20that%20help%20understand%20EDV%20in%20a%20poorly%20understood%20context%20and%20provide%20the%20groundwork%20for%20further%20research%20on%20the%20EDV%20problem%20in%20Jordan%2C%20addressing%20a%20lacuna%20in%20the%20literature%20on%20violence%20against%20Jordanian%20women.%22%2C%22date%22%3A%222021%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.3389%5C%2Ffpsyg.2021.719702%22%2C%22ISSN%22%3A%221664-1078%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A20%3A39Z%22%7D%7D%2C%7B%22key%22%3A%22C5BIEHRB%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rebollo-Catalan%20and%20Mayor-Buzon%22%2C%22parsedDate%22%3A%222020-12%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3ERebollo-Catalan%2C%20A.%2C%20%26amp%3B%20Mayor-Buzon%2C%20V.%20%282020%29.%20Adolescent%20Bystanders%20Witnessing%20Cyber%20Violence%20Against%20Women%20and%20Girls%3A%20What%20They%20Observe%20and%20How%20They%20Respond.%20%3Ci%3EViolence%20Against%20Women%3C%5C%2Fi%3E%2C%20%3Ci%3E26%3C%5C%2Fi%3E%2815%26%23x2013%3B16%29%2C%202024%26%23x2013%3B2040.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F1077801219888025%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F1077801219888025%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Adolescent%20Bystanders%20Witnessing%20Cyber%20Violence%20Against%20Women%20and%20Girls%3A%20What%20They%20Observe%20and%20How%20They%20Respond%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Angeles%22%2C%22lastName%22%3A%22Rebollo-Catalan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Virginia%22%2C%22lastName%22%3A%22Mayor-Buzon%22%7D%5D%2C%22abstractNote%22%3A%22The%20widespread%20use%20of%20social%20networks%20has%20turned%20cyber%20violence%20into%20a%20serious%20problem.%20We%20performed%20a%20survey%20with%201%2C468%20adolescents%20aged%2013-17%20years%20and%20found%20that%20almost%20one%20in%20four%20frequently%20observed%20different%20forms%20of%20cyber%20violence%20against%20women%20and%20girls.%20More%20than%20a%20third%20of%20the%20adolescents%20who%20witnessed%20the%20violence%20did%20nothing%2C%20and%20while%20girls%20gave%20more%20active%20responses%20to%20help%20the%20victim%2C%20both%20girls%20and%20boys%20normalized%20and%20even%20justified%20this%20behavior.%20Our%20findings%20also%20underline%20how%20little%20is%20known%20about%20institutional%20resources%20for%20victims.%20We%20also%20discuss%20the%20implications%20for%20awareness%20and%20prevention.%22%2C%22date%22%3A%222020-12%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F1077801219888025%22%2C%22ISSN%22%3A%221552-8448%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22P8RG6EUJ%22%2C%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-09-12T10%3A51%3A46Z%22%7D%7D%2C%7B%22key%22%3A%227YR7CS8L%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Henry%20et%20al.%22%2C%22parsedDate%22%3A%222020-12%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EHenry%2C%20N.%2C%20Flynn%2C%20A.%2C%20%26amp%3B%20Powell%2C%20A.%20%282020%29.%20Technology-Facilitated%20Domestic%20and%20Sexual%20Violence%3A%20A%20Review.%20%3Ci%3EViolence%20Against%20Women%3C%5C%2Fi%3E%2C%20%3Ci%3E26%3C%5C%2Fi%3E%2815%26%23x2013%3B16%29%2C%201828%26%23x2013%3B1854.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F1077801219875821%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F1077801219875821%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-Facilitated%20Domestic%20and%20Sexual%20Violence%3A%20A%20Review%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nicola%22%2C%22lastName%22%3A%22Henry%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Asher%22%2C%22lastName%22%3A%22Flynn%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Anastasia%22%2C%22lastName%22%3A%22Powell%22%7D%5D%2C%22abstractNote%22%3A%22This%20article%20investigates%20the%20phenomenon%20of%20domestic%20and%20sexual%20violence%20against%20adult%20women%20using%20digital%20communications%20technologies.%20The%20article%20explores%20terminological%20and%20conceptual%20challenges%20and%20describes%20the%20empirical%20research%20literature%20in%20this%20field%20to%20date%20in%20relation%20to%20digital%20dating%20abuse%2C%20intimate%20partner%20cyberstalking%2C%20technology-facilitated%20sexual%20assault%2C%20image-based%20sexual%20abuse%2C%20and%20online%20sexual%20harassment.%20The%20article%20also%20discusses%20policy%20and%20practice%20responses%20to%20this%20growing%20problem%2C%20as%20well%20as%20future%20directions%20for%20research.%20We%20argue%20that%20research%20and%20practice%20need%20to%20be%20guided%20by%20existing%20conceptual%20frameworks%20that%20utilize%20gender%20and%20actor-network%20theory%20to%20understanding%20the%20causes%20and%20consequences%20of%20women%27s%20experiences%20of%20abuse%20and%20violence%20facilitated%20by%20digital%20technologies.%22%2C%22date%22%3A%222020-12%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F1077801219875821%22%2C%22ISSN%22%3A%221552-8448%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A10%3A56Z%22%7D%7D%2C%7B%22key%22%3A%22DACL47RN%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Reed%20et%20al.%22%2C%22parsedDate%22%3A%222020-10%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EReed%2C%20E.%2C%20Wong%2C%20A.%2C%20%26amp%3B%20Raj%2C%20A.%20%282020%29.%20Cyber%20Sexual%20Harassment%3A%20A%20Summary%20of%20Current%20Measures%20and%20Implications%20for%20Future%20Research.%20%3Ci%3EViolence%20Against%20Women%3C%5C%2Fi%3E%2C%20%3Ci%3E26%3C%5C%2Fi%3E%2812%26%23x2013%3B13%29%2C%201727%26%23x2013%3B1740.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F1077801219880959%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F1077801219880959%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cyber%20Sexual%20Harassment%3A%20A%20Summary%20of%20Current%20Measures%20and%20Implications%20for%20Future%20Research%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Elizabeth%22%2C%22lastName%22%3A%22Reed%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alice%22%2C%22lastName%22%3A%22Wong%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Anita%22%2C%22lastName%22%3A%22Raj%22%7D%5D%2C%22abstractNote%22%3A%22Researchers%20have%20described%20cyber%20sexual%20harassment%20%28CSH%29%20as%20a%20range%20of%20sexually%20aggressive%20or%20harassing%20images%20or%20texts%20delivered%20through%20the%20use%20of%20digital%20mediums.%20CSH%20occurs%20in%20high%20proportions%20particularly%20among%20young%20populations%2C%20but%20the%20prevalence%20varies%20substantially%20across%20studies%2C%20largely%20due%20to%20variation%20in%20measures%20used%20and%20types%20of%20behaviors%20assessed.%20We%20describe%20the%20prevalence%20of%20CSH%20by%20types%20of%20CSH%20assessed%2C%20identify%20the%20measures%20used%20in%20previous%20research%2C%20and%20provide%20recommendations%20for%20future%20assessment.%20Future%20research%20is%20needed%20to%20ensure%20consistent%20and%20comprehensive%20measures%20that%20accurately%20capture%20CSH%20to%20assess%20prevalence%20and%20consequences.%22%2C%22date%22%3A%222020-10%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F1077801219880959%22%2C%22ISSN%22%3A%221552-8448%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%22P8RG6EUJ%22%2C%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-09-19T13%3A15%3A45Z%22%7D%7D%2C%7B%22key%22%3A%22F9R3AVXP%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hill%20and%20Johnson%22%2C%22parsedDate%22%3A%222020-10%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EHill%2C%20C.%2C%20%26amp%3B%20Johnson%2C%20H.%20%282020%29.%20Online%20Interpersonal%20Victimization%20as%20a%20Mechanism%20of%20Social%20Control%20of%20Women%3A%20An%20Empirical%20Examination.%20%3Ci%3EViolence%20Against%20Women%3C%5C%2Fi%3E%2C%20%3Ci%3E26%3C%5C%2Fi%3E%2812%26%23x2013%3B13%29%2C%201681%26%23x2013%3B1700.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F1077801219870608%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F1077801219870608%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Online%20Interpersonal%20Victimization%20as%20a%20Mechanism%20of%20Social%20Control%20of%20Women%3A%20An%20Empirical%20Examination%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cassandra%22%2C%22lastName%22%3A%22Hill%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Holly%22%2C%22lastName%22%3A%22Johnson%22%7D%5D%2C%22abstractNote%22%3A%22Cyber%20space%20is%20an%20ever-expanding%20mode%20of%20perpetrating%20sexualized%20violence%20toward%20women.%20This%20article%20empirically%20examines%20the%20applicability%20of%20Susan%20Brownmiller%27s%20adaptation%20of%20the%20theory%20of%20social%20control%20to%20online%20interpersonal%20victimization%20%28OIV%29%20against%20women.%20Multiple%20regression%20analysis%20identified%20predictors%20of%20behaviors%20indicative%20of%20social%20control%20among%20a%20Canadian%20sample.%20Findings%20suggest%20that%20the%20theory%20of%20social%20control%2C%20which%20has%20been%20applied%20to%20violence%20against%20women%20in%20physical%20space%2C%20is%20applicable%20to%20OIV.%20This%20study%20also%20provides%20insights%20into%20the%20separate%20and%20compound%20effects%20of%20physical%20space%20and%20cyber%20space%20victimizations%20on%20women%20and%20identifies%20implications%20for%20improving%20methods%20and%20building%20theories%20for%20addressing%20violence%20against%20women%20in%20cyber%20space.%22%2C%22date%22%3A%222020-10%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F1077801219870608%22%2C%22ISSN%22%3A%221552-8448%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A20%3A16Z%22%7D%7D%2C%7B%22key%22%3A%22C5BATTCK%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kardefelt-Winther%20and%20Maternowska%22%2C%22parsedDate%22%3A%222020-03%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EKardefelt-Winther%2C%20D.%2C%20%26amp%3B%20Maternowska%2C%20C.%20%282020%29.%20Addressing%20violence%20against%20children%20online%20and%20offline.%20%3Ci%3ENature%20Human%20Behaviour%3C%5C%2Fi%3E%2C%20%3Ci%3E4%3C%5C%2Fi%3E%283%29%2C%20227%26%23x2013%3B230.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1038%5C%2Fs41562-019-0791-3%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1038%5C%2Fs41562-019-0791-3%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Addressing%20violence%20against%20children%20online%20and%20offline%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Daniel%22%2C%22lastName%22%3A%22Kardefelt-Winther%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Catherine%22%2C%22lastName%22%3A%22Maternowska%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222020-03%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1038%5C%2Fs41562-019-0791-3%22%2C%22ISSN%22%3A%222397-3374%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A39%3A15Z%22%7D%7D%2C%7B%22key%22%3A%22URP4JQXM%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Powell%20and%20Henry%22%2C%22parsedDate%22%3A%222019-09%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EPowell%2C%20A.%2C%20%26amp%3B%20Henry%2C%20N.%20%282019%29.%20Technology-Facilitated%20Sexual%20Violence%20Victimization%3A%20Results%20From%20an%20Online%20Survey%20of%20Australian%20Adults.%20%3Ci%3EJournal%20of%20Interpersonal%20Violence%3C%5C%2Fi%3E%2C%20%3Ci%3E34%3C%5C%2Fi%3E%2817%29%2C%203637%26%23x2013%3B3665.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F0886260516672055%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F0886260516672055%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-Facilitated%20Sexual%20Violence%20Victimization%3A%20Results%20From%20an%20Online%20Survey%20of%20Australian%20Adults%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Anastasia%22%2C%22lastName%22%3A%22Powell%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nicola%22%2C%22lastName%22%3A%22Henry%22%7D%5D%2C%22abstractNote%22%3A%22Online%20forms%20of%20sexual%20harassment%20and%20abuse%20as%20experienced%20by%20adults%20represent%20an%20emerging%20yet%20under-researched%20set%20of%20behaviors%2C%20such%20that%20very%20few%20studies%20have%20sought%20to%20estimate%20the%20extent%20of%20the%20problem.%20This%20article%20presents%20the%20results%20of%20an%20online%20survey%20of%202%2C956%20Australian%20adult%20%28aged%2018%20to%2054%20years%29%20experiences%20of%20technology-facilitated%20sexual%20violence%20%28TFSV%29%20victimization.%20The%20prevalence%20of%20TFSV%20was%20analyzed%20in%20relation%20to%20a%2021-item%20scale%20developed%20in%20accordance%20with%20prior%20conceptual%20research%20identifying%20multiple%20dimensions%20of%20TFSV%20including%20digital%20sexual%20harassment%2C%20image-based%20sexual%20abuse%2C%20sexual%20aggression%20and%5C%2For%20coercion%2C%20and%2C%20gender%20and%5C%2For%20sexuality-based%20harassment%20%28including%20virtual%20sexual%20violence%29.%20Results%20revealed%20significant%20differences%20in%20lifetime%20TFSV%20victimization%20for%20younger%20%2818-24%29%20and%20non-heterosexual%20identifying%20adults.%20Lifetime%20TFSV%20victimization%20for%20men%20and%20women%20was%20not%20significantly%20different%2C%20though%20women%20were%20more%20likely%20to%20report%20sexual%20harassment%20victimization%20and%20men%20were%20more%20likely%20to%20report%20victimization%20through%20the%20distribution%20of%20non-consensual%20images%2C%20as%20well%20as%20gender%20and%5C%2For%20sexuality-based%20harassment.%20The%20authors%20conclude%20that%20although%20women%20and%20men%20report%20experiencing%20similar%20overall%20prevalence%20of%20TFSV%20victimization%2C%20the%20nature%20and%20impacts%20of%20those%20experiences%20differ%20in%20particular%20gendered%20ways%20that%20reflect%20broader%20patterns%20in%20both%20gender%20relations%20and%20%5C%22offline%5C%22%20sexual%20harassment.%22%2C%22date%22%3A%222019-09%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F0886260516672055%22%2C%22ISSN%22%3A%221552-6518%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A18%3A52Z%22%7D%7D%2C%7B%22key%22%3A%226HZA5KTP%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hinson%20et%20al.%22%2C%22parsedDate%22%3A%222019%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EHinson%2C%20L.%2C%20O%26%23x2019%3BBrien-Milne%2C%20L.%2C%20Mueller%2C%20J.%2C%20Bansal%2C%20V.%2C%20Wandera%2C%20N.%2C%20%26amp%3B%20Bankar%2C%20S.%20%282019%29.%20%3Ci%3EDefining%20and%20measuring%20technology-facilitated%20gender-based%20violence%3C%5C%2Fi%3E%20%28No.%20Brief%29.%20International%20Center%20for%20Research%20on%20Women.%20%3Ca%20href%3D%27http%3A%5C%2F%5C%2Fwww.svri.org%5C%2Fsites%5C%2Fdefault%5C%2Ffiles%5C%2Fattachments%5C%2F2019-03-25%5C%2FICRW_TFGBVMarketing_Brief_v3_WebReady_0.pdf%27%3Ehttp%3A%5C%2F%5C%2Fwww.svri.org%5C%2Fsites%5C%2Fdefault%5C%2Ffiles%5C%2Fattachments%5C%2F2019-03-25%5C%2FICRW_TFGBVMarketing_Brief_v3_WebReady_0.pdf%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Defining%20and%20measuring%20technology-facilitated%20gender-based%20violence%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22L%22%2C%22lastName%22%3A%22Hinson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22L%22%2C%22lastName%22%3A%22O%5Cu2019Brien-Milne%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22J%22%2C%22lastName%22%3A%22Mueller%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V%22%2C%22lastName%22%3A%22Bansal%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22N%22%2C%22lastName%22%3A%22Wandera%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22S%22%2C%22lastName%22%3A%22Bankar%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22Brief%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22International%20Center%20for%20Research%20on%20Women%22%2C%22date%22%3A%222019%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fwww.svri.org%5C%2Fsites%5C%2Fdefault%5C%2Ffiles%5C%2Fattachments%5C%2F2019-03-25%5C%2FICRW_TFGBVMarketing_Brief_v3_WebReady_0.pdf%22%2C%22collections%22%3A%5B%22C2MDU8RX%22%2C%224HXJCU5U%22%2C%22BZ6TV26U%22%2C%22KQVGJUWE%22%2C%227DF3TGWW%22%2C%22INNKXKUP%22%5D%2C%22dateModified%22%3A%222023-12-05T10%3A25%3A06Z%22%7D%7D%2C%7B%22key%22%3A%22ZJJL75XC%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Reyns%20and%20Fisher%22%2C%22parsedDate%22%3A%222018-08%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EReyns%2C%20B.%20W.%2C%20%26amp%3B%20Fisher%2C%20B.%20S.%20%282018%29.%20The%20Relationship%20Between%20Offline%20and%20Online%20Stalking%20Victimization%3A%20A%20Gender-Specific%20Analysis.%20%3Ci%3EViolence%20and%20Victims%3C%5C%2Fi%3E%2C%20%3Ci%3E33%3C%5C%2Fi%3E%284%29%2C%20769%26%23x2013%3B786.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1891%5C%2F0886-6708.VV-D-17-00121%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1891%5C%2F0886-6708.VV-D-17-00121%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22The%20Relationship%20Between%20Offline%20and%20Online%20Stalking%20Victimization%3A%20A%20Gender-Specific%20Analysis%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Bradford%20W.%22%2C%22lastName%22%3A%22Reyns%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Bonnie%20S.%22%2C%22lastName%22%3A%22Fisher%22%7D%5D%2C%22abstractNote%22%3A%22This%20study%20focuses%20on%20the%20relationship%20between%20online%20and%20offline%20stalking%20through%20a%20gendered%20approach.%20Experiencing%20offline%20stalking%20victimization%20was%20examined%20as%20a%20precursor%20to%20online%20stalking%20victimization%2C%20and%20experiencing%20cyberstalking%20victimization%20was%20investigated%20as%20a%20predictor%20of%20offline%20stalking%20victimization.%20These%20relationships%20also%20were%20tested%20separately%20for%20females%20and%20males%20using%20a%20sample%20of%20college%20students%20%28N%20%3D%203%2C488%29%20from%20two%20large%20universities-one%20in%20the%20Midwest%20and%20one%20in%20the%20South.%20The%20results%20for%20the%20full%20sample%20indicate%20that%20being%20stalked%20offline%20increases%20students%27%20likelihood%20of%20being%20stalked%20online.%20However%2C%20being%20a%20victim%20of%20cyberstalking%20did%20not%20affect%20students%27%20chances%20of%20being%20stalked%20offline.%20In%20the%20gender-specific%20analyses%2C%20findings%20suggest%20that%20females%20who%20are%20cyberstalked%20are%20less%20likely%20to%20be%20successively%20stalked%20offline%2C%20whereas%20males%20who%20are%20cyberstalked%20are%20more%20likely%20to%20be%20stalked%20offline.%20Finally%2C%20offline%20stalking%20victimization%20was%20a%20significant%20predictor%20of%20online%20victimization%20for%20females%2C%20but%20not%20males.%20These%20findings%20suggest%20that%20offline%20and%20online%20forms%20of%20stalking%20victimization%20are%20interrelated%20under%20some%20circumstances%2C%20and%20highlight%20the%20importance%20of%20the%20victim%27s%20gender%20in%20moderating%20this%20relationship.%22%2C%22date%22%3A%222018-08%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1891%5C%2F0886-6708.VV-D-17-00121%22%2C%22ISSN%22%3A%220886-6708%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A40%3A13Z%22%7D%7D%2C%7B%22key%22%3A%22VX5CRYGV%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Henry%20and%20Powell%22%2C%22parsedDate%22%3A%222018-04%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EHenry%2C%20N.%2C%20%26amp%3B%20Powell%2C%20A.%20%282018%29.%20Technology-Facilitated%20Sexual%20Violence%3A%20A%20Literature%20Review%20of%20Empirical%20Research.%20%3Ci%3ETrauma%2C%20Violence%20%26amp%3B%20Abuse%3C%5C%2Fi%3E%2C%20%3Ci%3E19%3C%5C%2Fi%3E%282%29%2C%20195%26%23x2013%3B208.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F1524838016650189%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F1524838016650189%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-Facilitated%20Sexual%20Violence%3A%20A%20Literature%20Review%20of%20Empirical%20Research%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nicola%22%2C%22lastName%22%3A%22Henry%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Anastasia%22%2C%22lastName%22%3A%22Powell%22%7D%5D%2C%22abstractNote%22%3A%22Technology-facilitated%20sexual%20violence%20%28TFSV%29%20refers%20to%20a%20range%20of%20behaviors%20where%20digital%20technologies%20are%20used%20to%20facilitate%20both%20virtual%20and%20face-to-face%20sexually%20based%20harms.%20Such%20behaviors%20include%20online%20sexual%20harassment%2C%20gender-%20and%20sexuality-based%20harassment%2C%20cyberstalking%2C%20image-based%20sexual%20exploitation%2C%20and%20the%20use%20of%20a%20carriage%20service%20to%20coerce%20a%20victim%20into%20an%20unwanted%20sexual%20act.%20This%20article%20reviews%20the%20current%20state%20of%20knowledge%20on%20these%20different%20dimensions%2C%20drawing%20on%20existing%20empirical%20studies.%20While%20there%20is%20a%20growing%20body%20of%20research%20into%20technology-facilitated%20harms%20perpetrated%20against%20children%20and%20adolescents%2C%20there%20is%20a%20dearth%20of%20qualitative%20and%20quantitative%20research%20on%20TFSV%20against%20adults.%20Moreover%2C%20few%20of%20the%20existing%20studies%20provide%20reliable%20data%20on%20the%20nature%2C%20scope%2C%20and%20impacts%20of%20TFSV.%20Preliminary%20studies%2C%20however%2C%20indicate%20that%20some%20harms%2C%20much%20like%20sexual%20violence%20more%20broadly%2C%20may%20be%20predominantly%20gender-%2C%20sexuality-%2C%20and%20age-based%2C%20with%20young%20women%20being%20overrepresented%20as%20victims%20in%20some%20categories.%20This%20review%20collects%20the%20empirical%20evidence%20to%20date%20regarding%20the%20prevalence%20and%20gender-based%20nature%20of%20TFSV%20against%20adults%20and%20discusses%20the%20implications%20for%20policy%20and%20programs%2C%20as%20well%20as%20suggestions%20for%20future%20research.%22%2C%22date%22%3A%222018-04%22%2C%22language%22%3A%22eng%22%2C%22DOI%22%3A%2210.1177%5C%2F1524838016650189%22%2C%22ISSN%22%3A%221552-8324%22%2C%22url%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A02%3A27Z%22%7D%7D%2C%7B%22key%22%3A%226BKNTTPA%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Aghtaie%20et%20al.%22%2C%22parsedDate%22%3A%222018%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EAghtaie%2C%20N.%2C%20Larkins%2C%20C.%2C%20Barte%2C%20C.%2C%20Stanley%2C%20N.%2C%20Wood%2C%20M.%2C%20%26amp%3B%20%26%23xD8%3Bverlien%2C%20C.%20%282018%29.%20Interpersonal%20violence%20and%20abuse%20in%20young%20people%26%23x2019%3Bs%20relationships%20in%20five%20European%20countries%3A%20online%20and%20offline%20normalisation%20of%20heteronormativity.%20%3Ci%3EJournal%20of%20Gender-Based%20Violence%3C%5C%2Fi%3E%2C%20%3Ci%3E2%3C%5C%2Fi%3E%282%29%2C%20293%26%23x2013%3B310.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1332%5C%2F239868018X15263879270302%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1332%5C%2F239868018X15263879270302%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Interpersonal%20violence%20and%20abuse%20in%20young%20people%5Cu2019s%20relationships%20in%20five%20European%20countries%3A%20online%20and%20offline%20normalisation%20of%20heteronormativity%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nadia%22%2C%22lastName%22%3A%22Aghtaie%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cath%22%2C%22lastName%22%3A%22Larkins%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Christine%22%2C%22lastName%22%3A%22Barte%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nicky%22%2C%22lastName%22%3A%22Stanley%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marsha%22%2C%22lastName%22%3A%22Wood%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Carolina%22%2C%22lastName%22%3A%22%5Cu00d8verlien%22%7D%5D%2C%22abstractNote%22%3A%22Qualitative%20interviews%20with%2091%20young%20people%20aged%2013%5Cu201318%20in%20Bulgaria%2C%20Cyprus%2C%20England%2C%20Italy%20and%20Norway%20explored%20their%20experiences%20of%20intimate%20partner%20violence%20and%20abuse%20%28IPVA%29.%20Some%20young%20women%20experienced%20extensive%20offline%20sexual%20pressure%20and%20young%20women%20were%20substantially%20more%20negatively%20affected%20by%20IPVA%20than%20young%20men.%20The%20data%20revealed%20that%20online%20space%20has%20created%20new%20mechanisms%20of%20control%20and%20surveillance%20that%20can%20intensify%20the%20impact%20of%20offline%20abuse.%20Analysing%20the%20data%20in%20the%20light%20of%20existing%20theories%20of%20cultural%20violence%20and%20coercive%20control%2C%20we%20explore%20both%20the%20normalising%20influence%20of%20prevailing%20heteronormative%20models%20of%20femininity%20and%20masculinity%20as%20well%20as%20young%20people%5Cu2019s%20agency%20to%20resist%20such%20normalisation.%22%2C%22date%22%3A%2206%5C%2F2018%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1332%5C%2F239868018X15263879270302%22%2C%22ISSN%22%3A%222398-6808%2C%202398-6816%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fbristoluniversitypressdigital.com%5C%2Fview%5C%2Fjournals%5C%2Fjgbv%5C%2F2%5C%2F2%5C%2Farticle-p293.xml%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A44%3A58Z%22%7D%7D%2C%7B%22key%22%3A%22MVP92VN4%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Brown%20and%20Hegarty%22%2C%22parsedDate%22%3A%222018%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EBrown%2C%20C.%2C%20%26amp%3B%20Hegarty%2C%20K.%20%282018%29.%20Digital%20dating%20abuse%20measures%3A%20A%20critical%20review.%20%3Ci%3EAggression%20and%20Violent%20Behavior%3C%5C%2Fi%3E%2C%20%3Ci%3E40%3C%5C%2Fi%3E%2C%2044%26%23x2013%3B59.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.avb.2018.03.003%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.avb.2018.03.003%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Digital%20dating%20abuse%20measures%3A%20A%20critical%20review%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cynthia%22%2C%22lastName%22%3A%22Brown%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kelsey%22%2C%22lastName%22%3A%22Hegarty%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%2205%5C%2F2018%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1016%5C%2Fj.avb.2018.03.003%22%2C%22ISSN%22%3A%2213591789%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Flinkinghub.elsevier.com%5C%2Fretrieve%5C%2Fpii%5C%2FS1359178917300368%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A46%3A25Z%22%7D%7D%2C%7B%22key%22%3A%229PZFPMD6%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hinson%20et%20al.%22%2C%22parsedDate%22%3A%222018%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3EHinson%2C%20L.%2C%20Mueller%2C%20J.%2C%20O%26%23x2019%3BBrien-Milne%2C%20L.%2C%20%26amp%3B%20Wandera%2C%20N.%20%282018%29.%20%3Ci%3ETechnology-facilitated%20gender-based%20violence%3A%20What%20is%20it%2C%20and%20how%20do%20we%20measure%20it%3F%3C%5C%2Fi%3E%20International%20Center%20for%20Research%20on%20Women.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fwww.icrw.org%5C%2Fpublications%5C%2Ftechnology-facilitated-gender-based-violence-what-is-it-and-how-do-we-measure-it%5C%2F%27%3Ehttps%3A%5C%2F%5C%2Fwww.icrw.org%5C%2Fpublications%5C%2Ftechnology-facilitated-gender-based-violence-what-is-it-and-how-do-we-measure-it%5C%2F%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Technology-facilitated%20gender-based%20violence%3A%20What%20is%20it%2C%20and%20how%20do%20we%20measure%20it%3F%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Laura%22%2C%22lastName%22%3A%22Hinson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jennifer%22%2C%22lastName%22%3A%22Mueller%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22L%22%2C%22lastName%22%3A%22O%27Brien-Milne%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Naome%22%2C%22lastName%22%3A%22Wandera%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22International%20Center%20for%20Research%20on%20Women%22%2C%22date%22%3A%222018%22%2C%22language%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.icrw.org%5C%2Fpublications%5C%2Ftechnology-facilitated-gender-based-violence-what-is-it-and-how-do-we-measure-it%5C%2F%22%2C%22collections%22%3A%5B%227DF3TGWW%22%2C%22P3WB9ASU%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A31%3A10Z%22%7D%7D%2C%7B%22key%22%3A%22TH7EQ9EI%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22%5Cu00c1lvarez-Garc%5Cu00eda%20et%20al.%22%2C%22parsedDate%22%3A%222017%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%3Cdiv%20class%3D%5C%22csl-bib-body%5C%22%20style%3D%5C%22line-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%5C%22%3E%5Cn%20%20%3Cdiv%20class%3D%5C%22csl-entry%5C%22%3E%26%23xC1%3Blvarez-Garc%26%23xED%3Ba%2C%20D.%2C%20N%26%23xFA%3B%26%23xF1%3Bez%2C%20J.%20C.%2C%20Barreiro-Collazo%2C%20A.%2C%20%26amp%3B%20Garc%26%23xED%3Ba%2C%20T.%20%282017%29.%20Validation%20of%20the%20Cybervictimization%20Questionnaire%20%28CYVIC%29%20for%20adolescents.%20%3Ci%3EComputers%20in%20Human%20Behavior%3C%5C%2Fi%3E%2C%20%3Ci%3E70%3C%5C%2Fi%3E%2C%20270%26%23x2013%3B281.%20%3Ca%20href%3D%27https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.chb.2017.01.007%27%3Ehttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.chb.2017.01.007%3C%5C%2Fa%3E%3C%5C%2Fdiv%3E%5Cn%3C%5C%2Fdiv%3E%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Validation%20of%20the%20Cybervictimization%20Questionnaire%20%28CYVIC%29%20for%20adolescents%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22David%22%2C%22lastName%22%3A%22%5Cu00c1lvarez-Garc%5Cu00eda%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jos%5Cu00e9%20Carlos%22%2C%22lastName%22%3A%22N%5Cu00fa%5Cu00f1ez%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alejandra%22%2C%22lastName%22%3A%22Barreiro-Collazo%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Trinidad%22%2C%22lastName%22%3A%22Garc%5Cu00eda%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%2205%5C%2F2017%22%2C%22language%22%3A%22en%22%2C%22DOI%22%3A%2210.1016%5C%2Fj.chb.2017.01.007%22%2C%22ISSN%22%3A%2207475632%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Flinkinghub.elsevier.com%5C%2Fretrieve%5C%2Fpii%5C%2FS0747563217300079%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A56%3A36Z%22%7D%7D%5D%7D
Quayle, E., Larkin, A., Schwannauer, M., Varese, F., Cartwright, K., Chitsabesan, P., Green, V., Radford, G., Richards, C., Shafi, S., Whelan, P., Chan, C., Hewins, W., Newton, A., Niebauer, E., Sandys, M., Ward, J., & Bucci, S. (2024). Experiences of a digital health intervention for young people exposed to technology assisted sexual abuse: a qualitative study. BMC Psychiatry, 24, 237. https://doi.org/10.1186/s12888-024-05605-6
Winkle, K., & Mulvihill, N. (2024). Anticipating the Use of Robots in Domestic Abuse: A Typology of Robot Facilitated Abuse to Support Risk Assessment and Mitigation in Human-Robot Interaction. Proceedings of the 2024 ACM/IEEE International Conference on Human-Robot Interaction, 781–790. https://doi.org/10.1145/3610977.3634938
Jurasz, O. (2024, March). Online violence against women: A Four Nations study [Other]. https://oro.open.ac.uk/96398/
UN Women. (2024). Action Coalitions on Gender Based Violence & Technology and Innovation for Gender Equality: Addressing gaps to prevent and eliminate technology facilitated gender-based violence against women and girls. UN Women. https://forum.generationequality.org/sites/default/files/2024-01/GBV-TechnologyFacilitated_11JAN24.pdf
Equality Now. (2024). Briefing paper: Deepfake image-based sexual abuse, tech-facilitated sexual exploitation and the law. Alliance for Universal Digital Rights. https://equalitynow.storage.googleapis.com/wp-content/uploads/2024/01/17084238/EN-AUDRi-Briefing-paper-deepfake-06.pdf
Sheikh, M. M. R., & Rogers, M. M. (2023). Technology-Facilitated Sexual Violence and Abuse in Low and Middle-Income Countries: A Scoping Review. Trauma, Violence, & Abuse, 15248380231191188. https://doi.org/10.1177/15248380231191189
Douglas, H., Tanczer, L., McLachlan, F., & Harris, B. (2023). Policing Technology-Facilitated Domestic Abuse (TFDA): Views of Service Providers in Australia and the United Kingdom. Journal of Family Violence. https://doi.org/10.1007/s10896-023-00619-2
Halpin, M., Richard, N., Preston, K., Gosse, M., & Maguire, F. (2023). Men who hate women: The misogyny of involuntarily celibate men. New Media & Society, 146144482311767. https://doi.org/10.1177/14614448231176777
Oliver, C., Cummings, S., Puiras, E., & Mazmanian, D. (2023). Technology-Facilitated Sexual Harassment Against Women and Psychological Dysfunction: A Test of Objectification Theory. Violence Against Women, 107780122311779. https://doi.org/10.1177/10778012231177998
Kim, S., Choi, E., & Champion, J. D. (2023). Technology-facilitated Sexual Violence in South Korea: A Content Analysis of a Website for Victims. Violence Against Women, 107780122311727. https://doi.org/10.1177/10778012231172712
Cookson, T. P., Fuentes, L., Zulver, J. M., & Nelson, A. (2023). Fit for purpose? Assessing the accessibility, theory of action, and accountability of digital technology interventions for sexual and gender-based violence prevention and response. Gender, Technology and Development, 27(2), 184–206. https://doi.org/10.1080/09718524.2023.2182035
Afrouz, R. (2023). The Nature, Patterns and Consequences of Technology-Facilitated Domestic Abuse: A Scoping Review. Trauma, Violence & Abuse, 24(2), 913–927. https://doi.org/10.1177/15248380211046752
UNFPA. (2023). Guidance on the Safe and Ethical Use of Technology to Address Gender-based Violence and Harmful Practices: Implementation Summary. UNFPA. https://www.unfpa.org/publications/implementation-summary-safe-ethical-use-technology-gbv-harmful-practices
Bansal, V., Rezwan, M., Iyer, M., Leasure, E., Roth, C., Pal, P., & Hinson, L. (2023). A Scoping Review of Technology-Facilitated Gender-Based Violence in Low- and Middle-Income Countries Across Asia. Trauma, Violence & Abuse, 15248380231154614. https://doi.org/10.1177/15248380231154614
Srivastava, A., Rusow, J., Schrager, S. M., Stephenson, R., & Goldbach, J. T. (2023). Digital Sexual Violence and Suicide Risk in a National Sample of Sexual Minority Adolescents. Journal of Interpersonal Violence, 38(3–4), 4443–4458. https://doi.org/10.1177/08862605221116317
Straw, I., & Tanczer, L. (2023). Safeguarding patients from technology-facilitated abuse in clinical settings: A narrative review. PLOS Digital Health, 2(1), e0000089. https://doi.org/10.1371/journal.pdig.0000089
Sciacca, B., Mazzone, A., Loftsson, M., O’Higgins Norman, J., & Foody, M. (2023). Nonconsensual Dissemination of Sexual Images Among Adolescents: Associations With Depression and Self-Esteem. Journal of Interpersonal Violence, 38(15–16), 9438–9464. https://doi.org/10.1177/08862605231165777
UNFPA, & Wilson Center. (2023). 2022 Global Symposium on Technology-facilitated Gender-based Violence Results: Building a Common Pathway. UNFPA. https://www.unfpa.org/publications/2022-global-symposium-technology-facilitated-gender-based-violence-results-building
UNFPA, Argentine Gender Editors Network, & Defensoría del Público. (2023). El Abordaje Mediático de la Violencia de Género Digital: Claves Para Una Comunicación Responsable. UNFPA. https://argentina.unfpa.org/es/publications/el-abordaje-medi%C3%A1tico-de-la-violencia-de-g%C3%A9nero-digital-claves-para-una-comunicaci%C3%B3n
University of Melbourne, & UNFPA. (2023). Measuring technology-facilitated gender-based violence. A discussion paper. University of Melbourne and UNFPA. https://www.unfpa.org/publications/measuring-technology-facilitated-gender-based-violence-discussion-paper
UN Women, & World Health Organization. (2023). Technology-facilitated violence against women: Taking stock of evidence and data collection. UN Women. https://www.unwomen.org/en/digital-library/publications/2023/04/technology-facilitated-violence-against-women-taking-stock-of-evidence-and-data-collection
UN Women, & World Health Organization. (2023). The state of evidence and data collection on technology-facilitated violence against women. UN Women. https://www.unwomen.org/en/digital-library/publications/2023/04/brief-the-state-of-evidence-and-data-collection-on-technology-facilitated-violence-against-women
Dolev-Cohen, M., Nezer, I., & Zumt, A. A. (2022). A Qualitative Examination of School Counselors’ Experiences of Sextortion Cases of Female Students in Israel. Sexual Abuse, 107906322211459. https://doi.org/10.1177/10790632221145925
Dahlqvist, H., Svensson, Å., & Gillander Gådin, K. (2022). Co-occurrence of online and offline bullying and sexual harassment among youth in Sweden: Implications for studies on victimization and health a short communication. International Journal of Circumpolar Health, 81(1), 2130362. https://doi.org/10.1080/22423982.2022.2130362
Karasavva, V., & Forth, A. (2022). Personality, Attitudinal, and Demographic Predictors of Non-consensual Dissemination of Intimate Images. Journal of Interpersonal Violence, 37(21–22), NP19265–NP19289. https://doi.org/10.1177/08862605211043586
Chan, E. (2022). Technology-Facilitated Gender-Based Violence, Hate Speech, and Terrorism: A Risk Assessment on the Rise of the Incel Rebellion in Canada. Violence Against Women, 10778012221125496. https://doi.org/10.1177/10778012221125495
Schokkenbroek, J. M., Ouytsel, J. V., Hardyns, W., & Ponnet, K. (2022). Adults’ Online and Offline Psychological Intimate Partner Violence Experiences. Journal of Interpersonal Violence, 37(15–16), NP14656–NP14671. https://doi.org/10.1177/08862605211015217
Alsawalqa, R. O., & Alrawashdeh, M. N. (2022). The role of patriarchal structure and gender stereotypes in cyber dating abuse: A qualitative examination of male perpetrators experiences. The British Journal of Sociology, 73(3), 587–606. https://doi.org/10.1111/1468-4446.12946
Champion, A. R., Oswald, F., Khera, D., & Pedersen, C. L. (2022). Examining the Gendered Impacts of Technology-Facilitated Sexual Violence: A Mixed Methods Approach. Archives of Sexual Behavior, 51(3), 1607–1624. https://doi.org/10.1007/s10508-021-02226-y
Lim, S. (2022). The Hidden Codes that Shape Our Expression: Understanding How Social Media Algorithms Obstruct Feminist Expression and How Malaysian Women Navigate the Challenges. KRYSS Network. https://firn.genderit.org/research/hidden-codes-shape-our-expression-understanding-how-social-media-algorithms-obstruct
Venturini, J. (2022). Technology-facilitated Gender-based Violence: Rights-based Regulation. UNFPA and Wilson Center. https://www.unfpa.org/resources/technology-facilitated-gender-based-violence-rights-based-regulation
Zagloul, N. M., Farghaly, R. M., ELKhatib, H., Issa, S. Y., & El-Zoghby, S. M. (2022). Technology facilitated sexual violence: a comparative study between working and non-working females in Egypt before and during the COVID-19 pandemic. Egyptian Journal of Forensic Sciences, 12(1), 21. https://doi.org/10.1186/s41935-022-00278-2
Paudel, S., & Shakya, S. (2021, December 1). Detection of online intimate partner violence in Nepali using artificial intelligence. SVRI Blog. https://www.svri.org/detection-of-online-intimate-partner-violence-in-nepali-using-artificial-intelligence/
Walker, K., Sleath, E., Hatcher, R. M., Hine, B., & Crookes, R. L. (2021). Nonconsensual Sharing of Private Sexually Explicit Media Among University Students. Journal of Interpersonal Violence, 36(17–18), NP9078–NP9108. https://doi.org/10.1177/0886260519853414
Williams, D. J., Arntfield, M., Schaal, K., & Vincent, J. (2021). Wanting sex and willing to kill: Examining demographic and cognitive characteristics of violent “involuntary celibates.” Behavioral Sciences & the Law, 39(4), 386–401. https://doi.org/10.1002/bsl.2512
Brown, C., & Hegarty, K. (2021). Development and validation of the TAR Scale: A measure of technology-facilitated abuse in relationships. Computers in Human Behavior Reports, 3, 100059. https://doi.org/https://doi.org/10.1016/j.chbr.2021.100059
Alsawalqa, R. O. (2021). Evaluating Female Experiences of Electronic Dating Violence in Jordan: Motivations, Consequences, and Coping Strategies. Frontiers in Psychology, 12, 719702. https://doi.org/10.3389/fpsyg.2021.719702
Rebollo-Catalan, A., & Mayor-Buzon, V. (2020). Adolescent Bystanders Witnessing Cyber Violence Against Women and Girls: What They Observe and How They Respond. Violence Against Women, 26(15–16), 2024–2040. https://doi.org/10.1177/1077801219888025
Henry, N., Flynn, A., & Powell, A. (2020). Technology-Facilitated Domestic and Sexual Violence: A Review. Violence Against Women, 26(15–16), 1828–1854. https://doi.org/10.1177/1077801219875821
Reed, E., Wong, A., & Raj, A. (2020). Cyber Sexual Harassment: A Summary of Current Measures and Implications for Future Research. Violence Against Women, 26(12–13), 1727–1740. https://doi.org/10.1177/1077801219880959
Hill, C., & Johnson, H. (2020). Online Interpersonal Victimization as a Mechanism of Social Control of Women: An Empirical Examination. Violence Against Women, 26(12–13), 1681–1700. https://doi.org/10.1177/1077801219870608
Kardefelt-Winther, D., & Maternowska, C. (2020). Addressing violence against children online and offline. Nature Human Behaviour, 4(3), 227–230. https://doi.org/10.1038/s41562-019-0791-3
Powell, A., & Henry, N. (2019). Technology-Facilitated Sexual Violence Victimization: Results From an Online Survey of Australian Adults. Journal of Interpersonal Violence, 34(17), 3637–3665. https://doi.org/10.1177/0886260516672055
Hinson, L., O’Brien-Milne, L., Mueller, J., Bansal, V., Wandera, N., & Bankar, S. (2019). Defining and measuring technology-facilitated gender-based violence (No. Brief). International Center for Research on Women. http://www.svri.org/sites/default/files/attachments/2019-03-25/ICRW_TFGBVMarketing_Brief_v3_WebReady_0.pdf
Reyns, B. W., & Fisher, B. S. (2018). The Relationship Between Offline and Online Stalking Victimization: A Gender-Specific Analysis. Violence and Victims, 33(4), 769–786. https://doi.org/10.1891/0886-6708.VV-D-17-00121
Henry, N., & Powell, A. (2018). Technology-Facilitated Sexual Violence: A Literature Review of Empirical Research. Trauma, Violence & Abuse, 19(2), 195–208. https://doi.org/10.1177/1524838016650189
Aghtaie, N., Larkins, C., Barte, C., Stanley, N., Wood, M., & Øverlien, C. (2018). Interpersonal violence and abuse in young people’s relationships in five European countries: online and offline normalisation of heteronormativity. Journal of Gender-Based Violence, 2(2), 293–310. https://doi.org/10.1332/239868018X15263879270302
Brown, C., & Hegarty, K. (2018). Digital dating abuse measures: A critical review. Aggression and Violent Behavior, 40, 44–59. https://doi.org/10.1016/j.avb.2018.03.003
Hinson, L., Mueller, J., O’Brien-Milne, L., & Wandera, N. (2018). Technology-facilitated gender-based violence: What is it, and how do we measure it? International Center for Research on Women. https://www.icrw.org/publications/technology-facilitated-gender-based-violence-what-is-it-and-how-do-we-measure-it/
Álvarez-García, D., Núñez, J. C., Barreiro-Collazo, A., & García, T. (2017). Validation of the Cybervictimization Questionnaire (CYVIC) for adolescents. Computers in Human Behavior, 70, 270–281. https://doi.org/10.1016/j.chb.2017.01.007