Technology Facilitated Gender Based Violence (TFGBV) is an act that is committed using information communication technologies or other digital tools which results in physical, sexual, psychological, social, political or economic harm or other infringements of rights and freedoms. Learn more about this topic by reading the resources provided on this page.
9542089
7DF3TGWW
1
apa
50
date
desc
5783
https://www.svri.org/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3Afalse%2C%22meta%22%3A%7B%22request_last%22%3A50%2C%22request_next%22%3A50%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%22EI8QLEFQ%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Mintarsih%20et%20al.%22%2C%22parsedDate%22%3A%222026-03-19%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BMintarsih%2C%20M.%2C%20Gayo%2C%20A.%2C%20Suhariyanto%2C%20B.%2C%20Rafsanjani%2C%20J.%20I.%2C%20Anggayudha%2C%20Z.%20H.%2C%20Farhana%2C%20F.%2C%20Untoro%2C%20U.%2C%20%26amp%3B%20Trisista%2C%20R.%20G.%20M.%20%282026%29.%20Critical%20Analysis%20on%20Legal%20Protection%20for%20Victims%20of%20Online%20Gender-Based%20Violence%20in%20Indonesia%3A%20Viewed%20From%20its%20Effectiveness%20and%20Recommendations.%20%26lt%3Bi%26gt%3BViolence%20Against%20Women%26lt%3B%5C%2Fi%26gt%3B%2C%2010778012261432624.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012261432624%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012261432624%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Critical%20Analysis%20on%20Legal%20Protection%20for%20Victims%20of%20Online%20Gender-Based%20Violence%20in%20Indonesia%3A%20Viewed%20From%20its%20Effectiveness%20and%20Recommendations%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mimin%22%2C%22lastName%22%3A%22Mintarsih%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ahyar%22%2C%22lastName%22%3A%22Gayo%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Budi%22%2C%22lastName%22%3A%22Suhariyanto%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jody%20Imam%22%2C%22lastName%22%3A%22Rafsanjani%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Zaihan%20Harmaen%22%2C%22lastName%22%3A%22Anggayudha%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Farhana%22%2C%22lastName%22%3A%22Farhana%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Untoro%22%2C%22lastName%22%3A%22Untoro%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ratna%20Galuh%20Manika%22%2C%22lastName%22%3A%22Trisista%22%7D%5D%2C%22abstractNote%22%3A%22Online%20gender-based%20violence%20%28OGBV%29%20in%20Indonesia%20includes%20various%20forms%20of%20online%20harassment%2C%20such%20as%20sexual%20harassment%2C%20revenge%20porn%2C%20and%20digital%20threats%20targeting%20gender%20and%20sexual%20orientation.%20With%20a%20rise%20in%20gender-based%20violence%20%28GBV%29%20cases%20over%20the%20past%205%20years%2C%20this%20study%20examines%20current%20practices%20and%20solutions%20for%20handling%20these%20cases.%20It%20uses%20a%20juridical-normative%20method%20with%20qualitative%20analysis%2C%20revealing%20that%20the%20interpretation%20of%20laws%20like%20the%20Criminal%20Code%2C%20Pornography%20Law%2C%20ITE%20Law%2C%20and%20TPKS%20Law%20creates%20challenges%20in%20addressing%20GBV.%20The%20study%20suggests%20the%20need%20for%20a%20specialized%20law%20to%20better%20tackle%20OGBV%2C%20incorporating%20Islamic%20law%20as%20a%20potential%20framework.%22%2C%22date%22%3A%222026-03-19%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F10778012261432624%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F10778012261432624%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221077-8012%2C%201552-8448%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222026-04-14T08%3A22%3A23Z%22%7D%7D%2C%7B%22key%22%3A%22333TU6A2%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Figueroa%20et%20al.%22%2C%22parsedDate%22%3A%222026-03-12%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BFigueroa%2C%20J.%20M.%2C%20Ha%2C%20T.%2C%20Anderson%2C%20S.%20F.%2C%20Maras%2C%20O.%2C%20%26amp%3B%20Quiroz%2C%20S.%20I.%20%282026%29.%20An%20ecological%20text%20message%20experiment%20of%20Hispanic%20and%20Latino%20adolescents%26%23x2019%3B%20recognition%20of%20and%20emotional%20responses%20to%20digital%20dating%20abuse%20behaviors.%20%26lt%3Bi%26gt%3BJournal%20of%20Research%20on%20Adolescence%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B36%26lt%3B%5C%2Fi%26gt%3B%281%29%2C%20e70167.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1111%5C%2Fjora.70167%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1111%5C%2Fjora.70167%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22An%20ecological%20text%20message%20experiment%20of%20Hispanic%20and%20Latino%20adolescents%27%20recognition%20of%20and%20emotional%20responses%20to%20digital%20dating%20abuse%20behaviors%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jennifer%20M.%22%2C%22lastName%22%3A%22Figueroa%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Thao%22%2C%22lastName%22%3A%22Ha%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Samantha%20F.%22%2C%22lastName%22%3A%22Anderson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Olivia%22%2C%22lastName%22%3A%22Maras%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Selena%20I.%22%2C%22lastName%22%3A%22Quiroz%22%7D%5D%2C%22abstractNote%22%3A%22Abstract%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20Digital%20dating%20abuse%20%28DDA%29%2C%20the%20use%20of%20technology%20to%20coerce%2C%20control%2C%20harass%2C%20threaten%2C%20monitor%2C%20or%20pressure%20a%20romantic%20partner%2C%20is%20a%20widespread%20form%20of%20dating%20violence%20among%20adolescents%20that%20is%20associated%20with%20adverse%20mental%20health%20outcomes.%20Previous%20research%20shows%20that%20adolescents%20misinterpret%20some%20DDA%20behaviors%20as%20normative%20relationship%20behaviors%2C%20increasing%20the%20risk%20for%20more%20severe%20DDA.%20These%20misinterpretations%20may%20stem%20from%20DDA%20occurring%20within%20positive%20%28e.g.%2C%20affection%20and%20joking%29%20contexts%2C%20and%20who%20is%20experiencing%20and%5C%2For%20engaging%20in%20DDA.%20Yet%2C%20it%20remains%20unclear%20how%20the%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20context%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20in%20which%20DDA%20occurs%20%28DDA%20only%2C%20DDA%20with%20affection%2C%20or%20no%20DDA%29%20and%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20roles%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20%28perpetrator%2C%20victim%2C%20or%20mutual%29%20influence%20adolescents%26%23039%3B%20recognition%20of%20and%20emotional%20responses%20to%20DDA.%20Two%20between%5Cu2010subjects%20experiments%20using%20hypothetical%20text%20messages%20examined%20how%20DDA%20context%20and%20role%20influenced%20DDA%20recognition%20and%20anticipation%20of%20feeling%20upset%20among%20Hispanic%20and%20Latino%20high%20school%20adolescents%20%28Study%201%3A%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20N%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20%5Cu2009%3D%5Cu2009422%2C%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20M%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20age%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20%5Cu2009%3D%5Cu200915.76%2C%20SD%5Cu2009%3D%5Cu20091.02%2C%2054.7%25%20female%3B%20Study%202%3A%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20N%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20%5Cu2009%3D%5Cu2009384%2C%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20M%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20age%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20%5Cu2009%3D%5Cu200916.52%2C%20SD%5Cu2009%3D%5Cu20090.98%2C%2051.8%25%20female%29.%20Across%20experiments%2C%20adolescents%26%23039%3B%20recognition%20of%20DDA%20behaviors%20and%20anticipation%20of%20feeling%20upset%20were%20significantly%20higher%20in%20both%20the%20DDA%5Cu2010with%5Cu2010affection%20and%20DDA%5Cu2010only%20contexts%20compared%20to%20the%20no%5Cu2010DDA%20context.%20Findings%20suggest%20that%20even%20when%20affectionate%20behaviors%20are%20present%2C%20DDA%20behaviors%20were%20still%20recognized%20by%20adolescents.%20There%20were%20no%20significant%20main%20effects%20of%20role%20on%20DDA%20recognition%20or%20anticipation%20of%20feeling%20upset.%20The%20findings%20of%20this%20work%20highlight%20the%20importance%20of%20addressing%20both%20overt%20and%20mixed%5Cu2010message%20forms%20of%20DDA%20in%20future%20adolescent%20prevention%20and%20intervention%20efforts.%22%2C%22date%22%3A%222026-03-12%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1111%5C%2Fjora.70167%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fonlinelibrary.wiley.com%5C%2Fdoi%5C%2F10.1111%5C%2Fjora.70167%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221050-8392%2C%201532-7795%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222026-04-14T08%3A29%3A17Z%22%7D%7D%2C%7B%22key%22%3A%227X5LQGFJ%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ardhanariswari%20et%20al.%22%2C%22parsedDate%22%3A%222026-02-04%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BArdhanariswari%2C%20R.%2C%20Azzahro%2C%20F.%2C%20Fauzan%2C%20M.%2C%20Pamuji%2C%20K.%2C%20%26amp%3B%20Murniati%2C%20T.%20%282026%29.%20Digital%20Technology%20as%20a%20Tool%20for%20Fulfilling%20Women%26%23x2019%3Bs%20Rights%3A%20A%20Legal%20Analysis%20of%20Online%20Gender-based%20Violence%20%28OGBV%29%20Within%20the%20Framework%20of%20SDG%205.%20%26lt%3Bi%26gt%3BKnE%20Social%20Sciences%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B11%26lt%3B%5C%2Fi%26gt%3B%281%29%2C%20213%26%23x2013%3B234.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.18502%5C%2Fkss.v11i1.20610%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.18502%5C%2Fkss.v11i1.20610%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Digital%20Technology%20as%20a%20Tool%20for%20Fulfilling%20Women%27s%20Rights%3A%20A%20Legal%20Analysis%20of%20Online%20Gender-based%20Violence%20%28OGBV%29%20Within%20the%20Framework%20of%20SDG%205%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Riris%22%2C%22lastName%22%3A%22Ardhanariswari%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Fathimah%22%2C%22lastName%22%3A%22Azzahro%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Muhammad%22%2C%22lastName%22%3A%22Fauzan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kadar%22%2C%22lastName%22%3A%22Pamuji%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tri%22%2C%22lastName%22%3A%22Murniati%22%7D%5D%2C%22abstractNote%22%3A%22The%20digital%20era%20has%20not%20only%20expanded%20social%20interactions%20but%20also%20significantly%20increased%20the%20prevalence%20of%20online%20gender-based%20violence%20%28OGBV%29%20in%20Indonesia.%20This%20trend%20indicates%20a%20regulatory%20gap%20between%20existing%20policies%20and%20SDG%205%20targets%20for%20gender%20equality.%20To%20address%20the%20gap%2C%20a%20more%20gender-responsive%20legal%20framework%20is%20needed%20to%20protect%20women%5Cu2019s%20rights%20in%20the%20digital%20space.%20Therefore%2C%20this%20research%20aims%20to%20analyze%20the%20legal%20framework%20for%20the%20protection%20of%20women%20rights%20from%20OGBV%20in%20the%20context%20of%20digital%20technology.%20The%20correlation%20between%20OGBV%20regulations%20and%20SDG%205%20targets%20toward%20the%20achievement%20of%20gender%20equality%20was%20also%20evaluated.%20Normative%20juridical%20research%20was%20carried%20out%20using%20conceptual%2C%20statute%2C%20and%20case%20approaches%20as%20analysis%20methods.%20The%20results%20showed%20that%20the%20legal%20framework%20of%20Indonesia%2C%20through%20the%20constitution%2C%20Sexual%20Violence%20Criminal%20Law%2C%20Human%20Rights%20Law%2C%20Electronic%20Information%20and%20Transactions%20Law%2C%20and%20Pornography%20Law%2C%20protects%20against%20OGBV%2C%20but%20only%20about%2018%25%20of%20reports%20are%20processed%20and%20less%20than%206%25%20lead%20to%20punishment%2C%20suggesting%20the%20need%20for%20regulatory%20revisions%2C%20improvement%20of%20digital%20forensic%20capacity%2C%20and%20social%20support%20to%20reduce%20revictimization%20and%20strengthen%20the%20effectiveness%20of%20protection.%20In%20conclusion%2C%20Indonesia%5Cu2019s%20regulations%20on%20OGBV%20support%20targets%20almost%20all%20of%20SDG%205%20and%20provide%20a%20legal%20framework%20for%20the%20prevention%2C%20handling%2C%20and%20recovery%20of%20victims%2C%20although%20the%20effectiveness%20is%20still%20limited.%20This%20indicates%20the%20importance%20of%20harmonization%20with%20international%20standards%20%28CEDAW%2C%20Istanbul%20Declaration%29%20and%20the%20application%20of%20due%20diligence%20on%20digital%20platforms.%22%2C%22date%22%3A%222026-02-04%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.18502%5C%2Fkss.v11i1.20610%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fknepublishing.com%5C%2Findex.php%5C%2FKnE-Social%5C%2Farticle%5C%2Fview%5C%2F20610%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%222518-668X%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222026-04-14T08%3A36%3A47Z%22%7D%7D%2C%7B%22key%22%3A%22D6W4FD4C%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Flynn%20et%20al.%22%2C%22parsedDate%22%3A%222026-02-02%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BFlynn%2C%20A.%2C%20Baigh%2C%20T.%20A.%2C%20%26amp%3B%20Quilty%2C%20E.%20%282026%29.%20Technology-Facilitated%20Gender-Based%20Violence%3A%20A%20Mixed-Methods%20Study%20of%20Practitioners%20in%20Pacific%20Island%20Countries.%20%26lt%3Bi%26gt%3BViolence%20Against%20Women%26lt%3B%5C%2Fi%26gt%3B%2C%2010778012251409161.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012251409161%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012251409161%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-Facilitated%20Gender-Based%20Violence%3A%20A%20Mixed-Methods%20Study%20of%20Practitioners%20in%20Pacific%20Island%20Countries%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Asher%22%2C%22lastName%22%3A%22Flynn%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tarannum%20Azim%22%2C%22lastName%22%3A%22Baigh%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Emma%22%2C%22lastName%22%3A%22Quilty%22%7D%5D%2C%22abstractNote%22%3A%22Scholars%20and%20practitioners%20are%20becoming%20increasingly%20aware%20of%20technologies%20being%20used%20to%20facilitate%20gender-based%20violence%2C%20yet%20little%20empirical%20research%20has%20explored%20this%20issue%20within%20the%20Pacific%20context.%20This%20article%20reports%20on%20a%20study%20of%20practitioners%20working%20across%20nine%20Pacific%20Island%20countries.%20While%20the%20rates%20and%20types%20of%20victimization%20experiences%20are%20not%20dissimilar%20to%20other%20countries%2C%20practitioners%20perceived%20that%20cultural%20and%20religious%20norms%2C%20gender%20roles%2C%20and%20societal%20expectations%20hinder%20victim-survivors%20from%20seeking%20help%2C%20disclosing%2C%20or%20reporting%20technology-facilitated%20gender-based%20violence.%20We%20argue%20that%20social%20and%20cultural%20contexts%20are%20key%20in%20understanding%20technology-facilitated%20gender-based%20violence%2C%20and%20developing%20prevention%2C%20response%2C%20and%20support%20measures.%22%2C%22date%22%3A%222026-02-02%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F10778012251409161%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F10778012251409161%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221077-8012%2C%201552-8448%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222026-04-14T08%3A37%3A16Z%22%7D%7D%2C%7B%22key%22%3A%22EH92F9D6%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ben%5Cu00edtez-Hidalgo%20et%20al.%22%2C%22parsedDate%22%3A%222026-01-14%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBen%26%23xED%3Btez-Hidalgo%2C%20V.%2C%20Pastor-Moreno%2C%20G.%2C%20Ruiz-P%26%23xE9%3Brez%2C%20I.%2C%20%26amp%3B%20Amaya-Santos%2C%20S.%20%282026%29.%20Technology-facilitated%20sexual%20violence%20against%20women%20and%20its%20health%20impact%3A%20a%20mixed-methods%20systematic%20review.%20%26lt%3Bi%26gt%3BBMC%20Public%20Health%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B26%26lt%3B%5C%2Fi%26gt%3B%281%29%2C%20543.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1186%5C%2Fs12889-026-26260-4%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1186%5C%2Fs12889-026-26260-4%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-facilitated%20sexual%20violence%20against%20women%20and%20its%20health%20impact%3A%20a%20mixed-methods%20systematic%20review%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vivian%22%2C%22lastName%22%3A%22Ben%5Cu00edtez-Hidalgo%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Guadalupe%22%2C%22lastName%22%3A%22Pastor-Moreno%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Isabel%22%2C%22lastName%22%3A%22Ruiz-P%5Cu00e9rez%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sua%22%2C%22lastName%22%3A%22Amaya-Santos%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222026-01-14%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1186%5C%2Fs12889-026-26260-4%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Flink.springer.com%5C%2F10.1186%5C%2Fs12889-026-26260-4%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221471-2458%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222026-04-14T07%3A46%3A29Z%22%7D%7D%2C%7B%22key%22%3A%227JAI9LPF%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ali%22%2C%22parsedDate%22%3A%222025-11-30%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BAli%2C%20M.%20I.%20%282025%29.%20Technology-Triggered%20Gender-Based%20Violence%20%28TTGBV%29%20in%20Zanzibar.%20%26lt%3Bi%26gt%3BInternational%20Journal%20of%20Science%20and%20Research%20Archive%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B17%26lt%3B%5C%2Fi%26gt%3B%282%29%2C%20474%26%23x2013%3B489.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.30574%5C%2Fijsra.2025.17.2.3049%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.30574%5C%2Fijsra.2025.17.2.3049%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-Triggered%20Gender-Based%20Violence%20%28TTGBV%29%20in%20Zanzibar%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mzuri%20Issa%22%2C%22lastName%22%3A%22Ali%22%7D%5D%2C%22abstractNote%22%3A%22This%20article%20explores%20the%20growing%20problem%20of%20technology-triggered%20gender-based%20violence%20%28TTGBV%29%20in%20Zanzibar%2C%20focusing%20on%20how%20digital%20platforms%20expose%20children%20and%20young%20men%20to%20harmful%20content%20that%20encourages%20sexual%20abuse.%20While%20global%20and%20national%20frameworks%20emphasize%20the%20elimination%20of%20gender-based%20violence%2C%20institutional%20gaps%20in%20Zanzibar%20across%20law%20enforcement%2C%20education%2C%20and%20community%20structures%20have%20left%20children%20increasingly%20vulnerable%20to%20online%20grooming%2C%20pornography%2C%20and%20sextortion.%20%5Cn%20%5CnTo%20address%20this%20gap%2C%20the%20study%20applies%20the%20Institutionalizing%20Social%20Ecological%20Model%20%28ISEM%29%2C%20which%20highlights%20institutions%20as%20central%20actors%20in%20either%20preventing%20or%20perpetuating%20TTGBV.%20Using%20a%20mixed-methods%20approach%2C%20including%20surveys%20with%20adolescents%20and%20interviews%20with%20key%20stakeholders%2C%20the%20research%20demonstrates%20that%20technology%20not%20only%20facilitates%20abuse%20but%20also%20triggers%20children%20and%20young%20men%20to%20engage%20in%20sexual%20acts.%20The%20findings%20show%20that%20institutional%20weaknesses%20amplify%20these%20risks%2C%20making%20TTGBV%20both%20a%20digital%20and%20structural%20problem.%20%5Cn%20%5CnThe%20article%20concludes%20by%20recommending%20urgent%20reforms%20in%20law%2C%20education%2C%20parental%20engagement%2C%20and%20survivor-centered%20services.%20By%20reframing%20TTGBV%20as%20an%20institutional%20challenge%20driven%20by%20technology%2C%20this%20study%20contributes%20new%20insights%20for%20safeguarding%20children%5Cu2019s%20digital%20and%20offline%20lives%20in%20Zanzibar.%22%2C%22date%22%3A%222025-11-30%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.30574%5C%2Fijsra.2025.17.2.3049%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fijsra.net%5C%2Fnode%5C%2F5414%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%2225828185%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222026-04-14T08%3A27%3A09Z%22%7D%7D%2C%7B%22key%22%3A%22K5LIUY6G%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Crowley%22%2C%22parsedDate%22%3A%222025-09-29%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BCrowley%2C%20J.%20E.%20%282025%29.%20Technology-facilitated%20gender-based%20violence%3A%20Categorizing%20and%20understanding%20sexual%20abuse%20against%20women%20ridesharing%20drivers.%20%26lt%3Bi%26gt%3BWomen%26%23x2019%3Bs%20Studies%20International%20Forum%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B114%26lt%3B%5C%2Fi%26gt%3B%2C%20103197.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.wsif.2025.103197%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.wsif.2025.103197%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-facilitated%20gender-based%20violence%3A%20Categorizing%20and%20understanding%20sexual%20abuse%20against%20women%20ridesharing%20drivers%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jocelyn%20Elise%22%2C%22lastName%22%3A%22Crowley%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222025-09-29%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1016%5C%2Fj.wsif.2025.103197%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Flinkinghub.elsevier.com%5C%2Fretrieve%5C%2Fpii%5C%2FS0277539525001463%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%2202775395%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222026-04-14T08%3A38%3A56Z%22%7D%7D%2C%7B%22key%22%3A%226J6ZHYIF%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Regehr%20et%20al.%22%2C%22parsedDate%22%3A%222025-09-19%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BRegehr%2C%20C.%2C%20Mishna%2C%20F.%2C%20Billard%2C%20D.%2C%20Fallon%2C%20B.%2C%20Schiffer%2C%20J.%2C%20%26amp%3B%20Lefebvre%2C%20R.%20%282025%29.%20Technology-facilitated%20violence%20against%20child%20welfare%20workers%3A%20A%20qualitative%20analysis.%20%26lt%3Bi%26gt%3BChild%20Protection%20and%20Practice%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B7%26lt%3B%5C%2Fi%26gt%3B%2C%20100241.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.chipro.2025.100241%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.chipro.2025.100241%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-facilitated%20violence%20against%20child%20welfare%20workers%3A%20A%20qualitative%20analysis%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cheryl%22%2C%22lastName%22%3A%22Regehr%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Faye%22%2C%22lastName%22%3A%22Mishna%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Danielle%22%2C%22lastName%22%3A%22Billard%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Barbara%22%2C%22lastName%22%3A%22Fallon%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jeffrey%22%2C%22lastName%22%3A%22Schiffer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rachael%22%2C%22lastName%22%3A%22Lefebvre%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222025-09-19%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1016%5C%2Fj.chipro.2025.100241%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Flinkinghub.elsevier.com%5C%2Fretrieve%5C%2Fpii%5C%2FS2950193825001494%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%2229501938%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222025-11-12T07%3A33%3A59Z%22%7D%7D%2C%7B%22key%22%3A%22XNJNZDCI%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ho%20et%20al.%22%2C%22parsedDate%22%3A%222025-09-16%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHo%2C%20M.%20H.%20S.%2C%20Ng%2C%20W.%20E.%2C%20Rosario%2C%20A.%20L.%20C.%2C%20Lee%2C%20J.%2C%20Wadhwa%2C%20B.%2C%20Choy%2C%20O.%2C%20%26amp%3B%20Tandoc%2C%20E.%20C.%20%282025%29.%20%26%23x2018%3BWhen%20everything%20goes%20online%2C%20it%26%23x2019%3Bs%20never%20really%20gone%26%23x2019%3B%3A%20understanding%20technology-facilitated%20sexual%20violence%20%28TFSV%29%20in%20Singapore.%20%26lt%3Bi%26gt%3BJournal%20of%20Gender%20Studies%26lt%3B%5C%2Fi%26gt%3B%2C%201%26%23x2013%3B24.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F09589236.2025.2561138%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F09589236.2025.2561138%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22%5Cu2018When%20everything%20goes%20online%2C%20it%5Cu2019s%20never%20really%20gone%5Cu2019%3A%20understanding%20technology-facilitated%20sexual%20violence%20%28TFSV%29%20in%20Singapore%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michelle%20H.%20S.%22%2C%22lastName%22%3A%22Ho%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Wi%20En%22%2C%22lastName%22%3A%22Ng%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Angela%20Louise%20C.%22%2C%22lastName%22%3A%22Rosario%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jungup%22%2C%22lastName%22%3A%22Lee%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Bimlesh%22%2C%22lastName%22%3A%22Wadhwa%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Olivia%22%2C%22lastName%22%3A%22Choy%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Edson%20C.%22%2C%22lastName%22%3A%22Tandoc%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222025-09-16%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1080%5C%2F09589236.2025.2561138%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.tandfonline.com%5C%2Fdoi%5C%2Ffull%5C%2F10.1080%5C%2F09589236.2025.2561138%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%220958-9236%2C%201465-3869%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222025-11-12T07%3A32%3A21Z%22%7D%7D%2C%7B%22key%22%3A%22DBFH8HPC%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Tyabashe-Phume%20et%20al.%22%2C%22parsedDate%22%3A%222025-09-12%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BTyabashe-Phume%2C%20B.%20P.%2C%20Tunggal%2C%20E.%2C%20Hameed%2C%20S.%2C%20Hunt%2C%20X.%2C%20Soldati%26%23x107%3B%2C%20K.%2C%20%26amp%3B%20Ned%2C%20L.%20%282025%29.%20Scoping%20review%20on%20technology-facilitated%20gender-based%20violence%20against%20women%20with%20disabilities%20and%20LGBTQI%2B%20persons%20in%20low-%20and%20middle-income%20countries.%20%26lt%3Bi%26gt%3BAfrican%20Journal%20of%20Disability%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B14%26lt%3B%5C%2Fi%26gt%3B%2C%20a1810.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.4102%5C%2FAJOD.v14i0.1810%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.4102%5C%2FAJOD.v14i0.1810%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Scoping%20review%20on%20technology-facilitated%20gender-based%20violence%20against%20women%20with%20disabilities%20and%20LGBTQI%2B%20persons%20in%20low-%20and%20middle-income%20countries%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Babalwa%20P.%22%2C%22lastName%22%3A%22Tyabashe-Phume%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Eunice%22%2C%22lastName%22%3A%22Tunggal%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shaffa%22%2C%22lastName%22%3A%22Hameed%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Xanthe%22%2C%22lastName%22%3A%22Hunt%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Karen%22%2C%22lastName%22%3A%22Soldati%5Cu0107%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lieketseng%22%2C%22lastName%22%3A%22Ned%22%7D%5D%2C%22abstractNote%22%3A%22Background%3A%5Cu00a0Technology-facilitated%20gender-based%20violence%20%28TFGBV%29%20refers%20to%20acts%20of%20harm%20enabled%20or%20intensified%20through%20digital%20platforms%2C%20negatively%20affecting%20women%5Cu2019s%20rights%2C%20safety%20and%20well-being.%20Women%20with%20disabilities%20are%20at%20heightened%20risk%20because%20of%20the%20intersection%20of%20ableism%20and%20gender%20inequality.%20However%2C%20limited%20evidence%20exists%20on%20how%20TFGBV%20manifests%20and%20impacts%20this%20population%2C%20particularly%20in%20low-%20and%20middle-income%20countries%20%28LMICs%29.%20%5CnObjectives%3A%5Cu00a0This%20scoping%20review%20aimed%20to%20map%20existing%20research%20on%20TFGBV%20against%20women%20with%20disabilities%20in%20LMICs%2C%20identify%20common%20patterns%20and%20explore%20intersections%20with%20broader%20structural%20vulnerabilities.%20%5CnMethod%3A%5Cu00a0Using%20the%20PRISMA-ScR%20framework%2C%20we%20searched%20seven%20academic%20databases%20and%20grey%20literature%20published%20between%202010%20and%202024.%20Eligible%20studies%20focused%20on%20women%20in%20LMICs%20and%20involved%20TFGBV%20through%20consumer%20digital%20technologies.%20Data%20were%20charted%20and%20deductively%20analysed%20using%20adapted%20frameworks%20from%20prior%20TFGBV%20literature.%20%5CnResults%3A%5Cu00a0From%204738%20records%20screened%2C%2043%20studies%20met%20the%20inclusion%20criteria.%20Most%20explored%20how%20digital%20tools%20enabled%20violence%20with%20offline%20consequences.%20None%20focused%20exclusively%20on%20women%20with%20disabilities%2C%20though%20some%20included%20them.%20Technology-facilitated%20gender-based%20violence%20impacts%20were%20wide-ranging%2C%20with%20LGBTQ%2B%20individuals%2C%20rural%20populations%20and%20low-income%20groups%20facing%20intersecting%20risks.%20%5CnConclusion%3A%5Cu00a0This%20review%20highlights%20a%20gap%20in%20research%20on%20TFGBV%20among%20women%20with%20disabilities%20in%20LMICs.%20Future%20studies%20must%20centre%20intersectional%2C%20inclusive%20and%20survivor-informed%20approaches.%20%5CnContribution%3A%5Cu00a0This%20review%20adopted%20an%20intersectional%20approach%2C%20recognising%20how%20disability%2C%20gender%2C%20poverty%20and%20other%20marginalised%20identities%20compound%20TFGBV%20risks.%20It%20highlights%20the%20lack%20of%20focused%20research%20on%20TFGBV%20against%20women%20with%20disabilities%20in%20LMICs%20and%20the%20need%20for%20inclusive%2C%20survivor-informed%20research%20and%20policy%20responses.%22%2C%22date%22%3A%222025-09-12%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.4102%5C%2FAJOD.v14i0.1810%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fajod.org%5C%2Findex.php%5C%2Fajod%5C%2Farticle%5C%2Fview%5C%2F1810%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%222223-9170%2C%202226-7220%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222026-04-14T08%3A41%3A12Z%22%7D%7D%2C%7B%22key%22%3A%22YJDC8BX8%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hartmann%20et%20al.%22%2C%22parsedDate%22%3A%222025-09-09%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHartmann%2C%20M.%20A.%2C%20Browne%2C%20E.%2C%20Mutangabende%2C%20S.%2C%20Mungwari%2C%20P.%2C%20Stotesbury%2C%20D.%2C%20Woollett%2C%20N.%2C%20K%26%23xE5%3Bgesten%2C%20A.%2C%20Roberts%2C%20S.%20T.%2C%20%26amp%3B%20Hatcher%2C%20A.%20%282025%29.%20Prevalence%20of%20technology%20facilitated%20and%20other%20gender-based%20violence%20among%20adolescent%20girls%20in%20Gqeberha%2C%20South%20Africa%20and%20its%20association%20with%20probable%20common%20mental%20disorders.%20%26lt%3Bi%26gt%3BFrontiers%20in%20Global%20Women%26%23x2019%3Bs%20Health%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B6%26lt%3B%5C%2Fi%26gt%3B%2C%201546901.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.3389%5C%2Ffgwh.2025.1546901%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.3389%5C%2Ffgwh.2025.1546901%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Prevalence%20of%20technology%20facilitated%20and%20other%20gender-based%20violence%20among%20adolescent%20girls%20in%20Gqeberha%2C%20South%20Africa%20and%20its%20association%20with%20probable%20common%20mental%20disorders%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Miriam%20Aviva%22%2C%22lastName%22%3A%22Hartmann%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Erica%22%2C%22lastName%22%3A%22Browne%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shepherd%22%2C%22lastName%22%3A%22Mutangabende%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Patience%22%2C%22lastName%22%3A%22Mungwari%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Danielle%22%2C%22lastName%22%3A%22Stotesbury%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nataly%22%2C%22lastName%22%3A%22Woollett%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Anna%22%2C%22lastName%22%3A%22K%5Cu00e5gesten%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sarah%20T.%22%2C%22lastName%22%3A%22Roberts%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Abbey%22%2C%22lastName%22%3A%22Hatcher%22%7D%5D%2C%22abstractNote%22%3A%22Background%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20Emerging%20evidence%20is%20raising%20alarms%20that%20technology%20facilitated%20gender-based%20violence%20%28TF-GBV%29%20is%20a%20growing%20public%20health%20concern%20with%20impacts%20on%20child%20wellbeing%2C%20yet%20little%20research%20on%20the%20topic%20has%20been%20conducted%20in%20middle-income%20country%20settings.%20This%20study%20aimed%20to%20investigate%20the%20prevalence%20of%20TF-GBV%2C%20other%20GBV%2C%20and%20their%20association%20with%20common%20mental%20disorder%20%28CMD%29%20symptoms%20among%20adolescent%20girls%20in%20South%20Africa.%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20Methods%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20Trained%20enumerators%20facilitated%20surveys%20on%20exposure%20to%20physical%20and%20sexual%20violence%20with%20adolescent%20girls%20aged%2010%5Cu201319%20from%2014%20low-income%20primary%20and%20secondary%20public%20schools.%20An%20index%20of%20TF-GBV%20assessed%20past-year%20exposure%20to%20acts%20such%20as%20public%20posting%20of%20sexual%20photos.%20CMD%20screening%20used%20Patient%20Health%20Questionnaire-2%20and%20Generalized%20Anxiety%20Disorder-2%20tools.%20Generalized%20estimating%20equations%20assessed%20associations%20between%20violence%20%28TF-GBV%2C%20other%20GBV%2C%20or%20both%29%20and%20CMD.%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20Results%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20A%20total%20of%201%2C540%20adolescent%20girls%20participated%20in%20the%20study.%20Most%20participants%20identified%20as%20Black%20%2884%25%29.%20CMD%20symptoms%20were%20more%20prevalent%20among%20girls%20in%20secondary%20school%20%2837%25%29%20than%20primary%20school%20%2810%25%29.%20All%20forms%20of%20past-year%20GBV%20were%20more%20prevalent%20among%20secondary%20school%20girls%2C%20including%20TF-GBV%20%2843%25%20vs.%2011%25%20in%20primary%20school%20girls%29.%20Exposure%20to%20both%20TF-GBV%20and%20other%20forms%20of%20GBV%20were%20significantly%20associated%20with%20a%203.68%20times%20higher%20risk%20of%20CMD%20%28aRR%5Cu2009%3D%5Cu20093.68%2C%2095%25%20CI%202.42%5Cu20135.62%29%20after%20adjusting%20for%20demographics%20and%20partnership%20status.%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20Conclusion%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20%20%20These%20findings%20underscore%20the%20need%20for%20targeted%20content%20to%20address%20TF-GBV%20within%20existing%20GBV%20programs%2C%20and%20its%20impact%20on%20mental%20health%20among%20adolescent%20girls%20in%20similar%20contexts.%22%2C%22date%22%3A%222025-9-9%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.3389%5C%2Ffgwh.2025.1546901%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.frontiersin.org%5C%2Farticles%5C%2F10.3389%5C%2Ffgwh.2025.1546901%5C%2Ffull%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%222673-5059%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222026-04-14T08%3A39%3A38Z%22%7D%7D%2C%7B%22key%22%3A%22DW2MC3FJ%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Koch%20et%20al.%22%2C%22parsedDate%22%3A%222025-08-31%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKoch%2C%20L.%2C%20Ghawi%2C%20R.%2C%20Pfeffer%2C%20J.%2C%20%26amp%3B%20Steinert%2C%20J.%20I.%20%282025%29.%20Online%20misogyny%20against%20female%20candidates%20in%20the%202022%20Brazilian%20elections%3A%20a%20threat%20to%20women%26%23x2019%3Bs%20political%20representation%3F%20%26lt%3Bi%26gt%3BInformation%2C%20Communication%20%26amp%3B%20Society%26lt%3B%5C%2Fi%26gt%3B%2C%201%26%23x2013%3B21.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F1369118X.2025.2551604%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F1369118X.2025.2551604%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Online%20misogyny%20against%20female%20candidates%20in%20the%202022%20Brazilian%20elections%3A%20a%20threat%20to%20women%27s%20political%20representation%3F%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Luise%22%2C%22lastName%22%3A%22Koch%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Raji%22%2C%22lastName%22%3A%22Ghawi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22J%5Cu00fcrgen%22%2C%22lastName%22%3A%22Pfeffer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Janina%20Isabel%22%2C%22lastName%22%3A%22Steinert%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222025-08-31%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1080%5C%2F1369118X.2025.2551604%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.tandfonline.com%5C%2Fdoi%5C%2Ffull%5C%2F10.1080%5C%2F1369118X.2025.2551604%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221369-118X%2C%201468-4462%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222026-04-14T08%3A40%3A27Z%22%7D%7D%2C%7B%22key%22%3A%2262SPWB95%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22McGlynn%20and%20Rigotti%22%2C%22parsedDate%22%3A%222025-08-29%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BMcGlynn%2C%20C.%2C%20%26amp%3B%20Rigotti%2C%20C.%20%282025%29.%20From%20Virtual%20Rape%20to%20Meta-rape%3A%20Sexual%20Violence%2C%20Criminal%20Law%20and%20the%20Metaverse.%20%26lt%3Bi%26gt%3BOxford%20Journal%20of%20Legal%20Studies%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B45%26lt%3B%5C%2Fi%26gt%3B%283%29%2C%20554%26%23x2013%3B582.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Fojls%5C%2Fgqaf009%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Fojls%5C%2Fgqaf009%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22From%20Virtual%20Rape%20to%20Meta-rape%3A%20Sexual%20Violence%2C%20Criminal%20Law%20and%20the%20Metaverse%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Clare%22%2C%22lastName%22%3A%22McGlynn%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Carlotta%22%2C%22lastName%22%3A%22Rigotti%22%7D%5D%2C%22abstractNote%22%3A%22Abstract%20%5Cn%20%20%20%20%20%20%20%20%20%20%20%20As%20the%20metaverse%20blurs%20the%20lines%20between%20physical%20and%20virtual%20realms%2C%20enhanced%20by%20haptic%20devices%20providing%20sensory%20feedback%2C%20it%20is%20poised%20to%20become%20integral%20to%20daily%20life.%20However%2C%20this%20new%20digital%20frontier%20is%20also%20a%20site%20for%20sexual%20violence.%20Women%20users%20increasingly%20report%20non-consensual%20touching%2C%20image-based%20sexual%20abuses%20and%20novel%20forms%20of%20gendered%20harm%2C%20often%20trivialised%20and%20inadequately%20addressed%20by%20current%20laws.%20Accordingly%2C%20this%20article%20proposes%20the%20new%20concept%20and%20terminology%20of%20%5Cu2018meta-rape%5Cu2019%20to%20better%20capture%20the%20intense%20and%20embodied%20nature%20of%20these%20forms%20of%20sexual%20violence.%20We%20also%20provide%20a%20new%20categorisation%20of%20experiences%20of%20sexual%20harassment%20and%20abuse%20in%20the%20metaverse%2C%20together%20with%20a%20comprehensive%20analysis%20of%20the%20role%20and%20application%20of%20criminal%20law%20in%20tackling%20meta-rape.%20We%20suggest%2C%20contrary%20to%20conventional%20approaches%2C%20that%20current%20criminal%20laws%20could%20apply%20to%20some%20forms%20of%20meta-rape.%20We%20also%20propose%20strengthening%20and%20future-proofing%20criminal%20law%2C%20with%20laws%20proscribing%20intimate%20intrusions.%20By%20reframing%20our%20understanding%20of%20meta-rape%2C%20we%20aim%20to%20address%20the%20prevalence%20and%20impact%20of%20these%20gendered%20and%20sexualised%20harms%2C%20providing%20robust%20avenues%20for%20victim%20redress%20and%20promoting%20safety%20and%20autonomy%20in%20emerging%20virtual%20spaces.%22%2C%22date%22%3A%222025-08-29%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1093%5C%2Fojls%5C%2Fgqaf009%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Facademic.oup.com%5C%2Fojls%5C%2Farticle%5C%2F45%5C%2F3%5C%2F554%5C%2F8108104%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%220143-6503%2C%201464-3820%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222026-04-14T08%3A39%3A58Z%22%7D%7D%2C%7B%22key%22%3A%22QGEFMD4N%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Koch%20et%20al.%22%2C%22parsedDate%22%3A%222025-06-27%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKoch%2C%20L.%2C%20Russo%20Riva%2C%20M.%20P.%2C%20%26amp%3B%20Steinert%2C%20J.%20I.%20%282025%29.%20Technology-Facilitated%20Gender-Based%20Violence%20Against%20Politically%20Active%20Women%3A%20A%20Systematic%20Review%20of%20Psychological%20and%20Political%20Consequences%20and%20Women%26%23x2019%3Bs%20Coping%20Behaviors.%20%26lt%3Bi%26gt%3BTrauma%2C%20Violence%2C%20%26amp%3B%20Abuse%26lt%3B%5C%2Fi%26gt%3B%2C%2015248380251343185.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380251343185%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380251343185%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-Facilitated%20Gender-Based%20Violence%20Against%20Politically%20Active%20Women%3A%20A%20Systematic%20Review%20of%20Psychological%20and%20Political%20Consequences%20and%20Women%5Cu2019s%20Coping%20Behaviors%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Luise%22%2C%22lastName%22%3A%22Koch%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Maria%20Paula%22%2C%22lastName%22%3A%22Russo%20Riva%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Janina%20Isabel%22%2C%22lastName%22%3A%22Steinert%22%7D%5D%2C%22abstractNote%22%3A%22Technology-facilitated%20gender-based%20violence%20presents%20critical%20challenges%20for%20politically%20active%20women%2C%20whose%20professional%20roles%20often%20expose%20them%20to%20elevated%20levels%20of%20online%20abuse%20with%20far-reaching%20impacts%20on%20their%20emotional%20well-being%2C%20professional%20engagement%2C%20and%20participation%20in%20public%20life.%20This%20systematic%20review%20synthesizes%20findings%20from%2048%20studies%20employing%20qualitative%2C%20quantitative%2C%20and%20mixed-methods%20research%20to%20examine%20the%20psychological%20and%20political%20consequences%20and%20coping%20mechanisms%20associated%20with%20online%20harassment.%20Eighty-one%20percent%20of%20the%20included%20studies%20%2839%5C%2F48%29%20report%20psychological%20distress%2C%20anxiety%2C%20and%20fear%20among%20targeted%20women%2C%20with%2031%25%20of%20the%20studies%20%2815%5C%2F48%29%20identifying%20online%20harassment%20as%20a%20trigger%20for%20%28re-%29%20traumatization.%20The%20political%20consequences%20are%20equally%20significant%2C%20with%2062%25%20of%20the%20studies%20%2830%5C%2F48%29%20documenting%20modifications%20in%20political%20messaging%2C%2039%25%20%2819%5C%2F48%29%20noting%20reduced%20engagement%20with%20online%20platforms%2C%20and%2029%25%20%2814%5C%2F48%29%20showing%20that%20women%20abandon%20their%20online%20presence%20altogether.%20Additionally%2C%2020%25%20%2810%5C%2F48%29%20of%20the%20studies%20report%20cases%20of%20women%20withdrawing%20from%20their%20political%20roles.%20In%20terms%20of%20coping%20strategies%2C%2066%25%20%2832%5C%2F48%29%20report%20women%20blocking%20or%20muting%20harassers%2C%20while%2037%25%20%2818%5C%2F48%29%20document%20women%20reporting%20abuse%20to%20authorities%20or%20platforms.%20This%20study%20highlights%20the%20pervasive%20impact%20of%20technology-facilitated%20violence%20on%20women%5Cu2019s%20emotional%20well-being%2C%20and%20their%20political%20participation%20and%20underscores%20its%20broader%20implications%20for%20democratic%20discourse%20and%20social%20equity.%22%2C%22date%22%3A%222025-06-27%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F15248380251343185%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F15248380251343185%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221524-8380%2C%201552-8324%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222026-04-14T08%3A40%3A41Z%22%7D%7D%2C%7B%22key%22%3A%22IAH8BM2B%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Masboungi%20and%20Quarterman%22%2C%22parsedDate%22%3A%222025-06-12%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BMasboungi%2C%20C.%2C%20%26amp%3B%20Quarterman%2C%20L.%20%282025%2C%20June%2012%29.%20When%20Will%20We%20Listen%3F%20-%20Centering%20Girls%26%23x2019%3B%20Voices%20in%20Our%20Efforts%20on%20Technology-facilitated%20Gender-based%20Violence%20%28TFGBV%29.%20%26lt%3Bi%26gt%3BSVRI%20Blog%26lt%3B%5C%2Fi%26gt%3B.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.svri.org%5C%2Fwhen-will-we-listen-centering-girls-voices-in-our-efforts-on-technology-facilitated-gender-based-violence-tfgbv%5C%2F%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.svri.org%5C%2Fwhen-will-we-listen-centering-girls-voices-in-our-efforts-on-technology-facilitated-gender-based-violence-tfgbv%5C%2F%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22blogPost%22%2C%22title%22%3A%22When%20Will%20We%20Listen%3F%20-%20Centering%20Girls%27%20Voices%20in%20Our%20Efforts%20on%20Technology-facilitated%20Gender-based%20Violence%20%28TFGBV%29%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Caroline%22%2C%22lastName%22%3A%22Masboungi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lara%22%2C%22lastName%22%3A%22Quarterman%22%7D%5D%2C%22abstractNote%22%3A%22This%20blog%20challenges%20how%20we%20talk%20about%20online%20misogyny%20and%20radicalisation%2C%20urging%20us%20not%20to%20erase%20the%20voices%20of%20girls%20harmed%20by%20gender-based%20violence.%22%2C%22blogTitle%22%3A%22SVRI%20Blog%22%2C%22date%22%3A%222025-06-12T09%3A33%3A00%2B00%3A00%22%2C%22DOI%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.svri.org%5C%2Fwhen-will-we-listen-centering-girls-voices-in-our-efforts-on-technology-facilitated-gender-based-violence-tfgbv%5C%2F%22%2C%22ISSN%22%3A%22%22%2C%22language%22%3A%22en-US%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222025-06-25T13%3A50%3A38Z%22%7D%7D%2C%7B%22key%22%3A%22Z9TLMGFI%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ison%20et%20al.%22%2C%22parsedDate%22%3A%222025-06-04%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BIson%2C%20J.%2C%20Santamaria%2C%20E.%2C%20Caluzzi%2C%20G.%2C%20McAllister%2C%20C.%2C%20Hooker%2C%20L.%2C%20Wilson%2C%20I.%2C%20Theobald%2C%20J.%2C%20Laslett%2C%20A.-M.%2C%20%26amp%3B%20Riordan%2C%20B.%20%282025%29.%20%26%23x201C%3BI%20Don%26%23x2019%3Bt%20Know%20for%20Certain%26%23x201D%3B%3A%20A%20Content%20Analysis%20of%20Reddit%20Posters%26%23x2019%3B%20Accounts%20of%20Drink%20Spiking.%20%26lt%3Bi%26gt%3BViolence%20Against%20Women%26lt%3B%5C%2Fi%26gt%3B%2C%2010778012251347585.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012251347585%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012251347585%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22%5Cu201cI%20Don%5Cu2019t%20Know%20for%20Certain%5Cu201d%3A%20A%20Content%20Analysis%20of%20Reddit%20Posters%5Cu2019%20Accounts%20of%20Drink%20Spiking%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jessica%22%2C%22lastName%22%3A%22Ison%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Erin%22%2C%22lastName%22%3A%22Santamaria%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Gabriel%22%2C%22lastName%22%3A%22Caluzzi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Callum%22%2C%22lastName%22%3A%22McAllister%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Leesa%22%2C%22lastName%22%3A%22Hooker%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ingrid%22%2C%22lastName%22%3A%22Wilson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jacqui%22%2C%22lastName%22%3A%22Theobald%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Anne-Marie%22%2C%22lastName%22%3A%22Laslett%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Benjamin%22%2C%22lastName%22%3A%22Riordan%22%7D%5D%2C%22abstractNote%22%3A%22This%20study%20analyzed%20drink%20spiking%20posts%20on%20Reddit%2C%20examining%2091%20threads%20and%2014%2C284%20comments%20to%20understand%20victim-survivor%20and%20bystander%20experiences.%20Our%20analysis%20produced%20four%20themes%3A%20contexts%20of%20drink%20spiking%2C%20harms%20experienced%2C%20immediate%20bystander%20actions%2C%20and%20long-term%20help-seeking.%20Drink%20spiking%20was%20often%20reported%20by%20women%20with%20male%20perpetrators%2C%20typically%20occurring%20in%20bars%2C%20private%20residences%2C%20or%20parties%20where%20alcohol%20was%20consumed%20and%20other%20drugs%20were%20likely%20administered%20without%20consent.%20Many%20victims%20described%20long-term%20mental%20health%20impacts%20and%20inadequate%20responses%20from%20emergency%20services.%20We%20recommend%20%5Cu201calcohol%20and%20drug-facilitated%20sexual%20violence%5Cu201d%20as%20more%20inclusive%20terminology%20and%20highlight%20the%20need%20for%20interventions%20that%20validate%20victim-survivor%20experiences.%22%2C%22date%22%3A%222025-06-04%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F10778012251347585%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F10778012251347585%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221077-8012%2C%201552-8448%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222025-06-25T08%3A57%3A47Z%22%7D%7D%2C%7B%22key%22%3A%22MD3DGV77%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Peterman%20et%20al.%22%2C%22parsedDate%22%3A%222025-06-02%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BPeterman%2C%20A.%2C%20Guedes%2C%20A.%2C%20%26amp%3B%20Kolbe-Stuart%2C%20C.%20%282025%2C%20June%202%29.%20Netflix%26%23x2019%3Bs%20Adolescence%3A%20Social%20Change%20Through%20Edutainment.%20%26lt%3Bi%26gt%3BThink%20Global%20Health%26lt%3B%5C%2Fi%26gt%3B.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.thinkglobalhealth.org%5C%2Farticle%5C%2Fnetflixs-adolescence-social-change-through-edutainment%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.thinkglobalhealth.org%5C%2Farticle%5C%2Fnetflixs-adolescence-social-change-through-edutainment%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22blogPost%22%2C%22title%22%3A%22Netflix%27s%20Adolescence%3A%20Social%20Change%20Through%20Edutainment%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Amber%22%2C%22lastName%22%3A%22Peterman%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alessandra%22%2C%22lastName%22%3A%22Guedes%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Christine%22%2C%22lastName%22%3A%22Kolbe-Stuart%22%7D%5D%2C%22abstractNote%22%3A%22The%20evidence%20behind%20the%20power%20of%20educational%20entertainment%20to%20prevent%20violence%20against%20women%20and%20children%22%2C%22blogTitle%22%3A%22Think%20Global%20Health%22%2C%22date%22%3A%222025-06-02%22%2C%22DOI%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.thinkglobalhealth.org%5C%2Farticle%5C%2Fnetflixs-adolescence-social-change-through-edutainment%22%2C%22ISSN%22%3A%22%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222025-06-25T09%3A04%3A17Z%22%7D%7D%2C%7B%22key%22%3A%22ZNCW8A5H%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Ofcom%22%2C%22parsedDate%22%3A%222025-06%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BOfcom.%20%282025%29.%20%26lt%3Bi%26gt%3BExperiences%20of%20engaging%20with%20the%20manosphere%26lt%3B%5C%2Fi%26gt%3B.%20Ofcom.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.ofcom.org.uk%5C%2Fonline-safety%5C%2Fprotecting-children%5C%2Fexperiences-of-engaging-with-the-manosphere%3Futm_medium%3Demail%26amp%3Butm_campaign%3DThe%2520Manosphere%2520unmasked%2520%2520new%2520qualitative%2520research%26amp%3Butm_content%3DThe%2520Manosphere%2520unmasked%2520%2520new%2520qualitative%2520research%2BCID_e5bc671ef53eabdd9a52837922ffee22%26amp%3Butm_source%3Dupdates%26amp%3Butm_term%3Dnew%2520research%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.ofcom.org.uk%5C%2Fonline-safety%5C%2Fprotecting-children%5C%2Fexperiences-of-engaging-with-the-manosphere%3Futm_medium%3Demail%26amp%3Butm_campaign%3DThe%2520Manosphere%2520unmasked%2520%2520new%2520qualitative%2520research%26amp%3Butm_content%3DThe%2520Manosphere%2520unmasked%2520%2520new%2520qualitative%2520research%2BCID_e5bc671ef53eabdd9a52837922ffee22%26amp%3Butm_source%3Dupdates%26amp%3Butm_term%3Dnew%2520research%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Experiences%20of%20engaging%20with%20the%20manosphere%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22Ofcom%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22Ofcom%22%2C%22date%22%3A%222025%5C%2F06%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.ofcom.org.uk%5C%2Fonline-safety%5C%2Fprotecting-children%5C%2Fexperiences-of-engaging-with-the-manosphere%3Futm_medium%3Demail%26utm_campaign%3DThe%2520Manosphere%2520unmasked%2520%2520new%2520qualitative%2520research%26utm_content%3DThe%2520Manosphere%2520unmasked%2520%2520new%2520qualitative%2520research%2BCID_e5bc671ef53eabdd9a52837922ffee22%26utm_source%3Dupdates%26utm_term%3Dnew%2520research%22%2C%22ISSN%22%3A%22%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222025-06-25T13%3A59%3A22Z%22%7D%7D%2C%7B%22key%22%3A%22AVEQPQW5%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kirkman%20et%20al.%22%2C%22parsedDate%22%3A%222025-03-01%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKirkman%2C%20G.%2C%20Willmott%2C%20D.%2C%20Boduszek%2C%20D.%2C%20%26amp%3B%20Debowska%2C%20A.%20%282025%29.%20Introduction%20and%20validation%20of%20the%20Modern%20Adolescent%20Dating%20Violence%20Attitude%20%28MADVA%29%20scale%3A%20A%20contemporary%20tool%20for%20assessing%20adolescent%20attitudes%20towards%20dating%20violence%20in%20offline%20and%20online%20environments.%20%26lt%3Bi%26gt%3BInternational%20Journal%20of%20Law%2C%20Crime%20and%20Justice%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B80%26lt%3B%5C%2Fi%26gt%3B%2C%20100705.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.ijlcj.2024.100705%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.ijlcj.2024.100705%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Introduction%20and%20validation%20of%20the%20Modern%20Adolescent%20Dating%20Violence%20Attitude%20%28MADVA%29%20scale%3A%20A%20contemporary%20tool%20for%20assessing%20adolescent%20attitudes%20towards%20dating%20violence%20in%20offline%20and%20online%20environments%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Gill%22%2C%22lastName%22%3A%22Kirkman%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Dominic%22%2C%22lastName%22%3A%22Willmott%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Daniel%22%2C%22lastName%22%3A%22Boduszek%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Agata%22%2C%22lastName%22%3A%22Debowska%22%7D%5D%2C%22abstractNote%22%3A%22The%20study%20developed%20and%20validated%20the%20Modern%20Adolescent%20Dating%20Violence%20Attitude%20%28MADVA%29%20scale%2C%20examining%20young%20people%26%23039%3Bs%20attitudes%20towards%20online%20and%20offline%20variants%20of%20adolescent%20dating%20violence%20and%20abuse%20%28ADVA%29.%20Data%20were%20collected%20among%202011%20adolescents%20from%20England%2C%20aged%2010%5Cu201325%20%28M%2015.72%20years%29.%20Dimensionality%20and%20construct%20validity%20of%20the%20MADVA%20was%20investigated%20using%20traditional%20Confirmatory%20Factor%20Analysis.%20Results%20indicate%20a%20six-factor%20model%20%28Attitudes%20towards%3A%20Sexual%20Abuse-Online%3B%20Sexual%20Abuse-Offline%3B%20Psychological%20Abuse-Online%3B%20Psychological%20Abuse-Offline%3B%20Physical%20Abuse-Offline%3B%20Controlling%20Behaviour-Offline%29.%20Excellent%20composite%20reliability%20and%20differential%20predictive%20validity%20were%20observed%20for%20all%20six%20subscales.%20The%20MADVA%20scale%20enables%20users%20to%20better%20evaluate%20ADVA%20prevention-programmes.%22%2C%22date%22%3A%222025-03-01%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1016%5C%2Fj.ijlcj.2024.100705%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.sciencedirect.com%5C%2Fscience%5C%2Farticle%5C%2Fpii%5C%2FS1756061624000570%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221756-0616%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%2C%229V9IUVAA%22%5D%2C%22dateModified%22%3A%222025-02-26T09%3A47%3A43Z%22%7D%7D%2C%7B%22key%22%3A%22QIQHYLYY%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Rindestig%20et%20al.%22%2C%22parsedDate%22%3A%222025-03-01%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BRindestig%2C%20F.%20C.%2C%20G%26%23xE5%3Bdin%2C%20K.%20G.%2C%20Jonsson%2C%20L.%2C%20Svedin%2C%20C.-G.%2C%20Landberg%2C%20%26%23xC5%3B.%2C%20%26amp%3B%20Dennhag%2C%20I.%20%282025%29.%20A%20latent%20class%20analysis%20of%20technology-facilitated%20sexual%20violence%3A%20Associations%20to%20other%20victimizations%2C%20psychiatric%20symptoms%2C%20and%20gender.%20%26lt%3Bi%26gt%3BChild%20Abuse%20%26amp%3B%20Neglect%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B161%26lt%3B%5C%2Fi%26gt%3B%2C%20107309.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.chiabu.2025.107309%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.chiabu.2025.107309%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22A%20latent%20class%20analysis%20of%20technology-facilitated%20sexual%20violence%3A%20Associations%20to%20other%20victimizations%2C%20psychiatric%20symptoms%2C%20and%20gender%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Frida%20Carlberg%22%2C%22lastName%22%3A%22Rindestig%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Katja%20Gillander%22%2C%22lastName%22%3A%22G%5Cu00e5din%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Linda%22%2C%22lastName%22%3A%22Jonsson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Carl-G%5Cu00f6ran%22%2C%22lastName%22%3A%22Svedin%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%5Cu00c5sa%22%2C%22lastName%22%3A%22Landberg%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Inga%22%2C%22lastName%22%3A%22Dennhag%22%7D%5D%2C%22abstractNote%22%3A%22Background%5CnPoly-victimization%20research%20has%20shown%20the%20cumulative%20detrimental%20effects%20of%20violence%20exposure%20on%20mental%20health.%20Latent%20Class%20Analysis%20%28LCA%29%20of%20victimization%20is%20a%20growing%20research%20field%20uncovering%20specific%20combinations%20of%20violence%20exposures%20particularly%20negative%20to%20mental%20health.%20Despite%20a%20growing%20concern%20of%20technology-facilitated%20violence%20%28TFSV%29%2C%20it%20is%20scarcely%20included%20in%20LCA%20studies.%5CnObjectives%5CnInvestigating%20victimization%20typologies%20that%20includes%20technology%20facilitated%20sexual%20violence.%5CnParticipants%20and%20setting%5CnCross-sectional%20survey%20data%20from%20a%20representative%20sample%20of%20Swedish%20young%20people%20in%20the%20age%20range%20of%2016%5Cu201323%20%28N%5Cu00a0%3D%5Cu00a03243%2C%20mean%20age%5Cu00a0%3D%5Cu00a018.20%2C%20SD%5Cu00a0%3D%5Cu00a00.61%29.%5CnMethods%5CnA%20Latent%20Class%20Analysis%20was%20conducted%20using%20the%20package%20PoLCA%20in%20R.%20A%20model%20with%20three%20classes%20was%20deemed%20to%20best%20fit%20the%20data.%5CnResults%5CnClass%201%20%28sexual%20polyvictimization%2C%2010.1%5Cu00a0%25%29%20had%20high%20probabilities%20of%20all%20forms%20of%20sexual%20violence%20including%20TFSV%20and%20the%20highest%20proportion%20of%20psychiatric%20diagnosis%20%2845.2%5Cu00a0%25%29.%20This%20class%20consisted%20of%20mostly%20girls.%20Class%202%20%28child%20abuse%20polyvictimization%2C14.8%5Cu00a0%25%29%20was%20characterized%20by%20high%20probabilities%20of%20physical%20and%20psychological%20child%20abuse%20and%20had%20an%20even%20gender%20distribution.%2030.6%5Cu00a0%25%20of%20this%20class%20endorsed%20having%20a%20psychiatric%20diagnosis.%20Class%203%20%2875.1%5Cu00a0%25%29%20was%20a%20low%20victimization%5C%2Fnormative%20subgroup%20with%20an%20even%20gender%20distribution%20and%20a%20low%20%2812.8%5Cu00a0%25%29%20frequency%20of%20psychiatric%20diagnosis.%20Class%201%20exhibited%20the%20highest%20levels%20of%20psychiatric%20symptoms.%5CnConclusions%5CnPrevention%20efforts%20targeted%20against%20TFSV%20should%20consider%20the%20whole%20web%20of%20violence%20that%20some%20young%20people%20are%20situated%20in.%20Since%20TFSV%20seems%20to%20be%20connected%20to%20psychiatric%20symptoms%20and%20diagnosis%2C%20Child-%20and%20Adolescent%20Psychiatric%20services%20should%20pay%20more%20attention%20to%20this%20type%20of%20violence%20among%20their%20young%20patients.%22%2C%22date%22%3A%222025-03-01%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1016%5C%2Fj.chiabu.2025.107309%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.sciencedirect.com%5C%2Fscience%5C%2Farticle%5C%2Fpii%5C%2FS014521342500064X%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%220145-2134%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222025-02-14T12%3A48%3A37Z%22%7D%7D%2C%7B%22key%22%3A%229NMQIK44%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Koukopoulos%20et%20al.%22%2C%22parsedDate%22%3A%222025-01-18%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKoukopoulos%2C%20N.%2C%20Janickyj%2C%20M.%2C%20%26amp%3B%20Tanczer%2C%20L.%20M.%20%282025%29.%20Defining%20and%20Conceptualizing%20Technology-Facilitated%20Abuse%20%28%26%23x201C%3BTech%20Abuse%26%23x201D%3B%29%3A%20Findings%20of%20a%20Global%20Delphi%20Study.%20%26lt%3Bi%26gt%3BJournal%20of%20Interpersonal%20Violence%26lt%3B%5C%2Fi%26gt%3B%2C%2008862605241310465.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605241310465%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605241310465%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Defining%20and%20Conceptualizing%20Technology-Facilitated%20Abuse%20%28%5Cu201cTech%20Abuse%5Cu201d%29%3A%20Findings%20of%20a%20Global%20Delphi%20Study%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Nikolaos%22%2C%22lastName%22%3A%22Koukopoulos%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Madeleine%22%2C%22lastName%22%3A%22Janickyj%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Leonie%20Maria%22%2C%22lastName%22%3A%22Tanczer%22%7D%5D%2C%22abstractNote%22%3A%22Technology-facilitated%20abuse%20%28TFA%29%20describes%20the%20misuse%20or%20repurposing%20of%20digital%20systems%20to%20harass%2C%20coerce%2C%20or%20abuse.%20It%20is%20a%20global%20problem%20involving%20both%20existing%20and%20emerging%20technologies.%20Despite%20significant%20work%20across%20research%2C%20policy%2C%20and%20practice%20to%20understand%20the%20issue%2C%20the%20field%20operates%20within%20linguistic%2C%20conceptual%2C%20and%20disciplinary%20silos%2C%20inhibiting%20collaboration.%20To%20address%20this%2C%20the%20present%20study%20used%20the%20Delphi%20technique%20to%20reach%20a%20consensus%20on%20TFA%20conceptualization%2C%20definition%2C%20terminology%2C%20and%20measurement%20among%20subject%20experts.%20Following%20a%20literature%20review%2C%20a%20global%2C%20cross-disciplinary%20sample%20of%20academics%2C%20practitioners%2C%20and%20policymakers%20%28%20n%5Cu2009%3D%5Cu2009316%29%20reflected%20on%20TFA%20across%20three%20survey%20rounds.%20The%20results%20showed%20both%20aligned%20and%20opposing%20perspectives.%20%5Cu201cTechnology%5Cu201d%20and%20%5Cu201cfacilitated%5Cu201d%20were%20the%20most%20preferable%20terms.%20Still%2C%20there%20was%20uncertainty%20regarding%20the%20need%20for%20additional%20terminologies%20to%20denote%20the%20scope%20of%20abuse%2C%20such%20as%20gendered%20descriptors.%20Participants%20had%20little%20familiarity%20with%20existing%20TFA%20measurement%20tools%2C%20with%20two-thirds%20unaware%20of%20any.%20Most%20experts%20agreed%20on%20conceptualizing%20TFA%20based%20on%20the%20perpetrator%5Cu2019s%20behavior%2C%20the%20victim%5Cu2019s%20harm%20and%20impact%2C%20and%20consent.%20They%20also%20supported%20an%20expansive%20TFA%20definition%2C%20beyond%20intimate%20relationships%2C%20that%20can%20involve%20groups%20and%20communities%20as%20perpetrators%20or%20targets.%20However%2C%20they%20were%20more%20reluctant%20to%20perceive%20TFA%20as%20a%20distinct%20abuse%20form%2C%20or%20one%20guided%20by%20social%20norms%2C%20legal%20thresholds%2C%20or%20involving%20child%20perpetrators.%20The%20findings%20are%20discussed%20in%20the%20context%20of%20the%20current%20TFA%20landscape%2C%20along%20with%20study%20limitations%20and%20steps%20to%20achieve%20a%20more%20unified%20TFA%20understanding.%22%2C%22date%22%3A%222025-01-18%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F08862605241310465%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F08862605241310465%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%220886-2605%2C%201552-6518%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222025-01-28T07%3A30%3A48Z%22%7D%7D%2C%7B%22key%22%3A%22NV9V7VNB%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Thompson%20et%20al.%22%2C%22parsedDate%22%3A%222025%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BThompson%2C%20L.%2C%20Rousay%2C%20V.%2C%20McNamara%2C%20H.%2C%20Moric%2C%20L.%2C%20van%20der%20Wat%2C%20M.%2C%20%26amp%3B%20Gaetan%2C%20E.%20%282025%29.%20%26lt%3Bi%26gt%3BNOT%20A%20FANTASY%3A%20How%20the%20Pornography%20Industry%20Exploits%20Image-based%20Sexual%20Abuse%20in%20Real%20Life%26lt%3B%5C%2Fi%26gt%3B.%20National%20Center%20on%20Sexual%20Exploitation.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fendsexualexploitation.org%5C%2Fwp-content%5C%2Fuploads%5C%2FNot-a-Fantasy-Report_NCOSE.pdf%3Fsm_guid%3DODY2NTc3fDc4MzY4MzQzfC0xfGxhaEB3dW5ybi5jb218Nzk2ODUyMXx8MHwwfDI2MzA5ODIwNHwxMTMyfDB8MHx8ODYxODY2fDA1%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fendsexualexploitation.org%5C%2Fwp-content%5C%2Fuploads%5C%2FNot-a-Fantasy-Report_NCOSE.pdf%3Fsm_guid%3DODY2NTc3fDc4MzY4MzQzfC0xfGxhaEB3dW5ybi5jb218Nzk2ODUyMXx8MHwwfDI2MzA5ODIwNHwxMTMyfDB8MHx8ODYxODY2fDA1%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22NOT%20A%20FANTASY%3A%20How%20the%20Pornography%20Industry%20Exploits%20Image-based%20Sexual%20Abuse%20in%20Real%20Life%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lisa%22%2C%22lastName%22%3A%22Thompson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Victoria%22%2C%22lastName%22%3A%22Rousay%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Haley%22%2C%22lastName%22%3A%22McNamara%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lily%22%2C%22lastName%22%3A%22Moric%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marcel%22%2C%22lastName%22%3A%22van%20der%20Wat%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Eleanor%22%2C%22lastName%22%3A%22Gaetan%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22National%20Center%20on%20Sexual%20Exploitation%22%2C%22date%22%3A%222025%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fendsexualexploitation.org%5C%2Fwp-content%5C%2Fuploads%5C%2FNot-a-Fantasy-Report_NCOSE.pdf%3Fsm_guid%3DODY2NTc3fDc4MzY4MzQzfC0xfGxhaEB3dW5ybi5jb218Nzk2ODUyMXx8MHwwfDI2MzA5ODIwNHwxMTMyfDB8MHx8ODYxODY2fDA1%22%2C%22ISSN%22%3A%22%22%2C%22language%22%3A%22en-US%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222025-06-25T08%3A27%3A58Z%22%7D%7D%2C%7B%22key%22%3A%228U2PAMCQ%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Prune%22%2C%22parsedDate%22%3A%222025%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BPrune.%20%282025%29.%20%26lt%3Bi%26gt%3BAI-powered%20takedowns%3A%20We%20weaponize%20LLMs%20against%5Cndigital%20exploitation%26lt%3B%5C%2Fi%26gt%3B.%20Prune.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fprune.co%5C%2F%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fprune.co%5C%2F%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22AI-powered%20takedowns%3A%20We%20weaponize%20LLMs%20against%5Cndigital%20exploitation%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22Prune%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222025%22%2C%22DOI%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fprune.co%5C%2F%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222025-06-18T16%3A13%3A31Z%22%7D%7D%2C%7B%22key%22%3A%22PCN5HF59%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Lu%20et%20al.%22%2C%22parsedDate%22%3A%222024-11-01%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BLu%2C%20M.%2C%20Lamond%2C%20M.%2C%20%26amp%3B%20Fry%2C%20D.%20%282024%29.%20A%20content%20analysis%20of%20metrics%20on%20online%20child%20sexual%20exploitation%20and%20abuse%20used%20by%20online%20content-sharing%20services.%20%26lt%3Bi%26gt%3BChild%20Abuse%20%26amp%3B%20Neglect%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B157%26lt%3B%5C%2Fi%26gt%3B%2C%20107046.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.chiabu.2024.107046%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1016%5C%2Fj.chiabu.2024.107046%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22A%20content%20analysis%20of%20metrics%20on%20online%20child%20sexual%20exploitation%20and%20abuse%20used%20by%20online%20content-sharing%20services%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mengyao%22%2C%22lastName%22%3A%22Lu%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Maria%22%2C%22lastName%22%3A%22Lamond%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Deborah%22%2C%22lastName%22%3A%22Fry%22%7D%5D%2C%22abstractNote%22%3A%22Background%5CnA%20critical%20step%20in%20improving%20the%20response%20to%20and%20monitoring%20of%20online%20child%20sexual%20exploitation%20and%20abuse%20%28OCSEA%29%20is%20the%20need%20to%20standardize%20the%20data%20that%20are%20collected%2C%20stored%2C%20and%20analyzed%20that%20effectively%20measure%20change%20in%20the%20frequency%2C%20nature%20and%20risk%20of%20OCSEA%20over%20time.%5CnObjective%5CnThe%20objective%20of%20the%20content%20analysis%20was%20to%20investigate%20the%20metrics%20used%20by%20online%20content-sharing%20platforms%20in%20their%20efforts%20to%20combat%20OCSEA.%5CnMethods%5CnA%20content%20analysis%20was%20undertaken%20on%2019%20online%20content-sharing%20services%26%23039%3B%20transparency%20reports%20on%20their%20metrics%20related%20to%20OCSEA.%5CnResults%5CnFrom%20the%2019%20transparency%20reports%2C%20132%20data%20points%20in%20relation%20to%20OCSEA%20were%20identified%20with%2022%20distinct%20metrics%20on%20OCSEA.%20Findings%20revealed%20a%20disparity%20of%20appropriate%20metrics%20and%20reporting%20mechanisms%20employed%2C%20particularly%2C%20there%20is%20a%20lack%20of%20standardized%20approaches%20to%20metrics%20reporting%20and%20an%20absence%20of%20time%20related%20measures.%20Furthermore%2C%20very%20few%20online%20content-sharing%20services%20disclosed%20metadata%20on%20the%20data%20reported%20and%20its%20capture%20methodology.%5CnConclusion%5CnThis%20study%20highlights%20the%20critical%20need%20for%20standardized%20metrics%20reporting%20to%20enable%20comparability%20across%20services.%20Without%20such%20an%20evidence%20base%2C%20there%20are%20no%20objective%20measures%20to%20assess%20the%20progress%20and%20effectiveness%20in%20addressing%20OCSEA.%22%2C%22date%22%3A%222024-11-01%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1016%5C%2Fj.chiabu.2024.107046%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.sciencedirect.com%5C%2Fscience%5C%2Farticle%5C%2Fpii%5C%2FS0145213424004368%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%220145-2134%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%2C%22SWE8BR2S%22%5D%2C%22dateModified%22%3A%222024-11-11T13%3A52%3A56Z%22%7D%7D%2C%7B%22key%22%3A%229W32DTQS%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Quayle%20et%20al.%22%2C%22parsedDate%22%3A%222024-03-28%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BQuayle%2C%20E.%2C%20Larkin%2C%20A.%2C%20Schwannauer%2C%20M.%2C%20Varese%2C%20F.%2C%20Cartwright%2C%20K.%2C%20Chitsabesan%2C%20P.%2C%20Green%2C%20V.%2C%20Radford%2C%20G.%2C%20Richards%2C%20C.%2C%20Shafi%2C%20S.%2C%20Whelan%2C%20P.%2C%20Chan%2C%20C.%2C%20Hewins%2C%20W.%2C%20Newton%2C%20A.%2C%20Niebauer%2C%20E.%2C%20Sandys%2C%20M.%2C%20Ward%2C%20J.%2C%20%26amp%3B%20Bucci%2C%20S.%20%282024%29.%20Experiences%20of%20a%20digital%20health%20intervention%20for%20young%20people%20exposed%20to%20technology%20assisted%20sexual%20abuse%3A%20a%20qualitative%20study.%20%26lt%3Bi%26gt%3BBMC%20Psychiatry%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B24%26lt%3B%5C%2Fi%26gt%3B%2C%20237.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1186%5C%2Fs12888-024-05605-6%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1186%5C%2Fs12888-024-05605-6%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Experiences%20of%20a%20digital%20health%20intervention%20for%20young%20people%20exposed%20to%20technology%20assisted%20sexual%20abuse%3A%20a%20qualitative%20study%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ethel%22%2C%22lastName%22%3A%22Quayle%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Amanda%22%2C%22lastName%22%3A%22Larkin%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Matthias%22%2C%22lastName%22%3A%22Schwannauer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Filippo%22%2C%22lastName%22%3A%22Varese%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kim%22%2C%22lastName%22%3A%22Cartwright%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Prathiba%22%2C%22lastName%22%3A%22Chitsabesan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Victoria%22%2C%22lastName%22%3A%22Green%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Gillian%22%2C%22lastName%22%3A%22Radford%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cathy%22%2C%22lastName%22%3A%22Richards%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sara%22%2C%22lastName%22%3A%22Shafi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Pauline%22%2C%22lastName%22%3A%22Whelan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Cindy%22%2C%22lastName%22%3A%22Chan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22William%22%2C%22lastName%22%3A%22Hewins%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Alice%22%2C%22lastName%22%3A%22Newton%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Erica%22%2C%22lastName%22%3A%22Niebauer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Marina%22%2C%22lastName%22%3A%22Sandys%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jennifer%22%2C%22lastName%22%3A%22Ward%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sandra%22%2C%22lastName%22%3A%22Bucci%22%7D%5D%2C%22abstractNote%22%3A%22Background%5CnThere%20is%20growing%20evidence%20that%20Technology%20Assisted%20Sexual%20Abuse%20%28TASA%29%20represents%20a%20serious%20problem%20for%20large%20numbers%20of%20children.%20To%20date%2C%20there%20are%20very%20few%20evidence-based%20interventions%20available%20to%20young%20people%20%28YP%29%20after%20they%20have%20been%20exposed%20to%20this%20form%20of%20abuse%2C%20and%20access%20to%20support%20services%20remains%20a%20challenge.%20Digital%20tools%20such%20as%20smartphones%20have%20the%20potential%20to%20increase%20access%20to%20mental%20health%20support%20and%20may%20provide%20an%20opportunity%20for%20YP%20to%20both%20manage%20their%20distress%20and%20reduce%20the%20possibility%20of%20further%20victimization.%20The%20current%20study%20explores%20the%20acceptability%20of%20a%20digital%20health%20intervention%20%28DHI%3B%20the%20i-Minds%20app%29%20which%20is%20a%20theory-driven%2C%20co-produced%2C%20mentalization-based%20DHI%20designed%20for%20YP%20aged%2012%5Cu201318%20who%20have%20experienced%20TASA.%5Cn%5CnMethods%5CnSemi-structured%20interviews%20were%20conducted%20with%2015%20YP%20recruited%20through%20Child%20and%20Adolescent%20Mental%20Health%20Services%2C%20a%20Sexual%20Assault%20Referral%20Centre%20and%20an%20e-therapy%20provider%20who%20had%20access%20to%20the%20i-Minds%20app%20as%20part%20of%20a%20feasibility%20clinical%20trial.%20Interviews%20focused%20on%20the%20acceptability%20and%20usability%20of%20i-Minds%20and%20were%20coded%20to%20themes%20based%20on%20the%20Acceptability%20of%20Healthcare%20Interventions%20framework.%5Cn%5CnResults%5CnAll%20participants%20found%20the%20i-Minds%20app%20acceptable.%20Many%20aspects%20of%20the%20app%20were%20seen%20as%20enjoyable%20and%20useful%20in%20helping%20YP%20understand%20their%20abuse%2C%20manage%20feelings%2C%20and%20change%20behavior.%20The%20app%20was%20seen%20as%20usable%20and%20easy%20to%20navigate%2C%20but%20for%20some%20participants%20the%20level%20of%20text%20was%20problematic%20and%20aspects%20of%20the%20content%20was%2C%20at%20times%2C%20emotionally%20distressing%20at%20times.%5Cn%5CnConclusions%5CnThe%20i-Minds%20app%20is%20useful%20in%20the%20management%20of%20TASA%20and%20helping%20change%20some%20risk-related%20vulnerabilities.%20The%20app%20was%20designed%2C%20developed%20and%20evaluated%20with%20YP%20who%20had%20experienced%20TASA%20and%20this%20may%20account%20for%20the%20high%20levels%20of%20acceptability%20seen.%5Cn%5CnTrial%20registration%5CnThe%20trial%20was%20registered%20on%20the%20ISRCTN%20registry%20on%20the%2012%5C%2F04%5C%2F2022%20as%20i-Minds%3A%20a%20digital%20intervention%20for%20young%20people%20exposed%20to%20online%20sexual%20abuse%20%28ISRCTN43130832%29.%22%2C%22date%22%3A%222024-3-28%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1186%5C%2Fs12888-024-05605-6%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.ncbi.nlm.nih.gov%5C%2Fpmc%5C%2Farticles%5C%2FPMC10979588%5C%2F%22%2C%22PMID%22%3A%2238549096%22%2C%22PMCID%22%3A%22PMC10979588%22%2C%22ISSN%22%3A%221471-244X%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222024-04-05T11%3A56%3A57Z%22%7D%7D%2C%7B%22key%22%3A%22J6EPIURR%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Winkle%20and%20Mulvihill%22%2C%22parsedDate%22%3A%222024-03-11%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BWinkle%2C%20K.%2C%20%26amp%3B%20Mulvihill%2C%20N.%20%282024%29.%20Anticipating%20the%20Use%20of%20Robots%20in%20Domestic%20Abuse%3A%20A%20Typology%20of%20Robot%20Facilitated%20Abuse%20to%20Support%20Risk%20Assessment%20and%20Mitigation%20in%20Human-Robot%20Interaction.%20%26lt%3Bi%26gt%3BProceedings%20of%20the%202024%20ACM%5C%2FIEEE%20International%20Conference%20on%20Human-Robot%20Interaction%2C%20HRI%20%26%23x2019%3B24%26lt%3B%5C%2Fi%26gt%3B%2C%20781%26%23x2013%3B790.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1145%5C%2F3610977.3634938%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1145%5C%2F3610977.3634938%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22conferencePaper%22%2C%22title%22%3A%22Anticipating%20the%20Use%20of%20Robots%20in%20Domestic%20Abuse%3A%20A%20Typology%20of%20Robot%20Facilitated%20Abuse%20to%20Support%20Risk%20Assessment%20and%20Mitigation%20in%20Human-Robot%20Interaction%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Katie%22%2C%22lastName%22%3A%22Winkle%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Natasha%22%2C%22lastName%22%3A%22Mulvihill%22%7D%5D%2C%22abstractNote%22%3A%22Domestic%20abuse%20research%20demonstrates%20that%20perpetrators%20are%20agile%20in%20finding%20new%20ways%20to%20coerce%20and%20to%20consolidate%20their%20control.%20They%20may%20leverage%20loved%20ones%20or%20cherished%20objects%2C%20and%20are%20increasingly%20exploiting%20and%20subverting%20what%20have%20become%20everyday%20%26%23039%3Bsmart%26%23039%3B%20technologies.%20Robots%20sit%20at%20the%20intersection%20of%20these%20categories%3A%20they%20bring%20together%20multiple%20digital%20and%20assistive%20functionalities%20in%20a%20physical%20body%2C%20often%20explicitly%20designed%20to%20take%20on%20a%20social%20companionship%20role.%20We%20present%20a%20typology%20of%20robot%20facilitated%20abuse%20based%20on%20these%20unique%20affordances%2C%20designed%20to%20support%20systematic%20risk%20assessment%2C%20mitigation%20and%20design%20work.%20Whilst%20most%20obviously%20relevant%20to%20those%20designing%20robots%20for%20in-home%20deployment%20or%20intrafamilial%20interactions%2C%20the%20ability%20to%20coerce%20can%20be%20wielded%20by%20those%20who%20have%20any%20form%20of%20social%20power%2C%20such%20that%20our%20typology%20and%20associated%20design%20reflections%20may%20also%20be%20salient%20for%20the%20design%20of%20robots%20to%20be%20used%20in%20the%20school%20or%20workplace%2C%20between%20carers%20and%20the%20vulnerable%2C%20elderly%20and%20disabled%20and%5C%2For%20in%20institutions%20which%20facilitate%20intimate%20relations%20of%20care.%22%2C%22proceedingsTitle%22%3A%22Proceedings%20of%20the%202024%20ACM%5C%2FIEEE%20International%20Conference%20on%20Human-Robot%20Interaction%22%2C%22conferenceName%22%3A%22%22%2C%22date%22%3A%22March%2011%2C%202024%22%2C%22eventPlace%22%3A%22%22%2C%22DOI%22%3A%2210.1145%5C%2F3610977.3634938%22%2C%22ISBN%22%3A%229798400703225%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdl.acm.org%5C%2Fdoi%5C%2F10.1145%5C%2F3610977.3634938%22%2C%22ISSN%22%3A%22%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222024-04-03T06%3A40%3A14Z%22%7D%7D%2C%7B%22key%22%3A%22IUVW6AKS%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Jurasz%22%2C%22parsedDate%22%3A%222024-03%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BJurasz%2C%20O.%20%282024%2C%20March%29.%20%26lt%3Bi%26gt%3BOnline%20violence%20against%20women%3A%20A%20Four%20Nations%20study%26lt%3B%5C%2Fi%26gt%3B%20%5BOther%5D.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Foro.open.ac.uk%5C%2F96398%5C%2F%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Foro.open.ac.uk%5C%2F96398%5C%2F%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Online%20violence%20against%20women%3A%20A%20Four%20Nations%20study%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Olga%22%2C%22lastName%22%3A%22Jurasz%22%7D%5D%2C%22abstractNote%22%3A%22The%20Online%20violence%20against%20women%3A%20A%20Four%20Nations%20study%20project%20is%20funded%20through%20the%20Open%20University%5Cu2019s%20Open%20Societal%20Challenges%20programme.%20The%20study%20was%20designed%20and%20led%20by%20Professor%20Olga%20Jurasz.%20%5CnThe%20project%20is%20the%20first%20comprehensive%2C%20large%20scale%20and%20empirical%20study%20examining%20the%20phenomenon%20of%20OVAW%20across%20the%20UK.%20It%20empirically%20examines%20the%20scale%2C%20impact%2C%20and%20societal%20attitudes%20towards%20OVAW%20across%20England%2C%20Scotland%2C%20Wales%20and%20Northern%20Ireland.%20%20It%20also%20investigates%20societal%20attitudes%20towards%20online%20safety%2C%20online%20behaviours%2C%20law%20and%20policy%20responses%20towards%20violence%20against%20women%20%28online%20and%20offline%29%20and%20public%20views%20on%20responsibilities%20for%20preventing%20and%20responding%20to%20OVAW.%20Uniquely%2C%20the%20project%20also%20looks%20into%20men%5Cu2019s%20experiences%20of%20witnessing%20and%20reacting%20to%20OVAW.%20%5CnThe%20aim%20of%20the%20project%20is%20to%20gather%20comprehensive%20and%20representative%20data%20on%20OVAW%20in%20the%20UK%20to%20better%20understand%20this%20pressing%20issue%20and%20for%20it%20to%20inform%20evidence-based%20law%20and%20policy%20responses.%22%2C%22date%22%3A%222024-03%22%2C%22DOI%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Foro.open.ac.uk%5C%2F96398%5C%2F%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222024-05-20T09%3A42%3A07Z%22%7D%7D%2C%7B%22key%22%3A%22ST72A2JM%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22UN%20Women%22%2C%22parsedDate%22%3A%222024%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BUN%20Women.%20%282024%29.%20%26lt%3Bi%26gt%3BAction%20Coalitions%20on%20Gender%20Based%20Violence%20%26amp%3B%20Technology%20and%20Innovation%20for%20Gender%20Equality%3A%20Addressing%20gaps%20to%20prevent%20and%20eliminate%20technology%20facilitated%20gender-based%20violence%20against%20women%20and%20girls%26lt%3B%5C%2Fi%26gt%3B.%20UN%20Women.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fforum.generationequality.org%5C%2Fsites%5C%2Fdefault%5C%2Ffiles%5C%2F2024-01%5C%2FGBV-TechnologyFacilitated_11JAN24.pdf%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fforum.generationequality.org%5C%2Fsites%5C%2Fdefault%5C%2Ffiles%5C%2F2024-01%5C%2FGBV-TechnologyFacilitated_11JAN24.pdf%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Action%20Coalitions%20on%20Gender%20Based%20Violence%20%26%20Technology%20and%20Innovation%20for%20Gender%20Equality%3A%20Addressing%20gaps%20to%20prevent%20and%20eliminate%20technology%20facilitated%20gender-based%20violence%20against%20women%20and%20girls%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22UN%20Women%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22UN%20Women%22%2C%22date%22%3A%222024%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fforum.generationequality.org%5C%2Fsites%5C%2Fdefault%5C%2Ffiles%5C%2F2024-01%5C%2FGBV-TechnologyFacilitated_11JAN24.pdf%22%2C%22ISSN%22%3A%22%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222024-02-23T09%3A56%3A45Z%22%7D%7D%2C%7B%22key%22%3A%22UQXAWRFR%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Equality%20Now%22%2C%22parsedDate%22%3A%222024%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BEquality%20Now.%20%282024%29.%20%26lt%3Bi%26gt%3BBriefing%20paper%3A%20Deepfake%20image-based%20sexual%20abuse%2C%20tech-facilitated%20sexual%20exploitation%20and%20the%20law%26lt%3B%5C%2Fi%26gt%3B.%20Alliance%20for%20Universal%20Digital%20Rights.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fequalitynow.storage.googleapis.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2024%5C%2F01%5C%2F17084238%5C%2FEN-AUDRi-Briefing-paper-deepfake-06.pdf%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fequalitynow.storage.googleapis.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2024%5C%2F01%5C%2F17084238%5C%2FEN-AUDRi-Briefing-paper-deepfake-06.pdf%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Briefing%20paper%3A%20Deepfake%20image-based%20sexual%20abuse%2C%20tech-facilitated%20sexual%20exploitation%20and%20the%20law%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22Equality%20Now%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22Alliance%20for%20Universal%20Digital%20Rights%22%2C%22date%22%3A%222024%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fequalitynow.storage.googleapis.com%5C%2Fwp-content%5C%2Fuploads%5C%2F2024%5C%2F01%5C%2F17084238%5C%2FEN-AUDRi-Briefing-paper-deepfake-06.pdf%22%2C%22ISSN%22%3A%22%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222024-02-21T08%3A50%3A14Z%22%7D%7D%2C%7B%22key%22%3A%22SCJQCS6V%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Sheikh%20and%20Rogers%22%2C%22parsedDate%22%3A%222023-08-31%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BSheikh%2C%20M.%20M.%20R.%2C%20%26amp%3B%20Rogers%2C%20M.%20M.%20%282023%29.%20Technology-Facilitated%20Sexual%20Violence%20and%20Abuse%20in%20Low%20and%20Middle-Income%20Countries%3A%20A%20Scoping%20Review.%20%26lt%3Bi%26gt%3BTrauma%2C%20Violence%2C%20%26amp%3B%20Abuse%26lt%3B%5C%2Fi%26gt%3B%2C%2015248380231191189.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380231191189%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380231191189%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-Facilitated%20Sexual%20Violence%20and%20Abuse%20in%20Low%20and%20Middle-Income%20Countries%3A%20A%20Scoping%20Review%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Md%20Mamunur%20Rashid%22%2C%22lastName%22%3A%22Sheikh%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michaela%20M.%22%2C%22lastName%22%3A%22Rogers%22%7D%5D%2C%22abstractNote%22%3A%22Technology-facilitated%20sexual%20violence%20and%20abuse%20%28TFSVA%29%20is%20a%20pervasive%20phenomenon%20and%20a%20global%20problem.%20TFSVA%20refers%20to%20any%20form%20of%20sexual%20violence%2C%20exploitation%2C%20or%20harassment%20enacted%20through%20the%20misuse%20of%20digital%20technologies.%20This%20includes%2C%20but%20is%20not%20limited%20to%2C%20image-based%20sexual%20abuse%2C%20online%20sexual%20exploitation%20and%20harassment%2C%20sextortion%2C%20and%20the%20non-consensual%20sharing%20of%20sexual%20images.%20It%20has%20significant%20and%20long-lasting%20psychological%2C%20social%2C%20financial%2C%20and%20health%20impacts.%20TFSVA%20is%20on%20the%20rise%2C%20particularly%20in%20low%20and%20middle-income%20countries%20%28LMICs%29%2C%20where%20there%20has%20been%20an%20explosion%20in%20digital%20technology%20overall.%20This%20scoping%20review%20aimed%20to%20identify%20studies%20on%20TFSVA%20in%20LMICs%20to%20examine%20its%20types%2C%20impacts%2C%20victim-survivor%20coping%20strategies%2C%20and%20help-seeking.%20To%20identify%20peer-reviewed%20literature%2C%20six%20databases%20were%20searched%3A%20Applied%20Social%20Sciences%20Index%20%26amp%3B%20Abstracts%2C%20ProQuest%2C%20PubMed%2C%20Scopus%2C%20Star%20Plus-University%20of%20Sheffield%20library%20search%2C%20and%20Web%20of%20Science.%20The%20review%20included%20empirical%20studies%20published%20in%20English%20between%201996%20and%202022%2C%20focusing%20on%20TFSVA%20among%20adults%20%28aged%2018%2B%29%20in%20LMICs.%20A%20total%20of%2014%20peer-reviewed%20studies%20were%20included%2C%20highlighting%20that%20scant%20empirical%20research%20is%20available%20on%20TFSVA%20in%20LMICs.%20This%20review%20found%20several%20types%20of%20TFSVA%20and%20their%20wide-ranging%20impacts%3B%20traditional%20patriarchal%20societal%20norms%20and%20values%20largely%20shape%20TFSVA%20for%20women%20in%20LMICs.%20It%20also%20found%20more%20social%20impacts%20linked%20to%20sociocultural%20factors.%20Survivors%20adopted%20various%20coping%20mechanisms%20and%20help-seeking%20behaviors%20primarily%20through%20informal%20family%20support.%20Studies%20highlighted%20the%20need%20for%20effective%20legislation%3B%20pro-victim-survivor%20policing%3B%20strong%20family%20support%3B%20increasing%20victim-survivors%5Cu2019%20knowledge%20about%20reporting%3B%20and%20more%20research.%22%2C%22date%22%3A%222023-08-31%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F15248380231191189%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F15248380231191189%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221524-8380%2C%201552-8324%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-09-22T08%3A34%3A57Z%22%7D%7D%2C%7B%22key%22%3A%225JA2TGKT%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Douglas%20et%20al.%22%2C%22parsedDate%22%3A%222023-08-02%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BDouglas%2C%20H.%2C%20Tanczer%2C%20L.%2C%20McLachlan%2C%20F.%2C%20%26amp%3B%20Harris%2C%20B.%20%282023%29.%20Policing%20Technology-Facilitated%20Domestic%20Abuse%20%28TFDA%29%3A%20Views%20of%20Service%20Providers%20in%20Australia%20and%20the%20United%20Kingdom.%20%26lt%3Bi%26gt%3BJournal%20of%20Family%20Violence%26lt%3B%5C%2Fi%26gt%3B.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs10896-023-00619-2%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs10896-023-00619-2%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Policing%20Technology-Facilitated%20Domestic%20Abuse%20%28TFDA%29%3A%20Views%20of%20Service%20Providers%20in%20Australia%20and%20the%20United%20Kingdom%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Heather%22%2C%22lastName%22%3A%22Douglas%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Leonie%22%2C%22lastName%22%3A%22Tanczer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Freya%22%2C%22lastName%22%3A%22McLachlan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Bridget%22%2C%22lastName%22%3A%22Harris%22%7D%5D%2C%22abstractNote%22%3A%22Technology-facilitated%20domestic%20abuse%20%28TFDA%29%20is%20a%20prevalent%20form%20of%20domestic%20abuse.%20While%20police%20are%20recognized%20as%20critical%20first%20responders%20to%20intimate%20partner%20violence%2C%20there%20is%20limited%20research%20about%20what%20the%20challenges%20to%20policing%20TFDA%20are%20perceived%20to%20be%20and%20how%20they%20might%20be%20addressed.%20This%20article%20speaks%20to%20this%20issue.%22%2C%22date%22%3A%222023-08-02%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1007%5C%2Fs10896-023-00619-2%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1007%5C%2Fs10896-023-00619-2%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221573-2851%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%2C%22SCHT9S2U%22%2C%22ZIXXWK8K%22%5D%2C%22dateModified%22%3A%222025-10-15T13%3A13%3A22Z%22%7D%7D%2C%7B%22key%22%3A%22FCW87JSU%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22parsedDate%22%3A%222023-06-08%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3B%26lt%3Bi%26gt%3BSupporting%20Safer%20Digital%20Spaces%26lt%3B%5C%2Fi%26gt%3B.%20%282023%2C%20June%208%29.%20Centre%20for%20International%20Governance%20Innovation.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.cigionline.org%5C%2Fpublications%5C%2Fsupporting-safer-digital-spaces%5C%2F%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.cigionline.org%5C%2Fpublications%5C%2Fsupporting-safer-digital-spaces%5C%2F%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22webpage%22%2C%22title%22%3A%22Supporting%20Safer%20Digital%20Spaces%22%2C%22creators%22%3A%5B%5D%2C%22abstractNote%22%3A%22Quantitative%20data%20collected%20on%20people%5Cu2019s%20experiences%20with%2C%20and%20opinions%20on%2C%20online%20harms%20is%20presented%20in%20this%20report%2C%20along%20with%20recommendations%20for%20governments%2C%20technology%20companies%2C%20academics%2C%20researchers%20and%20civil%20society%20organizations%20on%20how%20they%20can%20contribute%20to%20addressing%20and%20ending%20technology-facilitated%20violence.%22%2C%22date%22%3A%222023-06-08T07%3A00%3A00-04%3A00%22%2C%22DOI%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.cigionline.org%5C%2Fpublications%5C%2Fsupporting-safer-digital-spaces%5C%2F%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222025-02-26T09%3A45%3A33Z%22%7D%7D%2C%7B%22key%22%3A%22BFQXS82R%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Halpin%20et%20al.%22%2C%22parsedDate%22%3A%222023-06-06%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHalpin%2C%20M.%2C%20Richard%2C%20N.%2C%20Preston%2C%20K.%2C%20Gosse%2C%20M.%2C%20%26amp%3B%20Maguire%2C%20F.%20%282023%29.%20Men%20who%20hate%20women%3A%20The%20misogyny%20of%20involuntarily%20celibate%20men.%20%26lt%3Bi%26gt%3BNew%20Media%20%26amp%3B%20Society%26lt%3B%5C%2Fi%26gt%3B%2C%20146144482311767.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F14614448231176777%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F14614448231176777%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Men%20who%20hate%20women%3A%20The%20misogyny%20of%20involuntarily%20celibate%20men%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michael%22%2C%22lastName%22%3A%22Halpin%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Norann%22%2C%22lastName%22%3A%22Richard%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Kayla%22%2C%22lastName%22%3A%22Preston%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Meghan%22%2C%22lastName%22%3A%22Gosse%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Finlay%22%2C%22lastName%22%3A%22Maguire%22%7D%5D%2C%22abstractNote%22%3A%22This%20article%20uses%20computational%20data%20and%20social%20science%20theories%20to%20analyze%20the%20misogynistic%20discourse%20of%20the%20involuntary%20celibate%20%28%5Cu201cincel%5Cu201d%29%20community.%20We%20analyzed%20every%20comment%20%28%20N%5Cu2009%3D%5Cu20093%2C686%2C110%29%20produced%20over%2042%5Cu2009months%20on%20a%20popular%20incel%20discussion%20board%20and%20found%20that%20nearly%20all%20active%20participants%20use%20misogynistic%20terms.%20Participants%20used%20misogynistic%20terms%20nearly%20one%20million%20times%20and%20at%20a%20rate%202.4%20times%20greater%20than%20their%20use%20of%20neutral%20terms%20for%20women.%20The%20majority%20of%20participants%5Cu2019%20use%20of%20misogynistic%20terms%20does%20not%20increase%20or%20decrease%20with%20post%20frequency%2C%20suggesting%20that%20members%20arrive%20%28rather%20than%20become%29%20misogynistic.%20We%20discuss%20these%20findings%20in%20relation%20to%20theories%20of%20intersectionality%2C%20masculinity%2C%20and%20sexism.%20We%20likewise%20discuss%20potential%20policies%20for%20mitigating%20incel%20misogyny%20and%20similar%20online%20discourse.%22%2C%22date%22%3A%222023-06-06%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F14614448231176777%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F14614448231176777%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221461-4448%2C%201461-7315%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-08-01T15%3A37%3A49Z%22%7D%7D%2C%7B%22key%22%3A%227ACACMB6%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Oliver%20et%20al.%22%2C%22parsedDate%22%3A%222023-06-04%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BOliver%2C%20C.%2C%20Cummings%2C%20S.%2C%20Puiras%2C%20E.%2C%20%26amp%3B%20Mazmanian%2C%20D.%20%282023%29.%20Technology-Facilitated%20Sexual%20Harassment%20Against%20Women%20and%20Psychological%20Dysfunction%3A%20A%20Test%20of%20Objectification%20Theory.%20%26lt%3Bi%26gt%3BViolence%20Against%20Women%26lt%3B%5C%2Fi%26gt%3B%2C%20107780122311779.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012231177998%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012231177998%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-Facilitated%20Sexual%20Harassment%20Against%20Women%20and%20Psychological%20Dysfunction%3A%20A%20Test%20of%20Objectification%20Theory%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Casey%22%2C%22lastName%22%3A%22Oliver%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Shayna%22%2C%22lastName%22%3A%22Cummings%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Erika%22%2C%22lastName%22%3A%22Puiras%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Dwight%22%2C%22lastName%22%3A%22Mazmanian%22%7D%5D%2C%22abstractNote%22%3A%22Objectification%20theory%20was%20tested%20to%20examine%20the%20potential%20mediating%20role%20of%20self-objectification%20in%20the%20relationship%20between%20technology-facilitated%20sexual%20harassment%20%28TFSH%29%20and%20psychological%20functioning%20in%20a%20sample%20of%20women%20%28%20N%5Cu2009%3D%5Cu2009481%29.%20The%20results%20indicated%20that%20TFSH%20was%20associated%20with%20eating%20pathology%2C%20alcohol%20use%2C%20and%20sexual%20functioning.%20Furthermore%2C%20partial%20support%20for%20the%20objectification%20theory%20was%20achieved%2C%20with%20self-objectification%20potentially%20explaining%20the%20relationships%20between%20TFSH%20and%20eating%20pathology%2C%20and%20TFSH%20and%20alcohol%20use.%20This%20research%20may%20shed%20light%20on%20the%20role%20of%20objectification%20processes%20in%20the%20context%20of%20TFSH%20in%20women%2C%20as%20well%20as%20inform%20mental%20health%20interventions%20for%20women%20victims%20of%20TFSH.%22%2C%22date%22%3A%222023-06-04%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F10778012231177998%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F10778012231177998%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221077-8012%2C%201552-8448%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-07-26T15%3A12%3A11Z%22%7D%7D%2C%7B%22key%22%3A%22R3WSJY7T%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kim%20et%20al.%22%2C%22parsedDate%22%3A%222023-05-10%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKim%2C%20S.%2C%20Choi%2C%20E.%2C%20%26amp%3B%20Champion%2C%20J.%20D.%20%282023%29.%20Technology-facilitated%20Sexual%20Violence%20in%20South%20Korea%3A%20A%20Content%20Analysis%20of%20a%20Website%20for%20Victims.%20%26lt%3Bi%26gt%3BViolence%20Against%20Women%26lt%3B%5C%2Fi%26gt%3B%2C%20107780122311727.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012231172712%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10778012231172712%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Technology-facilitated%20Sexual%20Violence%20in%20South%20Korea%3A%20A%20Content%20Analysis%20of%20a%20Website%20for%20Victims%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Soojeong%22%2C%22lastName%22%3A%22Kim%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Eunju%22%2C%22lastName%22%3A%22Choi%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jane%20Dimmitt%22%2C%22lastName%22%3A%22Champion%22%7D%5D%2C%22abstractNote%22%3A%22Technology-facilitated%20sexual%20violence%20%28TFSV%29%20is%20an%20emerging%20form%20of%20gender-based%20violence.%20An%20understanding%20regarding%20the%20circumstance%20of%20TFSV%20and%20related%20health%20outcomes%20is%20limited.%20This%20qualitative%20study%20analyzed%20postings%20from%20an%20anonymous%20Korean%20website%20on%20which%20women%20suffering%20from%20TFSV%20freely%20posted%20messages%20asking%20for%20help%20and%20voicing%20concerns.%20Victims%20made%20efforts%20to%20solve%20problems%20that%20remained%20unresolved%2C%20thereby%20creating%20difficulties%20in%20their%20daily%20lives%2C%20and%20compelling%20them%20to%20quit%20jobs%20or%20break%20social%20relationships.%20They%20reported%20mental%20health%20concerns%20including%20suicide%20ideation%2C%20anxiety%2C%20frustration%2C%20sleep%20disorders%2C%20and%20depression.%20Results%20infer%20the%20imperative%20nature%20of%20research%2C%20intervention%2C%20and%20political%20action.%22%2C%22date%22%3A%222023-05-10%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F10778012231172712%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F10778012231172712%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221077-8012%2C%201552-8448%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-08-12T16%3A43%3A06Z%22%7D%7D%2C%7B%22key%22%3A%22UDJYY6T2%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Cookson%20et%20al.%22%2C%22parsedDate%22%3A%222023-05-04%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BCookson%2C%20T.%20P.%2C%20Fuentes%2C%20L.%2C%20Zulver%2C%20J.%20M.%2C%20%26amp%3B%20Nelson%2C%20A.%20%282023%29.%20Fit%20for%20purpose%3F%20Assessing%20the%20accessibility%2C%20theory%20of%20action%2C%20and%20accountability%20of%20digital%20technology%20interventions%20for%20sexual%20and%20gender-based%20violence%20prevention%20and%20response.%20%26lt%3Bi%26gt%3BGender%2C%20Technology%20and%20Development%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B27%26lt%3B%5C%2Fi%26gt%3B%282%29%2C%20184%26%23x2013%3B206.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F09718524.2023.2182035%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F09718524.2023.2182035%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Fit%20for%20purpose%3F%20Assessing%20the%20accessibility%2C%20theory%20of%20action%2C%20and%20accountability%20of%20digital%20technology%20interventions%20for%20sexual%20and%20gender-based%20violence%20prevention%20and%20response%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tara%20Patricia%22%2C%22lastName%22%3A%22Cookson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Lorena%22%2C%22lastName%22%3A%22Fuentes%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Julia%20Margaret%22%2C%22lastName%22%3A%22Zulver%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Austin%22%2C%22lastName%22%3A%22Nelson%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22date%22%3A%222023-05-04%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1080%5C%2F09718524.2023.2182035%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.tandfonline.com%5C%2Fdoi%5C%2Ffull%5C%2F10.1080%5C%2F09718524.2023.2182035%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%220971-8524%2C%200973-0656%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-07-21T08%3A09%3A35Z%22%7D%7D%2C%7B%22key%22%3A%22QJSCB5CE%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Afrouz%22%2C%22parsedDate%22%3A%222023-04%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BAfrouz%2C%20R.%20%282023%29.%20The%20Nature%2C%20Patterns%20and%20Consequences%20of%20Technology-Facilitated%20Domestic%20Abuse%3A%20A%20Scoping%20Review.%20%26lt%3Bi%26gt%3BTrauma%2C%20Violence%20%26amp%3B%20Abuse%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B24%26lt%3B%5C%2Fi%26gt%3B%282%29%2C%20913%26%23x2013%3B927.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380211046752%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380211046752%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22The%20Nature%2C%20Patterns%20and%20Consequences%20of%20Technology-Facilitated%20Domestic%20Abuse%3A%20A%20Scoping%20Review%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rojan%22%2C%22lastName%22%3A%22Afrouz%22%7D%5D%2C%22abstractNote%22%3A%22Women%20are%20increasingly%20at%20risk%20of%20gender-based%20violence%20through%20technology%20and%20digital%20tools.%20Some%20digital%20devices%20and%20apps%20such%20as%20GPS%20location%20tracking%2C%20spyware%2C%20mobile%20phones%20and%20social%20media%20platforms%20have%20become%20new%20tools%20for%20perpetrators%20to%20monitor%2C%20harass%20and%20abuse%20victims.%20However%2C%20the%20nature%20and%20impacts%20of%20technology%20on%20intimate%20partner%20violence%20%28IPV%29%20have%20remained%20perplexing%20and%20ambiguous.%20Hence%2C%20this%20scoping%20review%20was%20conducted%20to%20explore%20the%20nature%2C%20patterns%20and%20consequences%20of%20technology-facilitated%20domestic%20abuse%20%28TFDA%29.%20All%20journal%20articles%20and%20grey%20literature%20exploring%20the%20TFDA%20phenomenon%2C%20its%20nature%20and%20impacts%20on%20victims%20and%20services%20providers%20were%20scanned%2C%20and%20twenty-two%20papers%20were%20included%20in%20this%20scoping%20review.%20Overall%2C%20findings%20showed%20that%20digital%20devices%2C%20online%20applications%20and%20social%20media%20accounts%20facilitated%20IPV%20and%20exacerbated%20the%20consequences%20of%20abuse.%20Yet%2C%20many%20victims%20and%20frontline%20workers%20found%20understanding%20the%20nature%20and%20impacts%20of%20TFDA%20difficult.%20They%20faced%20many%20challenges%20addressing%20this%20form%20of%20abuse.%20Thus%2C%20several%20strategies%20are%20needed%20to%20adequately%20tackle%20TFDA%2C%20including%20conducting%20further%20research%20on%20the%20issue%2C%20developing%20appropriate%20policy%20and%20addressing%20gender%20inequality%20in%20the%20online%20environment.%22%2C%22date%22%3A%222023-04%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F15248380211046752%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22%22%2C%22PMID%22%3A%2234582729%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221552-8324%22%2C%22language%22%3A%22eng%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A14%3A43Z%22%7D%7D%2C%7B%22key%22%3A%228B38UVHI%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22UNFPA%22%2C%22parsedDate%22%3A%222023-03-13%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BUNFPA.%20%282023%29.%20%26lt%3Bi%26gt%3BGuidance%20on%20the%20Safe%20and%20Ethical%20Use%20of%20Technology%20to%20Address%20Gender-based%20Violence%20and%20Harmful%20Practices%3A%20Implementation%20Summary%26lt%3B%5C%2Fi%26gt%3B.%20UNFPA.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2Fimplementation-summary-safe-ethical-use-technology-gbv-harmful-practices%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2Fimplementation-summary-safe-ethical-use-technology-gbv-harmful-practices%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Guidance%20on%20the%20Safe%20and%20Ethical%20Use%20of%20Technology%20to%20Address%20Gender-based%20Violence%20and%20Harmful%20Practices%3A%20Implementation%20Summary%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22UNFPA%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22UNFPA%22%2C%22date%22%3A%2213%20March%202023%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2Fimplementation-summary-safe-ethical-use-technology-gbv-harmful-practices%22%2C%22ISSN%22%3A%22%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%225PQ9SW2W%22%2C%227DF3TGWW%22%2C%229Z4GDCHW%22%2C%22INNKXKUP%22%5D%2C%22dateModified%22%3A%222025-10-15T13%3A10%3A50Z%22%7D%7D%2C%7B%22key%22%3A%22UCQW2II6%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Bansal%20et%20al.%22%2C%22parsedDate%22%3A%222023-03-04%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BBansal%2C%20V.%2C%20Rezwan%2C%20M.%2C%20Iyer%2C%20M.%2C%20Leasure%2C%20E.%2C%20Roth%2C%20C.%2C%20Pal%2C%20P.%2C%20%26amp%3B%20Hinson%2C%20L.%20%282023%29.%20A%20Scoping%20Review%20of%20Technology-Facilitated%20Gender-Based%20Violence%20in%20Low-%20and%20Middle-Income%20Countries%20Across%20Asia.%20%26lt%3Bi%26gt%3BTrauma%2C%20Violence%20%26amp%3B%20Abuse%26lt%3B%5C%2Fi%26gt%3B%2C%2015248380231154614.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380231154614%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F15248380231154614%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22A%20Scoping%20Review%20of%20Technology-Facilitated%20Gender-Based%20Violence%20in%20Low-%20and%20Middle-Income%20Countries%20Across%20Asia%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Vaiddehi%22%2C%22lastName%22%3A%22Bansal%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mayumi%22%2C%22lastName%22%3A%22Rezwan%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mithila%22%2C%22lastName%22%3A%22Iyer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Erin%22%2C%22lastName%22%3A%22Leasure%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Connor%22%2C%22lastName%22%3A%22Roth%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Poulomi%22%2C%22lastName%22%3A%22Pal%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Laura%22%2C%22lastName%22%3A%22Hinson%22%7D%5D%2C%22abstractNote%22%3A%22Technology-facilitated%20gender-based%20violence%20%28GBV%29%20is%20a%20pervasive%20issue.%20Yet%2C%20most%20research%20focuses%20on%20high-income%20countries%20and%20few%20studies%20comprehensively%20summarize%20its%20prevalence%2C%20manifestations%2C%20and%20implications%20in%20the%20Global%20South.%20This%20scoping%20review%20sought%20to%20examine%20technology-facilitated%20GBV%20in%20low-%20and%20middle-income%20countries%20across%20Asia%2C%20specifically%20focusing%20on%20trends%2C%20common%20behaviors%2C%20and%20characteristics%20of%20perpetrators%20and%20survivors.%20A%20comprehensive%20search%20of%20peer-reviewed%20and%20gray%20literature%20published%20between%202006%20and%202021%20yielded%202%2C042%20documents%2C%20of%20which%2097%20articles%20were%20included%20in%20the%20review.%20Across%20South%20and%20Southeast%20Asia%2C%20findings%20indicate%20that%20technology-facilitated%20GBV%20is%20a%20widespread%20phenomenon%2C%20with%20increased%20incidence%20during%20the%20COVID-19%20pandemic.%20Technology-facilitated%20GBV%20comprises%20various%20forms%20of%20behaviors%20and%20prevalence%20varies%20by%20type%20of%20violence.%20Women%2C%20girls%2C%20and%20sexual%20and%20gender%20minorities%2C%20especially%20those%20with%20other%20intersecting%20marginalized%20identities%2C%20are%20often%20more%20vulnerable%20to%20experiencing%20online%20violence.%20Alongside%20these%20findings%2C%20the%20review%20revealed%20gaps%20in%20the%20literature%20including%20a%20lack%20of%20evidence%20from%20Central%20Asia%20and%20the%20Pacific%20Islands.%20There%20is%20also%20limited%20data%20on%20prevalence%20which%20we%20attribute%20to%20underreporting%2C%20in%20part%20due%20to%20disjointed%2C%20outdated%2C%20or%20nonexistent%20legal%20definitions.%20Findings%20from%20the%20study%20can%20be%20leveraged%20by%20key%20stakeholders%20such%20as%20researchers%2C%20practitioners%2C%20governments%2C%20and%20technology%20companies%20to%20develop%20prevention%2C%20response%2C%20and%20mitigation%20efforts.%22%2C%22date%22%3A%222023-03-04%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F15248380231154614%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22%22%2C%22PMID%22%3A%2236869803%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221552-8324%22%2C%22language%22%3A%22eng%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A11%3A58Z%22%7D%7D%2C%7B%22key%22%3A%225W6KDQUF%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Hall%20et%20al.%22%2C%22parsedDate%22%3A%222023-03%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BHall%2C%20M.%2C%20Hearn%2C%20J.%2C%20%26amp%3B%20Lewis%2C%20R.%20%282023%29.%20Image-Based%20Sexual%20Abuse%3A%20Online%20Gender-Sexual%20Violations.%20%26lt%3Bi%26gt%3BEncyclopedia%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B3%26lt%3B%5C%2Fi%26gt%3B%281%29%2C%20327%26%23x2013%3B339.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.3390%5C%2Fencyclopedia3010020%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.3390%5C%2Fencyclopedia3010020%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Image-Based%20Sexual%20Abuse%3A%20Online%20Gender-Sexual%20Violations%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Matthew%22%2C%22lastName%22%3A%22Hall%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jeff%22%2C%22lastName%22%3A%22Hearn%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ruth%22%2C%22lastName%22%3A%22Lewis%22%7D%5D%2C%22abstractNote%22%3A%22Image-based%20sexual%20abuse%20describes%20the%20offline%20or%20online%20non-consensual%20sharing%20of%20real%20or%20fake%20images%20or%20videos%20with%20%28un%29known%20others%20of%20a%20person%20that%20are%20either%20sexually%20explicit%20or%20sexually%20suggestive.%20New%20information%20and%20communication%20technologies%20%28ICTs%29%20provide%20many%20open-ended%20and%20undefined%20possibilities%20for%20image-based%20sexual%20abuse%20%28IBSA%29%2C%20such%20as%20%5Cu2018revenge%20pornography%5Cu2019%2C%20%5Cu2018upskirting%5Cu2019%2C%20deepfake%20pornography%2C%20sexual%20spycamming%2C%20and%20cyberflashing%2C%20to%20name%20just%20a%20few.%20These%20forms%20of%20abuse%20refer%20to%20the%20online%2C%20and%20also%20at%20times%20offline%2C%20non-consensual%20distribution%20or%20sharing%20of%20explicit%20images%20or%20videos%20of%20someone%20else%20by%20ex-partners%2C%20partners%2C%20others%2C%20or%20hackers%20seeking%20revenge%2C%20entertainment%2C%20or%20peer%20group%20status.%20The%20vast%20majority%20of%20these%20are%20committed%20by%20men%20against%20women.%20Given%20the%20many%20adverse%20impacts%20on%20physical%20and%20psychological%20health%20and%20well-being%20it%20has%20on%20its%20victim-survivors%2C%20exploring%20this%20form%20of%20online%20gender-sexual%20abuse%20and%20violation%20becomes%20an%20important%20endeavor.%20Situating%20the%20discussion%20within%20debates%20on%20gender%20and%20sexuality%2C%20the%20entry%20discusses%20the%20increasing%20use%20of%20new%20technologies%20for%20online%20gender-sexual%20abuse%20and%20violation%2C%20highlighting%20the%20motivations%20of%20those%20perpetrating%20IBSA%2C%20the%20negative%20physical%20and%20psychological%20impacts%20of%20IBSA%20on%20victim-survivors%2C%20and%20what%20has%20been%2C%20and%20could%20be%2C%20done%20to%20combat%20image-based%20sexual%20abuses%20and%20other%20misuses%20of%20new%20technologies%2C%20notably%20through%20legal%2C%20policy%2C%20and%20practice%20interventions%20within%20and%20between%20nations.%22%2C%22date%22%3A%222023%5C%2F3%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.3390%5C%2Fencyclopedia3010020%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.mdpi.com%5C%2F2673-8392%5C%2F3%5C%2F1%5C%2F20%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%222673-8392%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222024-11-26T10%3A57%3A02Z%22%7D%7D%2C%7B%22key%22%3A%225E8LTUAD%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Srivastava%20et%20al.%22%2C%22parsedDate%22%3A%222023-02%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BSrivastava%2C%20A.%2C%20Rusow%2C%20J.%2C%20Schrager%2C%20S.%20M.%2C%20Stephenson%2C%20R.%2C%20%26amp%3B%20Goldbach%2C%20J.%20T.%20%282023%29.%20Digital%20Sexual%20Violence%20and%20Suicide%20Risk%20in%20a%20National%20Sample%20of%20Sexual%20Minority%20Adolescents.%20%26lt%3Bi%26gt%3BJournal%20of%20Interpersonal%20Violence%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B38%26lt%3B%5C%2Fi%26gt%3B%283%26%23x2013%3B4%29%2C%204443%26%23x2013%3B4458.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605221116317%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605221116317%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Digital%20Sexual%20Violence%20and%20Suicide%20Risk%20in%20a%20National%20Sample%20of%20Sexual%20Minority%20Adolescents%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Ankur%22%2C%22lastName%22%3A%22Srivastava%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Joshua%22%2C%22lastName%22%3A%22Rusow%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Sheree%20M.%22%2C%22lastName%22%3A%22Schrager%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rob%22%2C%22lastName%22%3A%22Stephenson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Jeremy%20T.%22%2C%22lastName%22%3A%22Goldbach%22%7D%5D%2C%22abstractNote%22%3A%22This%20paper%20aimed%20to%20examine%20the%20association%20between%20digital%20sexual%20violence%20%28threat%20to%20post%20or%20nonconsensual%20posting%20of%20sexually%20explicit%20media%29%20and%20suicidal%20%28ideation%2C%20planning%2C%20and%20attempt%29%20and%20non-suicidal%20self-harm%20behavior.%20The%20data%20for%20the%20current%20analysis%20come%20from%20an%20online%20sample%20of%20sexual%20minority%20adolescents%20%28aged%2014-17%29%20recruited%20from%20across%20the%20United%20States%20%28n%5Cu2009%3D%5Cu2009970%29.%20Multivariate%20logistic%20regressions%20were%20used%20to%20examine%20the%20association%20between%20digital%20sexual%20violence%20with%20suicide%20%28ideation%2C%20planning%2C%20and%20attempt%29%20and%20self-harm.%20In%20the%20sample%2C%209.1%25%20of%20participants%20reported%20being%20threatened%20to%20have%20their%20sexually%20explicit%20media%20posted%20without%20their%20consent%2C%20while%206.5%25%20reported%20their%20sexually%20explicit%20media%20had%20been%20posted%20without%20their%20consent.%20Threat%20to%20post%20sexually%20explicit%20media%20without%20consent%20was%20associated%20with%20higher%20odds%20of%20reporting%20suicidal%20ideation%20%28odds%20ratio%20%5BOR%5D%5Cu2009%3D%5Cu20091.88%29%2C%20suicide%20plan%20%28OR%5Cu2009%3D%5Cu20092.12%29%2C%20suicide%20attempt%20%28OR%5Cu2009%3D%5Cu20093.56%29%2C%20and%20self-harm%20%28OR%5Cu2009%3D%5Cu20091.96%29.%20While%20nonconsensual%20posting%20of%20sexually%20explicit%20media%20was%20associated%20with%20higher%20odds%20of%20reporting%20suicidal%20ideation%20%28OR%5Cu2009%3D%5Cu20091.82%29%20and%20suicide%20attempt%20%28OR%5Cu2009%3D%5Cu20092.20%29.%20All%20models%20controlled%20for%20age%2C%20assigned%20sex%20at%20birth%2C%20sexual%20identity%2C%20and%20race%20and%20ethnicity.%20These%20findings%20underscore%20important%20considerations%20and%20future%20research%20directions.%20Given%20the%20associations%20between%20digital%20sexual%20violence%20and%20suicide%20risk%20among%20sexual%20minority%20adolescents%2C%20suicide%20prevention%20efforts%20with%20adolescents%20must%20be%20responsive%20to%20the%20needs%20of%20sexual%20minority%20adolescents%20and%20the%20changing%20landscape%20of%20sexual%20violence%20in%20digital%20spaces.%20Future%20research%20should%20examine%20the%20trajectories%20of%20digital%20sexual%20violence%20among%20adolescents%20and%20comparative%20analyses%20by%20demographic%20subgroups%20to%20better%20understand%20changes%20in%20these%20processes%20over%20time.%22%2C%22date%22%3A%222023-02%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F08862605221116317%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22%22%2C%22PMID%22%3A%2235942940%22%2C%22PMCID%22%3A%22PMC9850373%22%2C%22ISSN%22%3A%221552-6518%22%2C%22language%22%3A%22eng%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A11%3A17Z%22%7D%7D%2C%7B%22key%22%3A%22BUMFWGZQ%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Straw%20and%20Tanczer%22%2C%22parsedDate%22%3A%222023-01-04%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BStraw%2C%20I.%2C%20%26amp%3B%20Tanczer%2C%20L.%20%282023%29.%20Safeguarding%20patients%20from%20technology-facilitated%20abuse%20in%20clinical%20settings%3A%20A%20narrative%20review.%20%26lt%3Bi%26gt%3BPLOS%20Digital%20Health%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B2%26lt%3B%5C%2Fi%26gt%3B%281%29%2C%20e0000089.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1371%5C%2Fjournal.pdig.0000089%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1371%5C%2Fjournal.pdig.0000089%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Safeguarding%20patients%20from%20technology-facilitated%20abuse%20in%20clinical%20settings%3A%20A%20narrative%20review%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Isabel%22%2C%22lastName%22%3A%22Straw%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Leonie%22%2C%22lastName%22%3A%22Tanczer%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Yuan%22%2C%22lastName%22%3A%22Lai%22%7D%5D%2C%22abstractNote%22%3A%22Safeguarding%20vulnerable%20patients%20is%20a%20key%20responsibility%20of%20healthcare%20professionals.%20Yet%2C%20existing%20clinical%20and%20patient%20management%20protocols%20are%20outdated%20as%20they%20do%20not%20address%20the%20emerging%20threats%20of%20technology-facilitated%20abuse.%20The%20latter%20describes%20the%20misuse%20of%20digital%20systems%20such%20as%20smartphones%20or%20other%20Internet-connected%20devices%20to%20monitor%2C%20control%20and%20intimidate%20individuals.%20The%20lack%20of%20attention%20given%20to%20how%20technology-facilitated%20abuse%20may%20affect%20patients%20in%20their%20lives%2C%20can%20result%20in%20clinicians%20failing%20to%20protect%20vulnerable%20patients%20and%20may%20affect%20their%20care%20in%20several%20unexpected%20ways.%20We%20attempt%20to%20address%20this%20gap%20by%20evaluating%20the%20literature%20that%20is%20available%20to%20healthcare%20practitioners%20working%20with%20patients%20impacted%20by%20digitally%20enabled%20forms%20of%20harm.%20A%20literature%20search%20was%20carried%20out%20between%20September%202021%20and%20January%202022%2C%20in%20which%20three%20academic%20databases%20were%20probed%20using%20strings%20of%20relevant%20search%20terms%2C%20returning%20a%20total%20of%2059%20articles%20for%20full%20text%20review.%20The%20articles%20were%20appraised%20according%20to%20three%20criteria%3A%20%28a%29%20the%20focus%20on%20technology-facilitated%20abuse%3B%20%28b%29%20the%20relevance%20to%20clinical%20settings%3B%20and%20%28c%29%20the%20role%20of%20healthcare%20practitioners%20in%20safeguarding.%20Of%20the%2059%20articles%2C%2017%20articles%20met%20at%20least%20one%20criterion%20and%20only%20one%20article%20met%20all%20three%20criteria.%20We%20drew%20additional%20information%20from%20the%20grey%20literature%20to%20identify%20areas%20for%20improvement%20in%20medical%20settings%20and%20at-risk%20patient%20groups.%20Technology-facilitated%20abuse%20concerns%20healthcare%20professionals%20from%20the%20point%20of%20consultation%20to%20the%20point%20of%20discharge%2C%20as%20a%20result%20clinicians%20need%20to%20be%20equipped%20with%20the%20tools%20to%20identify%20and%20address%20these%20harms%20at%20any%20stage%20of%20the%20patient%5Cu2019s%20journey.%20In%20this%20article%2C%20we%20offer%20recommendations%20for%20further%20research%20within%20different%20medical%20subspecialities%20and%20highlight%20areas%20requiring%20policy%20development%20in%20clinical%20environments.%22%2C%22date%22%3A%222023-1-4%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1371%5C%2Fjournal.pdig.0000089%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdx.plos.org%5C%2F10.1371%5C%2Fjournal.pdig.0000089%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%222767-3170%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-07-28T14%3A45%3A17Z%22%7D%7D%2C%7B%22key%22%3A%22AWHKNZIY%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Sciacca%20et%20al.%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BSciacca%2C%20B.%2C%20Mazzone%2C%20A.%2C%20Loftsson%2C%20M.%2C%20O%26%23x2019%3BHiggins%20Norman%2C%20J.%2C%20%26amp%3B%20Foody%2C%20M.%20%282023%29.%20Nonconsensual%20Dissemination%20of%20Sexual%20Images%20Among%20Adolescents%3A%20Associations%20With%20Depression%20and%20Self-Esteem.%20%26lt%3Bi%26gt%3BJournal%20of%20Interpersonal%20Violence%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B38%26lt%3B%5C%2Fi%26gt%3B%2815%26%23x2013%3B16%29%2C%209438%26%23x2013%3B9464.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605231165777%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605231165777%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Nonconsensual%20Dissemination%20of%20Sexual%20Images%20Among%20Adolescents%3A%20Associations%20With%20Depression%20and%20Self-Esteem%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Beatrice%22%2C%22lastName%22%3A%22Sciacca%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Angela%22%2C%22lastName%22%3A%22Mazzone%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Magnus%22%2C%22lastName%22%3A%22Loftsson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22James%22%2C%22lastName%22%3A%22O%5Cu2019Higgins%20Norman%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Mair%5Cu00e9ad%22%2C%22lastName%22%3A%22Foody%22%7D%5D%2C%22abstractNote%22%3A%22The%20nonconsensual%20dissemination%20of%20sexual%20images%20is%20a%20form%20of%20image-based%20sexual%20abuse%20that%20is%20relatively%20common%20among%20adolescents.%20However%2C%20literature%20on%20this%20issue%20with%20adolescent%20samples%20is%20relatively%20scarce.%20Therefore%2C%20this%20study%20is%20aimed%20at%20investigating%20how%20this%20phenomenon%20varies%20based%20on%20gender%20and%20sexual%20orientation%2C%20along%20with%20its%20association%20with%20depression%20and%20self-esteem.%20Participants%20were%20728%20secondary%20school%20students%20in%20Sweden%20%2850.4%25%20girls%20and%2046.4%25%20boys%3B%2014.4%25%20lesbian%2C%20gay%2C%20bisexual%20%5BLGB%2B%5D%29%20aged%20from%2012%20to%2019%5Cu2009years%20%28%20M%5Cu2009%3D%5Cu200914.35%2C%20SD%5Cu2009%3D%5Cu20091.29%29.%20A%20survey%20was%20administered%20during%20school%20hours%2C%20including%20a%20measure%20assessing%20the%20nonconsensual%20dissemination%20of%20sexual%20images%2C%20the%20short%20version%20of%20the%20Moods%20and%20Feelings%20Questionnaire%2C%20and%20the%20Rosenberg%5Cu2019s%20Self-Esteem%20Scale.%20Results%20showed%20that%20LGB%2B%20participants%20were%20more%20likely%20to%20indicate%20that%20they%20were%20victimized%20compared%20to%20their%20heterosexual%20peers%2C%20while%20no%20differences%20were%20observed%20for%20gender.%20Being%20the%20target%20of%20nonconsensual%20dissemination%20of%20sexual%20images%20was%20positively%20associated%20with%20depression%2C%20whereas%20no%20significant%20associations%20were%20yielded%20for%20self-esteem.%20Based%20on%20the%20findings%20from%20this%20study%2C%20we%20suggest%20raising%20adolescent%20awareness%20in%20relation%20to%20the%20nonconsensual%20dissemination%20of%20sexual%20images%20as%20a%20form%20of%20sexual%20abuse%20that%20can%20have%20detrimental%20effects%20on%20those%20who%20are%20targeted.%20Such%20educational%20programs%20should%20be%20inclusive%20of%20sexual%20minority%20adolescents%2C%20as%20they%20are%20at%20a%20particular%20risk%20of%20being%20the%20target%20of%20nonconsensual%20dissemination%20of%20sexual%20images.%20Psychological%20support%20should%20be%20provided%20to%20the%20targets%20of%20this%20form%20of%20abuse%2C%20through%20both%20school%20and%20online%20counseling.%20Future%20research%20should%20adopt%20longitudinal%20designs%20while%20recruiting%20diverse%20samples.%22%2C%22date%22%3A%2208%5C%2F2023%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F08862605231165777%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F08862605231165777%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%220886-2605%2C%201552-6518%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-08-27T15%3A50%3A55Z%22%7D%7D%2C%7B%22key%22%3A%22Q9637KP5%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22UNFPA%20and%20Wilson%20Center%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BUNFPA%2C%20%26amp%3B%20Wilson%20Center.%20%282023%29.%20%26lt%3Bi%26gt%3B2022%20Global%20Symposium%20on%20Technology-facilitated%20Gender-based%20Violence%20Results%3A%20Building%20a%20Common%20Pathway%26lt%3B%5C%2Fi%26gt%3B.%20UNFPA.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2F2022-global-symposium-technology-facilitated-gender-based-violence-results-building%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2F2022-global-symposium-technology-facilitated-gender-based-violence-results-building%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%222022%20Global%20Symposium%20on%20Technology-facilitated%20Gender-based%20Violence%20Results%3A%20Building%20a%20Common%20Pathway%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22UNFPA%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22name%22%3A%22Wilson%20Center%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22UNFPA%22%2C%22date%22%3A%222023%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2F2022-global-symposium-technology-facilitated-gender-based-violence-results-building%22%2C%22ISSN%22%3A%22%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%2C%22INNKXKUP%22%5D%2C%22dateModified%22%3A%222023-10-20T06%3A45%3A37Z%22%7D%7D%2C%7B%22key%22%3A%22FUURE2NA%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22University%20of%20Melbourne%20and%20UNFPA%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BUniversity%20of%20Melbourne%2C%20%26amp%3B%20UNFPA.%20%282023%29.%20%26lt%3Bi%26gt%3BMeasuring%20technology-facilitated%20gender-based%20violence.%20A%20discussion%20paper%26lt%3B%5C%2Fi%26gt%3B.%20University%20of%20Melbourne%20and%20UNFPA.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2Fmeasuring-technology-facilitated-gender-based-violence-discussion-paper%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2Fmeasuring-technology-facilitated-gender-based-violence-discussion-paper%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Measuring%20technology-facilitated%20gender-based%20violence.%20A%20discussion%20paper%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22University%20of%20Melbourne%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22UNFPA%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22University%20of%20Melbourne%20and%20UNFPA%22%2C%22date%22%3A%222023%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.unfpa.org%5C%2Fpublications%5C%2Fmeasuring-technology-facilitated-gender-based-violence-discussion-paper%22%2C%22ISSN%22%3A%22%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A36%3A52Z%22%7D%7D%2C%7B%22key%22%3A%228LW3HW7E%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22UN%20Women%20and%20World%20Health%20Organization%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BUN%20Women%2C%20%26amp%3B%20World%20Health%20Organization.%20%282023%29.%20%26lt%3Bi%26gt%3BTechnology-facilitated%20violence%20against%20women%3A%20Taking%20stock%20of%20evidence%20and%20data%20collection%26lt%3B%5C%2Fi%26gt%3B.%20UN%20Women.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.unwomen.org%5C%2Fen%5C%2Fdigital-library%5C%2Fpublications%5C%2F2023%5C%2F04%5C%2Ftechnology-facilitated-violence-against-women-taking-stock-of-evidence-and-data-collection%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.unwomen.org%5C%2Fen%5C%2Fdigital-library%5C%2Fpublications%5C%2F2023%5C%2F04%5C%2Ftechnology-facilitated-violence-against-women-taking-stock-of-evidence-and-data-collection%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22Technology-facilitated%20violence%20against%20women%3A%20Taking%20stock%20of%20evidence%20and%20data%20collection%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22UN%20Women%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22World%20Health%20Organization%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22UN%20Women%22%2C%22date%22%3A%222023%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.unwomen.org%5C%2Fen%5C%2Fdigital-library%5C%2Fpublications%5C%2F2023%5C%2F04%5C%2Ftechnology-facilitated-violence-against-women-taking-stock-of-evidence-and-data-collection%22%2C%22ISSN%22%3A%22%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A26%3A40Z%22%7D%7D%2C%7B%22key%22%3A%223JLNMZA5%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22UN%20Women%20and%20World%20Health%20Organization%22%2C%22parsedDate%22%3A%222023%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BUN%20Women%2C%20%26amp%3B%20World%20Health%20Organization.%20%282023%29.%20%26lt%3Bi%26gt%3BThe%20state%20of%20evidence%20and%20data%20collection%20on%20technology-facilitated%20violence%20against%20women.%26lt%3B%5C%2Fi%26gt%3B%20UN%20Women.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fwww.unwomen.org%5C%2Fen%5C%2Fdigital-library%5C%2Fpublications%5C%2F2023%5C%2F04%5C%2Fbrief-the-state-of-evidence-and-data-collection-on-technology-facilitated-violence-against-women%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fwww.unwomen.org%5C%2Fen%5C%2Fdigital-library%5C%2Fpublications%5C%2F2023%5C%2F04%5C%2Fbrief-the-state-of-evidence-and-data-collection-on-technology-facilitated-violence-against-women%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22report%22%2C%22title%22%3A%22The%20state%20of%20evidence%20and%20data%20collection%20on%20technology-facilitated%20violence%20against%20women.%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22UN%20Women%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%22%2C%22lastName%22%3A%22World%20Health%20Organization%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22reportNumber%22%3A%22%22%2C%22reportType%22%3A%22%22%2C%22institution%22%3A%22UN%20Women%22%2C%22date%22%3A%222023%22%2C%22DOI%22%3A%22%22%2C%22ISBN%22%3A%22%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fwww.unwomen.org%5C%2Fen%5C%2Fdigital-library%5C%2Fpublications%5C%2F2023%5C%2F04%5C%2Fbrief-the-state-of-evidence-and-data-collection-on-technology-facilitated-violence-against-women%22%2C%22ISSN%22%3A%22%22%2C%22language%22%3A%22%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A25%3A26Z%22%7D%7D%2C%7B%22key%22%3A%22NGZKC4MK%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Dolev-Cohen%20et%20al.%22%2C%22parsedDate%22%3A%222022-12-13%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BDolev-Cohen%2C%20M.%2C%20Nezer%2C%20I.%2C%20%26amp%3B%20Zumt%2C%20A.%20A.%20%282022%29.%20A%20Qualitative%20Examination%20of%20School%20Counselors%26%23x2019%3B%20Experiences%20of%20Sextortion%20Cases%20of%20Female%20Students%20in%20Israel.%20%26lt%3Bi%26gt%3BSexual%20Abuse%26lt%3B%5C%2Fi%26gt%3B%2C%20107906322211459.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10790632221145925%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F10790632221145925%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22A%20Qualitative%20Examination%20of%20School%20Counselors%5Cu2019%20Experiences%20of%20Sextortion%20Cases%20of%20Female%20Students%20in%20Israel%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Michal%22%2C%22lastName%22%3A%22Dolev-Cohen%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Inbar%22%2C%22lastName%22%3A%22Nezer%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Anwar%20Abu%22%2C%22lastName%22%3A%22Zumt%22%7D%5D%2C%22abstractNote%22%3A%22Sextortion%20%28a%20portmanteau%20of%20%5Cu201csexual%5Cu201d%20and%20%5Cu201cextortion%5Cu201d%29%20is%20a%20relatively%20new%20phenomenon%20of%20sexual%20exploitation%2C%20which%20occurs%20when%20a%20person%20threatens%20another%20with%20the%20distribution%20of%20sexual%20content%20on%20the%20Internet%2C%20to%20obtain%20more%20pictures%20or%20videos%2C%20money%2C%20or%20have%20some%20other%20demand%20met.%20The%20current%20study%20examined%20how%20school%20counselors%20in%20Israel%20perceive%20the%20phenomenon%20of%20online%20sextortion.%20To%20this%20end%2C%20we%20conducted%20a%20qualitative%20study%20based%20on%2020%20semi-structured%20in-depth%20interviews%20with%20school%20counselors%20working%20in%20middle%20schools%20and%20high%20schools%20in%20Israel%2C%20who%20treated%20adolescent%20girls%20blackmailed%20over%20the%20Internet%20on%20sexual%20grounds.%20Findings%20indicate%20that%20the%20school%20counselors%20had%20difficulty%20in%20identifying%20and%20defining%20the%20cases%20they%20treated%20as%20instances%20of%20sextortion%2C%20and%20that%20in%20their%20view%20the%20harm%20was%20slight.%20Findings%20also%20indicate%20that%20school%20counselors%20associated%20the%20causes%20of%20sextortion%20with%20the%20victims%20and%20their%20backgrounds.%20We%20found%20differences%20between%20the%20Arab%20and%20secular%20and%20national-religious%20state%20education%20in%20the%20way%20Jewish%20counselors%20treated%20the%20victims%20and%20involved%20additional%20actors%20such%20as%20the%20victim%5Cu2019s%20parents%20and%20the%20police.%20This%20underscores%20the%20importance%20of%20providing%20educational%20staff%20with%20adequate%20knowledge%20and%20tools%20that%20are%20culturally%20suited%20to%20the%20victims.%22%2C%22date%22%3A%222022-12-13%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F10790632221145925%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22http%3A%5C%2F%5C%2Fjournals.sagepub.com%5C%2Fdoi%5C%2F10.1177%5C%2F10790632221145925%22%2C%22PMID%22%3A%22%22%2C%22PMCID%22%3A%22%22%2C%22ISSN%22%3A%221079-0632%2C%201573-286X%22%2C%22language%22%3A%22en%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-08-28T12%3A07%3A53Z%22%7D%7D%2C%7B%22key%22%3A%22SA3CSEGE%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Dahlqvist%20et%20al.%22%2C%22parsedDate%22%3A%222022-12%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BDahlqvist%2C%20H.%2C%20Svensson%2C%20%26%23xC5%3B.%2C%20%26amp%3B%20Gillander%20G%26%23xE5%3Bdin%2C%20K.%20%282022%29.%20Co-occurrence%20of%20online%20and%20offline%20bullying%20and%20sexual%20harassment%20among%20youth%20in%20Sweden%3A%20Implications%20for%20studies%20on%20victimization%20and%20health%20a%20short%20communication.%20%26lt%3Bi%26gt%3BInternational%20Journal%20of%20Circumpolar%20Health%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B81%26lt%3B%5C%2Fi%26gt%3B%281%29%2C%202130362.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F22423982.2022.2130362%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1080%5C%2F22423982.2022.2130362%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Co-occurrence%20of%20online%20and%20offline%20bullying%20and%20sexual%20harassment%20among%20youth%20in%20Sweden%3A%20Implications%20for%20studies%20on%20victimization%20and%20health%20a%20short%20communication%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Hel%5Cu00e9ne%22%2C%22lastName%22%3A%22Dahlqvist%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22%5Cu00c5sa%22%2C%22lastName%22%3A%22Svensson%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Katja%22%2C%22lastName%22%3A%22Gillander%20G%5Cu00e5din%22%7D%5D%2C%22abstractNote%22%3A%22Studies%20of%20co-occurrence%20of%20online%20and%20offline%20victimisation%20of%20bullying%20and%20sexual%20harassment%20and%20its%20associations%20to%20mental%20health%20outcomes%20among%20youth%20are%20scarce.%20To%20inform%20future%20study%20designs%2C%20the%20aim%20of%20this%20brief%20communication%20was%20to%20map%20co-occurrence%20of%20online%20and%20offline%20bullying%20and%20sexual%20harassment%20victimisation%20among%20adolescents.%20Data%20were%20collected%20in%202011%20in%20nine%20schools%20in%20Northern%20Sweden%2C%20n%20%3D%5Cu00a01193%20%28boys%5Cu00a0%3D%5Cu00a0566%3B%20girls%5Cu00a0%3D%5Cu00a0627%29.%20Absolute%20and%20relative%20frequencies%20were%20calculated%20to%20find%20combinations%20of%20victimisation%3A%20one%2C%20two%2C%20three%2C%20or%20four%20forms.%20Reflecting%20a%20picture%20of%20the%20early%20days%20of%20online%20victimisation%2C%20in%20total%20fifty%20seven%20percent%20%2857%25%29%20of%20adolescents%20were%20victimised.%20Single%20occurrence%20victimisation%20was%2021.2%25%20%28offline%20sexual%20harassment%20was%20most%20common%20irrespective%20of%20gender%29%2C%20showing%20that%20most%20youths%20were%20victimised%20in%20a%20co-occurrence%20of%20two%20or%20more%20forms.%20Seven%20percent%20%287%25%29%20were%20victimised%20by%20all%20four%20forms%20of%20victimisation.%20Offline%20sexual%20harassment%20victimisation%20was%20present%20in%20the%20most%20common%20co-occurrences.%20Directions%20for%20future%20studies%20of%20victimisation%20and%20its%20associations%20to%20mental%20health%20outcomes%20are%20discussed.%22%2C%22date%22%3A%222022-12%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1080%5C%2F22423982.2022.2130362%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22%22%2C%22PMID%22%3A%2236178257%22%2C%22PMCID%22%3A%22PMC9543120%22%2C%22ISSN%22%3A%222242-3982%22%2C%22language%22%3A%22eng%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A38%3A21Z%22%7D%7D%2C%7B%22key%22%3A%228LXJGELR%22%2C%22library%22%3A%7B%22id%22%3A9542089%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Karasavva%20and%20Forth%22%2C%22parsedDate%22%3A%222022-11%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%202%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKarasavva%2C%20V.%2C%20%26amp%3B%20Forth%2C%20A.%20%282022%29.%20Personality%2C%20Attitudinal%2C%20and%20Demographic%20Predictors%20of%20Non-consensual%20Dissemination%20of%20Intimate%20Images.%20%26lt%3Bi%26gt%3BJournal%20of%20Interpersonal%20Violence%26lt%3B%5C%2Fi%26gt%3B%2C%20%26lt%3Bi%26gt%3B37%26lt%3B%5C%2Fi%26gt%3B%2821%26%23x2013%3B22%29%2C%20NP19265%26%23x2013%3BNP19289.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-DOIURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605211043586%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1177%5C%2F08862605211043586%26lt%3B%5C%2Fa%26gt%3B%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Personality%2C%20Attitudinal%2C%20and%20Demographic%20Predictors%20of%20Non-consensual%20Dissemination%20of%20Intimate%20Images%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22V.%22%2C%22lastName%22%3A%22Karasavva%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22A.%22%2C%22lastName%22%3A%22Forth%22%7D%5D%2C%22abstractNote%22%3A%22Non-consensual%20intimate%20image%20dissemination%20%28NCII%29%2C%20or%20else%20better%20known%20as%20%26quot%3Brevenge%20pornography%26quot%3B%20is%20a%20form%20of%20technology-facilitated%20sexual%20violence%20that%20can%20have%20devastating%20effects%20on%20the%20victim.%20This%20is%20one%20of%20the%20first%20studies%20examining%20how%20demographic%20characteristics%20%28gender%2C%20sexual%20orientation%29%2C%20personality%20traits%20%28Dark%20Tetrad%29%2C%20and%20attitudes%20%28aggrieved%20entitlement%2C%20sexual%20entitlement%2C%20sexual%20image%20abuse%20myth%20acceptance%29%20predict%20NCII%20perpetration%20and%20victimization.%20In%20a%20sample%20of%20810%20undergraduate%20students%20%2872.7%25%20female%20and%2023.3%25%20male%29%2C%2013.7%25%20of%20the%20participants%20had%20at%20some%20point%20in%20their%20life%2C%20distributed%20nude%2C%20or%20sexual%20pictures%20of%20someone%20else%20without%20consent%20and%2028.5%25%20had%20experienced%20such%20victimization.%20NCII%20perpetration%20was%20predictive%20of%20NCII%20victimization%20and%20vice%20versa.%20Using%20binomial%20logistic%20regression%2C%20we%20found%20that%20women%2C%20members%20of%20the%20LGBQ%2B%20community%2C%20those%20scoring%20higher%20in%20sadism%2C%20and%20participants%20with%20a%20history%20of%20NCII%20perpetration%20were%20more%20likely%20to%20report%20that%20someone%20had%20distributed%20their%20nude%20or%20sexual%20image%20without%20consent.%20Further%2C%20we%20found%20that%20those%20scoring%20higher%20in%20narcissism%20and%20sadism%2C%20along%20with%20those%20with%20a%20history%20of%20NCII%20victimization%20were%20more%20likely%20to%20report%20they%20had%20distributed%20the%20nude%20or%20sexual%20image%20of%20someone%20else%20without%20consent.%20Finally%2C%20the%20findings%20suggest%20that%20the%20relationship%20between%20victims%20and%20perpetrators%20is%20quite%20a%20bit%20more%20varied%20than%20the%20term%20%26quot%3Brevenge%20pornography%26quot%3B%20implies.%22%2C%22date%22%3A%222022-11%22%2C%22section%22%3A%22%22%2C%22partNumber%22%3A%22%22%2C%22partTitle%22%3A%22%22%2C%22DOI%22%3A%2210.1177%5C%2F08862605211043586%22%2C%22citationKey%22%3A%22%22%2C%22url%22%3A%22%22%2C%22PMID%22%3A%2234507500%22%2C%22PMCID%22%3A%22PMC9554400%22%2C%22ISSN%22%3A%221552-6518%22%2C%22language%22%3A%22eng%22%2C%22collections%22%3A%5B%227DF3TGWW%22%5D%2C%22dateModified%22%3A%222023-05-12T09%3A15%3A34Z%22%7D%7D%5D%7D
Mintarsih, M., Gayo, A., Suhariyanto, B., Rafsanjani, J. I., Anggayudha, Z. H., Farhana, F., Untoro, U., & Trisista, R. G. M. (2026). Critical Analysis on Legal Protection for Victims of Online Gender-Based Violence in Indonesia: Viewed From its Effectiveness and Recommendations. Violence Against Women, 10778012261432624. https://doi.org/10.1177/10778012261432624
Figueroa, J. M., Ha, T., Anderson, S. F., Maras, O., & Quiroz, S. I. (2026). An ecological text message experiment of Hispanic and Latino adolescents’ recognition of and emotional responses to digital dating abuse behaviors. Journal of Research on Adolescence, 36(1), e70167. https://doi.org/10.1111/jora.70167
Ardhanariswari, R., Azzahro, F., Fauzan, M., Pamuji, K., & Murniati, T. (2026). Digital Technology as a Tool for Fulfilling Women’s Rights: A Legal Analysis of Online Gender-based Violence (OGBV) Within the Framework of SDG 5. KnE Social Sciences, 11(1), 213–234. https://doi.org/10.18502/kss.v11i1.20610
Flynn, A., Baigh, T. A., & Quilty, E. (2026). Technology-Facilitated Gender-Based Violence: A Mixed-Methods Study of Practitioners in Pacific Island Countries. Violence Against Women, 10778012251409161. https://doi.org/10.1177/10778012251409161
Benítez-Hidalgo, V., Pastor-Moreno, G., Ruiz-Pérez, I., & Amaya-Santos, S. (2026). Technology-facilitated sexual violence against women and its health impact: a mixed-methods systematic review. BMC Public Health, 26(1), 543. https://doi.org/10.1186/s12889-026-26260-4
Ali, M. I. (2025). Technology-Triggered Gender-Based Violence (TTGBV) in Zanzibar. International Journal of Science and Research Archive, 17(2), 474–489. https://doi.org/10.30574/ijsra.2025.17.2.3049
Crowley, J. E. (2025). Technology-facilitated gender-based violence: Categorizing and understanding sexual abuse against women ridesharing drivers. Women’s Studies International Forum, 114, 103197. https://doi.org/10.1016/j.wsif.2025.103197
Regehr, C., Mishna, F., Billard, D., Fallon, B., Schiffer, J., & Lefebvre, R. (2025). Technology-facilitated violence against child welfare workers: A qualitative analysis. Child Protection and Practice, 7, 100241. https://doi.org/10.1016/j.chipro.2025.100241
Ho, M. H. S., Ng, W. E., Rosario, A. L. C., Lee, J., Wadhwa, B., Choy, O., & Tandoc, E. C. (2025). ‘When everything goes online, it’s never really gone’: understanding technology-facilitated sexual violence (TFSV) in Singapore. Journal of Gender Studies, 1–24. https://doi.org/10.1080/09589236.2025.2561138
Tyabashe-Phume, B. P., Tunggal, E., Hameed, S., Hunt, X., Soldatić, K., & Ned, L. (2025). Scoping review on technology-facilitated gender-based violence against women with disabilities and LGBTQI+ persons in low- and middle-income countries. African Journal of Disability, 14, a1810. https://doi.org/10.4102/AJOD.v14i0.1810
Hartmann, M. A., Browne, E., Mutangabende, S., Mungwari, P., Stotesbury, D., Woollett, N., Kågesten, A., Roberts, S. T., & Hatcher, A. (2025). Prevalence of technology facilitated and other gender-based violence among adolescent girls in Gqeberha, South Africa and its association with probable common mental disorders. Frontiers in Global Women’s Health, 6, 1546901. https://doi.org/10.3389/fgwh.2025.1546901
Koch, L., Ghawi, R., Pfeffer, J., & Steinert, J. I. (2025). Online misogyny against female candidates in the 2022 Brazilian elections: a threat to women’s political representation? Information, Communication & Society, 1–21. https://doi.org/10.1080/1369118X.2025.2551604
McGlynn, C., & Rigotti, C. (2025). From Virtual Rape to Meta-rape: Sexual Violence, Criminal Law and the Metaverse. Oxford Journal of Legal Studies, 45(3), 554–582. https://doi.org/10.1093/ojls/gqaf009
Koch, L., Russo Riva, M. P., & Steinert, J. I. (2025). Technology-Facilitated Gender-Based Violence Against Politically Active Women: A Systematic Review of Psychological and Political Consequences and Women’s Coping Behaviors. Trauma, Violence, & Abuse, 15248380251343185. https://doi.org/10.1177/15248380251343185
Masboungi, C., & Quarterman, L. (2025, June 12). When Will We Listen? - Centering Girls’ Voices in Our Efforts on Technology-facilitated Gender-based Violence (TFGBV). SVRI Blog. https://www.svri.org/when-will-we-listen-centering-girls-voices-in-our-efforts-on-technology-facilitated-gender-based-violence-tfgbv/
Ison, J., Santamaria, E., Caluzzi, G., McAllister, C., Hooker, L., Wilson, I., Theobald, J., Laslett, A.-M., & Riordan, B. (2025). “I Don’t Know for Certain”: A Content Analysis of Reddit Posters’ Accounts of Drink Spiking. Violence Against Women, 10778012251347585. https://doi.org/10.1177/10778012251347585
Peterman, A., Guedes, A., & Kolbe-Stuart, C. (2025, June 2). Netflix’s Adolescence: Social Change Through Edutainment. Think Global Health. https://www.thinkglobalhealth.org/article/netflixs-adolescence-social-change-through-edutainment
Ofcom. (2025). Experiences of engaging with the manosphere. Ofcom. https://www.ofcom.org.uk/online-safety/protecting-children/experiences-of-engaging-with-the-manosphere?utm_medium=email&utm_campaign=The%20Manosphere%20unmasked%20%20new%20qualitative%20research&utm_content=The%20Manosphere%20unmasked%20%20new%20qualitative%20research+CID_e5bc671ef53eabdd9a52837922ffee22&utm_source=updates&utm_term=new%20research
Kirkman, G., Willmott, D., Boduszek, D., & Debowska, A. (2025). Introduction and validation of the Modern Adolescent Dating Violence Attitude (MADVA) scale: A contemporary tool for assessing adolescent attitudes towards dating violence in offline and online environments. International Journal of Law, Crime and Justice, 80, 100705. https://doi.org/10.1016/j.ijlcj.2024.100705
Rindestig, F. C., Gådin, K. G., Jonsson, L., Svedin, C.-G., Landberg, Å., & Dennhag, I. (2025). A latent class analysis of technology-facilitated sexual violence: Associations to other victimizations, psychiatric symptoms, and gender. Child Abuse & Neglect, 161, 107309. https://doi.org/10.1016/j.chiabu.2025.107309
Koukopoulos, N., Janickyj, M., & Tanczer, L. M. (2025). Defining and Conceptualizing Technology-Facilitated Abuse (“Tech Abuse”): Findings of a Global Delphi Study. Journal of Interpersonal Violence, 08862605241310465. https://doi.org/10.1177/08862605241310465
Thompson, L., Rousay, V., McNamara, H., Moric, L., van der Wat, M., & Gaetan, E. (2025). NOT A FANTASY: How the Pornography Industry Exploits Image-based Sexual Abuse in Real Life. National Center on Sexual Exploitation. https://endsexualexploitation.org/wp-content/uploads/Not-a-Fantasy-Report_NCOSE.pdf?sm_guid=ODY2NTc3fDc4MzY4MzQzfC0xfGxhaEB3dW5ybi5jb218Nzk2ODUyMXx8MHwwfDI2MzA5ODIwNHwxMTMyfDB8MHx8ODYxODY2fDA1
Prune. (2025). AI-powered takedowns: We weaponize LLMs against
digital exploitation. Prune. https://prune.co/
Lu, M., Lamond, M., & Fry, D. (2024). A content analysis of metrics on online child sexual exploitation and abuse used by online content-sharing services. Child Abuse & Neglect, 157, 107046. https://doi.org/10.1016/j.chiabu.2024.107046
Quayle, E., Larkin, A., Schwannauer, M., Varese, F., Cartwright, K., Chitsabesan, P., Green, V., Radford, G., Richards, C., Shafi, S., Whelan, P., Chan, C., Hewins, W., Newton, A., Niebauer, E., Sandys, M., Ward, J., & Bucci, S. (2024). Experiences of a digital health intervention for young people exposed to technology assisted sexual abuse: a qualitative study. BMC Psychiatry, 24, 237. https://doi.org/10.1186/s12888-024-05605-6
Winkle, K., & Mulvihill, N. (2024). Anticipating the Use of Robots in Domestic Abuse: A Typology of Robot Facilitated Abuse to Support Risk Assessment and Mitigation in Human-Robot Interaction. Proceedings of the 2024 ACM/IEEE International Conference on Human-Robot Interaction, HRI ’24, 781–790. https://doi.org/10.1145/3610977.3634938
Jurasz, O. (2024, March). Online violence against women: A Four Nations study [Other]. https://oro.open.ac.uk/96398/
UN Women. (2024). Action Coalitions on Gender Based Violence & Technology and Innovation for Gender Equality: Addressing gaps to prevent and eliminate technology facilitated gender-based violence against women and girls. UN Women. https://forum.generationequality.org/sites/default/files/2024-01/GBV-TechnologyFacilitated_11JAN24.pdf
Equality Now. (2024). Briefing paper: Deepfake image-based sexual abuse, tech-facilitated sexual exploitation and the law. Alliance for Universal Digital Rights. https://equalitynow.storage.googleapis.com/wp-content/uploads/2024/01/17084238/EN-AUDRi-Briefing-paper-deepfake-06.pdf
Sheikh, M. M. R., & Rogers, M. M. (2023). Technology-Facilitated Sexual Violence and Abuse in Low and Middle-Income Countries: A Scoping Review. Trauma, Violence, & Abuse, 15248380231191189. https://doi.org/10.1177/15248380231191189
Douglas, H., Tanczer, L., McLachlan, F., & Harris, B. (2023). Policing Technology-Facilitated Domestic Abuse (TFDA): Views of Service Providers in Australia and the United Kingdom. Journal of Family Violence. https://doi.org/10.1007/s10896-023-00619-2
Supporting Safer Digital Spaces. (2023, June 8). Centre for International Governance Innovation. https://www.cigionline.org/publications/supporting-safer-digital-spaces/
Halpin, M., Richard, N., Preston, K., Gosse, M., & Maguire, F. (2023). Men who hate women: The misogyny of involuntarily celibate men. New Media & Society, 146144482311767. https://doi.org/10.1177/14614448231176777
Oliver, C., Cummings, S., Puiras, E., & Mazmanian, D. (2023). Technology-Facilitated Sexual Harassment Against Women and Psychological Dysfunction: A Test of Objectification Theory. Violence Against Women, 107780122311779. https://doi.org/10.1177/10778012231177998
Kim, S., Choi, E., & Champion, J. D. (2023). Technology-facilitated Sexual Violence in South Korea: A Content Analysis of a Website for Victims. Violence Against Women, 107780122311727. https://doi.org/10.1177/10778012231172712
Cookson, T. P., Fuentes, L., Zulver, J. M., & Nelson, A. (2023). Fit for purpose? Assessing the accessibility, theory of action, and accountability of digital technology interventions for sexual and gender-based violence prevention and response. Gender, Technology and Development, 27(2), 184–206. https://doi.org/10.1080/09718524.2023.2182035
Afrouz, R. (2023). The Nature, Patterns and Consequences of Technology-Facilitated Domestic Abuse: A Scoping Review. Trauma, Violence & Abuse, 24(2), 913–927. https://doi.org/10.1177/15248380211046752
UNFPA. (2023). Guidance on the Safe and Ethical Use of Technology to Address Gender-based Violence and Harmful Practices: Implementation Summary. UNFPA. https://www.unfpa.org/publications/implementation-summary-safe-ethical-use-technology-gbv-harmful-practices
Bansal, V., Rezwan, M., Iyer, M., Leasure, E., Roth, C., Pal, P., & Hinson, L. (2023). A Scoping Review of Technology-Facilitated Gender-Based Violence in Low- and Middle-Income Countries Across Asia. Trauma, Violence & Abuse, 15248380231154614. https://doi.org/10.1177/15248380231154614
Hall, M., Hearn, J., & Lewis, R. (2023). Image-Based Sexual Abuse: Online Gender-Sexual Violations. Encyclopedia, 3(1), 327–339. https://doi.org/10.3390/encyclopedia3010020
Srivastava, A., Rusow, J., Schrager, S. M., Stephenson, R., & Goldbach, J. T. (2023). Digital Sexual Violence and Suicide Risk in a National Sample of Sexual Minority Adolescents. Journal of Interpersonal Violence, 38(3–4), 4443–4458. https://doi.org/10.1177/08862605221116317
Straw, I., & Tanczer, L. (2023). Safeguarding patients from technology-facilitated abuse in clinical settings: A narrative review. PLOS Digital Health, 2(1), e0000089. https://doi.org/10.1371/journal.pdig.0000089
Sciacca, B., Mazzone, A., Loftsson, M., O’Higgins Norman, J., & Foody, M. (2023). Nonconsensual Dissemination of Sexual Images Among Adolescents: Associations With Depression and Self-Esteem. Journal of Interpersonal Violence, 38(15–16), 9438–9464. https://doi.org/10.1177/08862605231165777
UNFPA, & Wilson Center. (2023). 2022 Global Symposium on Technology-facilitated Gender-based Violence Results: Building a Common Pathway. UNFPA. https://www.unfpa.org/publications/2022-global-symposium-technology-facilitated-gender-based-violence-results-building
University of Melbourne, & UNFPA. (2023). Measuring technology-facilitated gender-based violence. A discussion paper. University of Melbourne and UNFPA. https://www.unfpa.org/publications/measuring-technology-facilitated-gender-based-violence-discussion-paper
UN Women, & World Health Organization. (2023). Technology-facilitated violence against women: Taking stock of evidence and data collection. UN Women. https://www.unwomen.org/en/digital-library/publications/2023/04/technology-facilitated-violence-against-women-taking-stock-of-evidence-and-data-collection
UN Women, & World Health Organization. (2023). The state of evidence and data collection on technology-facilitated violence against women. UN Women. https://www.unwomen.org/en/digital-library/publications/2023/04/brief-the-state-of-evidence-and-data-collection-on-technology-facilitated-violence-against-women
Dolev-Cohen, M., Nezer, I., & Zumt, A. A. (2022). A Qualitative Examination of School Counselors’ Experiences of Sextortion Cases of Female Students in Israel. Sexual Abuse, 107906322211459. https://doi.org/10.1177/10790632221145925
Dahlqvist, H., Svensson, Å., & Gillander Gådin, K. (2022). Co-occurrence of online and offline bullying and sexual harassment among youth in Sweden: Implications for studies on victimization and health a short communication. International Journal of Circumpolar Health, 81(1), 2130362. https://doi.org/10.1080/22423982.2022.2130362
Karasavva, V., & Forth, A. (2022). Personality, Attitudinal, and Demographic Predictors of Non-consensual Dissemination of Intimate Images. Journal of Interpersonal Violence, 37(21–22), NP19265–NP19289. https://doi.org/10.1177/08862605211043586




