<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v25i1e46084</article-id>
      <article-id pub-id-type="pmid">37184899</article-id>
      <article-id pub-id-type="doi">10.2196/46084</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Using Twitter-Based Data for Sexual Violence Research: Scoping Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>P?rez Jover</surname>
            <given-names>Virtudes</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Emery</surname>
            <given-names>Sherry </given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Xue</surname>
            <given-names>Jia</given-names>
          </name>
          <degrees>MA, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Factor-Inwentash Faculty of Social Work</institution>
            <institution>University of Toronto</institution>
            <addr-line>246 Bloor Street West</addr-line>
            <addr-line>Toronto, ON, M5S 1V4</addr-line>
            <country>Canada</country>
            <phone>1 416 946 5429</phone>
            <email>jia.xue@utoronto.ca</email>
          </address>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-1668-2531</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>Bolun</given-names>
          </name>
          <degrees>BA, MA</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-0767-8239</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>Qiaoru</given-names>
          </name>
          <degrees>BA</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0003-2044-7838</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Hu</surname>
            <given-names>Ran</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5068-8833</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Jiang</surname>
            <given-names>Jielin</given-names>
          </name>
          <degrees>BCom</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0001-6948-2015</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>Nian</given-names>
          </name>
          <degrees>MI</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5477-1594</ext-link>
        </contrib>
        <contrib id="contrib7" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Peng</surname>
            <given-names>Yingdong</given-names>
          </name>
          <degrees>BA, MI</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0002-3190-8268</ext-link>
        </contrib>
        <contrib id="contrib8" contrib-type="author" equal-contrib="yes">
          <name name-style="western">
            <surname>Li</surname>
            <given-names>Ziqian</given-names>
          </name>
          <degrees>BSc, MI</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0002-0612-9908</ext-link>
        </contrib>
        <contrib id="contrib9" contrib-type="author">
          <name name-style="western">
            <surname>Logan</surname>
            <given-names>Judith</given-names>
          </name>
          <degrees>BA, MA, MLIS</degrees>
          <xref rid="aff5" ref-type="aff">5</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-8112-7999</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Factor-Inwentash Faculty of Social Work</institution>
        <institution>University of Toronto</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Faculty of Information</institution>
        <institution>University of Toronto</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Faculty of Arts and Science</institution>
        <institution>University of Toronto</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff4">
        <label>4</label>
        <institution>Department of Medicine</institution>
        <institution>Center for Gender &#38; Sexual Health Equity</institution>
        <institution>University of British Columbia</institution>
        <addr-line>Vancouver, BC</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff5">
        <label>5</label>
        <institution>John P Robarts Library</institution>
        <institution>University of Toronto</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Jia Xue <email>jia.xue@utoronto.ca</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2023</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>15</day>
        <month>5</month>
        <year>2023</year>
      </pub-date>
      <volume>25</volume>
      <elocation-id>e46084</elocation-id>
      <history>
        <date date-type="received">
          <day>5</day>
          <month>2</month>
          <year>2023</year>
        </date>
        <date date-type="rev-request">
          <day>3</day>
          <month>3</month>
          <year>2023</year>
        </date>
        <date date-type="rev-recd">
          <day>7</day>
          <month>3</month>
          <year>2023</year>
        </date>
        <date date-type="accepted">
          <day>17</day>
          <month>4</month>
          <year>2023</year>
        </date>
      </history>
      <copyright-statement>©Jia Xue, Bolun Zhang, Qiaoru Zhang, Ran Hu, Jielin Jiang, Nian Liu, Yingdong Peng, Ziqian Li, Judith Logan. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 15.05.2023.</copyright-statement>
      <copyright-year>2023</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2023/1/e46084" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Scholars have used data from in-person interviews, administrative systems, and surveys for sexual violence research. Using Twitter as a data source for examining the nature of sexual violence is a relatively new and underexplored area of study.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>We aimed to perform a scoping review of the current literature on using Twitter data for researching sexual violence, elaborate on the validity of the methods, and discuss the implications and limitations of existing studies.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We performed a literature search in the following 6 databases: APA PsycInfo (Ovid), Scopus, PubMed, International Bibliography of Social Sciences (ProQuest), Criminal Justice Abstracts (EBSCO), and Communications Abstracts (EBSCO), in April 2022. The initial search identified 3759 articles that were imported into Covidence. Seven independent reviewers screened these articles following 2 steps: (1) title and abstract screening, and (2) full-text screening. The inclusion criteria were as follows: (1) empirical research, (2) focus on sexual violence, (3) analysis of Twitter data (ie, tweets or Twitter metadata), and (4) text in English. Finally, we selected 121 articles that met the inclusion criteria and coded these articles.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>We coded and presented the 121 articles using Twitter-based data for sexual violence research. About 70% (89/121, 73.6%) of the articles were published in peer-reviewed journals after 2018. The reviewed articles collectively analyzed about 79.6 million tweets. The primary approaches to using Twitter as a data source were content text analysis (112/121, 92.5%) and sentiment analysis (31/121, 25.6%). Hashtags (103/121, 85.1%) were the most prominent metadata feature, followed by tweet time and date, retweets, replies, URLs, and geotags. More than a third of the articles (51/121, 42.1%) used the application programming interface to collect Twitter data. Data analyses included qualitative thematic analysis, machine learning (eg, sentiment analysis, supervised machine learning, unsupervised machine learning, and social network analysis), and quantitative analysis. Only 10.7% (13/121) of the studies discussed ethical considerations.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>We described the current state of using Twitter data for sexual violence research, developed a new taxonomy describing Twitter as a data source, and evaluated the methodologies. Research recommendations include the following: development of methods for data collection and analysis, in-depth discussions about ethical norms, exploration of specific aspects of sexual violence on Twitter, examination of tweets in multiple languages, and decontextualization of Twitter data. This review demonstrates the potential of using Twitter data in sexual violence research.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>Twitter data</kwd>
        <kwd>sexual violence</kwd>
        <kwd>sexual assault</kwd>
        <kwd>scoping review</kwd>
        <kwd>review method</kwd>
        <kwd>data analysis</kwd>
        <kwd>data collection</kwd>
        <kwd>Twitter</kwd>
        <kwd>social media</kwd>
        <kwd>women’s health</kwd>
        <kwd>violence</kwd>
        <kwd>abuse</kwd>
        <kwd>public health</kwd>
        <kwd>domestic violence</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Sexual violence is a global public health problem, threatening individuals’ health and well-being worldwide [<xref ref-type="bibr" rid="ref1">1</xref>]. It is defined as “any sexual act, attempt to obtain a sexual act, unwanted sexual comments or advances, or acts to traffic, or otherwise directed, against a person’s sexuality using coercion, by any person regardless of their relationship to the victim, in any setting, including but not limited to home and work” [<xref ref-type="bibr" rid="ref2">2</xref>]. Sexual violence victimization can lead to several adverse health outcomes, including self-perceived poor health [<xref ref-type="bibr" rid="ref3">3</xref>], sexually transmitted infections (eg, HIV), unintended pregnancies, and mental health issues, such as depression, suicide attempts, and posttraumatic stress disorder [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
        <p>Twitter, launched in 2006, has become one of the most widely used social media platforms and an important source of public health information [<xref ref-type="bibr" rid="ref5">5</xref>-<xref ref-type="bibr" rid="ref8">8</xref>] and the COVID-19 pandemic [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>]. Over the past decade, researchers have conducted numerous studies using Twitter to gain insights into sexual violence. Twitter has become a significant venue for political protest [<xref ref-type="bibr" rid="ref11">11</xref>], the feminist movement [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref>], digital feminist activism [<xref ref-type="bibr" rid="ref14">14</xref>], and agenda setting for partner violence [<xref ref-type="bibr" rid="ref15">15</xref>]. The MeToo campaign has been crucial in facilitating public disclosure of sexual assault experiences on social media, including Twitter. Survivors of sexual violence have used Twitter to disclose and share their experiences and connect with other survivors who have had similar experiences. This has enabled survivors to gain a deeper understanding of their experiences and has been seen as an essential step in the healing process [<xref ref-type="bibr" rid="ref16">16</xref>]. Twitter has been used extensively to discuss the MeToo campaign [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref18">18</xref>] and other related hashtags such as #NotOkay [<xref ref-type="bibr" rid="ref19">19</xref>], #UsToo [<xref ref-type="bibr" rid="ref20">20</xref>], #WhyIStayed [<xref ref-type="bibr" rid="ref21">21</xref>], and #WhyILeft [<xref ref-type="bibr" rid="ref22">22</xref>].</p>
        <p>Research has also explored social reactions to sexual violence disclosures on Twitter, with the use of hashtags such as #NotOkay [<xref ref-type="bibr" rid="ref11">11</xref>]. There have also been debates regarding high-profile cases of sexual violence, such as the Janay Rice and Ray Rice case [<xref ref-type="bibr" rid="ref23">23</xref>], as well as reactions to disclosures of sexual violence in the sports context [<xref ref-type="bibr" rid="ref24">24</xref>]. Researchers have also analyzed hidden topics and thematic structures of sexual violence texts on Twitter [<xref ref-type="bibr" rid="ref25">25</xref>]. The public response to disclosures of sexual violence can provide valuable insights to researchers on how bystanders react to such disclosures and help develop social media–based bystander programs. Negative social reactions to disclosures of sexual violence may dissuade survivors from disclosing their experiences, thereby making it difficult for them to access online support [<xref ref-type="bibr" rid="ref26">26</xref>]. Sexual assault survivors have used Twitter to seek health information or build online communities where they can discuss the magnitude of the social problem. Using network analysis, researchers have also explored how topics related to sexual violence are posted and disseminated on Twitter [<xref ref-type="bibr" rid="ref25">25</xref>].</p>
        <p>In the digital age, Twitter has emerged as a crucial platform for understanding sexual violence. Understanding how the Twitter data set can be harnessed is essential to contribute to our understanding of sexual violence research. Therefore, exploring the ways in which Twitter data can be effectively used in sexual violence research can provide valuable insights to practitioners and researchers to effectively use the platform’s potential for implementing violence prevention and intervention strategies.</p>
      </sec>
      <sec>
        <title>Aim of the Study</title>
        <p>This study aims to provide a scoping review of the current literature on using Twitter data for sexual violence research. This review focuses primarily on the current state of Twitter data in sexual violence research, including (1) describing the main objectives addressed by previous studies in the field; (2) evaluating the methodology of these studies, including aspects such as study design, data collection, and data analysis strategies; (3) presenting a taxonomy describing the ways in which Twitter is used as a data source in sexual violence research; (4) presenting the various ways in which Twitter metadata features are used in this regard; and (5) discussing the implications and limitations of using Twitter data for sexual violence research. By providing a scoping overview of the existing research, this study contributes to a better understanding of the potential of Twitter data for sexual violence research and provides insights into the evidence-based practices for conducting such research.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Overview</title>
        <p>This study was guided by Arksey and O’Malley’s scoping review framework [<xref ref-type="bibr" rid="ref24">24</xref>]. This study was carried out in five stages, including (1) identifying research questions; (2) identifying relevant studies; (3) selecting studies; (4) charting the data; and (5) collating, summarizing, and reporting the results [<xref ref-type="bibr" rid="ref27">27</xref>].</p>
      </sec>
      <sec>
        <title>Identifying Relevant Studies</title>
        <p>A social and health sciences librarian (JL) developed a search strategy for this review. The librarian drafted an initial search strategy validated against a predetermined test set of articles and peer-reviewed by an independent librarian colleague using the Peer Review of Electronic Search Strategies (PRESS) framework [<xref ref-type="bibr" rid="ref28">28</xref>]. This search was structured to retrieve articles examining “sexual violence and Twitter” or “hashtags specific to sexual violence,” such as #MeToo and #TimesUp, using both text words and subject headings. We used a test set of 13 predetermined studies to validate the primary search strategy in APA PsycInfo (Ovid). We iteratively refined the initial search strategy to ensure all 13 studies would pass the initial screening. Once finalized, the search strategy was translated into 5 other databases to locate relevant peer-reviewed studies without geographical restrictions. In total, we searched six databases, including (1) APA PsycInfo (Ovid), (2) Scopus, (3) PubMed, (4) International Bibliography of Social Sciences (ProQuest), (5) Criminal Justice Abstracts (EBSCO), and (6) Communication Abstracts (EBSCO). Results were filtered by date starting from 2006, the year of Twitter’s inception. No other filters were applied. These searches were last run on April 14, 2022, and uploaded to Covidence for deduplication and screening. The search strategy is available in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>.</p>
      </sec>
      <sec>
        <title>Selecting Studies</title>
        <sec>
          <title>Inclusion and Exclusion Criteria</title>
          <p>To be included in the review, studies had to meet the following criteria: (1) be empirical research, (2) focus on sexual violence (eg, if the study just mentioned the term “sexual violence” or “sexual assault,” it was not eligible), (3) analyze Twitter data (ie, tweets or Twitter metadata), and (4) be written in English. In this review, we defined sexual violence as “a sexual act that is committed or attempted by another person without freely given consent of the victim or against someone unable to consent or refuse” [<xref ref-type="bibr" rid="ref29">29</xref>]. Aligning with this definition, we included various terms commonly used in the literature to describe sexual violence, such as rape, sexual assault, sexual abuse, sexual harassment, sexual coercion, and sexual aggression. Studies were excluded from the review if (1) Twitter data were not analyzed in the study, for example, Twitter was used merely as a platform to recruit participants, and the sample consisted of human beings rather than Twitter data; (2) studies were nonempirical research (eg, reviews and comments); or (3) studies were written in languages other than English.</p>
        </sec>
        <sec>
          <title>Selection Procedure and Search Results</title>
          <p>The search retrieved a total of 3759 studies from the 6 selected databases. After removing duplicates (n=1063), 2695 articles were entered into Covidence for abstract screening. To ensure the accuracy of article extraction, 7 research assistants (BZ, QZ, RH, JJ, NL, YP, and ZL) were trained to participate in both abstract and full-text screening processes to extract relevant studies. Each study was independently reviewed by 2 research assistants using the screening software, Covidence. The principal investigator (PI) (JX) resolved all disagreements. Before the screening process began, the PI trained all research assistants on screening guidelines. Following the abstract screening, 258 studies were selected for full-text screening. Of these, 137 studies were excluded in the full-text screening stage, resulting in a final sample of 121 articles that met the inclusion criteria. A PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) flowchart, shown in <xref rid="figure1" ref-type="fig">Figure 1</xref>, illustrates the search and screening process. By adhering to a comprehensive screening process, this review aimed to ensure the selection of studies that met the predefined inclusion criteria and to minimize bias in the study selection process.</p>
          <fig id="figure1" position="float">
            <label>Figure 1</label>
            <caption>
              <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) flowchart. Selection procedure and search results.</p>
            </caption>
            <graphic xlink:href="jmir_v25i1e46084_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
      <sec>
        <title>Charting the Data</title>
        <p>The team developed a charting guideline for extracting essential information from the articles included in the review. The charting guideline was organized into several main categories, including publication year, study objectives, theoretical or conceptual framework, use of Twitter data in the study, use of Twitter metadata, data collection methods, sample size, data analysis strategy, key findings, ethical considerations, and study limitations. Seven research assistants participated in the data charting process. Prior to the charting launch, all research assistants completed a charting exercise by independently reviewing the same 4 selected articles to familiarize themselves with the charting guideline and identify any areas that needed further clarification. The research team met to debrief the charting exercise and refine the charting guideline accordingly. The intercoder reliability score was excellent (Cohen κ &#62;90%). The PI then assigned each article to 2 research assistants for independent charting. The charting results from all research assistants were compiled into an Excel sheet, and any discrepancies were resolved by the PI. The team spent 3 months completing the screening and another 3 months for data extraction.</p>
      </sec>
      <sec>
        <title>Collating, Summarizing, and Reporting the Results</title>
        <p>Using a scoping review design, this study aimed to provide a comprehensive knowledge synthesis that maps the current state of sexual violence studies using Twitter data and identifies gaps for future research. As per the scoping review framework [<xref ref-type="bibr" rid="ref27">27</xref>], the quality of the selected studies was not appraised in this study.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Overview</title>
        <p>In this study, a total of 121 articles were reviewed out of 3759 studies initially identified through the search. We reviewed and described the current state of sexual violence research using Twitter data, including publication year, publication sources (ie, journal or conference), research topic, research methods, data collection methods, sample size, timeframe of tweets collected, data analysis strategy, and institutional review board procedures for using Twitter data in sexual violence research. To characterize Twitter use as a data source in these articles, we developed a codebook to define the taxonomy for different metadata features that can be extracted from Twitter, including Twitter use (eg, content/text, social network, and sentiment/emotions), Twitter functions (eg, #hashtags, URLs, and geotags/locations), and Twitter users (eg, age, gender, and occupation). We also extracted information about the results and discussions of the assessed studies but did not report them in this article.</p>
      </sec>
      <sec>
        <title>Current State of Sexual Violence Research Using Twitter Data</title>
        <p>We extracted information about the publication year, publication source (ie, journal or conference), and research topics. Discussions related to institutional review boards or ethics reviews were also extracted.</p>
        <sec>
          <title>Publication Year</title>
          <p><xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref> shows the number of articles published each year till April 2022. The review found that most articles were recent, with 68.6% (83/121) published after 2018. However, the earliest study in this review, which examined the information dissemination about the 2012 New Delhi gang rape protest [<xref ref-type="bibr" rid="ref30">30</xref>], was published in 2013. The findings suggest that using Twitter data in sexual violence research is a relatively recent development, with a considerable increase in publications in recent years.</p>
        </sec>
        <sec>
          <title>Type of Journal or Conference</title>
          <p>Findings showed that journals were the most common publication type for the reviewed articles, with 73.6% (89/121) of the articles published in journals. The reviewed articles most favored the following journals: <italic>Journal of Interpersonal Violence</italic>, <italic>Journal of Medical Internet Research</italic>, <italic>Feminist Media Studies</italic>, <italic>Violence and Gender</italic>, and <italic>Journal of Community Psychology</italic>. The remaining journal articles were published across various disciplines. A total of 28 of 121 (23.1%) articles were published at conferences. The findings suggest a growing interest in using Twitter data for sexual violence research across different fields.</p>
        </sec>
        <sec>
          <title>Research Topics</title>
          <p>Regarding research topics, the reviewed articles used 511 different hashtags to reference their research focus. The top 10 most commonly used hashtags were #MeToo (n=71), #NotOkay (n=21), #WhyIStayed (n=18), #WhyILeft (n=12), #WhyIDidntReport (n=9), #YesAllWomen (n=8), #BeenRapedNeverReported (n=5), #BlackLivesMatter (n=5), and #domesticviolence (n=5). However, 451 hashtags only appeared once in the reviewed articles. The findings indicate that most articles focused on similar themes surrounding focusing events or social movements in the society.</p>
        </sec>
        <sec>
          <title>Research Objectives</title>
          <p>This scoping review examined the current state of using Twitter data for sexual violence research, with a focus on publication year, publication source (ie, journal or conference), research objectives, and ethical considerations surrounding using Twitter data. We identified 7 main objectives after reviewing and summarizing the stated research objectives, including (1) exploring online disclosures and public opinions of sexual violence victimization [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref31">31</xref>]; (2) analyzing Twitter activities and discussions about focusing events or cases related to sexual violence, such as “Wolf pack,” “Hawthron case,” [<xref ref-type="bibr" rid="ref32">32</xref>] “New Delhi Gangrape,” “Ray Rice,” and “Janay Rice” [<xref ref-type="bibr" rid="ref23">23</xref>]; (3) investigating cultural perceptions of sexual assault [<xref ref-type="bibr" rid="ref33">33</xref>]; (4) building tools to capture offensive and abusive language on Twitter [<xref ref-type="bibr" rid="ref34">34</xref>]; (5) using Twitter as a tool to set public agenda and influence policies related to sexual violence, for example, Clark and Evans [<xref ref-type="bibr" rid="ref35">35</xref>] examined how factors (ie, gender, partisanship, and ideology) influence Congress members’ tweet activities about the #MeToo movement; (6) building and testing algorithms to categorize tweets containing harassment [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]; and (7) examining public discourses under popular sexual assault–related hashtags (ie, #whyistatyed and #whyididn’treport) [<xref ref-type="bibr" rid="ref20">20</xref>] or with key terms of “domestic violence” [<xref ref-type="bibr" rid="ref38">38</xref>]. When using Twitter as a data source, most studies focused on analyzing tweets to examine sexual assault events in the society, such as assessing the reactions of Twitter users as supportive or detractive, as well as exploring the public discourse and personal revelation surrounding sexual violence. These studies used Twitter as a lens to examine high-profile cases of sexual violence and the reasons for staying in abusive relationships.</p>
        </sec>
        <sec>
          <title>Ethical Discussions</title>
          <p>Out of the 121 reviewed articles, only 2 indicated that they had obtained ethics approval for using Twitter data for sexual violence research from an Institutional Review Board [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. Eleven studies mentioned that Twitter’s terms of service were considered consent for using Twitter data or discussed the exemption of tweets, as publicly available information, from ethical reviews. Since we did not include articles that used Twitter as a platform to recruit participants, traditional written consent with study participants did not apply to this scoping review. The ethical implications of using Twitter data for sexual violence research were also explored in this scoping review. The findings highlight the need for further attention to ethical considerations when using Twitter data for sexual violence research.</p>
        </sec>
      </sec>
      <sec>
        <title>Taxonomy of Using Twitter Data</title>
        <p>We employed a predefined taxonomy codebook to categorize how Twitter data were used as a data source in the reviewed articles. The taxonomy included the following 5 categories: (1) content/text, (2) sentiment/emotions, (3) images/photos, (4) engagement (ie, campaigns and nonprofits), and (5) social networks (<xref ref-type="table" rid="table1">Table 1</xref>). Among the 121 reviewed articles, 112 (92.5%) analyzed the content/text of the tweets, and 31 (25.6%) focused on the sentiment expressed in the tweets (eg, positive or negative emotions). A small number of articles used Twitter to engage people for campaigns (n=5), and 2 studies involved image analysis in tweets. Furthermore, 14.9% (18/121) of the studies analyzed the relationships between networks of Twitter accounts, such as follower/following ratios, and other network characteristics. It is worth noting that studies that used Twitter as a platform to recruit participants or as an intervention were excluded from this review as we focused solely on using Twitter as a data source in this review.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Twitter data usage taxonomy.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="330"/>
            <col width="420"/>
            <col width="250"/>
            <thead>
              <tr valign="top">
                <td>Taxonomy (use of Twitter data)</td>
                <td>Description</td>
                <td>Article frequency (N=121), n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Content/text</td>
                <td>Analysis of the tweets’ text for themes</td>
                <td>112 (92.5)</td>
              </tr>
              <tr valign="top">
                <td>Sentiment/emotions</td>
                <td>Analysis of the tweets’ emotions</td>
                <td>31 (25.6)</td>
              </tr>
              <tr valign="top">
                <td>Images/photos</td>
                <td>Analysis of the tweets’ associated images</td>
                <td>2 (1.6)</td>
              </tr>
              <tr valign="top">
                <td>Engagement (ie, campaigns and nonprofits)</td>
                <td>Analysis of using Twitter to engage people for a campaign or use by nongovernmental organizations</td>
                <td>5 (3.3)</td>
              </tr>
              <tr valign="top">
                <td>Social networks</td>
                <td>Analysis of the relationships between users/accounts</td>
                <td>18 (14.9)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Twitter Metadata</title>
        <p>In the 121 reviewed articles, hashtags were the most common Twitter metadata feature used (103/121, 85.1%), followed by tweet time and date (52/121, 43.0%), retweets (46/121, 38.0%), replies (ie, @mention; 37/121, 30.6%), URLs (22/121,18.2%), and geotags (25/121, 20.7%) (<xref ref-type="table" rid="table2">Table 2</xref>). Among the 121 articles, the majority (89/121, 73.5%) used multiple hashtags. For example, Rai et al [<xref ref-type="bibr" rid="ref40">40</xref>] mentioned a total of 53 hashtags in their article. Only a minority of the articles (18/121, 14.9%) used a single hashtag, and a smaller portion (14/121, 11.6%) did not include any hashtags at all.</p>
        <p>To determine metadata inclusion, we coded articles with 1 if they explicitly mentioned the 140-character limitation for tweets and 0 if not. Similarly, for URLs and hashtags, articles were coded as 1 if the URLs were explicitly shown as preserved in the data and 0 if the URLs were explicitly stated as cleaned from the data. The image/photo feature was coded as 1 for articles that included tweet images in the data set, regardless of their inclusion in the analysis. Few studies analyzed the demographic characteristics of Twitter users, such as gender (31/121, 25.6%), race (17/121, 14.0%), age (14/121, 11.6%), and occupation (13/121, 10.7%) (<xref ref-type="table" rid="table3">Table 3</xref>).</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>The use of Twitter metadata in the reviewed articles (2013-2022).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="240"/>
            <col width="510"/>
            <col width="250"/>
            <thead>
              <tr valign="top">
                <td>Metadata about tweets</td>
                <td>Coding</td>
                <td>Number of articles (N=121), n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>140-character limitation</td>
                <td>Coded as 1 if the 140-character limitation of the tweets is explicitly mentioned in the article.</td>
                <td>41 (33.9)</td>
              </tr>
              <tr valign="top">
                <td>#Hashtags</td>
                <td>Coded as 1 if the hashtags are explicitly shown in the data set.</td>
                <td>103 (85.1)</td>
              </tr>
              <tr valign="top">
                <td>URLs</td>
                <td>Coded as 1 if the URLs are explicitly shown in the data set.</td>
                <td>22 (18.2)</td>
              </tr>
              <tr valign="top">
                <td>Geotags/locations</td>
                <td>Coded as 1 if the geotags/locations are explicitly shown in the data set.</td>
                <td>25 (20.7)</td>
              </tr>
              <tr valign="top">
                <td>Retweets</td>
                <td>Coded as 1 if the retweets are explicitly shown in the data set.</td>
                <td>46 (38.0)</td>
              </tr>
              <tr valign="top">
                <td>Images/photos</td>
                <td>Coded as 1 if the images or photos are stated in the data set.</td>
                <td>13 (10.7)</td>
              </tr>
              <tr valign="top">
                <td>Tweet time and date</td>
                <td>Coded as 1 if the time and date of the tweets are indicated in the data set.</td>
                <td>52 (43.0)</td>
              </tr>
              <tr valign="top">
                <td>Favorites</td>
                <td>Coded as 1 if the favorites of the tweets are explicitly mentioned in the article.</td>
                <td>12 (9.9)</td>
              </tr>
              <tr valign="top">
                <td>Replies (@mention)</td>
                <td>Coded as 1 if the replies to the tweets are explicitly mentioned in the article.</td>
                <td>37 (30.6)</td>
              </tr>
              <tr valign="top">
                <td>Others</td>
                <td>N/A<sup>a</sup></td>
                <td>22 (18.2)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>N/A: not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Metadata about Twitter users.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="500"/>
            <col width="500"/>
            <thead>
              <tr valign="top">
                <td>Metadata about users</td>
                <td>Number of articles (N=121), n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Followers</td>
                <td>16 (13.2)</td>
              </tr>
              <tr valign="top">
                <td>Followings</td>
                <td>7 (5.8)</td>
              </tr>
              <tr valign="top">
                <td>Age</td>
                <td>14 (11.6)</td>
              </tr>
              <tr valign="top">
                <td>Gender</td>
                <td>31 (25.6)</td>
              </tr>
              <tr valign="top">
                <td>Race</td>
                <td>17 (14.0)</td>
              </tr>
              <tr valign="top">
                <td>Occupation</td>
                <td>13 (10.7)</td>
              </tr>
              <tr valign="top">
                <td>Others</td>
                <td>21 (17.4)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Research Methods</title>
        <sec>
          <title>Data Collection Methods</title>
          <p>The application programming interface (API) was used to collect tweets in more than a third of the reviewed studies (51/121, 42.1%), followed by Twitter’s advanced search function (17/121, 14.0%) and NVivo Addition NCapture (12/121, 9.9%). The remaining studies used various tools such as Topsy, GetOldTweets, Meltwater, Netlytic.org, NodeXL, Radian6, Discover Text, LexisNexis, and R. However, we found that 8 articles, such as the study by More and Francis [<xref ref-type="bibr" rid="ref41">41</xref>], did not provide specific details regarding their data collection methods, stating that the “data is collected and scraped online on Twitter.” Of the 121 reviewed articles, 28 used hashtags as keywords to collect data. Among these, 5 articles used multiple hashtags, with 1 article using 6 keywords [<xref ref-type="bibr" rid="ref42">42</xref>]. The remaining 23 articles only employed a single hashtag as a keyword to collect data.</p>
        </sec>
        <sec>
          <title>Sample Size and Timeframe of Tweets Collected</title>
          <p>The range of sample sizes varied greatly from 93 tweets [<xref ref-type="bibr" rid="ref17">17</xref>] to 32 million tweets [<xref ref-type="bibr" rid="ref43">43</xref>]. <xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref> shows the distribution of the sample sizes collected and analyzed across the reviewed articles. Eight articles were excluded due to a lack of sample size reporting [<xref ref-type="bibr" rid="ref44">44</xref>].</p>
          <p>About 21% (25/121, 20.7%) of the reviewed articles collected tweets within 7 days, while one-third of the articles (41/121, 33.9%) collected tweets over an 8- to 31-day period. About 30% (36/121, 29.8%) of the articles collected tweets for longer than 1 month (31 days) but less than 1 year (365 days), and 10 articles collected tweets for over 12 months.</p>
          <p>To obtain the average number of tweets collected per day, the sample size was divided by the number of days collected. Among the articles, 30 collected fewer than 100 tweets daily, 31 collected between 100 and 999 tweets daily, 26 collected between 1000 and 9999 tweets daily, 15 collected between 10,000 and 99,999 tweets daily, and 3 collected more than 100,000 tweets daily.</p>
          <p>In terms of the year of tweets collected, the highest number of tweets were posted in 2017 (43/180, 23.9%), with more than half of the tweets posted between 2016 and 2018 (<xref ref-type="supplementary-material" rid="app2">Multimedia Appendix 2</xref>).</p>
        </sec>
        <sec>
          <title>Data Analysis Strategy</title>
          <p>Our review revealed 2 main aspects, namely coding strategies and analysis methods. Most studies (n=76) relied on manual coding of tweets, while 13 studies used a combination of manual coding and machine learning coding strategies. For example, Chowdhury et al [<xref ref-type="bibr" rid="ref45">45</xref>] developed a manual annotation to identify Twitter disclosures of sexual violence.</p>
          <p>Regarding the analysis methods employed in the reviewed articles, we identified 6 main approaches: qualitative analysis, sentiment analysis, supervised machine learning, unsupervised machine learning, social network analysis, and quantitative analysis. These categories extend the previously discussed taxonomies of Twitter data usage and coding strategies. A combined approach of qualitative and unsupervised machine learning strategies was reported by 5 studies [<xref ref-type="bibr" rid="ref46">46</xref>-<xref ref-type="bibr" rid="ref48">48</xref>]. The most commonly used approach for analyzing Twitter data was a qualitative one, such as thematic analysis, which was employed by 94 studies [<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref50">50</xref>]. Machine learning techniques were used in 45 studies to analyze Twitter data, with 21 using supervised learning [<xref ref-type="bibr" rid="ref51">51</xref>] and 15 using unsupervised learning [<xref ref-type="bibr" rid="ref52">52</xref>]. Sentiment analysis was performed in 25 of the reviewed studies [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref51">51</xref>], while 12 adopted social network analysis [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref53">53</xref>]. Additionally, 10 studies employed other forms of quantitative analysis [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref55">55</xref>], and 1 study presented their developed Twitter data corpus without mentioning their data analysis approach [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
          <p>Regarding the software and programming languages used for data analysis, Python was found to be the most commonly used language (n=19) [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref56">56</xref>], followed by NVivo, a qualitative software used in 10 studies for organizing and analyzing tweets [<xref ref-type="bibr" rid="ref57">57</xref>,<xref ref-type="bibr" rid="ref58">58</xref>]. R software was also popular, with 7 studies using it for data analysis [<xref ref-type="bibr" rid="ref59">59</xref>,<xref ref-type="bibr" rid="ref60">60</xref>]. The text analysis program Linguistic Inquiry and Word Count (LIWC) was used in 6 studies [<xref ref-type="bibr" rid="ref55">55</xref>,<xref ref-type="bibr" rid="ref61">61</xref>], and Dedoose was used for analyzing tweet text in 3 studies [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref48">48</xref>]. NodeXL, an Excel add-in, was used for social network analysis in 2 studies [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]. Other software mentioned in the reviewed articles included AntConc [<xref ref-type="bibr" rid="ref62">62</xref>], Gephi [<xref ref-type="bibr" rid="ref53">53</xref>], InfraNodus [<xref ref-type="bibr" rid="ref63">63</xref>], The Meaning Extraction Helper [<xref ref-type="bibr" rid="ref33">33</xref>], SÉANCE [<xref ref-type="bibr" rid="ref24">24</xref>], Stata [<xref ref-type="bibr" rid="ref64">64</xref>], and Meltwater (previously Sysomos) [<xref ref-type="bibr" rid="ref65">65</xref>]. However, we found that 56 of 121 (46.3%) articles did not specify the software, programming language, or app used to analyze tweet text or Twitter metadata. </p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Over the past decade, researchers have shown an increased interest in using Twitter data to conduct sexual violence research. This scoping review included 121 articles that were published between 2006 and 2022, with an increase in the number of publications since 2013, peaking in 2019 and 2020. Almost 75% (89/121, 73.6%) of the reviewed articles were published in peer-reviewed journals across different disciplines. This review has a couple of main findings. First, it described the current use of Twitter data in sexual violence. Second, it presented a taxonomy outlining how Twitter data are used in this field, including analyzing content/text, sentiment/emotions, images/photos, engagement (ie, campaigns and nonprofits), and social networks. Third, it described and evaluated the methodology applied in the reviewed studies.</p>
      </sec>
      <sec>
        <title>Taxonomy of Using Twitter Data</title>
        <p>This review developed a taxonomy to describe the use of Twitter data in sexual violence research, which included the following 5 categories: (1) content/text, (2) sentiment/emotions, (3) images/photos, (4) engagement (ie, campaigns and nonprofits), and (5) social networks. More than 90% (112/121, 92.5%) of the reviewed studies used Twitter text for analysis. For example, Aurrekoetxea-Casaus [<xref ref-type="bibr" rid="ref66">66</xref>] examined tweet discussions around the hashtags #lamanada [#thewolfpack] in Spain, using qualitative thematic and content analysis. The author found that Twitter is used as a “loudspeaker” to spread myths about sexual violence rather than to provide explicit support for victims. Nutbeam and Mereish [<xref ref-type="bibr" rid="ref67">67</xref>] analyzed 508 tweets containing the hashtag #MeToo with qualitative content analysis to explore negative attitudes of condemnation or ambivalence toward sexual assault abusers in the MeToo movement. They found novel motives to explain the accusations of the MeToo movement and its accusers, such as wealth, malice, political gain, revenge, and fame, which are not frequently addressed in the literature. Another method of analyzing Twitter-generated data is to assess tweets for public positive or negative reactions [<xref ref-type="bibr" rid="ref68">68</xref>]. For example, Stevens et al [<xref ref-type="bibr" rid="ref69">69</xref>] studied the uncivil reactions to sexual assault on Twitter and Reddit by measuring the linguistic characteristics of the news media, such as negative emotions. They found a strong correlation between disagreement language and incivility of Twitter posts, and observed that increased negative emotions reduced identity attacks.</p>
        <p>The technical paper by Kumar and Aggarwal [<xref ref-type="bibr" rid="ref70">70</xref>] reported the methods of extracting sentiments from tweets and calculating the percentages of positive, negative, and neutral tweets to assess the safety of various cities for women. For instance, their study found that Chennai is the safest city for women, while Delhi is the least safe based on the sampled tweets. However, it is important to note that sentiment analysis is cross-sectional, meaning that results are influenced by the date and location of the tweets and are subject to changes in public opinion due to trending news or events in the year.</p>
        <p>Social network analysis, which examines the relationship and interactions between Twitter users [<xref ref-type="bibr" rid="ref65">65</xref>], was employed in 18 studies. Sim et al [<xref ref-type="bibr" rid="ref71">71</xref>] in Singapore collaborated with the Association of Women for Action and Research (AWARE) to examine how they can reach out to the audience and drive greater awareness of sexual harassment on social media. To achieve this, they built an analytics pipeline that performs digital social listening on conversations about sexual harassment. They identified a network of top users whose tweets were most frequently liked and top users who acted as brokers in the network. They suggested that the AWARE can engage these users to spread information and increase their outreach efforts.</p>
        <p>The smallest category of studies in our review focused on the analysis of Twitter images (n=2) or engaged people in campaigns (n=5). Hassan et al [<xref ref-type="bibr" rid="ref18">18</xref>] examined the Face++ API to analyze Twitter users’ profile pictures to identify their gender and age. The study by Navarro and Coromina [<xref ref-type="bibr" rid="ref12">12</xref>] examined the public reaction on Twitter following the judicial sentence of the <italic>La Manada</italic> case in Spain on April 26, 2018. They analyzed the images in the posts and found that the images broadened the layers of meaning in the public discourse on Twitter. Despite being a small category, the analysis of Twitter images and campaigns can provide valuable insights into the public’s attitudes and perceptions related to sexual violence.</p>
      </sec>
      <sec>
        <title>Research Methods</title>
        <p>This review represents sexual violence research that uses Twitter data, with an estimated 79.6 million tweets analyzed. The most common approach used to access Twitter data was Twitter’s API or Twitter’s advanced search function. Other platforms, such as Discover Text, provided access to the entire collected tweet data set at a cost. Twitter’s API has several advantages for academic research, including free access and the ability to retrieve up to 10 million tweets per month using advanced search operators [<xref ref-type="bibr" rid="ref72">72</xref>]. Notably, there was variation in sample sizes among the reviewed studies, with some researchers claiming a small sample size (eg, n=300) as a limitation that prevented them from making generalized claims when not adopting a big data approach [<xref ref-type="bibr" rid="ref56">56</xref>].</p>
        <p>A previous review stated that 38 data features could be extracted for each tweet, but Twitter metadata was not fully used in the studies [<xref ref-type="bibr" rid="ref68">68</xref>]. In this review, we found that many data features were still not included in the analyzed studies. In particular, there was a lack of analysis on metadata about Twitter users, such as their demographic characteristics like gender, age, and occupation. One reason for this underuse of Twitter metadata is the limitations of data collection tools. For example, NVivo Addition NCapture does not collect demographic information [<xref ref-type="bibr" rid="ref20">20</xref>]. In addition, Twitter users often selectively share information in their public social media profiles, which can lead to a considerable number of missing values in the metadata.</p>
        <p>Additionally, the passive nature of data analysis can only retrieve demographic information if it is available on the users’ profiles [<xref ref-type="bibr" rid="ref73">73</xref>]. However, some studies used advanced data science models to classify the gender of the users. For example, Mueller et al [<xref ref-type="bibr" rid="ref42">42</xref>] used a convolutional neural network model called “NeuralGenderDemographer” to examine demographic features, including gender and racial/ethnic identities, and their intersections. They found that tweets posted by White women were overrepresented in the #MeToo movement, while tweets posted by Black women revealed more criticisms of the unequal treatment in the social justice system.</p>
        <p>This review highlights a potential limitation of underutilizing demographic information about Twitter users, which could decontextualize study findings. Understanding the specific communities that contribute to public opinion on Twitter is crucial to fully grasp the social impact of sexual violence on society. However, researchers must balance this with the ethical considerations of protecting Twitter users’ privacy and anonymity, particularly in sensitive topics such as sexual violence. As a result, demographic information, such as gender, race, and location, may be intentionally removed to protect the identity of users. This suggests a research gap and an opportunity to explore ways of better contextualizing social media data while maintaining confidentiality and privacy.</p>
      </sec>
      <sec>
        <title>Review Limitations</title>
        <p>There are several limitations in this review that need to be acknowledged. First, we only included articles that used Twitter data (eg, text and photos) to research sexual violence or assault. Studies that used Twitter for intervention or participation recruitment purposes were excluded. Second, the search terms were limited to certain types of sexual violence, such as sexual assault, rape, sexual abuse, sexual harassment, and gender-based violence (<xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>). Studies focusing on other forms of violence, such as physical abuse, psychological abuse, economic control, and verbal abuse, were excluded from the scoping review. It is worth noting that some of the reviewed studies examined sexual violence as well as other forms of violence such as physical assault. Third, our search strategy did not include key terms, such as “infoveillance” and “infodemiology,” which are important concepts in the field of public health research [<xref ref-type="bibr" rid="ref74">74</xref>]. Despite these limitations, this review is the first to comprehensively synthesize and evaluate the current use of social media data in sexual violence research, providing valuable insights into the field.</p>
      </sec>
      <sec>
        <title>Future Research: Recommendations for Using Twitter Data in Sexual Violence Research</title>
        <p>This scoping review demonstrates the potential of Twitter data as a valuable resource in sexual violence research. This method allows researchers to expand beyond traditional data collection methods like surveys, interviews, and administrative data for sexual violence research. However, it is important to note that gaps exist in the current literature, and a further study is needed to fully understand the potential and limitations of using Twitter as a data source for sexual violence research.</p>
        <sec>
          <title>Development of Methods for Collecting and Analyzing Twitter Data</title>
          <p>This scoping review highlights the need to develop more robust methods for data collection and analysis. Fourteen studies reported that a small sample size restricted the generalizability of their findings [<xref ref-type="bibr" rid="ref60">60</xref>]. In addition, some studies pointed out problems with the algorithms employed in data processing. For example, Purohit et al [<xref ref-type="bibr" rid="ref31">31</xref>] found that the LIWC tool required revision in order to effectively process the unconstrained natural language text of Twitter data.</p>
          <p>On the other hand, Lowenstein-Barkai [<xref ref-type="bibr" rid="ref75">75</xref>] suggested that qualitative thematic analysis was crucial for placing quantitative findings within a broader context. To address the limitations of research capacity, future research could benefit from strengthening interdisciplinary collaborations between computer science and sexual violence researchers, with a focus on qualitative interpretations that support solutions to social problems. This could involve exploring specific computational methods such as linguistics and geospatial analysis.</p>
        </sec>
        <sec>
          <title>Ethical Considerations Surrounding the Use of Twitter Data</title>
          <p>The ethical considerations of using Twitter data in sexual violence research have been discussed in a limited number of studies. Only 10.7% (13/121) of the reviewed studies explicitly reported ethical considerations. In these articles, direct interaction with human subjects was not involved, and formal informed consent was not required. To ensure the anonymity of the participants, quotes were modified to avoid reverse identification [<xref ref-type="bibr" rid="ref76">76</xref>], and traceable quotes were not included [<xref ref-type="bibr" rid="ref63">63</xref>]. Usher et al [<xref ref-type="bibr" rid="ref63">63</xref>] demonstrated the use of secure encryption of Twitter data through Meltwater and InfraNodus, minimizing potential harm to participants during data collection and analysis. Despite these efforts, future research should engage in in-depth discussions regarding ethical norms and guidelines to further protect the privacy and confidentiality of participants. For example, research examining the methods of inferring user demographics, such as gender, age, ethnicity, education, and income, from social media posts has gained increasing attention in recent years. This approach is particularly relevant for Twitter research [<xref ref-type="bibr" rid="ref77">77</xref>]. Unlike traditional survey methods that directly ask participants for demographic information, predicting the demographic characteristics of Twitter users from their posts poses significant challenges [<xref ref-type="bibr" rid="ref78">78</xref>-<xref ref-type="bibr" rid="ref80">80</xref>]. Inferring demographic information from Twitter data is often associated with substantial errors and ethical challenges relating to privacy and consent. Such discussions may lead to developing more comprehensive and robust ethical standards for using Twitter data in sexual violence research.</p>
        </sec>
        <sec>
          <title>Specific Aspects of Sexual Violence on Twitter</title>
          <p>Further examination is needed to gain a more comprehensive understanding of particular aspects of sexual violence on Twitter. One crucial area for exploration is the manifestation of intersectionality in tweets. Kachen et al [<xref ref-type="bibr" rid="ref46">46</xref>] suggested that future research should examine how intersectional differences may affect the semantic meaning and sentiment of tweets. Cultural backgrounds, racialization, socioeconomic status, and other particular experiences of social oppression and privileges may all interact and influence the contents and interactions of tweets related to sexual violence. For example, the hashtag #MeToo, used to discuss sexual violence, may be used in conjunction with other hashtags related to racial justice movements (eg, #BlackLivesMatter) and gender inclusion rights advocacy (eg, #TransRightsAreHumanRights). Exploring some forms of combinations of hashtags in future studies may be one of the practical intersectional approaches that provide a more nuanced and comprehensive understanding of how different social identities and experiences with intersecting privileges and oppressions intersect and shape the experiences of and perspectives on sexual violence. Ultimately, adopting intersectional lenses to collect and analyze social media data contributes to creating more thoughtful and inclusive antiviolence strategies, social programs, and policies.</p>
        </sec>
        <sec>
          <title>English Language Tweets</title>
          <p>Most of the reviewed studies only coded and analyzed English language tweets, leading to concerns about potential bias. Sixteen articles noted the inherent bias in their methodology, as they only included English tweets [<xref ref-type="bibr" rid="ref81">81</xref>]. Research suggests that “English-only tweets may reflect national hotspot areas in which English is spoken more commonly and thus have higher rates of English language tweets regarding any topic” [<xref ref-type="bibr" rid="ref39">39</xref>]. The #MeToo hashtag was widely used to collect tweets related to sexual violence in the reviewed studies. However, as a global movement, the stories of the #MeToo movement on social media are understudied when current research only examines English language tweets. To address this limitation, future studies should consider sampling tweets in diverse languages, such as #MeToo or similar hashtags in other languages [<xref ref-type="bibr" rid="ref82">82</xref>]. Meanwhile, researchers may consider collecting Twitter data along with data from other social media that are more commonly used by individuals who prefer digital communication in a language other than English. This approach would help broaden our knowledge of the global impact of antisexual violence campaigns, such as the #MeToo movement, and provide a more comprehensive understanding of how sexual violence is discussed across diverse cultures and languages in the transnational digital space.</p>
        </sec>
        <sec>
          <title>Underrepresentation</title>
          <p>Using Twitter as a data source for sexual violence research may not provide a representative sample of individuals who have experienced sexual violence. Thirty-two reviewed articles revealed that Twitter users do not represent the general population and only reflect opinions at a time, which do not accurately define the users. It is important to note that not all individuals who have experienced sexual violence use Twitter or disclose their experiences on this platform. Guidry et al [<xref ref-type="bibr" rid="ref83">83</xref>] noted the potential selection bias of individuals who choose to tweet using the hashtag #WhyIDidntReport. Woo et al [<xref ref-type="bibr" rid="ref84">84</xref>] mentioned that “we cannot definitively ascertain whether the purposes and attitudes of each Twitter post are parallel with those users’ intentions.” Thirteen articles stated that social media platforms, such as Twitter, are not socially representative and may limit the generalizability of the sample and results. For example, Twitter users tend to be younger in the United States [<xref ref-type="bibr" rid="ref85">85</xref>]. Tweet posters may be those who feel comfortable discussing sexual assault topics in public or those who are less traumatized when they disclose their own experience. It is important to recognize this limitation and mitigate it by intentionally collecting additional data from social groups whose perspectives and experiences are underrepresented on social media. This could be mitigated through the collection of data from other sources, such as traditional surveys and interviews, and different social media platforms.</p>
        </sec>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Existing literature shows the potential of using Twitter-based data for sexual violence research, as evidenced by the increasing number of publications after 2018. To contribute to this field, this study reviewed and extracted 121 articles that collectively analyzed about 79.6 million tweets. We described the current state of using Twitter data for sexual violence research, developed a new taxonomy that describes Twitter as a data source, and evaluated the methodologies used. Based on our review, several research recommendations are proposed, such as development of data collection and analysis methods, in-depth discussions about ethical norms, exploration of specific aspects of sexual violence on Twitter, analysis of tweets in multiple languages, and a more inclusive representation of the findings. These recommendations may guide future studies on using Twitter data for sexual violence research.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Search strategies.</p>
        <media xlink:href="jmir_v25i1e46084_app1.docx" xlink:title="DOCX File , 24 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Data regarding publication year, sample size, and year of data collection.</p>
        <media xlink:href="jmir_v25i1e46084_app2.docx" xlink:title="DOCX File , 22 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">API</term>
          <def>
            <p>application programming interface</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">AWARE</term>
          <def>
            <p>Association of Women for Action and Research</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">LIWC</term>
          <def>
            <p>Linguistic Inquiry and Word Count</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">PI</term>
          <def>
            <p>principal investigator</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Black</surname>
              <given-names>MC</given-names>
            </name>
            <name name-style="western">
              <surname>Basile</surname>
              <given-names>KC</given-names>
            </name>
            <name name-style="western">
              <surname>Breiding</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>SG</given-names>
            </name>
            <name name-style="western">
              <surname>Walters</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Merrick</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Stevens</surname>
              <given-names>MR</given-names>
            </name>
          </person-group>
          <article-title>National Intimate Partner and Sexual Violence Survey: 2010 Summary Report</article-title>
          <source>Centers for Disease Control and Prevention</source>
          <year>2011</year>
          <access-date>2023-04-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cdc.gov/violenceprevention/pdf/nisvs_report2010-a.pdf">https://www.cdc.gov/violenceprevention/pdf/nisvs_report2010-a.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Krug</surname>
              <given-names>EG</given-names>
            </name>
            <name name-style="western">
              <surname>Mercy</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Dahlberg</surname>
              <given-names>LL</given-names>
            </name>
            <name name-style="western">
              <surname>Zwi</surname>
              <given-names>AB</given-names>
            </name>
          </person-group>
          <article-title>The world report on violence and health</article-title>
          <source>The Lancet</source>
          <year>2002</year>
          <month>10</month>
          <volume>360</volume>
          <issue>9339</issue>
          <fpage>1083</fpage>
          <lpage>1088</lpage>
          <pub-id pub-id-type="doi">10.1016/s0140-6736(02)11133-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fanslow</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Robinson</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Violence against women in New Zealand: prevalence and health consequences</article-title>
          <source>N Z Med J</source>
          <year>2004</year>
          <month>11</month>
          <day>26</day>
          <volume>117</volume>
          <issue>1206</issue>
          <fpage>U1173</fpage>
          <pub-id pub-id-type="medline">15570342</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="web">
          <article-title>Violence against women : intimate partner and sexual violence against women : intimate partner and sexual violence have serious short- and long-term physical, mental and sexual and reproductive health problems for survivors : fact sheet</article-title>
          <source>World Health Organization</source>
          <year>2014</year>
          <access-date>2023-04-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://apps.who.int/iris/handle/10665/112325">https://apps.who.int/iris/handle/10665/112325</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Su</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Xue</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Gong</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Examining the Impact of COVID-19 Lockdown in Wuhan and Lombardy: A Psycholinguistic Analysis on Weibo and Twitter</article-title>
          <source>Int J Environ Res Public Health</source>
          <year>2020</year>
          <month>06</month>
          <day>24</day>
          <volume>17</volume>
          <issue>12</issue>
          <fpage>4552</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=ijerph17124552"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/ijerph17124552</pub-id>
          <pub-id pub-id-type="medline">32599811</pub-id>
          <pub-id pub-id-type="pii">ijerph17124552</pub-id>
          <pub-id pub-id-type="pmcid">PMC7344534</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xue</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Su</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Twitter Discussions and Emotions About the COVID-19 Pandemic: Machine Learning Approach</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>11</month>
          <day>25</day>
          <volume>22</volume>
          <issue>11</issue>
          <fpage>e20550</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/11/e20550/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/20550</pub-id>
          <pub-id pub-id-type="medline">33119535</pub-id>
          <pub-id pub-id-type="pii">v22i11e20550</pub-id>
          <pub-id pub-id-type="pmcid">PMC7690968</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xue</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Public discourse and sentiment during the COVID 19 pandemic: Using Latent Dirichlet Allocation for topic modeling on Twitter</article-title>
          <source>PLoS One</source>
          <year>2020</year>
          <month>9</month>
          <day>25</day>
          <volume>15</volume>
          <issue>9</issue>
          <fpage>e0239441</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0239441"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0239441</pub-id>
          <pub-id pub-id-type="medline">32976519</pub-id>
          <pub-id pub-id-type="pii">PONE-D-20-11036</pub-id>
          <pub-id pub-id-type="pmcid">PMC7518625</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xiang</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Lu</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Halavanau</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Xue</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Lai</surname>
              <given-names>PHL</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Modern Senicide in the Face of a Pandemic: An Examination of Public Discourse and Sentiment About Older Adults and COVID-19 Using Machine Learning</article-title>
          <source>J Gerontol B Psychol Sci Soc Sci</source>
          <year>2021</year>
          <month>03</month>
          <day>14</day>
          <volume>76</volume>
          <issue>4</issue>
          <fpage>e190</fpage>
          <lpage>e200</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32785620"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/geronb/gbaa128</pub-id>
          <pub-id pub-id-type="medline">32785620</pub-id>
          <pub-id pub-id-type="pii">5891619</pub-id>
          <pub-id pub-id-type="pmcid">PMC7454882</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xue</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>The Hidden Pandemic of Family Violence During COVID-19: Unsupervised Learning of Tweets</article-title>
          <source>J Med Internet Res</source>
          <year>2020</year>
          <month>11</month>
          <day>06</day>
          <volume>22</volume>
          <issue>11</issue>
          <fpage>e24361</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2020/11/e24361/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/24361</pub-id>
          <pub-id pub-id-type="medline">33108315</pub-id>
          <pub-id pub-id-type="pii">v22i11e24361</pub-id>
          <pub-id pub-id-type="pmcid">PMC7652592</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>López</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Bogen</surname>
              <given-names>KW</given-names>
            </name>
            <name name-style="western">
              <surname>Meza-Lopez</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Nugent</surname>
              <given-names>NR</given-names>
            </name>
            <name name-style="western">
              <surname>Orchowski</surname>
              <given-names>LM</given-names>
            </name>
          </person-group>
          <article-title>#DomesticViolence During the COVID-19 Global Pandemic: An Analysis of Public Commentary via Twitter</article-title>
          <source>Digit Health</source>
          <year>2022</year>
          <month>07</month>
          <day>25</day>
          <volume>8</volume>
          <fpage>20552076221115024</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/20552076221115024?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/20552076221115024</pub-id>
          <pub-id pub-id-type="medline">35923758</pub-id>
          <pub-id pub-id-type="pii">10.1177_20552076221115024</pub-id>
          <pub-id pub-id-type="pmcid">PMC9340387</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bogen</surname>
              <given-names>KW</given-names>
            </name>
            <name name-style="western">
              <surname>Bleiweiss</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Orchowski</surname>
              <given-names>LM</given-names>
            </name>
          </person-group>
          <article-title>Sexual violence is #NotOkay: Social reactions to disclosures of sexual victimization on twitter</article-title>
          <source>Psychology of Violence</source>
          <year>2019</year>
          <month>01</month>
          <volume>9</volume>
          <issue>1</issue>
          <fpage>127</fpage>
          <lpage>137</lpage>
          <pub-id pub-id-type="doi">10.1037/vio0000192</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Navarro</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Coromina</surname>
              <given-names>Ò</given-names>
            </name>
          </person-group>
          <article-title>Discussion and mediation of social outrage on Twitter: The reaction to the judicial sentence of "La Manada"</article-title>
          <source>Communication &#38; Society</source>
          <year>2020</year>
          <month>01</month>
          <day>07</day>
          <volume>33</volume>
          <issue>1</issue>
          <fpage>93</fpage>
          <lpage>106</lpage>
          <pub-id pub-id-type="doi">10.15581/003.33.37295</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zimmerman</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>#Intersectionality: T   e Fourth Wave Feminist Twitter Community</article-title>
          <source>Atlantis</source>
          <year>2017</year>
          <volume>38</volume>
          <issue>1</issue>
          <fpage>54</fpage>
          <lpage>70</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.msvu.ca/index.php/atlantis/article/view/4304/54-70%20PDF"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Puente</surname>
              <given-names>SN</given-names>
            </name>
            <name name-style="western">
              <surname>Maceiras</surname>
              <given-names>SD</given-names>
            </name>
            <name name-style="western">
              <surname>Romero</surname>
              <given-names>DF</given-names>
            </name>
          </person-group>
          <article-title>Twitter Activism and Ethical Witnessing: Possibilities and Challenges of Feminist Politics Against Gender-Based Violence</article-title>
          <source>Social Science Computer Review</source>
          <year>2019</year>
          <month>07</month>
          <day>24</day>
          <volume>39</volume>
          <issue>2</issue>
          <fpage>295</fpage>
          <lpage>311</lpage>
          <pub-id pub-id-type="doi">10.1177/0894439319864898</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xue</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Agenda-Setting for Intimate Partner Violence: Exploring the Role of Social Media United States - Based Twitter</article-title>
          <source>ProQuest</source>
          <year>2018</year>
          <access-date>2023-04-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.proquest.com/docview/2162939839">https://www.proquest.com/docview/2162939839</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Starzynski</surname>
              <given-names>LL</given-names>
            </name>
            <name name-style="western">
              <surname>Ullman</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Filipas</surname>
              <given-names>HH</given-names>
            </name>
            <name name-style="western">
              <surname>Townsend</surname>
              <given-names>SM</given-names>
            </name>
          </person-group>
          <article-title>Correlates of Women's Sexual Assault Disclosure to Informal and Formal Support Sources</article-title>
          <source>violence vict</source>
          <year>2005</year>
          <month>08</month>
          <day>01</day>
          <volume>20</volume>
          <issue>4</issue>
          <fpage>417</fpage>
          <lpage>432</lpage>
          <pub-id pub-id-type="doi">10.1891/vivi.2005.20.4.417</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alaggia</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>"I never told anyone until the #metoo movement": What can we learn from sexual abuse and sexual assault disclosures made through social media?</article-title>
          <source>Child Abuse Negl</source>
          <year>2020</year>
          <month>05</month>
          <volume>103</volume>
          <fpage>104312</fpage>
          <pub-id pub-id-type="doi">10.1016/j.chiabu.2019.104312</pub-id>
          <pub-id pub-id-type="medline">32200194</pub-id>
          <pub-id pub-id-type="pii">S0145-2134(19)30488-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hassan</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Mandal</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Bhuiyan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Moitra</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>SI</given-names>
            </name>
          </person-group>
          <article-title>Can women break the glass ceiling?: an analysis of #MeToo hashtagged posts on Twitter</article-title>
          <source>ASONAM '19: Proceedings of the 2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining</source>
          <year>2019</year>
          <conf-name>2019 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining</conf-name>
          <conf-date>August 27-30, 2019</conf-date>
          <conf-loc>Vancouver, British Columbia, Canada</conf-loc>
          <fpage>653</fpage>
          <lpage>656</lpage>
          <pub-id pub-id-type="doi">10.1145/3341161.3343701</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bogen</surname>
              <given-names>KW</given-names>
            </name>
            <name name-style="western">
              <surname>Millman</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Huntington</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Orchowski</surname>
              <given-names>LM</given-names>
            </name>
          </person-group>
          <article-title>A Qualitative Analysis of Disclosing Sexual Victimization by #NotOkay During the 2016 Presidential Election</article-title>
          <source>Violence and Gender</source>
          <year>2018</year>
          <month>09</month>
          <volume>5</volume>
          <issue>3</issue>
          <fpage>174</fpage>
          <lpage>181</lpage>
          <pub-id pub-id-type="doi">10.1089/vio.2017.0053</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bogen</surname>
              <given-names>KW</given-names>
            </name>
            <name name-style="western">
              <surname>Mulla</surname>
              <given-names>MMM</given-names>
            </name>
            <name name-style="western">
              <surname>Haikalis</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Orchowski</surname>
              <given-names>LM</given-names>
            </name>
          </person-group>
          <article-title>Sexual Victimization Among Men: A Qualitative Analysis of the Twitter Hashtag #UsToo</article-title>
          <source>J Interpers Violence</source>
          <year>2022</year>
          <month>05</month>
          <day>04</day>
          <volume>37</volume>
          <issue>9-10</issue>
          <fpage>NP7825</fpage>
          <lpage>NP7849</lpage>
          <pub-id pub-id-type="doi">10.1177/0886260520967167</pub-id>
          <pub-id pub-id-type="medline">33146060</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Storer</surname>
              <given-names>HL</given-names>
            </name>
            <name name-style="western">
              <surname>Rodriguez</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Franklin</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>"Leaving Was a Process, Not an Event": The Lived Experience of Dating and Domestic Violence in 140 Characters</article-title>
          <source>J Interpers Violence</source>
          <year>2021</year>
          <month>06</month>
          <day>05</day>
          <volume>36</volume>
          <issue>11-12</issue>
          <fpage>NP6553</fpage>
          <lpage>NP6580</lpage>
          <pub-id pub-id-type="doi">10.1177/0886260518816325</pub-id>
          <pub-id pub-id-type="medline">30516411</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cravens</surname>
              <given-names>JD</given-names>
            </name>
            <name name-style="western">
              <surname>Whiting</surname>
              <given-names>JB</given-names>
            </name>
            <name name-style="western">
              <surname>Aamar</surname>
              <given-names>RO</given-names>
            </name>
          </person-group>
          <article-title>Why I Stayed/Left: An Analysis of Voices of Intimate Partner Violence on Social Media</article-title>
          <source>Contemp Fam Ther</source>
          <year>2015</year>
          <month>9</month>
          <day>25</day>
          <volume>37</volume>
          <issue>4</issue>
          <fpage>372</fpage>
          <lpage>385</lpage>
          <pub-id pub-id-type="doi">10.1007/s10591-015-9360-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Davis</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Love</surname>
              <given-names>TP</given-names>
            </name>
          </person-group>
          <article-title>Women Who Stay: A Morality Work Perspective</article-title>
          <source>Social Problems</source>
          <year>2018</year>
          <volume>65</volume>
          <issue>2</issue>
          <fpage>251</fpage>
          <lpage>265</lpage>
          <pub-id pub-id-type="doi">10.1093/socpro/spx016</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eiler</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Al-Kire</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Doyle</surname>
              <given-names>PC</given-names>
            </name>
            <name name-style="western">
              <surname>Wayment</surname>
              <given-names>HA</given-names>
            </name>
          </person-group>
          <article-title>Power and Trust Dynamics of Sexual Violence: A Textual Analysis of Nassar Victim Impact Statements and #MeToo Disclosures on Twitter</article-title>
          <source>Journal of Clinical Sport Psychology</source>
          <year>2019</year>
          <month>06</month>
          <volume>13</volume>
          <issue>2</issue>
          <fpage>290</fpage>
          <lpage>310</lpage>
          <pub-id pub-id-type="doi">10.1123/jcsp.2018-0056</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xue</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Macropol</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Jia</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Zhu</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Gelles</surname>
              <given-names>RJ</given-names>
            </name>
          </person-group>
          <article-title>Harnessing big data for social justice: An exploration of violence against women‐related conversations on Twitter</article-title>
          <source>Human Behav and Emerg Tech</source>
          <year>2019</year>
          <month>07</month>
          <day>26</day>
          <volume>1</volume>
          <issue>3</issue>
          <fpage>269</fpage>
          <lpage>279</lpage>
          <pub-id pub-id-type="doi">10.1002/hbe2.160</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahrens</surname>
              <given-names>CE</given-names>
            </name>
          </person-group>
          <article-title>Being silenced: the impact of negative social reactions on the disclosure of rape</article-title>
          <source>Am J Community Psychol</source>
          <year>2006</year>
          <month>12</month>
          <volume>38</volume>
          <issue>3-4</issue>
          <fpage>263</fpage>
          <lpage>74</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/17111229"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10464-006-9069-9</pub-id>
          <pub-id pub-id-type="medline">17111229</pub-id>
          <pub-id pub-id-type="pmcid">PMC1705531</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arksey</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>O'Malley</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Scoping studies: towards a methodological framework</article-title>
          <source>International Journal of Social Research Methodology</source>
          <year>2005</year>
          <month>02</month>
          <volume>8</volume>
          <issue>1</issue>
          <fpage>19</fpage>
          <lpage>32</lpage>
          <pub-id pub-id-type="doi">10.1080/1364557032000119616</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McGowan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sampson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Salzwedel</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Cogo</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Foerster</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Lefebvre</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>PRESS Peer Review of Electronic Search Strategies: 2015 Guideline Statement</article-title>
          <source>J Clin Epidemiol</source>
          <year>2016</year>
          <month>07</month>
          <volume>75</volume>
          <fpage>40</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S0895-4356(16)00058-5"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jclinepi.2016.01.021</pub-id>
          <pub-id pub-id-type="medline">27005575</pub-id>
          <pub-id pub-id-type="pii">S0895-4356(16)00058-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Basile</surname>
              <given-names>KC</given-names>
            </name>
            <name name-style="western">
              <surname>Clayton</surname>
              <given-names>HB</given-names>
            </name>
            <name name-style="western">
              <surname>Rostad</surname>
              <given-names>WL</given-names>
            </name>
            <name name-style="western">
              <surname>Leemis</surname>
              <given-names>RW</given-names>
            </name>
          </person-group>
          <article-title>Sexual Violence Victimization of Youth and Health Risk Behaviors</article-title>
          <source>Am J Prev Med</source>
          <year>2020</year>
          <month>04</month>
          <volume>58</volume>
          <issue>4</issue>
          <fpage>570</fpage>
          <lpage>579</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/32033854"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.amepre.2019.11.020</pub-id>
          <pub-id pub-id-type="medline">32033854</pub-id>
          <pub-id pub-id-type="pii">S0749-3797(20)30010-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC7266035</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Jaidka</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Urs</surname>
              <given-names>SR</given-names>
            </name>
            <name name-style="western">
              <surname>Na</surname>
              <given-names>JC</given-names>
            </name>
            <name name-style="western">
              <surname>Buchanan</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>The Common Man: An Examination of Content Creation and Information Dissemination on Twitter during the 2012 New Delhi Gang-Rape Protest</article-title>
          <source>Digital Libraries: Social Media and Community Networks. ICADL 2013. Lecture Notes in Computer Science, vol 8279</source>
          <year>2013</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>117</fpage>
          <lpage>126</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Purohit</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Banerjee</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Hampton</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Shalin</surname>
              <given-names>VL</given-names>
            </name>
            <name name-style="western">
              <surname>Bhandutia</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Sheth</surname>
              <given-names>AP</given-names>
            </name>
          </person-group>
          <article-title>Gender-Based Violence in 140 Characters or Fewer: A #BigData Case Study of Twitter</article-title>
          <source>arXiv</source>
          <year>2015</year>
          <access-date>2023-04-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/1503.02086">https://arxiv.org/abs/1503.02086</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Waterhouse-Watson</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>“I Would Hate To See Our Good Name Tarnished”: Twitter Users Respond to Sexual Assault in Football</article-title>
          <source>Journal of Australian Studies</source>
          <year>2019</year>
          <month>01</month>
          <day>30</day>
          <volume>43</volume>
          <issue>1</issue>
          <fpage>22</fpage>
          <lpage>38</lpage>
          <pub-id pub-id-type="doi">10.1080/14443058.2018.1552609</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ikizer</surname>
              <given-names>EG</given-names>
            </name>
            <name name-style="western">
              <surname>Ramírez-Esparza</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Boyd</surname>
              <given-names>RL</given-names>
            </name>
          </person-group>
          <article-title>#sendeanlat (#tellyourstory): Text Analyses of Tweets About Sexual Assault Experiences</article-title>
          <source>Sex Res Soc Policy</source>
          <year>2018</year>
          <month>10</month>
          <day>6</day>
          <volume>16</volume>
          <issue>4</issue>
          <fpage>463</fpage>
          <lpage>475</lpage>
          <pub-id pub-id-type="doi">10.1007/s13178-018-0358-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rezvan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Shekarpour</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Balasuriya</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Thirunarayan</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Shalin</surname>
              <given-names>VL</given-names>
            </name>
            <name name-style="western">
              <surname>Sheth</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A Quality Type-aware Annotated Corpus and Lexicon for Harassment Research</article-title>
          <source>WebSci '18: Proceedings of the 10th ACM Conference on Web Science</source>
          <year>2018</year>
          <conf-name>10th ACM Conference on Web Science</conf-name>
          <conf-date>May 27-30, 2018</conf-date>
          <conf-loc>Amsterdam, Netherlands</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3201064.3201103</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Clark</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>HK</given-names>
            </name>
          </person-group>
          <article-title>Let’s Talk about Sex: Examining the Factors Influencing Congressional Response to #MeToo on Twitter</article-title>
          <source>APSC</source>
          <year>2019</year>
          <month>12</month>
          <day>23</day>
          <volume>53</volume>
          <issue>1</issue>
          <fpage>51</fpage>
          <lpage>56</lpage>
          <pub-id pub-id-type="doi">10.1017/s1049096519001124</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saeidi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>da S Sousa</surname>
              <given-names>SB</given-names>
            </name>
            <name name-style="western">
              <surname>Milios</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zeh</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Berton</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Cellier</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Driessens</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Categorizing Online Harassment on Twitter</article-title>
          <source>Machine Learning and Knowledge Discovery in Databases. ECML PKDD 2019. Communications in Computer and Information Science, vol 1168</source>
          <year>2019</year>
          <publisher-loc>Cham</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>283</fpage>
          <lpage>297</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kumari</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>kandukuri</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Dynamic Data Analysis and Decision Making on Twitter Data</article-title>
          <source>IJITEE</source>
          <year>2019</year>
          <month>11</month>
          <day>30</day>
          <volume>9</volume>
          <issue>1</issue>
          <fpage>4010</fpage>
          <lpage>4015</lpage>
          <pub-id pub-id-type="doi">10.35940/ijitee.a5255.119119</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Xue</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Gelles</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Using Data Mining Techniques to Examine Domestic Violence Topics on Twitter</article-title>
          <source>Violence and Gender</source>
          <year>2019</year>
          <month>06</month>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>105</fpage>
          <lpage>114</lpage>
          <pub-id pub-id-type="doi">10.1089/vio.2017.0066</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bogen</surname>
              <given-names>KW</given-names>
            </name>
            <name name-style="western">
              <surname>Orchowski</surname>
              <given-names>LM</given-names>
            </name>
          </person-group>
          <article-title>A Geospatial Analysis of Disclosure of and Social Reactions to Sexual Victimization on Twitter Using #MeToo</article-title>
          <source>Women &#38; Therapy</source>
          <year>2021</year>
          <month>10</month>
          <day>06</day>
          <volume>44</volume>
          <issue>3-4</issue>
          <fpage>374</fpage>
          <lpage>390</lpage>
          <pub-id pub-id-type="doi">10.1080/02703149.2021.1961449</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rai</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>YJ</given-names>
            </name>
            <name name-style="western">
              <surname>Cho</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Das</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Tamayo</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Menon</surname>
              <given-names>GM</given-names>
            </name>
          </person-group>
          <article-title>“#Domestic Violence Isn’t Stopping for Coronavirus …….”: Intimate Partner Violence Conversations on Twitter during the Early Days of the COVID-19 Pandemic</article-title>
          <source>Journal of Evidence-Based Social Work</source>
          <year>2021</year>
          <month>09</month>
          <day>30</day>
          <volume>19</volume>
          <issue>1</issue>
          <fpage>108</fpage>
          <lpage>128</lpage>
          <pub-id pub-id-type="doi">10.1080/26408066.2021.1964671</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>More</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Francis</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Analyzing the Impact of Domestic Violence on Social Media using Natural Language Processing</article-title>
          <year>2021</year>
          <conf-name>2021 IEEE Pune Section International Conference (PuneCon)</conf-name>
          <conf-date>December 16-19, 2021</conf-date>
          <conf-loc>Pune, India</conf-loc>
          <pub-id pub-id-type="doi">10.1109/punecon52575.2021.9686490</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mueller</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wood-Doughty</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Amir</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dredze</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lynn Nobles</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Demographic Representation and Collective Storytelling in the Me Too Twitter Hashtag Activism Movement</article-title>
          <source>Proc ACM Hum Comput Interact</source>
          <year>2021</year>
          <month>04</month>
          <volume>5</volume>
          <issue>CSCW1</issue>
          <fpage>107</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/35295189"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3449181</pub-id>
          <pub-id pub-id-type="medline">35295189</pub-id>
          <pub-id pub-id-type="pii">107</pub-id>
          <pub-id pub-id-type="pmcid">PMC8920314</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Prieto Curiel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Cresci</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Muntean</surname>
              <given-names>CI</given-names>
            </name>
            <name name-style="western">
              <surname>Bishop</surname>
              <given-names>SR</given-names>
            </name>
          </person-group>
          <article-title>Crime and its fear in social media</article-title>
          <source>Palgrave Commun</source>
          <year>2020</year>
          <month>04</month>
          <day>02</day>
          <volume>6</volume>
          <issue>1</issue>
          <fpage>57</fpage>
          <pub-id pub-id-type="doi">10.1057/s41599-020-0430-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Maluleke</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Moyer</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>“We Have to Ask for Permission to Become”: Young Women’s Voices, Violence, and Mediated Space in South Africa</article-title>
          <source>Signs: Journal of Women in Culture and Society</source>
          <year>2020</year>
          <month>06</month>
          <volume>45</volume>
          <issue>4</issue>
          <fpage>871</fpage>
          <lpage>902</lpage>
          <pub-id pub-id-type="doi">10.1086/707799</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chowdhury</surname>
              <given-names>AG</given-names>
            </name>
            <name name-style="western">
              <surname>Sawhney</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Mathur</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Mahata</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Shah</surname>
              <given-names>RR</given-names>
            </name>
          </person-group>
          <article-title>Speak up, Fight Back! Detection of Social Media Disclosures of Sexual Harassment</article-title>
          <source>Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Student Research Workshop</source>
          <year>2019</year>
          <conf-name>2019 Conference of the North American Chapter of the Association for Computational Linguistics: Student Research Workshop</conf-name>
          <conf-date>June 2019</conf-date>
          <conf-loc>Minneapolis, MN</conf-loc>
          <pub-id pub-id-type="doi">10.18653/v1/n19-3018</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kachen</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Krishen</surname>
              <given-names>AS</given-names>
            </name>
            <name name-style="western">
              <surname>Petrescu</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gill</surname>
              <given-names>RD</given-names>
            </name>
            <name name-style="western">
              <surname>Peter</surname>
              <given-names>PC</given-names>
            </name>
          </person-group>
          <article-title>#MeToo, #MeThree, #MeFour: Twitter as community building across academic and corporate institutions</article-title>
          <source>Psychology &#38; Marketing</source>
          <year>2020</year>
          <month>12</month>
          <day>30</day>
          <volume>38</volume>
          <issue>3</issue>
          <fpage>455</fpage>
          <lpage>469</lpage>
          <pub-id pub-id-type="doi">10.1002/mar.21442</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Manikonda</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Beigi</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kambhampati</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Twitter for Sparking a Movement, Reddit for Sharing the Moment: #metoo through the Lens of Social Media</article-title>
          <source>arXiv</source>
          <year>2018</year>
          <access-date>2023-04-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/1803.08022">https://arxiv.org/abs/1803.08022</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rodriguez</surname>
              <given-names>MY</given-names>
            </name>
            <name name-style="western">
              <surname>Storer</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>A computational social science perspective on qualitative data exploration: Using topic models for the descriptive analysis of social media data</article-title>
          <source>Journal of Technology in Human Services</source>
          <year>2019</year>
          <month>06</month>
          <day>08</day>
          <volume>38</volume>
          <issue>1</issue>
          <fpage>54</fpage>
          <lpage>86</lpage>
          <pub-id pub-id-type="doi">10.1080/15228835.2019.1616350</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dragiewicz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Burgess</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Canadian Journal of Women and the Law</source>
          <year>2016</year>
          <month>04</month>
          <volume>28</volume>
          <issue>1</issue>
          <fpage>211</fpage>
          <lpage>229</lpage>
          <pub-id pub-id-type="doi">10.3138/cjwl.28.1.211</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Subramanian</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Weare</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>#notokay: Challenging sexual violence through digital health activism</article-title>
          <source>Critical Public Health</source>
          <year>2020</year>
          <month>06</month>
          <day>18</day>
          <volume>32</volume>
          <issue>2</issue>
          <fpage>263</fpage>
          <lpage>272</lpage>
          <pub-id pub-id-type="doi">10.1080/09581596.2020.1776218</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kuna</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Bai</surname>
              <given-names>MR</given-names>
            </name>
            <name name-style="western">
              <surname>Sreedevi</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Shantha</surname>
              <given-names>DG</given-names>
            </name>
          </person-group>
          <article-title>Me Too Movement Sentiment Analysis</article-title>
          <source>International Journal of Advanced Science and Technology</source>
          <year>2020</year>
          <volume>29</volume>
          <issue>7s</issue>
          <fpage>4351</fpage>
          <lpage>4355</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://sersc.org/journals/index.php/IJAST/article/view/22961"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Baik</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Nyein</surname>
              <given-names>TH</given-names>
            </name>
            <name name-style="western">
              <surname>Modrek</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Social Media Activism and Convergence in Tweet Topics After the Initial #MeToo Movement for Two Distinct Groups of Twitter Users</article-title>
          <source>J Interpers Violence</source>
          <year>2022</year>
          <month>08</month>
          <day>12</day>
          <volume>37</volume>
          <issue>15-16</issue>
          <fpage>NP13603</fpage>
          <lpage>NP13622</lpage>
          <pub-id pub-id-type="doi">10.1177/08862605211001481</pub-id>
          <pub-id pub-id-type="medline">33840303</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Trott</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Networked feminism: counterpublics and the intersectional issues of #MeToo</article-title>
          <source>Feminist Media Studies</source>
          <year>2020</year>
          <month>04</month>
          <day>18</day>
          <volume>21</volume>
          <issue>7</issue>
          <fpage>1125</fpage>
          <lpage>1142</lpage>
          <pub-id pub-id-type="doi">10.1080/14680777.2020.1718176</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Baer</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Muted Groups and Public Discourse: The Web of Sexual Violence and Social Media</article-title>
          <source>ProQuest</source>
          <year>2017</year>
          <access-date>2023-04-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.proquest.com/openview/7f708959b3c1f7c749296a2631262f36/1.pdf?pq-origsite=gscholar&#38;cbl=18750">https://www.proquest.com/openview/7f708959b3c1f7c749296a2631262f36/1.pdf?pq-origsite=gscholar&#38;cbl=18750</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>ElSherief</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Belding</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Nguyen</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>#NotOkay: Understanding Gender-Based Violence in Social Media</article-title>
          <source>ICWSM</source>
          <year>2017</year>
          <month>05</month>
          <day>03</day>
          <volume>11</volume>
          <issue>1</issue>
          <fpage>52</fpage>
          <lpage>61</lpage>
          <pub-id pub-id-type="doi">10.1609/icwsm.v11i1.14877</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mendes</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Keller</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ringrose</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Digitized narratives of sexual violence: Making sexual violence felt and known through digital disclosures</article-title>
          <source>New Media &#38; Society</source>
          <year>2018</year>
          <month>12</month>
          <day>29</day>
          <volume>21</volume>
          <issue>6</issue>
          <fpage>1290</fpage>
          <lpage>1310</lpage>
          <pub-id pub-id-type="doi">10.1177/1461444818820069</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Maas</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>McCauley</surname>
              <given-names>HL</given-names>
            </name>
            <name name-style="western">
              <surname>Bonomi</surname>
              <given-names>AE</given-names>
            </name>
            <name name-style="western">
              <surname>Leija</surname>
              <given-names>SG</given-names>
            </name>
          </person-group>
          <article-title>"I Was Grabbed by My Pussy and Its #NotOkay": A Twitter Backlash Against Donald Trump's Degrading Commentary</article-title>
          <source>Violence Against Women</source>
          <year>2018</year>
          <month>11</month>
          <day>01</day>
          <volume>24</volume>
          <issue>14</issue>
          <fpage>1739</fpage>
          <lpage>1750</lpage>
          <pub-id pub-id-type="doi">10.1177/1077801217743340</pub-id>
          <pub-id pub-id-type="medline">30295180</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McCauley</surname>
              <given-names>HL</given-names>
            </name>
            <name name-style="western">
              <surname>Bonomi</surname>
              <given-names>AE</given-names>
            </name>
            <name name-style="western">
              <surname>Maas</surname>
              <given-names>MK</given-names>
            </name>
            <name name-style="western">
              <surname>Bogen</surname>
              <given-names>KW</given-names>
            </name>
            <name name-style="western">
              <surname>O'Malley</surname>
              <given-names>TL</given-names>
            </name>
          </person-group>
          <article-title>#MaybeHeDoesntHitYou: Social Media Underscore the Realities of Intimate Partner Violence</article-title>
          <source>J Womens Health (Larchmt)</source>
          <year>2018</year>
          <month>07</month>
          <volume>27</volume>
          <issue>7</issue>
          <fpage>885</fpage>
          <lpage>891</lpage>
          <pub-id pub-id-type="doi">10.1089/jwh.2017.6560</pub-id>
          <pub-id pub-id-type="medline">29565754</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Modrek</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Chakalov</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>The #MeToo Movement in the United States: Text Analysis of Early Twitter Conversations</article-title>
          <source>J Med Internet Res</source>
          <year>2019</year>
          <month>09</month>
          <day>03</day>
          <volume>21</volume>
          <issue>9</issue>
          <fpage>e13837</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2019/9/e13837/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/13837</pub-id>
          <pub-id pub-id-type="medline">31482849</pub-id>
          <pub-id pub-id-type="pii">v21i9e13837</pub-id>
          <pub-id pub-id-type="pmcid">PMC6751092</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dragotto</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Giomi</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Melchiorre</surname>
              <given-names>SM</given-names>
            </name>
          </person-group>
          <article-title>Putting women back in their place. Reflections on slut-shaming, the case Asia Argento and Twitter in Italy</article-title>
          <source>International Review of Sociology</source>
          <year>2020</year>
          <month>02</month>
          <day>26</day>
          <volume>30</volume>
          <issue>1</issue>
          <fpage>46</fpage>
          <lpage>70</lpage>
          <pub-id pub-id-type="doi">10.1080/03906701.2020.1724366</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahmed</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Jaidka</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Cho</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Tweeting India’s Nirbhaya protest: a study of emotional dynamics in an online social movement</article-title>
          <source>Social Movement Studies</source>
          <year>2016</year>
          <month>06</month>
          <day>13</day>
          <volume>16</volume>
          <issue>4</issue>
          <fpage>447</fpage>
          <lpage>465</lpage>
          <pub-id pub-id-type="doi">10.1080/14742837.2016.1192457</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hardaker</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>McGlashan</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>“Real men don’t hate women”: Twitter rape threats and group identity</article-title>
          <source>Journal of Pragmatics</source>
          <year>2016</year>
          <month>01</month>
          <volume>91</volume>
          <fpage>80</fpage>
          <lpage>93</lpage>
          <pub-id pub-id-type="doi">10.1016/j.pragma.2015.11.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Usher</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Durkin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Vanderslott</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Vindrola-Padros</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Usher</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Jackson</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Public Sentiment and Discourse on Domestic Violence During the COVID-19 Pandemic in Australia: Analysis of Social Media Posts</article-title>
          <source>J Med Internet Res</source>
          <year>2021</year>
          <month>10</month>
          <day>01</day>
          <volume>23</volume>
          <issue>10</issue>
          <fpage>e29025</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2021/10/e29025/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/29025</pub-id>
          <pub-id pub-id-type="medline">34519659</pub-id>
          <pub-id pub-id-type="pii">v23i10e29025</pub-id>
          <pub-id pub-id-type="pmcid">PMC8489563</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gurman</surname>
              <given-names>TA</given-names>
            </name>
            <name name-style="western">
              <surname>Nichols</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Greenberg</surname>
              <given-names>ES</given-names>
            </name>
          </person-group>
          <article-title>Potential for social media to challenge gender-based violence in India: a quantitative analysis of Twitter use</article-title>
          <source>Gender &#38; Development</source>
          <year>2018</year>
          <month>07</month>
          <day>04</day>
          <volume>26</volume>
          <issue>2</issue>
          <fpage>325</fpage>
          <lpage>339</lpage>
          <pub-id pub-id-type="doi">10.1080/13552074.2018.1473230</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moeke-Pickering</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Cote-Meek</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Pegoraro</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Understanding the ways missing and murdered Indigenous women are framed and handled by social media users</article-title>
          <source>Media International Australia</source>
          <year>2018</year>
          <month>10</month>
          <day>12</day>
          <volume>169</volume>
          <issue>1</issue>
          <fpage>54</fpage>
          <lpage>64</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1177/1329878X18803730"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/1329878x18803730</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aurrekoetxea-Casaus</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>San fermines #la manada case: An exploratory analysis of social support for victims of sexual violence on Twitter</article-title>
          <source>Computers in Human Behavior</source>
          <year>2020</year>
          <month>07</month>
          <volume>108</volume>
          <fpage>106299</fpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2020.106299</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nutbeam</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Mereish</surname>
              <given-names>EH</given-names>
            </name>
          </person-group>
          <article-title>Negative Attitudes and Beliefs Toward the #MeToo Movement on Twitter</article-title>
          <source>J Interpers Violence</source>
          <year>2022</year>
          <month>08</month>
          <day>23</day>
          <volume>37</volume>
          <issue>15-16</issue>
          <fpage>NP13018</fpage>
          <lpage>NP13044</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/33752498"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/08862605211001470</pub-id>
          <pub-id pub-id-type="medline">33752498</pub-id>
          <pub-id pub-id-type="pmcid">PMC9802676</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sinnenberg</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Buttenheim</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Padrez</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Mancheno</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ungar</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Merchant</surname>
              <given-names>RM</given-names>
            </name>
          </person-group>
          <article-title>Twitter as a Tool for Health Research: A Systematic Review</article-title>
          <source>Am J Public Health</source>
          <year>2017</year>
          <month>01</month>
          <volume>107</volume>
          <issue>1</issue>
          <fpage>e1</fpage>
          <lpage>e8</lpage>
          <pub-id pub-id-type="doi">10.2105/ajph.2016.303512</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stevens</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Acic</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>LD</given-names>
            </name>
          </person-group>
          <article-title>Uncivil Reactions to Sexual Assault Online: Linguistic Features of News Reports Predict Discourse Incivility</article-title>
          <source>Cyberpsychol Behav Soc Netw</source>
          <year>2021</year>
          <month>12</month>
          <day>01</day>
          <volume>24</volume>
          <issue>12</issue>
          <fpage>815</fpage>
          <lpage>821</lpage>
          <pub-id pub-id-type="doi">10.1089/cyber.2021.0075</pub-id>
          <pub-id pub-id-type="medline">34515520</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Aggarwal</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Analysis of Women Safety in Indian Cities Using Machine Learning on Tweets</article-title>
          <year>2019</year>
          <conf-name>2019 Amity International Conference on Artificial Intelligence (AICAI)</conf-name>
          <conf-date>February 4-6, 2019</conf-date>
          <conf-loc>Dubai, United Arab Emirates</conf-loc>
          <pub-id pub-id-type="doi">10.1109/aicai.2019.8701247</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sim</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>ER</given-names>
            </name>
            <name name-style="western">
              <surname>Ong</surname>
              <given-names>YX</given-names>
            </name>
            <name name-style="western">
              <surname>Yeo</surname>
              <given-names>JY</given-names>
            </name>
            <name name-style="western">
              <surname>Yan</surname>
              <given-names>CBS</given-names>
            </name>
            <name name-style="western">
              <surname>Choy</surname>
              <given-names>EWJ</given-names>
            </name>
            <name name-style="western">
              <surname>Shim</surname>
              <given-names>KJ</given-names>
            </name>
          </person-group>
          <article-title>Digital Social Listening on Conversations About Sexual Harassment</article-title>
          <year>2020</year>
          <conf-name>2020 IEEE International Conference on Big Data (Big Data)</conf-name>
          <conf-date>December 10-13, 2020</conf-date>
          <conf-loc>Atlanta, GA, USA</conf-loc>
          <pub-id pub-id-type="doi">10.1109/bigdata50022.2020.9377944</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="web">
          <article-title>Twitter Developer API</article-title>
          <source>Twitter</source>
          <access-date>2023-05-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://developer.twitter.com/en/products/twitter-api">https://developer.twitter.com/en/products/twitter-api</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hawkins</surname>
              <given-names>LG</given-names>
            </name>
            <name name-style="western">
              <surname>Mullet</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Brown</surname>
              <given-names>CC</given-names>
            </name>
            <name name-style="western">
              <surname>Eggleston</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Gardenhire</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>All Survivors Have the Right to Heal: A #Metoomen Content Analysis</article-title>
          <source>Journal of Feminist Family Therapy</source>
          <year>2019</year>
          <month>06</month>
          <day>25</day>
          <volume>31</volume>
          <issue>2-3</issue>
          <fpage>78</fpage>
          <lpage>99</lpage>
          <pub-id pub-id-type="doi">10.1080/08952833.2019.1633840</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eysenbach</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Infodemiology and infoveillance: framework for an emerging set of public health informatics methods to analyze search, communication and publication behavior on the Internet</article-title>
          <source>J Med Internet Res</source>
          <year>2009</year>
          <month>03</month>
          <day>27</day>
          <volume>11</volume>
          <issue>1</issue>
          <fpage>e11</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2009/1/e11/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.1157</pub-id>
          <pub-id pub-id-type="medline">19329408</pub-id>
          <pub-id pub-id-type="pii">v11i1e11</pub-id>
          <pub-id pub-id-type="pmcid">PMC2762766</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lowenstein-Barkai</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>#Me(n)Too? Online Social Support Toward Male and Female Survivors of Sexual Victimization</article-title>
          <source>J Interpers Violence</source>
          <year>2021</year>
          <month>12</month>
          <day>05</day>
          <volume>36</volume>
          <issue>23-24</issue>
          <fpage>NP13541</fpage>
          <lpage>NP13563</lpage>
          <pub-id pub-id-type="doi">10.1177/0886260520905095</pub-id>
          <pub-id pub-id-type="medline">32133903</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ayers</surname>
              <given-names>JW</given-names>
            </name>
            <name name-style="western">
              <surname>Caputi</surname>
              <given-names>TL</given-names>
            </name>
            <name name-style="western">
              <surname>Nebeker</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Dredze</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Don't quote me: reverse identification of research participants in social media studies</article-title>
          <source>NPJ Digit Med</source>
          <year>2018</year>
          <month>08</month>
          <day>02</day>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>30</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1038/s41746-018-0036-2"/>
          </comment>
          <pub-id pub-id-type="doi">10.1038/s41746-018-0036-2</pub-id>
          <pub-id pub-id-type="medline">31304312</pub-id>
          <pub-id pub-id-type="pii">36</pub-id>
          <pub-id pub-id-type="pmcid">PMC6550214</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Preoţiuc-Pietro</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Volkova</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lampos</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Bachrach</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Aletras</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Studying User Income through Language, Behaviour and Affect in Social Media</article-title>
          <source>PLoS One</source>
          <year>2015</year>
          <month>9</month>
          <day>22</day>
          <volume>10</volume>
          <issue>9</issue>
          <fpage>e0138717</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0138717"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0138717</pub-id>
          <pub-id pub-id-type="medline">26394145</pub-id>
          <pub-id pub-id-type="pii">PONE-D-15-14201</pub-id>
          <pub-id pub-id-type="pmcid">PMC4578862</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mislove</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lehmann</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ahn</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Onnela</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rosenquist</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Understanding the Demographics of Twitter Users</article-title>
          <source>ICWSM</source>
          <year>2021</year>
          <month>08</month>
          <day>03</day>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>554</fpage>
          <lpage>557</lpage>
          <pub-id pub-id-type="doi">10.1609/icwsm.v5i1.14168</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nguyen</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Gravel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Trieschnigg</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Meder</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>"How Old Do You Think I Am?" A Study of Language and Age in Twitter</article-title>
          <source>ICWSM</source>
          <year>2021</year>
          <month>08</month>
          <day>03</day>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>439</fpage>
          <lpage>448</lpage>
          <pub-id pub-id-type="doi">10.1609/icwsm.v7i1.14381</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Culotta</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kumar</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Cutler</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Predicting the Demographics of Twitter Users from Website Traffic Data</article-title>
          <source>AAAI</source>
          <year>2015</year>
          <month>02</month>
          <day>09</day>
          <volume>29</volume>
          <issue>1</issue>
          <fpage>9204</fpage>
          <pub-id pub-id-type="doi">10.1609/aaai.v29i1.9204</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Turki</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Izaguirre</surname>
              <given-names>CR</given-names>
            </name>
            <name name-style="western">
              <surname>DeMahy</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Thibodeaux</surname>
              <given-names>BL</given-names>
            </name>
            <name name-style="western">
              <surname>Gage</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Twitter as a tool for social movement: An analysis of feminist activism on social media communities</article-title>
          <source>J Community Psychol</source>
          <year>2021</year>
          <month>04</month>
          <day>07</day>
          <volume>49</volume>
          <issue>3</issue>
          <fpage>854</fpage>
          <lpage>868</lpage>
          <pub-id pub-id-type="doi">10.1002/jcop.22324</pub-id>
          <pub-id pub-id-type="medline">32032443</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Drewett</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Oxlad</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Augoustinos</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Breaking the silence on sexual harassment and assault: An analysis of #MeToo tweets</article-title>
          <source>Computers in Human Behavior</source>
          <year>2021</year>
          <month>10</month>
          <volume>123</volume>
          <fpage>106896</fpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2021.106896</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guidry</surname>
              <given-names>JPD</given-names>
            </name>
            <name name-style="western">
              <surname>Sawyer</surname>
              <given-names>AN</given-names>
            </name>
            <name name-style="western">
              <surname>Carlyle</surname>
              <given-names>KE</given-names>
            </name>
            <name name-style="western">
              <surname>Burton</surname>
              <given-names>CW</given-names>
            </name>
          </person-group>
          <article-title>#WhyIDidntReport: Women Speak Out About Sexual Assault on Twitter</article-title>
          <source>J Forensic Nurs</source>
          <year>2021</year>
          <volume>17</volume>
          <issue>3</issue>
          <fpage>129</fpage>
          <lpage>139</lpage>
          <pub-id pub-id-type="doi">10.1097/JFN.0000000000000335</pub-id>
          <pub-id pub-id-type="medline">34325434</pub-id>
          <pub-id pub-id-type="pii">01263942-900000000-99855</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Woo</surname>
              <given-names>CW</given-names>
            </name>
            <name name-style="western">
              <surname>Brigham</surname>
              <given-names>MP</given-names>
            </name>
            <name name-style="western">
              <surname>Gulotta</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Twitter Talk and Twitter Sharing in Times of Crisis: Exploring Rhetorical Motive and Agenda-Setting in the Ray Rice Scandal</article-title>
          <source>Communication Studies</source>
          <year>2019</year>
          <month>09</month>
          <day>17</day>
          <volume>71</volume>
          <issue>1</issue>
          <fpage>40</fpage>
          <lpage>58</lpage>
          <pub-id pub-id-type="doi">10.1080/10510974.2019.1661866</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Perrin</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Anderson</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Share of U.S. adults using social media, including Facebook, is mostly unchanged since 2018</article-title>
          <source>Pew Research Center</source>
          <year>2019</year>
          <access-date>2023-04-24</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pewresearch.org/fact-tank/2019/04/10/share-of-u-s-adults-using-social-media-including-facebook-is-mostly-unchanged-since-2018/">https://www.pewresearch.org/fact-tank/2019/04/10/share-of-u-s-adults-using-social-media-including-facebook-is-mostly-unchanged-since-2018/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
