<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="review-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v28i1e90068</article-id>
      <article-id pub-id-type="pmid">41980708</article-id>
      <article-id pub-id-type="doi">10.2196/90068</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Measuring Technology-Facilitated Sexual Violence and Abuse: Scoping Review of Existing Measures</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Brini</surname>
            <given-names>Stefano</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Graham</surname>
            <given-names>Laurie</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Chan</surname>
            <given-names>Kin-Sun</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>Pak</surname>
            <given-names>Sharon Hoi Lam</given-names>
          </name>
          <degrees>MPhil</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2751-7459</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Zhang</surname>
            <given-names>Linruo</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-0882-6424</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Wu</surname>
            <given-names>Chanchan</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5145-5484</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Chau</surname>
            <given-names>Pui Hing</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-0287-8020</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Bradbury-Jones</surname>
            <given-names>Caroline</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5237-6777</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Choi</surname>
            <given-names>Edmond Pui Hang</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>School of Nursing</institution>
            <institution>Li Ka Shing Faculty of Medicine</institution>
            <institution>The University of Hong Kong</institution>
            <addr-line>5/F, HKUMed Academic Building, 3 Sassoon Road, Pokfulam</addr-line>
            <addr-line>Hong Kong, 0000</addr-line>
            <country>China (Hong Kong)</country>
            <phone>852 3917 6972</phone>
            <email>h0714919@connect.hku.hk</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9062-3540</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>School of Nursing</institution>
        <institution>Li Ka Shing Faculty of Medicine</institution>
        <institution>The University of Hong Kong</institution>
        <addr-line>Hong Kong</addr-line>
        <country>China (Hong Kong)</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>School of Nursing</institution>
        <institution>Faculty of Health and Social Science</institution>
        <institution>The Hong Kong Polytechnic University</institution>
        <addr-line>Hong Kong</addr-line>
        <country>China (Hong Kong)</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Department of Nursing and Midwifery</institution>
        <institution>University of Birmingham</institution>
        <addr-line>Birmingham</addr-line>
        <country>United Kingdom</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Edmond Pui Hang Choi <email>h0714919@connect.hku.hk</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2026</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>14</day>
        <month>4</month>
        <year>2026</year>
      </pub-date>
      <volume>28</volume>
      <elocation-id>e90068</elocation-id>
      <history>
        <date date-type="received">
          <day>21</day>
          <month>12</month>
          <year>2025</year>
        </date>
        <date date-type="rev-request">
          <day>11</day>
          <month>1</month>
          <year>2026</year>
        </date>
        <date date-type="rev-recd">
          <day>2</day>
          <month>3</month>
          <year>2026</year>
        </date>
        <date date-type="accepted">
          <day>19</day>
          <month>3</month>
          <year>2026</year>
        </date>
      </history>
      <copyright-statement>©Sharon Hoi Lam Pak, Linruo Zhang, Chanchan Wu, Pui Hing Chau, Caroline Bradbury-Jones, Edmond Pui Hang Choi. Originally published in the Journal of Medical Internet Research (https://www.jmir.org), 14.04.2026.</copyright-statement>
      <copyright-year>2026</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on https://www.jmir.org/, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://www.jmir.org/2026/1/e90068" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Technology-facilitated sexual violence and abuse (TFSVA) encompasses sexual harms perpetrated through digital means. Rapid developments in this field pose challenges in precisely defining and measuring TFSVA. Consequently, existing measures may fail to capture its multifaceted nature.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This scoping review aimed to map and appraise current knowledge on measures used to assess TFSVA, specifically to identify and summarize existing measures of TFSVA and its associated constructs, including victimization, perpetration, related attitudes, motivations, and impacts.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>Following the Joanna Briggs Institute framework, we searched 10 English and Chinese databases (PubMed, Embase, CINAHL, Scopus, ProQuest, Web of Science, Chinese National Knowledge Infrastructure, SinoMed, Index to Taiwan Periodical Literature, and Ariti Library) from inception to January 13, 2026. We included peer-reviewed empirical studies focused on developing, adapting, or validating any TFSVA measures across populations and settings. Two independent reviewers screened records and extracted data. Data were analyzed using structural topic modeling (STM) and thematic analysis. Risk-of-bias assessment was not conducted, in accordance with scoping review methodology.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Among the 319 included studies, 218 distinct measures were identified. The analysis revealed a fragmented and conceptually narrow measurement landscape. Most measures focused on specific subdomains, primarily nonconsensual sexting (130/218, 59.6%), with less attention to image-based sexual abuse (30/218, 13.8%), online sexual harassment (27/218, 12.4%), online grooming (13/218, 6.0%), and cyber sexual dating abuse (8/218, 3.7%). Nearly half (108/218, 49.5%) assessed both victimization and perpetration, while 96 out of 218 (44.0%) focused solely on victimization, 12 out of 218 (5.5%) on perpetration, 1 out of 218 (0.5%) on the bystander perspective, and the remaining 1 out of 218 (0.5%) addressed all aspects. The vast majority (199/218, 91.3%) measured behaviors, whereas attitudes, motivations, and impacts were rarely assessed. STM identified 9 key topics, synthesized into 3 core dimensions: consent violation and coercive control; status degradation and demeaning harassment; and contextual and relational framing. Thematic analysis highlighted 5 themes: TFSVA acts, attitudes and beliefs, motivational factors, tactical and contextual dynamics, and survivor impact. Integrating these findings reveals a fundamental conceptual misalignment between existing measures and the full scope of TFSVA.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>This first comprehensive synthesis of existing TFSVA measures innovatively integrates STM and thematic analysis. While the absence of a risk-of-bias assessment precludes definitive conclusions regarding measurement robustness, this review moves beyond a descriptive catalog to identify substantive gaps within TFSVA-specific measures, most notably the omission of artificial intelligence–facilitated tactics, intersectional vulnerabilities, and institutional factors. These findings provide an empirical basis for developing robust, culturally sensitive measures essential for targeted research, effective policy, and responsive social support services in a rapidly evolving digital landscape.</p>
        </sec>
        <sec sec-type="trial registration">
          <title>Trial Registration</title>
          <p>Open Science Framework 10.17605/OSF.IO/Q5ETW; https://doi.org/10.17605/OSF.IO/Q5ETW</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>image-based sexual abuse</kwd>
        <kwd>online sexual violence</kwd>
        <kwd>measures</kwd>
        <kwd>scoping review</kwd>
        <kwd>structural topic modeling</kwd>
        <kwd>technology-facilitated sexual violence</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Rationale</title>
        <p>Technology-facilitated sexual violence and abuse (TFSVA) is a pervasive and urgent societal challenge, representing a convergence of digital innovation and sexual violence. Defined as any sexual violence and abuse perpetrated or amplified through digital technologies—from smartphones and social media platforms to artificial intelligence (AI)–driven applications and GPS tracking—TFSVA encompasses a spectrum of harms, including image-based sexual abuse (IBSA), cyberstalking, and targeted online sexual harassment [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. Specific manifestations range from the nonconsensual sharing of intimate content to the doxing of sensitive personal information, such as sexual orientation or sexually transmitted infection status [<xref ref-type="bibr" rid="ref3">3</xref>]. This review uses TFSVA as the overarching term for these technology-mediated sexual harms [<xref ref-type="bibr" rid="ref3">3</xref>].</p>
        <p>The rapid proliferation of digital technologies has precipitated a rise in TFSVA worldwide, with studies indicating that 16.6%-20% of adults in the United Kingdom and Australia have reported online sexual harassment in their lifetime, disproportionately affecting women and youth [<xref ref-type="bibr" rid="ref4">4</xref>-<xref ref-type="bibr" rid="ref6">6</xref>]. A meta-analysis and systematic review of 25 studies found that 8.8% of individuals have experienced nonconsensual sharing of sexual images or sexually explicit messages (sexting), with many facing threats or unauthorized image capture [<xref ref-type="bibr" rid="ref7">7</xref>]. TFSVA produces severe consequences, including anxiety, depression, posttraumatic stress disorder, and increased suicidal risk, often stemming from profound privacy violations, stigma, and blaming the individual [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref8">8</xref>]. The pervasive and enduring nature of these digital harms underscores the urgent need for effective identification methods and comprehensive intervention strategies.</p>
        <p>A robust and comprehensive measure of TFSVA is critical for understanding its prevalence, dynamics, and impact, as well as for informing prevention, intervention, and policy. However, the landscape of TFSVA is complex and rapidly evolving [<xref ref-type="bibr" rid="ref6">6</xref>]. This poses a significant challenge in defining and categorizing TFSVA, and existing measures often struggle to capture its multifaceted and context-specific nature [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>]. One of the primary difficulties in addressing this issue lies in the absence of a universally agreed-upon terminology or definition to describe the myriad ways in which technology is used to perpetrate acts of sexual abuse [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>]. The absence of shared definitions can lead to underrecognition and underreporting of TFSVA [<xref ref-type="bibr" rid="ref9">9</xref>], impeding accurate estimation of prevalence and effects [<xref ref-type="bibr" rid="ref10">10</xref>]. Additionally, the lack of standardized definitions and measures can complicate cross-study comparisons and the aggregation of data [<xref ref-type="bibr" rid="ref11">11</xref>]. Therefore, it is important to continue gathering data on whether this field of research is reaching a consensus on developing a uniform and comprehensive measure.</p>
        <p>To the best of our knowledge, no prior review has systematically mapped existing TFSVA measures. One explanation for this absence is that conducting a systematic review on this topic is challenging due to the lack of precise definitions and standardized research variables in the current evidence literature. This has led to a wide array of measures being used to assess different forms and outcomes of TFSVA. Given these challenges, a scoping review is the most suitable approach for examining emerging evidence before conducting a systematic review [<xref ref-type="bibr" rid="ref12">12</xref>]. A scoping review is particularly useful for mapping existing knowledge on a topic based on the available literature, thereby providing an overview of the current state of research and identifying gaps in the evidence [<xref ref-type="bibr" rid="ref13">13</xref>]. It is a transparent and increasingly recognized methodology that can address a broad range of research questions and identify evidence gaps [<xref ref-type="bibr" rid="ref13">13</xref>]. Although the concept of TFSVA is not yet well defined, to allow for a comprehensive exploration of the topic, TFSVA in this review refers to any form of sexual violence, exploitation, or harassment through the misuse of digital technologies [<xref ref-type="bibr" rid="ref3">3</xref>].</p>
      </sec>
      <sec>
        <title>Objectives</title>
        <p>This scoping review aimed to map and appraise current knowledge on measures used to assess TFSVA. The primary question guiding the review was “What measures are currently available to assess TFSVA?” Subquestions addressed measurement domains, psychometric properties, target populations, and contextual applications to ensure comprehensive coverage of the field. The objectives were to (1) identify and summarize existing measures for TFSVA and its associated constructs, including experiencing harm, perpetration, related attitudes, motivations, and impacts; (2) clarify key concepts and definitions of TFSVA in the literature; (3) evaluate the applicability and validity of these measures across different populations and settings; and (4) identify content coverage and gaps in current measurement approaches.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Protocol and Registration</title>
        <p>The scoping review was conducted according to the 5 standard stages of scoping review methodology outlined in the a priori protocol [<xref ref-type="bibr" rid="ref14">14</xref>], which was registered with the Open Science Framework [<xref ref-type="bibr" rid="ref15">15</xref>] on March 13, 2024. The review adhered to Joanna Briggs Institute guidance and the PRISMA-ScR (Preferred Reporting Items for Systematic Reviews and Meta-Analyses Extension for Scoping Reviews) reporting standards [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref16">16</xref>]. Deviations from the published protocol were explicitly noted in the relevant sections below.</p>
      </sec>
      <sec>
        <title>Eligibility Criteria</title>
        <p>The screening of studies was guided by the Population-Concept-Context (PCC) framework [<xref ref-type="bibr" rid="ref17">17</xref>]. The core inclusion criteria were as follows: (1) any population, including survivors, perpetrators, and bystanders, without restriction on sexual orientation, gender, age, or ethnicity; (2) empirical studies focused on the development, cultural adaptation, or validation of a measure for TFSVA; and (3) any geographical, cultural, or online setting. All peer-reviewed journal articles in English or Chinese that reported quantitative, qualitative, or mixed methods empirical data were included. Studies that described technology misuse without a sexual or intimate focus were excluded. For this review, a “measure” was defined as any instrument, tool, or technique used to assess, quantify, or characterize TFSVA or its associated constructs. This included multiitem scales, single-item questions, qualitative questions, and adapted or modified versions of existing measures. No minimum number of items was required for inclusion. Both validated and author-developed measures used in empirical studies were eligible.</p>
      </sec>
      <sec>
        <title>Information Sources</title>
        <p>The literature search and its reporting followed the PRISMA-S (extension to the PRISMA Statement for Reporting Literature Searches in Systematic Reviews) guidelines [<xref ref-type="bibr" rid="ref18">18</xref>]. A systematic search was conducted across 10 databases from database inception to January 13, 2026, including 6 English-language electronic databases (PubMed, Embase, CINAHL, Scopus, ProQuest, and Web of Science) and 4 Chinese databases (Chinese National Knowledge Infrastructure, SinoMed, Index to Taiwan Periodical Literature, and Airiti Library). Study registries were not searched, as the inclusion criteria focused exclusively on published peer-reviewed studies. Registries primarily contain protocols, preprints, and trial records, which were not eligible for inclusion. Online resources and browsing were not conducted, as database searching comprehensively covered the published literature and was supplemented by citation searching of included studies. No other search methods were used beyond the database and citation searches described.</p>
      </sec>
      <sec>
        <title>Search</title>
        <p>The search strategy combined keywords and controlled vocabulary terms, such as Medical Subject Headings, for the key concepts of the PCC framework. Search filters were not applied to maintain search sensitivity. The search strategy relied on controlled vocabulary and keywords only.</p>
        <p>Searches were limited to English- and Chinese-language peer-reviewed empirical studies. To ensure the review reflects the most current literature, the search was executed in 2 phases. The original search, detailed in the published protocol [<xref ref-type="bibr" rid="ref14">14</xref>], covered records from database inception to December 31, 2024. An updated search was conducted using an identical strategy to capture records published from January 1, 2025, to January 13, 2026. As this was not an update of a prior review, search updates were not applicable. The full electronic search strategy for all databases is provided in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>. To identify additional relevant papers, the reference lists of included studies were hand-searched. We did not contact individual researchers, experts, or organizations for unpublished measures or gray literature, as this scoping review aimed to map the publicly available published literature rather than solicit unpublished measures.</p>
      </sec>
      <sec>
        <title>Selection of Sources of Evidence</title>
        <p>Following the search, all records were collated and managed using EndNote 20 (Clarivate Plc). No other systematic review software was used for screening or data extraction. After automatic duplicate removal using EndNote, a manual check was performed. Two reviewers independently screened titles, abstracts, and full texts against the inclusion criteria. Any disagreements were resolved through consensus or consultation with a third researcher. Studies excluded at the full-text review stage were documented with specific reasons, aligned with the PCC framework.</p>
      </sec>
      <sec>
        <title>Data Items and Data Charting Process</title>
        <p>Data were extracted using a comprehensive data charting form detailed in the published protocol [<xref ref-type="bibr" rid="ref14">14</xref>]. The form captured variables across several domains aligned with the PCC framework: (1) study identification and design; (2) population characteristics (eg, age group, sexual orientation, role as survivor, perpetrator, or bystander); (3) geographical setting; (4) the specific type and definition of TFSVA measured; (5) details of the measure used, including its name, language, and reported psychometric properties; and (6) key outcomes related to TFSVA.</p>
        <p>The extraction process began with a pilot phase, during which 2 reviewers independently extracted data from 5 studies to establish consensus and refine the form. The remaining data were extracted by 1 reviewer and confirmed by a second reviewer. Discrepancies were resolved through discussion, and a third reviewer was consulted when necessary.</p>
      </sec>
      <sec>
        <title>Synthesis of Results</title>
        <sec>
          <title>Overview</title>
          <p>Our analysis followed a mixed methods design to integrate quantitative and qualitative insights. This was implemented through a 2-stage process: (1) a descriptive synthesis guided by the PAGER (Patterns, Advances, Gaps, Evidence for practice, and Research Recommendations) Framework to generate higher-level insights [<xref ref-type="bibr" rid="ref19">19</xref>]; and (2) a content analysis using both structural topic modeling (STM) [<xref ref-type="bibr" rid="ref20">20</xref>] and reflexive thematic analysis.</p>
        </sec>
        <sec>
          <title>Descriptive Synthesis Using the PAGER Framework</title>
          <p>The PAGER Framework provided a structured approach to synthesize and report findings [<xref ref-type="bibr" rid="ref19">19</xref>]. We applied this framework to systematically categorize the descriptive characteristics of the included studies and their measures across 5 dimensions:</p>
          <list list-type="bullet">
            <list-item>
              <p>Patterns: identifying dominant trends in the literature.</p>
            </list-item>
            <list-item>
              <p>Advances: highlighting methodological and conceptual progress.</p>
            </list-item>
            <list-item>
              <p>Gaps: recording underrepresented populations, contexts, or TFSVA domains.</p>
            </list-item>
            <list-item>
              <p>Evidence for practice: distilling findings applicable to current research and policy.</p>
            </list-item>
            <list-item>
              <p>Research recommendations: formulating priorities for future measure development.</p>
            </list-item>
          </list>
        </sec>
        <sec>
          <title>Analysis of Measure Content</title>
          <p>To analyze the substantive content of the measures, STM and reflexive thematic analysis were conducted on the same set of questionnaire items. This approach aligns with the methodological principle that qualitative and computational text analyses are complementary and analogous processes for identifying patterns in textual data [<xref ref-type="bibr" rid="ref21">21</xref>]. STM provided a quantitative and reproducible overview of latent conceptual patterns across the full dataset, while reflexive thematic analysis offered qualitative depth, capturing detailed meaning, contextual nuances, and specific question types that purely frequency-based analysis might overlook.</p>
          <p>STM is a text-mining technique that identifies latent topics within a text corpus. Each questionnaire item was treated as a separate document. Text preprocessing included lowercasing, removal of punctuation and digits, whitespace normalization, lemmatization, synonym mapping (eg, “photos or images or pics” → picture), and stop-word removal. We fitted STM models with the number of topics (K) ranging from 3 to 10, evaluating model fit using held-out likelihood, residuals, lower bound, semantic coherence, and exclusivity. After identifying K=7, 9, and 10 as offering the best balance of fit, we estimated unsupervised STMs (without covariates) and selected K=9 for final reporting based on balanced fit and conceptual interpretability. All analyses were conducted in R (R Foundation) using the stm (modeling and diagnostics), ggplot2 (visualization), and textstem (lemmatization) packages. This analysis yielded a quantitative map of the dominant conceptual patterns across all measurement items. Interpretive synthesis was performed to translate statistical topics into higher-order conceptual dimensions.</p>
          <p>Reflexive thematic analysis was conducted following the 6-phase approach by Clarke and Braun [<xref ref-type="bibr" rid="ref22">22</xref>]: (1) familiarization with the measurement items; (2) initial code generation; (3) theme search; (4) theme review; (5) theme definition and naming; and (6) report production. Analytical memos documented interpretive decisions and theoretical insights throughout, ensuring thematic robustness and grounding in the data. This independent analysis provided rich, detailed descriptions of question types, contextual nuances, and underlying constructs, complementing and contextualizing the broader statistical patterns identified by STM.</p>
          <p>The findings from these 2 analyses were integrated to identify gaps and misalignment within the TFSVA measurement field. Consistent with scoping review methodology, risk-of-bias assessment was omitted [<xref ref-type="bibr" rid="ref16">16</xref>], although only peer-reviewed articles were included to maintain quality standards.</p>
        </sec>
      </sec>
      <sec>
        <title>Ethics Considerations</title>
        <p>This scoping review involved a secondary analysis of previously published, publicly available literature. All included studies reported obtaining ethical approval from their respective institutional review boards or equivalent bodies, as documented in the original publications. No additional ethical approval was required for this review, as it did not involve primary data collection from human participants.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Overview of Included Studies and TFSVA Measures</title>
        <p>The database searches yielded a total of 17,640 studies. After removing 4046 duplicates, 13,594 references remained for further screening. Specifically, 12,811 records were excluded after title and abstract screening. Of the 783 remaining records for full-text screening, 14 were not retrieved and 450 were excluded for specific reasons. Finally, 319 studies were included in the analysis. From the perspective of publication language, all included studies were in English, and no relevant studies were published in Chinese. Study screening and selection were conducted following the PRISMA flow diagram [<xref ref-type="bibr" rid="ref23">23</xref>]. The detailed study selection process and specific reasons for exclusion are presented in <xref rid="figure1" ref-type="fig">Figure 1</xref>. Also see <xref ref-type="supplementary-material" rid="app2">Multimedia Appendices 2</xref> and <xref ref-type="supplementary-material" rid="app3">3</xref> for PRISMA-ScR and PRISMA-S checklists, respectively.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) flow diagram of study selection. This diagram shows the number of records identified, screened, assessed for eligibility, and included in the scoping review of technology-facilitated sexual violence and abuse measures, from database searching through final inclusion.</p>
          </caption>
          <graphic xlink:href="jmir_v28i1e90068_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>Included studies were published from September 2011 to January 2026 (<xref ref-type="supplementary-material" rid="app4">Multimedia Appendix 4</xref>). Study populations originated from diverse geographical regions, including 42 countries. Most studies were conducted in a single country, with the highest proportions from Europe (129/319, 40.4%) and North America (123/319, 38.6%), followed by Asia (40/319, 12.5%), South America (8/319, 2.5%), Africa (5/319, 1.6%), and Oceania (2/319, 0.6%). The remaining 12 (3.8%) studies were multicountry. Most studies targeted adolescents (aged 10-18 years; 130/319, 40.7%) and young adults (aged 18-26 years; 93/319, 29.1%), with 9 (2.8%) studies targeting both adolescents and young adults. Fewer studies focused on adult populations (aged ≥18 years; 68/319, 21.3%). The remaining 19 (6.0%) studies did not specify the age group of the target population. In terms of gender, 294 (92.2%) studies included both female and male populations, while 14 (4.4%) focused only on female populations and 6 (1.9%) focused only on male populations. Five studies (1.6%) included gender minority individuals, such as transgender and gender-diverse populations. Regarding sexual orientation, 314 (98.4%) studies did not specify the sexual orientation of the target population, and only 5 (1.6%) focused on sexual orientation minority populations. The studies used a variety of methodologies, including quantitative surveys (303/319, 95.0%), qualitative interviews (12/319, 3.8%), and mixed methods approaches (4/319, 1.2%).</p>
        <p>Among the 319 included studies, 218 distinct measures of TFSVA were identified. Most of these measures were related to nonconsensual sexting and sextortion (130/218, 59.6%). Other areas addressed included IBSA or revenge pornography (30/218, 13.8%), online sexual harassment (27/218, 12.4%), online grooming or solicitation (13/218, 6.0%), and cyber sexual dating abuse (8/218, 3.7%). The remaining 10 (4.6%) measures assessed general TFSVA behaviors. In terms of measurement focus, 96 (44.0%) measures focused on exposure to violence, 12 (5.5%) on perpetration, and 108 (49.5%) measured both aspects. One (0.5%) measure focused on the bystander role, and 1 (0.5%) measured all aspects. In terms of outcomes measured, most studies assessed TFSVA behaviors (199/218, 91.3%), including outcomes related to the prevalence and experiences of TFSVA. Five (2.3%) measures assessed attitudes toward TFSVA, and 4 (1.8%) evaluated motivations for committing TFSVA. The remaining 10 (4.6%) measures assessed more than 1 outcome. Characteristics of the included studies are presented in <xref ref-type="table" rid="table1">Table 1</xref> and TFSVA measures are summarized in <xref ref-type="table" rid="table2">Table 2</xref>.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Characteristics of the included studies. This table summarizes the key methodological and contextual details of the included studies (N=319).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="750"/>
            <col width="220"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Characteristics</td>
                <td>Value, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="2">
                  <bold>Study population</bold>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Europe</td>
                <td>129 (40.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>North America</td>
                <td>123 (38.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Asia</td>
                <td>40 (12.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>South America</td>
                <td>8 (2.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Africa</td>
                <td>5 (1.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Oceania</td>
                <td>2 (0.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Included more than 1 country</td>
                <td>12 (3.8)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <bold>Age group (years)</bold>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Adolescents (aged 10-18)</td>
                <td>130 (40.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Young adults (aged 18-26)</td>
                <td>93 (29.1)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Adolescents and young adults</td>
                <td>9 (2.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Adults (aged 18 or above)</td>
                <td>68 (21.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Any age group</td>
                <td>19 (6.0)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <bold>Gender</bold>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Both genders</td>
                <td>294 (92.2)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Female only</td>
                <td>14 (4.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Male only</td>
                <td>6 (1.9)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Gender minority (ie, transgender and gender-diverse)</td>
                <td>5 (1.6)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <bold>Sexual orientation</bold>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Not specified</td>
                <td>314 (98.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Sexual orientation minority (eg, LGBTQ+<sup>a</sup> or men who have sex with men)</td>
                <td>5 (1.6)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <bold>Study methodology</bold>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Quantitative survey</td>
                <td>303 (95.0)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Qualitative interview</td>
                <td>12 (3.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Mixed methods study</td>
                <td>4 (1.2)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn1">
              <p><sup>a</sup>LGBTQ+: lesbian, gay, bisexual, transgender, queer (or questioning), and others not explicitly listed.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>TFSVA<sup>a</sup> measures (n=218).</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="750"/>
            <col width="220"/>
            <thead>
              <tr valign="top">
                <td colspan="2">Characteristics</td>
                <td>Value, n (%)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="2">
                  <bold>Types of TFSVA</bold>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Nonconsensual sexting</td>
                <td>130 (59.6)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Image-based sexual abuse</td>
                <td>30 (13.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Online sexual harassment</td>
                <td>27 (12.4)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Online grooming</td>
                <td>13 (6.0)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Cyber sexual dating abuse</td>
                <td>8 (3.7)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>General TFSVA behaviors</td>
                <td>10 (4.6)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <bold>Measurement focus</bold>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Exposure to violence</td>
                <td>96 (44.0)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Perpetration</td>
                <td>12 (5.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Exposure to violence and perpetration</td>
                <td>108 (49.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Bystander</td>
                <td>1 (0.5)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>All aspects</td>
                <td>1 (0.5)</td>
              </tr>
              <tr valign="top">
                <td colspan="2">
                  <bold>Outcome measures</bold>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Behaviors</td>
                <td>199 (91.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Attitudes</td>
                <td>5 (2.3)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Motivations</td>
                <td>4 (1.8)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>More than 1 outcome</td>
                <td>10 (4.6)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>TFSVA: technology-facilitated sexual violence and abuse.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>Analysis of publication trends from 2011 to 2025 reveals the evolving focus of TFSVA measures in research. From 2011 to 2023, nonconsensual sexting emerged as the dominant type of TFSVA being measured, with numerous studies focusing on its prevalence, risks, and consequences, particularly among adolescents. However, since 2018, the field has expanded to include more diverse types of TFSVA, such as IBSA, online sexual harassment, and online grooming, reflecting the evolving nature of digital harms. The term TFSVA first appeared prominently in academic literature around 2018, marking a shift toward a more comprehensive understanding of technology-mediated sexual violence, and studies measuring TFSVA have increased significantly since then. By 2024, TFSVA had become the dominant focus of investigation, surpassing the narrower emphasis on nonconsensual sexting, with a broader spectrum of digital sexual violence and its multifaceted impacts being addressed. Data from 2025 indicate a continued increase in studies dedicated to these specific subtypes. The time trend of publications across different types of TFSVA is detailed in <xref rid="figure2" ref-type="fig">Figure 2</xref>.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Time trends in publications on different types of technology-facilitated sexual violence and abuse (TFSVA), 2011-2025. This stacked bar chart displays the annual number of publications included in this review, categorized by primary focus.</p>
          </caption>
          <graphic xlink:href="jmir_v28i1e90068_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>Among all included studies, only 55 reported details on psychometric properties. A total of 138 studies used nonvalidated measures, and 126 studies adapted questionnaires from existing measures. The distribution of validated, nonvalidated, and adapted measures by type of TFSVA across all included studies is presented in <xref rid="figure3" ref-type="fig">Figure 3</xref>.</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Validation status of measures by type of technology-facilitated sexual violence and abuse (TFSVA). This stacked bar chart displays the distribution of validated, nonvalidated, and adapted measures for each TFSVA type identified in the included studies.</p>
          </caption>
          <graphic xlink:href="jmir_v28i1e90068_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Measures by Types of TFSVA</title>
        <sec>
          <title>Nonconsensual Sexting</title>
          <p>Nonconsensual sexting, defined as sending or receiving sexually explicit messages or images without one’s permission, was the most extensively studied form of TFSVA (130/218, 59.6%). In terms of age group, 56 out of 130 (43.1%) measures targeted adolescents, 39 out of 130 (30%) focused on young adults, and 32 out of 130 (24.6%) focused on adult populations; 2 out of 130 (1.5%) measures targeted both adolescents and young adults, and the remaining 1 out of 130 (0.8%) included all age groups. Three nonconsensual sexting measures specifically targeted female participants, and none of the measures specified the sexual orientation of the target population.</p>
          <p>Nearly all studies related to nonconsensual sexting (n=127) focused on assessing the behavioral domain, with questions primarily addressing the frequency and targets of sexting. Six studies measured attitudes toward nonconsensual sexting, exploring general perceptions and perceived risks associated with the practice. Additionally, 7 studies investigated the motivations behind such behavior, examining reasons for engagement, including sexual purposes, emotional influences, body-image reinforcement, and relationship enhancement.</p>
          <p>In terms of psychometric properties, 25 measures were validated, of which 17 reported validity analyses, such as exploratory factor analysis or confirmatory factor analysis. All validated measures reported reliability, including internal consistency (eg, Cronbach α or McDonald ω). Among the validated measures, the Sexting Motivation Scale [<xref ref-type="bibr" rid="ref24">24</xref>], the Sexting Behavior Scale [<xref ref-type="bibr" rid="ref25">25</xref>], the Sexting Questionnaire [<xref ref-type="bibr" rid="ref26">26</xref>], and the Sexting Attitude Scale [<xref ref-type="bibr" rid="ref27">27</xref>] were the most commonly used. All of these demonstrated strong validity (ie, satisfactory exploratory factor analysis or confirmatory factor analysis) and reliability (ie, Cronbach α &#62;0.8). However, these tools were predominantly validated among adolescents and young adults (18/25, 72%), with limited application to adults or diverse cultural groups.</p>
        </sec>
        <sec>
          <title>Online Sexual Harassment</title>
          <p>Online sexual harassment refers to any unwelcome or unwanted sexual behavior, advances, or communication that occurs through digital platforms, including social media, messaging apps, email, or online gaming environments [<xref ref-type="bibr" rid="ref28">28</xref>]. This form of harassment encompasses a broad range of behaviors, such as sexualized cyberbullying, nonconsensual sharing of intimate content, sexually explicit comments, cyberflashing, and sexual coercion facilitated by digital means. Among the included studies (n=218), 27 (12.4%) measured online sexual harassment. In terms of age group, 11 out of 27 (41%) targeted adolescents, 8 out of 27 (30%) targeted young adults, 6 out of 27 (22%) targeted the adult population, and the remaining 2 (7%) included all age groups; 6 out of 27 (22%) measures were distributed to the female population only, and 1 targeted males only. One measure specifically focused on lesbian, gay, bisexual, transgender, queer (or questioning), and others not explicitly listed (LGBTQ+) individuals and examined sexuality-based cyberbullying [<xref ref-type="bibr" rid="ref29">29</xref>].</p>
          <p>Almost all measures included behavioral outcomes (26/27), with 1 study also measuring the motivation outcome. One study explored the attitude outcome from a bystander perspective; 19 out of 27 (70%) measures focused on exposure to violence, 3 (11%) on perpetration, and the remaining 5 (19%) on both aspects. Most questions in these studies inquired about personal experiences of online sexual harassment, such as receiving offensive sexist messages, encountering negative comments about one’s gender or sexual orientation, or being subjected to inappropriate sexual remarks about one’s body on social media. One measure with a motivation outcome asked about reasons for online sexual harassment.</p>
          <p>As many as 11 (41%) measures demonstrated satisfactory validity and reliability. The Online Sexual Victimization Scale was the most commonly used measure [<xref ref-type="bibr" rid="ref26">26</xref>].</p>
        </sec>
        <sec>
          <title>Image-Based Sexual Abuse</title>
          <p>IBSA, such as the nonconsensual sharing of intimate images, was assessed in 30 out of 218 (13.8%) studies; 5 out of these 30 (17%) studies targeted adolescents, 13 (43%) targeted young adults, and 6 (20%) targeted adults; 4 (13%) studies included participants across all age groups, and the remaining 2 (7%) did not specify the target population. One study focused on the male population only, while the others did not specify gender or sexual orientation.</p>
          <p>Most measures focused on behavioral outcomes (n=25), while 4 studies assessed attitude outcomes and 1 included motivation outcomes. Among the 30 studies, 14 (47%) focused on IBSA exposure, 3 (10%) on perpetration, 12 (40%) included both exposure to violence and perpetration, 1 (3%) focused on a bystander perspective, and 1 (3%) included all perspectives. The measurement questions explored experiences related to sending, receiving, or requesting intimate, suggestive, or provocative images or videos (eg, “I have sent/received/requested intimate/suggestive/provocative images or videos”), reasons and motivations for sharing such content (eg, “I have sent dick pics hoping to receive sexy pictures in return”), and attitudes toward IBSA behaviors (eg, “If a man sends a nude or sexual image to a partner, he can’t expect it will remain private”).</p>
          <p>A total of 6 (20%) measures were validated, demonstrating high validity and reliability. Among these, the Sexual Image-Based Abuse Myth Acceptance Scale was the most widely adapted and utilized [<xref ref-type="bibr" rid="ref30">30</xref>].</p>
        </sec>
        <sec>
          <title>Online Grooming</title>
          <p>Online grooming refers to the process by which an individual, typically an adult, establishes an emotional connection with a child or adolescent through digital platforms, such as social media or messaging apps, with the intent of exploiting them for sexual purposes [<xref ref-type="bibr" rid="ref31">31</xref>]. Of the 218 measures, 13 (6.0%) were designed to examine online grooming. Of these 13, 7 (54%) measures targeted adolescents, 2 (15%) targeted adults, 1 (8%) targeted young adults, and the remaining 3 (23%) focused on both adolescents and young adults. No studies specifically targeted sexual and gender minorities.</p>
          <p>All studies focused on behavioral outcomes, with 1 also exploring motivations underlying such behavior. Of the 13 studies, 11 (85%) assessed online grooming exposure, while the remaining 2 (15%) examined both online grooming exposure and perpetration. Most measurement questions centered on the frequency and experiences of online grooming (eg, “In the past 12 months, how often has an adult asked me for pictures or videos of myself with sexual content?”, “Someone has made sexual jokes or comments about me”).</p>
          <p>In these studies, 3 (23%) scales were validated with high reliability and validity, among which the Questionnaire for Online Sexual Solicitation and Interactions With Adults was the most commonly used [<xref ref-type="bibr" rid="ref32">32</xref>].</p>
        </sec>
        <sec>
          <title>Cyber Sexual Dating Abuse</title>
          <p>Cyber sexual dating abuse, encompassing behaviors such as monitoring, control, and harassment within romantic relationships, was addressed in 8 out of 218 (3.7%) studies. Of these 8, 5 (63%) focused on adolescents and 3 (38%) on adults. One study specifically targeted sexual and gender minority girls and feminine teens.</p>
          <p>All studies focused on behavioral outcomes, with 5 (63%) specifically addressing exposure and 3 (38%) exploring both exposure and perpetration. Some questionnaire content overlapped with items in IBSA and sexual aggression in dating or intimate relationships (eg, “Sending and/or uploading photos, images, and/or videos with intimate or sexual content without permission,” “Pressured my partner to send sexual or naked photos of him or her to me”).</p>
          <p>Of these 8 measures, 7 (88%) were validated, demonstrating high reliability and validity. Among these, the Cyber Dating Abuse Questionnaire was the most frequently adapted scale [<xref ref-type="bibr" rid="ref33">33</xref>].</p>
        </sec>
        <sec>
          <title>TFSVA as a Whole</title>
          <p>Since 2018, the term TFSVA has gained prominence as a comprehensive descriptor for a wide range of technology-mediated sexual harms [<xref ref-type="bibr" rid="ref28">28</xref>]. Of the 218 studies, 10 (4.6%) explored TFSVA as a broader category: 2 (20%) targeted adolescents, 7 (70%) targeted adults, and the remaining 1 (10%) had no age restrictions. No studies specifically targeted sexual and gender minorities.</p>
          <p>Of the 10 measures, 9 (90%) focused on behavioral outcomes, and 1 (10%) on attitudes toward TFSVA. Among these studies, 6 (60%) examined TFSVA exposure, while 4 (40%) assessed both exposure and perpetration. The measures encompassed various forms of abuse, including IBSA, online sexual harassment, and gender- or sexuality-based harassment, often grouping these behaviors under the umbrella of TFSVA. Questionnaire items focused on experiences of TFSVA (eg, “Nude or seminude image taken without permission,” “Unwanted sexual experience with someone met online,” “Receiving sexuality- or sexual identity-based offensive and/or degrading messages, comments, or other content”).</p>
          <p>Of the 10 measures, 3 (30%) were validated, with the 21-item Technology-Facilitated Sexual Violence Victimization Scale being widely adapted and utilized [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
        </sec>
      </sec>
      <sec>
        <title>Detailed Analysis of Validated Measures</title>
        <p>To gain detailed insights into the most methodologically robust measures in the field, an in-depth analysis of the 55 validated measures was conducted. This subanalysis focused on their structural characteristics, including TFSVA-specific item length, measurement outcomes, target population, and psychometric properties.</p>
        <p>The analysis focused on the TFSVA-specific item content within each validated measure. The number of items dedicated to assessing TFSVA constructs ranged from 1 to 63, with many measures embedding these items as a subscale within a broader questionnaire on general risky online behaviors or intimate partner violence. Validation was heavily concentrated in Western, high-income countries, notably the United States and Spain. Most measures targeted adolescent and young adult populations.</p>
        <p>Psychometric reporting among validated measures followed a clear pattern. Internal consistency reliability (Cronbach alpha and McDonald ω) was commonly reported, with typical values exceeding 0.80. However, evidence for temporal stability (test-retest reliability) and construct validity (eg, convergent, discriminant, predictive) was reported less consistently and comprehensively. This indicates that the foundational reliability of TFSVA measures has been established, but the full spectrum of validation evidence is not yet universal. Detailed information on the validated measures and their use is synthesized in <xref ref-type="supplementary-material" rid="app5">Multimedia Appendix 5</xref>.</p>
      </sec>
      <sec>
        <title>Content of Validated Measures</title>
        <sec>
          <title>Content Analysis Using STM</title>
          <p>Topic interpretation primarily explains the topic words that describe each topic. STM identifies 9 topics based on high-frequency words. <xref rid="figure4" ref-type="fig">Figure 4</xref> presents the top topics generated from unsupervised STM.</p>
          <fig id="figure4" position="float">
            <label>Figure 4</label>
            <caption>
              <p>Summary of top topics identified by unsupervised structural topic modeling (STM). This figure presents the 9 most prevalent topics identified using unsupervised STM. For each topic, the bar represents overall prevalence, and the accompanying text lists the highest-probability keywords.</p>
            </caption>
            <graphic xlink:href="jmir_v28i1e90068_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <p>Topics were synthesized into 3 core dimensions representing the content of existing measures of TFSVA: (1) consent violation and coercive control; (2) status degradation and demeaning harassment; and (3) contextual and relational framing. Details of the measurement focus and representative topics for each theme are shown in <xref ref-type="table" rid="table3">Table 3</xref>.</p>
          <table-wrap position="float" id="table3">
            <label>Table 3</label>
            <caption>
              <p>Core measurement dimensions identified from unsupervised structural topic modeling. This table presents the 3 primary dimensions identified through unsupervised structural topic modeling analysis of the included validated measures, listing their measurement focus and representative topics.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="260"/>
              <col width="380"/>
              <col width="360"/>
              <thead>
                <tr valign="top">
                  <td>Dimensions</td>
                  <td>Measurement focus</td>
                  <td>Representative topics</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Consent violation and coercive control</td>
                  <td>Measures acts that override consent, breach trust, and apply pressure or threats to dominate the survivor, representing an abuse of power.</td>
                  <td>3 (digital threats and control), 4 (sexual pressure online), and 5 (nonconsensual image distribution)</td>
                </tr>
                <tr valign="top">
                  <td>Status degradation and demeaning harassment</td>
                  <td>Measures acts designed to insult, humiliate, and lower the survivor’s social standing, which causes social and psychological harm.</td>
                  <td>2 (unwanted sexual advances and perceived context), 6 (psychological abuse), and 9 (body shaming)</td>
                </tr>
                <tr valign="top">
                  <td>Contextual and relational framing</td>
                  <td>Provides the situational setting by defining the specific relationship contexts or vulnerable populations that characterize the abuse.</td>
                  <td> 1 (pressured sexting in relationships), 7 (sexual exploitation of minors), and 8 (intimate partner revenge porn and betrayal)</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <p>The first dimension, consent violation and coercive control, encompasses measures of acts that override consent, breach authorization, or apply pressure. It is constituted by topics 3, 4, and 5. For instance, topic 5, the most prevalent topic, captures the nonconsensual distribution of intimate images, anchoring a central TFSVA construct in consent violation. Topics 3 and 4 complement this by measuring coercive tactics, with topic 3 focusing on digital threats and topic 4 capturing direct sexual pressure.</p>
          <p>The second dimension, status degradation and demeaning harassment, captures measures of acts intended to insult, humiliate, and lower the survivor’s social standing. Represented by topics 2, 6, and 9, it includes unwanted sexual advances that may carry attributions of blame (topic 2), psychological abuse and humiliation (topic 6), and body shaming in social media spaces (topic 9).</p>
          <p>The final dimension, contextual and relational framing, defines the specific relational contexts and vulnerable populations that characterize TFSVA. It is represented by topics 1, 7, and 8. Topics 1 and 8 frame abuse within intimate relationships, measuring pressured sexting and revenge porn, respectively. Topic 7 captures online grooming and the sexual exploitation of minors.</p>
          <p>Topic prevalence by types of TFSVA is shown in a heatmap (<xref rid="figure5" ref-type="fig">Figure 5</xref>). First, topic 5 (nonconsensual image distribution) demonstrates consistently high probability across all TFSVA types, suggesting it is a core element in TFSVA measures. Second, the relatively lower overall prevalence of topic 7 (online grooming and sexual exploitation of minors) may indicate that this form of abuse is underrepresented in general TFSVA instruments or is more often specialized in measures targeting child sexual exploitation. Third, the high specificity of certain topics—such as topic 8’s strong association with IBSA and the notable absence of topics 3 (digital threats) and 6 (psychological abuse) from the same type—indicates that IBSA is operationalized primarily around the violation of consent for visual content rather than coercive or psychological tactics.</p>
          <fig id="figure5" position="float">
            <label>Figure 5</label>
            <caption>
              <p>Topic prevalence by technology-facilitated sexual violence and abuse (TFSVA) type. This heatmap displays the prevalence of each STM topic (columns) across literature focused on specific TFSVA types (rows), highlighting which topics are central or peripheral to TFSVA measures.</p>
            </caption>
            <graphic xlink:href="jmir_v28i1e90068_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>Thematic Analysis</title>
          <sec>
            <title>Theme 1: TFSVA Acts and Experiences</title>
            <p>Results revealed that the conceptual foundation of TFSVA measures is the direct quantification of concrete acts and exposure experiences. This behavioral core is operationalized through a mirrored structure across instruments: perpetration tools inventory behaviors enacted, while victimization tools inventory exposure to those same behaviors. This is evidenced by the parallelism in items such as a perpetration subscale asking, “In the past year, have you asked someone to send naked pictures of them to you? When received, I’ve forwarded or shared suggestive or sexual text messages of other people” [<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref36">36</xref>], and a victimization scale probing, “I’ve received suggestive or sexual text messages” [<xref ref-type="bibr" rid="ref35">35</xref>].</p>
            <p>Beyond this dichotomy, measures capture critical behavioral specifics that define the phenomenon in the modern context. This included the nature of content shared (eg, “suggestive or sexual text messages/videos/images”), the exploitation of specific digital platforms (eg, “social media like Facebook, YouTube, Twitter, Instagram/messaging and communication apps like WhatsApp/online forums and chatrooms/websites and blogs”), and the relational dynamics between parties involved (eg, “friends or peers/online friends/stranger/romantic partner). Furthermore, instruments employed frequency metrics (eg, “number of times in the past 6 months that the participant had sent/received a sexual message”) to quantify experiences [<xref ref-type="bibr" rid="ref37">37</xref>]. A few questionnaires also included behavioral continuums ranging from online harassment to physical violence (eg, “threatened on a digital device to physically hurt me”) [<xref ref-type="bibr" rid="ref38">38</xref>].</p>
          </sec>
          <sec>
            <title>Theme 2: TFSVA-Related Attitudes and Beliefs</title>
            <p>The analysis identified that a distinct subset of instruments moved beyond measuring acts to assess the underlying cognitive frameworks that perpetuate TFSVA. These tools were designed to capture the beliefs that justify, minimize, or shift responsibility for abusive behaviors, and they revealed a critical triangulation of perspectives across different populations. Perpetrator-focused instruments measured aggression-supporting cognitions that legitimize harmful acts, exemplified by items asserting that “Women should be flattered if a partner or ex-partner shows nude pics of her to some close friends” [<xref ref-type="bibr" rid="ref30">30</xref>]. Conversely, survivor-focused tools often assessed internalized blame, capturing the harmful internalization of these same societal myths through items such as, “Someone who sends a nude or sexual image to their partner, should not be surprised and is responsible if the image ends up online” [<xref ref-type="bibr" rid="ref30">30</xref>]. Furthermore, instruments gauged societal-level myths and misconceptions that form the bedrock of these attitudes, including normative assertions like “It’s only natural for a guy to brag to his mates by showing them a nude or sexual image of his partner” [<xref ref-type="bibr" rid="ref30">30</xref>].</p>
          </sec>
          <sec>
            <title>Theme 3: Motivational Factors in TFSVA</title>
            <p>This theme examined the complex motivational factors underlying TFSVA, capturing the distinct methodological approaches used to ascertain reasons for perpetration. The analysis revealed that motivations were conceptualized along a continuum spanning internally generated, autonomous reasons and externally driven, coerced reasons, typically measured through direct self-report questions posed to perpetrators. Autonomous motivations encompassed internally driven drivers such as relationship enhancement (eg, “sometimes I sent sexts to increase intimacy in my dating relationship”), sexual arousal (eg, “I sent sexts to feel sexually aroused”), and self-validation (eg, “I sent sexts to test whether I am attractive enough/ to verify whether my body is okay”) [<xref ref-type="bibr" rid="ref24">24</xref>]. In direct contrast, coerced motivations were characterized by external pressure or instrumental gain, encompassing factors such as blackmail (eg, “sent threatening messages on digital devices”) [<xref ref-type="bibr" rid="ref38">38</xref>], compliance with external pressures (eg, “After you sent the sext, did anyone praise you/did you feel like you fit in better with your friends/peers?”) [<xref ref-type="bibr" rid="ref39">39</xref>], and the pursuit of tangible benefits such as financial rewards (eg, “offered me money or other things in exchange”) [<xref ref-type="bibr" rid="ref40">40</xref>]. A critical methodological divergence was also identified, whereby perpetrator motivation was alternatively assessed through the survivor’s interpretation of the event (eg, “perpetrator did this to humiliate me/to feel a sense of dominance and control”) [<xref ref-type="bibr" rid="ref41">41</xref>].</p>
          </sec>
          <sec>
            <title>Theme 4: The Tactical and Contextual Dynamics of TFSVA</title>
            <p>Measures of TFSVA demonstrated a sophisticated focus on the specific perpetrator tactics and contextual dynamics that define TFSVA. Instruments consistently captured a core set of direct harassment behaviors, quantifying the nonconsensual sharing of intimate images and the use of persistent online sexual threats through items probing experiences of “unwanted sexual communication” and “IBSA.”</p>
            <p>Beyond these direct acts, instruments increasingly measured more nuanced and calculated strategies. This included deception and impersonation, assessed through items asking respondents whether they had been contacted by “fake profiles” or had experienced “false rumors about their sexual behaviors being spread online” [<xref ref-type="bibr" rid="ref42">42</xref>]. A critical tactical subset involved overt coercion, prominently featured in the operationalization of sextortion. This was measured through items detailing how perpetrators manipulate survivors through threats, such as “Has anyone ever threatened to share your private images unless you sent money or more photos?,” which captures the dual mechanisms of financial coercion and sextortion [<xref ref-type="bibr" rid="ref40">40</xref>].</p>
          </sec>
          <sec>
            <title>Theme 5: Survivor Impact and Harm</title>
            <p>Measures of impact revealed a primary focus on the psychological and relational consequences for survivors of TFSVA. Existing instruments predominantly assessed 2 core internalized harms: internalized blame and trauma-related emotional effects. The first focused on items that probe self-directed blame and responsibility, such as survivors endorsing statements such as “senders should expect images to be shared” [<xref ref-type="bibr" rid="ref41">41</xref>]. The second captured the profound emotional fallout, quantifying experiences of humiliation, violated trust, and social anxiety through items like “victims find it difficult to trust others/often experience feelings of humiliation/being harassed or annoyed.” [<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref43">43</xref>].</p>
            <p>Beyond internal states, a significant portion of questions addressed broader relational outcomes, often framed by a tension between perceived positive effects (eg, intimacy-building within a consensual context) and the more frequently documented negative consequences of regret, trauma, and the reinforcement of power imbalances (eg, “Did you experience regret immediately after sending the sext?/I sent sexts because I am forced by someone”) [<xref ref-type="bibr" rid="ref39">39</xref>,<xref ref-type="bibr" rid="ref44">44</xref>]. Crucially, the nonconsensual nature of the acts was central to the conceptualization of harm. The profound impact was explicitly linked to the experience of violation, whether through the unauthorized sharing of intimate content, the coercion of sextortion, or the fundamental breach of privacy (eg, “disseminating or uploading to the Internet photos or videos of you with erotic or sexual content without your consent”) [<xref ref-type="bibr" rid="ref45">45</xref>].</p>
          </sec>
        </sec>
        <sec>
          <title>Integrated Synthesis</title>
          <p>To integrate the findings from STM and thematic analysis, an integrated evidence and gap map was developed and is presented in <xref rid="figure6" ref-type="fig">Figure 6</xref>. This conceptual synthesis does not propose a direct correlation but serves as an evaluative framework. It positions the 3 core measurement dimensions identified through STM against the 5 themes derived from thematic analysis. For each dimension, judgment was made regarding its coverage of each thematic construct. The resulting matrix reveals a structural pattern in which robust measurement of behavior differs significantly from deficits in assessing attitudes, motivations, tactical dynamics, and harm-related components.</p>
          <fig id="figure6" position="float">
            <label>Figure 6</label>
            <caption>
              <p>Synthesis of content coverage from structural topic modeling and thematic analysis. The table compares the 3 core measurement dimensions identified by structural topic modeling with the 5 themes derived from thematic analysis, indicating their coverage in the current evidence as strong, limited, or missing.</p>
            </caption>
            <graphic xlink:href="jmir_v28i1e90068_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Summary of Evidence</title>
        <p>This scoping review provides a novel diagnostic analysis of the TFSVA measurement field. Through the integration of STM and thematic analysis of 319 studies encompassing 218 distinct measures, we reveal a fundamental structural misalignment in the field. Current measures are heavily concentrated on cataloging specific behavioral acts while offering only limited or partial coverage of underlying attitudes, motivations, harm-based dimensions, and systemic contexts. This fragmentation helps explain why the field continues to struggle with conceptual and methodological challenges in capturing the multifaceted nature of TFSVA.</p>
      </sec>
      <sec>
        <title>Interpretation and Comparison With Existing Literature</title>
        <sec>
          <title>Scope and Definition of TFSVA</title>
          <p>This review confirms the definitional fragmentation of TFSVA noted in prior literature. Previous studies have observed that TFSVA encompasses a diverse range of behaviors studied in isolation using inconsistent terminology [<xref ref-type="bibr" rid="ref28">28</xref>]. Henry and Powell’s [<xref ref-type="bibr" rid="ref28">28</xref>] foundational work identified a critical lack of empirical research on TFSVA against adults and noted that only a few existing studies provide reliable data on the nature, scope, and impacts of TFSVA. Nearly a decade later, our synthesis provides empirical confirmation of this fragmentation. The field has produced an abundance of measures, yet they remain focused on specific behavioral subdomains with minimal conceptual integration.</p>
          <p>Three key findings from our analysis directly inform the need for an updated definition. First, the narrow behavioral focus of existing measures reveals that current conceptualizations fail to capture the full spectrum of TFSVA. Second, our analysis identified emerging forms of TFSVA, such as AI-generated deepfakes, that are absent from existing measures. Third, our findings show that TFSVA operates within broader structural contexts that shape both the nature of abuse and its consequences.</p>
          <p>Grounded in this evidence, we propose an updated definition that also engages with distinctions raised in restorative and transformative justice scholarship [<xref ref-type="bibr" rid="ref46">46</xref>]. Building on this foundation, we define TFSVA as any form of sexual violence, abuse, coercion, or exploitation that is initiated, facilitated, intensified, or sustained through digital technologies. Such acts may result in psychological, reputational, social, economic, physical, or sexual harm, though the presence or absence of harm is not definitional to the act itself.</p>
          <p>This formulation separates the act from its potential consequences. It acknowledges that (1) individuals may experience TFSVA without immediate measurable harm yet still warrant recognition and support; (2) the same act may produce different harms across individuals and contexts; and (3) harm may manifest differently across cultural and geographical settings [<xref ref-type="bibr" rid="ref46">46</xref>].</p>
          <p>The definition encompasses specific acts documented in our review, including IBSA, AI-generated sexual exploitation, cyberstalking leading to physical violence, and algorithmically amplified harassment. It remains adaptable to emerging forms not yet captured in existing measures. Crucially, it recognizes that TFSVA operates within systems of gendered, racialized, and intersectional oppression. These dimensions, which often transcend digital or physical boundaries and jurisdictional borders, are currently absent from existing measures.</p>
          <p>Additionally, the definition embeds recognition of systemic oppression and acknowledges that technology is not merely a neutral tool. For instance, algorithms can amplify harassment, platform design may facilitate sexual abuse, and networked technologies enable harm across jurisdictional boundaries [<xref ref-type="bibr" rid="ref47">47</xref>]. These dimensions follow directly from a definition centered on technological and structural contexts.</p>
        </sec>
        <sec>
          <title>Temporal Trends</title>
          <p>The increase in TFSVA publications observed in our temporal analysis suggests growing academic and societal recognition. A notable trend is the decline in studies on specific forms, such as sexting and IBSA, from 2011 to 2017. The use of the holistic term “TFSVA” began to rise sharply from 2018, suggesting a conceptual shift in which previously distinct behaviors are being consolidated under a broader umbrella [<xref ref-type="bibr" rid="ref3">3</xref>]. Additionally, the decline in specific terms may reflect a move away from fragmented terminology toward more comprehensive approaches that capture the spectrum of technology-facilitated sexual harms. Alternatively, it may indicate that earlier research on sexting, IBSA, online sexual harassment, and online grooming reached a saturation point, prompting scholars to explore broader themes or emerging forms of TFSVA. Further investigation is needed to determine whether this trend reflects evolving academic priorities or a response to new technological developments that blur the boundaries between specific subtypes of TFSVA.</p>
        </sec>
        <sec>
          <title>Gender, Geographic, and Cultural Considerations</title>
          <p>A core finding of this review is the gap in demographic representation within TFSVA measures. Henry and Powell [<xref ref-type="bibr" rid="ref28">28</xref>] observed that TFSVA may be predominantly gender-, sexuality-, and age-based, with young women being overrepresented as survivors. However, our analysis reveals that the field lacks the measures needed to adequately investigate these patterns.</p>
          <p>The gendered nature of TFSVA is well documented, with women and sexual minorities disproportionately affected [<xref ref-type="bibr" rid="ref48">48</xref>]. Emerging evidence also suggests that men experience TFSVA, albeit in different forms and with varying impacts [<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref50">50</xref>]. A recent study assessing the content validity of a TFSVA measure further highlighted significant variations in how individuals of different genders and sexual orientations interpret and perceive TFSVA [<xref ref-type="bibr" rid="ref51">51</xref>].</p>
          <p>Yet, our synthesis reveals 2 critical gaps that prevent the field from advancing this understanding. First, existing measures may lack content sensitivity to diverse identities. Items often use generic language that may not capture experiences specific to sexual and gender minorities. Second, even if measures could capture diverse experiences, they have rarely been validated with diverse populations. Of the 319 studies, 314 (98.4%) did not specify participants’ sexual orientation, and only 5 (1.6%) targeted gender minority populations. The implications of these gaps for measure design and validation are addressed in the subsequent discussion.</p>
          <p>Moreover, the geographic focus of TFSVA research is heavily skewed. For instance, our results indicate that 260 (81.5%) of the 319 included studies were conducted in Western, high-income countries, while studies from Asian, African, and low-income contexts remain scarce. This imbalance is critical, as cultural norms and contextual factors, such as varying digital literacy, internet access, and legal frameworks, can significantly influence how TFSVA is perceived and experienced [<xref ref-type="bibr" rid="ref3">3</xref>]. Consequently, existing measures may lack validity in these regions, highlighting the need to develop culturally adapted measures that account for specific social, legal, and technological environments.</p>
        </sec>
        <sec>
          <title>Gaps and Recommendations</title>
          <p>The thematic analysis of questionnaire content confirmed that existing measures capture behavioral data and certain attitudinal and motivational factors, but lack depth. Our integrated synthesis places these content gaps within a structural framework, revealing substantial limitations in addressing critical dimensions, notably evolving technological threats, intersectional vulnerabilities, and institutional factors.</p>
          <p>Emerging technologies present challenges for TFSVA measures. Our analysis showed that emerging forms of TFSVA, such as AI, deepfakes, zoom-bombing or digital intrusion, and abuse via smart devices, were not covered in the measurement content. These gaps render existing questionnaires outdated and create a persistent development lag, as the evolution of abuse tactics outpaces instrument updates [<xref ref-type="bibr" rid="ref51">51</xref>]. To remain relevant, future questionnaires should be dynamically updated to integrate assessments of emerging tactics, such as GPS stalking and AI-facilitated abuse.</p>
          <p>Results from our analysis reveal limitations in capturing intersectional experiences at 2 levels. First, in terms of measure design, the content of existing measures lacks sensitivity to how TFSVA manifests across individuals of different genders and sexual orientations. Items often use generic language (eg, “Have you received unwanted sexual images?”) that does not account for specific experiences among sexual and gender minority populations. This limits the validity of these measures for diverse groups. Second, in terms of study application, our descriptive synthesis shows that most included studies did not specify participants’ sexual orientation. This indicates that studies rarely conduct and report the intersectional analyses needed to understand disparities.</p>
          <p>Existing literature on other sexual violence measures offers concrete guidance for improving inclusivity. For example, the Daily Heterosexist Experiences Questionnaire includes items that specifically assess discrimination and harassment tied to sexual minority identity, such as “People assuming you are heterosexual because you have children,” moving beyond generic violence exposure questions [<xref ref-type="bibr" rid="ref52">52</xref>]. Similarly, measures of intimate partner violence for sexual and gender minority populations adapt items from the Revised Conflict Tactics Scale to capture experiences unique to these populations, including identity-based coercion and outing as a tactic of abuse [<xref ref-type="bibr" rid="ref53">53</xref>]. These examples demonstrate that inclusive measures require consultation with diverse communities during item development to ensure content validity [<xref ref-type="bibr" rid="ref52">52</xref>]. A second strategy is the use of language that reflects the lived experiences of specific groups rather than assuming universal applicability [<xref ref-type="bibr" rid="ref53">53</xref>]. A third is validating measures separately across different populations to establish measurement equivalence [<xref ref-type="bibr" rid="ref53">53</xref>]. Incorporating these strategies into TFSVA measure development is crucial for capturing nuanced harms, such as gendered and sexuality-based abuse [<xref ref-type="bibr" rid="ref5">5</xref>]. Future measure development should prioritize inclusive language and item wording, community engagement in the design process, and rigorous validation across diverse gender and sexual orientation groups.</p>
          <p>A related and critical gap is the lack of cross-cultural validity. Our findings show that most validated measures were developed in Western, high-income countries. To move forward, the adaptation of TFSVA measures should follow a rigorous framework to ensure validity across different contexts [<xref ref-type="bibr" rid="ref54">54</xref>]. This involves (1) ensuring conceptual equivalence through co-creation with local experts and cognitive testing; (2) conducting statistical measurement invariance testing (eg, multigroup confirmatory factor analysis); and (3) establishing criterion validity. This structured process moves beyond simple translation to develop measures that are valid for cross-cultural research and intervention.</p>
          <p>Findings from the thematic analysis of measurement content indicate that current TFSVA-specific measures critically underassess structural and institutional factors, such as interactions with legal systems and digital platforms. There is a notable absence of items within TFSVA measures assessing key mediators of survivor outcomes, such as a survivor’s trust in, or experience with, platform reporting systems, legal authorities, or support services. It is important to note that this finding is limited to the content of TFSVA-specific measures. Our review did not capture whether included studies administered additional, standalone measures assessing institutional trust, platform responsiveness, or help-seeking behaviors alongside their TFSVA measures. Therefore, although these constructs are absent from TFSVA-specific measures, we cannot draw conclusions regarding their overall availability or use elsewhere in the literature. Nevertheless, the absence of these constructs from TFSVA-specific measures has important implications. A growing body of evidence demonstrates that institutional responses profoundly influence survivor outcomes [<xref ref-type="bibr" rid="ref55">55</xref>]. Research on situational betrayal theory has shown that platform reporting processes can themselves become sources of secondary trauma when they are hostile, opaque, or ineffective [<xref ref-type="bibr" rid="ref56">56</xref>]. Institutional responses also shape bystander behaviors and help-seeking pathways [<xref ref-type="bibr" rid="ref57">57</xref>]. For instance, bystanders’ willingness to intervene is influenced by their perceptions of safety, responsibility, and the anticipated consequences of action, which are shaped by broader institutional and social norms [<xref ref-type="bibr" rid="ref57">57</xref>]. Similarly, survivors’ decisions to seek support are mediated by their trust in institutional responses and fear of further harm during or following disclosure [<xref ref-type="bibr" rid="ref57">57</xref>]. Consequently, when TFSVA measures are used in isolation, they can quantify the abusive act but cannot assess the institutional and structural context in which harm is experienced and mediated. To build an evidence base for effective interventions, future TFSVA measure development should consider integrating items that assess constructs such as institutional trust, platform responsiveness, and multilevel help-seeking behaviors.</p>
          <p>Our analysis of TFSVA-specific measures revealed limited attention to psychological and relational impacts, such as long-term trauma, reputational harm, or intimate partner dynamics. Results from STM and thematic analysis indicate that when impacts are included, they tend to frame consequences as isolated emotional states rather than examining how they interact with, or amplify, other mental health challenges [<xref ref-type="bibr" rid="ref58">58</xref>]. However, this finding is limited to the content of TFSVA measures, as we did not capture whether included studies administered separate validated instruments assessing psychological outcomes alongside their TFSVA-specific measures. Future research should examine how TFSVA measures are used in conjunction with established mental health measures. Additionally, TFSVA measure development should consider integrating items that capture long-term and relational impacts to provide a more comprehensive understanding of survivors’, perpetrators’, and bystanders’ outcomes.</p>
        </sec>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>This scoping review has several limitations. First, by design, it maps the available evidence but does not appraise study quality or synthesize findings, which precludes definitive conclusions regarding measurement robustness. Second, STM was applied to short questionnaire items. The required text preprocessing may have fragmented the original wording; however, topics were interpreted against the original texts to ensure validity. Third, the inclusion of only English and Chinese publications may have introduced language bias, potentially omitting relevant studies. Fourth, as TFSVA is an evolving field, this review may not capture all emerging forms of the phenomenon. Fifth, our analysis focused specifically on TFSVA measures rather than all measures used within the included studies. Future research could examine how TFSVA measures are used alongside other measures assessing related constructs, such as institutional trust or mental health outcomes.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>This scoping review provides the first comprehensive synthesis of existing TFSVA measures through the innovative integration of STM and thematic analysis. By examining 319 studies and 218 distinct measures, we move beyond cataloging to systematically identify the core dimensions reflected in existing measures, such as consent violations, coercive control, and contextual-relational framing. The review also reveals a field that is structurally misaligned with the realities of TFSVA: (1) a lack of measures addressing emerging AI-facilitated tactics; (2) the systematic omission of intersectional factors, such as gender and sexuality; (3) insufficient attention to structural and institutional mediators, such as platform responsiveness; and (4) superficial assessments of psychological and relational impacts, including long-term trauma. Importantly, these findings reflect gaps within TFSVA-specific measures rather than the broader literature, as we did not capture whether studies administered separate measures assessing these constructs alongside their TFSVA measures.</p>
        <p>This approach quantifies the field’s conceptual fragmentation and pinpoints empirical blind spots. The primary contribution is an evidence-based analysis that redirects measures from narrow, tactic-focused content toward capturing more diverse contextual dimensions. To address the identified gaps, future efforts must prioritize: (1) developing measures with inclusive, community-informed content that reflects diverse experiences across gender, sexuality, and cultural contexts; (2) validating measures across diverse populations to establish measurement equivalence; and (3) integrating items that assess institutional and structural factors shaping TFSVA outcomes. This shift is essential for generating the comprehensive evidence needed to inform responsive policy, platform governance, and social support services in the rapidly evolving digital age.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Keywords and search strategies.</p>
        <media xlink:href="jmir_v28i1e90068_app1.docx" xlink:title="DOCX File , 33 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>PRISMA-ScR (Preferred Reporting Items for Systematic Reviews and Meta-Analyses Extension for Scoping Reviews) checklist.</p>
        <media xlink:href="jmir_v28i1e90068_app2.pdf" xlink:title="PDF File  (Adobe PDF File), 99 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>PRISMA-S (PRISMA Statement for Reporting Literature Searches in Systematic Reviews) checklist. PRISMA: Preferred Reporting Items for Systematic Reviews and Meta-Analyses.</p>
        <media xlink:href="jmir_v28i1e90068_app3.pdf" xlink:title="PDF File  (Adobe PDF File), 83 KB"/>
      </supplementary-material>
      <supplementary-material id="app4">
        <label>Multimedia Appendix 4</label>
        <p>All included references.</p>
        <media xlink:href="jmir_v28i1e90068_app4.docx" xlink:title="DOCX File , 81 KB"/>
      </supplementary-material>
      <supplementary-material id="app5">
        <label>Multimedia Appendix 5</label>
        <p>Summary of validated measures.</p>
        <media xlink:href="jmir_v28i1e90068_app5.docx" xlink:title="DOCX File , 46 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AI</term>
          <def>
            <p>artificial intelligence</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">IBSA</term>
          <def>
            <p>image-based sexual abuse</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">LGBTQ+</term>
          <def>
            <p>lesbian, gay, bisexual, transgender, queer (or questioning), and others not explicitly listed</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">PAGER</term>
          <def>
            <p>Patterns, Advances, Gaps, Evidence for practice, and Research Recommendations</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">PCC</term>
          <def>
            <p>Population-Concept-Context</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">PRISMA-S</term>
          <def>
            <p>PRISMA Statement for Reporting Literature Searches in Systematic Reviews</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">PRISMA-ScR</term>
          <def>
            <p>Preferred Reporting Items for Systematic Reviews and Meta-Analyses Extension for Scoping Reviews</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">STM</term>
          <def>
            <p>structural topic modeling</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb9">TFSVA</term>
          <def>
            <p>technology-facilitated sexual violence and abuse</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <notes>
      <title>Data Availability</title>
      <p>This study analyzed secondary data sourced from the existing published literature. The complete set of references is provided in <xref ref-type="supplementary-material" rid="app4">Multimedia Appendix 4</xref>.</p>
    </notes>
    <notes>
      <title>Funding</title>
      <p>This study was funded by the General Research Fund, Research Grants Council, Hong Kong (reference: 17617721).</p>
    </notes>
    <fn-group>
      <fn fn-type="con">
        <p>Conceptualization: EPHC (lead), SHLP (equal)</p>
        <p>Data curation: SHLP (lead), CW (supporting)</p>
        <p>Formal analysis: SHLP (lead), LZ (supporting)</p>
        <p>Supervision: EPHC (lead), PHC (equal), CBJ (equal)</p>
        <p>Writing – original draft: SHLP</p>
        <p>Writing – review &#38; editing: SHLP (lead), EPHC (equal), PHC (equal), CBJ (equal), LZ (supporting), CW (supporting)</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Henry</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Flynn</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Powell</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Policing image-based sexual abuse: stakeholder perspectives</article-title>
          <source>Police Practice and Research</source>
          <year>2018</year>
          <month>09</month>
          <day>20</day>
          <volume>19</volume>
          <issue>6</issue>
          <fpage>565</fpage>
          <lpage>581</lpage>
          <pub-id pub-id-type="doi">10.1080/15614263.2018.1507892</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Buil-Gil</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Kemp</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kuenzel</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Coventry</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Zakhary</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tilley</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Nicholson</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>The digital harms of smart home devices: a systematic literature review</article-title>
          <source>Computers in Human Behavior</source>
          <year>2023</year>
          <month>08</month>
          <volume>145</volume>
          <fpage>107770</fpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2023.107770</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sheikh</surname>
              <given-names>MMR</given-names>
            </name>
            <name name-style="western">
              <surname>Rogers</surname>
              <given-names>MM</given-names>
            </name>
          </person-group>
          <article-title>Technology-facilitated sexual violence and abuse in low and middle-income countries: a scoping review</article-title>
          <source>Trauma Violence Abuse</source>
          <year>2024</year>
          <month>04</month>
          <day>31</day>
          <volume>25</volume>
          <issue>2</issue>
          <fpage>1614</fpage>
          <lpage>1629</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/15248380231191189?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/15248380231191189</pub-id>
          <pub-id pub-id-type="medline">37650241</pub-id>
          <pub-id pub-id-type="pmcid">PMC10913330</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Salerno-Ferraro</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Erentzen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Schuller</surname>
              <given-names>RA</given-names>
            </name>
          </person-group>
          <article-title>Young women's experiences with technology-facilitated sexual violence from male strangers</article-title>
          <source>J Interpers Violence</source>
          <year>2022</year>
          <month>10</month>
          <day>16</day>
          <volume>37</volume>
          <issue>19-20</issue>
          <fpage>NP17860</fpage>
          <lpage>NP17885</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/08862605211030018?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/08862605211030018</pub-id>
          <pub-id pub-id-type="medline">34271829</pub-id>
          <pub-id pub-id-type="pmcid">PMC9554274</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Powell</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Scott</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Henry</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Digital harassment and abuse: experiences of sexuality and gender minority adults</article-title>
          <source>European Journal of Criminology</source>
          <year>2018</year>
          <month>07</month>
          <day>30</day>
          <volume>17</volume>
          <issue>2</issue>
          <fpage>199</fpage>
          <lpage>223</lpage>
          <pub-id pub-id-type="doi">10.1177/1477370818788006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Henry</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Flynn</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Powell</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Technology-facilitated domestic and sexual violence: a review</article-title>
          <source>Violence Against Women</source>
          <year>2020</year>
          <month>12</month>
          <volume>26</volume>
          <issue>15-16</issue>
          <fpage>1828</fpage>
          <lpage>1854</lpage>
          <pub-id pub-id-type="doi">10.1177/1077801219875821</pub-id>
          <pub-id pub-id-type="medline">32998673</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Patel</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Roesch</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>The prevalence of technology-facilitated sexual violence: a meta-analysis and systematic review</article-title>
          <source>Trauma Violence Abuse</source>
          <year>2022</year>
          <month>04</month>
          <day>15</day>
          <volume>23</volume>
          <issue>2</issue>
          <fpage>428</fpage>
          <lpage>443</lpage>
          <pub-id pub-id-type="doi">10.1177/1524838020958057</pub-id>
          <pub-id pub-id-type="medline">32930064</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Champion</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Oswald</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Pedersen</surname>
              <given-names>CL</given-names>
            </name>
          </person-group>
          <article-title>Technology-facilitated sexual violence and suicide risk: a serial mediation model investigating bullying, depression, perceived burdensomeness, and thwarted belongingness</article-title>
          <source>The Canadian Journal of Human Sexuality</source>
          <year>2021</year>
          <month>04</month>
          <day>01</day>
          <volume>30</volume>
          <issue>1</issue>
          <fpage>125</fpage>
          <lpage>141</lpage>
          <pub-id pub-id-type="doi">10.3138/cjhs.2020-0044</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bates</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Revenge porn and mental health</article-title>
          <source>Feminist Criminology</source>
          <year>2016</year>
          <month>07</month>
          <day>24</day>
          <volume>12</volume>
          <issue>1</issue>
          <fpage>22</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.1177/1557085116654565</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Snaychuk</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>O’Neill</surname>
              <given-names>ML</given-names>
            </name>
          </person-group>
          <article-title>Technology-facilitated sexual violence: prevalence, risk, and resiliency in undergraduate students</article-title>
          <source>Journal of Aggression, Maltreatment &#38; Trauma</source>
          <year>2020</year>
          <month>01</month>
          <day>28</day>
          <volume>29</volume>
          <issue>8</issue>
          <fpage>984</fpage>
          <lpage>999</lpage>
          <pub-id pub-id-type="doi">10.1080/10926771.2019.1710636</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dragiewicz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Burgess</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Matamoros-Fernández</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Salter</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Suzor</surname>
              <given-names>NP</given-names>
            </name>
            <name name-style="western">
              <surname>Woodlock</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Harris</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Technology facilitated coercive control: domestic violence and the competing roles of digital media platforms</article-title>
          <source>Feminist Media Studies</source>
          <year>2018</year>
          <month>03</month>
          <day>20</day>
          <volume>18</volume>
          <issue>4</issue>
          <fpage>609</fpage>
          <lpage>625</lpage>
          <pub-id pub-id-type="doi">10.1080/14680777.2018.1447341</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Updated methodological guidance for the conduct of scoping reviews</article-title>
          <source>JBI evidence synthesis</source>
          <year>2020</year>
          <volume>18</volume>
          <issue>10</issue>
          <fpage>2119</fpage>
          <lpage>2126</lpage>
          <pub-id pub-id-type="doi">10.11124/jbies-20-00167</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Arksey</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>O'Malley</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Scoping studies: towards a methodological framework</article-title>
          <source>International Journal of Social Research Methodology</source>
          <year>2005</year>
          <month>02</month>
          <volume>8</volume>
          <issue>1</issue>
          <fpage>19</fpage>
          <lpage>32</lpage>
          <pub-id pub-id-type="doi">10.1080/1364557032000119616</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pak</surname>
              <given-names>SHL</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>EPH</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Chau</surname>
              <given-names>PH</given-names>
            </name>
            <name name-style="western">
              <surname>Bradbury-Jones</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Measuring technology-facilitated sexual violence and abuse: a scoping review protocol of existing measurements</article-title>
          <source>BMJ Open</source>
          <year>2024</year>
          <month>12</month>
          <day>27</day>
          <volume>14</volume>
          <issue>12</issue>
          <fpage>e089296</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmjopen.bmj.com/lookup/pmidlookup?view=long&#38;pmid=39732482"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmjopen-2024-089296</pub-id>
          <pub-id pub-id-type="medline">39732482</pub-id>
          <pub-id pub-id-type="pii">bmjopen-2024-089296</pub-id>
          <pub-id pub-id-type="pmcid">PMC11683985</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
          <article-title>Measuring technology-facilitated sexual violence: a scoping review protocol of existing instruments</article-title>
          <source>Open Science Framework</source>
          <year>2024</year>
          <month>3</month>
          <day>13</day>
          <access-date>2026-03-28</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://archive.org/details/osf-registrations-q5etw-v1">https://archive.org/details/osf-registrations-q5etw-v1</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tricco</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Lillie</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Zarin</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>O'Brien</surname>
              <given-names>KK</given-names>
            </name>
            <name name-style="western">
              <surname>Colquhoun</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Levac</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>MD</given-names>
            </name>
            <name name-style="western">
              <surname>Horsley</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Weeks</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hempel</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Akl</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>McGowan</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Stewart</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hartling</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Aldcroft</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wilson</surname>
              <given-names>MG</given-names>
            </name>
            <name name-style="western">
              <surname>Garritty</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Lewin</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Godfrey</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Macdonald</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Langlois</surname>
              <given-names>EV</given-names>
            </name>
            <name name-style="western">
              <surname>Soares-Weiser</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Moriarty</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Clifford</surname>
              <given-names>T</given-names>
            </name>
            <collab>Tunçalp</collab>
            <name name-style="western">
              <surname>Straus</surname>
              <given-names>SE</given-names>
            </name>
          </person-group>
          <article-title>PRISMA Extension for Scoping Reviews (PRISMA-ScR): checklist and explanation</article-title>
          <source>Ann Intern Med</source>
          <year>2018</year>
          <month>10</month>
          <day>02</day>
          <volume>169</volume>
          <issue>7</issue>
          <fpage>467</fpage>
          <lpage>473</lpage>
          <pub-id pub-id-type="doi">10.7326/m18-0850</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pollock</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>MDJ</given-names>
            </name>
            <name name-style="western">
              <surname>Khalil</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>McInerney</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Alexander</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Tricco</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Brandão de Moraes</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Godfrey</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Pieper</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Saran</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Stern</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Munn</surname>
              <given-names>Z</given-names>
            </name>
          </person-group>
          <article-title>Recommendations for the extraction, analysis, and presentation of results in scoping reviews</article-title>
          <source>JBI evidence synthesis</source>
          <year>2023</year>
          <volume>21</volume>
          <issue>3</issue>
          <fpage>520</fpage>
          <lpage>532</lpage>
          <pub-id pub-id-type="doi">10.11124/jbies-22-00123</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rethlefsen</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Kirtley</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Waffenschmidt</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ayala</surname>
              <given-names>AP</given-names>
            </name>
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Page</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Koffel</surname>
              <given-names>JB</given-names>
            </name>
            <collab>PRISMA-S Group</collab>
          </person-group>
          <article-title>PRISMA-S: an extension to the PRISMA Statement for Reporting Literature Searches in Systematic Reviews</article-title>
          <source>Systematic reviews</source>
          <year>2021</year>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>a</fpage>
          <lpage>19</lpage>
          <pub-id pub-id-type="doi">10.31219/osf.io/sfc38</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bradbury-Jones</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Aveyard</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Herber</surname>
              <given-names>OR</given-names>
            </name>
            <name name-style="western">
              <surname>Isham</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Taylor</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>O’Malley</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Scoping reviews: the PAGER framework for improving the quality of reporting</article-title>
          <source>International Journal of Social Research Methodology</source>
          <year>2021</year>
          <month>03</month>
          <day>18</day>
          <volume>25</volume>
          <issue>4</issue>
          <fpage>457</fpage>
          <lpage>470</lpage>
          <pub-id pub-id-type="doi">10.1080/13645579.2021.1899596</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beckmeyer</surname>
              <given-names>JJ</given-names>
            </name>
            <name name-style="western">
              <surname>Herbenick</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Eastman-Mueller</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Sexting with romantic partners during college: who does it, who doesn’t and who wants to</article-title>
          <source>Sexuality &#38; Culture</source>
          <year>2021</year>
          <month>05</month>
          <day>31</day>
          <volume>26</volume>
          <issue>1</issue>
          <fpage>48</fpage>
          <lpage>66</lpage>
          <pub-id pub-id-type="doi">10.1007/s12119-021-09878-x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gillies</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Murthy</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Brenton</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Olaniyan</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Theme and topic: how qualitative research and topic modeling can be brought together</article-title>
          <source>arXiv. Published online May 11, 2021</source>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://arxiv.org/abs/2210.00707"/>
          </comment>
          <pub-id pub-id-type="doi">10.48550/arXiv.2210.00707</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Clarke</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Braun</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Thematic analysis</article-title>
          <source>The Journal of Positive Psychology</source>
          <year>2016</year>
          <month>12</month>
          <day>09</day>
          <volume>12</volume>
          <issue>3</issue>
          <fpage>297</fpage>
          <lpage>298</lpage>
          <pub-id pub-id-type="doi">10.1080/17439760.2016.1262613</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Page</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>McKenzie</surname>
              <given-names>JE</given-names>
            </name>
            <name name-style="western">
              <surname>Bossuyt</surname>
              <given-names>PM</given-names>
            </name>
            <name name-style="western">
              <surname>Boutron</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Hoffmann</surname>
              <given-names>TC</given-names>
            </name>
            <name name-style="western">
              <surname>Mulrow</surname>
              <given-names>CD</given-names>
            </name>
            <name name-style="western">
              <surname>Shamseer</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Tetzlaff</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Akl</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Brennan</surname>
              <given-names>SE</given-names>
            </name>
            <name name-style="western">
              <surname>Chou</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Glanville</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Grimshaw</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Hróbjartsson</surname>
              <given-names>Asbjørn</given-names>
            </name>
            <name name-style="western">
              <surname>Lalu</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Loder</surname>
              <given-names>EW</given-names>
            </name>
            <name name-style="western">
              <surname>Mayo-Wilson</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>McDonald</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>McGuinness</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Stewart</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Thomas</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tricco</surname>
              <given-names>AC</given-names>
            </name>
            <name name-style="western">
              <surname>Welch</surname>
              <given-names>VA</given-names>
            </name>
            <name name-style="western">
              <surname>Whiting</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The PRISMA 2020 statement: an updated guideline for reporting systematic reviews</article-title>
          <source>BMJ</source>
          <year>2021</year>
          <month>03</month>
          <day>29</day>
          <volume>372</volume>
          <fpage>n71</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bmj.com/lookup/pmidlookup?view=long&#38;pmid=33782057"/>
          </comment>
          <pub-id pub-id-type="doi">10.1136/bmj.n71</pub-id>
          <pub-id pub-id-type="medline">33782057</pub-id>
          <pub-id pub-id-type="pmcid">PMC8005924</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bianchi</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Morelli</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Baiocco</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Chirumbolo</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Psychometric properties of the Sexting Motivations Questionnaire for adolescents and young adults</article-title>
          <source>Rassegna di Psicologia</source>
          <year>2016</year>
          <volume>35</volume>
          <issue>3</issue>
          <fpage>5</fpage>
          <lpage>18</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dir</surname>
              <given-names>AL</given-names>
            </name>
            <name name-style="western">
              <surname>Coskunpinar</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Steiner</surname>
              <given-names>JL</given-names>
            </name>
            <name name-style="western">
              <surname>Cyders</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Understanding differences in sexting behaviors across gender, relationship status, and sexual identity, and the role of expectancies in sexting</article-title>
          <source>Cyberpsychol Behav Soc Netw</source>
          <year>2013</year>
          <month>08</month>
          <volume>16</volume>
          <issue>8</issue>
          <fpage>568</fpage>
          <lpage>74</lpage>
          <pub-id pub-id-type="doi">10.1089/cyber.2012.0545</pub-id>
          <pub-id pub-id-type="medline">23675996</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gámez-Guadix</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Almendros</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Borrajo</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Calvete</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Prevalence and association of sexting and online sexual victimization among Spanish adults</article-title>
          <source>Sex Res Soc Policy</source>
          <year>2015</year>
          <month>3</month>
          <day>14</day>
          <volume>12</volume>
          <issue>2</issue>
          <fpage>145</fpage>
          <lpage>154</lpage>
          <pub-id pub-id-type="doi">10.1007/s13178-015-0186-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Weisskirch</surname>
              <given-names>RS</given-names>
            </name>
            <name name-style="western">
              <surname>Delevi</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>“Sexting” and adult romantic attachment</article-title>
          <source>Computers in Human Behavior</source>
          <year>2011</year>
          <month>09</month>
          <volume>27</volume>
          <issue>5</issue>
          <fpage>1697</fpage>
          <lpage>1701</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2011.02.008</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Henry</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Powell</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Technology-facilitated sexual violence: a literature review of empirical research</article-title>
          <source>Trauma Violence Abuse</source>
          <year>2018</year>
          <month>04</month>
          <day>16</day>
          <volume>19</volume>
          <issue>2</issue>
          <fpage>195</fpage>
          <lpage>208</lpage>
          <pub-id pub-id-type="doi">10.1177/1524838016650189</pub-id>
          <pub-id pub-id-type="medline">27311818</pub-id>
          <pub-id pub-id-type="pii">1524838016650189</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Muñoz-Fernández</surname>
              <given-names>Noelia</given-names>
            </name>
            <name name-style="western">
              <surname>Del Rey</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Mora-Merchán</surname>
              <given-names>Joaquín A</given-names>
            </name>
            <name name-style="western">
              <surname>Elipe</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Sexual diversity bullying and cyberbullying questionnaires: an inclusive approach to measure sexuality-based bullying</article-title>
          <source>J Homosex</source>
          <year>2024</year>
          <month>10</month>
          <day>14</day>
          <volume>71</volume>
          <issue>12</issue>
          <fpage>2740</fpage>
          <lpage>2763</lpage>
          <pub-id pub-id-type="doi">10.1080/00918369.2023.2260922</pub-id>
          <pub-id pub-id-type="medline">37756388</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Powell</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Henry</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Flynn</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Scott</surname>
              <given-names>AJ</given-names>
            </name>
          </person-group>
          <article-title>Image-based sexual abuse: the extent, nature, and predictors of perpetration in a community sample of Australian residents</article-title>
          <source>Computers in Human Behavior</source>
          <year>2019</year>
          <month>03</month>
          <volume>92</volume>
          <fpage>393</fpage>
          <lpage>402</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2018.11.009</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Whittle</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Hamilton-Giachritsis</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Beech</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Collings</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>A review of young people's vulnerabilities to online grooming</article-title>
          <source>Aggression and Violent Behavior</source>
          <year>2013</year>
          <month>1</month>
          <volume>18</volume>
          <issue>1</issue>
          <fpage>135</fpage>
          <lpage>146</lpage>
          <pub-id pub-id-type="doi">10.1016/j.avb.2012.11.008</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gámez-Guadix</surname>
              <given-names>Manuel</given-names>
            </name>
            <name name-style="western">
              <surname>De Santisteban</surname>
              <given-names>P</given-names>
            </name>
            <collab>Alcazar</collab>
          </person-group>
          <article-title>The construction and psychometric properties of the questionnaire for online sexual solicitation and interaction of minors with adults</article-title>
          <source>Sex Abuse</source>
          <year>2018</year>
          <month>12</month>
          <day>18</day>
          <volume>30</volume>
          <issue>8</issue>
          <fpage>975</fpage>
          <lpage>991</lpage>
          <pub-id pub-id-type="doi">10.1177/1079063217724766</pub-id>
          <pub-id pub-id-type="medline">28821214</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Borrajo</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Gámez-Guadix</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pereda</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Calvete</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>The development and validation of the cyber dating abuse questionnaire among young couples</article-title>
          <source>Computers in Human Behavior</source>
          <year>2015</year>
          <month>07</month>
          <volume>48</volume>
          <fpage>358</fpage>
          <lpage>365</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2015.01.063</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Powell</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Henry</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Technology-facilitated sexual violence victimization: results from an online survey of Australian adults</article-title>
          <source>J Interpers Violence</source>
          <year>2019</year>
          <month>09</month>
          <day>03</day>
          <volume>34</volume>
          <issue>17</issue>
          <fpage>3637</fpage>
          <lpage>3665</lpage>
          <pub-id pub-id-type="doi">10.1177/0886260516672055</pub-id>
          <pub-id pub-id-type="medline">27697966</pub-id>
          <pub-id pub-id-type="pii">0886260516672055</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>del Rey</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ojeda</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Casas</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Validation of the Sexting Behavior and Motives Questionnaire (SBM-Q)</article-title>
          <source>Psicothema</source>
          <year>2021</year>
          <month>05</month>
          <day>01</day>
          <volume>33</volume>
          <issue>2</issue>
          <fpage>287</fpage>
          <lpage>295</lpage>
          <pub-id pub-id-type="doi">10.7334/psicothema2020.207</pub-id>
          <pub-id pub-id-type="medline">33879302</pub-id>
          <pub-id pub-id-type="pii">4675</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>HJ</given-names>
            </name>
            <name name-style="western">
              <surname>Mori</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Van Ouytsel</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Madigan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Temple</surname>
              <given-names>JR</given-names>
            </name>
          </person-group>
          <article-title>Adolescent sexting involvement over 4 years and associations with sexual activity</article-title>
          <source>J Adolesc Health</source>
          <year>2019</year>
          <month>12</month>
          <volume>65</volume>
          <issue>6</issue>
          <fpage>738</fpage>
          <lpage>744</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/31277988"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.jadohealth.2019.04.026</pub-id>
          <pub-id pub-id-type="medline">31277988</pub-id>
          <pub-id pub-id-type="pii">S1054-139X(19)30247-2</pub-id>
          <pub-id pub-id-type="pmcid">PMC6874725</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lucić</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Baćak</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Štulhofer</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The role of peer networks in adolescent pornography use and sexting in Croatia</article-title>
          <source>Journal of Children and Media</source>
          <year>2019</year>
          <month>07</month>
          <day>10</day>
          <volume>14</volume>
          <issue>1</issue>
          <fpage>110</fpage>
          <lpage>127</lpage>
          <pub-id pub-id-type="doi">10.1080/17482798.2019.1637356</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brown</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Hegarty</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Development and validation of the TAR Scale: a measure of technology-facilitated abuse in relationships</article-title>
          <source>Computers in Human Behavior Reports</source>
          <year>2021</year>
          <month>01</month>
          <volume>3</volume>
          <fpage>100059</fpage>
          <pub-id pub-id-type="doi">10.1016/j.chbr.2021.100059</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cornelius</surname>
              <given-names>TL</given-names>
            </name>
            <name name-style="western">
              <surname>Bell</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Kistler</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Drouin</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Consensual sexting among college students: the interplay of coercion and intimate partner aggression in perceived consequences of sexting</article-title>
          <source>Int J Environ Res Public Health</source>
          <year>2020</year>
          <month>09</month>
          <day>29</day>
          <volume>17</volume>
          <issue>19</issue>
          <fpage>7141</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.mdpi.com/resolver?pii=ijerph17197141"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/ijerph17197141</pub-id>
          <pub-id pub-id-type="medline">33003567</pub-id>
          <pub-id pub-id-type="pii">ijerph17197141</pub-id>
          <pub-id pub-id-type="pmcid">PMC7579237</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gámez-Guadix</surname>
              <given-names>Manuel</given-names>
            </name>
            <name name-style="western">
              <surname>De Santisteban</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Wachs</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Unraveling cyber sexual abuse of minors: psychometrics properties of the Multidimensional Online Grooming Questionnaire and prevalence by sex and age</article-title>
          <source>Child Abuse Negl</source>
          <year>2021</year>
          <month>10</month>
          <volume>120</volume>
          <fpage>105250</fpage>
          <pub-id pub-id-type="doi">10.1016/j.chiabu.2021.105250</pub-id>
          <pub-id pub-id-type="medline">34399230</pub-id>
          <pub-id pub-id-type="pii">S0145-2134(21)00323-9</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harper</surname>
              <given-names>CA</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Leach</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Daruwala</surname>
              <given-names>NA</given-names>
            </name>
            <name name-style="western">
              <surname>Fido</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Development and validation of the Beliefs About Revenge Pornography Questionnaire</article-title>
          <source>Sex Abuse</source>
          <year>2023</year>
          <month>09</month>
          <day>05</day>
          <volume>35</volume>
          <issue>6</issue>
          <fpage>748</fpage>
          <lpage>783</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.sagepub.com/doi/10.1177/10790632221082663?url_ver=Z39.88-2003&#38;rfr_id=ori:rid:crossref.org&#38;rfr_dat=cr_pub  0pubmed"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/10790632221082663</pub-id>
          <pub-id pub-id-type="medline">35382636</pub-id>
          <pub-id pub-id-type="pmcid">PMC10399101</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sánchez</surname>
              <given-names>Virginia</given-names>
            </name>
            <name name-style="western">
              <surname>Muñoz-Fernández</surname>
              <given-names>Noelia</given-names>
            </name>
            <name name-style="western">
              <surname>Vega-Gea</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Peer sexual cybervictimization in adolescents: development and validation of a scale</article-title>
          <source>Int J Clin Health Psychol</source>
          <year>2017</year>
          <month>05</month>
          <volume>17</volume>
          <issue>2</issue>
          <fpage>171</fpage>
          <lpage>179</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S1697-2600(17)30022-4"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.ijchp.2017.04.001</pub-id>
          <pub-id pub-id-type="medline">30487892</pub-id>
          <pub-id pub-id-type="pii">S1697-2600(17)30022-4</pub-id>
          <pub-id pub-id-type="pmcid">PMC6220920</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>López-Cepero</surname>
              <given-names>Javier</given-names>
            </name>
            <name name-style="western">
              <surname>Vallejos-Saldarriaga</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Merino-García</surname>
              <given-names>María</given-names>
            </name>
          </person-group>
          <article-title>Digital intimate partner violence among Peruvian youths: validation of an instrument and a theoretical proposal</article-title>
          <source>J Interpers Violence</source>
          <year>2021</year>
          <month>06</month>
          <day>03</day>
          <volume>36</volume>
          <issue>11-12</issue>
          <fpage>5167</fpage>
          <lpage>5185</lpage>
          <pub-id pub-id-type="doi">10.1177/0886260518803610</pub-id>
          <pub-id pub-id-type="medline">30280639</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oswald</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Lopes</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Skoda</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Hesse</surname>
              <given-names>CL</given-names>
            </name>
            <name name-style="western">
              <surname>Pedersen</surname>
              <given-names>CL</given-names>
            </name>
          </person-group>
          <article-title>I'll show you mine so you'll show me yours: motivations and personality variables in photographic exhibitionism</article-title>
          <source>J Sex Res</source>
          <year>2020</year>
          <month>07</month>
          <day>18</day>
          <volume>57</volume>
          <issue>5</issue>
          <fpage>597</fpage>
          <lpage>609</lpage>
          <pub-id pub-id-type="doi">10.1080/00224499.2019.1639036</pub-id>
          <pub-id pub-id-type="medline">31318606</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Penado</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Rodicio-García</surname>
              <given-names>María Luisa</given-names>
            </name>
            <name name-style="western">
              <surname>Marcos Cuesta</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Corrás</surname>
              <given-names>Tania</given-names>
            </name>
          </person-group>
          <article-title>Construction and validation of the intimate images diffusion scale among adolescents</article-title>
          <source>Front Psychol</source>
          <year>2019</year>
          <month>6</month>
          <day>28</day>
          <volume>10</volume>
          <fpage>1485</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/31316439"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fpsyg.2019.01485</pub-id>
          <pub-id pub-id-type="medline">31316439</pub-id>
          <pub-id pub-id-type="pmcid">PMC6611224</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>McMahon</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Christensen</surname>
              <given-names>MC</given-names>
            </name>
            <name name-style="western">
              <surname>Todić</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Transformative justice and restorative justice approaches to campus sexual assault: a scoping review</article-title>
          <source>International journal of restorative justice</source>
          <year>2024</year>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>12</fpage>
          <lpage>42</lpage>
          <pub-id pub-id-type="doi">10.5553/tijrj.000156</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gomes</surname>
              <given-names>AB</given-names>
            </name>
            <name name-style="western">
              <surname>Sultan</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Problematizing content moderation by social media platforms and its impact on digital harm reduction</article-title>
          <source>Harm Reduct J</source>
          <year>2024</year>
          <month>11</month>
          <day>09</day>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>194</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://harmreductionjournal.biomedcentral.com/articles/10.1186/s12954-024-01104-9"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12954-024-01104-9</pub-id>
          <pub-id pub-id-type="medline">39516798</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12954-024-01104-9</pub-id>
          <pub-id pub-id-type="pmcid">PMC11549828</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gámez-Guadix</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sorrel</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Martínez-Bacaicoa</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Technology-facilitated sexual violence perpetration and victimization among adolescents: a network analysis</article-title>
          <source>Sex Res Soc Policy</source>
          <year>2022</year>
          <month>12</month>
          <day>09</day>
          <volume>20</volume>
          <issue>3</issue>
          <fpage>1000</fpage>
          <lpage>1012</lpage>
          <pub-id pub-id-type="doi">10.1007/s13178-022-00775-y</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Champion</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Oswald</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Khera</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Pedersen</surname>
              <given-names>CL</given-names>
            </name>
          </person-group>
          <article-title>Examining the gendered impacts of technology-facilitated sexual violence: a mixed methods approach</article-title>
          <source>Arch Sex Behav</source>
          <year>2022</year>
          <month>04</month>
          <day>18</day>
          <volume>51</volume>
          <issue>3</issue>
          <fpage>1607</fpage>
          <lpage>1624</lpage>
          <pub-id pub-id-type="doi">10.1007/s10508-021-02226-y</pub-id>
          <pub-id pub-id-type="medline">35182285</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10508-021-02226-y</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>EPH</given-names>
            </name>
            <name name-style="western">
              <surname>Wong</surname>
              <given-names>JYH</given-names>
            </name>
            <name name-style="western">
              <surname>Fong</surname>
              <given-names>DYT</given-names>
            </name>
          </person-group>
          <article-title>An emerging risk factor of sexual abuse: the use of smartphone dating applications</article-title>
          <source>Sex Abuse</source>
          <year>2018</year>
          <month>06</month>
          <day>02</day>
          <volume>30</volume>
          <issue>4</issue>
          <fpage>343</fpage>
          <lpage>366</lpage>
          <pub-id pub-id-type="doi">10.1177/1079063216672168</pub-id>
          <pub-id pub-id-type="medline">27698090</pub-id>
          <pub-id pub-id-type="pii">1079063216672168</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pak</surname>
              <given-names>SHL</given-names>
            </name>
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>KWY</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>EPH</given-names>
            </name>
          </person-group>
          <article-title>Measuring technology-facilitated sexual violence and abuse in the Chinese context: development study and content validity analysis</article-title>
          <source>JMIR Form Res</source>
          <year>2024</year>
          <month>11</month>
          <day>19</day>
          <volume>8</volume>
          <fpage>e65199</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://formative.jmir.org/2024//e65199/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/65199</pub-id>
          <pub-id pub-id-type="medline">39561365</pub-id>
          <pub-id pub-id-type="pii">v8i1e65199</pub-id>
          <pub-id pub-id-type="pmcid">PMC11615559</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Balsam</surname>
              <given-names>KF</given-names>
            </name>
            <name name-style="western">
              <surname>Beadnell</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Molina</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>The Daily Heterosexist Experiences Questionnaire: measuring minority stress among lesbian, gay, bisexual, and transgender adults</article-title>
          <source>Meas Eval Couns Dev</source>
          <year>2013</year>
          <month>01</month>
          <day>09</day>
          <volume>46</volume>
          <issue>1</issue>
          <fpage>3</fpage>
          <lpage>25</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/24058262"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/0748175612449743</pub-id>
          <pub-id pub-id-type="medline">24058262</pub-id>
          <pub-id pub-id-type="pmcid">PMC3777637</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dyar</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Messinger</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Newcomb</surname>
              <given-names>ME</given-names>
            </name>
            <name name-style="western">
              <surname>Byck</surname>
              <given-names>GR</given-names>
            </name>
            <name name-style="western">
              <surname>Dunlap</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Whitton</surname>
              <given-names>SW</given-names>
            </name>
          </person-group>
          <article-title>Development and initial validation of three culturally sensitive measures of intimate partner violence for sexual and gender minority populations</article-title>
          <source>J Interpers Violence</source>
          <year>2021</year>
          <month>08</month>
          <day>05</day>
          <volume>36</volume>
          <issue>15-16</issue>
          <fpage>NP8824</fpage>
          <lpage>NP8851</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/31057032"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/0886260519846856</pub-id>
          <pub-id pub-id-type="medline">31057032</pub-id>
          <pub-id pub-id-type="pmcid">PMC6829031</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Boateng</surname>
              <given-names>GO</given-names>
            </name>
            <name name-style="western">
              <surname>Neilands</surname>
              <given-names>TB</given-names>
            </name>
            <name name-style="western">
              <surname>Frongillo</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Melgar-Quiñonez</surname>
              <given-names>Hugo R</given-names>
            </name>
            <name name-style="western">
              <surname>Young</surname>
              <given-names>SL</given-names>
            </name>
          </person-group>
          <article-title>Best practices for developing and validating scales for health, social, and behavioral research: a primer</article-title>
          <source>Front Public Health</source>
          <year>2018</year>
          <month>6</month>
          <day>11</day>
          <volume>6</volume>
          <fpage>149</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/29942800"/>
          </comment>
          <pub-id pub-id-type="doi">10.3389/fpubh.2018.00149</pub-id>
          <pub-id pub-id-type="medline">29942800</pub-id>
          <pub-id pub-id-type="pmcid">PMC6004510</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sandoval</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>de Almeida Vau</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Solaas</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rodrigues</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Threat of deepfakes to the criminal justice system: a systematic review</article-title>
          <source>Crime Sci</source>
          <year>2024</year>
          <month>11</month>
          <day>17</day>
          <volume>13</volume>
          <issue>1</issue>
          <fpage>41</fpage>
          <lpage>46</lpage>
          <pub-id pub-id-type="doi">10.1186/s40163-024-00239-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Christl</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pham</surname>
              <given-names>KT</given-names>
            </name>
            <name name-style="western">
              <surname>Rosenthal</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>DePrince</surname>
              <given-names>AP</given-names>
            </name>
          </person-group>
          <article-title>When institutions harm those who depend on them: a scoping review of institutional betrayal</article-title>
          <source>Trauma Violence Abuse</source>
          <year>2024</year>
          <month>10</month>
          <day>22</day>
          <volume>25</volume>
          <issue>4</issue>
          <fpage>2797</fpage>
          <lpage>2813</lpage>
          <pub-id pub-id-type="doi">10.1177/15248380241226627</pub-id>
          <pub-id pub-id-type="medline">38258307</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kromann</surname>
              <given-names>SB</given-names>
            </name>
            <name name-style="western">
              <surname>Flynn</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Bystander intervention in image-based sexual abuse: a scoping review</article-title>
          <source>Trauma Violence Abuse</source>
          <year>2025</year>
          <month>06</month>
          <day>27</day>
          <fpage>15248380251343191</fpage>
          <pub-id pub-id-type="doi">10.1177/15248380251343191</pub-id>
          <pub-id pub-id-type="medline">40574536</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oram</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Sexual violence and mental health</article-title>
          <source>Epidemiol Psychiatr Sci</source>
          <year>2019</year>
          <month>04</month>
          <day>12</day>
          <volume>28</volume>
          <issue>6</issue>
          <fpage>592</fpage>
          <lpage>593</lpage>
          <pub-id pub-id-type="doi">10.1017/s2045796019000106</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
