<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article article-type="review-article" dtd-version="2.3" xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Public Health Rev</journal-id>
<journal-title>Public Health Reviews</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Public Health Rev</abbrev-journal-title>
<issn pub-type="epub">2107-6952</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">1606654</article-id>
<article-id pub-id-type="doi">10.3389/phrs.2024.1606654</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Public Health Archive</subject>
<subj-group>
<subject>Review</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Harnessing Health Information Technology in Domestic Violence in the United States: A Scoping Review</article-title>
<alt-title alt-title-type="left-running-head">Hui et al.</alt-title>
<alt-title alt-title-type="right-running-head">Harnessing HIT for Domestic Violence</alt-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Hui</surname>
<given-names>Vivian</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<xref ref-type="corresp" rid="c001">&#x2a;</xref>
<uri xlink:href="https://loop.frontiersin.org/people/2514258/overview"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Zhang</surname>
<given-names>Bohan</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Jeon</surname>
<given-names>Bomin</given-names>
</name>
<xref ref-type="aff" rid="aff3">
<sup>3</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Wong</surname>
<given-names>Kwan Ching Arkers</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Klem</surname>
<given-names>Mary Lou</given-names>
</name>
<xref ref-type="aff" rid="aff4">
<sup>4</sup>
</xref>
<xref ref-type="fn" rid="fn1">
<sup>&#x2020;</sup>
</xref>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Lee</surname>
<given-names>Young Ji</given-names>
</name>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
</contrib>
</contrib-group>
<aff id="aff1">
<sup>1</sup>
<institution>School of Nursing</institution>, <institution>The Hong Kong Polytechnic University</institution>, <addr-line>Kowloon</addr-line>, <country>Hong Kong SAR, China</country>
</aff>
<aff id="aff2">
<sup>2</sup>
<institution>Health and Community Systems</institution>, <institution>School of Nursing</institution>, <institution>University of Pittsburgh</institution>, <addr-line>Pittsburgh</addr-line>, <addr-line>PA</addr-line>, <country>United States</country>
</aff>
<aff id="aff3">
<sup>3</sup>
<institution>School of Nursing</institution>, <institution>University of Lowa</institution>, <addr-line>Iowa City</addr-line>, <addr-line>IA</addr-line>, <country>United States</country>
</aff>
<aff id="aff4">
<sup>4</sup>
<institution>Health Sciences Library System</institution>, <institution>University of Pittsburgh</institution>, <addr-line>Pittsburgh</addr-line>, <addr-line>PA</addr-line>, <country>United States</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>
<bold>Edited by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1138989/overview">Raquel Lucas</ext-link>, University Porto, Portugal</p>
</fn>
<fn fn-type="edited-by">
<p>
<bold>Reviewed by:</bold> <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2568919/overview">Shirin Shahbazi Sighaldeh</ext-link>, Tehran University of Medical Sciences, Iran</p>
<p>
<ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/2582399/overview">Sara Soares</ext-link>, University Porto, Portugal</p>
</fn>
<corresp id="c001">&#x2a;Correspondence: Vivian Hui, <email>vivianc.hui@polyu.edu.hk</email>
</corresp>
<fn fn-type="present-address" id="fn1">
<label>
<sup>&#x2020;</sup>
</label>
<p>
<bold>Present address:</bold> Mary Lou Klem, Health Sciences Library System, University of Pittsburgh, Pittsburgh, PA, United States</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>21</day>
<month>06</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="collection">
<year>2024</year>
</pub-date>
<volume>45</volume>
<elocation-id>1606654</elocation-id>
<history>
<date date-type="received">
<day>21</day>
<month>09</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>20</day>
<month>05</month>
<year>2024</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2024 Hui, Zhang, Jeon, Wong, Klem and Lee.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Hui, Zhang, Jeon, Wong, Klem and Lee</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. PHR is edited by the Swiss School of Public Health (SSPH&#x2b;) in a partnership with the Association of Schools of Public Health of the European Region (ASPHER)&#x2b;</p>
</license>
</permissions>
<abstract>
<sec>
<title>Objectives</title>
<p>The following scoping review aims to identify and map the existing evidence for HIT interventions among women with DV experiences in the United States. And provide guidance for future research, and facilitate clinical and technical applications for healthcare professionals.</p>
</sec>
<sec>
<title>Methods</title>
<p>Five databases, PubMed, EBSCOhost CINAHL, Ovid APA PsycINFO, Scopus and Google Scholar, were searched from date of inception to May 2023. Reviewers extracted classification of the intervention, descriptive details, and intervention outcomes, including physical safety, psychological, and technical outcomes, based on representations in the included studies.</p>
</sec>
<sec>
<title>Results</title>
<p>A total of 24 studies were included, identifying seven web-based interventions and four types of abuse. A total of five studies reported safety outcomes related to physical health. Three studies reported depression, anxiety, and post-traumatic stress disorder as psychological health outcomes. The effectiveness of technology interventions was assessed in eight studies.</p>
</sec>
<sec>
<title>Conclusion</title>
<p>Domestic violence is a major public health issue, and research has demonstrated the tremendous potential of health information technology, the use of which can support individuals, families, and communities of domestic violence survivors.</p>
</sec>
</abstract>
<kwd-group>
<kwd>health information technology</kwd>
<kwd>domestic violence</kwd>
<kwd>scoping review</kwd>
<kwd>women&#x2019;s health</kwd>
<kwd>domestic abuse</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<title>Introduction</title>
<p>Domestic violence (DV) is a significant yet frequently underreported public health concern that menaces individuals&#x2019; physical and mental wellbeing globally [<xref ref-type="bibr" rid="B1">1</xref>]. As defined by the United States (U.S.) Office on Violence against Women, DV encompasses a pattern of abusive behavior within any intimate relationship that one partner uses to sustain or maintain control over another partner [<xref ref-type="bibr" rid="B2">2</xref>]. An array of abuse that could happen within a household includes physical, psychological, sexual, and financial towards the children, elderly, or intimate partner [<xref ref-type="bibr" rid="B2">2</xref>]. One in three women encounters physical violence from an intimate partner every minute, resulting in approximately 10 million abuse survivors annually in the U.S. [<xref ref-type="bibr" rid="B3">3</xref>]. Moreover, DV exerts a significant financial burden with an estimated cost of $103,767 per female affected by intimate partner violence (IPV) [<xref ref-type="bibr" rid="B4">4</xref>].</p>
<p>Compared to men, women exhibit a significantly elevated vulnerability to experiencing DV in a lifetime [<xref ref-type="bibr" rid="B5">5</xref>]. Persistent experience of DV is associated with an array of detrimental effects on physical and mental health, including hypertension, diabetes [<xref ref-type="bibr" rid="B6">6</xref>], depression, anxiety, and post-traumatic stress disorder (PTSD) [<xref ref-type="bibr" rid="B7">7</xref>&#x2013;<xref ref-type="bibr" rid="B9">9</xref>], AIDS/HIV infection [<xref ref-type="bibr" rid="B10">10</xref>], sleep disturbances [<xref ref-type="bibr" rid="B11">11</xref>], and suicide attempts [<xref ref-type="bibr" rid="B12">12</xref>]. Nevertheless, the profound impact of DV on women is often underestimated due to its intricate nature, the prevalence of revictimization, and intergenerational victimization [<xref ref-type="bibr" rid="B13">13</xref>].</p>
<p>Intervention studies are pivotal in empowering survivors to overcome their challenges and enhancing their physical and mental wellbeing. However, conducting studies involving women with DV experiences often encountered substantial challenges. Previous research highlighted the difficulties faced when approaching DV survivors in person due to societal stigma, shame, guilt, alienation, and judgment [<xref ref-type="bibr" rid="B14">14</xref>&#x2013;<xref ref-type="bibr" rid="B16">16</xref>]. Traditional intervention methods such as focus group, one-to-one in-person interviews, and individual/group therapy require substantial time for participants&#x2019; recruitment and are susceptible to confidentiality issues among participants. Recently, health information technology (HIT) has been gaining traction in DV research, such as developing more precise and effective screening tools and improving the overall wellbeing for DV survivors. HIT refers to the utilization and application of information processing that includes both computer hardware and software, across the spectrum of data storing, retrieving, sharing, and using healthcare information, health-related data from both patients or healthcare providers, and knowledge for effective healthcare communication and decision-making in certain disease journey [<xref ref-type="bibr" rid="B17">17</xref>]. HIT interventions (e.g., guided online support) offer an anonymous environment that allows survivors to access information and seek help without the time and location constraints [<xref ref-type="bibr" rid="B18">18</xref>]. Women with DV experiences face additional vulnerabilities due to limited access to resources and the societal-asserted feminine duties on childcare and housework tasks. The use of HIT intervention allows these women to reach resources and seek help from the virtual space without restrictions. Also, studies indicated that women survivors tend to be more emotional and prefer text-based communication with healthcare providers as it provides them with a sense of anonymity and security [<xref ref-type="bibr" rid="B19">19</xref>].</p>
<p>With HIT accessible through mobile devices, women may easily acquire a wealth of health information and increase their likelihood of disclosing their abusive experience [<xref ref-type="bibr" rid="B20">20</xref>]. Studies also show the use of HIT interventions can improve health outcomes among the DV population. However, to the best of our knowledge, current reviews have only examined HIT interventions for mental health [<xref ref-type="bibr" rid="B21">21</xref>], child maltreatment [<xref ref-type="bibr" rid="B22">22</xref>], and peer aggression [<xref ref-type="bibr" rid="B23">23</xref>]. Although the application of HIT in the DV population has surged unprecedentedly, no evidence summarized the current state of the science of HIT interventions particularly in women with DV experiences.</p>
<p>As such, this scoping review aims to identify and map the available evidence for HIT interventions among women with DV experiences in the United States. This review can guide future research and advance the clinical and technological applications available to healthcare professionals.</p>
</sec>
<sec sec-type="methods" id="s2">
<title>Methods</title>
<sec id="s2-1">
<title>Search Strategy</title>
<p>Four bibliographic databases were searched from date of inception to May 2023 (PubMed, EBSCOhost CINAHL, Ovid APA PsycINFO, Scopus). Initial searches were run in Oct 2018 and search updates were run in May 2023. Searches were also run in Google Scholar. To ensure comprehensive coverage, a health sciences librarian (blinded) designed the PubMed search strategy and then adapted that search strategy for use in other databases. The search strings utilized a combination of natural language and, where applicable, controlled vocabulary to cover the concepts of &#x201c;technology&#x201d; and &#x201c;family or domestic violence.&#x201d; In instances where possible, the search results were limited to articles published in the English language. The full list of search strings from different databases is shown in <xref ref-type="table" rid="T1">Table 1</xref>.</p>
<table-wrap id="T1" position="float">
<label>TABLE 1</label>
<caption>
<p>Search string from different search engines (Worldwide publications, from date of inception to May 2023).</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Search engine</th>
<th align="center">Search string</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">PubMed</td>
<td align="left">(("Mobile Applications"[Mesh] OR "Internet"[Mesh] OR "Cell Phone"[Mesh] OR "Videoconferencing"[Mesh] OR "Crowdsourcing"[Mesh] OR smartphone[tiab] OR app[tiab])<break/>AND ("Intimate Partner Violence"[Mesh] OR "Gender-Based Violence"[Mesh] OR "Domestic Violence"[Mesh] OR intimate partner violence[tiab] OR domestic violence[tiab] OR child abuse[tiab] OR spouse abuse[tiab] OR elder abuse [tiab]))</td>
</tr>
<tr>
<td align="left">PsycINFO</td>
<td align="left">((online social networks/OR social media/OR online community/OR mobile application&#x2a;.ti,ab. OR exp mobile devices/OR text messaging/OR computer applications/OR exp electronic communication/OR (smartphone&#x2a; or app).ti,ab.)<break/>AND (domestic violence/or child abuse/or elder abuse/or emotional abuse/or intimate partner violence/or marital conflict/or partner abuse/OR (domestic abuse or domestic violence or intimate partner violence or child abuse or spouse abuse or elder abuse).ti,ab.))<break/>NOT (0200.pt. OR 0240.pt. OR 0280.pt. OR 0400.pt.)</td>
</tr>
<tr>
<td align="left">CINAHL</td>
<td align="left">((TI mobile application&#x2a; OR AB mobile application&#x2a; OR TI app OR AB app OR TI smartphone&#x2a; OR AB smartphone&#x2a; OR TI facebook OR AB facebook OR TI Twitter OR AB Twitter OR TI social media OR AB social media OR TI social network&#x2a; OR AB social network&#x2a;<break/>OR MH "Mobile Applications" OR MH "Cellular Phone" OR MH "Text Messaging" OR MH "Smartphone&#x2b;" OR MH "Crowdsourcing" OR MH "Online Services")<break/>AND (TI domestic violence OR AB domestic violence OR TI domestic abuse OR AB domestic abuse OR TI intimate partner violence OR AB intimate partner violence OR TI spouse abuse OR AB spouse abuse OR TI child abuse OR AB child abuse OR AB elder abuse OR MH "Domestic Violence&#x2b;"))<break/>NOT PT dissertation</td>
</tr>
<tr>
<td align="left">Scopus</td>
<td align="left">("domestic violence" OR "domestic abuse" OR "intimate partner violence" OR "spouse abuse" OR "child abuse" OR "partner abuse" OR "gender based violence" OR &#x201c;elder abuse&#x201d;)<break/>("mobile application&#x2a;" OR app OR smartphone&#x2a; OR "cell&#x2a;phone&#x2a;" OR "text messag&#x2a;" OR "smartphone&#x2a;" OR "crowdsourcing")</td>
</tr>
<tr>
<td align="left">Google Scholar</td>
<td align="left">"Mobile Applications" OR "Internet"OR "Cell Phone" OR "Videoconferencing" OR "Crowdsourcing" OR &#x27;&#x27;smartphone&#x27;&#x27; OR &#x27;&#x27;app&#x27;&#x27; AND "Intimate Partner Violence" OR "Gender-Based Violence" OR &#x201c;Elder abuse&#x201d;</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s2-2">
<title>Definition of DV</title>
<p>In this article, abuse that could happen in a household setting in the United States, including child abuse, IPV and elder abuse, regardless of the relationship between survivors and perpetrators will be considered as DV. Specifically, DV can occur between a parent and child, or siblings, while IPV can only occur between romantic partners who may or may not be living together in the same household.</p>
</sec>
<sec id="s2-3">
<title>Eligibility Criteria</title>
<p>The inclusion criteria include 1) health information technology interventions applied 2) women with DV experiences (including IPV, child abuse and elder abuse) 3) published between January 2008 and May 2023. Studies related to dating violence and social media were excluded because the settings could be out of the household in the United States. Editorials, commentaries, non-peer reviewed articles, study protocols, conference abstracts, and non-English articles were also excluded.</p>
</sec>
<sec id="s2-4">
<title>Review Process</title>
<p>In the initial phase (<xref ref-type="fig" rid="F1">Figure 1</xref>), articles were assessed based on their titles and abstracts, specifically examining their relevance to technology interventions for DV. Articles did not include women, or not conducted in the United States were not retrieved. Subsequently, in the second stage, full-text documents were obtained and subjected to qualitative review, guided by inclusion criteria. Prior to screening, a training session was conducted where reviewers evaluated a set of sample records together. A 75% inter-rater agreement was achieved among reviewers on this initial set before proceeding to the formal screening. During the formal screening, two independent reviewers examined the titles and abstracts of the records and categorized them as &#x201c;included,&#x201d; &#x201c;excluded&#x201d; or &#x201c;uncertain&#x201d; based on the relevancy to HIT interventions for DV. The reasons for exclusions include not related to HIT intervention, review articles, or any commentary articles. For any uncertain records, a senior researcher (BLINDED) resolved the status of the record.</p>
<fig id="F1" position="float">
<label>FIGURE 1</label>
<caption>
<p>Preferred reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) flow diagram (Worldwide publications, from date of inception to May 2023).</p>
</caption>
<graphic xlink:href="phrs-45-1606654-g001.tif"/>
</fig>
</sec>
<sec id="s2-5">
<title>Data Abstraction</title>
<p>Two reviewers independently charted data from each eligible articles. Any disagreements were resolved through group discussions or adjudication by a third author. The variables in the spreadsheet were organized into three categories: 1) classification of the intervention (including study purpose, technology, type of intervention, and abuse), 2) descriptive details (such as sample size, location, and settings), and 3) intervention outcomes (including physical safety, psychological, and technological outcomes). This scoping review followed the guidelines from Arksey and O&#x2019;Malley [<xref ref-type="bibr" rid="B24">24</xref>].</p>
</sec>
</sec>
<sec sec-type="results" id="s3">
<title>Results</title>
<p>A total of 3,830 articles were identified from four academic databases, as well as from Google Scholar. 2,204 duplicates and irrelevant articles were removed, and 72 articles underwent a more detailed screening based on the abstract and titles. 48 articles were subsequently removed due to irrelevance to the research questions or ineligibility to the predefined criteria (e.g., non-intervention studies, exploratory studies conducted in non-U.S. territory). Finally, twenty-four articles (N &#x3d; 24) met all of the inclusion criteria and were included in this review (<xref ref-type="fig" rid="F1">Figure 1</xref>). <xref ref-type="table" rid="T2">Table 2</xref> listed the participant characteristics, purpose of study, purpose of intervention and types of technology, while <xref ref-type="table" rid="T3">Table 3</xref> described the outcomes of interventions measured across studies.</p>
<table-wrap id="T2" position="float">
<label>TABLE 2</label>
<caption>
<p>Literature summary of critical findings among 24 studies from 2008 to 2023 (Worldwide publications, from date of inception to May 2023).</p>
</caption>
<table>
<thead valign="top">
<tr>
<th rowspan="2" align="left">No.</th>
<th rowspan="2" align="center">Authors (Year)</th>
<th rowspan="2" align="center">Purposes of the study</th>
<th rowspan="2" align="center">Types of technology</th>
<th rowspan="2" align="center">Purpose of intervention</th>
<th colspan="4" align="center">Participants characteristics</th>
</tr>
<tr>
<th align="center">Sample size</th>
<th align="center">Location</th>
<th align="center">Races</th>
<th align="center">Age (mean)</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">1</td>
<td align="left">Bacchus, et al (2016)</td>
<td align="left">Explore perinatal home visitor&#x2019;s and women&#x2019;s perceptions and experiences of the Domestic Violence Enhanced Home Visitation Program (DOVE) using mHealth technology or paper-based method.</td>
<td align="left">Domestic Violence Enhanced Home Visitation Program (DOVE) mHealth Technology</td>
<td align="left">Exploration</td>
<td align="center">N &#x3d; 26</td>
<td align="left">Metropolitan area</td>
<td align="left">White, <break/>Black, <break/>Mixed</td>
<td align="center">20&#x2013;27 mainly</td>
</tr>
<tr>
<td align="left">2</td>
<td align="left">Bloom, et al (2014)</td>
<td align="left">Evaluate the feasibility of Internet-based safety planning for rural and urban abused pregnant women and practicality of recruitment procedures for future trials.</td>
<td align="left">Online safety planning intervention</td>
<td align="left">Prevention</td>
<td align="center">N &#x3d; 46</td>
<td align="left">N/A</td>
<td align="left">White</td>
<td align="center">25</td>
</tr>
<tr>
<td align="left">3</td>
<td align="left">Blumling, et al (2018)</td>
<td align="left">Evaluate a standardized patient simulation experience depicting a victim of IPV on undergraduate nursing student knowledge and confidence in assessment and intervention of IPV</td>
<td align="left">Standardized patient simulation</td>
<td align="left">Education</td>
<td align="center">N &#x3d; 57</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="center">N/A</td>
</tr>
<tr>
<td align="left">4</td>
<td align="left">Choo, et al (2016)</td>
<td align="left">Examine the feasibility and acceptability of a computer-based program and telephone booster for drug-using women reporting IPV.</td>
<td align="left">Web-based BSAFER intervention and booster phone calls</td>
<td align="left">Education</td>
<td align="center">N &#x3d; 40</td>
<td align="left">Metropolitan area</td>
<td align="left">Non-white, Hispanic/Latino</td>
<td align="center">25</td>
</tr>
<tr>
<td align="left">5</td>
<td align="left">Constantino, et al (2015)</td>
<td align="left">Compare the effectiveness of online, face-to-face and waitlist control intervention of the HELPP based on personal, interpersonal and community level</td>
<td align="left">Online, face-to-face, Wait-list control HELPP intervention<break/>&#x201c;Email&#x201d;</td>
<td align="left">Education</td>
<td align="center">N &#x3d; 32</td>
<td align="left">Metropolitan area</td>
<td align="left">White, Black, Asian</td>
<td align="center">40</td>
</tr>
<tr>
<td align="left">6</td>
<td align="left">Eden, et al (2015)</td>
<td align="left">To test the effectiveness of a safety decision aid compared with usual safety planning (control) delivered through a secure website, using a multistate RCT design.</td>
<td align="left">Internet safety decision aid</td>
<td align="left">Prevention</td>
<td align="center">N &#x3d; 708</td>
<td align="left">Metropolitan area</td>
<td align="left">White<break/>Black<break/>Asian<break/>Native American<break/>Hawaiian or Pacific Islander<break/>Other<break/>Multi-racial</td>
<td align="center">33</td>
</tr>
<tr>
<td align="left">7</td>
<td align="left">Ejaz, et al (2017)</td>
<td align="left">Comparing the managers&#x2019; knowledge change after receiving educational online training modules about the background of abuse, screening and reporting abuse.</td>
<td align="left">Online training modules</td>
<td align="left">Education</td>
<td align="center">N &#x3d; 453</td>
<td align="left">Metropolitan area</td>
<td align="left">N/A</td>
<td align="center">N/A</td>
</tr>
<tr>
<td align="left">8</td>
<td align="left">Glass, et al (2017)</td>
<td align="left">To compare safety and mental health outcomes at baseline, 6 months, and 12 months among abused women randomized to (1) a tailored, internet-based safety decision aid or (2) control website.</td>
<td align="left">Internet safety decision aid</td>
<td align="left">Prevention</td>
<td align="center">N &#x3d; 672</td>
<td align="left">Metropolitan area</td>
<td align="left">White<break/>Black<break/>Asian<break/>Native American<break/>Hawaiian or Pacific Islander<break/>Other<break/>Multi-racial</td>
<td align="center">33</td>
</tr>
<tr>
<td align="left">9</td>
<td align="left">Goldman, et al (2019)</td>
<td align="left">Examine the knowledge level and feasibility of using a smartphone application to identify victims of sexual exploitation.</td>
<td align="left">SART START smartphone application</td>
<td align="left">Assessment</td>
<td align="center">N &#x3d; 103</td>
<td align="left">N/A</td>
<td align="left">White<break/>Asian<break/>Black<break/>Other</td>
<td align="center">31&#x2013;40 mainly</td>
</tr>
<tr>
<td align="left">10</td>
<td align="left">Gur, et al (2016)</td>
<td align="left">Explore the use of GPS for domestic violence or Intimate Partner Violence in pretrial programs</td>
<td align="left">GPS</td>
<td align="left">Exploration</td>
<td align="center">N &#x3d; 114</td>
<td align="left">Metropolitan and rural areas</td>
<td align="left">White</td>
<td align="center">70% were 40 or older</td>
</tr>
<tr>
<td align="left">11.</td>
<td align="left">Harris, et al (2009)</td>
<td align="left">Evaluate the costs and effectiveness of promoting online CME about IPV training to physicians.</td>
<td align="left">Free CME online program</td>
<td align="left">Education</td>
<td align="center">N &#x3d; 1869</td>
<td align="left">Metropolitan area</td>
<td align="left">N/A</td>
<td align="center">N/A</td>
</tr>
<tr>
<td align="left">12</td>
<td align="left">Hassija, et al (2010)</td>
<td align="left">To evaluate the effectiveness and feasibility of videoconferencing technology to provide evidence-based treatment to rural domestic violence and sexual assault populations</td>
<td align="left">Videoconferencing</td>
<td align="left">Prevention</td>
<td align="center">N &#x3d; 13</td>
<td align="left">Metropolitan and rural areas</td>
<td align="left">White</td>
<td align="center">30</td>
</tr>
<tr>
<td align="left">13</td>
<td align="left">Ibarra, et al (2014)</td>
<td align="left">To examine &#x201c;styles of surveillance&#x201d; among community corrections officers using Electronic monitoring, by employing a specific and comparative analysis from GPS in DV in the context of pretrial supervision</td>
<td align="left">GPS</td>
<td align="left">Exploration</td>
<td align="center">N &#x3d; 50</td>
<td align="left">Metropolitan and rural areas</td>
<td align="left">N/A</td>
<td align="center">N/A</td>
</tr>
<tr>
<td align="left">14</td>
<td align="left">Jabaley, et al (2011)</td>
<td align="left">Examine the iPhone&#x2122; when used as an assessment tool and an enhancement to an evidence-based, in-home child safety intervention.</td>
<td align="left">iPhone&#x2122;</td>
<td align="left">Assessment</td>
<td align="center">N &#x3d; 3 families</td>
<td align="left">Metropolitan area</td>
<td align="left">N/A</td>
<td align="center">N/A</td>
</tr>
<tr>
<td align="left">15</td>
<td align="left">Lefever, et al (2008)</td>
<td align="left">Assess the feasibility of using cell phone interviews to learn more about the quality of daily parenting and child neglect.</td>
<td align="left">Cell phone interview</td>
<td align="left">Screening</td>
<td align="center">Study 1:N &#x3d; 45<break/>Study 2: N &#x3d; 544</td>
<td align="left">Metropolitan area</td>
<td align="left">African<break/>European<break/>Hispanic, other ethnic</td>
<td align="center">Adolescent mother: 17.5<break/>Adult mother: 26.5</td>
</tr>
<tr>
<td align="left">16</td>
<td align="left">MacLeod, et al (2009)</td>
<td align="left">To assess whether the telemedicine would increase the ability of the rural provider to perform a complete and accurate sexual assault examination.</td>
<td align="left">Telemedicine video-conferencing</td>
<td align="left">Assessment</td>
<td align="center">N &#x3d; 42</td>
<td align="left">Rural area</td>
<td align="left">N/A</td>
<td align="center">7</td>
</tr>
<tr>
<td align="left">17</td>
<td align="left">McAndrew, et al (2014)</td>
<td align="left">To determine whether the dentistry&#x2019;s online tutorial on domestic violence is effective for dental students poised to embark on their professional careers</td>
<td align="left">Online tutorial</td>
<td align="left">Education<break/>Prevention<break/>Detection</td>
<td align="center">N &#x3d; 25</td>
<td align="left">Metropolitan area</td>
<td align="left">N/A</td>
<td align="center">N/A</td>
</tr>
<tr>
<td align="left">18</td>
<td align="left">Paranal, et al (2012)</td>
<td align="left">To discuss the benefits and limitations of conducting online organizational trainings from the perspective of participants, including what participants found effective, what challenges were most commonly encountered, and trainee perspectives of the program&#x2019;s overall impact</td>
<td align="left">Online training</td>
<td align="left">Education</td>
<td align="center">N &#x3d; 218</td>
<td align="left">Metropolitan area</td>
<td align="left">N/A</td>
<td align="center">N/A</td>
</tr>
<tr>
<td align="left">19</td>
<td align="left">Rothman, et al (2009)</td>
<td align="left">To assess the proportion of battered women&#x2019;s shelter residents who use e-mail in communication</td>
<td align="left">E-mail</td>
<td align="left">Assessment</td>
<td align="center">N &#x3d; 57</td>
<td align="left">Metropolitan area</td>
<td align="left">White<break/>Black<break/>Hispanic<break/>Asian, others</td>
<td align="center">30</td>
</tr>
<tr>
<td align="left">20</td>
<td align="left">Sargent, et al (2016)</td>
<td align="left">To assess the effects of an online program (Change A Life) designed to educate individuals about children&#x2019;s exposure to domestic violence, and to increase individuals&#x2019; self-efficacy for providing support to children exposed to DV.</td>
<td align="left">Online program</td>
<td align="left">Education<break/>Prevention</td>
<td align="center">N &#x3d; 255</td>
<td align="left">Metropolitan and rural area</td>
<td align="left">White, <break/>Black, <break/>Hispanic<break/>Asian</td>
<td align="center">39</td>
</tr>
<tr>
<td align="left">21</td>
<td align="left">Thraen, et al (2008)</td>
<td align="left">Evaluate the usability and satisfaction differences on a Web-based application developed for the remote sharing of child maltreatment assessment.</td>
<td align="left">Web-based application<break/>TeleCAM</td>
<td align="left">Assessment</td>
<td align="center">N &#x3d; 11</td>
<td align="left">Metropolitan area</td>
<td align="left">White<break/>African<break/>American</td>
<td align="center">N/A</td>
</tr>
<tr>
<td align="left">22</td>
<td align="left">Abujarad, et al<break/>2021</td>
<td align="left">Developed and evaluated the usability of a self-administered digital health tool, VOICES, that can be used to screen, educate, and motivate older adults to self-report elder abuse.</td>
<td align="left">A tablet-based self-administrated digital health tool</td>
<td align="left">Education<break/>Assessment<break/>Self-identification<break/>Interview</td>
<td align="center">N &#x3d; 38</td>
<td align="left">Metropolitan area</td>
<td align="left">African, American<break/>Asian<break/>White<break/>Other</td>
<td align="center">61&#x2013;98</td>
</tr>
<tr>
<td align="left">23</td>
<td align="left">Agu, et al<break/>2020</td>
<td align="left">Improve intimate partner violence service delivery.</td>
<td align="left">Two days of interactive sessions, six webinars, testing strategies using the improvement model (Plan-Do-Study-Act) and three online surveys</td>
<td align="left">Education<break/>Assessment</td>
<td align="center">N &#x3d; 98 (IPV home visitors)</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="center">N/A</td>
</tr>
<tr>
<td align="left">24</td>
<td align="left">Bagwell-Gray, et al<break/>2021</td>
<td align="left">Adapt and test the myPlan web app intervention for Native American women.</td>
<td align="left">Smartphone application</td>
<td align="left">Exploration</td>
<td align="center">N &#x3d; 83</td>
<td align="left">Metropolitan and rural areas</td>
<td align="left">N/A</td>
<td align="center">N/A</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="T3" position="float">
<label>TABLE 3</label>
<caption>
<p>Literature summary of critical findings among 24 studies from 2008 to 2023 (Worldwide publications, from date of inception to May 2023).</p>
</caption>
<table>
<thead valign="top">
<tr>
<th rowspan="2" align="left">No.</th>
<th rowspan="2" align="center">Authors (Year)</th>
<th rowspan="2" align="center">Types of abuse</th>
<th rowspan="2" align="center">Study design</th>
<th colspan="3" align="center">Intervention outcome</th>
</tr>
<tr>
<th align="center">Physical safety outcomes</th>
<th align="center">Psychological outcomes</th>
<th align="center">Technology outcomes</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">1</td>
<td align="left">Bacchus, et al (2016)</td>
<td align="left">IPV</td>
<td align="left">Qualitative Interviews</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">&#x201c;The computer tablet viewed as a safe and confidential way for DV women to disclose their experiences; tablet helped to establish trust and rapport between victim and providers; The technology helped reduce the anticipated stigma associated with disclosing abuse.&#x201d; <break/>&#x201c;Both methods of screening were positively influenced by factors like having established trust and rapport, and good interpersonal communication.&#x201d;</td>
</tr>
<tr>
<td align="left">2</td>
<td align="left">Bloom, et al (2014)</td>
<td align="left">IPV</td>
<td align="left">Feasibility</td>
<td align="left">Danger assessment score indicated severe danger in the abusive relationship. (M &#x3d; 16.1)</td>
<td align="left">N/A</td>
<td align="left">The average time to completion was 10.3 days (SD &#x3d; 16.3 days, range &#x3d; 0&#x2013;68 days), with rural women taking an average of 2.2 days longer than urban women (11.6 vs. 9.4 days, respectively).<break/>A higher percentage of rural women (63.2%) reported using a home computer compared with their urban counterparts (48.4%).<break/>A lower percentage of rural women used a computer at a friend&#x2019;s or family member&#x2019;s house (25.3% vs. 34.3, respectively)<break/>20% of e-mail contacts from potential participants originated from a mobile device.<break/>19.5% of the women completed the baseline session from a mobile device.</td>
</tr>
<tr>
<td align="left">3</td>
<td align="left">Blumling, et al (2018)</td>
<td align="left">IPV</td>
<td align="left">Cross-sectional study</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">The simulation technology demonstrated significant increase in confidence (<italic>p</italic> &#x3c; 0.001), and knowledge (<italic>p</italic> &#x3c; 0.001).</td>
</tr>
<tr>
<td align="left">4</td>
<td align="left">Choo, et al (2016)</td>
<td align="left">IPV</td>
<td align="left">RCT</td>
<td align="left">Past month drug use, the occurrence of psychological, physical, and sexual violence.</td>
<td align="left">N/A</td>
<td align="left">The web-based intervention plus telephone is highly feasible in the emergency care setting; High acceptability, satisfaction, and usability in the web-based intervention evaluation<break/>
<break/>Mean System Usability Scale (SUS) for the BSAFER Web program was 84 (95% CI<break/>78&#x2013;89) of 100; mean Client Satisfaction Questionnaire (CSQ-8) was 28 (95% CI 26&#x2013;29) of 32.</td>
</tr>
<tr>
<td align="left">5</td>
<td align="left">Constantino, et al (2015)</td>
<td align="left">IPV</td>
<td align="left">Sequential, transformative mixed-methods design</td>
<td align="left">N/A</td>
<td align="left">Significant improvement in anxiety (<italic>p</italic> &#x3d; 0.01), depression (<italic>p</italic> &#x3c; 0.001) and social support (<italic>p</italic> &#x3c; 0.001) in the pre-test score and post-test score for each of the groups; Online intervention may lessen social risks and inhibitions, enhances sharing of unwelcome thoughts and painful feelings.</td>
<td align="left"/>
</tr>
<tr>
<td align="left">6</td>
<td align="left">Eden, et al (2015)</td>
<td align="left">IPV</td>
<td align="left">RCT</td>
<td align="left">Intervention-group women had a greater reduction in total decisional conflict, uncertainty and feeling unsupported than control participants (<italic>p</italic> &#x3c; 0.05).</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
</tr>
<tr>
<td align="left">7</td>
<td align="left">Ejaz, et al (2017)</td>
<td align="left">Elder abuse</td>
<td align="left">Feasibility study</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">Significant improvement in knowledge for abuse background and report system (67%); The module &#x201c;Screening of abuse&#x201d; is the weakest module as it lacks illustrations relating to various types of self-neglect (environmental, health-related, and behavioral)</td>
</tr>
<tr>
<td align="left">8</td>
<td align="left">Glass, et al (2017)</td>
<td align="left">IPV</td>
<td align="left">RCT community-based</td>
<td align="left">Women who left the abuser had higher baseline risk (<italic>p &#x3d;</italic>0.003); they found the safety behaviors more helpful (<italic>p</italic> &#x3d; 0.037) and experienced less decisional conflict (<italic>p</italic> &#x3d; 0.042).</td>
<td align="left">Women in intervention group had greater reductions in psychological IPV (<italic>p</italic> &#x3d; 0.001) and sexual IPV (<italic>p</italic> &#x3d; 0.001).</td>
<td align="left">N/A</td>
</tr>
<tr>
<td align="left">9</td>
<td align="left">Goldman, et al (2019)</td>
<td align="left">Child abuse</td>
<td align="left">Feasibility</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">Knowledge increased significantly in smartphone application intervention group; the application reported as easy to use (59%), useful (63.9%) and preferred to obtain information than traditional printed materials (85%).</td>
</tr>
<tr>
<td align="left">10</td>
<td align="left">Gur, et al (2016)</td>
<td align="left">IPV<break/>DV</td>
<td align="left">Feasibility</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">The GPS in DV is important in providing enhanced supervision (96%), keeping victim safer (94%), allowing defendants to live in the community while awaiting trial (86%), receiving satisfaction monitoring information and supervising their clients easier for officers (51%); GPS technology facilitated asking&#x2019; hard questions and help guiding client&#x2019;s decision making (92%).</td>
</tr>
<tr>
<td align="left">11.</td>
<td align="left">Harris, et al (2009)</td>
<td align="left">IPV</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">The overall quality of the online CME program was rated highly in knowledge improvement (M &#x3d; 4.52/5); Direct email was the most effective, cost efficient, and common strategy of online intervention recruitment.</td>
</tr>
<tr>
<td align="left">12</td>
<td align="left">Hassija, et al (2010)</td>
<td align="left">DV</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">Participants exhibited large reductions on PTSD severity checklist (M &#x3d; 32.20, SD &#x3d; 12.68, <italic>d</italic> &#x3d; 1.17). And depressive symptoms (M &#x3d; 13.07, SD &#x3d; 9.07, <italic>d</italic> &#x3d; 1.24); Clients&#x2019; reports of satisfaction with the provision of psychological services via videoconferencing (M &#x3d; 52.93, SD &#x3d; 2.43).</td>
<td align="left">Videoconferencing is effective in providing specialized, evidence-based psychological services to rural domestic violence and sexual assault populations.</td>
</tr>
<tr>
<td align="left">13</td>
<td align="left">Ibarra, et al (2014)</td>
<td align="left">DV</td>
<td align="left">Qualitative interview/comparative analysis</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">The GPS is useful in tracking location, building trustful relationship, facilitating the interviews, and being a source of solace against the threat of false accusation.</td>
</tr>
<tr>
<td align="left">14</td>
<td align="left">Jabaley, et al (2011)</td>
<td align="left">Child abuse</td>
<td align="left">N/A</td>
<td align="left">Observation System: The Home Accident Prevention<break/>Inventory-Revised (HAPI-R) demonstrated significant decrease in hazards among families (Range: 74%&#x2013;97%); Parents considered their homes safer and expressed confidence in recognizing and securing hazards.</td>
<td align="left">N/A</td>
<td align="left">Communication via iPhone on logistical questions or reminders demonstrated good results; 86% Reported with favorable reactions to the iPhone texting communication.</td>
</tr>
<tr>
<td align="left">15</td>
<td align="left">Lefever, et al (2008)</td>
<td align="left">Child Abuse</td>
<td align="left">Longitudinal study</td>
<td align="left">Higher parenting essentials associated with higher knowledge of child development, higher scores on the parenting styles measure, lower child abuse potential, and lower scores on the history of neglect measure.</td>
<td align="left">N/A</td>
<td align="left">Cell phone offers greater level of mobility and convenience at a lower cost than landline phones; reported as useful in intervening with mothers at risk of suboptimal parenting and child neglect.</td>
</tr>
<tr>
<td align="left">16</td>
<td align="left">MacLeod, et al (2009)</td>
<td align="left">Child abuse</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">Rankings of practitioners&#x2019; skills and the telemedicine consultation effectiveness were high, with 82% of cases.</td>
<td align="left">Telemedicine consultations showed good scores in the use of the multimethod examination technique and the use of adjunct techniques.<break/>
<break/>The mean duration of the consultations was 71&#xa0;min (range: 25&#x2013;210&#xa0;min). The consultations resulted in changes in interview methods (47%), the use of the multimethod examination technique (86%), and the use of adjunct techniques (40%).<break/>There were 9 acute sexual assault telemedicine consults that resulted in changes to the collection of forensic evidence (89%). Rankings of practitioners&#x2019; skills and the telemedicine<break/>consult effectiveness were high, with 82% of cases scoring &#x2265;5 on a 7-point Likert scale.</td>
</tr>
<tr>
<td align="left">17</td>
<td align="left">McAndrew, et al (2014)</td>
<td align="left">IPV</td>
<td align="left">Quasi-experimental</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">&#x201c;The online tutorial was effective in increasing the participants&#x2019; perceived preparation, knowledge, and self-efficacy and decreasing perceptions of provider constraints in managing victims of IPV.&#x201d;</td>
</tr>
<tr>
<td align="left">18</td>
<td align="left">Paranal, et al (2012)</td>
<td align="left">Child abuse</td>
<td align="left">Non-equivalent group design</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">Individual participants rated the training content (9.13) and found the training format interesting (8.88), useful (8.9) and ease of use above neutral (6.4). 80% of the participants viewed all the video clips.<break/>
<break/>Organization perceived online training as easy to administer to staff (Mean:7.6), prefer online training (Mean:7.25); Effective in teaching adults about child abuse (Mean:8.97).</td>
</tr>
<tr>
<td align="left">19</td>
<td align="left">Rothman, et al (2009)</td>
<td align="left">IPV</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">Most shelter residents have email accounts (80%), prefer using email as communication and keep in touch with the advocates; 88% reported as a safe method.</td>
</tr>
<tr>
<td align="left">20</td>
<td align="left">Sargent, et al (2016)</td>
<td align="left">DV</td>
<td align="left">RCT</td>
<td align="left">N/A</td>
<td align="left">Knowledge about DV consequences, self-efficacy, and how to help children exposed to DV reported as significant improvement in intervention group.</td>
<td align="left">Online program is effective to reach large numbers of people inexpensively and quickly raise public awareness of DV effectively, offer a cost-effective way and allow participants to move through the program at their own pace.</td>
</tr>
<tr>
<td align="left">21</td>
<td align="left">Thraen, et al (2008)</td>
<td align="left">Child abuse</td>
<td align="left">Mixed methods</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">85% Participants used desktop PCs on a regular basis; reported the easiness to save and upload images from Web browser (81%); able to download and install plug-ins (72%); E-mail used for assessing child maltreatment (55%).</td>
</tr>
<tr>
<td align="left">22</td>
<td align="left">Abujarad, et al<break/>2021</td>
<td align="left">Elder abuse</td>
<td align="left">Mixed methods</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">Overall scored the VOICES usability score of 86.6, while 93% participants indicated the willingness to recommend digital VOICES tool to others and 100% indicated full understanding of health information and content.</td>
</tr>
<tr>
<td align="left">23</td>
<td align="left">Agu, et al<break/>2020</td>
<td align="left">IPV</td>
<td align="left">Mixed methods</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">From baseline to final survey, participants reported accurate knowledge (change: 2.3%&#x2013;34.8%), confidence (change: 31.8%&#x2013;37.9%), system awareness (change: 22.7%&#x2013;53.5%), and increased IPV screening rate (change: 88.0%&#x2013;91.0%) and referrals (change: 43.0%&#x2013;100.0%).</td>
</tr>
<tr>
<td align="left">24</td>
<td align="left">Bagwell-Gray, et al<break/>2021</td>
<td align="left">IPV</td>
<td align="left">Qualitative interview</td>
<td align="left">N/A</td>
<td align="left">N/A</td>
<td align="left">By understanding IPV&#x2019;s culture specific risks and protective factors, the web-based safety app called myPlan (renamed ourCircle) can better provide IPV Native American women with culturally specific safety priorities and security strategies.</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>
<p>Note: DV, domestic violence; IPV, intimate partner violence; M, mean; RCT, randomized controlled trial; SD, standard deviation; PTSD, Post-traumatic stress disorder.</p>
</fn>
</table-wrap-foot>
</table-wrap>
<sec id="s3-1">
<title>Types of Technology</title>
<p>Seven web-based interventions were identified; five of them collected data from a stand-alone website [<xref ref-type="bibr" rid="B25">25</xref>&#x2013;<xref ref-type="bibr" rid="B29">29</xref>]. Four online trainings were designed for multidisciplinary healthcare professionals [<xref ref-type="bibr" rid="B30">30</xref>&#x2013;<xref ref-type="bibr" rid="B33">33</xref>]. Five studies leveraged mobile devices to provide intervention [<xref ref-type="bibr" rid="B34">34</xref>&#x2013;<xref ref-type="bibr" rid="B38">38</xref>]. Two studies used email as an intervention tool [<xref ref-type="bibr" rid="B31">31</xref>, <xref ref-type="bibr" rid="B39">39</xref>]. Another two studies used Global Positioning System (GPS) as interventions [<xref ref-type="bibr" rid="B40">40</xref>, <xref ref-type="bibr" rid="B41">41</xref>]. One article used videoconferencing as intervention [<xref ref-type="bibr" rid="B42">42</xref>], and another study utilized simulation technology to tackle domestic violence [<xref ref-type="bibr" rid="B30">30</xref>].</p>
</sec>
<sec id="s3-2">
<title>Types of Intervention</title>
<p>Four studies focused on prevention [<xref ref-type="bibr" rid="B25">25</xref>&#x2013;<xref ref-type="bibr" rid="B27">27</xref>, <xref ref-type="bibr" rid="B42">42</xref>], and ten focused on education [<xref ref-type="bibr" rid="B28">28</xref>, <xref ref-type="bibr" rid="B30">30</xref>&#x2013;<xref ref-type="bibr" rid="B33">33</xref>, <xref ref-type="bibr" rid="B37">37</xref>, <xref ref-type="bibr" rid="B39">39</xref>, <xref ref-type="bibr" rid="B43">43</xref>&#x2013;<xref ref-type="bibr" rid="B45">45</xref>]. Five studies delineated the effectiveness of HIT intervention [<xref ref-type="bibr" rid="B34">34</xref>, <xref ref-type="bibr" rid="B40">40</xref>, <xref ref-type="bibr" rid="B41">41</xref>, <xref ref-type="bibr" rid="B46">46</xref>, <xref ref-type="bibr" rid="B47">47</xref>] and three focused on various types of DV assessment [<xref ref-type="bibr" rid="B29">29</xref>, <xref ref-type="bibr" rid="B35">35</xref>, <xref ref-type="bibr" rid="B48">48</xref>]. Only one study emphasized screening for patients [<xref ref-type="bibr" rid="B36">36</xref>].</p>
</sec>
<sec id="s3-3">
<title>Participant Characteristics</title>
<p>Different types of DV survivors or potential survivors were captured in this review, such as adolescent mothers [<xref ref-type="bibr" rid="B36">36</xref>], abused women [<xref ref-type="bibr" rid="B27">27</xref>, <xref ref-type="bibr" rid="B42">42</xref>], pregnant women [<xref ref-type="bibr" rid="B25">25</xref>, <xref ref-type="bibr" rid="B46">46</xref>], and battered women [<xref ref-type="bibr" rid="B47">47</xref>]. Simultaneously, participants were extended to various professions like nurses [<xref ref-type="bibr" rid="B30">30</xref>], physicians [<xref ref-type="bibr" rid="B31">31</xref>], dental students [<xref ref-type="bibr" rid="B32">32</xref>], and law enforcement officers [<xref ref-type="bibr" rid="B34">34</xref>]. Among twenty-four studies, the sample sizes were ranged from 11 to 1,869. The sample characteristics and demographics were diversified. The majority of studies recruited participants from designated clinical settings (e.g., hospitals, clinics), community centers (e.g., non-governmental organizations, shelters), schools, and criminal justice services departments. A mean age of 7&#x2013;40 was found across studies.</p>
<p>The review studies include people of diverse ethnic backgrounds, including Whites, African Americans, Hispanic Latinos, Asians, and others; however, the samples were predominantly White (N &#x3d; 13). Only one article was conducted in rural areas [<xref ref-type="bibr" rid="B48">48</xref>] compared to fourteen articles in metropolitan areas [<xref ref-type="bibr" rid="B26">26</xref>, <xref ref-type="bibr" rid="B27">27</xref>, <xref ref-type="bibr" rid="B29">29</xref>, <xref ref-type="bibr" rid="B31">31</xref>, <xref ref-type="bibr" rid="B32">32</xref>, <xref ref-type="bibr" rid="B35">35</xref>&#x2013;<xref ref-type="bibr" rid="B37">37</xref>, <xref ref-type="bibr" rid="B39">39</xref>, <xref ref-type="bibr" rid="B43">43</xref>&#x2013;<xref ref-type="bibr" rid="B47">47</xref>]. Another five articles have been discussed domestic violence in both metropolitan and rural areas [<xref ref-type="bibr" rid="B28">28</xref>, <xref ref-type="bibr" rid="B38">38</xref>, <xref ref-type="bibr" rid="B40">40</xref>&#x2013;<xref ref-type="bibr" rid="B42">42</xref>].</p>
</sec>
<sec id="s3-4">
<title>Types of Abuse</title>
<p>Four types of abuse were included. Twelve studies focused on intimate partner violence (IPV) [<xref ref-type="bibr" rid="B25">25</xref>&#x2013;<xref ref-type="bibr" rid="B27">27</xref>, <xref ref-type="bibr" rid="B30">30</xref>&#x2013;<xref ref-type="bibr" rid="B33">33</xref>, <xref ref-type="bibr" rid="B38">38</xref>, <xref ref-type="bibr" rid="B39">39</xref>, <xref ref-type="bibr" rid="B43">43</xref>, <xref ref-type="bibr" rid="B46">46</xref>, <xref ref-type="bibr" rid="B47">47</xref>], six highlighted child abuse [<xref ref-type="bibr" rid="B29">29</xref>, <xref ref-type="bibr" rid="B34">34</xref>&#x2013;<xref ref-type="bibr" rid="B36">36</xref>, <xref ref-type="bibr" rid="B45">45</xref>, <xref ref-type="bibr" rid="B48">48</xref>], four illustrated DV [<xref ref-type="bibr" rid="B28">28</xref>, <xref ref-type="bibr" rid="B40">40</xref>&#x2013;<xref ref-type="bibr" rid="B42">42</xref>], and two studies targeted on elder abuse [<xref ref-type="bibr" rid="B37">37</xref>, <xref ref-type="bibr" rid="B44">44</xref>].</p>
</sec>
<sec id="s3-5">
<title>Study Designs</title>
<p>Various research methods are used, including randomized controlled trials (N &#x3d; 5) [<xref ref-type="bibr" rid="B26">26</xref>&#x2013;<xref ref-type="bibr" rid="B28">28</xref>, <xref ref-type="bibr" rid="B43">43</xref>, <xref ref-type="bibr" rid="B46">46</xref>], and longitudinal (N &#x3d; 1) [<xref ref-type="bibr" rid="B36">36</xref>], mixed methods (N &#x3d; 5) [<xref ref-type="bibr" rid="B29">29</xref>, <xref ref-type="bibr" rid="B33">33</xref>, <xref ref-type="bibr" rid="B37">37</xref>&#x2013;<xref ref-type="bibr" rid="B39">39</xref>], feasibility tests (N &#x3d; 5) [<xref ref-type="bibr" rid="B25">25</xref>, <xref ref-type="bibr" rid="B30">30</xref>, <xref ref-type="bibr" rid="B34">34</xref>, <xref ref-type="bibr" rid="B40">40</xref>, <xref ref-type="bibr" rid="B44">44</xref>], non-equivalent group design (N &#x3d; 1) [<xref ref-type="bibr" rid="B45">45</xref>], quasi-experimental design (N &#x3d; 1) [<xref ref-type="bibr" rid="B32">32</xref>], as well as qualitative studies (N &#x3d; 1) [<xref ref-type="bibr" rid="B41">41</xref>].</p>
</sec>
<sec id="s3-6">
<title>Intervention Outcomes</title>
<sec id="s3-6-1">
<title>Physical Safety Outcomes</title>
<p>Physical safety outcomes were reported in five studies [<xref ref-type="bibr" rid="B25">25</xref>&#x2013;<xref ref-type="bibr" rid="B27">27</xref>, <xref ref-type="bibr" rid="B36">36</xref>, <xref ref-type="bibr" rid="B43">43</xref>]. Only one study assessed the abuse score for physical sexual violence [<xref ref-type="bibr" rid="B43">43</xref>], while the other one evaluated the neglect score among children at a home setting [<xref ref-type="bibr" rid="B36">36</xref>]. Both studies indicated a decrease in scores for both neglect and abuse. Moreover, three other studies showed improvement in danger assessment, safety strategies, and safety behaviors using different types of measurements [<xref ref-type="bibr" rid="B25">25</xref>&#x2013;<xref ref-type="bibr" rid="B27">27</xref>].</p>
</sec>
<sec id="s3-6-2">
<title>Psychological Outcomes</title>
<p>Depression, anxiety, and PTSD were reported as psychological health outcomes in three articles [<xref ref-type="bibr" rid="B25">25</xref>, <xref ref-type="bibr" rid="B39">39</xref>, <xref ref-type="bibr" rid="B42">42</xref>]. Bloom et al. (2014), Constantino et al. (2015), and Hassija et al. (2010) showed improvement in depression [<xref ref-type="bibr" rid="B25">25</xref>, <xref ref-type="bibr" rid="B39">39</xref>, <xref ref-type="bibr" rid="B42">42</xref>], Constantino et al. (2015) and Bloom et al. (2014) also reported improvement in PTSD and anxiety outcomes in their studies [<xref ref-type="bibr" rid="B25">25</xref>, <xref ref-type="bibr" rid="B39">39</xref>]. Choo et al. (2016) and Lefever et al. (2008) illustrated the abuse reduction as an outcome measure [<xref ref-type="bibr" rid="B36">36</xref>, <xref ref-type="bibr" rid="B43">43</xref>]. Only one article reported improved social support [<xref ref-type="bibr" rid="B39">39</xref>].</p>
</sec>
<sec id="s3-6-3">
<title>Technological Outcomes</title>
<p>Technological interventions effectiveness was evaluated in eight studies, which demonstrated strong feasibility, usability, and acceptability [<xref ref-type="bibr" rid="B25">25</xref>, <xref ref-type="bibr" rid="B29">29</xref>, <xref ref-type="bibr" rid="B34">34</xref>, <xref ref-type="bibr" rid="B36">36</xref>, <xref ref-type="bibr" rid="B37">37</xref>, <xref ref-type="bibr" rid="B42">42</xref>&#x2013;<xref ref-type="bibr" rid="B44">44</xref>]. Bloom et al. (2004), Choo et al. (2016), Thraen et al. (2008), and Abujarad et al. (2021) measured the usability [<xref ref-type="bibr" rid="B25">25</xref>, <xref ref-type="bibr" rid="B29">29</xref>, <xref ref-type="bibr" rid="B37">37</xref>, <xref ref-type="bibr" rid="B43">43</xref>], while Bloom et al. (2014), Choo et al. (2016), Ejaz et al. (2017), Goldman et al. (2019), Hassija et al. (2010), and Lefever et al. (2008) measured feasibility [<xref ref-type="bibr" rid="B25">25</xref>, <xref ref-type="bibr" rid="B34">34</xref>, <xref ref-type="bibr" rid="B36">36</xref>, <xref ref-type="bibr" rid="B42">42</xref>&#x2013;<xref ref-type="bibr" rid="B44">44</xref>], and Choo et al. (2016) measured the acceptability of the technological intervention [<xref ref-type="bibr" rid="B43">43</xref>].</p>
</sec>
</sec>
</sec>
<sec sec-type="discussion" id="s4">
<title>Discussion</title>
<p>Our study synthesized research articles on the technology interventions, research designs, and reports on the overall state of DV technology over the past decade. The results demonstrated the diverse application of technological interventions among women with DV experiences. Seven types of technology interventions were identified for DV (e.g., mobile applications, online training, web-based intervention, Global Positioning System (GPS), emails, videoconferencing, and simulation), and the majority of studies assessed usability, acceptability, and participants&#x2019; satisfaction. Several studies assessed psychological wellbeing outcomes, including stress levels, quality of life, sleep quality, and emotional needs.</p>
<sec id="s4-1">
<title>HIT Interventions Dominant in IPV</title>
<p>Our results highlight that HIT interventions focused on different types of abuse within families, with Intimate Partner Violence (IPV) being the most common and elder abuse being the least. Research has demonstrated that young and educated people were the population group more willing to accept and adopt HIT interventions in clinical and community settings, while older adults staying at home were unwilling to use these health interventions due to perceived barriers, such as inertia, cognitive impairment, and physical disabilities [<xref ref-type="bibr" rid="B49">49</xref>, <xref ref-type="bibr" rid="B50">50</xref>]. However, this situation might decline because of aging and the rise of computer literacy among the elderly. According to Internet World Statistics, over 89 percent of the U.S. population were internet users in 2019 [<xref ref-type="bibr" rid="B51">51</xref>]. The web-literate population has been growing and constantly surging with the increasing reliance on technology, machine learning, and artificial intelligence in our daily lives. Fleming (2015) delineated that over 60% of people older than 50 used technologies to browse social networking sites, take photos, and communicate in text messages [<xref ref-type="bibr" rid="B52">52</xref>]. Although those older than 65 may have more perceived barriers to using health technology, such as hearing deficit and cognitive impairment, they will accept new technologies when the benefits outweigh the drawbacks. There has been a proliferation of research concerning the utilization of technology in addressing elder abuse, highlighting its significant feasibility, accessibility, and effectiveness in monitoring neglect or physiological changes among elder abuse survivors, both at home and in clinical settings [<xref ref-type="bibr" rid="B53">53</xref>]. Therefore, it is anticipated that computer literacy and the implementation of HIT interventions among the elderly will continue to grow, leading to the expansion of interventions targeting aging in the forthcoming decades.</p>
</sec>
<sec id="s4-2">
<title>HIT Interventions Thrives in Urban and Rural Areas</title>
<p>The findings of our study also revealed that the use of HIT had been employed to assist DV survivors residing in both urban and rural settings. Due to limited access to healthcare services, women residing in rural areas experiencing DV face difficulties in effectively addressing their DV situation [<xref ref-type="bibr" rid="B54">54</xref>]. Previously, individuals from rural areas who were DV survivors may not have benefitted from technological advancements and treatments due to the inadequate support available to them [<xref ref-type="bibr" rid="B54">54</xref>]. However, our review demonstrates that digital devices in rural areas hold promise for telemedicine, providing an interactive means of delivering care, making referrals, and offering diagnosis and screening for DV survivors who may be able to meet healthcare professionals physically in a clinic or hospital. As the digital literacy rate has consistently improved over the past decade, it is expected that the limitations of technical support (such as limited wireless devices, unstable Internet, and restricted access to technical assistance) are no longer hindrances to implementing HIT interventions in rural areas. The current body of research has explored the utilization of videoconferencing, interventions pertaining to medical appointments, counseling services, and danger assessments, all of which should be expanded to rural areas through digital platforms or means. It is anticipated that the utilization of teleconferencing and online counseling services will become even more prominent, as indicated by the expanding coverage of health insurance plans for online services and consultations that aimed at addressing the mental health needs of women with DV experiences.</p>
</sec>
<sec id="s4-3">
<title>Web-Based Interventions Provide Better Platform for Self-Disclosure</title>
<p>The utilization of web-based interventions has emerged as a growing trend in DV prevention and education. HIT offers several advantages, including convenience, interactive design, and the creation of an anonymous environment facilitated by the Internet. Given that DV survivors may be reluctant to engage in face-to-face social interactions due to fear of stigmatization, shame, guilt, and judgment [<xref ref-type="bibr" rid="B16">16</xref>], web-based interventions provide an anonymous platform that encourages survivors to disclose their traumatic experiences more vividly and seek help proactively. It is well-documented that the sense of anonymity and social distance feeling created by the online platform fosters candid, sensitive and traumatic conversations [<xref ref-type="bibr" rid="B55">55</xref>, <xref ref-type="bibr" rid="B56">56</xref>]. It is noteworthy that effective patient-provider communication remains the linchpin of positive intervention outcomes, particularly when addressing sensitive topics such as DV. Technological advancements promise to promote truthful or effective communication between DV survivors and healthcare professionals.</p>
<p>While utilizing technology for DV was predominantly applied at the patient level, the application also extends to healthcare professionals&#x2019; training. Previous literature highlighted the lack of training provided for healthcare providers to screen DV cases, thereby weakening their ability to probe DV questions and the lack of empathic listening skills during consultations. As such, DV survivors easily suffer from delayed treatment or referral from physicians [<xref ref-type="bibr" rid="B57">57</xref>]. For future endeavors, DV training development can extend the targeted participants to more healthcare professionals who might be poorly equipped, such as new nursing staff, social workers, or counselors during the orientation program.</p>
</sec>
<sec id="s4-4">
<title>HIT Intervention Improved Physical Safety and Psychological Outcomes</title>
<p>HIT interventions have evaluated physical safety and psychological outcomes of women with DV experience. For instance, technology-based interventionshave heightened the awareness of safety strategies among women with DV experience, strengthening their sense of security and capacity to defend themselves from perpetrators within their households [<xref ref-type="bibr" rid="B27">27</xref>]. Mobile applications and online training programs have evaluated the current danger level for women, thereby increasing their prompt recognition and engagement in modifying their safety strategies [<xref ref-type="bibr" rid="B25">25</xref>]. By leveraging the use of technology, women can actively participate in reassessing their danger level and adapting their contingency plans [<xref ref-type="bibr" rid="B27">27</xref>]. They feel safer and find it easier to evaluate their situation on their smartphone [<xref ref-type="bibr" rid="B35">35</xref>]. Moreover, online platforms, emails, and messaging systems could reduce the risk of anxiety, depression, and post-traumatic stress disorder (PTSD) among women experiencing DV [<xref ref-type="bibr" rid="B25">25</xref>, <xref ref-type="bibr" rid="B39">39</xref>]. Technology provides a valuable platform for women to share and discuss their experiences with other survivors, aligning with previous research indicating that computer-based interventions can significantly improve social support, self-efficacy, and alleviate feelings of loneliness among rural women [<xref ref-type="bibr" rid="B58">58</xref>]. Consequently, HIT interventions can contribute to developing a stronger social support network for women facing DV.</p>
<p>There is a wealth of evidence showing the importance of emotional health towards women with DV experiences. However, our review indicated limited HIT intervention studies on assessing the emotional aspects of survivors&#x2019; experiences. For example, World Health Organization (WHO) demonstrated that women with IPV experience could have a higher demand for mental health services and an increased likelihood of psychological distress [<xref ref-type="bibr" rid="B59">59</xref>]. Women could experience emotional breakdown easier or the need to express themselves after traumatic experiences like DV. The anonymity and instant communication facilitated by mobile devices and the Internet, have provided opportunities for women to seek emotional support through texting through online platforms [<xref ref-type="bibr" rid="B60">60</xref>, <xref ref-type="bibr" rid="B61">61</xref>]. This avenue enables better adaptations and enhances the quality of life following traumatic experiences caused by abusive relationships. Future HIT research endeavors could focus on improving the emotional status of survivors, thus promoting more favorable mental health outcomes.</p>
<p>Despite the positive outcomes reported in the literature, adopting HIT interventions for DV population is not without demerits. Several articles have delineated the limitations of using a technical device across community, clinical, and household settings [<xref ref-type="bibr" rid="B62">62</xref>, <xref ref-type="bibr" rid="B63">63</xref>]. With reference to the power and control theory of DV, Baddam (2017) believes that the use of technology may exacerbate DV conditions as perpetrators can install tracker applications with GPS and blame the survivors for concealing the DV-related on their smartphones [<xref ref-type="bibr" rid="B64">64</xref>]. Perpetrators can turn out to be digital stalkers and constitute a significant threat to the victim, thereby permanently menacing psychological harm to the victim&#x2019;s life [<xref ref-type="bibr" rid="B65">65</xref>].</p>
<p>HIT interventions have predominantly focused on raising awareness and building a digital platform for women to communicate. However, the evaluation of most interventions has typically been limited to pre-and post-test assessments, without consistently tracking long-term performance across multiple time points, such as 3, 6, and 9 months follow-up. Besides, existing research weights physical wellbeing higher than emotional wellbeing. There is currently no standardized measurement for assessing emotions via technology. It is suggested that incorporating advanced machine learning data analytics could be beneficial in extracting emotional needs and delivering emotional support through virtual messaging, such as natural language processing. Further research can capitalize on data analytics to develop an emotional terminology dictionary (e.g., terms related to resilience or distress) that provides a measurable benchmark for extracting and systematically quantifying emotional text data (<xref ref-type="table" rid="T4">Table 4</xref>).</p>
<table-wrap id="T4" position="float">
<label>TABLE 4</label>
<caption>
<p>Literature summary on implications for practice, policy and research among 24 studies From 2008 to 2023 (Worldwide publications, from date of inception to May 2023).</p>
</caption>
<table>
<thead valign="top">
<tr>
<th align="left">Implications</th>
<th align="left"/>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">For research</td>
<td align="left">&#x27a2; Evaluate at different time points<break/>&#x27a2; Measure emotion condition<break/>&#x27a2; Build ontology and leverage natural language processing to provide intervention<break/>&#x27a2; Phase II and III trials (RCT)<break/>&#x27a2; Multiple sites RCT</td>
</tr>
<tr>
<td align="left">For practice</td>
<td align="left">&#x27a2; Web-based interventions in outpatient departments, pre-and-post natal visits, and home visits are more effective than other settings to reach potential women at risk for DV.<break/>&#x27a2; Healthcare providers should be trained on DV screening like identifying women&#x2019;s need in shelter, law protection, child care and family conflict solving.<break/>&#x27a2; Technical support should be provided to organizations and clinicians</td>
</tr>
<tr>
<td align="left">For policy</td>
<td align="left">&#x27a2; Translate the research into clinical and community settings.<break/>&#x27a2; More funding is recommended to advance care via technology.<break/>&#x27a2; Government should devise a policy to encourage a harmonious, respectful, and amicable environment in our families, workplaces, and communities.</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Furthermore, it is important to direct future research avenues towards conducting phase II and III randomized controlled clinical trials to evaluate the preliminary effect size, side effects, and efficacy of the technology within a specific context. The majority of studies reviewed primarily focused on intervention design, feasibility, and prototype intervention. The subsequent step should involve an initial test of intervention in comparison with an appropriate alternative option. To identify outcomes and determine whether the measurement tools can detect the anticipated changes, a small sample size of 40&#x2013;60 randomized controlled trials should be conducted, enabling the calculation of effect sizes for the intervention [<xref ref-type="bibr" rid="B66">66</xref>]. Future research can assess technological interventions by RCT in multiple settings or within a targeted setting to evaluate the efficacy.</p>
<p>This review also provides clinical insights into the context and environment of DV technology interventions. There are abundant web-based interventions, supported by theoretical and empirical evidence of their efficacy and feasibility, to raise awareness, enhance knowledge, and evaluate the specific needs of survivors. The utilization of web-based interventions in outpatient departments, prenatal or postnatal clinics, and home visits yield greater effectiveness compared to other settings. Moreover, existing literature highlights the importance of prioritizing victim&#x2019;s needs during family conflict. Healthcare providers should be well-informed and trained in addressing the common application procedures and criteria for DV shelter, safety planning, law protection, and childcare through technology (i.e., online training, and case study from online).</p>
<p>The resolution of this public health concern necessitates the implementation of policy modifications or reforms. From a policy standpoint, it is crucial to facilitate the translation of research findings into practical applications in clinical and community settings. In accordance with the socioecological model, the prevention of DV should involve interventions targeting individuals, interpersonal relationships, societal structures, and community dynamics. The government and other relevant stakeholders should join forces and support to violence prevention research endeavors. Additionally, it is recommended to allocate increased funding towards research and innovative technologies to enhance the provision of nursing care and social services through technological interventions. Furthermore, the government should formulate policies to foster an atmosphere of harmony, respect, and amicability within families, workplaces, and communities.</p>
</sec>
<sec id="s4-5">
<title>Limitations</title>
<p>Studies included in this review have methodological considerations regarding the sample size, demographic characteristics, and design that should be noted with caution. Our included studies generally with small sample size, with several studies even being characterized as pilot or exploratory studies. Although the geographical settings from our studies include rural, suburban, urban, clinical, and community areas, the demographic characteristics still predominantly comprise a white population, which affected the overall generalizability of this study. Given the inconsistent reporting of study location among studies, we categorized them as either metropolitan or rural areas based on the current metrics from the U.S. Census Bureau (2016) [<xref ref-type="bibr" rid="B67">67</xref>]. Notably, only four studies took place in rural areas; future research should strive to clarify the definition or characteristics of locations where the interventions were conducted. Also, this review did not capture which forms of abuse were experienced by the DV survivors, which could influence the adherence to HIT intervention. We accept this trade-off for this scoping review as the adherence data was not provided in most of the studies. To maintain consistency and precise comparison in the analysis, this review specifically excluded dating violence, and articles using social media to collect data for DV. Therefore, it is possible that certain HIT interventions in DV populations were missed from this review.</p>
</sec>
<sec id="s4-6">
<title>Conclusion</title>
<p>By and large, DV remains a significant public health issue characterized by repetitive trauma within a vicious cycle, especially in the United States. This review highlights the current scope of HIT interventions in addressing DV. Our synthesized literature demonstrates substantial heterogeneity in intervention modalities, target populations, as well as study designs. HIT interventions offer an opportunity to reach potential survivors from underserved rural and suburban areas where access to healthcare services and DV support may be limited. Moreover, the range of HIT interventions for DV encompasses interventions at the patient and provider levels. Implementing online training modules for multidisciplinary healthcare practitioners shows promise in improving outcomes, as demonstrated by pre- and post-intervention assessments. While not all physical health outcomes were measured, the findings emphasize technology&#x2019;s immense potential in reaching a broader and more heterogeneous sample base. Leveraging HIT can support DV survivors across individuals, families, and communities.</p>
</sec>
</sec>
</body>
<back>
<sec id="s5">
<title>Author Contributions</title>
<p>VH conceptualized the idea for the scoping review. BZ and BJ undertook the search strategy and ran the database searches. MK provided guidance on methodology. VH, BZ, and BJ screened abstracts and titles for inclusion/exclusion and full text articles for inclusion/exclusion. Data was extracted by VH, BZ, and BJ. VH, BZ, and BJ contributed to interpretation of results. Writing was completed by VH and BZ. KW and YL reviewed the manuscript and provided overall direction and edited the manuscript. All authors contributed to the article and approved the submitted version.</p>
</sec>
<sec sec-type="funding-information" id="s6">
<title>Funding</title>
<p>The author(s) declare(s) that no financial support was received for the research, authorship, and/or publication of this article.</p>
</sec>
<sec sec-type="COI-statement" id="s7">
<title>Conflict of Interest</title>
<p>The authors declare that they do not have any conflicts of interest.</p>
</sec>
<ack>
<p>The main results of this study have been published as a PhD dissertation thesis and the approval to republish the data has been obtained.</p>
</ack>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sugg</surname>
<given-names>N</given-names>
</name>
</person-group>. <article-title>Intimate Partner Violence: Prevalence, Health Consequences, and Intervention</article-title>. <source>Med Clin North Am</source> (<year>2015</year>) <volume>99</volume>:<fpage>629</fpage>&#x2013;<lpage>49</lpage>. <pub-id pub-id-type="doi">10.1016/j.mcna.2015.01.012</pub-id>
</citation>
</ref>
<ref id="B2">
<label>2.</label>
<citation citation-type="book">
<collab>Department of Justice.</collab> <source>Office on Violence Against Women (OVW)</source> (<year>2019</year>). <comment>Available from: <ext-link ext-link-type="uri" xlink:href="https://www.justice.gov/ovw">https://www.justice.gov/ovw</ext-link>
</comment> (<comment>Accessed April 1, 2023</comment>).</citation>
</ref>
<ref id="B3">
<label>3.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Black</surname>
<given-names>MC</given-names>
</name>
<name>
<surname>Basile</surname>
<given-names>KC</given-names>
</name>
<name>
<surname>Breiding</surname>
<given-names>MJ</given-names>
</name>
<name>
<surname>Smith</surname>
<given-names>SG</given-names>
</name>
<name>
<surname>Walters</surname>
<given-names>ML</given-names>
</name>
<name>
<surname>Merrick</surname>
<given-names>MT</given-names>
</name>
<etal/>
</person-group> <source>The National Intimate Partner and Sexual Violence Survey: 2010 Summary Report (2011)</source> (<year>2011</year>). <comment>Available from: <ext-link ext-link-type="uri" xlink:href="http://www.cdc.gov/violenceprevention/pdf/nisvs_report2010-a.pdf">http://www.cdc.gov/violenceprevention/pdf/nisvs_report2010-a.pdf</ext-link>
</comment> (<comment>Accessed April 1, 2023</comment>).</citation>
</ref>
<ref id="B4">
<label>4.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Peterson</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Kearns</surname>
<given-names>MC</given-names>
</name>
<name>
<surname>McIntosh</surname>
<given-names>WL</given-names>
</name>
<name>
<surname>Estefan</surname>
<given-names>LF</given-names>
</name>
<name>
<surname>Nicolaidis</surname>
<given-names>C</given-names>
</name>
<name>
<surname>McCollister</surname>
<given-names>KE</given-names>
</name>
<etal/>
</person-group> <article-title>Lifetime Economic Burden of Intimate Partner Violence Among U.S. Adults</article-title>. <source>Am J Prev Med</source> (<year>2018</year>) <volume>55</volume>:<fpage>433</fpage>&#x2013;<lpage>44</lpage>. <pub-id pub-id-type="doi">10.1016/j.amepre.2018.04.049</pub-id>
</citation>
</ref>
<ref id="B5">
<label>5.</label>
<citation citation-type="book">
<collab>National Center for Injury Prevention and Control, Centers for Disease Control and Prevention.</collab> <source>Infographic Based on Data from the National Intimate Partner and Sexual Violence Survey (Nisvs): 2010-2012 State Report</source> (<year>2017</year>). <comment>Available from: <ext-link ext-link-type="uri" xlink:href="https://www.cdc.gov/violenceprevention/pdf/NISVS-infographic-2016.pdf">https://www.cdc.gov/violenceprevention/pdf/NISVS-infographic-2016.pdf</ext-link>
</comment> (<comment>Accessed April 1, 2023</comment>).</citation>
</ref>
<ref id="B6">
<label>6.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Dolezal</surname>
<given-names>TA</given-names>
</name>
<name>
<surname>McCollum</surname>
<given-names>DL</given-names>
</name>
<name>
<surname>Callahan</surname>
<given-names>MJ.</given-names>
</name>
</person-group> <source>Hidden Costs in Health Care: The Economic Impact of Violence and Abuse</source>. <publisher-loc>MN</publisher-loc>: <publisher-name>Academy on Violence and Abuse</publisher-name> (<year>2009</year>).</citation>
</ref>
<ref id="B7">
<label>7.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Carlson</surname>
<given-names>BE</given-names>
</name>
<name>
<surname>McNutt</surname>
<given-names>LA</given-names>
</name>
<name>
<surname>Choi</surname>
<given-names>DY</given-names>
</name>
</person-group>. <article-title>Childhood and Adult Abuse Among Women in Primary Health Care: Effects on Mental Health</article-title>. <source>J interpersonal violence</source> (<year>2003</year>) <volume>18</volume>:<fpage>924</fpage>&#x2013;<lpage>41</lpage>. <pub-id pub-id-type="doi">10.1177/0886260503253882</pub-id>
</citation>
</ref>
<ref id="B8">
<label>8.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Golding</surname>
<given-names>JM</given-names>
</name>
</person-group>. <article-title>Intimate Partner Violence as a Risk Factor for Mental Disorders: A Meta-Analysis</article-title>. <source>J Fam violence</source> (<year>1999</year>) <volume>14</volume>:<fpage>99</fpage>&#x2013;<lpage>132</lpage>. <pub-id pub-id-type="doi">10.1023/a:1022079418229</pub-id>
</citation>
</ref>
<ref id="B9">
<label>9.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hathaway</surname>
<given-names>JE</given-names>
</name>
<name>
<surname>Mucci</surname>
<given-names>LA</given-names>
</name>
<name>
<surname>Silverman</surname>
<given-names>JG</given-names>
</name>
<name>
<surname>Brooks</surname>
<given-names>DR</given-names>
</name>
<name>
<surname>Mathews</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Pavlos</surname>
<given-names>CA</given-names>
</name>
</person-group>. <article-title>Health Status and Health Care Use of Massachusetts Women Reporting Partner Abuse</article-title>. <source>Am J Prev Med</source> (<year>2000</year>) <volume>19</volume>(<issue>4</issue>):<fpage>302</fpage>&#x2013;<lpage>7</lpage>. <pub-id pub-id-type="doi">10.1016/s0749-3797(00)00236-1</pub-id>
</citation>
</ref>
<ref id="B10">
<label>10.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname>
<given-names>Y</given-names>
</name>
<name>
<surname>Marshall</surname>
<given-names>CM</given-names>
</name>
<name>
<surname>Rees</surname>
<given-names>HC</given-names>
</name>
<name>
<surname>Nunez</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Ezeanolue</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Ehiri</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Intimate Partner Violence and HIV Infection Among Women: A Systematic Review and Meta-Analysis</article-title>. <source>J Int AIDS Soc</source> (<year>2014</year>) <volume>17</volume>(<issue>1</issue>):<fpage>18845</fpage>. <pub-id pub-id-type="doi">10.7448/IAS.17.1.18845</pub-id>
</citation>
</ref>
<ref id="B11">
<label>11.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Breiding</surname>
<given-names>MJ</given-names>
</name>
<name>
<surname>Chen</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Black</surname>
<given-names>MC.</given-names>
</name>
</person-group> <source>Intimate Partner Violence in the United States&#x2014;2010</source>. <publisher-loc>Atlanta, GA</publisher-loc>: <publisher-name>National Center for Injury Prevention and Control, Centers for Disease Control and Prevention</publisher-name> (<year>2014</year>). <comment>Available from: <ext-link ext-link-type="uri" xlink:href="https://stacks.cdc.gov/view/cdc/21961">https://stacks.cdc.gov/view/cdc/21961</ext-link>
</comment> (<comment>Accessed April 1, 2023</comment>).</citation>
</ref>
<ref id="B12">
<label>12.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Devries</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Watts</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Yoshihama</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Kiss</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Schraiber</surname>
<given-names>LB</given-names>
</name>
<name>
<surname>Deyessan</surname>
<given-names>N</given-names>
</name>
<etal/>
</person-group> <article-title>Violence Against Women Is Strongly Associated With Suicide Attempts: Evidence From the WHO Multi-Country Study on Women&#x2019;s Health and Domestic Violence Against Women</article-title>. <source>Soc Sci Med</source> (<year>2011</year>) <volume>73</volume>(<issue>1</issue>):<fpage>79</fpage>&#x2013;<lpage>86</lpage>. <pub-id pub-id-type="doi">10.1016/j.socscimed.2011.05.006</pub-id>
</citation>
</ref>
<ref id="B13">
<label>13.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Desai</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Arias</surname>
<given-names>I</given-names>
</name>
<name>
<surname>Thompson</surname>
<given-names>MP</given-names>
</name>
<name>
<surname>Basile</surname>
<given-names>KC</given-names>
</name>
</person-group>. <article-title>Childhood Victimization and Subsequent Adult Revictimization Assessed in a Nationally Representative Sample of Women and Men</article-title>. <source>Violence and victims</source> (<year>2002</year>) <volume>17</volume>(<issue>6</issue>):<fpage>639</fpage>&#x2013;<lpage>53</lpage>. <pub-id pub-id-type="doi">10.1891/vivi.17.6.639.33725</pub-id>
</citation>
</ref>
<ref id="B14">
<label>14.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Choo</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Ranney</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Wetle</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Morrow</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Mello</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Squires</surname>
<given-names>D</given-names>
</name>
<etal/>
</person-group> <article-title>Attitudes Toward Computer Interventions for Partner Abuse and Drug Use Among Women in the Emergency Department</article-title>. <source>Addict Disord their Treat</source> (<year>2015</year>) <volume>14</volume>:<fpage>95</fpage>&#x2013;<lpage>104</lpage>. <pub-id pub-id-type="doi">10.1097/ADT.0000000000000057</pub-id>
</citation>
</ref>
<ref id="B15">
<label>15.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Suler</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>The Online Disinhibition Effect</article-title>. <source>Cyberpsychol Behav</source> (<year>2004</year>) <volume>7</volume>:<fpage>321</fpage>&#x2013;<lpage>6</lpage>. <pub-id pub-id-type="doi">10.1089/1094931041291295</pub-id>
</citation>
</ref>
<ref id="B16">
<label>16.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tarzia</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Iyer</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Thrower</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Hegarty</surname>
<given-names>K</given-names>
</name>
</person-group>. <article-title>&#x201c;Technology Doesn&#x2019;t Judge You&#x201d;: Young Australian Women&#x2019;s Views on Using the Internet and Smartphones to Address Intimate Partner Violence</article-title>. <source>J Technol Hum Serv</source> (<year>2017</year>) <volume>35</volume>:<fpage>199</fpage>&#x2013;<lpage>218</lpage>. <pub-id pub-id-type="doi">10.1080/15228835.2017.1350616</pub-id>
</citation>
</ref>
<ref id="B17">
<label>17.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Thompson</surname>
<given-names>TG</given-names>
</name>
<name>
<surname>Brailer</surname>
<given-names>DJ</given-names>
</name>
</person-group>. <article-title>The Decade of Health Information Technology: Delivering Consumer-Centric and Information-Rich Health Car</article-title>. <source>Med Benefits</source> (<year>2004</year>) <volume>21</volume>:<fpage>12</fpage>.</citation>
</ref>
<ref id="B18">
<label>18.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ranney</surname>
<given-names>ML</given-names>
</name>
<name>
<surname>Choo</surname>
<given-names>EK</given-names>
</name>
<name>
<surname>Cunningham</surname>
<given-names>RM</given-names>
</name>
<name>
<surname>Spirito</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Thorsen</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Mello</surname>
<given-names>MJ</given-names>
</name>
<etal/>
</person-group> <article-title>Acceptability, Language, and Structure of Text Message-Based Behavioral Interventions for High-Risk Adolescent Females: A Qualitative Study</article-title>. <source>J Adolesc Health</source> (<year>2014</year>) <volume>55</volume>:<fpage>33</fpage>&#x2013;<lpage>40</lpage>. <pub-id pub-id-type="doi">10.1016/j.jadohealth.2013.12.017</pub-id>
</citation>
</ref>
<ref id="B19">
<label>19.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gilroy</surname>
<given-names>H</given-names>
</name>
<name>
<surname>McFarlane</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Nava</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Maddoux</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Preferred Communication Methods of Abused Women</article-title>. <source>Public Health Nurs</source> (<year>2013</year>) <volume>30</volume>:<fpage>402</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1111/phn.12030</pub-id>
</citation>
</ref>
<ref id="B20">
<label>20.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Al-Alosi</surname>
<given-names>H</given-names>
</name>
</person-group>. <article-title>Fighting Fire With Fire: Exploring the Potential of Technology to Help Victims Combat Intimate Partner Violence</article-title>. <source>Aggression Violent Behav</source> (<year>2020</year>) <volume>52</volume>:<fpage>101376</fpage>. <pub-id pub-id-type="doi">10.1016/j.avb.2020.101376</pub-id>
</citation>
</ref>
<ref id="B21">
<label>21.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Boydell</surname>
<given-names>KM</given-names>
</name>
<name>
<surname>Hodgins</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Pignatiello</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Teshima</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Edwards</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Willis</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>Using Technology to Deliver Mental Health Services to Children and Youth: A Scoping Review</article-title>. <source>J Can Acad Child Adolesc Psychiatry</source> (<year>2014</year>) <volume>23</volume>(<issue>2</issue>):<fpage>87</fpage>&#x2013;<lpage>99</lpage>. <pub-id pub-id-type="doi">10.1016/j.avb.2020.101376</pub-id>
</citation>
</ref>
<ref id="B22">
<label>22.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tiwari</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Recinos</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Garner</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Self-Brown</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Momin</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Durbha</surname>
<given-names>S</given-names>
</name>
<etal/>
</person-group> <article-title>Use of Technology in Evidence-Based Programs for Child Maltreatment and its Impact on Parent and Child Outcomes</article-title>. <source>Front digital Health</source> (<year>2023</year>) <volume>5</volume>:<fpage>1224582</fpage>. <pub-id pub-id-type="doi">10.3389/fdgth.2023.1224582</pub-id>
</citation>
</ref>
<ref id="B23">
<label>23.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Vandebosch</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Botezat</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Amodeo</surname>
<given-names>AL</given-names>
</name>
<name>
<surname>Pabian</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Plichta</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Puhari&#x107;</surname>
<given-names>Z</given-names>
</name>
<etal/>
</person-group> <article-title>A Scoping Review of Technological Interventions to Address Ethnicity-Related Peer Aggression</article-title>. <source>Aggression violent Behav</source> (<year>2022</year>) <volume>67</volume>:<fpage>101794</fpage>. <pub-id pub-id-type="doi">10.1016/j.avb.2022.101794</pub-id>
</citation>
</ref>
<ref id="B24">
<label>24.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Arksey</surname>
<given-names>H</given-names>
</name>
<name>
<surname>O&#x27;Malley</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>Scoping Studies: Towards a Methodological Framework</article-title>. <source>Int J Soc Res Methodol</source> (<year>2005</year>) <volume>8</volume>(<issue>1</issue>):<fpage>19</fpage>&#x2013;<lpage>32</lpage>. <pub-id pub-id-type="doi">10.1080/1364557032000119616</pub-id>
</citation>
</ref>
<ref id="B25">
<label>25.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bloom</surname>
<given-names>TL</given-names>
</name>
<name>
<surname>Glass</surname>
<given-names>NE</given-names>
</name>
<name>
<surname>Case</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Wright</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Nolte</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Parsons</surname>
<given-names>L</given-names>
</name>
</person-group>. <article-title>Feasibility of an Online Safety Planning Intervention for Rural and Urban Pregnant Abused Women</article-title>. <source>Nurs Res</source> (<year>2014</year>) <volume>63</volume>:<fpage>243</fpage>&#x2013;<lpage>51</lpage>. <pub-id pub-id-type="doi">10.1097/NNR.0000000000000036</pub-id>
</citation>
</ref>
<ref id="B26">
<label>26.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Eden</surname>
<given-names>KB</given-names>
</name>
<name>
<surname>Perrin</surname>
<given-names>NA</given-names>
</name>
<name>
<surname>Hanson</surname>
<given-names>GC</given-names>
</name>
<name>
<surname>Messing</surname>
<given-names>JT</given-names>
</name>
<name>
<surname>Bloom</surname>
<given-names>TL</given-names>
</name>
<name>
<surname>Campbell</surname>
<given-names>JC</given-names>
</name>
<etal/>
</person-group> <article-title>Use of Online Safety Decision Aid by Abused Women: Effect on Decisional Conflict in a Randomized Controlled Trial</article-title>. <source>Am J Prev Med</source> (<year>2015</year>) <volume>48</volume>:<fpage>372</fpage>&#x2013;<lpage>83</lpage>. <pub-id pub-id-type="doi">10.1016/j.amepre.2014.09.027</pub-id>
</citation>
</ref>
<ref id="B27">
<label>27.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Glass</surname>
<given-names>NE</given-names>
</name>
<name>
<surname>Perrin</surname>
<given-names>NA</given-names>
</name>
<name>
<surname>Hanson</surname>
<given-names>GC</given-names>
</name>
<name>
<surname>Bloom</surname>
<given-names>TL</given-names>
</name>
<name>
<surname>Messing</surname>
<given-names>JT</given-names>
</name>
<name>
<surname>Clough</surname>
<given-names>AS</given-names>
</name>
<etal/>
</person-group> <article-title>The Longitudinal Impact of an Internet Safety Decision Aid for Abused Women</article-title>. <source>Am J Prev Med</source> (<year>2017</year>) <volume>52</volume>:<fpage>606</fpage>&#x2013;<lpage>15</lpage>. <pub-id pub-id-type="doi">10.1016/j.amepre.2016.12.014</pub-id>
</citation>
</ref>
<ref id="B28">
<label>28.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sargent</surname>
<given-names>KS</given-names>
</name>
<name>
<surname>McDonald Rvu</surname>
<given-names>NL</given-names>
</name>
<name>
<surname>Jouriles</surname>
<given-names>EN</given-names>
</name>
</person-group>. <article-title>Evaluating an Online Program to Help Children Exposed to Domestic Violence: Results of Two Randomized Controlled Trials</article-title>. <source>J Fam Violence</source> (<year>2016</year>) <volume>31</volume>:<fpage>647</fpage>&#x2013;<lpage>54</lpage>. <pub-id pub-id-type="doi">10.1007/s10896-016-9800-8</pub-id>
</citation>
</ref>
<ref id="B29">
<label>29.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Thraen</surname>
<given-names>IM</given-names>
</name>
<name>
<surname>Frasier</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Cochella</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Yaffe</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Goede</surname>
<given-names>P</given-names>
</name>
</person-group>. <article-title>The Use of TeleCAM as a Remote Web-Based Application for Child Maltreatment Assessment, Peer Review, and Case Documentation</article-title>. <source>Child Maltreat</source> (<year>2008</year>) <volume>13</volume>(<issue>4</issue>):<fpage>368</fpage>&#x2013;<lpage>76</lpage>. <pub-id pub-id-type="doi">10.1177/1077559508318068</pub-id>
</citation>
</ref>
<ref id="B30">
<label>30.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Blumling</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Kameg</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Cline</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Szpak</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Koller</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>Evaluation of a Standardized Patient Simulation on Undergraduate Nursing Students&#x2019; Knowledge and Confidence Pertaining to Intimate Partner Violence</article-title>. <source>J forensic Nurs</source> (<year>2018</year>) <volume>14</volume>:<fpage>174</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1097/JFN.0000000000000212</pub-id>
</citation>
</ref>
<ref id="B31">
<label>31.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Harris</surname>
<given-names>JJM</given-names>
</name>
<name>
<surname>Novalis&#x2010;Marine</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Amend</surname>
<given-names>RW</given-names>
</name>
<name>
<surname>Surprenant</surname>
<given-names>ZJ</given-names>
</name>
</person-group>. <article-title>Promoting Free Online CME for Intimate Partner Violence: What Works at what Cost?</article-title> <source>J Contin Educ Health Professions</source> (<year>2009</year>) <volume>29</volume>:<fpage>135</fpage>&#x2013;<lpage>41</lpage>. <pub-id pub-id-type="doi">10.1002/chp.20025</pub-id>
</citation>
</ref>
<ref id="B32">
<label>32.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>McAndrew</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Pierre</surname>
<given-names>GC</given-names>
</name>
<name>
<surname>Kojanis</surname>
<given-names>LC</given-names>
</name>
</person-group>. <article-title>Effectiveness of an Online Tutorial on Intimate Partner Violence for Dental Students: A Pilot Study</article-title>. <source>J Dent Educ</source> (<year>2014</year>) <volume>78</volume>:<fpage>1176</fpage>&#x2013;<lpage>81</lpage>. <pub-id pub-id-type="doi">10.1002/j.0022-0337.2014.78.8.tb05789.x</pub-id>
</citation>
</ref>
<ref id="B33">
<label>33.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Agu</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Michael-Asalu</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Ramakrishnan</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Birriel</surname>
<given-names>PC</given-names>
</name>
<name>
<surname>Balogun</surname>
<given-names>O</given-names>
</name>
<name>
<surname>Parish</surname>
<given-names>A</given-names>
</name>
<etal/>
</person-group> <article-title>Improving Intimate Partner Violence Services in home Visiting: A Multisite Learning Collaborative Approach</article-title>. <source>J Soc Serv Res</source> (<year>2019</year>) <volume>46</volume>:<fpage>439</fpage>&#x2013;<lpage>51</lpage>. <pub-id pub-id-type="doi">10.1080/01488376.2019.1582452</pub-id>
</citation>
</ref>
<ref id="B34">
<label>34.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Goldman</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Goyal</surname>
<given-names>D</given-names>
</name>
</person-group>. <article-title>Knowledge Regarding Child Victims of Commercial Sexual Exploitation and the Feasibility of Using a Smartphone Application: A Pilot Study</article-title>. <source>J forensic Nurs</source> (<year>2019</year>) <volume>15</volume>:<fpage>103</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1097/JFN.0000000000000240</pub-id>
</citation>
</ref>
<ref id="B35">
<label>35.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jabaley</surname>
<given-names>JJ</given-names>
</name>
<name>
<surname>Lutzker</surname>
<given-names>JR</given-names>
</name>
<name>
<surname>Whitaker</surname>
<given-names>DJ</given-names>
</name>
<name>
<surname>Self-Brown</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Using iPhones&#x2122; to Enhance and Reduce Face-To-Face home Safety Sessions Within SafeCare&#xae;: An Evidence-Based Child Maltreatment Prevention Program</article-title>. <source>J Fam Violence</source> (<year>2011</year>) <volume>26</volume>:<fpage>377</fpage>&#x2013;<lpage>85</lpage>. <pub-id pub-id-type="doi">10.1007/s10896-011-9372-6</pub-id>
</citation>
</ref>
<ref id="B36">
<label>36.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lefever</surname>
<given-names>JB</given-names>
</name>
<name>
<surname>Howard</surname>
<given-names>KS</given-names>
</name>
<name>
<surname>Lanzi</surname>
<given-names>RG</given-names>
</name>
<name>
<surname>Borkowski</surname>
<given-names>JG</given-names>
</name>
<name>
<surname>Atwater</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Guest</surname>
<given-names>KC</given-names>
</name>
<etal/>
</person-group> <article-title>Cell Phones and the Measurement of Child Neglect: The Validity of the Parent-Child Activities Interview</article-title>. <source>Child Maltreat</source> (<year>2008</year>) <volume>13</volume>:<fpage>320</fpage>&#x2013;<lpage>33</lpage>. <pub-id pub-id-type="doi">10.1177/1077559508320680</pub-id>
</citation>
</ref>
<ref id="B37">
<label>37.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Abujarad</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Ulrich</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Edwards</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Choo</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Pantalon</surname>
<given-names>MV</given-names>
</name>
<name>
<surname>Jubanyik</surname>
<given-names>K</given-names>
</name>
<etal/>
</person-group> <article-title>Development and Usability Evaluation of VOICES: A Digital Health Tool to Identify Elder Mistreatment</article-title>. <source>J Am Geriatr Soc</source> (<year>2021</year>) <volume>69</volume>:<fpage>1469</fpage>&#x2013;<lpage>78</lpage>. <pub-id pub-id-type="doi">10.1111/jgs.17068</pub-id>
</citation>
</ref>
<ref id="B38">
<label>38.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bagwell-Gray</surname>
<given-names>ME</given-names>
</name>
<name>
<surname>Loerzel</surname>
<given-names>E</given-names>
</name>
<name>
<surname>Dana Sacco</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Messing</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Glass</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Sabri</surname>
<given-names>B</given-names>
</name>
<etal/>
</person-group> <article-title>From Myplan to Ourcircle: Adapting a Web-Based Safety Planning Intervention for Native American Women Exposed to Intimate Partner Violence</article-title>. <source>J Ethnic Cult Divers Soc Work</source> (<year>2021</year>) <volume>30</volume>:<fpage>163</fpage>&#x2013;<lpage>80</lpage>. <pub-id pub-id-type="doi">10.1080/15313204.2020.1770651</pub-id>
</citation>
</ref>
<ref id="B39">
<label>39.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Constantino</surname>
<given-names>RE</given-names>
</name>
<name>
<surname>Braxter</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Ren</surname>
<given-names>D</given-names>
</name>
<name>
<surname>Burroughs</surname>
<given-names>JD</given-names>
</name>
<name>
<surname>Doswell</surname>
<given-names>WM</given-names>
</name>
<name>
<surname>Wu</surname>
<given-names>L</given-names>
</name>
<etal/>
</person-group> <article-title>Comparing Online With Face-To-Face HELPP Intervention in Women Experiencing Intimate Partner Violence</article-title>. <source>Issues Ment Health Nurs</source> (<year>2015</year>) <volume>36</volume>:<fpage>430</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.3109/01612840.2014.991049</pub-id>
</citation>
</ref>
<ref id="B40">
<label>40.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gur</surname>
<given-names>OM</given-names>
</name>
<name>
<surname>Ibarra</surname>
<given-names>PR</given-names>
</name>
<name>
<surname>Erez</surname>
<given-names>E</given-names>
</name>
</person-group>. <article-title>Specialization and the Use of GPS for Domestic Violence by Pretrial Programs: Findings From a National Survey of US Practitioners</article-title>. <source>J Technol Hum Serv</source> (<year>2016</year>) <volume>34</volume>:<fpage>32</fpage>&#x2013;<lpage>62</lpage>. <pub-id pub-id-type="doi">10.1080/15228835.2016.1139418</pub-id>
</citation>
</ref>
<ref id="B41">
<label>41.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ibarra</surname>
<given-names>PR</given-names>
</name>
<name>
<surname>Gur</surname>
<given-names>OM</given-names>
</name>
<name>
<surname>Erez</surname>
<given-names>E</given-names>
</name>
</person-group>. <article-title>Surveillance as Casework: Supervising Domestic Violence Defendants With GPS Technology</article-title>. <source>Crime, L Soc Change</source> (<year>2014</year>) <volume>62</volume>:<fpage>417</fpage>&#x2013;<lpage>44</lpage>. <pub-id pub-id-type="doi">10.1007/s10611-014-9536-4</pub-id>
</citation>
</ref>
<ref id="B42">
<label>42.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hassija</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Gray</surname>
<given-names>MJ</given-names>
</name>
</person-group>. <article-title>The Effectiveness and Feasibility of Videoconferencing Technology to Provide Evidence-Based Treatment to Rural Domestic Violence and Sexual Assault Populations</article-title>. <source>Telemed e-Health</source> (<year>2011</year>) <volume>17</volume>:<fpage>309</fpage>&#x2013;<lpage>15</lpage>. <pub-id pub-id-type="doi">10.1089/tmj.2010.0147</pub-id>
</citation>
</ref>
<ref id="B43">
<label>43.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Choo</surname>
<given-names>EK</given-names>
</name>
<name>
<surname>Zlotnick</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Strong</surname>
<given-names>DR</given-names>
</name>
<name>
<surname>Squires</surname>
<given-names>DD</given-names>
</name>
<name>
<surname>Tap&#xe9;</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Mello</surname>
<given-names>MJ</given-names>
</name>
</person-group>. <article-title>BSAFER: A Web-Based Intervention for Drug Use and Intimate Partner Violence Demonstrates Feasibility and Acceptability Among Women in the Emergency Department</article-title>. <source>Substance abuse</source> (<year>2016</year>) <volume>37</volume>:<fpage>441</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1080/08897077.2015.1134755</pub-id>
</citation>
</ref>
<ref id="B44">
<label>44.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ejaz</surname>
<given-names>FK</given-names>
</name>
<name>
<surname>Rose</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Anetzberger</surname>
<given-names>G</given-names>
</name>
</person-group>. <article-title>Development and Implementation of Online Training Modules on Abuse, Neglect, and Exploitation</article-title>. <source>J elder abuse neglect</source> (<year>2017</year>) <volume>29</volume>:<fpage>73</fpage>&#x2013;<lpage>101</lpage>. <pub-id pub-id-type="doi">10.1080/08946566.2017.1307153</pub-id>
</citation>
</ref>
<ref id="B45">
<label>45.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Paranal</surname>
<given-names>RK</given-names>
</name>
<name>
<surname>Washington</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Derrick</surname>
<given-names>C</given-names>
</name>
</person-group>. <article-title>Utilizing Online Training for Child Sexual Abuse Prevention: Benefits and Limitations</article-title>. <source>J Child Sex Abus</source> (<year>2012</year>) <volume>21</volume>:<fpage>507</fpage>&#x2013;<lpage>20</lpage>. <pub-id pub-id-type="doi">10.1080/10538712.2012.697106</pub-id>
</citation>
</ref>
<ref id="B46">
<label>46.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bacchus</surname>
<given-names>LJ</given-names>
</name>
<name>
<surname>Bullock</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Sharps</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Burnett</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Schminkey</surname>
<given-names>DL</given-names>
</name>
<name>
<surname>Buller</surname>
<given-names>AM</given-names>
</name>
<etal/>
</person-group> <article-title>Infusing Technology Into Perinatal Home Visitation in the United States for Women Experiencing Intimate Partner Violence: Exploring the Interpretive Flexibility of an mHealth Intervention</article-title>. <source>J Med Internet Res</source> (<year>2016</year>) <volume>18</volume>:<fpage>e302</fpage>. <pub-id pub-id-type="doi">10.2196/jmir.6251</pub-id>
</citation>
</ref>
<ref id="B47">
<label>47.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rothman</surname>
<given-names>EF</given-names>
</name>
<name>
<surname>Meade</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Decker</surname>
<given-names>MR</given-names>
</name>
</person-group>. <article-title>E-Mail Use Among a Sample of Intimate Partner Violence Shelter Residents</article-title>. <source>Violence Against Women</source> (<year>2009</year>) <volume>15</volume>:<fpage>736</fpage>&#x2013;<lpage>44</lpage>. <pub-id pub-id-type="doi">10.1177/1077801209332188</pub-id>
</citation>
</ref>
<ref id="B48">
<label>48.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>MacLeod</surname>
<given-names>KJ</given-names>
</name>
<name>
<surname>Marcin</surname>
<given-names>JP</given-names>
</name>
<name>
<surname>Boyle</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Miyamoto</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Dimand</surname>
<given-names>RJ</given-names>
</name>
<name>
<surname>Rogers</surname>
<given-names>KK</given-names>
</name>
</person-group>. <article-title>Using Telemedicine to Improve the Care Delivered to Sexually Abused Children in Rural, Underserved Hospitals</article-title>. <source>Pediatrics</source> (<year>2009</year>) <volume>123</volume>:<fpage>223</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1542/peds.2007-1921</pub-id>
</citation>
</ref>
<ref id="B49">
<label>49.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Jimison</surname>
<given-names>H</given-names>
</name>
<name>
<surname>Gorman</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Woods</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Nygren</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Walker</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Norris</surname>
<given-names>S</given-names>
</name>
<etal/>
</person-group> <article-title>Barriers and Drivers of Health Information Technology Use for the Elderly, Chronically Ill, and Underserved</article-title>. <source>Evid Rep Technol Assess (Full Rep)</source> (<year>2008</year>) <volume>175</volume>:<fpage>1</fpage>&#x2013;<lpage>1422</lpage>.</citation>
</ref>
<ref id="B50">
<label>50.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lober</surname>
<given-names>WB</given-names>
</name>
<name>
<surname>Zierler</surname>
<given-names>B</given-names>
</name>
<name>
<surname>Herbaugh</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Shinstrom</surname>
<given-names>SE</given-names>
</name>
<name>
<surname>Stolyar</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Kim</surname>
<given-names>EH</given-names>
</name>
<etal/>
</person-group> <article-title>Barriers to the Use of a Personal Health Record by an Elderly Population</article-title>. <source>AMIA Annu Symp Proc</source> (<year>2006</year>) <volume>2006</volume>:<fpage>514</fpage>&#x2013;<lpage>8</lpage>.</citation>
</ref>
<ref id="B51">
<label>51.</label>
<citation citation-type="book">
<collab>Internet World Stats &#xa9; Copyright.</collab> <source>Miniwatts Marketing Group</source> (<year>2019</year>). <comment>Available from: <ext-link ext-link-type="uri" xlink:href="http://internetworldstats.com/">http://internetworldstats.com/</ext-link> (Accessed April 8, 2019)</comment>.</citation>
</ref>
<ref id="B52">
<label>52.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Fleming</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Reitsma</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Pappafotopoulos</surname>
<given-names>T</given-names>
</name>
<name>
<surname>Duan</surname>
<given-names>X</given-names>
</name>
<name>
<surname>Birrel</surname>
<given-names>R.</given-names>
</name>
</person-group> <source>The State of Consumers and Technology Benchmark 2015</source>. <publisher-loc>US. Cambridge, MA</publisher-loc>: <publisher-name>Forrester</publisher-name> (<year>2015</year>).</citation>
</ref>
<ref id="B53">
<label>53.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Beach</surname>
<given-names>SR</given-names>
</name>
</person-group>. <article-title>The Role of Technology in Elder Abuse Research</article-title>. In: <person-group person-group-type="editor">
<name>
<surname>Dong</surname>
<given-names>X</given-names>
</name>
</person-group>, editor. <source>Elder Abuse: Research, Practice and Policy</source>. <publisher-loc>Cham</publisher-loc>: <publisher-name>Springer</publisher-name> (<year>2017</year>). p. <fpage>201</fpage>&#x2013;<lpage>14</lpage>.</citation>
</ref>
<ref id="B54">
<label>54.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Peek-Asa</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Wallis</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Harland</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Beyer</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Dickey</surname>
<given-names>P</given-names>
</name>
<name>
<surname>Saftlas</surname>
<given-names>A</given-names>
</name>
</person-group>. <article-title>Rural Disparity in Domestic Violence Prevalence and Access to Resources</article-title>. <source>J Womens Health (Larchmt)</source> (<year>2011</year>) <volume>20</volume>:<fpage>1743</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1089/jwh.2011.2891</pub-id>
</citation>
</ref>
<ref id="B55">
<label>55.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cantrell</surname>
<given-names>MA</given-names>
</name>
<name>
<surname>Lupinacci</surname>
<given-names>P</given-names>
</name>
</person-group>. <article-title>Methodological Issues in Online Data Collection</article-title>. <source>J Adv Nurs</source> (<year>2007</year>) <volume>60</volume>:<fpage>544</fpage>&#x2013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1111/j.1365-2648.2007.04448.x</pub-id>
</citation>
</ref>
<ref id="B56">
<label>56.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wharton</surname>
<given-names>CM</given-names>
</name>
<name>
<surname>Hampl</surname>
<given-names>JS</given-names>
</name>
<name>
<surname>Hall</surname>
<given-names>R</given-names>
</name>
<name>
<surname>Winham</surname>
<given-names>DM</given-names>
</name>
</person-group>. <article-title>PCs or Paper-And Pencil:online Surveys for Data Collection</article-title>. <source>J Am Diet Assoc</source> (<year>2003</year>) <volume>103</volume>:<fpage>1458</fpage>&#x2013;<lpage>60</lpage>. <pub-id pub-id-type="doi">10.1016/j.jada.2003.09.004</pub-id>
</citation>
</ref>
<ref id="B57">
<label>57.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gillespie</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Branjerdporn</surname>
<given-names>G</given-names>
</name>
<name>
<surname>Tighe</surname>
<given-names>K</given-names>
</name>
<name>
<surname>Carrasco</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Baird</surname>
<given-names>K</given-names>
</name>
</person-group>. <article-title>Domestic Violence Screening in a Public Mental Health Service: A Qualitative Examination of Mental Health Clinician Responses to DFV</article-title>. <source>J Psychiatr Ment Health Nurs</source> (<year>2023</year>) <volume>30</volume>:<fpage>472</fpage>&#x2013;<lpage>80</lpage>. <pub-id pub-id-type="doi">10.1111/jpm.12875</pub-id>
</citation>
</ref>
<ref id="B58">
<label>58.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Weinert</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Cudney</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Hill</surname>
<given-names>WG</given-names>
</name>
</person-group>. <article-title>Rural Women, Technology, and Self-Management of Chronic Illness</article-title>. <source>Can J Nurs Res</source> (<year>2008</year>) <volume>40</volume>:<fpage>114</fpage>&#x2013;<lpage>34</lpage>.</citation>
</ref>
<ref id="B59">
<label>59.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ellsberg</surname>
<given-names>M</given-names>
</name>
<name>
<surname>Jansen</surname>
<given-names>HA</given-names>
</name>
<name>
<surname>Heise</surname>
<given-names>L</given-names>
</name>
<name>
<surname>Watts</surname>
<given-names>CH</given-names>
</name>
<name>
<surname>Garcia-Moreno</surname>
<given-names>C, </given-names>
</name>
</person-group>
<collab>WHO Multi-country Study on Women&#x27;s Health and Domestic Violence against Women Study Team</collab>. <article-title>Intimate Partner Violence and Women&#x27;s Physical and Mental Health in the WHO Multi-Country Study on Women&#x27;s Health and Domestic Violence: An Observational Study</article-title>. <source>The lancet</source> (<year>2008</year>) <volume>371</volume>:<fpage>1165</fpage>&#x2013;<lpage>72</lpage>. <pub-id pub-id-type="doi">10.1016/S0140-6736(08)60522-X</pub-id>
</citation>
</ref>
<ref id="B60">
<label>60.</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Kivran-Swaine</surname>
<given-names>F</given-names>
</name>
<name>
<surname>Brody</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Diakopoulos</surname>
<given-names>N</given-names>
</name>
<name>
<surname>Naaman</surname>
<given-names>M</given-names>
</name>
</person-group>. <article-title>Of joy and Gender: Emotional Expression in Online Social Networks</article-title>. In: <person-group person-group-type="editor">
<name>
<surname>Poltrock</surname>
<given-names>S</given-names>
</name>
</person-group>, editor. <source>Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work Companion</source>. <publisher-loc>New York, NY, United States</publisher-loc>: <publisher-name>Association for Computing Machinery</publisher-name> (<year>2012</year>). p. <fpage>139</fpage>&#x2013;<lpage>142</lpage>.</citation>
</ref>
<ref id="B61">
<label>61.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hui</surname>
<given-names>V</given-names>
</name>
<name>
<surname>Constantino</surname>
<given-names>RE</given-names>
</name>
<name>
<surname>Lee</surname>
<given-names>YJ</given-names>
</name>
</person-group>. <article-title>Harnessing Machine Learning in Tackling Domestic Violence&#x2014;An Integrative Review</article-title>. <source>Int J Environ Res Public Health</source> (<year>2023</year>) <volume>20</volume>(<issue>6</issue>):<fpage>4984</fpage>. <pub-id pub-id-type="doi">10.3390/ijerph20064984</pub-id>
</citation>
</ref>
<ref id="B62">
<label>62.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Murray</surname>
<given-names>CE</given-names>
</name>
<name>
<surname>Pow</surname>
<given-names>AM</given-names>
</name>
<name>
<surname>Chow</surname>
<given-names>A</given-names>
</name>
<name>
<surname>Nemati</surname>
<given-names>H</given-names>
</name>
<name>
<surname>White</surname>
<given-names>J</given-names>
</name>
</person-group>. <article-title>Domestic Violence Service Providers&#x2019; Needs and Perceptions of Technology: A Qualitative Study</article-title>. <source>J Technol Hum Serv</source> (<year>2015</year>) <volume>33</volume>:<fpage>133</fpage>&#x2013;<lpage>55</lpage>. <pub-id pub-id-type="doi">10.1080/15228835.2014.1000558</pub-id>
</citation>
</ref>
<ref id="B63">
<label>63.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Southworth</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Finn</surname>
<given-names>J</given-names>
</name>
<name>
<surname>Dawson</surname>
<given-names>S</given-names>
</name>
<name>
<surname>Fraser</surname>
<given-names>C</given-names>
</name>
<name>
<surname>Tucker</surname>
<given-names>S</given-names>
</name>
</person-group>. <article-title>Intimate Partner Violence, Technology, and Stalking</article-title>. <source>Violence Against Women</source> (<year>2007</year>) <volume>13</volume>:<fpage>842</fpage>&#x2013;<lpage>56</lpage>. <pub-id pub-id-type="doi">10.1177/1077801207302045</pub-id>
</citation>
</ref>
<ref id="B64">
<label>64.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Baddam</surname>
<given-names>B</given-names>
</name>
</person-group>. <article-title>Technology and its Danger to Domestic Violence Victims: How Did He Find Me?</article-title> <source>Alb LJ Sci Tech</source> (<year>2017</year>) <volume>28</volume>:<fpage>73</fpage>.</citation>
</ref>
<ref id="B65">
<label>65.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Melander</surname>
<given-names>LA</given-names>
</name>
</person-group>. <article-title>College Students&#x27; Perceptions of Intimate Partner Cyber Harassment</article-title>. <source>Cyberpsychol Behav Soc Netw</source> (<year>2010</year>) <volume>13</volume>:<fpage>263</fpage>&#x2013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1089/cyber.2009.0221</pub-id>
</citation>
</ref>
<ref id="B66">
<label>66.</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Gitlin</surname>
<given-names>LN</given-names>
</name>
</person-group>. <article-title>Introducing a New Intervention: An Overview of Research Phases and Common Challenges</article-title>. <source>Am J Occup Ther</source> (<year>2013</year>) <volume>67</volume>:<fpage>177</fpage>&#x2013;<lpage>84</lpage>. <pub-id pub-id-type="doi">10.5014/ajot.2013.006742</pub-id>
</citation>
</ref>
<ref id="B67">
<label>67.</label>
<citation citation-type="book">
<collab>U.S. Census Bureau.</collab> <source>Defining Rural at the U.S. Census Bureau American Community Survey and Geography Brief</source> (<year>2016</year>). <comment>Available from: <ext-link ext-link-type="uri" xlink:href="https://www2.census.gov/geo/pdfs/reference/ua/Defining_Rural.pdf">https://www2.census.gov/geo/pdfs/reference/ua/Defining_Rural.pdf</ext-link>
</comment> (<comment>Accessed April 1, 2023</comment>).</citation>
</ref>
</ref-list>
</back>
</article>