<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="2.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychol.</journal-id>
<journal-title>Frontiers in Psychology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychol.</abbrev-journal-title>
<issn pub-type="epub">1664-1078</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyg.2023.1289817</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Psychology</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>A critical analysis of gender-based violence reporting and evidence building applications (GBVxTech) for capturing memory reports</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes"><name><surname>Stevens</surname> <given-names>Laura M.</given-names></name><xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/1146320/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/investigation/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/supervision/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
<contrib contrib-type="author"><name><surname>Bennett</surname> <given-names>Tia C.</given-names></name><xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/2163536/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/project-administration/"/>
<role content-type="https://credit.niso.org/contributor-roles/visualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
<contrib contrib-type="author"><name><surname>Cotton</surname> <given-names>Jessica</given-names></name><xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/investigation/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author"><name><surname>Rockowitz</surname> <given-names>Sarah</given-names></name><xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/1174972/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/investigation/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author"><name><surname>Flowe</surname> <given-names>Heather D.</given-names></name><xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/721076/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/investigation/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/supervision/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>School of Psychology, University of Birmingham</institution>, <addr-line>Birmingham</addr-line>, <country>United Kingdom</country></aff>
<aff id="aff2"><sup>2</sup><institution>School of Psychology, Cardiff University</institution>, <addr-line>Cardiff</addr-line>, <country>United Kingdom</country></aff>
<author-notes>
<fn fn-type="edited-by" id="fn0001">
<p>Edited by: Dominic Willmott, Loughborough University, United Kingdom</p>
</fn>
<fn fn-type="edited-by" id="fn0002">
<p>Reviewed by: B. Kennath Widanaralalage, King's College London, United Kingdom; Samantha Mason, University of Leeds, United Kingdom</p>
</fn>
<corresp id="c001">&#x002A;Correspondence: Laura M. Stevens, <email>lms825@student.bham.ac.uk</email></corresp>
</author-notes>
<pub-date pub-type="epub">
<day>18</day>
<month>01</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="collection">
<year>2023</year>
</pub-date>
<volume>14</volume>
<elocation-id>1289817</elocation-id>
<history>
<date date-type="received">
<day>06</day>
<month>09</month>
<year>2023</year>
</date>
<date date-type="accepted">
<day>15</day>
<month>11</month>
<year>2023</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2024 Stevens, Bennett, Cotton, Rockowitz and Flowe.</copyright-statement>
<copyright-year>2024</copyright-year>
<copyright-holder>Stevens, Bennett, Cotton, Rockowitz and Flowe</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<sec>
<title>Introduction</title>
<p>Gender-based violence (GBV) is under-reported to the authorities owing to the stigma, shame, and fear of reprisal that surrounds these crimes. To address this, there has been an influx of technologies, including mobile phone and online applications that allow victim-survivors (hereafter, victims) to document and report GBV (hereafter referred to as GBVxTech). We critically analysed the extent to which GBVxTech applications align with the scientific knowledge base on gathering accounts of crimes from victims and witnesses.</p>
</sec>
<sec>
<title>Methods</title>
<p>We identified 41 reporting and evidence building applications from around the world but found many (<italic>n</italic>&#x2009;=&#x2009;19) were no longer accessible. A total of 13 applications met the study criteria and were available for download. We evaluated each application on how well its design and features align with established minimum best practice standards for gathering complete and accurate accounts from witnesses and victims, such as the pre-interview instructions (e.g., setting ground rules), questioning approach (e.g., using open-ended questions), and the adequacy of security features (e.g., password protection).</p>
</sec>
<sec>
<title>Results and Discussion</title>
<p>We found most applications employ open questions, encourage victims to report information in an independent voice, and seek to elicit information pertinent to a criminal investigation. None of the applications use leading questions. However, most applications do not establish ground rules, and many use forced-choice questions, do not time stamp the information gathered, or document when users change their answers. Many applications have limited security features, potentially compromising users&#x2019; safety. Further, some applications do not provide information about how to use the app, an informed consent procedure, or data usage information. We discuss the findings and offer recommendations for future GBVxTech development.</p>
</sec>
</abstract>
<kwd-group>
<kwd>gender-based violence</kwd>
<kwd>#MeToo</kwd>
<kwd>mobile applications</kwd>
<kwd>police interviews</kwd>
<kwd>rape</kwd>
<kwd>sexual violence</kwd>
</kwd-group>
<counts>
<fig-count count="1"/>
<table-count count="3"/>
<equation-count count="0"/>
<ref-count count="96"/>
<page-count count="13"/>
<word-count count="10656"/>
</counts>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Forensic and Legal Psychology</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<title>Introduction</title>
<p>Gender-based violence (GBV) is any harmful act perpetrated against an individual or group due to their gender, and encompasses domestic, sexual, psychological, financial, and digital violations, as well as female genital mutilation, human trafficking, and child marriage (<xref ref-type="bibr" rid="ref1018">United Nations, n.d.</xref>). GBV affects men, women, and children worldwide, with global estimates finding that one in three women over the age of 15 have experienced intimate partner violence or non-partner sexual violence at least once during their lifetime (<xref ref-type="bibr" rid="ref100">World Health Organization, 2021</xref>), and one in three men in the United States having experienced some form of sexual violence, intimate partner violence, or stalking within their lifetime (<xref ref-type="bibr" rid="ref80">Smith et al., 2018</xref>). Furthermore, the actual prevalence of GBV may be higher considering that many people do not disclose their victimisation (<xref ref-type="bibr" rid="ref99">World Health Organization, 2003</xref>) due to stigma, shame, and fear (<xref ref-type="bibr" rid="ref78">Shaibakova, 2020</xref>). Moreover, of all people who experience GBV, fewer than 40% seek any form of legal or medical assistance (<xref ref-type="bibr" rid="ref87">United Nations, 2015</xref>), and even fewer will have their case prosecuted (<xref ref-type="bibr" rid="ref35">Home Office, 2021</xref>).</p>
<p>Given global underreporting of GBV, the #MeToo movement was founded initially to support women and girls of colour who experienced sexual violence (<xref ref-type="bibr" rid="ref50">Me Too Movement, 2023</xref>) and to highlight how gender, race, and other inequalities intersect &#x201C;to produce unique experiences of violence&#x201D; (<xref ref-type="bibr" rid="ref37">Imkaan, 2019</xref>, pp. 3). The #MeToo movement later became a channel for victim-survivors (hereafter, victims) of sexual violence to disclose incidents on social media. These social media disclosures are revealing not only the widespread prevalence and nature of GBV but are also ushering in a burgeoning of mobile phone and online applications for gathering information about GBV incidents, hereafter referred to as <italic>GBVxTech</italic> (<xref ref-type="bibr" rid="ref98">World Bank Group, 2019</xref>). Victims, irrespective of gender, can use these applications to get help with accessing vital support services (e.g., medical and legal facilities) and to document incidents anonymously or confidentially, either in real-time or retrospectively. These digital data could potentially be admitted as evidence at trial in the United States (<xref ref-type="bibr" rid="ref53">Miller, 2022</xref>), the United Kingdom (<xref ref-type="bibr" rid="ref34">Hollie Guard, 2021</xref>), and Australia (<xref ref-type="bibr" rid="ref62">Paterson, 2018</xref>).</p>
<sec id="sec2">
<title>Benefits of GBVxTech</title>
<p>According to research, sexual assault victims and their support providers want an alternative reporting system, such as mobile phone applications and online reporting platforms, in addition to formal criminal justice reporting methods (<xref ref-type="bibr" rid="ref31">Heydon et al., 2023</xref>). There are many reasons for this. First, many applications and websites allow victims to report incidents in real-time and store their report (e.g., iWitnessed), which is crucial in situations where victims cannot report to the authorities. There may be no police station nearby for the victim to access support, such as in rural areas and in low- and middle-income countries (see <xref ref-type="bibr" rid="ref79">Smith et al., 2019</xref>), or victims may not be able to escape their attacker and make a report, such as in domestic violence cases. Compared to requiring formal police interviews, giving victims the flexibility to report sexual assault through informal or anonymous channels can reduce barriers and increase overall reporting rates (<xref ref-type="bibr" rid="ref31">Heydon et al., 2023</xref>). GBVxTech also stores reports for potential future use in criminal proceedings if victims choose to formally report later (<xref ref-type="bibr" rid="ref62">Paterson, 2018</xref>).</p>
<p>Second, GBV victims frequently delay reporting incidents to law enforcement (<xref ref-type="bibr" rid="ref71">Read and Connolly, 2007</xref>; <xref ref-type="bibr" rid="ref46">Loney-Howes et al., 2022</xref>), which results in missed opportunities to promptly gather forensic evidence and victim accounts (i.e., memory evidence). Memory strength for the crime decreases with time (<xref ref-type="bibr" rid="ref14">Ebbesen and Rienick, 1998</xref>; <xref ref-type="bibr" rid="ref24">Gabbert et al., 2009</xref>, <xref ref-type="bibr" rid="ref85">Stevens et al., 2022</xref>). With GBVxTech, victims can document a GBV incident soon after it occurs. Research has found that an early initial free recall attempt can maintain the accuracy and completeness of an individual&#x2019;s account over time if victims and witnesses are interviewed following recommended practise (e.g., <xref ref-type="bibr" rid="ref64">Penrod et al., 1982</xref>; <xref ref-type="bibr" rid="ref97">Wixted and Ebbesen, 1997</xref>; <xref ref-type="bibr" rid="ref14">Ebbesen and Rienick, 1998</xref>; <xref ref-type="bibr" rid="ref24">Gabbert et al., 2009</xref>), including in sexual offence cases (<xref ref-type="bibr" rid="ref84">Stevens et al., in prep.</xref>). Further still, immediate self-documentation can preserve memory accuracy over time (<xref ref-type="bibr" rid="ref26">Gabbert et al., 2022</xref>; <xref ref-type="bibr" rid="ref85">Stevens et al., 2022</xref>), and reduce susceptibility to misleading post-event information (<xref ref-type="bibr" rid="ref25">Gabbert et al., 2012</xref>). This is particularly important in GBV cases because the victim&#x2019;s account is often the primary, if not only, source of evidence (<xref ref-type="bibr" rid="ref39">Kebbell et al., 2007</xref>). Actual or perceived gaps or inconsistencies in victim accounts can diminish prosecution odds, as officials may think gaps and inconsistencies signal that the victim lacks credibility (<xref ref-type="bibr" rid="ref23">Freyd, 2004</xref>). Thus, timely documentation not only maintains accuracy (<xref ref-type="bibr" rid="ref14">Ebbesen and Rienick, 1998</xref>; <xref ref-type="bibr" rid="ref24">Gabbert et al., 2009</xref>) but also can serve to indirectly maintain the victim&#x2019;s credibility (see <xref ref-type="bibr" rid="ref94">Westera et al., 2011</xref>, <xref ref-type="bibr" rid="ref95">2013</xref>).</p>
<p>Third, some victims may prefer to use GBVxTech over contacting the police because the technology allows them to anonymously report the incidents to help law enforcement prevent future crimes. One example of an anonymous reporting app is <xref ref-type="bibr" rid="ref76">SafeTTC (n.d.)</xref>, where individuals can report incidents occurring in public spaces (e.g., public transport) to provide key information about local hotspots. <xref ref-type="bibr" rid="ref38">JDoe (n.d.)</xref> and <xref ref-type="bibr" rid="ref9">Callisto (n.d.)</xref> are also apps that allow anonymous reporting, and both use algorithms to monitor when multiple reports refer to the same perpetrator for purposes of identifying serial perpetrators.</p>
<p>Finally, GBVxTech may be used by those who wish to seek support services (<xref ref-type="bibr" rid="ref31">Heydon et al., 2023</xref>) or who intend to seek legal redress through civil action rather than criminal prosecution. For example, some apps (e.g., JDoe and Callisto) provide victims with the opportunity to be contacted by a lawyer or legal advisor to discuss their options.</p>
</sec>
<sec id="sec3">
<title>Minimum best practice principles and GBVxTech</title>
<p>The completeness and accuracy of victim accounts are largely dependent on adherence to minimum best practice principles for face-to-face interviews (e.g., <xref ref-type="bibr" rid="ref72">Read et al., 2009</xref>; <xref ref-type="bibr" rid="ref7">Brubacher et al., 2014</xref>). These principles were recently extended to self-administered written interviews that use open questions and free recall formats (<xref ref-type="bibr" rid="ref24">Gabbert et al., 2009</xref>, <xref ref-type="bibr" rid="ref26">2022</xref>). These principles set a minimum standard for interviews, and include establishing rapport and trust, providing narrative practise, setting ground rules, using open questions, and allowing for the victim&#x2019;s account to be appropriately documented (i.e., in the victim&#x2019;s own words, or via their &#x2018;independent voice&#x2019;; <xref ref-type="bibr" rid="ref66">Powell et al., 2005</xref>). It is also crucial that interviews adhere to principles that protect the victim&#x2019;s human rights (<xref ref-type="bibr" rid="ref57">Murad Code, 2022</xref>). Since the emergence of GBVxTech is recent, there has been little consideration of how these technologies might adopt these evidence-based principles. Below, we discuss the core principles of interviewing, and how they might be applied to GBVxTech.</p>
<sec id="sec4">
<title>Rapport building and trust</title>
<p>Rapport building is the process of establishing a relationship with another individual, and its use during an interview allows people to feel more at ease (<xref ref-type="bibr" rid="ref91">Vallano and Schreiber Compo, 2015</xref>). Establishing rapport can make victims feel more comfortable to disclose information (<xref ref-type="bibr" rid="ref20">Fisher and Geiselman, 1992</xref>). When an interviewer establishes rapport with a victim, it promotes a feeling of comfort, whereby a victim feels safe and relaxed to discuss their experiences (<xref ref-type="bibr" rid="ref63">Patterson, 2011</xref>). Interviewers can foster this environment by ensuring the victim feels believed (<xref ref-type="bibr" rid="ref63">Patterson, 2011</xref>), displaying empathy (<xref ref-type="bibr" rid="ref30">Greeson et al., 2014</xref>; <xref ref-type="bibr" rid="ref43">Kim et al., 2020</xref>), and by being personable with the victim (e.g., sharing a personal detail/story separate to the event to be discussed within the interview; <xref ref-type="bibr" rid="ref30">Greeson et al., 2014</xref>). Rapport building has been found to increase the accuracy of the victim&#x2019;s account (<xref ref-type="bibr" rid="ref41">Kieckhaefer et al., 2014</xref>; <xref ref-type="bibr" rid="ref90">Vallano et al., 2015</xref>), and increase the probability that victims who wish to make a formal complaint will carry through and complete the reporting process (<xref ref-type="bibr" rid="ref6">Brooks and Burman, 2017</xref>).</p>
<p>Rapport building is essential in dyadic person-to-person interviews for sexual assault (<xref ref-type="bibr" rid="ref96">Westera et al., 2016</xref>). Rapport is established through dynamic individual exchanges (see <xref ref-type="bibr" rid="ref1">Abbe and Brandon, 2013</xref>; <xref ref-type="bibr" rid="ref27">Gabbert et al., 2021</xref>, for reviews), whereas apps feature structured questioning and inflexible interaction. Undeniably, it is harder to implement rapport building techniques using technology compared to face-to-face contexts (<xref ref-type="bibr" rid="ref51">Meijer et al., 2021</xref>). Non-verbal communication (eye contact, open body language etc.) and verbal communication (affirmative responses, comforting the victim during disclosure) are methods used in rapport building (<xref ref-type="bibr" rid="ref1">Abbe and Brandon, 2013</xref>), and these cannot be simulated in GBVxTech applications. Trust, however, is one component within the definition of rapport (<xref ref-type="bibr" rid="ref58">Neequaye and Giolla, 2022</xref>) that could be achieved in a non-dyadic context (<xref ref-type="bibr" rid="ref51">Meijer et al., 2021</xref>). Examples include ensuring the technology clearly conveys the purpose of data collection, reassuring users with respect to data security, and obtaining informed consent regarding data storage and usage (<xref ref-type="bibr" rid="ref44">Liu, 2018</xref>; <xref ref-type="bibr" rid="ref59">Obada-Obieh et al., 2020</xref>). By establishing trust, users may feel more comfortable sharing information (<xref ref-type="bibr" rid="ref1">Abbe and Brandon, 2013</xref>; <xref ref-type="bibr" rid="ref27">Gabbert et al., 2021</xref>), which is a fundamental reason for establishing rapport.</p>
<p>Another critical component of helping victims to feel more comfortable with the interview experience is narrative practice. This allows the interviewee to practise recalling a neutral or positive episodic event before they provide information about the crime (<xref ref-type="bibr" rid="ref75">Roberts et al., 2004</xref>; <xref ref-type="bibr" rid="ref48">Lyon et al., 2014</xref>; <xref ref-type="bibr" rid="ref101">Yi and Lamb, 2018</xref>). This is beneficial because it gives victims the opportunity to familiarise themselves with the style of questioning that will be used during the interview (<xref ref-type="bibr" rid="ref74">Roberts et al., 2011</xref>), which in turn increases the number and accuracy of details disclosed during subsequent recalls (<xref ref-type="bibr" rid="ref83">Sternberg et al., 1997</xref>; <xref ref-type="bibr" rid="ref69">Price et al., 2013</xref>). Beyond increasing memory recall accuracy and completeness, narrative practise has also been found to help victims feel more comfortable during the interview by improving their understanding of the interview process (<xref ref-type="bibr" rid="ref8">Brubacher et al., 2020</xref>). Narrative practise could be implemented within GBVxTech by asking victims to freely recall a positive or neutral event before beginning their report.</p>
</sec>
<sec id="sec5">
<title>Ground rules</title>
<p>Ground rules are clear, simple instructions given to the victim that establish what to expect during the interview (<xref ref-type="bibr" rid="ref66">Powell et al., 2005</xref>). These instructions enhance memory reporting during the interview and help to manage interviewee expectations (<xref ref-type="bibr" rid="ref19">Fessinger et al., 2021</xref>). Key ground rules include encouraging the interviewee to say &#x2018;I do not know&#x2019; when they do not know an answer to a question, and correcting the interviewer if the interviewer does not accurately understand what the interviewee has said (<xref ref-type="bibr" rid="ref73">Ridley et al., 2012</xref>). In addition to managing expectations, encouraging &#x2018;do not know&#x2019; responses increases the accuracy of memory reports (<xref ref-type="bibr" rid="ref77">Scoboria and Fisico, 2013</xref>). Although most of the research about ground rules has focused on child interviewees, it is also useful with adults during investigative interviews (<xref ref-type="bibr" rid="ref2">Ali et al., 2020</xref>) and in lineup tests (<xref ref-type="bibr" rid="ref92">Weber and Perfect, 2012</xref>; <xref ref-type="bibr" rid="ref93">Wells et al., 2020</xref>). These research studies illustrate the importance of ground rules; but it is unclear to what extent these rules have been applied in the context of GBVxTech.</p>
<p>We were particularly interested in whether the applications we found would allow users to indicate when they do not know an answer to a question, or instead either require users to provide information or allow them to leave questions blank. Requiring users to provide information that they do not explicitly remember is problematic should the case progress to investigation. Requiring responses can introduce inaccuracy, inconsistency, or uncertainty in accounts. Allowing &#x2018;do not know&#x2019; or &#x2018;do not remember&#x2019; options protects against false information whilst signalling when users truly lack memory for certain details.</p>
</sec>
<sec id="sec6">
<title>Independent voice</title>
<p>During an interview, it is essential that the victim&#x2019;s voice is heard and not influenced by other information. This can occur if the victim overhears information provided by other witnesses (<xref ref-type="bibr" rid="ref28">Gabbert et al., 2003</xref>) or via information shared by the interviewer (<xref ref-type="bibr" rid="ref45">Loftus and Palmer, 1974</xref>). It is also particularly useful for interviewers to encourage a free recall account via open-ended prompts at the beginning of the interview before asking specific questions to ensure that the victim&#x2019;s initial account is given without any influence from the interviewer (<xref ref-type="bibr" rid="ref20">Fisher and Geiselman, 1992</xref>; <xref ref-type="bibr" rid="ref65">Powell, 2002</xref>; <xref ref-type="bibr" rid="ref56">Ministry of Justice, 2022</xref>). Additionally, interviewers should not interrupt the victim whilst they provide their account, because this can discourage the victim from taking an active role in the interview or may break the rhythm of their recall, which could result in their not reporting details that they otherwise would have remembered and reported and/or damage their independent voice (<xref ref-type="bibr" rid="ref20">Fisher and Geiselman, 1992</xref>). Further, accounts should be recorded verbatim, without bias or opinion from the interviewer (<xref ref-type="bibr" rid="ref65">Powell, 2002</xref>), in the victim&#x2019;s native language to reduce cognitive load and maximise accuracy (<xref ref-type="bibr" rid="ref70">Raver et al., 2023</xref>), and in a format that is simple and accessible for the victim (e.g., typed/voice recorded, <xref ref-type="bibr" rid="ref24">Gabbert et al., 2009</xref>). Despite evidence that this principle is crucial for obtaining an accurate report from victims, the extent to which independent voice is maintained in the context of GBVxTech remains to be seen.</p>
</sec>
<sec id="sec7">
<title>Open questions</title>
<p>Open questions are essential during a police interview. Open questions are used to elicit unrestricted answers and allow the interviewee to give a free narrative account of events (<xref ref-type="bibr" rid="ref56">Ministry of Justice, 2022</xref>). Due to the nature of open questions, they have a broad focus and do not dictate what information the interviewee should be reporting (<xref ref-type="bibr" rid="ref67">Powell and Snow, 2007</xref>), which enables interviewees to respond freely. Open questions are beneficial because they result in more detailed and accurate responses than yes/no and forced-choice questions (<xref ref-type="bibr" rid="ref60">Oxburgh et al., 2010</xref>; <xref ref-type="bibr" rid="ref94">Westera et al., 2011</xref>). Furthermore, open questions reduce the risk of the interviewer influencing the victim&#x2019;s response by imposing expectations or bias (i.e., avoiding leading questions, <xref ref-type="bibr" rid="ref55">Milne and Bull, 2006</xref>). Recommended practice entails asking open questions that have the least possible influence on memory reporting, thereby enabling victims to provide an independent account (<xref ref-type="bibr" rid="ref54">Milne and Bull, 1999</xref>; <xref ref-type="bibr" rid="ref32">Heydon and Powell, 2018</xref>). Given the importance of open questions in obtaining detailed and accurate statements, we were interested in the extent to which GBVxTech utilises them. Whilst open questions are considered best practice, most interviewers use specific questions (<xref ref-type="bibr" rid="ref66">Powell et al., 2005</xref>). Specific questions, including who/what/when/where questions, yes/no questions, and forced choice questions (<xref ref-type="bibr" rid="ref4">Benson and Powell, 2015</xref>) encourage the interviewee to answer with a single word or detail, and this tends to limit the amount of information elicited from the interviewee (<xref ref-type="bibr" rid="ref47">Lyon, 2014</xref>). Therefore, we also examined the use of specific questions in reviewing the applications.</p>
</sec>
<sec id="sec8">
<title>Human rights principles</title>
<p>Our analysis was also inspired by fundamental human rights standards and principles regarding respect for the life, dignity, and privacy of interviewees, as outlined in the <xref ref-type="bibr" rid="ref57">Murad Code (2022)</xref> and emphasised by Juan Mendez, the UN Special Rapporteur on Torture (<xref ref-type="bibr" rid="ref52">Mendez and Areh, 2021</xref>). The Murad Code, named after Nobel Peace Prize winner Nadia Murad, outlines ethical standards for interviewing sexual violence victims, including obtaining informed consent, protecting their privacy and safety, and avoiding re-traumatisation. These human rights principles also extend to digital evidence gathering through GBVxTech, which is key in humanitarian crises where users face heightened vulnerability (<xref ref-type="bibr" rid="ref1008">Hankins, 2019</xref>). However, the principles also apply more broadly given the sensitive nature of sexual violence evidence, regardless of context.</p>
</sec>
</sec>
<sec id="sec9">
<title>Evaluation of GBVxTech</title>
<p>GBVxTech can be a vital tool for GBV protection, prevention, and response (<xref ref-type="bibr" rid="ref15">Eisenhut et al., 2020</xref>). For example, a report from one mobile app, SafeTTC, aided in the arrest of an individual who was already wanted as a suspect for a separate assault (<xref ref-type="bibr" rid="ref81">Spurr, 2017</xref>). Furthermore, globally, 83% of individuals own a smartphone (<xref ref-type="bibr" rid="ref82">Statista, 2022</xref>), making smartphone-based technologies that record and report cases of GBV accessible and available to many members of the public, especially in the Global North. As such, GBVxTech is potentially a powerful tool to address the underreporting of GBV and strengthen the evidence base necessary for successful prosecutions. Whilst GBVxTech holds promise, its use requires diligence as improper use risks harm. Our study critically evaluates GBV reporting apps intended to aid victims in alerting authorities. Though well-intentioned, these tools require appraisal to realise potential benefits.</p>
<p>In the only research of its kind to date, <xref ref-type="bibr" rid="ref15">Eisenhut et al. (2020)</xref> systematically reviewed mobile health intervention apps that address violence against women. The authors classified apps into five categories: emergency (e.g., send emergency alerts to selected contacts), avoidance (e.g., avoid potential incidents), education (e.g., increase knowledge), reporting and evidence building (e.g., report an incident during or after it occurs), and supporting (e.g., used to provide support for victims). The authors found that just under half of the apps (47%) had the primary function of offering immediate help in emergencies, such as alerting emergency contacts or the nearest police station before, during, or soon after an incident. Furthermore, only 14% of apps were categorised as reporting and evidence building apps, although the prevalence of these apps was found to be increasing over time. The review also revealed that there is a growing number of education and supporting apps, which suggests that there may be a shift towards building apps that support individuals <italic>after</italic> the incident rather than during an emergency.</p>
<p>We extend the research conducted by <xref ref-type="bibr" rid="ref15">Eisenhut et al. (2020)</xref> by analysing the extent to which applications in the &#x2018;reporting and evidence building&#x2019; category both employ best practice principles for eliciting accurate and reliable information from victims and take steps to protect the victims who use them from further harm. We focus on this category because this type of GBVxTech was developed for the express purpose of recording information about the crime to share with law enforcement should the victim decide to report the crime(s) to the authorities. Altogether, given the ethical, legal, and social ramifications of GBVxTech, there is a need to better understand (1) how these applications elicit GBV accounts from users, and (2) the steps being taken by GBVxTech developers to protect users and their data.</p>
</sec>
<sec id="sec10">
<title>The current study</title>
<p>The core best practice principles discussed above are vital in gathering accurate and detailed accounts in face-to-face and written interviews. However, GBVxTech only recently emerged and therefore little is known about whether best practice principles are being adapted and implemented in this technology. We address this gap by critically analysing GBVxTech reporting apps that are currently in use and offering recommendations for how face-to-face interview principles may be adapted within a virtual context.</p>
<p>Our research has two objectives. Firstly, to evaluate the extent to which the best practice principles have been implemented in GBVxTech, and secondly, to draw on our findings to stimulate research and policy development so that the potential benefits of GBVxTech can be better realised.</p>
</sec>
</sec>
<sec sec-type="methods" id="sec11">
<title>Methods</title>
<sec id="sec12">
<title>GBVxTech identification</title>
<sec id="sec13">
<title>Identification plan</title>
<p>This review followed the PRISMA framework (<xref ref-type="bibr" rid="ref61">Page et al., 2021</xref>) when searching for GBVxTech and selecting our final sample. To identify all relevant GBVxTech platforms, keyword searches were conducted on Google Scholar, Google, Twitter, Play Store (Android), and App Store (iOS) for the following search strings: &#x2018;gender-based violence + reporting and evidence-based app&#x002A;&#x2019; (to capture all denominations of &#x2018;app&#x2019;, &#x2018;apps&#x2019;, &#x2018;application&#x2019;, and &#x2018;applications&#x2019;); &#x2018;gender-based violence + reporting app&#x002A;&#x2019; and &#x2018;gender-based violence + reporting tech&#x002A;&#x2019; (to capture all denominations of &#x2018;technology&#x2019;). Additionally, &#x2018;gender-based violence&#x2019; was replaced with &#x2018;sexual violence&#x2019;, &#x2018;sexual assault&#x2019;, and &#x2018;domestic violence&#x2019;. To ensure we located all possible GBVxTech platforms for inclusion within our review, we also completed a reference and citation search on the paper of <xref ref-type="bibr" rid="ref15">Eisenhut et al. (2020)</xref> and held discussions with academic and practitioner colleagues (see <xref ref-type="fig" rid="fig1">Figure 1</xref>).</p>
<fig position="float" id="fig1"><label>Figure 1</label>
<caption>
<p>GBVxTech identification PRISMA diagram.</p>
</caption>
<graphic xlink:href="fpsyg-14-1289817-g001.tif"/>
</fig>
</sec>
<sec id="sec14">
<title>Selection criteria</title>
<p>The GBVxTech platforms included in this study were those that document reports of GBV specifically. The GBVxTech accessed were filtered based on our exclusion criteria, with any GBVxTech that met one or more of our exclusion criteria being removed from the final review. Our exclusion criteria included: (i) if the GBVxTech only signposted victims to support services, crowdsourced crime information, or provided educational content but did not allow them to document a specific incident as this would not preserve their memory evidence for use in criminal justice proceedings; (ii) if researchers were unable to access the GBVxTech using a United Kingdom smartphone or laptop, a VPN, or via discussions with the creators, as we were unable to review the GBVxTech in its entirety; and (iii) if GBVxTech was not accessible to all service users (e.g., only accessible to young people aged 10&#x2013;24).</p>
</sec>
</sec>
<sec id="sec15">
<title>Data extraction</title>
<p>The evaluation checklist for face-to-face interviews used by <xref ref-type="bibr" rid="ref4">Benson and Powell (2015)</xref> was adapted to make it relevant to GBVxTech. Alongside the original criteria, another evaluation criterion exclusively related to technology (&#x2018;GBVxTech characteristics&#x2019;) was added based on recommendations from <xref ref-type="bibr" rid="ref49">Mart&#x00ED;nez-P&#x00E9;rez et al. (2015)</xref>. The adaptations were discussed and finalised by the research team to produce the modified checklist that was used for data extraction (see <xref ref-type="table" rid="tab1">Table 1</xref> for the modified evaluation criteria checklist). Data extraction was completed by conducting a mock report within each application.</p>
<table-wrap position="float" id="tab1"><label>Table 1</label>
<caption>
<p>Evaluation criteria checklist.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top" colspan="2">Best practise principles criteria</th>
<th align="left" valign="top">Definitions and examples</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top" rowspan="7">Questioning strategies</td>
<td align="left" valign="top">Open questions</td>
<td align="left" valign="top">Questions that allow a detailed responsee.g., &#x201C;<italic>Tell me what happened?</italic>&#x201D;</td>
</tr>
<tr>
<td align="left" valign="top" rowspan="2">Specific questions</td>
<td align="left" valign="top">Questions that request a particular detail through forced-choice, yes/no prompts or who/what/where/when/why/how questions e.g., &#x201C;<italic>what did the perpetrator look like?</italic>&#x201D;.</td>
</tr>
<tr>
<td align="left" valign="top" rowspan="2">Leading questions</td>
<td align="left" valign="top">Questions that suggest a particular answer and may introduce information that the victim never mentioned e.g., &#x201C;<italic>what did the male look like?</italic>&#x201D; (<italic>When the victim never mentioned the gender of the perpetrator</italic>).</td>
</tr>
<tr>
<td align="left" valign="top" rowspan="2">Responding methods</td>
<td align="left" valign="top">Different ways to answer a question e.g., <italic>free recall textbox, drop-down menu</italic> etc.</td>
</tr>
<tr>
<td align="left" valign="top" rowspan="6">Adherence to the interview protocol</td>
<td align="left" valign="top">Trust</td>
<td align="left" valign="top">Building a relationship with the victim to make them feel more comfortable during the interview. Examples of trust building methods within GBVxTech include:<break/><list list-type="bullet">
<list-item>
<p><italic>Asking for consent</italic> (e.g., <italic>via a pop-up</italic>)</p>
</list-item>
<list-item>
<p><italic>Giving an introduction to the app/website</italic></p>
</list-item>
<list-item>
<p><italic>Explaining the purpose of the GBVxTech</italic></p>
</list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Narrative practice</td>
<td align="left" valign="top">Allowing the victim the opportunity to practise recalling a neutral or positive episodic event before they provide information about the crime<break/><list list-type="bullet">
<list-item>
<p><italic>Narrative practice</italic> (e.g., <italic>practise questioning phase</italic>).</p>
</list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Ground rules</td>
<td align="left" valign="top">Ground rules are instructions given to the victim about what to expect during the interview. Examples of ground rules within GBVxTech include:<break/><list list-type="bullet">
<list-item>
<p><italic>Reporting ground rules</italic></p>
</list-item>
<list-item>
<p><italic>Ability to view completed report to clarify misunderstandings</italic></p>
</list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top">Independent voice</td>
<td align="left" valign="top">Allowing the victim to respond using their own words and experiences. Examples of this within GBVxTech include:<break/><list list-type="bullet">
<list-item>
<p><italic>Access to more than one language</italic></p>
</list-item>
<list-item>
<p><italic>Can upload voice notes or videos</italic></p>
</list-item>
<list-item>
<p><italic>No interruptions during report</italic></p>
</list-item>
<list-item>
<p><italic>Use of open questions</italic></p>
</list-item>
<list-item>
<p><italic>Free recall methods of responding</italic> (e.g.<italic>, text boxes</italic>)</p>
</list-item>
<list-item>
<p><italic>Can victims view other victim&#x2019;s reports?</italic></p>
</list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top" rowspan="2">Debrief</td>
<td align="left" valign="top">Giving support to the victim after they have completed the interviewe.g., <italic>helplines, website links</italic> etc.</td>
</tr>
<tr>
<td align="left" valign="top" colspan="2">Investigative questions</td>
<td align="left" valign="top">Investigation relevant details.<break/><list list-type="bullet">
<list-item>
<p><italic>The identity of the offender</italic></p>
</list-item>
<list-item>
<p><italic>The approximate time of the offence</italic></p>
</list-item>
<list-item>
<p><italic>The location</italic></p>
</list-item>
<list-item>
<p><italic>The offence type</italic></p>
</list-item>
<list-item>
<p><italic>Possible witnesses</italic></p>
</list-item>
<list-item>
<p><italic>Possible physical evidence</italic></p>
</list-item>
</list></td>
</tr>
<tr>
<td align="left" valign="top" rowspan="4">GBVxTech characteristics</td>
<td align="left" valign="top" rowspan="2">Data usage clarity</td>
<td align="left" valign="top">Did the GBVxTech explain what would happen with the victim&#x2019;s data after providing a report? e.g., <italic>data storage and usage statement.</italic></td>
</tr>
<tr>
<td align="left" valign="top" rowspan="2">Security options</td>
<td align="left" valign="top">Did the GBVxTech have security provisions? e.g., <italic>password/pin protection.</italic></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="sec16">
<title>Measures</title>
<p>The modified GBVxTech evaluation checklist adapted from <xref ref-type="bibr" rid="ref4">Benson and Powell (2015)</xref> consisted of four themes: questioning strategies, adherence to the interview protocol, investigative questions, and GBVxTech characteristics (<xref ref-type="bibr" rid="ref49">Mart&#x00ED;nez-P&#x00E9;rez et al., 2015</xref>). Each of the criteria on the evaluation checklist was either coded as &#x2018;present&#x2019; (if there was at least one instance of the criterion) or &#x2018;absent&#x2019; (if no element of the criterion was seen) within each evaluated GBVxTech platform.</p>
</sec>
<sec id="sec17">
<title>Reliability</title>
<p>Two researchers independently assessed all potential GBVxTech search results against the inclusion and exclusion criteria for final selection within the review. Any discrepancies were discussed with the senior author for final selection.</p>
<p>The same two researchers extracted information from the GBVxTech using the above evaluation criteria. Additionally, two blind coders evaluated around 60% of the GBVxTech for purposes of inter-rater reliability (<italic>n</italic>&#x2009;=&#x2009;8). Overall, there were moderate to perfect levels of agreement (&#x003C; 60% Kappa) on all evaluation criteria and discrepancies were discussed to yield the results presented below.</p>
</sec>
</sec>
<sec sec-type="results" id="sec18">
<title>Results</title>
<p><xref ref-type="table" rid="tab2">Table 2</xref> provides a descriptive overview of each of the 13 GBVxTech platforms reviewed.</p>
<table-wrap position="float" id="tab2"><label>Table 2</label>
<caption>
<p>GBVxTech description.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">GBVxTech</th>
<th align="left" valign="top">Country</th>
<th align="left" valign="top">Affiliation</th>
<th align="left" valign="top">Purpose</th>
<th align="left" valign="top">Availability</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">SafeTTC</td>
<td align="left" valign="top">Canada</td>
<td align="left" valign="top">Elerts</td>
<td align="left" valign="top">To report harassment or safety concerns on transport</td>
<td align="left" valign="top">iOS &#x0026; Play Store</td>
</tr>
<tr>
<td align="left" valign="top">iWitnessed</td>
<td align="left" valign="top">Australia</td>
<td align="left" valign="top">University of Sydney &#x0026; UNSW</td>
<td align="left" valign="top">To collect memory evidence for violent incidents (e.g., domestic violence)</td>
<td align="left" valign="top">iOS &#x0026; Play Store</td>
</tr>
<tr>
<td align="left" valign="top">Kharita: Harass Map</td>
<td align="left" valign="top">Egypt</td>
<td align="left" valign="top">Harass Map</td>
<td align="left" valign="top">To report sexual harassment and intervention, and to show the scope of the problem in Egypt on a map</td>
<td align="left" valign="top">Play Store and Online Website</td>
</tr>
<tr>
<td align="left" valign="top">Jdoe</td>
<td align="left" valign="top">United States</td>
<td align="left" valign="top">Ryan Soscia</td>
<td align="left" valign="top">To provide an anonymous platform to report sexual misconduct and to connect victims with legal professionals</td>
<td align="left" valign="top">iOS &#x0026; Play Store</td>
</tr>
<tr>
<td align="left" valign="top">SV_Case Study</td>
<td align="left" valign="top">Kenya</td>
<td align="left" valign="top">Wangu Kanja Foundation</td>
<td align="left" valign="top">To allow victims to document their experiences and to monitor case progression along the criminal justice pathway</td>
<td align="left" valign="top">iOS &#x0026; Play Store</td>
</tr>
<tr>
<td align="left" valign="top">Stop Sexual Harassment Video Recorder</td>
<td align="left" valign="top">United States</td>
<td align="left" valign="top">Safe Workplace LLC</td>
<td align="left" valign="top">To discretely collect audio and visual data on sexual harassment</td>
<td align="left" valign="top">iOS &#x0026; Play Store</td>
</tr>
<tr>
<td align="left" valign="top">Bright Sky</td>
<td align="left" valign="top">United Kingdom</td>
<td align="left" valign="top">Hestia</td>
<td align="left" valign="top">To signpost support services and to document victim&#x2019;s experiences</td>
<td align="left" valign="top">iOS &#x0026; Play Store</td>
</tr>
<tr>
<td align="left" valign="top">Spot</td>
<td align="left" valign="top">United States</td>
<td align="left" valign="top">All Turtles</td>
<td align="left" valign="top">To report misconduct at work</td>
<td align="left" valign="top">AI Chatbot through Workplace</td>
</tr>
<tr>
<td align="left" valign="top">eyeWitness to Atrocities</td>
<td align="left" valign="top">United Kingdom</td>
<td align="left" valign="top">International Bar Association</td>
<td align="left" valign="top">To discretely capture photos and videos of atrocities.</td>
<td align="left" valign="top">Play Store</td>
</tr>
<tr>
<td align="left" valign="top">Hollie Guard</td>
<td align="left" valign="top">United Kingdom</td>
<td align="left" valign="top">Hollie Gazzard Trust</td>
<td align="left" valign="top">To gather real-time evidence of incidents, as well as provide alerts and journey tracking capabilities</td>
<td align="left" valign="top">iOS &#x0026; Play Store</td>
</tr>
<tr>
<td align="left" valign="top">Callisto</td>
<td align="left" valign="top">United States</td>
<td align="left" valign="top">Callisto</td>
<td align="left" valign="top">To document assault and to match reports of individuals harmed by the same perpetrator</td>
<td align="left" valign="top">Website (need United States campus email)</td>
</tr>
<tr>
<td align="left" valign="top">DocuSAFE</td>
<td align="left" valign="top">United States</td>
<td align="left" valign="top">National Network to End Domestic Violence and Office on Victims of Crime</td>
<td align="left" valign="top">To document incidents of abuse and share with legal professionals</td>
<td align="left" valign="top">iOS &#x0026; Play Store</td>
</tr>
<tr>
<td align="left" valign="top">Report &#x0026; Support</td>
<td align="left" valign="top">UK</td>
<td align="left" valign="top">Culture Shift</td>
<td align="left" valign="top">To document bullying or harassment for students, staff, and visitors of UK Universities</td>
<td align="left" valign="top">Website</td>
</tr>
</tbody>
</table>
</table-wrap>
<p><xref ref-type="table" rid="tab3">Table 3</xref> illustrates how the 13 GBVxTech platforms performed on each of the criteria within the modified evaluation checklist. The results are discussed below, and implications for these results are explored in the discussion.</p>
<table-wrap position="float" id="tab3">
<label>Table 3</label>
<caption>
<p>GBVxTech evaluation results.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="center" valign="top" colspan="13">Questioning strategies</th>
</tr>
<tr>
<th/>
<th align="center" valign="top">Safe TTC</th>
<th align="center" valign="top">iWitnessed</th>
<th align="center" valign="top">Kharita: Harass Map</th>
<th align="center" valign="top">Jdoe</th>
<th align="center" valign="top">MobApp</th>
<th align="center" valign="top">Stop Sexual Harassment Video Recorder</th>
<th align="center" valign="top">Bright Sky</th>
<th align="center" valign="top">Spot</th>
<th align="center" valign="top">eyeWitness to Atrocities</th>
<th align="center" valign="top">Hollie Guard</th>
<th align="center" valign="top">Callisto</th>
<th align="center" valign="top">DocuSAFE</th>
<th align="center" valign="top">Report &#x0026; Support</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="middle">Open question usage</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
</tr>
<tr>
<td align="left" valign="middle">Specific question usage</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
</tr>
<tr>
<td align="left" valign="middle">Leading question usage</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="middle">Open responding methods</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
</tr>
<tr>
<td align="left" valign="middle">Closed responding methods</td>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
</tr>
<tr>
<td align="center" valign="middle" colspan="13">Adherence to interview protocol</td>
</tr>
<tr>
<td/>
<td align="center" valign="middle">Safe TTC</td>
<td align="center" valign="middle">iWitnessed</td>
<td align="center" valign="middle">Kharita: Harass Map</td>
<td align="center" valign="middle">Jdoe</td>
<td align="center" valign="middle">MobApp</td>
<td align="center" valign="middle">Stop Sexual Harassment Video Recorder</td>
<td align="center" valign="middle">Bright Sky</td>
<td align="center" valign="middle">Spot</td>
<td align="center" valign="middle">eyeWitness to Atrocities</td>
<td align="center" valign="middle">Hollie Guard</td>
<td align="center" valign="middle">Callisto</td>
<td align="center" valign="middle">DocuSAFE</td>
<td align="center" valign="middle">Report &#x0026; Support</td>
</tr>
<tr>
<td align="left" valign="top">Trust</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
</tr>
<tr>
<td align="left" valign="top">Narrative practice</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="top">Ground rules</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
</tr>
<tr>
<td align="left" valign="top">Independent voice</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
</tr>
<tr>
<td align="left" valign="top">Debrief</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
</tr>
<tr>
<td align="center" valign="top" colspan="13">Investigative questions</td>
</tr>
<tr>
<td/>
<td align="center" valign="middle">Safe TTC</td>
<td align="center" valign="middle">iWitnessed</td>
<td align="center" valign="middle">Kharita: Harass Map</td>
<td align="center" valign="middle">Jdoe</td>
<td align="center" valign="middle">MobApp</td>
<td align="center" valign="middle">Stop Sexual Harassment Video Recorder</td>
<td align="center" valign="middle">Bright Sky</td>
<td align="center" valign="middle">Spot</td>
<td align="center" valign="middle">eyeWitness to Atrocities</td>
<td align="center" valign="middle">Hollie Guard</td>
<td align="center" valign="middle">Callisto</td>
<td align="center" valign="middle">DocuSAFE</td>
<td align="center" valign="middle">Report &#x0026; Support</td>
</tr>
<tr>
<td align="left" valign="top">Identity of offender</td>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="top">Time</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
</tr>
<tr>
<td align="left" valign="top">Location</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
</tr>
<tr>
<td align="left" valign="top">Offence type</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
</tr>
<tr>
<td align="left" valign="top">Possible witnesses</td>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td/>
</tr>
<tr>
<td align="left" valign="top">Physical evidence</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
</tr>
<tr>
<td align="center" valign="middle" colspan="13">GBVxTech characteristics</td>
</tr>
<tr>
<td/>
<td align="center" valign="middle">Safe TTC</td>
<td align="center" valign="middle">iWitnessed</td>
<td align="center" valign="middle">Kharita: Harass Map</td>
<td align="center" valign="middle">Jdoe</td>
<td align="center" valign="top">MobApp</td>
<td align="center" valign="top">Stop Sexual Harassment Video Recorder</td>
<td align="center" valign="top">Bright Sky</td>
<td align="center" valign="top">Spot</td>
<td align="center" valign="top">eyeWitness to Atrocities</td>
<td align="center" valign="top">Hollie Guard</td>
<td align="center" valign="top">Callisto</td>
<td align="center" valign="top">DocuSAFE</td>
<td align="center" valign="top">Report &#x0026; Support</td>
</tr>
<tr>
<td align="left" valign="top">Data usage clarity</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
</tr>
<tr>
<td align="left" valign="top">Security options</td>
<td/>
<td align="center" valign="top">x</td>
<td/>
<td/>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td align="center" valign="top">x</td>
<td/>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p>An x indicates that the specified GBVxTech platform included at least one feature of the relevant criterion.</p>
</table-wrap-foot>
</table-wrap>
<sec id="sec19">
<title>Questioning strategies</title>
<p>Regarding question types, 92% of the GBVxTech platforms reviewed used open questions at least once, 69% used specific questions at least once, and 0% asked leading questions. Furthermore, specific questions were the most used question type, and only 23% of technologies opened with an open-ended invitation such as, &#x2018;[Tell me] What happened?&#x2019; instead of a specific question. We also found that whilst most of the GBVxTech used open questions at least once, only 38% of GBVxTech used solely free recall responding methods, e.g., using a textbox to enter the crime report. Additionally 62% of all GBVxTech incorporated closed responding methods, such as drop-down menus and multiple-choice questions.</p>
</sec>
<sec id="sec20">
<title>Adherence to interview protocol</title>
<p>Regarding trust, only 23% of GBVxTech asked users for informed consent, 52% provided an introduction to the app/website, 85% discussed the purpose and aims of the technology, and 0% provided an option for narrative practice. Additionally, whilst only 15% of the GBVxTech reported specific ground rules instructions (e.g., to state &#x2018;I do not know&#x2019;), 92% allowed victims to view the final report before submitting to clarify any misunderstandings within the report.</p>
<p>We also investigated whether the GBVxTech encouraged an independent voice and found that only 38% offered more than one language option, and that 62% allowed users to report using a voice note or video/photo feature. Furthermore, only one of the applications (Kharita: Harass Map) allowed victims to view other victims&#x2019; reports. We also found that only 46% of GBVxTech offered a debrief (e.g., signposting to psychological support or advice).</p>
</sec>
<sec id="sec21">
<title>Investigative questions</title>
<p>Since GBVxTech data could be used in legal proceedings, we assessed which details were collected by the platforms. We found that 38% asked for the identity of the offender, 77% asked for the approximate time of the offence and the location of the incident (either pinpoint on a map or write the location), and 69% asked for the specific offence type such as sexual assault or rape. Additionally, 23% of GBVxTech platforms asked about the presence of possible witnesses, and 85% enquired about potential physical evidence (e.g., forensic evidence, weapons, photos/documents/videos of injuries) to provide corroborating evidence.</p>
</sec>
<sec id="sec22">
<title>GBVxTech characteristics</title>
<p>All GBVxTech briefly discussed how the data will be used within their terms and conditions, but only 77% clearly explained where data will be stored and for what purposes it can be accessed (e.g., whether the data can be forwarded to police, whether data are solely saved on the GBVxTech app or institutional server, etc.).</p>
<p>We also wanted to investigate the security options available within the apps and websites and found that 54% of our reviewed GBVxTech utilised a security feature, such as a password, a quick escape button from the application if someone approaches, or a disguise function that makes the app appear to be another type of app (e.g., a weather app).</p>
</sec>
</sec>
<sec sec-type="discussion" id="sec23">
<title>Discussion</title>
<p>In this paper, we investigated the extent to which GBVxTech apps and websites adhere to best practice interviewing principles. Applying these principles can improve the accuracy of victim reports and ensure the methods and evidence are legally reliable should the victim decide to involve authorities. Further, we wanted to better understand how GBVxTech ensures the protection of users and their data.</p>
<p>Our review found that GBV apps <italic>partially</italic> follow best practices; some features align with key principles, but there is room for improvement. We will highlight well-implemented features, identify lacking areas, and recommend enhancements.</p>
<sec id="sec24">
<title>Adherence to best practice</title>
<p>The GBVxTech included in our review adhered to several minimum standards of best practice for interviewing victims about GBV incidents. For example, most of the applications used open questions, which helps to ensure that the victim&#x2019;s account is captured in their own words and not influenced by suggestive interview questions (<xref ref-type="bibr" rid="ref16">Elmir et al., 2011</xref>). Furthermore, none of the applications included in our review used leading questions. Leading questions can decrease a victim&#x2019;s credibility as they can elicit self-contradictions within the victim&#x2019;s testimony (<xref ref-type="bibr" rid="ref1002">Andrews and Lamb, 2016</xref>). By avoiding leading questions, GBVxTech can gather accounts that make for stronger legal evidence.</p>
<p>We also found that 12 out of 13 of the applications allowed victims to view their final report before submitting. On one hand, this could be viewed as a positive aspect of GBVxTech, since it allows victims to amend any mistakes or misinterpretations before submitting. On the other hand, by editing the final report before submitting, it may be argued that the evidence has been contaminated since the report is technically no longer a first account, and this could have repercussions in later legal proceedings. Only one application (Kharita: Harass Map), allowed victims to view other victims&#x2019; reports. Whilst no GBVxTech should have this feature, it is reassuring that so few applications enable reading others&#x2019; reports. Allowing victims access to others&#x2019; accounts is unethical, poses psychological and safety risks, and can potentially compromise the quality and utility of the victim&#x2019;s own report. Seeing other accounts could invalidate the victim&#x2019;s own experiences and dissuade them from reporting if they believe other incidents seem &#x2018;worse&#x2019; than theirs. Victims&#x2019; memories also risk contamination if they incorporate details from others&#x2019; reports into their own (see <xref ref-type="bibr" rid="ref28">Gabbert et al., 2003</xref>). Moreover, making reports public, even anonymised, endangers victims by enabling identification through case details. The lack of this feature across the applications we reviewed is positive, but technology creators must remain vigilant against its inclusion given the potential harms.</p>
<p>To address language and writing proficiency differences across users, we hoped that GBVxTech would incorporate a voice note or video feature to allow victims to report in their own words. We found that around 60% included this feature. This is crucial as it allows victims to disclose using their preferred method (text, voice note, video). In addition to addressing language barriers, voice note and recording facilities may increase user satisfaction and thereby people&#x2019;s willingness to engage with the application and disclose information. User feedback on the Self-Administered Interview indicated many people prefer typing or recording answers over using paper and pen, because it is easier, more practical, and offers users greater flexibility (<xref ref-type="bibr" rid="ref24">Gabbert et al., 2009</xref>).</p>
<p>The GBVxTech platforms we reviewed also effectively applied the principle of investigative questioning. Most of the applications asked investigative questions such as the identity of the offender, the time/location of the offence, offence type, potential physical evidence, etc. Since reports collected via GBVxTech may be used in later legal proceedings, it is crucial that these applications do not miss opportunities to collect investigation-relevant information. Whilst the inclusion of investigative questions in GBVxTech is positive, it is important to note that most applications used forced-choice closed response formats for these questions. Closed-ended questions can limit the level of detail obtained (<xref ref-type="bibr" rid="ref60">Oxburgh et al., 2010</xref>) and constrain the user&#x2019;s independent voice. Employing more open-ended response formats could elicit richer details from users in their own words.</p>
<p>All the GBVxTech platforms we reviewed explain in their terms how user data will be used. Furthermore, 77% clearly explain where user data are stored, such as whether the data are stored locally on the application. Ideally, all GBVxTech should explicitly detail data storage and access. This enables informed consent, as victims are able to actively understand how their data are being used (<xref ref-type="bibr" rid="ref31">Heydon et al., 2023</xref>) regardless of the data protection rules in a given jurisdiction.</p>
</sec>
<sec id="sec25">
<title>Limitations of current GBVxTech</title>
<p>Whilst not all minimum standards of best practice in face-to-face interviewing are feasible within a digital format (e.g., verbal communication tactics to build rapport), some principles that would be simple to adapt are often missing (e.g., open questions, narrative practice, and ground rules).</p>
<p>Firstly, we found that only 23% of GBVxTech prompted the user for information starting with an open-ended invitation such as, &#x2018;[Tell me] What happened?&#x2019; This low figure is concerning because according to face-to-face interview guidelines, a free recall account should always be obtained before asking specific questions (e.g., Achieving Best Evidence guidelines in the United Kingdom, <xref ref-type="bibr" rid="ref56">Ministry of Justice, 2022</xref>). This is encouraged because it allows victims to give a complete, uninterrupted account in their own words (<xref ref-type="bibr" rid="ref65">Powell, 2002</xref>; <xref ref-type="bibr" rid="ref5">Brewer and Williams, 2017</xref>). Furthermore, more than half of all GBVxTech used closed responding methods, such as drop-down menus and multiple-choice questions. This response style raises numerous issues; firstly, these forced-choice methods limit the response options available, and therefore may not list the victim&#x2019;s desired response option. As a result, victims may be forced to select an option that does not accurately capture their independent voice and experiences, or they may choose not to continue reporting if they feel their experience &#x2018;does not count&#x2019; within the options provided. Secondly, since the victim&#x2019;s account is limited to preselected response options, they cannot describe their experience in their own words. Forced-choice formats decrease the level of detail in reports, potentially reducing evidence quality for investigators. An open response format would also let victims rehearse details about the incident in their own words, strengthening their memory and any subsequent accounts they provide to legal officials.</p>
<p>We found that none of the GBVxTech employed narrative practice. <xref ref-type="bibr" rid="ref83">Sternberg et al. (1997)</xref> found that children who practised providing a detailed account of a positive or neutral non-abusive episodic memory in the introductory phase of the interview gave more detailed narratives in the later recall phase, demonstrating the importance of practising a separate episodic recall prior to being interviewed about the event. Thus, GBVxTech can increase victim comfort and the level of detail provided by employing narrative practice. Our results also showed that most of the GBVxTech did not include ground rules instructions. This is problematic because, as mentioned previously, ground rules are useful for both adults and children during investigative interviewing to obtain both detailed and accurate accounts (<xref ref-type="bibr" rid="ref47">Lyon, 2014</xref>; <xref ref-type="bibr" rid="ref2">Ali et al., 2020</xref>). Future GBVxTech should consider prioritising the introductory phase of the application before a victim begins their report. During the pre-interview phase, trust in the application could be built and expectations set through ground rules and narrative practice, which will promote more detailed and accurate responses.</p>
<p>Another issue we found is that most applications allow users to report in only one language. The limited language options could be damaging to the victim&#x2019;s independent voice. They should be able to report in their first language to capture the most accurate account (<xref ref-type="bibr" rid="ref70">Raver et al., 2023</xref>). Moreover, if a victim is forced to report using a language in which they are not proficient, it could impact the accuracy of the report via errors in translation (<xref ref-type="bibr" rid="ref17">Evans et al., 2019</xref>) or it could deter a victim from using the application.</p>
<p>Our analysis found gaps in adherence to human rights principles amongst the reviewed GBV technologies. Less than 25% requested informed consent from users, contrary to ethical investigative standards (<xref ref-type="bibr" rid="ref57">Murad Code, 2022</xref>). Additionally, only 46% offered post-reporting support, advice, or referral to services. This lack of victim debriefing conflicts with knowledge that GBV elevates risks for mental health consequences like PTSD, depression (<xref ref-type="bibr" rid="ref86">Tjaden and Thoennes, 2006</xref>; <xref ref-type="bibr" rid="ref10">Campbell et al., 2009</xref>) and substance abuse (<xref ref-type="bibr" rid="ref42">Kilpatrick et al., 1997</xref>). Best practices dictate that GBV reporting platforms should connect users with information and access to support given the empirical links between victimisation and psychological distress.</p>
<p>Finally, only around half of the GBVxTech we reviewed incorporated at least one security feature. This raises major ethical and safety concerns, particularly in cases where victims are reporting intimate partner violence when a partner could easily access their mobile phone or computer and retaliate (<xref ref-type="bibr" rid="ref22">Freed et al., 2018</xref>). Therefore, security options (e.g., passwords or &#x2018;quick escapes&#x2019;) should be implemented in every app or website created for the purpose of documenting GBV incidents.</p>
</sec>
<sec id="sec26">
<title>Recommendations</title>
<p>Whilst the GBVxTech we reviewed utilise <italic>some</italic> of the best practice interview principles which have been scientifically developed and tested for interviews in criminal justice contexts, we found that many of the technologies diverge from recommended minimum best practise standards for obtaining accurate and complete accounts. Digital evidence, like text messages and video recordings, have been permitted in GBV prosecutions, establishing precedent for admitting documentation from technology platforms (<xref ref-type="bibr" rid="ref33">Hlavka and Mulla, 2018</xref>; <xref ref-type="bibr" rid="ref29">Glasbeek, 2021</xref>). However, our findings reveal gaps in incorporating research-based memory retrieval strategies and ethical issues. Given the investigative and legal potential of these tools, further research should examine how to optimise memory recollection, ensure data protection, prioritise user wellbeing, and better align the applications to human rights-based principles. With careful design, GBVxTech could play a significant role in empowering victims whilst advancing just legal outcomes. However, additional interdisciplinary work is needed to actualise that potential responsibly and ethically.</p>
<p>GBVxTech should obtain informed consent, notifying users how data will be utilised, whether and how data can be withdrawn, and outlining plans if the application is discontinued (<xref ref-type="bibr" rid="ref49">Mart&#x00ED;nez-P&#x00E9;rez et al., 2015</xref>; <xref ref-type="bibr" rid="ref31">Heydon et al., 2023</xref>). Our analysis found that around half of the applications we identified were no longer accessible, raising questions about what happened to users&#x2019; data following discontinuation. Data loss risks accountability and can compromise the investigation of incidents and prevention of future crimes. As application technology evolves rapidly, many apps become defunct due to lack of funding for updates. Developers should carefully consider long-term sustainability and have transparent data protocols in case of discontinuation. Releasing applications without data retention plans risks doing more harm than good if evidence is lost when platforms cease operation.</p>
<p>The potential discoverability of victim disclosures on GBVxTech raises important considerations for users and designers. First, users should be advised that the information they report could be utilised as evidence in legal proceedings. Providing users with this knowledge is an essential part of the informed consent process. Second, developers must recognise that design features, like forced-choice questions, can potentially introduce memory errors and inconsistencies, which may damage victim credibility. It is critical that applications gather accounts in victims&#x2019; own words through open questions and response formats. Forced-choice options risk introducing inconsistencies that could undermine victim credibility later if the victim has to clarify answers they gave to forced choice questions. Since GBV victim testimony already faces heavy scrutiny and credibility challenges (<xref ref-type="bibr" rid="ref40">Kelly et al., 2005</xref>), preserving free narrative is imperative.</p>
<p>If accounts gathered via GBVxTech are entered into legal proceedings, data authenticity and chain of custody (i.e., documentation of the sequence of handling, transfer, and storage digital evidence) will become important issues. Criminal proceedings may involve examining application metadata or obtaining sworn statements on application use. If applications allow revising responses, originals should not be overwritten, but rather preserved alongside the revised information with timestamps. Digital evidence risks manipulation, and therefore steps must be taken to better ensure data authenticity. Asking the victim the reason why they made revisions may be beneficial, as changes may otherwise imply memory unreliability at trial (<xref ref-type="bibr" rid="ref44">Liu, 2018</xref>).</p>
<p>Finally, GBVxTech has immense potential to serve victims globally, but only if it is purposefully designed for accessibility across needs, resources, and contexts. The applications we reviewed would benefit from incorporating accessibility features for users with visual or cognitive impairments, such as text-to-speech and interface customisation options. Apps should partner with disabled persons organisations to incorporate accessibility best practises both in design and safeguarding features. GBVxTech should also function online, across different data bandwidths (WiFi/5G/4G/3G), across operating systems (Android, iOS, etc.), as well as offline to allow for timely documentation. Enabling offline access allows all victims to record accounts as soon as possible, benefiting evidentiary quality. Further, accessible design and clear language are crucial for GBVxTech, which likely attracts diverse users. GBVxTech should avoid legal jargon and use plain language to ensure accessibility for users with varying knowledge of GBV, the law, and reporting procedures, all of which can vary depending on jurisdiction. Our suggestion to use plain language aligns with recommended best practices for face-to-face investigative interviews (<xref ref-type="bibr" rid="ref12">Dando and Milne, 2009</xref>; <xref ref-type="bibr" rid="ref18">Farrugia et al., 2019</xref>). Onboard dictionaries or definitions can further aid understanding, particularly for crime classification questions, as many individuals lack awareness of distinctions between crimes like sexual assault versus sexual harassment. However, only five of the applications we reviewed offered built-in definitions. Developing a more inclusive GBVxTech platform has immense potential to broaden access to justice globally, especially if designed intentionally for clarity and transparency through built-in support features and avoidance of context-specific terminology.</p>
</sec>
</sec>
<sec sec-type="conclusions" id="sec27">
<title>Conclusion</title>
<p>The #MeToo movement that ushered in an era of online disclosure revealed the widespread prevalence of sexual violence as well as the many barriers to formal reporting. As we move forward, ethically designed GBVxTech platforms can provide a safe digital space for victims to document experiences if formal channels remain inaccessible or undesirable. However, to serve both victims and justice, evidence-based practices must be implemented to maintain the accuracy of the victim&#x2019;s account for purposes of crime prevention and, should the victim elect to make a formal complaint, legal proceedings. By working across sectors with victims, law enforcement, service providers, and researchers, GBVxTech developers can fulfil the diverse needs illuminated by #MeToo, creating empowering technologies that ethically gather victimisation experiences whilst advancing systemic reforms.</p>
</sec>
<sec sec-type="data-availability" id="sec28">
<title>Data availability statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec sec-type="author-contributions" id="sec29">
<title>Author contributions</title>
<p>LS: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Supervision, Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing. TB: Data curation, Formal analysis, Methodology, Project administration, Visualization, Writing &#x2013; review &#x0026; editing. JC: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Writing &#x2013; original draft. SR: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Writing &#x2013; original draft. HF: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Supervision, Writing &#x2013; original draft, Writing &#x2013; review &#x0026; editing.</p>
</sec>
</body>
<back>
<sec sec-type="funding-information" id="sec30">
<title>Funding</title>
<p>The author(s) declare financial support was received for the research, authorship, and/or publication of this article. This work was funded by University of Birmingham to cover open access publication fee and by the AHRC AH/T008091/1 award to HF.</p>
</sec>
<sec sec-type="COI-statement" id="sec31">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec id="sec100" sec-type="disclaimer">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Abbe</surname> <given-names>A.</given-names></name> <name><surname>Brandon</surname> <given-names>S. E.</given-names></name></person-group> (<year>2013</year>). <article-title>The role of rapport in investigative interviewing: a review</article-title>. <source>J. Investig. Psychol. Offender Profiling</source> <volume>10</volume>, <fpage>237</fpage>&#x2013;<lpage>249</lpage>. doi: <pub-id pub-id-type="doi">10.1002/jip.1386</pub-id></citation></ref>
<ref id="ref2"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ali</surname> <given-names>M. M.</given-names></name> <name><surname>Brubacher</surname> <given-names>S. P.</given-names></name> <name><surname>Earhart</surname> <given-names>B.</given-names></name> <name><surname>Powell</surname> <given-names>M. B.</given-names></name> <name><surname>Westera</surname> <given-names>N. J.</given-names></name></person-group> (<year>2020</year>). <article-title>The utility of ground rule instructions with younger and older adult witnesses</article-title>. <source>Appl. Cogn. Psychol.</source> <volume>34</volume>, <fpage>664</fpage>&#x2013;<lpage>677</lpage>. doi: <pub-id pub-id-type="doi">10.1002/acp.3648</pub-id></citation></ref>
<ref id="ref1002"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Andrews</surname> <given-names>S. J.</given-names></name> <name><surname>Lamb</surname> <given-names>M. E.</given-names></name></person-group> (<year>2016</year>). <article-title>How do lawyers examine and cross&#x2010;examine children in Scotland?</article-title> <source>Appl. Cog. Psychol.</source> <volume>30</volume>, <fpage>953</fpage>&#x2013;<lpage>971</lpage>. doi: <pub-id pub-id-type="doi">10.1002/acp.3286</pub-id></citation></ref>
<ref id="ref4"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Benson</surname> <given-names>M. S.</given-names></name> <name><surname>Powell</surname> <given-names>M. B.</given-names></name></person-group> (<year>2015</year>). <article-title>Evaluation of a comprehensive interactive training system for investigative interviewers of children</article-title>. <source>Psychol. Public Policy Law</source> <volume>21</volume>, <fpage>309</fpage>&#x2013;<lpage>322</lpage>. doi: <pub-id pub-id-type="doi">10.1037/law0000052</pub-id></citation></ref>
<ref id="ref5"><citation citation-type="book"><person-group person-group-type="editor"><name><surname>Brewer</surname> <given-names>N.</given-names></name> <name><surname>Williams</surname> <given-names>K. D.</given-names></name></person-group> (Eds.) (<year>2017</year>). <source>Psychology and Law: An Empirical Perspective.</source> <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Guilford Publications</publisher-name>.</citation></ref>
<ref id="ref6"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Brooks</surname> <given-names>O.</given-names></name> <name><surname>Burman</surname> <given-names>M.</given-names></name></person-group> (<year>2017</year>). <article-title>Reporting rape: victim perspectives on advocacy support in the criminal justice process</article-title>. <source>Criminol. Crim. Just.</source> <volume>17</volume>, <fpage>209</fpage>&#x2013;<lpage>225</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1748895816667996</pub-id></citation></ref>
<ref id="ref7"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Brubacher</surname> <given-names>S. P.</given-names></name> <name><surname>Powell</surname> <given-names>M. B.</given-names></name> <name><surname>Roberts</surname> <given-names>K. P.</given-names></name></person-group> (<year>2014</year>). <article-title>Recommendations for interviewing children about repeated experiences</article-title>. <source>Psychol. Public Policy Law</source> <volume>20</volume>, <fpage>325</fpage>&#x2013;<lpage>335</lpage>. doi: <pub-id pub-id-type="doi">10.1037/law0000011</pub-id></citation></ref>
<ref id="ref8"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Brubacher</surname> <given-names>S. P.</given-names></name> <name><surname>Sharman</surname> <given-names>S. J.</given-names></name> <name><surname>Westera</surname> <given-names>N. J.</given-names></name> <name><surname>Zekiroski</surname> <given-names>H.</given-names></name> <name><surname>Danby</surname> <given-names>M. C.</given-names></name> <name><surname>Powell</surname> <given-names>M. B.</given-names></name></person-group> (<year>2020</year>). <article-title>Narrative practice may foster comfort but not enhance cognition in adult witness interviews about a mock sexual assault</article-title>. <source>J. Forensic Psychiatry Psychol.</source> <volume>31</volume>, <fpage>814</fpage>&#x2013;<lpage>821</lpage>. doi: <pub-id pub-id-type="doi">10.1080/14789949.2020.1799056</pub-id></citation></ref>
<ref id="ref9"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll1">Callisto</collab></person-group> (<year>n.d.</year>). Callisto Vault. Available at: <ext-link xlink:href="https://www.projectcallisto.org/documentmatch" ext-link-type="uri">https://www.projectcallisto.org/documentmatch</ext-link></citation></ref>
<ref id="ref10"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Campbell</surname> <given-names>R.</given-names></name> <name><surname>Dworkin</surname> <given-names>E.</given-names></name> <name><surname>Cabral</surname> <given-names>G.</given-names></name></person-group> (<year>2009</year>). <article-title>An ecological model of the impact of sexual assault on women's mental health</article-title>. <source>Trauma Violence Abuse</source> <volume>10</volume>, <fpage>225</fpage>&#x2013;<lpage>246</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1524838009334456</pub-id>, PMID: <pub-id pub-id-type="pmid">19433406</pub-id></citation></ref>
<ref id="ref12"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Dando</surname> <given-names>C. J.</given-names></name> <name><surname>Milne</surname> <given-names>R.</given-names></name></person-group> (<year>2009</year>). &#x201C;<article-title>The cognitive interview</article-title>&#x201D; in <source>Applied Criminal Psychology: A Guide to Forensic Behavioral Science</source>. eds. <person-group person-group-type="editor"><name><surname>Kocsis</surname> <given-names>R. N.</given-names></name> <name><surname>Thomas</surname> <given-names>C. C.</given-names></name></person-group> <publisher-loc>Springfield, Illinois</publisher-loc>. <fpage>147</fpage>&#x2013;<lpage>168</lpage>.</citation></ref>
<ref id="ref14"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ebbesen</surname> <given-names>E. B.</given-names></name> <name><surname>Rienick</surname> <given-names>C. B.</given-names></name></person-group> (<year>1998</year>). <article-title>Retention interval and eyewitness memory for events and personal identifying attributes</article-title>. <source>J. Appl. Psychol.</source> <volume>83</volume>, <fpage>745</fpage>&#x2013;<lpage>762</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0021-9010.83.5.745</pub-id>, PMID: <pub-id pub-id-type="pmid">9806014</pub-id></citation></ref>
<ref id="ref15"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Eisenhut</surname> <given-names>K.</given-names></name> <name><surname>Sauerborn</surname> <given-names>E.</given-names></name> <name><surname>Garc&#x00ED;a-Moreno</surname> <given-names>C.</given-names></name> <name><surname>Wild</surname> <given-names>V.</given-names></name></person-group> (<year>2020</year>). <article-title>Mobile applications addressing violence against women: a systematic review. BMJ</article-title>. <source>Glob. Health</source> <volume>5</volume>:<fpage>e001954</fpage>. doi: <pub-id pub-id-type="doi">10.1136/bmjgh-2019-001954</pub-id>, PMID: <pub-id pub-id-type="pmid">32399255</pub-id></citation></ref>
<ref id="ref16"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Elmir</surname> <given-names>R.</given-names></name> <name><surname>Schmied</surname> <given-names>V.</given-names></name> <name><surname>Jackson</surname> <given-names>D.</given-names></name> <name><surname>Wilkes</surname> <given-names>L.</given-names></name></person-group> (<year>2011</year>). <article-title>Interviewing people about potentially sensitive topics</article-title>. <source>Nurs. Res.</source> <volume>19</volume>, <fpage>12</fpage>&#x2013;<lpage>16</lpage>. doi: <pub-id pub-id-type="doi">10.7748/nr2011.10.19.1.12.c8766</pub-id></citation></ref>
<ref id="ref17"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Evans</surname> <given-names>J.</given-names></name> <name><surname>Shaffer</surname> <given-names>S.</given-names></name> <name><surname>Walsh</surname> <given-names>D.</given-names></name></person-group> (<year>2019</year>). &#x201C;<article-title>Interpreters in investigative interviewing contexts</article-title>&#x201D; in <source>Routledge International Handbook of Legal and Investigative Psychology</source>. eds. <person-group person-group-type="editor"><name><surname>Bull</surname> <given-names>R.</given-names></name> <name><surname>Blandon-Gitlin</surname> <given-names>I.</given-names></name></person-group> (<publisher-loc>London</publisher-loc>: <publisher-name>Routledge</publisher-name>), <fpage>133</fpage>&#x2013;<lpage>148</lpage>.</citation></ref>
<ref id="ref18"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Farrugia</surname> <given-names>L.</given-names></name> <name><surname>Oxburgh</surname> <given-names>G.</given-names></name> <name><surname>Gabbert</surname> <given-names>F.</given-names></name></person-group> (<year>2019</year>). <article-title>Effective evaluation of forensic interviews: the forensic interview trace (FIT)</article-title>. <source>Investig. Interview. Res. Pract.</source> <volume>10</volume>, <fpage>20</fpage>&#x2013;<lpage>31</lpage>.</citation></ref>
<ref id="ref19"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fessinger</surname> <given-names>M. B.</given-names></name> <name><surname>McWilliams</surname> <given-names>K.</given-names></name> <name><surname>Bakth</surname> <given-names>F. N.</given-names></name> <name><surname>Lyon</surname> <given-names>T. D.</given-names></name></person-group> (<year>2021</year>). <article-title>Setting the ground rules: use and practice of ground rules in child forensic interviews</article-title>. <source>Child Maltreat.</source> <volume>26</volume>, <fpage>126</fpage>&#x2013;<lpage>132</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1077559520910783</pub-id>, PMID: <pub-id pub-id-type="pmid">32208866</pub-id></citation></ref>
<ref id="ref20"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Fisher</surname> <given-names>R. P.</given-names></name> <name><surname>Geiselman</surname> <given-names>R. E.</given-names></name></person-group> (<year>1992</year>). <source>Memory Enhancing Techniques for Investigative Interviewing: The Cognitive Interview.</source> <publisher-loc>Springfield, Illinois</publisher-loc>: <publisher-name>Charles C Thomas Publisher</publisher-name>.</citation></ref>
<ref id="ref22"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Freed</surname> <given-names>D.</given-names></name> <name><surname>Palmer</surname> <given-names>J.</given-names></name> <name><surname>Minchala</surname> <given-names>D.</given-names></name> <name><surname>Levy</surname> <given-names>K.</given-names></name> <name><surname>Ristenpart</surname> <given-names>T.</given-names></name> <name><surname>Dell</surname> <given-names>N.</given-names></name></person-group> (<year>2018</year>). &#x201C;A Stalker's paradise&#x201D;: how intimate partner abusers exploit technology&#x201D; in <italic>Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems</italic>. pp. 1&#x2013;13.</citation></ref>
<ref id="ref23"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Freyd</surname> <given-names>J. J.</given-names></name></person-group> (<year>2004</year>). <article-title>Memory for abuse: what can we learn from a prosecution sample?</article-title> <source>J. Child Sex. Abus.</source> <volume>12</volume>, <fpage>97</fpage>&#x2013;<lpage>103</lpage>. doi: <pub-id pub-id-type="doi">10.1300/J070v12n02_05</pub-id>, PMID: <pub-id pub-id-type="pmid">15105085</pub-id></citation></ref>
<ref id="ref24"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gabbert</surname> <given-names>F.</given-names></name> <name><surname>Hope</surname> <given-names>L.</given-names></name> <name><surname>Fisher</surname> <given-names>R. P.</given-names></name></person-group> (<year>2009</year>). <article-title>Protecting eyewitness evidence: examining the efficacy of a self-administered interview tool</article-title>. <source>Law Hum. Behav.</source> <volume>33</volume>, <fpage>298</fpage>&#x2013;<lpage>307</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10979-008-9146-8</pub-id>, PMID: <pub-id pub-id-type="pmid">18561007</pub-id></citation></ref>
<ref id="ref25"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gabbert</surname> <given-names>F.</given-names></name> <name><surname>Hope</surname> <given-names>L.</given-names></name> <name><surname>Fisher</surname> <given-names>R. P.</given-names></name> <name><surname>Jamieson</surname> <given-names>K.</given-names></name></person-group> (<year>2012</year>). <article-title>Protecting against misleading post-event information with a self-administered interview</article-title>. <source>Appl. Cogn. Psychol.</source> <volume>26</volume>, <fpage>568</fpage>&#x2013;<lpage>575</lpage>. doi: <pub-id pub-id-type="doi">10.1002/acp.2828</pub-id></citation></ref>
<ref id="ref26"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gabbert</surname> <given-names>F.</given-names></name> <name><surname>Hope</surname> <given-names>L.</given-names></name> <name><surname>Horry</surname> <given-names>R.</given-names></name> <name><surname>Drain</surname> <given-names>T.</given-names></name> <name><surname>Hughes</surname> <given-names>C.</given-names></name></person-group> (<year>2022</year>). <article-title>Examining the efficacy of a digital version of the self-administered interview</article-title>. <source>Comput Hum Behav Rep</source> <volume>5</volume>:<fpage>100159</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chbr.2021.100159</pub-id></citation></ref>
<ref id="ref27"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gabbert</surname> <given-names>F.</given-names></name> <name><surname>Hope</surname> <given-names>L.</given-names></name> <name><surname>Luther</surname> <given-names>K.</given-names></name> <name><surname>Wright</surname> <given-names>G.</given-names></name> <name><surname>Ng</surname> <given-names>M.</given-names></name> <name><surname>Oxburgh</surname> <given-names>G.</given-names></name></person-group> (<year>2021</year>). <article-title>Exploring the use of rapport in professional information-gathering contexts by systematically mapping the evidence base</article-title>. <source>Appl. Cogn. Psychol.</source> <volume>35</volume>, <fpage>329</fpage>&#x2013;<lpage>341</lpage>. doi: <pub-id pub-id-type="doi">10.1002/acp.3762</pub-id></citation></ref>
<ref id="ref28"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gabbert</surname> <given-names>F.</given-names></name> <name><surname>Memon</surname> <given-names>A.</given-names></name> <name><surname>Allan</surname> <given-names>K.</given-names></name></person-group> (<year>2003</year>). <article-title>Memory conformity: can eyewitnesses influence each other's memories for an event?</article-title> <source>Appl. Cogn. Psychol. Off. J. Soc. Appl. Res. Mem. Cogn.</source> <volume>17</volume>, <fpage>533</fpage>&#x2013;<lpage>543</lpage>. doi: <pub-id pub-id-type="doi">10.1002/acp.885</pub-id></citation></ref>
<ref id="ref29"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Glasbeek</surname> <given-names>A.</given-names></name></person-group> (<year>2021</year>). <article-title>He said, she said, we watched: video evidence in sexual assault trials</article-title> in <source>The Palgrave Handbook of Gendered Violence and Technology</source>. (eds.) <person-group person-group-type="author"><name><surname>Powell</surname> <given-names>A.</given-names></name> <name><surname>Flynn</surname> <given-names>A.</given-names></name> <name><surname>Sugiura</surname> <given-names>L.</given-names></name></person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Palgrave Macmillan</publisher-name>)</citation></ref>
<ref id="ref30"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Greeson</surname> <given-names>M. R.</given-names></name> <name><surname>Campbell</surname> <given-names>R.</given-names></name> <name><surname>Fehler-Cabral</surname> <given-names>G.</given-names></name></person-group> (<year>2014</year>). <article-title>Cold or caring? Adolescent sexual assault victims&#x2019; perceptions of their interactions with the police</article-title>. <source>Violence Vict.</source> <volume>29</volume>, <fpage>636</fpage>&#x2013;<lpage>651</lpage>. doi: <pub-id pub-id-type="doi">10.1891/0886-6708.VV-D-13-00039</pub-id></citation></ref>
<ref id="ref1008"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Hankins</surname> <given-names>M.</given-names></name></person-group> (<year>2019</year>).  Report Digital Dignity in armed conflict: a roadmap for, Wilton Park. United Kingdom. Available at: <ext-link xlink:href="https://policycommons.net/artifacts/1789971/report-digital-dignity-in-armed-conflict/2521615/" ext-link-type="uri">https://policycommons.net/artifacts/1789971/report-digital-dignity-in-armed-conflict/2521615/</ext-link> (Accessed December 1, 2023).</citation></ref>
<ref id="ref31"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Heydon</surname> <given-names>G.</given-names></name> <name><surname>Henry</surname> <given-names>N.</given-names></name> <name><surname>Loney-Howes</surname> <given-names>R.</given-names></name> <name><surname>Hindes</surname> <given-names>S.</given-names></name></person-group> (<year>2023</year>). <article-title>Alternative reporting options for sexual assault: Perspectives of victim-survivors</article-title>. <source>Trends &#x0026; Issues in Crime &#x0026; Criminal Justice, (678)</source>. <publisher-loc>Canberra</publisher-loc>: <publisher-name>Australian Institute of Criminology</publisher-name>. doi: <pub-id pub-id-type="doi">10.52922/ti77123</pub-id></citation></ref>
<ref id="ref32"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Heydon</surname> <given-names>G.</given-names></name> <name><surname>Powell</surname> <given-names>A.</given-names></name></person-group> (<year>2018</year>). <article-title>Written-response interview protocols: an innovative approach to confidential reporting in victim interviewing in sexual assault investigations</article-title>. <source>Polic. Soc.</source> <volume>28</volume>, <fpage>631</fpage>&#x2013;<lpage>646</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10439463.2016.1187146</pub-id></citation></ref>
<ref id="ref33"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hlavka</surname> <given-names>H. R.</given-names></name> <name><surname>Mulla</surname> <given-names>S.</given-names></name></person-group> (<year>2018</year>). <article-title>&#x201C;That's how she talks&#x201D;: animating text message evidence in the sexual assault trial</article-title>. <source>Law Soc. Rev.</source> <volume>52</volume>, <fpage>401</fpage>&#x2013;<lpage>435</lpage>. doi: <pub-id pub-id-type="doi">10.1111/lasr.12340</pub-id></citation></ref>
<ref id="ref34"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll2">Hollie Guard</collab></person-group> (<year>2021</year>). UK police&#x2014;Hollie guard extra. Available at: <ext-link xlink:href="https://hollieguard.co.uk/wp-content/uploads/2021/02/JA_ZEC_0554_HG_Police_V8.pdf" ext-link-type="uri">https://hollieguard.co.uk/wp-content/uploads/2021/02/JA_ZEC_0554_HG_Police_V8.pdf</ext-link></citation></ref>
<ref id="ref35"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll3">Home Office</collab></person-group> (<year>2021</year>). Crime outcomes in England and Wales 2020 to 2021. Available at: <ext-link xlink:href="https://www.gov.uk/government/statistics/crime-outcomes-in-england-and-wales-2020-to-2021" ext-link-type="uri">https://www.gov.uk/government/statistics/crime-outcomes-in-england-and-wales-2020-to-2021</ext-link></citation></ref>
<ref id="ref37"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll4">Imkaan</collab></person-group> (<year>2019</year>). The value of intersectionality in understanding violence against women and girls (VAWG) July 2019. Available at: <ext-link xlink:href="https://eca.unwomen.org/sites/default/files/Field%20Office%20ECA/Attachments/Publications/2019/10/The%20value%20of%20intersectionality%20in%20understanding%20violence%20against%20women%20and%20girls.pdf" ext-link-type="uri">https://eca.unwomen.org/sites/default/files/Field%20Office%20ECA/Attachments/Publications/2019/10/The%20value%20of%20intersectionality%20in%20understanding%20violence%20against%20women%20and%20girls.pdf</ext-link></citation></ref>
<ref id="ref38"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll5">JDoe</collab></person-group> (<year>n.d.</year>). Features. Available at: <ext-link xlink:href="https://jdoe.io/html/features.html" ext-link-type="uri">https://jdoe.io/html/features.html</ext-link></citation></ref>
<ref id="ref39"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kebbell</surname> <given-names>M. R.</given-names></name> <name><surname>O&#x2019;Kelly</surname> <given-names>C. M. E.</given-names></name> <name><surname>Gilchrist</surname> <given-names>E. L.</given-names></name></person-group> (<year>2007</year>). <article-title>Rape victims' experiences of giving evidence in English courts: a survey</article-title>. <source>Psychiatry Psychol. Law</source> <volume>14</volume>, <fpage>111</fpage>&#x2013;<lpage>119</lpage>. doi: <pub-id pub-id-type="doi">10.1375/pplt.14.1.111</pub-id></citation></ref>
<ref id="ref40"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Kelly</surname> <given-names>L.</given-names></name> <name><surname>Lovett</surname> <given-names>J.</given-names></name> <name><surname>Regan</surname> <given-names>L.</given-names></name></person-group> (<year>2005</year>). A gap or a chasm? Attrition in reported rape cases. Home Office Research Study, 293.</citation></ref>
<ref id="ref41"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kieckhaefer</surname> <given-names>J. M.</given-names></name> <name><surname>Vallano</surname> <given-names>J. P.</given-names></name> <name><surname>Schreiber Compo</surname> <given-names>N.</given-names></name></person-group> (<year>2014</year>). <article-title>Examining the positive effects of rapport building: when and why does rapport building benefit adult eyewitness memory?</article-title> <source>Memory</source> <volume>22</volume>, <fpage>1010</fpage>&#x2013;<lpage>1023</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09658211.2013.864313</pub-id>, PMID: <pub-id pub-id-type="pmid">24304449</pub-id></citation></ref>
<ref id="ref42"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kilpatrick</surname> <given-names>D. G.</given-names></name> <name><surname>Acierno</surname> <given-names>R.</given-names></name> <name><surname>Resnick</surname> <given-names>H. S.</given-names></name> <name><surname>Saunders</surname> <given-names>B. E.</given-names></name> <name><surname>Best</surname> <given-names>C. L.</given-names></name></person-group> (<year>1997</year>). <article-title>A 2-year longitudinal analysis of the relationships between violent assault and substance use in women</article-title>. <source>J. Consult. Clin. Psychol.</source> <volume>65</volume>, <fpage>834</fpage>&#x2013;<lpage>847</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0022-006X.65.5.834</pub-id>, PMID: <pub-id pub-id-type="pmid">9337502</pub-id></citation></ref>
<ref id="ref43"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kim</surname> <given-names>S.</given-names></name> <name><surname>Alison</surname> <given-names>L.</given-names></name> <name><surname>Christiansen</surname> <given-names>P.</given-names></name></person-group> (<year>2020</year>). <article-title>Observing rapport-based interpersonal techniques to gather information from victims</article-title>. <source>Psychol. Public Policy Law</source> <volume>26</volume>, <fpage>166</fpage>&#x2013;<lpage>175</lpage>. doi: <pub-id pub-id-type="doi">10.1037/law0000222</pub-id></citation></ref>
<ref id="ref44"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname> <given-names>H.</given-names></name></person-group> (<year>2018</year>). <article-title>When whispers enter the cloud: evaluating technology to prevent and report sexual assault</article-title>. <source>Harv. J. Law Technol.</source> <volume>31</volume>, <fpage>939</fpage>&#x2013;<lpage>963</lpage>.</citation></ref>
<ref id="ref45"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Loftus</surname> <given-names>E. F.</given-names></name> <name><surname>Palmer</surname> <given-names>J. C.</given-names></name></person-group> (<year>1974</year>). <article-title>Reconstruction of automobile destruction: an example of the interaction between language and memory</article-title>. <source>J. Verbal Learn. Verbal Behav.</source> <volume>13</volume>, <fpage>585</fpage>&#x2013;<lpage>589</lpage>. doi: <pub-id pub-id-type="doi">10.1016/S0022-5371(74)80011-3</pub-id></citation></ref>
<ref id="ref46"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Loney-Howes</surname> <given-names>R.</given-names></name> <name><surname>Heydon</surname> <given-names>G.</given-names></name> <name><surname>O&#x2019;Neill</surname> <given-names>T.</given-names></name></person-group> (<year>2022</year>). <article-title>Connecting survivors to therapeutic support and criminal justice through informal reporting options: an analysis of sexual violence reports made to a digital reporting tool in Australia</article-title>. <source>Curr. Issues Crim. Just.</source> <volume>34</volume>, <fpage>20</fpage>&#x2013;<lpage>37</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10345329.2021.2004983</pub-id></citation></ref>
<ref id="ref47"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lyon</surname> <given-names>T. D.</given-names></name></person-group> (<year>2014</year>). <article-title>Interviewing children</article-title>. <source>Annu. Rev. Law Soc. Sci.</source> <volume>10</volume>, <fpage>73</fpage>&#x2013;<lpage>89</lpage>. doi: <pub-id pub-id-type="doi">10.1146/annurev-lawsocsci-110413-030913</pub-id></citation></ref>
<ref id="ref48"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lyon</surname> <given-names>T. D.</given-names></name> <name><surname>Wandrey</surname> <given-names>L.</given-names></name> <name><surname>Ahern</surname> <given-names>E.</given-names></name> <name><surname>Licht</surname> <given-names>R.</given-names></name> <name><surname>Sim</surname> <given-names>M. P. Y.</given-names></name> <name><surname>Quas</surname> <given-names>J. A.</given-names></name></person-group> (<year>2014</year>). <article-title>Eliciting maltreated and nonmaltreated children&#x2019;s transgression disclosures: narrative practice rapport building and a putative confession</article-title>. <source>Child Dev.</source> <volume>85</volume>, <fpage>1756</fpage>&#x2013;<lpage>1769</lpage>. doi: <pub-id pub-id-type="doi">10.1111/cdev.12223</pub-id>, PMID: <pub-id pub-id-type="pmid">24467688</pub-id></citation></ref>
<ref id="ref49"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mart&#x00ED;nez-P&#x00E9;rez</surname> <given-names>B.</given-names></name> <name><surname>De La Torre-D&#x00ED;ez</surname> <given-names>I.</given-names></name> <name><surname>L&#x00F3;pez-Coronado</surname> <given-names>M.</given-names></name></person-group> (<year>2015</year>). <article-title>Privacy and security in mobile health apps: a review and recommendations</article-title>. <source>J. Med. Syst.</source> <volume>39</volume>, <fpage>1</fpage>&#x2013;<lpage>8</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10916-014-0181-3</pub-id></citation></ref>
<ref id="ref50"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll6">Me Too Movement</collab></person-group> (<year>2023</year>). Tarana Burke&#x2014;Founder. Available at: <ext-link xlink:href="https://metoomvmt.org/get-to-know-us/tarana-burke-founder/" ext-link-type="uri">https://metoomvmt.org/get-to-know-us/tarana-burke-founder/</ext-link></citation></ref>
<ref id="ref51"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Meijer</surname> <given-names>E.</given-names></name> <name><surname>Hoogesteyn</surname> <given-names>K.</given-names></name> <name><surname>Verigin</surname> <given-names>B.</given-names></name> <name><surname>Finnick</surname> <given-names>D.</given-names></name></person-group> (<year>2021</year>). Rapport building: online vs in-person interviews. Centre for Research and Evidence on Security Threats. Available at: <ext-link xlink:href="https://crestresearch.ac.uk/resources/rapport-building-online-vs-in-person-interviews/" ext-link-type="uri">https://crestresearch.ac.uk/resources/rapport-building-online-vs-in-person-interviews/</ext-link></citation></ref>
<ref id="ref52"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Mendez</surname> <given-names>J. E.</given-names></name> <name><surname>Areh</surname> <given-names>I.</given-names></name></person-group> (<year>2021</year>). Principles on effective interviewing for investigations and information gathering. Anti-Torture Initiative, the Association for the Prevention of Torture, and the Norwegian Centre for Human Rights. Available at: <ext-link xlink:href="http://www.interviewingprinciples.com" ext-link-type="uri">www.interviewingprinciples.com</ext-link> (Accessed March 11, 2023).</citation></ref>
<ref id="ref53"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Miller</surname> <given-names>C. M.</given-names></name></person-group> (<year>2022</year>). <article-title>A survey of prosecutors and investigators using digital evidence: a starting point</article-title>. <source>Forens. Sci. Int. Synergy</source> <volume>6</volume>:<fpage>100296</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.fsisyn.2022.100296</pub-id>, PMID: <pub-id pub-id-type="pmid">37398922</pub-id></citation></ref>
<ref id="ref54"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Milne</surname> <given-names>R.</given-names></name> <name><surname>Bull</surname> <given-names>R.</given-names></name></person-group> (<year>1999</year>). <source>Investigative Interviewing: Psychology and Practice.</source> <publisher-loc>Chichester, UK</publisher-loc>: <publisher-name>John Wiley &#x0026; Sons</publisher-name>.</citation></ref>
<ref id="ref55"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Milne</surname> <given-names>B.</given-names></name> <name><surname>Bull</surname> <given-names>R.</given-names></name></person-group> (<year>2006</year>). &#x201C;<article-title>Interviewing victims of crime, including children and people with intellectual disabilities</article-title>&#x201D; in <source>Practical Psychology for Forensic Investigations</source>. eds. <person-group person-group-type="editor"><name><surname>Kebbell</surname> <given-names>M. R.</given-names></name> <name><surname>Davies</surname> <given-names>G. M.</given-names></name></person-group> (<publisher-loc>Chichester, UK</publisher-loc>: <publisher-name>Wiley</publisher-name>)</citation></ref>
<ref id="ref56"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll7">Ministry of Justice</collab></person-group> (<year>2022</year>). Achieving Best evidence in criminal proceedings: Guidance on interviewing victims and witnesses, and guidance on using special measures. Available at: <ext-link xlink:href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1051269/achievingbestevidencecriminalproceedings.pdf" ext-link-type="uri">https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1051269/achievingbestevidencecriminalproceedings.pdf</ext-link></citation></ref>
<ref id="ref57"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll8">Murad Code</collab></person-group> (<year>2022</year>). Murad Code. Available at: <ext-link xlink:href="https://www.muradcode.com/murad-code" ext-link-type="uri">https://www.muradcode.com/murad-code</ext-link></citation></ref>
<ref id="ref58"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Neequaye</surname> <given-names>D. A.</given-names></name> <name><surname>Giolla</surname> <given-names>E. M.</given-names></name></person-group> (<year>2022</year>). <article-title>The use of the term rapport in the investigative interviewing literature: a critical examination of definitions</article-title>. <source>Meta-Psychol.</source> <volume>6</volume>, <fpage>1</fpage>&#x2013;<lpage>15</lpage>. doi: <pub-id pub-id-type="doi">10.15626/MP.2021.2808</pub-id></citation></ref>
<ref id="ref59"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Obada-Obieh</surname> <given-names>B.</given-names></name> <name><surname>Spagnolo</surname> <given-names>L.</given-names></name> <name><surname>Beznosov</surname> <given-names>K.</given-names></name></person-group> (<year>2020</year>). &#x201C;Towards understanding privacy and trust in online reporting of sexual assault&#x201D; in <italic>Sixteenth Symposium on Usable Privacy and Security</italic> (<italic>SOUPS 2020</italic>). 145&#x2013;164. Available at: <ext-link xlink:href="https://www.usenix.org/conference/soups2020/presentation/obada-obieh" ext-link-type="uri">https://www.usenix.org/conference/soups2020/presentation/obada-obieh</ext-link></citation></ref>
<ref id="ref60"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Oxburgh</surname> <given-names>G. E.</given-names></name> <name><surname>Myklebust</surname> <given-names>T.</given-names></name> <name><surname>Grant</surname> <given-names>T.</given-names></name></person-group> (<year>2010</year>). <article-title>The question of question types in police interviews: a review of the literature from a psychological and linguistic perspective</article-title>. <source>Int. J. Speech Lang. Law</source> <volume>17</volume>, <fpage>45</fpage>&#x2013;<lpage>66</lpage>. doi: <pub-id pub-id-type="doi">10.1558/ijsll.v17i1.45</pub-id></citation></ref>
<ref id="ref61"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Page</surname> <given-names>M. J.</given-names></name> <name><surname>McKenzie</surname> <given-names>J. E.</given-names></name> <name><surname>Bossuyt</surname> <given-names>P. M.</given-names></name> <name><surname>Boutron</surname> <given-names>I.</given-names></name> <name><surname>Hoffmann</surname> <given-names>T. C.</given-names></name> <name><surname>Mulrow</surname> <given-names>C. D.</given-names></name> <etal/></person-group>. (<year>2021</year>). <article-title>The PRISMA 2020 statement: an updated guideline for reporting systematic reviews</article-title>. <source>BMJ</source> <volume>372</volume>:<fpage>n71</fpage>. doi: <pub-id pub-id-type="doi">10.1136/bmj.n71</pub-id>, PMID: <pub-id pub-id-type="pmid">33782057</pub-id></citation></ref>
<ref id="ref62"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Paterson</surname> <given-names>H.</given-names></name></person-group> (<year>2018</year>). Why we made iWitnessed, an app to collect evidence. The Conversation. Available at: <ext-link xlink:href="https://theconversation.com/why-we-made-iwitnessed-an-app-to-collect-evidence-94107" ext-link-type="uri">https://theconversation.com/why-we-made-iwitnessed-an-app-to-collect-evidence-94107</ext-link></citation></ref>
<ref id="ref63"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Patterson</surname> <given-names>D.</given-names></name></person-group> (<year>2011</year>). <article-title>The impact of detectives&#x2019; manner of questioning on rape victims&#x2019; disclosure</article-title>. <source>Violence Against Women</source> <volume>17</volume>, <fpage>1349</fpage>&#x2013;<lpage>1373</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1077801211434725</pub-id>, PMID: <pub-id pub-id-type="pmid">22240403</pub-id></citation></ref>
<ref id="ref64"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Penrod</surname> <given-names>S. D.</given-names></name> <name><surname>Loftus</surname> <given-names>E. F.</given-names></name> <name><surname>Winkler</surname> <given-names>J.</given-names></name></person-group> (<year>1982</year>). &#x201C;<article-title>The reliability of eyewitness testimony: a psychological perspective</article-title>&#x201D; in <source>The Psychology of the Courtroom</source>. eds. <person-group person-group-type="editor"><name><surname>Kerr</surname> <given-names>N. L.</given-names></name> <name><surname>Bray</surname> <given-names>R. M.</given-names></name></person-group> (<publisher-loc>New York</publisher-loc>: <publisher-name>Academic Press</publisher-name>), <fpage>119</fpage>&#x2013;<lpage>168</lpage>.</citation></ref>
<ref id="ref65"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Powell</surname> <given-names>M. B.</given-names></name></person-group> (<year>2002</year>). <article-title>Specialist training in investigative and evidential interviewing: is it having any effect on the behaviour of professionals in the field?</article-title> <source>Psychiatry Psychol. Law</source> <volume>9</volume>, <fpage>44</fpage>&#x2013;<lpage>55</lpage>. doi: <pub-id pub-id-type="doi">10.1375/pplt.2002.9.1.44</pub-id></citation></ref>
<ref id="ref66"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Powell</surname> <given-names>M. B.</given-names></name> <name><surname>Fisher</surname> <given-names>R. P.</given-names></name> <name><surname>Wright</surname> <given-names>R.</given-names></name></person-group> (<year>2005</year>). &#x201C;<article-title>Investigative interviewing</article-title>&#x201D; in <source>Psychology and Law: An Empirical Perspective</source>. eds. <person-group person-group-type="editor"><name><surname>Brewer</surname> <given-names>N.</given-names></name> <name><surname>Williams</surname> <given-names>K. D.</given-names></name></person-group> (<publisher-loc>New York</publisher-loc>: <publisher-name>The Guilford Press</publisher-name>), <fpage>11</fpage>&#x2013;<lpage>42</lpage>.</citation></ref>
<ref id="ref67"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Powell</surname> <given-names>M. B.</given-names></name> <name><surname>Snow</surname> <given-names>P. C.</given-names></name></person-group> (<year>2007</year>). <article-title>Guide to questioning children during the free-narrative phase of an investigative interview</article-title>. <source>Aust. Psychol.</source> <volume>42</volume>, <fpage>57</fpage>&#x2013;<lpage>65</lpage>. doi: <pub-id pub-id-type="doi">10.1080/00050060600976032</pub-id></citation></ref>
<ref id="ref69"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Price</surname> <given-names>H. L.</given-names></name> <name><surname>Roberts</surname> <given-names>K. P.</given-names></name> <name><surname>Collins</surname> <given-names>A.</given-names></name></person-group> (<year>2013</year>). <article-title>The quality of children&#x2019;s allegations of abuse in investigative interviews containing practice narratives</article-title>. <source>J. Appl. Res. Mem. Cogn.</source> <volume>2</volume>, <fpage>1</fpage>&#x2013;<lpage>6</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jarmac.2012.03.001</pub-id></citation></ref>
<ref id="ref70"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Raver</surname> <given-names>A.</given-names></name> <name><surname>Lindholm</surname> <given-names>T.</given-names></name> <name><surname>Gustafsson</surname> <given-names>P. U.</given-names></name> <name><surname>Alm</surname> <given-names>C.</given-names></name></person-group> (<year>2023</year>). <article-title>Memory accuracy, suggestibility and credibility in investigative interviews with native and non-native eyewitnesses</article-title>. <source>Front. Psychol.</source> <volume>14</volume>:<fpage>1240822</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2023.1240822</pub-id>, PMID: <pub-id pub-id-type="pmid">37691785</pub-id></citation></ref>
<ref id="ref71"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Read</surname> <given-names>J. D.</given-names></name> <name><surname>Connolly</surname> <given-names>D. A.</given-names></name></person-group> (<year>2007</year>). &#x201C;<article-title>The effects of delay on long-term memory for witnessed events</article-title>&#x201D; in <source>Handbook of Witness Psychology: Volume I: Memory for Events</source>. eds. <person-group person-group-type="editor"><name><surname>Toglia</surname> <given-names>M. P.</given-names></name> <name><surname>Read</surname> <given-names>J. D.</given-names></name> <name><surname>Ross</surname> <given-names>D. F.</given-names></name> <name><surname>Lindsay</surname> <given-names>R. C. L.</given-names></name></person-group> (<publisher-loc>Mahway, NJ</publisher-loc>: <publisher-name>Erlbaum Associates Inc</publisher-name>), <fpage>117</fpage>&#x2013;<lpage>155</lpage>.</citation></ref>
<ref id="ref72"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Read</surname> <given-names>J. M.</given-names></name> <name><surname>Powell</surname> <given-names>M. B.</given-names></name> <name><surname>Kebbell</surname> <given-names>M. R.</given-names></name> <name><surname>Milne</surname> <given-names>R.</given-names></name></person-group> (<year>2009</year>). <article-title>Investigative interviewing of suspected sex offenders: a review of what constitutes best practice</article-title>. <source>Int. J. Police Sci. Manag.</source> <volume>11</volume>, <fpage>442</fpage>&#x2013;<lpage>459</lpage>. doi: <pub-id pub-id-type="doi">10.1350/ijps.2009.11.4.143</pub-id></citation></ref>
<ref id="ref73"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Ridley</surname> <given-names>A. M.</given-names></name> <name><surname>Gabbert</surname> <given-names>F.</given-names></name> <name><surname>La Rooy</surname> <given-names>D. J.</given-names></name></person-group> (<year>2012</year>). <source>Suggestibility in Legal Contexts: Psychological Research and Forensic Implications.</source> <publisher-loc>Chichester</publisher-loc>: <publisher-name>Wiley</publisher-name>.</citation></ref>
<ref id="ref74"><citation citation-type="book"><person-group person-group-type="author"><name><surname>Roberts</surname> <given-names>K. P.</given-names></name> <name><surname>Brubacher</surname> <given-names>S. P.</given-names></name> <name><surname>Powell</surname> <given-names>M. B.</given-names></name> <name><surname>Price</surname> <given-names>H. L.</given-names></name></person-group> (<year>2011</year>). &#x201C;<article-title>Practice narratives</article-title>&#x201D; in <source>Children&#x2019;s Testimony: A Handbook of Psychological Research and Forensic Practice</source>. eds. <person-group person-group-type="editor"><name><surname>Lamb</surname> <given-names>M. E.</given-names></name> <name><surname>LaRooy</surname> <given-names>D. J.</given-names></name> <name><surname>Malloy</surname> <given-names>L. C.</given-names></name> <name><surname>Katz</surname> <given-names>C.</given-names></name></person-group>. <edition>2nd</edition> ed (<publisher-loc>Chichester</publisher-loc>: <publisher-name>Wiley</publisher-name>), <fpage>129</fpage>&#x2013;<lpage>145</lpage>.</citation></ref>
<ref id="ref75"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Roberts</surname> <given-names>K. P.</given-names></name> <name><surname>Lamb</surname> <given-names>M. E.</given-names></name> <name><surname>Sternberg</surname> <given-names>K. J.</given-names></name></person-group> (<year>2004</year>). <article-title>The effects of rapport-building style on children's reports of a staged event</article-title>. <source>Appl. Cogn. Psychol.</source> <volume>18</volume>, <fpage>189</fpage>&#x2013;<lpage>202</lpage>. doi: <pub-id pub-id-type="doi">10.1002/acp.957</pub-id></citation></ref>
<ref id="ref76"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll9">SafeTTC</collab></person-group> (<year>n.d.</year>). Safe TTC app. Available at: <ext-link xlink:href="https://www.ttc.ca/riding-the-ttc/safety-and-security/safe-ttc-app" ext-link-type="uri">https://www.ttc.ca/riding-the-ttc/safety-and-security/safe-ttc-app</ext-link></citation></ref>
<ref id="ref77"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Scoboria</surname> <given-names>A.</given-names></name> <name><surname>Fisico</surname> <given-names>S.</given-names></name></person-group> (<year>2013</year>). <article-title>Encouraging and clarifying &#x201C;don&#x2019;t know&#x201D; responses enhances interview quality</article-title>. <source>J. Exp. Psychol. Appl.</source> <volume>19</volume>, <fpage>72</fpage>&#x2013;<lpage>82</lpage>. doi: <pub-id pub-id-type="doi">10.1037/a0032067</pub-id>, PMID: <pub-id pub-id-type="pmid">23544476</pub-id></citation></ref>
<ref id="ref78"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shaibakova</surname> <given-names>K. D.</given-names></name></person-group> (<year>2020</year>). <article-title>Gender-based violence: typology and solutions</article-title>. <source>Int. J. Criminol. Sociol.</source> <volume>9</volume>, <fpage>1028</fpage>&#x2013;<lpage>1032</lpage>. doi: <pub-id pub-id-type="doi">10.6000/1929-4409.2020.09.114</pub-id></citation></ref>
<ref id="ref79"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Smith</surname> <given-names>L. L.</given-names></name> <name><surname>Flowe</surname> <given-names>H. D.</given-names></name> <name><surname>Kanja</surname> <given-names>W.</given-names></name></person-group> (<year>2019</year>). <article-title>Achieving more with less: a critical review of protocols for forensic investigation of sexual violence in low-resource environments</article-title>. <source>Forens. Sci. Int. Synergy</source> <volume>1</volume>, <fpage>108</fpage>&#x2013;<lpage>113</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.fsisyn.2019.07.002</pub-id>, PMID: <pub-id pub-id-type="pmid">32411962</pub-id></citation></ref>
<ref id="ref80"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Smith</surname> <given-names>S. G.</given-names></name> <name><surname>Zhang</surname> <given-names>X.</given-names></name> <name><surname>Basile</surname> <given-names>K.C.</given-names></name> <name><surname>Merrick</surname> <given-names>M.T.</given-names></name> <name><surname>Wang</surname> <given-names>J.</given-names></name> <name><surname>Kresnow</surname> <given-names>M.</given-names></name> <etal/></person-group>. (<year>2018</year>). The National Intimate Partner and sexual violence survey (NISVS): 2015 data brief&#x2014;Updated release. National Center for Injury Prevention and Control, Centers for Disease Control and Prevention.</citation></ref>
<ref id="ref81"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Spurr</surname> <given-names>B.</given-names></name></person-group> (<year>2017</year>). TTC app led to sexual assault arrest, transit agency says. Toronto Star. Available at: <ext-link xlink:href="https://www.thestar.com/news/gta/transportation/2017/10/06/ttc-app-led-to-sexual-assault-arrest-transit-agency-says.html" ext-link-type="uri">https://www.thestar.com/news/gta/transportation/2017/10/06/ttc-app-led-to-sexual-assault-arrest-transit-agency-says.html</ext-link></citation></ref>
<ref id="ref82"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll10">Statista</collab></person-group> (<year>2022</year>). Number of smartphone subscriptions worldwide from 2016 to 2021, with forecasts from 2022 to 2027. Available at: <ext-link xlink:href="https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/" ext-link-type="uri">https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/</ext-link></citation></ref>
<ref id="ref83"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sternberg</surname> <given-names>K. J.</given-names></name> <name><surname>Lamb</surname> <given-names>M. E.</given-names></name> <name><surname>Hershkowitz</surname> <given-names>I.</given-names></name> <name><surname>Yudilevitch</surname> <given-names>L.</given-names></name> <name><surname>Orbach</surname> <given-names>Y.</given-names></name> <name><surname>Esplin</surname> <given-names>P. W.</given-names></name> <etal/></person-group>. (<year>1997</year>). <article-title>Effects of introductory style on children's abilities to describe experiences of sexual abuse</article-title>. <source>Child Abuse Negl.</source> <volume>21</volume>, <fpage>1133</fpage>&#x2013;<lpage>1146</lpage>. doi: <pub-id pub-id-type="doi">10.1016/S0145-2134(97)00071-9</pub-id>, PMID: <pub-id pub-id-type="pmid">9422833</pub-id></citation></ref>
<ref id="ref84"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Stevens</surname> <given-names>L. M.</given-names></name> <name><surname>Flowe</surname> <given-names>H. D.</given-names></name> <name><surname>Colloff</surname> <given-names>M. F.</given-names></name> <name><surname>Ingham</surname> <given-names>M.</given-names></name> <name><surname>Rockowitz</surname> <given-names>S.</given-names></name> <name><surname>Thompson</surname> <given-names>A.</given-names></name> <etal/></person-group>. (<year>in prep.</year>). Impact of misinformation, retention interval and repeated interviews on eyewitness memory for sexual violence&#x2014;a partial replication of Ebbesen and Rienick (1998).</citation></ref>
<ref id="ref85"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Stevens</surname> <given-names>L. M.</given-names></name> <name><surname>Reid</surname> <given-names>E.</given-names></name> <name><surname>Kanja</surname> <given-names>W.</given-names></name> <name><surname>Rockowitz</surname> <given-names>S.</given-names></name> <name><surname>Davies</surname> <given-names>K.</given-names></name> <name><surname>Dosanjh</surname> <given-names>S.</given-names></name> <etal/></person-group>. (<year>2022</year>). <article-title>The Kenyan survivors of sexual violence network: preserving memory evidence with a bespoke mobile application to increase access to vital services and justice</article-title>. <source>For. Soc.</source> <volume>12</volume>:<fpage>12</fpage>. doi: <pub-id pub-id-type="doi">10.3390/soc12010012</pub-id></citation></ref>
<ref id="ref86"><citation citation-type="other"><person-group person-group-type="author"><name><surname>Tjaden</surname> <given-names>P.</given-names></name> <name><surname>Thoennes</surname> <given-names>N.</given-names></name></person-group> (<year>2006</year>). Extent, nature, and consequences of rape victimization: Findings from the National Violence against Women Survey. National Institute of Justice and the Centers for Disease Control and Prevention.</citation></ref>
<ref id="ref1018"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll11">United Nations</collab></person-group> (<year>n.d.</year>) Frequently asked questions: Types of violence against women and girls. Available at: <ext-link xlink:href="https://www.unwomen.org/en/what-we-do/ending-violence-against-women/faqs/types-of-violence" ext-link-type="uri">https://www.unwomen.org/en/what-we-do/ending-violence-against-women/faqs/types-of-violence</ext-link></citation></ref>
<ref id="ref87"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll12">United Nations</collab></person-group> (<year>2015</year>). The World&#x2019;s women 2015: Trends and statistics. Department of Economic and Social Affairs, Statistics Division, United Nations.</citation></ref>
<ref id="ref90"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Vallano</surname> <given-names>J. P.</given-names></name> <name><surname>Evans</surname> <given-names>J. R.</given-names></name> <name><surname>Schreiber Compo</surname> <given-names>N.</given-names></name> <name><surname>Kieckhaefer</surname> <given-names>J. M.</given-names></name></person-group> (<year>2015</year>). <article-title>Rapport-building during witness and suspect interviews: a survey of law enforcement</article-title>. <source>Appl. Cogn. Psychol.</source> <volume>29</volume>, <fpage>369</fpage>&#x2013;<lpage>380</lpage>. doi: <pub-id pub-id-type="doi">10.1002/acp.3115</pub-id></citation></ref>
<ref id="ref91"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Vallano</surname> <given-names>J. P.</given-names></name> <name><surname>Schreiber Compo</surname> <given-names>N.</given-names></name></person-group> (<year>2015</year>). <article-title>Rapport-building with cooperative witnesses and criminal suspects: theoretical and empirical review</article-title>. <source>Psychol. Public Policy Law</source> <volume>21</volume>, <fpage>85</fpage>&#x2013;<lpage>99</lpage>. doi: <pub-id pub-id-type="doi">10.1037/law0000035</pub-id></citation></ref>
<ref id="ref92"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Weber</surname> <given-names>N.</given-names></name> <name><surname>Perfect</surname> <given-names>T. J.</given-names></name></person-group> (<year>2012</year>). <article-title>Improving eyewitness identification accuracy by screening out those who say they don&#x2019;t know</article-title>. <source>Law Hum. Behav.</source> <volume>36</volume>, <fpage>28</fpage>&#x2013;<lpage>36</lpage>. doi: <pub-id pub-id-type="doi">10.1037/h0093976</pub-id>, PMID: <pub-id pub-id-type="pmid">22471383</pub-id></citation></ref>
<ref id="ref93"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wells</surname> <given-names>G. L.</given-names></name> <name><surname>Kovera</surname> <given-names>M. B.</given-names></name> <name><surname>Douglass</surname> <given-names>A. B.</given-names></name> <name><surname>Brewer</surname> <given-names>N.</given-names></name> <name><surname>Meissner</surname> <given-names>C. A.</given-names></name> <name><surname>Wixted</surname> <given-names>J. T.</given-names></name></person-group> (<year>2020</year>). <article-title>Policy and procedure recommendations for the collection and preservation of eyewitness identification evidence</article-title>. <source>Law Hum. Behav.</source> <volume>44</volume>, <fpage>3</fpage>&#x2013;<lpage>36</lpage>. doi: <pub-id pub-id-type="doi">10.1037/lhb0000359</pub-id>, PMID: <pub-id pub-id-type="pmid">32027160</pub-id></citation></ref>
<ref id="ref94"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Westera</surname> <given-names>N. J.</given-names></name> <name><surname>Kebbell</surname> <given-names>M. R.</given-names></name> <name><surname>Milne</surname> <given-names>R.</given-names></name></person-group> (<year>2011</year>). <article-title>Interviewing rape complainants: police officers&#x2019; perceptions of interview format and quality of evidence</article-title>. <source>Appl. Cogn. Psychol.</source> <volume>25</volume>, <fpage>917</fpage>&#x2013;<lpage>926</lpage>. doi: <pub-id pub-id-type="doi">10.1002/acp.1770</pub-id></citation></ref>
<ref id="ref95"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Westera</surname> <given-names>N. J.</given-names></name> <name><surname>Kebbell</surname> <given-names>M. R.</given-names></name> <name><surname>Milne</surname> <given-names>B.</given-names></name></person-group> (<year>2013</year>). <article-title>It is better, but does it look better? Prosecutor perceptions of using rape complainant investigative interviews as evidence</article-title>. <source>Psychol. Crime Law</source> <volume>19</volume>, <fpage>595</fpage>&#x2013;<lpage>610</lpage>. doi: <pub-id pub-id-type="doi">10.1080/1068316X.2012.656119</pub-id></citation></ref>
<ref id="ref96"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Westera</surname> <given-names>N. J.</given-names></name> <name><surname>Kebbell</surname> <given-names>M. R.</given-names></name> <name><surname>Milne</surname> <given-names>B.</given-names></name></person-group> (<year>2016</year>). <article-title>Want a better criminal justice response to rape? Improve police interviews with complainants and suspects</article-title>. <source>Violence Against Women</source> <volume>22</volume>, <fpage>1748</fpage>&#x2013;<lpage>1769</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1077801216631439</pub-id>, PMID: <pub-id pub-id-type="pmid">26920944</pub-id></citation></ref>
<ref id="ref97"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wixted</surname> <given-names>J. T.</given-names></name> <name><surname>Ebbesen</surname> <given-names>E. B.</given-names></name></person-group> (<year>1997</year>). <article-title>Genuine power curves in forgetting: a quantitative analysis of individual subject forgetting functions</article-title>. <source>Mem. Cogn.</source> <volume>25</volume>, <fpage>731</fpage>&#x2013;<lpage>739</lpage>. doi: <pub-id pub-id-type="doi">10.3758/BF03211316</pub-id></citation></ref>
<ref id="ref98"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll14">World Bank Group</collab></person-group> (<year>2019</year>). Program&#x2014;law, justice and development week 2019. Available at: <ext-link xlink:href="https://ghum.kuleuven.be/ggs/program-ljd-week-2019.pdf" ext-link-type="uri">https://ghum.kuleuven.be/ggs/program-ljd-week-2019.pdf</ext-link></citation></ref>
<ref id="ref99"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll15">World Health Organization</collab></person-group> (<year>2003</year>). WHO multi-country study on women&#x2019;s health and domestic violence against women. Available at: <ext-link xlink:href="https://apps.who.int/iris/bitstream/handle/10665/67422/WHO_FCH_GWH_02.2.pdf" ext-link-type="uri">https://apps.who.int/iris/bitstream/handle/10665/67422/WHO_FCH_GWH_02.2.pdf</ext-link></citation></ref>
<ref id="ref100"><citation citation-type="other"><person-group person-group-type="author"><collab id="coll16">World Health Organization</collab></person-group> (<year>2021</year>). Violence against women prevalence estimates, 2018: Global, regional and national prevalence estimates for intimate partner violence against women and global and regional prevalence estimates for non-partner sexual violence against women. Executive summary. Available at: <ext-link xlink:href="https://www.who.int/publications/i/item/9789240022256" ext-link-type="uri">https://www.who.int/publications/i/item/9789240022256</ext-link></citation></ref>
<ref id="ref101"><citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yi</surname> <given-names>M.</given-names></name> <name><surname>Lamb</surname> <given-names>M. E.</given-names></name></person-group> (<year>2018</year>). <article-title>The effects of narrative practice on children's testimony and disclosure of secrets</article-title>. <source>Appl. Cogn. Psychol.</source> <volume>32</volume>, <fpage>326</fpage>&#x2013;<lpage>336</lpage>. doi: <pub-id pub-id-type="doi">10.1002/acp.3385</pub-id></citation></ref>
</ref-list>
</back>
</article>