- 1School of Psychology, University of Birmingham, Birmingham, United Kingdom
- 2School of Psychology, Cardiff University, Cardiff, United Kingdom
Introduction: Gender-based violence (GBV) is under-reported to the authorities owing to the stigma, shame, and fear of reprisal that surrounds these crimes. To address this, there has been an influx of technologies, including mobile phone and online applications that allow victim-survivors (hereafter, victims) to document and report GBV (hereafter referred to as GBVxTech). We critically analysed the extent to which GBVxTech applications align with the scientific knowledge base on gathering accounts of crimes from victims and witnesses.
Methods: We identified 41 reporting and evidence building applications from around the world but found many (n = 19) were no longer accessible. A total of 13 applications met the study criteria and were available for download. We evaluated each application on how well its design and features align with established minimum best practice standards for gathering complete and accurate accounts from witnesses and victims, such as the pre-interview instructions (e.g., setting ground rules), questioning approach (e.g., using open-ended questions), and the adequacy of security features (e.g., password protection).
Results and Discussion: We found most applications employ open questions, encourage victims to report information in an independent voice, and seek to elicit information pertinent to a criminal investigation. None of the applications use leading questions. However, most applications do not establish ground rules, and many use forced-choice questions, do not time stamp the information gathered, or document when users change their answers. Many applications have limited security features, potentially compromising users’ safety. Further, some applications do not provide information about how to use the app, an informed consent procedure, or data usage information. We discuss the findings and offer recommendations for future GBVxTech development.
Introduction
Gender-based violence (GBV) is any harmful act perpetrated against an individual or group due to their gender, and encompasses domestic, sexual, psychological, financial, and digital violations, as well as female genital mutilation, human trafficking, and child marriage (United Nations, n.d.). GBV affects men, women, and children worldwide, with global estimates finding that one in three women over the age of 15 have experienced intimate partner violence or non-partner sexual violence at least once during their lifetime (World Health Organization, 2021), and one in three men in the United States having experienced some form of sexual violence, intimate partner violence, or stalking within their lifetime (Smith et al., 2018). Furthermore, the actual prevalence of GBV may be higher considering that many people do not disclose their victimisation (World Health Organization, 2003) due to stigma, shame, and fear (Shaibakova, 2020). Moreover, of all people who experience GBV, fewer than 40% seek any form of legal or medical assistance (United Nations, 2015), and even fewer will have their case prosecuted (Home Office, 2021).
Given global underreporting of GBV, the #MeToo movement was founded initially to support women and girls of colour who experienced sexual violence (Me Too Movement, 2023) and to highlight how gender, race, and other inequalities intersect “to produce unique experiences of violence” (Imkaan, 2019, pp. 3). The #MeToo movement later became a channel for victim-survivors (hereafter, victims) of sexual violence to disclose incidents on social media. These social media disclosures are revealing not only the widespread prevalence and nature of GBV but are also ushering in a burgeoning of mobile phone and online applications for gathering information about GBV incidents, hereafter referred to as GBVxTech (World Bank Group, 2019). Victims, irrespective of gender, can use these applications to get help with accessing vital support services (e.g., medical and legal facilities) and to document incidents anonymously or confidentially, either in real-time or retrospectively. These digital data could potentially be admitted as evidence at trial in the United States (Miller, 2022), the United Kingdom (Hollie Guard, 2021), and Australia (Paterson, 2018).
Benefits of GBVxTech
According to research, sexual assault victims and their support providers want an alternative reporting system, such as mobile phone applications and online reporting platforms, in addition to formal criminal justice reporting methods (Heydon et al., 2023). There are many reasons for this. First, many applications and websites allow victims to report incidents in real-time and store their report (e.g., iWitnessed), which is crucial in situations where victims cannot report to the authorities. There may be no police station nearby for the victim to access support, such as in rural areas and in low- and middle-income countries (see Smith et al., 2019), or victims may not be able to escape their attacker and make a report, such as in domestic violence cases. Compared to requiring formal police interviews, giving victims the flexibility to report sexual assault through informal or anonymous channels can reduce barriers and increase overall reporting rates (Heydon et al., 2023). GBVxTech also stores reports for potential future use in criminal proceedings if victims choose to formally report later (Paterson, 2018).
Second, GBV victims frequently delay reporting incidents to law enforcement (Read and Connolly, 2007; Loney-Howes et al., 2022), which results in missed opportunities to promptly gather forensic evidence and victim accounts (i.e., memory evidence). Memory strength for the crime decreases with time (Ebbesen and Rienick, 1998; Gabbert et al., 2009, Stevens et al., 2022). With GBVxTech, victims can document a GBV incident soon after it occurs. Research has found that an early initial free recall attempt can maintain the accuracy and completeness of an individual’s account over time if victims and witnesses are interviewed following recommended practise (e.g., Penrod et al., 1982; Wixted and Ebbesen, 1997; Ebbesen and Rienick, 1998; Gabbert et al., 2009), including in sexual offence cases (Stevens et al., in prep.). Further still, immediate self-documentation can preserve memory accuracy over time (Gabbert et al., 2022; Stevens et al., 2022), and reduce susceptibility to misleading post-event information (Gabbert et al., 2012). This is particularly important in GBV cases because the victim’s account is often the primary, if not only, source of evidence (Kebbell et al., 2007). Actual or perceived gaps or inconsistencies in victim accounts can diminish prosecution odds, as officials may think gaps and inconsistencies signal that the victim lacks credibility (Freyd, 2004). Thus, timely documentation not only maintains accuracy (Ebbesen and Rienick, 1998; Gabbert et al., 2009) but also can serve to indirectly maintain the victim’s credibility (see Westera et al., 2011, 2013).
Third, some victims may prefer to use GBVxTech over contacting the police because the technology allows them to anonymously report the incidents to help law enforcement prevent future crimes. One example of an anonymous reporting app is SafeTTC (n.d.), where individuals can report incidents occurring in public spaces (e.g., public transport) to provide key information about local hotspots. JDoe (n.d.) and Callisto (n.d.) are also apps that allow anonymous reporting, and both use algorithms to monitor when multiple reports refer to the same perpetrator for purposes of identifying serial perpetrators.
Finally, GBVxTech may be used by those who wish to seek support services (Heydon et al., 2023) or who intend to seek legal redress through civil action rather than criminal prosecution. For example, some apps (e.g., JDoe and Callisto) provide victims with the opportunity to be contacted by a lawyer or legal advisor to discuss their options.
Minimum best practice principles and GBVxTech
The completeness and accuracy of victim accounts are largely dependent on adherence to minimum best practice principles for face-to-face interviews (e.g., Read et al., 2009; Brubacher et al., 2014). These principles were recently extended to self-administered written interviews that use open questions and free recall formats (Gabbert et al., 2009, 2022). These principles set a minimum standard for interviews, and include establishing rapport and trust, providing narrative practise, setting ground rules, using open questions, and allowing for the victim’s account to be appropriately documented (i.e., in the victim’s own words, or via their ‘independent voice’; Powell et al., 2005). It is also crucial that interviews adhere to principles that protect the victim’s human rights (Murad Code, 2022). Since the emergence of GBVxTech is recent, there has been little consideration of how these technologies might adopt these evidence-based principles. Below, we discuss the core principles of interviewing, and how they might be applied to GBVxTech.
Rapport building and trust
Rapport building is the process of establishing a relationship with another individual, and its use during an interview allows people to feel more at ease (Vallano and Schreiber Compo, 2015). Establishing rapport can make victims feel more comfortable to disclose information (Fisher and Geiselman, 1992). When an interviewer establishes rapport with a victim, it promotes a feeling of comfort, whereby a victim feels safe and relaxed to discuss their experiences (Patterson, 2011). Interviewers can foster this environment by ensuring the victim feels believed (Patterson, 2011), displaying empathy (Greeson et al., 2014; Kim et al., 2020), and by being personable with the victim (e.g., sharing a personal detail/story separate to the event to be discussed within the interview; Greeson et al., 2014). Rapport building has been found to increase the accuracy of the victim’s account (Kieckhaefer et al., 2014; Vallano et al., 2015), and increase the probability that victims who wish to make a formal complaint will carry through and complete the reporting process (Brooks and Burman, 2017).
Rapport building is essential in dyadic person-to-person interviews for sexual assault (Westera et al., 2016). Rapport is established through dynamic individual exchanges (see Abbe and Brandon, 2013; Gabbert et al., 2021, for reviews), whereas apps feature structured questioning and inflexible interaction. Undeniably, it is harder to implement rapport building techniques using technology compared to face-to-face contexts (Meijer et al., 2021). Non-verbal communication (eye contact, open body language etc.) and verbal communication (affirmative responses, comforting the victim during disclosure) are methods used in rapport building (Abbe and Brandon, 2013), and these cannot be simulated in GBVxTech applications. Trust, however, is one component within the definition of rapport (Neequaye and Giolla, 2022) that could be achieved in a non-dyadic context (Meijer et al., 2021). Examples include ensuring the technology clearly conveys the purpose of data collection, reassuring users with respect to data security, and obtaining informed consent regarding data storage and usage (Liu, 2018; Obada-Obieh et al., 2020). By establishing trust, users may feel more comfortable sharing information (Abbe and Brandon, 2013; Gabbert et al., 2021), which is a fundamental reason for establishing rapport.
Another critical component of helping victims to feel more comfortable with the interview experience is narrative practice. This allows the interviewee to practise recalling a neutral or positive episodic event before they provide information about the crime (Roberts et al., 2004; Lyon et al., 2014; Yi and Lamb, 2018). This is beneficial because it gives victims the opportunity to familiarise themselves with the style of questioning that will be used during the interview (Roberts et al., 2011), which in turn increases the number and accuracy of details disclosed during subsequent recalls (Sternberg et al., 1997; Price et al., 2013). Beyond increasing memory recall accuracy and completeness, narrative practise has also been found to help victims feel more comfortable during the interview by improving their understanding of the interview process (Brubacher et al., 2020). Narrative practise could be implemented within GBVxTech by asking victims to freely recall a positive or neutral event before beginning their report.
Ground rules
Ground rules are clear, simple instructions given to the victim that establish what to expect during the interview (Powell et al., 2005). These instructions enhance memory reporting during the interview and help to manage interviewee expectations (Fessinger et al., 2021). Key ground rules include encouraging the interviewee to say ‘I do not know’ when they do not know an answer to a question, and correcting the interviewer if the interviewer does not accurately understand what the interviewee has said (Ridley et al., 2012). In addition to managing expectations, encouraging ‘do not know’ responses increases the accuracy of memory reports (Scoboria and Fisico, 2013). Although most of the research about ground rules has focused on child interviewees, it is also useful with adults during investigative interviews (Ali et al., 2020) and in lineup tests (Weber and Perfect, 2012; Wells et al., 2020). These research studies illustrate the importance of ground rules; but it is unclear to what extent these rules have been applied in the context of GBVxTech.
We were particularly interested in whether the applications we found would allow users to indicate when they do not know an answer to a question, or instead either require users to provide information or allow them to leave questions blank. Requiring users to provide information that they do not explicitly remember is problematic should the case progress to investigation. Requiring responses can introduce inaccuracy, inconsistency, or uncertainty in accounts. Allowing ‘do not know’ or ‘do not remember’ options protects against false information whilst signalling when users truly lack memory for certain details.
Independent voice
During an interview, it is essential that the victim’s voice is heard and not influenced by other information. This can occur if the victim overhears information provided by other witnesses (Gabbert et al., 2003) or via information shared by the interviewer (Loftus and Palmer, 1974). It is also particularly useful for interviewers to encourage a free recall account via open-ended prompts at the beginning of the interview before asking specific questions to ensure that the victim’s initial account is given without any influence from the interviewer (Fisher and Geiselman, 1992; Powell, 2002; Ministry of Justice, 2022). Additionally, interviewers should not interrupt the victim whilst they provide their account, because this can discourage the victim from taking an active role in the interview or may break the rhythm of their recall, which could result in their not reporting details that they otherwise would have remembered and reported and/or damage their independent voice (Fisher and Geiselman, 1992). Further, accounts should be recorded verbatim, without bias or opinion from the interviewer (Powell, 2002), in the victim’s native language to reduce cognitive load and maximise accuracy (Raver et al., 2023), and in a format that is simple and accessible for the victim (e.g., typed/voice recorded, Gabbert et al., 2009). Despite evidence that this principle is crucial for obtaining an accurate report from victims, the extent to which independent voice is maintained in the context of GBVxTech remains to be seen.
Open questions
Open questions are essential during a police interview. Open questions are used to elicit unrestricted answers and allow the interviewee to give a free narrative account of events (Ministry of Justice, 2022). Due to the nature of open questions, they have a broad focus and do not dictate what information the interviewee should be reporting (Powell and Snow, 2007), which enables interviewees to respond freely. Open questions are beneficial because they result in more detailed and accurate responses than yes/no and forced-choice questions (Oxburgh et al., 2010; Westera et al., 2011). Furthermore, open questions reduce the risk of the interviewer influencing the victim’s response by imposing expectations or bias (i.e., avoiding leading questions, Milne and Bull, 2006). Recommended practice entails asking open questions that have the least possible influence on memory reporting, thereby enabling victims to provide an independent account (Milne and Bull, 1999; Heydon and Powell, 2018). Given the importance of open questions in obtaining detailed and accurate statements, we were interested in the extent to which GBVxTech utilises them. Whilst open questions are considered best practice, most interviewers use specific questions (Powell et al., 2005). Specific questions, including who/what/when/where questions, yes/no questions, and forced choice questions (Benson and Powell, 2015) encourage the interviewee to answer with a single word or detail, and this tends to limit the amount of information elicited from the interviewee (Lyon, 2014). Therefore, we also examined the use of specific questions in reviewing the applications.
Human rights principles
Our analysis was also inspired by fundamental human rights standards and principles regarding respect for the life, dignity, and privacy of interviewees, as outlined in the Murad Code (2022) and emphasised by Juan Mendez, the UN Special Rapporteur on Torture (Mendez and Areh, 2021). The Murad Code, named after Nobel Peace Prize winner Nadia Murad, outlines ethical standards for interviewing sexual violence victims, including obtaining informed consent, protecting their privacy and safety, and avoiding re-traumatisation. These human rights principles also extend to digital evidence gathering through GBVxTech, which is key in humanitarian crises where users face heightened vulnerability (Hankins, 2019). However, the principles also apply more broadly given the sensitive nature of sexual violence evidence, regardless of context.
Evaluation of GBVxTech
GBVxTech can be a vital tool for GBV protection, prevention, and response (Eisenhut et al., 2020). For example, a report from one mobile app, SafeTTC, aided in the arrest of an individual who was already wanted as a suspect for a separate assault (Spurr, 2017). Furthermore, globally, 83% of individuals own a smartphone (Statista, 2022), making smartphone-based technologies that record and report cases of GBV accessible and available to many members of the public, especially in the Global North. As such, GBVxTech is potentially a powerful tool to address the underreporting of GBV and strengthen the evidence base necessary for successful prosecutions. Whilst GBVxTech holds promise, its use requires diligence as improper use risks harm. Our study critically evaluates GBV reporting apps intended to aid victims in alerting authorities. Though well-intentioned, these tools require appraisal to realise potential benefits.
In the only research of its kind to date, Eisenhut et al. (2020) systematically reviewed mobile health intervention apps that address violence against women. The authors classified apps into five categories: emergency (e.g., send emergency alerts to selected contacts), avoidance (e.g., avoid potential incidents), education (e.g., increase knowledge), reporting and evidence building (e.g., report an incident during or after it occurs), and supporting (e.g., used to provide support for victims). The authors found that just under half of the apps (47%) had the primary function of offering immediate help in emergencies, such as alerting emergency contacts or the nearest police station before, during, or soon after an incident. Furthermore, only 14% of apps were categorised as reporting and evidence building apps, although the prevalence of these apps was found to be increasing over time. The review also revealed that there is a growing number of education and supporting apps, which suggests that there may be a shift towards building apps that support individuals after the incident rather than during an emergency.
We extend the research conducted by Eisenhut et al. (2020) by analysing the extent to which applications in the ‘reporting and evidence building’ category both employ best practice principles for eliciting accurate and reliable information from victims and take steps to protect the victims who use them from further harm. We focus on this category because this type of GBVxTech was developed for the express purpose of recording information about the crime to share with law enforcement should the victim decide to report the crime(s) to the authorities. Altogether, given the ethical, legal, and social ramifications of GBVxTech, there is a need to better understand (1) how these applications elicit GBV accounts from users, and (2) the steps being taken by GBVxTech developers to protect users and their data.
The current study
The core best practice principles discussed above are vital in gathering accurate and detailed accounts in face-to-face and written interviews. However, GBVxTech only recently emerged and therefore little is known about whether best practice principles are being adapted and implemented in this technology. We address this gap by critically analysing GBVxTech reporting apps that are currently in use and offering recommendations for how face-to-face interview principles may be adapted within a virtual context.
Our research has two objectives. Firstly, to evaluate the extent to which the best practice principles have been implemented in GBVxTech, and secondly, to draw on our findings to stimulate research and policy development so that the potential benefits of GBVxTech can be better realised.
Methods
GBVxTech identification
Identification plan
This review followed the PRISMA framework (Page et al., 2021) when searching for GBVxTech and selecting our final sample. To identify all relevant GBVxTech platforms, keyword searches were conducted on Google Scholar, Google, Twitter, Play Store (Android), and App Store (iOS) for the following search strings: ‘gender-based violence + reporting and evidence-based app*’ (to capture all denominations of ‘app’, ‘apps’, ‘application’, and ‘applications’); ‘gender-based violence + reporting app*’ and ‘gender-based violence + reporting tech*’ (to capture all denominations of ‘technology’). Additionally, ‘gender-based violence’ was replaced with ‘sexual violence’, ‘sexual assault’, and ‘domestic violence’. To ensure we located all possible GBVxTech platforms for inclusion within our review, we also completed a reference and citation search on the paper of Eisenhut et al. (2020) and held discussions with academic and practitioner colleagues (see Figure 1).
Selection criteria
The GBVxTech platforms included in this study were those that document reports of GBV specifically. The GBVxTech accessed were filtered based on our exclusion criteria, with any GBVxTech that met one or more of our exclusion criteria being removed from the final review. Our exclusion criteria included: (i) if the GBVxTech only signposted victims to support services, crowdsourced crime information, or provided educational content but did not allow them to document a specific incident as this would not preserve their memory evidence for use in criminal justice proceedings; (ii) if researchers were unable to access the GBVxTech using a United Kingdom smartphone or laptop, a VPN, or via discussions with the creators, as we were unable to review the GBVxTech in its entirety; and (iii) if GBVxTech was not accessible to all service users (e.g., only accessible to young people aged 10–24).
Data extraction
The evaluation checklist for face-to-face interviews used by Benson and Powell (2015) was adapted to make it relevant to GBVxTech. Alongside the original criteria, another evaluation criterion exclusively related to technology (‘GBVxTech characteristics’) was added based on recommendations from Martínez-Pérez et al. (2015). The adaptations were discussed and finalised by the research team to produce the modified checklist that was used for data extraction (see Table 1 for the modified evaluation criteria checklist). Data extraction was completed by conducting a mock report within each application.
Measures
The modified GBVxTech evaluation checklist adapted from Benson and Powell (2015) consisted of four themes: questioning strategies, adherence to the interview protocol, investigative questions, and GBVxTech characteristics (Martínez-Pérez et al., 2015). Each of the criteria on the evaluation checklist was either coded as ‘present’ (if there was at least one instance of the criterion) or ‘absent’ (if no element of the criterion was seen) within each evaluated GBVxTech platform.
Reliability
Two researchers independently assessed all potential GBVxTech search results against the inclusion and exclusion criteria for final selection within the review. Any discrepancies were discussed with the senior author for final selection.
The same two researchers extracted information from the GBVxTech using the above evaluation criteria. Additionally, two blind coders evaluated around 60% of the GBVxTech for purposes of inter-rater reliability (n = 8). Overall, there were moderate to perfect levels of agreement (< 60% Kappa) on all evaluation criteria and discrepancies were discussed to yield the results presented below.
Results
Table 2 provides a descriptive overview of each of the 13 GBVxTech platforms reviewed.
Table 3 illustrates how the 13 GBVxTech platforms performed on each of the criteria within the modified evaluation checklist. The results are discussed below, and implications for these results are explored in the discussion.
Questioning strategies
Regarding question types, 92% of the GBVxTech platforms reviewed used open questions at least once, 69% used specific questions at least once, and 0% asked leading questions. Furthermore, specific questions were the most used question type, and only 23% of technologies opened with an open-ended invitation such as, ‘[Tell me] What happened?’ instead of a specific question. We also found that whilst most of the GBVxTech used open questions at least once, only 38% of GBVxTech used solely free recall responding methods, e.g., using a textbox to enter the crime report. Additionally 62% of all GBVxTech incorporated closed responding methods, such as drop-down menus and multiple-choice questions.
Adherence to interview protocol
Regarding trust, only 23% of GBVxTech asked users for informed consent, 52% provided an introduction to the app/website, 85% discussed the purpose and aims of the technology, and 0% provided an option for narrative practice. Additionally, whilst only 15% of the GBVxTech reported specific ground rules instructions (e.g., to state ‘I do not know’), 92% allowed victims to view the final report before submitting to clarify any misunderstandings within the report.
We also investigated whether the GBVxTech encouraged an independent voice and found that only 38% offered more than one language option, and that 62% allowed users to report using a voice note or video/photo feature. Furthermore, only one of the applications (Kharita: Harass Map) allowed victims to view other victims’ reports. We also found that only 46% of GBVxTech offered a debrief (e.g., signposting to psychological support or advice).
Investigative questions
Since GBVxTech data could be used in legal proceedings, we assessed which details were collected by the platforms. We found that 38% asked for the identity of the offender, 77% asked for the approximate time of the offence and the location of the incident (either pinpoint on a map or write the location), and 69% asked for the specific offence type such as sexual assault or rape. Additionally, 23% of GBVxTech platforms asked about the presence of possible witnesses, and 85% enquired about potential physical evidence (e.g., forensic evidence, weapons, photos/documents/videos of injuries) to provide corroborating evidence.
GBVxTech characteristics
All GBVxTech briefly discussed how the data will be used within their terms and conditions, but only 77% clearly explained where data will be stored and for what purposes it can be accessed (e.g., whether the data can be forwarded to police, whether data are solely saved on the GBVxTech app or institutional server, etc.).
We also wanted to investigate the security options available within the apps and websites and found that 54% of our reviewed GBVxTech utilised a security feature, such as a password, a quick escape button from the application if someone approaches, or a disguise function that makes the app appear to be another type of app (e.g., a weather app).
Discussion
In this paper, we investigated the extent to which GBVxTech apps and websites adhere to best practice interviewing principles. Applying these principles can improve the accuracy of victim reports and ensure the methods and evidence are legally reliable should the victim decide to involve authorities. Further, we wanted to better understand how GBVxTech ensures the protection of users and their data.
Our review found that GBV apps partially follow best practices; some features align with key principles, but there is room for improvement. We will highlight well-implemented features, identify lacking areas, and recommend enhancements.
Adherence to best practice
The GBVxTech included in our review adhered to several minimum standards of best practice for interviewing victims about GBV incidents. For example, most of the applications used open questions, which helps to ensure that the victim’s account is captured in their own words and not influenced by suggestive interview questions (Elmir et al., 2011). Furthermore, none of the applications included in our review used leading questions. Leading questions can decrease a victim’s credibility as they can elicit self-contradictions within the victim’s testimony (Andrews and Lamb, 2016). By avoiding leading questions, GBVxTech can gather accounts that make for stronger legal evidence.
We also found that 12 out of 13 of the applications allowed victims to view their final report before submitting. On one hand, this could be viewed as a positive aspect of GBVxTech, since it allows victims to amend any mistakes or misinterpretations before submitting. On the other hand, by editing the final report before submitting, it may be argued that the evidence has been contaminated since the report is technically no longer a first account, and this could have repercussions in later legal proceedings. Only one application (Kharita: Harass Map), allowed victims to view other victims’ reports. Whilst no GBVxTech should have this feature, it is reassuring that so few applications enable reading others’ reports. Allowing victims access to others’ accounts is unethical, poses psychological and safety risks, and can potentially compromise the quality and utility of the victim’s own report. Seeing other accounts could invalidate the victim’s own experiences and dissuade them from reporting if they believe other incidents seem ‘worse’ than theirs. Victims’ memories also risk contamination if they incorporate details from others’ reports into their own (see Gabbert et al., 2003). Moreover, making reports public, even anonymised, endangers victims by enabling identification through case details. The lack of this feature across the applications we reviewed is positive, but technology creators must remain vigilant against its inclusion given the potential harms.
To address language and writing proficiency differences across users, we hoped that GBVxTech would incorporate a voice note or video feature to allow victims to report in their own words. We found that around 60% included this feature. This is crucial as it allows victims to disclose using their preferred method (text, voice note, video). In addition to addressing language barriers, voice note and recording facilities may increase user satisfaction and thereby people’s willingness to engage with the application and disclose information. User feedback on the Self-Administered Interview indicated many people prefer typing or recording answers over using paper and pen, because it is easier, more practical, and offers users greater flexibility (Gabbert et al., 2009).
The GBVxTech platforms we reviewed also effectively applied the principle of investigative questioning. Most of the applications asked investigative questions such as the identity of the offender, the time/location of the offence, offence type, potential physical evidence, etc. Since reports collected via GBVxTech may be used in later legal proceedings, it is crucial that these applications do not miss opportunities to collect investigation-relevant information. Whilst the inclusion of investigative questions in GBVxTech is positive, it is important to note that most applications used forced-choice closed response formats for these questions. Closed-ended questions can limit the level of detail obtained (Oxburgh et al., 2010) and constrain the user’s independent voice. Employing more open-ended response formats could elicit richer details from users in their own words.
All the GBVxTech platforms we reviewed explain in their terms how user data will be used. Furthermore, 77% clearly explain where user data are stored, such as whether the data are stored locally on the application. Ideally, all GBVxTech should explicitly detail data storage and access. This enables informed consent, as victims are able to actively understand how their data are being used (Heydon et al., 2023) regardless of the data protection rules in a given jurisdiction.
Limitations of current GBVxTech
Whilst not all minimum standards of best practice in face-to-face interviewing are feasible within a digital format (e.g., verbal communication tactics to build rapport), some principles that would be simple to adapt are often missing (e.g., open questions, narrative practice, and ground rules).
Firstly, we found that only 23% of GBVxTech prompted the user for information starting with an open-ended invitation such as, ‘[Tell me] What happened?’ This low figure is concerning because according to face-to-face interview guidelines, a free recall account should always be obtained before asking specific questions (e.g., Achieving Best Evidence guidelines in the United Kingdom, Ministry of Justice, 2022). This is encouraged because it allows victims to give a complete, uninterrupted account in their own words (Powell, 2002; Brewer and Williams, 2017). Furthermore, more than half of all GBVxTech used closed responding methods, such as drop-down menus and multiple-choice questions. This response style raises numerous issues; firstly, these forced-choice methods limit the response options available, and therefore may not list the victim’s desired response option. As a result, victims may be forced to select an option that does not accurately capture their independent voice and experiences, or they may choose not to continue reporting if they feel their experience ‘does not count’ within the options provided. Secondly, since the victim’s account is limited to preselected response options, they cannot describe their experience in their own words. Forced-choice formats decrease the level of detail in reports, potentially reducing evidence quality for investigators. An open response format would also let victims rehearse details about the incident in their own words, strengthening their memory and any subsequent accounts they provide to legal officials.
We found that none of the GBVxTech employed narrative practice. Sternberg et al. (1997) found that children who practised providing a detailed account of a positive or neutral non-abusive episodic memory in the introductory phase of the interview gave more detailed narratives in the later recall phase, demonstrating the importance of practising a separate episodic recall prior to being interviewed about the event. Thus, GBVxTech can increase victim comfort and the level of detail provided by employing narrative practice. Our results also showed that most of the GBVxTech did not include ground rules instructions. This is problematic because, as mentioned previously, ground rules are useful for both adults and children during investigative interviewing to obtain both detailed and accurate accounts (Lyon, 2014; Ali et al., 2020). Future GBVxTech should consider prioritising the introductory phase of the application before a victim begins their report. During the pre-interview phase, trust in the application could be built and expectations set through ground rules and narrative practice, which will promote more detailed and accurate responses.
Another issue we found is that most applications allow users to report in only one language. The limited language options could be damaging to the victim’s independent voice. They should be able to report in their first language to capture the most accurate account (Raver et al., 2023). Moreover, if a victim is forced to report using a language in which they are not proficient, it could impact the accuracy of the report via errors in translation (Evans et al., 2019) or it could deter a victim from using the application.
Our analysis found gaps in adherence to human rights principles amongst the reviewed GBV technologies. Less than 25% requested informed consent from users, contrary to ethical investigative standards (Murad Code, 2022). Additionally, only 46% offered post-reporting support, advice, or referral to services. This lack of victim debriefing conflicts with knowledge that GBV elevates risks for mental health consequences like PTSD, depression (Tjaden and Thoennes, 2006; Campbell et al., 2009) and substance abuse (Kilpatrick et al., 1997). Best practices dictate that GBV reporting platforms should connect users with information and access to support given the empirical links between victimisation and psychological distress.
Finally, only around half of the GBVxTech we reviewed incorporated at least one security feature. This raises major ethical and safety concerns, particularly in cases where victims are reporting intimate partner violence when a partner could easily access their mobile phone or computer and retaliate (Freed et al., 2018). Therefore, security options (e.g., passwords or ‘quick escapes’) should be implemented in every app or website created for the purpose of documenting GBV incidents.
Recommendations
Whilst the GBVxTech we reviewed utilise some of the best practice interview principles which have been scientifically developed and tested for interviews in criminal justice contexts, we found that many of the technologies diverge from recommended minimum best practise standards for obtaining accurate and complete accounts. Digital evidence, like text messages and video recordings, have been permitted in GBV prosecutions, establishing precedent for admitting documentation from technology platforms (Hlavka and Mulla, 2018; Glasbeek, 2021). However, our findings reveal gaps in incorporating research-based memory retrieval strategies and ethical issues. Given the investigative and legal potential of these tools, further research should examine how to optimise memory recollection, ensure data protection, prioritise user wellbeing, and better align the applications to human rights-based principles. With careful design, GBVxTech could play a significant role in empowering victims whilst advancing just legal outcomes. However, additional interdisciplinary work is needed to actualise that potential responsibly and ethically.
GBVxTech should obtain informed consent, notifying users how data will be utilised, whether and how data can be withdrawn, and outlining plans if the application is discontinued (Martínez-Pérez et al., 2015; Heydon et al., 2023). Our analysis found that around half of the applications we identified were no longer accessible, raising questions about what happened to users’ data following discontinuation. Data loss risks accountability and can compromise the investigation of incidents and prevention of future crimes. As application technology evolves rapidly, many apps become defunct due to lack of funding for updates. Developers should carefully consider long-term sustainability and have transparent data protocols in case of discontinuation. Releasing applications without data retention plans risks doing more harm than good if evidence is lost when platforms cease operation.
The potential discoverability of victim disclosures on GBVxTech raises important considerations for users and designers. First, users should be advised that the information they report could be utilised as evidence in legal proceedings. Providing users with this knowledge is an essential part of the informed consent process. Second, developers must recognise that design features, like forced-choice questions, can potentially introduce memory errors and inconsistencies, which may damage victim credibility. It is critical that applications gather accounts in victims’ own words through open questions and response formats. Forced-choice options risk introducing inconsistencies that could undermine victim credibility later if the victim has to clarify answers they gave to forced choice questions. Since GBV victim testimony already faces heavy scrutiny and credibility challenges (Kelly et al., 2005), preserving free narrative is imperative.
If accounts gathered via GBVxTech are entered into legal proceedings, data authenticity and chain of custody (i.e., documentation of the sequence of handling, transfer, and storage digital evidence) will become important issues. Criminal proceedings may involve examining application metadata or obtaining sworn statements on application use. If applications allow revising responses, originals should not be overwritten, but rather preserved alongside the revised information with timestamps. Digital evidence risks manipulation, and therefore steps must be taken to better ensure data authenticity. Asking the victim the reason why they made revisions may be beneficial, as changes may otherwise imply memory unreliability at trial (Liu, 2018).
Finally, GBVxTech has immense potential to serve victims globally, but only if it is purposefully designed for accessibility across needs, resources, and contexts. The applications we reviewed would benefit from incorporating accessibility features for users with visual or cognitive impairments, such as text-to-speech and interface customisation options. Apps should partner with disabled persons organisations to incorporate accessibility best practises both in design and safeguarding features. GBVxTech should also function online, across different data bandwidths (WiFi/5G/4G/3G), across operating systems (Android, iOS, etc.), as well as offline to allow for timely documentation. Enabling offline access allows all victims to record accounts as soon as possible, benefiting evidentiary quality. Further, accessible design and clear language are crucial for GBVxTech, which likely attracts diverse users. GBVxTech should avoid legal jargon and use plain language to ensure accessibility for users with varying knowledge of GBV, the law, and reporting procedures, all of which can vary depending on jurisdiction. Our suggestion to use plain language aligns with recommended best practices for face-to-face investigative interviews (Dando and Milne, 2009; Farrugia et al., 2019). Onboard dictionaries or definitions can further aid understanding, particularly for crime classification questions, as many individuals lack awareness of distinctions between crimes like sexual assault versus sexual harassment. However, only five of the applications we reviewed offered built-in definitions. Developing a more inclusive GBVxTech platform has immense potential to broaden access to justice globally, especially if designed intentionally for clarity and transparency through built-in support features and avoidance of context-specific terminology.
Conclusion
The #MeToo movement that ushered in an era of online disclosure revealed the widespread prevalence of sexual violence as well as the many barriers to formal reporting. As we move forward, ethically designed GBVxTech platforms can provide a safe digital space for victims to document experiences if formal channels remain inaccessible or undesirable. However, to serve both victims and justice, evidence-based practices must be implemented to maintain the accuracy of the victim’s account for purposes of crime prevention and, should the victim elect to make a formal complaint, legal proceedings. By working across sectors with victims, law enforcement, service providers, and researchers, GBVxTech developers can fulfil the diverse needs illuminated by #MeToo, creating empowering technologies that ethically gather victimisation experiences whilst advancing systemic reforms.
Data availability statement
The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.
Author contributions
LS: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Supervision, Writing – original draft, Writing – review & editing. TB: Data curation, Formal analysis, Methodology, Project administration, Visualization, Writing – review & editing. JC: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Writing – original draft. SR: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Writing – original draft. HF: Conceptualization, Data curation, Formal analysis, Investigation, Methodology, Supervision, Writing – original draft, Writing – review & editing.
Funding
The author(s) declare financial support was received for the research, authorship, and/or publication of this article. This work was funded by University of Birmingham to cover open access publication fee and by the AHRC AH/T008091/1 award to HF.
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher’s note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
Abbe, A., and Brandon, S. E. (2013). The role of rapport in investigative interviewing: a review. J. Investig. Psychol. Offender Profiling 10, 237–249. doi: 10.1002/jip.1386
Ali, M. M., Brubacher, S. P., Earhart, B., Powell, M. B., and Westera, N. J. (2020). The utility of ground rule instructions with younger and older adult witnesses. Appl. Cogn. Psychol. 34, 664–677. doi: 10.1002/acp.3648
Andrews, S. J., and Lamb, M. E. (2016). How do lawyers examine and cross‐examine children in Scotland? Appl. Cog. Psychol. 30, 953–971. doi: 10.1002/acp.3286
Benson, M. S., and Powell, M. B. (2015). Evaluation of a comprehensive interactive training system for investigative interviewers of children. Psychol. Public Policy Law 21, 309–322. doi: 10.1037/law0000052
Brewer, N., and Williams, K. D. (Eds.) (2017). Psychology and Law: An Empirical Perspective. New York, NY: Guilford Publications.
Brooks, O., and Burman, M. (2017). Reporting rape: victim perspectives on advocacy support in the criminal justice process. Criminol. Crim. Just. 17, 209–225. doi: 10.1177/1748895816667996
Brubacher, S. P., Powell, M. B., and Roberts, K. P. (2014). Recommendations for interviewing children about repeated experiences. Psychol. Public Policy Law 20, 325–335. doi: 10.1037/law0000011
Brubacher, S. P., Sharman, S. J., Westera, N. J., Zekiroski, H., Danby, M. C., and Powell, M. B. (2020). Narrative practice may foster comfort but not enhance cognition in adult witness interviews about a mock sexual assault. J. Forensic Psychiatry Psychol. 31, 814–821. doi: 10.1080/14789949.2020.1799056
Callisto (n.d.). Callisto Vault. Available at: https://www.projectcallisto.org/documentmatch
Campbell, R., Dworkin, E., and Cabral, G. (2009). An ecological model of the impact of sexual assault on women's mental health. Trauma Violence Abuse 10, 225–246. doi: 10.1177/1524838009334456
Dando, C. J., and Milne, R. (2009). “The cognitive interview” in Applied Criminal Psychology: A Guide to Forensic Behavioral Science. eds. R. N. Kocsis and C. C. Thomas Springfield, Illinois. 147–168.
Ebbesen, E. B., and Rienick, C. B. (1998). Retention interval and eyewitness memory for events and personal identifying attributes. J. Appl. Psychol. 83, 745–762. doi: 10.1037/0021-9010.83.5.745
Eisenhut, K., Sauerborn, E., García-Moreno, C., and Wild, V. (2020). Mobile applications addressing violence against women: a systematic review. BMJ. Glob. Health 5:e001954. doi: 10.1136/bmjgh-2019-001954
Elmir, R., Schmied, V., Jackson, D., and Wilkes, L. (2011). Interviewing people about potentially sensitive topics. Nurs. Res. 19, 12–16. doi: 10.7748/nr2011.10.19.1.12.c8766
Evans, J., Shaffer, S., and Walsh, D. (2019). “Interpreters in investigative interviewing contexts” in Routledge International Handbook of Legal and Investigative Psychology. eds. R. Bull and I. Blandon-Gitlin (London: Routledge), 133–148.
Farrugia, L., Oxburgh, G., and Gabbert, F. (2019). Effective evaluation of forensic interviews: the forensic interview trace (FIT). Investig. Interview. Res. Pract. 10, 20–31.
Fessinger, M. B., McWilliams, K., Bakth, F. N., and Lyon, T. D. (2021). Setting the ground rules: use and practice of ground rules in child forensic interviews. Child Maltreat. 26, 126–132. doi: 10.1177/1077559520910783
Fisher, R. P., and Geiselman, R. E. (1992). Memory Enhancing Techniques for Investigative Interviewing: The Cognitive Interview. Springfield, Illinois: Charles C Thomas Publisher.
Freed, D., Palmer, J., Minchala, D., Levy, K., Ristenpart, T., and Dell, N. (2018). “A Stalker's paradise”: how intimate partner abusers exploit technology” in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. pp. 1–13.
Freyd, J. J. (2004). Memory for abuse: what can we learn from a prosecution sample? J. Child Sex. Abus. 12, 97–103. doi: 10.1300/J070v12n02_05
Gabbert, F., Hope, L., and Fisher, R. P. (2009). Protecting eyewitness evidence: examining the efficacy of a self-administered interview tool. Law Hum. Behav. 33, 298–307. doi: 10.1007/s10979-008-9146-8
Gabbert, F., Hope, L., Fisher, R. P., and Jamieson, K. (2012). Protecting against misleading post-event information with a self-administered interview. Appl. Cogn. Psychol. 26, 568–575. doi: 10.1002/acp.2828
Gabbert, F., Hope, L., Horry, R., Drain, T., and Hughes, C. (2022). Examining the efficacy of a digital version of the self-administered interview. Comput Hum Behav Rep 5:100159. doi: 10.1016/j.chbr.2021.100159
Gabbert, F., Hope, L., Luther, K., Wright, G., Ng, M., and Oxburgh, G. (2021). Exploring the use of rapport in professional information-gathering contexts by systematically mapping the evidence base. Appl. Cogn. Psychol. 35, 329–341. doi: 10.1002/acp.3762
Gabbert, F., Memon, A., and Allan, K. (2003). Memory conformity: can eyewitnesses influence each other's memories for an event? Appl. Cogn. Psychol. Off. J. Soc. Appl. Res. Mem. Cogn. 17, 533–543. doi: 10.1002/acp.885
Glasbeek, A. (2021). He said, she said, we watched: video evidence in sexual assault trials in The Palgrave Handbook of Gendered Violence and Technology. (eds.) Powell, A., Flynn, A., and Sugiura, L. (Cham: Palgrave Macmillan)
Greeson, M. R., Campbell, R., and Fehler-Cabral, G. (2014). Cold or caring? Adolescent sexual assault victims’ perceptions of their interactions with the police. Violence Vict. 29, 636–651. doi: 10.1891/0886-6708.VV-D-13-00039
Hankins, M. (2019). Report Digital Dignity in armed conflict: a roadmap for, Wilton Park. United Kingdom. Available at: https://policycommons.net/artifacts/1789971/report-digital-dignity-in-armed-conflict/2521615/ (Accessed December 1, 2023).
Heydon, G., Henry, N., Loney-Howes, R., and Hindes, S. (2023). Alternative reporting options for sexual assault: Perspectives of victim-survivors. Trends & Issues in Crime & Criminal Justice, (678). Canberra: Australian Institute of Criminology. doi: 10.52922/ti77123
Heydon, G., and Powell, A. (2018). Written-response interview protocols: an innovative approach to confidential reporting in victim interviewing in sexual assault investigations. Polic. Soc. 28, 631–646. doi: 10.1080/10439463.2016.1187146
Hlavka, H. R., and Mulla, S. (2018). “That's how she talks”: animating text message evidence in the sexual assault trial. Law Soc. Rev. 52, 401–435. doi: 10.1111/lasr.12340
Hollie Guard (2021). UK police—Hollie guard extra. Available at: https://hollieguard.co.uk/wp-content/uploads/2021/02/JA_ZEC_0554_HG_Police_V8.pdf
Home Office (2021). Crime outcomes in England and Wales 2020 to 2021. Available at: https://www.gov.uk/government/statistics/crime-outcomes-in-england-and-wales-2020-to-2021
Imkaan (2019). The value of intersectionality in understanding violence against women and girls (VAWG) July 2019. Available at: https://eca.unwomen.org/sites/default/files/Field%20Office%20ECA/Attachments/Publications/2019/10/The%20value%20of%20intersectionality%20in%20understanding%20violence%20against%20women%20and%20girls.pdf
JDoe (n.d.). Features. Available at: https://jdoe.io/html/features.html
Kebbell, M. R., O’Kelly, C. M. E., and Gilchrist, E. L. (2007). Rape victims' experiences of giving evidence in English courts: a survey. Psychiatry Psychol. Law 14, 111–119. doi: 10.1375/pplt.14.1.111
Kelly, L., Lovett, J., and Regan, L. (2005). A gap or a chasm? Attrition in reported rape cases. Home Office Research Study, 293.
Kieckhaefer, J. M., Vallano, J. P., and Schreiber Compo, N. (2014). Examining the positive effects of rapport building: when and why does rapport building benefit adult eyewitness memory? Memory 22, 1010–1023. doi: 10.1080/09658211.2013.864313
Kilpatrick, D. G., Acierno, R., Resnick, H. S., Saunders, B. E., and Best, C. L. (1997). A 2-year longitudinal analysis of the relationships between violent assault and substance use in women. J. Consult. Clin. Psychol. 65, 834–847. doi: 10.1037/0022-006X.65.5.834
Kim, S., Alison, L., and Christiansen, P. (2020). Observing rapport-based interpersonal techniques to gather information from victims. Psychol. Public Policy Law 26, 166–175. doi: 10.1037/law0000222
Liu, H. (2018). When whispers enter the cloud: evaluating technology to prevent and report sexual assault. Harv. J. Law Technol. 31, 939–963.
Loftus, E. F., and Palmer, J. C. (1974). Reconstruction of automobile destruction: an example of the interaction between language and memory. J. Verbal Learn. Verbal Behav. 13, 585–589. doi: 10.1016/S0022-5371(74)80011-3
Loney-Howes, R., Heydon, G., and O’Neill, T. (2022). Connecting survivors to therapeutic support and criminal justice through informal reporting options: an analysis of sexual violence reports made to a digital reporting tool in Australia. Curr. Issues Crim. Just. 34, 20–37. doi: 10.1080/10345329.2021.2004983
Lyon, T. D. (2014). Interviewing children. Annu. Rev. Law Soc. Sci. 10, 73–89. doi: 10.1146/annurev-lawsocsci-110413-030913
Lyon, T. D., Wandrey, L., Ahern, E., Licht, R., Sim, M. P. Y., and Quas, J. A. (2014). Eliciting maltreated and nonmaltreated children’s transgression disclosures: narrative practice rapport building and a putative confession. Child Dev. 85, 1756–1769. doi: 10.1111/cdev.12223
Martínez-Pérez, B., De La Torre-Díez, I., and López-Coronado, M. (2015). Privacy and security in mobile health apps: a review and recommendations. J. Med. Syst. 39, 1–8. doi: 10.1007/s10916-014-0181-3
Me Too Movement (2023). Tarana Burke—Founder. Available at: https://metoomvmt.org/get-to-know-us/tarana-burke-founder/
Meijer, E., Hoogesteyn, K., Verigin, B., and Finnick, D. (2021). Rapport building: online vs in-person interviews. Centre for Research and Evidence on Security Threats. Available at: https://crestresearch.ac.uk/resources/rapport-building-online-vs-in-person-interviews/
Mendez, J. E., and Areh, I. (2021). Principles on effective interviewing for investigations and information gathering. Anti-Torture Initiative, the Association for the Prevention of Torture, and the Norwegian Centre for Human Rights. Available at: www.interviewingprinciples.com (Accessed March 11, 2023).
Miller, C. M. (2022). A survey of prosecutors and investigators using digital evidence: a starting point. Forens. Sci. Int. Synergy 6:100296. doi: 10.1016/j.fsisyn.2022.100296
Milne, R., and Bull, R. (1999). Investigative Interviewing: Psychology and Practice. Chichester, UK: John Wiley & Sons.
Milne, B., and Bull, R. (2006). “Interviewing victims of crime, including children and people with intellectual disabilities” in Practical Psychology for Forensic Investigations. eds. M. R. Kebbell and G. M. Davies (Chichester, UK: Wiley)
Ministry of Justice (2022). Achieving Best evidence in criminal proceedings: Guidance on interviewing victims and witnesses, and guidance on using special measures. Available at: https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1051269/achievingbestevidencecriminalproceedings.pdf
Murad Code (2022). Murad Code. Available at: https://www.muradcode.com/murad-code
Neequaye, D. A., and Giolla, E. M. (2022). The use of the term rapport in the investigative interviewing literature: a critical examination of definitions. Meta-Psychol. 6, 1–15. doi: 10.15626/MP.2021.2808
Obada-Obieh, B., Spagnolo, L., and Beznosov, K. (2020). “Towards understanding privacy and trust in online reporting of sexual assault” in Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 145–164. Available at: https://www.usenix.org/conference/soups2020/presentation/obada-obieh
Oxburgh, G. E., Myklebust, T., and Grant, T. (2010). The question of question types in police interviews: a review of the literature from a psychological and linguistic perspective. Int. J. Speech Lang. Law 17, 45–66. doi: 10.1558/ijsll.v17i1.45
Page, M. J., McKenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., Mulrow, C. D., et al. (2021). The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. BMJ 372:n71. doi: 10.1136/bmj.n71
Paterson, H. (2018). Why we made iWitnessed, an app to collect evidence. The Conversation. Available at: https://theconversation.com/why-we-made-iwitnessed-an-app-to-collect-evidence-94107
Patterson, D. (2011). The impact of detectives’ manner of questioning on rape victims’ disclosure. Violence Against Women 17, 1349–1373. doi: 10.1177/1077801211434725
Penrod, S. D., Loftus, E. F., and Winkler, J. (1982). “The reliability of eyewitness testimony: a psychological perspective” in The Psychology of the Courtroom. eds. N. L. Kerr and R. M. Bray (New York: Academic Press), 119–168.
Powell, M. B. (2002). Specialist training in investigative and evidential interviewing: is it having any effect on the behaviour of professionals in the field? Psychiatry Psychol. Law 9, 44–55. doi: 10.1375/pplt.2002.9.1.44
Powell, M. B., Fisher, R. P., and Wright, R. (2005). “Investigative interviewing” in Psychology and Law: An Empirical Perspective. eds. N. Brewer and K. D. Williams (New York: The Guilford Press), 11–42.
Powell, M. B., and Snow, P. C. (2007). Guide to questioning children during the free-narrative phase of an investigative interview. Aust. Psychol. 42, 57–65. doi: 10.1080/00050060600976032
Price, H. L., Roberts, K. P., and Collins, A. (2013). The quality of children’s allegations of abuse in investigative interviews containing practice narratives. J. Appl. Res. Mem. Cogn. 2, 1–6. doi: 10.1016/j.jarmac.2012.03.001
Raver, A., Lindholm, T., Gustafsson, P. U., and Alm, C. (2023). Memory accuracy, suggestibility and credibility in investigative interviews with native and non-native eyewitnesses. Front. Psychol. 14:1240822. doi: 10.3389/fpsyg.2023.1240822
Read, J. D., and Connolly, D. A. (2007). “The effects of delay on long-term memory for witnessed events” in Handbook of Witness Psychology: Volume I: Memory for Events. eds. M. P. Toglia, J. D. Read, D. F. Ross, and R. C. L. Lindsay (Mahway, NJ: Erlbaum Associates Inc), 117–155.
Read, J. M., Powell, M. B., Kebbell, M. R., and Milne, R. (2009). Investigative interviewing of suspected sex offenders: a review of what constitutes best practice. Int. J. Police Sci. Manag. 11, 442–459. doi: 10.1350/ijps.2009.11.4.143
Ridley, A. M., Gabbert, F., and La Rooy, D. J. (2012). Suggestibility in Legal Contexts: Psychological Research and Forensic Implications. Chichester: Wiley.
Roberts, K. P., Brubacher, S. P., Powell, M. B., and Price, H. L. (2011). “Practice narratives” in Children’s Testimony: A Handbook of Psychological Research and Forensic Practice. eds. M. E. Lamb, D. J. LaRooy, L. C. Malloy, and C. Katz. 2nd ed (Chichester: Wiley), 129–145.
Roberts, K. P., Lamb, M. E., and Sternberg, K. J. (2004). The effects of rapport-building style on children's reports of a staged event. Appl. Cogn. Psychol. 18, 189–202. doi: 10.1002/acp.957
SafeTTC (n.d.). Safe TTC app. Available at: https://www.ttc.ca/riding-the-ttc/safety-and-security/safe-ttc-app
Scoboria, A., and Fisico, S. (2013). Encouraging and clarifying “don’t know” responses enhances interview quality. J. Exp. Psychol. Appl. 19, 72–82. doi: 10.1037/a0032067
Shaibakova, K. D. (2020). Gender-based violence: typology and solutions. Int. J. Criminol. Sociol. 9, 1028–1032. doi: 10.6000/1929-4409.2020.09.114
Smith, L. L., Flowe, H. D., and Kanja, W. (2019). Achieving more with less: a critical review of protocols for forensic investigation of sexual violence in low-resource environments. Forens. Sci. Int. Synergy 1, 108–113. doi: 10.1016/j.fsisyn.2019.07.002
Smith, S. G., Zhang, X., Basile, K.C., Merrick, M.T., Wang, J., Kresnow, M., et al. (2018). The National Intimate Partner and sexual violence survey (NISVS): 2015 data brief—Updated release. National Center for Injury Prevention and Control, Centers for Disease Control and Prevention.
Spurr, B. (2017). TTC app led to sexual assault arrest, transit agency says. Toronto Star. Available at: https://www.thestar.com/news/gta/transportation/2017/10/06/ttc-app-led-to-sexual-assault-arrest-transit-agency-says.html
Statista (2022). Number of smartphone subscriptions worldwide from 2016 to 2021, with forecasts from 2022 to 2027. Available at: https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/
Sternberg, K. J., Lamb, M. E., Hershkowitz, I., Yudilevitch, L., Orbach, Y., Esplin, P. W., et al. (1997). Effects of introductory style on children's abilities to describe experiences of sexual abuse. Child Abuse Negl. 21, 1133–1146. doi: 10.1016/S0145-2134(97)00071-9
Stevens, L. M., Flowe, H. D., Colloff, M. F., Ingham, M., Rockowitz, S., Thompson, A., et al. (in prep.). Impact of misinformation, retention interval and repeated interviews on eyewitness memory for sexual violence—a partial replication of Ebbesen and Rienick (1998).
Stevens, L. M., Reid, E., Kanja, W., Rockowitz, S., Davies, K., Dosanjh, S., et al. (2022). The Kenyan survivors of sexual violence network: preserving memory evidence with a bespoke mobile application to increase access to vital services and justice. For. Soc. 12:12. doi: 10.3390/soc12010012
Tjaden, P., and Thoennes, N. (2006). Extent, nature, and consequences of rape victimization: Findings from the National Violence against Women Survey. National Institute of Justice and the Centers for Disease Control and Prevention.
United Nations (n.d.) Frequently asked questions: Types of violence against women and girls. Available at: https://www.unwomen.org/en/what-we-do/ending-violence-against-women/faqs/types-of-violence
United Nations (2015). The World’s women 2015: Trends and statistics. Department of Economic and Social Affairs, Statistics Division, United Nations.
Vallano, J. P., Evans, J. R., Schreiber Compo, N., and Kieckhaefer, J. M. (2015). Rapport-building during witness and suspect interviews: a survey of law enforcement. Appl. Cogn. Psychol. 29, 369–380. doi: 10.1002/acp.3115
Vallano, J. P., and Schreiber Compo, N. (2015). Rapport-building with cooperative witnesses and criminal suspects: theoretical and empirical review. Psychol. Public Policy Law 21, 85–99. doi: 10.1037/law0000035
Weber, N., and Perfect, T. J. (2012). Improving eyewitness identification accuracy by screening out those who say they don’t know. Law Hum. Behav. 36, 28–36. doi: 10.1037/h0093976
Wells, G. L., Kovera, M. B., Douglass, A. B., Brewer, N., Meissner, C. A., and Wixted, J. T. (2020). Policy and procedure recommendations for the collection and preservation of eyewitness identification evidence. Law Hum. Behav. 44, 3–36. doi: 10.1037/lhb0000359
Westera, N. J., Kebbell, M. R., and Milne, R. (2011). Interviewing rape complainants: police officers’ perceptions of interview format and quality of evidence. Appl. Cogn. Psychol. 25, 917–926. doi: 10.1002/acp.1770
Westera, N. J., Kebbell, M. R., and Milne, B. (2013). It is better, but does it look better? Prosecutor perceptions of using rape complainant investigative interviews as evidence. Psychol. Crime Law 19, 595–610. doi: 10.1080/1068316X.2012.656119
Westera, N. J., Kebbell, M. R., and Milne, B. (2016). Want a better criminal justice response to rape? Improve police interviews with complainants and suspects. Violence Against Women 22, 1748–1769. doi: 10.1177/1077801216631439
Wixted, J. T., and Ebbesen, E. B. (1997). Genuine power curves in forgetting: a quantitative analysis of individual subject forgetting functions. Mem. Cogn. 25, 731–739. doi: 10.3758/BF03211316
World Bank Group (2019). Program—law, justice and development week 2019. Available at: https://ghum.kuleuven.be/ggs/program-ljd-week-2019.pdf
World Health Organization (2003). WHO multi-country study on women’s health and domestic violence against women. Available at: https://apps.who.int/iris/bitstream/handle/10665/67422/WHO_FCH_GWH_02.2.pdf
World Health Organization (2021). Violence against women prevalence estimates, 2018: Global, regional and national prevalence estimates for intimate partner violence against women and global and regional prevalence estimates for non-partner sexual violence against women. Executive summary. Available at: https://www.who.int/publications/i/item/9789240022256
Keywords: gender-based violence, #MeToo, mobile applications, police interviews, rape, sexual violence
Citation: Stevens LM, Bennett TC, Cotton J, Rockowitz S and Flowe HD (2024) A critical analysis of gender-based violence reporting and evidence building applications (GBVxTech) for capturing memory reports. Front. Psychol. 14:1289817. doi: 10.3389/fpsyg.2023.1289817
Edited by:
Dominic Willmott, Loughborough University, United KingdomReviewed by:
B. Kennath Widanaralalage, King's College London, United KingdomSamantha Mason, University of Leeds, United Kingdom
Copyright © 2024 Stevens, Bennett, Cotton, Rockowitz and Flowe. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Laura M. Stevens, bG1zODI1QHN0dWRlbnQuYmhhbS5hYy51aw==