Severity: Warning
Message: file_get_contents(https://...@pubfacts.com&api_key=b8daa3ad693db53b1410957c26c9a51b4908): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests
Filename: helpers/my_audit_helper.php
Line Number: 144
Backtrace:
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 144
Function: file_get_contents
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 212
Function: simplexml_load_file_from_url
File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3106
Function: getPubMedXML
File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global
File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword
File: /var/www/html/index.php
Line: 316
Function: require_once
Introduction: Gender-based violence (GBV) is under-reported to the authorities owing to the stigma, shame, and fear of reprisal that surrounds these crimes. To address this, there has been an influx of technologies, including mobile phone and online applications that allow victim-survivors (hereafter, victims) to document and report GBV (hereafter referred to as GBVxTech). We critically analysed the extent to which GBVxTech applications align with the scientific knowledge base on gathering accounts of crimes from victims and witnesses.
Methods: We identified 41 reporting and evidence building applications from around the world but found many ( = 19) were no longer accessible. A total of 13 applications met the study criteria and were available for download. We evaluated each application on how well its design and features align with established minimum best practice standards for gathering complete and accurate accounts from witnesses and victims, such as the pre-interview instructions (e.g., setting ground rules), questioning approach (e.g., using open-ended questions), and the adequacy of security features (e.g., password protection).
Results And Discussion: We found most applications employ open questions, encourage victims to report information in an independent voice, and seek to elicit information pertinent to a criminal investigation. None of the applications use leading questions. However, most applications do not establish ground rules, and many use forced-choice questions, do not time stamp the information gathered, or document when users change their answers. Many applications have limited security features, potentially compromising users' safety. Further, some applications do not provide information about how to use the app, an informed consent procedure, or data usage information. We discuss the findings and offer recommendations for future GBVxTech development.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10830630 | PMC |
http://dx.doi.org/10.3389/fpsyg.2023.1289817 | DOI Listing |
Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!