Skip to main content
PLOS One logoLink to PLOS One
. 2025 Aug 13;20(8):e0320709. doi: 10.1371/journal.pone.0320709

Using safe and ethical technology to prevent and respond to sexual and interpersonal violence during adolescence and young adulthood: Identifying evidence, best practices, and pathways forward—A global scoping review protocol

Mahboubeh Shirzad 1,*, Astha Ramaiya 1, Katie Edwards 2, Meng Yuan 1, Surabhi Bhanot 3, Michelle R Kaufman 1,3
Editor: Morteza Arab-Zozani4
PMCID: PMC12349042  PMID: 40802606

Abstract

Background

Adolescents and young adults face elevated risks of sexual and interpersonal violence (SIV) compared to adults. Technology has been used to help mitigate this issue by mapping incidents, supporting victims, and promoting behavior change to prevent re-occurrence. However, there is a risk that technology could facilitate abuse. Ensuring technology use is safe and ethical in the context of SIV is critical.

Objective

This protocol provides a roadmap for a scoping review to synthesize global literature on how technology has been used to address SIV among adolescents and young adults. It aims to identify evidence and strategies for enhancing the safety, privacy, and effectiveness of technologies to prevent and respond to SIV. A scoping review was chosen because the evidence in this field is still emerging and fragmented. This approach allows us to map the breadth of existing research, highlight gaps, and make recommendations on the pathways forward.

Materials and methods

A search strategy was developed to identify English-language studies published since 2008, the year of the emergence of smartphones in the United States, in databases such as PubMed, EMBASE, Web of Science, and Scopus. We will include qualitative, quantitative, and mixed-methods studies that use technology (e.g., mobile apps, websites) to address SIV among youth. This scoping review protocol was prepared following the Joanna Briggs Institute guidelines and Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols (PRISMA-P), which will be adhered to during content analysis review process. Covidence, a web-based platform for systematic review management, will be used to manage screening and data extraction. Two independent reviewers will screen and extract data, with disagreements resolved by a third reviewer.

Discussion

The findings of the proposed scoping review have the potential to contribute to improving technology safety, data privacy, and ethical considerations in the context of reporting and tracking SIV, alongside informing future metrics, policies, guidelines, and platform designs, contributing to the creation of more secure and effective tools for SIV reporting and tracking.

Scoping review registration

This protocol has been registered in the Open Science Framework (OSF): https://doi.org/10.17605/OSF.IO/WUNT9

Background

Gender-based violence (GBV) refers to any harmful act or threat targeting an individual or group due to their actual or perceived sex, gender identity, gender expression, sexual orientation, or sex characteristics [1]. One major category of GBV is sexual and interpersonal violence (SIV), which includes a range of behaviors such as sexual assault (e.g., non-consensual sexual contact), dating violence (e.g., controlling or abusive behavior in romantic relationships), and intimate partner violence (e.g., physical or emotional abuse by a current or former partner) [2,3]. Globally, SIV affect one in three women and girls [4], and also impacts men and boys, often in less visible ways [5,6]. For instance, in India, a study revealed that 52.4% of men reported experiencing SIV in their lifetime, with contributing factors such as lower family income, limited education, and alcohol use by perpetrators [7]. The prevalence is even higher among gender-non-binary individuals who do not place themselves in the male/female categories and may include transgender, non-conforming, third gender, and other non-cisgender individuals [810]. These patterns reveal the broad and complex nature of SIV affecting diverse groups.Across population segments, adolescents and youth face unique risks of SIV. In comparison to adults, adolescents are 3–4 times more likely to experience sexual violence [1013], and approximately 10–20% adolescents become victims of sexual or physical dating violence [14]. Within the United States, 16–19 year old women are 4 times more likely to be sexually assaulted than women in other age groups [15]. Gender diverse adolescents and young adults experience violent victimization at rates four times higher than that of cisgender young people [11,12], driven by stigma, discrimination, social isolation, and absence of protective policies [13,14]. Sexual and dating violence among youth is particularly rampant on college campuses and in peer settings, with as many as one in five women and one in ten men experiencing on-campus sexual violence at least once in their academic journeys [1618].

The impact of technology on mitigating SIV is promising. Through the use of mobile phone applications and online platforms, crucial interventions and programs have been implemented, including mapping incidents of violence, providing information and support services to victims, conducting safety assessments, facilitating relationship support interventions, and promoting behavior change programs for perpetrators [15,19,20]. However, technology can sometimes serve as a conduit for perpetrating acts of violence. A study by the Australian Institute of Criminology indicates that approximately 75% of individuals using dating applications have encountered forms of sexual violence, such as harassment and stalking [21]. Adolescents and young adults are easy targets of technology facilitated abuse (TFA), both in partnered and non-partnered contexts. The prevalence of different forms of technology-assisted sexual assault (TASA), including image-based sexual abuse, non-consensual sexting, self-produced child sexual-abuse images, online grooming (manipulating minors for sexual purposes), revenge pornography (non-consensual sharing of intimate images), and sextortion (threats to release sexual content for more material), is as high as 15.6% among the adolescent and young adult population in the United States [17,22]. In fact, one study found that youth aged 13–17 were the age group at highest risk of being victimized by technology-assisted abuse, with most perpetrators being older than this group [17].

Safety concerns may also come up in the use of technology specifically created for addressing SIV, such as personal data misuse, breaches of personal information, and increased exposure to harm if discovered by the abusive partner [23]. Survivors may face tracking, unauthorized data sharing, or retaliation if technology is misused or insufficiently protected [24]. Ethical concerns in the use of technology are particularly relevant for young users, who may not fully understand the implications of sharing sensitive personal information or may not hold complete agency in technology use [18,25]. Developmentally inappropriate and unverified content on SIV circulating on digital platforms may further make adolescents susceptible to feelings of distress, re-traumatization, and developing incorrect perceptions of consent, victim-blaming, and healthy relationships [3,18]. Addressing these issues requires robust security, age-appropriate consent mechanisms for data collection and sharing and survivor-centered design, such as anonymized reporting and trauma-informed interfaces, to ensure protection and equitable access to digital support tools [15,26]. Hence, there is a pressing need for greater caution and deliberation in utilizing technology in safe ways to address SIV [27].

Technology-based approaches to SIV typically fall into two categories: prevention and response. Prevention efforts aim to stop violence before it occurs through strategies like public education, awareness campaigns, or behavior change tools [28]. Response strategies focus on supporting individuals after violence has occurred, including reporting systems, crisis services, and access to medical, legal, psychosocial, and recovery-oriented support [29,30]. This review considers both types of interventions to understand the full spectrum of technology’s role in addressing SIV.

Ethical considerations in using technology to address SIV apply to both developers and users. Developers must ensure privacy, transparency, consent, and data protection in the design of digital tools [31,32]. Users, particularly adolescents and young adults, must be informed of their data rights and able to provide meaningful consent [31,32]. These factors are especially critical given the sensitivity of SIV and the potential for technology to both help and harm.

To optimize the safety and effectiveness of these technologies, it is essential to understand how they have supported effective prevention, response, tracking, reporting, and service delivery in various settings [33,34]. Moreover, it is important to assess whether any ethical issues have been reported during the use of such technologies, given the sensitivity of SIV. For example, some platforms have lacked sufficient anonymization or security, resulting in the unintentional disclosure of survivor identities [15]. Prioritizing robust safety and privacy measures is critical to safeguarding individuals and preventing further harm [26].

There is insufficient systematically synthesized evidence in the area of safety, privacy, and ethics for technology that seeks to address SIV, resulting in a significant knowledge gap that remains inadequately explored despite its importance [35,36]. Although a few systematic and scoping reviews have been published in recent years on the use of e-health and various technologies in addressing sexual assault, most have focused on aspects such as effectiveness, acceptability, or user experience [21,3739]. However, no studies have systematically synthesized evidence on the safety, privacy, or ethical concerns of using technology in addressing these sensitive topics [15]. This oversight is particularly concerning given the increasing prevalence of technology-facilitated abuse, and the unintended consequences or risks associated with using technology to address SIV, posing unique challenges to survivors’ safety and privacy [40] Our study fills this gap by mapping how these safety and ethical elements are integrated into technology-based interventions targeting SIV among adolescents and young adults. Given the heterogeneous, still-emerging evidence on technology-based SIV interventions, a scoping review is an ideal method [41] to map global experiences and examine how safety and privacy issues have been considered for addressing SIV. This approach allows us to systematically explore existing literature, identify gaps in knowledge, and outline areas where further research is needed [41]. By synthesizing these insights, the review will provide a comprehensive overview of global knowledge to date and offer valuable guidance for future studies to address these critical issues effectively.

Study objectives

This scoping review protocol outlines the process for synthesizing literature, evidence, and best practices on using safe and ethical technology to address SIV. The primary objective is to examine whether safety and privacy considerations are integrated into technology for SIV prevention (e.g., awareness campaigns, educational programs) and response (e.g., survivor support services, forensic care, reporting systems). The secondary objectives are to explore how these concerns are addressed in practice, identify the types of technologies being used, assess which populations they serve, and highlight implementation challenges and opportunities to guide future research and policy.

Materials and methods

This study will follow the guidelines for conducting scoping reviews outlined by the Joanna Briggs Institute (JBI) and in the PRISMA-P (Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols) checklist (S1 Table) to ensure a structured approach, transparency, methodological rigor, and comprehensive reporting, increasing the reproducibility and reliability of research findings [4244]. A scoping review was chosen because the existing literature on technology-based prevention and responses to SIV among youth is highly diverse in design, scope, and quality. This approach allows for a comprehensive overview of the available evidence and identification of key concepts, gaps, and areas for future research, making it well suited to an emerging and interdisciplinary field.

Review questions

To explore pertinent studies and evidence, we will address the following research questions:

  • I. How has technology (e.g., mobile apps, websites, or software) been utilized to respond to and prevent SIV?

  • II. To what extent has technology been effective in facilitating incident reporting, enhancing survivor safety, and improving access to support services?

  • III. What ethical and safety considerations are associated with the use of technology to address SIV, including privacy, traceability, consent requirements, data storage, and data protection?

  • IV. How have these ethical and safety concerns been addressed in the use of technology for SIV prevention and response?

Inclusion criteria

To clearly define the inclusion criteria for the proposed scoping review, we followed the Participant, Concept, Context (PCC) framework outlined in the JBI guidelines.

Participants.

We will include published research studies focusing on adolescents and young adults, ages 10–24 of all genders, a pivotal age range when SIV rates are at their highest [39].

Concept.

This review will include studies examining the use of technology—such as mobile applications, websites, and digital platforms—designed for SIV prevention and response. Prevention focuses on strategies, interventions, or programs aimed at stopping SIV before it occurs, while response addresses actions taken after SIV has occurred. Eligible studies may include evaluations of prevention programs, technology-assisted interventions, support and response mechanisms, policy analyses, impact assessments, qualitative research, cross-cultural studies, or education initiatives related to SIV. Given that some technology-based interventions address both the mitigation of SIV’s effects and its prevention through education and awareness, this review aims to explore the full spectrum of technology’s role in addressing SIV, including preventive measures, response strategies, and efforts to reduce the impact of violence.

Context.

This review will take a global view, including studies from all countries and regions. Eligible studies must have been published in English and must cover the period from 2008 to the present, reflecting the rapid evolution of digital technologies following the launch of the first smartphones. This timeframe captures the rise of mobile and internet-based tools that have transformed how SIV is addressed. The review will consider all study designs, including qualitative, quantitative, and mixed-methods studies.

Exclusion criteria

We will exclude studies that: (1) are not published in English, (2) do not focus on adolescents or young adults aged 10–24, (3) do not involve a technology-based intervention for SIV prevention or response, or (4) are systematic reviews, scoping reviews, narrative reviews, commentaries, short communications, proposals, theses, dissertations, posters, books, or protocols.

Search strategy and information sources

An experienced librarian assisted in developing a comprehensive search strategy for this review (S2 Table). The strategy was designed to ensure an efficient and thorough collection of relevant literature across multiple databases. Advanced search techniques and database-specific tools were employed to capture a broad range of high-quality, credible studies.

The search, conducted in January 2025, incorporated a wide array of keywords related to SIV, such as “intimate partner violence,” “gender-based violence,” “interpersonal violence,” “sexual abuse,” “sexual assault,” “sexual harassment,” and “femicide.” Technology-related terms included “mobile app,” “mobile applications,” “smartphone apps,” “portable software application,” “eHealth,” “digital health,” “telemedicine,” and “technology-facilitated abuse.” The full list of search terms and database-specific queries is provided in S2 Table.

To ensure the inclusivity of the search, databases like PubMed/MEDLINE, EMBASE, Scopus, and Web of Science were used. In addition, relevant gray literature sources, including UN Women, United States Agency for International Development (USAID), and Open Archives Initiative (OAIster), were included. These sources can provide valuable reports, policy briefs, and other materials that may not be published in peer-reviewed journals. This multifaceted search strategy aimed to gather diverse and high-quality resources, drawing from both published peer-reviewed literature and grey literature.

Evidence screening and selection

After completing the database searches, all references will be imported into Covidence, a bibliographic management platform [45] to streamline the review process and enhance both the rigor and reliability of the analysis. Duplicate studies will be removed, and two independent reviewers (MS and SB) will screen the remaining studies by title and abstract, excluding those that do not meet the inclusion criteria. Studies meeting the criteria will advance to the full-text review stage, where they will undergo a thorough examination. During this stage, the two reviewers (MS and SB) will assess the full text of each study based on the study objectives and inclusion criteria individually. Interrater reliability will be assessed and discussed if disagreements arise between the reviewers and will be resolved through discussion or with a third reviewer (MRK). Any studies that do not align with the objectives or research questions will be excluded. The review team will also pilot this process to ensure consistency in the study selection approach. We will document the reasons for excluding sources of evidence and present them in a PRISMA-ScR flow diagram. Consistent with JBI guidance for scoping reviews, we will not conduct a critical appraisal, assess methodological limitations, or evaluate the risk of bias, as the purpose of a scoping review is to provide a broad overview of existing literature rather than evaluate the quality of individual studies [43].

Data extraction

We will extract key information and data from the selected sources of evidence based on our study aims and research questions. We developed a standardized data extraction form for this review using the JBI format to minimize bias [46] (S3 Table). The form will undergo a piloting stage, during which two reviewers (MS and SB) will test it on at least three studies to ensure accuracy, completeness, and consistency.

Extracted data will include study identification details (title, publication date, authors, location, and country), study characteristics (type and design), population characteristics (e.g., age, gender identity, sexual orientation), data collection methods (e.g., surveys, interviews), data analysis methods, the type of technology used (e.g., mobile apps, websites, software), type of violence addressed (e.g., sexual assault, dating violence), outcomes reported and type of data collected (e.g., personally identifiable information). We will also extract information on ethical and safety considerations (e.g., privacy, traceability, consent, data storage, and protection), facilitators (e.g., features or conditions that enabled effective implementation, such as usability, institutional support, or integration with services), and challenges (e.g., technical barriers, low user engagement). Summaries will emphasize limitations and recommendations for future research, policy, and practice.

Data analysis and presentation of results

We will use basic descriptive analysis both qualitatively and quantitatively. For qualitative data, we will use reflexive content analysis to identify patterns and develop key themes across studies [47]. This method allows for flexibility in interpreting diverse data and is suitable for scoping reviews that seek to map complex topics [47,48]. For quantitative data, we will summarize frequencies and proportions and use cross-tabulations to identify patterns across study characteristics (e.g., by population group, intervention type, or technology platform). Reflexivity will be integrated throughout the process by encouraging the team to document interpretations and analytical decisions using memos, which helps to ensure transparency and minimize bias. These reflective notes will guide discussions during coding and theme refinement, supporting consistent and credible synthesis [49]. Coding and synthesis will be conducted collaboratively by two reviewers (MS and SB), who will also reflect on their positionality, including their disciplinary background and relationship to the topic. The findings will be presented as a data map, using either tables, charts, or diagrams, or in a descriptive format that aligns with the review’s objectives and scope.

Deviations from the protocol

It is common for scoping reviews to occasionally deviate from their protocols [50]. If this occurs, we will document any deviations in the final report of the scoping review, along with an explanation for why these changes were made.

Status of the study & expected timeline

We confirm that our study is ongoing, and data collection is not yet complete as we submit this protocol. Our search strategy is finalized, and the database search is complete. We expect to finish screening and data extraction by April 2025, with final results available in July 2025.

Statements of ethical approval

This study is not human subjects research, as it utilizes only publicly available published papers.

Discussion

This scoping review protocol outlines the process for examining existing literature, evidence, and best practices on the use of safe and ethical technology in addressing SIV. It will investigate whether safety and privacy issues have been considered in technological approaches for SIV prevention and response, and how these concerns have been addressed. The findings will guide the development of tools tailored to the needs of diverse populations, offering actionable insights to inform policies, guidelines, and metrics for the ethical use of technology in SIV prevention and intervention. Recommendations will emphasize data safety, privacy, and usability, and promote technology-driven solutions that are inclusive of youth with diverse identities and experiences, and effective in both preventing SIV and supporting recovery. This includes addressing user safety and privacy concerns, enhancing access to digital tools, and ensuring that technological interventions not only provide support to survivors but also help prevent future occurrences of violence.

Additionally, the study results can help us to propose strategies to engage city, state, and national governments in improving SIV reporting protocols through education and advocacy. The review aims to support technology developers, researchers, and stakeholders in advancing digital innovations while identifying gaps in current research and implementations. By synthesizing global lessons, this review has the potential to drive more equitable, secure, and effective applications of technology in addressing SIV and supporting survivors.

Dissemination

To ensure the findings reach relevant audiences, we plan to disseminate the results through publication in a peer-reviewed journal and presentations at academic and public health conferences. Additionally, we will share tailored policy briefs with practitioners, technology developers, and national and local government agencies involved in violence prevention. We also plan to post a summary of findings on open-access platforms, practitioner networks, and social media channels (e.g., Twitter, LinkedIn) to promote digital safety and adolescent well-being.

Limitations

Given the comprehensive nature of these databases, the majority of relevant literature is expected to be captured, making these four databases the primary sources of data. Although relevant grey literature sources were also included, the search may still miss studies not indexed in these selected platforms, which could result in the exclusion of valuable but less visible evidence and introduce some publication or indexing bias. Moreover, only studies published in English will be considered, which may result in excluding other relevant research in other languages and introduce a potential language bias. Additionally, the expected heterogeneity in study designs, populations, technologies used, and outcomes measured may pose challenges for synthesis and may limit the comparability and generalizability of findings. Our search strategy may have missed relevant grey literature from key organizations such as ECPAT and the WeProtect Global Alliance, as the search was finalized prior to protocol submission.

Conclusions

This scoping review protocol outlines a framework for exploring the global use of technology in addressing SIV. By analyzing the effectiveness, challenges, and ethical considerations of digital tools, it seeks to identify best practices and highlight critical gaps in existing literature. The findings aim to inform the development of evidence-based policies, guidelines, and technology designs for the U.S. context that prioritize safety, privacy, and accessibility, ultimately enhancing support systems and interventions for SIV prevention and response.

Supporting information

S1 Table. PRISMA-P 2015 checklist.

(DOCX)

pone.0320709.s001.docx (35KB, docx)
S2 Table. Search strategy.

(DOCX)

pone.0320709.s002.docx (20.5KB, docx)
S3 Table. Data extraction form.

(DOCX)

pone.0320709.s003.docx (21.8KB, docx)

Acknowledgments

We thank Donna Hesson, MLS, at the Welch Medical Library, Johns Hopkins University, for her support in developing the search strategy for this study.

Data Availability

This study utilizes only publicly available published papers. Research results and data will be made publicly available when the study is completed and published.

Funding Statement

MS Cost Center number: 1600108542 funder name: Bloomberg American Health Initiative URL: https://americanhealth.jhu.edu. The funder had no involvement in the conceptualization, design, execution, analysis, or reporting of this scoping review.

References

Decision Letter 0

Morteza Arab-Zozani

13 Jun 2025

Dear Dr. Shirzad,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

Please submit your revised manuscript by Jul 28 2025 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at plosone@plos.org . When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.

  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.

  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols . Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols .

We look forward to receiving your revised manuscript.

Kind regards,

Morteza Arab-Zozani, Ph. D.

Academic Editor

PLOS ONE

Journal Requirements:

When submitting your revision, we need you to address these additional requirements.

1.Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. We are unable to open your Supporting Information file Archive.zip. Please kindly revise as necessary and re-upload.

3. Please review your reference list to ensure that it is complete and correct. If you have cited papers that have been retracted, please include the rationale for doing so in the manuscript text, or remove these references and replace them with relevant current references. Any changes to the reference list should be mentioned in the rebuttal letter that accompanies your revised manuscript. If you need to cite a retracted article, indicate the article’s retracted status in the References list and also include a citation and full reference for the retraction notice.

Additional Editor Comments:

Dear Respectable Authors

After gathering the opinions of our reviewers, we have reached a decision regarding your article.

Our decision is: Minor Revision

Please send the response to reviewers file as soon as possible and also highlighted the changes in the main text.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Does the manuscript provide a valid rationale for the proposed study, with clearly identified and justified research questions?

Reviewer #1: Partly

Reviewer #2: Yes

Reviewer #3: Partly

Reviewer #4: Yes

**********

2. Is the protocol technically sound and planned in a manner that will lead to a meaningful outcome and allow testing the stated hypotheses??>

Reviewer #1: Partly

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: Yes

**********

3. Is the methodology feasible and described in sufficient detail to allow the work to be replicable??>

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: Yes

**********

4. Have the authors described where all data underlying the findings will be made available when the study is complete??>

The PLOS Data policy

Reviewer #1: No

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: No

**********

5. Is the manuscript presented in an intelligible fashion and written in standard English??>

Reviewer #1: Yes

Reviewer #2: Yes

Reviewer #3: Yes

Reviewer #4: Yes

**********

Please use the space provided to explain your answers to the questions above and, if applicable, provide comments about issues authors must address before this protocol can be accepted for publication. You may also include additional comments for the author, including concerns about research or publication ethics.

You may also provide optional suggestions and comments to authors that they might find helpful in planning their study.

Reviewer #1: Dear Authors,

Thank you for the opportunity to review your protocol for the scoping review titled "Using Safe and Ethical Technology to Prevent and Respond to Sexual and Interpersonal Violence: Identifying Evidence, Best Practices, and Pathways Forward." I commend your work on addressing such a vital and timely topic.

Your protocol is well-structured, transparent, and largely adheres to PRISMA-P standards for scoping reviews. The inclusion of supplementary materials, such as the detailed search strategy and extraction form, is a significant strength and demonstrates commitment to methodological rigor.

Below, I provide detailed feedback by section, with recommendations to further enhance the clarity, completeness, and transparency of your protocol.

1. Summary (Abstract)

• The abstract provides a concise overview of the rationale, objectives, and methods.

• To further improve clarity, consider specifying the types of studies included (e.g., qualitative, quantitative, mixed-methods) directly in the summary. This will help readers quickly understand the scope and methodological breadth of your review.

2. Background and Study Objectives

• The background is comprehensive and well-referenced, clearly establishing the need for this review.

• To strengthen this section, explicitly reference any previous systematic or scoping reviews on similar topics and clarify how your review specifically addresses the existing gaps identified in previous literature. For example, detail the unique aspects of safety and ethical considerations that have not been systematically synthesized to date (aspects like data protection regulations, user consent, or risk management strategies could add depth).

• Clearly delineating primary and secondary objectives would enhance the reader’s understanding of your review’s focus areas and priorities.

3. Methods

• The methods section is generally robust, with clear descriptions of the search strategy, screening, and data extraction processes.

• Specify exclusion criteria more explicitly (e.g., non-English studies, non-youth populations, non-technology interventions). Additionally, provide a more detailed justification for the selected timeframe (2008 to present), explaining its relevance to the evolution of technology in this field.

• Clarify how grey literature or unpublished studies will be handled, as this can impact the comprehensiveness of your review.

4. Supplementary Materials

• The inclusion of a detailed search strategy and extraction form is a notable strength, supporting reproducibility and transparency.

5. Limitations

• The protocol acknowledges the limitation of including only English-language studies, which may introduce language bias. This is appropriate, but you may also wish to discuss any other potential limitations, such as the challenges in synthesizing a highly heterogeneous evidence base.

In summary, your protocol is methodologically sound and addresses a critical area of public health. Addressing the points above will further enhance its clarity, transparency, and alignment with best practices for scoping reviews. I look forward to seeing the results of your important work.

Reviewer #2: Thank you for this important forward thinking innovation to the field!

-Consider revising the title & short title to include 'youth' or 'young people' as an important descriptor.

-Review grammar in abstract Obj sentence 1.

-Consider revising the terms used. Interpersonal violence is not typically considered a sub-category of GBV as stated in line 55. Rather, interpersonal violence includes a wider range of behaviors including community (gang, etc) violence. I think the term implies a bigger scope than is envisioned here. You might mean intimate partner violence? See https://www.ncbi.nlm.nih.gov/books/NBK525208/. Consider aligning with a recent terminology pub: https://ecpat.org/wp-content/uploads/2025/04/Second-Edition-Terminology-Guidelines-final.pdf

-Please add definitions of terms such as 'online grooming', 'revenge pornography', and 'sextortion'

-Please include the full list of search terms

-Did you consider including online research on experiences of SV/GBV? It could be an important addition for the field.

-Please add a citation for the sentence: "a pivotal age range when SIV rates are at their highest before decreasing."

-Consider expanding the resources for grey/white literature to include ECPAT, WeProtect Global Alliance, and other tech-focused organizations.

-Data extraction should clearly document the type of violence addressed, type of data (if any) collected (personally identifiable information? violence outcomes? indirect outcomes? no outcomes at all?)

-What do you mean by 'facilitators' to be extracted?

-In the discussion, you talk about informing city/state governments. Since this is a global study, can 'national' governments also be added?

Reviewer #3: Please accept my review of manuscript #PONE-D-25-09607, which is being considered for publication in PLOS ONE. This manuscript outlines an evidence-based protocol with which the authors plan to conduct a scoping review. The focus of this review will be technology’s impacts on either mitigating or facilitating sexual and interpersonal violence (SIV) amongst 8-25 year olds. The protocol has many strengths, including filling a needed gap in the literature on factors influencing technology-facilitated or -mitigated SIV, responding to a rising form of SIV with both a preventative and responsive intention, as well as the rigor and depth of the proposed scoping review. In addition to these strengths, I included suggestions for improvements below, which focus on increasing clarity of wording and purpose, flow, citations, and minor suggestions on methodology. Overall, I think this is an important study and a well-devised protocol that will be ready for publication with some revisions.

Paper-wide suggestions:

Please use consistent either APA or AMA-style in-text citation formatting. AMA would include superscript numbering, while APA would include the author last names and publication date in parentheses.

General recommendation: please clarify more thoroughly, in both the introduction and method, why a scoping review is the best choice of review type for this study.

Abstract:

Please include the full version of the abbreviation PRISMA-P.

Briefly mention that Covidence is a type of software for those who are unfamiliar.

Introduction:

I have an issue with the way SIV is presented in the first paragraph. Think about and revisit.

Line 67: “age-groups” does not need a hyphen.

Line 70: “(11,12).Sexual”: insert a space.

Line 80: “Adolescents and young adults are easy target of “: change to targets.

Line 81: “both in partner and non-partner contexts”: please change to “partnered and non-partnered”

Line 82: the word “penetration” is inappropriately used in this sentence. Do you mean frequency or prevalence?

Line 85: please say “in the United States”

Line 85: “Youth aged 13-17 years were found to be at the highest risk of technology-assited abuse, with majority of the perpetrators being older than this age-group (18).”

Perhaps a more precise and grammatically correct way to word this is something like: In fact, one study found that youth aged 13-17 were the age group with the highest risk of being victimized by technology-assisted abuse, with the majority of perpetrators being older than this age group (18).

Line 94: “use(21,22)” insert a space after “use.”

Lines 94-98: Please be more specific about the “topics” that adolescents may develop “incorrect” perceptions about; also, please be more specific about what is meant by “content-based data practices” and survivor-centered “design.” I also suggest citing all of these claims.

Line 103: what is an example of a potential ethical issue that may have been reported in the past?

Lines 113-120: please be sure to cite all claims.

Method:

General recommendation: please include a description of how the “needs of diverse populations” will be methodologically approached, such as whether it will be a specific research question or piece of extracted data, as this goal is mentioned in both the introduction and discussion.

Line 135: add period.

Research question 2: This is a great question, yet it might be more scientifically fruitful to answer if it is reworded as an open question. For example, “To what extent has technology been effective in facilitating…” may give you more room to answer this question qualitatively.

The parenthetical portion of your 3rd research question is important background information about ethical considerations in SIV-related technology. I suggest integrating this information into a new paragraph in your introduction so that the reader is more aware of the possibilities regarding ethical and safety issues that are reasonable to suspect could be helpful or harmful.

Line 156: please cite.

Concept section: Similarly to my suggestion above, your description of prevention versus response strategies in this section is very helpful and would be important to address in your introduction more thoroughly to justify the focus on these types of studies.

Lines 185-186: It would read better to reword the information inside the parentheses as a separate sentence.

Lines 206-207. Please justify more fully why you will not “conduct a critical appraisal, assess methodological limitations, or evaluate the risk of bias due to the nature of study.” Every study would likely benefit from these practices, so please include more rationale for these choices. Furthermore, this statement is confusing as just after this (e.g., line 211), there is a statement regarding bias mitigation. Therefore, it would be best to either have a subsection describing such bias mitigation strategies, methodological limitations, etc., and/or more fully explain what is meant by the statement in lines 206-207.

Line 212: you write that you will conduct a pilot and refinement stage, followed by the sentence, “The research team will test it on at least three studies to confirm its accuracy and completeness.” I believe that this sentence is your description of what your piloting stage will entail, but this is slightly unclear. Please connect that this is your piloting plan, if that is correct.

Data Analysis section: please include a citation regarding your intended qualitative data analysis, and name your specific qualitative analytic approach (I believe you are describing thematic analysis). I also suggest expanding more on your plan to use reflexivity, including what the process will entail and why it is recommended and by whom.

Line 232: please cite.

Reviewer #4: I recommend for the authors to outline how they intend to share their findings from the study once it is completed.

**********

what does this mean? ). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy

Reviewer #1: Yes:  Prof. Yordanis Enriquez Canto

Reviewer #2: Yes:  Ashleigh L Howard

Reviewer #3: No

Reviewer #4: No

**********

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool, https://pacev2.apexcovantage.com/ . PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at figures@plos.org

Attachment

Submitted filename: PONE-D-25-09607_6.5.2025_Peer Review.docx

pone.0320709.s004.docx (20.1KB, docx)
PLoS One. 2025 Aug 13;20(8):e0320709. doi: 10.1371/journal.pone.0320709.r002

Author response to Decision Letter 1


15 Jul 2025

RESPONSE MATRIX

15 July 2025

Manuscript ID: PONE-D-25-09607

Manuscript Title: Using Safe and Ethical Technology to Prevent and Respond to Sexual and Interpersonal Violence during Adolescence and Young Adulthood: Identifying Evidence, Best Practices, and Pathways Forward—A Global Scoping Review Protocol

Reviewers’ Comments (#1) Authors’ Responses (Page and line number)

1. Summary (Abstract)

• The abstract provides a concise overview of the rationale, objectives, and methods.

• To further improve clarity, consider specifying the types of studies included (e.g., qualitative, quantitative, mixed-methods) directly in the summary. This will help readers quickly understand the scope and methodological breadth of your review.

Thank you for your suggestion. We clarified the inclusion of qualitative, quantitative, and mixed-methods studies during the review. The following sentence was added: “We will include qualitative, quantitative, and mixed-methods studies.”(Abstract, lines 37–38)

2. Background and Study Objectives

• The background is comprehensive and well-referenced, clearly establishing the need for this review.

• To strengthen this section, explicitly reference any previous systematic or scoping reviews on similar topics and clarify how your review specifically addresses the existing gaps identified in previous literature. For example, detail the unique aspects of safety and ethical considerations that have not been systematically synthesized to date (aspects like data protection regulations, user consent, or risk management strategies could add depth). We cited relevant existing reviews and emphasized how our review uniquely addresses a gap in the literature. The following sentence was added “Our study fills this gap by mapping how these safety and ethical elements are integrated into technology-based interventions targeting SIV among adolescents and young adults.” (Background section, lines 135–137)

3. Clearly delineating primary and secondary objectives would enhance the reader’s understanding of your review’s focus areas and priorities. We reworded the objectives to clarify that the primary aim is to assess safety and privacy integration in SIV-related technologies, while secondary aims include exploring practical implementation, technology types, target populations, and future research needs. (Background, lines 144–152)

4. Methods

• The methods section is generally robust, with clear descriptions of the search strategy, screening, and data extraction processes.

• Specify exclusion criteria more explicitly (e.g., non-English studies, non-youth populations, non-technology interventions).

• Additionally, provide a more detailed justification for the selected timeframe (2008 to present), explaining its relevance to the evolution of technology in this field.

• Clarify how grey literature or unpublished studies will be handled, as this can impact the comprehensiveness of your review. We added explicit exclusion criteria, including non-English publications, non-youth populations, non-technology-based interventions, and non-original research. (Exclusion Criteria section, lines 199–204)

We clarified that the 2008 start date reflects the emergence of smartphones and widespread use of digital tools relevant to SIV interventions. The following sentences was added “reflecting the rapid evolution of digital technologies following the launch of the first smartphones. This timeframe captures the rise of mobile and internet-based tools that have transformed how SIV is addressed. (Context section, lines 195-198)

We clarified our approach to grey literature by explicitly listing key sources (e.g., UN Women, USAID, OAIster) and noting their value in identifying reports and materials beyond peer-reviewed journals. (Search Strategy, lines 217–220)

5. Supplementary Materials

• The inclusion of a detailed search strategy and extraction form is a notable strength, supporting reproducibility and transparency Thank you for highlighting this.

6. Limitations

• The protocol acknowledges the limitation of including only English-language studies, which may introduce language bias. This is appropriate, but you may also wish to discuss any other potential limitations, such as the challenges in synthesizing a highly heterogeneous evidence base. We expanded the Limitations section to include potential challenges related to synthesizing a highly heterogeneous evidence base. The following sentence was added “Additionally, the expected heterogeneity in study designs, populations, technologies used, and outcomes measured may pose challenges for synthesis and may limit the comparability and generalizability of findings.” (Limitations section, lines 313–315)

7.In summary, your protocol is methodologically sound and addresses a critical area of public health. Addressing the points above will further enhance its clarity, transparency, and alignment with best practices for scoping reviews. I look forward to seeing the results of your important work. Thank you for this and other helpful critiques which have strengthened our manuscript.

Reviewers’ Comments (#2) Authors’ Responses

1.Thank you for this important forward thinking innovation to the field! Consider revising the title & short title to include 'youth' or 'young people' as an important descriptor. We revised the full and short titles to include “during Adolescence and Young Adulthood.” (Title Page, Lines 2 & 4,5)

2.Review grammar in abstract Obj sentence We corrected the grammar from “addresses” to “address.” (Abstract, line 30)

3.Consider revising the terms used. Interpersonal violence is not typically considered a sub-category of GBV as stated in line 55. Rather, interpersonal violence includes a wider range of behaviors including community (gang, etc) violence. I think the term implies a bigger scope than is envisioned here. You might mean intimate partner violence? See https://www.ncbi.nlm.nih.gov/books/NBK525208/. Consider aligning with a recent terminology pub: https://ecpat.org/wp-content/uploads/2025/04/Second-Edition-Terminology-Guidelines-final.pdf

Thank you for the suggestion. We retained the original terminology "sexual and interpersonal violence (SIV)" to maintain consistency with our research framing. However, we revised the Background to clarify our conceptualization of SIV as a major category of gender-based violence (GBV), encompassing sexual assault, dating violence, and intimate partner violence. (Background, lines 57–60)

4.Please add definitions of terms such as 'online grooming', 'revenge pornography', and 'sextortion' Brief definitions were added in parentheses to clarify each term. “Online grooming (manipulating minors for sexual purposes), revenge pornography (non-consensual sharing of intimate images), and sextortion (threats to release sexual content for more material)” (Background, lines 87–89)

5.Please include the full list of search terms We added more search terms in the main text and explicitly referenced the full list in Supplementary File S2. “The search, conducted in January 2025, incorporated a wide array of keywords related to SIV, such as “intimate partner violence,” “gender-based violence,” “interpersonal violence,” “sexual abuse,” “sexual assault,” “sexual harassment,” and “femicide.” Technology-related terms included “mobile app,” “mobile applications,” “smartphone apps,” “portable software application,” “eHealth,” “digital health,” “telemedicine,” and “technology-facilitated abuse.” The full list of search terms and database-specific queries is provided in Supplementary File S2.” (Search Strategy, lines 210-215)

6.Did you consider including online research on experiences of SV/GBV? It could be an important addition for the field. Thank you for the suggestion and we agree with you. Currently, we have chosen not to include online research studies that focus solely on participants' experiences of SV/GBV outside the context of specific technological interventions. However, this is an important area of work and was noted in the discussion section of the paper.

7.Please add a citation for the sentence: "a pivotal age range when SIV rates are at their highest before decreasing." We added a citation to support this sentence in the revised manuscript. (Inclusion Criteria, Line 180)

8.Consider expanding the resources for grey/white literature to include ECPAT, WeProtect Global Alliance, and other tech-focused organizations. Thank you for the helpful suggestion. As our search was completed after submitting the study protocol, we are unable to expand the sources further. We add this as one limitation. The following sentence was added “Our search strategy may have missed relevant grey literature from key organizations such as ECPAT and the WeProtect Global Alliance, as the search was finalized prior to protocol submission.” (Limitation, Line 135-137)

9.Data extraction should clearly document the type of violence addressed, type of data (if any) collected (personally identifiable information? violence outcomes? indirect outcomes? no outcomes at all?) We revised the Data Extraction section to specify analysis methods, technology type, violence type, and data collected. (Data Extraction, lines 250–256)

10.What do you mean by 'facilitators' to be extracted? We clarified the meaning of “facilitators” as “features or conditions that enabled effective implementation.” (Data Extraction, lines 253-254)

11.In the discussion, you talk about informing city/state governments. Since this is a global study, can 'national' governments also be added? We revised the text to include "national" governments alongside city and state levels. (Discussion, line 294)

Reviewers’ Comments (#3) Authors’ Responses

1.Please use consistent either APA or AMA-style in-text citation formatting. AMA would include superscript numbering, while APA would include the author last names and publication date in parentheses. We updated all in-text citations and references to follow AMA style consistently throughout the manuscript.

2.General recommendation: please clarify more thoroughly, in both the introduction and method, why a scoping review is the best choice of review type for this study. We expanded the rationale for selecting a scoping review by explaining its suitability for mapping diverse and emerging literature, particularly in a field where concepts, technologies, and ethical considerations are still evolving. (Background, line 137; Methods, lines 158–162)

3.Abstract:

Please include the full version of the abbreviation PRISMA-P. We added the full version of the abbreviation “PRISMA-P” as “Preferred Reporting Items for Systematic Reviews and Meta-Analyses Protocols”. (Abstract, Line 40)

4.Briefly mention that Covidence is a type of software for those who are unfamiliar We added a brief clarification that Covidence is “a web-based platform for systematic review management” to assist readers unfamiliar with the tool. (Abstract, lines 41-42)

5.I have an issue with the way SIV is presented in the first paragraph. Think about and revisit. We revised the first paragraph to more clearly define SIV as a subset of GBV. The following sentence was added “One major category of GBV is sexual and interpersonal violence (SIV), which includes a range of behaviors such as sexual assault (e.g., non-consensual sexual contact), dating violence (e.g., controlling or abusive behavior in romantic relationships), and intimate partner violence (e.g., physical or emotional abuse by a current or former partner).” (Background, lines 57-60)

6.Line 67: “age-groups” does not need a hyphen. We revised the phrase “age-groups” to “age group” to correct the grammar. (Background, line 71)

7.Line 70: “(11,12).Sexual”: insert a space. We inserted a space between the citation and the word “Sexual” for proper formatting. (Background, line 74)

8.Line 80: “Adolescents and young adults are easy target of “: change to targets. We changed “target” to “targets” for grammatical accuracy. (Background, line 84)

9.Line 81: “both in partner and non-partner contexts”: please change to “partnered and non-partnered” We revised the phrase to “partnered and non-partnered” for improved clarity. (Background, line 85)

10.Line 82: the word “penetration” is inappropriately used in this sentence. Do you mean frequency or prevalence? We revised “penetration” to “prevalence” to more accurately reflect the intended meaning. (Background, line 86)

11.Line 85: please say “in the United States” We revised the sentence to specify “in the United States”. (Background, lines 90)

12.Line 85: “Youth aged 13-17 years were found to be at the highest risk of technology-assited abuse, with majority of the perpetrators being older than this age-group (18).” Perhaps a more precise and grammatically correct way to word this is something like: In fact, one study found that youth aged 13-17 were the age group with the highest risk of being victimized by technology-assisted abuse, with the majority of perpetrators being older than this age group (18). We revised the sentence for clarity and grammatical accuracy using the suggested phrasing. (Background, lines 90-92)

13.Line 94: “use(21,22)” insert a space after “use.” We inserted a space after "use" to correct the formatting. (Background, line 99)

14.Lines 94-98: Please be more specific about the “topics” that adolescents may develop “incorrect” perceptions about; also, please be more specific about what is meant by “content-based data practices” and survivor-centered “design.” I also suggest citing all of these claims. We revised the section to specify that adolescents may develop incorrect perceptions of consent, victim-blaming, and healthy relationships. We clarified “survivor-centered design” with examples such as anonymized reporting and trauma-informed interfaces and added appropriate citations. (Background, lines 101-104)

15.Line 103: What is an example of a potential ethical issue that may have been reported in the past? We added an example of ethical concerns. The following sentence was added “ For example, some platforms have lacked sufficient anonymization or security, resulting in the unintentional disclosure of survivor identities.” (Background, lines 122-124)

16.Lines 113-120: please be sure to cite all claims. We reviewed and added citations to support all claims made in this section. (Background, lines 131-143)

17.Method:

General recommendation: please include a description of how the “needs of diverse populations” will be methodologically approached, such as whether it will be a specific research question or piece of extracted data, as this goal is mentioned in both the introduction and discussion. We added “population characteristics (e.g., age, gender identity, sexual orientation) ”to the Data Extraction section (Data Extraction, lines 247-248)

18.Line 135: add period. Period added at the end of the sentence for proper punctuation. (Method, line 139)

19.Research question 2: This is a great question, yet it might be more scientifically fruitful to answer if it is reworded as an open question. For example, “To what extent has technology been effective in facilitating…” may give you more room to answer this question qualitatively. We revised Research Question 2 to be more open-ended: “To what extent has technology been effective in facilitating incident reporting, enhancing survivor safety, and improving access to support services?” (Review Questions, line 168-169)

20.The parenthetical portion of your 3rd research question is important background information about ethical considerations in SIV-related technology. I suggest integrating this information into a new paragraph in your introduction so that the reader is more aware of the possibilities regarding ethical and safety issues that are reasonable to suspect could be helpful or harmful. We moved the content regarding ethical and safety considerations from the third research question into a dedicated paragraph in the Background section to provide better context and clarity. (Background, lines 114–118)

21.Line 156: please cite. We have added an appropriate citation to support the statement. (Inclusion Criteria, line 180)

22.Concept section: Similarly to my suggestion above, your description of prevention versus response strategies in this section is

Attachment

Submitted filename: Response to Reviewers 7.15.docx

pone.0320709.s005.docx (35.8KB, docx)

Decision Letter 1

Morteza Arab-Zozani

21 Jul 2025

Using Safe and Ethical Technology to Prevent and Respond to Sexual and Interpersonal Violence during Adolescence and Young Adulthood: Identifying Evidence, Best Practices, and Pathways Forward—A Global Scoping Review Protocol

PONE-D-25-09607R1

Dear Dr. Shirzad,

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice will be generated when your article is formally accepted. Please note, if your institution has a publishing partnership with PLOS and your article meets the relevant criteria, all or part of your publication costs will be covered. Please make sure your user information is up-to-date by logging into Editorial Manager at Editorial Manager®  and clicking the ‘Update My Information' link at the top of the page. If you have any questions relating to publication charges, please contact our Author Billing department directly at authorbilling@plos.org.

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

Kind regards,

Morteza Arab-Zozani, Ph. D.

Academic Editor

PLOS ONE

Additional Editor Comments (optional):

Reviewers' comments:

Acceptance letter

Morteza Arab-Zozani

PONE-D-25-09607R1

PLOS ONE

Dear Dr. Shirzad,

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now being handed over to our production team.

At this stage, our production department will prepare your paper for publication. This includes ensuring the following:

* All references, tables, and figures are properly cited

* All relevant supporting information is included in the manuscript submission,

* There are no issues that prevent the paper from being properly typeset

You will receive further instructions from the production team, including instructions on how to review your proof when it is ready. Please keep in mind that we are working through a large volume of accepted articles, so please give us a few days to review your paper and let you know the next and final steps.

Lastly, if your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact onepress@plos.org.

You will receive an invoice from PLOS for your publication fee after your manuscript has reached the completed accept phase. If you receive an email requesting payment before acceptance or for any other service, this may be a phishing scheme. Learn how to identify phishing emails and protect your accounts at https://explore.plos.org/phishing.

If we can help with anything else, please email us at customercare@plos.org.

Thank you for submitting your work to PLOS ONE and supporting open access.

Kind regards,

PLOS ONE Editorial Office Staff

on behalf of

Dr. Morteza Arab-Zozani

Academic Editor

PLOS ONE

Associated Data

    This section collects any data citations, data availability statements, or supplementary materials included in this article.

    Supplementary Materials

    S1 Table. PRISMA-P 2015 checklist.

    (DOCX)

    pone.0320709.s001.docx (35KB, docx)
    S2 Table. Search strategy.

    (DOCX)

    pone.0320709.s002.docx (20.5KB, docx)
    S3 Table. Data extraction form.

    (DOCX)

    pone.0320709.s003.docx (21.8KB, docx)
    Attachment

    Submitted filename: PONE-D-25-09607_6.5.2025_Peer Review.docx

    pone.0320709.s004.docx (20.1KB, docx)
    Attachment

    Submitted filename: Response to Reviewers 7.15.docx

    pone.0320709.s005.docx (35.8KB, docx)

    Data Availability Statement

    This study utilizes only publicly available published papers. Research results and data will be made publicly available when the study is completed and published.


    Articles from PLOS One are provided here courtesy of PLOS

    RESOURCES