{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T10:49:13Z","timestamp":1777546153780,"version":"3.51.4"},"reference-count":53,"publisher":"SAGE Publications","issue":"9","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Cyberpsychology, Behavior, and Social Networking"],"published-print":{"date-parts":[[2025,9]]},"abstract":"<jats:p>\n                    Technology-facilitated sexual dating abuse (TFSDA) involves non-consensual sexual behaviors in relationships\u2014such as sharing nude\/sexual content\u2014often visible to bystanders, who can intervene and reduce its impact. In Portugal, the lack of assessment measures limits understanding of which intervention opportunities are detected and which adolescents detect them. This study aimed to analyze the psychometric properties of the Scale of Bystanders\u2019 Detection of Intervention Opportunities in TFSDA\u2014adapted from the Technology-Facilitated Abuse in Relationships Scale\u2014estimate the prevalence of detection, and examine associations between detection and gender, age, victimization and\/or perpetration. Between February and May 2023, 1,604 Portuguese adolescents (51.4% cisgender boys;\n                    <jats:italic toggle=\"yes\">\n                      M\n                      <jats:sub>age<\/jats:sub>\n                    <\/jats:italic>\n                    = 14.92,\n                    <jats:italic toggle=\"yes\">SD<\/jats:italic>\n                    = 1.73) in grades 7\u201312 from 25 schools in northern and central Portugal completed an online questionnaire. This sample was divided into calibration (\n                    <jats:italic toggle=\"yes\">n<\/jats:italic>\n                    <jats:sub>1<\/jats:sub>\n                    = 444) and validation (\n                    <jats:italic toggle=\"yes\">n<\/jats:italic>\n                    <jats:sub>2<\/jats:sub>\n                    = 579,\n                    <jats:italic toggle=\"yes\">n<\/jats:italic>\n                    <jats:sub>3<\/jats:sub>\n                    = 581). Exploratory factor analysis identified an 8-item, two-factor structure\u2014\n                    <jats:italic toggle=\"yes\">Sexual Coercion<\/jats:italic>\n                    and\n                    <jats:italic toggle=\"yes\">Image-Based Sexual Harassment\/Abuse<\/jats:italic>\n                    \u2014explaining 53% of the variance. Confirmatory factor analysis demonstrated good fit indices, and measurement invariance was achieved for gender and age. Convergent and discriminant validity were acceptable, with high reliability across samples. Results indicate that 21.3% of adolescents detected intervention opportunities in TFSDA. Cisgender girl were less likely, while older adolescents were more likely, to detect\n                    <jats:italic toggle=\"yes\">Image-Based Sexual Harassment\/Abuse<\/jats:italic>\n                    . Victims and victim-perpetrators of TFSDA reported higher detection rates. Findings support the scale\u2019s psychometric robustness and its utility in research, clinical, and forensic contexts, while highlighting groups that may benefit from awareness or skills training to address TFSDA.\n                  <\/jats:p>","DOI":"10.1177\/21522715251372433","type":"journal-article","created":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T19:57:42Z","timestamp":1757534262000},"page":"636-644","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Bystanders\u2019 Detection of Intervention Opportunities in Technology-Facilitated Sexual Dating Abuse: Scale Validation and Correlates"],"prefix":"10.1177","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3088-923X","authenticated-orcid":false,"given":"Maria","family":"Vale","sequence":"first","affiliation":[{"name":"Psychology Research Centre, School of Psychology, University of Minho, Braga, Portugal."}]},{"given":"Denise","family":"Hines","sequence":"additional","affiliation":[{"name":"Department of Social Work, College of Public Health, George Mason University, Fairfax, Virginia, USA."}]},{"given":"Marlene","family":"Matos","sequence":"additional","affiliation":[{"name":"Psychology Research Centre, School of Psychology, University of Minho, Braga, Portugal."}]}],"member":"179","published-online":{"date-parts":[[2025,9,10]]},"reference":[{"key":"e_1_3_8_2_2","unstructured":"Pew Research Center. Teens technology and romantic relationships. 2015. Available from: https:\/\/www.pewresearch.org\/internet\/2015\/10\/01\/teens-technology-and-romantic-relationships\/"},{"key":"e_1_3_8_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2019.08.018"},{"key":"e_1_3_8_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.06.005"},{"key":"e_1_3_8_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106861"},{"key":"e_1_3_8_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2021.101613"},{"key":"e_1_3_8_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-013-9922-8"},{"key":"e_1_3_8_8_2","doi-asserted-by":"publisher","DOI":"10.7334\/psicothema2022.196"},{"key":"e_1_3_8_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-018-0023-4"},{"key":"e_1_3_8_10_2","doi-asserted-by":"crossref","unstructured":"Vale M Matos M. Technology-facilitated abuse in relationships scale (TAR): Psychometric properties of victimization and perpetration among Portuguese adolescents. J Interpers Violence 2025 (in press).","DOI":"10.1177\/08862605251368832"},{"key":"e_1_3_8_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2020.105921"},{"key":"e_1_3_8_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2017.05.015"},{"key":"e_1_3_8_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2019.104607"},{"key":"e_1_3_8_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2020.105451"},{"key":"e_1_3_8_15_2","doi-asserted-by":"publisher","DOI":"10.1177\/15248380231201816"},{"key":"e_1_3_8_16_2","doi-asserted-by":"publisher","DOI":"10.1037\/tra0001815"},{"key":"e_1_3_8_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23171-6"},{"key":"e_1_3_8_18_2","doi-asserted-by":"publisher","DOI":"10.1177\/15248380221137067"},{"key":"e_1_3_8_19_2","doi-asserted-by":"publisher","DOI":"10.1332\/239868021X16231534981819"},{"key":"e_1_3_8_20_2","doi-asserted-by":"publisher","DOI":"10.1177\/08862605241259005"},{"key":"e_1_3_8_21_2","doi-asserted-by":"publisher","DOI":"10.1037\/vio0000151"},{"key":"e_1_3_8_22_2","doi-asserted-by":"publisher","DOI":"10.1002\/ajcp.12312"},{"key":"e_1_3_8_23_2","doi-asserted-by":"publisher","DOI":"10.1177\/0265407520940415"},{"key":"e_1_3_8_24_2","volume-title":"Australian Institute of Criminology","author":"Flynn A","year":"2022","unstructured":"Flynn A, , Cama E, , Scott AJ. Preventing image-based abuse in Australia: The role of bystanders. In: Australian Institute of Criminology: Canberra ACT Australia; 2022."},{"key":"e_1_3_8_25_2","doi-asserted-by":"publisher","DOI":"10.1002\/pits.22320"},{"key":"e_1_3_8_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.05.037"},{"key":"e_1_3_8_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0149-7634(00)00014-2"},{"key":"e_1_3_8_28_2","doi-asserted-by":"publisher","DOI":"10.1037\/a0034325"},{"key":"e_1_3_8_29_2","doi-asserted-by":"publisher","DOI":"10.1111\/jora.12362"},{"issue":"2","key":"e_1_3_8_30_2","first-page":"244","article-title":"Bystanders \u201capathy\u201d","volume":"57","author":"Latan\u00e9 B","year":"1969","unstructured":"Latan\u00e9 B, , Darley JM. Bystanders \u201capathy\u201d. Am Sci, 1969; 57(2):244\u2013268.","journal-title":"Am Sci"},{"key":"e_1_3_8_31_2","first-page":"125","volume-title":"The transtheoretical model and stages of change. In: Health Behavior: Theory, Research, and Practice","author":"Prochaska JO","year":"2015","unstructured":"Prochaska JO, , Redding CA, , Evers KE. The transtheoretical model and stages of change. In: Health Behavior: Theory, Research, and Practice (Glanz K, , Rimer BK, , Viswanath K. 5th ed.). San Francisco: Jossey-Bass; 2015; pp. 125\u2013148.","edition":"5"},{"key":"e_1_3_8_32_2","first-page":"100059","article-title":"Development and validation of the TAR scale: A measure of technology facilitated abuse in relationships","volume":"3","author":"Brown C","year":"2021","unstructured":"Brown C, , Hegarty K. Development and validation of the TAR scale: A measure of technology facilitated abuse in relationships. Comput Human Behav, 2021; 3:100059; doi: 10.1016\/j.chbr.2021.100059","journal-title":"Comput Human Behav"},{"key":"e_1_3_8_33_2","doi-asserted-by":"publisher","DOI":"10.1017\/SJP.2021.50"},{"issue":"2","key":"e_1_3_8_34_2","first-page":"101","article-title":"ITC guidelines for translating and adapting tests","volume":"18","author":"International Test Commission","year":"2017","unstructured":"International Test Commission. ITC guidelines for translating and adapting tests. Int J Test, 2017; 18(2):101\u2013134; doi: 10.1080\/15305058.2017.1398166","journal-title":"Int J Test"},{"key":"e_1_3_8_35_2","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1988.10478722"},{"key":"e_1_3_8_36_2","volume-title":"Multivariate Data Analysis","author":"Hair JF","year":"2019","unstructured":"Hair JF, , Black WC, , Babin BJ, et al. Multivariate Data Analysis. Eighth edition. Andover, Hampshire: Cengage; 2019."},{"key":"e_1_3_8_37_2","doi-asserted-by":"publisher","DOI":"10.1177\/0011000006288127"},{"key":"e_1_3_8_38_2","volume-title":"An\u00e1lise de Equa\u00e7\u00f5es Estruturais: Fundamentos Te\u00f3ricos, Software e Aplica\u00e7\u00f5es","author":"Mar\u00f4co J","year":"2021","unstructured":"Mar\u00f4co J. An\u00e1lise de Equa\u00e7\u00f5es Estruturais: Fundamentos Te\u00f3ricos, Software e Aplica\u00e7\u00f5es. 3.a Edi\u00e7\u00e3o. P\u00earo Pinheiro: ReportNumber; 2021.","edition":"3"},{"key":"e_1_3_8_39_2","doi-asserted-by":"publisher","DOI":"10.1080\/10705510701301834"},{"key":"e_1_3_8_40_2","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_3_8_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"key":"e_1_3_8_42_2","doi-asserted-by":"publisher","DOI":"10.1111\/bjop.12046"},{"key":"e_1_3_8_43_2","doi-asserted-by":"publisher","DOI":"10.1037\/1040-3590.7.3.309"},{"key":"e_1_3_8_44_2","volume-title":"Psychometric Theory","author":"Nunnally JC","year":"1994","unstructured":"Nunnally JC, , Bernstein IH, (eds). Psychometric Theory. 3rd ed. McGraw-Hill: New York; 1994.","edition":"3"},{"key":"e_1_3_8_45_2","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen J","year":"1988","unstructured":"Cohen J, (ed). Statistical Power Analysis for the Behavioral Sciences. 2nd ed. Lawrence Erlbaum Associates: Hillsdale (NJ); 1988.","edition":"2"},{"key":"e_1_3_8_46_2","unstructured":"R Core Team. (2023). R: A language and environment for statistical computing (Version 4.2.3). [Computer software]. Vienna Austria: R Foundation for Statistical Computing. Available from: https:\/\/www.R-project.org\/"},{"key":"e_1_3_8_47_2","unstructured":"Revelle W. (2025). Psych: Procedures for Psychological Psychometric and Personality Research. Northwestern University Evanston Illinois. Available from: https:\/\/CRAN.R-project.org\/package=psych"},{"key":"e_1_3_8_48_2","unstructured":"O\u2019Connor B. (2024). EFA.dimensions: Exploratory Factor Analysis Functions for Assessing Dimensionality. Available from: https:\/\/CRAN.R-project.org\/package=EFA.dimensions"},{"key":"e_1_3_8_49_2","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v048.i02"},{"key":"e_1_3_8_50_2","unstructured":"Jorgensen TD Pornprasertmanit S Schoemann AM et al. (2025). SemTools: Useful Tools for Structural Equation Modeling. Available from: https:\/\/CRAN.R-project.org\/package=semTools"},{"key":"e_1_3_8_51_2","volume-title":"IBM SPSS Statistics (Version 29.0) [Computer software]","author":"IBM Corp","year":"2022","unstructured":"IBM Corp. IBM SPSS Statistics (Version 29.0) [Computer software]. IBM Corp; 2022."},{"key":"e_1_3_8_52_2","first-page":"886260525131576","article-title":"Analysis of image-based sexual harassment and abuse in adolescents\u2019 socio-affective relationships","author":"Mart\u00ednez Rom\u00e1n R","year":"2025","unstructured":"Mart\u00ednez Rom\u00e1n R, , Lameiras Fern\u00e1ndez M, , Ad\u00e1 Lameiras A, et al. Analysis of image-based sexual harassment and abuse in adolescents\u2019 socio-affective relationships. J Interpers Violence, 2025:8862605251315767; doi: 10.1177\/08862605251315767","journal-title":"J Interpers Violence"},{"key":"e_1_3_8_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.wsif.2022.102615"},{"key":"e_1_3_8_54_2","doi-asserted-by":"publisher","DOI":"10.7870\/cjcmh-2014-002"}],"container-title":["Cyberpsychology, Behavior, and Social Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/21522715251372433","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/21522715251372433","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/21522715251372433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T17:36:01Z","timestamp":1777397761000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/21522715251372433"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":53,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["10.1177\/21522715251372433"],"URL":"https:\/\/doi.org\/10.1177\/21522715251372433","relation":{},"ISSN":["2152-2715","2152-2723"],"issn-type":[{"value":"2152-2715","type":"print"},{"value":"2152-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}