<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">JMIR Pediatr Parent</journal-id><journal-id journal-id-type="publisher-id">pediatrics</journal-id><journal-id journal-id-type="index">30</journal-id><journal-title>JMIR Pediatrics and Parenting</journal-title><abbrev-journal-title>JMIR Pediatr Parent</abbrev-journal-title><issn pub-type="epub">2561-6722</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v8i1e73579</article-id><article-id pub-id-type="doi">10.2196/73579</article-id><article-categories><subj-group subj-group-type="heading"><subject>Viewpoint</subject></subj-group></article-categories><title-group><article-title>Leveraging AI to Investigate Child Maltreatment Text Narratives: Promising Benefits and Addressable Risks</article-title></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name name-style="western"><surname>Lukmanjaya</surname><given-names>Wilson</given-names></name><degrees>BSc</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Butler</surname><given-names>Tony</given-names></name><degrees>BSc, MSc, PhD</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Cox</surname><given-names>Sarah</given-names></name><degrees>BSc, PhD</degrees><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Perez-Concha</surname><given-names>Oscar</given-names></name><degrees>BSc, PhD</degrees><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Bromfield</surname><given-names>Leah</given-names></name><degrees>BSc, PhD</degrees><xref ref-type="aff" rid="aff2">2</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Karystianis</surname><given-names>George</given-names></name><degrees>BSc, MSc, PhD</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib></contrib-group><aff id="aff1"><institution>School of Population Health, University of New South Wales Sydney</institution><addr-line>F25, Samuels Building, Samuel Terry Ave, Kensington</addr-line><addr-line>Sydney</addr-line><country>Australia</country></aff><aff id="aff2"><institution>Australian Center for Child Protection, University of South Australia</institution><addr-line>Adelaide</addr-line><country>Australia</country></aff><aff id="aff3"><institution>Centre for Big Data Resarch in Health, University of New South Wales Sydney</institution><addr-line>Sydney</addr-line><country>Australia</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Badawy</surname><given-names>Sherif</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>Zheng</surname><given-names>ChengDa</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Gillingham</surname><given-names>Philip</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Wilson Lukmanjaya, BSc, School of Population Health, University of New South Wales Sydney, F25, Samuels Building, Samuel Terry Ave, Kensington, Sydney, 2033, Australia, 61 293853136, 61 93136185; <email>w.lukmanjaya@unsw.edu.au</email></corresp></author-notes><pub-date pub-type="collection"><year>2025</year></pub-date><pub-date pub-type="epub"><day>24</day><month>7</month><year>2025</year></pub-date><volume>8</volume><elocation-id>e73579</elocation-id><history><date date-type="received"><day>06</day><month>03</month><year>2025</year></date><date date-type="rev-recd"><day>04</day><month>06</month><year>2025</year></date><date date-type="accepted"><day>16</day><month>06</month><year>2025</year></date></history><copyright-statement>&#x00A9; Wilson Lukmanjaya, Tony Butler, Sarah Cox, Oscar Perez-Concha, Leah Bromfield, George Karystianis. Originally published in JMIR Pediatrics and Parenting (<ext-link ext-link-type="uri" xlink:href="https://pediatrics.jmir.org">https://pediatrics.jmir.org</ext-link>), 24.7.2025. </copyright-statement><copyright-year>2025</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Pediatrics and Parenting, is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://pediatrics.jmir.org">https://pediatrics.jmir.org</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://pediatrics.jmir.org/2025/1/e73579"/><abstract><p>The trove of information contained in child maltreatment narratives represents an opportunity to strengthen the evidence base for policy reform in this area, yet it remains underutilized by researchers and policy makers. Current research into child maltreatment often involves the use of qualitative methodologies or structured survey data that are either too broad or not representative, thereby limiting the development of effective policy responses and intervention strategies. Artificial intelligence (AI) approaches such as large language models (AI models that understand and generate language) can analyze large volumes of child maltreatment narratives by extracting population-level insights on factors of interest such as mental health and treatment needs. However, when applying such methods, it is useful to have a framework on which to base approaches to the data. We propose a seven step framework: (1) data governance; (2) researcher vetting; (3) data deidentification; (4) data access; (5) feasibility testing of baseline methods; (6) large-scale implementation of black box algorithms; and (7) domain expert result validation for such exercises to ensure careful execution and limit the risk of privacy and security breaches, bias, and unreliable conclusions.</p></abstract><kwd-group><kwd>artificial intelligence</kwd><kwd>large language models</kwd><kwd>child maltreatment narratives</kwd><kwd>text mining</kwd><kwd>benefits and risks</kwd><kwd>research framework</kwd></kwd-group></article-meta></front><body><sec id="s1"><title>Smarter Tech, Safer Kids</title><p>The World Health Organization estimates around 1 in 2 children worldwide experience physical, sexual, and emotional abuse and neglect [<xref ref-type="bibr" rid="ref1">1</xref>]. In Australia, the monitoring of child maltreatment (ie, &#x201C;all forms of physical and emotional ill-treatment, sexual abuse, neglect, and exploitation that results in actual or potential harm to the child&#x2019;s health, development or dignity&#x201D; [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref3">3</xref>]) relies on administrative data provided by child protection departments for local and national reporting purposes [<xref ref-type="bibr" rid="ref4">4</xref>-<xref ref-type="bibr" rid="ref6">6</xref>]. However, the structured nature of these data limits the reporting of more nuanced information such as maltreatment types, treatment needs, and mental health, preventing the ability to answer key questions. For example, the 2021 Australian Child Maltreatment Study [<xref ref-type="bibr" rid="ref6">6</xref>] recorded the prevalence of physical abuse and sexual abuse at 32.0% and 28.5%, respectively, whereas the Australian Bureau of Statistics [<xref ref-type="bibr" rid="ref5">5</xref>] in the same year reported that 1 in 7 (14%) children experienced physical and sexual abuse. Several factors contribute to such discrepancies, including the use of different methodologies (eg, self-report, cross-sectional surveys, and surveillance through administrative data), varying definitions of abuse and age ranges, and biases due to the small sample sizes and response rates [<xref ref-type="bibr" rid="ref7">7</xref>-<xref ref-type="bibr" rid="ref9">9</xref>]. While high-level reporting is important, both sources fail to provide a comprehensive picture of child maltreatment necessary for effective policy responses. Characteristics such as uncommon maltreatment subtypes and treatment needs are lacking. Indeed, the Australian Productivity Commission states that &#x201C;with technological developments and advances in analytical techniques, not only is the volume of data being generated and collected growing, but so too is the scope to make use of data in innovative ways in every sphere of life<italic>&#x201D;</italic> [<xref ref-type="bibr" rid="ref10">10</xref>]. Child protection should be no exception to this.</p><p>Research in child maltreatment has predominantly utilized statistical and artificial intelligence (AI) approaches such as artificial neural networks and predictive risk modeling applied to structured child protection administrative data [<xref ref-type="bibr" rid="ref11">11</xref>-<xref ref-type="bibr" rid="ref15">15</xref>]. Studies on health administrative records focused on developing models to predict cases of sexual abuse [<xref ref-type="bibr" rid="ref11">11</xref>], physical abuse [<xref ref-type="bibr" rid="ref12">12</xref>], and overall maltreatment [<xref ref-type="bibr" rid="ref13">13</xref>-<xref ref-type="bibr" rid="ref15">15</xref>], with robust performance. Furthermore, information has been successfully extracted using text mining techniques such as word embeddings, bag-of-words, and feature selection from free-text health notes [<xref ref-type="bibr" rid="ref16">16</xref>-<xref ref-type="bibr" rid="ref19">19</xref>] to detect physical abuse.</p><p>Nevertheless, rarely tapped sources of unstructured information in this area are child maltreatment narratives containing detailed descriptive accounts of incidents or experiences of physical or emotional harm to a child. These document the initial reasons for coming to the attention of authorities (ie, intake report), descriptions of a child&#x2019;s experience of abuse or neglect, psychologists&#x2019; assessments, police and medical records, and a detailed history of child protection involvement. They also describe abuse types, substance use and abuse, recorded injuries, mental and behavioral problems, physical health conditions, parental and family characteristics, and the types and conditions of the accommodation. Utilizing the information contained within the narratives could fill existing knowledge gaps by highlighting less common abusive behaviors (eg, social abuse, coercive control) and enriching definitions and measures of abuse types and mental illnesses [<xref ref-type="bibr" rid="ref20">20</xref>-<xref ref-type="bibr" rid="ref22">22</xref>]. A limited number of studies have used these narratives to automatically extract information. Victor et al [<xref ref-type="bibr" rid="ref23">23</xref>] and Perron et al [<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref25">25</xref>] applied machine learning algorithms such as random forest and k-nearest neighbors on caseworker summaries to identify domestic violence events and opioid-related maltreatment risks, respectively. In addition, Saxena et al [<xref ref-type="bibr" rid="ref26">26</xref>] used topic modeling to explore the concept and definitions of &#x201C;risk&#x201D; on child maltreatment records with promising performance. Despite the advent of newer technologies to conduct text analysis such as large language models (LLMs; AI models that can understand and generate language), limited attempts have been made [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref>] to implement this approach. In particular, Perron et al [<xref ref-type="bibr" rid="ref27">27</xref>] reported an <italic>F</italic><sub>1</sub>-score of 89%&#x2010;95% for their model to classify and extract substance-related problems, while more recently, Stoll et al [<xref ref-type="bibr" rid="ref28">28</xref>] noted their approach to classify maltreatment subtype yielded a superior performance against human reviewers by 10%.</p><p>However, automatically mining information from child maltreatment records faces significant limitations [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref28">28</xref>]. Most importantly, the lack of sufficient training data restricts the AI model&#x2019;s capacity to learn complex patterns [<xref ref-type="bibr" rid="ref29">29</xref>] such as nuanced indicators of abuse. In addition, the limited contextual understanding (even when using LLMs), along with the inconsistencies in narrative style and language, as caseworkers may document&#x2014;or omit&#x2014;events of child maltreatment through various terms, descriptions, and writing style, can lead to inaccurate outputs and falsehoods [<xref ref-type="bibr" rid="ref26">26</xref>]. This is particularly critical when analyzing data related to Indigenous populations requiring a specific cultural lens through which to examine the data. Relying exclusively on one data type (eg, administrative data) can also skew the results and present an inaccurate picture [<xref ref-type="bibr" rid="ref30">30</xref>].</p></sec><sec id="s2"><title>Benefits Versus Risks</title><p>To manually process such voluminous and diverse information is extremely time consuming and not without significant challenges, including a lack of human resources to inspect large scale data and the associated high cost. AI pipelines, particularly applications of LLMs, offer a solution for efficiently processing vast amounts of child maltreatment narratives, comprehending the text for a broader range of tasks (ie, summarization, classification) [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref31">31</xref>], and offering potentially greater quality control due to its standardized approach compared to other (eg, qualitative) methods [<xref ref-type="bibr" rid="ref32">32</xref>]. A primary concern of child protection services is to safeguard and monitor those in their care who may be at risk of maltreatment and neglect. Timely processing of many thousands of cases provides the possibility for professionals and policy makers to make faster decisions (eg, identifying clusters of abuse or mental illness using geographic areas) by predicting the severity of future abuse or allocating resources to high-prevalence communities and intervene earlier. Consequently, new evidence-based protocols for early intervention and prevention can be developed aimed at improving outcomes for children and families.</p><p>While appealing, AI applications come with security risks (eg, malware, data leakage), performance issues (eg, &#x201C;AI hallucinations&#x201D;), technical limitations (eg, black box bias), and ethical conundrums (eg, machine vs human decisions). Hidden malware or malicious code within unvetted AI algorithms with built-in third-party components could result in leaking sensitive information residing in child maltreatment narratives [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. Child protection departments are extremely cautious about providing data access (making this data some of the most difficult to access) as children&#x2019;s data privacy risks could expose them to further harm. When the data involve Indigenous populations, additional cultural considerations for access, governance, and interpretation are required. Even with data access approval, challenges related to narrative data quality, such as data omission, will persist as researchers have limited control over these factors. Cultural and linguistic biases, as well as selection bias in the training data, also pose risks for misinterpretation of findings. In particular, LLM performance can be vulnerable due to &#x201C;hallucinations&#x201D; or misinformation with models generating inaccurate or false conclusions. This is further amplified by black box bias [<xref ref-type="bibr" rid="ref35">35</xref>-<xref ref-type="bibr" rid="ref37">37</xref>], since the decision-making process is not visible or understandable by humans and, therefore, it is hard to conduct any detailed error analysis.</p><p>For these reasons, AI-generated misinformation can have larger implications due to false positives and negatives, fabrication of summarization, and misclassifications. In child maltreatment cases, this could lead to the misidentification of mental health disorders, abuse and neglect misclassification, and unnecessary family separation [<xref ref-type="bibr" rid="ref38">38</xref>-<xref ref-type="bibr" rid="ref42">42</xref>]. Falsehoods could be interpreted as gold standards. Therefore, child maltreatment policies require a decision framework that draws conclusions from both machines and humans, with the final decision relying on human expertise. While some may propose automated approaches can reduce human errors, bias, and the time required to process reports, replacing human decision-making with AI-powered approaches requires ethical protocols to be in place. Relying exclusively on algorithms and their outputs should be discouraged as they lack the complexities and subtleties of human reasoning and decision making [<xref ref-type="bibr" rid="ref43">43</xref>-<xref ref-type="bibr" rid="ref47">47</xref>]. Human judgement needs to take priority over AI outputs [<xref ref-type="bibr" rid="ref48">48</xref>] and adhere to research ethics and legal standards [<xref ref-type="bibr" rid="ref49">49</xref>-<xref ref-type="bibr" rid="ref51">51</xref>]. Machine-made choices bear potentially severe consequences when it comes to enhancing the evidence base and policy translation leading to social injustice and population oversurveillance [<xref ref-type="bibr" rid="ref48">48</xref>]. Considering the inherent risk of biases [<xref ref-type="bibr" rid="ref52">52</xref>,<xref ref-type="bibr" rid="ref53">53</xref>] (ie, underrepresented groups sampling bias) and the cost of hardware requirements, security protocols, and manual code inspection, it is difficult to apply such algorithms widely without the appropriate precautions.</p><p>Risk mitigation strategies are essential to ensure the appropriate application of automated approaches in areas such as child protection. First, using deidentified data and downloadable models from verified sources minimizes the risk of leaking private information. The incorporation of local LLMs could be set up using a virtual machine and offline to prohibit data access and the possibility of reidentifying personal records if information were to be siphoned off through hidden malware. False outcomes could be mitigated through improved quality of input data, further training to improve the model&#x2019;s understanding and designing clear, precise instructions for the model (ie, design prompt) that steer its response towards accurate information [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref48">48</xref>]. Governance infrastructures are also necessary to ensure appropriate handling of such sensitive data and the generated findings, especially if these data involve Indigenous populations, which would require input from key stakeholder groups and people with lived experience to ensure culturally sensitive analysis and interpretation. Finally, pipelines need to have expert-in-the-loop architecture to improve the quality and reliability of results. Ensuring that pipelines powered up by LLMs operate transparently with domain experts&#x2019; input not only protects against biased decision-making but also aligns with efforts to safeguard personal data, as some algorithms can obscure the processes that may compromise fairness and privacy.</p></sec><sec id="s3"><title>Proposed Framework</title><p>Existing research using AI approaches on child maltreatment narratives follows the establishment of the technical pipeline to extract information and obtain data access. Additional steps (eg, governance, data deidentification, researcher vetting) are also required to not only enhance the performance of such approaches but to limit security risks, ensure translatable outputs, and boost public confidence in such approaches. For these reasons, we propose a seven-step framework for processing child maltreatment narratives with LLMs or any black box algorithm: (1) data governance (including cultural considerations where appropriate), (2) researcher vetting, (3) data deidentification, (4) data access, (5) feasibility testing of baseline methods, (6) large-scale implementation of black box algorithms, and (7) domain expert result validation. These steps align with Gillingham&#x2019;s [<xref ref-type="bibr" rid="ref48">48</xref>] principles of algorithmic accountability in social work and existing policy guidelines on AI for children [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref55">55</xref>] that prioritize children&#x2019;s safety, well-being, data privacy, and AI transparency. Although Gillingham&#x2019;s principles are rooted in decision support tools, they are relevant due to the generated results potentially contributing to policy making and translation.</p><p>The seven steps include:</p><list list-type="order"><list-item><p>Data governance: this foundational step focuses on establishing appropriate data governance infrastructures on both the child maltreatment data and the generated outputs. Key stakeholder agencies such as departments of child protection and information and communication technology services along with ethics committees must be engaged before any data analysis takes place. If the data relate to Indigenous populations, it is necessary to include relevant community representatives to ensure the analysis interpretation and dissemination of findings are culturally appropriate and align with Indigenous data sovereignty.</p></list-item><list-item><p>Researcher vetting: researchers need to be vetted (eg, have no track record of criminal activity, have previous experience with handling and analyzing sensitive data, be domestically based) to ensure responsible research, including a working with children government check. Signing a nondisclosure agreement can further minimize potential risks such as data privacy breaches and identity theft.</p></list-item><list-item><p>Data deidentification: as child protection data contains extremely sensitive information (eg, name, addresses, date of birth), to minimize privacy breaches, deidentification of child maltreatment narratives is recommended. Thus, in the unlikely event of data leakage, deidentification ensures that no identifiable information is exposed in the dataset.</p></list-item><list-item><p>Data access: accessing child protection data should be done within the vicinity of child protection agencies who can assign researchers limited access and maintain history logs of accessed or modified documents. Such an approach will ensure transparency and provide the capacity for tracking errors and auditability.</p></list-item><list-item><p>Feasibility testing of baseline methods: conducting a feasibility test before any large-scale implementation is important. Implementing simpler approaches that rely on lexical pattern identification (eg, rule-based) or traditional machine learning algorithms offers a controlled, auditable environment with enhanced security reducing the risk of unintended data exposure, allowing for more interpretability on potential errors (ie, false positives, false negatives) without requiring an extraneous number of resources and costs [<xref ref-type="bibr" rid="ref56">56</xref>].</p></list-item><list-item><p>Large scale implementation of black box algorithms: the implementation of black box approaches or algorithms ensures efficient and effective large-scale processing of voluminous datasets. Evaluation metrics such as precision and recall ensure robust performance and support scalable research to address knowledge gaps in child maltreatment. Models such as LLMs can assist in the contextual understanding and scalability of the research to ultimately narrow the information gap within specific research aims in child maltreatment. These applications can be applied offline through a secure virtual machine environment. Through this approach, child protection organizations can ensure that researchers have no means of extracting and downloading identifiable data without explicit approval from participating governmental departments.</p></list-item><list-item><p>Domain expert result validation: the returned results need to be validated by domain experts in child maltreatment to ensure that the extracted or generated information does not lead to inaccurate or misleading conclusions. This can be done by manually checking a random sample of narratives and conducting interannotator agreement (via metrics such as Cohen &#x03BA; coefficient) between 2 to 3 experts. Disagreements between domain experts regarding claims may require researchers to retrain and re-evaluate their method. This evaluation and validation process will ensure the findings&#x2019; accuracy and relevancy are aligned with ethical standards such as the policy guidance for AI for children [<xref ref-type="bibr" rid="ref54">54</xref>] or transnational frameworks for AI and children&#x2019;s rights and well-being [<xref ref-type="bibr" rid="ref55">55</xref>], ensuring accuracy and fairness and limiting risks of potential harm before being used towards shaping existing or new policies and protocols.</p></list-item></list><p>Our proposed 7-step framework offers a novel research pipeline specific to ethical and secure use of AI in child maltreatment research. By introducing data governance, the inclusion of stakeholders with lived experience and structured deidentification processes and feasibility testing, the framework prioritizes both ethical and cultural safety while promoting analytical rigor. Incorporating domain expert validation further enhances the interpretability, contextual relevance, and ethical soundness of AI outputs&#x2014;elements that are largely absent in the current literature. An illustrative example of a brief case scenario is presented in <xref ref-type="fig" rid="figure1">Figure 1</xref>. While it is understood that the framework may not apply to all contexts&#x2014;given that protocols can vary across countries and may not have Indigenous cultures&#x2014;the core principles are common. Adhering to these principles supports data privacy and cultural sensitivity and helps mitigate the uncaptured context problem and bias mitigation within the field through domain expert result validation [<xref ref-type="bibr" rid="ref57">57</xref>].</p><fig position="float" id="figure1"><label>Figure 1.</label><caption><p>Illustrative example of the proposed 7-step framework for responsible AI use in child maltreatment research. AI: artificial intelligence; ICT: information and communications technology.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="pediatrics_v8i1e73579_fig01.png"/></fig></sec><sec id="s4" sec-type="conclusions"><title>Conclusions</title><p>As the complexity and scale of child maltreatment increases and the volume of information expands, an opportunity exists to apply new and sophisticated approaches that rely on AI to strengthen the evidence base by processing large volumes of narrative data. However, with this opportunity come risks that need to be minimized. The implementation of AI methods, particularly black box methods such as LLMs, should follow a framework of seven key steps&#x2014;(1) data governance, (2) researcher vetting, (3) data deidentification, (4) data access, (5) feasibility testing of baseline methods, (6) large-scale implementation of black box algorithms, and (7) domain expert result validation&#x2014;to ensure culturally sensitive governance, minimization of privacy risks, improvement data analysis, and optimization of AI usability in strengthening the evidence base for child maltreatment. Further research is needed to evaluate the framework&#x2019;s effectiveness and practice to improve policies and lead to better outcomes in child protection.</p></sec></body><back><notes><sec><title>Data Availability</title><p>No generative artificial intelligence was used in any portion of the manuscript generation.</p></sec></notes><fn-group><fn fn-type="con"><p>WL conceived the study and conducted the drafting, literature review, revision, and submission of the manuscript. OP-C, LB, and SC drafted and revised the study. TB helped with the study design, revision, and supervision. GK helped with study conception and design, revision, and supervision.</p></fn><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">AI</term><def><p>artificial intelligence</p></def></def-item><def-item><term id="abb2">LLM</term><def><p>large language model</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hillis</surname><given-names>S</given-names> </name><name name-style="western"><surname>Mercy</surname><given-names>J</given-names> </name><name name-style="western"><surname>Amobi</surname><given-names>A</given-names> </name><name name-style="western"><surname>Kress</surname><given-names>H</given-names> </name></person-group><article-title>Global prevalence of past-year violence against children: a systematic review and minimum estimates</article-title><source>Pediatrics</source><year>2016</year><month>03</month><volume>137</volume><issue>3</issue><fpage>e20154079</fpage><pub-id pub-id-type="doi">10.1542/peds.2015-4079</pub-id><pub-id pub-id-type="medline">26810785</pub-id></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Daley</surname><given-names>SF</given-names> </name><name name-style="western"><surname>Gonzalez</surname><given-names>D</given-names> </name><name name-style="western"><surname>Bethencourt Mirabal</surname><given-names>A</given-names> </name><name name-style="western"><surname>Afzal</surname><given-names>M</given-names> </name></person-group><article-title>Child abuse and neglect</article-title><source>StatPearls</source><year>2025</year><publisher-name>StatPearls Publishing</publisher-name><pub-id pub-id-type="medline">29083602</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="web"><article-title>Child maltreat</article-title><source>World Health Organization</source><year>2024</year><access-date>2025-04-22</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.who.int/news-room/fact-sheets/detail/child-maltreatment">https://www.who.int/news-room/fact-sheets/detail/child-maltreatment</ext-link></comment></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="web"><article-title>Child protection Australia 2021-22</article-title><source>Australian Institute of Health and Welfare</source><year>2023</year><access-date>2024-04-16</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.aihw.gov.au/reports/child-protection/child-protection-australia-2021-22">https://www.aihw.gov.au/reports/child-protection/child-protection-australia-2021-22</ext-link></comment></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="web"><article-title>1 in 7 Australians have experienced childhood abuse</article-title><source>Australian Bureau of Statistics</source><year>2023</year><access-date>2024-04-16</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.abs.gov.au/media-centre/media-releases/1-7-australians-have-experienced-childhood-abuse">https://www.abs.gov.au/media-centre/media-releases/1-7-australians-have-experienced-childhood-abuse</ext-link></comment></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mathews</surname><given-names>B</given-names> </name><name name-style="western"><surname>Pacella</surname><given-names>R</given-names> </name><name name-style="western"><surname>Dunne</surname><given-names>M</given-names> </name><etal/></person-group><article-title>The Australian Child Maltreatment Study (ACMS): protocol for a national survey of the prevalence of child abuse and neglect, associated mental disorders and physical health problems, and burden of disease</article-title><source>BMJ Open</source><year>2021</year><month>05</month><day>11</day><volume>11</volume><issue>5</issue><fpage>e047074</fpage><pub-id pub-id-type="doi">10.1136/bmjopen-2020-047074</pub-id><pub-id pub-id-type="medline">33980529</pub-id></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mathews</surname><given-names>B</given-names> </name><name name-style="western"><surname>Pacella</surname><given-names>R</given-names> </name><name name-style="western"><surname>Scott</surname><given-names>JG</given-names> </name><etal/></person-group><article-title>The prevalence of child maltreatment in Australia: findings from a national survey</article-title><source>Med J Aust</source><year>2023</year><month>04</month><day>3</day><volume>218 Suppl 6</volume><issue>Suppl 6</issue><fpage>S13</fpage><lpage>S18</lpage><pub-id pub-id-type="doi">10.5694/mja2.51873</pub-id><pub-id pub-id-type="medline">37004184</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="web"><article-title>4906055003 - personal safety survey, Australia: user guide, 2016: methodology</article-title><source>Australian Bureau of Statistics</source><year>2017</year><access-date>2025-04-22</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.abs.gov.au/ausstats/abs@.nsf/Lookup/4906.0.55.003main+features222016">https://www.abs.gov.au/ausstats/abs@.nsf/Lookup/4906.0.55.003main+features222016</ext-link></comment></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="web"><article-title>4906.0.55.003 - personal safety survey, Australia: user guide, 2016: response rates</article-title><source>Australian Bureau of Statistics</source><year>2017</year><access-date>2025-04-22</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.abs.gov.au/ausstats/abs@.nsf/Lookup/4906.0.55.003main+features242016">https://www.abs.gov.au/ausstats/abs@.nsf/Lookup/4906.0.55.003main+features242016</ext-link></comment></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="web"><article-title>Data availability and use</article-title><source>Productivity Commission</source><year>2017</year><access-date>2024-04-16</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.pc.gov.au/inquiries/completed/data-access/report/data-access.pdf">https://www.pc.gov.au/inquiries/completed/data-access/report/data-access.pdf</ext-link></comment></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ucuz</surname><given-names>I</given-names> </name><name name-style="western"><surname>Ari</surname><given-names>A</given-names> </name><name name-style="western"><surname>Ozcan</surname><given-names>OO</given-names> </name><name name-style="western"><surname>Topaktas</surname><given-names>O</given-names> </name><name name-style="western"><surname>Sarraf</surname><given-names>M</given-names> </name><name name-style="western"><surname>Dogan</surname><given-names>O</given-names> </name></person-group><article-title>Estimation of the development of depression and PTSD in children exposed to sexual abuse and development of decision support systems by using artificial intelligence</article-title><source>J Child Sex Abus</source><year>2022</year><month>01</month><volume>31</volume><issue>1</issue><fpage>73</fpage><lpage>85</lpage><pub-id pub-id-type="doi">10.1080/10538712.2020.1841350</pub-id><pub-id pub-id-type="medline">33206583</pub-id></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Shahi</surname><given-names>N</given-names> </name><name name-style="western"><surname>Shahi</surname><given-names>AK</given-names> </name><name name-style="western"><surname>Phillips</surname><given-names>R</given-names> </name><name name-style="western"><surname>Shirek</surname><given-names>G</given-names> </name><name name-style="western"><surname>Lindberg</surname><given-names>DM</given-names> </name><name name-style="western"><surname>Moulton</surname><given-names>SL</given-names> </name></person-group><article-title>Using deep learning and natural language processing models to detect child physical abuse</article-title><source>J Pediatr Surg</source><year>2021</year><month>12</month><volume>56</volume><issue>12</issue><fpage>2326</fpage><lpage>2332</lpage><pub-id pub-id-type="doi">10.1016/j.jpedsurg.2021.03.007</pub-id><pub-id pub-id-type="medline">33838900</pub-id></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Vaithianathan</surname><given-names>R</given-names> </name><name name-style="western"><surname>Maloney</surname><given-names>T</given-names> </name><name name-style="western"><surname>Putnam-Hornstein</surname><given-names>E</given-names> </name><name name-style="western"><surname>Jiang</surname><given-names>N</given-names> </name></person-group><article-title>Children in the public benefit system at risk of maltreatment: identification via predictive modeling</article-title><source>Am J Prev Med</source><year>2013</year><month>09</month><volume>45</volume><issue>3</issue><fpage>354</fpage><lpage>359</lpage><pub-id pub-id-type="doi">10.1016/j.amepre.2013.04.022</pub-id><pub-id pub-id-type="medline">23953364</pub-id></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Horikawa</surname><given-names>H</given-names> </name><name name-style="western"><surname>Suguimoto</surname><given-names>SP</given-names> </name><name name-style="western"><surname>Musumari</surname><given-names>PM</given-names> </name><name name-style="western"><surname>Techasrivichien</surname><given-names>T</given-names> </name><name name-style="western"><surname>Ono-Kihara</surname><given-names>M</given-names> </name><name name-style="western"><surname>Kihara</surname><given-names>M</given-names> </name></person-group><article-title>Development of a prediction model for child maltreatment recurrence in Japan: a historical cohort study using data from a Child Guidance Center</article-title><source>Child Abuse Negl</source><year>2016</year><month>09</month><volume>59</volume><fpage>55</fpage><lpage>65</lpage><pub-id pub-id-type="doi">10.1016/j.chiabu.2016.07.008</pub-id><pub-id pub-id-type="medline">27517122</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Choi</surname><given-names>J</given-names> </name><name name-style="western"><surname>Kim</surname><given-names>K</given-names> </name></person-group><article-title>Predictive risk modeling for recurrence of child maltreatment using cases from the National Child Maltreatment Data System in Korea: exploratory data analysis using data mining algorithm</article-title><source>Prev Sci</source><year>2022</year><month>11</month><volume>23</volume><issue>8</issue><fpage>1517</fpage><lpage>1530</lpage><pub-id pub-id-type="doi">10.1007/s11121-022-01446-5</pub-id><pub-id pub-id-type="medline">36251208</pub-id></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Amrit</surname><given-names>C</given-names> </name><name name-style="western"><surname>Paauw</surname><given-names>T</given-names> </name><name name-style="western"><surname>Aly</surname><given-names>R</given-names> </name><name name-style="western"><surname>Lavric</surname><given-names>M</given-names> </name></person-group><article-title>Identifying child abuse through text mining and machine learning</article-title><source>Expert Syst Appl</source><year>2017</year><month>12</month><volume>88</volume><fpage>402</fpage><lpage>418</lpage><pub-id pub-id-type="doi">10.1016/j.eswa.2017.06.035</pub-id></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jadhav</surname><given-names>P</given-names> </name><name name-style="western"><surname>Sears</surname><given-names>T</given-names> </name><name name-style="western"><surname>Floan</surname><given-names>G</given-names> </name><etal/></person-group><article-title>Application of a machine learning algorithm in prediction of abusive head trauma in children</article-title><source>J Pediatr Surg</source><year>2024</year><month>01</month><volume>59</volume><issue>1</issue><fpage>80</fpage><lpage>85</lpage><pub-id pub-id-type="doi">10.1016/j.jpedsurg.2023.09.027</pub-id><pub-id pub-id-type="medline">37858394</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Annapragada</surname><given-names>AV</given-names> </name><name name-style="western"><surname>Donaruma-Kwoh</surname><given-names>MM</given-names> </name><name name-style="western"><surname>Annapragada</surname><given-names>AV</given-names> </name><name name-style="western"><surname>Starosolski</surname><given-names>ZA</given-names> </name></person-group><article-title>A natural language processing and deep learning approach to identify child abuse from pediatric electronic medical records</article-title><source>PLoS ONE</source><year>2021</year><volume>16</volume><issue>2</issue><fpage>e0247404</fpage><pub-id pub-id-type="doi">10.1371/journal.pone.0247404</pub-id><pub-id pub-id-type="medline">33635890</pub-id></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Tiyyagura</surname><given-names>G</given-names> </name><name name-style="western"><surname>Asnes</surname><given-names>AG</given-names> </name><name name-style="western"><surname>Leventhal</surname><given-names>JM</given-names> </name><etal/></person-group><article-title>Development and validation of a natural language processing tool to identify injuries in infants associated with abuse</article-title><source>Acad Pediatr</source><year>2022</year><month>08</month><volume>22</volume><issue>6</issue><fpage>981</fpage><lpage>988</lpage><pub-id pub-id-type="doi">10.1016/j.acap.2021.11.004</pub-id><pub-id pub-id-type="medline">34780997</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Laajasalo</surname><given-names>T</given-names> </name><name name-style="western"><surname>Cowley</surname><given-names>LE</given-names> </name><name name-style="western"><surname>Otterman</surname><given-names>G</given-names> </name><etal/></person-group><article-title>Current issues and challenges in the definition and operationalization of child maltreatment: a scoping review</article-title><source>Child Abuse Negl</source><year>2023</year><month>06</month><volume>140</volume><fpage>106187</fpage><pub-id pub-id-type="doi">10.1016/j.chiabu.2023.106187</pub-id><pub-id pub-id-type="medline">37030235</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Brewsaugh</surname><given-names>K</given-names> </name><name name-style="western"><surname>Holmes</surname><given-names>AK</given-names> </name><name name-style="western"><surname>Richardson</surname><given-names>A</given-names> </name><etal/></person-group><article-title>Research and knowledge gaps in child welfare in the United States: a national survey of agency staff, allied disciplines, tribal leaders, and people who have experienced child welfare</article-title><source>Child Youth Serv Rev</source><year>2022</year><month>07</month><volume>138</volume><fpage>106496</fpage><pub-id pub-id-type="doi">10.1016/j.childyouth.2022.106496</pub-id></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Higgins</surname><given-names>DJ</given-names> </name><name name-style="western"><surname>Mathews</surname><given-names>B</given-names> </name><name name-style="western"><surname>Pacella</surname><given-names>R</given-names> </name><etal/></person-group><article-title>The prevalence and nature of multi-type child maltreatment in Australia</article-title><source>Med J Aust</source><year>2023</year><month>04</month><day>3</day><volume>218 Suppl 6</volume><issue>Suppl 6</issue><fpage>S19</fpage><lpage>S25</lpage><pub-id pub-id-type="doi">10.5694/mja2.51868</pub-id><pub-id pub-id-type="medline">37004183</pub-id></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Victor</surname><given-names>BG</given-names> </name><name name-style="western"><surname>Perron</surname><given-names>BE</given-names> </name><name name-style="western"><surname>Sokol</surname><given-names>RL</given-names> </name><name name-style="western"><surname>Fedina</surname><given-names>L</given-names> </name><name name-style="western"><surname>Ryan</surname><given-names>JP</given-names> </name></person-group><article-title>Automated identification of domestic violence in written child welfare records: leveraging text mining and machine learning to enhance social work research and evaluation</article-title><source>J Soc Social Work Res</source><year>2021</year><month>12</month><day>1</day><volume>12</volume><issue>4</issue><fpage>631</fpage><lpage>655</lpage><pub-id pub-id-type="doi">10.1086/712734</pub-id></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Perron</surname><given-names>BE</given-names> </name><name name-style="western"><surname>Victor</surname><given-names>BG</given-names> </name><name name-style="western"><surname>Bushman</surname><given-names>G</given-names> </name><etal/></person-group><article-title>Detecting substance-related problems in narrative investigation summaries of child abuse and neglect using text mining and machine learning</article-title><source>Child Abuse Negl</source><year>2019</year><month>12</month><volume>98</volume><fpage>104180</fpage><pub-id pub-id-type="doi">10.1016/j.chiabu.2019.104180</pub-id><pub-id pub-id-type="medline">31521909</pub-id></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Perron</surname><given-names>BE</given-names> </name><name name-style="western"><surname>Victor</surname><given-names>BG</given-names> </name><name name-style="western"><surname>Ryan</surname><given-names>JP</given-names> </name><name name-style="western"><surname>Piellusch</surname><given-names>EK</given-names> </name><name name-style="western"><surname>Sokol</surname><given-names>RL</given-names> </name></person-group><article-title>A text-based approach to measuring opioid-related risk among families involved in the child welfare system</article-title><source>Child Abuse Negl</source><year>2022</year><month>09</month><volume>131</volume><fpage>105688</fpage><pub-id pub-id-type="doi">10.1016/j.chiabu.2022.105688</pub-id><pub-id pub-id-type="medline">35687937</pub-id></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Saxena</surname><given-names>D</given-names> </name><name name-style="western"><surname>Moon</surname><given-names>ESY</given-names> </name><name name-style="western"><surname>Chaurasia</surname><given-names>A</given-names> </name><name name-style="western"><surname>Guan</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Guha</surname><given-names>S</given-names> </name></person-group><article-title>Rethinking &#x201C;risk&#x201D; in algorithmic systems through a computational narrative analysis of casenotes in child-welfare</article-title><conf-name>CHI &#x2019;23: CHI Conference on Human Factors in Computing Systems</conf-name><conf-date>Apr 23-28, 2023</conf-date><conf-loc>Hamburg, Germany</conf-loc><pub-id pub-id-type="doi">10.1145/3544548.3581308</pub-id></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Perron</surname><given-names>BE</given-names> </name><name name-style="western"><surname>Luan</surname><given-names>H</given-names> </name><name name-style="western"><surname>Victor</surname><given-names>BG</given-names> </name><name name-style="western"><surname>Hiltz-Perron</surname><given-names>O</given-names> </name><name name-style="western"><surname>Ryan</surname><given-names>J</given-names> </name></person-group><article-title>Moving beyond ChatGPT: local large language models (LLMs) and the secure analysis of confidential unstructured text data in social work research</article-title><source>Res Soc Work Pract</source><year>2024</year><pub-id pub-id-type="doi">10.1177/10497315241280686</pub-id></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Stoll</surname><given-names>D</given-names> </name><name name-style="western"><surname>Wehrli</surname><given-names>S</given-names> </name><name name-style="western"><surname>L&#x00E4;tsch</surname><given-names>D</given-names> </name></person-group><article-title>Case reports unlocked: harnessing large language models to advance research on child maltreatment</article-title><source>Child Abuse Negl</source><year>2025</year><month>02</month><volume>160</volume><fpage>107202</fpage><pub-id pub-id-type="doi">10.1016/j.chiabu.2024.107202</pub-id><pub-id pub-id-type="medline">39689392</pub-id></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hanson</surname><given-names>B</given-names> </name><name name-style="western"><surname>Stall</surname><given-names>S</given-names> </name><name name-style="western"><surname>Cutcher-Gershenfeld</surname><given-names>J</given-names> </name><etal/></person-group><article-title>Garbage in, garbage out: mitigating risks and maximizing benefits of AI in research</article-title><source>Nature New Biol</source><year>2023</year><month>11</month><volume>623</volume><issue>7985</issue><fpage>28</fpage><lpage>31</lpage><pub-id pub-id-type="doi">10.1038/d41586-023-03316-8</pub-id><pub-id pub-id-type="medline">37907636</pub-id></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>van Giffen</surname><given-names>B</given-names> </name><name name-style="western"><surname>Herhausen</surname><given-names>D</given-names> </name><name name-style="western"><surname>Fahse</surname><given-names>T</given-names> </name></person-group><article-title>Overcoming the pitfalls and perils of algorithms: a classification of machine learning biases and mitigation methods</article-title><source>J Bus Res</source><year>2022</year><month>05</month><volume>144</volume><fpage>93</fpage><lpage>106</lpage><pub-id pub-id-type="doi">10.1016/j.jbusres.2022.01.076</pub-id></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Octoman</surname><given-names>O</given-names> </name><name name-style="western"><surname>Cox</surname><given-names>S</given-names> </name><name name-style="western"><surname>Arney</surname><given-names>F</given-names> </name><name name-style="western"><surname>Chong</surname><given-names>A</given-names> </name><name name-style="western"><surname>Tucker</surname><given-names>E</given-names> </name></person-group><article-title>Narrative and fixed&#x2010;field data: are we underestimating the risk of family and domestic violence?</article-title><source>Child Abuse Rev</source><year>2023</year><month>07</month><volume>32</volume><issue>4</issue><fpage>e2811</fpage><pub-id pub-id-type="doi">10.1002/car.2811</pub-id></nlm-citation></ref><ref id="ref32"><label>32</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Taherdoost</surname><given-names>H</given-names> </name></person-group><article-title>What are different research approaches? Comprehensive review of qualitative, quantitative, and mixed method research, their applications, types, and limitations</article-title><source>J Manag Sci Eng Res</source><year>2022</year><volume>5</volume><issue>1</issue><fpage>53</fpage><lpage>63</lpage><pub-id pub-id-type="doi">10.30564/jmser.v5i1.4538</pub-id></nlm-citation></ref><ref id="ref33"><label>33</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Green</surname><given-names>BL</given-names> </name><name name-style="western"><surname>Ayoub</surname><given-names>C</given-names> </name><name name-style="western"><surname>Dym Bartlett</surname><given-names>J</given-names> </name><etal/></person-group><article-title>It&#x2019;s not as simple as it sounds: problems and solutions in accessing and using administrative child welfare data for evaluating the impact of early childhood interventions</article-title><source>Child Youth Serv Rev</source><year>2015</year><month>10</month><volume>57</volume><issue>40-49</issue><fpage>40</fpage><lpage>49</lpage><pub-id pub-id-type="doi">10.1016/j.childyouth.2015.07.015</pub-id><pub-id pub-id-type="medline">26744551</pub-id></nlm-citation></ref><ref id="ref34"><label>34</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Martin</surname><given-names>I</given-names> </name></person-group><article-title>Hackers have uploaded thousands of malicious files to AI&#x2019;s biggest online repository</article-title><source>Forbes</source><year>2024</year><access-date>2025-07-15</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.forbes.com/sites/iainmartin/2024/10/22/hackers-have-uploaded-thousands-of-malicious-models-to-ais-biggest-online-repository/">https://www.forbes.com/sites/iainmartin/2024/10/22/hackers-have-uploaded-thousands-of-malicious-models-to-ais-biggest-online-repository/</ext-link></comment></nlm-citation></ref><ref id="ref35"><label>35</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Lupariello</surname><given-names>F</given-names> </name><name name-style="western"><surname>Sussetto</surname><given-names>L</given-names> </name><name name-style="western"><surname>Di Trani</surname><given-names>S</given-names> </name><name name-style="western"><surname>Di Vella</surname><given-names>G</given-names> </name></person-group><article-title>Artificial intelligence and child abuse and neglect: a systematic review</article-title><source>Children (Basel)</source><year>2023</year><month>10</month><day>6</day><volume>10</volume><issue>10</issue><fpage>1659</fpage><pub-id pub-id-type="doi">10.3390/children10101659</pub-id><pub-id pub-id-type="medline">37892322</pub-id></nlm-citation></ref><ref id="ref36"><label>36</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Cohen</surname><given-names>D</given-names> </name></person-group><article-title>Data scientists targeted by malicious hugging face ML models with silent backdoor</article-title><source>JFrog</source><year>2024</year><access-date>2025-07-15</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://jfrog.com/blog/data-scientists-targeted-by-malicious-hugging-face-ml-models-with-silent-backdoor/">https://jfrog.com/blog/data-scientists-targeted-by-malicious-hugging-face-ml-models-with-silent-backdoor/</ext-link></comment></nlm-citation></ref><ref id="ref37"><label>37</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Fluke</surname><given-names>JD</given-names> </name><name name-style="western"><surname>Tonmyr</surname><given-names>L</given-names> </name><name name-style="western"><surname>Gray</surname><given-names>J</given-names> </name><etal/></person-group><article-title>Child maltreatment data: a summary of progress, prospects and challenges</article-title><source>Child Abuse Negl</source><year>2021</year><month>09</month><volume>119</volume><issue>Pt 1</issue><fpage>104650</fpage><pub-id pub-id-type="doi">10.1016/j.chiabu.2020.104650</pub-id><pub-id pub-id-type="medline">32861435</pub-id></nlm-citation></ref><ref id="ref38"><label>38</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zhou</surname><given-names>J</given-names> </name><name name-style="western"><surname>Zhang</surname><given-names>J</given-names> </name><name name-style="western"><surname>Wan</surname><given-names>R</given-names> </name><etal/></person-group><article-title>Integrating AI into clinical education: evaluating general practice trainees&#x2019; proficiency in distinguishing AI-generated hallucinations and impacting factors</article-title><source>BMC Med Educ</source><year>2025</year><month>03</month><day>19</day><volume>25</volume><issue>1</issue><fpage>406</fpage><pub-id pub-id-type="doi">10.1186/s12909-025-06916-2</pub-id><pub-id pub-id-type="medline">40108629</pub-id></nlm-citation></ref><ref id="ref39"><label>39</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hatem</surname><given-names>R</given-names> </name><name name-style="western"><surname>Simmons</surname><given-names>B</given-names> </name><name name-style="western"><surname>Thornton</surname><given-names>JE</given-names> </name></person-group><article-title>A call to address AI &#x201C;hallucinations&#x201D; and how healthcare professionals can mitigate their risks</article-title><source>Cureus</source><year>2023</year><month>09</month><volume>15</volume><issue>9</issue><fpage>e44720</fpage><pub-id pub-id-type="doi">10.7759/cureus.44720</pub-id><pub-id pub-id-type="medline">37809168</pub-id></nlm-citation></ref><ref id="ref40"><label>40</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Evans</surname><given-names>H</given-names> </name><name name-style="western"><surname>Snead</surname><given-names>D</given-names> </name></person-group><article-title>Understanding the errors made by artificial intelligence algorithms in histopathology in terms of patient impact</article-title><source>NPJ Digit Med</source><year>2024</year><month>04</month><day>10</day><volume>7</volume><issue>1</issue><fpage>89</fpage><pub-id pub-id-type="doi">10.1038/s41746-024-01093-w</pub-id><pub-id pub-id-type="medline">38600151</pub-id></nlm-citation></ref><ref id="ref41"><label>41</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hart</surname><given-names>LC</given-names> </name><name name-style="western"><surname>Viswanathan</surname><given-names>M</given-names> </name><name name-style="western"><surname>Nicholson</surname><given-names>WK</given-names> </name><etal/></person-group><article-title>Evidence from the USPSTF and new approaches to evaluate interventions to prevent child maltreatment</article-title><source>JAMA Netw Open</source><year>2024</year><month>07</month><day>1</day><volume>7</volume><issue>7</issue><fpage>e2420591</fpage><pub-id pub-id-type="doi">10.1001/jamanetworkopen.2024.20591</pub-id><pub-id pub-id-type="medline">38976263</pub-id></nlm-citation></ref><ref id="ref42"><label>42</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Timmons</surname><given-names>AC</given-names> </name><name name-style="western"><surname>Duong</surname><given-names>JB</given-names> </name><name name-style="western"><surname>Simo Fiallo</surname><given-names>N</given-names> </name><etal/></person-group><article-title>A call to action on assessing and mitigating bias in artificial intelligence applications for mental health</article-title><source>Perspect Psychol Sci</source><year>2023</year><month>09</month><volume>18</volume><issue>5</issue><fpage>1062</fpage><lpage>1096</lpage><pub-id pub-id-type="doi">10.1177/17456916221134490</pub-id><pub-id pub-id-type="medline">36490369</pub-id></nlm-citation></ref><ref id="ref43"><label>43</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gillingham</surname><given-names>P</given-names> </name></person-group><article-title>Predictive risk modelling to prevent child maltreatment and other adverse outcomes for service users: inside the &#x201C;black box&#x201D; of machine learning</article-title><source>Br J Soc Work</source><year>2016</year><month>06</month><volume>46</volume><issue>4</issue><fpage>1044</fpage><lpage>1058</lpage><pub-id pub-id-type="doi">10.1093/bjsw/bcv031</pub-id><pub-id pub-id-type="medline">27559213</pub-id></nlm-citation></ref><ref id="ref44"><label>44</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Schoech</surname><given-names>D</given-names> </name><name name-style="western"><surname>Jennings</surname><given-names>H</given-names> </name><name name-style="western"><surname>Schkade</surname><given-names>LL</given-names> </name><name name-style="western"><surname>Hooper-Russell</surname><given-names>C</given-names> </name></person-group><article-title>Expert systems: artificial intelligence for professional decisions</article-title><source>Comput Hum Serv</source><year>1985</year><volume>1</volume><issue>1</issue><fpage>81</fpage><lpage>115</lpage><pub-id pub-id-type="doi">10.1300/J407v01n01_06</pub-id></nlm-citation></ref><ref id="ref45"><label>45</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hussey</surname><given-names>JM</given-names> </name><name name-style="western"><surname>Marshall</surname><given-names>JM</given-names> </name><name name-style="western"><surname>English</surname><given-names>DJ</given-names> </name><etal/></person-group><article-title>Defining maltreatment according to substantiation: distinction without a difference?</article-title><source>Child Abuse Negl</source><year>2005</year><month>05</month><volume>29</volume><issue>5</issue><fpage>479</fpage><lpage>492</lpage><pub-id pub-id-type="doi">10.1016/j.chiabu.2003.12.005</pub-id><pub-id pub-id-type="medline">15970321</pub-id></nlm-citation></ref><ref id="ref46"><label>46</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Jent</surname><given-names>JF</given-names> </name><name name-style="western"><surname>Eaton</surname><given-names>CK</given-names> </name><name name-style="western"><surname>Knickerbocker</surname><given-names>L</given-names> </name><name name-style="western"><surname>Lambert</surname><given-names>WF</given-names> </name><name name-style="western"><surname>Merrick</surname><given-names>MT</given-names> </name><name name-style="western"><surname>Dandes</surname><given-names>SK</given-names> </name></person-group><article-title>Multidisciplinary child protection decision making about physical abuse: determining substantiation thresholds and biases</article-title><source>Child Youth Serv Rev</source><year>2011</year><month>09</month><day>1</day><volume>33</volume><issue>9</issue><fpage>1673</fpage><lpage>1682</lpage><pub-id pub-id-type="doi">10.1016/j.childyouth.2011.04.029</pub-id><pub-id pub-id-type="medline">21804681</pub-id></nlm-citation></ref><ref id="ref47"><label>47</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Manion</surname><given-names>K</given-names> </name><name name-style="western"><surname>Renwick</surname><given-names>J</given-names> </name></person-group><article-title>Equivocating over the care and protection continuum: an exploration of families not meeting the threshold for statutory intervention</article-title><source>Soc Policy J N Z</source><year>2008</year><access-date>2025-07-15</access-date><volume>33</volume><issue>70</issue><fpage>94</fpage><comment><ext-link ext-link-type="uri" xlink:href="https://www.thefreelibrary.com/Equivocating+over+the+care+and+protection+continuum%3A+an+exploration...-a0181897147">https://www.thefreelibrary.com/Equivocating+over+the+care+and+protection+continuum%3A+an+exploration...-a0181897147</ext-link></comment></nlm-citation></ref><ref id="ref48"><label>48</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Gillingham</surname><given-names>P</given-names> </name></person-group><article-title>Decision support systems, social justice and algorithmic accountability in social work: a new challenge</article-title><source>Practice (Birm)</source><year>2019</year><month>08</month><day>8</day><volume>31</volume><issue>4</issue><fpage>277</fpage><lpage>290</lpage><pub-id pub-id-type="doi">10.1080/09503153.2019.1575954</pub-id></nlm-citation></ref><ref id="ref49"><label>49</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hagendorff</surname><given-names>T</given-names> </name></person-group><article-title>The ethics of AI ethics: an evaluation of guidelines</article-title><source>Minds &#x0026; Machines</source><year>2020</year><month>03</month><volume>30</volume><issue>1</issue><fpage>99</fpage><lpage>120</lpage><pub-id pub-id-type="doi">10.1007/s11023-020-09517-8</pub-id></nlm-citation></ref><ref id="ref50"><label>50</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Shaw</surname><given-names>J</given-names> </name><name name-style="western"><surname>Ali</surname><given-names>J</given-names> </name><name name-style="western"><surname>Atuire</surname><given-names>CA</given-names> </name><etal/></person-group><article-title>Research ethics and artificial intelligence for global health: perspectives from the global forum on bioethics in research</article-title><source>BMC Med Ethics</source><year>2024</year><month>04</month><day>18</day><volume>25</volume><issue>1</issue><fpage>46</fpage><pub-id pub-id-type="doi">10.1186/s12910-024-01044-w</pub-id><pub-id pub-id-type="medline">38637857</pub-id></nlm-citation></ref><ref id="ref51"><label>51</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Qadhi</surname><given-names>SM</given-names> </name><name name-style="western"><surname>Alduais</surname><given-names>A</given-names> </name><name name-style="western"><surname>Chaaban</surname><given-names>Y</given-names> </name><name name-style="western"><surname>Khraisheh</surname><given-names>M</given-names> </name></person-group><article-title>Generative AI, research ethics, and higher education research: insights from a scientometric analysis</article-title><source>Information</source><year>2024</year><volume>15</volume><issue>6</issue><fpage>325</fpage><pub-id pub-id-type="doi">10.3390/info15060325</pub-id></nlm-citation></ref><ref id="ref52"><label>52</label><nlm-citation citation-type="other"><person-group person-group-type="author"><name name-style="western"><surname>Beatty</surname><given-names>D</given-names> </name><name name-style="western"><surname>Masanthia</surname><given-names>K</given-names> </name><name name-style="western"><surname>Kaphol</surname><given-names>T</given-names> </name><name name-style="western"><surname>Sethi</surname><given-names>N</given-names> </name></person-group><article-title>Revealing hidden bias in AI: lessons from large language models</article-title><source>arXiv</source><comment>Preprint posted online on  Oct 22, 2024</comment><pub-id pub-id-type="doi">10.48550/arXiv.2410.16927</pub-id></nlm-citation></ref><ref id="ref53"><label>53</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Holdsworth</surname><given-names>J</given-names> </name></person-group><article-title>What is AI bias?</article-title><source>IBM</source><year>2023</year><access-date>2025-07-18</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.ibm.com/think/topics/ai-bias">https://www.ibm.com/think/topics/ai-bias</ext-link></comment></nlm-citation></ref><ref id="ref54"><label>54</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Dignum</surname><given-names>V</given-names> </name><name name-style="western"><surname>Penagos</surname><given-names>M</given-names> </name><name name-style="western"><surname>Pigmans</surname><given-names>K</given-names> </name><name name-style="western"><surname>Vosloo</surname><given-names>S</given-names> </name></person-group><article-title>Policy guidance on AI for children</article-title><source>UNICEF Innocenti</source><access-date>2025-04-22</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.unicef.org/innocenti/reports/policy-guidance-ai-children">https://www.unicef.org/innocenti/reports/policy-guidance-ai-children</ext-link></comment></nlm-citation></ref><ref id="ref55"><label>55</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Mahomed</surname><given-names>S</given-names> </name><name name-style="western"><surname>Aitken</surname><given-names>M</given-names> </name><name name-style="western"><surname>Atabey</surname><given-names>A</given-names> </name><name name-style="western"><surname>Wong</surname><given-names>J</given-names> </name><name name-style="western"><surname>Briggs</surname><given-names>M</given-names> </name></person-group><article-title>AI, children&#x2019;s rights, &#x0026; wellbeing: transnational frameworks</article-title><source>The Alan Turing Institute</source><year>2023</year><access-date>2025-04-22</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.turing.ac.uk/sites/default/files/2023-12/ai-childrens_rights-_wellbeing-transnational_frameworks_report.pdf">https://www.turing.ac.uk/sites/default/files/2023-12/ai-childrens_rights-_wellbeing-transnational_frameworks_report.pdf</ext-link></comment></nlm-citation></ref><ref id="ref56"><label>56</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Karystianis</surname><given-names>G</given-names> </name><name name-style="western"><surname>Adily</surname><given-names>A</given-names> </name><name name-style="western"><surname>Schofield</surname><given-names>PW</given-names> </name><etal/></person-group><article-title>Surveillance of domestic violence using text mining outputs from Australian police records</article-title><source>Front Psychiatry</source><year>2021</year><volume>12</volume><fpage>787792</fpage><pub-id pub-id-type="doi">10.3389/fpsyt.2021.787792</pub-id><pub-id pub-id-type="medline">35222105</pub-id></nlm-citation></ref><ref id="ref57"><label>57</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Bhattacharya</surname><given-names>A</given-names> </name><name name-style="western"><surname>Stumpf</surname><given-names>S</given-names> </name><name name-style="western"><surname>De Croon</surname><given-names>R</given-names> </name><name name-style="western"><surname>Verbert</surname><given-names>K</given-names> </name></person-group><article-title>Explanatory debiasing: involving domain experts in the data generation process to mitigate representation bias in AI systems</article-title><conf-name>CHI 2025: CHI Conference on Human Factors in Computing Systems</conf-name><conf-date>Apr 26 to May 1, 2025</conf-date><conf-loc>Yokohama, Japan</conf-loc><pub-id pub-id-type="doi">10.1145/3706598.3713497</pub-id></nlm-citation></ref></ref-list></back></article>