Next Article in Journal
Decoding the Generational Digital Divide: Profiles and Predictors of Grandparents’ Attitudes Toward Young Children’s Technology Use
Previous Article in Journal
Effects of Painting-Based Art Interventions on Mental Health Outcomes: A Meta-Analysis of Randomized Controlled Trials
Previous Article in Special Issue
Sexual Harassment and Gender-Based Harassment Among Teaching and Research Staff at a Public University in Northwestern Spain: Prevalence and Predictors
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Preventing Sexual Violence Against Adolescent Girls: Psychometric Validation of the EDR-ESIA Screening Instrument for Early Detection of Exploitation Risk

1
Department of Pedagogy and Specific Didactics, Faculty of Education, University of Balearic Islands, 07122 Palma de Mallorca, Spain
2
Paola Bully Methodological and Statistical Consultancy, 48071 Bilbao, Spain
3
Department of Developmental and Educational Psychology, Faculty of Education, University of the Basque Country (UPV/EHU), 48940 Leioa, Spain
*
Author to whom correspondence should be addressed.
Behav. Sci. 2026, 16(5), 831; https://doi.org/10.3390/bs16050831 (registering DOI)
Submission received: 9 February 2026 / Revised: 28 March 2026 / Accepted: 13 May 2026 / Published: 21 May 2026

Abstract

Sexual violence against women frequently originates during adolescence, when structural inequalities and gendered power dynamics heighten vulnerability, making early identification of risk factors essential to prevent trajectories leading to sexual exploitation. This study presents the psychometric validation of the EDR-ESIA, a screening instrument designed to detect vulnerability to Child Sexual Exploitation (CSE) in healthcare, education, and social care settings, with particular relevance for prevention strategies targeting adolescent girls. The sample comprised 199 adolescents aged 11–17 years (M = 15.23; SD = 1.59) residing in Spain (58.8% female, 40.2% male, 1.0% unspecified), assessed by trained professionals using case records and reports. The 88-item instrument underwent expert review and pilot testing prior to validation, and its internal structure was examined using Partial Least Squares Structural Equation Modeling (PLS-SEM). The results indicated that all subdimensions and higher-order constructs showed an adequate fit to the theoretical model, supporting the instrument’s validity. Female adolescents scored significantly higher than males on CSE target indicators, reflecting a medium-to-large gender difference in vulnerability levels. Overall, the EDR-ESIA constitutes an evidence-based instrument for the timely recognition of CSE vulnerability, supporting prevention, education, and intervention efforts aimed at reducing sexual violence against women from early developmental stages.

1. Introduction

Child sexual exploitation (CSE) happens when an individual or group takes advantage of a power imbalance to coerce, manipulate, or trick children or adolescents into performing a sexual activity in exchange for something the victim needs or wants, producing economic profit, privileges, or other advantages for the exploiter (ECPAT Interagency Working Group, 2016; Laird et al., 2023). There may be sexual exploitation even if the sexual activity seems to be consensual. CSE does not always involve physical contact; it may also occur with the use of technology (as is the case with pornography and Livestreaming Technology for Child Sexual Exploitation and Abuse, amongst others) (Finkelhor et al., 2023; Joleby et al., 2021; Lu et al., 2024).
CSE constitutes a serious violation of children’s rights, defined as “sexual abuse committed by the adult and remuneration in cash or kind to the child or a third person or persons” (Stockholm, 1996). This type of sexual victimisation, recognised as one of the most damaging public health problems (Engelmann et al., 2025; Greenbaum, 2020; World Health Organization, 2017), has gained prominence on the international and European political agenda. Spanish legislation, particularly Organic Law 8/2021, of 4 June, on the comprehensive protection of children and adolescents against violence (LOPIVI, 2021), explicitly addresses CSE as a type of violence that requires a comprehensive response.
The consequences of CSE have been well documented. The aftereffects of CSE tend to manifest themselves through symptoms at the behavioural, physical, psychological, social, and sexual level (Fredlund et al., 2013; Jackson, 2014; Pedersen & Hegna, 2003; Perry et al., 2022). The seriousness of these aftereffects is conditioned by a series of mediating variables such as a greater level of social stigma; difficulties in coping skills; a higher number, frequency, duration, and consequences of traumatic events; etc. The aftereffects of CSE have been linked to low self-esteem, a greater risk of re-victimisation, emotional dysregulation, and dysfunctional coping skills in adulthood, including substance use; they can be devastating and last a lifetime (Caffo et al., 2021; Benavente & Pereda, 2026). Evidence suggests that girls are more likely to develop internalizing symptoms (e.g., depression, anxiety), while boys may present externalizing behaviours (e.g., aggression, delinquency), which requires tailoring prevention and intervention strategies accordingly (Gauthier-Duchesne et al., 2017; Levkovich et al., 2025).
CSE, as a form of sexual violence against children and adolescents, presents particular and differential characteristics that define it as a multicausal and complex social problem that violates children’s right to protection and safety (Pereda et al., 2021; Benavente et al., 2024).
In the European context, the process of victim recruitment has been identified as differing from the methods prevalent in international networks of human smuggling and trafficking, where kidnapping, violence, and threats predominate. In Europe, however, it is based on the concept of exchange, as reported by Pereda et al. (2022). This exchange process arises from an imbalance of power that forces the victim to silence, generating a perception of responsibility and consensual participation in a sexual relationship (Laird et al., 2023). It is crucial to underline that not all cases involve victims being displaced to other areas or regions; instead, exploitation tends to take place in the same area where the victims and their exploiters—who do not always have links to organised crime—live (Greenbaum, 2018). This approach highlights the complexity and lack of uniformity in the modus operandi of child sexual exploitation in the European context. The prevalence of CSE in Europe stands at 1–2.5% for girls and 1–2.1% for boys, who have reported in different studies to have “traded with their sex” (Averdijk et al., 2019; Fredlund et al., 2013, 2018; Pedersen & Hegna, 2003). These percentages undergo a marked increase when referring to adolescents who live in protection institutions, reaching 17.4% in Spain (Pereda et al., 2023) and 24.4% in the United Kingdom (Lerpiniere et al., 2013). This underscores the notable vulnerability of this group, despite being scarcely studied.
From a perspective of gender, CSE has been evidenced to affect both boys and girls, defying previous stereotypes (Benavente et al., 2022b). Notwithstanding, recent studies suggest that the percentage of male victims could be underestimated, posing the possibility that boys might have greater difficulties in recognising themselves or being recognised as victims (ECPAT International, 2021; Josenhans et al., 2020; Madigan et al., 2018; Øien et al., 2025; UNICEF, 2020).
Sexual exploitation has also found new channels through Information and Communication Technologies (ICT), with the Internet as the space most used by perpetrators to recruit victims (Baird & Connolly, 2023; EUROPOL, 2020, 2025; Finkelhor et al., 2024). In fact, it can be used in a variety of ways by people with a sexual interest in children and adolescents; for instance, to make and distribute pornography, to recruit children and adolescents online, or to engage in or promote sexual relationships with children and adolescents (Ballester et al., 2020, 2022). Recently, the terms IBSA and IBSE have been proposed to refer to technology-facilitated image-based sexual abuse/exploitation, given the growing evidence of the prominent role that Internet technologies have in the growth of sexual abuse and of sexual exploitation aimed at the production of images and at the production of pornography (Ali et al., 2023; Finkelhor et al., 2023), by incorporating any technological novelty, such as, lately, Generative Artificial Intelligence or Livestreaming Technology and Online Child Sexual Exploitation and Abuse (Dorotic & Johnsen, 2023; Drejer et al., 2024). These diverse ways in which the pornographic industry is taking advantage of sexual images have increased the situations of sexual exploitation directed towards the production of exploitation images, as has been revealed in an evaluation of international studies (Weprotect, 2023; Pereda & Águila-Otero, 2026). Girls, in particular, are more frequently targeted through online grooming and image-based exploitation, reflecting broader patterns of sexual violence that disproportionately affect women and adolescent girls (de Santisteban & Gámez-Guadix, 2018; Mármol et al., 2025).
Precise knowledge of this phenomenon, including its indicators and risk factors, is crucial in order to prevent, identify, and effectively tackle CSE (Barnert et al., 2022; Benavente & Pereda, 2026). Further, the training of professionals is fundamental for early detection and adequate intervention, reducing the risk of secondary victimisation (Brady, 2018; Walsh et al., 2022). In this line, the effective fight against CSE requires not only awareness of the issue, but also the necessary willingness and knowledge to act in an effective way.
Although it is true that no child or adolescent is exempt from being a victim of CSE, certain experiences, situations, and contexts in the life of minors are linked to an increase in the risk of suffering this form of exploitation (Barnert et al., 2017; Pereda et al., 2025). It is essential to highlight the fact that there is no one single factor that can explain the risk of a minor’s involvement in CSE. Hence, it is imperative to understand the diverse factors that could have contributed to the minor becoming involved in this situation (Laird et al., 2023).
The importance of having effective tools and instruments for the detection of risk by professionals becomes evident in this context (Greenbaum, 2020; Weston & Mythen, 2023). These tools must be sensitive enough to identify the life experiences, situations, and contexts that could increase the risk of sexual exploitation. Likewise, the complexity of the factors that contribute to minors becoming involved in CSE must be addressed (Franchino-Olsen, 2021; Laird et al., 2023). In order to ensure the adequate implementation of these tools, it is essential to provide specialised training to professionals. This training not only guarantees the correct use of the instruments, but also boosts the in-depth understanding of the risk indicators, thereby strengthening the ability of professionals to intervene in an effective way and to protect vulnerable children and adolescents (Basson, 2017; Benavente et al., 2024).
In the last few years, various screening tools have been developed to help professionals in the identification of minors who are victims of or at risk of CSE; systematic reviews of instruments have even been conducted (Armstrong, 2017; Benavente et al., 2024; Interiano-Shiverdecker et al., 2022; Romero et al., 2021). Nonetheless, most of these tools were conceived in the United Kingdom and the United States of America, and the only one designed and validated in Spain is the Tool for the Detection of the Risk of Child Sexual Exploitation (EDR-ESIA) (Benavente et al., 2022a, 2024).
Basson et al. (2012) highlight that 75% of young individuals affected by commercial sexual exploitation face years of ongoing abuse before any intervention takes place, underscoring the importance of tools that facilitate decision-making for professionals. These tools enable them to assess the level of intervention required, based on whether the indicators suggest that the minor is at risk of being, or may already be, sexually exploited (Panlilio et al., 2022).
Despite their potential usefulness, it must be noted that very few of these tools have been subjected to a rigorous evaluation of their metric properties (Benavente et al., 2024). This lack of scientific evidence compromises the validity and reliability of their proper functioning in practice. In this sense, the lack of studies supporting the efficacy and accuracy of these tools raises questions as to their generalised application and highlights the urgent need to carry out rigorous evaluations to validate their usefulness and efficacy in the detection and evaluation of the risk of CSE, in a range of contexts and populations (Benavente et al., 2024). Recent studies, such as the one by Lu et al. (2024), continue to emphasize the need to improve metrics for conducting prevalence studies using well-established instruments with an operational definition. This enhancement would contribute to greater clarity in establishing consistent metrics. Given the documented gender differences in vulnerability, instruments such as the EDR-ESIA are crucial for equipping professionals with tools that can capture both common and gender-specific risk indicators of sexual exploitation.
In order to facilitate early detection and evaluation of CSE and how to approach it in the early stages of detection, it is key to provide professionals with reliable and valid instruments that will enable the detection of the factors associated with CSE. For this purpose, the main aim of this study was to analyse the psychometric properties of the EDR-ESIA, the previously designed screening instrument, which is considered the most comprehensive tool for detecting child and adolescent sexual exploitation in the Spanish population. (Benavente et al., 2022a, 2024). This instrument is based on a victim-centered approach, as proposed by Dixon (2024), but also includes others who may become victims (potential victims), following a universal prevention approach.
The primary hypothesis for the validation of the EDR-ESIA tool can be summarized into four key points:
Theoretical Model Fit: The internal structure of the EDR-ESIA—comprising target indicators, three levels of risk (significant, moderate, and other), and family/personal vulnerabilities—would show an adequate statistical fit to a theoretical model of Child Sexual Exploitation (CSE) risk.
Dimensional Contribution to Total Risk: That each subdimension (Target Indicators, Severe Risk, etc.) would make a meaningful and significant contribution to the higher-order construct of “CSE TOTAL RISK”. This was tested using Partial Least Squares Structural Equation Modeling (PLS-SEM) to see how well these factors predicted overall vulnerability.
Sensitivity to Gender Differences: Given that the tool integrates a gender perspective, the researchers hypothesized that it would identify statistically significant differences between sexes, specifically expecting female adolescents to show higher levels of vulnerability and higher scores in target indicators compared to males.
Psychometric Stability: The study operated on the premise that the formative indicators (situational observations) would remain reliable and valid across different groups (such as different ages and sexes), providing a stable framework for professionals to use in primary care settings.

2. Methods

2.1. Participants

The inclusion criteria defined for professionals were as follows: (1) Being a health or social care professional in either public or private institutions (doctors, nurses, social workers, psychologists, and other health care and social services professionals) or a member of the security forces (police officers and members of other security forces who work in the protection and defence of minors). (2) Having experience and direct contact with minors at risk of child sexual exploitation. This contact might be through direct interventions, prevention schemes, investigation of cases, or provision of support and rehabilitation services. (3) Having participated in training for the identification, prevention and intervention in cases of child sexual exploitation using the EDR-ESIA tool.
After meeting the inclusion criteria, professionals were invited to participate and provided informed consent prior to completing the questionnaire. Participants were informed that the data should be reported based on existing case records and that no identifying information about minors would be collected.
In order to ensure the integrity and validity of the results of the study (Shadish et al., 2002; Engelmann et al., 2025), the following exclusion criteria were designed: (1) professionals who had had no direct contact with minors in a situation of vulnerability or whose experience was limited to administrative or indirect functions with no direct intervention with boys, girls, and teenagers; (2) professionals with fewer than two years of experience in roles related to the care, protection, or safety of minors; and (3) participants who might have conflicts of interest that could compromise the objectivity of the data, such as financial ties or personal relationships with potential study subjects.
In order to ensure diversity and inclusiveness in the sample (Benavente et al., 2021), the selection criteria for minors at risk of sexual exploitation upon whom to report information for this study were: (1) Being between 11 and 17 years old; (2) Being under the supervision or protection of social services, foster homes, shelters, or child protection programmes; and (3) Being identified by authorities, social services, schools, or health professionals as a vulnerable population. To ensure the validity and ethics of the study, the following exclusion criteria were defined: (1) Not having been formally identified by professionals or the competent authorities as actually being at risk of sexual exploitation; (2) Being under 11 or over 17 years old; and (3) People whose participation in the study might place them at additional risk of victimisation or reprisals; situations in which participation in the study might compromise their personal safety or that of their family.
Out of the 325 times the tool was started through the online questionnaire, 73 were abandoned and 252 were completed, which represents a response rate of 77.54%. It was decided to exclude from the study the data of 51 individuals: 18 cases (7.1%) with missing responses to all 13 target indicators, two cases (0.01%) classified as factitious responses, and 33 cases (13.09%) where the participants’ age exceeded the established limit.
To assess the adequacy of the sample size, we conducted a sensitivity power analysis for the most complex endogenous construct in the model (five predictors). The results showed that, with N = 199, α = 0.05, and power = 0.80, the model was able to detect effects as small as f2 = 0.066. This indicates that the available sample size was sufficient to detect small-to-moderate effects. To evaluate the stability of the model, we conducted a bootstrap validation procedure with 5000 resamples across the multiply imputed datasets. The bootstrap results showed highly stable path estimates across resamples and imputations. All structural path coefficients remained significant, and the 95% confidence intervals consistently excluded zero. These findings support the robustness of the model despite the moderate sample size.
The 199 adolescents who finally made up the sample were between 11 and 17 years old (M = 15.23; SD = 1.59). Their sociodemographic characteristics can be observed in the following table (Table 1):
Of the sample explored, 133 (66.8%) had a dossier open in Social Services and 92 (46.2%) had a family dossier open in the same service. One hundred and seventy-eight tools (89.4%) were completed for boys and girls with a dossier open in child protection and 24 (12.1%) with a dossier open in juvenile justice. Regarding their home, 131 (66.4%) of the children and adolescents were in protective residential care, 44 (22.4%) lived in the family home, 11 (5.6%) in family foster care, 8 in juvenile justice residential care (3.9%), while for 5 (1.7%) this detail was unknown.

2.2. Instrument

The final version of the EDR-ESIA tool subjected to validation (Benavente et al., 2024) is made up of 88 items to be completed by a professional, with information gathered from the reports, medical history, and/or dossiers of the minor in four sections: (1) Identification of the minor and their family (22 items), (2) CSE target indicators (13 items), (3) Risk indicators subdivided, in turn, into: (a) Indicators of significant risk; (b) Indicators of moderate risk; (c) Other indicators of risk; with 12 items in each subcategory (up to 49 items in all the indicators); and (4) Vulnerabilities of the minor (17 items). The characteristics of the indicators considered are based on descriptive language; therefore, they leave very little margin for distorted evaluations. Technically, they are observations from professionals of situations that might be described; if the situation can be documented, the indicator always works in the same way in different informants.
To facilitate their completion, each of the risk indicator items is defined in the tool itself and indications are given as to how to score them according to the degree to which they are manifested. The score for each of these items is recorded as not present: 0; mild: 1; moderate: 2; serious: 3, with the following score considered as the final result: >9 points: established risk; 6–9 points: likely risk; 1–5 points: at professional discretion. In addition, risk is considered to be established whenever the first target indicator is scored differently from 0. The EDR-ESIA tool was designed for application in first-level detection in care settings (Benavente et al., 2022a, 2024). The EDR-ESIA is intended to be applied in primary care education, health, and social services.

2.3. Procedure

The EDR-ESIA tool was developed in a 2-stage process, covering the six steps necessary for its development. Figure 1 serves as an outline of the work process followed.
The flow diagram (Figure 1) provides a comprehensive overview of the EDR-ESIA tool’s evolution, detailing a two-stage process composed of six specific steps:
Stage 1: Initial Development (June–December 2020):
Step 1: Conducted a bibliographic review of aspects related to Child Sexual Exploitation (CSE) and identified key evaluative indicators.
Step 2: Involved a review of indicators by a Delphi Panel of 22 international experts and multidisciplinary workgroups to establish six thematic blocks: sociodemographic characteristics, target indicators, and various levels of risk and vulnerability.
Stage 2: Empirical Validation (July–November 2022 onwards):
Step 3: Executed a second bibliographic review specifically targeting 14 existing national and international CSE detection instruments.
Step 4: Generated the first version of the tool in an editable PDF format, followed by professional training and a pilot test involving 98 minors, which gathered 47 feedback comments from users.
Step 5: Performed a psychometric analysis of the refined version, utilizing web completion for 252 minors (with 199 cases meeting the final inclusion criteria) and employing Partial Least Squares Structural Equation Modeling (PLS-SEM) to confirm the model’s fit.
Step 6: Outlined suggestions for improvements and future longitudinal studies.
The current validation study specifically focuses on the last two steps of this flow diagram, analyzing the metric properties and structural validity of the final refined instrument. This expanded description offers a holistic view of how the tool transitioned from a qualitative expert consensus (Stage 1) to a statistically validated screening resource (Stage 2).

2.4. Data Analysis

First of all, a preliminary analysis of the information collected was conducted in order to refine the data and determine the distribution of frequencies in each of the elements. For the evaluation of the theoretical model, Partial Least Squares Structural Equation Modelling (PLS-SEM) methodology was used, which is particularly suitable for models with formative constructs, since it assumes no correlation between indicators and allows for the analysis of the individual contribution of each indicator to the latent variable (Hair et al., 2022; Sarstedt et al., 2022). This approach is suitable when indicators represent different dimensions of the construct rather than reflecting a single underlying entity, which is consistent with the specification of the present study (Diamantopoulos & Winklhofer, 2001; Hair et al., 2022).
In the specified model, first- and second-order factors are considered, all of a formative nature. The first-order factors include specific indicators that capture different dimensions of risk and vulnerability. In particular, (1) Target Indicators (ID): composed of 13 indicators (ID1–ID13); (2) Severe Risk Indicators (IRS): Composed of 12 indicators (IRS1–IRS12); (3) Medium Risk Indicators (IRM): Made up of 12 indicators (IRM1–IRM12); (4) Other Risk Indicators (OIR): Contains 12 indicators (OIR1–OIR12); (5) Family vulnerability (VF): Composed of 10 indicators (VF1–VF10); and (6) Personal vulnerability (VP): Defined by 7 indicators (VP1–VP7).
Given that the first-order factors represent differentiated dimensions of risk and vulnerability, their indicators were modelled formatively. In turn, second-order relationships were established in the structure of the model: Global vulnerability (V): this is a second-order formative construct that is determined by its two first-order dimensions, VF and VP. Global risk (CSE TOTAL RISK): This is a second-order construct, predicted by the four risk factors (ID, IRS, IRM and OIR) and by global vulnerability (V).
Responses coded as “unknown” were treated as missing values rather than as the absence of risk. Because several indicators showed non-trivial proportions of missingness, missing data were handled using multiple imputation by chained equations (MICE) as the primary strategy. To assess robustness, the PLS-SEM was re-estimated using median imputation as a sensitivity analysis. The results were highly consistent across missing-data strategies. Differences between multiple imputation and median imputation were negligible for all structural paths (all absolute differences < 0.002) and for the explained variance of the endogenous constructs (absolute differences in R2 < 0.001). Measurement parameters were also broadly stable, with only minor variation in a small number of indicator weights and loadings. Overall, the substantive conclusions of the model were unchanged across imputation methods.
The weights of the indicators were also analysed to assess the contribution of each indicator to the formative construct and their statistical significance using the PLS algorithm with bootstrap resampling of 5000 iterations (Chin, 1998). Since the constructs are formative, internal reliability was not assessed using Cronbach’s Alpha or Composite Reliability, as these indicators assume homogeneity across items, which is not applicable to formative models (Diamantopoulos & Siguaw, 2006; Hair et al., 2022). Instead, collinearity between indicators was examined using the Variance Inflation Factor (VIF), ensuring that no indicator exceeded a threshold of 5, which would indicate redundancy problems (Diamantopoulos & Winklhofer, 2001; Hair et al., 2022).
To assess the overall quality of the PLS-SEM model, the coefficient of determination (R2), the Global Goodness of Fit (GOF) index, the effect sizes (f2) of each sub-dimension and the Stone–Geisser indices (Q″) were calculated (Hair et al., 2022).
Finally, the scores for each first-order factor were calculated, and differences were estimated based on sex and age group using non-parametric tests (Mann–Whitney U test). To complement the significance tests, effect sizes were calculated using Cohen’s d to assess the magnitude of the observed differences. This analysis aimed to identify potential variations in risk perception and vulnerability levels across demographic segments, providing a deeper understanding of how these factors may influence the overall assessment of ESIA risk.
All analyses were performed using the R statistical programme (R x64 version 3.5.0).

3. Results

3.1. Dimensionality

The formative measurement model showed generally consistent outer weights, supporting the adequacy of the construct specification. Although some indicators displayed relatively low weights, their relevance was assessed considering both outer weights and outer loadings in line with PLS-SEM recommendations (Hair et al., 2022). Indicators with low weights but meaningful loadings were retained, as a sensitivity analysis excluding them did not alter the model structure or substantive conclusions, and they remain theoretically and clinically relevant according to expert consultation during instrument development.
To assess potential collinearity among formative indicators, variance inflation factors (VIF) were calculated. As shown in Table 2 and Table 3, all VIF values were below conventional thresholds, indicating no problematic multicollinearity.
Vulnerabilities were a two-dimensional scale with appropriate and meaningful weights for each of the indicators as shown in Table 3.
Furthermore, the model meets the criteria for both discriminant and convergent validity. The discriminant validity assessment confirms that each construct is distinct from the others, as indicated by higher loadings on their respective latent variables compared to cross-loadings on other constructs. Furthermore, the coefficients of correlations between latent variables show that the risk constructs are highly correlated with each other (ID-IRS = 0.70, ID-IRM = 0.73, IRS-IRM = 0.73, OIR-IRM = 0.76), but maintain sufficient separation with respect to vulnerability (VF-VP = 0.50) (Figure 2).
Convergent validity is also supported, as the indicators sufficiently explain the variance of their corresponding constructs. These findings suggest that the measurement model effectively captures the underlying theoretical structure.
The bootstrap analysis further confirms the stability of the estimated coefficients. By resampling the data and generating confidence intervals, the bootstrap procedure provides evidence that the estimated relationships are not highly sensitive to sampling variability. The absence of confidence intervals containing zero supports the significance of the estimated paths, reinforcing the reliability of the model’s structural relationships.
To further examine the psychometric performance of the proposed questionnaire, the structural model was assessed using the coefficient of determination (R2), effect sizes (f2), Stone–Geisser predictive relevance (Q2), and the global goodness-of-fit (GOF) index.
The results showed very high explanatory power for the endogenous constructs included in the measurement model. Specifically, the vulnerability construct (V) explained 97.6% of the variance (R2 = 0.97), while the higher-order risk construct (CSE TOTAL RISK) explained 98.2% of the variance (R2 = 0.98). As expected in the specification of the structural model, exogenous constructs (ID, IRS, IRM, OIR, V_Fam, and V_Pers) showed R2 values equal to zero.
Effect size analysis (f2) indicated that all sub-dimensions made substantial contributions to the explanatory capacity of the instrument. Within the vulnerability construct, both family vulnerability (V_Fam → V: f2 = 12.20) and personal vulnerability (V_Pers → V: f2 = 8.30) exhibited very large effects. Likewise, all dimensions contributing to the higher-order risk construct displayed large effect sizes, including OIR (f2 = 2.34), vulnerability (f2 = 1.42), ID (f2 = 1.28), IRS (f2 = 1.17), and IRM (f2 = 1.07). These results indicate that each dimension contributes meaningfully to explaining the overall construct measured by the instrument.
Predictive relevance was assessed using the Stone–Geisser Q2 statistic obtained through blindfolding. The results indicated strong predictive relevance for the endogenous constructs, with Q2 values of 0.97 for vulnerability and 0.98 for overall risk, both well above zero. According to established guidelines, Q2 values greater than zero indicate that the model has predictive relevance for the corresponding endogenous constructs.
At the global level, the model yielded a GOF index of 0.57, indicating a satisfactory overall fit between the measurement and structural components of the model.
It is important to note that the relatively high R2 and Q2 values should be interpreted in light of the hierarchical component model adopted in this study, in which higher-order constructs are formed by theoretically related sub-dimensions derived from the same measurement instrument. In such models, strong explanatory relationships between lower-order dimensions and higher-order constructs are expected, reflecting the conceptual coherence of the measurement structure rather than model overfitting.

3.2. Differences According to Sex and Age Group

As expected, the group of females obtained significantly higher mean scores than males in the target indicators, indicators of moderate risk, other indicators, and vulnerabilities to CSE (see Table 4).
Differences by sex showed that females reported higher scores than males in several domains. Moderate effect sizes were observed for CSE target indicators (d = 0.63), indicators of moderate risk of CSE (d = 0.74), other indicators of risk of CSE (d = 0.52), and vulnerabilities (d = 0.50). In contrast, the difference in indicators of significant risk of CSE was negligible (d = −0.02).
Regarding age group, adolescents aged 14–17 reported higher levels of CSE-related indicators than those aged 11–13 in several domains. Effect sizes were moderate for CSE target indicators (d = 0.54) and indicators of significant risk of CSE (d = 0.58), and large for indicators of moderate risk of CSE (d = 1.01). Differences in other indicators of risk of CSE (d = 0.11) and vulnerabilities (d = 0.03) were small or negligible (see Table 4).

3.3. Cut-Off Points

This total score in target indicators can be divided into three sections or categories: (1) more than 9 points = established risk; (2) from 6 to 9 points = likely risk; and (3) from 1 to 5 points = at professional discretion. Based on this classification, 40 of those assessed (17.2%) were at likely risk of CSE, and 21 (9.1%) at established risk, that is, over a quarter of the sample (Figure 3).

4. Discussion

One of the greatest strengths of this tool is the use of a participatory approach for its development (Benavente et al., 2022a, 2024), by obtaining evidence of the validity of its content based on scientific literature and in a consensual and collaborative way with experts and professional users in a range of fields. Importantly, the instrument allows not only for a general assessment of CSE risk but also for a gender-differentiated study, making it possible to highlight the particular vulnerability of girls and adolescent women. Previous research shows that they are more frequently victims of exploitation and tend to develop internalizing consequences (e.g., depression, anxiety, PTSD), while boys are comparatively more likely to present externalizing symptoms (e.g., aggression, delinquency) (Euser et al., 2013; Lewis et al., 2016; Øien et al., 2025). The instrument also includes important information for analyzing the specific situations of boys who suffer sexual exploitation, in accordance with the need identified by Connella et al. (2023).
The use of PLS-SEM allowed the hierarchical structure of the formative constructs in the ESIA risk measure to be analysed, providing robust estimates and allowing the identification of factors contributing to the overall risk. The results indicate that all the dimensions of the EDR-ESIA questionnaire, from the metric point of view, have an adequate overall fit to the theoretical starting models. None of the items, except for the item “Minor is a sexual aggressor”, reveals local goodness-of-fit problems, with all saturating above 0.4 in their respective dimensions (mostly above 0.60). In the case of the “Minor is a sexual aggressor” item, this works differently from the rest, with a very low loading factor, due to its low frequency. Nonetheless, as it is an indicator of having suffered sexual violence, it is kept on the list. In terms of reliability, the internal consistency can be said to be very good in all dimensions. Therefore, it can be stated that the scores that will be obtained with the final version of the EDR-ESIA tool have the guarantees of validity and reliability demanded by the international standards for test creation and adaptation.
The use of a common tool is important for all professionals who work with minors because it enables the detection of children and adolescents at risk of or actually in a situation of sexual exploitation, by providing a common framework of reference that would act as a support for clinical judgement and subsequent measures to be taken. This is particularly relevant for girls and adolescent women, who are frequently targeted through online grooming or solicitations by adults—a phenomenon shown to be highly prevalent in longitudinal studies (Ortega-Barón et al., 2022)—and whose vulnerability is further confirmed by national data indicating gender-specific patterns of CSE in Spain (Pereda et al., 2025). In the short term, the functionalities of the EDR-ESIA tool are to: (1) enable the diagnosis or detection of minors at risk of CSE, by gathering information from completion of the tool in one of its different formats (paper- or web-based questionnaire); (2) establish priorities for in-depth exploration, by means of an interview, when indications are inconclusive; (3) compile and unify the main CSE risk indicators so that all the services responsible for care in childhood and adolescence have this information available; and (4) provide information to the professionals responsible for the care of minors regarding their lifestyles and patterns of greatest risk of CSE for the purpose of supporting them, motivating them, and advising them on how to approach the situation and encourage healthier lifestyles. In the medium term, it will serve to: (5) identify subpopulations at high risk of CSE, based on the data stored with the use of the tool; (6) be able to evaluate the prevalence of the risk of CSE at the population level, by using it in several settings such as schools, healthcare centres, and community services, amongst others; (7) characterise this population and plan the need for specific services; (8) contribute to monitoring accompaniment processes by means of changes in level of risk throughout the socio-educational work carried out; and (9) the EDR-ESIA tool on many occasions involves intersectoral collaboration between organisations that work at the community, welfare, and legal level, which promotes the development of synergies and new professional roles that can lead to programmes of joint participation between several organisations with a common purpose.

Limitations and Future Research Directions

While the tool is built on a rigorous evidence-based development process, its current validation presents several limitations related to the characteristics of the sample and the predictive scope of the study, which are well documented in the methodological literature on risk assessment and validation studies (Shadish et al., 2002) and continue to be highlighted in more recent research on instruments for identifying child sexual exploitation (Benavente et al., 2024).
The evidence-based development of the instrument was supported by a multi-stage process that included a systematic review of the international literature, a Delphi panel with 22 international experts, a review by 36 active professionals in the field, and a methodological review conducted by university researchers. This process ensured that the indicators were grounded in established scientific knowledge prior to the empirical validation phase. However, this does not eliminate the limitations associated with the design of the validation study.
First, the instrument is a screening (not diagnostic) tool designed for early detection in normalized settings such as schools and health centers. Its primary aim is to provide a common framework of reference that can help non-specialized professionals identify alert signals. Therefore, it should be understood as a promising starting point for prevention strategies rather than definitive evidence of real-world impact, which is consistent with how similar tools in this field have been conceptualized in previous research (Benavente et al., 2024).
Second, previous studies have noted that many instruments addressing child sexual exploitation have been developed and validated in selective prevention contexts involving populations already identified as being at higher risk (Cockbain et al., 2017; Benavente et al., 2024). Consistent with this, in the most recent validation, the sample (N = 199) consisted of adolescents already under supervision or identified as vulnerable, which limits the generalizability of the findings to the general adolescent population.
Third, the cross-sectional nature of the current validation constitutes another important limitation. As widely recognized in evaluation research, cross-sectional designs restrict the ability to establish predictive validity and causal inferences over time (Shadish et al., 2002). Longitudinal research will therefore be necessary to determine the extent to which these indicators can prospectively predict situations of sexual exploitation, an issue that has also been highlighted in recent reviews of the field (Benavente et al., 2024).
Additional methodological limitations should also be considered. Although several indicators contained substantial proportions of “unknown” responses, the sensitivity analyses suggest that the main conclusions are robust to the choice of missing-data treatment. Nevertheless, this aspect should be interpreted with caution and further studies with more complete data collection procedures would strengthen the evidence.
A further limitation relates to reliability assessment. Because ratings were conducted retrospectively using information extracted from case files, it was not possible to systematically evaluate test–retest or inter-rater reliability, as multiple independent ratings were not available for all cases. While this approach is common in initial validation studies based on retrospective data, future research should address this limitation by incorporating repeated assessments and independent raters to further examine the temporal stability and inter-rater reliability of the instrument.
Finally, it is important to emphasize that a high score on the instrument does not provide certainty that exploitation is occurring, nor does a low score guarantee that a minor is free of risk. The tool is intended to support, rather than replace, professional clinical judgment and should be followed by a specialized assessment when risk is identified.
Future research should address the current limitations of the study while also adapting to the evolving nature of child sexual exploitation (CSE). First, further work is needed to strengthen the psychometric evaluation of the instrument. In particular, future studies should move beyond retrospective case-file analysis and incorporate repeated assessments and independent raters. This would allow for a systematic evaluation of test–retest and inter-rater reliability, which could not be fully assessed in the present study.
Second, longitudinal research is necessary to examine the predictive validity of the EDR-ESIA indicators over time. Such studies would help determine whether early identification of risk effectively anticipates trajectories into exploitation and supports preventive intervention.
Third, validation should be extended to broader and more diverse samples. Future studies could include adolescents from the general population and involve professionals from different regions to assess the applicability of the tool across contexts. Expanding validation to other Southern European settings may also be valuable in exploring potential cultural and linguistic adaptations of the instrument.
In addition, research should continue to refine the indicators associated with technology-facilitated sexual exploitation. There is a recognized need to improve the detection and assessment of Image-Based Sexual Exploitation (IBSE) in order to better evaluate risks associated with the online distribution of sexual images, following the recommendations developed by Minihan et al. (2024), Seto et al. (2024), and van der Spuy et al. (2024). Similarly, it is essential to improve the detection and prevention of situations involving child sexual exploitation material (CSEM), particularly when it is self-produced by minors under coercion, as suggested by Bloxsom et al. (2024).
Future research should also incorporate the perspectives and lived experiences of victims to better understand the pathways and contextual factors associated with exploitation. This may contribute to improving both the conceptualization of risk indicators and the design of preventive strategies.
Finally, special attention should be given to specific vulnerabilities that may be underrepresented in current screening tools, including adolescents from the LGTBIQ+ community or those with prior experiences of sexual victimization. These considerations are particularly relevant in the case of girls, who are disproportionately affected by online grooming and image-based coercion, reinforcing the need for preventive actions and interventions that integrate a gender perspective (Ortega-Barón et al., 2022; Fry et al., 2025). Altogether, these efforts may contribute to the development of a more comprehensive framework for addressing the increasing complexity of online child sexual exploitation.

5. Conclusions

This study aimed to validate the EDR-ESIA as a screening tool for the early detection of risk indicators associated with child sexual exploitation (CSE). The main hypothesis proposed that the internal structure of the instrument—comprising target indicators, different levels of risk, and contextual vulnerabilities—would show an adequate fit within a theoretical model of CSE risk and contribute meaningfully to the overall construct of total risk.
The results provide empirical support for the proposed hypotheses within the scope of the study design. The analyses indicated that the proposed theoretical model demonstrated an adequate statistical fit and that the different dimensions of the instrument contributed significantly to the higher-order construct of CSE total risk. In addition, the findings suggest that the indicators included in the EDR-ESIA are relevant for identifying patterns of vulnerability associated with exploitation.
Consistent with the study expectations, the instrument also showed sensitivity to gender differences, with female adolescents presenting higher levels of vulnerability and higher scores in several indicators, which aligns with existing research highlighting gendered patterns of risk in CSE. Furthermore, the formative structure of the indicators showed adequate psychometric behavior within the PLS-SEM model, supporting their usefulness as part of a screening framework.
Overall, the findings suggest that the EDR-ESIA may represent a promising screening tool to support early detection efforts in professional contexts such as education, health, and social services. At the same time, the results should be interpreted considering the limitations of the study, particularly the characteristics of the sample and the cross-sectional design. Continued research will be necessary to further consolidate the predictive validity and applicability of the instrument in broader populations and contexts.

Author Contributions

All the authors contributed equally to this work. Conceptualization, B.B. and L.B.; Methodology, P.B. and L.B.; Validation, P.B.; Formal analysis, P.B. and L.B.; Investigation, B.B.; Data curation, B.B., P.B. and L.B.; Writing—original draft, B.B. and P.B.; Writing—review & editing, B.B., P.B. and L.B.; Supervision, B.B. and L.B.; Project administration, B.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding for the present study. The initial development phases of the EDR-ESIA were supported by the Instituto Balear de la Mujer.

Institutional Review Board Statement

This study was conducted in accordance with the Declaration of Helsinki. Institutional approval for this project was obtained from the Institut Balear de la Dona. The administrative decision authorizing the start of the project was issued on 25 May 2022. A formal ethics endorsement was subsequently provided by the institution. All data were anonymized, and informed consent procedures were implemented throughout the study.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The data presented in this study are not publicly available due to ethical and confidentiality restrictions related to case-file information involving minors. The dataset consists of anonymized observations provided by professionals based on existing records. Data may be available from the corresponding author upon reasonable request and subject to ethical and institutional approval.

Acknowledgments

The authors would like to express their gratitude to the professionals and administrative bodies that contributed to the design and various validation stages of the EDR-ESIA. They are particularly grateful to the Instituto Balear de la Mujer for funding the initial development phases of the instrument and for their support during the early stages of the research process. The institution had no role in the design of the present study, data analysis, interpretation of the results, or decision to publish this manuscript.

Conflicts of Interest

Paola Bully was employed by Paola Bully Methodological and Statistical Consultancy. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Ali, S., Haykal, H. A., & Youssef, E. Y. M. (2023). Child sexual abuse and the internet: A systematic review. Human Arenas, 6(2), 404–421. [Google Scholar] [CrossRef]
  2. Armstrong, S. (2017). Instruments to identify commercially sexually exploited children: Feasibility of use in an emergency department setting. Pediatric Emergency Care, 33(12), 794–799. [Google Scholar] [CrossRef] [PubMed]
  3. Averdijk, M., Ribeaud, D., & Eisner, M. (2019). Longitudinal risk factors of selling and buying sexual services among youths in Switzerland. Archives of Sexual Behavior, 49, 11279–11290. [Google Scholar] [CrossRef]
  4. Baird, K., & Connolly, J. (2023). Recruitment and entrapment pathways of minors into sex trafficking in Canada and the United States: A systematic review. Trauma, Violence, & Abuse, 24(1), 189–202. [Google Scholar]
  5. Ballester, L., Orte, C., & Rosón, C. (2022). A survey study on pornography consumption among young Spaniards and its impact on interpersonal relationships. Net Journal of Social Sciences, 10(3), 71–86. [Google Scholar] [CrossRef]
  6. Ballester, L., Rosón, C., Noya, M., & Calderón-Cruz, B. (2020). Revisión sistemática sobre los efectos de la nueva pornografía online y las intervenciones preventivas de las consecuencias negativas. In L. Ballester, C. Rosón, & T. Facal, (Coord.), Pornografía y educación afectivosexual (pp. 81–116). Octaedro. [Google Scholar]
  7. Barnert, E. S., Bath, E., Heard-Garris, N., Lee, J., Guerrero, A., Biely, C., Jackson, N., Chung, P. J., & Dudovitz, R. (2022). Commercial sexual exploitation during adolescence: A US-based national study of adolescent to adult health. Public Health Reports, 137, 53S–62S. [Google Scholar] [CrossRef] [PubMed]
  8. Barnert, E. S., Iqbal, Z., Bruce, J., Anoshiravani, A., Kolhatkar, G., & Greenbaum, J. (2017). Commercial sexual exploitation and sex trafficking of children and adolescents: A narrative review. Academic Pediatrics, 17(8), 825–829. [Google Scholar] [CrossRef]
  9. Basson, D. (2017). Validation of the commercial sexual exploitation-identification tool (CSE-IT) [Technical report]. WestCoast Children’s Clinic. [Google Scholar]
  10. Basson, D., Rosenblatt, E., & Haley, H. (2012). Research to action: Sexually exploited minors (SEM) needs and strengths. WestCoast Children’s Clinic. [Google Scholar]
  11. Benavente, B., Ballester, L., Pich, J., & Pereda, N. (2021). Risk factors for commercial sexual exploitation of children and adolescents: Results of an international Delphi panel. Psicothema, 33(3), 449–455. [Google Scholar] [CrossRef]
  12. Benavente, B., Ballester, L., Pich, J., & Pereda, N. (2022a). Detección de la explotación sexual en la infancia y la adolescencia mediante la evaluación de indicadores de riesgo en España. Papeles del Psicólogo, 43(2), 90–95. [Google Scholar] [CrossRef]
  13. Benavente, B., Bully, P., & Ballester, L. (2024). Instruments for the identification of child sexual exploitation: A systematic review. Trauma, Violence, & Abuse, 25(3), 2204–2218. [Google Scholar] [CrossRef]
  14. Benavente, B., Díaz-Faes, D. A., Ballester, L., & Pereda, N. (2022b). Commercial sexual exploitation of children and adolescents in europe: A systematic review. Trauma, Violence, & Abuse, 23(5), 1529–1548. [Google Scholar] [CrossRef]
  15. Benavente, B., & Pereda, N. (2026). Manual de detección y actuación ante la explotación sexual infantil y adolescente. Editorial Octaedro. [Google Scholar]
  16. Bloxsom, G., McKibbin, G., Humphreys, C., Davidson, J., & Halfpenny, N. (2024). Five forms of coerced “self-produced” child sexual exploitation material: A critical interpretive synthesis. Trauma, Violence, & Abuse, 25(5), 4230–4244. [Google Scholar] [CrossRef] [PubMed]
  17. Brady, M. (2018). UK paramedics confidence in identifying child sexual abuse: A mixed-methods investigation. Journal of Child Sexual Abuse, 27(4), 439–458. [Google Scholar] [CrossRef]
  18. Caffo, E., Asta, L., & Scandroglio, F. (2021). Child abuse and exploitation: What we know about the problem and new perspectives. In Online child sexual exploitation: Treatment and prevention of abuse in a digital world (pp. 3–21). Springer. [Google Scholar]
  19. Chin, W. W. (1998). The Partial Least Squares approach for structural equation modeling. In G. A. Marcoulides (Ed.), Modern methods for business research (pp. 295–336). Lawrence Erlbaum Associates. [Google Scholar]
  20. Cockbain, E., Ashby, M., & Brayley, H. (2017). Immaterial boys? A large-scale exploration of gender-based differences in child sexual exploitation service users. Sexual Abuse: A Journal of Research and Treatment, 29(7), 658–684. [Google Scholar] [CrossRef]
  21. Connella, A., Valentine, C., Stone, S., & Reid, J. A. (2023). Exploring the role of prior sexual abuse in the commercial sexual exploitation of boys and young men. Journal of Child Sexual Abuse, 33(6), 714–735. [Google Scholar] [CrossRef]
  22. de Santisteban, P., & Gámez-Guadix, M. (2018). Prevalence and risk factors among minors for online sexual solicitations and interactions with adults. Journal of Sex Research, 55(7), 939–950. [Google Scholar] [CrossRef]
  23. Diamantopoulos, A., & Siguaw, J. A. (2006). Formative versus reflective indicators in organizational measure development: A comparison and empirical illustration. British Journal of Management, 17(4), 263–282. [Google Scholar] [CrossRef]
  24. Diamantopoulos, A., & Winklhofer, H. M. (2001). Index construction with formative indicators: An alternative to scale development. Journal of Marketing Research, 38(2), 269–277. [Google Scholar] [CrossRef]
  25. Dixon, S. (2024). Child sexual exploitation (CSE) networks: Reassembling structure and activity. Journal of Sexual Aggression, 31(3), 396–412. [Google Scholar] [CrossRef]
  26. Dorotic, M., & Johnsen, J. W. (2023). Child sexual abuse on the internet: Report on the analysis of technological factors that affect the creation and sharing of child sexual abuse material on the internet [Forskningsrapport, BI]. Handelshøyskolen BI. [Google Scholar]
  27. Drejer, C., Riegler, M. A., Halvorsen, P., Johnson, M. S., & Baugerud, G. A. (2024). Livestreaming technology and online child sexual exploitation and abuse: A scoping review. Trauma, Violence, & Abuse, 25(1), 260–274. [Google Scholar] [CrossRef]
  28. ECPAT Interagency Working Group. (2016). Terminology guidelines for the protection of children from sexual exploitation and sexual abuse. ECPAT International. Available online: https://www.ohchr.org/sites/default/files/TerminologyGuidelines_en.pdf (accessed on 17 March 2026).
  29. ECPAT International. (2021). Global Boys Initiative: A global review of existing literature on the sexual exploitation of boys. ECPAT International. Available online: https://ecpat.org/wp-content/uploads/2021/09/Global-Boys-Initiative-Literature-Review-ECPAT-International-2021.pdf (accessed on 12 May 2026).
  30. Engelmann, L., Weirich, C. A., & May-Chahal, C. (2025). Developing quality standards for community-based online child sexual exploitation and abuse interventions. Child Abuse & Neglect, 164, 107444. [Google Scholar] [CrossRef]
  31. European Union Agency for Law Enforcement Cooperation. (2020). Internet Organised Crime Threat Assessment (IOCTA) 2020. Europol. [Google Scholar]
  32. European Union Agency for Law Enforcement Cooperation. (2025). Internet Organised Crime Threat Assessment (IOCTA) 2025. Europol. [Google Scholar]
  33. Euser, S., Alink, L. R., Tharner, A., van Ijzendoorn, M. H., & Bakermans-Kranenburg, M. J. (2013). The prevalence of child sexual abuse in out-of-home care: A comparison between abuse in residential and in foster care. Child Maltreatment, 18(4), 221–231. [Google Scholar] [CrossRef] [PubMed]
  34. Finkelhor, D., Sutton, S., Turner, H., & Colburn, D. (2024). How risky is online sexting by minors? Journal of Child Sexual Abuse, 33(2), 169–182. [Google Scholar] [CrossRef]
  35. Finkelhor, D., Turner, H., Colburn, D., Mitchell, K., & Mathews, B. (2023). Child sexual abuse images and youth produced images: The varieties of image-based sexual exploitation and abuse of children. Child Abuse & Neglect, 143, 106269. [Google Scholar] [CrossRef]
  36. Franchino-Olsen, H. (2021). Frameworks and theories relevant for organizing commercial sexual exploitation of children/domestic minor sex trafficking risk factors: A systematic review of proposed frameworks to conceptualize vulnerabilities. Trauma, Violence & Abuse, 22(2), 306–317. [Google Scholar] [CrossRef]
  37. Fredlund, C., Dahlström, Ö., Svedin, C. G., Wadsby, M., Jonsson, L. S., & Priebe, G. (2018). Adolescents’ motives for selling sex in a welfare state—A swedish national study. Child Abuse & Neglect, 81, 286–295. [Google Scholar]
  38. Fredlund, C., Svensson, F., Svedin, C. G., Priebe, G., & Wadsby, M. (2013). Adolescents’ lifetime experience of selling sex: Development over five years. Journal of Child Sexual Abuse, 22(3), 312–325. [Google Scholar] [CrossRef] [PubMed]
  39. Fry, D., Krzeczkowska, A., Ren, J., Lu, M., Fang, X., & Into the Light Index Study Group. (2025). Prevalence estimates and nature of online child sexual exploitation and abuse: A systematic review and meta-analysis. The Lancet Child & Adolescent Health, 9(3), 184–193. [Google Scholar] [CrossRef]
  40. Gauthier-Duchesne, A., Hébert, M., & Daspe, M. È. (2017). Gender as a predictor of posttraumatic stress symptoms and externalizing behavior problems in sexually abused children. Child Abuse & Neglect, 64, 79–88. [Google Scholar] [CrossRef] [PubMed]
  41. Greenbaum, J. (2018). Child sex trafficking and commercial sexual exploitation. Advances in Pediatrics, 65(1), 55–70. [Google Scholar] [CrossRef]
  42. Greenbaum, J. (2020). A public health approach to global child sex trafficking. Annual Review of Public Health, 41, 481–497. [Google Scholar] [CrossRef]
  43. Hair, J. F., Hult, G. T. M., Ringle, C. M., & Sarstedt, M. (2022). A primer on partial least squares structural equation modeling (PLS-SEM) (3rd ed.). SAGE Publications. [Google Scholar]
  44. Interiano-Shiverdecker, C. G., Romero, D. E., Anderson, A., & Castellon, N. E. (2022). A content analysis of sex trafficking instruments. International Journal for the Advancement of Counselling, 44(3), 373–394. [Google Scholar] [CrossRef]
  45. Jackson, A. (2014). Literature review: Young people at high risk of sexual exploitation, absconding and other significant harms. Berry Street Childhood Institute. [Google Scholar]
  46. Joleby, M., Landström, S., Lunde, C., & Jonsson, L. S. (2021). Experiences and psychological health among children exposed to online child sexual abuse–a mixed methods study of court verdicts. Psychology, Crime & Law, 27(2), 159–181. [Google Scholar] [CrossRef]
  47. Josenhans, V., Kavenagh, M., Smith, S., & Wekerle, C. (2020). Gender, rights and responsibilities: The need for a global analysis of the sexual exploitation of boys. Child Abuse & Neglect, 110, 104291. [Google Scholar] [CrossRef] [PubMed]
  48. Laird, J. J., Klettke, B., Hall, K., & Hallford, D. (2023). Toward a global definition and understanding of child sexual exploitation: The development of a conceptual model. Trauma, Violence & Abuse, 24(4), 2243–2264. [Google Scholar] [CrossRef]
  49. Lerpiniere, J., Hawthorn, M., Smith, I., Connelly, G., Kendrick, A., & Welch, V. (2013). The sexual exploitation of looked after children in Scotland. A scoping study to inform methodology for inspection. Centre for Excellence for Looked After Children in Scotland. [Google Scholar]
  50. Levkovich, I., Yatzkar, U., & Shenaar-Golan, V. (2025). Age and gender differences in emotional and behavioral functioning among youth referred to a psychiatric outpatient clinic at a public hospital. Children, 12(6), 683. [Google Scholar] [CrossRef]
  51. Lewis, T., McElroy, E., Harlaar, N., & Runyan, D. (2016). Does the impact of child sexual abuse differ from maltreated but non-sexually abused children? A prospective examination of the impact of child sexual abuse on internalizing and externalizing behavior problems. Child Abuse & Neglect, 51, 31–40. [Google Scholar] [CrossRef]
  52. LOPIVI. (2021). Ley orgánica 8/2021, de 4 de junio, de protección integral a la infancia y la adolescencia frente a la violencia. Boletín Oficial del Estado, 134, 69284–69333. Available online: https://www.boe.es/diario_boe/txt.php?id=BOE-A-2021-9347 (accessed on 12 May 2026).
  53. Lu, M., Lamond, M., & Fry, D. (2024). A content analysis of metrics on online child sexual exploitation and abuse used by online content-sharing services. Child Abuse & Neglect, 157, 107046. [Google Scholar] [CrossRef]
  54. Madigan, S., Ly, A., Rash, C. L., Van Ouytsel, J., & Temple, J. R. (2018). Prevalence of multiple forms of sexting behavior among youth: A systematic review and meta-analysis. JAMA Pediatrics, 172(4), 327–335. [Google Scholar] [CrossRef]
  55. Mármol, C. J., Luna, A., & Legaz, I. (2025). Disproportionate cybersexual victimization of women from adolescence into midlife in spain: Implications for targeted protection and prevention. Behavioral Sciences, 15(11), 1571. [Google Scholar] [CrossRef]
  56. Minihan, S., Burton, M., Nicholas, M., Trengove, K., Napier, S., & Brown, R. (2024). Prevalence and predictors of requests for facilitated child sexual exploitation on online platforms. Trends and Issues in Crime and Criminal Justice, 692, 1–19. [Google Scholar] [CrossRef]
  57. Ortega-Barón, J., Machimbarrena, J. M., Calvete, E., Orue, I., Pereda, N., & González-Cabrera, J. (2022). Epidemiology of online sexual solicitation and interaction of minors with adults: A longitudinal study. Child Abuse & Neglect, 131, 105759. [Google Scholar] [CrossRef]
  58. Øien, R. A., Cogo-Moreira, H., Nordahl-Hansen, A., Juel, E. K., Silverman, W. K., Larsen, K., & Lebowitz, E. R. (2025). Sex and age as moderators in the expression of internalizing and externalizing behaviors: Insights from the Child Behavior Checklist (CBCL). BMC Psychology, 13, 1211. [Google Scholar] [CrossRef]
  59. Panlilio, C. C., Dierkhising, C. B., Richardson, J., & Runner, J. (2022). Evaluating and validating the classification accuracy of a screening instrument to assess risk for commercial sexual exploitation of child welfare–involved children and adolescents. Public Health Reports, 137, 73S–82S. [Google Scholar] [CrossRef] [PubMed]
  60. Pedersen, W., & Hegna, K. (2003). Children and adolescents who sell sex: A community study. Social Science & Medicine, 56(1), 135–147. [Google Scholar] [CrossRef]
  61. Pereda, N., Arruabarrena, I., Benavente, B., Águila-Otero, A., Codina, M., & Guardiola, M. J. (2023). Estudio de prevención del riesgo de explotación sexual de los niños, niñas y adolescentes en los centros de acogimiento residencial del sistema de protección a la infancia de Cantabria. Dirección General de Políticas Sociales del Gobierno de Cantabria. [Google Scholar]
  62. Pereda, N., & Águila-Otero, A. (2026). Prevalence and factors associated with intentional pornography access among Spanish adolescents. Sexuality Research and Social Policy. [Google Scholar] [CrossRef]
  63. Pereda, N., Águila-Otero, A., Codina, M., & Cabrera, M. (2022). Guía común de actuación para la detección, notificación y derivación de casos de explotación sexual contra la infancia en centros residenciales, con especial atención a niñas y adolescentes. Ministerio de Igualdad. [Google Scholar]
  64. Pereda, N., Águila-Otero, A., & Leiva, V. (2025). Prevalence and associated characteristics of sexual exploitation in a representative sample of spanish youth from an intersectional perspective. Child Abuse & Neglect, 160, 107234. [Google Scholar] [CrossRef] [PubMed]
  65. Pereda, N., Codina, M., & Kanter, B. (2021). Explotación sexual comercial infantil y adolescente: Una aproximación a la situación en España. Papeles del Psicólogo, 42(3), 193–199. [Google Scholar] [CrossRef]
  66. Perry, E. W., Osborne, M. C., Lee, N., Kinnish, K., & Self-Brown, S. R. (2022). Posttraumatic cognitions and posttraumatic stress symptoms among young people who have experienced commercial sexual exploitation and trafficking. Public Health Reports, 137, 91S–101S. [Google Scholar] [CrossRef]
  67. Romero, D., Interiano-Shiverdecker, C., Castellon, N., & Strentzsch, J. (2021). A review of child sex trafficking instruments. Journal of Child and Adolescent Counseling, 7(1), 56–69. [Google Scholar] [CrossRef]
  68. Sarstedt, M., Hair, J. F., Ringle, C. M., Thiele, K. O., & Gudergan, S. P. (2022). Estimation issues with PLS and CB-SEM: Where the bias lies! Journal of Business Research, 69(10), 3998–4010. [Google Scholar] [CrossRef]
  69. Seto, M. C., Roche, K., Mariesa, N., & Jennifer, N. (2024). Predictors of online child sexual exploitation through image-sharing. Child Protection and Practice, 2, 100045. [Google Scholar] [CrossRef]
  70. Shadish, W. R., Cook, T. D., & Campbell, D. T. (2002). Experimental and quasi-experimental designs for generalized causal inference. Houghton, Mifflin and Company. [Google Scholar]
  71. Stockholm. (1996). First world congress against commercial sexual exploitation of children. Available online: http://www.csecworldcongress.org/ (accessed on 10 March 2026).
  72. UNICEF. (2020). Gender dimensions of violence against children and adolescents. UNICEF Child Protection Programme Division. Available online: https://www.unicef.org/media/93986/file/Child-Protection-Gender-Dimensions-of-VACAG-2021.pdf (accessed on 12 May 2026).
  73. van der Spuy, A., Witting, S., Burton, P., Day, E., Livingstone, S., & Sylwander, K. R. (2024). Guiding principles for addressing technology-facilitated child sexual exploitation and abuse. Digital Futures for Children Centre, London School of Economics and Political Sciences, and 5Rights Foundation. [Google Scholar]
  74. Walsh, K., Eggins, E., Hine, L., Mathews, B., Kenny, M. C., Howard, S., Ayling, N., Dallaston, E., Pink, E., & Vagenas, D. (2022). Child protection training for professionals to improve reporting of child abuse and neglect. The Cochrane Database of Systematic Reviews, 7(7), CD011775. [Google Scholar] [CrossRef] [PubMed]
  75. Weprotect. (2023). Global threat assessment 2023. Assessing the scale and scope of child sexual exploitation and abuse online, to transform the response. Available online: https://www.weprotect.org/wp-content/uploads/Global-Threat-Assessment-2023-English.pdf (accessed on 10 March 2026).
  76. Weston, S., & Mythen, G. (2023). Child sexual exploitation and the adoption of public health approaches to prevention: Critical reflections on evolving processes and practices. Crime Prevention and Community Safety, 25, 227–242. [Google Scholar] [CrossRef]
  77. World Health Organization. (2017). Responding to children and adolescents who have been sexually abused: WHO clinical guidelines. World Health Organization. [Google Scholar]
Figure 1. Flow diagram of the development process and analysis of metric properties. Source: Authors’ own elaboration. Note. SECA = Sexual Exploitation of Children and Adolescents.
Figure 1. Flow diagram of the development process and analysis of metric properties. Source: Authors’ own elaboration. Note. SECA = Sexual Exploitation of Children and Adolescents.
Behavsci 16 00831 g001
Figure 2. Estimated PLS-SEM structural model of CSE total risk. Source: Authors’ own elaboration. Note. Standardized path coefficients (β) are reported on the arrows. The coefficient of determination (R2) indicates the proportion of variance explained in the endogenous construct. Abbreviations: CSE = Child Sexual Exploitation; ID = Target Indicators; IRS = Severe Risk Indicators; IRM = Medium Risk Indicators; OIR = Other Risk Indicators; V = Vulnerabilities; VF = Family vulnerability; VP = Personal vulnerability.
Figure 2. Estimated PLS-SEM structural model of CSE total risk. Source: Authors’ own elaboration. Note. Standardized path coefficients (β) are reported on the arrows. The coefficient of determination (R2) indicates the proportion of variance explained in the endogenous construct. Abbreviations: CSE = Child Sexual Exploitation; ID = Target Indicators; IRS = Severe Risk Indicators; IRM = Medium Risk Indicators; OIR = Other Risk Indicators; V = Vulnerabilities; VF = Family vulnerability; VP = Personal vulnerability.
Behavsci 16 00831 g002
Figure 3. Frequency and percentage of participants in each level of risk of CSE. Source: Authors’ own elaboration.
Figure 3. Frequency and percentage of participants in each level of risk of CSE. Source: Authors’ own elaboration.
Behavsci 16 00831 g003
Table 1. Sociodemographic characteristics of the participants in the data collection with the refined version of the EDR-ESIA tool.
Table 1. Sociodemographic characteristics of the participants in the data collection with the refined version of the EDR-ESIA tool.
Characteristicsn%
Sex
Female11758.8
Male8040.2
Unknown21.0
Age group
11–13 years3417.1
14–17 years16080.4
Unknown52.5
Autonomous community
Balearic Islands63.0
Galicia84.0
Basque Country8643.2
Cantabria9849.2
Unknown10.5
Legal situation
Spanish nationality13869.3
Regularised/or3919.6
Migrant115.5
Unaccompanied migrant/or52.5
Unknown63.0
LGTBI collective
Yes168.0
No15175.9
Unknown3216.1
Minority ethnicity
Yes4623.1
No14673.4
Unknown73.5
Educational level
Primary5929.6
Secondary10351.8
Baccalaureate42.0
VET2311.6
Dropped out21.0
Unknown84.0
Special Educational Learning Needs
Yes5226.1
No13968.9
Unknown84.0
Proficiency in the official language
Yes16783.9
No199.5
Unknown136.5
Table 2. Percentage of participants in the different response options and factor loadings to CSE indicators.
Table 2. Percentage of participants in the different response options and factor loadings to CSE indicators.
Not PresentMildModerateSeriousUnknown
%%%%%λVIF
CSE Target Indicator (ID)
ID1. Receives goods in exchange for sex72.82.21.73.015.10.622.49
ID2. Recruiter of other minors for sexual exploitation78.91.30.00.413.80.302.49
ID3. Unjustified possession of money, jewellery, mobiles, or other objects of value68.515.57.31.33.00.582.49
ID4. Sexually active 13-year-old minor73.75.23.02.27.80.342.49
ID5. Risky sexual relations35.815.99.911.223.70.752.49
ID6. Involved in online sexual activity53.910.83.03.427.70.442.48
ID7. Recurring sexually transmitted infections75.46.50.4012.10.522.47
ID8. Acquaintances and/or friends connected to sexual exploitation57.36.01.73.027.60.472.47
ID9. Relations with people and places close to prostitution61.23.91.72.225.40.542.45
ID10. Friends and/or partners older than the minor (5years of difference)50.49.511.67.815.90.672.40
ID11. Online relationships and/or meetings with strangers50.47.35.64.727.60.472.23
ID12. Abuse/dependence on alcohol and/or other drugs47.822.811.210.33.40.681.98
ID13. Recurring physical injuries of unknown origin77.64.32.60.98.60.441.20
Indicator of Significant Risk (IRS) 2.09
IRS1. Hiding information23.731.925.012.15.20.771.58
IRS2. Providing inconsistent stories44.822.815.58.24.70.741.57
IRS3. Running away from home65.113.47.35.63.40.671.57
IRS4. Truancy69.47.86.98.62.60.591.57
IRS5. Addiction to online or in-person gambling76.72.62.22.610.80.161.56
IRS6. Verbalization of knowledge of the “Sugar Daddy” or “Sugar Dating” offer and the intention of making money from it67.714.41.70.911.20.371.56
IRS7. Involvement in dysfunctional gangs/groups of friends64.212.56.56.55.20.591.56
IRS8. Commission of crimes69.010.35.63.96.00.441.55
IRS9. Weapon possession84.51.70.02.24.70.141.52
IRS10. Tattoos that would indicate belonging to a gang or gang ownership90.90.40.00.03.00.391.51
IRS11. Minor involved in drug trafficking76.75.21.30.910.30.441.48
IRS12. On-line grooming66.80.90.90.425.40.472.41
Indicators of Moderate Risk (IMR) 2.41
IRM1. Arriving home late68.217.27.89.14.30.622.41
IRM2. Self-harm72.411.25.62.23.90.552.40
IRM3. Suicidal ideas or attempts69.411.65.21.35.60.352.39
IRM4. Occasional alcohol consumption43.533.68.26.04.70.632.38
IRM5. Occasional drug consumption56.914.26.99.57.80.662.37
IRM6. Sentimental relationships with a high level of emotional dependence44.812.116.49.913.80.522.37
IRM7. Over 13 years old and sexually active40.119.016.88.613.80.702.36
IRM8. Menstrual and/or gynaecological disorders65.910.33.92.611.20.362.33
IRM9. Pregnancy tests71.19.53.41.79.10.521.58
IRM10. Pregnancies/Abortions82.32.20.90.97.30.351.39
IRM11. Sudden personality changes50.422.415.17.30.90.682.69
IRM12. Important changes in physical appearance or way of dressing76.77.85.62.22.20.571.03
Other Indicators of Risk (OIR) 1.03
OIR1. Minor is a sexual aggressor80.60.91.31.310.30.101.03
OIR2. Emotional distress19.028.930.619.81.30.731.03
OIR3. Signs and symptoms of depression36.628.917.212.12.20.661.02
OIR4. Fears/State of alertness47.824.112.56.55.20.651.02
OIR5. Anxiety29.332.821.19.93.90.681.02
OIR6. Signs and symptoms of malnutrition85.83.90.91.71.70.371.02
OIR7. Hypersexualised clothing73.78.68.23.41.70.631.02
OIR8. Significant decrease in academic performance65.512.55.68.23.40.611.02
OIR9. Irregular attendance at school71.66.96.07.33.00.601.02
OIR10. Abuse of mobiles and social networks44.019.015.511.26.90.542.49
OIR11. Sleeping problems53.417.211.66.08.60.572.49
OIR12. Lack of social skills39.728.017.28.23.00.372.49
Table 3. Percentage of participants in the different response options and factor loadings to vulnerabilities of CSE.
Table 3. Percentage of participants in the different response options and factor loadings to vulnerabilities of CSE.
Not PresentPresentUnknown
%%%λVIF
Family Vulnerability Indicators (VF)
VF1. Presence of any disability?84.18.27.80.261.24
VF2. Migrant family or migrant minor53.939.72.20.171.11
VF3. Inattention/Neglect/Abuse in childhood10.882.85.60.481.10
VF4. Inappropriate living conditions47.826.324.10.521.10
VF5. Family history of mental health issues26.331.539.70.521.10
VF6. Family history of committing crimes31.535.831.50.631.10
VF7. Family history of substance abuse21.641.436.20.541.10
VF8. Family violence and/or gender-based violence inside the family16.850.431.50.701.09
VF9. Family history of prostitution47.06.545.70.641.09
VF10. Breakdown of family ties21.173.34.70.401.09
Personal Vulnerability Indicators (VP) 1.17
VP1. Lack of positive ties with a protective adult36.257.84.70.621.14
VP2. Prior history of bullying48.317.732.80.611.14
VP3. Prior history of child sexual abuse51.319.827.20.651.13
VP4. Sexualised behaviour of the minor65.526.36.50.451.11
VP5. Eating disorders79.710.87.80.371.11
VP6. Social isolation44.822.84.70.521.10
VP7. Low self-esteem28.965.15.60.561.24
Table 4. Descriptive statistics and mean differences in the total scores of the blocks of CSE according to sex and age group.
Table 4. Descriptive statistics and mean differences in the total scores of the blocks of CSE according to sex and age group.
SexAge Group
MinMaxMean95% CI MeanSDZU MinMaxMean95% CI MeanSDZU
LLUL(p)LLUL(p)
CSE target indicators
Male0152.261.632.893.034.6811–130181.890.603.173.7415.0
Female0214.793.955.634.81(<0.001)14–170214.133.474.794.51(0.001)
Indicators of significant risk of CSE
Male0164.363.475.254.310.0811–130102.511.533.502.878.47
Female0174.263.554.974.06(0.933)14–170174.593.975.214.22(0.014)
Indicators of moderate risk of CSE
Male0153.432.754.123.304.8811–130151.890.862.912.9931.41
Female0256.845.857.825.62(<0.001)14–170256.125.376.885.14(<0.001)
Other indicators of risk of CSE
Male0246.235.127.345.363.4611–130247.635.439.826.392.76
Female0339.418.2410.596.71(0.001)14–170338.307.379.246.37(0.251)
Vulnerabilities
Male1125.675.126.232.673.5011–130146.405.287.523.260.20
Female0147.056.567.542.81(<0.001)14–171146.496.086.902.79(0.914)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Benavente, B.; Bully, P.; Ballester, L. Preventing Sexual Violence Against Adolescent Girls: Psychometric Validation of the EDR-ESIA Screening Instrument for Early Detection of Exploitation Risk. Behav. Sci. 2026, 16, 831. https://doi.org/10.3390/bs16050831

AMA Style

Benavente B, Bully P, Ballester L. Preventing Sexual Violence Against Adolescent Girls: Psychometric Validation of the EDR-ESIA Screening Instrument for Early Detection of Exploitation Risk. Behavioral Sciences. 2026; 16(5):831. https://doi.org/10.3390/bs16050831

Chicago/Turabian Style

Benavente, Beatriz, Paola Bully, and Lluís Ballester. 2026. "Preventing Sexual Violence Against Adolescent Girls: Psychometric Validation of the EDR-ESIA Screening Instrument for Early Detection of Exploitation Risk" Behavioral Sciences 16, no. 5: 831. https://doi.org/10.3390/bs16050831

APA Style

Benavente, B., Bully, P., & Ballester, L. (2026). Preventing Sexual Violence Against Adolescent Girls: Psychometric Validation of the EDR-ESIA Screening Instrument for Early Detection of Exploitation Risk. Behavioral Sciences, 16(5), 831. https://doi.org/10.3390/bs16050831

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop