5.1.1 Risk scenarios need to be realistically risky to be believable.
Overall, many of the teens (65%, n = 13) indicated that the risk scenarios needed to be more believable and relevant to their lived experiences. For instance, almost half of the teens (40%, n = 8) thought that cyberbullying in real-life is often harsher than what we depicted and typically about one’s physical appearance. As such, many participants considered “Emily’s” (cyberbullying persona and risk scenario) remarks, "I can’t stop laughing at ur post, it’s so stupid" to be too generic to be considered risky. Teens thought that such banter was common among teens, especially in friend groups. Instead, teens recommended harsher forms of cyberbullying, such as condescending remarks about one’s physical appearance or body image or making fun of someone’s weight, outfit, or eating disorders, namely, body-shaming. For instance, P16 recalled a cyberbullying situation where her friend was cyberbullied for being anorexic:
"It’s always like body image, like someone claimed that they were anorexic. And then someone was like, well, you literally eat everything, you can’t be." - P16 (17-year-old, female)
Other teens believed that cyberbullying sometimes felt harsher, even if it was not targeted towards them. For instance, some cyberbullies made them feel unsafe by judging and “backbiting” others, such as
“R u actually friends with (someone), aren’t they annoying?” (P9, 13-year-old, female). A few teens also redesigned the cyberbullying persona to indicate higher social status, such as Emily being rich and bullying others by looking down on them about their social status. Some teens (20%,
n = 4) also redesigned “Dave” (predatory persona and risk scenario) by having him share explicit content with teens. Their rationale was that sending compliments on one’s appearance may seem creepy but did not reach the threshold of being an actual threat. Instead, some teens felt that the predatory risk would be more believable if the predator shared explicit content with requests for sensitive information, such as their phone number or location to meet in-person (Fig.
5). In the same vein, a few teens (15%,
n = 3) critiqued that instead of asking generic questions (e.g., "where are you from?"), “Bryan” (information breach persona and risk scenario) should ask questions for more specific and targeted sensitive information, such as their location information, which could escalate into a predatory situation or offline risks. P20 explained,
"The information should at least risky enough to the point where it’s not just Oh, where are you generally from? It’s like, Where do you live? Can I have your phone number?" - P20 (14-year-old, male)
Similarly, teens (20%, n = 4) redesigned “Kyle” (scam bot persona and risk scenario) to be higher risk through targeted scam based on teens’ interests, which would feel riskier due to personalization. At the same time, teens acknowledged that such personalization might not be possible for the purposes of research and therefore recommended sending phishing links related to popular brands (e.g., Starbucks) that everyone knew, as a feasible alternative. Teens also wanted to increase the believability of Kyle by having the scam bot reshare content that was trending, making Kyle seem less suspicious, as they had seen fake accounts that stole content from smaller creators to draw less attention. In summary, teens increased the believability of the personas and risk scenarios by increasing the severity of risk, but they also considered alternatives, so that the risk scenarios were not harmful to teens in a research study.
5.1.2 Online risks should be tricky and subtle, not obvious.
Teens’ feedback indicated that our risk scenarios were too obvious. Instead, online risks often happen in subtle ways that aim to trick people. For instance, many teens (55%, n = 11) suggested that Kyle (scam bot persona and risk scenario) should send scam and phishing links in a deceptive and subtle way. They found Kyle to be too phishy to be a real person, as the account did not have a photo or bio and sent scam links that were clearly suspicious. Therefore, they redesigned Kyle to be deceptive by including a photo, bio, and content on a profile. These teens also suggested that Kyle should first attempt to interact with users similar to real human accounts and then send malicious content. Moreover, they recommended that Kyle should send personalized click-bait to match the type of scam they receive online and to make the link more deceiving such as “Hey, is this you?”... “No? can you at least check this out.” Other teens suggested making the scam link more enticing by offering money, giftcards, or gaming points, such as “Congrats, you’ve won our giveaway from Target! Click here to redeem..." (P10, 15-year-old, male). A few teens commented that such scam links often come from hacked accounts of their friends, which increased their chances of clicking the links. P12 recalled similar targeted phishing risks,
"I see those a lot like someone tagged me, oh, you want a giveaway, press the link and then they ask for your credit card information. My friend gave her Social Security once." - P12 (14-year-old, female)
Additionally, almost half of teens (45%,
n = 9) recommended that Dave (predatory persona and risk scenario) should trick victims by building trust first, as they felt that such risks often fell into two categories; a) stalkers who messaged you inappropriate comments out-of-the-blue, or b) predators with a an ulterior motive who slowly built trust with the teen, and befriended them before risky behavior. As such, teens recommended different strategies for trust building for Dave. For instance, a few teens recommended that such predators often try to gain the victims’ sympathy by sharing personal problems or relatable "rants" (e.g., about their job), and later revealing their risky motives (e.g., requests to meet) (Fig.
5). For instance, P14 added a risky message for Dave,
“I really enjoy talking to you and would love to get to know you better...want to meet up?” (P14, 16-year-old, male). Other suggestions included making Dave a supportive person for the teens who helps them to gain their trust, as P19 suggested,
"I would make him like more a counselor. Someone like who listens to people’s feelings and pretends they want the best for them" - P19 (17-year-old, male)
A few teens thought that predators often try to offer incentives to attract teens, such as showing off their belongings, career, or social life (Fig.
5). Other teens believed that Dave would make personalized comments about the teen’s photos, instead of generic remarks, to get a response; they explained that teens are at a vulnerable age where they are often impressed by such compliments. Relatedly, some teens (35%,
n = 7) thought that Bryan (information breach persona and risk scenario) was asking for information in very obvious ways, by immediately jumping to ask the teen’s address. In contrast, they believed that such risks were often perpetuated ambiguously and redesigned Bryan to ask for information subtly, for instance, based on mutual factors (e.g., location, interests),
“Hey, did you go to Oakridge, u look kinda familiar” (P11, 18-year-old, female). Moreover, some teens believed that such risks were often built up over time, with established rapport and shared context with the teen, before asking for their personal information. P16 explained,
"If they immediately put, Where is it? What’s your number, that’s automatic block for me. But I would give it a second thought if they’re in my area or around my age." - P16 (17-year-old, female)
Lastly, teens (30%, n = 6) changed Emily’s (cyberbullying persona and risk scenario) persona to be more tricky as they thought that condescending remarks happened in subtle ways through backhanded compliments about physical appearance. For instance, one of the participants suggested that Emily should make a sarcastic comment, "OMG that outfit would look so much better on me :)". Teens explained that such sarcastic comments can leave the victims confused and disturbed. Additionally, they thought that such back-handed bullying often comes from people they know. For instance, P11 questioned the intention of such cyberbullies online, as she thought that their aim is often to hurt the other person while protecting themselves without saying something too obviously harmful. P11 explained,
"Many people are really smart with how they say things, they won’t be too direct so that they can back out and they want you to think about it so that it hurts" - P11 (18-year-old, female)
Overall, half of the teens shared how risk severity often lies in subtlety, where risks and positive interactions are not mutually exclusive (50%, n = 10). Online risks were considered tricky, as interactions that start as positive may end up with a breach of trust or information.
5.1.3 Characteristics of the perpetrator should match the risk.
The majority of teens (90%,
n = 18) in our study wanted the characteristics of the perpetrators to match the risk in order to improve realism, based on experience with users they met online. Overall, teens were thoughtful about how the personalities would play a critical role in the type of interaction they expected to have with the personas. Teens paid attention to several characteristics of the risky personas, including their personalities, backgrounds, occupations, and content. For instance, several teens (40%,
n = 8) pointed out that “Dave” should have a more realistic and relaxed occupation because an adult who is busy with their job would not spend that much time on social media (Fig.
5). P12 explained,
"It’s unrealistic that someone with a busy profession would spend so much time outside of work on social media" - P12 (14-year-old, female)
Teens also considered Dave’s apparent age problematic; several teens (25%,
n = 5) thought that he should hide his real age in an attempt to deceive teens and fit in with the younger crowd. A few teens (15%,
n = 3) thought that his character should be narcissistic to match the type of creepy users they encounter online, by posting more photos of himself and oversharing about himself (Fig.
5). Being an adult, teens also imagined Dave to have a different texting style than teens, such as using too many emojis or not being familiar with their slang. Teens also changed the personality traits of “Bryan” (information breach) to better match the risk scenario. For instance, some teens (25%,
n = 5) wanted Bryan to act more oblivious and naive, as an introverted teen, who would use innocence to trick the victim. This was because they thought that Bryan would benefit from
seeming like someone who does not understand social cues and was unaware of what was appropriate to ask, leading others to give him the benefit of the doubt. P10 explained,
"It can leave a person who’s talking with this persona thinking ’Oh, well, they’re a bit naive. Maybe they didn’t realize that at first.’ which might lead someone to trusting them more." - P10 (15-year-old, male)
In contrast, some teens (25%, n = 5) wanted to change Bryan’s personality completely to be extroverted, as they considered that an introverted person would be less likely to ask such direct and invasive questions. Importantly, a few teens were particularly off-put by the awkward nature of Bryan’s persona, as they strongly felt that socially awkward individuals should not be depicted as unsafe. This was insightful feedback from an autistic teen who participated in the study that we will take to heart. Overall, teens felt that Bryan should be deceptive by either faking being a naive teen or being an upfront extroverted personality to ask direct questions.
Teens also thought that risky users may show opposing sides of their personality in different contexts. Several teens thought that popular people care about their reputation and do not cyberbully others publicly for fear of getting “canceled.” Therefore, many teens (35%, n = 7) redesigned Emily to be more "two-faced", who would bully in private, while pretending to be supportive to others in public. Moreover, some teens thought that such cyberbullies often have influential personalities and often act as the "leader" of the group. Due to the peer pressure, they often get support from others, leading to ganging up on a victim, as no one would stand up to the cyberbully. P3 described this persona,
"If she says something, everyone will follow. No one’s brave enough to stand up."- P3 (16-year-old, female)
Finally, we looked at the big picture, by viewing all personas and risk scenarios (risky, neutral, positive) together. Teens were quite vocal about not agreeing with our categorizations as they thought that social media users should not be boxed into black-and-white categories like “risky,” “positive,” or “neutral” as many of these traits co-exist. Instead, some teens (35%, n = 7) recategorized personas based on their relationship with the person (e.g., safe users they know and trust, acquaintances, and untrusted strangers). In contrast, a few teens did not think that the people they knew were always safe (e.g., positive users can have risky traits). A few teens (20%, n = 4) decided on the safety of a user depending on past interactions (e.g., someone who supports them would be safe). Therefore, teens considered the online safety of users to be a convoluted concept, where safety was on a spectrum, rather than discrete categorizations.