<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Comput. Sci.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Computer Science</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Comput. Sci.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">2624-9898</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fcomp.2026.1655186</article-id>
<article-version article-version-type="Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Understanding and responding to complex online harms: misinformation, fake news, and young adults</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Zhang</surname>
<given-names>Viana Nijia</given-names>
</name>
<xref ref-type="aff" rid="aff1"/>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/2235170"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Project administration" vocab-term-identifier="https://credit.niso.org/contributor-roles/project-administration/">Project administration</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="software" vocab-term-identifier="https://credit.niso.org/contributor-roles/software/">Software</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Vlachokyriakos</surname>
<given-names>Vasilis</given-names>
</name>
<xref ref-type="aff" rid="aff1"/>
<uri xlink:href="https://loop.frontiersin.org/people/3368957"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Project administration" vocab-term-identifier="https://credit.niso.org/contributor-roles/project-administration/">Project administration</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Funding acquisition" vocab-term-identifier="https://credit.niso.org/contributor-roles/funding-acquisition/">Funding acquisition</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Johnson</surname>
<given-names>Ian</given-names>
</name>
<xref ref-type="aff" rid="aff1"/>
<uri xlink:href="https://loop.frontiersin.org/people/2791094"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Durrant</surname>
<given-names>Abigail</given-names>
</name>
<xref ref-type="aff" rid="aff1"/>
<uri xlink:href="https://loop.frontiersin.org/people/2236566"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="resources" vocab-term-identifier="https://credit.niso.org/contributor-roles/resources/">Resources</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Funding acquisition" vocab-term-identifier="https://credit.niso.org/contributor-roles/funding-acquisition/">Funding acquisition</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Project administration" vocab-term-identifier="https://credit.niso.org/contributor-roles/project-administration/">Project administration</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
</contrib>
</contrib-group>
<aff id="aff1"><institution>Open Lab, School of Computing, Newcastle University</institution>, <city>Newcastle upon Tyne</city>, <country country="gb">United Kingdom</country></aff>
<author-notes>
<corresp id="c001"><label>&#x002A;</label>Correspondence: Viana Nijia Zhang, <email xlink:href="mailto:Nijia.Zhang2@newcastle.ac.uk">Nijia.Zhang2@newcastle.ac.uk</email></corresp>
</author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-03-04">
<day>04</day>
<month>03</month>
<year>2026</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2026</year>
</pub-date>
<volume>8</volume>
<elocation-id>1655186</elocation-id>
<history>
<date date-type="received">
<day>27</day>
<month>06</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>14</day>
<month>10</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>20</day>
<month>01</month>
<year>2026</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2026 Zhang, Vlachokyriakos, Johnson and Durrant.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>Zhang, Vlachokyriakos, Johnson and Durrant</copyright-holder>
<license>
<ali:license_ref start_date="2026-03-04">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<sec>
<title>Introduction</title>
<p>This United Kingdom (UK)-based study examines how online tools and technologies shape young adults&#x2019; interactions with misinformation and fake news in everyday contexts, integrating insights from young adults and key stakeholders from both public and private sectors.</p>
</sec>
<sec>
<title>Methods</title>
<p>Through two data collection workshops&#x2014;a stakeholder engagement session (N=22) and a co-design workshop with young adults aged 18 to 25 (M=7), we explored the challenges that young people face when encountering and interacting with misinformation and fake news online. Additionally, we examined the design of privacy-enhancing technologies, as well as the innovation and policy development priorities highlighted by our stakeholders.</p>
</sec>
<sec>
<title>Results</title>
<p>Our findings point to how young adults become vulnerable to exploitation by malicious actors online in various contexts, especially focusing on emotionally vulnerable life events. Our findings also emphasise the need for more empirical research that engages young adults within enclosed online communities, such as online gaming voice channels, where opinions can become radicalised, emotions intensified, and young adults desensitised.</p>
</sec>
<sec>
<title>Discussion</title>
<p>We propose implications for designing harm-reducing tools through increasing young people&#x2019;s individual agency, equipping them with the skills to recognise, assess, and address misinformation whilst also enhancing their algorithmic and new media literacy. We also advocate for increased reciprocal interactions and collaboration between mainstream and marginalised communities. These recommendations aim to guide the education sector, parents, policymakers, media professionals, technology designers, and other stakeholders in exercising collective agency and fostering collaborative efforts to share communications and values that contribute to safeguarding a safer online environment for young adults.</p>
</sec>
</abstract>
<kwd-group>
<kwd>misinformation</kwd>
<kwd>fake news</kwd>
<kwd>young adults</kwd>
<kwd>online harms</kwd>
<kwd>social media</kwd>
</kwd-group>
<funding-group>
<funding-statement>The author(s) declared that financial support was received for this work and/or its publication. This research is supported by both the AGENCY Project and the Centre for Digital Citizens (CDC) Project. &#x2018;AGENCY: Assuring Citizen Agency in a World with Complex Online Harms&#x2019; is an interdisciplinary research project (<ext-link xlink:href="https://agencyresearch.net/" ext-link-type="uri">https://agencyresearch.net/</ext-link>) funded by EPSRC through REPHRAIN, the National Research Centre on Privacy, Harm Reduction and Adversarial Influence Online (<ext-link xlink:href="https://www.rephrain.ac.uk/" ext-link-type="uri">https://www.rephrain.ac.uk/</ext-link>). The aim of the AGENCY project is to explore the design of tools that empower their users to manage the potential risk of online harms and address unmet user needs within the UK population. The project combines academic expertise in Computer Science, Design, Communication Studies, Business, Applied Ethics and Law and involves applied (real-world) research with stakeholders and intended end users of online technologies, and sketching and evaluation of novel design concepts to inform the development of privacy enhancing technologies. Furthermore, AGENCY is case study based, to address particular contexts of interaction in which complex harms may take place. CDC centre is also funded by EPSRC. It takes an inclusive, participatory approach and works with citizens and partners to co-design sustainable &#x2018;Digital Social Innovations&#x2019; that ensure technologies applications support diverse communities and have long-lasting social value and impact beyond the life of the Centre (<ext-link xlink:href="https://digitalcitizens.uk" ext-link-type="uri">https://digitalcitizens.uk</ext-link>).</funding-statement>
</funding-group>
<counts>
<fig-count count="2"/>
<table-count count="2"/>
<equation-count count="0"/>
<ref-count count="176"/>
<page-count count="20"/>
<word-count count="18167"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Human-Media Interaction</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<label>1</label>
<title>Introduction</title>
<p>The social media landscape encompasses diverse web-based communication and networking tools (<xref ref-type="bibr" rid="ref167">Wang et al., 2019</xref>). It emphasises user-generated content shaped by distinct social-cultural characteristics, influencing communication styles, values and ideologies worldwide (<xref ref-type="bibr" rid="ref31">Butler, 2012</xref>; <xref ref-type="bibr" rid="ref33">Chen et al., 2011</xref>; <xref ref-type="bibr" rid="ref161">Ulrich, 1986</xref>). However, it has grown increasingly complex due to unregulated information flow and the spread of misinformation and fake news (e.g., <xref ref-type="bibr" rid="ref49">Eysenbach, 2020</xref>; <xref ref-type="bibr" rid="ref54">Freelon and Wells, 2020</xref>). Social media and online communication platforms have become a fact of life for young adults (<xref ref-type="bibr" rid="ref173">Young et al., 2023</xref>) in the United States (US) and globally. Their relationship with online misinformation and fake news is multifaceted, driven by their extensive platform use. In China, young adults can be not only targets but also spreaders, creators, or critics of false information (<xref ref-type="bibr" rid="ref33">Chen et al., 2011</xref>). In the UK, <xref ref-type="bibr" rid="ref132">Ofcom (2024b)</xref> reports that this demographic frequently encounters misinformation. Transnationally, misinformation is an established term that refers to a wide range of &#x2018;false, misleading, and deceptive&#x2019; information &#x2018;disorders&#x2019;, varying by intention and veracity (<xref ref-type="bibr" rid="ref45">Ecker et al., 2022</xref>). UK young adults use an average of 8.7 communication platforms, increasing their exposure to potentially harmful content (<xref ref-type="bibr" rid="ref131">Ofcom, 2024a</xref>). <xref ref-type="bibr" rid="ref131">Ofcom&#x2019;s (2024a)</xref> <italic>Adults&#x2019; Media Use and Attitudes Report</italic> highlights that, despite high confidence in digital literacy, many remain unable to handle situations such as scam emails, leaving them vulnerable to misinformation and fake news.</p>
<p>The Online Safety Act 2023 (OSA) (<xref ref-type="bibr" rid="ref135">Online Safety Act 2023, 2023</xref>) is a landmark piece of legislation designed to protect children and adults online by imposing duties to online user-to-user services&#x2014;such as video-sharing platforms, forums, chat and dating services&#x2014;to conduct risk assessments (<xref ref-type="bibr" rid="ref118">Milmo, 2024</xref>). Currently, the OSA arguably lacks a credible and comprehensive plan to address the harms caused by online misinformation and fake news, leaving the public vulnerable to pervasive risks associated with online harms (<xref ref-type="bibr" rid="ref8">Arshad and Brasted, 2024</xref>; <xref ref-type="bibr" rid="ref55">Full Fact, 2024</xref>). Such harms include exposure to harmful or extremist ideologies, manipulation through false narratives, and victimisation by scams which have been exacerbated by the spread of online falsehoods (<xref ref-type="bibr" rid="ref46">Elgot and Courea, 2024</xref>). Our study reported herein emerged within this context, responding to the gaps in the OSA by focusing on a demographic that continues to require societal attention.</p>
<p>Significant research and media attention have centred on children (e.g., <xref ref-type="bibr" rid="ref70">Hopwood, 2023</xref>; <xref ref-type="bibr" rid="ref97">Lepper, 2024</xref>) and teenagers (e.g., <xref ref-type="bibr" rid="ref3">Almeida et al., 2023</xref>), particularly concerning their exposure to fake news (<xref ref-type="bibr" rid="ref12">BBC, 2024</xref>) and the psychological impacts of manipulated imagery, such as beauty filters (<xref ref-type="bibr" rid="ref20">Booth, 2024</xref>). However, young adults also warrant attention, as they are among the most active users of social media and video platforms (<xref ref-type="bibr" rid="ref5">Anderson and Jiang, 2018</xref>). Reuters Institute report (<xref ref-type="bibr" rid="ref128">Newman et al., 2022</xref>; <xref ref-type="bibr" rid="ref127">Newman et al., 2023</xref>) show 39&#x2013;44% of 18- to 24-year-olds (N&#x202F;=&#x202F;2000) used Tiktok as their primary source of news between 2022 and 2023. By 2024, 86% of this group worldwide (<italic>N</italic> = 10,024) identified platforms including Instagram, Tiktok and X as main news sources (<xref ref-type="bibr" rid="ref129">Newman et al., 2024</xref>). A UK survey published by The Alan Turing Institute and The Ada Lovelace Institute found that 41% of 18- to 24&#x202F;year-olds reported the highest exposure to harmful online content (<xref ref-type="bibr" rid="ref48">Enoch et al., 2023</xref>).</p>
<p>Despite growing independence and digital proficiency (<xref ref-type="bibr" rid="ref149">Schwartz et al., 2015</xref>; <xref ref-type="bibr" rid="ref156">Simpson, 2018</xref>), young adults remain susceptible to online misinformation, fake news, and harmful and illegal content due to their transitional developmental stage (<xref ref-type="bibr" rid="ref160">Treadway and Holloway, 2018</xref>). Whilst aware of misleading content, many lack adequate knowledge of fact-checking tools and struggle to evaluate credibility (<xref ref-type="bibr" rid="ref37">De Vicente Dom&#x00ED;nguez et al., 2021</xref>). As society increasingly relies on digital platforms, it is imperative to examine young adults&#x2019; exposure to misinformation and fake news, whilst addressing the challenges they face in navigating a deceptive digitalised information environment that transcends national boundaries.</p>
<p>This paper explores the complex online harms posed by misinformation and fake news affecting young adults in the UK. We focused on their lived experiences, complemented by stakeholder insights. We examined how young adults interact with social media content and exercise agency in identifying, navigating, and mitigating such harms. Whilst some literature treats &#x2018;agency&#x2019; and &#x2018;autonomy&#x2019; synonymously (<xref ref-type="bibr" rid="ref14">Bennett et al., 2023</xref>), others distinguish &#x2018;autonomy&#x2019; as social-transformational and agency as the individual capacity to influence one&#x2019;s environment (<xref ref-type="bibr" rid="ref83">Kalaja and Rouhotie-Lyhty, 2021</xref>). We adopted the Human-Computer Interaction (HCI) definition of &#x2018;agency&#x2019; as the experience of initiating intentional actions (<xref ref-type="bibr" rid="ref108">Lukoff et al., 2021</xref>). Building on this, we examined the potential of harm-reducing tools to support young adults in taking control of their digital interactions, identifying misinformation and fake news, preventing its spread, and co-creating safer spaces whilst preserving freedom of social expression.</p>
<p>Our study had two aims. First, through engagements with stakeholders and young adults, we contextualised scenarios in which young adults encounter misinformation online and examined the associated harms and mechanisms. Second, through discussions and co-design sessions, we explored implications for developing privacy enhancing technologies (PETs) that reduce harms and support young adults in exercising agency and mitigating risks. Specifically, we addressed the following research questions.</p>
<disp-quote>
<p>RQ1: In what contexts are young adults more susceptible to online harms when navigating information?</p>
</disp-quote>
<disp-quote>
<p>RQ2: What are the implications for designing harm-reducing technologies that support young adults in exercising agency to identify online misinformation and fake news, whilst mitigating the harms enabled by such content?</p>
</disp-quote>
<p>We adopted a qualitative approach to embrace in-depth, idiographic insights from diverse stakeholder groups introduced above. Two workshops held in May and August 2023 engaged young adults<italic>&#x2014;</italic>as primary social media consumers<italic>&#x2014;</italic>alongside stakeholders from sectors responsible for safeguarding online information integrity. These workshops illuminated critical contexts and scenarios where complex harms emerge, as well as the roles individuals play in creating and disseminating them. We also investigated the vulnerabilities increasing young adults&#x2019; susceptibility to these harms. Our empirical engagements produced concrete, storyboard-based depictions of how young adults encounter misinformation in mundane settings. We further highlight the emotional dimensions of these interactions, the indicators used to assess trustworthiness, the vulnerabilities that increase their susceptibility to harm, and participant-proposed mitigation strategies. These findings provide valuable insights for designing harm-reducing tools to help young adults identify and evaluate online misinformation and fake news effectively.</p>
<p>We structure this paper as follows. In Section 2 we review the literature on young adults&#x2019; consumption of online misinformation and differing perspectives on agency. Section 3 details the study methods, participant demographics, and the three storyboards co-created by young adults during the second workshop. In Section 4 we present findings s derived from the round-table discussions across both workshops, organised thematically. In Section 5 we reflect on these themes and participant contexts, proposing design implications for PETs that support content identification and the effective exercise of agency by young adults.</p>
</sec>
<sec id="sec2">
<label>2</label>
<title>Background</title>
<sec id="sec3">
<label>2.1</label>
<title>Young people and misinformation</title>
<p>Although the literature often uses umbrella terms such as &#x2018;young people&#x2019; or &#x2018;youth&#x2019;&#x2014;often encompassing ages 15 to 35 (e.g., <xref ref-type="bibr" rid="ref43">Duan, 2023</xref>; <xref ref-type="bibr" rid="ref53">Ford et al., 2024</xref>; <xref ref-type="bibr" rid="ref81">Juvalta et al., 2023</xref>)&#x2014;this study focuses specifically on &#x2018;young adults&#x2019; aged 18&#x2013;25 due to their distinct cognitive and emotional characteristics (<xref ref-type="bibr" rid="ref45">Ecker et al., 2022</xref>). This age marks a transitional phase involving identity formation, abstract reasoning, emotional reasoning, emotional regulation, and critical thinking (<xref ref-type="bibr" rid="ref149">Schwartz et al., 2015</xref>; <xref ref-type="bibr" rid="ref156">Simpson, 2018</xref>). As part of <italic>Generation Z</italic>, they are considered digital migrants shaped by technologies and frequently characterised as open-minded and homogeneous (<xref ref-type="bibr" rid="ref41">Dimock, 2019</xref>; <xref ref-type="bibr" rid="ref74">Insider Intelligence, 2023</xref>; <xref ref-type="bibr" rid="ref68">Hassoun et al., 2023</xref>; <xref ref-type="bibr" rid="ref139">Parker and Igielnik, 2020</xref>). Upon gaining legal adulthood, they can access age-restricted content and be responsible for criminal behaviours (<xref ref-type="bibr" rid="ref133">Office for National Statistics, 2019</xref>), yet they remain susceptible to online misinformation due to ongoing cognitive development (<xref ref-type="bibr" rid="ref48">Enoch et al., 2023</xref>; <xref ref-type="bibr" rid="ref143">Quintas-Froufe et al., 2024</xref>).</p>
<p>Young adulthood is also a sensitive developmental period marked by enhanced vulnerability to environmental stressors (<xref ref-type="bibr" rid="ref16">Biddle et al., 1990</xref>; <xref ref-type="bibr" rid="ref18">Bleidorn et al., 2014</xref>). According to the UK&#x2019;s &#x2018;State of the nation 2022&#x2019; report, vulnerable young adults are often targets of coercion and exploitation (<xref ref-type="bibr" rid="ref38">Department for Education, 2023</xref>), yet they may not recognise abuse or report it, engaging in high-risk behaviours (<xref ref-type="bibr" rid="ref7">Arora et al., 2015</xref>; <xref ref-type="bibr" rid="ref9">Bailey, 2017</xref>). <xref ref-type="bibr" rid="ref173">Young et al. (2023)</xref> found that US college students perceive online harassment as pervasive but exhibit limited engagement in addressing it, often normalising hatred and promoting unjust social comparisons.</p>
<p>Despite awareness of misinformation and fake news, young adults often underestimate its impact. <xref ref-type="bibr" rid="ref62">Gurgun et al. (2024)</xref> conducted a survey among 247 UK Facebook users and found they are less likely than older adults to challenge misinformation on the platform. A self-reporting survey during the COVID-19 identified young adults (aged 18&#x2013;35) frequently spread misinformation, often without verifying content (<xref ref-type="bibr" rid="ref10">Balakrishnan, 2024</xref>). Contributing factors include lack of media literacy education, time constraints, limited interest, and overconfidence in their critical skills (<xref ref-type="bibr" rid="ref37">De Vicente Dom&#x00ED;nguez et al., 2021</xref>; <xref ref-type="bibr" rid="ref106">Livingstone, 2004</xref>; <xref ref-type="bibr" rid="ref107">Livingstone et al., 2019</xref>; <xref ref-type="bibr" rid="ref113">Manca et al., 2021</xref>; <xref ref-type="bibr" rid="ref170">Xiao et al., 2021</xref>).</p>
<p>The critical role of social media platforms in young adults&#x2019; communications has also been frequently highlighted in studies with this demographic during COVID-19 (<xref ref-type="bibr" rid="ref40">Diepeveen and Pinet, 2022</xref>; <xref ref-type="bibr" rid="ref53">Ford et al., 2024</xref>, <xref ref-type="bibr" rid="ref52">2025</xref>; <xref ref-type="bibr" rid="ref103">List et al., 2015</xref>). Despite heavy use of these platforms, young adults regarded them as some of the least reliable sources of information (<xref ref-type="bibr" rid="ref40">Diepeveen and Pinet, 2022</xref>). In examining the effectiveness of vaccine messaging from Canadian government Instagram accounts targeting 18&#x2013;29&#x202F;year olds for the COVID-19 vaccine, <xref ref-type="bibr" rid="ref53">Ford et al. (2024)</xref> highlight that these efforts failed to meet the needs of this demographic, particularly in building trust and addressing online misinformation.</p>
<p>However, more research is needed to clearly define the contexts in which young adults encounter online misinformation and fake news, and how they make sense of it, beyond just understanding their general perceptions and attitudes. This will help identify specific risks in concrete scenarios and inform the development of more targeted interventions.</p>
</sec>
<sec id="sec4">
<label>2.2</label>
<title>Online misinformation and correction</title>
<p><xref ref-type="bibr" rid="ref174">Yu et al. (2023)</xref> conducted a systematic review of 64 empirical studies to understand strategies for reducing misinformation sharing and promoting correction sharing in today&#x2019;s decentralised informational landscape. Their findings highlight several social media platform features that contribute to the recirculation of misinformation. These include credibility indicators such as user and expert reputation ratings (<xref ref-type="bibr" rid="ref90">Kim et al., 2019</xref>); virality metrics like the number of retweets (<xref ref-type="bibr" rid="ref96">Lee and Oh, 2017</xref>), likes and replies (<xref ref-type="bibr" rid="ref89">Kim, 2018</xref>); the influence of power users (<xref ref-type="bibr" rid="ref152">Shao et al., 2018</xref>); profit-driven algorithms (<xref ref-type="bibr" rid="ref28">Braun and Eklund, 2019</xref>); and the employment of bots (<xref ref-type="bibr" rid="ref152">Shao et al., 2018</xref>). The sequence of exposure to rumours and rebuttals also affects message perception and acceptance (<xref ref-type="bibr" rid="ref136">Pal et al., 2020</xref>). These findings align with earlier research by <xref ref-type="bibr" rid="ref30">Bryanov and Vziatysheva (2021)</xref>, which explained why individuals fall for fake news and the factors influencing belief in misinformation. For instance, message topics and bandwagon heuristics, represented by the numbers of likes, can significantly enhance the perceived credibility (<xref ref-type="bibr" rid="ref109">Luo et al., 2022</xref>). <xref ref-type="bibr" rid="ref174">Yu et al. (2023)</xref> also found that perceived message importance mediates misinformation and correction-sharing behaviours (<xref ref-type="bibr" rid="ref134">Oh and Lee, 2019</xref>), aligning with prior work on the role of innate beliefs and ideological predispositions (<xref ref-type="bibr" rid="ref141">Pennycook and Rand, 2020</xref>). However, more research is needed to explore how young adults assess online information in everyday contexts and what actions they take based on trust or mistrust.</p>
<p>Existing studies in the social sciences and HCI have examined practical approaches to help a broader demographic identify and prevent the spread of misinformation and fake news online (e.g., <xref ref-type="bibr" rid="ref68">Hassoun et al., 2023</xref>; <xref ref-type="bibr" rid="ref126">Nazari et al., 2022</xref>; <xref ref-type="bibr" rid="ref158">Staender and Humprecht, 2023</xref>; <xref ref-type="bibr" rid="ref163">Veeriah, 2021</xref>). Various measures for fact-checking have been compared, designed, and evaluated, including the use of traditional news media, fact-checking organisations, professional journalists, as well as emerging approaches such as Artificial Intelligence (AI) and crowdsourcing (e.g., <xref ref-type="bibr" rid="ref3">Almeida et al., 2023</xref>; <xref ref-type="bibr" rid="ref66">Haque et al., 2020</xref>; <xref ref-type="bibr" rid="ref98">Li and Chang, 2023</xref>; <xref ref-type="bibr" rid="ref105">Liu et al., 2023</xref>; <xref ref-type="bibr" rid="ref148">Santos and Pereira, 2024</xref>; <xref ref-type="bibr" rid="ref155">Shusas, 2024</xref>). <xref ref-type="bibr" rid="ref151">Sehat et al. (2024)</xref> proposed a priority framework to assist fact-checkers in making strategic decisions to evaluate and address the harms caused by misinformation. Other measures include interventions by trusted individuals, such as family members, who challenge the misinformed person offline&#x2014;a strategy highlighted as effective by <xref ref-type="bibr" rid="ref150">Scott et al. (2023)</xref>. Additionally, games have been developed to raise awareness about the tactics employed by misinformation creators (e.g., <xref ref-type="bibr" rid="ref71">Humphrey, 2023</xref>; <xref ref-type="bibr" rid="ref85">Karlova, 2018</xref>; <xref ref-type="bibr" rid="ref112">Maertens et al., 2021</xref>; <xref ref-type="bibr" rid="ref146">Roozenbeek and Van Der Linden, 2019</xref>). Warning labels designed to discourage users from engaging with misinformation or assist in correcting it, along with preventive measures integrated into messaging platforms to limit content sharing, have also been explored (e.g., <xref ref-type="bibr" rid="ref29">Broniatowski et al., 2023</xref>; <xref ref-type="bibr" rid="ref125">Nassetta and Gross, 2020</xref>). However, some interventions, such as setting warning flags, may only be effective for a short period (<xref ref-type="bibr" rid="ref29">Broniatowski et al., 2023</xref>; <xref ref-type="bibr" rid="ref150">Scott et al., 2023</xref>).</p>
<p>Whilst researchers have started to explore specific vulnerable groups, such as older adults and individuals who have previously shared low-quality news (e.g., <xref ref-type="bibr" rid="ref24">Brashier, 2024</xref>; <xref ref-type="bibr" rid="ref121">Moore and Hancock, 2022</xref>; <xref ref-type="bibr" rid="ref140">Peng et al., 2024</xref>), there remains a lack of evidence addressing the unique implications for young adults. Teenagers are growing up in an era where information on social media saturates their lives, and influencers significantly shape their options (e.g., <xref ref-type="bibr" rid="ref142">Peter and Muth, 2023</xref>). We consider our work both timely and critical in raising awareness of these experiences. Furthermore, we offer considerations for stakeholdesrs in global societies who are involved in the health and growth of younger generations.</p>
</sec>
<sec id="sec5">
<label>2.3</label>
<title>Perspectives on agency</title>
<p>We define &#x2018;agency&#x2019; as the subjectivity of individuals in holding motivational attitudes and taking initiative aligned with those attitudes (<xref ref-type="bibr" rid="ref64">Hainz et al., 2016</xref>). In our study, we focus on young adults&#x2019; proactive attitudes and their capability to act against the spread of misinformation and fake news they encounter online. We emphasise the importance of their ability to shape outcomes rather than merely exchange information, whilst also evaluating such behaviours with regards to their own beliefs and attitudes (<xref ref-type="bibr" rid="ref64">Hainz et al., 2016</xref>; <xref ref-type="bibr" rid="ref108">Lukoff et al., 2021</xref>). <xref ref-type="bibr" rid="ref14">Bennett et al. (2023)</xref> categorised human agency into four broad aspects: (1) the level and directness of casual involvement or value alignment (e.g., <xref ref-type="bibr" rid="ref17">Birk et al., 2016</xref>; <xref ref-type="bibr" rid="ref94">Lazar et al., 2017</xref>; <xref ref-type="bibr" rid="ref116">Mentis et al., 2019</xref>; <xref ref-type="bibr" rid="ref162">Valencia et al., 2020</xref>); (2) the sense of agency in triggering events (e.g., <xref ref-type="bibr" rid="ref86">Kasahara et al., 2019</xref>); (3) the timescale of agency manifests, from momentary to lifelong (e.g., <xref ref-type="bibr" rid="ref35">Cornelio Martinez et al., 2017</xref>; <xref ref-type="bibr" rid="ref51">Foley et al., 2019</xref>); and (4) individual independence versus social interdependence (e.g., <xref ref-type="bibr" rid="ref57">Garg, 2022</xref>; <xref ref-type="bibr" rid="ref61">G&#x00FC;ldenpfennig et al., 2019</xref>). Despite these categorisations, researchers often fail to articulate or examine the coordination and trade-offs between these dimensions (<xref ref-type="bibr" rid="ref14">Bennett et al., 2023</xref>). <xref ref-type="bibr" rid="ref77">Jicol et al. (2021)</xref>, for instance, explored emotion and agency in Virtual Reality settings, showing that agency moderates the emotion&#x2019;s effect on presence.</p>
<p>In the social sciences, particularly in Social Media Studies, agency has been examined through diverse lenses. Increasing attention is directed towards agency involving machines and algorithms in mainstream media and journalism (e.g., <xref ref-type="bibr" rid="ref102">Linden, 2017</xref>; <xref ref-type="bibr" rid="ref147">Rydenfelt, 2022</xref>; <xref ref-type="bibr" rid="ref164">Verwiebe et al., 2024</xref>). Researchers have argued to maintain human oversight and control by ensuring individuals are informed about and capable of monitoring the behaviours of automated algorithmic agents, which should not independently make decisions (<xref ref-type="bibr" rid="ref102">Linden, 2017</xref>; <xref ref-type="bibr" rid="ref147">Rydenfelt, 2022</xref>). Complementing this perspective, <xref ref-type="bibr" rid="ref34">Clark et al. (2015)</xref> explored the potential for agency in generation of young people through exchange storytelling. Their work highlighted how digitally enabled narrative exchanges on digital and social media platforms can foster a deeper awareness of the complex contexts that young people connect with.</p>
<p>Existing research across different fields is establishing connections. For instance, <xref ref-type="bibr" rid="ref14">Bennett et al.&#x2019;s (2023)</xref> generation of the interdependence within social contexts aligns with <xref ref-type="bibr" rid="ref34">Clark et al.&#x2019;s (2015)</xref> proposition of encouraging such awareness in education to generate agency among young people. However, a notable gap remains in further identifying other dimensions of agency that contribute to positive outcomes, such as enhancing individuals&#x2019; sense of self and wellbeing (<xref ref-type="bibr" rid="ref14">Bennett et al., 2023</xref>; <xref ref-type="bibr" rid="ref108">Lukoff et al., 2021</xref>). We recognise an opportunity through our recent work to contribute new, empirically grounded implications for how to promote agency in ways that enable young adults to protect themselves whilst mitigating the harms and risks associated with navigating information online, especially when encountering online misinformation and experiencing forms of online harm.</p>
</sec>
</sec>
<sec sec-type="methods" id="sec6">
<label>3</label>
<title>Methods</title>
<p>Our qualitative approach was grounded in a phenomenological methodology and our objective to empirically understand and evidence a &#x2018;rich picture&#x2019; of individual experiences and perspectives from diverse cross-sector and cross-generational groups within the UK population (<xref ref-type="bibr" rid="ref44">Durrant et al., 2018</xref>). This guided our sampling strategy to engage diverse groups of individuals, and methods; we planned first a cross-sector workshop engaging a mix of professional stakeholders across job sectors plus young adults who have also professionally engaged with the subject; and a second &#x2018;co-design&#x2019; workshop with young adults who also hold professional expertise or training in design or HCI.</p>
<p>The first stakeholder workshop (W1) engaged 22 stakeholders recruited through the research team&#x2019;s professional network (see <xref ref-type="table" rid="tab1">Table 1</xref>). The workshop aimed to gain a multi-faceted understanding from people who live or work closely with young adults, including the contexts and encounters with misinformation and fake news, and the related impacts.</p>
<table-wrap position="float" id="tab1">
<label>Table 1</label>
<caption>
<p>Stakeholder workshop (W1) participant information.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Participant ID (W1)</th>
<th align="left" valign="top">Role</th>
<th align="left" valign="top">Expertise</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">P1</td>
<td align="left" valign="top">(Former) Police Representative</td>
<td align="left" valign="top">Design and deliver violence reduction themed learning with and for children and young people</td>
</tr>
<tr>
<td align="left" valign="top">P2</td>
<td align="left" valign="top">Public Media Corporation Representative</td>
<td align="left" valign="top">Data and Artificial Intelligence (AI) in news production and reporting</td>
</tr>
<tr>
<td align="left" valign="top">P3</td>
<td align="left" valign="top">Digital Identity Company Representative</td>
<td align="left" valign="top">Policy development for fraud prevention and safeguarding</td>
</tr>
<tr>
<td align="left" valign="top">P4</td>
<td align="left" valign="top">Undergraduate Student Representative</td>
<td align="left" valign="top">Computer Science</td>
</tr>
<tr>
<td align="left" valign="top">P5</td>
<td align="left" valign="top">Postgraduate Student Representative</td>
<td align="left" valign="top">Human-Computer Interaction (HCI) and Interaction Design</td>
</tr>
<tr>
<td align="left" valign="top">P6</td>
<td align="left" valign="top">Local, Black-Led Women Organisation Manager</td>
<td align="left" valign="top">Supporting black and minoritised women and children who have been subject to domestic and sexual violence</td>
</tr>
<tr>
<td align="left" valign="top">P7</td>
<td align="left" valign="top">Public Media Corporation Representative</td>
<td align="left" valign="top">Researching on public values and data-driven technology</td>
</tr>
<tr>
<td align="left" valign="top">P8</td>
<td align="left" valign="top">NHS Regional Integrated Care Board Representative</td>
<td align="left" valign="top">Public, patient, and carer engagement</td>
</tr>
<tr>
<td align="left" valign="top">P9</td>
<td align="left" valign="top">Local Cyber Security Cluster representative</td>
<td align="left" valign="top">Information security, cyber essentials, and strategic technology planning</td>
</tr>
<tr>
<td align="left" valign="top">P10</td>
<td align="left" valign="top">National Children Charity Group representative</td>
<td align="left" valign="top">Children Protection, working with children and young people in care.</td>
</tr>
<tr>
<td align="left" valign="top">P11</td>
<td align="left" valign="top">Local Youth Development Charity representative</td>
<td align="left" valign="top">Local youth engagement and service delivery</td>
</tr>
<tr>
<td align="left" valign="top">P12</td>
<td align="left" valign="top">Computer Science Co-Investigator</td>
<td align="left" valign="top">Applied machine learning</td>
</tr>
<tr>
<td align="left" valign="top">P13</td>
<td align="left" valign="top">Computer Science Researcher</td>
<td align="left" valign="top">Natural Language Processing</td>
</tr>
<tr>
<td align="left" valign="top">P14</td>
<td align="left" valign="top">Law Co-Investigator</td>
<td align="left" valign="top">Law and emerging technologies</td>
</tr>
<tr>
<td align="left" valign="top">P15</td>
<td align="left" valign="top">Law Researcher</td>
<td align="left" valign="top">Interaction of law with emerging technologies</td>
</tr>
<tr>
<td align="left" valign="top">P16</td>
<td align="left" valign="top">Ethics, Responsibility &#x0026; Sustainability Co-Investigator</td>
<td align="left" valign="top">Developing theories of value to address sustainability issues</td>
</tr>
<tr>
<td align="left" valign="top">P17</td>
<td align="left" valign="top">Corporate Digital Responsibility (CDR) Researcher</td>
<td align="left" valign="top">CDR and digital ethics</td>
</tr>
<tr>
<td align="left" valign="top">P18</td>
<td align="left" valign="top">Computer Science Co-Investigator</td>
<td align="left" valign="top">Human-AI Interaction enhancement and AI-powered interactive systems</td>
</tr>
<tr>
<td align="left" valign="top">P19</td>
<td align="left" valign="top">Computer Science Researcher</td>
<td align="left" valign="top">Cyber security and Human-AI Interaction</td>
</tr>
<tr>
<td align="left" valign="top">P20</td>
<td align="left" valign="top">Media and Cultural Studies Co-Investigator</td>
<td align="left" valign="top">Media technologies and cultures</td>
</tr>
<tr>
<td align="left" valign="top">P21</td>
<td align="left" valign="top">Media and Cultural Studies Researcher</td>
<td align="left" valign="top">Digital media cultures, conflicts, and politics</td>
</tr>
<tr>
<td align="left" valign="top">P22</td>
<td align="left" valign="top">Finance Researcher</td>
<td align="left" valign="top">Information security, operational security for financial firms and governments</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The following young adult co-design workshop involved seven young adults with expertise in technology design and social sciences, who were also recruited through the research team&#x2019;s professional network. Participants brought a relatively comprehensive understanding of how misinformation is created and disseminated through social media, along with enhanced insights into design principles, the needs of their peers, as well as the technical and practical feasibility of proposed solutions and challenges.</p>
<sec id="sec7">
<label>3.1</label>
<title>Phase one: expert stakeholder engagement</title>
<p>The sample comprised: nine external stakeholders with interdisciplinary backgrounds across private sector, NHS, Higher Education, the Voluntary, Community and Social Enterprise (VCSE) sector, and the public sector; two young adult representatives; and 13 internal project researchers. We held the workshop in a hybrid format (i.e., three offline groups and one online group), with a meeting room organised into roundtables. In accordance with the informed consent and workshop protocol, we assigned participant IDs to each participant along with a brief description of their role and expertise (see <xref ref-type="table" rid="tab1">Table 1</xref>).</p>
<p>We engaged in discussions in response to three prompts across three round-table sessions. Each group appointed one researcher participant, to act as a coordinator and responsible for taking notes. At the end of each session, one participant from each group was selected to summarise the discussion outcomes on behalf of the group members. Following each presentation, all participants were encouraged to share their reflections.</p>
<p>After this workshop, we transcribed the audio recordings and collected hand-written notes captured at each table. We employed a Deductive Reflexive Thematic Analysis (RTA) method (<xref ref-type="bibr" rid="ref21">Boyatzis, 1998</xref>; <xref ref-type="bibr" rid="ref26">Braun and Clarke, 2012</xref>, <xref ref-type="bibr" rid="ref27">2019</xref>; <xref ref-type="bibr" rid="ref145">Roberts et al., 2019</xref>), to capture, structure and interpret the data in relation to our predefined research questions, drawn from participants&#x2019; rich discussions and reflections (<xref ref-type="bibr" rid="ref25">Braun and Clarke, 2006</xref>; <xref ref-type="bibr" rid="ref124">Naeem et al., 2023</xref>). Audio recordings were transcribed by a trusted third-party company.</p>
<p>The first author of this paper began by thoroughly reviewing the transcripts to become familiarised with the data. The transcripts were then imported into NVivo for coding. Based on the existing research questions, the first author developed a set of preliminary codes and applied them to relevant segments of data. These codes were then subsequently organised and connected, facilitating the identification of recurring themes and patterns that aligned with the study&#x2019;s focus.</p>
<p>The initial themes and corresponding coded excerpts were exported into an Excel file for further review and refinement. In line with RTA, the authors collectively reviewed the clustered themes during weekly meetings, fostering critical reflection and ensuring that the themes accurately represented the research questions.</p>
</sec>
<sec id="sec8">
<label>3.2</label>
<title>Phase two: co-design with young adults</title>
<p>In the second workshop (W2), the participants were assigned with participant IDs W2P1-W2P7. Our co-design method appropriated <italic>Ideation Card Design Method</italic> (<xref ref-type="bibr" rid="ref58">Golembewski and Selby, 2010</xref>; <xref ref-type="bibr" rid="ref69">Hope and Mulhall, 2024</xref>) and <italic>Storyboarding Techniques</italic> (e.g., <xref ref-type="bibr" rid="ref60">Greenberg et al., 2012</xref>). Our objective was to facilitate the participants to collaboratively create (co-create) specific user scenarios of interacting with online technologies that demonstrate and depict their experiences mediated by online media consumption. Our appropriation of the Ideation Card method (<xref ref-type="bibr" rid="ref58">Golembewski and Selby, 2010</xref>) utilised visual storyboarding (e.g., akin to comic strips) to depict the scenarios where individual (fictional) characters may encounter (or have encountered) online misinformation and fake news, and where interactions with online technologies can take place between particular people; these scenarios could be fictional but inspired by or grounded in participants&#x2019; personal experiences or the experiences of their peers. The rationale for using this method was to focus discussion on user experiences with technology (ibid). The broader rationale for the co-creative setting and use of storyboarded, character-driven scenarios was to prompt dialogue and reflection by young adults on specific contexts of interaction, to raise considerations for technology designers (<xref ref-type="bibr" rid="ref44">Durrant et al., 2018</xref>) (see <xref ref-type="table" rid="tab2">Table 2</xref>).</p>
<table-wrap position="float" id="tab2">
<label>Table 2</label>
<caption>
<p>Co-design workshop (W2) participant information.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Participant ID (W2)</th>
<th align="left" valign="top">Gender</th>
<th align="left" valign="top">Affiliation</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">P1</td>
<td align="left" valign="top">Female</td>
<td align="left" valign="top">PhD student in HCI</td>
</tr>
<tr>
<td align="left" valign="top">P2</td>
<td align="left" valign="top">Male</td>
<td align="left" valign="top">Master student in HCI</td>
</tr>
<tr>
<td align="left" valign="top">P3</td>
<td align="left" valign="top">Male</td>
<td align="left" valign="top">PhD student in HCI</td>
</tr>
<tr>
<td align="left" valign="top">P4</td>
<td align="left" valign="top">Male</td>
<td align="left" valign="top">PhD student in HCI</td>
</tr>
<tr>
<td align="left" valign="top">P5</td>
<td align="left" valign="top">Female</td>
<td align="left" valign="top">Master student in HCI</td>
</tr>
<tr>
<td align="left" valign="top">P6</td>
<td align="left" valign="top">Female</td>
<td align="left" valign="top">Master student in HCI</td>
</tr>
<tr>
<td align="left" valign="top">P7</td>
<td align="left" valign="top">Female</td>
<td align="left" valign="top">User Researcher with an education background in HCI</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="sec9">
<label>3.2.1</label>
<title>Card-based design method</title>
<p>Participants co-created &#x2018;Instance Cards&#x2019; in a bespoke Ideation Card deck. We provided four card &#x2018;suits&#x2019; in this deck: (i) <italic>Character</italic>, (ii) <italic>Technology</italic>, (iii) <italic>(Mis) Information and Fake News</italic>, and (iv) <italic>Action</italic>. Content to represent instances of three suits of cards [i.e., (i, ii, iii)] were co-created with the participants, whilst content for the &#x2018;Action&#x2019; cards was provided by the researchers to scaffold ideation and ensure focus on relevant topics. The following prompt questions were also provided in conjunction with the theming of each card suit, to steer conversation and reflection on: diverse personas; technologies involved in potential harms; and types of information encountered online.</p>
<list list-type="simple">
<list-item>
<p>1) <italic>Character</italic>&#x2014;Who are we involving in this scenario? What is the character&#x2019;s name, age, and profession? What are they interested in? What are their routine activities?</p>
</list-item>
</list>
<disp-quote>
<p>(e.g., <italic>a 23-year-old man, John, who is a software engineer and part-time gamer. He goes to work from 9am till 5pm and plays games in the evening and during the weekends</italic>)</p>
</disp-quote>
<list list-type="simple">
<list-item>
<p>2) <italic>Technologies</italic>&#x2014;What devices and online platforms are used when assessing the (mis/dis) information? Is the device or platform intelligent (i.e., using Machine Learning or Artificial Intelligent technologies)? What functional features does the device have?</p>
</list-item>
</list>
<disp-quote>
<p>(e.g., <italic>a desktop computer with Discord installed. It is not intelligent. It has vocal communication channels</italic>)</p>
</disp-quote>
<list list-type="simple">
<list-item>
<p>3) <italic>Misinformation and Fake News</italic>&#x2014;What content or topic is being assessed? Who creates it (i.e., BBC journalist, TikTok users)? What form of multi-media is included (i.e., photo, video)? What population does such information target? What is the category of this information (i.e., misinformation that may be misinterpreted, or fake news or advertisements?)</p>
</list-item>
</list>
<disp-quote>
<p>(e.g., <italic>NHS-verified news but may be misinterpreted on social media, with a target of general public; fake news with an intention to mislead with its title and contents</italic>)</p>
</disp-quote>
<p>Each group of participants collaboratively created one instance card for each of the three suits. In addition to including illustrations, they provided detailed descriptions of each suit card, elaborating on the details (as shown in the right picture of <xref ref-type="fig" rid="fig1">Figure 1</xref>).</p>
<fig position="float" id="fig1">
<label>Figure 1</label>
<caption>
<p>(Left) Participants each created &#x2018;information&#x2019; instance cards. An example prompt card was placed on the table; (right) working in groups of two or three, participants chose one card from each &#x2018;suit&#x2019; to collectively storyboard a scenario.</p>
</caption>
<graphic xlink:href="fcomp-08-1655186-g001.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Two young adult participants sit at a wooden table with coloured markers, ideation card examples, actively creating their own ideation cards. The second panel shows eight handwritten ideation cards with sketches and text, detailing personas, technologies, (mis/dis/mal)information, and actions taken (e.g., reflect/think, ask/enquire offline).</alt-text>
</graphic>
</fig>
</sec>
<sec id="sec10">
<label>3.2.2</label>
<title>Storyboarding techniques</title>
<p>Authors 1 and 4 conducted the workshop. We split the participants into three groups (two or three people in each group). Each group picked one Instance Card from each suit, to form a card deck, and then co-created a storyboard by adopting the information on the deck.</p>
<p>During the storyboard creation process, we encouraged participants to reflect on how the characters made sense of their encounters with information, and how engaging with the information made them feel. We also provided prompts that were inspired and informed by the Stakeholder Workshop (1) discussions, such as: &#x2018;What are the benefits of sharing such information?&#x2019; and &#x2018;What are the consequences and harms?&#x2019; After the creation of the storyboard, each group presented their story. Connecting with each story, participants reflected on the harms caused to young adults in similar real-life contexts.</p>
<p>We audio-recorded presentations of the three storyboards by each group, along with the subsequent reflective round-table discussions. These recordings were pseudonymised by the first author and transcribed by a professional transcription service. Given the narrative richness of data, which included both the narration of the storyboards and participants&#x2019; discussions and reflections on the scenarios, we used Inductive RTA specifically to make sense of the discussion and reflection sessions (<xref ref-type="bibr" rid="ref26">Braun and Clarke, 2012</xref>). The first author first familiarised herself with the data and organised transcripts and visual data for association with one of three distinct scenarios that were storyboarded. Participants&#x2019; narrations and discussion of a given storyboard were analysed with the corresponding illustrations. Three distinct scenarios were generated: &#x2018;Hair growth advertisement&#x2019;; &#x2018;Employment seeking scam&#x2019;; &#x2018;Expert chatbot for health information&#x2019;. The original language uttered by the participants in their narration was preserved throughout initial data processing. The first author then hand-coded the transcripts line-by-line using Microsoft Word. The codes were then critically discussed with the other authors at weekly meeting sessions and the first author reflected further and refined the codes. These were subsequently synthesised into initial themes for further collective analysis and consolidation by the research team, for example, to ascertain the sufficiency of data supporting each individual theme.</p>
</sec>
</sec>
<sec id="sec11">
<label>3.3</label>
<title>Co-design workshop storyboards</title>
<p>We now report on the storyboard contents and illustrations co-created and narrated by our participants in the co-design workshop.</p>
<sec id="sec12">
<label>3.3.1</label>
<title>Hair growth advertisement on Instagram</title>
<p>Gavin reads about &#x2018;the Miracle Anti-Hair Loss Treatment&#x2019; Product on Instagram. He is always a bit anxious and worried about his appearance, and checks the product posts. Lots of people like the post. He also shares the post with his brother. In Gavin&#x2019;s eyes, his brother knows everything. His brother responds, &#x2018;Yes, it looks good. Try it!&#x2019;. So, Gavin orders the product, and 4 years later, he is still as bald as his brother. He is sad because he could have used the money at somewhere else to make himself feel good.</p>
</sec>
<sec id="sec13">
<label>3.3.2</label>
<title>Employment seeking advertisement scam</title>
<p>Chloe wants to look for a better job with more flexible time on her own. She encounters an ideal job on TikTok, which redirects her to the job advertisement link on Google. She applies for the job and receives a job offer. As she is preparing to quit her current job, suddenly she sees a post that claims the company she just received the offer is a scam. She says, &#x2018;Oh my! That was close.&#x2019; She shares her experience to online communities and more people respond to her, mentioning the company is a scam to collect people&#x2019;s private data. Chloe does not know if she is going to be lucky next time.</p>
</sec>
<sec id="sec14">
<label>3.3.3</label>
<title>An expert chatbot for health (mis)information</title>
<p>Steven is an undergraduate student majoring in Economics. Recently, he tested the Economy Chatbot built from ChatGPT. He started with small talks. The chatbot can understand him. He then tested the chatbot with economic concepts and to his surprise, the chatbot worked well. His trust on chatbot was increased. One day, when he is affected by a new form of virus&#x2014;the Ninja virus, Steven goes to the chatbot for help. The chatbot is eager to figure out the symptoms and help him with potential treatment options&#x2026;</p>
<p>Scenario One: Steven thinks it is still better for him to attend his GP service no matter what. He is given the right medicine and recovers in a few days.</p>
<p>Scenario Two: Steven decides to follow what the chatbot suggests and have a DIY treatment at home. The chatbot suggest vinegar having a powerful effect on this type of virus. Steven takes vinegar for a few days, but his situation gets much worse. He ends up in hospital (see <xref ref-type="fig" rid="fig2">Figure 2</xref>).</p>
<fig position="float" id="fig2">
<label>Figure 2</label>
<caption>
<p>Storyboarded scenarios (top): hair growth advertisement on Instagram; (middle): employment seeking advertisement scam; (bottom): an expert chatbot for health (mis) information.</p>
</caption>
<graphic xlink:href="fcomp-08-1655186-g002.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Comic-style illustration in two panels. The top panel follows a worried man, Gavin, scrolls past a 'Miracle Anti-Hair Loss' ad on his phone, surrounded by likes. hee sends the post to his brother, who gives a thumbs-up and replies, "Yes, it looks good. Try it!"  Gavin excitedly unboxing his order. Four years later, Gavin and his brother, both completely bald, standing before a mirror. Gavin looks sadly at his reflection, a thought bubble showing him regretting the wasted money he could have spent on something that would have truly made him feel good. The bottom panel features a girl named Chloe, looking hopeful, tapping on an ideal job advertisement on her TikTok feed. She stares at a computer, receiving a congratulatory job offer email, with a "Quit Job" letter ready beside her. Later she is shocked as she sees a scam warning on her phone, exclaiming, "Oh my! That was close." Chloe types her experience into an online community forum. Her screen fills with responses from other users confirming the scam, leaving her with a worried expression and the lingering question of whether she will be so lucky next time. Hand-drawn comic featuring a stick figure chatting with a chatbot named Steven. He is happily testing his "Economy Chatbot" with complex concepts. Later, feeling unwell with the 'Ninja virus', he consults the same chatbot for medical advice. The story then splits. In Ending One, Steven decides to ignore the bot and visits his doctor, who gives him the right medicine, leading to a quick recovery. In Ending Two, he follows the chatbot's DIY advice to take vinegar. The final panel shows him in a hospital bed, his condition worsened, highlighting the dangers of trusting AI for medical information.</alt-text>
</graphic>
</fig>
</sec>
</sec>
</sec>
<sec id="sec15">
<label>4</label>
<title>Findings</title>
<p>This following section presents the results of the deductive analysis of data recorded from the round-tables, and reflections from both workshops, addressing the research questions. These findings highlight how young adults encounter misinformation and fake news online and the related consequences. Additionally, the findings describe the individuals involved in the creation and dissemination of online misinformation and fake news to young adults and other younger generations, as well as the behaviours and strategies they employ in these processes. This has inspired our further translational work to deliver design implications for tools and resources that young adults should equip with in their future navigation online.</p>
<sec id="sec16">
<label>4.1</label>
<title>Emotional drivers in misinformation encounters</title>
<p>Our findings highlight that young adults&#x2019; emotions and aspirations are often exploited in various contexts, plus their frustrations in seeking healthcare support, anxieties about fitting into social circles, efforts to secure employment, and desires for quick financial gains. In these situations, their eagerness to engage and succeed can increase their vulnerability to harm, particularly through the dissemination of misinformation by predatory &#x2018;bad actors&#x2019;.</p>
<p>In discussing the spread of healthcare misinformation, W1P8 (NHS) described a scenario in which young adults <italic>&#x2018;</italic>get progressively frustrated by being passed from service provider to service provider<italic>&#x2019;</italic>, after <italic>&#x2018;</italic>following the traditional route to access a health service for a particular health problem<italic>&#x2019;</italic>. The frustration and eagerness may drive them to seek out alternative support, which can result in serious harms. This NHS worker provided an example of <italic>&#x2018;</italic>people not getting a particular medication that they want prescribed, they may go and source it from alternatively online through illegal sources<italic>&#x2019;</italic>.</p>
<p>We find that such urges to seek healthcare support can be taken advantage of by certain <italic>&#x2018;bad actors&#x2019;</italic>. The public media corporation representative (W1P7) highlighted the allure of &#x2018;capitalism and profit-making&#x2019;, which draws in certain &#x2018;hidden game changers&#x2019;&#x2014;some pharmaceutical companies involved in collecting and monetising personal health data. These companies crafted targeted misinformation online, influencing and disrupting young adults&#x2019; online efforts to seek reliable information and support.</p>
<p>Like the protagonist Gavin in the hair growth advertisement scenario, participants from the co-design workshop (W2) noted that young adults can be easily affected by social anxieties, and by the efforts made to fit in social circles. Hence, they tend to seek simple, &#x2018;One for all&#x2019; (W2P3) solutions to their problems, frequently neglecting to invest time in scrutinising product descriptions or verifying the source of advertisements they encounter.</p>
<p>Social media platforms have arguably capitalised on the concerns and peer pressures experienced by young adults, by offering faster and more convenient pathways to online purchasing. As W2P4 noted, &#x2018;If you see it on a video or in a post, you can just literally click on a link, and it will take you to the shop that&#x2019;s within the social media app&#x2019;. This can be exacerbated by &#x2018;celebrities and influencers&#x2019; whose revenue depends on attracting audiences, promoting, and selling products (W1P12, computer science). The selected publication channels, identified as <italic>&#x2018;social mediums&#x2019;</italic>, are often &#x2018;less inclined to moderate the content and advertisements&#x2019;. W1P5 (postgraduate) added: &#x2018;Sometimes they are less inclined to moderate what advertisements they are actually selling through their promotions.&#x2019; Arguably<italic>, s</italic>uch commercialised online environments further influence young adults&#x2019; against applying logical judgment and critical thinking when navigating digital spaces.</p>
<p>In the &#x2018;Employment seeking advertisement scam&#x2019; scenario, W2P5 highlighted that fake job scams would normally <italic>&#x2018;misplace letters&#x2019;</italic> of renowned company names in order to target and mislead young adults who do not identify carefully when looking for a job, prompting them to think that the opportunity is with the renowned company. Refinement on the details such as reputation and history of fake companies would make it more difficult for young adults to distinguish information veracity, because &#x2018;people thought it was reputable, so they didn&#x2019;t have any doubts&#x2019; (W2P5). Young adults, in their desire to seize and secure job opportunities, may share personal information, such as identity and bank details, through the convenience of auto-complete browser functions. They seem to be susceptible to this when they want to secure a job position, and do not take the time to verify a company&#x2019;s legitimacy, potentially leading to financial loss, data breaches, and an increased risk of future <italic>&#x2018;scam calls&#x2019;</italic>.</p>
<disp-quote>
<p>&#x2018;<italic>When people are kind of desperate, I think people ignore all those kinds of signs like asking for money, things like that.&#x2019;</italic> (W2P6)</p>
</disp-quote>
<p>W1P3 (Digital Identity Representative) cited the example of young adults being harmed by <italic>&#x2018;money muling&#x2019;</italic><xref ref-type="fn" rid="fn0001"><sup>1</sup></xref> advertisements, which can attract individuals with the promise of immediate financial gain whilst obscuring the potential long-term subsequent consequences for themselves and others:</p>
<disp-quote>
<p>&#x2018;<italic>I was on a session with a young people&#x2019;s panel which was looking at the number of young people that just saw money muling as a way to make money, and they didn't understand the implications. They just say, &#x201C;Oh, somebody's offering me &#x00A3;100, let me try this.&#x201D; They didn't understand what the risks were.&#x2019;</italic></p>
</disp-quote>
<p>Hence, W2P3 and W2P4 proposed that designers should consider how to stop young adults from making rushed decisions when what they &#x2018;normally look for efficiency&#x2019;. Technology applications should be designed to prompt their users to make time to <italic>&#x2018;pause&#x2019;</italic>, to reflect on their own judgment, &#x2018;rather than being persuaded&#x2019; (into a rushed decision).</p>
<p>W2P4 also observed that, everyone is susceptible to <italic>&#x2018;emotional moments&#x2019;</italic> and may experience &#x2018;certain degree of disabilities&#x2019; at times. Young adults in particular find themselves experiencing heightened emotional states, &#x2018;such as feeling isolated at home or about stressed job security and happiness&#x2019; (W2P4). In such states, individuals are more likely to be harmed by misinformation and fake news, as they will &#x2018;feel difficult to identify them&#x2019; (W2P4, W2P7). Consequently, they may be easily targeted or manipulated, as misleading information can offer &#x2018;a false sense of control&#x2019; (W2P7). The emergence of AI algorithms raises new concerns, particularly around how new media technologies like chatbots may exploit young adults. These AI-driven technologies can project positivity, persuasiveness, and a &#x2018;keenness to help&#x2019; (W2P1) by actively listening and providing support during young adults&#x2019; expressed emotional needs. W2P3 commented that unlike &#x2018;a friend or a family member who may really want to help but don&#x2019;t have the information<italic>&#x2019;</italic>, such technologies can easily <italic>&#x2018;</italic>draw people in&#x2019; with tailored responses.</p>
<p>In summary, this section reported how young adults&#x2019; expressed emotions such as frustration, eagerness and anxiety can be exploited by targeted misinformation, especially during times of mental stress, physical discomfort, peer pressure, or financial instability. Participants noted that such potential harm from misinformation encounters could extend to anyone experiencing heightened emotional states at certain points in life. In these contexts, misinformation targeting is shaped not only by content but also by underlying social dynamics.</p>
</sec>
<sec id="sec17">
<label>4.2</label>
<title>Trust indicators of young adults</title>
<p>Across both workshops, participants agreed that young adults&#x2019; trust in online information is highly susceptible to influence. Several contexts were described to illustrate the factors affecting trust, such as the perceived reliability of information, the influence of endorsements from trusted family members, the reactions of the public, and long-term influences by closed online communities dominated by singular and uniform opinions or voices.</p>
<p>In the co-design workshop (W2), young adults shared their curiosity about how peers assess the trustworthiness of health information. They observed that chatbot-generated responses might more readily earn users&#x2019; trust because of the chatbot&#x2019;s anthropomorphic language use, making them more approachable and reliable. When searching for similar questions on search engine, participants noted that the results are often presented in an exaggerated manner. The outcomes can be fear-inducing and overwhelming.</p>
<disp-quote>
<p><italic>&#x2018;I think it&#x2019;s the ChatGPT virtual system, they made it sound human, so you actually trust it. Well people, if you search your condition on Google or on Bing it&#x2019;s just like, &#x201C;Yeah, you&#x2019;re dead in like three seconds.&#x201D;&#x2019;</italic> (W2P2)</p>
</disp-quote>
<p>They also highlighted the difficulty of evaluating information provided by the ChatGPT chatbot. In particular, the <italic>&#x2018;one-time&#x2019;</italic> (W2P2) and real-time nature of the communication makes it challenging for users to revisit and re-evaluate the previous responses provided as &#x2018;there&#x2019;s no coming back to questioning it<italic>&#x2019;</italic> (W2P4). Hence, it is also difficult to lose the trust of human users once it proves its efficiency.</p>
<p>Trusted close family members, such as the brother in the &#x2018;hair growth advertisement on Instagram&#x2019; scenario, can easily influence young adults&#x2019; decisions to trust when faced with misleading advertisements, &#x2018;even though the (protagonist&#x2019;s) brother clearly doesn&#x2019;t have any knowledge around hair growth&#x2019; (W2P3). To young adults, such trusted people can &#x2018;act as a proxy who is able to, hopefully, understand the world better than them<italic>&#x2019;</italic>, and let the demographic &#x2018;put down their guard<italic>&#x2019;</italic>.</p>
<p>Young adults&#x2019; trust to official information sources can be easily swayed, particularly when mistrust in health experts spreads rapidly through social <italic>&#x2018;contagion&#x2019;</italic> (W1P14, law). For example, W1P14 spoke about <italic>&#x2018;vaccine hesitancy&#x2019;</italic> during the Covid-19 pandemic as an example, describing how circulating doubts and mistrust towards health authorities led to widespread reluctance or refusal to get vaccinated. Additionally, public signals reflected by <italic>&#x2018;likes&#x2019;</italic> or <italic>&#x2018;votes&#x2019;</italic> on social media platforms (e.g., Instagram) can influence young adults&#x2019; trust in online content. As W2P5 commented, &#x2018;some young people see the number of likes as a sort of, vote of confidence<italic>&#x2019;</italic>.</p>
<p>Another high-risk context for young adults&#x2019; exposure to online misinformation is within echo chambers. In these spaces, young adults&#x2019; trust in and judgment of others can become desensitised, often leading to the normalisation of inappropriate behaviours. W1P12 (computer science) noted that individuals in echo chambers &#x2018;only got a partial awareness&#x2019; and <italic>&#x2018;</italic>tend to only look at news or only hear the views of people that agree with them<italic>&#x2019;</italic>. Some young adults who &#x2018;believe everything is fine<italic>&#x2019;</italic> will gradually stop questioning information validity.</p>
<p>In these closed communities, AI-generated &#x2018;personalised <italic>fake accounts</italic>&#x2019; driven by &#x2018;political or societal campaigns&#x2019; can effectively propagate misinformation to align with campaign goals. A significant challenge arises in tracking and preserving evidence within these real-time communication channels, making it challenging to counter misinformation. For example, W1P14 speaks about such an occurrence in the context of online gaming communities:</p>
<disp-quote>
<p><italic>&#x2018;There can be a lot of safeguarding issues around it, in part because if you're looking particularly at online gaming voice chat, you're talking about a lack of permanence, so it's often very difficult to have an evidence trail you can use to really identify who is at risk, who's being impacted, and how exactly this is being spread and disseminated.&#x2019;</italic> (W1P14)</p>
</disp-quote>
<p>Young adults&#x2019; criteria for trust are found to be varied and often unpredictable. They may endorse trust in AI tools, close family members without specific expertise, or be swayed by public opinion, sometimes even challenging authorised and professional insights. Echo chambers can desensitise young adults to differing perspectives, making it harder to identify misinformation and engage with diverse viewpoints.</p>
</sec>
<sec id="sec18">
<label>4.3</label>
<title>Vulnerabilities and susceptibility to information among young adults</title>
<p>Participants in the stakeholder engagement workshop highlighted several marginalised groups that are often overlooked by mainstream society and are particularly vulnerable to online misinformation. For instance, W1P14 (law) mentioned &#x2018;online gaming or virtual reality gaming&#x2019; communities often marginalise or trivialise certain groups, particularly <italic>&#x2018;</italic>women or girls, and individuals from diverse racial backgrounds<italic>&#x2019;</italic>. Such communities may perpetuate stereotypes or dismiss the experiences of these groups, reinforcing the exclusion of their voices. Hence, participants called for more inclusive research engagements with young adults whose voices are silent or silenced within online communities, to illustrate both idiographic journeys and experiences of complex online harms:</p>
<disp-quote>
<p><italic>&#x2018;It's remembering that there are populations of young people who are silent or silenced. We haven&#x2019;t come up with a solution as to how we reach those young people, but it&#x2019;s a case of there&#x2019;s something to think about.&#x2019;</italic> (W1P14)</p>
</disp-quote>
<p>W1P1 (Police) expanded the discussion of marginalised audiences to include not only young adults but also children. He highlighted concerns around &#x2018;an organised criminality harvesting the information of children, manipulating and engaging with them<italic>&#x2019;</italic>. He raised an example of Kinder eggs to illustrate these tactics:</p>
<disp-quote>
<p><italic>&#x2018;Posting a photograph of Kinder egg with drugs</italic><xref ref-type="fn" rid="fn0002"><sup>2</sup></xref> <italic>on an online platform. You then get children responding to that. So, the criminal has now harvested the contact details. He has identified children who are interested in finding a Kinder egg full of drugs.&#x2019;</italic> (W1P1)</p>
</disp-quote>
<p>By identifying contact details of children who show interest through specific keyword searches on search engines, organised networks can effectively build a customer base. This enables stakeholders to &#x2018;target their campaigns to children&#x2019; (W1P3) with particular vulnerabilities, minimising the need for direct targeting efforts.</p>
<p>In addition to specific gender, age, and racial groups, W1P3 (Digital Identity) highlighted the cascading chain effects of familial and social challenges faced by some young adults, which heighten their susceptibility to problematic situations. She noted that interconnected incidents are like &#x2018;chinks in the armour&#x2019; that can exacerbate the fragility to misinformation and other online risks, such as being <italic>&#x2018;neurodiverse&#x2019;</italic>, experiencing <italic>&#x2018;</italic>a parental break up<italic>&#x2019;</italic>, or having <italic>&#x2018;</italic>a parent or sibling going into prison<italic>&#x2019;</italic>. Personal and social struggles often compound and limit their resilience and access to reliable support. She explained the reason:</p>
<disp-quote>
<p>&#x2018;<italic>Because if somebody has got a fragility, they're the ones that are most likely to be targeted for different ends, be that through loneliness, be it through them having some gender or other element which singles them out.&#x2019;</italic></p>
</disp-quote>
<p>Malicious actors can exploit marginalised demographics with specific vulnerabilities by using AI algorithms to &#x2018;ascertain characteristics such as gender, age, cognitive or physical disabilities<italic>&#x2019;</italic> (W1P3). This enables them to target misinformation more precisely at the selected audiences, increasing impact of misleading or harmful content.</p>
<p>Another form of vulnerability arises from the challenges of understanding complex medical, legal, or commercial terminologies online. Participants (W1P8 NHS, W1P14 law, W1P20 media) in the stakeholder engagement workshop (W1) emphasised that such language barriers prevent young adults from fully &#x2018;understanding a situation&#x2019; <italic>and</italic> often leaving them <italic>&#x2018;</italic>trying to make sense of in a given moment or situation<italic>&#x2019;</italic>. They highlighted the example of young adults seeking healthcare support online. Given that online spaces provide healthcare information from diverse sources worldwide, often in different languages and cultural frameworks, the information exists in a legally ambiguous juridical territory. The space &#x2018;is no longer governed by the best advice of a UK health provider&#x2019; (W1P14), making it challenging to safeguard young adults from unverified or potentially misleading healthcare sources, which may impact their wellbeing:</p>
<disp-quote>
<p>&#x2018;<italic>You may find advice that may be appropriate in the United States, where they have a different regulatory system or other forms of English language speaking.&#x2019;</italic></p>
</disp-quote>
<p>Young adults are vulnerable to spread of misinformation when online bystanders amplify the situation, particularly outside school spaces. W1P1 (Police) expressed concern about how content regarding conflicts between young adults can escalate and spread rapidly online. Online bystanders, such as &#x2018;parents or just people who are on the periphery<italic>&#x2019;,</italic> or those <italic>&#x2018;</italic>just out of meanness who what to stir the pot<italic>&#x2019;</italic>, can &#x2018;add fuel to&#x2019; the fire, exacerbating the situation without considering the consequences. As W1P3 (Digital Identity) noted, people may not realise that what they are sharing is <italic>&#x2018;</italic>fuelling, supporting and committing harmful conduct<italic>&#x2019;</italic>.</p>
<p>In sum: across both workshops, participants identified several types of vulnerabilities that increase young adults&#x2019; susceptibility to misinformation. These include marginalised demographics, challenges in understanding complex legal, medical, or commercial terms across online boarders, and the potential harm caused by online bystanders outside of school-supervised environments. Such factors contribute to the potential risks young adults face online, as each can increase their exposure to and impact from misinformation.</p>
</sec>
<sec id="sec19">
<label>4.4</label>
<title>Strategies for mitigating harms</title>
<p>To address the prevalence of misinformation, both W1P7 (Public Media) and W1P3 (Digital Identity) stressed the importance of equipping young people with personalised techniques and countermeasures to effectively &#x2018;debunk and identify&#x2019; the harmful practices and strategies employed by bad actors. They highlighted the necessity to incorporate these resources into school curricula. Promoting media literacy, they argue, offers &#x2018;a better way of trying to understand the spread of misinformation and who is impacted&#x2019;.</p>
<p>W1P14 and W1P20 (Law and Media) highlight the importance of considering the &#x2018;rationality and contextual nature&#x2019;&#x2014;the contextual significance of &#x2018;agency&#x2019;. They argue that solely increasing young adults&#x2019; agency is insufficient, as it can wrongly validate individuals&#x2019; perceived expertise on complex issues in which they personally lack knowledge, thus heightening their susceptibility to the influence of misinformation. Hence, the extent of agency granted to young adults in navigating online information and using digital devices requires reconsideration within societal disclosure:</p>
<disp-quote>
<p><italic>&#x2018;We talked a little bit about that, and what does it actually mean to increase or decrease agency, and the relationality and contextual nature of agency itself basically, which makes it complicated to design for because it doesn't necessarily mean that if you increase agency, that's a good thing, because arguably, increasing agency was one of the reasons that misinformation was created in the first place.&#x2019;</italic> (W1P20)</p>
</disp-quote>
<p>Nevertheless, participants discussed how encouraging individuals to develop self-responsibility by promoting their agency is not the solution to mitigate against harms. In addition to endorsing individual agency, W1P20 (Media) also emphasised the importance of <italic>&#x2018;collective agency&#x2019;</italic> (<xref ref-type="bibr" rid="ref64">Hainz et al., 2016</xref>), which can foster group-based critical thinking about interventions and responses that can enable both informal and formal social controls. One example is the inclusion of oversight by mainstream journalists:</p>
<disp-quote>
<p><italic>&#x2018;I think that collective agency (is a good point), because we're always focusing on the individual. But this is where remit and responsibility through journalists&#x2019; work at the BBC, where you're thinking about that all the time, the individual within the group.&#x2019;</italic> (W1P20)</p>
</disp-quote>
<p>The discussion of traditional gatekeepers in media accuracy such as news reporters and journalists prompted participants to explore evolving definitions of <italic>&#x2018;guardians&#x2019;</italic> in the context of social media. W1P5 (postgraduate) noted that some young adults see themselves as guardians of safe online spaces, taking on roles in &#x2018;advocating online safety&#x2019; and <italic>&#x2018;</italic>providing peer support<italic>&#x2019;</italic>. They actively monitor the veracity of information and exercise agency over how it is shared.</p>
<p>This theme highlighted participants&#x2019; insights on key directions social media platform developers and policymakers should consider reducing young adults&#x2019; exposure to and harm from misinformation. Discussions emphasised the importance of empowering young adults with agency to identify and stop the spread of misinformation, whilst also acknowledging challenges that may require additional intervention from mainstream gatekeepers and other stakeholders. In addition, providing more tailored materials to enhance young adults&#x2019; media literacy skills in identifying misinformation was seen as critical.</p>
</sec>
</sec>
<sec sec-type="discussion" id="sec20">
<label>5</label>
<title>Discussion</title>
<p>We reported in our Findings section three everyday contexts in which young adults may encounter and be adversely impacted by misinformation online. These contexts were co-created by young adults and highlighted how the fast-paced new-media environment can amplify this population&#x2019;s vulnerability to online information. Subsequently, we presented a qualitative data analysis of workshop discussions that shed light emotional influences as key driver of misinformation and fake news encounters of young adults in their daily lives. Additionally, we examined the indicators young adults use to determine trustworthiness, the vulnerabilities that increase their susceptibility to misinformation, and the proposed strategies for mitigating the emotional, physical, and financial harms delineated in these contexts.</p>
<p>In this Discussion section, we deepen our analysis in relation to critical themes raised by participants in the workshops. These include the dynamics of echo chambers, the interplay between collective and individual agency, the cultivation of new media and algorithmic literacy (<xref ref-type="bibr" rid="ref33">Chen et al., 2011</xref>; <xref ref-type="bibr" rid="ref91">Koltay, 2011</xref>; <xref ref-type="bibr" rid="ref101">Lin et al., 2013</xref>), strategies for future engagement with excluded voices, the design of slow thinking and emotion-buffering spaces, and approaches to support the emotional vulnerabilities of individuals in everyday settings. These insights offer valuable contributions to the fields both Social Sciences and Human-Computer Interaction design.</p>
<sec id="sec21">
<label>5.1</label>
<title>The &#x2018;malicious&#x2019; echo chambers</title>
<p>During the first workshop (W1), stakeholders (e.g., W1P12) discussed the serious harm and risks posed by the spread of misinformation within small, enclosed online communities&#x2014;often referred to as echo chambers or filter bubbles (e.g., <xref ref-type="bibr" rid="ref141">Pennycook and Rand, 2020</xref>; <xref ref-type="bibr" rid="ref84">Kalu&#x017E;a, 2022</xref>). Both terms are normally conflated in existing work and are frequently driven by social or political campaigns and exacerbated through the curation and manipulation of algorithms. Social media and other new media platforms afford both the representation and provocation of emotions, which can significantly influence the escalation and de-escalation of violence (<xref ref-type="bibr" rid="ref123">Morales, 2024</xref>). The amplification of emotional responses and the resulting inappropriate behaviours, either through heated discussions or fabricated contents tailored specifically for the echo chamber spaces, can fuel conflicts by reinforcing polarised narratives.</p>
<p>An abundance of literature has explored and analysed how misinformation is created and disseminated to desensitise young adults within echo chambers. For instance, <xref ref-type="bibr" rid="ref39">Diaz Ruiz and Nilsson (2023)</xref> highlighted that the malicious actors would strategically &#x2018;seed&#x2019; the deceptions within these spaces by masquerading misinformation as credible information. Once introduced, members within the echo chambers are enlisted to cocreate and propagate these contentious narratives, further disseminating the misinformation. As emphasised by W1P12, though initially seeking peers to share common interests, young adults may narrow their worldview to align solely with the perspectives within these spaces, leading to the subjective rejection of diverse voices and the gradual loss of critical thinking. However, there is a notable scarcity of empirical evidence involving users within echo chambers. Existing work, such as <xref ref-type="bibr" rid="ref157">S&#x00F6;derberg's (2016)</xref> interviews with 13 users of anti-immigration internet media, explored why individuals consume such content and whether they are influenced by echo chambers. Despite this, it remains challenging to track and understand how young adults are gradually influenced within closed, encrypted groups like Telegram (<xref ref-type="bibr" rid="ref120">Molla, 2021</xref>), where the dynamics of misinformation propagation and ideological reinforcement are often concealed. We propose adopting research methodologies such as data diaries (<xref ref-type="bibr" rid="ref165">Vlachokyriakos et al., 2024</xref>), which allows for the longitudinal collection of self-reported data, to better track and understand young adults&#x2019; behavioural change within such spaces over time. Notably, engaging with this demographic presents challenges, as young adults within echo chambers may be reluctant to participate in research activities or may resist acknowledging the presence of misinformation (<xref ref-type="bibr" rid="ref42">Du, 2023</xref>, p. 20).</p>
<p>Participants also specifically talked about online gaming as a critical area for future research and engagement. The communication environment in gaming is often characterised by hostile and aggressive expressions, including discrimination, racism, and sexism (<xref ref-type="bibr" rid="ref117">Meril&#x00E4;inen and Ruotsalainen, 2024</xref>). Due to the online disinhibition effect, young adults may feel less socially restrained, leading to more uninhibited and open expressions (<xref ref-type="bibr" rid="ref159">Suler, 2004</xref>). Furthermore, the gaming environment can normalise such behaviours, making young adults perceive them as more acceptable (<xref ref-type="bibr" rid="ref117">Meril&#x00E4;inen and Ruotsalainen, 2024</xref>). Compounding this issue, messages conveyed through voice are particularly difficult to capture as evidence, whilst tone and emotional delivery can more directly provoke responses and reactions (<xref ref-type="bibr" rid="ref93">Lawson and Mayer, 2022</xref>). Given these dynamics, we believe this is an essential field requiring the involvement of researchers and educators to better understand and address the complexities within this unique context.</p>
<p>In addition, online technologies that enable encrypted communication and anonymity further complicate the situation within echo chambers by allowing individuals to engage in harmful activities without the risk of incrimination (<xref ref-type="bibr" rid="ref166">Walther and McCoy, 2021</xref>). As W1P14 highlighted, AI-generated personalised fake accounts further contribute to the blend of voices in these enclosed spaces. Such AI deception&#x2014;where AI systems are trained with malicious intent&#x2014;can be seen a process of human disempowerment (<xref ref-type="bibr" rid="ref138">Park et al., 2024</xref>). In these echo chambers, intentionally created to attract vulnerable groups of young adults seeking peer support, voices gradually become contaminated by increasingly radicalised and polarised voices and opinions if they operate without supervision or moderation.</p>
<p>Hence, there is an urgent need to address how misinformation proliferates in these spaces and to evaluate the effectiveness of potential interventions through engagements with young adults and related stakeholders. By conducting empirical research in this area, researchers and related stakeholders can propose more effective policies and design tools that better safeguard young adults from these digital risks.</p>
</sec>
<sec id="sec22">
<label>5.2</label>
<title>Implications</title>
<p>In this section, we consolidate insights from the workshops into strategic design implications.</p>
<sec id="sec23">
<label>5.2.1</label>
<title>Balancing collective and individual agency</title>
<p>Participants in the stakeholder-engagement workshop (W1) discussed both individual and collective agency. As highlighted by W1P20, solely increasing individual agency might in advertently escalate the risks of introducing more misinformation. Furthermore, existing research suggests that enhancing agency in information search could also stem concerns about active intervention and customisations that may expose more personalised data (<xref ref-type="bibr" rid="ref144">Rezk et al., 2024</xref>). Participants advocated for a critical perspective on collective agency. Drawing on <xref ref-type="bibr" rid="ref59">Gonzalez Montero et al.&#x2019;s (2024)</xref> arguments, we define collective agency as the integration of the casual powers of young adults and stakeholders, enabling the coordinated actions as a collective (<xref ref-type="bibr" rid="ref64">Hainz et al., 2016</xref>). This encompasses their collaborative interactions with online information and the reciprocal effects and influences exerted on every receiver and reader of that information.</p>
<p>Building on our findings, we propose design implications for enhancing both individual and collective agency by incorporating several factors-informed agency. These align with the existing categorisations of agency perspectives, including emotion (<xref ref-type="bibr" rid="ref77">Jicol et al., 2021</xref>), communication, and values, drawing on the foundation of existing work (e.g., <xref ref-type="bibr" rid="ref14">Bennett et al., 2023</xref>; <xref ref-type="bibr" rid="ref64">Hainz et al., 2016</xref>; <xref ref-type="bibr" rid="ref87">Kavada, 2016</xref>; <xref ref-type="bibr" rid="ref144">Rezk et al., 2024</xref>). Such perspectives can combine the interplay of individual and group efforts in navigating and mitigating misinformation and fake news online.</p>
<sec id="sec24">
<label>5.2.1.1</label>
<title>Emotion-informed individual agency</title>
<p>Crowd members are especially susceptible to blindly following others due to heightened emotions, which reinforces collective emotion states (<xref ref-type="bibr" rid="ref95">Lebon, 2008</xref>). Participants in the co-design workshop (W2) highlighted that negative emotions among young adults are often exacerbated by the influence of celebrities and social media influencers. This emotional vulnerability, as highlighted in existing research, positions young adults for exploitation by malicious actors, political and social campaigns, as well as impulsive purchasing behaviours. Social media influencers, who convey social prestige, have emerged as new opinions leaders, experts, and brand ambassadors (<xref ref-type="bibr" rid="ref36">Croes and Bartels, 2021</xref>; <xref ref-type="bibr" rid="ref100">Lin et al., 2018</xref>). As discussed in Section 4.1, this individual fragility is further amplified within peer groups or echo chambers, where shared perspectives intensify emotional responses. Emotions such as anger can reinforce and perpetuate echo chamber dynamics, creating self-reinforcing cycles that deepen biases and limit young adults&#x2019; exposure to diverse viewpoints (<xref ref-type="bibr" rid="ref168">Wolleb&#x00E6;k et al., 2019</xref>).</p>
<p>Young adults&#x2019; emotions can be unconsciously triggered by bystanders&#x2014;individuals who witness harmful actions or conflicts but either do not intervene or inadvertently escalate the situation (<xref ref-type="bibr" rid="ref119">Mitchell et al., 2022</xref>). Participant W1P1 highlighted a widespread lack of public awareness regarding how sharing, twisting, or amplifying content can exacerbate conflicts among young adults. Research similarly emphasises the harmful role of online bystanders, whose actions can intensify tensions and extend real-world conflict into virtual realm, particularly on social media (<xref ref-type="bibr" rid="ref79">Joelsson and Bruno, 2022</xref>). By unintentionally contributing to these dynamics, bystanders may heighten emotional and psychological harm for young adults, both online and offline. This highlights the need for more regulatory action from social media platforms and legislative systems, as well as the urgent empowerment of young adults&#x2019; individual agency in self-protection. Perpetrators and bystanders involved in bullying often become increasingly aware of the optimal time and places for harm, using spatial tactics to maximise social impact whilst minimising the possibility of &#x2018;being caught&#x2019; (<xref ref-type="bibr" rid="ref6">Andrews and Chen, 2006</xref>; <xref ref-type="bibr" rid="ref79">Joelsson and Bruno, 2022</xref>). In response, young adults must develop critical awareness and resilience, employing self-protection strategies such as anonymous reporting and seeking support through accessible online and offline channels.</p>
<p>Institutional distrust is another emotional factor that can easily spread through online sources promoting pseudoscience and is closely linked to public anxieties (<xref ref-type="bibr" rid="ref65">Han and Curtis, 2021</xref>). Mistrust of experts by certain individuals, exemplified by vaccine hesitancy as surfaced by participant W1P14 in our findings and reported substantially on similar work (e.g., <xref ref-type="bibr" rid="ref76">Jaffe et al., 2022</xref>; <xref ref-type="bibr" rid="ref130">Nurmi and Jaakola, 2023</xref>), can quickly spread to a broader audience. As participant W2P5 highlighted, mechanisms like public votes or likes on social media further amplify this mistrust, intensifying anxieties by moralising perceived &#x2018;risky&#x2019; behaviours (<xref ref-type="bibr" rid="ref65">Han and Curtis, 2021</xref>). To address the issue of &#x2018;collective anxiety&#x2019; (<xref ref-type="bibr" rid="ref172">Yang et al., 2021</xref>) and the spread of distrust, it is crucial to emphasise the role of individual agency. Existing research suggests that agency should only be prioritised when it can meaningfully contribute to the narrative and context of experiences (<xref ref-type="bibr" rid="ref77">Jicol et al., 2021</xref>). Whilst this implication emerged in the context of VR settings, we argue that it is equally relevant to our study. Specifically, young adults&#x2019; individual agency should be empowered and exercised when the awareness and ability to be independent, opt out of online communities or disengage from information sources provides them with a way to avoid being further influenced by collective emotions (<xref ref-type="bibr" rid="ref14">Bennett et al., 2023</xref>). This is particularly important in situations where they feel overwhelmed or when such interactions negatively impact their emotional wellbeing.</p>
</sec>
<sec id="sec25">
<label>5.2.1.2</label>
<title>Communication and value-informed collective agency</title>
<p>The adoption and cultivation of collective agency also requires the efforts and power from news publishers, curators, and journalists, as emphasised by participant W1P20, beyond the individualistic approaches (<xref ref-type="bibr" rid="ref2">Aghajari et al., 2023</xref>). From the young adults&#x2019; perspective, this is important because the processes of self-control and self-change can both support and constrain the endorsement of agency over time (<xref ref-type="bibr" rid="ref14">Bennett et al., 2023</xref>; <xref ref-type="bibr" rid="ref110">Lyngs et al., 2022</xref>). Young adults&#x2019; goals, values, and intentions can vary, and as some younger children transition into young adulthood every day, the delegation of agency requires not only oversight by schools but also involvement from gatekeepers, such as publishers and journalists, whose voices are increasingly undermined by the risks of algorithms (<xref ref-type="bibr" rid="ref15">Bhuiyan et al., 2021</xref>; <xref ref-type="bibr" rid="ref115">McClure Haughey et al., 2020</xref>). Whilst from a societal perspective, we need collective agency as it reflects the values derived from collaborative communications and actions among all related stakeholders (<xref ref-type="bibr" rid="ref87">Kavada, 2016</xref>). These stakeholders include not only traditional and new socia media content curators but also parents and teachers, Internet influencers, and policymakers &#x2013;individuals who must recognise the effectiveness and legitimacy of rules and principles aimed at preventing the spread of misinformation or fake news (<xref ref-type="bibr" rid="ref64">Hainz et al., 2016</xref>; <xref ref-type="bibr" rid="ref114">Mathiesen, 2006</xref>). Online media can be regarded as one of the sites for conversations and textual information exchange, offering affordances that enable interactions among diverse stakeholders&#x2014;facilitating the sharing and exchanging of opinions, as well as evaluations on the information consumed and disseminated (<xref ref-type="bibr" rid="ref87">Kavada, 2016</xref>).</p>
<p>By acknowledging these standards and committing to act in accordance with them, these stakeholders collectively contribute to fostering a responsible and informed online environment. Such efforts can also promote societal collective beliefs and desires to safeguard a safe and responsible digital space that satisfies the needs of young adults who navigate information online (<xref ref-type="bibr" rid="ref104">List and Pettit, 2011</xref>; <xref ref-type="bibr" rid="ref114">Mathiesen, 2006</xref>). In many everyday situations, individuals act not in isolation but within social contexts (<xref ref-type="bibr" rid="ref122">Moore and Obhi, 2012</xref>). We believe that the collective agency, in turn, reinforces and stimulates young adults&#x2019; individual agency. This reciprocal dynamic aligns with the concept of &#x2018;interdependence&#x2019; within social contexts&#x2014;a perspective of agency highlighted in <xref ref-type="bibr" rid="ref14">Bennett et al.&#x2019;s (2023)</xref> work&#x2014;where collaborative actions within the social frameworks strengthen individual capacities for informed actions.</p>
</sec>
</sec>
<sec id="sec26">
<label>5.2.2</label>
<title>Cultivating new media and algorithmic literacy</title>
<p>Professionals in the first workshop emphasised the growing concern about young adults&#x2019; vulnerability to unintentionally or unknowingly entering legally binding contracts and illegal sources of healthcare online. With the increasing prevalence of digital devices, children and young adults face greater risks of exposure to legal obligations and unauthorised healthcare or mediations without full understanding the implications or professional languages (<xref ref-type="bibr" rid="ref19">Blum-Ross and Livingstone, 2017</xref>; <xref ref-type="bibr" rid="ref169">Wszalek, 2017</xref>). Hence, promoting education about the legislative frameworks and authorised healthcare practices can contribute to raising awareness and improving understanding among children and young adults. In accordance with the <xref ref-type="bibr" rid="ref135">Online Safety Act 2023 (2023)</xref>, both demographics should be equipped with &#x2018;<italic>sufficient capability&#x2019;</italic> to evaluate online contents and services that they attend to. They should be empowered with the knowledge and tools to identify underlying harmful online interactions. In addition, they should also be educated about their responsibilities and rights to report the <italic>&#x2018;abusive contents&#x2019;</italic>, <italic>&#x2018;hatred&#x2019;</italic> behaviours, and illegal bindings online.</p>
<p>We would also like to highlight an intriguing avenue for future research based on insights from participating young adults in the co-design workshop (W2). They described mundane scenarios in which ChatGPT becomes seamlessly integrated into their daily communications, information searches, and decision-making. The co-created storyboard illustrates a situation where young adults carefully test and assess ChatGPT&#x2019;s credibility before trusting it with more aspects of daily decision-making. Recent research examining scientific papers with signs of GPT use on Google Scholar, particularly those focused on health-related topics, found that 57% of the selected questionable papers were susceptible to influence operations (<xref ref-type="bibr" rid="ref63">Haider et al., 2024</xref>). Such convincingly scientific looking paper would undermine the basis for trust in scientific knowledge, bringing detrimental harm to the trust of young adults in academic professionals and institutions.</p>
<p>In the era of social media, these &#x2018;mighty&#x2019; AI algorithms have become significant factors in shaping how young adults perceive and process information. AI algorithms now act as a new type of &#x2018;actor&#x2019; that intervenes in communication and influences individual lives (<xref ref-type="bibr" rid="ref154">Shin et al., 2022</xref>). They bring convenience to media consumers, delivering personalised information tailored to individual interests and preferences (<xref ref-type="bibr" rid="ref99">Li et al., 2011</xref>). However, the lack of transparency and non-deterministic nature of some AI algorithms poses challenges in identifying the sources and pathways of information, as it may sometimes be fully fabricated to maximise relevance based on the audience&#x2019;s perceived characteristics (<xref ref-type="bibr" rid="ref42">Du, 2023</xref>). Whilst algorithms may present certain facts accurately, their inherent opacity can foster mistrust, paradoxically leading to an over-reliance on human oversight and intervention in the technology. This phenomenon, referred to as the &#x2018;the automation paradox&#x2019; in existing work, suggests that as automated systems becomes more efficient, the need for meaningful human involvement becomes increasingly critical (<xref ref-type="bibr" rid="ref92">KPI, 2024</xref>). This dynamic poses potential risks to young adults, as excessive intervention or over-reliance could inadvertently exacerbate harms rather than mitigate them. In addition, existing literature has examined how algorithm-driven recommendations and push content may undermine young adults&#x2019; sense of agency in selecting precepted information by continually reinforcing and delivering content lined to negative keywords (<xref ref-type="bibr" rid="ref108">Lukoff et al., 2021</xref>).</p>
<p>Hence, we emphasise the importance of considering the role AI algorithms play in the social media landscape and the need to enhance individual&#x2019;s algorithmic literacy&#x2014;the awareness, knowledge, imagined understanding, and tactics that are responsible for content personalisation mechanisms (<xref ref-type="bibr" rid="ref13">Bell et al., 2023</xref>). This also includes promoting skills in both algorithm appreciation and avoidance (<xref ref-type="bibr" rid="ref80">Joris et al., 2021</xref>; <xref ref-type="bibr" rid="ref153">Shin, 2020</xref>). To assist young adults in detecting and reporting misinformation, credibility tools should be enhanced to address the challenges posed by <italic>&#x2018;deepfakes&#x2019;</italic> and <italic>&#x2018;</italic>cheap fakes&#x2019;<xref ref-type="fn" rid="fn0003"><sup>3</sup></xref> (<xref ref-type="bibr" rid="ref56">Gamage et al., 2022</xref>). Value-centric curatorial algorithms and social media systems should also be designed and developed that can embed values such as prioritising children and young adults&#x2019; emotional wellbeing beyond engagement.</p>
</sec>
<sec id="sec27">
<label>5.2.3</label>
<title>More engagement with excluded voices</title>
<p>Certain groups of &#x2018;strategic actors&#x2019;&#x2014;such as activists ranging from large unions to small citizen groups are overrepresented in the social media environment (<xref ref-type="bibr" rid="ref32">Chalmers and Shotton, 2016</xref>; <xref ref-type="bibr" rid="ref72">Humprecht et al., 2020</xref>). Attention should also shift towards amplifying silent voices and exploring less traditional digital interaction spaces, such as voice chat channels and emerging video game platforms as addressed in Section 4.1. These platforms offer unique environments where marginalised groups may communicate or express themselves in ways that are often overlooked in mainstream studies. There is also existing proposed solution to amplify these voices is the use of social bots, which can artificially inflate the number of likes and shares, creating a manufactured sense of popularity (<xref ref-type="bibr" rid="ref23">Bradshaw and Howard, 2017</xref>). Whilst this may bring attention to marginalised ideas, it raises ethical concerns about authenticity and the potential manipulation of online disclosure (e.g., <xref ref-type="bibr" rid="ref22">Braddock et al., 2024</xref>). We need to explore effective ways to closely engaged with underrepresented voices, whilst ensuring the efforts to elevate them do not inadvertently distort the integrity of the dissemination of online communication. There are also proposals for future research to incorporate Community-based Participatory Design and collaborative design approaches (<xref ref-type="bibr" rid="ref50">Fathallah, 2021</xref>; <xref ref-type="bibr" rid="ref67">Harrington et al., 2019</xref>), or offering solutions such as establishing local libraries and encouraging storytelling within communities (<xref ref-type="bibr" rid="ref4">Amazeen et al., 2024</xref>). These initiatives aim to foster civic and community engagement whilst empowering marginalised individuals throughout the process of involvement.</p>
<p>Workshop participants did not offer additional strategies for engaging with marginalised groups. However, we want to extend beyond existing approaches, highlighting that solely recruiting marginalised participants into the design and engagement process may be insufficient for addressing misinformation, as it primarily emphasises one-way inclusions. Instead, we believe there is a need for fostering meaningful, reciprocal communications, where voices are not only heard but actively engaged in efforts to achieve shared understanding. Recent research suggests that regular interactions with minoritised groups can help bridge the radical divides surrounding important current events (<xref ref-type="bibr" rid="ref1">Abrajano et al., 2024</xref>). Active, interpersonal engagement with individuals from either similar or different minoritised backgrounds is positively associated with correcting misconceptions. Therefore, we propose that, beyond general strategies to amplify excluded voices, fostering mutual interactions between marginalised and mainstream voices especially among young adults could help individuals understand how misconceptions and misinformation form about or within both mainstream and marginalised communities.</p>
</sec>
<sec id="sec28">
<label>5.2.4</label>
<title>Designing slow thinking and emotional buffering for young adults</title>
<p>The concept of designing a &#x2018;slow thinking space&#x2019; was inspired by W2P3 and W2P4&#x2019;s comments as a strategy to promote more thoughtful decision-making, particularly when individuals are at high risk of exposure to misinformation. This heuristic aims to help peers make more informed decisions and reduce the risks associated with harmful content. Additionally, it seeks to empower young users as they navigate online environments by encouraging thoughtful, deliberate engagement.</p>
<p>Fast and slow thinking modes can be distinguished and measured by the time spent on decision-making (<xref ref-type="bibr" rid="ref78">Jimenez et al., 2018</xref>). Fast thinking is characterised by factors including speed, intuition, emotion responses, and low awareness; whilst slow thinking involves careful interpretation, analysis, heightened awareness, doubt, and stress (<xref ref-type="bibr" rid="ref82">Kahneman, 2012</xref>). Recent research has shown that individuals aged 14 to 19 are primarily characterised by a fast-thinking style (<xref ref-type="bibr" rid="ref75">Jabbar et al., 2024</xref>). Young adults are in a stage of development where slow thinking becomes more prominent, yet they remain vulnerable, especially when consuming social media. Research has shown that users tend to think more intuitively and make quicker intuitive decisions on a smartphone compared to a personal computer (PC), increasing their susceptibility to impulsive judgments.</p>
<p>Research by <xref ref-type="bibr" rid="ref11">Baum and Abdel Rahman (2021)</xref> further underscores the complexity of these cognitive processes, revealing that simply reminding individuals of the trustworthiness of media sources before exposure to information does little to counteract the effects of emotionally charged headlines. Negative social&#x2013;emotional information, even from untrustworthy sources, is participially hard to ignore. Fast and slow cognitive responses to such headlines remain biased, as emotions often override critical thinking and reflection, regardless of whether individuals engage in fast or slow thinking.</p>
<p>In addition to designing a &#x2018;slow thinking space&#x2019;, we advocate for future research to explore the creation of an &#x2018;emotion buffer space&#x2019;. This concept would protect young adults from being immediately confronted with emotionally charged headlines, providing them with the cognitive agency to pause and engage in more critical judgment. By allowing more time for reflection, this approach could help precent emotional responses from completely dominating their information evaluation and decision-making processes.</p>
</sec>
<sec id="sec29">
<label>5.2.5</label>
<title>Support for emotionally vulnerable moments in life</title>
<p>In the first workshop, participant W1P8 emphasised how frustration can lead young adults to seek out &#x2018;illegal sources of health providers&#x2019;, potentially resulting in serious harm. This concern was echoed by the young adult designers in the second workshop, who highlighted that everyone can feel vulnerable and isolated at certain points in life, making it challenging to identify reliable information. Emotional vulnerability is closely tied to social discomfort and reflects an individual&#x2019;s sensitivity and the likelihood of getting hurt (<xref ref-type="bibr" rid="ref88">Khrystenko, 2022</xref>; <xref ref-type="bibr" rid="ref171">Yamaguchi et al., 2022</xref>). People tend to focus more on information that worries them rather than information that does not (<xref ref-type="bibr" rid="ref111">MacLeod et al., 1986</xref>). When they are highly sensitive and exposed to more concern-related information, they may be especially vulnerable to the harmful effects of mis- or dis-information, particularly when algorithms on social media push this type of content to them.</p>
</sec>
</sec>
<sec id="sec30">
<label>5.3</label>
<title>Limitations and future research</title>
<p>Our qualitative approach for both workshops determined a relatively small, non-representative UK study sample and could be complemented by a larger-scale future study with a representative sample. Also, in the co-design workshop (W2), our choice of co-creation methods led to our recruitment of participants who have specialist expertise in Interaction Design. This focus on expert participants introduced a bias, because it engaged young adults with higher levels of media literacy and technology skills. Future research could involve a more diverse sample of young adults.</p>
<p>In terms of extending the qualitative research on this topic and reflecting on methods: whilst the storyboarding techniques drew anecdotally on lived experiences, there is also an opportunity to use different speculative design methods that engage research populations in the real-world contexts of their lives, for example, more performative techniques (<xref ref-type="bibr" rid="ref47">Elsden et al., 2017</xref>; <xref ref-type="bibr" rid="ref73">Hutchinson et al., 2025</xref>), or other real-world interventions and observations (<xref ref-type="bibr" rid="ref9009">Cipolla, 2018</xref>). Such methods could invite co-creativity and speculation in participants, whilst also capturing direct experiences of media creation and consumption that could deliver evidence on situated behaviours and sense making.</p>
</sec>
</sec>
<sec sec-type="conclusions" id="sec31">
<label>6</label>
<title>Conclusion</title>
<p>This qualitative study explored broad and specific contexts in which young adults living in the UK become vulnerable to encountering and being affected by online misinformation and fake news. We adopted a qualitative, idiographic approach to engage diverse stakeholders including young adults in rich roundtable discussions, supported by workshops that utilised co-creative methods (including visual storyboarding) to evidence individual experiences and perspectives. We explored how emotions may prompt and shape misinformation encounters, and how social factors influence young adults&#x2019; trust in various online sources. We further illuminated the vulnerabilities that malicious actors exploit, plus participant-proposed mitigation strategies.</p>
<p>We address the challenges of engaging and supporting young adults in echo chambers and the importance of safeguarding them from additional harms within these enclosed online communities. Reflections on ideas of &#x2018;agency&#x2019; are offered from both individual and collective perspectives, reflecting on how factors such as emotions, communication, and values shape not only young adults&#x2019; individual sense of agency but also the collaborative agency of related stakeholders, who should uphold the veracity and accuracy of online information. Additionally, we stress the criticality of cultivating new media literacy, particularly algorithmic literacy, placing focus on how AI-driven chatbots and other emerging technologies shape young adults&#x2019; information assessment and decision-making processes. We highlight vulnerabilities such as marginalised demographics and the challenges in understanding professional terminology. Recognising the emotional vulnerabilities inherent to everyone&#x2014;not only young adults&#x2014;underscores the need to protect online technology users against exploitation by malicious actors; nudges may be designed into technology applications to discourage rash and rushed decision making and to encourage critical reflection-in-action.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="sec32">
<title>Data availability statement</title>
<p>The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author.</p>
</sec>
<sec sec-type="ethics-statement" id="sec33">
<title>Ethics statement</title>
<p>The studies involving humans were approved by SAgE Ethics Committee of Newcastle University. The studies were conducted in accordance with the local legislation and institutional requirements. The participants provided their written informed consent to participate in this study. Written informed consent was obtained from the individual(s) for the publication of any potentially identifiable images or data included in this article.</p>
</sec>
<sec sec-type="author-contributions" id="sec34">
<title>Author contributions</title>
<p>VZ: Resources, Visualization, Conceptualization, Formal analysis, Project administration, Software, Data curation, Methodology, Writing &#x2013; review &#x0026; editing, Writing &#x2013; original draft. VV: Methodology, Supervision, Validation, Writing &#x2013; review &#x0026; editing, Project administration, Formal analysis, Funding acquisition. IJ: Formal analysis, Validation, Writing &#x2013; review &#x0026; editing. AD: Resources, Funding acquisition, Project administration, Visualization, Data curation, Validation, Writing &#x2013; review &#x0026; editing, Supervision, Conceptualization, Investigation, Methodology.</p>
</sec>
<sec sec-type="COI-statement" id="sec35">
<title>Conflict of interest</title>
<p>The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="sec36">
<title>Generative AI statement</title>
<p>The author(s) declared that Generative AI was not used in the creation of this manuscript.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec sec-type="disclaimer" id="sec37">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Abrajano</surname><given-names>M.</given-names></name> <name><surname>Lajevardi</surname><given-names>N.</given-names></name> <name><surname>Uribe</surname><given-names>L.</given-names></name></person-group> (<year>2024</year>). <article-title>Context, contact, and misinformation about socially marginalized groups in the United States</article-title>. <source>J. Race Ethn. Polit.</source> <volume>9</volume>, <fpage>335</fpage>&#x2013;<lpage>376</lpage>. doi: <pub-id pub-id-type="doi">10.1017/rep.2023.44</pub-id></mixed-citation></ref>
<ref id="ref2"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Aghajari</surname><given-names>Z.</given-names></name> <name><surname>Baumer</surname><given-names>E. P. S.</given-names></name> <name><surname>DiFranzo</surname><given-names>D.</given-names></name></person-group> (<year>2023</year>). <article-title>Reviewing interventions to address misinformation: the need to expand our vision beyond an individualistic focus</article-title>. <source>Proc. ACM Hum.-Comput. Interact.</source> <volume>7</volume>, <fpage>1</fpage>&#x2013;<lpage>34</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3579520</pub-id></mixed-citation></ref>
<ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Almeida</surname><given-names>C.</given-names></name> <name><surname>Macedo-Rouet</surname><given-names>M.</given-names></name> <name><surname>de Carvalho</surname><given-names>V. B.</given-names></name> <name><surname>Castilhos</surname><given-names>W.</given-names></name> <name><surname>Ramalho</surname><given-names>M.</given-names></name> <name><surname>Amorim</surname><given-names>L.</given-names></name> <etal/></person-group>. (<year>2023</year>). <article-title>When does credibility matter? The assessment of information sources in teenagers navigation regimes</article-title>. <source>J. Librariansh. Inf. Sci.</source> <volume>55</volume>, <fpage>218</fpage>&#x2013;<lpage>231</lpage>. doi: <pub-id pub-id-type="doi">10.1177/09610006211064647</pub-id></mixed-citation></ref>
<ref id="ref4"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Amazeen</surname><given-names>M. A.</given-names></name> <name><surname>Vasquez</surname><given-names>R. A.</given-names></name> <name><surname>Krishna</surname><given-names>A.</given-names></name> <name><surname>Ji</surname><given-names>Y. G.</given-names></name> <name><surname>Su</surname><given-names>C. C.</given-names></name> <name><surname>Cummings</surname><given-names>J. J.</given-names></name></person-group> (<year>2024</year>). <article-title>Missing voices: examining how misinformation-susceptible individuals from underrepresented communities engage, perceive, and combat science misinformation</article-title>. <source>Sci. Commun.</source> <volume>46</volume>, <fpage>3</fpage>&#x2013;<lpage>35</lpage>. doi: <pub-id pub-id-type="doi">10.1177/10755470231217536</pub-id></mixed-citation></ref>
<ref id="ref5"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Anderson</surname><given-names>M.</given-names></name> <name><surname>Jiang</surname><given-names>J.</given-names></name></person-group> (<year>2018</year>). <source>Teens, social media &#x0026; technology 2018 (No. 202.419.4372)</source>. <publisher-name>Washington, DC: Pew Research Centre</publisher-name>.</mixed-citation></ref>
<ref id="ref6"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Andrews</surname><given-names>G. J.</given-names></name> <name><surname>Chen</surname><given-names>S.</given-names></name></person-group> (<year>2006</year>). <article-title>The production of tyrannical space</article-title>. <source>Child. Geogr.</source> <volume>4</volume>, <fpage>239</fpage>&#x2013;<lpage>250</lpage>. doi: <pub-id pub-id-type="doi">10.1080/14733280600807120</pub-id></mixed-citation></ref>
<ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Arora</surname><given-names>S.</given-names></name> <name><surname>Shah</surname><given-names>D.</given-names></name> <name><surname>Chaturvedi</surname><given-names>S.</given-names></name> <name><surname>Gupta</surname><given-names>P.</given-names></name></person-group> (<year>2015</year>). <article-title>Defining and measuring vulnerability in young people</article-title>. <source>Indian J. Community Med.</source> <volume>40</volume>, <fpage>193</fpage>&#x2013;<lpage>197</lpage>. doi: <pub-id pub-id-type="doi">10.4103/0970-0218.158868</pub-id>, <pub-id pub-id-type="pmid">26170545</pub-id></mixed-citation></ref>
<ref id="ref8"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Arshad</surname><given-names>T.</given-names></name> <name><surname>Brasted</surname><given-names>C.</given-names></name></person-group> (<year>2024</year>). What&#x2019;s next for the UK&#x2019;S online safety act and can it solve the misinformation problem? Available online at: <ext-link xlink:href="https://www.hoganlovells.com/en/publications/whats-next-for-the-uks-online-safety-act-and-can-it-solve-the-misinformation-problem" ext-link-type="uri">https://www.hoganlovells.com/en/publications/whats-next-for-the-uks-online-safety-act-and-can-it-solve-the-misinformation-problem</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref9"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Bailey</surname><given-names>S.</given-names></name></person-group> (<year>2017</year>) Unite against child sexual exploitation [National Police Chief&#x2019;s Council]. Available online at: <ext-link xlink:href="https://news.npcc.police.uk/releases/cc-simon-bailey-blog-unite-against-child-sexual-exploitation" ext-link-type="uri">https://news.npcc.police.uk/releases/cc-simon-bailey-blog-unite-against-child-sexual-exploitation</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref10"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Balakrishnan</surname><given-names>V.</given-names></name></person-group> (<year>2024</year>). <article-title>Socio-demographic predictors for misinformation sharing and authenticating amidst the COVID-19 pandemic among Malaysian Young adults</article-title>. <source>Inf. Dev.</source> <volume>40</volume>, <fpage>319</fpage>&#x2013;<lpage>331</lpage>. doi: <pub-id pub-id-type="doi">10.1177/02666669221118922</pub-id></mixed-citation></ref>
<ref id="ref11"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Baum</surname><given-names>J.</given-names></name> <name><surname>Abdel Rahman</surname><given-names>R.</given-names></name></person-group> (<year>2021</year>). <article-title>Emotional news affects social judgments independent of perceived media credibility</article-title>. <source>Soc. Cogn. Affect. Neurosci.</source> <volume>16</volume>, <fpage>280</fpage>&#x2013;<lpage>291</lpage>. doi: <pub-id pub-id-type="doi">10.1093/scan/nsaa164</pub-id>, <pub-id pub-id-type="pmid">33274748</pub-id></mixed-citation></ref>
<ref id="ref12"><mixed-citation publication-type="other"><collab id="coll1">BBC</collab>. (<year>2024</year>). Half of teenagers worried about fake news. Available online at: <ext-link xlink:href="https://www.bbc.co.uk/bitesize/articles/zsrtg2p" ext-link-type="uri">https://www.bbc.co.uk/bitesize/articles/zsrtg2p</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bell</surname><given-names>A. R.</given-names></name> <name><surname>Tennfjord</surname><given-names>M. K.</given-names></name> <name><surname>Tokovska</surname><given-names>M.</given-names></name> <name><surname>Eg</surname><given-names>R.</given-names></name></person-group> (<year>2023</year>). <article-title>Exploring the role of social media literacy in adolescents&#x2019; experiences with personalization: a Norwegian qualitative study</article-title>. <source>J. Adolesc. Adult. Lit.</source> <volume>66</volume>, <fpage>239</fpage>&#x2013;<lpage>248</lpage>. doi: <pub-id pub-id-type="doi">10.1002/jaal.1273</pub-id></mixed-citation></ref>
<ref id="ref14"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Bennett</surname><given-names>D.</given-names></name> <name><surname>Metatla</surname><given-names>O.</given-names></name> <name><surname>Roudaut</surname><given-names>A.</given-names></name> <name><surname>Mekler</surname><given-names>E. D.</given-names></name></person-group> (<year>2023</year>). <article-title>How does HCI understand human agency and autonomy?</article-title> <conf-name>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>18</lpage></mixed-citation></ref>
<ref id="ref15"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bhuiyan</surname><given-names>M. M.</given-names></name> <name><surname>Whitley</surname><given-names>H.</given-names></name> <name><surname>Horning</surname><given-names>M.</given-names></name> <name><surname>Lee</surname><given-names>S. W.</given-names></name> <name><surname>Mitra</surname><given-names>T.</given-names></name></person-group> (<year>2021</year>). <article-title>Designing transparency cues in online news platforms to promote trust: journalists&#x2019; &#x0026; consumers&#x2019; perspectives</article-title>. <source>Proc. ACM Hum.-Comput. Interact.</source> <volume>5</volume>, <fpage>1</fpage>&#x2013;<lpage>31</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3479539</pub-id></mixed-citation></ref>
<ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Biddle</surname><given-names>B. J.</given-names></name> <name><surname>Bank</surname><given-names>B. J.</given-names></name> <name><surname>Slavings</surname><given-names>R. L.</given-names></name></person-group> (<year>1990</year>). <article-title>Modality of thought, campus experiences, and the development of values</article-title>. <source>J. Educ. Psychol.</source> <volume>82</volume>, <fpage>671</fpage>&#x2013;<lpage>682</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0022-0663.82.4.671</pub-id></mixed-citation></ref>
<ref id="ref17"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Birk</surname><given-names>M. V.</given-names></name> <name><surname>Atkins</surname><given-names>C.</given-names></name> <name><surname>Bowey</surname><given-names>J. T.</given-names></name> <name><surname>Mandryk</surname><given-names>R. L.</given-names></name></person-group> (<year>2016</year>). <article-title>Fostering intrinsic motivation through avatar identification in digital games</article-title>. <conf-name>Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>2982</fpage>&#x2013;<lpage>2995</lpage></mixed-citation></ref>
<ref id="ref18"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bleidorn</surname><given-names>W.</given-names></name> <name><surname>Kandler</surname><given-names>C.</given-names></name> <name><surname>Caspi</surname><given-names>A.</given-names></name></person-group> (<year>2014</year>). <article-title>The behavioural genetics of personality development in adulthood&#x2014;classic, contemporary, and future trends</article-title>. <source>Eur. J. Personal.</source> <volume>28</volume>, <fpage>244</fpage>&#x2013;<lpage>255</lpage>. doi: <pub-id pub-id-type="doi">10.1002/per.1957</pub-id></mixed-citation></ref>
<ref id="ref19"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Blum-Ross</surname><given-names>A.</given-names></name> <name><surname>Livingstone</surname><given-names>S.</given-names></name></person-group> (<year>2017</year>). <article-title>&#x201C;Sharenting,&#x201D; parent blogging, and the boundaries of the digital self</article-title>. <source>Popul. Commun.</source> <volume>15</volume>, <fpage>110</fpage>&#x2013;<lpage>125</lpage>. doi: <pub-id pub-id-type="doi">10.1080/15405702.2016.1223300</pub-id></mixed-citation></ref>
<ref id="ref20"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Booth</surname><given-names>R.</given-names></name></person-group> (<year>2024</year>). &#x2018;<article-title>Teenage girls are feeling vulnerable&#x2019;: Fears grow over online beauty filters</article-title>. <source>The Guardian</source>. Available online at: <ext-link xlink:href="https://www.theguardian.com/media/2024/nov/29/teenage-girls-are-feeling-vulnerable-fears-grow-over-online-beauty-filters" ext-link-type="uri">https://www.theguardian.com/media/2024/nov/29/teenage-girls-are-feeling-vulnerable-fears-grow-over-online-beauty-filters</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref21"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Boyatzis</surname><given-names>R. E.</given-names></name></person-group> (<year>1998</year>). <source>Transforming qualitative information: Thematic analysis and code development</source>. <publisher-name>Thousand Oaks, CA: Sage Publications</publisher-name>.</mixed-citation></ref>
<ref id="ref22"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Braddock</surname><given-names>K.</given-names></name> <name><surname>Hughes</surname><given-names>B.</given-names></name> <name><surname>Goldberg</surname><given-names>B.</given-names></name> <name><surname>Miller-Idriss</surname><given-names>C.</given-names></name></person-group> (<year>2024</year>). <article-title>Engagement in subversive online activity predicts susceptibility to persuasion by far-right extremist propaganda</article-title>. <source>New Media Soc.</source> <volume>26</volume>, <fpage>1775</fpage>&#x2013;<lpage>1798</lpage>. doi: <pub-id pub-id-type="doi">10.1177/14614448221077286</pub-id></mixed-citation></ref>
<ref id="ref23"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Bradshaw</surname><given-names>S.</given-names></name> <name><surname>Howard</surname><given-names>P. N.</given-names></name></person-group> (<year>2017</year>) Troops, trolls and troublemakers: A global inventory of organized social media manipulation (computational propaganda research project) [Working paper], University of Oxford. Available online at: <ext-link xlink:href="https://ora.ox.ac.uk/objects/uuid:cef7e8d9-27bf-4ea5-9fd6-855209b3e1f6/files/m3ca8c455852611e82d0fb182445a471f" ext-link-type="uri">https://ora.ox.ac.uk/objects/uuid:cef7e8d9-27bf-4ea5-9fd6-855209b3e1f6/files/m3ca8c455852611e82d0fb182445a471f</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref24"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Brashier</surname><given-names>N. M.</given-names></name></person-group> (<year>2024</year>). <article-title>Fighting misinformation among the most vulnerable users</article-title>. <source>Curr. Opin. Psychol.</source> <volume>57</volume>:<fpage>101813</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.copsyc.2024.101813</pub-id>, <pub-id pub-id-type="pmid">38670015</pub-id></mixed-citation></ref>
<ref id="ref25"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Braun</surname><given-names>V.</given-names></name> <name><surname>Clarke</surname><given-names>V.</given-names></name></person-group> (<year>2006</year>). <article-title>Qualitative research in psychology using thematic analysis in psychology using thematic analysis in psychology</article-title>. <source>Qual. Res. Psychol.</source> <volume>3</volume>, <fpage>77</fpage>&#x2013;<lpage>101</lpage>. doi: <pub-id pub-id-type="doi">10.1191/1478088706qp063oa</pub-id></mixed-citation></ref>
<ref id="ref26"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Braun</surname><given-names>V.</given-names></name> <name><surname>Clarke</surname><given-names>V.</given-names></name></person-group> (<year>2012</year>). &#x201C;<article-title>Thematic analysis</article-title>&#x201D; in <source>APA handbook of research methods in psychology, eds. Cooper, H., Camic, P. M., Long, D. L., Panter, A. T., Rindskopf, D., and Sher, K. J. Vol 2: Research designs. Washington, DC; Hershey, Pennsylvania; London: Quantitative, qualitative, neuropsychological, and biological, vol. 2</source>, <fpage>57</fpage>&#x2013;<lpage>71</lpage>.</mixed-citation></ref>
<ref id="ref27"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Braun</surname><given-names>V.</given-names></name> <name><surname>Clarke</surname><given-names>V.</given-names></name></person-group> (<year>2019</year>). <article-title>Reflecting on reflexive thematic analysis</article-title>. <source>Qual. Res. Sport Exerc. Health</source> <volume>11</volume>, <fpage>589</fpage>&#x2013;<lpage>597</lpage>. doi: <pub-id pub-id-type="doi">10.1080/2159676X.2019.1628806</pub-id></mixed-citation></ref>
<ref id="ref28"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Braun</surname><given-names>J. A.</given-names></name> <name><surname>Eklund</surname><given-names>J. L.</given-names></name></person-group> (<year>2019</year>). <article-title>Fake news, real money: ad tech platforms, profit-driven hoaxes, and the business of journalism</article-title>. <source>Digit. Journal.</source> <volume>7</volume>, <fpage>1</fpage>&#x2013;<lpage>21</lpage>. doi: <pub-id pub-id-type="doi">10.1080/21670811.2018.1556314</pub-id></mixed-citation></ref>
<ref id="ref29"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Broniatowski</surname><given-names>D. A.</given-names></name> <name><surname>Simons</surname><given-names>J. R.</given-names></name> <name><surname>Gu</surname><given-names>J.</given-names></name> <name><surname>Jamison</surname><given-names>A. M.</given-names></name> <name><surname>Abroms</surname><given-names>L. C.</given-names></name></person-group> (<year>2023</year>). <article-title>The efficacy of Facebook&#x2019;s vaccine misinformation policies and architecture during the COVID-19 pandemic</article-title>. <source>Sci. Adv.</source> <volume>9</volume>:<fpage>eadh2132</fpage>. doi: <pub-id pub-id-type="doi">10.1126/sciadv.adh2132</pub-id>, <pub-id pub-id-type="pmid">37713497</pub-id></mixed-citation></ref>
<ref id="ref30"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bryanov</surname><given-names>K.</given-names></name> <name><surname>Vziatysheva</surname><given-names>V.</given-names></name></person-group> (<year>2021</year>). <article-title>Determinants of individuals&#x2019; belief in fake news: a scoping review determinants of belief in fake news</article-title>. <source>PLoS One</source> <volume>16</volume>:<fpage>e0253717</fpage>. doi: <pub-id pub-id-type="doi">10.1371/journal.pone.0253717</pub-id>, <pub-id pub-id-type="pmid">34166478</pub-id></mixed-citation></ref>
<ref id="ref31"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Butler</surname><given-names>J.</given-names></name></person-group> (<year>2012</year>). &#x201C;<article-title>Grappling with change: web 2.0 and teacher educators</article-title>&#x201D; in <source>Developing technology-rich teacher education programs. Washington, DC; Hershey, Pennsylvania; London: Key issues, Vol. 1</source>, <fpage>135</fpage>&#x2013;<lpage>150</lpage>.</mixed-citation></ref>
<ref id="ref32"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Chalmers</surname><given-names>A. W.</given-names></name> <name><surname>Shotton</surname><given-names>P. A.</given-names></name></person-group> (<year>2016</year>). <article-title>Changing the face of advocacy? Explaining interest organizations&#x2019; use of social media strategies</article-title>. <source>Polit. Commun.</source> <volume>33</volume>, <fpage>374</fpage>&#x2013;<lpage>391</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10584609.2015.1043477</pub-id></mixed-citation></ref>
<ref id="ref33"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Chen</surname><given-names>D.-T.</given-names></name> <name><surname>Wu</surname><given-names>J.</given-names></name> <name><surname>Wang</surname><given-names>Y.-M.</given-names></name></person-group> (<year>2011</year>). <article-title>Unpacking new media literacy</article-title>. <source>Syst. Cybern. Inform.</source> <volume>9</volume>, <fpage>84</fpage>&#x2013;<lpage>88</lpage>.</mixed-citation></ref>
<ref id="ref9009"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cipolla</surname><given-names>C.</given-names></name></person-group> (<year>2018</year>). <article-title>Designing for vulnerability: interpersonal relations and design. She Ji:</article-title> <source>J Design Eco. Inn</source> <volume>4</volume>, <fpage>111</fpage>&#x2013;<lpage>122</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.sheji.2018.03.001</pub-id></mixed-citation></ref>
<ref id="ref9001"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Clark</surname><given-names>C.</given-names></name></person-group> (<year>2018</year>). <article-title>Designing for vulnerability: interpersonal relations and design. She Ji</article-title>. <source>J Design Eco. Inn</source>, <volume>4</volume>, <fpage>111</fpage>&#x2013;<lpage>122</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.sheji.2018.03.001</pub-id></mixed-citation></ref>
<ref id="ref34"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Clark</surname><given-names>W.</given-names></name> <name><surname>Couldry</surname><given-names>N.</given-names></name> <name><surname>MacDonald</surname><given-names>R.</given-names></name> <name><surname>Stephansen</surname><given-names>H. C.</given-names></name></person-group> (<year>2015</year>). <article-title>Digital platforms and narrative exchange: hidden constraints, emerging agency</article-title>. <source>New Media Soc.</source> <volume>17</volume>, <fpage>919</fpage>&#x2013;<lpage>938</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1461444813518579</pub-id></mixed-citation></ref>
<ref id="ref35"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Cornelio Martinez</surname><given-names>P. I.</given-names></name> <name><surname>De Pirro</surname><given-names>S.</given-names></name> <name><surname>Vi</surname><given-names>C. T.</given-names></name> <name><surname>Subramanian</surname><given-names>S.</given-names></name></person-group> (<year>2017</year>). <article-title>Agency in mid-air interfaces</article-title>. <conf-name>Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>2426</fpage>&#x2013;<lpage>2439</lpage></mixed-citation></ref>
<ref id="ref36"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Croes</surname><given-names>E.</given-names></name> <name><surname>Bartels</surname><given-names>J.</given-names></name></person-group> (<year>2021</year>). <article-title>Young adults&#x2019; motivations for following social influencers and their relationship to identification and buying behavior</article-title>. <source>Comput. Human Behav.</source> <volume>124</volume>:<fpage>106910</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2021.106910</pub-id></mixed-citation></ref>
<ref id="ref37"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>De Vicente Dom&#x00ED;nguez</surname><given-names>A. M.</given-names></name> <name><surname>Beriain Ba&#x00F1;ares</surname><given-names>A.</given-names></name> <name><surname>Sierra S&#x00E1;nchez</surname><given-names>J.</given-names></name></person-group> (<year>2021</year>). <article-title>Young Spanish adults and disinformation: do they identify and spread fake news and are they literate in it?</article-title> <source>Publica</source> <volume>9</volume>:<fpage>2</fpage>. doi: <pub-id pub-id-type="doi">10.3390/publications9010002</pub-id></mixed-citation></ref>
<ref id="ref38"><mixed-citation publication-type="other"><collab id="coll2">Department for Education</collab> (<year>2023</year>) <source>State of the nation 2022: Children and young people&#x2019;s wellbeing (Washington, DC; Hershey, Pennsylvania; London: Government Social Research)</source></mixed-citation></ref>
<ref id="ref39"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Diaz Ruiz</surname><given-names>C.</given-names></name> <name><surname>Nilsson</surname><given-names>T.</given-names></name></person-group> (<year>2023</year>). <article-title>Disinformation and echo chambers: how disinformation circulates on social media through identity-driven controversies</article-title>. <source>J. Public Policy Mark.</source> <volume>42</volume>, <fpage>18</fpage>&#x2013;<lpage>35</lpage>. doi: <pub-id pub-id-type="doi">10.1177/07439156221103852</pub-id></mixed-citation></ref>
<ref id="ref40"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Diepeveen</surname><given-names>S.</given-names></name> <name><surname>Pinet</surname><given-names>M.</given-names></name></person-group> (<year>2022</year>). <article-title>User perspectives on digital literacy as a response to misinformation</article-title>. <source>Dev. Policy Rev.</source> <volume>40</volume>:<fpage>e12671</fpage>. doi: <pub-id pub-id-type="doi">10.1111/dpr.12671</pub-id></mixed-citation></ref>
<ref id="ref41"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Dimock</surname><given-names>M.</given-names></name></person-group> (<year>2019</year>). <source>Where millennials end and generation Z begins</source>. <publisher-name>Washington, DC: Pew Research Center</publisher-name>.</mixed-citation></ref>
<ref id="ref42"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Du</surname><given-names>Y. R.</given-names></name></person-group> (<year>2023</year>). <article-title>Personalisation, echo chambers, news literacy, and algorithmic literacy: a qualitative study of AI-powered news app users</article-title>. <source>J. Broadcast. Electron. Media</source> <volume>67</volume>, <fpage>246</fpage>&#x2013;<lpage>273</lpage>. doi: <pub-id pub-id-type="doi">10.1080/08838151.2023.2182787</pub-id></mixed-citation></ref>
<ref id="ref43"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Duan</surname><given-names>T.</given-names></name></person-group> (<year>2023</year>). <article-title>Preparing youth with media literacy for future digital civic engagement</article-title>. <conf-name>Proceedings of the 7th International Conference on Education and Multimedia Technology</conf-name>, <fpage>315</fpage>&#x2013;<lpage>320</lpage></mixed-citation></ref>
<ref id="ref44"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Durrant</surname><given-names>A. C.</given-names></name> <name><surname>Kirk</surname><given-names>D. S.</given-names></name> <name><surname>Moncur</surname><given-names>W.</given-names></name> <name><surname>Orzech</surname><given-names>K. M.</given-names></name> <name><surname>Taylor</surname><given-names>R.</given-names></name> <name><surname>Trujillo Pisanty</surname><given-names>D.</given-names></name></person-group> (<year>2018</year>). <article-title>Rich pictures for stakeholder dialogue: a polyphonic picture book</article-title>. <source>Des. Stud.</source> <volume>56</volume>, <fpage>122</fpage>&#x2013;<lpage>148</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.destud.2018.01.001</pub-id></mixed-citation></ref>
<ref id="ref45"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ecker</surname><given-names>U. K. H.</given-names></name> <name><surname>Lewandowsky</surname><given-names>S.</given-names></name> <name><surname>Cook</surname><given-names>J.</given-names></name> <name><surname>Schmid</surname><given-names>P.</given-names></name> <name><surname>Fazio</surname><given-names>L. K.</given-names></name> <name><surname>Brashier</surname><given-names>N.</given-names></name> <etal/></person-group>. (<year>2022</year>). <article-title>The psychological drivers of misinformation belief and its resistance to correction</article-title>. <source>Nat. Rev. Psychol.</source> <volume>1</volume>, <fpage>13</fpage>&#x2013;<lpage>29</lpage>. doi: <pub-id pub-id-type="doi">10.1038/s44159-021-00006-y</pub-id></mixed-citation></ref>
<ref id="ref46"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Elgot</surname><given-names>J.</given-names></name> <name><surname>Courea</surname><given-names>E.</given-names></name></person-group> (<year>2024</year>). <article-title>Online safety act not fit for purpose after far-right riots, says Sadiq khan</article-title>. <source>The Guardian</source>. Available online at: <ext-link xlink:href="https://www.theguardian.com/media/article/2024/aug/08/online-safety-act-not-fit-for-purpose-far-right-riots-sadiq-khan" ext-link-type="uri">https://www.theguardian.com/media/article/2024/aug/08/online-safety-act-not-fit-for-purpose-far-right-riots-sadiq-khan</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref47"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Elsden</surname><given-names>C.</given-names></name> <name><surname>Chatting</surname><given-names>D.</given-names></name> <name><surname>Durrant</surname><given-names>A. C.</given-names></name> <name><surname>Garbett</surname><given-names>A.</given-names></name> <name><surname>Nissen</surname><given-names>B.</given-names></name> <name><surname>Vines</surname><given-names>J.</given-names></name> <etal/></person-group>. (<year>2017</year>). <article-title>On speculative enactments</article-title>. <conf-name>Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>5386</fpage>&#x2013;<lpage>5399</lpage></mixed-citation></ref>
<ref id="ref48"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Enoch</surname><given-names>F.</given-names></name> <name><surname>Johansson</surname><given-names>P.</given-names></name> <name><surname>Bright</surname><given-names>J.</given-names></name> <name><surname>Margetts</surname><given-names>H. Z.</given-names></name></person-group> (<year>2023</year>). Tracking experiences of online harms and attitudes towards online safety interventions: findings from a large-scale, nationally representative survey of the British public. The Alan Turing Institute. Available online at: <ext-link xlink:href="https://www.ssrn.com/abstract=4416355" ext-link-type="uri">https://www.ssrn.com/abstract=4416355</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref49"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Eysenbach</surname><given-names>G.</given-names></name></person-group> (<year>2020</year>). <article-title>How to fight an Infodemic: the four pillars of Infodemic management</article-title>. <source>J. Med. Internet Res.</source> <volume>22</volume>:<fpage>e21820</fpage>. doi: <pub-id pub-id-type="doi">10.2196/21820</pub-id>, <pub-id pub-id-type="pmid">32589589</pub-id></mixed-citation></ref>
<ref id="ref50"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Fathallah</surname><given-names>S.</given-names></name></person-group> (<year>2021</year>) The case for participatory methods in design research [medium]. Available online at: <ext-link xlink:href="https://medium.com/pollinator/the-case-for-participatory-methods-in-design-research-9ca23ac55cd8" ext-link-type="uri">https://medium.com/pollinator/the-case-for-participatory-methods-in-design-research-9ca23ac55cd8</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref51"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Foley</surname><given-names>S.</given-names></name> <name><surname>Welsh</surname><given-names>D.</given-names></name> <name><surname>Pantidi</surname><given-names>N.</given-names></name> <name><surname>Morrissey</surname><given-names>K.</given-names></name> <name><surname>Nappey</surname><given-names>T.</given-names></name> <name><surname>McCarthy</surname><given-names>J.</given-names></name></person-group> (<year>2019</year>). <article-title>Printer pals: experience-centered design to support agency for people with dementia</article-title>. <conf-name>Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>13</lpage></mixed-citation></ref>
<ref id="ref52"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ford</surname><given-names>C.</given-names></name> <name><surname>MacKay</surname><given-names>M.</given-names></name> <name><surname>McWhirter</surname><given-names>J.</given-names></name> <name><surname>Papadopoulos</surname><given-names>A.</given-names></name></person-group> (<year>2025</year>). <article-title>Communicating about COVID-19 vaccines: a qualitative study on preferences, attitudes, and influences on Canadian post-secondary student decisions to get vaccinated</article-title>. <source>Emerg. Adulthood</source> <volume>13</volume>, <fpage>175</fpage>&#x2013;<lpage>184</lpage>. doi: <pub-id pub-id-type="doi">10.1177/21676968241292110</pub-id></mixed-citation></ref>
<ref id="ref53"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ford</surname><given-names>C.</given-names></name> <name><surname>MacKay</surname><given-names>M.</given-names></name> <name><surname>Thaivalappil</surname><given-names>A.</given-names></name> <name><surname>McWhirter</surname><given-names>J.</given-names></name> <name><surname>Papadopoulos</surname><given-names>A.</given-names></name></person-group> (<year>2024</year>). <article-title>COVID-19 vaccine communications on Instagram and vaccine uptake in young adults: a content assessment and public engagement analysis</article-title>. <source>Emerg. Adulthood</source> <volume>12</volume>, <fpage>224</fpage>&#x2013;<lpage>235</lpage>. doi: <pub-id pub-id-type="doi">10.1177/21676968231222439</pub-id></mixed-citation></ref>
<ref id="ref54"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Freelon</surname><given-names>D.</given-names></name> <name><surname>Wells</surname><given-names>C.</given-names></name></person-group> (<year>2020</year>). <article-title>Disinformation as political communication</article-title>. <source>Polit. Commun.</source> <volume>37</volume>, <fpage>145</fpage>&#x2013;<lpage>156</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10584609.2020.1723755</pub-id></mixed-citation></ref>
<ref id="ref55"><mixed-citation publication-type="other"><collab id="coll3">Full Fact</collab> (<year>2024</year>) The online safety act and misinformation: what you need to know full fact. Available online at: <ext-link xlink:href="https://fullfact.org/policy/online-safety-act/#:~:text=The%20Online%20Safety%20Act%202023,UK%20regulator%20for%20online%20safety" ext-link-type="uri">https://fullfact.org/policy/online-safety-act/#:~:text=The%20Online%20Safety%20Act%202023,UK%20regulator%20for%20online%20safety</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref56"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Gamage</surname><given-names>D.</given-names></name> <name><surname>Stomber</surname><given-names>J.</given-names></name> <name><surname>Jahanbakhsh</surname><given-names>F.</given-names></name> <name><surname>Skeet</surname><given-names>B.</given-names></name> <name><surname>Shahi</surname><given-names>G. K.</given-names></name></person-group> (<year>2022</year>). <article-title>Designing Credibility tools to combat mis/disinformation: a human-centered approach</article-title>. <conf-name>CHI Conference on Human Factors in Computing Systems Extended Abstracts</conf-name>, <fpage>1</fpage>&#x2013;<lpage>4</lpage></mixed-citation></ref>
<ref id="ref57"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Garg</surname><given-names>R.</given-names></name></person-group> (<year>2022</year>). <article-title>Supporting the design of smart speakers to foster a sense of ownership in asian indian families</article-title>. <conf-name>CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>15</lpage></mixed-citation></ref>
<ref id="ref58"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Golembewski</surname><given-names>M.</given-names></name> <name><surname>Selby</surname><given-names>M.</given-names></name></person-group> (<year>2010</year>). <article-title>Ideation decks: A card-based design ideation tool</article-title>. <conf-name>Proceedings of the 8th ACM Conference on Designing Interactive Systems</conf-name>, <fpage>89</fpage>&#x2013;<lpage>92</lpage>.</mixed-citation></ref>
<ref id="ref59"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gonzalez Montero</surname><given-names>S. A.</given-names></name> <name><surname>Sarria-Palacio</surname><given-names>A. M.</given-names></name> <name><surname>L&#x00F3;pez G&#x00F3;mez</surname><given-names>C.</given-names></name> <name><surname>Sierra Montero</surname><given-names>J. M.</given-names></name></person-group> (<year>2024</year>). <article-title>Exploring collective agency: a methodological approach to becoming differently</article-title>. <source>J. Cult. Res.</source> <volume>28</volume>, <fpage>393</fpage>&#x2013;<lpage>414</lpage>. doi: <pub-id pub-id-type="doi">10.1080/14797585.2024.2386947</pub-id></mixed-citation></ref>
<ref id="ref60"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Greenberg</surname><given-names>S.</given-names></name> <name><surname>Carpendale</surname><given-names>S.</given-names></name> <name><surname>Marquardt</surname><given-names>N.</given-names></name> <name><surname>Buxton</surname><given-names>B.</given-names></name></person-group> (<year>2012</year>). <article-title>The narrative storyboard: telling a story about use and context over time</article-title>. <source>Interactions</source> <volume>19</volume>, <fpage>64</fpage>&#x2013;<lpage>69</lpage>. doi: <pub-id pub-id-type="doi">10.1145/2065327.2065340</pub-id></mixed-citation></ref>
<ref id="ref61"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>G&#x00FC;ldenpfennig</surname><given-names>F.</given-names></name> <name><surname>Mayer</surname><given-names>P.</given-names></name> <name><surname>Panek</surname><given-names>P.</given-names></name> <name><surname>Fitzpatrick</surname><given-names>G.</given-names></name></person-group> (<year>2019</year>). <article-title>An autonomy-perspective on the design of assistive technology experiences of people with multiple sclerosis</article-title>. <conf-name>Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>14</lpage></mixed-citation></ref>
<ref id="ref62"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gurgun</surname><given-names>S.</given-names></name> <name><surname>Cemiloglu</surname><given-names>D.</given-names></name> <name><surname>Close</surname><given-names>E. A.</given-names></name> <name><surname>Phalp</surname><given-names>K.</given-names></name> <name><surname>Nakov</surname><given-names>P.</given-names></name> <name><surname>Ali</surname><given-names>R.</given-names></name></person-group> (<year>2024</year>). <article-title>Why do we not stand up to misinformation? Factors influencing the likelihood of challenging misinformation on social media and the role of demographics</article-title>. <source>Technol. Soc.</source> <volume>76</volume>:<fpage>102444</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.techsoc.2023.102444</pub-id></mixed-citation></ref>
<ref id="ref63"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Haider</surname><given-names>J.</given-names></name> <name><surname>S&#x00F6;derstr&#x00F6;m</surname><given-names>K. R.</given-names></name> <name><surname>Ekstr&#x00F6;m</surname><given-names>B.</given-names></name> <name><surname>R&#x00F6;dl</surname><given-names>M.</given-names></name></person-group> (<year>2024</year>). <article-title>GPT-fabricated scientific papers on Google scholar: key features, spread, and implications for preempting evidence manipulation</article-title>. <source>Harv. Kennedy Sch. Misinform. Rev.</source> doi: <pub-id pub-id-type="doi">10.37016/mr-2020-156</pub-id></mixed-citation></ref>
<ref id="ref64"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hainz</surname><given-names>T.</given-names></name> <name><surname>Bossert</surname><given-names>S.</given-names></name> <name><surname>Strech</surname><given-names>D.</given-names></name></person-group> (<year>2016</year>). <article-title>Collective agency and the concept of &#x2018;public&#x2019; in public involvement: a practice-oriented analysis</article-title>. <source>BMC Med. Ethics</source> <volume>17</volume>:<fpage>1</fpage>. doi: <pub-id pub-id-type="doi">10.1186/s12910-015-0083-z</pub-id>, <pub-id pub-id-type="pmid">26732279</pub-id></mixed-citation></ref>
<ref id="ref65"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Han</surname><given-names>Q.</given-names></name> <name><surname>Curtis</surname><given-names>D. R.</given-names></name></person-group> (<year>2021</year>). <article-title>Suspicious minds: cinematic depiction of distrust during epidemic disease outbreaks</article-title>. <source>Med. Humanit.</source> <volume>47</volume>, <fpage>248</fpage>&#x2013;<lpage>256</lpage>. doi: <pub-id pub-id-type="doi">10.1136/medhum-2020-011871</pub-id>, <pub-id pub-id-type="pmid">32467302</pub-id></mixed-citation></ref>
<ref id="ref66"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Haque</surname><given-names>M. M.</given-names></name> <name><surname>Yousuf</surname><given-names>M.</given-names></name> <name><surname>Alam</surname><given-names>A. S.</given-names></name> <name><surname>Saha</surname><given-names>P.</given-names></name> <name><surname>Ahmed</surname><given-names>S. I.</given-names></name> <name><surname>Hassan</surname><given-names>N.</given-names></name></person-group> (<year>2020</year>). <article-title>Combating misinformation in Bangladesh: roles and responsibilities as perceived by journalists, fact-checkers, and users</article-title>. <source>Proc. ACM Hum.-Comput. Interact.</source> <volume>4</volume>, <fpage>1</fpage>&#x2013;<lpage>32</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3415201</pub-id></mixed-citation></ref>
<ref id="ref67"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Harrington</surname><given-names>C.</given-names></name> <name><surname>Erete</surname><given-names>S.</given-names></name> <name><surname>Piper</surname><given-names>A. M.</given-names></name></person-group> (<year>2019</year>). <article-title>Deconstructing community-based collaborative design: Towards more equitable participatory design engagements</article-title>. <source>Proc. ACM Hum.-Comput. Interact.</source> <volume>3</volume>, <fpage>1</fpage>&#x2013;<lpage>25</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3359318</pub-id></mixed-citation></ref>
<ref id="ref68"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Hassoun</surname><given-names>A.</given-names></name> <name><surname>Beacock</surname><given-names>I.</given-names></name> <name><surname>Consolvo</surname><given-names>S.</given-names></name> <name><surname>Goldberg</surname><given-names>B.</given-names></name> <name><surname>Kelley</surname><given-names>P. G.</given-names></name> <name><surname>Russell</surname><given-names>D. M.</given-names></name></person-group> (<year>2023</year>). <article-title>Practicing information sensibility: How Gen Z engages with online information</article-title>. <conf-name>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>17</lpage></mixed-citation></ref>
<ref id="ref69"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hope</surname><given-names>S.</given-names></name> <name><surname>Mulhall</surname><given-names>H.</given-names></name></person-group> (<year>2024</year>). <article-title>Cards on the table: critical reflections on a participatory research method</article-title>. <source>Conjunctions</source> <volume>11</volume>, <fpage>1</fpage>&#x2013;<lpage>14</lpage>. doi: <pub-id pub-id-type="doi">10.2478/tjcp-2023-0008</pub-id></mixed-citation></ref>
<ref id="ref70"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Hopwood</surname><given-names>K.</given-names></name></person-group> (<year>2023</year>) How might vulnerable children be impacted by misinformation and disinformation online and what can parents fo to limite these impacts? [internet matters]</mixed-citation></ref>
<ref id="ref71"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Humphrey</surname><given-names>B.</given-names></name></person-group> (<year>2023</year>). <article-title>Libertas Veritas: freedom and truth</article-title>. <source>The School Librarian; Wanborough</source> <volume>71</volume>:<fpage>26</fpage>.</mixed-citation></ref>
<ref id="ref72"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Humprecht</surname><given-names>E.</given-names></name> <name><surname>Esser</surname><given-names>F.</given-names></name> <name><surname>Van Aelst</surname><given-names>P.</given-names></name></person-group> (<year>2020</year>). <article-title>Resilience to online disinformation: a framework for cross-national comparative research</article-title>. <source>Int. J. Press/Politics</source> <volume>25</volume>, <fpage>493</fpage>&#x2013;<lpage>516</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1940161219900126</pub-id></mixed-citation></ref>
<ref id="ref73"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Hutchinson</surname><given-names>J. W.</given-names></name> <name><surname>Hutchinson</surname><given-names>J.</given-names></name> <name><surname>Vlachokyriakos</surname><given-names>V.</given-names></name> <name><surname>Kirk</surname><given-names>D.</given-names></name> <name><surname>Johnson</surname><given-names>I. G.</given-names></name> <name><surname>Evans</surname><given-names>M.</given-names></name> <etal/></person-group>. (<year>2025</year>). <article-title>Alt(ernate) CHI: Using alternate history artifacts in research</article-title>. <conf-name>Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>10</lpage></mixed-citation></ref>
<ref id="ref74"><mixed-citation publication-type="other"><collab id="coll4">Insider Intelligence</collab>. (<year>2023</year>) Generation Z: Latest gen Z news, research, facts 2023. Available online at: <ext-link xlink:href="https://www.insiderintelligence.com/insights/generation-z-facts/" ext-link-type="uri">https://www.insiderintelligence.com/insights/generation-z-facts/</ext-link> (Accessed July 30, 2023).</mixed-citation></ref>
<ref id="ref75"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jabbar</surname><given-names>M. K.</given-names></name> <name><surname>Al-Gburi</surname><given-names>M. F. A. R.</given-names></name> <name><surname>Alwan</surname><given-names>H. S.</given-names></name></person-group> (<year>2024</year>). <article-title>The development of fast and slow thinking of adolescents and adults</article-title>. <source>Social Space</source> <volume>24</volume>:<fpage>66</fpage>&#x2013;<lpage>85</lpage>.</mixed-citation></ref>
<ref id="ref76"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jaffe</surname><given-names>A. E.</given-names></name> <name><surname>Graupensperger</surname><given-names>S.</given-names></name> <name><surname>Blayney</surname><given-names>J. A.</given-names></name> <name><surname>Duckworth</surname><given-names>J. C.</given-names></name> <name><surname>Stappenbeck</surname><given-names>C. A.</given-names></name></person-group> (<year>2022</year>). <article-title>The role of perceived social norms in college student vaccine hesitancy: implications for COVID-19 prevention strategies</article-title>. <source>Vaccine</source> <volume>40</volume>, <fpage>1888</fpage>&#x2013;<lpage>1895</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.vaccine.2022.01.038</pub-id>, <pub-id pub-id-type="pmid">35190209</pub-id></mixed-citation></ref>
<ref id="ref77"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Jicol</surname><given-names>C.</given-names></name> <name><surname>Wan</surname><given-names>C. H.</given-names></name> <name><surname>Doling</surname><given-names>B.</given-names></name> <name><surname>Illingworth</surname><given-names>C. H.</given-names></name> <name><surname>Yoon</surname><given-names>J.</given-names></name> <name><surname>Headey</surname><given-names>C.</given-names></name> <etal/></person-group>. (<year>2021</year>). <article-title>Effects of emotion and agency on presence in virtual reality</article-title>. <conf-name>Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>13</lpage></mixed-citation></ref>
<ref id="ref78"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jimenez</surname><given-names>N.</given-names></name> <name><surname>Rodriguez-Lara</surname><given-names>I.</given-names></name> <name><surname>Tyran</surname><given-names>J.-R.</given-names></name> <name><surname>Wengstr&#x00F6;m</surname><given-names>E.</given-names></name></person-group> (<year>2018</year>). <article-title>Thinking fast, thinking badly</article-title>. <source>Econ. Lett.</source> <volume>162</volume>, <fpage>41</fpage>&#x2013;<lpage>44</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.econlet.2017.10.018</pub-id></mixed-citation></ref>
<ref id="ref79"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Joelsson</surname><given-names>T.</given-names></name> <name><surname>Bruno</surname><given-names>L.</given-names></name></person-group> (<year>2022</year>). <article-title>Proximal or peripheral: temporality and spatiality in young people&#x2019;s discourses on gender violence in Sweden</article-title>. <source>Gender Educ.</source> <volume>34</volume>, <fpage>167</fpage>&#x2013;<lpage>182</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09540253.2020.1860199</pub-id></mixed-citation></ref>
<ref id="ref80"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Joris</surname><given-names>G.</given-names></name> <name><surname>Grove</surname><given-names>F. D.</given-names></name> <name><surname>Van Damme</surname><given-names>K.</given-names></name> <name><surname>De Marez</surname><given-names>L.</given-names></name></person-group> (<year>2021</year>). <article-title>Appreciating news algorithms: examining audiences&#x2019; perceptions to different news selection mechanisms</article-title>. <source>Digit. Journal.</source> <volume>9</volume>, <fpage>589</fpage>&#x2013;<lpage>618</lpage>. doi: <pub-id pub-id-type="doi">10.1080/21670811.2021.1912626</pub-id></mixed-citation></ref>
<ref id="ref81"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Juvalta</surname><given-names>S.</given-names></name> <name><surname>Speranza</surname><given-names>C.</given-names></name> <name><surname>Robin</surname><given-names>D.</given-names></name> <name><surname>El Maohub</surname><given-names>Y.</given-names></name> <name><surname>Krasselt</surname><given-names>J.</given-names></name> <name><surname>Dreesen</surname><given-names>P.</given-names></name> <etal/></person-group>. (<year>2023</year>). <article-title>Young people&#x2019;s media use and adherence to preventive measures in the &#x201C;infodemic&#x201D;: is it masked by political ideology?</article-title> <source>Soc. Sci. Med.</source> <volume>317</volume>:<fpage>115596</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.socscimed.2022.115596</pub-id>, <pub-id pub-id-type="pmid">36535229</pub-id></mixed-citation></ref>
<ref id="ref82"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Kahneman</surname><given-names>D.</given-names></name></person-group> (<year>2012</year>). <source>Thinking, fast and slow</source>. <publisher-name>New York, NY: Peguin</publisher-name>.</mixed-citation></ref>
<ref id="ref83"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Kalaja</surname><given-names>P.</given-names></name> <name><surname>Rouhotie-Lyhty</surname><given-names>M.</given-names></name></person-group> (<year>2021</year>). &#x201C;<article-title>Autonomy and agency</article-title>&#x201D; in <source>The Routledge handbook of the psychology of language learning and teaching</source>. <edition>1st</edition> ed, eds. Gonz&#x00E1;lez-Lloret, M., Lasagabaster, D., Verhoeven, L., and Etxeberria, A. (<publisher-name>New York, NY: Routledge</publisher-name>), <fpage>245</fpage>&#x2013;<lpage>259</lpage>.</mixed-citation></ref>
<ref id="ref84"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kalu&#x017E;a</surname><given-names>J.</given-names></name></person-group> (<year>2022</year>). <article-title>Habitual generation of filter bubbles: why is algorithmic personalisation problematic for the democratic public sphere?</article-title> <source>Javnost Public</source> <volume>29</volume>, <fpage>267</fpage>&#x2013;<lpage>283</lpage>. doi: <pub-id pub-id-type="doi">10.1080/13183222.2021.2003052</pub-id></mixed-citation></ref>
<ref id="ref85"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Karlova</surname><given-names>N. A.</given-names></name></person-group> (<year>2018</year>) Misinformation and disinformation in online games [University of Washington]. Available online at: <ext-link xlink:href="https://digital.lib.washington.edu/researchworks/bitstream/handle/1773/42416/Karlova_washington_0250E_18480.pdf?sequence=1&#x0026;isAllowed=y" ext-link-type="uri">https://digital.lib.washington.edu/researchworks/bitstream/handle/1773/42416/Karlova_washington_0250E_18480.pdf?sequence=1&#x0026;isAllowed=y</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref86"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Kasahara</surname><given-names>S.</given-names></name> <name><surname>Nishida</surname><given-names>J.</given-names></name> <name><surname>Lopes</surname><given-names>P.</given-names></name></person-group> (<year>2019</year>). <article-title>Preemptive action: Accelerating human reaction using electrical muscle stimulation without compromising agency</article-title>. <conf-name>Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>15</lpage></mixed-citation></ref>
<ref id="ref87"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kavada</surname><given-names>A.</given-names></name></person-group> (<year>2016</year>). <article-title>Social movements and political agency in the digital age: a communication approach</article-title>. <source>Media Commun.</source> <volume>4</volume>, <fpage>8</fpage>&#x2013;<lpage>12</lpage>. doi: <pub-id pub-id-type="doi">10.17645/mac.v4i4.691</pub-id></mixed-citation></ref>
<ref id="ref88"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Khrystenko</surname><given-names>O.</given-names></name></person-group> (<year>2022</year>). <article-title>Implicit displays of emotional vulnerability: a cross-cultural analysis of &#x201C;unacceptable&#x201D; embarrassment-related emotions in the communication within male groups</article-title>. <source>Open Linguist.</source> <volume>8</volume>, <fpage>209</fpage>&#x2013;<lpage>231</lpage>. doi: <pub-id pub-id-type="doi">10.1515/opli-2022-0189</pub-id></mixed-citation></ref>
<ref id="ref89"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kim</surname><given-names>J. W.</given-names></name></person-group> (<year>2018</year>). <article-title>Rumor has it: the effects of virality metrics on rumor believability and transmission on twitter</article-title>. <source>New Media Soc.</source> <volume>20</volume>, <fpage>4807</fpage>&#x2013;<lpage>4825</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1461444818784945</pub-id></mixed-citation></ref>
<ref id="ref90"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kim</surname><given-names>A.</given-names></name> <name><surname>Moravec</surname><given-names>P. L.</given-names></name> <name><surname>Dennis</surname><given-names>A. R.</given-names></name></person-group> (<year>2019</year>). <article-title>Combating fake news on social media with source ratings: the effects of user and expert reputation ratings</article-title>. <source>J. Manage. Inf. Syst.</source> <volume>36</volume>, <fpage>931</fpage>&#x2013;<lpage>968</lpage>. doi: <pub-id pub-id-type="doi">10.1080/07421222.2019.1628921</pub-id></mixed-citation></ref>
<ref id="ref91"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Koltay</surname><given-names>T.</given-names></name></person-group> (<year>2011</year>). <article-title>The media and the literacies: media literacy, information literacy, digital literacy</article-title>. <source>Media Cult. Soc.</source> <volume>33</volume>, <fpage>211</fpage>&#x2013;<lpage>221</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0163443710393382</pub-id></mixed-citation></ref>
<ref id="ref92"><mixed-citation publication-type="book"><collab id="coll5">KPI</collab> (<year>2024</year>). <source>Beware of the automation paradox: The vital role of humans in automation</source>. <publisher-name>Melbourne, VIC, Australia: KPI</publisher-name>.</mixed-citation></ref>
<ref id="ref93"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lawson</surname><given-names>A. P.</given-names></name> <name><surname>Mayer</surname><given-names>R. E.</given-names></name></person-group> (<year>2022</year>). <article-title>The power of voice to convey emotion in multimedia instructional messages</article-title>. <source>Int. J. Artif. Intell. Educ.</source> <volume>32</volume>, <fpage>971</fpage>&#x2013;<lpage>990</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s40593-021-00282-y</pub-id></mixed-citation></ref>
<ref id="ref94"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Lazar</surname><given-names>A.</given-names></name> <name><surname>Edasis</surname><given-names>C.</given-names></name> <name><surname>Piper</surname><given-names>A. M.</given-names></name></person-group> (<year>2017</year>). <article-title>Supporting people with dementia in digital social sharing</article-title>. <conf-name>Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>2149</fpage>&#x2013;<lpage>2162</lpage></mixed-citation></ref>
<ref id="ref95"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Lebon</surname><given-names>G.</given-names></name></person-group> (<year>2008</year>) The crowd: The study of the popular mind. Digireads.com</mixed-citation></ref>
<ref id="ref96"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lee</surname><given-names>H.</given-names></name> <name><surname>Oh</surname><given-names>H. J.</given-names></name></person-group> (<year>2017</year>). <article-title>Normative mechanism of rumor dissemination on twitter</article-title>. <source>Cyberpsychol. Behav. Soc. Netw.</source> <volume>20</volume>, <fpage>164</fpage>&#x2013;<lpage>171</lpage>. doi: <pub-id pub-id-type="doi">10.1089/cyber.2016.0447</pub-id>, <pub-id pub-id-type="pmid">28263685</pub-id></mixed-citation></ref>
<ref id="ref97"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Lepper</surname><given-names>J.</given-names></name></person-group> (<year>2024</year>). Digitally excluded children at greater risk of fake news, researchers warn. Children &#x0026; Young People Now. Available online at: <ext-link xlink:href="https://www.cypnow.co.uk/content/news/digitally-excluded-children-at-greater-risk-of-fake-news-researchers-warn/#:~:text=This%20violence%20was%20sparked%20by,death%20in%20Southport%20last%20month" ext-link-type="uri">https://www.cypnow.co.uk/content/news/digitally-excluded-children-at-greater-risk-of-fake-news-researchers-warn/#:~:text=This%20violence%20was%20sparked%20by,death%20in%20Southport%20last%20month</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref98"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Li</surname><given-names>J.</given-names></name> <name><surname>Chang</surname><given-names>X.</given-names></name></person-group> (<year>2023</year>). <article-title>Combating misinformation by sharing the truth: a study on the spread of fact-checks on social media</article-title>. <source>Inf. Syst. Front.</source> <volume>25</volume>, <fpage>1</fpage>&#x2013;<lpage>15</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10796-022-10296-z</pub-id>, <pub-id pub-id-type="pmid">35729965</pub-id></mixed-citation></ref>
<ref id="ref99"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Li</surname><given-names>C.</given-names></name> <name><surname>Kalyanaraman</surname><given-names>S.</given-names></name> <name><surname>Du</surname><given-names>Y. R.</given-names></name></person-group> (<year>2011</year>). <article-title>Moderating effects of collectivism on customized communication: a test with tailored and targeted messages</article-title>. <source>Asian J. Commun.</source> <volume>21</volume>, <fpage>575</fpage>&#x2013;<lpage>594</lpage>. doi: <pub-id pub-id-type="doi">10.1080/01292986.2011.609596</pub-id></mixed-citation></ref>
<ref id="ref100"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lin</surname><given-names>H.-C.</given-names></name> <name><surname>Bruning</surname><given-names>P. F.</given-names></name> <name><surname>Swarna</surname><given-names>H.</given-names></name></person-group> (<year>2018</year>). <article-title>Using online opinion leaders to promote the hedonic and utilitarian value of products and services</article-title>. <source>Bus. Horiz.</source> <volume>61</volume>, <fpage>431</fpage>&#x2013;<lpage>442</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.bushor.2018.01.010</pub-id></mixed-citation></ref>
<ref id="ref101"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lin</surname><given-names>T.-B.</given-names></name> <name><surname>Li</surname><given-names>J.-Y.</given-names></name> <name><surname>Deng</surname><given-names>F.</given-names></name> <name><surname>Lee</surname><given-names>L.</given-names></name></person-group> (<year>2013</year>). <article-title>Understanding new media literacy: an explorative theoretical framework</article-title>. <source>J. Educ. Technol. Soc.</source> <volume>16</volume>, <fpage>160</fpage>&#x2013;<lpage>170</lpage>.</mixed-citation></ref>
<ref id="ref102"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Linden</surname><given-names>C.-G.</given-names></name></person-group> (<year>2017</year>). <article-title>Decades of automation in the newsroom: why are there still so many jobs in journalism?</article-title> <source>Digit. Journal.</source> <volume>5</volume>, <fpage>123</fpage>&#x2013;<lpage>140</lpage>. doi: <pub-id pub-id-type="doi">10.1080/21670811.2016.1160791</pub-id></mixed-citation></ref>
<ref id="ref103"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>List</surname><given-names>A.</given-names></name> <name><surname>Grossnickle</surname><given-names>E. M.</given-names></name> <name><surname>Alexander</surname><given-names>P. A.</given-names></name></person-group> (<year>2015</year>). <article-title>Undergraduate students&#x2019; justifications for source selection in a digital academic context</article-title>. <source>J. Educ. Comput. Res.</source> <volume>54</volume>, <fpage>22</fpage>&#x2013;<lpage>61</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0735633115606659</pub-id></mixed-citation></ref>
<ref id="ref104"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>List</surname><given-names>C.</given-names></name> <name><surname>Pettit</surname><given-names>P.</given-names></name></person-group> (<year>2011</year>). <source>Group agency: The possibility, design, and status of corporate agents</source>. <publisher-name>Oxford UK; New York, NY, USA: Oxford University Press</publisher-name>.</mixed-citation></ref>
<ref id="ref105"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Liu</surname><given-names>X.</given-names></name> <name><surname>Qi</surname><given-names>L.</given-names></name> <name><surname>Wang</surname><given-names>L.</given-names></name> <name><surname>Metzger</surname><given-names>M. J.</given-names></name></person-group> (<year>2023</year>). <article-title>Checking the fact-checkers: the role of source type, perceived credibility, and individual differences in fact-checking effectiveness</article-title>. <source>Commun. Res.</source> <volume>52</volume>:<fpage>00936502231206419</fpage>. doi: <pub-id pub-id-type="doi">10.1177/00936502231206419</pub-id> (Accessed January 25, 2026).</mixed-citation></ref>
<ref id="ref106"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Livingstone</surname><given-names>S.</given-names></name></person-group> (<year>2004</year>). <article-title>Media literacy and the challenge of new information and communication technologies</article-title>. <source>Commun. Rev.</source> <volume>7</volume>, <fpage>3</fpage>&#x2013;<lpage>14</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10714420490280152</pub-id></mixed-citation></ref>
<ref id="ref107"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Livingstone</surname><given-names>S.</given-names></name> <name><surname>Van Couvering</surname><given-names>E.</given-names></name> <name><surname>Thumim</surname><given-names>N.</given-names></name></person-group> (<year>2019</year>). Adult media literacy. Centre for the Study of children. Available online at: <ext-link xlink:href="https://www.ofcom.org.uk/media-use-and-attitudes/media-habits-adults/adults" ext-link-type="uri">https://www.ofcom.org.uk/media-use-and-attitudes/media-habits-adults/adults</ext-link> (accessed 25, January 2026).</mixed-citation></ref>
<ref id="ref108"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Lukoff</surname><given-names>K.</given-names></name> <name><surname>Lyngs</surname><given-names>U.</given-names></name> <name><surname>Zade</surname><given-names>H.</given-names></name> <name><surname>Liao</surname><given-names>J. V.</given-names></name> <name><surname>Choi</surname><given-names>J.</given-names></name> <name><surname>Fan</surname><given-names>K.</given-names></name> <etal/></person-group>. (<year>2021</year>). <article-title>How the design of YouTube influences user sense of agency</article-title>. <conf-name>Proceedings of the 2021 CHI conference on human factors in computing systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>17</lpage></mixed-citation></ref>
<ref id="ref109"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Luo</surname><given-names>M.</given-names></name> <name><surname>Hancock</surname><given-names>J. T.</given-names></name> <name><surname>Markowitz</surname><given-names>D. M.</given-names></name></person-group> (<year>2022</year>). <article-title>Credibility perceptions and detection accuracy of fake news headlines on social media: effects of truth-Bias and endorsement cues</article-title>. <source>Commun. Res.</source> <volume>49</volume>, <fpage>171</fpage>&#x2013;<lpage>195</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0093650220921321</pub-id></mixed-citation></ref>
<ref id="ref110"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lyngs</surname><given-names>U.</given-names></name> <name><surname>Lukoff</surname><given-names>K.</given-names></name> <name><surname>Csuka</surname><given-names>L.</given-names></name> <name><surname>Slov&#x00E1;k</surname><given-names>P.</given-names></name> <name><surname>Van Kleek</surname><given-names>M.</given-names></name> <name><surname>Shadbolt</surname><given-names>N.</given-names></name></person-group> (<year>2022</year>). <article-title>The goldilocks level of support: using user reviews, ratings, and installation numbers to investigate digital self-control tools</article-title>. <source>Int. J. Hum.-Comput. Stud.</source> <volume>166</volume>:<fpage>102869</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.ijhcs.2022.102869</pub-id></mixed-citation></ref>
<ref id="ref111"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>MacLeod</surname><given-names>C.</given-names></name> <name><surname>Mathews</surname><given-names>A.</given-names></name> <name><surname>Tata</surname><given-names>P.</given-names></name></person-group> (<year>1986</year>). <article-title>Attentional bias in emotional disorders</article-title>. <source>J. Abnorm. Psychol.</source> <volume>95</volume>, <fpage>15</fpage>&#x2013;<lpage>20</lpage>. doi: <pub-id pub-id-type="doi">10.1037/0021-843X.95.1.15</pub-id>, <pub-id pub-id-type="pmid">3700842</pub-id></mixed-citation></ref>
<ref id="ref112"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Maertens</surname><given-names>R.</given-names></name> <name><surname>Roozenbeek</surname><given-names>J.</given-names></name> <name><surname>Basol</surname><given-names>M.</given-names></name> <name><surname>van der Linden</surname><given-names>S.</given-names></name></person-group> (<year>2021</year>). <article-title>Long-term effectiveness of inoculation against misinformation: three longitudinal experiments</article-title>. <source>J. Exp. Psychol. Appl.</source> <volume>27</volume>, <fpage>1</fpage>&#x2013;<lpage>16</lpage>. doi: <pub-id pub-id-type="doi">10.1037/xap0000315</pub-id>, <pub-id pub-id-type="pmid">33017160</pub-id></mixed-citation></ref>
<ref id="ref113"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Manca</surname><given-names>S.</given-names></name> <name><surname>Bocconi</surname><given-names>S.</given-names></name> <name><surname>Gleason</surname><given-names>B.</given-names></name></person-group> (<year>2021</year>). <article-title>&#x201C;Think globally, act locally&#x201D;: a glocal approach to the development of social media literacy</article-title>. <source>Comput. Educ.</source> <volume>160</volume>:<fpage>104025</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.compedu.2020.104025</pub-id></mixed-citation></ref>
<ref id="ref114"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Mathiesen</surname><given-names>K.</given-names></name></person-group> (<year>2006</year>). <article-title>We &#x2018;re all in this together: responsibility of collective agents and their members&#x2019;</article-title>. <source>Midwest Stud. Philos.</source> <volume>30</volume>, <fpage>240</fpage>&#x2013;<lpage>255</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1475-4975.2006.00137.x</pub-id></mixed-citation></ref>
<ref id="ref115"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>McClure Haughey</surname><given-names>M.</given-names></name> <name><surname>Muralikumar</surname><given-names>M. D.</given-names></name> <name><surname>Wood</surname><given-names>C. A.</given-names></name> <name><surname>Starbird</surname><given-names>K.</given-names></name></person-group> <year>2020</year>. <article-title>On the misinformation beat: Understanding the work of investigative journalists reporting on problematic information online</article-title>. <source>Proc. ACM Hum.-Comput. Interact.</source>, <volume>4</volume>, <fpage>1</fpage>&#x2013;<lpage>22</lpage></mixed-citation></ref>
<ref id="ref116"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Mentis</surname><given-names>H. M.</given-names></name> <name><surname>Madjaroff</surname><given-names>G.</given-names></name> <name><surname>Massey</surname><given-names>A. K.</given-names></name></person-group> (<year>2019</year>). <article-title>Upside and downside risk in online security for older adults with mild cognitive impairment</article-title>. <conf-name>Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>13</lpage></mixed-citation></ref>
<ref id="ref117"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Meril&#x00E4;inen</surname><given-names>M.</given-names></name> <name><surname>Ruotsalainen</surname><given-names>M.</given-names></name></person-group> (<year>2024</year>). <article-title>Online disinhibition, normative hostility, and banal toxicity: Young people&#x2019;s negative online gaming conduct</article-title>. <source>Soc. Media Soc.</source> <volume>10</volume>:<fpage>20563051241274669</fpage>. doi: <pub-id pub-id-type="doi">10.1177/20563051241274669</pub-id></mixed-citation></ref>
<ref id="ref118"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Milmo</surname><given-names>D.</given-names></name></person-group> (<year>2024</year>). <article-title>Social media platforms have work to do to comply with online safety act, says Ofcom</article-title>. <source>The Guardian</source>. Available online at: <ext-link xlink:href="https://www.theguardian.com/media/2024/dec/16/social-media-platforms-have-work-to-do-to-comply-with-online-safety-act-says-ofcom" ext-link-type="uri">https://www.theguardian.com/media/2024/dec/16/social-media-platforms-have-work-to-do-to-comply-with-online-safety-act-says-ofcom</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref119"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Mitchell</surname><given-names>K. J.</given-names></name> <name><surname>Banyard</surname><given-names>V.</given-names></name> <name><surname>Ybarra</surname><given-names>M. L.</given-names></name></person-group> (<year>2022</year>). <article-title>Are the bystanders okay? Exploring the impact of bystander behavior for self-directed violence</article-title>. <source>J. Adolesc. Health</source> <volume>70</volume>, <fpage>298</fpage>&#x2013;<lpage>304</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jadohealth.2021.08.003</pub-id>, <pub-id pub-id-type="pmid">34625376</pub-id></mixed-citation></ref>
<ref id="ref120"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Molla</surname><given-names>R.</given-names></name></person-group> (<year>2021</year>). <article-title>Telegram: extremists&#x2019; new favorite messaging and social media app</article-title>. <source>Vox.</source> Available online at: <ext-link xlink:href="https://www.vox.com/recode/22238755/telegram-messaging-social-media-extremists" ext-link-type="uri">https://www.vox.com/recode/22238755/telegram-messaging-social-media-extremists</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref121"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Moore</surname><given-names>R. C.</given-names></name> <name><surname>Hancock</surname><given-names>J. T.</given-names></name></person-group> (<year>2022</year>). <article-title>A digital media literacy intervention for older adults improves resilience to fake news</article-title>. <source>Sci. Rep.</source> <volume>12</volume>:<fpage>6008</fpage>. doi: <pub-id pub-id-type="doi">10.1038/s41598-022-08437-0</pub-id>, <pub-id pub-id-type="pmid">35397631</pub-id></mixed-citation></ref>
<ref id="ref122"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Moore</surname><given-names>J. W.</given-names></name> <name><surname>Obhi</surname><given-names>S. S.</given-names></name></person-group> (<year>2012</year>). <article-title>Intentional binding and the sense of agency: a review</article-title>. <source>Conscious. Cogn.</source> <volume>21</volume>, <fpage>546</fpage>&#x2013;<lpage>561</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.concog.2011.12.002</pub-id>, <pub-id pub-id-type="pmid">22240158</pub-id></mixed-citation></ref>
<ref id="ref123"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Morales</surname><given-names>E.</given-names></name></person-group> (<year>2024</year>). <article-title>Social media and the mediation of everyday violence: a study of Colombian young adults&#x2019; experiences</article-title>. <source>New Media Soc.</source> <volume>27</volume>, <fpage>4308</fpage>&#x2013;<lpage>4325</lpage>. doi: <pub-id pub-id-type="doi">10.1177/14614448241236756</pub-id></mixed-citation></ref>
<ref id="ref124"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Naeem</surname><given-names>M.</given-names></name> <name><surname>Ozuem</surname><given-names>W.</given-names></name> <name><surname>Howell</surname><given-names>K.</given-names></name> <name><surname>Ranfagni</surname><given-names>S.</given-names></name></person-group> (<year>2023</year>). <article-title>A step-by-step process of thematic analysis to develop a conceptual model in qualitative research</article-title>. <source>Int J Qual Methods</source> <volume>22</volume>:<fpage>16094069231205789</fpage>. doi: <pub-id pub-id-type="doi">10.1177/16094069231205789</pub-id></mixed-citation></ref>
<ref id="ref125"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Nassetta</surname><given-names>J.</given-names></name> <name><surname>Gross</surname><given-names>K.</given-names></name></person-group> (<year>2020</year>). <article-title>State media warning labels can counteract the effects of foreign disinformation</article-title>. <source>Harv. Kennedy Sch. Misinf. Rev.</source> doi: <pub-id pub-id-type="doi">10.37016/mr-2020-45</pub-id></mixed-citation></ref>
<ref id="ref126"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Nazari</surname><given-names>Z.</given-names></name> <name><surname>Oruji</surname><given-names>M.</given-names></name> <name><surname>Jamali</surname><given-names>H. R.</given-names></name></person-group> (<year>2022</year>). <article-title>News consumption and behavior of young adults and the issue of fake news</article-title>. <source>J. Inf. Sci. Theory Pract.</source> <volume>10</volume>, <fpage>1</fpage>&#x2013;<lpage>16</lpage>. doi: <pub-id pub-id-type="doi">10.1633/JISTAP.2022.10.2.1</pub-id></mixed-citation></ref>
<ref id="ref127"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Newman</surname><given-names>N.</given-names></name> <name><surname>Fletcher</surname><given-names>R.</given-names></name> <name><surname>Eddy</surname><given-names>K.</given-names></name> <name><surname>Robinson</surname><given-names>C. T.</given-names></name> <name><surname>Nielsen</surname><given-names>R. K.</given-names></name></person-group> (<year>2023</year>). <source>Reuters institute digital news report 2023</source>. <publisher-name>Oxford, UK: Reuters Institute for the Study of Journalism</publisher-name>.</mixed-citation></ref>
<ref id="ref128"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Newman</surname><given-names>N.</given-names></name> <name><surname>Fletcher</surname><given-names>R.</given-names></name> <name><surname>Robertson</surname><given-names>C. T.</given-names></name> <name><surname>Eddy</surname><given-names>K.</given-names></name> <name><surname>Nielsen</surname><given-names>R. K.</given-names></name></person-group> (<year>2022</year>). <source>Reuters institute digital news report 2022</source>. <publisher-name>Oxford, UK: Reuters Institute for the Study of Journalism</publisher-name>.</mixed-citation></ref>
<ref id="ref129"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Newman</surname><given-names>N.</given-names></name> <name><surname>Fletcher</surname><given-names>R.</given-names></name> <name><surname>Robertson</surname><given-names>C. T.</given-names></name> <name><surname>Ross Arguedas</surname><given-names>A.</given-names></name> <name><surname>Nielsen</surname><given-names>R. K.</given-names></name></person-group> (<year>2024</year>). <source>Reuters institute digital news report 2024</source>. <publisher-name>Oxford, UK: Reuters Institute for the Study of Journalism</publisher-name>.</mixed-citation></ref>
<ref id="ref130"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Nurmi</surname><given-names>J.</given-names></name> <name><surname>Jaakola</surname><given-names>J.</given-names></name></person-group> (<year>2023</year>). <article-title>Losing trust: processes of vaccine hesitancy in parents&#x2019; narratives</article-title>. <source>Soc. Sci. Med.</source> <volume>331</volume>:<fpage>116064</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.socscimed.2023.116064</pub-id>, <pub-id pub-id-type="pmid">37450990</pub-id></mixed-citation></ref>
<ref id="ref131"><mixed-citation publication-type="other"><collab id="coll6">Ofcom</collab> (<year>2024a</year>) Adults&#x2019; media use and attitudes report</mixed-citation></ref>
<ref id="ref132"><mixed-citation publication-type="other"><collab id="coll7">Ofcom</collab>. (<year>2024b</year>). Four in 10 UK adults encounter misinformation [Ofcom].</mixed-citation></ref>
<ref id="ref133"><mixed-citation publication-type="book"><collab id="coll8">Office for National Statistics</collab> (<year>2019</year>). <source>Milestones: Journeying into adulthood</source>. <publisher-name>London, UK: ONS</publisher-name>.</mixed-citation></ref>
<ref id="ref134"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Oh</surname><given-names>H. J.</given-names></name> <name><surname>Lee</surname><given-names>H.</given-names></name></person-group> (<year>2019</year>). <article-title>When do people Verify and Share health rumors on social media? The effects of message importance, health anxiety, and health literacy</article-title>. <source>J. Health Commun.</source> <volume>24</volume>, <fpage>837</fpage>&#x2013;<lpage>847</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10810730.2019.1677824</pub-id>, <pub-id pub-id-type="pmid">31609678</pub-id></mixed-citation></ref>
<ref id="ref135"><mixed-citation publication-type="other"><collab id="coll9">Online Safety Act 2023</collab>, UK Public General Acts (<year>2023</year>).</mixed-citation></ref>
<ref id="ref136"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Pal</surname><given-names>A.</given-names></name> <name><surname>Chua</surname><given-names>A. Y. K.</given-names></name> <name><surname>Hoe-Lian Goh</surname><given-names>D.</given-names></name></person-group> (<year>2020</year>). <article-title>How do users respond to online rumor rebuttals?</article-title> <source>Comput. Hum. Behav.</source> <volume>106</volume>:<fpage>106243</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.chb.2019.106243</pub-id></mixed-citation></ref>
<ref id="ref137"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Paris</surname><given-names>B.</given-names></name> <name><surname>Donovan</surname><given-names>J.</given-names></name></person-group> (<year>2019</year>). Deepfakes and cheap fakes: The manipulation of audio and visual evidence (United States of America: Data &#x0026; Society). University of California. Available online at: <ext-link xlink:href="https://datasociety.net/wp-content/uploads/2019/09/DS_Deepfakes_Cheap_FakesFinal-1-1.pdf" ext-link-type="uri">https://datasociety.net/wp-content/uploads/2019/09/DS_Deepfakes_Cheap_FakesFinal-1-1.pdf</ext-link> (Accessed September 30, 2024).</mixed-citation></ref>
<ref id="ref138"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Park</surname><given-names>P. S.</given-names></name> <name><surname>Goldstein</surname><given-names>S.</given-names></name> <name><surname>O&#x2019;Gara</surname><given-names>A.</given-names></name> <name><surname>Chen</surname><given-names>M.</given-names></name> <name><surname>Hendrycks</surname><given-names>D.</given-names></name></person-group> (<year>2024</year>). <article-title>AI deception: a survey of examples, risks, and potential solutions</article-title>. <source>Patterns</source> <volume>5</volume>:<fpage>100988</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.patter.2024.100988</pub-id>, <pub-id pub-id-type="pmid">38800366</pub-id></mixed-citation></ref>
<ref id="ref139"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Parker</surname><given-names>K.</given-names></name> <name><surname>Igielnik</surname><given-names>R.</given-names></name></person-group> (<year>2020</year>). <source>On the cusp of adulthood and facing an uncertain Fture: What we know about gen Z so far</source>. <publisher-name>Washington, DC: Pew Research Center</publisher-name>.</mixed-citation></ref>
<ref id="ref140"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Peng</surname><given-names>W.</given-names></name> <name><surname>Lee</surname><given-names>H. R.</given-names></name> <name><surname>Lim</surname><given-names>S.</given-names></name></person-group> (<year>2024</year>). <article-title>Leveraging Chatbots to combat health misinformation for older adults: participatory design study</article-title>. <source>JMIR Form. Res.</source> <volume>8</volume>:<fpage>e60712</fpage>. doi: <pub-id pub-id-type="doi">10.2196/60712</pub-id>, <pub-id pub-id-type="pmid">39393065</pub-id></mixed-citation></ref>
<ref id="ref141"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Pennycook</surname><given-names>G.</given-names></name> <name><surname>Rand</surname><given-names>D. G.</given-names></name></person-group> (<year>2020</year>). <article-title>Who falls for fake news? The roles of bullshit receptivity, overclaiming, familiarity, and analytic thinking</article-title>. <source>J. Pers.</source> <volume>88</volume>, <fpage>185</fpage>&#x2013;<lpage>200</lpage>. doi: <pub-id pub-id-type="doi">10.1111/jopy.12476</pub-id>, <pub-id pub-id-type="pmid">30929263</pub-id></mixed-citation></ref>
<ref id="ref142"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Peter</surname><given-names>C.</given-names></name> <name><surname>Muth</surname><given-names>L.</given-names></name></person-group> (<year>2023</year>). <article-title>Social media influencers&#x2019; role in shaping political opinions and actions of young audiences</article-title>. <source>Media Commun.</source> <volume>11</volume>, <fpage>164</fpage>&#x2013;<lpage>174</lpage>. doi: <pub-id pub-id-type="doi">10.17645/mac.v11i3.6750</pub-id></mixed-citation></ref>
<ref id="ref143"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Quintas-Froufe</surname><given-names>N.</given-names></name> <name><surname>Gonz&#x00E1;lez-Neira</surname><given-names>A.</given-names></name> <name><surname>Fia&#x00F1;o-Salinas</surname><given-names>C.</given-names></name></person-group> (<year>2024</year>). <article-title>Corporate policies to protect against disinformation for young audiences: the case of TikTok</article-title>. <source>Front. Commun.</source> <volume>9</volume>:<fpage>1410100</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fcomm.2024.1410100</pub-id></mixed-citation></ref>
<ref id="ref144"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Rezk</surname><given-names>A. M.</given-names></name> <name><surname>Simkute</surname><given-names>A.</given-names></name> <name><surname>Luger</surname><given-names>E.</given-names></name> <name><surname>Vines</surname><given-names>J.</given-names></name> <name><surname>Elsden</surname><given-names>C.</given-names></name> <name><surname>Evans</surname><given-names>M.</given-names></name> <etal/></person-group>. (<year>2024</year>). <article-title>Agency aspirations: Understanding users&#x2019; preferences and perceptions of their role in personalised news curation</article-title>. <conf-name>Proceedings of the CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>16</lpage>.</mixed-citation></ref>
<ref id="ref145"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Roberts</surname><given-names>K.</given-names></name> <name><surname>Dowell</surname><given-names>A.</given-names></name> <name><surname>Nie</surname><given-names>J.-B.</given-names></name></person-group> (<year>2019</year>). <article-title>Attempting rigour and replicability in thematic analysis of qualitative research data; a case study of codebook development</article-title>. <source>BMC Med. Res. Methodol.</source> <volume>19</volume>:<fpage>66</fpage>. doi: <pub-id pub-id-type="doi">10.1186/s12874-019-0707-y</pub-id>, <pub-id pub-id-type="pmid">30922220</pub-id></mixed-citation></ref>
<ref id="ref146"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Roozenbeek</surname><given-names>J.</given-names></name> <name><surname>Van Der Linden</surname><given-names>S.</given-names></name></person-group> (<year>2019</year>). <article-title>Fake news game confers psychological resistance against online misinformation</article-title>. <source>Palgrave Commun.</source> <volume>5</volume>:<fpage>65</fpage>. doi: <pub-id pub-id-type="doi">10.1057/s41599-019-0279-9</pub-id></mixed-citation></ref>
<ref id="ref147"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rydenfelt</surname><given-names>H.</given-names></name></person-group> (<year>2022</year>). <article-title>Transforming media agency? Approaches to automation in Finnish legacy media</article-title>. <source>New Media Soc.</source> <volume>24</volume>, <fpage>2598</fpage>&#x2013;<lpage>2613</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1461444821998705</pub-id></mixed-citation></ref>
<ref id="ref148"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Santos</surname><given-names>V. V. D. A.</given-names></name> <name><surname>Pereira</surname><given-names>C. P.</given-names></name></person-group> (<year>2024</year>). <article-title>Promoting prevention to fake news through an educational software</article-title>. <source>J. Interact. Syst.</source> <volume>15</volume>, <fpage>170</fpage>&#x2013;<lpage>193</lpage>. doi: <pub-id pub-id-type="doi">10.5753/jis.2024.3769</pub-id></mixed-citation></ref>
<ref id="ref149"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Schwartz</surname><given-names>S. J.</given-names></name> <name><surname>Hardy</surname><given-names>S. A.</given-names></name> <name><surname>Zamboanga</surname><given-names>B. L.</given-names></name> <name><surname>Meca</surname><given-names>A.</given-names></name> <name><surname>Waterman</surname><given-names>A. S.</given-names></name> <name><surname>Picariello</surname><given-names>S.</given-names></name> <etal/></person-group>. (<year>2015</year>). <article-title>Identity in young adulthood: links with mental health and risky behavior</article-title>. <source>J. Appl. Dev. Psychol.</source> <volume>36</volume>, <fpage>39</fpage>&#x2013;<lpage>52</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.appdev.2014.10.001</pub-id>, <pub-id pub-id-type="pmid">34334855</pub-id></mixed-citation></ref>
<ref id="ref150"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Scott</surname><given-names>L.</given-names></name> <name><surname>Coventry</surname><given-names>L.</given-names></name> <name><surname>Cecchinato</surname><given-names>M. E.</given-names></name> <name><surname>Warner</surname><given-names>M.</given-names></name></person-group> (<year>2023</year>). <article-title>&#x201C;I figured her feeling a little bit bad was worth it to not spread that kind of hate&#x201D;: exploring how UK families discuss and challenge misinformation</article-title>. <conf-name>Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>15</lpage>.</mixed-citation></ref>
<ref id="ref151"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Sehat</surname><given-names>C. M.</given-names></name> <name><surname>Li</surname><given-names>R.</given-names></name> <name><surname>Nie</surname><given-names>P.</given-names></name> <name><surname>Prabhakar</surname><given-names>T.</given-names></name> <name><surname>Zhang</surname><given-names>A. X.</given-names></name></person-group> (<year>2024</year>). <article-title>Misinformation as a harm: structured approaches for fact-checking prioritization</article-title>. <source>Proc. ACM Hum.-Comput. Interact.</source> <volume>8</volume>, <fpage>1</fpage>&#x2013;<lpage>36</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3641010</pub-id></mixed-citation></ref>
<ref id="ref152"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Shao</surname><given-names>C.</given-names></name> <name><surname>Ciampaglia</surname><given-names>G. L.</given-names></name> <name><surname>Varol</surname><given-names>O.</given-names></name> <name><surname>Yang</surname><given-names>K.-C.</given-names></name> <name><surname>Flammini</surname><given-names>A.</given-names></name> <name><surname>Menczer</surname><given-names>F.</given-names></name></person-group> (<year>2018</year>). <article-title>The spread of low-credibility content by social bots</article-title>. <source>Nat. Commun.</source> <volume>9</volume>:<fpage>4787</fpage>. doi: <pub-id pub-id-type="doi">10.1038/s41467-018-06930-7</pub-id>, <pub-id pub-id-type="pmid">30459415</pub-id></mixed-citation></ref>
<ref id="ref153"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Shin</surname><given-names>D.</given-names></name></person-group> (<year>2020</year>). <article-title>User perceptions of algorithmic decisions in the personalized AI system: perceptual evaluation of fairness, accountability, transparency, and explainability</article-title>. <source>J. Broadcast. Electron. Media</source> <volume>64</volume>, <fpage>541</fpage>&#x2013;<lpage>565</lpage>. doi: <pub-id pub-id-type="doi">10.1080/08838151.2020.1843357</pub-id></mixed-citation></ref>
<ref id="ref154"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Shin</surname><given-names>D.</given-names></name> <name><surname>Zaid</surname><given-names>B.</given-names></name> <name><surname>Biocca</surname><given-names>F.</given-names></name> <name><surname>Rasul</surname><given-names>A.</given-names></name></person-group> (<year>2022</year>). <article-title>In platforms we trust? Unlocking the black-box of news algorithms through interpretable AI</article-title>. <source>J. Broadcast. Electron. Media</source> <volume>66</volume>, <fpage>235</fpage>&#x2013;<lpage>256</lpage>. doi: <pub-id pub-id-type="doi">10.1080/08838151.2022.2057984</pub-id></mixed-citation></ref>
<ref id="ref155"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Shusas</surname><given-names>E.</given-names></name></person-group> (<year>2024</year>). <article-title>Designing better credibility indicators: Understanding how emerging adults assess source credibility of misinformation identification and labeling</article-title>. <conf-name>Designing Interactive Systems Conference</conf-name>, <fpage>41</fpage>&#x2013;<lpage>44</lpage></mixed-citation></ref>
<ref id="ref156"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Simpson</surname><given-names>A. R.</given-names></name></person-group> (<year>2018</year>). Changes in Young adulthood. Young adult development project. Available online at: <ext-link xlink:href="https://hr.mit.edu/static/worklife/youngadult/changes.html" ext-link-type="uri">https://hr.mit.edu/static/worklife/youngadult/changes.html</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref157"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>S&#x00F6;derberg</surname><given-names>B.</given-names></name></person-group> (<year>2016</year>) Inside the echo chamber: A qualitative study on anto-immigration internet media, political polarisation and social trust in a fragmented digital landscape [S&#x00F6;dert&#x00F6;rns h&#x00F6;gskola]</mixed-citation></ref>
<ref id="ref158"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Staender</surname><given-names>A.</given-names></name> <name><surname>Humprecht</surname><given-names>E.</given-names></name></person-group> (<year>2023</year>). &#x201C;<article-title>Content analysis in the research field of disinformation</article-title>&#x201D; in <source>Standardisierte Inhaltsanalyse in der Kommunikationswissenschaft &#x2013; Standardized content analysis in communication research</source>. eds. <person-group person-group-type="editor"><name><surname>Oehmer-Pedrazzi</surname><given-names>F.</given-names></name> <name><surname>Kessler</surname><given-names>S. H.</given-names></name> <name><surname>Humprecht</surname><given-names>E.</given-names></name> <name><surname>Sommer</surname><given-names>K.</given-names></name> <name><surname>Castro</surname><given-names>L.</given-names></name></person-group> (<publisher-name>London, UK: Springer Fachmedien Wiesbaden</publisher-name>), <fpage>339</fpage>&#x2013;<lpage>348</lpage>.</mixed-citation></ref>
<ref id="ref159"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Suler</surname><given-names>J.</given-names></name></person-group> (<year>2004</year>). <article-title>The online disinhibition effect</article-title>. <source>Cyberpsychol. Behav.</source> <volume>7</volume>, <fpage>321</fpage>&#x2013;<lpage>326</lpage>. doi: <pub-id pub-id-type="doi">10.1089/1094931041291295</pub-id>, <pub-id pub-id-type="pmid">15257832</pub-id></mixed-citation></ref>
<ref id="ref160"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Treadway</surname><given-names>M.</given-names></name> <name><surname>Holloway</surname><given-names>E.</given-names></name></person-group> (<year>2018</year>) Young adults in transition: factors that support and hinder growth and change. Available online at: <ext-link xlink:href="http://www.natsap-jtsp.com/article/3225-young-adults-in-transition-factors-that-support-and-hinder-growth-and-change" ext-link-type="uri">http://www.natsap-jtsp.com/article/3225-young-adults-in-transition-factors-that-support-and-hinder-growth-and-change</ext-link> (Accessed December 22, 2024).</mixed-citation></ref>
<ref id="ref161"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Ulrich</surname><given-names>B.</given-names></name></person-group> (<year>1986</year>). <source>Risk society: Towards a new modernity</source>. <publisher-name>New Delhi: Sage</publisher-name>.</mixed-citation></ref>
<ref id="ref162"><mixed-citation publication-type="confproc"><person-group person-group-type="author"><name><surname>Valencia</surname><given-names>S.</given-names></name> <name><surname>Pavel</surname><given-names>A.</given-names></name> <name><surname>Santa Maria</surname><given-names>J.</given-names></name> <name><surname>Yu</surname><given-names>S. (Gloria)</given-names></name> <name><surname>Bigham</surname><given-names>J. P.</given-names></name> <etal/></person-group>. (<year>2020</year>). <article-title>Conversational agency in augmentative and alternative communication</article-title>. <conf-name>Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems</conf-name>, <fpage>1</fpage>&#x2013;<lpage>12</lpage></mixed-citation></ref>
<ref id="ref163"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Veeriah</surname><given-names>J.</given-names></name></person-group> (<year>2021</year>). <article-title>Young adults&#x2019; ability to detect fake news and their new media literacy level in the wake of the COVID-19 pandemic</article-title>. <source>J. Content Community Commun.</source> <volume>13</volume>:<fpage>5168788</fpage>. doi: <pub-id pub-id-type="doi">10.31620/JCCC.06.21/31.372</pub-id></mixed-citation></ref>
<ref id="ref164"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Verwiebe</surname><given-names>R.</given-names></name> <name><surname>Buder</surname><given-names>C.</given-names></name> <name><surname>Weissmann</surname><given-names>S.</given-names></name> <name><surname>Osorio-Krauter</surname><given-names>C.</given-names></name> <name><surname>Philipp</surname><given-names>A.</given-names></name></person-group> (<year>2024</year>). <article-title>&#x201C;The algorithm is like a mercurial god&#x201D;: exploring content creators&#x2019; perception of algorithmic agency on YouTube</article-title>. <source>New Media Soc.</source> <volume>28</volume>:<fpage>14614448241307931</fpage>. doi: <pub-id pub-id-type="doi">10.1177/14614448241307931</pub-id></mixed-citation></ref>
<ref id="ref165"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Vlachokyriakos</surname><given-names>V.</given-names></name> <name><surname>Johnson</surname><given-names>I.</given-names></name> <name><surname>Anderson</surname><given-names>R.</given-names></name> <name><surname>Claisse</surname><given-names>C.</given-names></name> <name><surname>Zhang</surname><given-names>V.</given-names></name> <name><surname>Briggs</surname><given-names>P.</given-names></name></person-group> (<year>2024</year>). Design implications for a social and collaborative understanding of online information assessment practices, challenges and heuristics. <italic>Proceedings of the 22nd European Conference on Computer-Supported Cooperative Work</italic> (ECSCW 2024). European Society for Socially Embedded Technologies, <fpage>1</fpage>&#x2013;<lpage>19</lpage>. doi: <pub-id pub-id-type="doi">10.48340/ecscw2024_n04</pub-id></mixed-citation></ref>
<ref id="ref166"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Walther</surname><given-names>S.</given-names></name> <name><surname>McCoy</surname><given-names>A.</given-names></name></person-group> (<year>2021</year>). <article-title>US extremism on telegram: Fueling disinformation, conspiracy theories, and accelerationism</article-title>. <italic>Perspectives on Terrorism</italic>, <volume>15</volume>, <fpage>100</fpage>&#x2013;<lpage>116</lpage>.</mixed-citation></ref>
<ref id="ref167"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname><given-names>Y.</given-names></name> <name><surname>McKee</surname><given-names>M.</given-names></name> <name><surname>Torbica</surname><given-names>A.</given-names></name> <name><surname>Stuckler</surname><given-names>D.</given-names></name></person-group> (<year>2019</year>). <article-title>Systematic literature review on the spread of health-related misinformation on social media</article-title>. <source>Soc. Sci. Med.</source> <volume>240</volume>:<fpage>112552</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.socscimed.2019.112552</pub-id>, <pub-id pub-id-type="pmid">31561111</pub-id></mixed-citation></ref>
<ref id="ref168"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wolleb&#x00E6;k</surname><given-names>D.</given-names></name> <name><surname>Karlsen</surname><given-names>R.</given-names></name> <name><surname>Steen-Johnsen</surname><given-names>K.</given-names></name> <name><surname>Enjolras</surname><given-names>B.</given-names></name></person-group> (<year>2019</year>). <article-title>Anger, fear, and echo chambers: the emotional basis for online behavior</article-title>. <source>Soc. Media Soc.</source> <volume>5</volume>:<fpage>2056305119829859</fpage>. doi: <pub-id pub-id-type="doi">10.1177/2056305119829859</pub-id></mixed-citation></ref>
<ref id="ref169"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wszalek</surname><given-names>J.</given-names></name></person-group> (<year>2017</year>). <article-title>Ethical and legal concerns associated with the comprehension of legal language and concepts</article-title>. <source>AJOB Neurosci.</source> <volume>8</volume>, <fpage>26</fpage>&#x2013;<lpage>36</lpage>. doi: <pub-id pub-id-type="doi">10.1080/21507740.2017.1285821</pub-id>, <pub-id pub-id-type="pmid">30918742</pub-id></mixed-citation></ref>
<ref id="ref170"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Xiao</surname><given-names>X.</given-names></name> <name><surname>Su</surname><given-names>Y.</given-names></name> <name><surname>Lee</surname><given-names>D. K. L.</given-names></name></person-group> (<year>2021</year>). <article-title>Who consumes new media content more wisely? Examining personality factors, SNS use, and new media literacy in the era of misinformation</article-title>. <source>Soc. Media Soc.</source> <volume>7</volume>:<fpage>2056305121990635</fpage>. doi: <pub-id pub-id-type="doi">10.1177/2056305121990635</pub-id></mixed-citation></ref>
<ref id="ref171"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yamaguchi</surname><given-names>S.</given-names></name> <name><surname>Kawata</surname><given-names>Y.</given-names></name> <name><surname>Murofushi</surname><given-names>Y.</given-names></name> <name><surname>Ota</surname><given-names>T.</given-names></name></person-group> (<year>2022</year>). <article-title>The development and validation of an emotional vulnerability scale for university students</article-title>. <source>Front. Psychol.</source> <volume>13</volume>:<fpage>941250</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2022.941250</pub-id>, <pub-id pub-id-type="pmid">36186345</pub-id></mixed-citation></ref>
<ref id="ref172"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname><given-names>Y.</given-names></name> <name><surname>Ta</surname><given-names>N.</given-names></name> <name><surname>Li</surname><given-names>K.</given-names></name> <name><surname>Jiao</surname><given-names>F.</given-names></name> <name><surname>Hu</surname><given-names>B.</given-names></name> <name><surname>Li</surname><given-names>Z.</given-names></name></person-group> (<year>2021</year>). <article-title>Influential factors on collective anxiety of online topic-based communities</article-title>. <source>Front. Psychol.</source> <volume>12</volume>:<fpage>740065</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2021.740065</pub-id>, <pub-id pub-id-type="pmid">34675846</pub-id></mixed-citation></ref>
<ref id="ref173"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Young</surname><given-names>R.</given-names></name> <name><surname>Kananovich</surname><given-names>V.</given-names></name> <name><surname>Johnson</surname><given-names>B. G.</given-names></name></person-group> (<year>2023</year>). <article-title>Young adults&#x2019; folk theories of how social media harms its users</article-title>. <source>Mass Commun. Soc.</source> <volume>26</volume>, <fpage>23</fpage>&#x2013;<lpage>46</lpage>. doi: <pub-id pub-id-type="doi">10.1080/15205436.2021.1970186</pub-id></mixed-citation></ref>
<ref id="ref174"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yu</surname><given-names>W.</given-names></name> <name><surname>Payton</surname><given-names>B.</given-names></name> <name><surname>Sun</surname><given-names>M.</given-names></name> <name><surname>Jia</surname><given-names>W.</given-names></name> <name><surname>Huang</surname><given-names>G.</given-names></name></person-group> (<year>2023</year>). <article-title>Toward an integrated framework for misinformation and correction sharing: a systematic review across domains</article-title>. <source>New Media Soc.</source> <volume>25</volume>, <fpage>2241</fpage>&#x2013;<lpage>2267</lpage>. doi: <pub-id pub-id-type="doi">10.1177/14614448221116569</pub-id></mixed-citation></ref>
</ref-list>
<fn-group>
<fn fn-type="custom" custom-type="edited-by" id="fn0004">
<p>Edited by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/951127/overview">Ayodeji Olalekan Salau</ext-link>, Afe Babalola University, Nigeria</p>
</fn>
<fn fn-type="custom" custom-type="reviewed-by" id="fn0005">
<p>Reviewed by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1786076/overview">Antoine Khati</ext-link>, University of Connecticut, United States</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3153467/overview">Raqiya Alharrasi</ext-link>, Expert Verlag GmbH, Germany</p>
</fn>
</fn-group>
<fn-group>
<fn id="fn0001"><label>1</label><p><ext-link xlink:href="https://www.nationalcrimeagency.gov.uk/moneymuling" ext-link-type="uri">https://www.nationalcrimeagency.gov.uk/moneymuling</ext-link> (Accessed January 2024).</p></fn>
<fn id="fn0002"><label>2</label><p>For more details: <ext-link xlink:href="https://www.bbc.co.uk/news/uk-england-norfolk-41268211" ext-link-type="uri">https://www.bbc.co.uk/news/uk-england-norfolk-41268211</ext-link> (Accessed January 2024).</p></fn>
<fn id="fn0003"><label>3</label><p><italic>&#x2018;Deepfake&#x2019;</italic> refers to <italic>&#x2018;videos that use some form of deep or machine leaning to hybridise or generate human bodies and faces&#x2019;. &#x2018;Cheap fake&#x2019;,</italic> as another form of Audiovisual Manipulation, refers to <italic>&#x2018;videos created relying on cheap, accessible software, or no software at all&#x2019;</italic> (<xref ref-type="bibr" rid="ref137">Paris and Donovan, 2019</xref>).</p></fn>
</fn-group>
</back>
</article>