Sarah Tabassum (University of North Carolina at Charlotte, USA), Narges Zare (University of North Carolina at Charlotte, USA), Cori Faklaris(University of North Carolina at Charlotte, USA)

In today’s digital world, migrants stay connected to family, institutions, and services across borders, but this reliance on digital communication also exposes them to unfamiliar risks when they enter new technological and cultural environments. Educational migrants (also known as international students) depend on online platforms to manage admission, housing, work, and everyday life in the United States. Yet this transition often introduces an unfamiliar and fragmented digital ecosystem where they encounter privacy and security threats such as phishing, identity fraud, and cross-channel scams. Existing security tools rarely consider the situated vulnerabilities of newcomers who must interpret these threats without local knowledge or culturally familiar cues. To investigate these challenges, we conducted participatory design sessions with 22 educational migrants from Global South countries studying in the United States. Using inductive open coding within a reflexive thematic analysis framework, we identified seven themes of desired features. Participants proposed a range of support mechanisms, including transparent reporting and verification workflows, scam filtering, migrant-focused scam databases, and university-integrated safety tools Participants also mapped their concepts to high-level AI capabilities, emphasizing detection, identification, and interpretable explanations. Our findings highlight the need for transparent, culturally grounded, and context-aware digital safety supports for newcomers during their early experiences in the U.S. digital ecosystem.

View More Papers

Icarus: Achieving Performant Asynchronous BFT with Only Optimistic Paths

Xiaohai Dai (Huazhong University of Science and Technology), Yiming Yu (Huazhong University of Science and Technology), Sisi Duan (Tsinghua University), Rui Hao (Wuhan University of Technology), Jiang Xiao (Huazhong University of Science and Technology), Hai Jin (Huazhong University of Science and Technology)

Read More

Bleeding Pathways: Vanishing Discriminability in LLM Hidden States Fuels...

Yingjie Zhang (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Tong Liu (Institute of Information Engineering, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of Sciences), Zhe Zhao (Ant Group), Guozhu Meng (Institute of Information Engineering, Chinese Academy of Sciences; School…

Read More

KnowHow: Automatically Applying High-Level CTI Knowledge for Interpretable and...

Yuhan Meng (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University), Shaofei Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of Computer Science, Peking University), Jiaping Gui (School of Computer Science, Shanghai Jiao Tong University), Peng Jiang (Southeast University), Ding Li (Key Laboratory of High-Confidence Software Technologies (MOE), School of…

Read More