skip to main content
10.1145/2675133.2675287acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors

Authors Info & Claims
Published:28 February 2015Publication History

ABSTRACT

Through a secondary data analysis of a nationally representative Pew survey [35-36], we empirically test the validity of two contrasting theoretical models of adolescent information privacy behaviors. Our results suggest that in seeking to understand the underlying processes of teens' privacy risk-taking and risk-coping behaviors within social media, a "risk-centric" framework may be more useful than a traditional "concern-centric" framework that emphasizes privacy antecedents and outcomes. Our newly proposed and validated "risk-centric" framework implies a possible risk escalation process wherein teens make online disclosures and render themselves more susceptible to experiences of risky online interactions; in turn, these risky experiences are associated with higher levels of teen privacy concern. Higher levels of teen privacy concern predict both advice-seeking and remedy/corrective risk-coping behaviors. Drawing on theories of information privacy and developmental psychology, we discuss these findings from the perspective of allowing teens to experience some level of online risk so that they can learn how to navigate the dangers and reap the benefits of online engagement.

References

  1. Acquisti, A., & Gross, R. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy enhancing technologies, (2006), 36--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Altman, I. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing, Monterey, CA, 1975.Google ScholarGoogle Scholar
  3. Bansal, G., Zahedi, F. and Gefen, D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49, 2 (2010), 138150. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Barkhuus, L. and Dey, A. K. Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns. INTERACT 3(2003), 702--712.Google ScholarGoogle Scholar
  5. Barnes, S. B. A privacy paradox: Social networking in the USA, 2006.Google ScholarGoogle Scholar
  6. Baumrind, D. A developmental perspective on adolescent risk taking in contemporary America. New directions for child development, 37 (1987), 93--125.Google ScholarGoogle Scholar
  7. Boldero, J., & Fallon, B. Adolescent help-seeking: What do they get help for and from whom? Journal of Adolescence, 18, 2 (1995), 193--209.Google ScholarGoogle ScholarCross RefCross Ref
  8. boyd, d. Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life In D. Buckingham (ed.) YOUTH, IDENTITY, AND DIGITAL MEDIA, Berkman Center Research Publication No. 2007--16, (2007).Google ScholarGoogle Scholar
  9. Breakwell, G. M. The psychology of risk Cambridge University Press, Cambridge, 2007.Google ScholarGoogle Scholar
  10. Burgoon, J. K., Parrott, R., Le Poire, B. A., Kelley, D. L., Walther, J. B. and Perry, D. Maintaining and restoring privacy through communication in different types of relationships. Journal of Social and Personal Relationships, 6, 2 (1989), 131--158.Google ScholarGoogle ScholarCross RefCross Ref
  11. Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., & Upadhyaya, S. J. Internet and online information privacy: An exploratory study of preteens and early teens. IEEE Transactions, 52, 2 (2009), 167--182.Google ScholarGoogle Scholar
  12. Chen, Y., Zhang, L., Michelony, A. and Zhang, Y. 4Is of social bully filtering: identity, inference, influence, and intervention. In Proc. Proceedings of the 21st ACM international conference on Information and knowledge management, ACM (2012), 2677--2679. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Cho, H., & LaRose, R. Privacy issues in Internet surveys. Social Science Computer Review, 17, 4 (1999), 421--434. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Christofides, E., Muise, A., & Desmarais, S. Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? CyberPsychology & Behavior, 12, 3 (2009), 341--345.Google ScholarGoogle ScholarCross RefCross Ref
  15. Cohn, L. D., Macfarlane, S., Yanez, C., & Imai, W. K. Risk-perception: differences between adolescents and adults. Health Psychology, 14, 3 (1995), 217.Google ScholarGoogle ScholarCross RefCross Ref
  16. Consumers-Union. Consumer Reports Poll: Americans Extremely Concerned About Internet Privacy. 2008, http://www.consumersunion.org/pub/core_telecom_and _utilities/006189.html.Google ScholarGoogle Scholar
  17. Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer Mediated Communication, 15, 1 (2009), 83--108.Google ScholarGoogle ScholarCross RefCross Ref
  18. Dumont, M., & Provost, M. A. Resilience in adolescents: Protective role of social support, coping strategies, self-esteem, and social activities on experience of stress and depression. Journal of youth and adolescence, 28, 3 (1999), 343--363.Google ScholarGoogle Scholar
  19. Ellison, N. B., Steinfield, C. and Lampe, C. The benefits of Facebook "friends:" Social capital and college students' use of online social network sites. Journal of ComputerMediated Communication, 12, 4 (2007), 1143--1168.Google ScholarGoogle Scholar
  20. Feng, Y. and Xie, W. Teens' concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacyprotecting behaviors. Comput. Hum. Behav., 33 (2014), 153--162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Goffman, E. The presentation of self in everyday life. Anchor, New York, USA, 1959.Google ScholarGoogle Scholar
  22. Gould, M. S., Munfakh, J. L. H., Lubell, K., Kleinman, M., & Parker, S. Seeking help from the internet during adolescence. Journal of the American Academy of Child & Adolescent Psychiatry, 41, 10 (2002), 1182--1189.Google ScholarGoogle ScholarCross RefCross Ref
  23. Hoy, M. G., & Milne, G. Gender differences in privacyrelated measures for young adult Facebook users. Journal of Interactive Advertising, 10, 2 (2010), 28--45.Google ScholarGoogle ScholarCross RefCross Ref
  24. ISTTF. Enhancing Child Safety and Online Technologies. Harvard University's Berkman Center for Internet and Society, Internet Safety Technical Task Force, 2008,Google ScholarGoogle Scholar
  25. Kaiser, H. F. The Application of Electronic Computers to Factor Analysis. Educational and Psychological Measurement, 20, 1 (April 1, 1960 1960), 141--151.Google ScholarGoogle ScholarCross RefCross Ref
  26. Krasnova, H., Günther, O., Spiekermann, S., & Koroleva, K. Privacy concerns and identity in online social networks. Identity in the Information Society, 2, 1 (2009), 39--63.Google ScholarGoogle ScholarCross RefCross Ref
  27. Kumaragruru, P., Rhee, Y., Acquisti, A., Cranor, L. F., Hong, J. and Nunge, E. Protecting people from phishing: The design and evaluation of an embedded training email system. In Proc. SIGCHI Conference on Human Factors in Computing Systems, ACM (2007), 905--914. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Laufer, R. S. and Wolfe, M. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory. Journal of Social Issues, 33, 3 (1977), 22--42.Google ScholarGoogle ScholarCross RefCross Ref
  29. Lenhart, A. and Madden, M. Teens, Privacy & Online Social Networks, PEW Internet & American Life Project. 2007, http://www.pewinternet.org/ppf/r/211/report_display.asp .Google ScholarGoogle Scholar
  30. Lewis, K., Kaufman, J., & Christakis, N. The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer Mediated Communication, 14, 1 (2008), 79--100.Google ScholarGoogle ScholarCross RefCross Ref
  31. Livingstone, S. Taking risky opportunities in youthful content creation: Teenagers' use of social networking sites for intimacy, privacy, and self-expression. New Media & Society, 10 (2008), 393--411.Google ScholarGoogle ScholarCross RefCross Ref
  32. Livingstone, S., i Helsper, E. Gradations in digital inclusion: children, young people and the digital divide. New Media & Society, 9, 4 (2007), 671.Google ScholarGoogle ScholarCross RefCross Ref
  33. Livingstone, S., Ólafsson, K. and Staksrud, E. Risky Social Networking Practices Among "Underage" Users: Lessons for Evidence-Based Policy. Journal of Computer-Mediated Communication, 18, 3 (2013), 303320.Google ScholarGoogle ScholarCross RefCross Ref
  34. Lwin, M. O., Stanaland, A. and Miyazaki, A. Protecting children's privacy online: How parental mediation strategies affect website safeguard effectiveness. Journal of Retailing, 4, 2 (2008), 205--217.Google ScholarGoogle Scholar
  35. Madden, M., Cortesi, S., Gasser, U., Lenhart, A. and Duggan, M. Where Teens Seek Online Privacy Advice. Pew Research Center's Internet & American Life Project, 2013, http://www.pewinternet.org/2013/08/15/where-teensseek-online-privacy-advice/.Google ScholarGoogle Scholar
  36. Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A. and Beaton, M. Teens, Social Media, and Privacy 2013, http://www.pewinternet.org/Reports/2013/Teens-SocialMedia-And-Privacy.aspx.Google ScholarGoogle Scholar
  37. Marwick, A. E. and boyd, d. Networked privacy: How teenagers negotiate context in social media. New Media & Society (July 21, 2014).Google ScholarGoogle Scholar
  38. Meulman, J. J. and Heiser, W. J. SPSS-Categories. 2004, http://www.helsinki.fi/~komulain/Tilastokirjat/IBMSPSS-Categories.pdf.Google ScholarGoogle Scholar
  39. Milne, G. R. and Culnan, M. J. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices. Journal of Interactive Marketing, 18, 3 (2004), 15--29.Google ScholarGoogle ScholarCross RefCross Ref
  40. Miyazaki, A. D., & Fernandez, A. Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs, 35, 1 (2001), 27--44.Google ScholarGoogle ScholarCross RefCross Ref
  41. Moscardelli, D. M., & Divine, R. Adolescents' Concern for Privacy When Using the Internet: An Empirical Analysis of Predictors and Relationships With Privacy Protecting Behaviors. Family and Consumer Sciences Research Journal, 35, 3 (2007), 232--252.Google ScholarGoogle ScholarCross RefCross Ref
  42. Norberg, P. A., Horne, D. R., & Horne, D. A. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41, 1 (2007), 100--126.Google ScholarGoogle ScholarCross RefCross Ref
  43. Nosko, A., Wood, E. and Molema, S. All about me: Disclosure in online social networking profiles: The case of FACEBOOK. Computers in Human Behavior, 26, 3 (2010), 406--418. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Palen, L. and Dourish, P. Unpacking "privacy" for a networked world. In Proc. Proceedings of the SIGCHI conference on Human factors in computing systems, ACM (2003), 129--136. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Rachels, J. Why privacy is important. In D. G. J. J. W. Snapper (ed.) Ethical issues in the use of computers, (1985), 194--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Schau, H. J. and Gilly, M. C. We are what we post? Self-presentation in personal web space. Journal of Consumer Research, 30, 3 (2003), 385--404.Google ScholarGoogle Scholar
  47. Schermelleh-Engel, K., Moosbrugger, H. and Müller, H. Evaluating the fit of structural equation models: Tests of significance and descriptive goodness-of-fit measures. Methods of psychological research online, 8, 2 (2003), 23--74.Google ScholarGoogle Scholar
  48. Seiffge-Krenke, I. Stress, coping, and relationships in adolescence. Lawrence Erlbaum, Mahwah, NJ, 1995.Google ScholarGoogle Scholar
  49. Sheehan, K. B. Toward a typology of Internet users and online privacy concerns. The Information Society, 18, 1 (2002), 21--32.Google ScholarGoogle ScholarCross RefCross Ref
  50. Shin, D. H. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22, 5 (2010), 428--438. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Smith, H. J., Dinev, T. and Xu, H. Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35, 4 (2011), 989--1015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Steinberg, L. Risk taking in adolescence: what changes, and why? Annals of the New York Academy of Sciences, 1021, 1 (2004), 51--58.Google ScholarGoogle ScholarCross RefCross Ref
  53. Steinberg, L. A social neuroscience perspective on adolescent risk-taking. Developmental review, 28, 1 (2008), 78--106.Google ScholarGoogle Scholar
  54. Stevenson, F. and Zimmerman, M. A. ADOLESCENT RESILIENCE: A Framework for Understanding Healthy Development in the Face of Risk. Annual Review of Public Health, 26 (2005), 399--419.Google ScholarGoogle ScholarCross RefCross Ref
  55. Tan, X., Qin, L., Kim, Y., & Hsu, J. Impact of privacy concern in social networking web sites. Internet Research, 22, 2 (2012), 211--233.Google ScholarGoogle ScholarCross RefCross Ref
  56. Tufekci, Z. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society, 28, 1 (February 1, 2008 2008), 20--36.Google ScholarGoogle Scholar
  57. Utz, S., & Kramer, N. The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3, 2 (2009).Google ScholarGoogle Scholar
  58. Vygostky, L. S. Mind in Society: The Development of Higher Psychological Processes. Harvard University Press, Cambridge, Mass, 1978.Google ScholarGoogle Scholar
  59. Walther, J. B. Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23 (1996), 3--44.Google ScholarGoogle ScholarCross RefCross Ref
  60. Wisniewski, P., Xu, H., Rosson, M. B. and Carroll, J. M. Adolescent Online Safety: The "Moral" of the Story. In Proc. CSCW 2014 (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Xu, H., Parks, R., Chu, C. H., & Zhang, X. L. Information disclosure and online social networks: From the case of Facebook news feed controversy to a theoretical understanding. In Proc. AMCIS 2010 (2010).Google ScholarGoogle Scholar
  62. Youn, S. Parental influence and teens' attitude toward online privacy protection. Journal of Consumer Affairs, 42, 3 (2008), 362--388.Google ScholarGoogle ScholarCross RefCross Ref
  63. Youn, S. Teenagers' perceptions of online privacy and coping behaviors: a risk-benefit appraisal approach. Journal of Broadcasting & Electronic Media, 49, 1 (2005), 86--110.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CSCW '15: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing
          February 2015
          1956 pages
          ISBN:9781450329224
          DOI:10.1145/2675133

          Copyright © 2015 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 February 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CSCW '15 Paper Acceptance Rate161of575submissions,28%Overall Acceptance Rate2,235of8,521submissions,26%

          Upcoming Conference

          CSCW '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader