ABSTRACT
Through a secondary data analysis of a nationally representative Pew survey [35-36], we empirically test the validity of two contrasting theoretical models of adolescent information privacy behaviors. Our results suggest that in seeking to understand the underlying processes of teens' privacy risk-taking and risk-coping behaviors within social media, a "risk-centric" framework may be more useful than a traditional "concern-centric" framework that emphasizes privacy antecedents and outcomes. Our newly proposed and validated "risk-centric" framework implies a possible risk escalation process wherein teens make online disclosures and render themselves more susceptible to experiences of risky online interactions; in turn, these risky experiences are associated with higher levels of teen privacy concern. Higher levels of teen privacy concern predict both advice-seeking and remedy/corrective risk-coping behaviors. Drawing on theories of information privacy and developmental psychology, we discuss these findings from the perspective of allowing teens to experience some level of online risk so that they can learn how to navigate the dangers and reap the benefits of online engagement.
- Acquisti, A., & Gross, R. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy enhancing technologies, (2006), 36--58. Google ScholarDigital Library
- Altman, I. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks/Cole Publishing, Monterey, CA, 1975.Google Scholar
- Bansal, G., Zahedi, F. and Gefen, D. The impact of personal dispositions on information sensitivity, privacy concern and trust in disclosing health information online. Decision Support Systems, 49, 2 (2010), 138150. Google ScholarDigital Library
- Barkhuus, L. and Dey, A. K. Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns. INTERACT 3(2003), 702--712.Google Scholar
- Barnes, S. B. A privacy paradox: Social networking in the USA, 2006.Google Scholar
- Baumrind, D. A developmental perspective on adolescent risk taking in contemporary America. New directions for child development, 37 (1987), 93--125.Google Scholar
- Boldero, J., & Fallon, B. Adolescent help-seeking: What do they get help for and from whom? Journal of Adolescence, 18, 2 (1995), 193--209.Google ScholarCross Ref
- boyd, d. Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life In D. Buckingham (ed.) YOUTH, IDENTITY, AND DIGITAL MEDIA, Berkman Center Research Publication No. 2007--16, (2007).Google Scholar
- Breakwell, G. M. The psychology of risk Cambridge University Press, Cambridge, 2007.Google Scholar
- Burgoon, J. K., Parrott, R., Le Poire, B. A., Kelley, D. L., Walther, J. B. and Perry, D. Maintaining and restoring privacy through communication in different types of relationships. Journal of Social and Personal Relationships, 6, 2 (1989), 131--158.Google ScholarCross Ref
- Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., & Upadhyaya, S. J. Internet and online information privacy: An exploratory study of preteens and early teens. IEEE Transactions, 52, 2 (2009), 167--182.Google Scholar
- Chen, Y., Zhang, L., Michelony, A. and Zhang, Y. 4Is of social bully filtering: identity, inference, influence, and intervention. In Proc. Proceedings of the 21st ACM international conference on Information and knowledge management, ACM (2012), 2677--2679. Google ScholarDigital Library
- Cho, H., & LaRose, R. Privacy issues in Internet surveys. Social Science Computer Review, 17, 4 (1999), 421--434. Google ScholarDigital Library
- Christofides, E., Muise, A., & Desmarais, S. Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? CyberPsychology & Behavior, 12, 3 (2009), 341--345.Google ScholarCross Ref
- Cohn, L. D., Macfarlane, S., Yanez, C., & Imai, W. K. Risk-perception: differences between adolescents and adults. Health Psychology, 14, 3 (1995), 217.Google ScholarCross Ref
- Consumers-Union. Consumer Reports Poll: Americans Extremely Concerned About Internet Privacy. 2008, http://www.consumersunion.org/pub/core_telecom_and _utilities/006189.html.Google Scholar
- Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer Mediated Communication, 15, 1 (2009), 83--108.Google ScholarCross Ref
- Dumont, M., & Provost, M. A. Resilience in adolescents: Protective role of social support, coping strategies, self-esteem, and social activities on experience of stress and depression. Journal of youth and adolescence, 28, 3 (1999), 343--363.Google Scholar
- Ellison, N. B., Steinfield, C. and Lampe, C. The benefits of Facebook "friends:" Social capital and college students' use of online social network sites. Journal of ComputerMediated Communication, 12, 4 (2007), 1143--1168.Google Scholar
- Feng, Y. and Xie, W. Teens' concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacyprotecting behaviors. Comput. Hum. Behav., 33 (2014), 153--162. Google ScholarDigital Library
- Goffman, E. The presentation of self in everyday life. Anchor, New York, USA, 1959.Google Scholar
- Gould, M. S., Munfakh, J. L. H., Lubell, K., Kleinman, M., & Parker, S. Seeking help from the internet during adolescence. Journal of the American Academy of Child & Adolescent Psychiatry, 41, 10 (2002), 1182--1189.Google ScholarCross Ref
- Hoy, M. G., & Milne, G. Gender differences in privacyrelated measures for young adult Facebook users. Journal of Interactive Advertising, 10, 2 (2010), 28--45.Google ScholarCross Ref
- ISTTF. Enhancing Child Safety and Online Technologies. Harvard University's Berkman Center for Internet and Society, Internet Safety Technical Task Force, 2008,Google Scholar
- Kaiser, H. F. The Application of Electronic Computers to Factor Analysis. Educational and Psychological Measurement, 20, 1 (April 1, 1960 1960), 141--151.Google ScholarCross Ref
- Krasnova, H., Günther, O., Spiekermann, S., & Koroleva, K. Privacy concerns and identity in online social networks. Identity in the Information Society, 2, 1 (2009), 39--63.Google ScholarCross Ref
- Kumaragruru, P., Rhee, Y., Acquisti, A., Cranor, L. F., Hong, J. and Nunge, E. Protecting people from phishing: The design and evaluation of an embedded training email system. In Proc. SIGCHI Conference on Human Factors in Computing Systems, ACM (2007), 905--914. Google ScholarDigital Library
- Laufer, R. S. and Wolfe, M. Privacy as a Concept and a Social Issue: A Multidimensional Developmental Theory. Journal of Social Issues, 33, 3 (1977), 22--42.Google ScholarCross Ref
- Lenhart, A. and Madden, M. Teens, Privacy & Online Social Networks, PEW Internet & American Life Project. 2007, http://www.pewinternet.org/ppf/r/211/report_display.asp .Google Scholar
- Lewis, K., Kaufman, J., & Christakis, N. The taste for privacy: An analysis of college student privacy settings in an online social network. Journal of Computer Mediated Communication, 14, 1 (2008), 79--100.Google ScholarCross Ref
- Livingstone, S. Taking risky opportunities in youthful content creation: Teenagers' use of social networking sites for intimacy, privacy, and self-expression. New Media & Society, 10 (2008), 393--411.Google ScholarCross Ref
- Livingstone, S., i Helsper, E. Gradations in digital inclusion: children, young people and the digital divide. New Media & Society, 9, 4 (2007), 671.Google ScholarCross Ref
- Livingstone, S., Ólafsson, K. and Staksrud, E. Risky Social Networking Practices Among "Underage" Users: Lessons for Evidence-Based Policy. Journal of Computer-Mediated Communication, 18, 3 (2013), 303320.Google ScholarCross Ref
- Lwin, M. O., Stanaland, A. and Miyazaki, A. Protecting children's privacy online: How parental mediation strategies affect website safeguard effectiveness. Journal of Retailing, 4, 2 (2008), 205--217.Google Scholar
- Madden, M., Cortesi, S., Gasser, U., Lenhart, A. and Duggan, M. Where Teens Seek Online Privacy Advice. Pew Research Center's Internet & American Life Project, 2013, http://www.pewinternet.org/2013/08/15/where-teensseek-online-privacy-advice/.Google Scholar
- Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A. and Beaton, M. Teens, Social Media, and Privacy 2013, http://www.pewinternet.org/Reports/2013/Teens-SocialMedia-And-Privacy.aspx.Google Scholar
- Marwick, A. E. and boyd, d. Networked privacy: How teenagers negotiate context in social media. New Media & Society (July 21, 2014).Google Scholar
- Meulman, J. J. and Heiser, W. J. SPSS-Categories. 2004, http://www.helsinki.fi/~komulain/Tilastokirjat/IBMSPSS-Categories.pdf.Google Scholar
- Milne, G. R. and Culnan, M. J. Strategies for reducing online privacy risks: Why consumers read (or don't read) online privacy notices. Journal of Interactive Marketing, 18, 3 (2004), 15--29.Google ScholarCross Ref
- Miyazaki, A. D., & Fernandez, A. Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs, 35, 1 (2001), 27--44.Google ScholarCross Ref
- Moscardelli, D. M., & Divine, R. Adolescents' Concern for Privacy When Using the Internet: An Empirical Analysis of Predictors and Relationships With Privacy Protecting Behaviors. Family and Consumer Sciences Research Journal, 35, 3 (2007), 232--252.Google ScholarCross Ref
- Norberg, P. A., Horne, D. R., & Horne, D. A. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs, 41, 1 (2007), 100--126.Google ScholarCross Ref
- Nosko, A., Wood, E. and Molema, S. All about me: Disclosure in online social networking profiles: The case of FACEBOOK. Computers in Human Behavior, 26, 3 (2010), 406--418. Google ScholarDigital Library
- Palen, L. and Dourish, P. Unpacking "privacy" for a networked world. In Proc. Proceedings of the SIGCHI conference on Human factors in computing systems, ACM (2003), 129--136. Google ScholarDigital Library
- Rachels, J. Why privacy is important. In D. G. J. J. W. Snapper (ed.) Ethical issues in the use of computers, (1985), 194--200. Google ScholarDigital Library
- Schau, H. J. and Gilly, M. C. We are what we post? Self-presentation in personal web space. Journal of Consumer Research, 30, 3 (2003), 385--404.Google Scholar
- Schermelleh-Engel, K., Moosbrugger, H. and Müller, H. Evaluating the fit of structural equation models: Tests of significance and descriptive goodness-of-fit measures. Methods of psychological research online, 8, 2 (2003), 23--74.Google Scholar
- Seiffge-Krenke, I. Stress, coping, and relationships in adolescence. Lawrence Erlbaum, Mahwah, NJ, 1995.Google Scholar
- Sheehan, K. B. Toward a typology of Internet users and online privacy concerns. The Information Society, 18, 1 (2002), 21--32.Google ScholarCross Ref
- Shin, D. H. The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22, 5 (2010), 428--438. Google ScholarDigital Library
- Smith, H. J., Dinev, T. and Xu, H. Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35, 4 (2011), 989--1015. Google ScholarDigital Library
- Steinberg, L. Risk taking in adolescence: what changes, and why? Annals of the New York Academy of Sciences, 1021, 1 (2004), 51--58.Google ScholarCross Ref
- Steinberg, L. A social neuroscience perspective on adolescent risk-taking. Developmental review, 28, 1 (2008), 78--106.Google Scholar
- Stevenson, F. and Zimmerman, M. A. ADOLESCENT RESILIENCE: A Framework for Understanding Healthy Development in the Face of Risk. Annual Review of Public Health, 26 (2005), 399--419.Google ScholarCross Ref
- Tan, X., Qin, L., Kim, Y., & Hsu, J. Impact of privacy concern in social networking web sites. Internet Research, 22, 2 (2012), 211--233.Google ScholarCross Ref
- Tufekci, Z. Can You See Me Now? Audience and Disclosure Regulation in Online Social Network Sites. Bulletin of Science, Technology & Society, 28, 1 (February 1, 2008 2008), 20--36.Google Scholar
- Utz, S., & Kramer, N. The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3, 2 (2009).Google Scholar
- Vygostky, L. S. Mind in Society: The Development of Higher Psychological Processes. Harvard University Press, Cambridge, Mass, 1978.Google Scholar
- Walther, J. B. Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction. Communication Research, 23 (1996), 3--44.Google ScholarCross Ref
- Wisniewski, P., Xu, H., Rosson, M. B. and Carroll, J. M. Adolescent Online Safety: The "Moral" of the Story. In Proc. CSCW 2014 (2014). Google ScholarDigital Library
- Xu, H., Parks, R., Chu, C. H., & Zhang, X. L. Information disclosure and online social networks: From the case of Facebook news feed controversy to a theoretical understanding. In Proc. AMCIS 2010 (2010).Google Scholar
- Youn, S. Parental influence and teens' attitude toward online privacy protection. Journal of Consumer Affairs, 42, 3 (2008), 362--388.Google ScholarCross Ref
- Youn, S. Teenagers' perceptions of online privacy and coping behaviors: a risk-benefit appraisal approach. Journal of Broadcasting & Electronic Media, 49, 1 (2005), 86--110.Google ScholarCross Ref
Index Terms
- Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors
Recommendations
"Preventative" vs. "Reactive": How Parental Mediation Influences Teens' Social Media Privacy Behaviors
CSCW '15: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social ComputingThrough an empirical, secondary analysis of 588 teens (ages 12 - 17) and one of their parents living in the USA, we present useful insights into how parental privacy concerns for their teens and different parental mediation strategies (direct ...
Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure
CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing SystemsWe cannot fully protect adolescents from experiencing online risks; however, we can aim to better understand how online risk experiences impact teens, factors that contribute to or prevent teens from exposure to risk, as well as factors that can protect ...
Teen online information disclosure: Empirical testing of a protection motivation and social capital model
With bases in protection motivation theory and social capital theory, this study investigates teen and parental factors that determine teens' online privacy concerns, online privacy protection behaviors, and subsequent online information disclosure on ...
Comments