skip to main content
10.1145/2675133.2675293acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

"Preventative" vs. "Reactive": How Parental Mediation Influences Teens' Social Media Privacy Behaviors

Authors Info & Claims
Published:28 February 2015Publication History

ABSTRACT

Through an empirical, secondary analysis of 588 teens (ages 12 - 17) and one of their parents living in the USA, we present useful insights into how parental privacy concerns for their teens and different parental mediation strategies (direct intervention versus active mediation) influence teen privacy concerns and privacy risk-taking and risk-coping privacy behaviors in social media. Our results suggest that the use of direct intervention by itself may have a suppressive effect on teens, reducing their exposure to online risks but also their ability to engage with others online and to learn how to effectively cope with online risks. Therefore, it may be beneficial for parents to combine active mediation with direct intervention so that they can protect their teens from severe online risks while empowering teens to engage with others online and learn to make good online privacy choices.

References

  1. The 17th ACM Conference on Computer-Supported Cooperative Work & Social Computing Conference Program. 2014, http://cscw.acm.org/2014/cscw2014_program.pdf.Google ScholarGoogle Scholar
  2. Ackerman, M. S. The intellectual challenge of CSCW: the gap between social requirements and technical feasibility. Human-Computer Interaction, 15, 2 (2000), 179--203. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Arbuckle, J. L. Amos SPSS, City, 2006.Google ScholarGoogle Scholar
  4. Barnes, S. B. A privacy paradox: Social networking in the United States, 2006.Google ScholarGoogle Scholar
  5. Baumrind, D. A developmental perspective on adolescent risk taking in contemporary America. New directions for child development, 37 (1987), 93--125.Google ScholarGoogle Scholar
  6. Baumrind, D. Patterns of parental authority and adolescent autonomy. New Directions for Child and Adolescent Development, 2005, 108 (2005), 61--69.Google ScholarGoogle ScholarCross RefCross Ref
  7. Buhler, T., Neustaedter, C. and Hillman, S. How and Why Teenagers Use Video Chat. In Proc. CSCW 2013 (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Crossler, R. E., Bélanger, F., Hiller, J. S., Park, J.-M., Hsiao, M., Channakeshava, K., Bian, K. and Korbich, E. Determinants of Protection Behaviors for Online Privacy of Children. In Proc. 39th Annual Meeting of The Decision Sciences Institute (2008).Google ScholarGoogle Scholar
  9. Cummings, E. M., Bergman, K. N. and Kuznicki, K. A. Emerging Methods for Studying Families as Systems. In Proc. PSU 20th Annual Symposium on Family Issues (2012).Google ScholarGoogle Scholar
  10. D'Haenens, L., Vandonink, S. and Donoso, V. How to cope and build resilience. EU Kids Online, 2013, http://eprints.lse.ac.uk/48115/1/How%20to%20cope%20and%20build%20online%20resilience%20%28lsero%29.pdf.Google ScholarGoogle Scholar
  11. Desmond, R. J., Singer, J. L. and Singer, D. G. Family Mediation: Parental Communication Patterns and the Influences of Television on Children. In J. Bryant (ed.) Television and the American Family, (1990), 293--309.Google ScholarGoogle Scholar
  12. Dinev, T., Xu, H. and Smith, H. J. Information Privacy Values, Beliefs and Attitudes: An Empirical Analysis of Web 2.0 Privacy. In Proc. Proceedings of 42th Hawaii International Conference on System Sciences (HICSS 42) (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Dürager, A. and Livingstone, S. How can parents support children's internet safety?, 2012, http://www.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/ParentalMediation.pdf.Google ScholarGoogle Scholar
  14. Eastin, M. S., Greenberg, B. S. and Hofschire, L. Parenting the Internet. Journal of Communication, 56, 3 (2006), 486--504.Google ScholarGoogle ScholarCross RefCross Ref
  15. Falk, R. F. and Miller, N. B. A primer for soft modeling. University of Akron Press, Akron, OH, 1992.Google ScholarGoogle Scholar
  16. Forte, A., Dickard, M., Magee, R. and Agosto, D. E. What do teens ask their online social networks?: social search practices among high school students. In Proc. Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, ACM (2014), 28--37. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Gefen, D., Rigdon, E. and Straub, W. D. An Update and Extension to SEM Guidelines for Administrative and Social Science Research. MIS Quarterly, 35, 2 (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Grinter, E. R. and Palen, L. Instant Messaging in Teen Life. In Proc. Proceedings of the 2002 ACM conference on Computer supported cooperative work (2002), 21--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Hasebrink, U., Görzig, A., Haddon, L., Kalmus, V. and Livingstone, S. Patterns of risk and safety online: indepth analyses. The London School of Economics and Political Science, London, UK., 2011,Google ScholarGoogle Scholar
  20. IBM. Categorical principal components analysis (CATPCA). 2014, http://pic.dhe.ibm.com/infocenter/spssstat/v20r0m0/index.jsp?topic=%2Fcom.ibm.spss.statistics.help%2Fidh_cpca.htm.Google ScholarGoogle Scholar
  21. Jia, H., Wisniewski, P., Xu, H., Rosson, M. B. and Carroll, J. M. Risk-taking as a Learning Process for Shaping Teen's Online Information Privacy Behaviors. In Proc. Computer-Supported Cooperative Work and Social Computing (2015). Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Kaiser, H. F. The application of electronic computers to factor analysis. Educational and psychological Measurement, 20 (1960), 141--151.Google ScholarGoogle Scholar
  23. Klein, P. S., Nir-Gal, O. and Darom, E. The Use of Computers in Kindergarten, With or Without Adult Mediation; Effects on Children's Cognitive Performance and Behavior. Computers in Human Behavior, 16, 6 (2000), 591--608.Google ScholarGoogle Scholar
  24. Kline, R. B. Principles and Practice of Structural Equation Modeling. The Guilford Press, New York, 2011.Google ScholarGoogle Scholar
  25. Lampe, C., Gurzick, D., Stutzman, F., Yardi, S. and Bruckman, A. Get Off My e-Lawn: Mulching Youth and Technology. In Proc. CSCW 2010 (2010).Google ScholarGoogle Scholar
  26. Lerner, R. M. Adolescence: Development, diversity, context, and application. Prentice-Hall, Upper Saddle River, NJ, 2002.Google ScholarGoogle Scholar
  27. Linting, M., Meulman, J. J., Groenen, P. J. F. and van der Koojj, A. J. Nonlinear principal components analysis: Introduction and application. Psychological Methods, 12, 3 (2007), 336--358.Google ScholarGoogle ScholarCross RefCross Ref
  28. Livingstone, S., Haddon, L., Görzig, A. and Ólafsson, K. Risks and safety on the internet: The perspective of European children. EU Kids Online, 2011, http://eprints.lse.ac.uk/33731/.Google ScholarGoogle Scholar
  29. Livingstone, S. and Helsper, E. J. Parental Mediation of Children's Internet Use. Journal of Broadcasting & Electronic Media, 52, 4 (2008), 581--599.Google ScholarGoogle ScholarCross RefCross Ref
  30. Livingstone, S., Ólafsson, K., O'Neill, B. and Donoso, V. Towards a better internet for children: findings and recommendations from EU Kids Online to inform the CEO coalition., The London School of Economics and Political Science, London, UK., 2012,Google ScholarGoogle Scholar
  31. Madden, M., Cortesi, S., Gasser, U., Lenhart, A. and Duggan, M. Parents, Teens, and Online Privacy. Pew Research Center's Internet & American Life Project, 2012, http://pewinternet.org/Reports/2012/Teens-and-Privacy.aspx.Google ScholarGoogle Scholar
  32. Madden, M., Cortesi, S., Gasser, U., Lenhart, A. and Duggan, M. Where Teens Seek Online Privacy Advice. Pew Research Center's Internet & American Life Project, 2013, http://www.pewinternet.org/2013/08/15/where-teens-seek-online-privacy-advice/.Google ScholarGoogle Scholar
  33. Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A. and Beaton, M. Teens, Social Media, and Privacy 2013, http://www.pewinternet.org/Reports/2013/Teens-Social-Media-And-Privacy.aspx.Google ScholarGoogle Scholar
  34. Madden, M., Lenhart, A., Duggan, M., Cortesi, S. and Gasser, U. Teens and Technology 2013 Pew Internet, 2013, http://www.pewinternet.org/Reports/2013/Teens-and-Tech/Summary-of-Findings.aspx.Google ScholarGoogle Scholar
  35. Malhotra, N. K., Kim, S. S. and Agarwal, J. Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15, 4 (December 2004), 336--355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Mesch, G. S. Parental Mediation, Online Activities, and Cyberbullying CyberPsychology & Behavior, 12, 4 (2009), 387--393.Google ScholarGoogle Scholar
  37. Mitchell, K. J., Finkelhor, D. and Wolak, J. Youth Internet Users at Risk for the Most Serious Online Sexual Solicitations. American Journal of Preventive Medicine, 32, 6 (2007), 532--537.Google ScholarGoogle ScholarCross RefCross Ref
  38. Rosen, L. D., Cheever, N. A. and Carrier, L. M. The association of parenting style and child age with parental limit setting and adolescent MySpace behavior. Journal of Applied Developmental Psychology, 29, 6 (2008), 459--471.Google ScholarGoogle ScholarCross RefCross Ref
  39. Schermelleh-Engel, K., Moosbrugger, H. and Müller, H. Evaluating the fit of structural equation models: Tests of significance and descriptive goodness-of-fit measures. Methods of psychological research online, 8, 2 (2003), 23--74.Google ScholarGoogle Scholar
  40. Shin, W., Huh, J. and Faber, R. J. Tweens' Online Privacy Risks and the Role of Parental Mediation. Journal of Broadcasting & Electronic Media, 56, 4 (2012), 632--649.Google ScholarGoogle ScholarCross RefCross Ref
  41. Smith, H. J., Dinev, T. and Xu, H. Information Privacy Research: An Interdisciplinary Review. MIS Quarterly, 35, 4 (2011), 989--1015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Sorbring, E. and Lundin, L. Mothers' and fathers' insights into teenagers' use of the internet. New Media & Society, 14, 7 (2012), 1181--1197.Google ScholarGoogle ScholarCross RefCross Ref
  43. Stevenson, F. and Zimmerman, M. A. Adolescent Resilience: A Framework for Understanding Healthy Development in the Face of Risk. Annual Review of Public Health, 26 (2005), 399--419.Google ScholarGoogle ScholarCross RefCross Ref
  44. Tabachnick, B. G. and Fidell, L. S. Using Multivariate Statistics. Pearson Education, Inc., Boston, 1996.Google ScholarGoogle Scholar
  45. Valkenburg, P. M., Krcmar, M., Peeters, A. L. and Marseille, N. M. Developing A Scale to Assess Three Styles of Television Mediation: "Instructive Mediation," "Restrictive Mediation," and "Social Coviewing". Journal of Broadcasting & Electronic Media, 43, 1 (1999), 52--66.Google ScholarGoogle ScholarCross RefCross Ref
  46. Wisniewski, P., Xu, H., Rosson, M. B. and Carroll, J. M. Adolescent Online Safety: The "Moral" of the Story. In Proc. CSCW 2014 (2014). Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Xu, H., Dinev, T., Smith, H. J. and Hart, P. Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View. In Proc. Twenty Ninth International Conference on Information Systems (2008).Google ScholarGoogle Scholar

Index Terms

  1. "Preventative" vs. "Reactive": How Parental Mediation Influences Teens' Social Media Privacy Behaviors

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CSCW '15: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing
          February 2015
          1956 pages
          ISBN:9781450329224
          DOI:10.1145/2675133

          Copyright © 2015 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 28 February 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          CSCW '15 Paper Acceptance Rate161of575submissions,28%Overall Acceptance Rate2,235of8,521submissions,26%

          Upcoming Conference

          CSCW '24

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader