Abstract
Late adolescence represents an important life stage where children are becoming more independent and autonomous from their parents but are not quite old enough to go out on their own. Teenagers are also avid users of mobile devices and social media and actively use their smartphones to connect with friends and share their lives. Much of the research looking at teen technology use has employed a risk-centric approach; in other words, it takes the view that teens are putting themselves at risk by sharing personal information online, so the privacy-oriented solutions typically involve parental monitoring or technology restrictions. In this chapter, we review the research on teens, technology use, and privacy and discuss why such risk-centric models may be problematic to teens’ maturation. Instead, we argue that—much like it was for prior generations—risk-taking is a learning process critical to becoming a young adult and that teens do think about their privacy online, albeit in different ways than their adult counterparts. We offer design heuristics for developing tools for teens that allow for appropriate levels of risk-taking while protecting their privacy and ensuring their safety.
You have full access to this open access chapter, Download chapter PDF
Similar content being viewed by others
Keywords
1 Introduction
The impact social and mobile communication technologies have on young people cannot be understated. Networked communication technologies are an ever-present force in the lives of nearly all teenagers; according to Pew Research, 95% of teens ages 13–17 in the United States have access to smartphones, 89% go online multiple times a day—with 45% reporting near-constant connectivity [1]—and 71% use more than one social media platform [2]. Over half of teens in the United States have developed new friendships, flirted, and/or expressed romantic interest in someone through social media platforms like Instagram [3]. Common Sense Media [4, 5] reports that teens spend more than 7 h a day using screens, and the largest proportion of this time is spent on smartphones. As the Internet has become increasingly mobile and ubiquitous, teens no longer distinguish between “online” and “offline” spaces.
When describing teens and their prolific use of technology, the phrase “digital natives” [6] is often used to reference those who have grown up with modern technologies and particularly high-speed Internet access. However, this framing often incorrectly presupposes that everyone born in the twenty-first century is digitally literate and otherwise competent at technical activities, such as setting up an online account or changing privacy settings on a phone.
Hargittai [7] was one of the first scholars to note that the assumption that younger generations are inherently tech savvy is inaccurate and that web skills are not universal across all young people who use the Internet frequently. Her research showed that higher socioeconomic status, race (white or Asian), gender (male), and parental education are associated with higher levels of web skills. Hargittai suggests that most teens are more like “digital naives”—they are naive especially when it comes to “the critical knowledge to engage productively with networked situations, including the ability to control how personal information flows and how to look for and interpret accessible information” [8 , p. 180]. Indeed, Common Sense Media [5] found that teens and younger children (ages 10–18) possess poor digital literacy when it comes to assessing whether a piece of information is real or fake, with 31% reporting they shared a news story in the last 6 months that they later found out was untrue.
More broadly, society has also made numerous assumptions about teens and their digital privacy. For example, the assumption that teens are at extreme risk online because of their poor information disclosure decisions is prevalent in the literature (e.g., [9, 10]) and suggests that teens’ lack of privacy awareness leads to serious harms, ranging from inappropriate consumer data collection to online sexual predation. Wisniewski [11] cautions that this narrative may be potentially counter-productive because it victim-blames teens for not being able to make complex privacy decisions that research has consistently shown are equally difficult for adults [12, 13]. Sonia Livingstone, a leading expert in child online safety, also argues that there is little evidence that online risks present more harm than the risks teens typically encounter offline [14]; therefore, we should be careful to not treat online risks as an epidemic that plagues our youth.
In this chapter, we unpack and scrutinize some of the assumptions regarding teens, disclosure, and privacy and evaluate whether they hold up based on empirical research with teens. In the next section, we introduce digital privacy in relation to adolescence, which is a unique and important stage of human development. Next, we show how privacy research with teens presents some unique and paradoxical challenges—between trying to give teens the privacy and autonomy they need as they transition into adulthood and using surveillance tactics to keep them safe from online risks. Then, we present recent empirical research on networked privacy and teens. We conclude this chapter with actionable guidelines for designing systems that support the privacy and online safety of adolescents.
1.1 The Developmental Stage of Adolescence
Section Highlights
-
Adolescence is a unique developmental life stage where teens transition between childhood and emerging adulthood, distancing themselves from their parents.
-
Teenage years are characterized by increased sociality and peer pressure, the need for more autonomy and privacy, as well as heightened risk-seeking behaviors.
-
These key changes during adolescents often lead to conflict between parents and teens.
This chapter addresses the important—and often volatile—developmental stage of adolescence, which is characterized as between the ages of 10 and 19 by the World Health Organization [15]. However, within the digital privacy literature in the United States, the age range for adolescence is often bounded between the ages of 13 and 17 [16]. This is due, in part, to the Children’s Online Privacy Protection Act (COPPA) [17], which legally protects children under the age of 13 from unfair or deceptive collection, use, and/or disclosure of their personal information by online service providers, while age 18 is the legal definition for adulthood.
During adolescence, teens are both highly social and more risk-seeking than younger children [18]; they need independence to individuate themselves from their parents [19, 20] but are less capable than adults at managing online risks without some guidance [21]. In short, adolescence is a time of great change and conflict, both physically and mentally. As Dahl [22] notes, “by adolescence, individuals have matured beyond the frailties of childhood, but have not yet begun any of the declines of adult aging” (p. 3). The high school and college years are viewed as particularly transitional periods of adolescence—what Arnett [23] has termed “emerging adulthood”—when attitudes and beliefs are maturing and teens become less dependent on their parents. In transitioning away from dependence on their parents, teens become more reliant on and influenced by their peers during this time; peer influence peaks at age 14; after that, teens start building resistance to peer influences [24].
During adolescence, many teens experiment with “risky” behaviors, including sex, drinking, and smoking, and these behaviors are sometimes perpetuated through more intense peer pressure [25]. Such behaviors often create tension in families, as teens become more secretive [26], and parents are forced to balance their concerns for their teens’ safety with trusting their teens with more autonomy as they transition to young adults [27]. Some level of risk-taking and autonomy-seeking is a natural and necessary part of adolescence [28]. In fact, preventing such experiences may stunt developmental growth as teens strive to separate themselves from their parents to become well-adjusted and independent adults [18, 19, 29]. In the next section, we explain how the introduction of information and communication technologies have added to the challenges, tensions, and conflicts that arise for teens, and between teens and parents, during the unique transitional period of adolescence.
1.2 Adolescence as a “Privacy Paradox”
Section Highlights
-
Teens’ online disclosure behavior is often framed as paradoxical or problematic, putting them at greater risk for online dangers. Yet, adults face many of the same privacy challenges as teens.
-
Adults send conflicting messages to teens about their online privacy. Parents may tell them to be more private so that they can be safe online and then use privacy-invasive parental controls to ensure their online safety.
-
In order to design tools that meet teens’ privacy needs, we need to draw from evidence-based research, rather than the paternal instinct to shield teens from all online risks.
The “privacy paradox” (as defined in Chap. X) typically describes the discrepancy between Internet users’ high levels of stated privacy concerns versus their copious online disclosures [12, 30,31,32,33,34]. Yet, when Barnes [9] first coined the term in 2005, she specifically referred to the online dangers (i.e., sexual predators) teens faced because of their over-willingness to share personal information via social media; this behavior of public over-sharing was framed as paradoxical because it conflicted with teens’ desire to protect their publicly posted private thoughts from their parents—a primary source of safety and protection—rather than from complete strangers.
From a developmental perspective, however, this behavior is far from paradoxical; a teen’s need for autonomy from their parents is directly related to their need for privacy and respect [35]. Steeves and Regan [36] explain that young people place great social value on their online privacy and want policies that are fair and negotiable. The use of online surveillance—especially by parents [37]—can undermine trust and hinder relationship building. This is counterproductive since trust is also a critical factor in adolescents’ relationship with their parents [38], where some level of monitoring and information disclosure by teens is necessary, so that parents can ensure their teen is safe from online dangers [39].
At a societal level, the trade-offs between surveillance, privacy, and safety are both controversial and complex [40, 41]. For example, in the United States, most people value their civil liberties and their right to privacy over the government’s right to protect them from threats to their personal safety [42]. Yet, as adults, we do not afford the same level of privacy and personal agency to our youth, especially when trying to protect teens from online risks [43]. The “privacy as risk prevention” approach to online safety has resulted in privacy-invasive tools that allow parents to monitor and restrict their teens’ online behaviors [44,45,46], which exacerbate the privacy tensions between parents and teens [47,48,49,50,51].
Furthermore, such paternalistic, restrictive, and privacy-invasive approaches to online safety have been shown to be ineffective in protecting teens from online risks, harming the trust relationship between parents and teens, and can even limit potential opportunities youth garner by engaging with others online [50, 52,53,54,55]. This fear-based approach to privacy protection of teens has led to a new privacy paradox for adolescents [43]: On one hand, adults tell teens that they need to care about their online privacy to stay safe; on the other hand, as designers and parents, we develop and use surveillance technologies that take teens’ privacy away for the sake of their online safety.
To disentangle and resolve this paradox of modern adolescent online privacy, we argue that practitioners, researchers, and parents should turn to evidence-based research conducted with teens to understand how we can (1) move away from authoritarian and paternalistic models of privacy protection for teens to more resilience-based perspectives [56], (2) develop tools for teens that ensure their safety in a way that respects their privacy, (3) allow teens to engage online in ways that help them build skills and resilience related to online risks they might encounter, and (4) account for teens’ developmental needs as they transition through the uniquely tumultuous period of adolescence.
2 Teens and Networked Privacy: Empirical Evidence
Section Highlights
-
Teens value their online privacy and have unique strategies for how they manage it.
-
Sometimes, teens feel peer pressure to make online disclosures, even when they are concerned about privacy.
-
Teens’ strategies are often different than how adults manage online privacy, and we need to be careful not to make false assumptions about teens and privacy.
Marwick and Boyd’s [57] foundational work with teens provides pivotal insights into how teens negotiate their “networked privacy” on social media. The term “networked privacy” refers to the notion that individuals lack full control over how, when, and what personal information is shared about them online. Instead, privacy is collectively managed by individuals and others who co-own that information (cf. Sandra Petronio’s Communication Privacy Management (CPM) theory [58] in Chap. 2), including service providers like Facebook and Google. Marwick and Boyd’s [57] interviews with teens dispelled the myth that teens do not care about their online privacy; instead, teens go to great lengths to “be in public without always being public” (p. 1052). While teens might share frequently, this does not mean that what they share is meant for a wide audience [57].
In her book, It’s Complicated: The Social Lives of Networked Teens [8], Boyd uncovers a range of strategies teens employ online to ensure that content can be seen by their intended audience while remaining hidden or uninterpretable by others. For example, Boyd describes a teen girl who posts song lyrics to her Facebook page. By themselves, the lyrics appear innocuous, and her mother will not worry, but her close friends immediately know the ulterior meaning—she was upset. Boyd refers to this practice as “social steganography,” or hiding a message in plain sight.
Boyd’s ethnographic findings are supported through large-scale studies conducted by Pew Research. Through surveys and focus groups, Madden et al. [59] found that while teens share a lot of information through social media platforms, they also take steps to manage their identity and protect sensitive information, including deleting and de-tagging content, deleting friends, deactivating their profile, using inside jokes, and using fake names and/or profile information. Privacy concerns among teens also fuel the popularity of Snapchat among this age group [1] because shared content is usually only available for a short period of time before they become inaccessible. Privacy concerns are also linked to the increasing use of “fake” social media profiles like “Finstas,” where—compared to their “real” accounts—teens share less curated content with closer friends [60].
Taken together, this work confirms the central role social media plays in the modern lives of teens and highlights the interplay between sociality and privacy. The assumption that teens lack the ability to make calculated privacy decisions online has been debunked; teens do take protective measures against online risks and value their privacy, but they also value the social benefits of engaging online [8, 55, 61,62,63]. And even when teens are concerned about their privacy, they still report feeling pressured to make online disclosures to friends [64].
In the sections below, we discuss more recent empirical research on adolescents as it relates to their online privacy and safety. First, we explore privacy boundaries between parents and teens when negotiating technology use in the home. Then, we focus on teens themselves to show how they exhibit a markedly different privacy calculus than adults; they treat “risk as a learning process” [24], taking protective measures to recover once disclosures have escalated to the point of potentially harmful interactions. Next, we show how different parental mediation strategies (i.e., preventative versus reactive [65]) influence teen social media privacy behaviors. Finally, we conclude this section of the chapter with a discussion on the irrevocable, yet complex, relationship between privacy and online safety for teens.
2.1 Privacy Turbulence Within Families
Section Highlights
-
Technology provides new ways for parents to monitor teens.
-
Parental surveillance of teens’ online behaviors causes tensions within families, as teens desire autonomy and privacy from their parents.
-
Existing tools for monitoring teens online are heavily focused on parental control, using authoritarian restriction and privacy-invasive monitoring that negate the developmental needs of teens.
-
More tools need to be developed that support teen self-regulation, as well as collaborative practices and open communication within families.
As noted earlier, the teen years represent an important transitional time for parent-child interactions. Adults and teenagers have strongly differing attitudes about many of the most popular apps and platforms, which can aggravate existing tensions about technology use within families. Parents may struggle to use technology themselves and to understand how and why their teenage children use it so frequently [48, 51]. Communication technologies provide new ways for parents and children to connect, as well as new ways for parents to monitor their children’s online and offline behaviors. While this increased connection may help ease parental concerns, it also creates new sources of turbulence within families [66]. According to Cranor and colleagues’ [51] interview study with parents and teens, teens tend to view digital spaces as “personal and private,” while parents regard content shared online as “uncontrollable” and prefer to monitor or restrict it.
Parents’ rules about technology use—including when teens can use technology, what content they can access, and what controls they must turn over to parents—may create tension in parent-child relationships, especially as teens approach adulthood and seek greater autonomy. According to Yardi and Bruckman [50], teens—who often have greater knowledge and skills (compared to their parents) in applying technology workarounds—may rebel against their parents’ rules and engage in riskier behaviors to avoid technology constraints.
Wisniewski et al.’s [45] feature analysis of 75 commercially available parental control apps found that these tools often share fine-grained details about teenagers’ smartphone use, including websites visited, calls made, texts sent (including the actual content of the message), and GPS location with parents. For example, parents may require their teen to install a monitoring app on their smartphone or use tools like “Find My Phone” to share up-to-the-minute location data with parents. Parents also may use one of the many car applications that lets them set maximum speeds and stereo volume, as well as create a perimeter zone, which notifies them if the child leaves that zone [67].
Parents often feel caught between competing desires: They recognize the need to trust and respect their children’s emerging autonomy, but at the same time, they seek to preserve their teens’ physical safety and emotional well-being [52, 68]. Meanwhile, teens—and especially older teens—unequivocally prefer a level of trust and privacy from their parents, rather than technologies that act to monitor and restrict their online activities. For example, Ghosh et al. [37] analyzed 736 online reviews posted by teens and younger children about parental control apps available on Google Play; 76% of the reviews gave the apps a single star rating. Children strongly disliked these apps because they were overly restrictive, invasive of their personal privacy, and negatively impacted their relationships with their parents.
In light of this, we call for a paradigm shift toward family online safety apps that respect teens’ privacy, help teens self-regulate their own online behaviors, and improve communication between teens and parents. In one example of this, Wisniewski et al. [45] proposed the Teen Online Safety Strategies (TOSS) framework (Fig. 14.1 ) to balance tensions between parental control and teen self-regulation. In this framework, parental control strategies for online safety include monitoring, restriction, and active mediation [69, 70]. These strategies were based primarily on Valkenburg et al.’s [71] foundational work, which created scales assessing three styles of parental television mediation. They have since widely been adapted for use in the context of online parental mediation [69, 72,73,74].
The teen self-regulation strategies were drawn from the adolescent developmental psychology literature, which considers self-regulation a “resiliency factor” [75] that protects teens from offline risks by modulating emotions and behaviors through monitoring, inhibition, and self-evaluation [76,77,78]. Teen self-regulation strategies include self-monitoring, impulse control, and risk-coping. In order for teens to effectively self-regulate their online behaviors, they must be aware of their own actions through self-observation (i.e., self-monitoring) [77, 79]. Impulse control aids in self-regulation by inhibiting one’s short-term desires in favor of positive long-term consequences [80]. Risk-coping is a component of self-regulation that occurs after one encounters a stressful situation, which involves addressing the problem in a way that mitigates harm [76, 81]. It is largely influenced by teens’ self-appraisals of online risk based on their frequency of Internet use, risk experiences, and observed peers’ risk experiences [65, 82, 83]. The TOSS framework makes an explicit association between active parental mediation and teen risk-coping [45].
A number of researchers have called for new solutions that move away from parental control toward promoting positive parent-teen relationships and teen self-regulation of their online behaviors (e.g., [44, 46, 52, 55, 84, 85]). Human-computer interaction (HCI) researchers [85,86,87,88] have been at the forefront of this research, conceptualizing more collaborative technologies that engage parents with their children in digital rule-setting. For example, Ko et al. [87] developed a prototype called “FamiLync” that used participatory parental mediation; parents and teens engaged in co-learning activities around digital media use. This approach increased the shared understanding of smartphone use, fostered positive parent-teen relationships, and encouraged active participation in use-limiting activities, which significantly reduced overall smartphone usage [87]. Schiano and Burg [44] recently challenged interaction designers to reconceptualize parental control technologies as “collaborative self-regulation training tools” to help teach teens how to moderate their media use. Yet few, if any, technologies have been developed to help teens self-regulate and manage online privacy and/or safety risks in a meaningful way [45].
2.2 Risk as a Learning Process and the Suppressive Effect of Restrictive Parental Mediation During Adolescence
Section Highlights
-
Teens make privacy decisions differently than adults. They experiment with online disclosures and take protective measures retroactively once their privacy concern has been triggered.
-
Parents take both preventative and reactive measures to protect their teens online. Yet more authoritarian measures can have a suppressive effect by limiting teens’ online disclosures and risk-coping skills.
-
It may be beneficial to give teens some leeway to make mistakes, learn from them, and be able to recover.
To evaluate how teens think about and manage their privacy on social media, as well as how different parental mediation strategies affect this privacy regulation process, Wisniewski and colleagues [65, 82] conducted a secondary analysis of Pew Research dataset including teen and parent survey responses. In the first study, Jia et al. [82] compared the widely accepted concern-centric model of information privacy based on “Antecedents➔Privacy Concerns➔Outcomes” (or “APCO”)Footnote 1 to a newly proposed “risk-centric” model of information privacy developed for teens. They confirmed that the risk-centric model was a better representation of how teens made privacy disclosure decisions on social media than the concern-centric model. Instead of privacy concerns driving teens’ information disclosures or privacy protective behaviors, teens demonstrated what looked more like a risk escalation process (Fig. 14.2 in red) in which teens first make online disclosures that render them more susceptible to experiences of risky online interactions. In turn, these risky experiences are associated with higher levels of privacy concerns, leading to privacy-preserving behaviors (e.g., advice-seeking) and remedy/corrective risk-coping behaviors (e.g., deleting content, blocking another user, deactivating their account).
In a follow-up study, Wisniewski et al. [65] used the same dataset to determine how two different parental mediation strategies (direct intervention versus active parental mediation) affected this risk-taking process. Direct intervention included restrictive practices, such as using parental controls and changing the teen’s privacy settings for them, while active mediation focused more on talking to teens about what they post online or commenting on their posts. They found (Fig. 14.2 ) that direct parental intervention reduced teens’ overall information disclosures and privacy protective actions, while it was positively associated with advice-seeking. In contrast, active mediation was positively associated with more remedy/corrective or privacy protection behaviors.
In other words, direct parental intervention served as a preventative approach to privacy protection, while active mediation was more of a reactive approach, where parents engaged with teens to discuss what they are doing online and helped them recover if they did some mistakes online. When parents employed direct intervention without active mediation, this seemed to have the most suppressive effect on how frequently teens used social media and the diversity of their connections.
So while it may be possible that teens who have parents who directly intervene on the behalf of their online privacy are more discerning about the types of connections they make—in addition to reducing any possibly risky interaction online—this strategy may also reduce positive online interactions or even encourage teens to circumvent parental supervision by interacting with others more covertly through other means or platforms that are less visible to their parents.
Hearkening back to the developmental perspective on adolescence and risk-taking, these findings suggest that focusing only on shielding teens online may inhibit them from learning how to make appropriate online disclosures, learn from their own mistakes, and recover once they have encountered a privacy violation that makes them feel threatened.
3 Designing Sociotechnical Systems to Support Adolescence
Section Highlights
-
The Internet, social media, and mobile technologies provide both benefits and risks to teens.
-
To optimize the benefits, we must be careful not to overly protect teens by shielding them from all risks because these experiences help teens mature into adults.
-
We need to consider the developmental needs of teens when we design privacy mechanisms for their online safety.
As discussed in this chapter, adolescent online safety plays a central role in adolescent privacy research. Social and mobile technologies facilitate new opportunities for teens: they can benefit from online interactions that allow them to explore their self-identities, seek social support, and search for new information [53, 89]. However, these technologies may also amplify some existing risks.
The Crimes Against Children Research Center [90] reports that one in four youth in the United States has experienced unwanted exposure to Internet pornography, one in nine has been a victim of online harassment, and one in 11 reports receiving unwanted sexual solicitations online. The rates of depressive symptoms, self-harm, and teen suicide in the United States have increased with the rise in adolescent digital media use [91, 92]; while some researchers suggest that new technologies play a critical role in these negative trends [1, 93], others have shown these claims to be overstated [94, 95].
Teens themselves are ambivalent about the effect the Internet and social media has had on their lives: about a quarter feel that social media has had mostly a negative impact on their lives, 31% think it has a mostly positive effect, and 45% are neutral [1].
Our limited knowledge about what teens are doing online, concern for the personal information they are disclosing to others, and inability to protect them from harm fosters a sense of fear and constrains our ability to design privacy and safety mechanisms for online platforms that are developmentally appropriate for empowering adolescents in a way that they become risk resilient. As Boyd aptly put it in her book:
It is clear there is a sociotechnical gap between what we know about healthy adolescent development and the current systems designed to support adolescent privacy and online safety. The current paradigm for keeping teens safe online focuses heavily on paternalistic approaches that increase parental control through authoritarian and privacy-invasive parental features that monitor and restrict a teen’s online activities [45, 96,97,98]. Such solutions have repeatedly been shown to be ineffective, and even detrimental, to the trust relationship between teens and parents [37, 48, 52, 72, 99]. Additionally, there is little evidence that these technologies actually keep teens safe online and, more importantly, may hinder teens from learning important online safety skills and effectively managing online risks on their own [56, 96].
A more active approach, including talking to the teens about what they do online, sharing activities with them, and offering help, is linked to lower risk and harm, as well as more developed online skills [100], yet we are not currently designing tools to facilitate this process. Therefore, in the next section, we conclude this chapter with actionable guidelines for supporting online privacy and safety from an evidence-based and developmental perspective that is appropriate for the unique life stage of adolescence.
4 Design Guidelines for Privacy and Risk-Taking During Adolescence
Section Highlights
-
A user-centered approach to online privacy and safety considers the needs and desire of teens as key stakeholders.
-
Online privacy and safety tools for teens should be developmentally appropriate for allowing them to engage in appropriate levels of risk.
-
Systems should reward positive behavior and raise risk awareness so that teens can become good digital citizens and learn how to take privacy-preserving actions to ensure their own online safety.
-
There are trade-offs when designing for adolescent privacy, parental control, online safety, and trust.
-
The key to privacy design for adolescence is helping families negotiate online boundaries and balance these tensions.
Drawing from the evidence-based research presented in this chapter, we provide the following privacy design heuristics for adolescence.
Take a “User-Centered” Approach to Adolescent Privacy and Online Safety
First, we should refrain from fear-based and paternalistic privacy narratives about adolescents, their digital privacy, and their online safety. When we make decisions based on fear and protectionism, we take a stronger and more authoritarian stance than we would when taking a more rational and evidence-based approach. Further, when we design for parents without considering the needs of teens as key stakeholders in the design of technologies they will ultimately use, we are failing to take a user-centered approach to privacy design [101]. Therefore, it is important to first identify biases and assumptions about teens that are being used to design systems for them and to scrutinize these assumptions for validity.
Instead of designing for “parental control,” we should design solutions that encourage teens to reflect on and self-regulate their own behaviors. Engaging teens directly as end users of online safety apps may empower them by giving them more agency and choice, thereby increasing their sense of personal autonomy and control. We should leverage user-centered techniques to better understand what safety and privacy features teens would actually find useful. Instead of assuming that teens are inherently risk seekers, a more nuanced approach would be to work with teens (e.g., through participatory design or other approaches) and ask them in what ways they feel that they need to be kept safe and then provide features teens find personally beneficial.
Some Risk Is Essential for Teen Developmental Growth
We should design for features that help parents engage in conversations with their teens about their online risk-taking and risk-coping behaviors instead of concentrating on blocking all exposure to online risk. Parents should provide room for teens to make mistakes and recover from them, as this helps teens build resilience [43]. In cases where teens’ perceptions of what is considered risky online behavior conflict with their parents’ perception, it would be helpful to provide functionality that gives teens the possibility to negotiate the course of action with their parents [52].
For instance, instead of parental controls that unequivocally restrict teens from taking certain actions online (e.g., visiting a potentially risky website), teens might first be warned of the potential risk and be given the option to override the warning, and the software could involve the parent if the situation escalates. Allowing teens this kind of agency and choice would acknowledge that adolescence is characterized by a growing need for independence from parents but at the same time signal to teens that their parents trust them to make good decisions.
Design for Reward Instead of Punishment
We should design for online environments that encourage and reward teens for positive and pro-social behavior, rather than punishing them for perceived rule violations. Wisniewski et al.’s [49, 63] diary study with parents and teens found that teens often do not tell their parents about their online risk experiences because they are concerned that their parents will punish them and/or make the situation worse.
Instead, we should consider promoting open, honest, and nonjudgmental family communication about online safety, supporting teens in a way that helps them cope with and recover from privacy violations and online risk exposure. Further, parental control software could also leverage positive reinforcement more effectively. For instance, the Screen Time Companion appFootnote 2 offers a “reward time system” that allows teens to get extra time if they meet certain criteria specified by their parents. Reward systems are more contextualized restraints because they provide positive reinforcement and allow teens to earn privileges, as well as their parents’ trust [43].
Design for Raising Risk Awareness, Which Encourages a Protective Response from Teens
When teens make online disclosures that lead to risky online interactions and increased privacy concerns, this also leads to increased privacy-preserving behaviors as well as remedy/corrective risk-coping behaviors [82]. Therefore, we should find ways to raise risk awareness through “teachable moments [102],” which has been validated as a more effective approach within educational psychology research. Havighurst’s book (1953) on Human Development and Education explains developmental tasks must be learned at the right time so that learning can be most effective. For example, raising the risk awareness of teens in the context of a risky interaction (e.g., taking and sending an explicit photo) may be more effective than using generic warnings about appropriate sharing outside the context of that risky interaction. Therefore, we should design warning systems that make privacy risks more apparent to teens in order to enhance their privacy awareness, teach, and encourage appropriate risk-coping behaviors [102]. In this way, parental monitoring software could be transformed into online safety software to teach teens about how to manage their online interactions with others.
Design for Safety with Privacy and Trust in Mind
We should consider designing features that facilitate building trust and respect teens’ privacy. Most research shows teens value their privacy while interacting with others online [61, 62, 103, 104]. Teen’s need for privacy is directly tied to their need for autonomy and respect [35]. In the case of families, trust is a critical factor in an adolescent’s relationship with their parents [38]. Parental trust is based on knowledge of their children’s past and present behavior, and information disclosure from teens is necessary for “knowing” as a form of “trusting” [39]. Inversely, trust is also tightly coupled with privacy for adolescents, where “trusting” is a form of giving a teen the space and autonomy to not disclose information [35]. Some degree of trust is needed to promote independence in teens [51]. In the context of adolescent online safety, parents have to balance their children’s growing independence with their own concerns for safety [48]. Ultimately, all parents will have to rely on their teens behaving responsibly even when parents do not know where exactly they are or what they do; that is, parents just have to trust their teens’ good intentions, knowing that there is a possible risk for them behaving in an unwanted way [39] While some control may be necessary, instead of risking losing their teen’s trust by restricting or monitoring their technology use, parents should strive to build trusting relationships with their teens so that teens can both earn that trust and learn to self-regulate their own online behaviors into emerging adulthood [52]. Designing with privacy and trust in mind could include creating online safety apps that give parents helpful meta-level information regarding teens’ online activities instead of full disclosure of what teens do online [45, 52, 96].
For example, software could provide parents with only a summary of who their teen is engaging with via their mobile device and how often, as opposed to disclosing the content of the conversations. Features such as this would contribute to maintaining a trusting relationship between family members: Parents would know when there is something to worry about, and teens would know that their parents care and have some understanding of what the teens do online and who they interact with, but teens would not need to feel like they are being spied on [55].
Support Families in Online Boundary Negotiation
Privacy turbulence in families often occurs when teens do not feel like they have agency or when rules are miscommunicated, seem arbitrary, or seem overly restrictive [58]. Therefore, we should design systems that allow families to jointly negotiate and set boundaries related to technology use and renegotiate them when needed. Supporting this kind of open communication within families will help teens understand why specific rules exist, are likely to reduce uncertainty, and increase the likelihood that teens come to their parents with problems. In turn, it will help parents be less fearful about the online risks the Internet presents to their teens so that parents and teens feel empowered to leverage technology in beneficial ways. For instance, it would be beneficial to design evidence-based instructive media to educate parents and teens on digital privacy and online safety that includes how to help teens resolve privacy violations and negative online situations that may occur or after they have occurred. This approach would be analogous to providing comprehensive sex education, as opposed to abstinence-only approaches that have proven ineffective [105].
We might also reframe online safety and behaviors as joint family responsibilities, making teens and parents accountable to one another [49]. For example, accountability software detects and notifies adult peers of lapses of pornography addiction [106]. Perhaps a similar system could detect teen risk-seeking behaviors, prompt parents to inquire, encourage teens to ask their parents for advice, and even “nudge” [107] teens to change their behaviors. To close the loop, designers might also build mechanisms to keep parents accountable to teens for upholding the same moral character, teaching teens to “do as I do” instead of “as I say,” emphasizing joint accountability over strict and unidirectional parental oversight. Overall, we believe these guidelines will help families reduce privacy turbulence by establishing open communication and negotiation concerning shared rules and boundaries. It would help teens build resilience to online risks while respecting teens’ need for privacy, autonomy, and control.
5 Summary
Teen life in the twenty-first century is both very similar to and very different from that of their parents. While teens still push for autonomy and freedom to experiment and take risks, much of their behaviors are now captured on friends’ smartphones, shared on social media, and archived on search engines. Much of the research and media attention on teens’ technology use has focused on the risks and negative outcomes of this more public performance of adolescence, with the primary solution being more technology to closely monitor teens’ behaviors. In this chapter, we argue that technology designers must push beyond authoritative approach to parenting teens in the digital age and instead recognize the importance of risk-taking during this life stage and focus on more teen-centric design solutions that encourage reflection and discussion rather than surveillance and restriction.
Notes
- 1.
The APCO model was developed within the Information Systems (IS) field (see Chap. 3) and is typically applied to adult populations.
- 2.
References
Anderson, M., and J. Jiang. 2018. Teens, Social Media & Technology 2018. Washington, DC: Pew Research Center.
Lenhart, A., M. Duggan, A. Perrin, R. Stepler, L. Rainie, and K. Parker. 2015. Teens, Social Media & Technology Overview 2015. Washington, DC: Pew Research Center.
Lenhart, A., A. Monica, and A. Smith. 2015. Teens, Technology and Romantic Relationships. Washington, DC: Pew Research Center.
The Common Sense Census. 2015. Media Use by Tweens and Teens 2015. San Francisco, CA: Common Sense Media.
Robb, M.B. 2017. News and America’s Kids: How Young People Perceive and Are Impacted by the News. San Francisco, CA: Common Sense Media.
Palfrey, J.G., and U. Gasser. 2008. Born Digital: Understanding the First Generation of Digital Natives. New York: Basic Books.
Hargittai, E. 2010. Digital Na(t)ives? Variation in internet skills and uses among members of the “net generation”*. Sociological Inquiry. 80: 92–113. https://doi.org/10.1111/j.1475-682X.2009.00317.x.
Boyd, D. 2014. It’s Complicated: The Social Lives of Networked Teens. New Haven, CT: Yale University Press.
Barnes, S.B. 2006. A privacy paradox: Social networking in the United States. First Monday. 11 (9): 11–15.
Walrave, M., and W. Heirman. 2011. Disclosing or protecting? Teenagers’ online self-disclosure. In Computers, Privacy and Data Protection: An element of choice, 285–307. Dordrecht: Springer. https://doi.org/10.1007/978-94-007-0641-5_14.
Anjum, B. Ubiquity: An Interview with Pamela Wisniewski. https://ubiquity.acm.org/article.cfm?id=3301323. Last Accessed 29 Aug 2019.
Acquisti, A., and R. Gross. 2006. Imagined communities: Awareness, information sharing, and privacy on the Facebook. In Privacy Enhancing Technologies, 36–58. Berlin, Heidelberg: Springer.
Acquisti, A., and Grossklags, J. 2005. Uncertainty, ambiguity and privacy. Presented at the Fourth Annual Workshop Economics and Information Security (WEIS 2005).
Livingstone, S., and P.K. Smith. 2014. Annual research review: Harms experienced by child users of online and mobile technologies: The nature, prevalence and management of sexual and aggressive risks in the digital age. Journal of Child Psychology and Psychiatry 55: 635–654. https://doi.org/10.1111/jcpp.12197.
2003. Age limits and adolescents. Paediatr Child Health. 8: 577.
Pinter, A.T., Wisniewski, P., Xu, H., Rosson, M.B., Carroll, J.M. 2017. Adolescent online safety: Moving beyond formative evaluations to designing solutions for the future. In Proceedings of the International Conference on Interaction Design and Children.
Children’s Online Privacy Protection Rule (“COPPA”). 2013.
Steinberg, L. 2004. Risk taking in adolescence: What changes, and why? Annals of the New York Academy of Sciences 1021: 51–58. https://doi.org/10.1196/annals.1308.005.
Baumrind, D. 2005. Patterns of parental authority and adolescent autonomy. New Directions for Child and Adolescent Development. 2005: 61–69. https://doi.org/10.1002/cd.128.
Youniss, J., and J. Smollar. 1985. Adolescent Relations with Mothers, Fathers, and Friends. Chicago, IL: University of Chicago Press.
Cohn, L.D., S. Macfarlane, C. Yanez, and W.K. Imai. 1995. Risk-perception: differences between adolescents and adults. Health Psychology 14: 217.
Dahl, R.E. 2004. Adolescent brain development: A period of vulnerabilities and opportunities. Keynote Address. Annals of the New York Academy of Sciences. 1021: 1–22. https://doi.org/10.1196/annals.1308.001.
Arnett, J.J. 2012. New horizons in research on emerging and young adulthood. In Early Adulthood in a Family Context, ed. A. Booth, S.L. Brown, N.S. Landale, W.D. Manning, and S.M. McHale, 231–244. New York, NY: Springer. https://doi.org/10.1007/978-1-4614-1436-0_15.
Steinberg, L., and K.C. Monahan. 2007. Age differences in resistance to peer influence. Developmental Psychology 43: 1531–1543. https://doi.org/10.1037/0012-1649.43.6.1531.
Allen, J.P., M.R. Porter, and F.C. McFARLAND. 2006. Leaders and followers in adolescent close friendships: Susceptibility to peer influence as a predictor of risky behavior, friendship instability, and depression. Development and Psychopathology 18: 155–172. https://doi.org/10.1017/S0954579406060093.
Finkenauer, C., R.C.M.E. Engels, and W. Meeus. 2002. Keeping secrets from parents: Advantages and disadvantages of secrecy in adolescence. Journal of Youth and Adolescence. 31: 123–136. https://doi.org/10.1023/A:1014069926507.
Conflict Processes and Transitions in Parent and Peer Relationships: Implications for Autonomy and Regulation – W. Andrew Collins, Brett Laursen, Nicole Mortensen, Coral Luebker, Margaret Ferreira, 1997. https://journals.sagepub.com/doi/10.1177/0743554897122003. Last Accessed 29 Aug 2019.
Baumrind, D. 1987. A developmental perspective on adolescent risk taking in contemporary America. New Directions for Child Development 37: 93–125.
Steinberg, L., S.D. Lamborn, N. Darling, N.S. Mounts, and S.M. Dornbusch. 1994. Over-time changes in adjustment and competence among adolescents from authoritative, authoritarian, indulgent, and neglectful families. Child Development. 65: 754–770. https://doi.org/10.2307/1131416.
Acquisti, A., and J. Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security & Privacy. 3: 26–33.
Gambino, A., J. Kim, S.S. Sundar, J. Ge, and M.B. Rosson. 2016. User disbelief in privacy paradox: Heuristics that determine disclosure. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, 2837–2843. New York, NY: ACM. https://doi.org/10.1145/2851581.2892413.
Norberg, P.A., D.R. Horne, and D.A. Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs. 41: 100–126. https://doi.org/10.1111/j.1745-6606.2006.00070.x.
Phelan, C., C. Lampe, and P. Resnick. 2016. It’s creepy, but it doesn’t bother me. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 5240–5251. New York, NY: ACM. https://doi.org/10.1145/2858036.2858381.
Utz, S., and N. Krämer. 2009. The privacy paradox on social network sites revisited: The role of individual characteristics and group norms. Cyberpsychology: Journal of Psychosocial Research on Cyberspace. 3 (2): 1.
Rossler, B. 2005. The Value of Privacy. Cambridge: Polity Press.
Steeves, V., and P. Regan. 2014. Young people online and the social value of privacy. Journal of Information, Communication and Ethics in Society. https://doi.org/10.1108/JICES-01-2014-0004.
Ghosh, A.K., K. Badillo-Urquiola, S. Guha, J.J. LaViola Jr., and P.J. Wisniewski. 2018. Safety vs. surveillance: What children have to say about mobile apps for parental control. In Proceedings of the 2018 ACM Conference on Human Factors in Computing Systems. Montréal, Canada: ACM.
Williams, A. 2003. Adolescents’ relationships with parents. Journal of Language and Social Psychology. 22: 58–65. https://doi.org/10.1177/0261927X02250056.
Kerr, M., H. Stattin, and K. Trost. 1999. To know you is to trust you: Parents’ trust is rooted in child disclosure of information. Journal of Adolescence 22: 737–752. https://doi.org/10.1006/jado.1999.0266.
Lyon, D. 2006. Theorizing Surveillance. London: Routledge.
Nock, S.L. 1993. The Costs of Privacy: Surveillance and Reputation in America. Piscataway: Transaction Publishers.
Gao, G. What Americans think about NSA surveillance, national security and privacy. http://www.pewresearch.org/fact-tank/2015/05/29/what-americans-think-about-nsa-surveillance-national-security-and-privacy/. Last Accessed 17 July 2017.
Wisniewski, P. 2018. The privacy paradox of adolescent online safety: A matter of risk prevention or risk resilience? IEEE Security & Privacy. 16: 86–90. https://doi.org/10.1109/MSP.2018.1870874.
Schiano, D.J., and C. Burg. 2017. Parental controls: Oxymoron and design opportunity. In HCI International 2017 – Posters’ Extended Abstracts, 645–652. Berlin: Springer, Champions. https://doi.org/10.1007/978-3-319-58753-0_91.
Wisniewski, P., A.K. Ghosh, H. Xu, M.B. Rosson, and J.M. Carroll. 2017. Parental control vs. teen self-regulation: Is there a middle ground for mobile online safety? In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 51–69. New York, NY: ACM. https://doi.org/10.1145/2998181.2998352.
Collier, A. Less parental control, more support of kids’ self-regulation: Study. http://www.connectsafely.org/less-parental-control-more-support-of-kids-self-regulation-study/. Last Accessed 18 July 2017.
Child, J.T., and S. Petronio. 2011. Unpacking the paradoxes of privacy in CMC relationships: The challenges of blogging and relational communication on the internet. In Computer Mediated Communication in Personal Relationships, ed. Webb, K.W.& L., 21–40. New York: Peter Lang.
Erickson, L.B., P. Wisniewski, H. Xu, J.M. Carroll, M.B. Rosson, and D.F. Perkins. 2015. The boundaries between: Parental involvement in a teen’s online world. Journal of the Association for Information Science and Technology. https://doi.org/10.1002/asi.23450.
Wisniewski, P., H. Xu, M.B. Rosson, and J.M. Carroll. 2017. Parents just don’t understand: Why teens don’t talk to parents about their online risk experiences. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing, 523–540. New York, NY: ACM. https://doi.org/10.1145/2998181.2998236.
Yardi, S., Bruckman, A. 2011. Social and technical challenges in parenting teens’ social media use. Presented at the Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1979422. https://doi.org/10.1145/1978942.1979422.
Cranor, L.F., A.L. Durity, A. Marsh, and B. Ur. 2014. Parents’ and teens’ perspectives on privacy in a technology-filled world. In Proceedings of the Tenth Symposium on Usable Privacy and Security. Menlo Park, CA: USENIX.
Hartikainen, H., N. Iivari, and M. Kinnula. 2016. Should we design for control, trust or involvement? A discourses survey about children’s online safety. In Proceedings of the the 15th International Conference on Interaction Design and Children, 367–378. New York, NY: ACM. https://doi.org/10.1145/2930674.2930680.
Livingstone, S., and E. Helsper. 2010. Balancing opportunities and risks in teenagers’ use of the internet: The role of online skills and internet self-efficacy. New Media & Society. 12: 309–329. https://doi.org/10.1177/1461444809342697.
Mathiesen, K. 2013. The internet, children, and privacy: The case against parental monitoring. Ethics and Information Technology 15: 263–274. https://doi.org/10.1007/s10676-013-9323-4.
Hartikainen, H., M. Kinnula, N. Iivari, and D. Rajanen. 2017. Finding common ground: Comparing children’s and parents’ views on children’s online safety. In Proceedings of the 31st British Computer Society Human Computer Interaction Conference, 43:1–43:12. Swindon: BCS Learning & Development Ltd. https://doi.org/10.14236/ewic/HCI2017.43.
Wisniewski, P., H. Jia, N. Wang, S. Zheng, H. Xu, M.B. Rosson, and J.M. Carroll. 2015. Resilience mitigates the negative effects of adolescent internet addiction and online risk exposure. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 4029–4038. New York, NY: ACM. https://doi.org/10.1145/2702123.2702240.
Marwick, A.E., and D. Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New Media & Society 16: 1051–1067.
Petronio, S. 2010. Communication privacy management theory: What do we know about family privacy regulation? Journal of Family Theory & Review. 2: 175–196.
Madden, M., A. Lenhart, S. Cortesi, U. Gasser, M. Duggan, A. Smith, and M. Beaton. 2013. Teens, social media, and privacy. Pew Research Center 21 (1055): 2–86.
Dewar, S., S. Islam, E. Resor, and N. Salehi. 2019. Finsta: Creating “Fake” spaces for authentic performance. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, LBW1214:1–LBW1214:6. New York, NY: ACM. https://doi.org/10.1145/3290607.3313033.
Davis, K., and C. James. 2013. Tweens’ conceptions of privacy online: implications for educators. Learning, Media and Technology 38: 4–25. https://doi.org/10.1080/17439884.2012.658404.
Smith, P.K., J. Mahdavi, M. Carvalho, S. Fisher, S. Russell, and N. Tippett. 2008. Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry and Allied Disciplines 49: 376–385. https://doi.org/10.1111/j.1469-7610.2007.01846.x.
Wisniewski, P., H. Xu, M.B. Rosson, D.F. Perkins, and J.M. Carroll. 2016. Dear diary: Teens reflect on their weekly online risk experiences. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 3919–3930. New York, NY: ACM. https://doi.org/10.1145/2858036.2858317.
Agosto, D.E., and J. Abbas. 2017. “Don’t be dumb—that’s the rule I try to live by”: A closer look at older teens’ online privacy and safety attitudes. New Media & Society. 19: 347–365. https://doi.org/10.1177/1461444815606121.
Wisniewski, P., H. Jia, H. Xu, M.B. Rosson, and J.M. Carroll. 2015. “Preventative” vs. “Reactive”: How parental mediation influences teens’ social media privacy behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 302–316. New York, NY: ACM. https://doi.org/10.1145/2675133.2675293.
Child, J.T., and D.A. Westermann. 2013. Let’s be Facebook friends: Exploring parental Facebook friend requests from a communication privacy management (CPM) perspective. Journal of Family Communication. 13: 46–59. https://doi.org/10.1080/15267431.2012.742089.
Got a teen driver? Here is tech to help keep them safe, https://www.usatoday.com/story/tech/columnist/2017/06/25/got-teen-driver-here-tech-help-keep-them-safe/103076252/. Last Accessed 29 Aug 2019.
Czeskis, A., Dermendjieva, I., Yapit, H., Borning, A., Friedman, B., Gill, B., Kohno, T. 2010. Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety. Presented at the Proceedings of the Sixth Symposium on Usable Privacy and Security, 1837130. https://doi.org/10.1145/1837110.1837130.
Eastin, M.S., B.S. Greenberg, and L. Hofschire. 2006. Parenting the Internet. Journal of Communication. 56: 486–504. https://doi.org/10.1111/j.1460-2466.2006.00297.x.
Livingstone, S., L. Haddon, A. Görzig, and K. Ólafsson. 2011. Risks and Safety on the Internet: The Perspective of European Children. London: EU Kids Online.
Valkenburg, P.M., M. Krcmar, A.L. Peeters, and N.M. Marseille. 1999. Developing a scale to assess three styles of television mediation: “Instructive Mediation,” “Restrictive Mediation,” and “Social Coviewing.”. Journal of Broadcasting & Electronic Media. 43: 52–66.
Duerager, A., Livingstone, S. 2012. How can parents support children’s internet safety?
Livingstone, S., and E.J. Helsper. 2008. Parental mediation of Children’s internet use. Journal of Broadcasting & Electronic Media. 52: 581–599. https://doi.org/10.1080/08838150802437396.
Mesch, G.S. 2009. Parental mediation, online activities, and cyberbullying. Cyber Psychology and Behavior 12: 387–393.
Gardner, T.W., T.J. Dishion, and A.M. Connell. 2008. Adolescent self-regulation as resilience: Resistance to antisocial behavior within the deviant peer context. Journal of Abnormal Child Psychology. 36: 273–284.
Fingerman, K.L., J. Smith, and C. Berg. 2010. Coping and self-regulation across the life span. In Handbook of Life-Span Development. Cham: Springer Publishing Company.
Kopp, C.B. 1982. Antecedents of self-regulation: A developmental perspective. Developmental Psychology 18: 199–214. https://doi.org/10.1037/0012-1649.18.2.199.
Moilanen, K.L., K.E. Rasmussen, and L.M. Padilla-Walker. 2015. Bidirectional associations between self-regulation and parenting styles in early adolescence. Journal of Research on Adolescence (Wiley-Blackwell) 25: 246–262. https://doi.org/10.1111/jora.12125.
Bandura, A. 1991. Social cognitive theory of self-regulation. Organizational Behavior and Human Decision Processes. 50: 248–287. https://doi.org/10.1016/0749-5978(91)90022-L.
Bechara, A. 2005. Decision making, impulse control and loss of willpower to resist drugs: A neurocognitive perspective. Nature Neuroscience 8: 1458–1463. https://doi.org/10.1038/nn1584.
Lazarus, R.S. 2000. Toward better research on stress and coping. The American Psychologist. 55: 665–673.
Jia, H., P.J. Wisniewski, H. Xu, M.B. Rosson, and J.M. Carroll. 2015. Risk-taking as a learning process for shaping teen’s online information privacy behaviors. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 583–599. New York, NY: ACM. https://doi.org/10.1145/2675133.2675287.
d’Haenens, L., Vandoninck, S., Donoso, V. How to cope and build online resilience? http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/Home.aspx. Last Accessed 22 Oct 2019.
Law, D.M., J.D. Shapka, and B.F. Olson. 2010. To control or not to control? Parenting Behaviours and Adolescent Online Aggression. Computers in Human Behavior. 26: 1651–1656. https://doi.org/10.1016/j.chb.2010.06.013.
NSF Award Search: Award#1618153 – TWC SBE: Small: Helping teens and parents negotiate online privacy and safety. https://www.nsf.gov/awardsearch/showAward?AWD_ID=1618153&HistoricalAwards=false. Last Accessed 31 July 2017.
Hashish, Y., A. Bunt, and J.E. Young. 2014. Involving children in content control: A collaborative and education-oriented content filtering approach. In Proceedings of the 32Nd Annual ACM Conference on Human Factors in Computing Systems, 1797–1806. New York, NY: ACM. https://doi.org/10.1145/2556288.2557128.
Ko, M., S. Choi, S. Yang, J. Lee, and U. Lee. 2015. FamiLync: Facilitating participatory parental mediation of adolescents’ smartphone use. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 867–878. New York, NY: ACM.
Nouwen, M., JafariNaimi, N., Zaman, B. 2017, August 1. Parental controls: reimagining technologies for parent-child interaction. In Presented at the Proceedings of 15th European Conference on Computer-Supported Cooperative Work-Exploratory Papers, Reports of the European Society for Socially Embedded Technologies. https://doi.org/10.18420/ecscw2017-28.
Shapiro, L.A.S., and G. Margolin. 2014. Growing up wired: Social networking sites and adolescent psychosocial development. Clinical Child and Family Psychology Review 17 (1): 1–18. https://doi.org/10.1007/s10567-013-0135-1.
Jones, L.M., K.J. Mitchell, and D. Finkelhor. 2012. Trends in youth internet victimization: Findings from three youth internet safety surveys 2000–2010. Journal of Adolescent Health 50: 179–186. https://doi.org/10.1016/j.jadohealth.2011.09.015.
Center for Disease Control: FastStats. https://www.cdc.gov/nchs/fastats/suicide.htm. Last Accessed 24 Nov 2017.
Twenge, J.M., T.E. Joiner, M.L. Rogers, and G.N. Martin. 2017. Increases in depressive symptoms, suicide-related outcomes, and suicide rates among U.S. adolescents after 2010 and links to increased new media screen time. Clinical Psychological Science. https://doi.org/10.1177/2167702617723376.
Turkle, S. 2011. Life on the Screen. New York: Simon and Schuster.
Jensen, M., M.J. George, M.R. Russell, and C.L. Odgers. 2019. Young adolescents’ digital technology use and mental health symptoms: Little evidence of longitudinal or daily linkages. Clinical Psychological Science. https://doi.org/10.1177/2167702619859336.
Orben, A., and A.K. Przybylski. 2019. The association between adolescent Well-being and digital technology use. Nature Human Behaviour 3: 173–182. https://doi.org/10.1038/s41562-018-0506-1.
Ghosh, A.K., K. Badillo-Urquiola, M.B. Rosson, H. Xu, J.M. Carroll, and P.J. Wisniewski. 2018. A matter of control or safety? Examining parental use of technical monitoring apps on teens’ mobile devices. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 194:1–194:14. New York, NY: ACM. https://doi.org/10.1145/3173574.3173768.
Stevenson, F., and M.A. Zimmerman. 2005. Adolescent resilience: A framework for understanding healthy development in the face of risk. Annual Review of Public Health. 26: 399–419.
Hartikainen, H., N. Iivari, and M. Kinnula. 2015. Children and web 2.0: What they do, what we fear, and what is done to make them safe. In Nordic Contributions in IS Research, ed. H. Oinas-Kukkonen, N. Iivari, K. Kuutti, A. Öörni, and M. Rajanen, 30–43. Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-21783-3_3.
Shin, W., and N. Ismail. 2014. Exploring the role of parents and peers in young adolescents’ risk taking on social networking sites. Cyberpsychology, Behavior and Social Networking 17: 578–583. https://doi.org/10.1089/cyber.2014.0095.
Duerager, A., and Livingstone, S. How can parents support children’s internet safety? http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/Home.aspx, Last Accessed 22 Oct 2019.
Abras, C., D. Maloney-krichmar, and J. Preece. 2004. User-centered design. In Encyclopedia of Human-Computer Interaction, ed. W. Bainbridge. Thousand Oaks: Sage.
Havighurst, R.J. 1953. Human Development and Education. New York: Longmans, Green.
Helsper, Ellen Johanna. 2014. Boyd, Danah: It’s Complicated: The Social Lives of Networked Teens. New Haven: Yale University Press.
Wisniewski, P., H. Xu, M.B. Rosson, D.F. Perkins, and J.M. Carroll. 2016. Dear diary: Teens reflect on their weekly online risk experiences. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 3919–3930. New York: ACM. https://doi.org/10.1145/2858036.2858317.
Comprehensive Sex Education: Research and Results. http://www.advocatesforyouth.org/publications/1487. Last Accessed 4 Aug 2016.
Covenant Eyes.
Thaler, R.H., and C. Sunstein. 2008. Nudge: Improving Decisions About Health, Wealth, and Happiness. New Haven, NJ & London, U.K.: Yale University Press.
Acknowledgments
This research was supported in part by the William T. Grant Foundation under grant number #187941 and the US National Science Foundation under grant numbers CHS-1844881 and #IIP-1827700. Any opinion, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the research sponsors.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Copyright information
© 2022 The Author(s)
About this chapter
Cite this chapter
Wisniewski, P.J., Vitak, J., Hartikainen, H. (2022). Privacy in Adolescence. In: Knijnenburg, B.P., Page, X., Wisniewski, P., Lipford, H.R., Proferes, N., Romano, J. (eds) Modern Socio-Technical Perspectives on Privacy. Springer, Cham. https://doi.org/10.1007/978-3-030-82786-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-82786-1_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-82785-4
Online ISBN: 978-3-030-82786-1
eBook Packages: Computer ScienceComputer Science (R0)