Academia.eduAcademia.edu

Tweens' conceptions of privacy online: implications for educators

There is considerable debate about young people’s concern for privacy today, given their frequent use of social media to share information and other content about themselves and others. While researchers have investigated the online privacy practices of teens and emerging adults, relatively little is known about the attitudes and behaviors of younger youth. Drawing on interviews with 42 middle school students, or ‘tweens’, we explore how youth in this age group think about and manage privacy issues online, as well as the messages they report hearing from educators about online privacy. Our findings suggest that most tweens value privacy, seek privacy from both strangers and known others online, and use a variety of strategies to protect their privacy online. Further, tweens’ online privacy concerns are considerably broader than the ‘stranger danger’ messages they report hearing from teachers. We discuss the educational implications of these findings.

This art icle was downloaded by: [ Harvard College] On: 27 April 2012, At : 06: 09 Publisher: Rout ledge I nform a Lt d Regist ered in England and Wales Regist ered Num ber: 1072954 Regist ered office: Mort im er House, 37- 41 Mort im er St reet , London W1T 3JH, UK Learning, Media and Technology Publicat ion det ails, including inst ruct ions f or aut hors and subscript ion inf ormat ion: ht t p: / / www. t andf online. com/ loi/ cj em20 Tweens' conceptions of privacy online: implications for educators a Kat ie Davis & Carrie James a a Graduat e School of Educat ion, Harvard Universit y, Cambridge, MA, USA Available online: 19 Mar 2012 To cite this article: Kat ie Davis & Carrie James (2012): Tweens' concept ions of privacy online: implicat ions f or educat ors, Learning, Media and Technology, DOI: 10. 1080/ 17439884. 2012. 658404 To link to this article: ht t p: / / dx. doi. org/ 10. 1080/ 17439884. 2012. 658404 PLEASE SCROLL DOWN FOR ARTI CLE Full t erm s and condit ions of use: ht t p: / / www.t andfonline.com / page/ t erm s- andcondit ions This art icle m ay be used for research, t eaching, and privat e st udy purposes. Any subst ant ial or syst em at ic reproduct ion, redist ribut ion, reselling, loan, sub- licensing, syst em at ic supply, or dist ribut ion in any form t o anyone is expressly forbidden. The publisher does not give any warrant y express or im plied or m ake any represent at ion t hat t he cont ent s will be com plet e or accurat e or up t o dat e. The accuracy of any inst ruct ions, form ulae, and drug doses should be independent ly verified wit h prim ary sources. The publisher shall not be liable for any loss, act ions, claim s, proceedings, dem and, or cost s or dam ages what soever or howsoever caused arising direct ly or indirect ly in connect ion wit h or arising out of t he use of t his m at erial. Learning, Media and Technology 2012, 1–22, iFirst article Tweens’ conceptions of privacy online: implications for educators Katie Davis∗ and Carrie James Graduate School of Education, Harvard University, Cambridge, MA, USA Downloaded by [Harvard College] at 06:09 27 April 2012 (Received 24 October 2011; accepted 6 January 2012) There is considerable debate about young people’s concern for privacy today, given their frequent use of social media to share information and other content about themselves and others. While researchers have investigated the online privacy practices of teens and emerging adults, relatively little is known about the attitudes and behaviors of younger youth. Drawing on interviews with 42 middle school students, or ‘tweens’, we explore how youth in this age group think about and manage privacy issues online, as well as the messages they report hearing from educators about online privacy. Our findings suggest that most tweens value privacy, seek privacy from both strangers and known others online, and use a variety of strategies to protect their privacy online. Further, tweens’ online privacy concerns are considerably broader than the ‘stranger danger’ messages they report hearing from teachers. We discuss the educational implications of these findings. Keywords: digital media; privacy; middle school students; Internet safety; citizenship curricula Introduction Marisa1 is a 10-year-old Latina youth who enjoys participating in virtual worlds and using instant messenger and Facebook to socialize with her friends. As she engages in these activities, Marisa is keenly aware of risks – especially those related to privacy. When she goes online, she considers ways to protect her privacy from both strangers and friends. Although she is only 10 years old, Marisa’s online privacy strategies are fairly sophisticated. She withholds sensitive, personal information from her Facebook profile and takes more proactive measures, such as using privacy settings and blocking unwanted contacts online. Marisa’s strategies are informed by interactions with her parents, who give advice and oversee her online activities, and by her own practice of pausing and reflecting before posting content online. Her concerns about privacy are also informed by messages she has heard from teachers, which make her fearful of contact with strangers online. ∗ Corresponding author. Email: [email protected] ISSN 1743-9884 print/ISSN 1743-9892 online # 2012 Taylor & Francis http://dx.doi.org/10.1080/17439884.2012.658404 http://www.tandfonline.com Downloaded by [Harvard College] at 06:09 27 April 2012 2 K. Davis and C. James In this paper, we draw on the voices of young people like Marisa in order to explore how youth think about and manage privacy issues online. Given the increasing use of the Internet and social media by children, tweens, and teens, privacy has emerged as an urgent topic of concern among parents, educators, and policymakers. A growing body of research suggests that while teens share a great deal online, their willingness to share does not mean that they care little for privacy. Less is known, however, about the attitudes and behaviors of younger youth and the role of educators in shaping these attitudes and behaviors. Such insight is needed in order to design effective educational interventions that are tied directly to early adolescents’ distinct experiences with and understanding of online privacy. The current study involved in-depth interviews with 42 ‘tweens’, youth aged 10– 14 years who were attending middle school at the time of their interview. We sought to understand the extent to which youth in this age group value privacy, the particular concerns they have about privacy online, the strategies they adopt to protect it, how they make decisions about what to share or withhold online, and the messages they hear from educators about privacy issues online. Research context Youth’s attitudes toward online privacy Recent studies of youth’s digital media use confirm what parents and educators already know: young people share a considerable amount of information about themselves online. A 2006 survey of American teens (aged 12–17 years) found that 82% of teens with online profiles include their first name on their profile; 79% include photos of themselves; 61% include their city or town; and 49% include their school’s name (Lenhart and Madden 2007). Since 2006, the amount of time that US teens spend online has increased (Lenhart 2011), and their information disclosure has followed suit (Lenhart et al. 2011; Thomas 2010). In addition, there is evidence to suggest that younger adolescents share more about themselves online than older adolescents; in their study of 12–18 year-old youth in Sydney, Australia, De Souza and Dick (2009) found that 12–14 year-olds disclosed more personal information on MySpace than 15–18 year-olds. Young people’s willingness to disclose information about themselves online is sometimes taken as proof that they do not care about their privacy (Marwick, Diaz, and Palfrey 2010). However, recent empirical evidence indicates that youth are both aware of and care about privacy risks online. A 2010 survey of 13– 17 year-olds living in the USA found that 88% of teens said they worry about the consequences of posting their contact information online (Thomas 2010). Additionally, many respondents displayed awareness that what they post online may affect various aspects of their lives, such as their reputation, safety, and friendships, as well as their ability to get a job in the future and their chances of being admitted to the college of their choice. Younger adolescents and children are also concerned about their privacy Downloaded by [Harvard College] at 06:09 27 April 2012 Learning, Media and Technology 3 online (Devitt and Roker 2009; Lwin, Stanaland, and Miyazaki 2008; Steeves and Webster 2008; Youn 2009), with a majority believing that it is unsafe to post personal information online (Thomas 2008). There appears to be a disconnect between youth’s desire to protect their privacy online and their willingness to share personal information on sites like Facebook. In fact, existing evidence suggests that the two are uncorrelated (Christofides, Muise, and Desmarais 2009; De Souza and Dick 2009; Tufecki 2008). To explain this disjunction, Livingstone (2008)—whose research involves British teens—suggests that youth’s conception of privacy online has less to do with the types of information they disclose and more to do with their desire to exert control over this information. According to Livingstone, ‘. . . teenagers must and do disclose personal information in order to sustain intimacy, but they wish to be in control of how they manage this disclosure’ (2008, 405). Empirical evidence suggests that many young people living in Western societies feel they possess such control (Marwick, Diaz, and Palfrey 2010). This perception of control may help explain why youth are at once concerned about their privacy and willing to share their personal information online. Social pressures are another likely cause of the disconnect between youth’s concern about privacy and their online sharing habits. Social network sites like Facebook have become a central gathering place and mode of communication for young people (De Souza and Dick 2009; Debatin et al. 2009). Eighty percent of US teens with Internet access (Lenhart et al. 2011) and 82% of young adults use social network sites (Purcell 2011). A young person who chooses not to participate on these sites risks social isolation from his or her peers (boyd 2007; Tufecki 2008). For many youth in Western societies, the social rewards of sharing personal information online outweigh the perceived risks to their privacy (boyd and Marwick 2011). The centrality of peers on social network sites may also illuminate an apparent disjunction between adults’ and youth’s online privacy concerns. While adults are primarily concerned with protecting young people from strangers online, the privacy concerns of North American youth extend to known others (Harris 2010; Steeves and Webster 2008). For both high school students and undergraduates, these known others tend to be adults, such as parents, teachers, and employers, although certain peers (e.g., acquaintances, romantic partners) may also be counted in this list (boyd and Marwick 2011; Marwick, Diaz, and Palfrey 2010; Thomas 2010; West, Lewis, and Currie 2009). Because they regard sites like Facebook as peer spaces, youth do not welcome the (increasingly large) presence of adults on these sites. In fact, many youth view their presence as an invasion of privacy (boyd and Marwick 2011). Youth’s privacy-protecting behaviors online Adolescents and emerging adults employ a variety of strategies for protecting their privacy from both known and unknown others online. In fact, there is Downloaded by [Harvard College] at 06:09 27 April 2012 4 K. Davis and C. James evidence that young people’s privacy-protecting behaviors on social network sites have increased over time to the point where they are more likely to engage in these behaviors than older adults (Marwick, Diaz, and Palfrey 2010; Young 2009). In their review of research on youth’s online privacy practices, Marwick, Diaz, and Palfrey (2010) identified two broad categories of strategies employed by adolescents living in the USA, the UK, the European Union, and Canada. Avoidance strategies involve choosing not to use certain websites. Approach strategies include more proactive behaviors, such as providing false personal information, reading privacy statements, using privacy settings, and seeking advice from parents, teachers, or friends (Youn 2009). With respect to advice-seeking, a 2011 survey of 12– 17 year-olds living in the USA found that fully 97% of respondents reported that they had received advice from at least one person about how to use the Internet safely and responsibly (Lenhart et al. 2011). Providing false personal information emerged as the most popular privacy strategy among one sample of US high school students between the ages of 14 and 17 years (Moscardelli and Divine 2007). The popularity of this strategy seems only to have increased in the years since that study was conducted. A 2011 survey of US teens found that 49% of 12– 13 year-olds and 42% of 14– 17 year-olds admitted to falsifying their age online (Lenhart et al. 2011). As Marwick, Diaz, and Palfrey (2010) observe, these data suggest that youth’s privacy-protecting behaviors, while perhaps more widespread than adults’, may also be less ethical. Drawing on interviews with US high school students, boyd and Marwick (2011) offer an alternate framework for understanding youth’s privacy-protecting behaviors. Instead of avoidance and approach strategies, they distinguish between social and structural strategies for creating privacy online. With respect to social strategies, boyd and Marwick use the term ‘social steganography’ to describe youth’s practice of hiding in public on social network sites like Facebook. This is done by using language and images that hold a particular meaning to a particular group of people. For instance, a young person might post lyrics to a song that played at a recent party or a quote from a movie that is popular among his or her close friends. Anyone who is not privy to these shared experiences, such as a parent, might infer an entirely different meaning from an exchange between friends than the friends themselves. In this way, youth embed hidden messages in the content they post publicly online. Structural strategies involve making use of the technological affordances available on particular sites to control access to specific content (boyd and Marwick 2011). Examples of structural strategies include using privacy settings and creating restricted friend lists on social network sites. boyd and Marwick observe that this strategy is limited by the fact that youth do not always understand how to make use of technological affordances to protect their privacy online. This limitation may be particularly prominent among younger youth, Learning, Media and Technology 5 Downloaded by [Harvard College] at 06:09 27 April 2012 who tend to have a less sophisticated understanding of the technical and social complexity of the internet (Yan 2005, 2006). Teaching online privacy The research into youth’s privacy attitudes and practices suggests a number of areas in which young people could benefit from educational supports. One such area includes education around the properties of networked publics that distinguish them from offline contexts and limit individuals’ ability to exert full control over the information they share online (boyd 2007). An understanding of how easy it is to reproduce, spread, and search for information online, as well as how difficult it can be to delete information once it has been posted, may temper youth’s confidence in their ability to retain control over what they share online. Other opportunities for intervention include educating youth about the use of privacy settings and engaging youth in conversations about the ethical implications of certain privacy-protecting behaviors like falsifying personal information online. Over the course of the last decade, a variety of educational curricula have been developed in the USA that aim to promote young people’s safe, responsible, and ethical behavior online. Examples include i-SAFE’s Internet Safety curriculum (http://www.isafe.org), Common Sense Media’s Digital Literacy and Citizenship curriculum (http://www.commonsensemedia.org/), and the educational materials produced by Web Wise Kids (http://www.webwisekids. org/). Some schools and school districts now mandate the use of such curricula as part of their educational technology initiatives. Indeed, in order to qualify for federal technology funds, the Protecting Children in the 21st Century Act requires schools to demonstrate that they have taken steps to educate students about appropriate online behavior. While the research into youth’s privacy attitudes and practices suggests these efforts are well-placed, their effects on youth’s online behavior remain unknown. It is not clear what messages youth take away from school-based initiatives, or whether these messages encompass the full range of privacy-related issues that youth confront online. The current study To date, most of the research on youth’s online privacy attitudes and practices has involved high school and college students (e.g., boyd and Marwick 2011; Christofides, Muise, and Desmarais 2009; Lenhart and Madden 2007; Moscardelli and Divine 2007; Peluchette and Karl 2008; Robards 2010; Tufecki 2008; West, Lewis, and Currie 2009; Youn 2008; Young 2009). Relatively little is known about the attitudes and behaviors of younger youth, including the role of educators in shaping these attitudes and behaviors (Youn 2009). While tweens’ technical understanding of the Internet is comparable to older adolescents, their understanding of the Internet’s social complexity – including Downloaded by [Harvard College] at 06:09 27 April 2012 6 K. Davis and C. James online privacy – is somewhat less sophisticated (Yan 2005, 2006). This difference in understanding may give rise to distinct conceptions of and approaches to online privacy. In order to build effective educational interventions for middle school students around online privacy, it is important to understand how they think about these issues. Moreover, the few studies that do involve tweens (e.g., Devitt and Roker 2009; Lwin, Stanaland, and Miyazaki 2008; Steeves and Webster 2008; Youn 2009) have not typically asked participants to reflect on the broad range of their privacy concerns, including their efforts to secure privacy from both known and unknown others. For instance, studies conducted by Lwin, Stanaland, and Miyazaki (2008) and Youn (2009) examined preteen and early adolescents’ privacy practices in the context of e-marketing; these practices may differ markedly from those used to secure privacy from parents, teachers, or friends. The current study addresses this gap in the literature by drawing on interviews with 42 middle school students. It is guided by the following research questions: Research Question 1: How do middle school students think about and manage privacy in new media environments? Research Question 2: What messages do they receive from educators about online privacy? Method Sample We recruited students from eight middle schools and one after school program in three school districts in the Greater Boston area. In order to obtain a diverse sample, we sought participants from six urban schools with racially and socioeconomically diverse students and from two suburban schools with largely white, upper-middle class students. The recruitment process involved two stages. First, we conducted surveys with a representative population at each school. Then, based on survey responses, we selected the most digitally engaged students to invite for interviews; we chose these students based on the assumption that their rich experiences would enhance their ability to reflect on the ethical issues and dilemmas with which we presented them. Students were contacted with an invitation to participate in interviews either by email or through a teacher at their school; parental consent was obtained before interviews were conducted. Between February and August 2010, we conducted in-depth interviews with 42 youth between the ages of 10 and 14 years. The demographic characteristics of the sample are reported in Table 1. The online activities in which participants engaged included texting, talking on a cell phone, instant messaging, playing games, and the use of social network sites such as Facebook and, less often, Learning, Media and Technology 7 Downloaded by [Harvard College] at 06:09 27 April 2012 Table 1. Demographic characteristics of sample. Age Range Mean Gender Female Male Grade in school 5th grade 6th grade 7th grade 8th grade Race Asian Black White Other Ethnicity African East Asian European-American Latino South Asian Other No response Mother’s education Less than high school High school graduate or GED Some college College graduate Graduate or professional degree Don’t know or did not report 10–14 years 12 years 24 participants 18 participants 12 11 9 10 4 18 11 9 4 2 2 10 2 7 15 2 7 6 9 8 10 MySpace. Many of our participants reported that they were under-aged users of social networks; researchers kept this information confidential, in accordance with human subjects requirements. Data collection Given our research goals – to understand how youth think about their online choices – we chose in-depth interviews as our principal method. In contrast to surveys, interviews allow for probing of participants’ responses in order to capture rich details and nuances in their thinking and the subjective meaning Downloaded by [Harvard College] at 06:09 27 April 2012 8 K. Davis and C. James they grant to their activities (Weiss 1995). Our research team included five interviewers trained in qualitative methods. We conducted one-to-one interviews with participants in unoccupied classrooms and conference rooms either after school or during a study period. We interviewed each participant twice; on average, each interview lasted 45 minutes. By arranging two interviews, we ensured that we would have ample time to cover all of our questions without tiring participants or overly disrupting their schedules. Because the current study is part of a broader investigation into the ethical dimensions of young people’s online activities, our interview protocols included questions that extend beyond privacy, such as plagiarism, cyberbullying, and identity play. We asked different kinds of questions about these key topics in each of the two interviews conducted with each participant. We also posed general questions about participants’ activities and choices online, and we asked them to respond to hypothetical scenarios. We used visual materials to facilitate our conversations with youth, such as colorful images depicting different new media activities and authentic mock-ups of social network profiles. We asked participants a number of questions to elicit their conceptions of online privacy. We asked them to share their personal definitions of privacy; the strategies they use to create privacy online; the targets of their privacy strategies (i.e., the individuals from whom they seek privacy online); any experiences with privacy lapses online; and the messages heard from others (especially adults) about privacy online. We also raised privacy issues through the hypothetical scenarios. For example, we asked participants to respond to a mock social network profile in which a hypothetical friend was sharing emotions about family conflicts. Data analysis Interviews were digitally recorded and transcribed verbatim for coding and analysis. In addition, after each interview, researchers recorded notes about participants’ responses to key questions, memorable anecdotes, and details about interview context and rapport. A team of five researchers developed the coding scheme, composed of both etic codes (derived from our research questions and the literature) and emic codes (themes which emerged from the stories and perspectives shared by our interview participants) (Glaser and Strauss 1967; Miles and Huberman 1994). Codes used in this analysis are described in Table 2. Codes were tied to specific interview questions; however, we also coded for unprompted comments. For example, in coding for ‘online privacy strategies’, we examined responses to one interview question, ‘How do you create privacy online?’ in addition to all other mentions of privacy-protecting behaviors. Findings from this code generated a subcode about how youth make decisions about which online privacy strategies to adopt. Members of the research team obtained intercoder reliability through a multi-stage process that began with independently coding the same transcript Learning, Media and Technology 9 Table 2. Code descriptions. Downloaded by [Harvard College] at 06:09 27 April 2012 Privacy definition Online privacy targets Online privacy strategies Online privacy lapses Parent and teacher messages What does privacy mean to you? Who do you want privacy from online? How do you create privacy online? Has someone ever not respected your privacy online? Have you ever talked with anyone about privacy on the Internet? Have you ever talked with an adult? How about your parents? Has anyone spoken at your school about Internet safety or cyber-bullying? What did they say? for a given set of codes. We then entered the coding into a qualitative software package (N’Vivo) and conducted a coding comparison test that produced the following statistics: Percentage of Agreement in the application of a given code; Kappa (a measure of agreement that takes chance into account); and Code Occurrence, or the percentage of each transcript in which the code was applied. We discussed any disagreements revealed by these tests and refined code definitions as needed. Following guidelines suggested by Landis and Koch (1977), we repeated this process until acceptable levels of Kappa (above 0.70) and Percentage of Agreement (above 0.80) were obtained; for the privacy codes, this process required two rounds of testing. We then divided and coded the transcripts independently. Reliability statistics for each code discussed in this paper are reported in Table 3. Given that we asked different questions in interview 1 and interview 2, we conducted separate reliability tests for each interview and reported results accordingly. Findings Findings from our study suggest that middle school-aged youth, or ‘tweens’, value privacy, seek privacy from both strangers and known others, and pursue various strategies to protect their privacy online. However, the messages they report hearing from educators focus on a rather narrow set of concerns. Below, we draw on the voices of our study participants to illustrate these findings. Tweens’ definitions of privacy In order to elicit tweens’ personal definitions of privacy – whether online or offline – we asked them, ‘What does the word privacy mean to you?’ Like Marisa, nearly all participants (n ¼ 41, 98%) reported definitions that we would classify as ‘conventional’ – focused on maintaining control over their personal information and protecting it from unwanted audiences. For example, 10-year-old Gavin said privacy is ‘. . . not putting too much information. Keeping yourself confidential and not showing too much of your 10 K. Davis and C. James Table 3. Reliability statistics, by code. Round 1 Downloaded by [Harvard College] at 06:09 27 April 2012 Node Privacy, all codes (interview 1) Privacy, all codes (interview 2) Privacy definition (interview 1) Privacy definition (interview 2) Online privacy strategies (interview 1) Online privacy strategies (interview 2) Online privacy targets (interview 1) Online privacy targets (interview 2) Online privacy lapses (interview 1) Online privacy lapses (interview 2) Parent messages (interview 1) Parent messages (interview 2) Teacher messages (interview 1) Teacher messages (interview 2) Round 2 Code Code Agreement occurrence Agreement occurrence Kappa (%) (%) Kappa (%) (%) 0.95 97.81 35.34 0.77 92.01 26.96 0.68 86.70 36.02 0.74 89.33 33.90 1 100 0.45 1 100 2.73 1 100 0 1 100 0.00 0.31 80.14 26.07 0.97 99.03 18.15 0.71 93.81 15.08 0.77 94.13 18.17 0.51 90.18 16.00 0.79 94.50 18.32 0.37 92.00 10.62 0.76 94.94 14.18 1 100 0.15 0.87 99.95 0.22 1 100 0 1 100 0.00 0.74 91.84 23.38 0.99 99.73 11.68 0.70 90.61 23.95 0.91 96.09 34.32 0.73 96.19 9.56 1 99.93 9.66 0.80 95.55 14.98 0.84 95.73 18.49 identity online and stuff’. Gavin sees privacy as something to be protected or controlled by holding back information. Christina, age 11, spoke about privacy in terms of limiting audiences for her online content: ‘just letting people that you know see it . . . like the things you put on your email or your Facebook or stuff like that’. Some tweens explicitly mentioned privacy invasions when discussing their definitions. For example, Zachary, age 12, talked about privacy as follows: I think of just being alone in the house or somewhere quiet. And online, to me, privacy is something like not a million people knowing who I am, not constantly Learning, Media and Technology 11 trying to talk to me or bugging me or stuff like that. No viruses, no spyware, no key loggers, no Trojans, no stalking, stuff like that. Downloaded by [Harvard College] at 06:09 27 April 2012 The privacy definitions shared by most tweens in our study suggest that they value this concept and would not subscribe to the famous statement made by Sun Microsystems’ CEO Scott McNealy in 1999 that ‘You have zero privacy, anyway. Get over it’. Only one tween suggested that privacy is not relevant or valued. Perry, age 14, said, ‘I don’t really think [privacy] means much anymore at this point. I mean, privacy to me is – most of my life is very public, and I know that’. Privacy targets Tweens mentioned unwanted audiences for their online content at various points in the interviews. We also asked them the direct question, ‘Who do you want privacy from when you’re online?’ Participants cited a range of targets. Perhaps not surprisingly, strangers (‘people I don’t know’) were cited frequently, by 33 youth, or 79% of the sample. Emma, age 13, said she wanted privacy from: People who I don’t know. Like people from other countries I don’t really want looking at my profile. Like I’m fine with someone from [the] high school looking at mine, even though they didn’t really know me. Like that’s okay, because they live in the same town and I know a lot of – most people in this town are like good kids. Emma differentiates between distant strangers (‘people from other countries’) and near strangers (high school students in her hometown). Terms like ‘creepy people’ and ‘predators’ were used by some youth when they mentioned distant strangers, which suggests a sense of fear about contact with unknown others online. While fear of strangers was evident, participants were even more likely to cite wanting privacy from a ‘known other’; 35 tweens, or 83% of the sample, cited at least one known individual. Marisa, described above, sought privacy from both friends and strangers. Similarly, when asked who she wants privacy from online, Makayla, age 12, said, ‘Mostly friends. And mostly family members. Because if something happened, or I fell down, or a joke happened that is going to hurt me, or teasing, I’m going to be like, “Man, why did you put that up? I don’t like that”’. As suggested by Makayla, tweens’ concerns often focused on the potential for the known others to share embarrassing information about them. Looking more specifically at known targets, 30 tweens (71% of the sample) cited at least one known adult (a parent, teacher, other family member, and/or unspecified adults). Brianna, age 14, mentioned a specific event in explaining why she wanted privacy from adults at school: ‘Like in school, yeah. Like one day, I was using my phone and [my teacher] took it from me, and they went through my texts to see who I was texting’. Jonah, age 14, talked about 12 K. Davis and C. James AIM, an instant messaging tool, as providing an important space for youth to vent with peers about adults online: Downloaded by [Harvard College] at 06:09 27 April 2012 Adults . . . Like on AIM, I just want it to be like a teenager world . . . Because sometimes you do talk about your teachers or your parents and how they’re, what they’re doing, and how it frustrates you and gets you mad and stuff. Two-thirds of the sample (28 tweens, 67%) named other youth, such as friends, peers, siblings, and cousins, as privacy targets. Caleb, age 10, said ‘My friends. I wouldn’t know [sic] them to know specific things about me’. Like many of our participants, Caleb suggests that there are certain things about himself that he withholds from even his friends. Other participants were explicit in placing their privacy concerns in the context of peer conflict – ‘drama’ – that they have observed and fear. Ashley, age 12, wants privacy from ‘Just people . . . who like to start drama’. Related to this finding, we asked youth if they have ever felt that their own privacy was disrespected or invaded online. Only 10 participants (24%) reported an incident; notably, of these incidents, 7 (70%) were perpetrated by known others – for example, an adult or friend looking at participants’ online content without permission, forwarding a text, IM, or FB message to unintended audiences, or sharing something about them that they had shared in confidence. Moreover, regardless of whether they personally experienced a privacy invasion online, many of our participants mentioned stories about friends or peers who had experienced invasions from known others. Other specific targets mentioned less frequently by youth were institutions that can subject youth to surveillance (such as the police and the government) or individuals who can harm them (hackers, terrorists). One participant mentioned advertisers (‘spammers’) and one participant displayed awareness of future audiences when he cited future hockey coaches as targets from whom he wants privacy online. Privacy management Given tweens’ conventional definitions of privacy and the range of target audiences they seek to avoid online, it is important to look at how they manage this complex landscape. We asked participants how they create privacy online and whether they felt it was ‘hard’ to do so. With respect to the latter question, nearly half of the sample (19 tweens, or 45%) responded that creating privacy online was not hard. However, another 19 participants said that they felt privacy was hard to create and 4 of these participants said that they ‘can’t’ create privacy online or that they ‘don’t know how’ to do it. One tween said that creating privacy online is just as difficult as creating it offline, and three tweens were not asked or did not respond to the question. Despite the difficulties, some tweens reported with creating privacy online, all of our participants spoke about using privacy strategies, at least for certain Learning, Media and Technology 13 situations and contexts online, and most (36, or 86%) use a combination of strategies. Below, we describe two important dimensions of privacy management observed among the tweens in our study: the strategies they adopt – the things they do or don’t do – in order to protect their privacy online, and the processes or factors that inform the strategies they choose. With respect to the former, our analysis revealed that participants employ withholding, proactive, or no privacy strategies. With respect to the latter, we identified three decision-making processes: interactions with others, reflection, and what we have termed the ‘default’ approach. Downloaded by [Harvard College] at 06:09 27 April 2012 Privacy strategies Withholding strategies. Mirroring the avoidance strategies identified by Marwick, Diaz, and Palfrey (2010), nearly all the participants in our study (40, or 95%) talked about strategies that involve withholding content from online spaces. Tweens talked about not posting certain personal information (such as their full names, addresses, and phone numbers) on their social network, instant messaging, or virtual world profiles. On Facebook, Ben, age 12, shares only his birth month and day, not the year, and his home state, but not the specific town in which he lives. Kevin, age 11, shares different kinds of information, depending on the platform he is using: Like for example, [on] Twitter, people could follow me any time they want to. So I just put a little bit of information and don’t say that much. And like IM (instant messenger), I put a lot of, mostly a lot of my information, because it’s just my friends and family, not other people, [on IM]. In talking about online privacy, some participants used the terms ‘appropriate’ and ‘inappropriate’ to refer to the kind of content they post or avoid posting online. Ahmed, age 12, asserted, ‘I only put appropriate stuff. I don’t talk about private things on MySpace’. Examples of inappropriate content mentioned by tweens include naked pictures and comments containing swear words or sexual content. Lindsay, age 11, talked about withholding information that could be potentially embarrassing, ‘I don’t like giving information about me because I think it’s going to be embarrassing, so I just keep it to myself’. Proactive strategies. Thirty-eight participants, 90% of the sample, spoke about using more ‘proactive’ measures to protect their privacy online. Adjustment of privacy settings on social networks to ‘friends only’ was the most prevalent proactive strategy, used by 27 participants. Fifteen participants (36%) spoke about embedding false information into their online profiles in order to protect their privacy. Notably, three of these youth shared that these deceptive privacy tactics were suggested by parents. Monitoring social network comments and photos in which one is ‘tagged’ – and deleting and ‘untagging’ as necessary – was another proactive strategy mentioned. Like many youth in 14 K. Davis and C. James Downloaded by [Harvard College] at 06:09 27 April 2012 our sample, 13-year-old Kiara is friends with her mother on Facebook; she said that she untags herself from embarrassing baby pictures that her Mom posts. Seven participants talked about more involved strategies for managing different audiences online and for creating more private spaces. Jade, age 14, actively maintains two Facebook accounts – one account that is open to her family and church friends, and one account for her school friends only. This strategy alleviates Jade’s fears that her family and church circle will witness inappropriate online comments and photos posted by her school friends on Facebook. Another participant, Emily, age 12, talked about how she creates privacy on IM: ‘On IM, I usually make a chat room with only the people that I want to tell, and I just tell them’. Absent strategies. While all participants in our study use withholding and/or proactive strategies at least some of the time, we observed that eight of these youth fail to employ privacy strategies on certain platforms or in certain situations online. Five of these tweens were unaware of privacy options on specific sites. For example, Tyler, age 12, uses proactive strategies (such as deception) to protect his privacy in a virtual world, but he was unaware of privacy settings on Facebook. Another participant, 13-year-old Danielle, chooses ‘friends only’ for photos when prompted by Facebook to choose who can see them; however, she was unaware of the general settings for her profile. Two participants reported awareness of privacy settings but had not bothered to adjust them, and one participant ‘randomly’ accepts friend requests in a game world. Tweens’ decision-making processes Interactions with others. Thirty-three participants (79% of the sample) spoke about conferring with close relations when making decisions about how to manage their own and others’ privacy online. Twenty-seven participants (64%) said that they confer with parents, and 16 (38%) reported talking with other youth (siblings or friends). Only one participant mentioned talking with a teacher. We classified such conversations as ‘interactions’ and observed both voluntary and involuntary forms. The majority of references to interactions (71%) appeared to be voluntary, 19% were involuntary, and the remaining references were unclear. Voluntary cases included those in which tweens sought advice from parents or friends in relation to posting information or photos, adjusting privacy settings on social networks, and responding to friend requests from unknown people. Emma, age 13, spoke about turning to friends when she feels unsure about content she has posted online, ‘Sometimes I’ll just post some [information online] and if my friends will be – and then I’ll ask my friends if it’s okay and they’ll either say, “Delete” or they’ll say, “Yeah, it’s fine”’. Six tweens (14%) spoke about checking in with friends before posting photos or comments about them online. These kinds of interactions were rarer in our sample, but are worth noting given the kinds of concerns tweens expressed Downloaded by [Harvard College] at 06:09 27 April 2012 Learning, Media and Technology 15 about privacy lapses by known others online. Impressively, three tweens talked about creating explicit guidelines with family or friends to respect each other’s privacy online. For example, when asked how she creates privacy for her cell phone, 11-year-old Lindsay said, ‘Me, my mom, and my sisters, we all agreed that nobody looks at nobody’s phone, unless you tell them to’. Less voluntary interactions included parents monitoring participants’ Facebook walls or watching over their shoulders as they communicate over instant messenger. When asked about her online interactions, 10-year-old Marisa said that she is careful about what she says and with whom she interacts ‘because my mom watches the conversation’. We also examined the privacy strategies suggested by these interactions. We found that the majority of references to interactions (58%) suggested proactive privacy strategies, over a third (36%) suggested withholding strategies, and the remaining references did not indicate a specific privacy strategy. Reflection. Twelve tweens, or 29% of the sample, told us that they take time to reflect on the potential consequences, for themselves or another person, of posting information or content online. The phrase, ‘think before you post’, was used by some tweens to capture the essence of this decision-making practice. Ben, age 12, articulated his approach by stating, ‘. . . you just have to think before you put stuff up. Because when you put something on the Internet, it stays there . . . So anybody can always find you and stuff’. Ben’s recognition that content persists online informs his reflective approach to making decisions about what he shares and, in this case, leads him to employ a withholding strategy. However, for other tweens, the relationship between reflection and privacy strategies is less clear; most participants spoke in generalities about using the process of reflection, but did not indicate the extent to which it led them to withholding or proactive strategies. The default approach. Four tweens (10% of the sample) reported using what we call a ‘default’ approach to privacy choices online – they made a conscious choice to accept the default privacy settings on a given site based on the belief that the site designers considered privacy issues and built adequate privacy protections into the site’s architecture. These tweens’ comments suggest that their understandings were not always accurate. Anthony, age 11, said, ‘You have to be friends to look at each others’ information. I guess that’s the rule on Facebook. It’s [the] law’. And Jose, age 12, said, ‘Like in Twitter or on Facebook, you have to put where you live. And mostly, they only let you put Boston, Massachusetts, and that’s it’. Educators’ messages about online privacy As discussed, a majority of tweens in our study cited use of ‘interactive approaches’, or conferring with adults or friends, to help guide their Downloaded by [Harvard College] at 06:09 27 April 2012 16 K. Davis and C. James decision-making online. We also asked participants several direct questions about the Internet-related topics that adults (educators and parents) have discussed with them. Thirty-eight participants (90% of the sample) reported receiving messages about online privacy from an adult. Of these participants, 34 (89%) reported hearing messages from parents or other adult family members and 24 (63%) reported messages from educators. We were also interested in the substance of the messages heard from adults, especially educators. The most frequent messages tweens reported hearing from educators were ‘Don’t post personal information online’ (e.g., address, location, phone number) and ‘Avoid interacting with strangers’. Seventy-one percent of the participants who had received messages from educators said they heard a ‘don’t post’ message, and 54% heard warnings about stranger interactions. Tweens reported hearing these two messages nearly as often from parents, although the top parent message was ‘Don’t post inappropriate content online’. One participant’s account highlights how the ‘don’t post’ and ‘stranger danger’ messages were often shared simultaneously by educators. Elevenyear-old Maya said, [My teacher] talked to us about it, and then when I got home I checked everything, just to make sure. I just got scared. Like I would go on Facebook and I’d check the account setting, and all that. I learned that not to share your personal things with people who you don’t know, because they can just come to your house. A response from another participant suggested that some educators use extreme scare tactics to get their messages across to youth. Marisa, age 10, said: ‘[My computer lab teacher] said that people on the Internet, they can threaten you. . .they’re going to hunt you and kill you. And that. . .they can find you and rape you’. Other messages heard from educators focused on data security (using strong passwords) (cited by four tweens); the importance of using privacy settings (four tweens); the public nature of the Internet and the persistence of content online (three tweens); and suggestions of safe websites (three tweens). Only one tween reported hearing a message from a teacher about respecting others’ privacy online. Discussion To date, most of the research on youth’s online privacy practices has involved high school and college students (e.g., boyd and Marwick 2011; Christofides, Muise, and Desmarais 2009; Lenhart and Madden 2007; Moscardelli and Divine 2007; Peluchette and Karl 2008; Robards 2010; Tufecki 2008; West, Lewis, and Currie 2009; Youn 2008; Young 2009). The current study investigated conceptions of and experiences with online privacy among a group of Downloaded by [Harvard College] at 06:09 27 April 2012 Learning, Media and Technology 17 younger adolescents between the ages of 10 and 14 years. Although age restrictions ostensibly prevent youth under the age of 13 years from accessing many websites, the reality is that youth in this age group are often frequent participants in online social networks and other spaces (Lenhart et al. 2011). Despite earlier research showing developmental differences in youth’s understanding of the Internet’s social complexity (Yan 2005, 2006), our findings revealed that tweens display many (though not all) of the same attitudes and behaviors around online privacy as older adolescents and emerging adults. Our findings also provide new insight into the decision-making processes that inform tweens’ privacy strategies; the privacy-protecting messages that tweens hear from their teachers; the relationship between teachers’ messages and tweens’ privacy concerns; and opportunities for educational intervention around tweens’ online privacy practices. Consistent with research on high school and college students (Marwick, Diaz, and Palfrey 2010; Thomas 2010), the youth in our sample care about their privacy when they go online. They desire control over their personal information, and they want to feel they are protected from the attention of unwanted audiences, including people they know. Most participants displayed multiple privacy strategies, such as withholding information online and using privacy settings, and decision-making processes, such as conferring with close relations and reflecting independently on whether they should post certain content. These approaches appear to be influenced more by their peers and parents than by their teachers. Although participants did discuss hearing messages about privacy from teachers, these messages focused narrowly on stranger danger. In this section, we discuss these findings in light of existing literature and explore their educational implications. Like older youth (e.g., boyd and Marwick 2011; Harris 2010), early adolescents desire privacy from known others in addition to strangers when they go online. In fact, the participants in our sample discussed wanting privacy from people they know more frequently than they discussed wanting privacy from strangers. They were more likely to identify adults than other youth, although fully two-thirds of our sample did say they sometimes want privacy from friends, acquaintances, siblings, or cousins. Participants were also more likely to talk about invasions of privacy involving people they know rather than strangers. These findings suggest that, by focusing their privacy messages on strangers, teachers are not addressing the full range of youth’s online privacy concerns. As boyd and Marwick (2011) found with the high school students they interviewed, the middle school students in our study regard sites like Facebook primarily as peer spaces. They may be ‘friends’ with their parents and other family members, but they do not want everything they post on Facebook to be viewed by these adults. In fact, they do not even want everything they share online to be viewed by all of their peers. By expanding their privacy discussions to include such concerns, teachers will be more aligned with what their Downloaded by [Harvard College] at 06:09 27 April 2012 18 K. Davis and C. James students are actually doing online. These discussions could help youth understand when it is and is not reasonable to expect privacy from certain people. Moreover, teachers could use these discussions to encourage their students to think about how their online actions affect other people’s privacy. Another area of opportunity for educational intervention concerns the strategies that youth employ to protect their privacy online. Over one-third of participants in our study said that they include false information about themselves to protect their privacy online. Although this is lower than the rate for older adolescents (13– 17 years) (Thomas 2010), it nevertheless represents a sizable minority of youth. Disguising one’s true identity is not uncommon online. Indeed, on many sites, including child-centered sites like Habbo Hotel, users are prohibited from providing their real names. However, there is a qualitative difference between presenting a username that is immediately recognized as such by others and creating a false identity intended to be taken at face value by certain people. The latter act suggests that it is acceptable to mislead other people in order to protect oneself. The ethics of such a stance are dubious. We believe it is an area around which teachers could engage their students in thoughtful conversations about the impact their actions have on other people and the communities in which they participate online. Such discussions represent a promising opportunity to promote students’ digital citizenship. Falsifying personal information was by no means the only strategy that the youth in our sample employed to protect their privacy online. Fully 86% of participants reported using multiple strategies that we categorized as either withholding or proactive strategies. These categories correspond to the avoidance and approach strategies discussed by Marwick, Diaz, and Palfrey (2010). Further, the most widespread proactive strategy in our sample, using privacy settings, corresponds to the structural strategies described by boyd and Marwick (2011). Notably, however, we did not find evidence that the early adolescents in our study engage in the practice of ‘social steganography’ that boyd and Marwick found to be popular among older youth. Two explanations for this discrepant finding strike us as plausible. First, it is possible that the participants we interviewed actually do engage in social steganography but they do not view these practices in privacy-related terms. Alternately, it may be that ‘hiding in public’ requires a level of sophistication that early adolescents do not yet possess. This second explanation aligns with Yan’s (2005, 2006) research showing a positive connection between developmental maturity and young people’s understanding of the social complexity of the Internet. Developmental immaturity may also help explain why some of the youth in our study displayed ignorance or a lack of confidence about how to secure their privacy in certain situations. Without a sophisticated understanding of the privacy issues associated with online communication (an aspect of the Internet’s social complexity), it is unlikely these youth would be aware of the range of measures they might take to protect their privacy. Further, although all participants spoke about using privacy strategies in certain circumstances, Downloaded by [Harvard College] at 06:09 27 April 2012 Learning, Media and Technology 19 our analyses revealed that there are several instances in which youth do not employ any strategies to protect their privacy online. There is opportunity here for teachers to develop their students’ repertoire of privacy strategies and encourage them to think more broadly about when to use these strategies. In addition to investigating youth’s online privacy strategies, our study explored the decision-making processes they employ to arrive at these strategies. These processes include interactions with others, individual reflection, and what we call a ‘default’ approach that involves reliance on the privacy controls youth believe (correctly or not) to be built into a particular site. With respect to the individual reflection in which 12 youth (29%) said they engage, it is possible that teachers’ privacy messages inform the nature of these reflections. Notably, however, only one youth included teachers in the list of people with whom she interacts around managing her privacy online. It is possible that teachers’ focus on stranger danger messages discourages youth from approaching them about other types of privacy concerns. We are also mindful of the fact that many schools have restrictive policies around students’ Internet use that may prevent teachers and students from engaging in conversations about online privacy. Both possibilities are regrettable, as our findings suggest there is need among early adolescents for education around online privacy management. Limitations and future research As with most qualitative research, our sample is small and was not drawn at random. Although we sought to create a sample that reflected the demographic characteristics of the region in which we conducted our research, we chose to include only youth who were particularly active digital media users. Therefore, we cannot claim that the findings are representative of all early adolescents in this region, and certainly not of the entire USA. It is possible that less-frequent digital media users approach issues of online privacy differently than the youth we interviewed. This possibility is supported by Yan’s (2006) research showing that frequent Internet users tend to display a greater understanding of the Internet’s social complexity. Thus, future research is needed to examine the online privacy conceptions and experiences of a broader range of early adolescents. An important contribution of our study lies in its focus on a younger group of youth than has typically been included in research on young people’s online privacy practices. We identified several consistencies between our findings and previous research involving high school and college students. At the same time, our findings suggest there may be some differences in the way tweens think about and approach online privacy; for example, we found no evidence that our participants engage in the practice of ‘social steganography’ that boyd and Marwick (2011) found to be popular among older youth. In future studies, researchers should explore in greater depth the possibility of developmental differences in youth’s online privacy attitudes and behavior. For Downloaded by [Harvard College] at 06:09 27 April 2012 20 K. Davis and C. James instance, future research could investigate whether developmental maturity predicts individuals’ familiarity with specific privacy-protecting measures. Moreover, because children’s online experiences begin at increasingly young ages, these studies should include children who are even younger than the participants in our sample. Lastly, although the interview method is well-aligned with our goal of understanding youth’s perspectives on their digital media practices, we are aware of certain limitations associated with this method. Most notably, interviews elicit participants’ descriptions of their behaviors rather than the behaviors themselves. These descriptions may be shaped by participants’ desire to portray themselves in a favorable light, or by their imperfect memories. For instance, it is possible that some teachers’ messages about online privacy are actually broader than warnings about strangers; such warnings may simply stand out in youth’s memories. Although it is important to know that these messages are particularly salient to youth, future studies should seek to gather data from a wider range of sources, such as direct observations of class discussions about online privacy and interviews with teachers and parents about the messages they give to their students and children. Conclusion Over the last decade, online environments have become increasingly central in young people’s lives. The present study offered insight into how a group of early adolescents navigate the privacy issues that arise in these new environments. Like older youth, the participants in our sample both care about and take measures to protect their privacy online. Yet, these measures are sometimes haphazardly employed and some youth display uncertainty or ignorance about how to protect their privacy. These findings suggest a need for educational intervention around online privacy targeted to the distinct experiences and attitudes of middle school students. At present, however, teachers’ messages appear to be focused on a narrow – albeit important – range of youth’s privacy concerns. Moreover, the privacy practices employed by the youth in our sample are shaped more by their parents and peers than by their teachers. We hope that the findings from our study will motivate teachers and school administrators to explore new ways of engaging with students around online privacy management. Acknowledgements The research reported in this article was funded by the John D. and Catherine T. MacArthur Foundation. The authors wish to thank the editors and referees of Learning, Media and Technology for their useful comments on earlier drafts of this article. Note 1. All participants were assigned pseudonyms. Learning, Media and Technology 21 Notes on contributors Katie Davis is a Project Manager at Harvard Project Zero. Her research focuses on the role of digital media technologies in adolescents’ social, moral, and academic lives. Carrie James is a Principal Investigator at Harvard Project Zero. Her research focuses on morality and ethics in new media environments, young people’s engagement with digital media, and their participation in civic and political life. Downloaded by [Harvard College] at 06:09 27 April 2012 References boyd, danah. 2007. Why youth heart social network sites: The role of networked publics in teenage social life. In Youth, identity, and digital media. ed. David Buckingham, 119–42. Cambridge, MA: MIT Press. boyd, danah, and Alice Marwick. 2011. Social privacy in networked publics: Teens’ attitudes, practices, and strategies. Paper presented at the Oxford Internet Institute Decade in Internet Time Symposium, September 22, in Oxford, UK. Christofides, E., A. Muise, and S. Desmarais. 2009. Information disclosure and control on Facebook: Are they two sides of the same coin or two different processes? CyberPsychology & Behavior 12, no. 3: 341–5. Debatin, Bernhard, Jennette P. Lovejoy, Ann-Kathrin Horn, and Brittany N. Hughes. 2009. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication 15, no. 1: 83 –108. De Souza, Zaineb, and Geoffrey N. Dick. 2009. Disclosure of information by children in social networking—Not just a case of ‘you show me yours and I’ll show you mine’. International Journal of Information Management 29, no. 4: 255–61. Devitt, Kerry, and Debi Roker. 2009. The role of mobile phones in family communication. Children & Society 23, no. 3: 189–202. Glaser, Barney, and Anselm Strauss. 1967. The discovery of grounded theory: Strategies for qualitative research. Piscataway, NJ: Aldine Transaction. Harris, Frances J. 2010. Teens and privacy: Myths and realities. Knowledge Quest 39: 74–9. Landis, J. Richard, and Gary G. Koch. 1977. The measurement of observer agreement for categorical data. Biometrics 33, no. 1: 159–74. Lenhart, Amanda. 2011. ‘How do [they] even do that?’ Myths and facts about the impact of technology on the lives of American teens (Pew Internet & American Life Project). Presentation given at the Robert F. and Jean E. Holtz Center for Science and Technology Studies, Madison, WI. http://www.pewinternet.org/ Presentations/2011/Apr/From-Texting-to-Twitter.aspx. Lenhart, Amanda, and Mary Madden. 2007. Teens, privacy, and online social networks (PEW Internet & American Life Project). http://www.pewinternet.org/pdfs/PIP_ Teens_Privacy_SNS_Report_Final.pdf. Lenhart, Amanda, Mary Madden, Aaron Smith, Kristen Purcell, Kathryn Zickuhr, and Lee Rainie. 2011. Teens, kindness and cruelty on social network sites: How American teens navigate the new world of ‘digital citizenship’ (Pew Internet & American Life Project). http://www.pewinternet.org/~/media/Files/Reports/2011/ PIP_Teens_Kindness_Cruelty_SNS_Report_Nov_2011_FINAL_110711.pdf. Livingstone, Sonia. 2008. Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media & Society 10, no. 3: 393–411. Downloaded by [Harvard College] at 06:09 27 April 2012 22 K. Davis and C. James Lwin, May O., Andrea J.S. Stanaland, and Anthony D. Miyazaki. 2008. Protecting children’s privacy online: How parental mediation strategies affect website safeguard effectiveness. Journal of Retailing 84, no. 2: 205–17. Marwick, Alice E., Diego M. Diaz, and John Palfrey. 2010. Youth, privacy, and reputation: Literature review. Cambridge, MA: The Berkman Center for Internet & Society, Harvard University, (Research Publication No. 2010-5) http://papers. ssrn.com/sol3/papers.cfm?abstract_id=1588163. Miles, Matthew B., and A. Michael Huberman. 1994. Qualitative data analysis: An expanded sourcebook. Thousand Oaks: Sage Publications. Moscardelli, D.M., and R. Divine. 2007. Adolescents’ concern for privacy when using the internet: An empirical analysis of predictors and relationships with privacy-protecting behaviors. Family and Consumer Sciences Research Journal 35, no. 3: 232–52. Peluchette, Joy, and Katherine Karl. 2008. Social networking profiles: An examination of student attitudes regarding use and appropriateness of content. CyberPsychology & Behavior 11, no. 1: 95 –7. Purcell, Kristen. 2011. Trends in teen communication and social media use (Pew Internet & American Life Project). Presentation given at Joint Girl Scout Research Institute/Pew Internet Webinar. http://www.pewinternet.org/ Presentations/2011/Feb/PIP-Girl-Scout-Webinar.aspx. Robards, Brady. 2010. Randoms in my bedroom: Negotiating privacy and unsolicited contact on social network sites. PRism 7, no. 3: 1–12. Steeves, Valerie, and Cheryl Webster. 2008. Closing the barn door: The effect of parental supervision on Canadian children’s online privacy. Bulletin of Science, Technology & Society 28, no. 1: 4–19. Thomas, Kim. 2008. Tweens and internet safety, Cox Communications in partnership with the National Center for Missing & Exploited Children. http://ww2.cox.com/ wcm/en/aboutus/datasheet/takecharge/archives/2008-teen-survey.pdf?campcode= takecharge-archive-link_2008-survey_0511. Thomas, Kim. 2010. Teen online safety & digital reputation survey, Cox Communications in partnership with the National Center for Missing & Exploited Children. http://multivu.prnewswire.com/player/44526-cox-teen-summit-internetsafety/docs/44526-Cox_Online_Safety_Digital_Reputation_Survey-FNL.pdf. Tufecki, Zeynep. 2008. Can you see me now? Audience and disclosure regulation on online social network sites. Bulletin of Science, Technology & Society 28, no. 1: 20–36. Weiss, Robert Stuart. 1995. Learning from strangers: The art and method of qualitative interview studies. New York, Toronto: Free Press. West, Anne, Jane Lewis, and Peter Currie. 2009. Students’ Facebook ‘friends’: Public and private spheres. Journal of Youth Studies 12, no. 6: 615–27. Yan, Zheng. 2005. Age differences in children’s understanding of the complexity of the internet. Journal of Applied Developmental Psychology 26, no. 4: 385–96. Yan, Zheng. 2006. What influences children’s and adolescents’ understanding of the complexity of the internet? Developmental Psychology 42, no. 3: 418–28. Youn, Seounmi. 2008. Parental influence and teens’ attitude toward online privacy protection. Journal of Consumer Affairs 42, no. 3: 362–88. Youn, Seounmi. 2009. Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs 43, no. 3: 389–418. Young, Kirsty. 2009. Online social networking: An Australian perspective. International Journal of Emerging Technologies and Society 7, no. 1: 39 –57.