skip to main content
research-article
Open access

Understanding Teenage Perceptions and Configurations of Privacy on Instagram

Published: 11 November 2022 Publication History

Abstract

As teenage use of social media platform continues to proliferate, so do concerns about teenage privacy and safety online. Prior work has established that privacy on networked publics, such as social media, is complex, requiring users to navigate not only the technical affordances on the platform but also interpersonal relationships and social norms. We investigate how teenagers think about privacy on the popular image-sharing platform, Instagram. We draw on an online survey (N=144) and semi-structured interviews (N=21) with teenagers, ages 13-19, to gain a better understanding how teenagers configure privacy on the popular image-sharing platform Instagram and why they make these privacy decisions. Finally, based on our findings, we provide design recommendations towards the design of better privacy controls for promoting teenage safety online.

References

[1]
Private profiles on vscp. https://support.vsco.co/hc/en-us/articles/360040916071-Private-profiles-on-VSCO.
[2]
Acqisti, A., and Gross, R. Imagined communities: Awareness, information sharing, and privacy on the facebook. In Privacy Enhancing Technologies Workshop (PET) (2006).
[3]
Adorjan, M., and Ricciardelli, R. A new privacy paradox? youth agentic practices of privacy management despite ?nothing to hide" online. Canadian Review of Sociology 56, 1 (2019), 8--29.
[4]
Agosto, D. E., and Abbas, J. ?don't be dumb-that's the rule i try to live by": A closer look at older teens' online privacy and safety attitudes. New Media & Society 19, 3 (2017), 347--365.
[5]
Anderson, M. A majority of teens have experienced some form of cyberbullying.
[6]
Anderson, M., and Jiang, J. Teens, social media and technology overview 2018. Tech. rep., Pew Research Center, 2018.
[7]
Badillo-Urqiola, K., Smriti, D., McNally, B., Golub, E., Bonsignore, E., and Wisniewski, P. J. Stranger danger! social media app features co-designed with children to keep them safe online. In ACM International Conference on Interaction Design and Children (2019).
[8]
Balleys, C., and Coll, S. Being publicly intimate: teenagers managing online privacy. Media, Culture & Society 39, 6 (2017), 885--901.
[9]
Barlett, C. P., Gentile, D. A., and Chew, C. Predicting cyberbullying from anonymity. Psychology of Popular Media Culture 5, 2 (2016), 171.
[10]
Barnes, S. B. A privacy paradox: Social networking in the united states. First Monday (2006).
[11]
Boyd, D. Social network sites as networked publics: Affordances, dynamics, and implications. In A networked self. Routledge, 2010, pp. 47--66.
[12]
Boyd, D. It's complicated: The social lives of networked teens. Yale University Press, 2014.
[13]
Boyd, D., and Hargittai, E. Connected and concerned: Variation in parents' online safety concerns. Policy & Internet 5, 3 (2013), 245--269.
[14]
Boyd, D., and Marwick, A. Social steganography: Privacy in networked publics. International Communication Association, Boston, MA 93 (2011).
[15]
Cho, H., and Filippova, A. Networked privacy management in facebook: A mixed-methods and multinational study. In Conference on Computer-Supported Cooperative Work and Social Computing (CSCW) (2016).
[16]
Cho, H., Knijnenburg, B., Kobsa, A., and Li, Y. Collective privacy management in social media: A cross-cultural validation. Transactions on Computer-Human Interaction (TOCHI) 25, 3 (2018).
[17]
Choi, T. R., and Sung, Y. Instagram versus snapchat: Self-expression and privacy concern on social media. Telematics and Informatics 35, 8 (2018), 2289--2298.
[18]
Chou, H.-L., and Chou, C. How teens negotiate privacy on social media proactively and reactively. New Media & Society (2021).
[19]
Chua, T. H. H., and Chang, L. Follow me and like my beautiful selfies: Singapore teenage girls' engagement in self-presentation and peer comparison on social media. Computers in Human Behavior 55 (2016), 190--197.
[20]
De Wolf, R. Contextualizing how teens manage personal and interpersonal privacy on social media. New Media & Society 22, 6 (2020), 1058--1075.
[21]
Dennen, V. P., Rutledge, S. A., Bagdy, L. M., Rowlett, J. T., Burnick, S., and Joyce, S. Context collapse and student social media networks: Where life and high school collide. In Conference on Social media & Society (SMSOCIETY) (2017).
[22]
DeVito, M. A., Birnholtz, J., and Hancock, J. T. Platforms, people, and perception: Using affordances to understand self-presentation on social media. In Conference on Computer Supported CooperativeWork and Social Computing (CSCW) (2017).
[23]
DeVito, M. A., Walker, A. M., and Birnholtz, J. 'too gay for facebook' presenting lgbtq identity throughout the personal social media ecosystem. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 1--23.
[24]
Dewar, S., Islam, S., Resor, E., and Salehi, N. Finsta: Creating "fake" spaces for authentic performance. In Extended Abstracts of the Conference on Human Factors in Computing Systems (CHI EA) (2019), pp. 1--6.
[25]
Dhir, A., Kaur, P., Lonka, K., and Nieminen, M. Why do adolescents untag photos on facebook? Computers in Human Behavior 55 (2016), 1106--1115.
[26]
Duffy, B. E., and Chan, N. K. "you never really know who's looking": Imagined surveillance across social media platforms. New Media & Society 21, 1 (2019), 119--138.
[27]
Emami Naeini, P., Degeling, M., Bauer, L., Chow, R., Cranor, L. F., Haghighat, M. R., and Patterson, H. The influence of friends and experts on privacy decision making in iot scenarios. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 1--26.
[28]
Evans, A., and Sharma, A. Furthering our safety and privacy commitments for teens on tiktok. https://newsroom. tiktok.com/en-ie/furthering-our-safety-and-privacy-commitments-for-teens-on-tiktok-ire, 2021.
[29]
Feng, Y., and Xie, W. Teens' concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Computers in Human Behavior 33 (2014), 153--162.
[30]
Fogel, J., and Nehmad, E. Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior 25, 1 (2009), 153--160.
[31]
Guest, G., Namey, E., and Chen, M. A simple method to assess and report thematic saturation in qualitative research. PloS one 15, 5 (2020), e0232076.
[32]
Hargittai, E., et al. Facebook privacy settings: Who cares? First Monday (2010).
[33]
Hargittai, E., and Marwick, A. "what can i really do?" explaining the privacy paradox with online apathy. International journal of communication 10 (2016), 21.
[34]
Hofstra, B., Corten, R., and van Tubergen, F. Understanding the privacy behavior of adolescents on facebook: The role of peers, popularity and trust. Computers in Human Behavior 60 (2016), 611--621.
[35]
John, N. A. Sharing and web 2.0: The emergence of a keyword. New media & society 15, 2 (2013), 167--182.
[36]
Kang, C. Lawmakers urge the head of instagram to better protect children. https://www.nytimes.com/2021/12/08/ technology/adam-mosseri-instagram-senate.html, 2021.
[37]
Kang, H., Shin, W., and Huang, J. Teens' privacy management on video-sharing social media: the roles of perceived privacy risk and parental mediation. Internet Research (2021).
[38]
Lang, C., and Barton, H. Just untag it: Exploring the management of undesirable facebook photos. Computers in Human Behavior 43 (2015), 147--155.
[39]
Lenhart, A. Teens, social media and technology overview 2015. Tech. rep., Pew Research Center, 2015.
[40]
Livingstone, S. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression. New Media & Society 10, 3 (2008), 393--411.
[41]
Livingstone, S. Developing social media literacy: How children learn to interpret risky opportunities on social network sites. Communications 39, 3 (2014), 283--303.
[42]
Locke, J. L. Eavesdropping: An intimate history. OUP Oxford, 2010.
[43]
Ma, X., Hancock, J., and Naaman, M. Anonymity, intimacy and self-disclosure in social media. In Conference on Human Factors in Computing Systems (CHI) (2016).
[44]
Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., and Beaton, M. Teens, social media, and privacy. Pew Research Center 21, 1055 (2013), 2--86.
[45]
Mansour, A., and Francke, H. Collective privacy management practices: A study of privacy strategies and risks in a private facebook group. Proceedings of the ACM on Human-Computer Interaction 5, CSCW (2021), 1--27.
[46]
Marwick, A. E., and Boyd, D. I tweet honestly, i tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society 13, 1 (2011), 114--133.
[47]
Marwick, A. E., and boyd, d. Networked privacy: How teenagers negotiate context in social media. New Media & Society 16, 7 (2014), 1051--1067.
[48]
May-Chahal, C., Mason, C., Rashid, A., Walkerdine, J., Rayson, P., and Greenwood, P. Safeguarding cyborg childhoods: Incorporating the on/offline behaviour of children into everyday social work practices. British Journal of Social Work 44, 3 (2014), 596--614.
[49]
McHugh, B. C., Wisniewski, P., Rosson, M. B., and Carroll, J. M. When social media traumatizes teens: The roles of online risk exposure, coping, and post-traumatic stress. Internet Research (2018).
[50]
Mendel, T., and Toch, E. Susceptibility to social influence of privacy behaviors: Peer versus authoritative sources. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (2017), pp. 581--593.
[51]
Oolo, E., and Siibak, A. Performing for one's imagined audience: Social steganography and other privacy strategies of estonian teens on networked publics. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 7, 1 (2013).
[52]
Palen, L., and Dourish, P. Unpacking" privacy" for a networked world. In Conference on Human Factors in Computing Systems (CHI) (2003).
[53]
Papacharissi, Z., and Gibson, P. L. Fifteen minutes of privacy: Privacy, sociality, and publicity on social network sites. In Privacy Online. Springer, 2011, pp. 75--89.
[54]
Petronio, S. Boundaries of privacy: Dialectics of disclosure. Suny Press, 2002.
[55]
Rashidi, Y., Kapadia, A., Nippert-Eng, C., and Su, N. M. "it's easier than causing confrontation": Sanctioning strategies to maintain social norms and privacy on social media. Proceedings of the ACM on Human-Computer Interaction 4, CSCW1 (2020), 1--25.
[56]
Salter, M. Privates in the online public: Sex (ting) and reputation on social media. New Media & Society 18, 11 (2016), 2723--2739.
[57]
Santana, A. D. Virtuous or vitriolic: The effect of anonymity on civility in online newspaper reader comment boards. Journalism practice 8, 1 (2014), 18--33.
[58]
Sciara, S., Contu, F., Bianchini, M., Chiocchi, M., and Sonnewald, G. G. Going public on social media: The effects of thousands of instagram followers on users with a high need for social approval. Current Psychology (2021), 1--15.
[59]
Scolere, L., Pruchniewska, U., and Duffy, B. E. Constructing the platform-specific self-brand: The labor of social media promotion. Social Media Society 4, 3 (2018).
[60]
Strano, M. M., and Queen, J. W. Covering your face on facebook. Journal of Media Psychology (2013).
[61]
Stutzman, F., and Kramer-Duffield, J. Friends only: examining a privacy-enhancing behavior in facebook. In Conference on Human Factors in Computing Systems (CHI) (2010).
[62]
Sundén, J. Material virtualities: Approaching online textual embodiment. Peter Lang, 2003.
[63]
Taber, L., andWhittaker, S. Personality depends on the medium: differences in self-perception on snapchat, facebook and offline. In Conference on Human Factors in Computing Systems (CHI) (2018).
[64]
Taber, L., and Whittaker, S. " on finsta, i can say'hail satan'": Being authentic but disagreeable on instagram. In Conference on Human Factors in Computing Systems (CHI) (2020).
[65]
Trieu, P., and Baym, N. K. Private responses for public sharing: understanding self-presentation and relational maintenance via stories in social media. In Conference on Human Factors in Computing Systems (CHI) (2020).
[66]
Tufekci, Z. Can you see me now? audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society 28, 1 (2008), 20--36.
[67]
Tufekci, Z. Facebook, youth and privacy in networked publics. In The International Conference on Weblogs and Social Media (ICWSM) (2012).
[68]
Wells, G., Horwitz, J., and Seetharaman, D. Facebook knows instagram is toxic for teen girls, company documents show. https://www.wsj.com/articles/facebook-knows-instagram-is-toxic-for-teen-girls-company-documents-show-11631620739, 2021.
[69]
Wisniewski, P., Islam, A., Richter Lipford, H., and Wilson, D. C. Framing and measuring multi-dimensional interpersonal privacy preferences of social networking site users. Communications of the Association for information systems 38, 1 (2016), 10.
[70]
Xiao, S., Metaxa, D., Park, J. S., Karahalios, K., and Salehi, N. Random, messy, funny, raw: finstas as intimate reconfigurations of social media. In Conference on Human Factors in Computing Systems (CHI) (2020).
[71]
Xie, W., and Kang, C. See you, see me: Teenagers' self-disclosure and regret of posting on social network site. Computers in Human Behavior 52 (2015), 398--407.
[72]
Yang, K. C., Pulido, A., and Yowei, K. Exploring the relationship between privacy concerns and social media use among college students: A communication privacy management perspective. Intercultural Communication Studies 25, 2 (2016).
[73]
Yau, J. C., and Reich, S. M. ?it's just a lot of work": Adolescents' self-presentation norms and practices on facebook and instagram. Journal of research on adolescence 29, 1 (2019), 196--209.
[74]
Zhang-Kennedy, L., Mekhail, C., Abdelaziz, Y., and Chiasson, S. From nosy little brothers to stranger-danger: Children and parents' perception of mobile threats. In ACM International Conference on Interaction Design and Children (2016).
[75]
Zhao, X., Lampe, C., and Ellison, N. B. The social media ecology: User perceptions, strategies and challenges. In Conference on Human Factors in Computing Systems (CHI) (2016).

Cited By

View all
  • (2024)Sosyal Medyada Gözetim ve Mahremiyet Algısı: Instagram Kullanıcıları Üzerine Bir İncelemeAkdeniz Üniversitesi İletişim Fakültesi Dergisi10.31123/akil.1427283(146-169)Online publication date: 31-Dec-2024
  • (2024)Envisioning New Futures of Positive Social Technology: Beyond Paradigms of Fixing, Protecting, and PreventingCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3681833(701-704)Online publication date: 11-Nov-2024
  • (2024)Can Large Language Models Be Good Companions?Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596008:2(1-41)Online publication date: 15-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 6, Issue CSCW2
CSCW
November 2022
8205 pages
EISSN:2573-0142
DOI:10.1145/3571154
Issue’s Table of Contents
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 November 2022
Published in PACMHCI Volume 6, Issue CSCW2

Check for updates

Author Tags

  1. instagram
  2. privacy
  3. social media
  4. teenagers

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)638
  • Downloads (Last 6 weeks)77
Reflects downloads up to 31 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Sosyal Medyada Gözetim ve Mahremiyet Algısı: Instagram Kullanıcıları Üzerine Bir İncelemeAkdeniz Üniversitesi İletişim Fakültesi Dergisi10.31123/akil.1427283(146-169)Online publication date: 31-Dec-2024
  • (2024)Envisioning New Futures of Positive Social Technology: Beyond Paradigms of Fixing, Protecting, and PreventingCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3681833(701-704)Online publication date: 11-Nov-2024
  • (2024)Can Large Language Models Be Good Companions?Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596008:2(1-41)Online publication date: 15-May-2024
  • (2024)The Subversive AI Acceptance Scale (SAIA-8): A Scale to Measure User Acceptance of AI-Generated, Privacy-Enhancing Image ModificationsProceedings of the ACM on Human-Computer Interaction10.1145/36410248:CSCW1(1-43)Online publication date: 26-Apr-2024
  • (2024)"I Just Don’t Care Enough To Be Interested": Teens’ Moment-By-Moment Experiences on InstagramProceedings of the 23rd Annual ACM Interaction Design and Children Conference10.1145/3628516.3655812(14-29)Online publication date: 17-Jun-2024
  • (2023)A Socioenactive Perspective on Emotion Contagion and Senses: Analyzing the Phenomenon via EEG SignalsProceedings of the XXII Brazilian Symposium on Human Factors in Computing Systems10.1145/3638067.3638132(1-11)Online publication date: 16-Oct-2023
  • (2023)CASESProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36109107:3(1-31)Online publication date: 27-Sep-2023
  • (2023)Audio Augmented Reality OutdoorsProceedings of the 2023 ACM International Conference on Interactive Media Experiences10.1145/3573381.3597028(199-204)Online publication date: 12-Jun-2023
  • (2023)Multi-Camera Lighting Estimation for Photorealistic Front-Facing Mobile Augmented RealityProceedings of the 24th International Workshop on Mobile Computing Systems and Applications10.1145/3572864.3580337(68-73)Online publication date: 22-Feb-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media