{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T17:06:02Z","timestamp":1756573562726,"version":"3.41.0"},"reference-count":51,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW","license":[{"start":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T00:00:00Z","timestamp":1573084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bentley Research Council"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2019,11,7]]},"abstract":"<jats:p>Social media privacy features can act as a mechanism for regulating interpersonal relationships, but why do some people not use these features? Through an interview study of 56 social media users, we found two high-level perspectives towards social media and privacy that affected attitudes towards and usage of privacy features. Some users took a pragmatic approach to using social media and felt comfortable using various privacy features as a tool to manage their social relationships (e.g., avoiding bothersome posts, not feeling compelled to interact). However, there were also users who viewed taking such privacy actions as a relational hindrance and were concerned how using certain features to meet their own needs would harm their relationships with others. Through a subsequent survey (N=320), we reveal how these two perspectives impact user behavior across four social media platforms (Facebook, Instagram, LinkedIn, Twitter). Users who viewed social media as a pragmatic tool indeed used privacy features more. On the other hand, users who focused on how privacy can serve as a relational hindrance avoided using these features and, instead, prioritized social engagement and took a more indirect approach to protecting their privacy. Furthermore, the results show how these perspectives vary by individual rather than by privacy feature. These findings demonstrate the need to consider different perspectives towards social media and privacy when trying to understand and design for user behavior.<\/jats:p>","DOI":"10.1145\/3359212","type":"journal-article","created":{"date-parts":[[2019,11,8]],"date-time":"2019-11-08T13:40:21Z","timestamp":1573220421000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Pragmatic Tool vs. Relational Hindrance"],"prefix":"10.1145","volume":"3","author":[{"given":"Xinru","family":"Page","sequence":"first","affiliation":[{"name":"Bentley University, Waltham, MA, USA"}]},{"given":"Reza","family":"Ghaiumy Anaraky","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"Clemson University, Clemson, SC, USA"}]},{"given":"Pamela J.","family":"Wisniewski","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2901790.2901873"},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Alessandro Acquisti and Jens Grossklags. 2008. What Can Behavioral Economics Teach Us About Privacy? Digital Privacy: Theory Technologies and Practices: 363--377.  Alessandro Acquisti and Jens Grossklags. 2008. What Can Behavioral Economics Teach Us About Privacy? Digital Privacy: Theory Technologies and Practices: 363--377.","DOI":"10.1201\/9781420052183.ch18"},{"volume-title":"Personal Space, Territory, and Crowding.","author":"Altman Irwin","key":"e_1_2_1_3_1","unstructured":"Irwin Altman . 1975. The Environment and Social Behavior: Privacy , Personal Space, Territory, and Crowding. Brooks\/Cole Publishing , Monterey, CA . Irwin Altman. 1975. The Environment and Social Behavior: Privacy, Personal Space, Territory, and Crowding. Brooks\/Cole Publishing, Monterey, CA."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12276"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466446"},{"volume-title":"Proceedings of the 21st International Conference on Human-Computer Interaction.","key":"e_1_2_1_7_1","unstructured":"Berryman, C., McHugh, B., Wisniewski, P., Ferguson, C., and Negy, C . 2019. Can't Even Say It! User Characteristics of Vaguebookers Versus General Social Media Users . In Proceedings of the 21st International Conference on Human-Computer Interaction. Berryman, C., McHugh, B., Wisniewski, P., Ferguson, C., and Negy, C. 2019. Can't Even Say It! User Characteristics of Vaguebookers Versus General Social Media Users. In Proceedings of the 21st International Conference on Human-Computer Interaction."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11126-017-9535-6"},{"key":"e_1_2_1_9_1","volume-title":"Economics of Information Security and Privacy","author":"Bonneau Joseph","year":"2012","unstructured":"Joseph Bonneau and S\u00f6ren Preibusch . 2010. The Privacy Jungle: On the Market for Data Protection in Social Networks . In Economics of Information Security and Privacy , Tyler Moore, David Pym and Christos Ioannidis (eds.). Springer US , New York, NY , 121--167. Retrieved June 4, 2012 from 10.1007\/978--1--4419--6967--5_8 Joseph Bonneau and S\u00f6ren Preibusch. 2010. The Privacy Jungle: On the Market for Data Protection in Social Networks. In Economics of Information Security and Privacy, Tyler Moore, David Pym and Christos Ioannidis (eds.). Springer US, New York, NY, 121--167. Retrieved June 4, 2012 from 10.1007\/978--1--4419--6967--5_8"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1190275.1190279"},{"key":"e_1_2_1_11_1","volume-title":"Priming app information privacy concerns in mobile ecosystems. Bayreuther Arbeitspapiere zur Wirtschaftsinformatik. Retrieved","author":"Buck Christoph","year":"2019","unstructured":"Christoph Buck , Simone Burster , and Torsten Eymann . 2017. Priming app information privacy concerns in mobile ecosystems. Bayreuther Arbeitspapiere zur Wirtschaftsinformatik. Retrieved April 3, 2019 from https:\/\/www.econstor.eu\/handle\/10419\/172465 Christoph Buck, Simone Burster, and Torsten Eymann. 2017. Priming app information privacy concerns in mobile ecosystems. Bayreuther Arbeitspapiere zur Wirtschaftsinformatik. Retrieved April 3, 2019 from https:\/\/www.econstor.eu\/handle\/10419\/172465"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12078"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998223"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"e_1_2_1_16_1","volume-title":"The New York Times. Retrieved","author":"Granville Kevin","year":"2018","unstructured":"Kevin Granville . 2018 . Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens . The New York Times. Retrieved March 22, 2018 from https:\/\/www.nytimes.com\/2018\/03\/19\/technology\/facebook-cambridge-analytica-explained.html Kevin Granville. 2018. Facebook and Cambridge Analytica: What You Need to Know as Fallout Widens. The New York Times. Retrieved March 22, 2018 from https:\/\/www.nytimes.com\/2018\/03\/19\/technology\/facebook-cambridge-analytica-explained.html"},{"key":"e_1_2_1_17_1","volume-title":"Death to the Privacy Calculus? Rochester","author":"Knijnenburg Bart P.","year":"2017","unstructured":"Bart P. Knijnenburg , Elaine M. Raybourn , David Cherry , Daricia Wilkinson , Saadhika Sivakumar , and Henry Sloan . 2017. Death to the Privacy Calculus? Rochester , NY. Retrieved March 7, 2017 from https:\/\/papers.ssrn.com\/abstract=2923806 Bart P. Knijnenburg, Elaine M. Raybourn, David Cherry, Daricia Wilkinson, Saadhika Sivakumar, and Henry Sloan. 2017. Death to the Privacy Calculus? Rochester, NY. Retrieved March 7, 2017 from https:\/\/papers.ssrn.com\/abstract=2923806"},{"key":"e_1_2_1_18_1","unstructured":"Hanna Krasnova Elena Kolesnikova and Oliver Guenther. 2009. ?It Won't Happen To Me!\": Self-Disclosure in Online Social Networks.  Hanna Krasnova Elena Kolesnikova and Oliver Guenther. 2009. ?It Won't Happen To Me!\": Self-Disclosure in Online Social Networks."},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Airi Lampinen Vilma Lehtinen Asko Lehmuskallio and Sakari Tamminen. 2011. We're in It Together: Interpersonal Management of Disclosure in Social Network Services.  Airi Lampinen Vilma Lehtinen Asko Lehmuskallio and Sakari Tamminen. 2011. We're in It Together: Interpersonal Management of Disclosure in Social Network Services.","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"e_1_2_1_21_1","first-page":"2","article-title":"Cross-Cultural Privacy Prediction","volume":"3","author":"Li Yao","year":"2017","unstructured":"Yao Li , Alfred Kobsa , Bart P. Knijnenburg , and M-H. Carolyn Nguyen . 2017 . Cross-Cultural Privacy Prediction . Proceedings on Privacy Enhancing Technologies 3 , 2 . Yao Li, Alfred Kobsa, Bart P. Knijnenburg, and M-H. Carolyn Nguyen. 2017. Cross-Cultural Privacy Prediction. Proceedings on Privacy Enhancing Technologies 3, 2.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Heather Richter Lipford Pamela Wisniewski Cliff Lampe Lorraine Kisselburgh and Kelly Caine. 2012. Reconciling Privacy and Social Media.  Heather Richter Lipford Pamela Wisniewski Cliff Lampe Lorraine Kisselburgh and Kelly Caine. 2012. Reconciling Privacy and Social Media.","DOI":"10.1145\/2141512.2141523"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1040.0032"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"e_1_2_1_25_1","volume-title":"Newman","author":"Newman Barbara M.","year":"2017","unstructured":"Barbara M. Newman and Philip R . Newman . 2017 . Development Through Life: A Psychosocial Approach. Cengage Learning, Boston, MA. Barbara M. Newman and Philip R. Newman. 2017. Development Through Life: A Psychosocial Approach. Cengage Learning, Boston, MA."},{"key":"e_1_2_1_26_1","first-page":"119","article-title":"Privacy as Contextual Integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum . 2004 . Privacy as Contextual Integrity . Washington Law Review 79 , 1: 119 -- 158 . Helen Nissenbaum. 2004. Privacy as Contextual Integrity. Washington Law Review 79, 1: 119--158.","journal-title":"Washington Law Review"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493487"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the Eleventh International AAAI Conference on Weblogs and Social Media.","author":"Page Xinru","year":"2017","unstructured":"Xinru Page and Marco Marabelli . 2017 . Changes in Social Media Behavior During Life Periods of Uncertainty . In Proceedings of the Eleventh International AAAI Conference on Weblogs and Social Media. Xinru Page and Marco Marabelli. 2017. Changes in Social Media Behavior During Life Periods of Uncertainty. In Proceedings of the Eleventh International AAAI Conference on Weblogs and Social Media."},{"key":"e_1_2_1_30_1","unstructured":"Xinru Page Pamela Wisniewski Bart P. Knijnenburg and Moses Namara. 2018. Social Media's Have-Nots: An Era of Social Disenfranchisement. Internet Research: 00--00. https:\/\/doi.org\/10.1108\/IntR-03--2017-0123  Xinru Page Pamela Wisniewski Bart P. Knijnenburg and Moses Namara. 2018. Social Media's Have-Nots: An Era of Social Disenfranchisement. Internet Research: 00--00. https:\/\/doi.org\/10.1108\/IntR-03--2017-0123"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"volume-title":"Boundaries of Privacy: Dialects of Disclosure","author":"Petronio Sandra Sporbert","key":"e_1_2_1_32_1","unstructured":"Sandra Sporbert Petronio . 2002. Boundaries of Privacy: Dialects of Disclosure . SUNY Press . Sandra Sporbert Petronio. 2002. Boundaries of Privacy: Dialects of Disclosure. SUNY Press."},{"key":"e_1_2_1_33_1","volume-title":"Americans' complicated feelings about social media in an era of privacy concerns","author":"Rainie Lee","year":"2018","unstructured":"Lee Rainie . 2018. Americans' complicated feelings about social media in an era of privacy concerns . Pew Research Center . Retrieved September 16, 2018 from http:\/\/www.pewresearch.org\/fact-tank\/2018\/03\/27\/americans-complicated-feelings-about-social-media-in-an-era-of-privacy-concerns\/ Lee Rainie. 2018. Americans' complicated feelings about social media in an era of privacy concerns. Pew Research Center. Retrieved September 16, 2018 from http:\/\/www.pewresearch.org\/fact-tank\/2018\/03\/27\/americans-complicated-feelings-about-social-media-in-an-era-of-privacy-concerns\/"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820066"},{"key":"e_1_2_1_35_1","volume-title":"Social Media Use","author":"Smith Aaron","year":"2018","unstructured":"Aaron Smith , Monica, and erson. 2018. Social Media Use in 2018 . Pew Research Center : Internet, Science & Tech. Retrieved September 16, 2018 from http:\/\/www.pewinternet.org\/2018\/03\/01\/social-media-use-in-2018\/ Aaron Smith, Monica, and erson. 2018. Social Media Use in 2018. Pew Research Center: Internet, Science & Tech. Retrieved September 16, 2018 from http:\/\/www.pewinternet.org\/2018\/03\/01\/social-media-use-in-2018\/"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.07.002"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145320"},{"key":"e_1_2_1_38_1","unstructured":"Fred Stutzman Jessica Vitak Nicole B. Ellison Rebecca Gray and Cliff Lampe. 2012. Privacy in Interaction: Exploring Disclosure and Social Capital in Facebook.  Fred Stutzman Jessica Vitak Nicole B. Ellison Rebecca Gray and Cliff Lampe. 2012. Privacy in Interaction: Exploring Disclosure and Social Capital in Facebook."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816660731"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/0270467607311484"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531672"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"volume-title":"Equifax-Harris consumer privacy survey","author":"Westin Alan","key":"e_1_2_1_43_1","unstructured":"Alan Westin , Louis Harris , and others. 1991. Equifax-Harris consumer privacy survey . Conducted for Equifax Inc . Alan Westin, Louis Harris, and others. 1991. Equifax-Harris consumer privacy survey. Conducted for Equifax Inc."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3170617"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23007"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.03810"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675256"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207761"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3022198.3022660"},{"key":"e_1_2_1_51_1","volume-title":"Chao Hsien Chu, & Xiaolong Luke Zhang","author":"Xu Heng","year":"2010","unstructured":"Heng Xu , Rachida Parks , Chao Hsien Chu, & Xiaolong Luke Zhang . 2010 . Information disclosure and online social networks: From the case of Facebook news feed controversy to a theoretical understanding. Heng Xu, Rachida Parks, Chao Hsien Chu, & Xiaolong Luke Zhang. 2010. Information disclosure and online social networks: From the case of Facebook news feed controversy to a theoretical understanding."}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359212","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:54Z","timestamp":1750201974000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359212"}},"subtitle":["Exploring Why Some Social Media Users Avoid Privacy Features"],"short-title":[],"issued":{"date-parts":[[2019,11,7]]},"references-count":51,"journal-issue":{"issue":"CSCW","published-print":{"date-parts":[[2019,11,7]]}},"alternative-id":["10.1145\/3359212"],"URL":"https:\/\/doi.org\/10.1145\/3359212","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2019,11,7]]},"assertion":[{"value":"2019-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}