{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:03:52Z","timestamp":1776107032267,"version":"3.50.1"},"reference-count":77,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:00:00Z","timestamp":1746144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,5,2]]},"abstract":"<jats:p>\n            Through co-design interviews (N=19) and a design evaluation survey (N=136) with U.S. teens ages 13-18, we investigated teens' privacy management on social media. Our study revealed that 28.1% of teens with public accounts and 15.3% with private accounts experience\n            <jats:italic toggle=\"yes\">dysfunctional fear,<\/jats:italic>\n            that is, fear that diminishes their quality of life or paralyzes them from taking necessary precautions. These fears fall into three categories: fear of uncontrolled audience reach, fear of online hostility, and fear of personal privacy missteps. While current approaches often emphasize individual vigilance and restrictive measures, our findings show this can paradoxically lead teens to either withdraw from beneficial social interactions or resign themselves to accept privacy violations, viewing them as inevitable. Drawing on teen input, we developed and evaluated ten design prototypes that emphasize empowerment over fear, system-wide explicit emphasis on privacy, clear privacy norms, and flexible controls. Survey results indicate teens perceive these approaches as effectively reducing privacy concerns while preserving social benefits. Our findings suggest that platforms will be more likely to protect teens' privacy and less likely to manufacture unnecessary fear if they include designs that minimize the impact on other users, have low trade-offs with existing features, require minimal user effort, and function independently of community behavior. Such designs include: 1) alerting users about potentially unintentional personal information disclosure and 2) following up on user reports.\n          <\/jats:p>","DOI":"10.1145\/3711049","type":"journal-article","created":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T01:35:05Z","timestamp":1746236105000},"page":"1-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Privacy as Social Norm: Systematically Reducing Dysfunctional Privacy Concerns on Social Media"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4302-3221","authenticated-orcid":false,"given":"JaeWon","family":"Kim","sequence":"first","affiliation":[{"name":"Information School, University of Washington, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4832-208X","authenticated-orcid":false,"given":"Soobin","family":"Cho","sequence":"additional","affiliation":[{"name":"Human Centered Design &amp; Engineering, University of Washington, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7133-695X","authenticated-orcid":false,"given":"Robert","family":"Wolfe","sequence":"additional","affiliation":[{"name":"Information School, University of Washington, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-3490-2465","authenticated-orcid":false,"given":"Jishnu Hari","family":"Nair","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1607-0778","authenticated-orcid":false,"given":"Alexis","family":"Hiniker","sequence":"additional","affiliation":[{"name":"Information School, University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,5,2]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"[n. d.]. ChatGPT. https:\/\/openai.com\/chatgpt\/. Accessed: 2024--7--13."},{"key":"e_1_2_1_2_1","unstructured":"[n. d.]. sentence-transformers\/all-mpnet-base-v2 \u00b7 Hugging Face. https:\/\/huggingface.co\/sentence-transformers\/allmpnet-base-v2. Accessed: 2024--7--15."},{"key":"e_1_2_1_3_1","unstructured":"[n. d.]. SentenceTransformers Documentation \u2014 Sentence Transformers documentation. https:\/\/sbert.net\/. Accessed: 2024--7--15."},{"key":"e_1_2_1_4_1","unstructured":"[n. d.]. The Visual Collaboration Platform for Every Team. https:\/\/miro.com\/. Accessed: 2023--7--18."},{"key":"e_1_2_1_5_1","unstructured":"2023. Social Media and Youth Mental Health: The U.S. Surgeon General's Advisory. Technical Report."},{"key":"e_1_2_1_6_1","unstructured":"2024. ATLAS.ti. https:\/\/atlasti.com\/. Accessed: 2024--1--15."},{"key":"e_1_2_1_7_1","first-page":"3","article-title":"Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online","volume":"50","author":"Acquisti Alessandro","year":"2017","unstructured":"Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, and Shomir Wilson. 2017. Nudges for Privacy and Security: Understanding and Assisting Users' Choices Online. ACM Comput. Surv. 50, 3 (Aug. 2017), 1--41.","journal-title":"ACM Comput. Surv."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/17439884.2019.1583671"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3593923"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579625"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815606121"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501969"},{"key":"e_1_2_1_14_1","unstructured":"Brooke Auxier Lee Rainie Monica Anderson Andrew Perrin Madhu Kumar and Erica Turner. 2019. Americans and privacy: Concerned confused and feeling lack of control over their personal information. (2019)."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2479938"},{"key":"e_1_2_1_16_1","volume-title":"The Role of Networked Publics in Teenage Social Life","author":"Boyd Danah","unstructured":"Danah Boyd. 2008. Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life. In The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning. unknown, 1--26."},{"key":"e_1_2_1_17_1","volume-title":"It's Complicated: The Social Lives of Networked Teens (1 ed.)","unstructured":"danah boyd. 2014. It's Complicated: The Social Lives of Networked Teens (1 ed.). Yale University Press, New York."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbr.2022.100236"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.107082"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305118763349"},{"key":"e_1_2_1_21_1","volume-title":"Reflecting on reflexive thematic analysis. Qualitative research in sport, exercise and health 11, 4","author":"Braun Virginia","year":"2019","unstructured":"Virginia Braun and Victoria Clarke. 2019. Reflecting on reflexive thematic analysis. Qualitative research in sport, exercise and health 11, 4 (2019), 589--597."},{"key":"e_1_2_1_22_1","unstructured":"Ann Cavoukian. 2009. Privacy by design. (2009)."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2011.0608"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462204.3481778"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.02.012"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3661578"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/14614448211018797"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376240"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2012.02.013"},{"key":"e_1_2_1_30_1","volume-title":"Contextualizing how teens manage personal and interpersonal privacy on social media. New media & society 22, 6","author":"Wolf Ralf De","year":"2020","unstructured":"Ralf De Wolf. 2020. Contextualizing how teens manage personal and interpersonal privacy on social media. New media & society 22, 6 (2020), 1058--1075."},{"key":"e_1_2_1_31_1","volume-title":"Privacy online: Perspectives on privacy and self-disclosure in the social web","author":"Debatin Bernhard","unstructured":"Bernhard Debatin. 2011. Ethics, privacy, and self-restraint in social networking. In Privacy online: Perspectives on privacy and self-disclosure in the social web. Springer, 47--60."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097286.3097318"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998192"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12163"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-1209-4_1"},{"key":"e_1_2_1_36_1","volume-title":"Imaginary audience behavior in children and adolescents. Developmental psychology 15, 1","author":"Elkind David","year":"1979","unstructured":"David Elkind and Robert Bowen. 1979. Imaginary audience behavior in children and adolescents. Developmental psychology 15, 1 (1979), 38."},{"key":"e_1_2_1_37_1","volume-title":"With a little help from my friends: How social network sites affect social capital processes. A networked self","author":"Ellison Nicole B","year":"2010","unstructured":"Nicole B Ellison, Cliff Lampe, and Charles Steinfield. 2010. With a little help from my friends: How social network sites affect social capital processes. A networked self (2010), 132--153."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"e_1_2_1_39_1","volume-title":"Negotiating privacy concerns and social capital needs in a social media environment. Privacy online: Perspectives on privacy and self-disclosure in the social web","author":"Ellison Nicole B","year":"2011","unstructured":"Nicole B Ellison, Jessica Vitak, Charles Steinfield, Rebecca Gray, and Cliff Lampe. 2011. Negotiating privacy concerns and social capital needs in a social media environment. Privacy online: Perspectives on privacy and self-disclosure in the social web (2011), 19--32."},{"key":"e_1_2_1_40_1","volume-title":"Fear and its relationship to crime, neighborhood deterioration, and informal social control. The social ecology of crime","author":"Greenberg Stephanie W","year":"1986","unstructured":"Stephanie W Greenberg. 1986. Fear and its relationship to crime, neighborhood deterioration, and informal social control. The social ecology of crime (1986), 47--62."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/17456916211014189"},{"key":"e_1_2_1_43_1","first-page":"21","article-title":"What can I really do?","volume":"10","author":"Hargittai Eszter","year":"2016","unstructured":"Eszter Hargittai and Alice Marwick. 2016. \"What can I really do?\" Explaining the privacy paradox with online apathy. International journal of communication 10 (2016), 21.","journal-title":"International journal of communication"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580773"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azp059"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675287"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106260"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1108\/INTR-01-2021-0005"},{"key":"e_1_2_1_50_1","volume-title":"Eleventh symposium on usable privacy and security (SOUPS","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. {\"My} Data Just Goes {Everywhere:\"} User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh symposium on usable privacy and security (SOUPS 2015). 39--52."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-009-0019-1"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979420"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/01449290600879344"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.52306\/02020219SVZL9707"},{"key":"e_1_2_1_55_1","volume-title":"Fear of crime and the environment: systematic review of UK qualitative evidence. BMC public health 13","author":"Lorenc Theo","year":"2013","unstructured":"Theo Lorenc, Mark Petticrew, Margaret Whitehead, David Neary, Stephen Clayton, Kath Wright, Hilary Thomson, Steven Cummins, Amanda Sowden, and Adrian Renton. 2013. Fear of crime and the environment: systematic review of UK qualitative evidence. BMC public health 13 (2013), 1--8."},{"key":"e_1_2_1_56_1","volume-title":"Networked privacy: How teenagers negotiate context in social media. New media & society 16, 7","author":"Marwick Alice E","year":"2014","unstructured":"Alice E Marwick and Danah Boyd. 2014. Networked privacy: How teenagers negotiate context in social media. New media & society 16, 7 (2014), 1051--1067."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376666"},{"key":"e_1_2_1_58_1","volume-title":"Umap: Uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426","author":"McInnes Leland","year":"2018","unstructured":"Leland McInnes, John Healy, and James Melville. 2018. Umap: Uniform manifold approximation and projection for dimension reduction. arXiv preprint arXiv:1802.03426 (2018)."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376346"},{"key":"e_1_2_1_60_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.543388"},{"key":"e_1_2_1_62_1","volume-title":"Adolescents' online privacy: Toward a developmental perspective. Privacy online: Perspectives on privacy and self-disclosure in the social web","author":"Peter Jochen","year":"2011","unstructured":"Jochen Peter and Patti M Valkenburg. 2011. Adolescents' online privacy: Toward a developmental perspective. Privacy online: Perspectives on privacy and self-disclosure in the social web (2011), 221--234."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555538"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3587558"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v13i01.3356"},{"key":"e_1_2_1_66_1","volume-title":"The uses of privacy online: trading a loss of privacy for social web gratifications? In Privacy online: Perspectives on privacy and self-disclosure in the social web","author":"Taddicken Monika","unstructured":"Monika Taddicken and Cornelia Jers. 2011. The uses of privacy online: trading a loss of privacy for social web gratifications? In Privacy online: Perspectives on privacy and self-disclosure in the social web. Springer, 143--156."},{"key":"e_1_2_1_67_1","volume-title":"Computer-mediated communication effects on disclosure, impressions, and interpersonal evaluations: Getting to know one another a bit at a time. Human communication research 28, 3","author":"Tidwell Lisa Collins","year":"2002","unstructured":"Lisa Collins Tidwell and Joseph BWalther. 2002. Computer-mediated communication effects on disclosure, impressions, and interpersonal evaluations: Getting to know one another a bit at a time. Human communication research 28, 3 (2002), 317--348."},{"key":"e_1_2_1_68_1","first-page":"4","article-title":"The Social Media Privacy Model","volume":"31","author":"Trepte Sabine","year":"2020","unstructured":"Sabine Trepte. 2020. The Social Media Privacy Model: Privacy and Communication in the Light of Social Media Affordances. Commun. Theory 31, 4 (May 2020), 549--570.","journal-title":"Commun. Theory"},{"key":"e_1_2_1_69_1","article-title":"Connecting and protecting? Comparing predictors of self-disclosure and privacy settings use between adolescents and adults. Cyberpsychology","volume":"6","author":"Walrave Michel","year":"2012","unstructured":"Michel Walrave, Ini Vanwesenbeeck, and Wannes Heirman. 2012. Connecting and protecting? Comparing predictors of self-disclosure and privacy settings use between adolescents and adults. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 6, 1 (2012).","journal-title":"Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_2_1_70_1","volume-title":"Privacy online: Perspectives on privacy and self-disclosure in the social web","author":"Walther Joseph B","unstructured":"Joseph B Walther. 2011. Introduction to privacy online. In Privacy online: Perspectives on privacy and self-disclosure in the social web. Springer, 3--8."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581229"},{"key":"e_1_2_1_72_1","volume-title":"Behind Their Screens: What Teens Are Facing (and Adults Are Missing)","author":"Weinstein Emily","unstructured":"Emily Weinstein and Carrie James. 2022. Behind Their Screens: What Teens Are Facing (and Adults Are Missing). MIT Press."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1870874"},{"key":"e_1_2_1_74_1","volume-title":"Modern Socio-Technical Perspectives on Privacy","author":"Wisniewski Pamela J.","unstructured":"Pamela J. Wisniewski, Jessica Vitak, and Heidi Hartikainen. 2022. Privacy in Adolescence. In Modern Socio-Technical Perspectives on Privacy. Springer International Publishing."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376424"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819948"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555608"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711049","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711049","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T00:54:03Z","timestamp":1755737643000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711049"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,2]]},"references-count":77,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,5,2]]}},"alternative-id":["10.1145\/3711049"],"URL":"https:\/\/doi.org\/10.1145\/3711049","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,2]]},"assertion":[{"value":"2025-05-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}