{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:19:44Z","timestamp":1777936784460,"version":"3.51.4"},"reference-count":40,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2016,7,9]],"date-time":"2016-07-09T00:00:00Z","timestamp":1468022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2017,2]]},"abstract":"<jats:p>This article considers young people\u2019s identities and privacy on social network sites through reflection on the analogy of the teenage bedroom as a means to understand such spaces. The notion therein of intimate personal space may jar with the scope and complexity of social media and, particularly, with recent emphasis on the challenges to privacy posed by such environments. I suggest, however, that, through increased use of access controls and a range of informal strategies, young people\u2019s everyday digital communication may not be as out of control as is sometimes inferred. Recent adaptations of the bedroom analogy indicate that social network sites retain intimacy and that their individual-centred format continues to facilitate the exhibition and mapping of identities. Although an awkward fit, I suggest the bedroom may still help us think through how social network sites can function as vital personal home territories in the midst of multi-spatial patterns of sociability.<\/jats:p>","DOI":"10.1177\/1461444815605454","type":"journal-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T21:10:14Z","timestamp":1442956214000},"page":"272-288","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":60,"title":["Bedrooms and beyond: Youth, identity and privacy on social network sites"],"prefix":"10.1177","volume":"19","author":[{"given":"Paul","family":"Hodkinson","sequence":"first","affiliation":[{"name":"University of Surrey, UK"}]}],"member":"179","published-online":{"date-parts":[[2016,7,9]]},"reference":[{"key":"bibr1-1461444815605454","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v12i8.1978"},{"key":"bibr2-1461444815605454","first-page":"119","volume-title":"Youth, Identity, and Digital Media","author":"boyd d","year":"2007"},{"key":"bibr3-1461444815605454","volume-title":"It\u2019s Complicated: The Social Lives of Networked Teens","author":"boyd d","year":"2014"},{"key":"bibr4-1461444815605454","unstructured":"Chandler D, Roberts-Young D (1998) The construction of identity in the personal homepages of adolescents. Available at: http:\/\/www.aber.ac.uk\/media\/Documents\/short\/Strasbourg.html (accessed 10 Feburary 2006)."},{"key":"bibr5-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1057\/9781137287021_2"},{"key":"bibr6-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511489433"},{"key":"bibr7-1461444815605454","first-page":"15","volume-title":"Children, Youth and Leisure","author":"Downs C","year":"2011"},{"key":"bibr8-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"bibr9-1461444815605454","volume-title":"Modernity and Self-Identity: Self and Society in the Late Modern Age","author":"Giddens A","year":"1991"},{"key":"bibr10-1461444815605454","volume-title":"The Presentation of Self in Everyday Life","author":"Goffman E","year":"1956"},{"key":"bibr11-1461444815605454","volume-title":"Interaction Ritual: Essays in Face-to-Face Behaviour","author":"Goffman E","year":"1967"},{"key":"bibr12-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812458432"},{"key":"bibr13-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1057\/9781137287021_5"},{"key":"bibr14-1461444815605454","unstructured":"Gross D (2014) Facebook privacy now defaults to friends only. CNN. Available at: http:\/\/edition.cnn.com\/2014\/05\/22\/tech\/social-media\/facebook-privacy\/"},{"key":"bibr15-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1177\/1461444807076972"},{"key":"bibr16-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1177\/110330880701600103"},{"key":"bibr17-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1177\/0270467610385893"},{"key":"bibr18-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814544001"},{"key":"bibr19-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00400.x"},{"key":"bibr20-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814544002"},{"key":"bibr21-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1057\/9781137031082"},{"key":"bibr22-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814554065."},{"key":"bibr23-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1080\/10462930500362494"},{"key":"bibr24-1461444815605454","doi-asserted-by":"crossref","unstructured":"Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers\u2019 use of social network sites for intimacy, privacy and self-expression. New Media & Society 10(3): 393\u2013411.","DOI":"10.1177\/1461444808089415"},{"key":"bibr25-1461444815605454","unstructured":"Livingstone S (2015) At last, an evaluation of the online social network sites kids actually use \u2013 by parents and teenagers themselves. Available at: http:\/\/blogs.lse.ac.uk\/mediapolicyproject\/2015\/01\/09\/at-last-an-evaluation-of-the-online-social-network-sites-kids-actually-use-by-parents-and-teenagers-themselves\/"},{"key":"bibr26-1461444815605454","unstructured":"Madden M, Lenhart A, Cortesi S, (2013) Social media, teens and privacy. Pew Internet Research Project report. Available at: http:\/\/www.pewinternet.org\/2013\/05\/21\/teens-social-media-and-privacy\/"},{"key":"bibr27-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"bibr28-1461444815605454","volume-title":"Changing contexts: young people\u2019s experiences of growing up in regeneration areas of Glasgow","author":"Neary J","year":"2015"},{"key":"bibr29-1461444815605454","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v14i3.2162"},{"key":"bibr30-1461444815605454","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v15i1.2775"},{"key":"bibr31-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814530095."},{"key":"bibr32-1461444815605454","unstructured":"Robards B (2010) Randoms in my bedroom: negotiating privacy and unsolicited contact on social network sites. PRism 7(3). Available at: http:\/\/www.prismjournal.org"},{"key":"bibr33-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1080\/10304312.2012.665836"},{"key":"bibr34-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1057\/9781137287021_3"},{"issue":"2","key":"bibr35-1461444815605454","first-page":"305","volume":"45","author":"Robards B","year":"2012","journal-title":"Sociology"},{"key":"bibr36-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814567984."},{"key":"bibr37-1461444815605454","volume-title":"Life on the Screen","author":"Turkle S","year":"1995"},{"key":"bibr38-1461444815605454","unstructured":"Velez E (2014) Intimate publics and ephemerality, snapchat: a case study. In: The Second Shift. Available at: http:\/\/www.secondshiftblog.com\/2014\/09\/intimate-publics-and-ephemerality-snapchat-a-case-study\/ (accessed January 2015)."},{"key":"bibr39-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005407717409"},{"key":"bibr40-1461444815605454","doi-asserted-by":"publisher","DOI":"10.1177\/0891241605285100"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444815605454","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444815605454","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444815605454","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:43:31Z","timestamp":1777693411000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444815605454"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,9]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["10.1177\/1461444815605454"],"URL":"https:\/\/doi.org\/10.1177\/1461444815605454","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,9]]}}}