{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:19:46Z","timestamp":1777936786697,"version":"3.51.4"},"reference-count":53,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2016,7,9]],"date-time":"2016-07-09T00:00:00Z","timestamp":1468022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2017,3]]},"abstract":"<jats:p>Popular media often characterize youths\u2019 use of social media as overwhelmingly negative, reporting that teens engage in reckless, unsafe behaviors with little thought to their online privacy or safety. Typically, these popular media accounts are based on adults\u2019 prescriptive views of youths\u2019 attitudes and behaviors. Using qualitative methods including background questionnaires and focus groups, we gathered older teens\u2019 attitudes about online privacy and safety to provide a more complete narrative from a teen perspective. Findings suggest that older teens are concerned with their online privacy and feel discomfort with unintended audiences seeing their personal information, yet most feel tension to share personal information with friends. They are less concerned about safety, tending to feel safe online and to employ protective measures, but viewing older and younger generations as less knowledgeable about online safety. The article concludes with a discussion of the implications of these findings for teaching teens about online privacy and safety.<\/jats:p>","DOI":"10.1177\/1461444815606121","type":"journal-article","created":{"date-parts":[[2015,9,22]],"date-time":"2015-09-22T21:10:14Z","timestamp":1442956214000},"page":"347-365","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":61,"title":["\u201cDon\u2019t be dumb\u2014that\u2019s the rule I try to live by\u201d: A closer look at older teens\u2019 online privacy and safety attitudes"],"prefix":"10.1177","volume":"19","author":[{"given":"Denise E","family":"Agosto","sequence":"first","affiliation":[{"name":"Drexel University, USA"}]},{"given":"June","family":"Abbas","sequence":"additional","affiliation":[{"name":"University of Oklahoma, USA"}]}],"member":"179","published-online":{"date-parts":[[2016,7,9]]},"reference":[{"key":"bibr1-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1002\/asi.22612"},{"key":"bibr2-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1002\/meet.14504701025"},{"key":"bibr3-1461444815606121","doi-asserted-by":"crossref","DOI":"10.5040\/9798216023944","volume-title":"Teens, Libraries, and Social Networking: What Librarians Need to Know","author":"Agosto DE","year":"2011"},{"key":"bibr4-1461444815606121","first-page":"117","volume-title":"The Information Behavior of a New Generation","author":"Agosto DE","year":"2013"},{"key":"bibr5-1461444815606121","unstructured":"Biegler S, boyd d (2010) Risky behaviors and online safety: a 2010 literature review. Available at: http:\/\/www.zephoria.org\/files\/2010SafetyLitReview.pdf"},{"key":"bibr6-1461444815606121","first-page":"119","volume-title":"Youth, Identity, and Digital Media","author":"boyd d","year":"2008"},{"key":"bibr7-1461444815606121","volume-title":"It\u2019s Complicated: The Social Lives of Networked Teens","author":"boyd d","year":"2014"},{"key":"bibr8-1461444815606121","unstructured":"boyd d, Marwick AE (2011) Social privacy in networked publics: teens\u2019 attitudes, practices, and strategies (SSRN Scholarly Paper No. ID 1925128). Available at: http:\/\/papers.ssrn.com\/abstract=1925128"},{"key":"bibr9-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"bibr10-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1177\/1948550611408619"},{"key":"bibr11-1461444815606121","doi-asserted-by":"crossref","unstructured":"Clarke BH (2009) Early adolescents\u2019 use of social networking sites to maintain friendship and explore identity: implications for policy. Policy & Internet 1. Available at: http:\/\/www.psocommons.org\/policyandinternet\/vol1\/iss1\/art3 (accessed 24 August 2015).","DOI":"10.2202\/1944-2866.1018"},{"key":"bibr12-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2009.03.006"},{"key":"bibr13-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.07.035"},{"key":"bibr14-1461444815606121","first-page":"33","volume-title":"Handbook of Interview Research","author":"Eder D","year":"2002"},{"key":"bibr15-1461444815606121","volume-title":"Identity, Youth and Crisis","author":"Erikson E","year":"1968"},{"key":"bibr16-1461444815606121","volume-title":"The Presentation of Self in Everyday Life","author":"Goffman E","year":"1959"},{"key":"bibr17-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812459171"},{"key":"bibr18-1461444815606121","doi-asserted-by":"publisher","DOI":"10.4135\/9781446249420"},{"key":"bibr19-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1080\/01411920902989227"},{"key":"bibr20-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2007.05.004"},{"key":"bibr21-1461444815606121","first-page":"225","volume-title":"Errors in Organizations","author":"Hollnagel E","year":"2011"},{"key":"bibr22-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809342558"},{"key":"bibr23-1461444815606121","volume-title":"Hanging Out, Messing Around, and Geeking Out: Kids Living and Learning with New Media","author":"Ito M","year":"2010"},{"key":"bibr24-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1177\/1461444813520301"},{"key":"bibr25-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125641"},{"key":"bibr26-1461444815606121","unstructured":"Lenhart A, Madden M, Cortesi S, (2013) Where Teens Seek Online Privacy Advice. Washington, DC: Pew Internet and American Life Project, Available at: http:\/\/www.pewinternet.org\/files\/old-media\/Files\/Reports\/2013\/PIP_TeensandPrivacyAdvice.pdf (accessed 24 August 2015)."},{"key":"bibr27-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1108\/14636691111174252"},{"key":"bibr28-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.705195"},{"key":"bibr29-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808089415"},{"key":"bibr30-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1111\/j.1099-0860.2009.00243.x"},{"key":"bibr31-1461444815606121","unstructured":"Madden M, Lenhart A, Cortesi S, (2013) Teens, Social Media, and Privacy. Washington, DC: Pew Internet and American Life Project, Available at: http:\/\/pewinternet.org\/Reports\/2013\/Teens-Social-Media-And-Privacy.aspx (accessed 24 August 2015)."},{"key":"bibr32-1461444815606121","first-page":"51","volume":"1","author":"Mallan K","year":"2009","journal-title":"Digital Culture & Education"},{"key":"bibr33-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2010.09.004"},{"key":"bibr34-1461444815606121","doi-asserted-by":"crossref","unstructured":"Marwick A (2008) To catch a predator? The MySpace moral panic. First Monday, Available at: http:\/\/journals.uic.edu\/ojs\/index.php\/fm\/article\/view\/2152\/1966 (accessed 24 August 2015).","DOI":"10.5210\/fm.v13i6.2152"},{"key":"bibr35-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810365313"},{"key":"bibr36-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"bibr37-1461444815606121","unstructured":"Mayring P (2000) Qualitative content analysis. Forum: Qualitative Social Research 1(2). Available at: http:\/\/nbn-resolving.de\/urn:nbn:de:0114-fqs0002204 (accessed 24 August 2015)."},{"key":"bibr38-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2009.04.015"},{"key":"bibr39-1461444815606121","doi-asserted-by":"publisher","DOI":"10.4135\/9781412984287"},{"key":"bibr40-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1177\/1077727X06296622"},{"key":"bibr41-1461444815606121","first-page":"43","volume":"2","author":"Moscardelli DM","year":"2004","journal-title":"Journal of Business and Economics Research"},{"key":"bibr42-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814552379."},{"key":"bibr43-1461444815606121","volume-title":"Born Digital: Understanding the First Generation of Digital Natives","author":"Palfrey J","year":"2008"},{"key":"bibr44-1461444815606121","unstructured":"Palfrey J, boyd d, Sacco D (eds) (2010) Enhancing Child Safety and Online Technologies: Final Report of the Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States. Durham, NC: Carolina Academic Press, Available at: http:\/\/www.cap-press.com\/pdf\/1997.pdf (accessed 24 August 2015)."},{"key":"bibr45-1461444815606121","unstructured":"Patchin JW (2013) Cyberbullying Research: 2013 Update. Cyberbullying Research Center. Available at: http:\/\/cyberbullying.us\/cyberbullying-research-2013-update\/ (accessed 24 August 2015)."},{"key":"bibr46-1461444815606121","unstructured":"Pew Research (2014) Teens fact sheet. Available at: http:\/\/www.pewinternet.org\/fact-sheets\/teens-fact-sheet\/ (accessed 24 August 2015)."},{"key":"bibr47-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.07.005"},{"key":"bibr48-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1353\/foc.0.0006"},{"key":"bibr49-1461444815606121","unstructured":"US Census Bureau (2014) State & county quick facts. Available at: http:\/\/quickfacts.census.gov\/qfd\/index.html# (accessed 24 August 2015)."},{"key":"bibr50-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1136\/amiajnl-2012-000949"},{"key":"bibr51-1461444815606121","volume-title":"Privacy and Freedom","author":"Westin AF","year":"1967"},{"key":"bibr52-1461444815606121","volume-title":"Applications of Social Research Methods to Questions in Information and Library Science","author":"Wildemuth BM","year":"2009"},{"key":"bibr53-1461444815606121","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2007-0693"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444815606121","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444815606121","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444815606121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:43:33Z","timestamp":1777693413000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444815606121"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,9]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["10.1177\/1461444815606121"],"URL":"https:\/\/doi.org\/10.1177\/1461444815606121","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,9]]}}}