{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T00:24:50Z","timestamp":1769300690264,"version":"3.49.0"},"reference-count":62,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2016,6,27]],"date-time":"2016-06-27T00:00:00Z","timestamp":1466985600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p> Online social networks are designed to encourage disclosure while also having the ability to disrupt existing privacy boundaries. This study assesses those individuals who are the most active online: \u201cDigital Natives.\u201d The specific focus includes participants\u2019 privacy beliefs; how valuable they believe their personal, private information to be; and what risks they perceive in terms of disclosing this information in a fairly anonymous online setting. A model incorporating these concepts was tested in the context of communication privacy management theory. Study findings suggest that attitudinal measures were stronger predictors of privacy behaviors than were social locators. In particular, support was found for a model positing that if an individual placed a higher premium on their personal, private information, they would then be less inclined to disclose such information while visiting online social networking sites. <\/jats:p>","DOI":"10.1177\/1461444816654465","type":"journal-article","created":{"date-parts":[[2016,6,29]],"date-time":"2016-06-29T03:35:07Z","timestamp":1467171307000},"page":"50-67","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":36,"title":["Managing the virtual boundaries: Online social networks, disclosure, and privacy behaviors"],"prefix":"10.1177","volume":"20","author":[{"given":"Mary Helen","family":"Millham","sequence":"first","affiliation":[{"name":"University of Connecticut, USA"}]},{"given":"David","family":"Atkin","sequence":"additional","affiliation":[{"name":"University of Connecticut, USA"}]}],"member":"179","published-online":{"date-parts":[[2016,6,27]]},"reference":[{"key":"bibr1-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_3"},{"key":"bibr2-1461444816654465","volume-title":"The Environment and Social Behavior: Privacy Personal Space Territory Crowding","author":"Altman I","year":"1975"},{"key":"bibr3-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01883.x"},{"key":"bibr4-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1177\/0270467609355051"},{"key":"bibr5-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1037\/h0024927"},{"key":"bibr6-1461444816654465","unstructured":"boyd d (2010) Making sense of privacy and publicity. Available at: http:\/\/www.danah.org\/papers\/talks\/2010\/SXSW2010.html"},{"key":"bibr7-1461444816654465","doi-asserted-by":"crossref","unstructured":"boyd d, Hargittai E (2010) Facebook privacy settings: who cares? Available at: http:\/\/journals.uic.edu\/ojs\/index.php\/fm\/article\/view\/3086","DOI":"10.5210\/fm.v15i8.3086"},{"key":"bibr8-1461444816654465","unstructured":"Burnett G (2000) Information exchange in virtual communities: a typology. Information Research 5. Available at: http:\/\/informationr.net\/ir\/5-4\/paper82.html (accessed 19 November 2009)."},{"key":"bibr9-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.02.009"},{"key":"bibr10-1461444816654465","first-page":"21","volume-title":"Computer-Mediated Communication in Personal Relationships","author":"Child JT","year":"2011"},{"key":"bibr11-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21122"},{"key":"bibr12-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.05.009"},{"key":"bibr13-1461444816654465","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1974.35.3.1059"},{"key":"bibr14-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.12.058"},{"key":"bibr15-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"bibr16-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01885.x"},{"key":"bibr17-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.112.1.106"},{"key":"bibr18-1461444816654465","volume-title":"Discovering Statistics Using SPSS","author":"Field A","year":"2009"},{"key":"bibr19-1461444816654465","volume-title":"Database Nation: The Death of Privacy in the 21st Century","author":"Garfinkel S","year":"2001"},{"key":"bibr20-1461444816654465","volume-title":"The Structural Transformation of the Public Sphere: An Inquiry into a Category of Bourgeois Society","author":"Habermas J","year":"1962"},{"key":"bibr21-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1177\/0270467610385893"},{"key":"bibr22-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.678717"},{"key":"bibr23-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1086\/656423"},{"key":"bibr24-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812450684"},{"key":"bibr25-1461444816654465","doi-asserted-by":"publisher","DOI":"10.2307\/1190673"},{"key":"bibr26-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.07.045"},{"key":"bibr27-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1145\/1531674.1531717"},{"key":"bibr28-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1177\/0093650210365537"},{"key":"bibr29-1461444816654465","unstructured":"Lee LT (2007) Digital Media Technology and Individual Privacy: Communication Technology and Social Change. Mahwah, NJ: Lawrence Erlbaum Associates, pp. 257\u2013279."},{"key":"bibr30-1461444816654465","volume-title":"New New Media","author":"Levinson P","year":"2013"},{"key":"bibr31-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2008.01432.x"},{"key":"bibr32-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01879.x"},{"key":"bibr33-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01878.x"},{"key":"bibr34-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00071"},{"key":"bibr35-1461444816654465","doi-asserted-by":"crossref","unstructured":"Metzger MJ (2004) Privacy, trust, and disclosure: exploring barriers to electronic commerce. Journal of Computer-Mediated Communication 9: 00. Available at: http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1083-6101.2004.tb00292.x\/abstract","DOI":"10.1111\/j.1083-6101.2004.tb00292.x"},{"key":"bibr36-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00328.x"},{"key":"bibr37-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1207\/s15506878jobem4703_3"},{"key":"bibr38-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2013.04.002"},{"key":"bibr39-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"bibr40-1461444816654465","volume-title":"Born Digital: Understanding the First Generation of Digital Natives","author":"Palfrey J","year":"2008"},{"key":"bibr41-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1991.tb00023.x"},{"key":"bibr42-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1080\/15267431.2004.9670131"},{"key":"bibr43-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1353\/book4588"},{"key":"bibr44-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1080\/00909880701422443"},{"key":"bibr45-1461444816654465","doi-asserted-by":"publisher","DOI":"10.4135\/9781483329529.n23"},{"key":"bibr46-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4679(198605)42:3<499::AID-JCLP2270420317>3.0.CO;2-I"},{"key":"bibr47-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1080\/03637758409390200"},{"key":"bibr48-1461444816654465","unstructured":"Rainie L, Kiesler S, Kang R, et al. (2013) Anonymity, privacy, and security online. Pew Research Center\u2019s Internet & American Life Project, 5 September. Available at: http:\/\/www.pewinternet.org\/2013\/09\/05\/anonymity-privacy-and-security-online\/"},{"key":"bibr49-1461444816654465","volume-title":"Legislating Privacy: Technology, Social Values, and Public Policy","author":"Regan PM","year":"1995"},{"key":"bibr50-1461444816654465","volume-title":"The Unwanted Gaze: The Destruction of Privacy in America","author":"Rosen J","year":"2001"},{"key":"bibr51-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.1967.tb01454.x"},{"key":"bibr52-1461444816654465","doi-asserted-by":"publisher","DOI":"10.2307\/249477"},{"key":"bibr53-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.10.017"},{"key":"bibr54-1461444816654465","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v4i2.620"},{"key":"bibr55-1461444816654465","first-page":"330","volume-title":"Proceedings of the sixth international AAAI conference on web and social media","author":"Stutzman F","year":"2012"},{"key":"bibr56-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1080\/08838151.2012.732140"},{"key":"bibr57-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1177\/1461444812451566"},{"key":"bibr58-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2011.05.002"},{"key":"bibr59-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20530"},{"key":"bibr60-1461444816654465","doi-asserted-by":"publisher","DOI":"10.1108\/19355181200900011"},{"key":"bibr61-1461444816654465","unstructured":"Zickuhr K (2010) Generations 2010. Pew Internet & American Life Project, 16 December. Available at: http:\/\/www.pewinternet.org\/2010\/12\/16\/generations-2010\/"},{"key":"bibr62-1461444816654465","volume-title":"The Future of the Internet and How to Stop It","author":"Zittrain J","year":"2008"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816654465","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444816654465","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816654465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T10:49:54Z","timestamp":1740826194000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444816654465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,27]]},"references-count":62,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1177\/1461444816654465"],"URL":"https:\/\/doi.org\/10.1177\/1461444816654465","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,27]]}}}