{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:28:20Z","timestamp":1777937300300,"version":"3.51.4"},"reference-count":44,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T00:00:00Z","timestamp":1690502400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2025,2]]},"abstract":"<jats:p>\n                    Society has normalized the use of the screenshot feature to surreptitiously capture and share private digital messages. While screenshots have utilitarian purposes, we provide evidence that this feature enables violations of interpersonal privacy expectations. In addition, we extend communication privacy management (CPM) theory beyond its interpersonal limitations to include platforms as privacy rulemakers through explicit cues and embedded trust. We conducted a 2(Accountability cue: present or absent) \u00d7 3(Platform trust: high, low, control) between-subjects experiment to understand their conditional impact on control over and disclosure of personal and co-owned information within a proposed digital messaging platform (\n                    <jats:italic>N<\/jats:italic>\n                    \u2009=\u2009307). Our experimental results showcase the power of a screenshot accountability cue and platform trust on privacy perceptions and management within messaging platforms. Implications for design against the screenshot feature are discussed.\n                  <\/jats:p>","DOI":"10.1177\/14614448231188929","type":"journal-article","created":{"date-parts":[[2023,7,29]],"date-time":"2023-07-29T00:57:09Z","timestamp":1690592229000},"page":"1053-1072","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":13,"title":["Platform rules as privacy tools: The influence of screenshot accountability and trust on privacy management"],"prefix":"10.1177","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8085-2355","authenticated-orcid":false,"given":"Alexis","family":"Shore","sequence":"first","affiliation":[{"name":"Boston University, USA"}]},{"given":"Kelsey","family":"Prena","sequence":"additional","affiliation":[{"name":"Boston University, USA"}]}],"member":"179","published-online":{"date-parts":[[2023,7,28]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1100.0335"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1108\/09593841111109431"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820939922"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415244"},{"key":"e_1_3_4_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.08.035"},{"key":"e_1_3_4_7_1","volume-title":"The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age","author":"Citron DK","year":"2022","unstructured":"Citron DK (2022) The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age. London: W.W. Norton; Penguin Vintage."},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/13548565221089211"},{"key":"e_1_3_4_9_1","first-page":"1","article-title":"Uses and gratifications of the screenshot in human communication: an exploratory study","volume":"29","author":"Cramer EM","year":"2019","unstructured":"Cramer EM, Sang Y, Park S (2019) Uses and gratifications of the screenshot in human communication: an exploratory study. The Electronic Journal of Communication 29: 1\u201320.","journal-title":"The Electronic Journal of Communication"},{"key":"e_1_3_4_10_1","unstructured":"Dorman JL (2022) GOP Sens. Rubio Daines face backlash for sharing photos of Zelensky on social media after being asked to protect his safety. Business Insider 6 March. Available at: https:\/\/www.businessinsider.in\/politics\/world\/news\/gop-sens-rubio-daines-face-backlash-for-sharing-photos-of-zelensky-on-social-media-after-being-asked-to-protect-his-safety\/articleshow\/90022227.cms"},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819833331"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/joc\/jqab006"},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.1093\/ct\/qtab008"},{"key":"e_1_3_4_14_1","doi-asserted-by":"publisher","DOI":"10.4159\/9780674985124"},{"key":"e_1_3_4_15_1","unstructured":"Hauff S Veit D (2014) Communication privacy management in the digital age: effects of general and situational privacy concerns. Available at: https:\/\/d-nb.info\/1222438771\/34"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1086\/660854"},{"key":"e_1_3_4_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819878806"},{"key":"e_1_3_4_18_1","first-page":"1153","article-title":"Communication privacy management for smart speaker use: integrating the role of privacy self-efficacy and the multidimensional view","volume":"5","author":"Kang H","year":"2021","unstructured":"Kang H, Oh J (2021) Communication privacy management for smart speaker use: integrating the role of privacy self-efficacy and the multidimensional view. New Media & Society 5: 1153\u20131175.","journal-title":"New Media & Society"},{"key":"e_1_3_4_19_1","doi-asserted-by":"publisher","DOI":"10.1057\/s41303-017-0064-z"},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274359"},{"key":"e_1_3_4_21_1","first-page":"6905","article-title":"A snap of intimacy: photo-sharing practices among young people on social media","volume":"21","author":"Kofoed J","year":"2016","unstructured":"Kofoed J, Larsen MC (2016) A snap of intimacy: photo-sharing practices among young people on social media. First Monday 21: 6905.","journal-title":"First Monday"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.012"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432954"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2013.805244"},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392836"},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24291"},{"key":"e_1_3_4_27_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3274376","article-title":"Tell me before you stream me: managing information disclosure in video game live streaming","volume":"2","author":"Li Y","year":"2018","unstructured":"Li Y, Kou Y, Lee JS, et al. (2018) Tell me before you stream me: managing information disclosure in video game live streaming. Proceedings of the ACM on Human-Computer Interaction 2: 1\u201318.","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"e_1_3_4_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.10.029"},{"key":"e_1_3_4_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479504"},{"key":"e_1_3_4_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"e_1_3_4_31_1","doi-asserted-by":"crossref","unstructured":"Paul C Scheibe K Nilakanta S (2020) Privacy concerns regarding wearable IoT devices: how it is influenced by GDPR? In: Proceedings of the 53rd Hawaii international conference on system sciences. Available at: https:\/\/core.ac.uk\/download\/pdf\/286030593.pdf","DOI":"10.24251\/HICSS.2020.536"},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1353\/book4588"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/15267431.2013.743426"},{"key":"e_1_3_4_34_1","first-page":"365","volume-title":"Uncertainty, Information Management, and Disclosure Decisions: Theories and Applications","author":"Petronio S","year":"2009","unstructured":"Petronio S, Reierson J (2009) Regulating the privacy of confidentiality: grasping the complexities through communication privacy management theory. In: Afifi TD, Afifi WA (eds) Uncertainty, Information Management, and Disclosure Decisions: Theories and Applications. New York: Routledge, pp. 365\u2013383."},{"key":"e_1_3_4_35_1","unstructured":"Pu Y Grossklags J (2017) Valuating {friends\u2019} privacy: does anonymity of sharing personal data matter? In: Thirteenth symposium on usable privacy and security (SOUPS 2017) pp. 339\u2013355. Available at: https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/pu#:~:text=Valuating%20Friends'%20Privacy%3A%20Does%20Anonymity%20of%20Sharing%20Personal%20Data%20Matter%3F -Authors%3A&text=Abstract%3A to%20control%20these%20information%20flow"},{"key":"e_1_3_4_36_1","volume-title":"Intellectual Privacy: Rethinking Civil Liberties in the Digital Age","author":"Richards N","year":"2015","unstructured":"Richards N (2015) Intellectual Privacy: Rethinking Civil Liberties in the Digital Age. Oxford: Oxford University Press."},{"key":"e_1_3_4_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/01463373.2015.1039717"},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.1093\/ct\/qtz035"},{"issue":"1","key":"e_1_3_4_39_1","first-page":"220","article-title":"Managing disclosure through social media: how Snapchat is shaking boundaries of privacy perceptions","volume":"6","author":"Velten JC","year":"2017","unstructured":"Velten JC, Arif R, Moehring D (2017) Managing disclosure through social media: how Snapchat is shaking boundaries of privacy perceptions. The Journal of Social Media in Society 6(1): 220\u2013250.","journal-title":"The Journal of Social Media in Society"},{"key":"e_1_3_4_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/03637751.2012.697628"},{"key":"e_1_3_4_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274450"},{"key":"e_1_3_4_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820979708"},{"key":"e_1_3_4_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-019-00335-0"},{"key":"e_1_3_4_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/02650487.2016.1186951"},{"key":"e_1_3_4_45_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00281"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14614448231188929","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14614448231188929","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14614448231188929","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:59:26Z","timestamp":1777694366000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14614448231188929"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,28]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["10.1177\/14614448231188929"],"URL":"https:\/\/doi.org\/10.1177\/14614448231188929","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,28]]}}}