Teens' privacy management on video-sharing social media: the roles of perceived privacy risk and parental mediation

Hyunjin Kang,Wonsun Shin,Junru Huang
DOI: https://doi.org/10.1108/intr-01-2021-0005
IF: 5.9
2021-07-16
Internet Research
Abstract:Purpose This study investigates how different parental mediation strategies (active versus restrictive) and teen Douyin users' privacy risk perceptions are associated with their privacy management behaviors. Design/methodology/approach An online survey with teen Douyin users ( N = 500) was administered in mainland China. Findings Perceived privacy risk leads teenagers to implement stricter privacy management strategies. However, different types of parental mediation have different impacts on teens' privacy management behaviors. Discussion-based active mediation is positively correlated with privacy disclosure and privacy boundary linkage, while rule-based restrictive mediation is positively associated with privacy boundary control. In addition, active mediation encourages teens to use their own judgment about privacy risks when deciding how much personal information to disclose and with whom they want to share their information. Conversely, restrictive mediation results in teens making decisions about disclosing private information without taking their own risk assessments into account. Originality/value Video-sharing social media platforms like TikTok and Douyin have become a cultural trend among teen social media users. However, loss of privacy is a potentially serious downside of using such platforms. Despite the platforms' popularity among this age group, little is known about the ways teens manage their privacy on such social media platforms. By examining how teens' privacy risk perception and parental intervention shape three different aspects of privacy boundary management (i.e. privacy disclosure, privacy boundary linkage, and privacy boundary control), this study provides a comprehensive understanding of teen Douyin users' privacy management.
computer science, information systems,telecommunications,business
What problem does this paper attempt to address?