New Media & Society: Networked Privacy: How Teenagers Negotiate Context in Social Media
New Media & Society: Networked Privacy: How Teenagers Negotiate Context in Social Media
com/
Media & Society
Published by:
http://www.sagepublications.com
Additional services and information for New Media & Society can be found at:
Subscriptions: http://nms.sagepub.com/subscriptions
Reprints: http://www.sagepub.com/journalsReprints.nav
Permissions: http://www.sagepub.com/journalsPermissions.nav
What is This?
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
543995
research-article2014
NMS0010.1177/1461444814543995new media & societyMarwick and boyd
Alice E Marwick
Fordham University, USA
danah boyd
Microsoft Research, USA
Abstract
While much attention is given to young people’s online privacy practices on sites like
Facebook, current theories of privacy fail to account for the ways in which social media
alter practices of information-sharing and visibility. Traditional models of privacy are
individualistic, but the realities of privacy reflect the location of individuals in contexts
and networks. The affordances of social technologies, which enable people to share
information about others, further preclude individual control over privacy. Despite this,
social media technologies primarily follow technical models of privacy that presume
individual information control. We argue that the dynamics of sites like Facebook
have forced teens to alter their conceptions of privacy to account for the networked
nature of social media. Drawing on their practices and experiences, we offer a model of
networked privacy to explain how privacy is achieved in networked publics.
Keywords
Context collapse, Facebook, privacy, social media, social network sites, teenagers
Introduction
Waffles: Every teenager wants privacy. Every single last one of them, whether they tell you or
not, wants privacy … Just because teenagers use internet sites to connect to other people
doesn’t mean they don’t care about their privacy. We don’t tell everybody every single thing
Corresponding author:
Alice E Marwick, Department of Communication and Media Studies, Fordham University, New York, NY
10458, USA.
Email: amarwick@gmail.com
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
2 new media & society
about our lives. We tell them general information—names, places, what we like to do—but
that’s general knowledge. That’s not something you like to keep private—“Oh, I play games. I
better not tell anybody about that.” … So to go ahead and say that teenagers don’t like privacy
is pretty ignorant and inconsiderate honestly, I believe, on the adult’s part.
The myth that teenagers do not care about privacy persists, despite evidence that suggests
little variation between adults and young people (Hoofnagle et al., 2010; Madden et al.,
2013). Almost all American teenagers (95%) are Internet users, and 85% use social media
(Lenhart et al., 2011). Parents, journalists, and entrepreneurs often use teens’ deep engage-
ment with and willingness to share information on social media as “proof” that they eschew
privacy. However, as “Waffles”—a White 17-year-old from North Carolina—explains,
online participation does not necessarily indicate that today’s teens reject privacy as a value
(Livingstone, 2008). Instead, teenagers attempt to simultaneously participate in the net-
worked publics that are foundational to their peer groups while maintaining a degree of
privacy. Simply put, they are trying to be in public without always being public. Their
frequent sharing of digital content does not suggest that they share indiscriminately, nor
does it mean that what they do share is intended for wide audiences.
New technologies, from closed-circuit television cameras to large databases, have
long complicated privacy practices (Solove, 2004). Such technologies shift the informa-
tion landscape in ways that call into question cultural assumptions and social norms
about sharing, visibility, and the very essence of privacy. By helping create “networked
publics”—spaces constructed through networked technologies and imagined communi-
ties that emerge as a result of the intersection of people, technology, and practice (boyd,
2014)—social media has given people new tools to see and be seen, forcing participants
to reassess their personal privacy desires in a highly networked society where sharing is
a central component of participation. Although models of data sharing are typically
understood through the lens of individual rights and controls, the networked nature of
social media means that individuals’ experiences with their data are consistently imbri-
cated with others. Given that social media content has the potential to be distributed to
enormous online audiences, there is a tendency to argue that the only way to maintain
privacy is not to share in the first place. Youth do not approach privacy this way. Instead,
they develop innovative mechanisms for achieving privacy in response to the technical
architectures and social dynamics that underpin networked publics.
In this article, we interrogate the notion that “teenagers don’t care about privacy” by
arguing that engagement with social media has shifted conceptions of privacy from an
individualistic frame to one that is networked. While social scientists have long argued
that privacy is contextual (Altman, 1977; Palen and Dourish, 2003), the individualistic
approach promulgated by legal frames and technological implementations has domi-
nated public discourse. Social media-enabled practices require people to contend with
the limitations of individual control and address how to actively navigate context when
boundaries cannot be taken for granted. We draw on examples from a large-scale ethno-
graphic study of American teenagers to explore what we refer to as networked privacy.
This article examines both how youth manage privacy in networked publics and how
networked data challenges predominant conceptualizations of privacy. We argue that the
realities of privacy practice in networked publics reveal the intrinsically contextual
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
Marwick and boyd 3
nature of privacy. As a result, legal and technical understandings of online privacy should
shift to incorporate networked contexts.
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
4 new media & society
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
Marwick and boyd 5
Method
This article draws from 166 semi-structured interviews with teenagers and participant
observation conducted across 17 US states as part of an ongoing ethnographic project
regarding teen social media practices (boyd, in press; Marwick and boyd, 2014). The
first wave of interviews (n = 106) was conducted in 14 states during 2006–2009 and
focused on general technology practices. The second wave (n = 60) was conducted in
2010–2011 in five states and emphasized privacy.
We worked with community organizations to recruit diverse teenagers. Of our inter-
view subjects, 94 were female and 72 were male. In all, 86 identified as White; 39 as
Black, African-American, or biracial Black/White; 22 as Hispanic, Chicano, Latino, or
biracial Hispanic/White; 13 as Asian, Indian, or Pakistani; 3 as Native American; and 3
as Middle Eastern or Egyptian. Our participants’ ranged in age from 13 to 19 (mean = 16).
A total of 45 teens had at least one parent with a graduate or professional degree, 50 had
at least one parent with a Bachelor of Arts (BA) or some college, and the parents of 35
had a high school diploma or less; 36 reported that they didn’t know their parents’ educa-
tion level. While this is not a generalizable sample, it reflects a variety of experiences and
backgrounds. All names and identifying information have been changed to protect the
identities of our participants.
Before each interview, participants (or their parents) signed a consent form. They
filled out a questionnaire, including open-ended questions about demography, household
makeup, technology usage, and media consumption. Interviews ranged from 60 minutes
to 2 hours. Participants were compensated for their time: US$ 30 during the first wave
and US$ 40 during the second wave.
We used a semi-structured interview method to ask about a range of topics, including
general questions like “What makes someone a friend?” in addition to technology-spe-
cific questions like “When is it better to use technology than to talk face-to-face?” The
second wave also included questions about privacy, sharing, and publicity. We followed
an ethnographic approach to interviewing, listening to how teenagers explained and con-
ceptualized their lives rather than interrogating the accuracy of their statements. We
focused on cultural meaning-making, language use, description, and experience
(Spradley, 1979). We asked participants to clarify with concrete examples, and took
screenshots of their social media profiles. Interviews were digitally recorded and tran-
scribed by a transcription company; a research assistant double-checked the transcripts
for accuracy.
Observing and participating in the communities where we interviewed teenagers
allowed us to situate interviews within a broader context. We attended school football
games, went to religious services at megachurches, and ate fast food alongside teens.
Our theory of networked privacy was formulated throughout data collection and anal-
ysis through both thematic and inductive analysis (Thomas, 2006). Reading through the
transcripts, both authors identified themes related to privacy (e.g. participants’ tactics),
emerging patterns, and concepts. Interview data were coded according to an emergent
coding schema using Atlas.ti. The second author (danah) wrote ethnographic memos of
specific incidents that demonstrated particular aspects of networked privacy. As our
understanding of networked privacy deepened, the first author (Alice) returned to the
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
6 new media & society
corpus and coded for related concepts. Due to the iterative nature of coding and analysis,
coding was ongoing.
During the writing process, our understanding of networked privacy developed based
on findings that problematized our original theories. We presented earlier versions of this
article at academic conferences and revised our theories based on feedback. Our theory
of networked privacy was thus formulated throughout interviewing, data analysis, and
writing, rather than in advance.
Determining context
It is challenging to manage discrete social worlds simultaneously, particularly when the
norms and values of these worlds differ. The resulting “context collapse,” in which seem-
ingly disparate audiences co-exist, often creates a sense of lost privacy. Hunter, a 14-year-
old Black youth from inner-city Washington, DC, is frustrated when friends or family
members fail to recognize that their beliefs and norms are not universally held:
When I’m talking to my friends on Facebook or I put up a status, something I hate is when
people who I’m not addressing in my statuses comment on my statuses. In [my old school],
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
Marwick and boyd 7
people always used to call me nerdy and that I was the least black black person that they’ve ever
met, some people say that, and I said on Facebook, “Should I take offense to the fact that
somebody put the ringtone ‘White and Nerdy’ [a satirical song by Weird Al Yankovic] for me?”
and it was a joke. I guess we were talking about it in school, and [my sister] comes out of
nowhere, “Aw, baby bro,” and I’m like, no, don’t say that, I wasn’t talking to you.
Hunter is friends with his sister on Facebook, but feels that she should understand that
not all Facebook conversations are intended for her. When danah asked him how some-
one should know what is appropriate for commentary, Hunter responded by saying,
I guess that is a point. Sometimes it probably is hard, but I think it’s just the certain way that
you talk. I will talk to my sister a different way than I’ll talk to my friends at school … I mean,
I think you can figure out that I’m not talking to you if I’m talking about a certain teacher.
Hunter recognizes that linguistic and social cues indicate whether or not a status update
is directed toward a particular audience.
In an effort to reclaim a sense of control over the social situations presented on
Facebook—and, thus, gain a sense of privacy—Hunter tries to use Facebook’s privacy
settings to segment his audience. When he wants to talk about video games, he posts dif-
ferent messages for his cousins and his classmates. Hunter’s cousins like first person
shooter games, and mock his interest in the old-fashioned Pokémon and Legend of Zelda
games popular among his peers at school. To avoid being embarrassed in front of his
school friends, he blocks his cousins from seeing these posts. While Hunter does not
want to exclude them from his life, he cannot imagine another way to manage the differ-
ent norms and values present in his network other than de-friending his cousins or delet-
ing comments, both of which are socially costly.
By manually filtering content suitable for his cousins and school friends, Hunter’s
experience highlights how challenging it can be to meaningfully control information
flow in a networked public where content is typically accessible and persistent. He suc-
ceeds primarily because he is the sole bridge between the two networks. Had his school
friends also been friends with his cousins, it would be much more difficult for Hunter to
separate family and school contexts because responses from friends would be visible to
his cousins.
While teens can control what they post on their profiles by using different privacy
settings, they have far less control over what friends post about them or how their friends’
practices shape how they’re seen. Ramón, a 17-year-old of Puerto Rican descent, is a
talented North Carolina soccer player aspiring to get a college athletic scholarship. He
regularly befriended university soccer coaches on Facebook to show that he was a
thoughtful, compassionate, all American athlete. His White classmate and friend Matthew
approached Facebook differently, often using the site to share crass and juvenile humor
with friends that was not intended for adult eyes. Matthew did not friend anyone outside
his peer group, but set his privacy settings so friends-of-friends could see his posts. He
assumed his friends treated Facebook similarly; he was horrified to realize that Ramón
was friends with college representatives. It hadn’t dawned on Matthew that adults might
see the joking comments he posted on Ramón’s pictures.
Matthew failed to understand the context in which he was posting, and thus misunder-
stood the potential audience for his remarks. Although he intended to share his jokes only
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
8 new media & society
with a limited audience, they traveled outside his envisioned boundary, exposing both
him and Ramón in unanticipated ways. Ramón is affected not only by his own content,
but how those around him socially co-construct Facebook. Meanwhile, Matthew cannot
realistically keep track of how each of his friends manages their privacy settings. This
means that in a networked environment, neither teen can assert control over the context.
To accurately define the social situation, they must understand how others have shaped
the context and operate accordingly. This is not practically possible.
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
Marwick and boyd 9
If you’re talking about somebody on Facebook, they can see it … not directly talking about
somebody, but talking about them without using their names, and then, they’ll start talking
about them without using their name, and it’s obviously they know they’re making fun of each
other.
Like everybody will use a quote that somebody said, and then they’ll be like, that’s so stupid or
something, who is she, and then another person will say it, and then they’ll, like, respond to
something else, and kind of making fun of them indirectly, fighting.
The practice of purposefully encoding messages that contain drama has become so
common on social media that some teens refer to this practice as “subtweeting.” A subt-
weet does not name names, but is clearly calling out or criticizing a specific individual;
some might characterize subtweets as “passive aggressive.” Subtweeting creates plausible
deniability, since the subtweeter can always claim the tweet was about someone else if
confronted. In other instances, the subtweet may reveal aspects of drama without reveal-
ing the whole story. One teenage boy posted on Twitter “Ok so you blocked me.. But why
LOL.” While the boy may be curious—laugh out loud (LOL) notwithstanding— there is
no @ reply or username mentioned, obscuring the incident from curious onlookers.
Sometimes, subtweets are obvious insults; another boy tweeted, “Why do u post pictures
on instagram of urself in the morning when u look so ratchet. #subtweet.” The insult is
magnified by the #subtweet tag which makes it explicit.
While social steganography and other methods to limit access to meaning are com-
mon teenage strategies, other tactics, especially those that involve creatively manipulat-
ing the technical affordances of social media, are less common. Consider the esoteric
techniques used by 18-year-old Mikalah and 17-year-old Shamika, two Black inner-city
teens in Washington, DC, who are wary of others.
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
10 new media & society
Mikalah wanted to limit adults’ access to her Facebook content. As a ward of the state,
government agencies regularly used technology to monitor her, or asked her about her
online activities. Frustrated by their surveillance and pressure, she tried to delete her
Facebook account. Instead, Facebook suggested that she deactivate her account, so she
could recover the content whenever she wished. She saw a unique opportunity to limit
what people could see about her, and so deactivated her account. Every evening, she
logged on to Facebook and reactivated her account. When she was done for the day, she
deactivated it again. She assumed—reasonably—that adults would not look at her
Facebook profile at night when she was chatting with friends. During the day, when she
was offline, it appeared that she didn’t have a Facebook page at all, since her account was
deactivated. In effect, she created an invisibility cloak for her Facebook, allowing her to
believe that she controlled the social situation by making Facebook a real-time service.
Shamika was more concerned with her peers, who frequently dredged up past com-
ments and status updates to start “drama” in the present. To gain control over the context
in which her remarks were interpreted, she chose to delete all comments and messages
she received after she read them, and deleted all the comments and updates that she left
on others’ pages a day or two after she posted them. By keeping Facebook clean, she was
able to focus others’ attention on the present rather than dealing with the persistent nature
of normative Facebook practices. While she acknowledged that anyone could manually
record older content by taking a screenshot, she stressed that this would be a clear viola-
tion of what she thought was appropriate. Her decision to eliminate content was her way
of maintaining control.
Mikalah and Shamika’s efforts to use Facebook’s technical affordances to control
their social situations are atypical, but exemplify extreme measures youth can take to
achieve privacy by using technology in unexpected ways. As teens attempt to negotiate
peers, friends, and family simultaneously on sites like Facebook, they appropriate tech-
nical affordances and develop different tactics and strategies to segment audiences,
restrict flows of information, and limit who can interpret what to the best of their ability.
This does not prevent people from posting messages about them, or others from misin-
terpreting what they see, but their ingenuity allows some degree of control in an other-
wise destabilizing social context.
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
Marwick and boyd 11
happening in her life, but also gives her most trusted friends access to intimate digital
materials:
I mean I do care about privacy, but if I found someone that I could trust then my first instinct
would be to share stuff with that person. For example, I think, like my last boyfriend and I we
were really close and then we had each other’s passwords to Facebook and to emails and stuff.
And so if I would get something that I didn’t know about then he would notify me and look over
my stuff.
For Meixing, making herself vulnerable to another is a form of intimacy: “It made me
feel more connected and less lonely. Because I feel like Facebook sometimes is kind of
like a lonely sport … But if someone else knows your password and stuff it just feels
better.”
The idea that Meixing could care about privacy while still sharing her password may
seem paradoxical. But this practice is quite common among teens, many of whom had
grown up sharing their passwords with their parents (Lenhart et al., 2011). Parents ask
children for their passwords based on advice from online safety experts. Some parents
make password sharing a rule, while others use the language of "trust" to frame password
sharing as a mechanism of protection. From this, many youths have concluded that to
trust means to share. And to share means to trust.
In a networked setting, teens cannot depend on single-handedly controlling how their
information is distributed. What their peers share about them, and what they do with the
information they receive cannot be regulated technically, but must be negotiated socially.
Teens may naively share with a significant other only to be spurned after a nasty breakup,
or they may trust their parents to only login to their accounts in an emergency. But no
technical solution can provide complete reassurance. Instead, teenagers often rely on
interpersonal relationship management to negotiate who shares what about them, who
does what with their information, and how their reputations are treated. As countless
teenagers have learned, assuming trust is by no means foolproof, but no technical solu-
tion to networked data offers a better path forward.
Examining the history of eavesdropping, John L. Locke (2010) explains that people
only share personal information when they are confident that it cannot hurt them. One
way to do this is through mutual information-sharing, which tends to build trust, “while,
paradoxically, making trust less necessary, since each party possesses the tools to hurt the
other” (Locke, 2010: 102). Trust and intimacy create reciprocity, which, less charitably,
might be viewed as a sort of mutually assured destruction. Similarly, teenagers create
trust by revealing information, which in turn may prevent their intimates from revealing
that information to others and thus breaking trust. Nissenbaum (2010) describes such
contexts as “spheres of trust,” she writes, “the parent chooses not to read the child’s jour-
nal, even though he knows where the journal is kept, as this would not only violate a
principle of transmission but would undermine the bonds of trust” (pp. 240–241).
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
12 new media & society
seek to share and maintain privacy. The clunky “access-control list” and “personally
identifiable information” models do not cover the instances in which a user’s desired
approach to information flow may be violated by her network or by a system’s technical
architecture. If a Facebook user is tagged in a picture or mentioned in a status update, it
will appear on her timeline. Even if she is not tagged, Facebook’s “tag suggestion” fea-
ture may suggest her name to others, based on tagging patterns and facial recognition
algorithms (Butcher, 2013). If a Twitter account is private, friends with public accounts
who @reply to tweets or retweet messages may reveal the topic of an otherwise pro-
tected conversation. Mobile location apps like Foursquare make it possible for friends to
“check in” a user at a physical location without prior permission, while LiveJournal
makes the time stamp of the last journal entry public, revealing to filtered-out users that
posts existed that they cannot see.
Social media privacy controls imply that individuals should be held responsible for
how they manage their privacy settings regardless of how well they understand those
settings or how frequently those settings change. Facebook’s privacy settings, for exam-
ple, have changed significantly over the last decade (Stutzman et al., 2013), and many
users are not confident that they can configure their settings to obtain a desired level of
privacy (boyd and Hargittai, 2010). Even when people do configure their settings cor-
rectly, information can still slip through the cracks. When Taylor McCormick, a student
at the University of Texas, joined the campus’s Queer Chorus Facebook group, his par-
ticipation was broadcast to everyone in his network, effectively outing him to his parents.
While Taylor had configured his privacy settings to exclude his parents from seeing
much of what he posted, groups have separate privacy settings which trump that of the
individual user (Fowler, 2012).
When users choose to share content, or fail to keep content private, companies often
reserve the right to share that data with third parties. Others may mine, store, or republish
that content elsewhere under the guise that it was public and, therefore, permissible,
regardless of the desires of the relevant parties. In a networked world, technical mecha-
nisms often drive normative sensibilities. Businesses, governments, educators, law
enforcement, and other actors use these technical affordances to justify decisions to
examine, use, and spread anything that is visible. The onus is placed on the individual to
understand and adjust their settings and practices accordingly. Failure to do so is inter-
preted as apathy vis-à-vis privacy, giving rise to the popular idea that because teenagers
share information online, they “don’t care” about privacy.
Networked privacy
In order to better understand how privacy is achieved in networked publics, we need a
model of privacy that is networked. Privacy in social media cannot be entirely main-
tained and established by individuals, as it is not wholly dependent on individual choices
or control over data. This networked context is determined through a combination of
audience, technical mechanisms, and social norms. Because contexts shift and overlap
over time, privacy is an ongoing, active practice. How people achieve privacy depends
not solely on their ability to navigate technology, but requires them to fully understand
the context in which they are operating, influence others’ behaviors, shape who can
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
Marwick and boyd 13
interpret what information, and possess the knowledge and skills necessary to directly
affect how information flows and is interpreted within that context. In other words, they
must have agency. Networked publics complicate privacy precisely because they alter
social situations in such ways that having power, knowledge, and skills cannot be taken
for granted.
Networked privacy invokes the constellation of audience dynamics, social norms, and
technical functionality that affect the processes of information disclosure, concealment,
obscurity, and interpretation within a networked public. If we understand privacy to be
about the management of boundaries, networked privacy is the ongoing negotiation of
contexts in a networked ecosystem in which contexts regularly blur and collapse.
Networked privacy cannot be achieved simply by providing or denying information; it
requires meaningful control over the networked contexts in which the information flows.
In other words, achieving privacy requires that people have an understanding of and
influence in shaping the context in which information is being interpreted. This can be
done by co-constructing the architecture of the systems, or it can be done by embedding
meaning and context into the content itself.
Ultimately, attempts to navigate privacy through social media reveal the underlying
interactional dynamics of privacy practices, demonstrating that the individualistic model
of privacy does not accurately map to human behavior. People live in social contexts;
their acts within networked publics implicate each other. Recognizing that privacy is
networked suggests that privacy might best be maintained through shared social norms
over information-sharing.
Furthermore, conceptualizing privacy as networked highlights the difficulty involved
in defining or even understanding social contexts, as they are co-constructed by all pre-
sent and shaped by the affordances of the social technology in play.
To illustrate these shifts, consider the results when Alice asked her students to violate
an unspoken online social norm. Some chose to comment on older photos of their friends.
Interacting with older photos can be a taboo among college students, who, after all, have
embarrassing middle school pictures in their Facebook albums. Although these photos
were “public,” in that they were visible to all Facebook friends, the act of commenting
re-broadcast them to the network. In other words, the act of commenting became an act
of publicizing. The pushback from peers was intense; some students were defriended,
others were gossiped about, while still others received text messages or phone calls ask-
ing them to stop. The complex information norms of Facebook were not about whether
the photos were public or private, but whether or not they were publicized. The fact that
this dynamic is experienced as a privacy violation is indicative of how context and norms
are entwined with networked privacy.
Conclusion
Legal and technical instantiations of online privacy assume that individuals can and should
manage privacy. Networked privacy offers a different model for understanding privacy
practices in a networked era. Networked privacy also challenges the access-control list
model, which suggests that privacy can be managed by determining who can see a particu-
lar piece of information. In the networked privacy model, it is assumed that information
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
14 new media & society
will pass through the network and that privacy can easily be violated by any individual
connected to the user. The only guarantee against such things may be shared social norms
and social ties. Even if a user makes a picture available to only three friends, these friends
can easily disseminate it further. Whether or not they do so is not predicated upon their
access to the picture, but their shared social norms and ties to the picture-provider.
Furthermore, networked privacy complicates Nissenbaum’s theory of contextual
integrity. Contextual integrity assumes that an individual can easily understand the con-
text in which information is originally provided, that contexts are stable and separable,
and that privacy violations only occur once information slips to a different context with
differing information norms. Networked privacy goes further to suggest that information
norms and contexts are co-constructed by participants and frequently shifting. There are
differing skill levels to understanding context, and context slips and changes according
to fluctuating social norms and technological affordances. Moreover, contexts are not
bounded and information norms are not fixed. Instead, situations are co-constructed by
all participants. Contextual integrity assumes the context is a given, whereas networked
privacy takes into account that individuals may interpret context differently, that contexts
may be destabilized or collapse, or that other people may have control over the context
in ways that are beyond the purview of the individual (e.g. surveillance, information
leakage, or data-mining).
A theory of networked privacy suggests that we must re-conceptualize the harms of
privacy. Rather than thinking about privacy harms in terms of individuals or groups—
classes of people—we need to frame privacy in terms of networks, or the relationships
between people. Social media highlights that information is intrinsically intertwined;
photographs contain multiple subjects, messages have senders and recipients, and people
share information that implicates others. These complexities cannot be resolved through
property models that rely on joint rights. Instead, viable models need to respect that net-
works of people are connected to information shared in a socially networked world. In a
world where networked privacy is common, both legal and technical regimes around
information privacy must adapt to better reflect the reality of networked social
information.
A networked model of privacy contradicts many of the paternalistic discourses about
young people that exist today. When privacy models are individual and technology-
focused, the onus is placed on teens, their guardians, or the technology itself to control
the flow of data. If a teenager makes digital content available, there is an assumption that
privacy no longer matters. Concerned adults encourage teenagers to lock down access
for protection. When they do not, they are assumed to be naïve, irresponsible, or engag-
ing in risky behaviors.
Networked publics make it difficult for teens to effectively control information flow.
The privacy practices and strategies that teenagers engage in do not necessarily “solve”
the problem of privacy, but they do reveal how the technical affordances of networked
publics are insufficient to protect privacy. Networked publics create serious and signifi-
cant conflicts for what youth are trying to achieve in disclosing or withdrawing both
information and meaning. Their strategies and tactics reveal one way of managing this
conundrum, while also highlighting the importance of re-conceptualizing privacy in a
networked era.
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
Marwick and boyd 15
Acknowledgements
The authors would like to thank the attendees of the 2011 Privacy Law Scholars Conference, the
2012 Association of Internet Researchers annual meeting, and the Oxford Internet Institute’s A
Decade in Internet Time symposium; members of the Social Media Collective at Microsoft
Research and the Privacy Research Group at NYU Law; Heather Casteel; and the anonymous
reviewers for their helpful feedback and advice.
Funding
This project was funded by Microsoft Research and the John D. and Catherine T. MacArthur
Foundation. Its findings are solely the responsibility of the authors and do not necessarily represent
the views of either funder.
References
Altman I (1977) Privacy regulation: culturally universal or culturally specific? Journal of Social
Issues 33(3): 66–84.
Barbaro M and Zeller T Jr (2006) A face is exposed for AOL searcher no. 4417749. The New York
Times, 9 August. Available at: http://www.nytimes.com/2006/08/09/technology/ 09aol.html
boyd d (2014) It’s Complicated: The Social Lives of Networked Teens. New Haven, CT: Yale
University Press.
boyd d and Hargittai E (2010) Facebook privacy settings: who cares? First Monday 15(8): 2.
boyd d and Marwick A (2011) Social privacy in networked publics: teens’ attitudes, practices,
and strategies. Paper presented at the Oxford Internet Institute Decade in Internet Time
Symposium, Oxford, 22 September.
boyd d (in press) Making sense of teen life: strategies for capturing ethnographic data in a net-
worked era. In: Hargittai E and Sandvig C (eds) Digital Research Confidential: The Secrets
of Studying Behavior Online. Cambridge, MA: The MIT Press.
Butcher M (2013) Facebook turns photo tag suggestions back on in the US: will users like it this
time? TechCrunch, 1 February. Available at: http://techcrunch.com/2013/02/01/facebook-
turns-photo-tag-suggestions-back-on-in-the-us-will-users-like-it-this-time/ (accessed 24 July
2013).
Cohen JE (2012) Configuring the Networked Self: Law, Code, and the Play of Everyday Practice.
New Haven, CT: Yale University Press.
Fowler GA (2012) When the most personal secrets get outed on Facebook. The Wall Street
Journal, 13 October. Available at: http://online.wsj.com/news/articles/SB10000872396390
444165804578008740578200224
Goffman E (1959) The Presentation of Self in Everyday Life. New York: Doubleday.
Hoofnagle CJ, King J, Li S, et al. (2010) How Different Are Young Adults from Older Adults
When It Comes to Information Privacy Attitudes and Policies? Berkeley, CA: University
of California, Berkeley. Available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_
id=1589864
John NA (2013) Sharing and Web 2.0: the emergence of a keyword. New Media & Society 15(2):
167–182.
Johnson NF and Jajodia S (1998) Exploring steganography: seeing the unseen. Computer 31(2):
26–34.
Lenhart A, Madden M, Smith A, et al. (2011) Teens, Kindness and Cruelty on Social Network
Sites. Washington, DC: Pew Internet & American Life Project. Available at: http://pewinter-
net.org/Reports/2011/Teens-and-social-media.aspx
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
16 new media & society
Livingstone S (2008) Taking risky opportunities in youthful content creation: teenagers’ use of
social networking sites for intimacy, privacy and self-expression. New Media & Society
10(3): 393–411.
Locke JL (2010) Eavesdropping: An Intimate History. New York: Oxford University Press.
McCallister E, Grance T and Scarfone KA (2010) Guide to Protecting the Confidentiality
of Personally Identifiable Information (PII) (Computer Security, Special Publication).
Washington, DC: National Institute of Standards and Technology. Available at: http://csrc.
nist.gov/publications/nistpubs/800-122/sp800-122.pdf (accessed 26 March 2014).
Madden M, Lenhart A, Cortesi S, et al. (2013) Teens, Social Media, and Privacy. Washington, DC:
Pew Internet & American Life Project. Available at: http://pewinternet.org/Reports/2013/
Teens-Social-Media-And-Privacy/Summary-of-Findings.aspx (accessed 11 July 2013).
Marwick A and boyd d (2011) I tweet honestly, I tweet passionately: Twitter users, context col-
lapse, and the imagined audience. New Media & Society 13(1): 114–133.
Marwick A and boyd d (2014) ‘It’s Just Drama’: teen perspectives on conflict and aggres-
sion in a networked era. Journal of Youth Studies. Epub ahead of print 4 April. DOI:
10.1080/13676261.2014.901493.
Narayanan A and Shmatikov V (2010) Myths and fallacies of personally identifiable information.
Communications of the ACM 53(6): 24–26.
Nelson M (2010) Parenting Out of Control: Anxious Parents in Uncertain Times. New York:
NYU Press.
Nippert-Eng CE (2010) Islands of Privacy. Chicago, IL: The University of Chicago Press.
Nissenbaum HF (2010) Privacy in Context: Technology, Policy, and the Integrity of Social Life.
Stanford, CA: Stanford University Press.
Ohm P (2010) Broken promises of privacy: responding to the surprising failure of anonymization.
UCLA Law Review 57: 1701.
Palen L and Dourish P (2003) Unpacking ‘privacy’ for a networked world. In: Proceedings of
the SIGCHI conference on human factors in computing systems, Fort Lauderdale, FL, 5–10
April, pp. 129–136. New York: ACM.
Regan PM (1995) Legislating Privacy: Technology, Social Values, and Public Policy. Durham,
NC: The University of North Carolina Press.
Ruck M, Harris A, Fine M, et al. (2008) Youth experiences of surveillance. In: Flynn M and
Brotherton D (eds) Globalizing the Streets: Cross-Cultural Perspectives on Youth, Social
Control, and Empowerment. New York: Columbia University Press, pp. 15–30.
Schwartz PM and Solove DJ (2011) The PII problem: privacy and a new concept of personally
identifiable information. New York University Law Review 86: 1814. Available at: http://
papers.ssrn.com/abstract=1909366 (accessed 23 July 2013).
Shmueli B and Blecher-Prigat A (2010) Privacy for children. Columbia Human Rights Law Review
42: 759.
Solove DJ (2004) The Digital Person: Technology and Privacy in the Information Age. New York:
NYU Press.
Spradley JP (1979) The Ethnographic Interview. New York: Harcourt Brace Jovanovich.
Stutzman F, Gross R and Acquisti A (2013) Silent listeners: the evolution of privacy and disclo-
sure on Facebook. Journal of Privacy and Confidentiality 4(2): 2.
Sundén J (2003) Material Virtualities: Approaching Online Textual Embodiment. New York:
Peter Lang.
Sweeney L (2000) Uniqueness of Simple Demographics in the US Population. Pittsburgh, PA:
Laboratory for International Data Privacy, Carnegie Mellon University.
Thomas DR (2006) A general inductive approach for analyzing qualitative evaluation data.
American Journal of Evaluation 27(2): 237–246.
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014
Marwick and boyd 17
Tufekci Z (2008) Can you see me now? Audience and disclosure regulation in online social net-
work sites. Bulletin of Science, Technology & Society 28(1): 20–36.
Vitak J, Lampe C, Ellison N, et al. (2012) ‘Why Won’t You Be My Facebook Friend?’: strategies
for managing context collapse in the workplace. In: Proceedings of the 7th annual iConfer-
ence, Toronto, ON, Canada, 7–10 February, pp. 555–557. New York: ACM.
Wilkins RG (1987) Defining the reasonable expectation of privacy: an emerging tripartite analysis.
Vanderbilt Law Review 40: 1077–1129.
Author biographies
Alice E Marwick is the director of the McGannon Center and an Assistant Professor of
Communication and Media Studies at Fordham University. She is the author of Status Update:
Celebrity, Publicity and Branding in the Social Media Age (Yale 2013).
danah boyd is a Principal Researcher at Microsoft Research and the Chief Instigator of the Data &
Society Research Institute. She is the author of It’s Complicated: The Social Lives of Networked
Teens (Yale 2014).
Downloaded from nms.sagepub.com at CHINESE UNIV HONG KONG LIB on November 16, 2014