2,317
Views
23
CrossRef citations to date
0
Altmetric
Articles

‘Adults don’t understand’: exploring how teens use dialectical frameworks to navigate webs of tensions in online life

&
Pages 21-41 | Received 08 May 2015, Accepted 31 May 2016, Published online: 22 Nov 2016

References

  • Above the Fray. (2015). Teen online life survey. Retrieved from https://www.surveymonkey.com/r/ATFtest
  • Ahmad, M. A., Shen, C., Srivastava, J., & Contractor, N. (2014). Predicting real world behaviors from virtual world data. New York, NY: Springer.
  • Amos, D. (2014, August 14). Online with a sexual predator. Retrieved from http://abcnews.go.com/WNT/story?id=130735
  • Baxter, L. A. (2004). A tale of two voices: Relational dialectics theory. Journal of Family Communication, 4(3/4), 181–192. doi:10.1207/s15327698jfc0403&4_5
  • Blackwell, C. K., Lauricella, A. R., Conway, A., & Wartella, E. (2014). Children and the internet: Developmental implications of web site preferences among 8- to 12-year-old children. Journal of Broadcasting & Electronic Media, 58(1), 1–20. doi:10.1080/08838151.2013.875022
  • Boren, J. P., & Alberts, J. K. (2011). The impact of an enacted social support training intervention on work life interaction and stress in a sample of working adults. Paper presented at the annual meeting of the National Communication Association, New Orleans, LA.
  • boyd, d. (2012). The politics of “real names”: Power, context, and control in networked publics. Communications of the ACM, 55(8), 29–31. doi: 10.1145/2240236.2240247
  • boyd, d., & Hargittai, E. (2013). Connected and concerned: Variation in parents’ online safety concerns. Policy & Internet, 5(3), 245–269. doi:10.1002/1944-2866.POI332
  • boyd, d., & Marwick, A. (2011, September 22). Social privacy in networked publics: Teens’ attitudes, practices, and strategies. Paper presented at the Oxford Internet Institute Decade in Internet Time Symposium.
  • Cahir, J., & Lloyd, J. (2015). ‘People just don’t care’: Practices of text messaging in the presence of others. Media, Culture & Society, 37(5), 703–719. doi:10.1177/0163443715577242
  • Catalina García, B., López de Ayala López, M. C., & García Jiménez, A. (2014). The risks faced by adolescents on the internet: Minors as actors and victims of the dangers of the internet. Revista Latina de Comunicación Social, 69, 462–485. doi:10.4185/RLCS-2014-1020en
  • Cingel, D. P., & Sundar, S. S. (2012). Texting, techspeak, and tweens: The relationship between text messaging and English grammar skills. New Media & Society, 14(8), 1304–1320. doi:10.1177/1461444812442927
  • Clair, R. P. (1996). The political nature of the colloquialism, “a real job”: Implications for organizational socialization. Communication Monographs, 63, 249–267. doi:10.1080/03637759609376392
  • Coughlan, S. (2016). Student suicide figures increase. BBC News. Retrieved from http://www.bbc.co.uk/news/education-36378573
  • Crowley, J. P. (2014). Expressive writing to cope with hate speech: Assessing psychobiological stress recovery and forgiveness promotion for lesbian, gay, bisexual, or queer victims of hate speech. Human Communication Research, 40(2), 238–261. doi:10.1111/hcre.12020
  • Davis, K. (2012). Tensions of identity in a networked era: Young people’s perspectives on the risks and rewards of online self-expression. New Media & Society, 14(4), 634–651. doi:10.1177/1461444811422430
  • Fairhurst, G. T., & Putnam, L. L. (2015). Sourcing paradoxical tensions in organizational discourse. 101st Annual Convention of the National Communication Association, Las Vegas, Nevada.
  • Foster, M. D. (2015). Tweeting about sexism: The well-being benefits of a social media collective action. British Journal of Social Psychology, 54, 629–647. doi:10.1111/bjso.12101
  • Harry, B., Sturges, K., & Klingner, J. (2005). Qualitative data analysis: Mapping the process. Educational Researcher, 34(2), 3–13. doi: 10.3102/0013189X034002003
  • Hu, E. (2013). What you need to know about babies, toddlers and screen time. Retrieved from http://kuow.org/post/what-you-need-know-about-babies-toddlers-and-screen-time
  • Lauricella, A. R., Cingel, D. P., Blackwell, C., Wartella, E., & Conway, A. (2014). The mobile generation: Youth and adolescent ownership and use of new media. Communication Research Reports, 31(4), 357–364. doi:10.1080/08824096.2014.963221
  • Lederman, L. C. (2004). Focus group interviews for alcohol prevention campaigns on college campuses: A manual for use in preparing, conducting, and analyzing data from focus group research. Rutgers, NJ: Center for Communication and Health Issues.
  • Lenhart, A. (2015). Teens, social media, and technology overview 2015. Retrieved from http://www.pewinternet.org/2015/04/09/teens-social-media-technology-2015/
  • Lindlof, T. R., & Taylor, B. C. (2011). Qualitative communication research methods. Thousand Oaks, CA: Sage.
  • Livingstone, S. (2003). Children’s use of the internet: Reflections on the emerging research agenda. New Media & Society, 5(2), 147–166. doi:10.1177/1461444803005002001
  • Livingstone, S. (2014). Developing social media literacy: How children learn to interpret risky opportunities on social network sites. Communications: The European Journal of Communication Research, 39(3), 283–303. doi:10.1515/commun-2014-0113
  • Marwick, A. E., & boyd, d. (2014). Networked privacy: How teenagers negotiate context in social media. New Media & Society, 16(7), 1051–1067. doi:10.1177/1461444814543995
  • Meisenbach, R. J. (2008). Working with tensions: Materiality, discourse, and (dis)empowerment in occupational identity negotiation among higher education fund-raisers. Management Communication Quarterly, 22(2), 258–287. doi:10.1177/0893318908323150
  • Meyers, E. M., Nathan, L. P., & Unsworth, K. (2010). Who’s watching your kids? Safety and surveillance in virtual worlds for children. Journal of Virtual Worlds Research, 3(2), 3–28.
  • Murphy, M. E. (2014). Why some schools are selling their iPads. Retrieved from http://www.theatlantic.com/education/archive/2014/08/whats-the-best-device-for-interactive-learning/375567/
  • Pauley, P. M., & Hesse, C. (2009). The effects of social support, depression, and stress on drinking behaviors in a college student sample. Communication Studies, 60(5), 493–508. doi:10.1080/10510970903260335
  • Pike, J. C., Bateman, P. J., & Butler, B. (2013). Dialectic tensions of information quality: Social networking sites and hiring. Journal of Computer-Mediated Communication, 19(1), 56–77. doi:10.1111/jcc4.12031
  • Prensky, M. (2001). Digital natives, digital immigrants part 1. On the Horizon, 9(5), 1–6. doi:10.1108/10748120110424816
  • Putnam, L. L., Fairhurst, G. T., & Banghart, S. (2016). Contradictions, dialectics, and paradoxes in organizations: A constitutive approach. The Academy of Management Annals, 10, 65–171. doi:10.1080/19416520.2016.1162421
  • Putnam, L. L., Myers, K. K., & Gailliard, B. M. (2014). Examining the tensions in workplace flexibility and exploring options for new directions. Human Relations, 67(4), 413–440. doi:10.1177/0018726713495704
  • Răcătău, I. M. (2013). Adolescents and identity formation in a risky online environment: The role of negative user-generated and xenophobic websites. Journal of Media Research, 6(3), 16–36.
  • Radovanović, D., Hogan, B., & Lalić, D. (2015). Overcoming digital divides in higher education: Digital literacy beyond Facebook. New Media & Society, 17, 1733–1749. doi:10.1177/1461444815588323
  • Ringrose, J., & Barajas, K. E. (2011). Gendered risks and opportunities? Exploring teen girls’ digitized sexual identities in postfeminist media contexts. International Journal of Media & Cultural Politics, 7(2), 121–138. doi:10.1386/macp.7.2.121_1
  • Roberto, A. J., & Eden, J. (2010). Cyberbullying: Aggressive communication in the digital age. In T. A. Avtgis & A. S. Rancer (Eds.), Arguments, aggression, and conflict: New directions in theory and research (pp. 198–216). New York, NY: Routledge.
  • Rosin, H. (2014, November). Why kids sext. Retrieved from http://www.theatlantic.com/magazine/archive/2014/11/why-kids-sext/380798/
  • Schrock, A., & boyd, d. (2011). Problematic youth interaction online: Solicitation, harassment, and cyberbullying. In K. B. Wright & L. M. Webb (Eds.), Computer-mediated communication in personal relationships (pp. 368–398). New York, NY: Peter Lang.
  • Selwyn, N. (2009). The digital native – myth and reality. Aslib Proceedings: New Information Perspectives, 61, 364–379. doi:10.1108/00012530910973776
  • Seo, M., Putnam, L. L., & Bartunek, J. M. (2004). Contradictions and tensions of planned organizational change. In M. S. Poole & A. Van de Ven (Eds.), Handbook of organizational change and innovation (pp. 73–107). New York, NY: Oxford University Press.
  • Tracy, S. J. (2013). Qualitative research methods. Malden, MA: Wiley-Blackwell.
  • Tracy, S. J., & Trethewey, A. (2005). Fracturing the real-self ↔ fake-self dichotomy: Moving toward ‘crystallized’ organizational discourses and identities. Communication Theory, 15, 168–195.
  • Vivienne, S., & Burgess, J. (2012). The digital storyteller’s stage: Queer everyday activists negotiating privacy and publicness. Journal of Broadcasting & Electronic Media, 56(3), 362–377. doi:10.1080/08838151.2012.705194
  • Way, A. (2013). Organizing girls’ empowerment: Negotiating tensions through community engaged research. TAMARA Journal for Critical Organization Inquiry, 11(4), 79–92.
  • Weinstein, E. C. (2014). The personal is political on social media: Online civic expression patterns and pathways among civically engaged youth. International Journal of Communication, 8, 210–233.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.