314
Views
0
CrossRef citations to date
0
Altmetric
Article

Research brief: early adolescents’ perceptions of the motivations and consequences of sharing passwords with friends in Belgium

ORCID Icon &
Pages 75-86 | Received 14 Apr 2021, Accepted 08 Jun 2022, Published online: 21 Jun 2022

References

  • Bevan, J. (2018). Social networking site password sharing and account monitoring as online surveillance. Cyberpsychology, Behavior and Social Networking, 21(12), 797–802.
  • Bowker, A. (2004). Predicting friendship stability during early adolescence. The Journal of Early Adolescence, 24(2), 85–112.
  • Buhrmester, D. (1990). Intimacy of friendship, interpersonal competence, and adjustment during preadolescence and adolescence. Child Development, 61(4), 1101–1111.
  • De Wolf, R. (2019). Contextualizing how teens manage personal and interpersonal privacy on social media. New Media & Society, 22(6), 1058–1075.
  • De Wolf, R., & Joye, S. (2019). Control responsibility: The discursive construction of privacy, teens, and Facebook in Flemish newspapers. International Journal of Communication, 13, 5505–5524.
  • Ferreira, A., Correia, R., Chadwick, D., Santos, H. M., Gomes, R., Reis, D., & Antunes, L. (2013). Password sharing and how to reduce it. In IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 22–42). Hershey, PA: IGI Global.
  • Frijns, T., Finkenauer, C., & Keijsers, L. (2013). Shared secrets versus secrets kept private are linked to better adolescent adjustment. Journal of Adolescence, 36(1), 55–64.
  • Gershon, I. (2014). Publish and be damned: New media publics and neoliberal risk. Ethnography, 15(1), 70–87.
  • Giordano, P. C. (2003). Relationships in adolescence. Annual Review of Sociology, 29(1), 257–281.
  • Gogus, A., & Saygın, Y. (2019). Privacy perception and information technology utilization of high school students. Heliyon, 5(5), e01614.
  • Hristova, D., Dumit, J., Lieberoth, A., & Slunecko, T. (2019). Snapchat streaks: How adolescents metagame gamification in social media. PsyArXiv Preprints. doi:10.31234/osf.io/nszex
  • Korkmazer, B., Bauwel, S. V., & Ridder, S. D. (2019). “Who does not dare, is a pussy”.: A textual analysis of media panics, youth, and sexting in print media. Observatorio (OBS*), 13, 53–69.
  • Krueger, R. A., & Casey, M. A. (2009). Focus groups: A practical guide for applied research (4th ed.). Thousand Oaks, California: Sage.
  • Lenhart, A., Madden, M., Smith, A., Purcell, K., Zickuhr, K., & Rainie, L. (2011). Teens, kindness and cruelty on social network sites: How American teens navigate the new world of “digital citizenship”. Washington, D.C: Pew Internet & American Life Project. Pew Research Center.
  • Livingstone, S. (2008). Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media & Society, 10(3), 393–411.
  • Lucero, J. L., Weisz, A. N., Smith-Darden, J., & Lucero, S. M. (2014). Exploring gender differences: Socially interactive technology use/abuse among dating teens. Affilia, 29(4), 478–491.
  • Marwick, A. E., & boyd, D. (2014). Networked privacy: How teenagers negotiate context in social media. New Media & Society, 16(7), 1051–1067.
  • McGlotten, S. (2019). Streaking. TDR/The Drama Review, 63(4), 152–171.
  • Merdenyan, B., & Petrie, H. (2022). Two studies of the perceptions of risk, benefits and likelihood of undertaking password management behaviours. Behaviour & Information Technology, 1–14. doi:10.1080/0144929X.2021.2019832
  • Meter, D. J., & Bauman, S. (2015). When sharing is a bad idea: The effects of online social network engagement and sharing passwords with friends on cyberbullying involvement. Cyberpsychology, Behavior and Social Networking, 18(8), 437–442.
  • Obada-Obieh, B., Huang, Y., & Beznosov, K. (2020). The burden of ending online account sharing. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. Honolulu, HI, USA.
  • Parker, J. G., Low, C. M., Walker, A. R., & Gamm, B. K. (2005). Friendship jealousy in young adolescents: Individual differences and links to sex, self-esteem, aggression, and social adjustment. Developmental Psychology, 41(1), 235–250.
  • Petronio, S. (2010). Communication privacy management theory: What do we know about family privacy regulation? Journal of Family Theory & Review, 2(3), 175–196.
  • Petronio, S. (2015). Communication privacy management theory. The International Encyclopedia of Interpersonal Communication, 1–9. doi:10.1002/9781118540190.wbeic132
  • Reed, L. A., Tolman, R. M., Ward, L. M., & Safyer, P. (2016). Keeping tabs: Attachment anxiety and electronic intrusion in high school dating relationships. Computers in Human Behavior, 58, 259–268.
  • Ringrose, J., Harvey, L., Gill, R., & Livingstone, S. (2013). Teen girls, sexual double standards and ‘sexting’: Gendered value in digital image exchange. Feminist Theory, 14(3), 305–323.
  • Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91(1), 93–114.
  • Van Gool, E., Van Ouytsel, J., Ponnet, K., & Walrave, M. (2015). To share or not to share? Adolescents’ self-disclosure about peer relationships on Facebook: An application of the prototype willingness model. Computers in Human Behavior, 44, 230–239.
  • Walrave, M., & Heirman, W. (2011). Cyberbullying: Predicting victimisation and perpetration. Children & Society, 25(1), 59–72.
  • Wolfe, D. A., Crooks, C. V., Chiodo, D., Hughes, R., & Ellis, W. (2011). Observations of adolescent peer resistance skills following a classroom-based healthy relationship program: A post-intervention comparison. Prevention Science, 13(2), 196–205.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.