Creative beyond TikToks: Investigating Adolescents' Social Privacy Management on TikTok

AI-generated keywords: Privacy Adolescents TikTok COM-B Model Algorithmic Recommendations

AI-generated Key Points

  • The study focuses on privacy management practices of adolescent users on TikTok
  • 54 adolescents in Switzerland were interviewed and their responses were analyzed using the COM-B model
  • Young TikTok users are aware of privacy related to their online social connections and perform conscious privacy management
  • The study identified new patterns related to the central role of algorithmic recommendations potentially relevant for other social networks
  • Adolescents find creative ways to protect their privacy such as identifying stalkers or maintaining multiple user accounts with different privacy settings
  • Anonymized, coded interview transcripts are publicly available for further research purposes
  • The study proposes various concrete measures to develop interventions that protect adolescent users' privacy on TikTok based on these findings.
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Nico Ebert, Tim Geppert, Joanna Strycharz, Melanie Knieps, Michael Hönig, Elke Brucker-Kley

License: CC BY 4.0

Abstract: TikTok has been criticized for its low privacy standards, but little is known about how its adolescent users protect their privacy. Based on interviews with 54 adolescents in Switzerland, this study provides a comprehensive understanding of young TikTok users' privacy management practices related to the creation of videos. The data were explored using the COM-B model, an established behavioral analysis framework adapted for sociotechnical privacy research. Our overall findings are in line with previous research on other social networks: adolescents are aware of privacy related to their online social connections (social privacy) and perform conscious privacy management. However, we also identified new patterns related to the central role of algorithmic recommendations potentially relevant for other social networks. Adolescents are aware that TikTok's special algorithm, combined with the app's high prevalence among their peers, could easily put them in the spotlight. Some adolescents also reduce TikTok, which was originally conceived as a social network, to its extensive audio-visual capabilities and share TikToks via more private channels (e.g., Snapchat) to manage audiences and avoid identification by peers. Young users also find other creative ways to protect their privacy such as identifying stalkers or maintaining multiple user accounts with different privacy settings to establish granular audience management. Based on our findings, we propose various concrete measures to develop interventions that protect the privacy of adolescents on TikTok.

Submitted to arXiv on 27 Jan. 2023

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2301.11600v1

This study delves into the privacy management practices of adolescent users on TikTok, a social media platform that has been criticized for its low privacy standards. The research team conducted interviews with 54 adolescents in Switzerland and used the COM-B model to analyze their responses. The findings show that young TikTok users are aware of privacy related to their online social connections and perform conscious privacy management. However, the study also identified new patterns related to the central role of algorithmic recommendations potentially relevant for other social networks. Adolescents are aware that TikTok's special algorithm, combined with the app's high prevalence among their peers, could easily put them in the spotlight. Some adolescents also reduce TikTok to its extensive audio-visual capabilities and share TikToks via more private channels to manage audiences and avoid identification by peers. Young users also find other creative ways to protect their privacy such as identifying stalkers or maintaining multiple user accounts with different privacy settings to establish granular audience management. To analyze the content of the interviews, a two-step procedure was used that first divided each statement into one of the four COM-B components before further subdividing them into privacy-specific content. An inductive thematic analysis was conducted to identify themes within similarly coded statements. Ultimately, researchers reviewed and discussed emerging themes, merged similar ones, and re-labeled others. The study proposes various concrete measures to develop interventions that protect adolescent users' privacy on TikTok based on these findings. The anonymized, coded interview transcripts are publicly available for further research purposes. Overall, this study provides a comprehensive understanding of how young TikTok users manage their social privacy while creating videos on this popular platform.
Created on 02 May. 2023

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.