Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Privacy and Safety on Social Networking Sites: Autistic and Non-Autistic Teenagers’ Attitudes and Behaviors

Published: 07 January 2022 Publication History

Abstract

Autistic teenagers are suspected to be more vulnerable to privacy and safety threats on social networking sites (SNS) than the general population. However, there are no studies comparing these users’ privacy and safety concerns and protective strategies online with those reported by non-autistic teenagers. Furthermore, researchers have yet to identify possible explanations for autistic teenagers’ increased risk of online harms. To address these research gaps, we conducted semi-structured interviews with 12 autistic and 16 non-autistic teenagers assessing their privacy- and safety-related attitudes and behaviors on SNS, and factors affecting them. We used videos demonstrating relevant SNS scenarios as prompts to engage participants in conversation. Through our thematic analyses, we found evidence that autistic teenagers may be more averse to taking risks on SNS than non-autistic teenagers. Yet, several personal, social, and SNS design factors may make autistic teenagers more vulnerable to cyberbullying and social exclusion online. We provide recommendations for making SNS safer for autistic teenagers. Our research highlights the need for more inclusive usable privacy and security research with this population.

Appendices

I Interview Guide

Introduction and Assent
Hi, my name is Jessica. I am a student at Carleton University. Today, we are going to talk about privacy on [SNS]. During the session, we will look at a [SNS] user’s profile and watch some video messages describing different online social situations. I will ask you to give some advice about what the person should do in each situation. I will also ask you about your own experiences using [SNS].
Today’s session will take about 30 minutes to complete. I will record your voice so that I remember your comments. If you don’t want me to record your voice, please let me know.
The information you will share with me will be safely locked up. No one will hear what you said except for me and my supervisor. Just remember, I am not testing you—I just want to hear your thoughts and opinions.
You have the choice to do this study or not; it is entirely up to you. You can say okay now and change your mind later. All you have to do is tell me that you want to stop. It really is okay to say stop.
To thank you for your help, I will give you $30 cash. You can keep the money even if you decide to stop the study.
Do you have any questions? Remember that you can ask questions at any time.
Do you agree to participate in this study?
Do you agree to be audio-recorded?
Scenarios
Okay, great! So, here is the scenario for this part of the session: An [SNS] user named Allie is looking for advice about how to protect her privacy on the site. This is her account. Allie has left a few video messages with her questions for us to watch and discuss.
This part of the session will go as follows: I will play the video messages one at a time, asking you a few questions after each one. Feel free to look through Allie’s profile or others’ if that would help you to answer the question.
Understand?
Great! Here is the first scenario:
Scenario 1 (Dog Photo)
Video description: The video shows the character’s screen, as she scrolls through her uploaded photos. She opens up a photo of her with her face cropped out holding a puppy. While this is happening on screen, she excitedly says:
“Oh my gosh! Guess what? My parents just got me a new puppy: see?! I’m so excited! I really want to share this news. Who should I share this with?
1)
Who should she share the picture with?
2)
Should she share the picture on [SNS]? (Would you?)
3)
Do you post pictures of yourself on [SNS]?
(a)
If yes:
Who do you want to see your pictures?
Is there anyone you would not like to see your pictures?
If yes: Do you do anything to make sure that they can’t see your pictures?
If yes: What do you do?
(b)
If no:
Why not?
Do you post any other kinds of pictures on [SNS]? If so, what kinds of pictures do you post?
4)
Apart from pictures, is there anything else that you share on [SNS]?
5)
Do you share personal identifying information on [SNS]? (e.g., real name, email address, location/city)
Scenario 2 (Stranger)
Video description: The video shows the character’s SNS profile. She clicks on her notifications to show the viewer that someone she does not know has started following her. She then clicks on the unknown user’s profile, which has some inspirational quotes, nature and music-related photos posted on there. While this is happening, she says:
“Hi again! So, I just got this notification on my [SNS] feed. It says that someone named Josh Forrester is now following me. I’ve never met this guy before in real life. I took a look at his profile page. It looks like we have a lot in common, but I don’t know if I should let him follow me. What should I do?”
1)
What should Allie do? Is that what you would do in this situation? (If no: What would you do?)
2)
Does it matter that she doesn’t know the person in real life? Why or why not?
3)
Do you have any followers on [SNS] who you do not know in real life?
(a)
If yes:
Do you consider them to be your friends? Why or why not?
Do you have online friends on other SNS?
Do you talk to them, through comments or direct messages?
If yes:
What kinds of things do you talk about?
Is there anything you avoid talking about with your online friends?
(b)
If no: Why not?
Scenario 3 (Embarrassing Photo)
Video description: The video shows the character’s screen as she scrolls through her SNS feed. She finds the picture that she’s looking for, which is of her dancing in her pajamas. While this is happening, she says:
“Hey! So, I was scrolling through my feed and noticed that my friend posted a very embarrassing picture of me. I don’t want this picture of me online, but I don’t know what to do. What do you think I should do?
1)
What should Allie do? Is that what you would do? (If no: What would you do?)
2)
What difference does it make if others see the picture? (Would you care if that happened to you?)
3)
Are there any pictures of you on [SNS] that you wish were not online?
(a)
If yes:
Who posted them?
Why are they still online?
Is there anything that you can do to take the pictures off of the site?
Scenario 4 (Private Account)
Video description: The video shows the character’s screen, as she clicks back and forth a couple of times between her feed and her profile. While this is happening, she says:
“Hi again! So, my friend told me that there’s a way to make my account private, so that only my friends can see my posts. I don’t know how to set my account to private. Do you?”
(1)
Do you know how to make her account private?
(a)
If yes:
Can you show me how to do it?
Who taught you how to do that?
2)
Is your [SNS] profile set to private? (If no: Why not?)
Scenario 5 (Other)
Video description: The video just shows the character’s profile. She says:
“Hey! Thanks for all of your help. Here’s my last question: So, I’m trying to figure out how to set up my profile so that only the right people can see my information. Is there anything else that you do to keep your information safe?”
1)
Is there anything else that you do to keep your information safe?
2)
Who taught you about online privacy? What kinds of things did they teach you?
What does “online privacy” mean to you?
3)
Do you wish that you knew more about online privacy, or are you happy with how much you know?
Post-Scenario Interview
Social Media Use
1)
When do you use [SNS]? (How often do you use it?)
2)
What do you do on [SNS], apart from posting stuff?
3)
Does anyone help you to use [SNS]?
a.
If yes:
Who?
What do they help you to do?
4)
Apart from [SNS], what social networking sites do you use?
Demographic Questions
1)
What is your age?
2)
Are you a boy, a girl or non-binary?
3)
What devices do you use to go online?
4)
Do you have Internet at home? (If no: Where do you access the Internet?)
Debriefing Script
Thank you very much for participating! The goal of this research was to better understand how teenagers, like you, protect their privacy on social networking sites. Your thoughts, comments and opinions are very valuable to my research.
At the beginning of the study, I made it seem like the profile that we were looking at together belongs to a real person. In reality, the profile was created for the purpose of our study. I needed the scenarios to be as realistic as possible for you. Is it okay if we still keep your answers to our questions?
Before we wrap up, do you have any questions for me?
II Example Coding for Inter-Rater Reliability

Prior Publication Policy Statement

This manuscript has not been currently submitted elsewhere. The research was conducted for the first author’s Master’s thesis; the thesis is publicly available online, but has not been published in any peer-reviewed venues (i.e., journals, conference proceedings). This study has not been presented at any peer-reviewed conferences.

References

[1]
Kelly A. Allen, Tracii Ryan, DeLeon L. Gray, Dennis M. McInerney, and Lea Waters. 2014. Social media use and social connectedness in adolescents: The positives and the potential pitfalls. The Educational and Developmental Psychologist 31, 1 (2014), 18–31.
[2]
American Psychiatric Association. 2013. Diagnostic and Statistical Manual of Mental Disorders: DSM-5 (5th ed.). American Psychiatric Publishing, Inc., Washington, DC.
[3]
Amelia Anderson and Abigail Phillips. 2019. “Getting basic information isn’t as helpful as the nuanced advice we can give each other”: Teens with autism on digital citizenship education. The Journal of Research on Libraries and Young Adults 10, 3 (2019), 1–27.
[4]
Monica Anderson and Jingjing Jiang. 2018. Teens, social media & technology 2018. Pew Research Center 31, 2018 (2018), 1673–1689.
[5]
Rebecca P. Ang. 2015. Adolescent cyberbullying: A review of characteristics, prevention and intervention strategies. Aggression and Violent Behavior 25, Part A (2015), 35–42.
[6]
Khadija Bahiss, Sally Jo Cunningham, and Tony Smith. 2010. Investigating the usability of social networking sites for teenagers with autism. In Proceedings of the 11th International Conference of the NZ Chapter of the ACM Special Interest Group on Human-Computer Interaction. ACM, 5–8.
[7]
Jon Baio, Lisa Wiggins, Deborah L. Christensen, Matthew J. Maenner, Julie Daniels, Zachary Warren, Margaret Kurzius-Spencer, Walter Zahorodny, Cordelia Robinson Rosenberg, Tiffany White, and M. S. Durkin. 2018. Prevalence of autism spectrum disorder among children aged 8 years — Autism and Developmental Disabilities Monitoring Network, 11 Sites, United States, 2014. MMWR Surveillance Summaries 67, 6 (2018), 1.
[8]
Claire Balleys and Sami Coll. 2017. Being publicly intimate: Teenagers managing online privacy. Media, Culture & Society 39, 6 (2017), 885–901.
[9]
Valerie Barker. 2009. Older adolescents’ motivations for social network site use: The influence of gender, group identity, and collective self-esteem. Cyberpsychology & Behavior 12, 2 (2009), 209–213.
[10]
Penny Benford and P. Standen. 2009. The Internet: A comfortable communication medium for people with Asperger syndrome (AS) and high functioning autism (HFA)? Journal of Assistive Technologies 3, 2 (2009), 44–53.
[11]
Ine Beyens, Eline Frison, and Steven Eggermont. 2016. “I don’t want to miss a thing”: Adolescents’ fear of missing out and its relationship to adolescents’ social needs, Facebook use, and Facebook related stress. Computers in Human Behavior 100, 64 (2016), 1–8.
[12]
Kristen Bottema-Beutel, Steven K. Kapp, Jessica Nina Lester, Noah J. Sasson, and Brittany N. Hand. 2020. Avoiding ableist language: Suggestions for autism researchers. Autism in Adulthood 3, 1 (2020), 18–29.
[13]
Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3, 2 (2006), 77–101.
[14]
Talita Britto and E. Pizzolato. 2016. Towards web accessibility guidelines of interaction and interface design for people with autism spectrum disorder. In Proceedings of the 9th International Conference on Advances in Computer-Human Interactions. IARIA XPS Press, 1–7.
[15]
Jo Bryce and James Fraser. 2014. The role of disclosure of personal information in the evaluation of risk and trust in young peoples’ online interactions. Computers in Human Behavior 30 (2014), 299–306.
[16]
Petra C. M. Buijs, Erik Boot, Andrea Shugar, Wai Lun Alan Fung, and Anne S. Bassett. 2017. Internet safety issues for adolescents and adults with intellectual disabilities. Journal of Applied Research in Intellectual Disabilities 30, 2 (2017), 416–418.
[17]
Moira Burke, Robert Kraut, and Diane Williams. 2010. Social use of computer-mediated communication by adults on the autism spectrum. In Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work. ACM, 425–434.
[18]
Eilidh Cage and Zoe Troxell-Whitman. 2019. Understanding the reasons, contexts and costs of camouflaging for autistic adults. Journal of Autism and Developmental Disorders 49, 5 (2019), 1899–1911.
[19]
Marilyn Campbell, Yoon-Suk Hwang, Chrystal Whiteford, Julie Dillon-Wallace, Jill Ashburner, Beth Saggers, and Suzanne Carrington. 2017. Bullying prevalence in students with autism spectrum disorder. Australasian Journal of Special Education 41, 2 (2017), 101–122.
[20]
Sue Caton and Melanie Chapman. 2016. The use of social media and people with intellectual disability: A systematic review and thematic analysis. Journal of Intellectual and Developmental Disability 41, 2 (2016), 125–139.
[21]
Darren D. Chadwick, Sally Quinn, and Chris Fullwood. 2017. Perceptions of the risks and benefits of Internet access and use by people with intellectual disabilities. British Journal of Learning Disabilities 45, 1 (2017), 21–31.
[22]
Sangmi Chai, Sharmistha Bagchi-Sen, Claudia Morrell, H. Raghav Rao, and Shambhu J. Upadhyaya. 2009. Internet and online information privacy: An exploratory study of preteens and early teens. IEEE Transactions on Professional Communication 52, 2 (2009), 167–182.
[23]
Hongliang Chen, Christopher E. Beaudoin, and Traci Hong. 2016. Teen online information disclosure: Empirical testing of a protection motivation and social capital model. Journal of the Association for Information Science and Technology 67, 12 (2016), 2871–2881.
[24]
Nick Chown, Jackie Robinson, Luke Beardon, Jillian Downing, Liz Hughes, Julia Leatherland, Katrina Fox, Laura Hickman, and Duncan MacGregor. 2017. Improving research about us, with us: A draft framework for inclusive autism research. Disability & Society 32, 5 (2017), 720–734.
[25]
Emily Christofides, Amy Muise, and Serge Desmarais. 2012. Risky disclosures on Facebook: The effect of having a bad experience on online behavior. Journal of Adolescent Research 27, 6 (2012), 714–731.
[26]
Katie Davis. 2012. Friendship 2.0: Adolescents’ experiences of belonging and self-disclosure online. Journal of Adolescence 35, 6 (2012), 1527–1536.
[27]
Jacquiline den Houting. 2019. Neurodiversity: An insider’s perspective. Autism 23, 2 (2019), 271–273.
[28]
Jacquiline den Houting, Julianne Higgins, Kathy Isaacs, Joanne Mahony, and Elizabeth Pellicano. 2020. ‘I’m not just a guinea pig’: Academic and community perceptions of participatory autism research. Autism 25, 1 (2020), 1362361320951696.
[29]
Amandeep Dhir, Puneet Kaur, Kirsti Lonka, and Marko Nieminen. 2016. Why do adolescents untag photos on Facebook? Computers in Human Behavior 55, Part B (2016), 1106–1115.
[30]
Sue Fletcher-Watson, Susan R. Leekam, and John M. Findlay. 2013. Social interest in high-functioning adults with autism spectrum disorders. Focus on Autism and Other Developmental Disabilities 28, 4 (2013), 222–229.
[31]
Rebecca S. Vine Foggo and Amanda A. Webster. 2017. Understanding the social experiences of adolescent females on the autism spectrum. Research in Autism Spectrum Disorders 100, 35 (2017), 74–85.
[32]
Bethany Good and Lin Fang. 2015. Promoting smart and safe Internet use among children with neurodevelopmental disorders and their parents. Clinical Social Work Journal 43, 2 (2015), 179–188.
[33]
David R. Hannah and Brenda A. Lautsch. 2011. Counting in qualitative research: Why to conduct it, when to avoid it, and when to closet it. Journal of Management Inquiry 20, 1 (2011), 14–22.
[34]
Laura Hull, K. V. Petrides, Carrie Allison, Paula Smith, Simon Baron-Cohen, Meng-Chuan Lai, and William Mandy. 2017. “Putting on my best normal”: Social camouflaging in adults with autism spectrum conditions. Journal of Autism and Developmental Disorders 47, 8 (2017), 2519–2534.
[35]
Pier Jaarsma and Stellan Welin. 2012. Autism as a natural human variation: Reflections on the claims of the neurodiversity movement. Health Care Analysis 20, 1 (2012), 20–30.
[36]
Stefan Johansson. 2016. Towards a Framework to Understand Mental and Cognitive Accessibility in a Digital Context. Ph.D. Dissertation. KTH Royal Institute of Technology.
[37]
Matthew Johnson. 2017. To Share or Not to Share: How Teens Make Privacy Decisions about Photos on Social Media. Media Smarts, Ottawa.
[38]
Mike Just and Tessa Berg. 2017. Keeping children safe online: Understanding the concerns of carers of children with autism. In Proceedings of the 16th IFIP TC13 International Conference on Human-Computer Interaction. Springer, 34–53.
[39]
Steven K. Kapp, Kristen Gillespie-Lynch, Lauren E. Sherman, and Ted Hutman. 2013. Deficit, difference, or both? Autism and neurodiversity. Developmental Psychology 49, 1 (2013), 59.
[40]
Lorcan Kenny, Caroline Hattersley, Bonnie Molins, Carole Buckley, Carol Povey, and Elizabeth Pellicano. 2016. Which terms should be used to describe autism? Perspectives from the UK autism community. Autism 20, 4 (2016), 442–462.
[41]
Jeehoon Kim, Hee Yun Lee, M. Candace Christensen, and Joseph R. Merighi. 2017. Technology access and use, and their associations with social engagement among older adults: Do women and men differ? Journals of Gerontology Series B: Psychological Sciences and Social Sciences 72, 5 (2017), 836–845.
[42]
Robin M. Kowalski and Cristin Fedina. 2011. Cyber bullying in ADHD and Asperger Syndrome populations. Research in Autism Spectrum Disorders 5, 3 (2011), 1201–1208.
[43]
Melissa H. Kuo, Gael I. Orsmond, Wendy J. Coster, and Ellen S. Cohn. 2014. Media use among adolescents with autism spectrum disorder. Autism 18, 8 (2014), 914–923.
[44]
Meng-Chuan Lai, Caroline Kassee, Richard Besney, Sarah Bonato, Laura Hull, William Mandy, Peter Szatmari, and Stephanie H. Ameis. 2019. Prevalence of co-occurring mental health diagnoses in the autism population: A systematic review and meta-analysis. The Lancet Psychiatry 6, 10 (2019), 819–829.
[45]
Fabienne Lang. 2019. Instagram is Hiding “like” Numbers in Six Countries to Help Its Users. Retrieved July 23, 2021 from https://interestingengineering.com/instagram-is-hiding-like-numbers-in-six-countries-to-help-its-users.
[46]
Mark R. Leary and Robin M. Kowalski. 1997. Social Anxiety. Guilford Press, New York, NY.
[47]
Bianca W. Lee and Lexine A. Stapinski. 2012. Seeking safety on the internet: Relationship between social anxiety and problematic Internet use. Journal of Anxiety Disorders 26, 1 (2012), 197–205.
[48]
Louis Leung. 2014. Predicting Internet risks: A longitudinal panel study of gratifications-sought, Internet addiction symptoms, and social media use among children and adolescents. Health Psychology and Behavioral Medicine: An Open Access Journal 2, 1 (2014), 424–439.
[49]
Laura Foran Lewis. 2016. Exploring the experience of self-diagnosis of autism spectrum disorder in adults. Archives of Psychiatric Nursing 30, 5 (2016), 575–580.
[50]
Laura Foran Lewis. 2017. A mixed methods study of barriers to formal diagnosis of autism spectrum disorder in adults. Journal of Autism and Developmental Disorders 47, 8 (2017), 2410–2424.
[51]
Cong Liu, Rebecca P. Ang, and May O. Lwin. 2013. Cognitive, personality, and social factors associated with adolescents’ online personal information disclosure. Journal of Adolescence 36, 4 (2013), 629–638.
[52]
Sonia Livingstone. 2008. Taking risky opportunities in youthful content creation: Teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media & Society 10, 3 (2008), 393–411.
[53]
Lotta Löfgren-Mårtenson, Emma Sorbring, and Martin Molin. 2015. “T@ngled Up in Blue”: Views of parents and professionals on Internet use for sexual purposes among young people with intellectual disabilities. Sexuality and Disability 33, 4 (2015), 533–544.
[54]
Kirsty Macmillan, Tessa Berg, Mike Just, and Mary Stewart. 2020. Are autistic children more vulnerable online? Relating autism to online safety, child wellbeing and parental risk management. In Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society. ACM, 1–11.
[55]
Jennifer A. MacMullin, Yona Lunsky, and Jonathan A. Weiss. 2016. Plugged in: Electronics use in youth and young adults with autism spectrum disorder. Autism 20, 1 (2016), 45–54.
[56]
Caitlin Malloy, Josephine Cuda, So Yoon Kim, and Kristen Bottema-Beutel. 2020. “They can even make waiting in line fun”: A quantitative content analysis of autistic children’s friendship conceptualizations. Psychology in the Schools 57, 6 (2020), 973–989.
[57]
Yazdan Mansourian. 2008. Exploratory nature of, and uncertainty tolerance in, qualitative research. New Library World 109, 5/6 (2008), 273–286.
[58]
Sana Maqsood, Christine Mekhail, and Sonia Chiasson. 2018. A day in the life of Jos: A web-based game to increase children’s digital literacy. In Proceedings of the 17th ACM Conference on Interaction Design and Children. ACM, 241–252.
[59]
Joseph A. Maxwell. 2010. Using numbers in qualitative research. Qualitative Inquiry 16, 6 (2010), 475–482.
[60]
Rinita Mazumder and Sandra Thompson-Hodgetts. 2019. Stigmatization of children and adolescents with autism spectrum disorders and their families: A scoping study. Review Journal of Autism and Developmental Disorders 6, 1 (2019), 96–107.
[61]
Micah O. Mazurek, Paul T. Shattuck, Mary Wagner, and Benjamin P. Cooper. 2012. Prevalence and correlates of screen-based media use among youths with autism spectrum disorders. Journal of Autism and Developmental Disorders 42, 8 (2012), 1757–1767.
[62]
Damian E. M. Milton. 2012. On the ontological status of autism: The ‘double empathy problem’. Disability & Society 27, 6 (2012), 883–887.
[63]
Claude L. Normand and François Sallafranque-St-Louis. 2016. Cybervictimization of young people with an intellectual or developmental disability: Risks specific to sexual solicitation. Journal of Applied Research in Intellectual Disabilities 29, 2 (2016), 99–110.
[64]
Natascha Notten and Peter Nikken. 2016. Boys and girls taking risks online: A gendered perspective on social context and adolescents’ risky online behavior. New Media & Society 18, 6 (2016), 966–988.
[65]
Kathleen A. Quill. 1997. Instructional considerations for young children with autism: The rationale for visually cued instruction. Journal of Autism and Developmental Disorders 27, 6 (1997), 697–714.
[66]
Ana Radovic, Theresa Gmelin, Bradley D. Stein, and Elizabeth Miller. 2017. Depressed adolescents’ positive and negative use of social media. Journal of Adolescence 100, 55 (2017), 5–15.
[67]
Ginny Russell, Steven K. Kapp, Daisy Elliott, Chris Elphick, Ruth Gwernan-Jones, and Christabel Owens. 2019. Mapping the autistic advantage from the accounts of adults diagnosed with autism: A qualitative study. Autism in Adulthood 1, 2 (2019), 124–133.
[68]
François Sallafranque-St-Louis and Claude L. Normand. 2017. From solitude to solicitation: How people with intellectual disability or autism spectrum disorder use the Internet. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 11, 1 (2017).
[69]
Margarete Sandelowski. 2001. Real qualitative researchers do not count: The use of numbers in qualitative research. Research in Nursing & Health 24, 3 (2001), 230–240.
[70]
Noah J. Sasson, Rachel B. Nowlin, and Amy E. Pinkham. 2013. Social cognition, social skill, and the broad autism phenotype. Autism 17, 6 (2013), 655–667.
[71]
Susan M. Schultz, Gloria Jacobs, and Jacob Schultz. 2013. A promising practice: Using Facebook as a communication and social networking tool. Rural Special Education Quarterly 32, 4 (2013), 38–44.
[72]
Krystelle Shaughnessy, Jessica N. Rocheleau, Somayyeh Kamalou, and David A. Moscovitch. 2017. The effects of social anxiety and online privacy concern on individual differences in internet-based interaction anxiety and communication preferences. Cyberpsychology, Behavior, and Social Networking 20, 4 (2017), 212–217.
[73]
Wonsun Shin and May O. Lwin. 2017. How does “talking about the Internet with others” affect teenagers’ experience of online risks? The role of active mediation by parents, peers, and school teachers. New Media & Society 19, 7 (2017), 1109–1126.
[74]
Carmit-Noa Shpigelman and Carol J. Gill. 2014. Facebook use by persons with disabilities. Journal of Computer-Mediated Communication 19, 3 (2014), 610–624.
[75]
Jim Sinclair. 2010. Being autistic together. Disability Studies Quarterly 30, 1 (2010).
[76]
Maithri Sivaraman and Tara A. Fahmie. 2018. Using common interests to increase socialization between children with autism and their peers. Research in Autism Spectrum Disorders 51 (2018), 1–8.
[77]
John Snakenborg, Richard Van Acker, and Robert A. Gable. 2011. Cyberbullying: Prevention and intervention to protect our children and youth. Preventing School Failure: Alternative Education for Children and Youth 55, 2 (2011), 88–95.
[78]
Tal Soffer and Anat Cohen. 2014. Privacy perception of adolescents in a digital world. Bulletin of Science, Technology & Society 34, 5–6 (2014), 145–158.
[79]
Marcantonio M. Spada. 2014. An overview of problematic Internet use. Addictive Behaviors 39, 1 (2014), 3–6.
[80]
Debbie Spain, Jacqueline Sin, Kai B. Linder, Johanna McMahon, and Francesca Happé. 2018. Social anxiety in autism spectrum disorder: A systematic review. Research in Autism Spectrum Disorders 52 (2018), 51–68.
[81]
Wouter M. P. Steijn. 2014. A developmental perspective regarding the behaviour of adolescents, young adults, and adults on social network sites. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 8, 2 (2014).
[82]
Wouter M. P. Steijn and Anton Vedder. 2015. Privacy under construction: A developmental perspective on privacy perception. Science, Technology, & Human Values 40, 4 (2015), 615–637.
[83]
Elda Tartari. 2015. Benefits and risks of children and adolescents using social media. European Scientific Journal 11, 13 (2015), 321–332.
[84]
Pere Tuset, Juan Miguel López, Pere Barberán, Léonard Janer, and Cristina Cervelló-Pastor. 2011. Designing Messenger Visual, an instant messaging service for individuals with cognitive disability. In Proceedings of the 3rd International Workshop on Ambient Assisted Living. Springer, 57–64.
[85]
Ellen Van Gool, Joris Van Ouytsel, Koen Ponnet, and Michel Walrave. 2015. To share or not to share? Adolescents’ self-disclosure about peer relationships on Facebook: An application of the Prototype Willingness Model. Computers in Human Behavior 44, C (2015), 230–239.
[86]
Anne Vermeulen, Heidi Vandebosch, and Wannes Heirman. 2018. #Smiling,#venting, or both? Adolescents’ social sharing of emotions on social media. Computers in Human Behavior 84 (2018), 211–219.
[87]
Yang Wang, Pedro Giovanni Leon, Kevin Scott, Xiaoxuan Chen, Alessandro Acquisti, and Lorrie Faith Cranor. 2013. Privacy nudges for social media: An exploratory Facebook study. In Proceedings of the 22nd International Conference on World Wide Web. ACM, 763–770.
[88]
David Wasserman. 2019. A case for greater risk tolerance in Internet use by adults with intellectual disabilities: A comment on Chalghoumi et al. Ethics & Behavior 29, 3 (2019), 223–226.
[89]
Susan W. White, Brenna B. Maddox, and Carla A. Mazefsky. 2020. The Oxford Handbook of Autism and Co-Occurring Psychiatric Conditions. Oxford University Press, New York, NY.
[90]
Amanda L. Williams and Michael J. Merten. 2008. A review of online social networking profiles by adolescents: Implications for future research and intervention. Adolescence 43, 170 (2008), 253.
[91]
Alexander C. Wilson and Dorothy V. M. Bishop. 2021. “Second guessing yourself all the time about what they really mean...”: Cognitive differences between autistic and non-autistic adults in understanding implied meaning. Autism Research 14, 1 (2021), 93–101.
[92]
Pamela Wisniewski, Heng Xu, Mary Beth Rosson, Daniel F. Perkins, and John M. Carroll. 2016. Dear diary: Teens reflect on their weekly online risk experiences. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. ACM, 3919–3930.
[93]
Michelle F. Wright. 2017. Cyber victimization and depression among adolescents with intellectual disabilities and developmental disorders: The moderation of perceived social support. Journal of Mental Health Research in Intellectual Disabilities 10, 2 (2017), 126–143.
[94]
Leah Zhang-Kennedy, Yomna Abdelaziz, and Sonia Chiasson. 2017. Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy. International Journal of Child-Computer Interaction 100, 13 (2017), 10–18.
[95]
Alyssa Hillary Zisk and Elizabeth Dalton. 2019. Augmentative and alternative communication for speaking autistic adults: Overview and recommendations. Autism in Adulthood 1, 2 (2019), 93–100.

Cited By

View all
  • (2024)“That’s Kind of Sus(picious)”: The Comprehensiveness of Mental Health Application Users’ Privacy and Security ConcernsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642705(1-16)Online publication date: 11-May-2024
  • (2024)Towards Digital Independence: Identifying the Tensions between Autistic Young Adults and Their Support Network When Mediating Social MediaProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642567(1-21)Online publication date: 11-May-2024
  • (2024)A Review of Social Network Regulations and Mechanisms for Safeguarding Children’s PrivacyAdvanced Information Networking and Applications10.1007/978-3-031-57931-8_41(427-438)Online publication date: 9-Apr-2024
  • Show More Cited By

Index Terms

  1. Privacy and Safety on Social Networking Sites: Autistic and Non-Autistic Teenagers’ Attitudes and Behaviors

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Computer-Human Interaction
    ACM Transactions on Computer-Human Interaction  Volume 29, Issue 1
    February 2022
    354 pages
    ISSN:1073-0516
    EISSN:1557-7325
    DOI:10.1145/3505201
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 January 2022
    Accepted: 01 June 2021
    Revised: 01 June 2021
    Received: 01 March 2021
    Published in TOCHI Volume 29, Issue 1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Privacy
    2. autistic teens
    3. user study
    4. social media

    Qualifiers

    • Research-article
    • Refereed

    Funding Sources

    • Ontario Ministry and Innovation Early Researcher
    • Canada Research Chairs Program
    • NSERC Discovery
    • Social Sciences and Humanities Research Council Canada Graduate Scholarship – Master’s Award

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)460
    • Downloads (Last 6 weeks)38
    Reflects downloads up to 29 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)“That’s Kind of Sus(picious)”: The Comprehensiveness of Mental Health Application Users’ Privacy and Security ConcernsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642705(1-16)Online publication date: 11-May-2024
    • (2024)Towards Digital Independence: Identifying the Tensions between Autistic Young Adults and Their Support Network When Mediating Social MediaProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642567(1-21)Online publication date: 11-May-2024
    • (2024)A Review of Social Network Regulations and Mechanisms for Safeguarding Children’s PrivacyAdvanced Information Networking and Applications10.1007/978-3-031-57931-8_41(427-438)Online publication date: 9-Apr-2024
    • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
    • (2023)TikTok as algorithmically mediated biographical illumination: Autism, self-discovery, and platformed diagnosis on #autisktokNew Media & Society10.1177/14614448231193091Online publication date: 19-Aug-2023
    • (2023)Safety Issues in Conversational SystemsProceedings of the 2023 AAAI/ACM Conference on AI, Ethics, and Society10.1145/3600211.3604748(950-951)Online publication date: 8-Aug-2023
    • (2023)Understanding Noise Sensitivity through Interactions in Two Online Autism ForumsProceedings of the 25th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3597638.3608413(1-12)Online publication date: 22-Oct-2023
    • (2023)Media use and youth with disabilitiesEncyclopedia of Child and Adolescent Health10.1016/B978-0-12-818872-9.00158-8(441-449)Online publication date: 2023

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media