Skip to main content
Log in

Sharing of Digital Visual Media: Privacy Concerns and Trust Among Young People

  • Published:
American Journal of Criminal Justice Aims and scope Submit manuscript

Abstract

This study compares college students’ attitudes about privacy and trust when sharing digital images or video of themselves with three specific forms of Internet- and cellular-based media: Facebook, other social networking sites, and mobile phones. An increasing popular use of mobile phones is the practice of ‘sexting:’ sending and receiving sexually explicit images. These practices have only recently been introduced to criminological literature. Results indicate that trust in the receiver of images sent via mobile phones was significantly higher than other mediums. Also, females were less likely to trust mobile phones as they age if they reported to have previously engaged in sexting behaviors. This article argues that trust in sharing images or video via mobile phones is perhaps misplaced because there are many ways of losing control through non-consensual use of the digital images (e.g., victimization). Further, future research needs clearer distinctions to be made when defining the term ‘sexting’ and the intentions and purposes of people who engage in it.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Adapted items used to compile trust scales:

    Facebook Trust

    Facebook.com is a trustworthy social network. I can count on Facebook.com to protect my privacy. I can count on Facebook.com to protect my personal information from unauthorized use. Facebook.com can be relied on to keep its promises.

    Social Network Trust

    Web sites are trustworthy social networks. I can count on most social sites to protect my privacy. I can count on most sites to protect my personal information from unauthorized use. Social web sites can be relied on to keep their promises.

    Cellular Trust

    The people that I send pictures/video to are trustworthy. I can count on those people to protect my privacy. I can count on those people to protect my personal information from unauthorized use. Those people can be relied on to keep their promises.

References

  • Albury, K., & Crawford, K. (2012). Sexting, consent and young people’s ethics: beyond Megan’s story. Continuum: Journal Of Media & Cultural Studies, 26, 463–473.

    Article  Google Scholar 

  • Blinka, L., Subrahmanyam, K., Šmahel, D., & Seganti, F. R. (2012). Differences in the teen blogosphere: insights from a content analysis of English- and Czech-language weblogs. Nordic Journal of Youth Research, 20, 277–296.

    Google Scholar 

  • Bossewitch, J., & Sinnreich, A. (2012). The end of forgetting: strategic agency beyond the panopticon. New Media Society, 15, 224–242.

    Article  Google Scholar 

  • Boyd, D. (2008). Taken out of context: American teen sociality in networked publics. Berkeley: University of California.

    Google Scholar 

  • Boyd, D., & Ellison, N. (2007). Social network sites: definition, history, and scholarship. Journal of Computer-Mediated Communication, 13, 210–230.

    Article  Google Scholar 

  • Brechwald, W. A., & Prinstein, M. J. (2011). Beyond homophily: a decade of advances in understanding peer influence processes. Journal of Research on Adolescence, 21, 166–179.

    Article  Google Scholar 

  • Buchanan, T., Paine, C., Joinson, A. N., & Reips, U. D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American Society for Information Science and Technology, 58, 157–165.

    Article  Google Scholar 

  • Burke, M., Marlow, C., & Lento, T. (2009). Feed me: Motivating newcomer contribution in social network sites. Boston, MA: ACM.

    Book  Google Scholar 

  • Chalfen, R. (2009). ‘It’s only a picture’: sexting, ‘smutty’ snapshots and felony charges. Visual Studies, 24.

  • Chalfen, R. (2010). Commentary sexting as adolescent social communication. Journal of Children and Media, 4, 350–354.

    Article  Google Scholar 

  • Christofides, E., Muise, A., & Desmarais, S. (2009). Information disclosure and control on Facebook: are they two sides of the same coin or two different processes? CyberPsychology & Behavior, 12, 340–345.

    Article  Google Scholar 

  • Davis, K. (2012). Friendship 2.0: adolescents’ experiences of belonging and self-disclosure online. Journal of Adolescence, 35, 1527–1536.

    Article  Google Scholar 

  • Dwyer, C., Hiltz, S. R. & Passerini, K. (2007). Trust and privacy: A comparison of Facebook and MySpace. Thirteenth Americas Conference on Information Systems. Keystone, Colorado.

  • Ellison, N. B., Steinfield, C. & Lampe, C. (2007). The benefits of Facebook “Friends:” social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12, Retrieved from http://jcmc.indiana.edu/vol12/issue4/ellison.html.

  • Farquhar, L. (2012). Performing and interpreting identity through Facebook imagery. Convergence: The International Journal of Research into New Media Technologies, 1–26.

  • Fogel, J., & Nehmad, E. (2009). Internet social network communities: risk taking, trust, and privacy concerns. Computers in Human Behavior, 25, 153–160.

    Article  Google Scholar 

  • Hasinoff, A. A. (2012). Sexting as media production: Rethinking social media and sexuality. New Media & Society, 1–17.

  • Henderson, S., & Gilding, M. (2004). ‘I’ve never clicked this much with anyone in my life’: trust and hyperpersonal communication in online friendships. New Media & Society, 6, 487–506.

    Article  Google Scholar 

  • Hinduja, S. & Patchin, J. W. (2013). State sexting laws: A brief review of state sexting laws and policies. Cyberbullying Research Center. URL: http://www.cyberbullying.us/state_sexting_laws.pdf. Last accessed: April 15, 2014.

  • Ito, M. (2005). Intimate Visual Co-Presence. 2005 Ubiquitous Computing Conference.

  • Jackson, L., Samona, R., Moomaw, J., Ramsay, L., Murray, C., & Smith, A. (2007). What children do on the Internet: domains visited and their relationship to socio-demographic characteristics and academic performance. Cyberpsychology & Behavior, 10, 182–190.

    Article  Google Scholar 

  • Joinson, A. N. (2001). Self-disclosure in computer-mediated communication: the role of self-awareness and visual anonymity. European Journal of Social Psychology, 31, 177–192.

    Article  Google Scholar 

  • Judge, A. M. (2012). ‘Sexting’ among U.S. adolescents: psychological and legal perspectives. Harvard Review of Psychiatry, 20, 86–96.

    Article  Google Scholar 

  • Kaare, B. H., Brandtzeg, P. B., Heim, J., & Endestad, T. (2007). In the borderland between family orientation and peer culture: the use of communication technologies among Norwegian tweens. New Media & Society, 9, 603–624.

    Article  Google Scholar 

  • Krasnova, H., Kolesnikova, E., & Guenther, O. (2009). “It won’t happen to me!”: Self-disclosure in online social networks. Americas conference on information systems. San Francisco, CA: Association for Information Systems.

    Google Scholar 

  • Lenhart, A. (2009). Teens and sexting. Millennials: A portrait of generation next. Washington, DC: Pew Internet & American Life Project.

    Google Scholar 

  • Lenhart, A. (2012). Teens, smartphones & texting. Washington, DC: Pew Internet & American Life Project.

    Google Scholar 

  • Lenhart, A., & Madden, M. (2005). Teen Content Creators and Consumers: More than half of online teens have created content for the internet; and most teen downloaders think that getting free music files is easy to do. Washington, DC: Pew Internet & American Life Project.

    Google Scholar 

  • Lenhart, A., & Madden, M. (2007). Teens, privacy and online social networks. Washington, DC: Pew Internet & American Life Project.

    Google Scholar 

  • Livingstone, S. (2002). Young people and new media: Childhood and the changing media environment. London: Sage.

    Google Scholar 

  • Livingstone, S. (2004). Media literacy and the challenge of new information and communication technologies. The Communication Review, 7, 3–14.

    Article  Google Scholar 

  • Livingstone, S. (2006). Children’s Privacy Online: Experimenting with boundaries within and beyond the family. In R. Kraut, M. Brynin, & S. Kiesler (Eds.), Computers, phones, and the internet: Domesticating information technology. Oxford, England: Oxford University Press.

    Google Scholar 

  • Livingstone, S. (2008). Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media & Society, 10, 393–411.

    Article  Google Scholar 

  • Livingstone, S., Haddon, L., Gorzig, A., & Ólafsson, K. (2011). Risks and safety for children on the internet: The UK report. EU Kids Online. London: LSE.

    Google Scholar 

  • Livingstone, S., & Helsper, E. (2010). Balancing opportunities and risks in teenager’ use of the internet: the role of online skills and internet self-efficacy. New Media Society, 12, 309–329.

    Article  Google Scholar 

  • Lounsbury, K., Mitchell, K. J. & Finkelhor, D. (2011). The true prevalence of “sexting”. University of New Hampshire: Crimes against children research center.

  • Madden, M., Lenhart, A., Duggan, M., Cortesi, S., & Gasser, U. (2013). Teens and Technology 2013. Washington, DC: Pew Research Center’s Internet & American Life Project.

    Google Scholar 

  • Marwick, A. E., & Boyd, D. (2010). I tweet honestly, I tweet passionately: Twitter users, context collapse, and the imagined audience. New Media & Society, 13, 114–133.

    Article  Google Scholar 

  • Marwick, A. E., Diaz, D. M., & Palfrey, J. (2010). Youth, privacy and reputation: A literature review. Cambridge, MA: The Berkman Center for Internet & Society at Harvard University.

    Google Scholar 

  • Mitchell, K. J., Finkelhor, D., Jones, L. M., & Wolak, J. (2011). Prevalence and characteristics of youth sexting: a national study. Pediatrics, 129, 13–20.

    Article  Google Scholar 

  • Murumaa, M. & Siibak, A. (2012). The imagined audience on Facebook: Analysis of Estonian teen sketches about typical Facebook users. First Monday, 17, article 5.

  • Nippert-Eng, C. E. (2010). Islands of privacy. Chicago, IL: University of Chicago Press.

    Book  Google Scholar 

  • Pan, Y., & Zinkhan, G. M. (2006). Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing, 82, 331–338.

    Article  Google Scholar 

  • Pearson, E. (2010). Making a good (Virtual) first impression: The use of visuals in online impression management and creating identity performances. In J. Berleur, M. D. Hercheui, & L. M. Hilty (Eds.), What kind of information society? Governance, virtuality, surveillance, sustainability, resilience. Brisbane, Australia: IFIP Advances in Information and Communication Technology.

    Google Scholar 

  • Redmon, D. (2003). Playful deviance as an urban leisure activity: secret selves, self-validation, and entertaining performances. Deviant Behavior, 24(1), 27–51.

    Article  Google Scholar 

  • Reyns, B. W., Burek, M. W., Henson, B., & Fisher, B. S. (2013). The unintended consequences of digital technology: exploring the relationship between sexting and cybervictimization. Journal of Crime and Justice, 36(1), 1–17.

    Article  Google Scholar 

  • Sefton-Green, J. (2006). Youth, technology, and media cultures. In J. Green & A. Luke (Eds.), Review of Research in Education 30, 2006. Washington: American Educational Research Association.

    Google Scholar 

  • Siibak, A. (2009). Constructing the Self through the Photo selection - Visual Impression Management on Social Networking Websites. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 3, article 1.

  • Snell, P. A., & Englander, E. K. (2010). Cyberbullying victimization and behaviors among girls: applying research findings in the field. Journal of Social Sciences, 6, 510–514.

    Article  Google Scholar 

  • Strassberg, D., McKinnon, R., Sustaita, M., & Rullo, J. (2013). Sexting by high school students: an exploratory and descriptive study. Archives of Sexual Behavior, 42, 15–21.

    Article  Google Scholar 

  • Stutzman, F. (2006). An evaluation of identity-sharing behavior in social network communities. International Digital and Media Arts, 3, 10–18.

    Google Scholar 

  • Subrahmanyam, K., & Šmahel, D. (2011). Digital youth: The role of media in development. New York: Springer.

    Book  Google Scholar 

  • Sydell, L. (2013). How Hackers Tapped Into My Cellphone For Less Than $300. All Tech Considered.

  • Tidwell, L. C., & Walther, J. B. (2006). Computer-mediated communication effects on disclosure, impressions, and interpersonal evaluations: getting to know one another a bit at a time. Human Communication Research, 28, 317–348.

    Article  Google Scholar 

  • Uimonen, P. (2013). Visual identity in Facebook. Visual Studies, 28, 122–135.

    Article  Google Scholar 

  • Valkenburg, P. M., & Peter, J. (2011). Online communication among adolescents: an integrated model of its attraction, opportunities, and risks. Journal of Adolescent Health, 48, 121–127.

    Article  Google Scholar 

  • Wolak, J. & Finkelhor, D. (2011). Sexting: A typology. Research Bulletin (March). University of New Hampshire: Crimes Against Children Research Center.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David R. Zemmels.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zemmels, D.R., Khey, D.N. Sharing of Digital Visual Media: Privacy Concerns and Trust Among Young People. Am J Crim Just 40, 285–302 (2015). https://doi.org/10.1007/s12103-014-9245-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12103-014-9245-7

Keywords

Navigation