Group privacy management strategies and challenges in Facebook: A focus group study among Flemish youth organizations
Vol.10,No.1(2016)
Special issue: Online Self-disclosure and Privacy
A large body of research has studied young people’s privacy practices and needs in Facebook. Less is known about group privacy. In this study 12 focus groups were organized with a total of 78 adolescents and young adults of local Flemish youth organizations to discuss their privacy practices. Findings describe how different strategies are used to coordinate the group information flow. The study also shows how online group privacy management can be challenging because ‘implicit’ privacy rules need to be made ‘explicit’, personal boundaries may conflict with those of the group one belongs to and privacy turbulence is difficult to define.
Privacy; boundary coordination; group; focus groups; communication privacy management; qualitative; Facebook
Ralf De Wolf
University of Ghent, Ghent, Belgium & Vrije Universiteit Brussel, Brussels, Belgium
Ralf De Wolf is a postdoctoral researcher at the University of Ghent and project coordinator of the AdLit project (www.AdLit.be). Ralf holds a master in Sociology (UGent) and a PhD in Media and Communication Studies (VUB). He started his career at iMinds-SMIT, where he studied the social aspects of online privacy and security in the context of social network services. His current work focuses on advertising literacy and privacy management.
Bernstein, M. S., Bakshy, E., Burke, M., & Karrer, B. (2013). Quantifying the invisible audience in social networks. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 21–30). New York, NY, USA: ACM. http://dx.doi.org/10.1145/2470654.2470658
boyd, d. (2010). Social network sites as networked publics: Affordances, dynamics, and implications. In Z. Papacharissi (Ed.), A networked self: Identity, community, and culture on social network sites (pp. 39–58). New York: Routledge.
boyd, d., & Hargittai, E. (2010). Facebook privacy settings: Who cares? First Monday, 15(8). Retrieved from http://firstmonday.org/ojs/index.php/fm/article/view/3086
boyd, d., & Marwick, A. E. (2011). Social privacy in networked publics: Teens’ attitudes, practices, and strategies (SSRN Scholarly Paper No. ID 1925128). Rochester, NY: Social Science Research Network. Retrieved from http://papers.ssrn.com/abstract=1925128
Coussée, F. (2006). De Pedagogiek Van Het Jeugdwerk [The pedagogy of youth work]. Gent: Academia Press.
De Wolf, R., Willaert, K., & Pierson, J. (2014). Managing privacy boundaries together: Exploring individual and group privacy management strategies in Facebook. Computers in Human Behavior, 35, 444–454. http://dx.doi.org/10.1016/j.chb.2014.03.010
Gibson, J. (2012). Interviews and focus groups with children: Methods that match children’s developing competencies. Journal of Family theory and Review, 4, 148-159. http://dx.doi.org/10.1111/j.1756-2589.2012.00119.x
Hogan, B. (2010). The presentation of self in the age of social media: Distinguishing performances and exhibitions online. Bulletin of Science, Technology & Society, 30, 377–386. http://dx.doi.org/10.1177/0270467610385893
Kramer-Duffield, J. (2010). Beliefs and uses of tagging among undergraduates. University of North Carolina, Chapel Hill.
Lampinen, A., Lehtinen, V., Lehmuskallio, A., & Tamminen, S. (2011). We’re in it together: Interpersonal management of disclosure in social network services. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 3217–3226). New York, NY, USA: ACM. http://dx.doi.org/10.1145/1978942.1979420
Litt, E. (2012). Knock, Knock. who’s there? The imagined audience. Journal of Broadcasting and Electronic Media, 56, 330–345. http://dx.doi.org/10.1080/08838151.2012.705195
Litt, E. (2013). Understanding social network site users’ privacy tool use. Computers in Human Behavior, 29, 1649– 1656. http://dx.doi.org/10.1016/j.chb.2013.01.049
Litt, E., & Hargittai, E. (2014). A bumpy ride on the information superhighway: Exploring turbulence online. Computers in Human Behavior, 36, 520–529. http://dx.doi.org/10.1016/j.chb.2014.04.027
Litt, E., Spottswood, E., Birnholtz, J., Hancock, J. T., Smith, M. E., & Reynolds, L. (2014). Awkward Encounters of an “other” kind: Collective self-presentation and face threat on Facebook. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 449–460). New York, NY, USA: ACM. http://dx.doi.org/10.1145/2531602.2531646
Madden, M. (2012). Privacy management on social media sites. Pew Internet & American Life Project, Washington, DC. Retrieved from http://pewinternet. org/Reports/2012/Privacy-management-on-social-media.aspx
Markham, A. (2013). Remix cultures, remix methods: reframing qualitative inquiry for social media contexts. In N. Denzin & M. Giardina (Eds.), Global dimensions of qualitative inquiry. Walnut Creek, CA: Left Coast Press, 63–81.
Marwick, A. E., & boyd, d. (2014). Networked privacy: How teenagers negotiate context in social media. New Media & Society, 16, 1051-1067. http://dx.doi.org/10.1177/1461444814543995
Nissenbaum, H. F. (2010.). Privacy in context : Technology, policy, and the integrity of social life. Stanford, CA: Stanford University Press.
Page, X., Kobsa, A., & Knijnenburg, B. P. (2012). Don’t Disturb my circles! Boundary preservation is at the center of location-sharing concerns. In Sixth International AAAI Conference on Weblogs and Social Media. Retrieved from https://www.aaai.org/ocs/index.php/ICWSM/ICWSM12/paper/view/4679
Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. State University of New York Press.
Strauss, A., & Corbin, J. (1990). Basics of qualitative research. Grounded theory procedures and techniques. Newbury Park: Sage.
Stutzman, F. & Hartzog, W. (2012). Boundary regulation in social media. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work (pp. 769-778). New York, NY, USA: ACM. http://dx.doi.org/10.1145/2145204.2145320
Vitak, J. (2012). The impact of context collapse and privacy on social network site disclosures. Journal of Broadcasting & Electronic Media, 56, 451–470. http://dx.doi.org/10.1080/08838151.2012.732140
Vitak, J., & Kim, J. (2014). “You can’t block people offline”: Examining how Facebook’s affordances shape the disclosure process. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work & Social Computing (pp. 461–474). New York, NY, USA: ACM. http://dx.doi.org/10.1145/2531602.2531672
Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P. G., & Cranor, L. F. (2011). “I regretted the minute i pressed share”: A qualitative study of regrets on Facebook. In Proceedings of the Seventh Symposium on Usable Privacy and Security (pp. 10:1–10:16). New York, NY, USA: ACM. http://dx.doi.org/10.1145/2078827.2078841
Wisniewski, P., Lipford, H., & Wilson, D. (2012). Fighting for my space: Coping mechanisms for sns boundary regulation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 609–618). New York, NY, USA: ACM. http://dx.doi.org/10.1145/2207676.2207761
Young, A. L., & Quan-Haase, A. (2013). Privacy protection strategies on Facebook: The internet privacy paradox revisited. Information, Communication & Society, 16, 479–500. http://dx.doi.org/10.1080/1369118X.2013.777757
Introduction
Theoretical Background
Communication Privacy Management
it a secret for the next few days”) are examples of explicit privacy rules. Implicit privacy rules are less articulated and occur in more ambiguous situations. People can hint at a rule without clearly formulating or let another person articulate the rule. Rules can be routinized or triggered. “(...) Once formulated, these rules become patterned actions that people depend on to communicate with others about this issue over time. The routinized rules become integrated into typical patterns used for privacy management” (Petronio, 2002, p.79).
“(...) who, outside the boundary, can know the information, the amount of information they can know, when it is appropriate for them to know, and how they should be told” (Petronio, 2002, p.100). Next to rules about access people also develop rules that concern the private information itself. For example, certain topics can be avoided or even treated as taboo to prevent a breach in collective boundaries. Finally, Petronio (2002) also differentiates between rules that help determine the boundary borders, that is, boundary ownership. Because we have to manage multiple boundaries around the self and the groups we belong to, it is necessary to differentiate between borders.
Privacy Management in Social Networking Sites
information users can later regret certain disclosures, such as posting when in a highly emotional state (Wang et al., 2011). The collapse of boundaries also makes it difficult to decide what content is appropriate and can be distributed. Nissenbaum (2010) argued that the informational norms of appropriateness and distribution organize the flow within and between contexts. For example, the religious affiliation of a job applicant should not be discussed with a job recruiter (appropriateness), nor should the application be made public (distribution). With the collapse of boundaries in SNSs, however, a “context” is not as clearly delineated as in typical face-to-face interactions, making it unclear what is appropriate and can be distributed.
managing their information flow online. boyd and Marwick (2011, p. 22) gave the example of social steganography: “a tactic of hiding information in plain sight driven by the notion of security through obscurity,” where youngsters encrypt their online postings in such a way that they only have meaning for a select audience. Recent work tends to shift the focus from individual to collaborative privacy practices in SNSs (Lampinen et al., 2011; De Wolf, Willaert, & Pierson, 2014; Litt et al., 2014; Litt & Hargittai, 2014; Page, Kobsa, & Knijnenburg, 2012). The study of Lampinen et al. (2011) found how users employ collaborative strategies both in a preventive (e.g. asking for approval before disclosing information that concerns a person involved) and corrective manner (e.g., asking a person to delete content). The study of Litt et al. (2014) suggested that many turbulent instances are caused by others, such as a Facebook friend posting information that is not suitable for all to see, and thus beyond individual control.
of turbulence that we can find the privacy needs of users in SNSs and provide subsequent solutions. Petronio (2002) states that “knowing the way rules develop and function is fundamental to comprehending boundary coordination, boundary turbulence, and the larger privacy management process” (p. 37). “How do youth organizations manage group privacy and what strategies are used?” constitutes the first research question. By comparing offline and online strategies and discussing them further with the participants the challenges for group privacy also become clear. The second research question is as follows: “What are the challenges of group privacy management in Facebook?”
Method
Youth Organizations
Table 1. Demographics of the participants and composition of focus groups.
Focus Group (F) |
# |
|
Gender |
|
Role |
|
Age |
||
|
|
|
Men |
Women |
|
Member |
Leader |
|
|
Youth organization 1 |
|
|
|
|
|
|
|
|
|
F1 |
9 |
|
0 |
9 |
|
0 |
9 |
|
17–24 |
F2 |
7 |
|
7 |
0 |
|
0 |
7 |
|
16–28 |
Youth organization 2 |
|
|
|
|
|
|
|
|
|
F3 |
5 |
|
0 |
5 |
|
3 |
2 |
|
15–22 |
F4 |
7 |
|
7 |
0 |
|
0 |
7 |
|
17–24 |
Youth organization 3 |
|
|
|
|
|
|
|
|
|
F5 |
6 |
|
0 |
6 |
|
0 |
6 |
|
16–21 |
F6 |
6 |
|
6 |
0 |
|
0 |
6 |
|
16–21 |
Youth organization 4 |
|
|
|
|
|
|
|
|
|
F7 |
6 |
|
2 |
4 |
|
6 |
0 |
|
13–17 |
F8 |
7 |
|
4 |
3 |
|
0 |
7 |
|
17–21 |
Youth organization 5 |
|
|
|
|
|
|
|
|
|
F9 |
6 |
|
6 |
0 |
|
6 |
0 |
|
16–17 |
F10 |
7 |
|
7 |
0 |
|
0 |
7 |
|
18–19 |
Youth organization 6 |
|
|
|
|
|
|
|
|
|
F11 |
6 |
|
0 |
6 |
|
6 |
0 |
|
14–15 |
F12 |
6 |
|
0 |
6 |
|
0 |
6 |
|
18–21 |
Total participants |
78 |
|
39 |
39 |
|
21 |
57 |
|
13–28 |
Procedure
All focus groups took place between September and the beginning of December 2013 in the clubhouses of youth organizations during the weekend and lasted for about an hour and a half. The head of a local youth organization was contacted to co-organize the practical part of the focus groups and provide the items needed for the setting (e.g., table, chairs, separate room). Before the focus group began, participants were asked to sign a document of informed consent. Participants younger than 18 years old were asked to let their parents or legal guardians give their informed consent. The conversations were recorded, transcribed and coded. All participants were compensated with a cinema ticket.
Before the focus groups began, the participants filled out a document with general questions concerning their Facebook activity and privacy. All youth organizations used Facebook for sharing photos, communicating with others, as well as for advertising for events and parties they organized. The document asked if the participants ever experienced an embarrassing or problematic group incident on Facebook (yes/no question). Only one youth organization reported privacy turbulence (see Table 2). During the focus groups, however, the participants brought up different examples of turbulence. I also asked them to score the following statements on a 7-point Likert scale, ranging from “strongly disagree” to “strongly agree”: “In our youth organization we have clear rules regarding Facebook” and “I believe that our youth organization controls who has access to information that is of our concern.” Table 2 presents the aggregated number. To measure privacy turbulence, privacy rules and privacy control I used items as developed previously by De Wolf et al. (2014).
Table 2. Privacy turbulence, rules, and control.
Focus Group |
Privacy Turbulence |
Privacy Rules |
Privacy Control |
F1 |
No |
M = 2.89 |
M = 7 |
F2 |
Yes |
M = 5.71 |
M = 3.71 |
F3 |
No |
M = 1.6 |
M = 4.2 |
F4 |
No |
M = 6 |
M = 3.14 |
F5 |
No |
M = 6.5 |
M = 3.5 |
F6 |
No |
M = 6.67 |
M = 5.66 |
F7 |
No |
M = 4 |
M = 5.5 |
F8 |
No |
M = 3.86 |
M = 5.71 |
F9 |
No |
M = 3.17 |
M = 5.5 |
F10 |
No |
M = 4 |
M = 4.43 |
F11 |
No |
M = 4.67 |
M = 5.67 |
F12 |
No |
M = 4.33 |
M = 3.00 |
Note: Privacy turbulence: “Has your group ever experienced an embarrassing or problematic incident in Facebook” (Yes/no question); Privacy rules: “Our group has clear guidelines with regard to sharing information in Facebook” (1-7 Likert item); Privacy control: “Our group controls who has access of information that is of our concern” (1-7 Likert item) |
Focus groups with pre-existing youth organization groups were set up, so that the participants could elaborate on shared experiences in the comfort of being among familiar faces. Because the research centered on private and sensitive information, participants’ comfort was an absolute necessity. One of the main pitfalls when conducting focus groups with young people is that the approach is not attuned to their developmental needs and capabilities (Gibson, 2012). Therefore, I integrated young-people-friendly eliciting techniques in the study, with a focus on ‘generating’ and ‘interrogating’ meaning. The latter describes the act of reflection and questioning everyday activities, while the former refers to transforming data into new data (Markham, 2013).

Data Analysis
The recordings of the focus groups were transcribed and coded using Strauss and Corbin’s approach (1990): moving from a procedure focused on examining salient categories (open coding); to grouping (sub)categories that seem to relate (axial coding); to producing a set of themes and theoretical propositions (selective coding).
In a first stage of analyzing the data, every word that appeared significant was coded. A close connection between the codes and the qualitative data was maintained, meaning that no categories or further dimensions were made yet. Simultaneously, during the first stage, I took notes about reoccurring answers throughout the focus groups, examples of group privacy management strategies and marked sections that displayed remarkable or problematic issues. In the next stage I made categories of different open codes, introducing the interpretation of the researcher for the first time. The open codes were categorized and three themes emerged: 1) codes that describe the goal, role and relationships of youth organizations; 2) codes that describe their privacy practices for different types of information; 3) and codes that present new media technologies and settings. In the final stage the interpretation of the researcher was introduced for the second time by coupling the three themes with theoretical concepts as delineated in the literature, such as privacy rules and turbulence.
Results
Youth Organizations: Goal, Role and Relationships
F4 Alan (23 years old, male, leader): ‘My Life’—That’s what I wrote down. I really mean it. Everything I do is marked by my youth organization.
F4 Braxton (22 years old, male, leader): Building the future.
Interviewer: You wrote that down. Why?
Braxton: In the beginning, you start making friends; you learn how to act in a group and work together.
When you become a leader, you organize fun activities and let younger ones have a good time. You teach them norms and values in the process.
F5 Luna (21 years old, female, leader): Younger ones often call us ‘Miss Luna’ or ‘Miss Jasmine’ instead of just calling us by our first name. We often correct them, but they keep on saying it. Those little ones really treat us as a mother figure. When they hurt themselves, they want a hug; when they go to sleep, they want a bedtime story.
Offline and Online Group Privacy Management Strategies
F6 Levi (18 years old, male, leader): Towards the younger ones we say that a monster or ‘fatty’ sleeps in there [referring to their tent] and that they will be eaten alive when they come too close [laughs]. You would expect them to be curious and go and look, but when you tell them not to go near they really don’t.
F2 Gabriel (23 years old, male, leader): Around four o’ clock I usually signal my co-leader that I’m [going] away for five minutes to smoke a cigarette. Kayden (27 years old, male, leader): We always mention it to one another. I still remember from when I used to smoke that you have to keep the other leaders informed.
for smoking to use CPM terminology.
F3 Fiona (15 years old, female, member): I really like it when they [referring to their leaders] allow us to [drink one beer]. Not everyone drinks alcohol. But knowing we are allowed to is rather nice.
F12 Alana (18 years old, female, leader): We’ve had a heavy storm at camp and a couple of our tents were torn down. We needed to evacuate and move to the closest farm for shelter. One of the cooks at our camp posted the situation on Facebook, but we didn’t had a chance to inform the parents first. So we were kind of worried that they would think we wouldn’t have everything under control.
F5 Luna (21 years old, female, leader): It’s a rule that you don’t put information on Facebook when you are at camp.
Interviewer: Why not?Luna: Because you do not control the situation. We never check our smartphones and imagine one of the members putting information on Facebook.
F5 Jasmine (21 years old, female, leader): On our website, the cooking team puts a small message on our website every day during camp.Laura (18 years old, female, leader): They just put a little text online with what the children have done that day, and that’s it. It keeps the parents happy.
F5 Katherine (21 years old, female, leader): It’s a [Facebook] group for active leaders only. When people leave the youth organization they are removed from the Facebook group.
F5 Laura (18 years old, female, leader): We created Facebook police because you cannot be Facebook friends with members of our youth organization.
Interviewer: “Facebook police”, can you explain to me how it works?
Laura (18 years old, female, leader): When you become a leader in our youth organization you are not allowed to be Facebook friends with one of the members. Not even the oldest members. So the Facebook police [referring to the two head leaders of the youth organization] scan for members in the Facebook friendslist of all leaders.
Katherine (21 years old, female, leader): You have to delete them after that.
Laura: It seems ridiculous, but it’s pretty serious. Imagine those young ones seeing pictures of you. Everyone drinks a beer or goes out to party.
Table 3. Overview of group privacy management strategies used in Youth Organizations.
Group privacy management strategies |
Example |
Establishing spatial boundaries
|
Creating Facebook groups for sharing information with a defined group of others. Making use of different SNSs for disclosing different sorts of information. |
Establishing temporal boundaries |
Removing leaders/members from a Facebook group when they leave the youth organization. |
Managing content together |
Organizing a slide show evening where all pictures of camp are presented and a selection is made before it is allowed on Facebook or website. Deleting online information that can be harmful for the youth organization. |
Managing audiences together |
Not accepting parents or (young) members as a Facebook friend. Making use of Facebook groups or chat to discuss group information. |
Creating a control agent |
Scanning profiles and enforcing group privacy rules (e.g., “Facebook police”) |
Group Privacy Management Challenges
F10 Interviewer: “I decide for myself what I post on Facebook and whom I accept as a Facebook friend.”
[Interviewer reads this statement aloud]
Fabian (18 years old, male, leader): It’s your own Facebook account. Other people should not decide what you post and [do] not post.
Pete (18 years old, male, leader): There is no one who can tell me what to do on Facebook, except for my mom (laughs).
F11 Marie (14 years old, female, member): How can it be any different than that? It’s your own profile. Nobody else can make such decisions.
F6 Trenton (21 years old, male, leader): I completely agree with what the organization tells us to do. I also favor not becoming Facebook friends with members on Facebook. Maybe this is a bit strange and hard, but you aren’t “friends” with the members. That’s not appropriate.
F12 Lauren (20 years old, female, leader): I’m a Facebook friend with only four or five members. So I created a group, added them, and asked them to add the others I wasn’t a Facebook friends with but I knew they were.
F4 Interviewer: What did you do?
Braxton (22 years old, male, leader): Me? Nothing. What are you going to achieve when you react to such posts? You can confront them, but then you also create a very unpleasant situation. It’s not worth my time. I will not let them provoke me. I do think it’s ridiculous and a lack of respect towards my privacy.
F12 Rayne: We did have a discussion on other stuff [hesitating].
Interviewer: I am not trying here to come to terms with the past. But can you tell me something more about this discussion?
Rayne (19 years old, female, leader): There are things online through which it seems that the membersare too close with the leaders. We think that there should be some sort of “wall” between the leaders and the members, and in some of the conversations on the newsfeed [referring to communication between a leader and member in Facebook], it wasn’t that clear.
Discussion
Main Results and Reflections
Recommendations
Limitations and Future Research
group control. A positive correlation was expected between these variables, in line with CPM theory. A possible explanation could be that the groups who score high on group privacy rules have the need to express that as a group you do not have everything under control. Hence, a low score on group control can be seen as a justification for their implementation of privacy rules on a group level. In a similar fashion, the groups who score low on implementing group rules justify their practices through stating that they control the situation. Future research is necessary to support or reject these hypotheses.
Conclusion
Notes
2. KSJ-KSA-VKSJ is an abbreviation in Dutch: Katholieke Studerende Jeugd [Catholic, education and youth]- Katholieke Studenten Actie – [Catholic, students and action]; Vrouwelijke Katholieke Studerende Jeugd [Catholic, women, students and youth].
3. On an average the local youth organizations consisted of 136 people in total, with an average of 18 leaders and 14 oldest members.
4. In Belgium, 16 year olds are allowed to drink alcoholic beverages that contain a maximum of 5 percent alcohol. 18 year olds are allowed to drink strong liquor.
Acknowledgement

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright © 2016 Ralf De Wolf