Sei sulla pagina 1di 11

Computers in Human Behavior 33 (2014) 356–366

Contents lists available at ScienceDirect

Computers in Human Behavior


journal homepage: www.elsevier.com/locate/comphumbeh

Late adolescent identity definition and intimate disclosure on Facebook


Zayira Jordán-Conde a,1, Brian Mennecke b,⇑, Anthony Townsend b,2
a
Polytechnic University of Puerto Rico, Department of Electrical and Computer Engineering and Computer Science, 377 P. de León Ave., Hato Rey, PR 00918, United States
b
College of Business, Iowa State University, Ames, IA 50011, United States

a r t i c l e i n f o a b s t r a c t

Article history: During the last decade, online social networks such as Facebook™ (Facebook) grew rapidly in popularity
Available online 9 August 2013 and this was due in no small measure to use of these media by adolescents. For many teenagers and
young adults, Facebook represents a social institution that can be used by adolescents not only for shar-
Keywords: ing basic information and for connecting with others, but also as a platform for exploring and divulging
Facebook information about their identities. To examine issues related to questions about the formation and dis-
Adolescent closure of identity-related information by late adolescents, this study investigates the relationship
Identity
between disclosures of intimate information by late adolescents through Facebook and their stage of psy-
Intimacy
Disclosure
chosocial development. To examine disclosure behaviors of young college students on Facebook, we con-
Social networking site ducted focus groups in conjunction with a content analysis of Facebook profiles. Findings point to an
extended adolescence period resting on the identity construction dilemma posed by digital social
networks.
Ó 2013 Elsevier Ltd. All rights reserved.

1. Introduction Late adolescents represent a particularly important group to


study in the context of identity formation and representation not
Online social networks such as Facebook™ (Facebook) became only to understand why and how they use (or misuse) applications
mainstream in a relatively short amount of time due in large part like Facebook, but also because their identities change as they un-
to their popularity among adolescents. As a result of its popularity dergo the transition from childhood to adulthood. Furthermore, it
Facebook became more than merely a medium of communication; is important to understand late adolescent behaviors and motiva-
it achieved a level of recognition and influence as a new sort of so- tions because many in this age range do not have a fully-developed
cial institution for sharing information and for finding and con- awareness and understanding of the ‘‘public and persistent’’ (Len-
necting with others. Yet, this medium has not been without hart & Madden, 2007, p. 3) nature of the information they publish
controversy and risks. In fact, much of the early attention by the online, which often seems to clash with their perception of social
news media on social networks focused on the amount and depth network sites as private spaces. This is confounded by the fact that
of intimate information adolescents posted on their profiles. For in- many late adolescents are challenged to establish and maintain
stance, in 2007, a number of media outlets reported on a case their popularity during a period of self-definition and, as a result,
involving a 14-year old girl who had sued MySpace™ alleging that many actively negotiate the boundaries of their intimacy amid
the company was instrumental in the sexual assault she had suf- the constant interactions they engage in with their Facebook
fered at the hands of an adult user (MSNBC, 2006). Controversy re- ‘‘friends.’’ Moreover, even with the availability of features that al-
lated to public disclosures of personal information continues and low users to manage the privacy of their profiles (i.e., the settings
brings to the fore the fact that social networks are public portals that determine who can gain access to their information), many
containing ‘‘vaults’’ of information about individuals who willingly late adolescent Facebook users keep their information open to
divulge personal information for others to consume and dissemi- the general public or to large numbers of peers (De Souzaa & Dick,
nate. This raises the question of why one of the prominent groups 2009; Gross & Acquisti, 2005; Raynes-Goldie, 2010).
of users of social network sites, late adolescents, divulge the infor- According to Erikson (1959), adolescence is a period when
mation that they do in these public forums, and how this process of young people begin to establish their sense of self identity. For
divulgence is aligned with their evolving identity formation. example, some adolescents, those who have not committed to
their identities, can be said to be at ‘‘moratorium’’ (relative to their
⇑ Corresponding author. Tel.: +1 515 294 8100. identity formation) while others who have made commitments to
E-mail addresses: zjordan@pupr.edu (Z. Jordán-Conde), mennecke@iastate.edu a fixed identity are said to be in ‘‘achievement.’’ Shaping personal
(B. Mennecke), amt@iastate.edu (A. Townsend). identities and resolving identity crises are processes that are
1
Tel.: +1 787 622 8000x456. played out, Erickson states, in many types of social interactions
2
Tel.: +1 515 294 7934.

0747-5632/$ - see front matter Ó 2013 Elsevier Ltd. All rights reserved.
http://dx.doi.org/10.1016/j.chb.2013.07.015
Z. Jordán-Conde et al. / Computers in Human Behavior 33 (2014) 356–366 357

and at many different times during adolescence. In the case of to- 2. Theory
day’s young people, a substantial part of these interactions is
increasingly computer-mediated. 2.1. Young people and computers
The purported abandonment of the privacy norm with regard to
their on-line representation by late adolescents may be related to In the last 20 years, individuals and society have been greatly
the identity formation stage they are in. For them, the portrayal affected by the phenomenal developments of technology, particu-
of a distant and disconnected self could represent the ideal context larly communication technology. The so-called ‘‘net generation’’
for resolving the identity crisis characteristic of this developmental (Tapscott, 1998) has become what anthropologist Mead (1973)
stage. The virtual presence offered by a Facebook profile, persistent would have called a ‘‘prefigurative society’’ where the young teach
but undemanding, may stand as a convenient outlet for young peo- the old the competencies to function properly in society; in this
ple to use and discard aspects of their representation as they come case, how to use and deal with computer-supported social interac-
to terms with the commitments they must make in order to move tions. One of the first researchers to address people’s relationships
onto their lives as adults. Lessig (2000) argues that software code is with computers was Sherry Turkle. By the 1980s, Turkle (1984)
a form of social architecture, and undoubtedly, the most important was already documenting children’s fascination with computers
architectural feature that social networks possess is the sociality and their relation to them. As technology became more ubiquitous
they enable. In their meta-analysis of the literature on online social and applied to daily life, Turkle (1995) noted that the traditional
networks, boyd and Ellison (2007) argue that ‘‘available research notion people held about the ‘‘division’’ between humans and ma-
suggests that most social networks primarily support pre-existing chine was receding. She found that understandings of the real and
social relations’’ (boyd & Ellison, 2007, p. 12). These social interac- the virtual were being restructured to accommodate ‘‘computers’
tions offer a new virtual context where late adolescents resolve the representations of the world as the world’’ (p. 63). In effect, com-
identity crises that for centuries have played out in face to face puters have come to be considered by younger people who are
interactions. accustomed to them as a sort of intelligent object or ‘‘objects to
Contrary to the social technologies enabled by early computers, think with’’ (p. 47).
the most controversial characteristics of the current versions of so- This phenomenon played out in the early part of the last decade
cial software are the visibility of information about the adolescent as social networks proliferated and were often adopted first by
and the friendship paradigm, both of which have proven conflictive adolescents. In 2005, a study by the Pew Research Center for the
as they disrupt the balance of real life social performances. boyd People and the Press on teenage use of technology confirmed that
(2006) argues that ‘‘friendship helps people write community into most young people had at that time made the internet an impor-
being in social network sites’’ (p. 1). Most, if not all, of the social tant venue for social interactions (Lenhart, Madden, & Hitlin,
networks analyzed by boyd (2006) have resorted to a ‘‘culture of 2005) and that a majority of teens had profiles online in social net-
friending’’ as the resolution of a conflict between social tensions works like MySpace and Facebook (Lenhart & Madden, 2007). The
that resulted from technological limitations (p. 2). That is, in order Pew studies’ reported how adolescents’ online communication
to be technically viable, the software negated the nuances related practices demonstrated incipient tendencies that influenced the
to the various levels of intimacy and commitment that human rela- behaviors of late adolescents. An implication of these uses of social
tionships entail. Language was dichotomized as developers obvi- networks by members of the net generation means that adoles-
ated the nuanced conventions that regulate the boundaries of cents could extend their social networks beyond the limits of phys-
privacy in social interaction. boyd (2006) points out that, in these ical proximity. Clearly, how they disclose information about
sites, ‘‘friending is deeply affected by both social processes and themselves and the way they do so often exceeds the traditional
technological affordances’’ (p. 1). As a result of the limitations im- social norms for the regulation of privacy. Processes that used to
posed by code, users see a need to cope with the system by con- take place privately or among a very limited set of friends are
firming others as ‘‘friends’’ when they have not come to share now enacted before a much wider online audience.
the time and commitment this type of relationship calls for in real Why do late adolescents disclose intimate information through
life (boyd, 2006, p. 4). boyd and Ellison (2007) claim that ‘‘by acting Facebook? To answer this question, some theories have proposed
as a tool for ‘saving face,’ the friending function can operate as a that young people go through a period of transformation charac-
catalyst for social drama’’ (p. 11). terized by tensions that accompany the development of personal
In this light, this study asks an important set of research ques- identities (Erikson, 1959; Vadeboncoeur, 2005). Young people,
tions about the formation and disclosure of identity-related infor- these theories suggest, negotiate meanings that help establish per-
mation by late adolescents; that is, what are the factors that sonal identity through social networks, whether these are online or
influence late adolescents in their disclosure of intimate informa- offline. In the next section we review several of the important the-
tion on Facebook and how are disclosure behaviors manifest in oretical frameworks that examine factors influencing psychosocial
this venue? We suggest that disclosure of intimacy on Facebook development through the period of adolescence.
is influenced by identity status, where late adolescents undergo-
ing an identity crisis known as moratorium are expected to dis-
close more intimate information than those who have settled 2.2. Adolescent development and identity formation
identity commitments for adult life. This study also provides an
account of the understanding late adolescents (college students The era following the industrial revolution has been
18–21) have of Facebook as a tool for social interaction, and re- characterized by an increasing physical separation of adults from
ports on their attitudes and perceptions about the privacy issues their children. As a consequence, young people today spend less
related to its use. Facebook profiles are examined to expose the time with adults and family members and more time with peers.
relationship between the psychosocial stage of development and Furthermore, unlike other societies where rites of passage clearly
willingness to disclose intimate information online. The findings mark the transition from childhood to adulthood, most western
illustrate online communication practices by late adolescents on cultures do not have formal rituals marking the individual’s com-
Facebook. The study therefore also aims to determine the kinds ing of age, which makes demarcating the boundaries between
of intimate information adolescents disclose on Facebook and childhood and adulthood a challenge for children and adults. Stan-
the reasoning and decision-making associated with these ley Hall, the ‘‘father of adolescence,’’ proposed that this develop-
behaviors. mental stage is part of a cumulative process leading to adulthood
358 Z. Jordán-Conde et al. / Computers in Human Behavior 33 (2014) 356–366

(Vadeboncoeur, 2005, p. 3). Hall is responsible for the widely ac- interpersonal (i.e., aspects of friendship, dating, sex roles, and rec-
cepted notion of adolescence as a period of ‘‘storm and stress’’ (p. reational choices). Marcia sees identity formation as a process in
57) where individuals are seen as incomplete and have yet to at- which there are two possible paths, both of which start with the
tain a bona fide status as fully integrated members of society. All individual at diffusion status in which he/she is tied to childhood
these conditions position adolescents at a liminal state in society identifications and commitments. In the first path, the individual
where the individual is neither a child nor an adult. The neither- goes directly to a foreclosure status that fixes commitments bound
nor stage of adolescence helps foster an implied societal agreement by childhood identifications. In the second path, the individual
that they should be accorded time to experiment with their iden- undergoes a crisis at the moratorium stage, where he/she experi-
tities before they commit to an adult identification (i.e., the adoles- ments with different commitments until he/she determines that
cent makes a commitment to a chosen role or value). certain characteristics are suitable for moving onto adulthood
One of the most influential theories about adolescence as a thereby entering the identity achievement status. According to
stage of identity crisis is that proposed by Erikson (1959) where Adams (1998), individuals can be at different statuses as they go
adolescence is viewed to be a period of identity definition in which through the two dimensions of identity, ideological and interper-
‘‘the individual seeks to balance ecological and internal factors to sonal; that is, a person can be at one status in terms of ideological
achieve the fixation of an identity’’ (p. 245). The adolescent’s task, commitments (religious and political) and another status in terms
identity definition, is achieved only ‘‘when the individual has sub- of interpersonal commitments (dating, sex roles). Adams’ survey,
ordinated his childhood identifications to a new kind of identifica- used in this study, measures these two dimensions as two distinct
tion achieved by absorbing sociability and in competitive constructs.
apprenticeship with and among his age mates’’ (p. 155). The affil- Both, Erikson and Marcia stress the importance of friends in
iations resulting from this critical period lead to commitments the helping to discern commitments. Some scholars claim that identity
individual engages in ‘‘for life’’ (p. 155). Erikson holds that the mor- negotiations at this critical period may have changed in the last
atorium granted adolescents is a period of ‘‘free role experimenta- few decades as the emergence of adulthood is delayed in response
tion’’ followed by the desire to ‘‘find a niche in some section of his to further societal constraints. A number of factors may be at the
society, a niche which is firmly defined and yet seems to be un- root of this shift, such as higher societal expectations (i.e., more
iquely made for him’’ (p. 156). The moratorium stage is character- schooling, higher costs of living) and the increasing amount of
ized by a need for recognition and in delaying ‘‘adult identity playfulness allowed in the virtual scenarios of the web.
commitments,’’ allowing the individual a ‘‘provocative playful- Further, because of changes in social structures, the consequences
ness’’ (p. 157) of which he or she may not be aware. of sexual behavior, the pressures of college life, and health issues,
Erikson suggests that the negotiation of identity is a struggle among others, the struggles at moratorium are now played out on-
that is solved mainly as a result of adolescents’ interactions with line. In other words, Facebook now functions as a venue in which
others who, in line with Cooley’s (1964) tenets, act as ‘‘mirror(s) late adolescents can navigate the difficult moratorium stage.
to the self’’ (p. 8). Erikson confirms Cooley’s notion of the social According to Erikson’s (1968) theory, moratorium individuals
construction of the self when he declares that adolescents ‘‘are should disclose more than those in the achievement status.
sometimes morbidly, often curiously, preoccupied with what they According to Marcia’s definition, the moratorium stage is charac-
appear to be in the eyes of others as compared with what they feel terized by a lack of commitments and a struggle to identify those
they are’’ (1968, p. 128). Erikson’s theory offers a basis for under- commitments. In this regard, the relationship between commit-
standing the ‘‘playful’’ use of intimacy in online interactions ments and identity status is examined by tracking relevant Face-
through Facebook. Erickson explains that young people who have book fields in which these commitments may be stated. This
not defined their identity do not involve themselves in intimacy, monitoring of the cues provided by Facebook friends provides a
but throw themselves ‘‘into acts of intimacy which are ‘promiscu- principle evaluative mechanism for the adolescent. Goffman
ous’ without true fusion or real self-abandon’’ (p. 135). (1959) suggests that the expression of identity is done for a specific
Rawlins (1992) supports Erikson’s contentions and states that audience; in this case, the identity is being developed for a specific
‘‘adolescents achieve their self-definition communicatively in con- audience, and the feedback cues indicate quite explicitly how the
junction with their social networks’’ (p. 59). Like Erikson, Rawlins presentation is being received. Because the goal at this stage is
argues that friends aid adolescents in the process of articulating the adolescent’s identity definition, these cues function to inform
identity. According to Rawlins, identity and intimacy are closely re- the adolescent as to whether the portrayal they intend is the por-
lated in adolescence as young people test the taken-for-granted trayal that their Facebook friends are observing.
identities they play out in front of the family against the identities
acquired from peer culture.
2.3. Intimacy and disclosure
Marcia (1966) built on Erikson’s work by proposing four sta-
tuses of identity characteristic associated with this developmental
Wheeless (1978) posits that due to a tendency toward general
period (Table 1). He also identified two dimensions of identity that
disclosiveness, people tend to trust their interlocutor when they
were later developed by Adams (1998) into a quantitative instru-
do not know each other well enough or when their relationships
ment; that is, the ideological (i.e., occupational, religious, political
‘‘are only moderately solid’’ (p. 145). Following Wheeless’ defini-
and philosophical life-style values, goals, and standards) and the
tion, we define disclosiveness as the general tendency to disclose

Table 1
Adolescent identity statuses according to Marcia (1966). Marcia identified two dimensions: interpersonal and ideological and four possible stages of development: diffusion,
moratorium, foreclosure, and achievement.

Adolescent identity
Interpersonal Ideological
Diffusion Moratorium Foreclosure Achievement
The subject ‘‘may or may not have The subject is ‘‘in the crisis period with The subject has preemptively The subject ‘‘has experienced a crisis
experienced a crisis period; his commitments rather vague’’ but on an committed himself without period and is committed to an
hallmark is a lack of commitment.’’ ‘‘active struggle’’ to make those ‘‘having experienced a crisis.’’ occupation and ideology.’’
Z. Jordán-Conde et al. / Computers in Human Behavior 33 (2014) 356–366 359

intimate information to a stranger. Rather than referring to ‘‘any contention that intimate details are becoming an integral part of
message about the self,’’ intimate self disclosure in this study re- self portrayal online.
lates to the elicitation of information of an intimate character, Tidwell and Walther (2002) also focused on self disclosure and
what Greene, Delega, & Mathews (in Gibbs, Ellison, & Heino, impression formation as a function of the medium’s capacity. Their
2006, p. 155) catalog as the ‘‘highly personal,’’ of the type usually results support Walther’s hyperpersonal theory. They found that in
disclosed in a romantic relationship (p. 156). comparison to face-to-face (FtF) interaction, people rated each
Intimacy has traditionally been seen as a relational goal in dya- other lower in various interpersonal perceptual attributes during
dic relationships, generally in married couples. However, an indi- CMC, but they rated them with more extreme scores. In other
vidual can categorize information as more or less intimate in words, there was ‘‘more selective and yet exaggerated social infor-
response to his/her anticipated audience and context of the mes- mation sharing online, consistent with the hyperpersonal ap-
sage. This study applies the concept of intimacy in the classifica- proach’’ (Tidwell & Walther, 2002, p. 319). Tidwell and Walther
tion of information about a person by the individual himself, (2002) used uncertainty reduction theory (URT) to explain how
which follows Jourard and Jaffe’s (1970) approach by measuring people exchange information online:
the content of elicitations or the topic’s ‘‘intimacy value’’ (p. 134).
Our findings indicate that the restrictions of CMC prompt users’
Moon’s (2000) findings demonstrating how computers affect
adaptation to the medium through modification of uncertainty
consumers’ willingness to release intimate information showed
reduction behaviors. Bereft of most nonverbal cues, CMC partners
that disclosures are influenced by the medium used for communi-
forgo the peripheral questions and answers that mark the normal,
cation. Specifically, Moon (2000) found that people showed more
superficial exchanges among new acquaintances in FtF encounters.
resistance to giving out emotive information about themselves to
Instead, CMC interactants appeared to employ a greater proportion
a computer compared to less emotional content (p. 333). Moon’s
of more direct, interactive uncertainty reduction strategies—inter-
list of topics is used in the current study to guide our examination
mediate questioning and disclosing with their partners—than did
of the intimacy of topics. By determining the amount of intimate
their FtF counterparts. (p. 338)
disclosures participants engage in on Facebook, the present study
seeks to assess the impact of a virtual setting in the exercise of dis-
closive behaviors.
Similarly, Rubin (1975) argues that the honesty with which
2.4. Presence in computer mediated communication (CMC) some individuals present themselves online is a function of the
‘‘passing stranger’’ phenomenon. Rubin proposes that individuals
The presence literature suggests that computer-mediated pres- are more willing to reveal information to people they consider
ence is a perception that is dependent upon: (1) the medium’s abil- inconsequential acquaintances (Gibbs et al., 2006; Rubin, 1975).
ity to make itself transparent, (2) its capacity to convey acceptable Sproull and Kiesler (1991) found that disembodied interactions en-
sensorial input, (3) its capacity to portray natural mobility and con- able participants to be ‘simultaneously linked to and buffered from
trol over the environment, (4) the type of representation it enables, one another’’ (p. 30). This buffer effect, given in a less-embodied
and (5) the exposure the user has had to it (Biocca, Harms, & Bur- interaction afforded by Facebook, may help explain the perception
goon, 2003; Lee, 2000; Lombard & Ditton, 1997; Zhao, 2003). that an increased disclosure is needed to get the message across.
According to these precepts, in a continuum of computer-mediated The level of intimate details young people reveal online appears
channels, social networks sites should offer a reduced sense of to be influenced by several factors. O’Sullivan (2000) argues that
presence when compared to that of the real world. The reduced although research on privacy boundary management generally
presence offered by CMC (i.e. social networking sites, or SNSs) seems to indicate that mediated channels are actively sought as a
may act as a buffer that users manipulate many times to purposely way to control privacy, the mediation effect seems to foster looser
control their messages. It could also act as a hurdle for conveying boundaries among adolescents (p. 425). That is, adolescents think
messages that could, in turn, cause an increase in the amount of that ‘‘little vulnerability to privacy violations exist’’ through these
information provided and the number of disclosures contained channels where they actively vent out their secrets to others (p.
therein. 425). The studies on presence indicate that the strategies people
Walther (2007) proposed his hyperpersonal model of com- resort to in CMC are partially a function of the capacity of the chan-
puter-mediated communication, in which ‘‘users exploit the tech- nel to convey their message. The sense of presence sparked by var-
nological aspects in order to enhance the messages they construct ious online media is directly related to the strategies people use to
to manage impressions and facilitate desired relationships’’ (p. make up for the perceived loss of cues. These studies and similar
2538). For Walther, hyperpersonal stands for the ‘‘potential exag- research on presence and CMC suggest that, in the context of social
geration of impressions and relationships online’’ (p. 2539). networks like Facebook, disclosure of intimate information is dri-
According to his model, online communication tends to contribute ven by the feeling of being there, the sense of presence, and, for late
to the creation of idealized notions about partners and may even adolescents, this interacts with the identity crisis characteristic of
‘‘create dynamic feedback loops wherein the exaggerated expec- this developmental stage and the user’s goals of using the media
tancies are confirmed and reciprocated through mutual interaction to negotiate boundaries of their intimacy.
via the bias-prone communication processes’’ (p. 2539). Walther
contends that the absence of cues normally associated with face- 2.5. A model for adolescent identity definition and disclosure of
to-face interaction restricts the message, causing less ‘‘leakage’’ intimacy online
(p. 2541). The sensory and cognitive focus of the interaction is then
redirected to the creation of the message. The reduced cues, due to Peers are very important in adolescent life. Many of today’s ado-
the affordances of the medium, are taken advantage of by the user lescents employ social network sites in their interactions with
who exaggerates those characteristics he/she wishes to call atten- peers to achieve a sense of popularity and self-validation. We posit
tion to (p. 2552). Interestingly, Walther argues that CMC, as com- that Facebook ‘‘friends’’ are used as a reference group to help de-
pared to face-to-face interactions, leads to ‘‘more extreme fine norms and standards and to validate ‘‘ways of being’’ adoles-
impressions’’ and ‘‘more positive relations over time’’ (p. 2539). cents wrestle with prior to committing to a fixed identity. In this
The tendency of young people to go beyond the norm of privacy sense, Facebook, along with other social network sites, is bound
to make an impression online seems to conform with Walther’s to create a culture with an impact on identity development.
360 Z. Jordán-Conde et al. / Computers in Human Behavior 33 (2014) 356–366

The network, rather than being just a place to ‘‘hang out’’ 3.1. Phase 1: Exploratory focus group
(boyd, 2007), is a place where adolescents negotiate identity
uncontrived by physicality or real life social norms. The perfor- A group of six males and three females aged 18–21 were re-
mance of the self online, the virtual ‘‘me,’’ is an extension of cruited from the student population at Iowa State University in
the real life (RL) self that allows creative ways of testing facets the United States. Because the subjects were taking an advanced
of identity. Faced with RL conditions burdening the process of computer course, these students were knowledgeable about com-
identity definition, adolescents have moved to the web. Namely, puters and their many uses. A moderator helped guide the conver-
they use Facebook as an ideal venue for negotiating the morato- sation. Using a semi-structured questionnaire, students were asked
rium phase that allows them to play out aspects of a yet unfixed about how they see Facebook, in what ways do they use this appli-
identity. cation, their perceptions of the impact of Facebook on everyday
Fig. 1 diagrams a model that is in line with Erikson’s psychoso- life, what they disclose about themselves in their profiles, and their
cial development theory, which proposes identity definition as the expectations for the future of Facebook. The focus group session
major task facing moratorium adolescents on Facebook. Through was videotaped and audio-recorded and complementary notes
their Facebook profiles, adolescents work on defining their iden- were taken during the session. The transcripts of these proceedings
tity, simultaneously balancing the need for privacy with their de- were analyzed for emerging themes. The purpose of this prelimin-
sire for validation and popularity. This study proposes that ary research was to better inform the data collection and to obtain
Facebook acts as a venue for young people who might just want an understanding of the trends, practices, and interests related to
some time to deal with themselves—a time to decide who they disclosure of intimate information on the site.
are—with their ‘‘friends’’ in the virtual realm.
Concentric circles in Fig. 1 represent adolescent’s social world 3.2. Phase 2: Content analyses
in two different contexts: real life and the virtual world of so-
cial networking sites. The disclosures are indicated by arrows 3.2.1. Survey
flowing from and toward the individual to indicate negotiations First and second year students from the design college at the re-
of real life identity as theorized by Erikson (1968). In real life, searcher’s institution were targeted for this research because stu-
the network surrounding the individual is contained, limited in dents in this status would be undergoing or would recently have
number, and largely ‘‘visible’’ because the social networks sup- undergone the first round of screening to be admitted to a very
ported by face-to-face interaction are constrained by the num- selective design major (i.e., graphic design, a program with narrow
ber of people the individual can personally reach. The arrows enrollment limits). Our expectation was that these students would
flowing toward the box to the right represent disclosures made be likely to discuss their experience and whether they were admit-
by the individual when using his/her computer to access Face- ted to or rejected from the program, a topic that, among others,
book. The box stands for the devices (software and hardware) was of an intimate nature. To attract these students to the study,
modulating the individual’s interaction through a computer. As e-mail messages were sent to approximately 300 freshmen and
the literature on presence suggests, the medium has reduced sophomores in this program to solicit their participation in a sur-
capacity to convey information (compared to real life), creating vey and the content analysis. Those who indicated an interest were
a buffering effect that motivates an increase in disclosures both instructed to complete an online questionnaire including a section
in terms of the intimacy of the content and in amount of con- in which participants were asked to rate intimate topics and Ben-
tent available. Furthermore, in Facebook, although the individ- nion and Adams (1986) EOMEIS-2 scale measuring identity status.
ual’s disclosures are directed to an intended audience, there Participants were also asked to accept the researcher as a Facebook
are unintended audiences that add to the locus of effect of inti- friend and join a Facebook group specific to the research. A total of
mate disclosures. 45 students participated in the survey. From these, 25 students (14
females, 11 males) agreed to allow the researcher to monitor their
profile pages.
3. Methods Moon’s (2000) study of intimate exchanges during CMC interac-
tions was used as the basis for the items included in the intimacy
To gather data for this study, multiple research methods were rankings. Participants rated the topics (1) favorite pastimes/hob-
employed. By using a multi-methods approach we seek to address bies, (2) self-pride, (3) anger management, (4) feelings and atti-
the call by McGrath (1982) and others to cross methodological tudes about death, (5) self-discontent (personality), (6) self-
boundaries to address important research questions. These data discontent (physical), (7) frustrations, (8) sexual behaviors, (9)
were collected in two phases. In Phase 1, we conducted an guilt, (10) emotional aspects of self, and (11) dislikes about others)
exploratory focus group session. The purpose of the focus group using a Likert scale (0–5 where 0 meant ‘‘not intimate at all’’ and 5
was to surface and assess the general concerns and practices meant ‘‘extremely intimate’’) to indicate the intimacy value they
young college students associate with Facebook. Furthermore, allocated to said topics.
we also used this session to identify relevant terminology and Ego identity status was measured using Bennion and Adams’
technology features identified as important to late adolescent (1986) EOMEIS-2 scale where two dimensions of identity were
users of Facebook. In Phase 2, we conducted a quantitative study measured: ideological identity and interpersonal identity. Ideolog-
to examine the primary research questions. Specifically, we con- ical identity includes ‘‘occupational, religious, political and philo-
ducted a content analysis of Facebook users’ profiles to determine sophical life-style values, goals, and standards’’ while social
the intimate topics frequently disclosed online and the ways by orinterpersonal identity involves aspects of friendship, dating, sex
which these topics are disclosed. We also surveyed the subjects roles, and recreational choices (Adams, 1998). The EOMEIS-2 was
whose profiles we examined to identify their stage of develop- developed through an iterative process based on Marcia’s identity
ment as well as other pertinent demographic and attitudinal framework. This scale has been repeatedly tested for validity and
information. The goals of this approach were to obtain a general has been shown to reliably reflect Marcia’s identity status con-
understanding of Facebook as seen by adolescents and to com- structs (Adams, 1998; Bergh & Erling, 2005).
pare and contrast moratorium and achievement individuals to Identity status was calculated by coding the answers to the 64-
gain an understanding of the differences on intimacy disclosure items in the scale and determining a score that indicated one of
by identity status. four statuses. Adams explains:
Z. Jordán-Conde et al. / Computers in Human Behavior 33 (2014) 356–366 361

Fig. 1. Model for adolescents’ identity negotiations and disclosure of Intimacy on Facebook. The model shows disclosures by adolescents in the real world, the medium
(computer) represented in the box and the larger circle representing social networking sites such as Facebook with its unintended audience.

This 64-item scale utilizes 32 items to assess ideological identity in 6. Religious views: Open text
the domains of occupation, politics, religion, and philosophical life- 7. Favorite quotes: Open text
style; and 32 items to assess interpersonal identity in the domains 8. About me: Open text
of sex roles, friendship, recreation, and dating. (p. 26).
Education and work section
Each item in the scale is related to a dimension and identity sta-
tus as shown in Table 2. The reliability test of the identity status
1. College/University: Open text
scale resulted in a Cronbach’s alpha of 0.81.
2. Concentration: Open text
3. Second concentration: Open text
3.2.2. Content analysis
4. Third concentration: Open text
A content analysis of the subjects’ Facebook profiles was con-
5. Degree: Open text
ducted to gain an insight into participants’ intimacy disclosure
practices. Those who completed the survey questionnaire and pro-
All the fields were coded for changes over time. In other words,
vided consent to access to their Facebook profiles constituted the
if any of these fields changed after initial capture in the subsequent
source sample for this part of the study. A total of 25 profiles were
seven ‘‘snapshots’’ captured over a 4-week period, the coders noted
captured twice a week for a period of 4 weeks. After data collec-
each change. The ‘‘status update,’’ favorite quotes,’’ and ‘‘about me’’
tion, images and fields that were not pertinent to the current study
fields were included in the count of intimacy topics. Specifically,
were deleted. A text file was created for each participant that in-
coders searched for the occurrence of the three topics identified
cluded information retrieved from the various fields analyzed.
by subjects in their survey responses as highly intimate in the inti-
The fields analyzed were:
macy value ranking: feelings and attitudes toward death, sexual
Basic information section
behaviors, and emotional aspects of self.
Facebook’s Wall was also captured and analyzed to determine
1. Status update: A text string that is often used to inform friends
the number of disclosures of intimate topics. The Wall is a bulletin
of a mood, change, or special event in the profile owner’s life.
board that allows Facebook users to publish messages (i.e., post-
2. Relationship status: This field asks the profile owner to indicate
ings) directed to a profile owner that can be seen by others. The
whether he/she is ‘‘single, in a relationship, engaged, married,
visible (public) postings on friends’ walls were also captured. Only
it’s complicated, or in an open relationship.’’
friends who had privacy settings allowing the researcher access to
3. Looking for: This field asks the profile owner to indicate whether
their ‘‘public’’ profiles were included in this analysis. Postings re-
he/she is looking for ‘‘friendship, dates, a relationship, or
lated to emotional aspects of the self were considered only if they
networks.’’
were related to the basic emotions identified by Parrott (2001):
4. Birthday: The user’s options to control the visibility of this field
love, joy, surprise, anger, sadness, and fear. The objective of this
include: showing the full date, month and day only, or not
phase of the study was to have a first-hand view of the disclosure
show.
of highly intimate topics participants engaged in on Facebook.
5. Political views: Open text
To evaluate the reliability of the coding, a pilot test was carried
Table 2
out to test inter-coder reliability. Two female coders (aged over 25)
EOMEIS-2 distribution of items according to dimension and status. with a general understanding of the study were trained to code.
They were provided instructions for coding in an orientation and
Achievement Moratorium Diffusion Foreclosure
question/answer session to discuss each of the fields to be coded
Ideology subscales as well as the definitions of each of the intimacy items to be coded.
Occupation 33, 49 9, 57 1, 25 17, 41
Religion 18, 42 26, 34 2, 10 50, 58
The coders in this pre-test brought up important clarifications and
Politics 8, 40 32, 48 16,56 24, 64 their suggestions to strengthen validity were integrated into the fi-
Philosophy 20, 60 12, 36 4, 52 28, 44 nal coding protocols.
Interpersonal subscales After the initial pre-test, a female and a male coder over the age
Friendship 13, 45 5, 61 29, 53 21, 37 of 18 who were blind to the purpose of the study were trained
Dating 15, 55 31, 47 7, 23 39, 63 using the codebook, instructions, and definitions refined during
Sex roles 35, 51 11, 43 19, 59 3, 27
the pre-test to review text files of the Facebook profile captures.
Recreation 22, 46 14, 54 6, 30 38, 62
The number of changes through time was tracked for the 13 fields.
362 Z. Jordán-Conde et al. / Computers in Human Behavior 33 (2014) 356–366

Table 3 people they met in real life. Participants indicated they actively
Inter-coder reliability for changes over time. managed their profile settings; however, they did not have in-
Percent Scott’s Cohen’s Krippendorff’s depth knowledge of the privacy controls available in Facebook.
agreement Pi Kappa Alpha Concerning representations of identity, the main topic partici-
Status update 100 1 1 1 pants were concerned about was the publication of photos in
Favorite quotes 96 0.90 0.90 0.90 which they were ‘‘tagged.’’ Most of them said they would ‘‘de-
About me 100 1 1 1 tag’’ photos because they did not want to be perceived negatively
Birthday 100 1 1 1
Relationship status 96 0.92 0.92 0.92
and out of context. A female participant claimed she had photos
Looking for 100 1 1 1 in her profile, ‘‘but anything that I’m tagged [sic] I make sure it’s
Political views 96 0.92 0.920128 0.92 not [compromising]. I don’t want to be associated with the alco-
Religious views 96 0.92 0.92 0.92 holic who always has a drink in pictures.’’ There was also some
College/university 100 1 1 1
understanding of an etiquette related to tagging practices. Some
First concentration 96 0.92 0.92 0.92
Second 100 1 1 1 pointed out that they had agreed with their friends not to tag each
concentration other.
Third concentration 100 1 1 1 There seemed to be a clash between the concept of privacy and
Degree 96 0.92 0.92 0.92 the definition of friendship on Facebook. For instance, a participant
said she had her settings tuned so that only ‘‘friends’’ could see her,
but when asked about the number of friends she has, she replied
The ‘‘status update,’’ ‘‘favorite quotes,’’ ‘‘about me’’ and Wall fields around 500. Another participant admitted he had not changed
were analyzed to determine the presence of the three topics with his privacy settings and had around 300 friends. Most of them
highest intimacy scores in the survey (feelings and attitudes to- had network friends that stood in the hundreds, with the number
ward death, sexual behaviors, and emotional aspects of self). The ranging from 72 to over 500. The notion of friends in Facebook has
visible (public) postings on friends’ walls were also captured. Cod- been discussed by boyd (2006) and Ellison, Steinfield, and Lampe
ers identified and reported the number of discrete disclosures (2007). The dichotomous friend/not friend selection the site affor-
made by participants in each of the mentioned fields. ded at the time these data were collected represented a hindrance
To determine inter-coder reliability for changes over time, to the expression of the nuances of real life networks. In other
agreements and disagreements were registered for all 13 fields in words, on some occasions, users’ limited understanding of or lack
each of the eight captures of 25 Facebook profiles. The overall in- of time or disposition result in the release of information to audi-
ter-coder reliability coefficient for this part of the analysis was ences for which the message was not intended.
98% (Table 3). In general, the group revealed a lack of concern that perhaps
Inter-coder percent agreement for intimacy topic content was legitimizes the privacy worries other researchers and commenta-
calculated by registering decisions made for each of the four fields tors have expressed about adolescent users of Facebook and other
in the eight captures of each of 25 profiles. The overall inter-coder social networks. Some said, ‘‘My Facebook represents me when I’m
reliability for intimacy content was 84%, which is in the acceptable being extremely social,’’ and ‘‘I don’t know how to separate my dig-
range (Table 4). ital life from my real life.’’ Others complain that some photos were
The data obtained through the analysis of the content of the ‘‘outlandish...I hope I could meet someone in person before they
profiles provided a first-hand view of the actual expression of inti- see this.’’
macy on Facebook. This information, together with the data ob- Even though some were concerned about employers getting
tained through the surveys on identity status, was examined to ‘‘the wrong picture,’’ the majority seemed to have a nonchalant
understand the interaction between these factors. attitude toward these postings. One said that ‘‘unless you are being
hired by the CIA or the NSA, you should not have to worry.’’ For
them, Facebook is a ‘‘creative environment,’’ a place where they
4. Results can express themselves, a place where others (including adults
and employers) should not be allowed or, if they were, they should
4.1. Phase 1: Focus group results not expect to impose real life or adults’ social expectations over
Facebook expressions. One participant opposed the notion that
Our discussions with focus group participants indicate that all profile pictures could harm job search: ‘‘It doesn’t seem as if
of them have made communications through computers part of they’re looking at that kind of stuff (profiles photos) and saying,
their daily routines. Facebook was one of the first channels to be ‘Oh, you’re drinking beer [so] I’m not going to hire you.’’
mentioned when talking about communicating with others, espe- These responses as well as others paint a picture about how
cially those within their age range. Overall, participants in the fo- these users of Facebook considered whether and how their profiles
cus group enjoyed the benefits provided by Facebook as the site reflected their identities. Nevertheless, their attitudes about how
facilitated their relationship maintenance tasks. They appreciated well these representations accurately portrayed their identities
Facebook as a medium that made it easier for them to manage varied. One participant noted, ‘‘you can’t put someone down on pa-
the way they presented themselves to their friends. Facebook also per,’’ suggesting he thought that you could not capture one’s es-
allowed them to establish connections and find out more about sence on Facebook, while another participant suggested one
Table 4 ‘‘projects a certain image on Facebook.’’ Participants generally
Intercoder reliability for intimacy topic content. interpreted Facebook profiles to be expressions of themselves
Percent Scott’s Cohen’s Krippendorff’s
and resisted the idea that they could be pigeonholed as a result
agreement Pi Kappa Alpha of what is shown there. Some of their statements in this respect
were: ‘‘It [the profile] doesn’t say who you are’’; ‘‘It’s not accurate
Status 80 0.60 0.610 0.60
update about who you are all the time; it doesn’t show the whole picture’’;
Favorite 88 0.65 0.664 0.66 ‘‘There is no picture that describes you [completely]’’; ‘‘A picture is
quotes worth a thousand words, but a personality is a lot more than that.’’
About me 84 0.60 0.61 0.61
Alternatively, another participant conceded that ‘‘it shapes you in a
Wall 84 0.68 0.68 0.68
way. I’m not going to censor or detag; still it is not representing me
Z. Jordán-Conde et al. / Computers in Human Behavior 33 (2014) 356–366 363

in all my whole.’’ Similarly, another person noted that ‘‘sometimes Table 5


I get the feeling it does influence people’s ideas.’’ Further, one fe- Descriptive statistics for intimacy mentions by interpersonal and ideological identity
status.
male participant said her sorority sisters checked each other’s pro-
files and that this influenced how she behaved and what she N Mean Std. error Std. dev.
posted: ‘‘It keeps me in check, makes me realize it’s not only me Interpersonal identity
that is affected [when unsavory pictures are posted].’’ Diffusion 7 9.14 3.97 10.51
In summary, the comments offered by our focus groups partic- Foreclosure 3 5 3.60 6.24
Moratorium 9 4.66 1.29 3.87
ipants appear to confirm the contention that Facebook could func- Achievement 6 3.83 0.95 2.32
tion as a place for discerning identity issues associated with Entire sample 25 5.76 1.29 6.46
adolescence. It may also help explain college-aged users’ willing- Ideological identity
ness to disclose intimate information as a reflection of their atti- Diffusion 6 9.83 4.26 10.44
tudes about representation, privacy, and the role of friend Foreclosure 2 2 1 1.41
networks. Specifically, many varied perspectives on the role of this Moratorium 13 4.84 1.16 4.20
Achievement 4 4.50 2.87 5.74
social network does or should play in the subjects’ public and pro-
Entire sample 25 5.76 1.29 6.46
fessional lives were expressed suggesting that many adolescents
view Facebook as a safe place to share intimacy while others recog-
nized the risks in doing so.
A contextual review of the Facebook profiles revealed that there
4.2. Phase 2: Results of survey and content analysis are areas beyond the scope of this project that may inform prac-
tices related to disclosure of intimacy. An example of this is the
4.2.1. Survey results application called Bumper Stickers, which is composed of images
The results from the EOMEIS-2 questionnaire on identity status resembling the stickers used on car bumpers. Facebook users give
showed that the majority of the respondents were at moratorium each other bumper stickers to communicate feelings and attitudes;
on both their ideological identity status (49%) and interpersonal the messages are metaphorical. Bumper stickers, as well as other
identity status (46%). The intimacy ranking produced a Cronbach’s interactional strategies using images, offer an enriched perspective
alpha of .75, suggesting that the items tested were internally con- into Facebook interaction practices. This group’s Facebook postings
sistent. The three top-rated items (feelings and attitudes toward demonstrated an underlying humor and lingo that reflected mood,
death, sexual behaviors, and emotional aspects of self) accounted attitudes and feelings toward a friend that could be used to express
for 48% of the highest intimacy rankings and were thus searched proximity with the other or a certain ‘‘fun’’ way of being.
for and coded in the content analysis of the captured Facebook pro- There were also many noticeable practices related to the adap-
files as an indicator of intimacy disclosure behaviors. tation of the English language in Facebook interactions. Some
expressions and lexicon used in these profiles affirm membership
in an artistic group because the profile owners are students in a de-
4.2.2. Content analysis – behavioral practices in relation to identity sign program. This includes the use of such terms as ‘‘izzle’’ added
In total, 116 changes were made to the 13 Facebook profile to a verb or the term ‘‘chillaxing,’’ communicating relaxation by
fields analyzed. Of these changes, only six were in fields reflecting combining the coloquial words ‘‘chill’’ and ‘‘relaxing.’’ Many pur-
ideological status information (political and religious views) and posely employed typos. For example, one wrote, ‘‘so whats are
two were in fields dealing with interpersonal status (relationship you doings on yer birfday?’’ This sentence illustrates the practice
status and looking for). There were 224 intimacy mentions in 25 of phonetically substituting letters for humorous effect. Students
profiles. The majority of the intimate mentions (162 mentions, also used words that have been appropriated by celebrities to indi-
87%) were related to emotional aspects of self. There were 14 that cate their identification with hip-hop culture.
alluded to feelings and attitudes toward death, and 10 mentions of The ‘‘relationship status’’ field often contains real life romantic
sexual behavior. relationships but also information that tends to hint at the ‘‘close-
Table 5 shows the descriptive statistics for intimacy mentions ness’’ between two individuals who have common interests and
by identity status. Due to the non-normality of the distribution wished to announce their alliance. Through this field, users even
of Facebook intimacy mentions, a Mann–Whitney test was used demonstrated levels of commitment and relationships outside
to test this factor by moratorium and achievement status in both the social norm. For example, a girl could be married to a girlfriend
interpersonal (n = 15) and ideological (n = 17) identity. No statisti- although they are not in a romantic or physical relationship, or a
cally significant differences were found between groups in either girl could marry her boyfriend’s brother to indicate a certain tem-
the ideological (p = .79, @ = .05) or interpersonal (p = .86, @ = .05) porary alliance. There were also a number of references that may
dimension. Nevertheless, it is worth noting that diffusion partici- illustrate the transgression of accepted social conduct, including
pants made almost twice as many intimacy disclosures compared the use of sexual innuendoes, health problems, excessive alcohol
to any of the groups in other statuses. We discuss these findings consumption, name-calling, and even racial slurs.
further in the next section. Facebook users updated information about their whereabouts
often, many doing so a few times during the day. It is clear that
4.2.3. Content analysis – emerging themes young people connect with offline acquaintances online. Facebook
To dig into the meaning associated with postings and changes seems to be a medium for social assessment and, with the depth
in Facebook profiles, we examined the content of these 25 subjects and breadth of information the profile fields offer, these adoles-
over this 4 week time period. To be included in this analysis sub- cents appeared to feel safe enough to add someone they just met
jects needed to agree to become friends with one of the researchers as a friend. The artificial process for the construction of ‘‘friend-
and sign and deliver a consent document to the researchers. In this ship’’ on Facebook, already problematized by boyd (2007), is an
section we report on our observations related to both intimacy and awkward transformation from the traditional (real life) concept
disclosure as well as for other ‘‘types’’ of information. In the Dis- of friendship. Due to the constraints of the interface at the time
cussion section that follows, we examine the implications of these of fieldwork, whatever messages were meant for those in high
observations in the context of these users and for ongoing theory intimacy networks could often be relayed to low and medium inti-
and research. macy networks as well.
364 Z. Jordán-Conde et al. / Computers in Human Behavior 33 (2014) 356–366

This Facebook community had ongoing conversations about has become a venue for identity experimentation, attracting ado-
common topics and asserted their belonging to a certain real life lescents in moratorium who may perceive that the site is a safe
community. There were 21 references to the admission process space for interactions associated with the negotiation of identity.
to their academic programs of interest: ‘‘congrats!!!! i made it The prevalence of moratorium individuals among Facebook
too!!!!’’ Some participants bragged about having been admitted users in this study could also be related to the lengthening of the
to higher ranking programs. In this respect, users employed the site moratorium period among adolescents in our society. In this re-
to announce the members’ rank in their academic program. spect, this study suggests that longer schooling and the multiple
In Facebook, one can create reminders of events such as birth- possibilities for defining adult commitments offered by online
days. By using specific applications or by merely reviewing profiles media, among other factors, could be contributing to a prolonged
the user can keep track of important celebrations. An extensive list stage of adolescence. That is, the crisis of adolescence may have
of postings congratulating participants on their birthdays is an come to include ages that had historically been considered part
indication that the profile owner has achieved Facebook popular- of the commitment associated with adulthood. As this study ad-
ity. Ten of these postings were noted during fieldwork. There were dresses questions related to Facebook use by late adolescents
numerous comments about real life events and up-to-the-minute and their intimacy disclosure online, it suggests re-consideration
news, such as flooding in some locales near informants’ homes. of the intimacy construct in the era of computer-mediated commu-
Thus, Facebook postings help orient users to places like their nication. Society’s continued exposure to mass media messages for
hometowns. the past century may have displaced people’s understanding of
In summary, there are certain characteristics associated with intimacy, allowing for looser boundaries. Furthermore, although
the culture of the Facebook site that seem to foster disclosure. First, presence was not analyzed in this study, its use could have helped
college students feel a sense of ownership of the site, which has assess mediated communication behaviors by accounting for a fac-
been designed to enhance academic networking. Perhaps because tor that could have possibly influenced such behavior. Specifically,
of this, they feel free to express themselves on Facebook (i.e., ‘‘this in his discussion of social interaction and the construction of the
is our space. . . we should not be bothered by ‘grown-ups’ here’’). self, Goffman (1959) equated real life social interaction to a theatri-
Second, adolescents are fast expanding their networks, even cal performance. The concept of ‘‘presence’’ aids in explaining the
‘‘friending’’ people they have met in real life just one time. The net- kind of performance adolescents engage in through Facebook,
work then increases the reach of the information they publish. Be- which may be likened to the types of ‘‘performances’’ seen in 3-D
cause the center of the network is the owner and all links are social networks like Second Life (see Townsend & Mennecke,
directly tied to him/her, any information published reaches all 2013).
the links unless the owner modifies the privacy settings of his/ The qualitative findings of this study provide valuable insights
her profile (at the time this study was being conducted, the privacy into the practices and emerging norms in young people’s Facebook
regulation features in Facebook were less well developed and the culture. They could serve as a frame of reference for further inves-
amount of control offered to users was limited). Moreover, consis- tigation of the evolving dynamics of Facebook interactions among
tent with Gross and Acquisti’s (2005) findings, the participants young people. Both the focus group results and the content analy-
showed they had either no knowledge of or interest in adjusting sis show that late adolescents felt confident about the safety of the
their privacy settings. As a result, the humor and innuendo, the up- information they published on Facebook. They often reported that
dates about relationships and their whereabouts, the playful inti- they rejected the notion that the information they published on the
macy (Erikson, 1968, p. 135) intended for their close peers, were site had the potential to be taken out of context and might affect
shared not only with close friends but also with ‘‘friends’’ who their future prospects. They adapted to Facebook’s limitations as
the user recently met or with whom they have very limited ties. they existed at the time of the research (i.e., the friend-not friend
dichotomy) and had taken advantage of the site’s ability to facili-
tate interpersonal connections. Put another way, they perceived
5. Discussion that the threats to their privacy were outweighed by the satisfac-
tion they obtained from the communication and relational func-
This study set out to investigate the relationship between the tionality offered by the site.
disclosure of intimate information by late adolescents through Independent of a critique of Facebook’s construction of friend-
Facebook and the developmental stage they are in per Erikson’s ship and the possibility of a shift in the understanding of intimacy,
psychosocial development theory (1959). The results show that Facebook remains an important addition to this generation’s daily
there were intimate disclosures found on participants’ profiles, lives. Why is Facebook important to adolescents today? According
which, combined with the finding of no significant difference to this study’s respondents, it is because Facebook facilitates rela-
across status categories, suggests that there is a culture of disclo- tionship maintenance. In the era of digital technology, young peo-
sure on Facebook that drives interaction independently of the psy- ple have devised a way of communicating what they want to their
chosocial status of the individual. It is also possible that the mere peers in a more manageable way. They make public announce-
construction of the concept of intimacy has changed in today’s ments and through the medium, buffer their involvement in
youth and the depth and value of the information provided online uncomfortable situations. In any case, they employ what they have
constitutes the norm for this generation. Nevertheless, the inti- been provided with to achieve their immediate goals, relational
macy disclosure late adolescents engage in, coupled with the ease and otherwise.
of access to the information they provide online, increases the like- Many fields of study have demonstrated an interest in discern-
lihood of a generational clash between the net generation’s take on ing the future of online social networks. Marketers and advertisers
what is acceptable and that of older and, perhaps, more rigid social have identified their potential for revenue, computer scientists are
values. Erikson’s proposition about the moratorium status of ado- intrigued by the challenge they pose in programming, sociologists
lescence as a time for ‘‘pseudo-intimacy’’ is confirmed in this study see an incomparable source of data, and gender and cultural stud-
given that the majority of our sample consisted of college students ies’ scholars are mesmerized at the revolutionary constructions of
at moratorium, both defined in terms of the ideological and inter- virtual space. The various perspectives that can be applied in the
personal dimensions. Facebook has historically attracted adoles- analysis of the future of virtual worlds illustrate the immense
cents perhaps because of its origins as an exclusive college scope of the effects of this technology in society (Mennecke
campus directory; however, these findings suggest that Facebook et al., 2008). The findings of our research suggests a cultivation
Z. Jordán-Conde et al. / Computers in Human Behavior 33 (2014) 356–366 365

analysis to determine if a ‘‘stable base of social conventions’’ arises files monitored may have been more predisposed to disclose inti-
in these as well as other emerging social network applications. mate information. Nevertheless, the content of the discussions
Granovetter (1973) argues that social networks are formed by were often open and disclosive, suggesting that the ‘‘presence’’ of
ties that can be strong or weak. He relates the strength of a tie to a researcher was not influencing behaviors. Additionally, the tim-
a variety of factors, including ‘‘amount of time, the emotional ing of data collection is an important factor when considering
intensity, the intimacy (mutual confiding), and the reciprocal ser- these observations and results. Facebook is a work in progress
vices which characterize the tie’’ (p. 1361). The strength of weak and evolved within the timeframe during which this study data
ties, in this case, is derived from the social network’s capacity to were collected (i.e., 2008) in ways that could have affected data
act as a bridge that is ‘‘indispensable to individuals’ opportunities collection (e.g., the privacy settings have been improved and made
and to their integration into communities’’ (p. 1378). The way in more accessible subsequent to our interviews and observations).
which the participants interact and express themselves through Also, the time of the year (summer break) chosen for fieldwork
Facebook seems to corroborate this tenet. This is seen in the num- and data collection for the content analysis may have affected
ber of intimate expressions participants make through their pro- interaction because participants were away from their college
files and, also, in their willingness to cope with the limitations of peers and involved in activities that were different from what they
a system that does not reflect the way they deal with real life social do the rest of the year. Nevertheless, it is unlikely that the under-
networks. lying phenomenon influencing behaviors associated with disclo-
Facebook users take an active role in adapting to the strengths sure and intimacy would have been significantly affected by
and limitations of a social network. This implies that future social either changes in interface design or timing during the year. In fact,
networks could better serve their clients by carefully assessing it is likely that for close friends Facebook would have been used
their needs. Ethnographic studies of stakeholders should be com- more extensively during the summer when proximity precluded
mon practice in the design of technologies that are likely to affect other forms of communication. Finally, it is also possible that the
the way people interact. Cyberanthropologist Hakken (1993) has social construction of some of the concepts examined in our study
pointed to the need to make design a participatory process (p. (e.g., intimacy) is changing as technology and norms evolve. For
117). Social network designers should be listening to the advice example, do youth who are bombarded by media and express
of users as they become more informed about the ways in which themselves routinely through media have a different set of expec-
technology can serve their social and relational needs as they ex- tations about the impacts of disclosive behaviors? This question is
plore their identities online. Thus, an important role for social net- beyond the scope of this study but suggests an important line of re-
work designers is to consider the user in context and apply the search to examine attitudes towards intimacy, disclosiveness, and
insights from a more holistic approach to understanding users in real-world impacts of these behaviors.
the context of use. The limitations inherent to the observation and unobtrusive
While this study has focused on late adolescent Facebook users data gathering in online communities are parallel to those of eth-
in the context of use in a collegiate setting, these results have nographic work in real life settings. These have been extensively
important organizational and societal implications. For example, discussed in the literature on anthropology by prominent figures
the net generation as represented by the sample we examined in of this field such as Clifford Geertz and Margaret Mead. The meth-
this study is from the next generation of organizational profession- odological limitations are linked to the specific pursuit of the dis-
als. As a result, their appropriation of technology and their atti- cipline itself, and the argument has been made that human
tudes towards intimacy and disclosure will influence how they behavior is contextual and responds to an infinite number of fac-
develop and use similar technologies in organizations. As social tors that cannot ever be simulated or controlled. The specifics of
technologies continue to proliferate in organizational settings online ethnographic work were originally documented by Escobar
and are used for a variety of important organizational tasks, under- (1994) and, later, by Budka and Kremser (2004) in their work on
standing how this population of users views privacy, intimacy, and the anthropology of cyberculture. Such limitations have also been
disclosure will be important in helping developers of organiza- discussed and dealt with on most cyberanthropological work such
tional social networks in building and securing these systems as as Nakamura’s (2002) study on race and gender online and Turkle’s
well as training users. Furthermore, this study and our model are (1999) research on children and computers. In an attempt to deal
both useful in helping our understanding of how users perceive with these limitations, this study has employed a mixed-method
their intended as well as unintended audiences and how organiza- approach to provide a richer picture of attitudes and behaviors
tional communiqués may be inappropriately generated and dis- undertaken by users of Facebook.
persed. Recent public scandals where messages or images were
disseminated beyond the intended recipients illustrate the risks
run by organizations as they deploy social technologies. By apply- 6. Conclusions
ing both our methodological approach as well as the results from
our examination of late adolescent users to other contexts we hope We undertook this research to examine the relationship be-
this study would prove useful in the adoption and deployment of tween the developmental stage of Facebook users and their disclo-
social network technologies. sure of intimate information through Facebook. Using Erikson’s
The small sample sizes in each of the three methods applied in psychosocial development theory (1959) and Marcia’s (1966) four
this study limit the generalizability of the results. Only 25 respon- statuses of identity characteristics, we examined the online behav-
dents were willing to permit monitoring online. Each of the meth- ior of a sample of adolescent Facebook users. The results demon-
ods employed a convenience sample that may not be strate that users frequently use the environment to communicate
representative of the population of students in the design college, routine as well as intimate information to peers. The number of
let alone other groups. Also, Facebook users in this study may al- intimate disclosures observed along with the finding of no signifi-
ready be conditioned to accept the disruption of privacy as an inev- cant difference across status categories, indicates that Facebook is
itable product of their participation on a SNS. used as a forum for disclosure that is independent of the psychoso-
Because the students were aware that they are being observed cial status of the individual. Results from our discussions with
by researchers, posting behaviors may have been influenced by the youth in this age range during focus groups suggest that
fact that they were being watched (i.e., the Hawthorne effect) or perceptions of privacy and the broader ramifications of disclosure
those participants who accepted that invitation to have their pro- are not considered significant by these users. This has important
366 Z. Jordán-Conde et al. / Computers in Human Behavior 33 (2014) 356–366

implications for parents, counselors, and educators in that adoles- Lenhart, A., Madden, M., & Hitlin, P. (2005). Teens and technology: Pew Internet &
American Life Project. <http://www.pewinternet.org/Reports/2005/Teens-and-
cents in this age range who, presumably, are treated as adults, fail
Technology.aspx>.
to have a mature understanding of the potential harm that disclo- Lessig, L. (2000). Code and other laws of cyberspace. New York: Basic Books.
sure could have on their wellbeing. Lombard, M., & Ditton, T. (1997). At the heart of it all: The concept of presence.
Journal of Computer Mediated Communication, 3(2). <http://jcmc.indiana.edu/
vol3/issue4/> Retrieved 21.09.12.
References Marcia, J. E. (1966). Development and validation of ego-identity status. Journal of
Personality and Social Psychology, 3(5), 551–558.
Adams, G. R. (1998). The objective measure of ego identity status: A reference manual. McGrath, Joseph E. (1982). In J. E. McGrath, J. Martin, & R. A. Kulka (Eds.), Judgment
<http://www.uoguelph.ca/~gadams/OMEIS_manual.pdf>. Retrieved 13.04.13. calls in research. Beverly Hills, CA: Sage Publications.
Bennion, L., & Adams, G. R. (1986). A revision of the extended version of the Mead, M. (1973). Coming of age in Samoa: A psychological study of primitive youth for
objective measure of ego identity status: An identity instrument for use with western civilization. New York: American Museum of Natural History.
late adolescents. Journal of Adolescent Research, 1, 183–198. Mennecke, B. E., McNeill, D., Ganis, M., Roche, E., Konsynski, B., Bray, D., et al. (2008).
Bergh, S., & Erling, A. (2005). Adolescent identity formation: A Swedish study of Second life and other virtual worlds: A roadmap for research. Communications of
identity status using the EOM-EIS-II. Adolescence, 40(158), 377–396. the AIS, 22(20), 371–388.
Biocca, F., Harms, C., & Burgoon, J. K. (2003). Toward a more robust theory and Moon, Y. (2000). Intimate exchanges: Using computers to elicit self-disclosure from
measure of social presence: Review and suggested criteria. Presence: consumers. Journal of Consumer Research, 26, 323–339.
Teleoperators and Virtual Environments, 12(5), 456–480. MSNBC (2006). Girl, 14, sues MySpace over alleged sex assault. <http://
boyd, D. (2006). Friends, friendsters, and top 8: Writing community into being on www.msnbc.msn.com/id/13437619/> Retrieved 20.06.12.
social network sites. First Monday, 11(12). <ttp://firstmonday.org/issues/ Nakamura, Lisa (2002). Cybertypes: Race, ethnicity, and identity on the internet. New
issue11_12/boyd/index.html>. York: Routledge.
boyd, D. (2007). Social network sites: Public, private, or what? Knowledge Tree (Vol. O’Sullivan, P. B. (2000). What you don’t know won’t hurt me: Impression
13). <http://kt.flexiblelearning.net.au/tkt2007/?page_id=28>. Retrieved management functions of communication channels in relationships. Human
12.02.13. Communication Research, 26(3), 403–431.
boyd, D., & Ellison, N. B. (2007). Social network sites: Definition, history, and Parrott, W. (2001). Emotions in social psychology. Philadelphia: Psychology Press.
scholarship. Journal of Computer-Mediated Communication, 13(1) (Article 11) Rawlins, W. K. (1992). Friendship matters: Communication, dialectics, and the life
<http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html> Retrieved 20.12.12. course. New York: Aldine De Gruyter.
Budka, P., & Kremser, M. (2004). CyberAnthropology: Anthropology of cyberculture. Raynes-Goldie, K. (2010). Aliases, creeping, and wall cleaning: Understanding
In S. Khittel, B. Plankensteiner, & M. Six-Hohenbalken (Eds.), Contemporary privacy in the age of Facebook. First Monday, 15(1). <http://firstmonday.org/
issues in socio-cultural anthropology: Perspectives and research activities from htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2775/2432> Retrieved
Austria (pp. 213–226). Vienna: Loecker. 07.01.12.
Cooley, C. H. (1964). Human nature and the social order. New York: Schocken Books, Rubin, Z. (1975). Disclosing oneself to a stranger: Reciprocity and its limits. Journal
Inc.. of Experimental Social Psychology, 11, 233–260.
De Souzaa, Z., & Dick, G. N. (2009). Disclosure of information by children in social Sproull, L., & Kiesler, S. (1991). Connections: New ways of working in the networked
networking—Not just a case of ‘‘you show me yours and I’ll show you mine’’. organization. Cambridge, MA: MIT Press.
International Journal of Information Management, 29(4), 255–261. Tapscott, D. (1998). Growing up digital: The rise of the net generation. New York:
Ellison, N., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook ‘‘friends’’: McGraw-Hill.
Social capital and college students’ use of online social network sites. Journal of Tidwell, L. C., & Walther, J. B. (2002). Computer-mediated communication effects on
Computer-Mediated Communication, 12(4) (Article 1). disclosure, impressions, and interpersonal evaluations: Getting to know one
Erikson, E. H. (1959). Identity and the life cycle. New York: International Universities another a bit at a time. Human Communication Research, 28(3), 317–348.
Press. Townsend, A., & Mennecke, B. E. (2013). The theatre of virtual worlds, in postcards
Erikson, E. H. (1968). Identity, youth and crisis. New York: W.W. Norton & Company, from the MetaverseTeigland, R., & Power, D. (Eds.). , The immersive internet:
Inc.. Reflections on the entangling of the virtual with society, politics and the economy.
Escobar, A. (1994). Welcome to cyberia: Notes on the anthropology of cyberculture. Palgrave: Macmillan.
Current Anthropology, 35(3), 211–321. Turkle, S. (1984). The second self: Computers and the human spirit. New York: Simon
Gibbs, J. L., Ellison, N. B., & Heino, R. D. (2006). Self-presentation in online personals: and Schuster.
The role of anticipated future interaction, self-disclosure, and perceived success Turkle, S. (1995). Life on the screen: Identity in the age of the Internet. New York:
in internet dating. Communication Research, 33(2), 152–177. Simon and Schuster.
Goffman, E. (1959). The presentation of self in everyday life. Garden City, NJ: Turkle, S. (1999). Cyberspace and identity. Contemporary Sociology, 28(6), 643–648.
Doubleday. Vadeboncoeur, J. A. (2005). Naturalized, restricted, packaged, and sold: Reifying the
Granovetter, M. S. (1973). The strength of weak ties. The American Journal of fictions of ‘‘adolescent’’ and ‘‘adolescence’’. In J. A. Vadeboncoeur & L. P. Stevens
Sociology, 78, 1360–1380. (Eds.). Re/Constructing ‘‘the adolescent:’’ Sign, symbol, and body (Vol. 33). New
Gross, R., & Acquisti, A. (2005). Information revelation and privacy in online social York: Peter Lang.
networks. Paper presented at the WPES ‘05. Alexandria, VA. Walther, J. B. (2007). Selective self-presentation in computer-mediated
Hakken, D. (1993). Computing and social change: New technology and workplace communication: Hyperpersonal dimensions of technology, language, and
transformation, 1980–1990. Annual Review of Anthropology, 22, 107–132. cognition. Computers in Human Behavior, 23, 2538–2557.
Jourard, S., & Jaffe, P. (1970). Influence of an interviewer’s disclosure on the self- Wheeless, L. R. (1978). A follow-up study of the relationships among trust,
disclosing behavior of interviewees. Journal of Counseling Psychology, 17(3), disclosure, and interpersonal solidarity. Human Communication Research, 4(2),
252–257. 143.
Lee, K. M. (2000). MUD and self efficacy. Educational Media International, 37, Zhao, S. (2003). Toward a taxonomy of copresence. Presence: Teleoperators and
171–183. Virtual Environments, 12(5), 445–455.
Lenhart, A., & Madden, M. (2007). Teens, privacy & online social networks: Pew
Internet & American Life Project. <http://pewresearch.org/pubs/454/teens-
privacy–online-social-networks>.

Potrebbero piacerti anche