At present, 87% of adolescents (aged 12-15 years) report using social networking sites (SNS). Research predominantly highlights the risks of SNS use (e.g., cyberbullying), yet SNS also presents potential benefits (e.g., enhancing social relationships). This study aims to explore adolescent perceptions of the benefits of SNS use and whether risk concern may predict these. Adolescents (N= 342; 53.3% female; M= 13.92, SD=1.35) completed two measures: sorting items about positive SNS use and an adapted SNS risk concern scale. Findings suggest females' SNS risk concern positively predicted perceptions of disclosing to family online, whilst older females viewed this less favourably. Also, both males and females who viewed social capital positively viewed social comparison positively, and vice versa.<\/p>","DOI":"10.4018\/ijcbpl.306646","type":"journal-article","created":{"date-parts":[[2022,8,5]],"date-time":"2022-08-05T12:05:21Z","timestamp":1659701121000},"page":"1-22","source":"Crossref","is-referenced-by-count":0,"title":["Adolescent Perceptions of the Risks and Benefits of Social Networking Site Use"],"prefix":"10.4018","volume":"12","author":[{"given":"Beatrice","family":"Hayes","sequence":"first","affiliation":[{"name":"Royal Holloway, University of London, UK"}]},{"given":"Alana","family":"James","sequence":"additional","affiliation":[{"name":"University of Reading, UK"}]},{"given":"Ravinder","family":"Barn","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, UK"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3727-4198","authenticated-orcid":true,"given":"Dawn","family":"Watling","sequence":"additional","affiliation":[{"name":"Royal Holloway, University of London, UK"}]}],"member":"2432","reference":[{"key":"IJCBPL.306646-0","doi-asserted-by":"publisher","DOI":"10.1111\/cdep.12111"},{"key":"IJCBPL.306646-1","doi-asserted-by":"publisher","DOI":"10.1525\/si.2000.23.1.1"},{"key":"IJCBPL.306646-2","unstructured":"Anderson, M., & Jiang, J. (2018). Teens, social media & technology 2018. Pew Research Center. Retrieved 19\/08\/19: http:\/\/publicservicesalliance.org\/wp-content\/uploads\/2018\/06\/Teens-Social-Media-Technology-2018-PEW.pdf"},{"key":"IJCBPL.306646-3","unstructured":"Anderson, M., & Jiang, J. (2018). Teens, social media & technology 2018. Pew Research Center. Retrieved 19\/08\/19Available at: http:\/\/publicservicesalliance.org\/wp-content\/uploads\/2018\/06\/Teens-Social-Media-Technology-2018-PEW.pdf"},{"key":"IJCBPL.306646-4","doi-asserted-by":"publisher","DOI":"10.1007\/s10826-017-0817-2"},{"key":"IJCBPL.306646-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.addbeh.2019.05.009"},{"key":"IJCBPL.306646-6","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00247"},{"key":"IJCBPL.306646-7","doi-asserted-by":"publisher","DOI":"10.4018\/ijsodit.2013100103"},{"key":"IJCBPL.306646-8","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12106"},{"key":"IJCBPL.306646-9","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2020.05.004"},{"key":"IJCBPL.306646-10","doi-asserted-by":"publisher","DOI":"10.1006\/jado.1993.1014"},{"key":"IJCBPL.306646-11","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520704"},{"key":"IJCBPL.306646-12","unstructured":"Blum-Ross, A., & Livingstone, S. (2018). The Trouble with \u201cScreen Time\u201d Rules. Digital Parenting: The Challenges for Families in the Digital Age, 179-187."},{"key":"IJCBPL.306646-13","doi-asserted-by":"publisher","DOI":"10.1080\/15213260801906471"},{"key":"IJCBPL.306646-14","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"IJCBPL.306646-15","doi-asserted-by":"crossref","unstructured":"Brown, B. B. (2004). Handbook of adolescent psychology: Vol. 363-394. Adolescents\u2019 relationships with peers. Academic Press.","DOI":"10.1002\/9780471726746.ch12"},{"key":"IJCBPL.306646-16","doi-asserted-by":"publisher","DOI":"10.1002\/9780470479193.adlpsy002004"},{"key":"IJCBPL.306646-17","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20459"},{"key":"IJCBPL.306646-18","author":"W. M.Bukowski","year":"1998","journal-title":"The company they keep: Friendships in childhood and adolescence"},{"key":"IJCBPL.306646-19","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979023"},{"key":"IJCBPL.306646-20","doi-asserted-by":"publisher","DOI":"10.1016\/j.bodyim.2017.09.001"},{"key":"IJCBPL.306646-21","doi-asserted-by":"crossref","unstructured":"Caspi, A. (2000). The child is father of the man: personality continuities from childhood to adulthood. Journal of Personality and Social Psychology, 78(1), 158-172. doi: 10.1037110022-3514.78A~158","DOI":"10.1037\/0022-3514.78.1.158"},{"key":"IJCBPL.306646-22","doi-asserted-by":"publisher","DOI":"10.1037\/ppm0000130"},{"key":"IJCBPL.306646-23","doi-asserted-by":"publisher","DOI":"10.1186\/1741-7015-8-61"},{"key":"IJCBPL.306646-24","doi-asserted-by":"publisher","DOI":"10.1177\/1948550611408619"},{"key":"IJCBPL.306646-25","doi-asserted-by":"crossref","unstructured":"Collins, W. A., & Steinberg, L. (2007). Adolescent development in interpersonal context (Vol. 3). Handbook of child psychology. Academic Press.","DOI":"10.1002\/9780470147658.chpsy0316"},{"key":"IJCBPL.306646-26","doi-asserted-by":"publisher","DOI":"10.1207\/s15327795jra0403_3"},{"key":"IJCBPL.306646-27","doi-asserted-by":"publisher","DOI":"10.1002\/9780470479193.adlpsy001010"},{"key":"IJCBPL.306646-28","doi-asserted-by":"publisher","DOI":"10.1177\/1367493516642744"},{"key":"IJCBPL.306646-29","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9507.2005.00317.x"},{"key":"IJCBPL.306646-30","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01885.x"},{"key":"IJCBPL.306646-31","doi-asserted-by":"publisher","DOI":"10.1111\/jpc.13462"},{"key":"IJCBPL.306646-32","doi-asserted-by":"publisher","DOI":"10.1023\/B:BTTJ.0000047585.06264.cc"},{"key":"IJCBPL.306646-33","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.026"},{"key":"IJCBPL.306646-34","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2006.00020.x"},{"key":"IJCBPL.306646-35","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"IJCBPL.306646-36","doi-asserted-by":"publisher","DOI":"10.1037\/a0029847"},{"key":"IJCBPL.306646-37","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0492"},{"key":"IJCBPL.306646-38","doi-asserted-by":"publisher","DOI":"10.1177\/0956797611429709"},{"key":"IJCBPL.306646-39","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.29.4.622"},{"key":"IJCBPL.306646-40","doi-asserted-by":"publisher","DOI":"10.1002\/9780471726746.ch8"},{"key":"IJCBPL.306646-41","author":"E.Goffman","year":"1978","journal-title":"The presentation of self in everyday life"},{"key":"IJCBPL.306646-42","doi-asserted-by":"publisher","DOI":"10.1509\/jppm.25.2.147"},{"key":"IJCBPL.306646-43","doi-asserted-by":"publisher","DOI":"10.5817\/CP2013-1-4"},{"key":"IJCBPL.306646-44","author":"E.Gouws","year":"2000","journal-title":"The adolescent"},{"key":"IJCBPL.306646-45","doi-asserted-by":"publisher","DOI":"10.3109\/10826084.2014.984847"},{"key":"IJCBPL.306646-46","doi-asserted-by":"crossref","unstructured":"Hayes, B., James, A., Barn, R., & Watling, D. (2022). Children's risk and benefit behaviours on social networking sites. Computers in Human Behavior, 130, 107147","DOI":"10.1016\/j.chb.2021.107147"},{"key":"IJCBPL.306646-47","doi-asserted-by":"publisher","DOI":"10.1080\/13676260600881474"},{"key":"IJCBPL.306646-48","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2017.04.052"},{"key":"IJCBPL.306646-49","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.015"},{"key":"IJCBPL.306646-50","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106260"},{"key":"IJCBPL.306646-51","first-page":"123","article-title":"Young people, alcohol and a social science of risk: Bauman and the problem of ambivalence","author":"P.Kelly","year":"2014","journal-title":"Health Education"},{"key":"IJCBPL.306646-52","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.09.046"},{"key":"IJCBPL.306646-53","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.016"},{"key":"IJCBPL.306646-54","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2012.09.018"},{"key":"IJCBPL.306646-55","doi-asserted-by":"publisher","DOI":"10.2307\/1131814"},{"key":"IJCBPL.306646-56","doi-asserted-by":"publisher","DOI":"10.1177\/1403494814525004"},{"key":"IJCBPL.306646-57","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.004"},{"key":"IJCBPL.306646-58","article-title":"Children\u2019s privacy online: experimenting with boundaries within and beyond the family","author":"S.Livingstone","year":"2006","journal-title":"Computers, Phones and the Internet: Domesticating Information Technology. Human Technology Interaction Series"},{"key":"IJCBPL.306646-59","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808089415"},{"key":"IJCBPL.306646-60","author":"S.Livingstone","year":"2012","journal-title":"Children, risk and safety on the Internet: Research and policy challenges in comparative perspective"},{"key":"IJCBPL.306646-61","author":"S.Livingstone","year":"2011","journal-title":"Risks and safety on the internet: the perspective of European children: full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries. EU Kids Online, Deliverable D4"},{"key":"IJCBPL.306646-62","author":"S.Livingstone","year":"2017","journal-title":"Young adolescents and digital media: uses, risks and opportunities in low- and middle-income countries: a rapid evidence review"},{"key":"IJCBPL.306646-63","author":"M.Madden","year":"2013","journal-title":"Teens, social media, and privacy"},{"key":"IJCBPL.306646-64","doi-asserted-by":"publisher","DOI":"10.1002\/per.2220"},{"key":"IJCBPL.306646-65","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106488"},{"key":"IJCBPL.306646-66","doi-asserted-by":"publisher","DOI":"10.1007\/BF02089234"},{"key":"IJCBPL.306646-67","doi-asserted-by":"publisher","DOI":"10.1016\/j.addbeh.2016.07.001"},{"key":"IJCBPL.306646-68","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-005-9014-5"},{"key":"IJCBPL.306646-69","doi-asserted-by":"publisher","DOI":"10.1080\/13676261.2014.901493"},{"key":"IJCBPL.306646-70","author":"G.Mascheroni","year":"2013","journal-title":"Mobile internet access and use among European children. Initial findings of the Net Children Go Mobile project"},{"key":"IJCBPL.306646-71"},{"key":"IJCBPL.306646-72","doi-asserted-by":"publisher","DOI":"10.1111\/j.1532-7795.2010.00718.x"},{"key":"IJCBPL.306646-73","doi-asserted-by":"publisher","DOI":"10.1080\/13691180701657899"},{"key":"IJCBPL.306646-74","doi-asserted-by":"publisher","DOI":"10.1016\/S1054-139X(02)00412-3"},{"key":"IJCBPL.306646-75","doi-asserted-by":"publisher","DOI":"10.1007\/s41347-020-00134-x"},{"key":"IJCBPL.306646-76","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2011-0054"},{"key":"IJCBPL.306646-77","doi-asserted-by":"publisher","DOI":"10.1177\/1359104518775154"},{"key":"IJCBPL.306646-78","unstructured":"Ofcom. (2019). Children and Parents: Media Use and Attitudes Report. Available at: https:\/\/www.ofcom.org.uk\/__data\/assets\/pdf_file\/0020\/108182\/children-parents-media-use-attitudes-2017.pdf"},{"key":"IJCBPL.306646-79","unstructured":"Ofcom (2021). Children and Parents: Media Use and Attitudes Report. Available at: https:\/\/www.ofcom.org.uk\/__data\/assets\/pdf_file\/0025\/217825\/children-and-parents-media-use-and-attitudes-report-2020-21.pdf"},{"key":"IJCBPL.306646-80","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2019.02.011"},{"key":"IJCBPL.306646-81","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.07.009"},{"key":"IJCBPL.306646-82","doi-asserted-by":"publisher","DOI":"10.1037\/a0026980"},{"key":"IJCBPL.306646-83","author":"F. P.Rice","year":"2005","journal-title":"The adolescent: Development, relationships and culture"},{"key":"IJCBPL.306646-84","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1975.9915803"},{"key":"IJCBPL.306646-85","first-page":"113","article-title":"Protection motivation theory","author":"R. W.Rogers","year":"1997","journal-title":"Handbook of health behavior research 1: Personal and social determinants"},{"key":"IJCBPL.306646-86","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.132.1.98"},{"key":"IJCBPL.306646-87","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2011.01560.x"},{"key":"IJCBPL.306646-88","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2013.763834"},{"key":"IJCBPL.306646-89","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.607225"},{"key":"IJCBPL.306646-90","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.12.025"},{"key":"IJCBPL.306646-91","doi-asserted-by":"publisher","DOI":"10.1016\/S2352-4642(18)30022-1"},{"key":"IJCBPL.306646-92","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.92.3.641"},{"key":"IJCBPL.306646-93","doi-asserted-by":"publisher","DOI":"10.1006\/jmva.1995.1069"},{"key":"IJCBPL.306646-94","doi-asserted-by":"publisher","DOI":"10.1016\/j.sapharm.2020.07.027"},{"key":"IJCBPL.306646-95","doi-asserted-by":"publisher","DOI":"10.1007\/s11469-016-9684-0"},{"key":"IJCBPL.306646-96","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2008.07.008"},{"key":"IJCBPL.306646-97","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2010.09.011"},{"key":"IJCBPL.306646-98","doi-asserted-by":"publisher","DOI":"10.1002\/hbe2.144"},{"key":"IJCBPL.306646-99","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2601(06)38004-5"},{"key":"IJCBPL.306646-100","article-title":"The cultural psychology of development: One mind, many mentalities","volume":"Vol. 865\u2013937","author":"R.Shweder","year":"1998"},{"key":"IJCBPL.306646-101","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2010.04.004"},{"key":"IJCBPL.306646-102","doi-asserted-by":"crossref","unstructured":"Stald, G., & \u00d3lafsson, K. (2012). Mobile access: Different users, different risks, different consequences. Children, risk and safety online: Research and policy challenges in comparative perspective, 285-295.","DOI":"10.46692\/9781847428844.022"},{"key":"IJCBPL.306646-103","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8721.2007.00475.x"},{"key":"IJCBPL.306646-104","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.52.1.83"},{"key":"IJCBPL.306646-105","doi-asserted-by":"publisher","DOI":"10.2307\/1130361"},{"key":"IJCBPL.306646-106","doi-asserted-by":"publisher","DOI":"10.1207\/s1532785xmep0601_1"},{"key":"IJCBPL.306646-107","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2012.12.015"},{"key":"IJCBPL.306646-108","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph16234696"},{"key":"IJCBPL.306646-109","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0140"},{"key":"IJCBPL.306646-110","doi-asserted-by":"publisher","DOI":"10.1353\/jip.2015.0021"},{"key":"IJCBPL.306646-111","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01474.x"},{"key":"IJCBPL.306646-112","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iwt058"},{"key":"IJCBPL.306646-113","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818755634"},{"key":"IJCBPL.306646-114","first-page":"41","article-title":"Theories of risk perception: Who fears what and why?","author":"A.Wildavsky","year":"1990","journal-title":"Daedalus"},{"key":"IJCBPL.306646-115","unstructured":"Wurtele, S. K. (2017). Preventing cyber sexual solicitation of adolescents. Research and practices in child maltreatment prevention, 1, 363-393."},{"key":"IJCBPL.306646-116","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2017.08.006"},{"key":"IJCBPL.306646-117","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2007.03.004"},{"key":"IJCBPL.306646-118","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2007.0240"},{"key":"IJCBPL.306646-119","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2006.00038.x"}],"container-title":["International Journal of Cyber Behavior, Psychology and Learning"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=306646","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T23:45:39Z","timestamp":1673912739000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCBPL.306646"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2022,8,5]]},"references-count":120,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcbpl.306646","relation":{},"ISSN":["2155-7136","2155-7144"],"issn-type":[{"value":"2155-7136","type":"print"},{"value":"2155-7144","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,5]]}}}