skip to main content
article

Chatting with teenagers: Considering the place of chat technologies in teen life

Published:01 December 2006Publication History
Skip Abstract Section

Abstract

In the last few years, teenagers have been on the forefront of adopting short message service (SMS), a mobile phone-based text messaging system, and instant messaging (IM), a computer-based text chat system. However, while teenage adoption of SMS had led to a series of studies examining the reasons for its popularity, IM use in the teenage population remains understudied. This omission becomes significant given the increasing interest in domestic computing among human-computer interaction (HCI) and computer-supported cooperative work (CSCW) researchers. Further, because of the dearth of empirical work on teenage use of IM, we find that IM and SMS are sometimes incorrectly assumed to share the same features of use. To address these concerns, we revisit our own studies of SMS and IM use and reexamine them in tandem with other published studies on teenage chat. We consider similarities and differences in styles of SMS and IM use and how chat technologies enable the pursuit of teenage independence. We examine how differences are born out of technological differences and financial cost structures. We discuss how SMS and IM are used in concert to provide increased awareness and to coordinate inter-household communications, and how privacy is regulated within the individual household as a means of maintaining these communications.

References

  1. Ackerman, M. S. and Palen, L. A. 1996. The Zephyr help instance: Promoting ongoing activity in a CSCW system. In Proceedings of the ACM Computer-Human Interaction Conference on Human Factors in Computer Systems. Vancouver, BC (Apr. 13--18). 268--275. Google ScholarGoogle Scholar
  2. Anderson, B., McWilliam, A., Lachohee, H., Clucas, E., and Gershuny, J. 1999. Family life in the digital home---Domestic telecommunications at the end of the 20th century. BT Technol. J. 17, 1, 85--97. Google ScholarGoogle Scholar
  3. Baron, N. S., Squires, L., Tench, S., and Thompson, M. 2003. Tethered or mobile? Use of away messages in instant messaging by American college students. In Proceedings of the Front Stage---Back Stage: Mobile Communication and the Renegotiation of the Social Sphere Conference. Grimstad, Norway (Jun. 22--24).Google ScholarGoogle Scholar
  4. Bell, G., Blythe, M., and Sengers, P. 2005. Making by making strange: Defamiliarization and the design of domestic technologies. ACM Trans. Comput.-Human Interact. 12, 2, 149--173. Google ScholarGoogle Scholar
  5. Berg, S., Taylor, A., and Harper, R. 2003. Mobile phones for the next generation: Device designs for teenagers. In Proceedings of the ACM Conference on Human Factors in Computing (CHI). Ft. Lauderdale, FL (Apr. 5--10). 433--440. Google ScholarGoogle Scholar
  6. Bradner, E., Kellogg, W. A., and Erickson, T. 1999. The adoption and use of BABBLE: A field study of chat in the workplace. In Proceedings of the 6th European Conference on Computer-Supported Cooperative Work (ECSCW).Copenhagen, Denmark (Sept. 12--16). 139--158, Google ScholarGoogle Scholar
  7. Cranor, L. F. and Garfinkel, S., Eds. 2005. Security and Usability. O'Reilly Press, Sebastopol, CA. Google ScholarGoogle Scholar
  8. Dourish, P., Grinter, R. E., Delgado, de la Flor, J., and Joseph, M. 2004. Security in the wild: User strategies for managing security as an everyday, practical problem. J. Personal Ubiquitous Computing 8, 6, 391--401. Google ScholarGoogle Scholar
  9. Edwards, W. K. and Grinter, R. E. 2001. At home with ubiquitous computing: Seven challenges. In Proceedings of the UbiComp Conferendce. Atlanta, GA (Sept. 30--Oct. 2). Lecture Notes in Computer Science 2201. Springer Verlag, New York. 256--272. Google ScholarGoogle Scholar
  10. Fischer, C. S. 1992. America Calling: A Social History of the Telephone to 1940. University of California Press, Berkeley, CA. Google ScholarGoogle Scholar
  11. Giddens, A., Duneier, M., and Appelbaum, R. P. 2003. Introduction to Sociology. W. W. Norton, New York.Google ScholarGoogle Scholar
  12. Grinter, R. E., Edwards, W. K., Newman, M., and Ducheneaut, N. 2005. The work to make the home network work. In Proceedings of the 9th European Conference on Computer-Supported Cooperative Work. Paris (Sept. 18--22). 469--488. Google ScholarGoogle Scholar
  13. Grinter, R. E. and Eldridge, M. 2001. y do tngrs luv 2 txt msg? In Proceedings of the 7th European Conference on Computer-Supported Cooperative Work (ECSCW). Bonn, Germany (Sept. 16--20). 219--238. Google ScholarGoogle Scholar
  14. Grinter, R. E. and Eldridge, M. 2003. wan2tlk: Everyday text messaging. In Proceedings of the ACM Conference on Human Factors in Computing (CHI). Ft. Lauderdale, FL (Apr. 5--10). 441--448. Google ScholarGoogle Scholar
  15. Grinter, R. E. and Palen, L. 2002. Instant messaging in teenage life. In Proceedings of ACM Conference on Computer-Supported Cooperative Work (CSCW). New Orleans, LA (Nov. 16--20). 21--30. Google ScholarGoogle Scholar
  16. Herbsleb, J. D., Atkins, D. L., Boyer, D. G., Handel, M., and Finholt, T. A. 2002. Introducing instant messaging and chat in the workplace. In Proceedings of the Conference on Human Factors in Computing Systems (CHI). Minneapolis, MN (Apr. 20--25). 171--178. Google ScholarGoogle Scholar
  17. Isaacs, E., Waldendowski, A., Whittaker, S., Schiano, D. J., and Kamm, C. 2002. The character, functions, and styles of instant messaging in the workplace. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW). New Orleans, LA (Nov. 16--20). Google ScholarGoogle Scholar
  18. Ito, M. 2001. Mobile phones, Japanese youth, and the replacement of social contact. In Proceedings of the Annual Meeting for the Society for the Social Studies of Science. Cambridge, MA (Nov. 1--4).Google ScholarGoogle Scholar
  19. Ito, M,, Okabe, D., and Matsuda, M., Eds. 2005. Personal, Portable, Pedestrian. The MIT Press, Cambridge, MA. Google ScholarGoogle Scholar
  20. Jackson, L. A., von Eye, A., Barbatsis, G., Biocca, F., Fitzgerald, H. E., and Zhao, Y. 2004. The impact of internet use on the other side of the digital divide. Commun. ACM 47, 7, 43--47. Google ScholarGoogle Scholar
  21. Kasesniemi, E.-L. and Rautiainen, P. 2002. Mobile culture of children and teenagers in Finland. In Perpetual Contact: Mobile Communication, Private Talk, Public Performance, J. E. Katz and M. Aakhus, Eds. Cambridge University Press, Cambridge, UK, 170--192. Google ScholarGoogle Scholar
  22. Kraut, R., Mukhopadhyay, T., Szczypula, J., Kiesler, S., and Scherlis, W. 1999. Information and communication: Alternative uses of the internet in households. Inf. Syst. Res. 10, 4, 287--303. Google ScholarGoogle Scholar
  23. Lenhart, A., Rainie, L., and Lewis, O. 2001. Teenage Life Online: The Rise of the Instant Message Generation and the Internet's Impact on Friendships and Family Relationships. Pew Internet and American Life Project. http://www.pewinternet.org/.Google ScholarGoogle Scholar
  24. Ling, R. 2000. Norwegian teens, mobile telephony and text messages. Tech. newsletter from Telenor Research and Development. 2-2000.Google ScholarGoogle Scholar
  25. Ling, R. 2004. The Mobile Connection: The Cell Phone's Impact on Society. Elsevier, San Fransisco, CA. Google ScholarGoogle Scholar
  26. Ling, R. and Yttri, B. 2002. Hyper-Coordination via mobile phones in Norway. In Perpetual Contact: Mobile Communication, Private Talk, Public Performance, J. E. Katz and M. Aakhus, Eds. Cambridge University Press, Cambridge, UK, 139--169. Google ScholarGoogle Scholar
  27. Livingstone, S. 2002. Young People and New Media: Childhood and the Changing Media Environment. Sage Press, London.Google ScholarGoogle Scholar
  28. Lynd, R. S. and Lynd, H. M. 1929. Middletown: A Study in Modern American Culture. Harcourt Brace Jovanovich, Orlando, FL.Google ScholarGoogle Scholar
  29. Nardi, B. A., Whittaker, S., and Bradner, E. 2000. Interaction and outeraction: Instant messaging in action. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW). Philadelphia, PA (Dec. 2--6). 79--88. Google ScholarGoogle Scholar
  30. Palen, L. and Dourish, P. 2003. Unpacking “privacy” for a networked world. In Proceedings of the ACM Conference on Human Factors in Computing (CHI). Ft. Lauderdale, FL (Apr. 5--10). 129--136. Google ScholarGoogle Scholar
  31. Rautiainen, P. and Kasesniemi, E.-L. 2000. Mobile communication of children and teenagers: Case Finland 1997--2000. In Proceedings of Workshop on “the Social Consequences of Mobile Telephony: The Proceedings from a Seminar about Society, Mobile Telephony and Children”. Oslo, Norway (Jun. 16).Google ScholarGoogle Scholar
  32. Rodden, T. and Benford, S. 2003. The evolution of buildings and the implications for the design of ubiquitous domestic environments. In Proceedings the ACM Conference on Human Factors in Computing (CHI). Ft. Lauderdale, FL (Apr. 5--10). 9--16. Google ScholarGoogle Scholar
  33. Saltzer, J. H. and Schroeder, M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9, 1278--1308.Google ScholarGoogle Scholar
  34. Schiano, D. J., Chen, C P., Ginsberg, J., Gretarsdottir, U., Huddleston, M., and Isaacs, E. 2002. Teen use of messaging media. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI). Minneapolis, MN (Apr. 20--25). 594--595. Google ScholarGoogle Scholar
  35. Smith, H., Rogers, Y., and Brady, M. 2003. Managing one's social network: Does age make a difference? In Proceedings of the INTERACT Conference. Zurich, Switzerland (Sept. 1--5). 551--558.Google ScholarGoogle Scholar
  36. Star, S. L. 1999. The ethnography of infrastructure. American Behav. Sci. 43, 3, 377--391.Google ScholarGoogle Scholar
  37. Star, S. L. and Ruhleder, K. 1996. Steps towards an ecology of infrastructure: Design and access for large information spaces. Inf. Syst. Res. 7, 1, 111--134.Google ScholarGoogle Scholar
  38. Stevens, G. and Wulf, V. 2002. A new dimension in access control: Studying maintenance engineering across organizational boundaries. In Proceedings of the ACM Conference on Human Factors in Computer-Supported Cooperative Work (CSCW). New Orleans, LA (Nov. 16--20). 196--205. Google ScholarGoogle Scholar
  39. Tang, J. C., Yankelovich, N., Begole, J. B., van Kleek, M., Li, F., and Bhalodia, J. 2001. ConNexus to Awarenex: Extending awareness to mobile users. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI). Seattle, WA (Mar. 31--Apr. 4). 221--228. Google ScholarGoogle Scholar
  40. Taylor, A. and Harper, R. 2002. Age-Old practices in the “new world:” A study of gift-giving between teenage mobile phone users. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI). Minneapolis, MN (Apr. 20--25). 439--446. Google ScholarGoogle Scholar
  41. Taylor, A. S. and Harper, R. 2003. The gift of the gab?: A design-oriented sociology of young people's use of mobiles. Comput. Supported Cooperative Work: Int. J. 12, 4, 267--296. Google ScholarGoogle Scholar
  42. Tolmie, P., Pycock, J., Diggins, T., Maclean, A., and Karsenty, A. 2002. Unremarkable computing. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI). Minneapolis, MN (Apr. 20--25). 399--406. Google ScholarGoogle Scholar
  43. Turow, J. and Kavanaugh, A. L., Eds. 2003. The Wired Homestead: An MIT Press Sourcebook on the Internet and the Family. The MIT Press, Cambridge, MA. Google ScholarGoogle Scholar
  44. Vitalari, N. P., Venkatesh, A., and Gronhaug, K. 1986. Computing in the Home: Shifts in the time allocation patterns of households. Commun. ACM 28, 5, 512--522. Google ScholarGoogle Scholar
  45. Voida, A. and Mynatt, E. 2005. Six themes of the communicative appropriation of photographic images. In Proceedings of the ACM Conferene on Human Factors in Computing Systems (CHI). Portland, OR (Apr. 2--7). 171--180. Google ScholarGoogle Scholar
  46. Voida, A., Newstetter, W., and Mynatt, E. D. 2002. When conversations collide: The tensions of instant messaging attributed. In Proceedings of the ACM Conferene on Human Factors in Computing Systems (CHI). Minneapolis, MN (Apr. 20--25). 187--194. Google ScholarGoogle Scholar
  47. Wellman, B. and Haythornthwaite, C., Eds. 2002. The Internet in Everyday Life. Blackwell Press, Oxford, UK.Google ScholarGoogle Scholar
  48. Zurko, M. E. and Simon, R. T. 1996. User-Centered security. In Proceedings of the New Security Paradigms Workshop. Lake Arrowhead, CA (Sept. 17--20). 27--33. Google ScholarGoogle Scholar

Index Terms

  1. Chatting with teenagers: Considering the place of chat technologies in teen life

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Computer-Human Interaction
        ACM Transactions on Computer-Human Interaction  Volume 13, Issue 4
        December 2006
        160 pages
        ISSN:1073-0516
        EISSN:1557-7325
        DOI:10.1145/1188816
        Issue’s Table of Contents

        Copyright © 2006 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 December 2006
        Published in tochi Volume 13, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader