Skip to main content

Colouring Inside the Lines: Using Technology to Regulate Children’s Behaviour Online

  • Chapter
  • First Online:
Minding Minors Wandering the Web: Regulating Online Child Safety

Part of the book series: Information Technology and Law Series ((ITLS,volume 24))

Abstract

Online safety for children and teenagers is a concern for regulators, policy makers and technology developers. One of the ways to create safer online environments for this group is through ‘technological influencing’, i.e. through the use of technical tools. Such tools shape what children and teenagers can and cannot do when they go online. They limit children’s access to certain content and make certain actions impossible. Technological influencing comes in various forms, some very stringent (techno-regulation), others less so (nudging, persuasion). Van den Berg discusses the ideas underlying technological influencing and looks at different cases thereof in the domain of online safety for children. Currently, technology developers exclusively rely on techno-regulation to ensure that youngsters will ‘color inside the lines’, i.e. they leave children no room to manoeuvre, to experiment. Providing them with nudging mechanisms, however, would teach them more about potential risks, and hence make them more risk-aware and resilient. This is especially important for older children.

Bibi van den Berg is Assistant Professor at eLaw, the Center for Law in the Information Society at Leiden University’s Law School, Leiden, The Netherlands.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 89.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Hasebrink et al. 2011; Livingstone and Haddon 2009a; OECD 2011.

  2. 2.

    Livingstone et al. 2011.

  3. 3.

    ITU 2009.

  4. 4.

    And, of course, also for adults.

  5. 5.

    Cf. ITU 2009. The ITU report focuses almost exclusively the policy measures that should be taken, both on national and international levels, to combat the rise and spread of child abuse material (or CAM for short) via the internet. However, many of the policy recommendations in this report also apply to other areas that have been defined as online risks for children and teenagers.

  6. 6.

    Duffy 2003; Fogg 2003; Friedman et al. 2003; Friedman and Millett 1995; Nass and Moon 2000; Nass et al. 1994a, b; 1993; Reeves and Nass 1996; Thaler and Sunstein 2008; Turkle 1984, 2007; Van den Berg 2010a, b; Verbeek 2005.

  7. 7.

    Fogg 2003.

  8. 8.

    Fogg 2003, p. 49.

  9. 9.

    Thaler and Sunstein 2008.

  10. 10.

    Thaler and Sunstein 2008, p. 3.

  11. 11.

    Thaler and Sunstein 2008; for a critical reading of this concept, cf. Yeung 2012; Amir and Lobel 2009; Burgess 2012.

  12. 12.

    Van den Berg and Leenes 2010, 2011.

  13. 13.

    See ‘clocky’ and ‘Tocky’ at www.nandahome.com.

  14. 14.

    Hildebrandt 2008, 2009, 2011.

  15. 15.

    Hildebrandt 2011.

  16. 16.

    Cf. Brownsword 2008; Latour 1992; Leenes 2010; Leenes 2011;Van den Berg 2011; Van den Berg and Leenes 2013.

  17. 17.

    Morgan and Yeung 2007; Yeung 2008.

  18. 18.

    Cf. Lessig 2006.

  19. 19.

    Cf. ITU 2009; Hasebrink et al. 2011.

  20. 20.

    Livingstone and Haddon 2009b, p. 19. Note that having the software installed does not mean that parents are actually using it.

  21. 21.

    Cf. ITU 2009; Deibert et al. 2008.

  22. 22.

    Thierer 2009.

  23. 23.

    Thierer 2009, p. 15.

  24. 24.

    The list of keywords that must be filtered can, in many cases, be composed or adjusted by parents themselves. Many internet filtering packages also come with a preinstalled list. In the broader context of using filtering and blocking software governments and other regulatory forces may also define lists of keywords to be filtered within the boundaries over which they hold sovereign power.

  25. 25.

    Preston 2007, p. 1451; also see Deibert et al. 2008, p. 34.

  26. 26.

    Preston 2007; also see Deibert et al. 2008, p. 34.

  27. 27.

    Cf. Yeung 2011, p. 7.

  28. 28.

    Cf. Livingstone and Haddon 2009b.

  29. 29.

    Zittrain and Palfrey 2008, p. 44.

  30. 30.

    Livingstone and Haddon 2009b, p. 26.

  31. 31.

    See www.kidzui.com (last accessed on 12 June 2013).

  32. 32.

    The Netherlands has its own browser especially designed for children, called MyBee (see www.mybee.nl (last accessed on 12 June 2013)). This browser was created and is owned by KPN, the Netherlands’ largest cable and telephone company.

  33. 33.

    Burt 2010.

  34. 34.

    See www.buddybrowser.com/Free-Parental-Controls.cfm (last accessed on 12 June 2013).

  35. 35.

    Preston 2007.

  36. 36.

    Gralla 2007, p. 312.

  37. 37.

    Preston 2007.

  38. 38.

    Preston 2007, p. 1431.

  39. 39.

    Cf. Gralla 2007; Nunziato 2008.

  40. 40.

    Preston 2007, p. 1432.

  41. 41.

    Nunziato 2008, p. 1573.

  42. 42.

    Also see Weekes 2003.

  43. 43.

    Nunziato 2008.

  44. 44.

    Thierer 2009, p. 56.

  45. 45.

    Thierer 2009, p. 195, also see Thierer 2013.

References

  • Amir O, Lobel O (2009) Stumble, predict, nudge: how behavioral economics informs law and policy. Columbia Law Rev 108:2098–2139

    Google Scholar 

  • Brownsword R (2008) So what does the world need now? Reflections on regulating technologies. In: Brownsword R, Yeung K (eds) Regulating technologies: legal futures, regulatory frames and technological fixes. Hart, Oxford, pp 23–46

    Google Scholar 

  • Burgess A (2012) ‘Nudging’ healthy lifestyles: the UK experiments with the behavioural alternative to regulation and the market. Eur J Risk Regul 3(1):3–30

    Google Scholar 

  • Burt D (2010) Kid safe browsers: product comparison 2010. http://filteringfacts.files.wordpress.com/2010/02/pckidsafebrowsers2010.pdf

  • Deibert R, Palfrey J, Rohozinski R, Zittrain J (2008) Access denied: the practice and policy of global Internet filtering. The information revolution and global politics. MIT Press, Cambridge, MA

    Google Scholar 

  • Duffy BR (2003) Anthropomorphism and the social robot. Robot Auton Syst 42:177–190

    Article  Google Scholar 

  • Fogg BJ (2003) Persuasive technology: using computers to change what we think and do. The Morgan Kaufmann series in interactive technologies. Morgan Kaufmann, Amsterdam, Boston

    Google Scholar 

  • Friedman B, Millett L (1995) ‘It’s the computer’s fault’—reasoning about computers as moral agents. Paper read at Conference companion of the conference on human factors in computing systems: CHI’95, May 1995, New York

    Google Scholar 

  • Friedman B, Kahn Jr PH, Hagman J (2003) Hardware companions? What online AIBO discussion forums reveal about the human-robotic relationship. Paper read at computer-human interaction (CHI) conference 2003, 5–10 April, Ft. Lauderdale, FA

    Google Scholar 

  • Gralla P (2007) How the Internet works, 8th edn. Que Pub, Indianapolis

    Google Scholar 

  • Hasebrink U, Görzig A, Haddon L, Kalmus V, Livingstone S (2011) Patterns of risk and safety online: in-depth analyses from the EU kids online survey of 9- to 16-year olds and their parents in 25 European countries. EU kids online. LSE, London

    Google Scholar 

  • Hildebrandt M (2008) A vision of ambient law. In: Brownsword R, Yeung K (eds) Regulating technologies. Legal futures, regulatory frames and technological fixes. Hart, Oxford, pp 175–192

    Google Scholar 

  • Hildebrandt M (2009) Technology and the end of law. In: Claes E, Devroe W, Keirsbilck B (eds) Facing the limits of the law. Springer, Berlin, Heidelberg

    Google Scholar 

  • Hildebrandt M (2011) Legal protection by design: objections and refutations. Legisprudence 5(2):223–249

    Article  Google Scholar 

  • ITU (2009) Guidelines for policy makers on child online protection. www.itu.int/osg/csd/cybersecurity/gca/cop/guidelines/policy_makers.pdf

  • Latour B (1992) Where are the missing masses? The sociology of a few mundane artifacts. In: Bijker WE, Law J (eds) Shaping technology/building society: studies in sociotechnical change. MIT Press, Cambridge, MA

    Google Scholar 

  • Leenes R (2010) Harde lessen: apologie van technologie als reguleringsinstrument. Universiteit van Tilburg, Tilburg

    Google Scholar 

  • Leenes R (2011) Framing techno-regulation: an exploration of state and non-state regulation by technology. Legisprudence 5(2):143–169

    Article  Google Scholar 

  • Lessig L (2006) Code: version 2.0, 2nd edn. Basic Books, New York

    Google Scholar 

  • Livingstone S, Haddon L (2009a) Conclusions. In: Livingstone S, Haddon L (eds) In kids online: opportunities and risks for children. The Policy Press, Bristol

    Google Scholar 

  • Livingstone S, Haddon L (2009b) EU kids online: Final report. In EU kids online. EC safer internet plus programme deliverable D6.5. LSE, London

    Google Scholar 

  • Livingstone S, Haddon L, Görzig A, Ólafsson K (2011) Risks and safety on the internet: the perspective of European children. Full findings. In EU kids online. LSE, London

    Google Scholar 

  • Morgan B, Yeung K (2007) Regulatory instruments and techniques. In: Morgan B, Yeung K (eds) An introduction to law and regulation: text and materials. Cambridge University Press, Cambridge, pp 79–150

    Chapter  Google Scholar 

  • Nass CI, Moon Y (2000) Machines and mindlessness: social responses to computers. J Soc Issues 56(1):81–103

    Article  Google Scholar 

  • Nass CI, Steuer J, Tauber ER, Reeder H (1993) Anthropomorphism, agency, and ethopoeia: computers as social actors. Paper read at computer-human interaction (CHI) conference 1993. Amsterdam, The Netherlands

    Google Scholar 

  • Nass CI, Steuer J, Henriksen L, Dryer DC (1994a) Machines, social attributions, and ethopoeia: performance assessments of computers subsequent to ‘self-’ or ‘other-’ evaluations. Int J Hum Comput Stud 40(3):543–559

    Article  Google Scholar 

  • Nass CI, Steuer J, Tauber ER (1994b) Computers are social actors. Paper read at computer-human interaction (CHI) conference: Celebrating interdependence. Boston, MA

    Google Scholar 

  • Nunziato DC (2008) Technology and pornography. Brigham Young University Law Review 1535–1585

    Google Scholar 

  • OECD (2011) The protection of children online: risks faced by children online and policies to protect them. www.oecd.org/sti/ieconomy/protectingchildrenonline.htm

  • Preston CB (2007) Zoning the internet: a new approach to protecting children online. Brigham Young University Law Review 1417–1467

    Google Scholar 

  • Reeves B, Nass CI (1996) The media equation: how people treat computers, television, and new media like real people and places. CSLI Publications/Cambridge University Press, Stanford/New York

    Google Scholar 

  • Thaler RH, Sunstein CR (2008) Nudge: improving decisions about health, wealth, and happiness. Yale University Press, New Haven, CT

    Google Scholar 

  • Thierer A (2009) Parental controls and online child protection. In PFF special report. The Progress & Freedom Foundation, Washington, DC

    Google Scholar 

  • Thierer A (2013) The pursuit of privacy in a world where information control is failing. Harvard J Law Public Policy 36(2):409–456

    Google Scholar 

  • Turkle S (1984) The second self: computers and the human spirit. Simon and Schuster, New York

    Google Scholar 

  • Turkle S (2007) Evocative objects: things we think with. MIT Press, Cambridge, MA

    Google Scholar 

  • Van den Berg B (2010a) I-object: intimate technologies as ‘reference groups’ in the construction of identities. Technè 14(3):176–193

    Google Scholar 

  • Van den Berg B (2010b) The situated self: identity in a world of ambient intelligence. Wolf Legal Publishers, Nijmegen

    Google Scholar 

  • Van den Berg B (2011) Robots as tools for techno-regulation. Law Innov Technol 3(2):317–332

    Google Scholar 

  • Van den Berg B, Leenes R (2010) Audience segregation in social network sites. In: Proceedings for SocialCom2010/PASSAT2010, Second IEEE international conference on social computing/second IEEE international conference on privacy, security, risk and trust. IEEE, Minneapolis, MI

    Google Scholar 

  • Van den Berg B, Leenes R (2011) Masking in social network sites: translating a real-world social practice to the online domain. IT Inf Technol (1):26–34

    Google Scholar 

  • Van den Berg B, Leenes R (2013) Abort, retry, fail: scoping techno-regulation and other techno-effects. In: Hildebrandt M, Gaakeer J (eds) Human law and computer law: comparative perspectives. Springer, Berlin, pp 67–88

    Google Scholar 

  • Verbeek P-P (2005) What things do: philosophical reflections on technology, agency, and design. Pennsylvania State University Press, University Park, PA

    Google Scholar 

  • Weekes RB (2003) Cyber-zoning a mature domain: the solution to preventing inadvertant access to sexually explicit content on the internet? Virginia J Law Technol 8(1)

    Google Scholar 

  • Yeung K (2008) Towards an understanding of regulation by design. In: Brownsword R, Yeung K (eds) Regulating technologies: legal futures, regulatory frames and technological fixes. Hart, Oxford, pp 79–108

    Google Scholar 

  • Yeung K (2011) Can we employ design-based regulation while avoiding brave new world? Law Innov Technol 3(1):1–29

    Article  Google Scholar 

  • Yeung K (2012) Nudge as fudge. Mod Law Rev 75(1):122–148

    Article  Google Scholar 

  • Zittrain J, Palfrey J (2008) Internet filtering: the Politics and mechanisms of control. In: Deibert R, Palfrey J, Rohozinski R, Zittrain J (eds) Access denied: the practice and policy of global Internet filtering. MIT Press, Cambridge, MA, pp 29–56

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bibi van den Berg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 © T.M.C. Asser Press, The Hague, The Netherlands, and the author(s)

About this chapter

Cite this chapter

van den Berg, B. (2014). Colouring Inside the Lines: Using Technology to Regulate Children’s Behaviour Online. In: van der Hof, S., van den Berg, B., Schermer, B. (eds) Minding Minors Wandering the Web: Regulating Online Child Safety. Information Technology and Law Series, vol 24. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-005-3_4

Download citation

Publish with us

Policies and ethics

Societies and partnerships