Abstract
Online safety for children and teenagers is a concern for regulators, policy makers and technology developers. One of the ways to create safer online environments for this group is through ‘technological influencing’, i.e. through the use of technical tools. Such tools shape what children and teenagers can and cannot do when they go online. They limit children’s access to certain content and make certain actions impossible. Technological influencing comes in various forms, some very stringent (techno-regulation), others less so (nudging, persuasion). Van den Berg discusses the ideas underlying technological influencing and looks at different cases thereof in the domain of online safety for children. Currently, technology developers exclusively rely on techno-regulation to ensure that youngsters will ‘color inside the lines’, i.e. they leave children no room to manoeuvre, to experiment. Providing them with nudging mechanisms, however, would teach them more about potential risks, and hence make them more risk-aware and resilient. This is especially important for older children.
Bibi van den Berg is Assistant Professor at eLaw, the Center for Law in the Information Society at Leiden University’s Law School, Leiden, The Netherlands.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
Livingstone et al. 2011.
- 3.
ITU 2009.
- 4.
And, of course, also for adults.
- 5.
Cf. ITU 2009. The ITU report focuses almost exclusively the policy measures that should be taken, both on national and international levels, to combat the rise and spread of child abuse material (or CAM for short) via the internet. However, many of the policy recommendations in this report also apply to other areas that have been defined as online risks for children and teenagers.
- 6.
- 7.
Fogg 2003.
- 8.
Fogg 2003, p. 49.
- 9.
Thaler and Sunstein 2008.
- 10.
Thaler and Sunstein 2008, p. 3.
- 11.
- 12.
- 13.
See ‘clocky’ and ‘Tocky’ at www.nandahome.com.
- 14.
- 15.
Hildebrandt 2011.
- 16.
- 17.
- 18.
Cf. Lessig 2006.
- 19.
- 20.
Livingstone and Haddon 2009b, p. 19. Note that having the software installed does not mean that parents are actually using it.
- 21.
- 22.
Thierer 2009.
- 23.
Thierer 2009, p. 15.
- 24.
The list of keywords that must be filtered can, in many cases, be composed or adjusted by parents themselves. Many internet filtering packages also come with a preinstalled list. In the broader context of using filtering and blocking software governments and other regulatory forces may also define lists of keywords to be filtered within the boundaries over which they hold sovereign power.
- 25.
- 26.
- 27.
Cf. Yeung 2011, p. 7.
- 28.
Cf. Livingstone and Haddon 2009b.
- 29.
Zittrain and Palfrey 2008, p. 44.
- 30.
Livingstone and Haddon 2009b, p. 26.
- 31.
See www.kidzui.com (last accessed on 12 June 2013).
- 32.
The Netherlands has its own browser especially designed for children, called MyBee (see www.mybee.nl (last accessed on 12 June 2013)). This browser was created and is owned by KPN, the Netherlands’ largest cable and telephone company.
- 33.
Burt 2010.
- 34.
See www.buddybrowser.com/Free-Parental-Controls.cfm (last accessed on 12 June 2013).
- 35.
Preston 2007.
- 36.
Gralla 2007, p. 312.
- 37.
Preston 2007.
- 38.
Preston 2007, p. 1431.
- 39.
- 40.
Preston 2007, p. 1432.
- 41.
Nunziato 2008, p. 1573.
- 42.
Also see Weekes 2003.
- 43.
Nunziato 2008.
- 44.
Thierer 2009, p. 56.
- 45.
References
Amir O, Lobel O (2009) Stumble, predict, nudge: how behavioral economics informs law and policy. Columbia Law Rev 108:2098–2139
Brownsword R (2008) So what does the world need now? Reflections on regulating technologies. In: Brownsword R, Yeung K (eds) Regulating technologies: legal futures, regulatory frames and technological fixes. Hart, Oxford, pp 23–46
Burgess A (2012) ‘Nudging’ healthy lifestyles: the UK experiments with the behavioural alternative to regulation and the market. Eur J Risk Regul 3(1):3–30
Burt D (2010) Kid safe browsers: product comparison 2010. http://filteringfacts.files.wordpress.com/2010/02/pckidsafebrowsers2010.pdf
Deibert R, Palfrey J, Rohozinski R, Zittrain J (2008) Access denied: the practice and policy of global Internet filtering. The information revolution and global politics. MIT Press, Cambridge, MA
Duffy BR (2003) Anthropomorphism and the social robot. Robot Auton Syst 42:177–190
Fogg BJ (2003) Persuasive technology: using computers to change what we think and do. The Morgan Kaufmann series in interactive technologies. Morgan Kaufmann, Amsterdam, Boston
Friedman B, Millett L (1995) ‘It’s the computer’s fault’—reasoning about computers as moral agents. Paper read at Conference companion of the conference on human factors in computing systems: CHI’95, May 1995, New York
Friedman B, Kahn Jr PH, Hagman J (2003) Hardware companions? What online AIBO discussion forums reveal about the human-robotic relationship. Paper read at computer-human interaction (CHI) conference 2003, 5–10 April, Ft. Lauderdale, FA
Gralla P (2007) How the Internet works, 8th edn. Que Pub, Indianapolis
Hasebrink U, Görzig A, Haddon L, Kalmus V, Livingstone S (2011) Patterns of risk and safety online: in-depth analyses from the EU kids online survey of 9- to 16-year olds and their parents in 25 European countries. EU kids online. LSE, London
Hildebrandt M (2008) A vision of ambient law. In: Brownsword R, Yeung K (eds) Regulating technologies. Legal futures, regulatory frames and technological fixes. Hart, Oxford, pp 175–192
Hildebrandt M (2009) Technology and the end of law. In: Claes E, Devroe W, Keirsbilck B (eds) Facing the limits of the law. Springer, Berlin, Heidelberg
Hildebrandt M (2011) Legal protection by design: objections and refutations. Legisprudence 5(2):223–249
ITU (2009) Guidelines for policy makers on child online protection. www.itu.int/osg/csd/cybersecurity/gca/cop/guidelines/policy_makers.pdf
Latour B (1992) Where are the missing masses? The sociology of a few mundane artifacts. In: Bijker WE, Law J (eds) Shaping technology/building society: studies in sociotechnical change. MIT Press, Cambridge, MA
Leenes R (2010) Harde lessen: apologie van technologie als reguleringsinstrument. Universiteit van Tilburg, Tilburg
Leenes R (2011) Framing techno-regulation: an exploration of state and non-state regulation by technology. Legisprudence 5(2):143–169
Lessig L (2006) Code: version 2.0, 2nd edn. Basic Books, New York
Livingstone S, Haddon L (2009a) Conclusions. In: Livingstone S, Haddon L (eds) In kids online: opportunities and risks for children. The Policy Press, Bristol
Livingstone S, Haddon L (2009b) EU kids online: Final report. In EU kids online. EC safer internet plus programme deliverable D6.5. LSE, London
Livingstone S, Haddon L, Görzig A, Ólafsson K (2011) Risks and safety on the internet: the perspective of European children. Full findings. In EU kids online. LSE, London
Morgan B, Yeung K (2007) Regulatory instruments and techniques. In: Morgan B, Yeung K (eds) An introduction to law and regulation: text and materials. Cambridge University Press, Cambridge, pp 79–150
Nass CI, Moon Y (2000) Machines and mindlessness: social responses to computers. J Soc Issues 56(1):81–103
Nass CI, Steuer J, Tauber ER, Reeder H (1993) Anthropomorphism, agency, and ethopoeia: computers as social actors. Paper read at computer-human interaction (CHI) conference 1993. Amsterdam, The Netherlands
Nass CI, Steuer J, Henriksen L, Dryer DC (1994a) Machines, social attributions, and ethopoeia: performance assessments of computers subsequent to ‘self-’ or ‘other-’ evaluations. Int J Hum Comput Stud 40(3):543–559
Nass CI, Steuer J, Tauber ER (1994b) Computers are social actors. Paper read at computer-human interaction (CHI) conference: Celebrating interdependence. Boston, MA
Nunziato DC (2008) Technology and pornography. Brigham Young University Law Review 1535–1585
OECD (2011) The protection of children online: risks faced by children online and policies to protect them. www.oecd.org/sti/ieconomy/protectingchildrenonline.htm
Preston CB (2007) Zoning the internet: a new approach to protecting children online. Brigham Young University Law Review 1417–1467
Reeves B, Nass CI (1996) The media equation: how people treat computers, television, and new media like real people and places. CSLI Publications/Cambridge University Press, Stanford/New York
Thaler RH, Sunstein CR (2008) Nudge: improving decisions about health, wealth, and happiness. Yale University Press, New Haven, CT
Thierer A (2009) Parental controls and online child protection. In PFF special report. The Progress & Freedom Foundation, Washington, DC
Thierer A (2013) The pursuit of privacy in a world where information control is failing. Harvard J Law Public Policy 36(2):409–456
Turkle S (1984) The second self: computers and the human spirit. Simon and Schuster, New York
Turkle S (2007) Evocative objects: things we think with. MIT Press, Cambridge, MA
Van den Berg B (2010a) I-object: intimate technologies as ‘reference groups’ in the construction of identities. Technè 14(3):176–193
Van den Berg B (2010b) The situated self: identity in a world of ambient intelligence. Wolf Legal Publishers, Nijmegen
Van den Berg B (2011) Robots as tools for techno-regulation. Law Innov Technol 3(2):317–332
Van den Berg B, Leenes R (2010) Audience segregation in social network sites. In: Proceedings for SocialCom2010/PASSAT2010, Second IEEE international conference on social computing/second IEEE international conference on privacy, security, risk and trust. IEEE, Minneapolis, MI
Van den Berg B, Leenes R (2011) Masking in social network sites: translating a real-world social practice to the online domain. IT Inf Technol (1):26–34
Van den Berg B, Leenes R (2013) Abort, retry, fail: scoping techno-regulation and other techno-effects. In: Hildebrandt M, Gaakeer J (eds) Human law and computer law: comparative perspectives. Springer, Berlin, pp 67–88
Verbeek P-P (2005) What things do: philosophical reflections on technology, agency, and design. Pennsylvania State University Press, University Park, PA
Weekes RB (2003) Cyber-zoning a mature domain: the solution to preventing inadvertant access to sexually explicit content on the internet? Virginia J Law Technol 8(1)
Yeung K (2008) Towards an understanding of regulation by design. In: Brownsword R, Yeung K (eds) Regulating technologies: legal futures, regulatory frames and technological fixes. Hart, Oxford, pp 79–108
Yeung K (2011) Can we employ design-based regulation while avoiding brave new world? Law Innov Technol 3(1):1–29
Yeung K (2012) Nudge as fudge. Mod Law Rev 75(1):122–148
Zittrain J, Palfrey J (2008) Internet filtering: the Politics and mechanisms of control. In: Deibert R, Palfrey J, Rohozinski R, Zittrain J (eds) Access denied: the practice and policy of global Internet filtering. MIT Press, Cambridge, MA, pp 29–56
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 © T.M.C. Asser Press, The Hague, The Netherlands, and the author(s)
About this chapter
Cite this chapter
van den Berg, B. (2014). Colouring Inside the Lines: Using Technology to Regulate Children’s Behaviour Online. In: van der Hof, S., van den Berg, B., Schermer, B. (eds) Minding Minors Wandering the Web: Regulating Online Child Safety. Information Technology and Law Series, vol 24. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-005-3_4
Download citation
DOI: https://doi.org/10.1007/978-94-6265-005-3_4
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-94-6265-004-6
Online ISBN: 978-94-6265-005-3
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)