Children's Data and Privacy Online

Total Page:16

File Type:pdf, Size:1020Kb

Children's Data and Privacy Online Children’s data and privacy online Growing up in a digital age An evidence review Sonia Livingstone ▪ Mariya Stoilova ▪ Rishita Nandagiri December 2018 1 Table of contents 1. Executive summary ........................................................................................................................ 3 2. Acknowledgements ........................................................................................................................ 5 3. Introduction .................................................................................................................................... 6 3.1. Context .................................................................................................................................... 6 3.2. Aims of the project and the evidence review ......................................................................... 8 4. Methodology .................................................................................................................................. 8 5. Children’s privacy online: key issues and findings from the systematic evidence mapping ..... 10 5.1. Conceptualising privacy in the digital age............................................................................. 10 5.2. Dimensions of children’s online privacy ............................................................................... 12 Interpersonal privacy .................................................................................................................... 13 Institutional privacy ...................................................................................................................... 13 Commercial privacy ....................................................................................................................... 14 Types of digital data ...................................................................................................................... 16 5.3. Privacy and child development ............................................................................................. 17 5.4. Children’s negotiation of privacy and information disclosure .............................................. 21 5.5. Children’s privacy protection strategies ............................................................................... 22 5.6. Media literacy ....................................................................................................................... 23 5.7. Differences among children .................................................................................................. 26 Socio-economic inequalities .......................................................................................................... 26 Gender differences ........................................................................................................................ 27 Vulnerability .................................................................................................................................. 28 5.8. Privacy-related risks of harm ................................................................................................ 28 5.9. Privacy protection and children’s autonomy ........................................................................ 30 5.10. Supporting children ........................................................................................................... 30 6. Recommendations ....................................................................................................................... 34 Appendices ........................................................................................................................................... 36 Appendix 1: Detailed methodology .................................................................................................. 36 Approach ....................................................................................................................................... 36 Search terms and outcomes ......................................................................................................... 36 Databases searched ...................................................................................................................... 38 Screening ....................................................................................................................................... 39 Coding ........................................................................................................................................... 40 Appendix 2: List of coded sources .................................................................................................... 41 Appendix 3: Glossary ........................................................................................................................ 48 References ............................................................................................................................................ 51 Cover image: Max Pixel 2 1. Executive summary by recent high-profile privacy issues and infringements. Children’s autonomy and dignity as actors in the In order to capture the full complexity of world depends on both their freedom to engage children’s privacy online, we distinguish and their freedom from undue persuasion or among: (i) interpersonal privacy (how my ‘data influence. In a digital age in which many everyday self’ is created,2 accessed and multiplied via actions generate data – whether given by digital my online social connections); (ii) institutional actors, observable from digital traces, or inferred privacy (how public agencies like government, by others, whether human or algorithmic – the educational and health institutions gather and relation between privacy and data online is handle data about me); and (iii) commercial becoming highly complex. This in turn sets a privacy (how my personal data is harvested significant media literacy challenge for children and used for business and marketing (and their parents and teachers) as they try to purposes). understand and engage critically with the digital environment. The key privacy challenge (and paradox) With growing concerns over children’s privacy and currently posed by the internet is the the commercial uses of their data, it is vital that simultaneous interconnectedness of voluntary children’s understandings of the digital sharing of personal information online, environment, their digital skills and their capacity important for children’s agency, and the to consent are taken into account in designing attendant threats to their privacy, also services, regulation and policy. Using systematic important for their safety. While children evidence mapping, we reviewed the existing value their privacy and engage in protective knowledge on children’s data and privacy online, strategies, they also greatly appreciate the identified research gaps and outlined areas of ability to engage online. potential policy and practice development. Individual privacy decisions and practices are Key findings include: influenced by the social environment. Children negotiate sharing or withholding of personal Children’s online activities are the focus of a information in a context in which networked multitude of monitoring and data-generating communication and sharing practices shape processes, yet the possible implications of this their decisions and create the need to balance ‘datafication of children’1 has only recently privacy with the need for participation, self- caught the attention of governments, expression and belonging. researchers and privacy advocates. Institutionalised aspects of privacy, where Attempts to recognise children’s right to data control is delegated – voluntarily or not – privacy on its own terms are relatively new and to external agencies such as government have been brought to the fore by the institutions, is becoming the norm rather than adoption of the European General Data the exception in the digital age. Yet there are Protection Regulation (GDPR, 2018) as well as gaps in our knowledge of how children experience institutional privacy, raising questions about informed consent and children’s rights. 1 ‘Datafication’ refers to the process of intensified monitoring and data gathering in which people The invasive tactics used by marketers to (including children) are quantified and objectified – collect personal information from children positioned as objects (serving the interests of others) have aroused data privacy and security rather than subjects (or agents of their own interests concerns particularly relating to children’s and concerns); see Lupton, D. and Williamson, B. (2017) The datafied child: The dataveillance of children and implications for their rights. New Media & Society 19(5), 2 ‘Data self’ refers to all the information available 780-94. (offline and online) about an individual. 3 ability to understand and consent to such privacy online threats due to their lack of datafication and the need for parental digital skills or awareness of privacy risks. approval and supervision, especially for the While issues such as online sexual exploitation youngest internet users. While the and contact with strangers are prominent in commercial use of children’s data is at the current debates, more research is needed to forefront of current privacy debates, the explore potential links between privacy risks empirical evidence related to children’s and harmful consequences for children, experiences, awareness and competence
Recommended publications
  • Parental Controls 1
    Parental Controls 1 Begin as you mean to go. You can introduce parental software controls to a younger child with more ease than to a teenager. Getting your child used to the idea that the tablet goes off, the video goes off, the TV goes off at certain times is extremely attractive. And with parental control software, you can do just that. Parental controls are usually included in most devices, such as your computer, tablet and smartphone. You need to dive into those settings and dig around to see what features are available to you. If you are based in Europe, the European Commission maintains a website called SipBench.eu which provides benchmarking analysis of parental control software. The findings are available in several European languages and identify the prices, technical requirements, operating system and age of the children to be protected. It is a handy background resource to get you started with parental controls. If you know of other parental control software tools that should be added to this list, please write to me at [email protected] so I can investigate and incorporate them into this resource sheet. Thank you for being a part of our Digital Parenting Community. www.digitalparentingcoach.com 2 Before signing up for parental control software • Read this article from Common Sense Media to help you make sense of the different types of parental control systems. • Confirm that your parental control software will allow you, at the very least, to set screen limits, filter content, block ads, and monitor your child’s online activities.
    [Show full text]
  • Privacy and Cyber Security Emphasizing Privacy Protection in Cyber Security Activities
    Privacy and Cyber Security Emphasizing privacy protection in cyber security activities December 2014 Table of Contents Abstract ................................................................................................................................................................... 1 Introduction ............................................................................................................................................................ 1 1. Cyber Security Challenges ................................................................................................................................. 2 2. Cyber Security Policy Developments ................................................................................................................. 5 3. Conclusion: Emphasizing privacy protection in cyber security activities .......................................................... 7 ________________________________________________________________________________________________________ 30 Victoria Street – 1st Floor, Gatineau, QC K1A 1H3 • Toll-free: 1-800-282-1376 • Fax: (819) 994-5424 • TDD (819) 994-6591 www.priv.gc.ca • Follow us on Twitter: @privacyprivee Abstract This research report examines the common interests and tensions between privacy and cyber security. It explores how challenges for cyber security are also challenges for privacy and data protection, considers how cyber security policy can affect privacy, and notes how cyberspace governance and security is a global issue. Finally, it sets out key policy
    [Show full text]
  • Digital Privacy Policy
    Digital Privacy Policy This Internet Privacy Policy explains how we may collect information from you when you visit our web site or when you use our online financial services. We recognize the importance our customers place on the privacy and security of their personal information. Our goal is to protect your personal information in every way that we interact with you, whether it's on the telephone, in our lobby, at one of our ATMs, or on the Internet. We think it is important for you to be informed of the policies, procedures, and security measures that we have in place to safeguard your personal and confidential information. With that in mind, we have developed this Internet Privacy Policy to help you to understand the steps we take to protect your personal information when you utilize our online financial services. Below are several definitions of terms used within this policy: Customer Information - Customer Information refers to personally identifiable information about a consumer, customer or former customer of this Institution. Internet Protocol (IP) Address - an IP address is a unique address that devices use in order to identify and communicate with each other on a computer network. An IP address can be thought of as a street address or a phone number for a computer or other network device on the Internet. Just as each street address and phone number uniquely identifies a building or telephone, an IP address can uniquely identify a specific computer or other network device on a network. We may use IP addresses to monitor login activity and for identification purposes when necessary for security investigations.
    [Show full text]
  • Is the Market for Digital Privacy a Failure?1
    Is the Market for Digital Privacy a Failure?1 Caleb S. Fuller2 Abstract Why do many digital firms rely on collecting consumer information–a practice that survey evidence shows is widely disliked? Why don’t they, instead, charge a fee that would protect privacy? This paper empirically adjudicates between two competing hypotheses. The first holds that firms pursue this strategy because consumers are ill-informed and thus susceptible to exploitation. The second holds that this strategy reasonably approximates consumer preferences. By means of survey, I test a.) the extent of information asymmetry in digital markets, b.) consumers’ valuation of privacy, and c.) whether government failure contributes to consumer mistrust of information collection. My results indicate that a.) the extent of information asymmetry is minimal, b.) there is significant divergence between “notional” and “real” demand for privacy and c.) that government contributes to consumer distrust of information collection by private firms. Significantly, almost 82% of Google users are unwilling to pay anything for increased digital privacy. JEL-Classification: D23, K29, Z18 Keywords: privacy paradox, digital privacy, survey, market failure 1 I wish to thank Alessandro Acquisti, Peter Leeson, Chris Coyne, Peter Boettke, David Lucas, Noah Gould, and Nicholas Freiling for helpful suggestions. All errors are my own. I am also indebted to the Mercatus Center for providing funding for the survey conducted by Haven Insights LLC. 2 Assistant professor of economics, Grove City College, Email: 1 INTRODUCTION Google’s motto is “Don’t Be Evil.” But the fact that the company surreptitiously collects the information of over one billion individuals annually leads some to question whether the firm’s business model runs afoul of its dictum (Hoofnagle 2009).
    [Show full text]
  • Gender Self-Determination Troubles
    Gender Self-Determination Troubles by Ido Katri A thesis submitted in conformity with the requirements for the degree of Doctor of Juridical Science Faculty of Law University of Toronto © Copyright by Ido Katri 2021 Gender Self-Determination Troubles Ido Katri Doctor of Juridical Science Faculty of Law University of Toronto 2021 Abstract This dissertation explores the growing legal recognition of what has become known as ‘gender self-determination.’ Examining sex reclassification policies on a global scale, I show a shift within sex reclassification policies from the body to the self, from external to internal truth. A right to self-attested gender identity amends the grave breach of autonomy presented by other legal schemes for sex reclassification. To secure autonomy, laws and policies understand gender identity as an inherent and internal feature of the self. Yet, the sovereignty of a right to gender identity is circumscribed by the system of sex classification and its individuating logics, in which one must be stamped with a sex classification to be an autonomous legal subject. To understand this failure, I turn to the legal roots of the concept self-determination by looking to international law, and to the origin moment of legal differentiation, sex assignment at birth. Looking at the limitations of the collective right for state sovereignty allows me to provide a critical account of the inability of a right to gender identity to address systemic harms. Self- attested gender identity inevitably redraws the public/private divide along the contours of the trans body, suggesting a need to examine the apparatus of assigning sex at birth and its pivotal role in both the systemic exclusions of trans people, and in the broader regulation of gender.
    [Show full text]
  • The Right to Privacy in the Digital Age
    The Right to Privacy in the Digital Age April 9, 2018 Dr. Keith Goldstein, Dr. Ohad Shem Tov, and Mr. Dan Prazeres Presented on behalf of Pirate Parties International Headquarters, a UN ECOSOC Consultative Member, for the Report of the High Commissioner for Human Rights Our Dystopian Present Living in modern society, we are profiled. We accept the necessity to hand over intimate details about ourselves to proper authorities and presume they will keep this information secure- only to be used under the most egregious cases with legal justifications. Parents provide governments with information about their children to obtain necessary services, such as health care. We reciprocate the forfeiture of our intimate details by accepting the fine print on every form we sign- or button we press. In doing so, we enable second-hand trading of our personal information, exponentially increasing the likelihood that our data will be utilized for illegitimate purposes. Often without our awareness or consent, detection devices track our movements, our preferences, and any information they are capable of mining from our digital existence. This data is used to manipulate us, rob from us, and engage in prejudice against us- at times legally. We are stalked by algorithms that profile all of us. This is not a dystopian outlook on the future or paranoia. This is present day reality, whereby we live in a data-driven society with ubiquitous corruption that enables a small number of individuals to transgress a destitute mass of phone and internet media users. In this paper we present a few examples from around the world of both violations of privacy and accomplishments to protect privacy in online environments.
    [Show full text]
  • Annual Privacy Report
    U.S. DEPARTMENT OF JUSTICE ANNUAL PRIVACY REPORT THE CHIEF PRIVACY AND CIVIL LIBERTIES OFFICER AND THE OFFICE OF PRIVACY AND CIVIL LIBERTIES OCTOBER 1, 2016 – SEPTEMBER 30, 2020 1 (MULTI) ANNUAL PRIVACY REPORT MESSAGE FROM THE CHIEF PRIVACY AND CIVIL LIBERTIES OFFICER I am pleased to present the Department of Justice’s (Department or DOJ) Annual Privacy Report, describing the operations and activities of the Chief Privacy and Civil Liberties Officer (CPCLO) and the Office of Privacy and Civil Liberties (OPCL), in accordance with Section 1174 of the Violence Against Women and Department of Justice Reauthorization Act of 2005. This report covers the period from October 1, 2016, through September 30, 2020. The Department’s privacy program is supported by a team of dedicated privacy professionals who strive to build a culture and understanding of privacy within the complex and diverse mission work of the Department. The work of the Department’s privacy team is evident in the care, consideration, and dialogue about privacy that is incorporated in the daily operations of the Department. During this reporting period, there has been an evolving landscape of technological development and advancement in areas such as artificial intelligence, biometrics, complex data flows, and an increase in the number of cyber security events resulting in significant impacts to the privacy of individuals. Thus, the CPCLO and OPCL have developed new policies and guidance to assist the Department with navigating these areas, some of which include the following:
    [Show full text]
  • Piracy Versus Privacy: an Analysis of Values Encoded in the Piratebrowser
    International Journal of Communication 9(2015), 818–838 1932–8036/20150005 Piracy Versus Privacy: An Analysis of Values Encoded in the PirateBrowser BALÁZS BODÓ University of Amsterdam, Institute for Information Law The Netherlands The PirateBrowser is a Web browser that uses Tor privacy-enhancing technology to circumvent nationally implemented Internet filters blocking access to The Pirate Bay. This article analyzes the possible consequences of a mass influx of copyright pirates into the privacy domain. The article addresses the effects of the uptake of strong privacy technologies by pirates on copyright enforcement and on free speech and privacy technology domains. Also discussed are the norms and values reflected in the specific design choices taken by the developers of the PirateBrowser. Keywords: piracy, privacy, Tor, privacy-enhancing technologies, policy Introduction Tor (The Onion Router), “endorsed by Egyptian activists, WikiLeaks, NSA, GCHQ, Chelsea Manning, Snowden” (Dingledine & Appelbaum, 2013), is a volunteer network of computers that relays Web traffic through itself to provide anonymous, unobserved, and uncensored access to the Internet. It has about 4,000 relays and about 1,000 exit nodes. Tor users connect to the network, and their Web traffic is channeled through the internal relays to reach its final destination through one of the exit nodes. This arrangement makes the identification and surveillance of Tor users difficult. Anonymity is promised by the difficulty of tracing the Web traffic that appears on the exit node back to the individual who initiated the traffic, as long as there is a sufficient number of internal hops in between. Protection from surveillance is granted by the fact that each link in the communication chain is encrypted.
    [Show full text]
  • COVERING CYBER Media Coverage of Cyber Issues Since 2014
    COVERING CYBER Media Coverage of Cyber Issues Since 2014 Sean Aday Institute for Public Diplomacy and Global Communication George Washington University COVERING COVERING CYBER CYBER About the Author: Sean Aday is an associate professor of MEDIA COVERAGE OF CYBER media and public affairs and ISSUES SINCE 2014 international affairs at George Washington University. ABOUT THE REPORT This report analyzes media coverage of cyber issues in major American newspapers and network and cable news broadcasts since About IPDGC: 2014 to assess how these issues are being framed in the press, and what aspects of this complex topic are reaching news audiences. In The Institute for Public addition, specialty online media are analyzed in comparison to Diplomacy and Global Communication at traditional media coverage. George Washington University is a leading The report shows that cyber is becoming more prominent on the news organization in the agenda in the U.S., but that it is simultaneously receiving less field of public substantive coverage. Cyber is thus more likely to be covered as an diplomacy and global event than as policy. The report discusses implications of these and communication issues. other findings. It is jointly administered by the Columbian College of Arts and Sciences and the Elliott School of International Affairs. www.ipdgc.gwu.edu 1 TABLE OF CONTENTS I. Executive Summary p. 1 II. Introduction p. 3 III. Findings p. 4 IV. Conclusions p. 13 VI. Appendix 1: Methodology p. 17 EXECUTIVE SUMMARY This study primarily analyzed coverage of cyber related issues in 20 of the highest circulation newspapers in the United States, as well as that on all three network newscasts and CNN and Fox News Channel, from January 2014-June 2017.
    [Show full text]
  • Security and Privacy Risks of Parental Control Solutions
    Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions Suzan Ali Mounir Elgharabawy Quentin Duchaussoy [email protected] [email protected] [email protected] Concordia University Concordia University Concordia University Montreal, Quebec, Canada Montreal, Quebec, Canada Montreal, Quebec, Canada Mohammad Mannan Amr Youssef [email protected] [email protected] Concordia University Concordia University Montreal, Quebec, Canada Montreal, Quebec, Canada ABSTRACT Conference (ACSAC 2020), December 7–11, 2020, Austin, USA. ACM, New For parents of young children and adolescents, the digital age has in- York, NY, USA, 15 pages. https://doi.org/10.1145/3427228.3427287 troduced many new challenges, including excessive screen time, in- appropriate online content, cyber predators, and cyberbullying. To address these challenges, many parents rely on numerous parental 1 INTRODUCTION control solutions on different platforms, including parental con- Many of today’s children cannot imagine their daily lives without trol network devices (e.g., WiFi routers) and software applications internet. A recent survey [66] shows that 42% of US children (4–14 on mobile devices and laptops. While these parental control solu- years) spend over 30 hours a week on their phones; nearly 70% of tions may help digital parenting, they may also introduce serious parents think that such use has a positive effect on their children’s security and privacy risks to children and parents, due to their development [66]. While the web could be an excellent environment elevated privileges and having access to a significant amount of for learning and socializing, there is also a plethora of online content privacy-sensitive data.
    [Show full text]
  • Operations Manual
    Operations Manual Français p. 63 Español p. 127 Wii U System Manuals The official seal is your assurance that this product is licensed or manufactured by Nintendo. Always look for this seal when buying video game systems, accessories, Types of Manuals games and related products. Printed manuals • Wii U Quick Start Guide This guide covers the basic information for setting up and using your Wii U system. Please carefully read this Operations Manual before setup or use of the Wii U™ system. If • Wii U Operations Manual (this manual) you have problems or questions after reading all of the instructions, please visit our This manual gives the names of each component and describes how to recharge the customer service area at support.nintendo.com or call 1-800-255-3700. Also, additional controller, configure System Settings, and perform various procedures. It also provides pre-installed electronic manuals are available for the Wii U system and software applications troubleshooting and support information. from the HOME Menu, as described on the next page. Pre-installed electronic manuals • Wii U Electronic Manual ( ) This manual describes the Wii U features and gives detailed instructions on how to use the pre installed software, how to launch the Wii™ menu, and other operations. • Wii Menu Electronic Manual This manual describes the Wii Menu features and gives detailed instructions on how to use the included software. Viewing an Electronic Manual When the Wii U Menu is displayed, press on the Wii U™ GamePad to open the HOME Menu, then tap to open the Wii U Electronic Manual.
    [Show full text]
  • Parental Security Control
    IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 2 Issue 10, October 2015. www.ijiset.com ISSN 2348 – 7968 Parental Security Control Monali Shirbhate, Mitali Tiwari, Supriya Raut and Dolly Kumbhalkar 1Asst Prof, Computer Science and Engineering, RTMNU, Nagpur, Maharashtra, India 2 Students of Computer Science and Engineering, RTMNU, Nagpur, Maharashtra, India 3 Students of Computer Science and Engineering, RTMNU, Nagpur, Maharashtra, India 4 Students of Computer Science and Engineering, RTMNU, Nagpur, Maharashtra, India Abstract devices, and your home network. Parents, educators, This project describes an android application for parental social scientists, media pundits, and many others all offer security Control which will help the parents to monitor the their opinions, but rarely is any consensus reached. activities done on their children’s smart phones. Now-a-days a Parental controls are features which may be included lot of misuse is done on smart-phones operating android by in digital television services, computer and video recent generation. To control this misuse we are developing this games, mobile devices and software. Parental controls are application which will be installed on child’s smart phone by divided into four categories: contents filters (which limit parents. There is some feature which we will provide like Create and maintain log of calls, Record call, Create and maintain log of access to age inappropriate content), usage controls message, Record messages, Record the history of websites (which constrain the usage of these devices such as browsed. This entire detail is maintained and recorded by our placing time-limits on usage or forbidding certain types of application file in background.
    [Show full text]