Abstract
Social networking services (SNS) are an important part of many children and teenagers’ media use. As they communicate and share content by means of these services, minors may also engage in more risky behaviour, leading to reciprocal harassment which may blur the lines between victims and offenders to a greater extent than in the offline world. However, due to the specific nature of SNS, the use, and especially the implementation and enforcement of, traditional types of legislation are confronted with many obstacles. After identifying certain legal implications, this chapter examines the potential of alternative regulatory mechanisms and empowerment techniques (co-regulation, technical tools, media literacy, information provision mechanisms). The goal is to provide guidelines for the development of regulatory strategies which reduce peer-to-peer conduct and content risks in user-centric environments for children and young people while safeguarding fundamental rights and public interest goals.
Social media mirror, magnify and complicate countless aspects of everyday life, bringing into question practices that are presumed stable and shedding light on contested social phenomena.
Nancy K. Baym and Danah Boyd (Baym and Boyd 2012, p. 320).
Dr. Eva Lievens is a Senior Research Fellow of the Research Fund Flanders at the Interdisciplinary Centre for Law and ICT—KU Leuven—iMinds.
The research findings presented in this chapter are the result of her research project “Risk-reducing regulatory strategies for illegal and harmful conduct and content in online social network sites” (Postdoctoral research project funded by the Research Fund Flanders; www.fwo.be). The author wishes to thank Simone van der Hof and Bart Schermer for their valuable comments.
Access provided by Autonomous University of Puebla. Download chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
1 Introduction
Online social networking sites (SNS) provide individuals with the opportunity to share information on a previously unimaginable scale, by creating profiles, disclosing facts, emotions, or pictures and to interact in a highly sophisticated manner. During the past 5 years, the popularity of these SNS has expanded spectacularly, attracting an extraordinary number of users (e.g. almost 1,25 billion users for Facebook).Footnote 1 Among children and young people, social networking has become one of the preferred online activities.Footnote 2 The EU Kids Online study found that 77 % of 13–16 year olds and 38 % of 9–12 year olds have a social networking profile,Footnote 3 even though most SNS put the minimum age limit to create a profile at 13.
It has been argued that the blurring between ‘public’ and ‘private’ in SNS, the invisibility of audiences and the fact that information in such networks is persistent, replicable, searchable and visible on a large-scaleFootnote 4 entail that risks in an SNS environment are significantly more complex than equivalent offline risks. Aside from providing greater access to certain (illegal or harmful) categories of content (e.g. hate speech), and the facilitation of certain behaviour such as sexting or grooming, an added complexity can be found in the fact that the increased interaction between minors may lead to more reciprocal harassment, blurring the lines between victims and offenders to a greater extent than in the offline world.Footnote 5 , Footnote 6
This changing role of minors within social networks raises questions with regard to the applicability of the current legislative framework and liability for certain acts. This chapter will assess this applicability, to what extent minors may be held liable according to existing criminal or civil law for certain risk behaviour (e.g. bullying, posting of harmful/illegal comments or pictures) and whether third parties, such as parents, may be held liable for the behaviour of minors on SNS. This will be illustrated by means of provisions from Belgian (civil and criminal) law. Given the specific nature of SNS, the use, and especially the implementation and enforcement of, traditional types of legislation are neither obvious nor desirable.Footnote 7 It is the aim of this chapter to explore a number of regulatory and other strategies that may be adopted instead to deal with risk behaviour of young SNS users without depriving them of the undeniable benefits and opportunities that SNS provide them with. This includes a discussion of the potential of self- and co-regulation and non-regulatory mechanisms, such as improving media literacy skills or providing efficient reporting tools, for the development of (regulatory) strategies, which reduce peer-to-peer risks in user-centric environments.
2 Children and SNS Risks: Victims, Participants, Offenders, …?
As in most environments in which children and young people are present (e.g. the street, school, playground, in front of the television, etc.), risks may occur in social networks. Recent research has found that children who use SNS encounter more risks online than those who do not,Footnote 8 but this substantially depends on how they use these services. Moreover, the exposure to risks does not automatically lead to harm. As Staksrud et al. put it: “Risk may, therefore, be safely encountered by many, and only in a proportion of cases (depending on the action of both protective and risk factors) does it result in harm.”Footnote 9
Examples of risks that may occur in SNS are bullying, sexting, posting hurtful comments, sharing of or being tagged in pictures without permission and targeted advertising.Footnote 10 Whereas children used to be predominantly regarded as victims of certain risks, in need of protection, increasingly, and this has become very visible in the SNS environment, they may adopt different roles depending on the activities they perform. According to the ‘three C’s classification’ of online risks developed by the EU Kids Online study children may be recipients (Content), participants (Contact) or actors (Conduct) with regard to various risks.Footnote 11
Although (inappropriate or harmful) content and contact (with adult strangers, so-called ‘stranger danger’Footnote 12) have traditionally been the major causes of concern for policy makers and parents, empirical research has shown that the risks that upsets minors the most often occur between peers.Footnote 13 Sexting, i.e. the communication of “sexually explicit content […] via text messages, smart phones or visual and Web 2.0. activities such as social networking sites”Footnote 14 and cyberbullying are prime examples of this type of risks. Scholars have found, for instance, that, similarly to bullying that occurs offline, around 60 % of children that bully online have been the target of bullies themselves.Footnote 15 , Footnote 16 Children thus engage in both functions (victim—bully),Footnote 17 and these multiple roles are considered to be “fluid over time and across different contexts”.Footnote 18 Other situations where peers may be considered ‘actors’ are when pictures or video clips are posted, shared or tagged without the consent of the child that is portrayed. This may, for instance, be the case with regard to types of secondary sexting,Footnote 19 where sexually suggestive pictures that are sent voluntarily by someone are forwarded by the receiver of the picture, or incidents of ‘happy slapping’, where bullying scenes or assaults in the offline world are filmed with a digital or often a phone camera and then shared online. Especially in SNS, which are increasingly accessed through smart phones,Footnote 20 such actions may have significant consequences that are often not anticipated by the ‘actor’. Once content is uploaded on an SNS it can be shared very quickly with a very large audience,Footnote 21 and it is often very difficult to completely remove it. Moreover, content may already have been copied or forwarded before it is erased by a SNS provider, something of which children and young people are often not aware.Footnote 22
3 Legal Implications
Translated to the legal context the various roles a child may adopt in the SNS environment, e.g. active creator, perpetrator or ‘data controller’, may—in theory—entail different legal consequences and the applicability of specific legislation. Of course, it is necessary to take into account that, because of their age, or potential lack of legal capacities,Footnote 23 they may not be considered liable for their actions. Consequently, this raises questions with regard to the liability of parents or other caretakers.
3.1 Applying Existing Legislative Provisions to Unwanted Behaviour
The fact that SNS constitute a global, vast communication platform with millions of users in countries across the world does not entail that this environment finds itself in a legal vacuum. If an offense is committed on a SNS, the existing legal framework may be applied if certain conditions laid down in the law in question are fulfilled. Depending on the national circumstances, legislation may be formulated in a technology-neutral manner, may be interpreted in an evolutionary manner or may even be drafted especially with new media environment in mind (e.g. provisions with regard to electronic stalking or harassment).Footnote 24
In Belgium, for instance, a number of articles of the Criminal Code may be relevant with regard to sexting. Article 383 criminalises the display, sale or distribution of writings or images that are indecent. If this is done in the presence of minors below the age of 16, more severe sentences are imposed according to Article 386. In addition, Article 384 stipulates that the production of indecent writings or images is also a criminal offence. Child pornography is addressed in Article 383bis of the Criminal Code. This article criminalises the display, sale, rental, distribution, transmission, delivery, possession or (knowing) obtainment of access of or to images that depict poses or sexual acts with a pornographic character which involve or depict minors. These articles are formulated in a technology-neutral and broad manner, so in theory they could be applied to cases of sexting in SNS. In addition to criminal provisions, legislation with regard to the processing of personal data or portrait rights may be violated in cases where images are shared or distributed without the consent of the person that is portrayed. Whether or not these existing legislative provisions are applicable in certain situations will be judged on a case-by-case basis.
However, the application of existing legislation may have unintended consequences. In case of primary sexting, for instance, it seems to be disproportionate to apply legislative provisions that aim to address child pornography and to punish adults who intend to sexually abuse children, to situations where minors send or post sexually suggestive pictures to each other.Footnote 25 Not only may such behaviour possibly “be part of the developmentally necessary exploration and experimentation that enables the emergence of sexual identity”,Footnote 26 but even when considered imprudent or unwise taking into account the spiralling loss of control of a picture once uploaded on a SNS, criminally prosecuting and punishing minors may also be counterproductive and over-reaching.Footnote 27
In addition, practical obstacles may arise when an attempt is made to enforce national legislative provisions. Often SNS providers are located in another jurisdiction than the victim and declare in their Terms and Conditions that disputes need to be brought before the courts of their country of establishment.Footnote 28 Moreover, in the SNS environment perpetrators may act anonymously (for instance by means of a fake profile), making it very difficult to find and punish them. Other complicating factors may be that victims have not succeeded in obtaining evidence of certain acts (because the offending content has been deleted by the perpetrator or by the victim itself), that law enforcement and magistrates are not sufficiently aware of the characteristics of the SNS environment or that children do simply not report or file a complaint when they have been the victim of harmful acts.
3.2 Responsibility and Liability of Minors, Parents and Teachers
-
1.
Criminal liability
Even if certain acts may fall within the scope of application of existing criminal provisions, this will not automatically mean that children can be held responsible or liable. This will depend on the age of criminal responsibility, i.e. “the age at which children are deemed to have the capacity to be legally responsible for breaches of the criminal law”,Footnote 29 that is adopted in each national jurisdiction, as there is no commonly accepted age of criminal responsibility in international or European legislative or policy documents.Footnote 30 In order to determine this age it should be assessed “whether a child, by virtue of her or his individual discernment and understanding, can be held responsible for essentially anti-social behaviour”.Footnote 31
In Belgium, for instance, the Youth Protection Act of 1965 states that minors cannot be put on a par with adults with regard to the degree of liability and the consequences of their actions (Preamble, para 4). However, if a minor commits an ‘act that is described as a crime’ they should be made aware of the consequences of that offence. As a result, the Youth Protection Act imposes other measures, including supervision, education, disciplinary measures, guidance, advice or support instead of the punishments of the Criminal Code.Footnote 32 Measures can be imposed on parents or on the minors themselves. The age of the minor in question is taken into account; different measures will be imposed before and after the age of 12 years (Article 37). If possible, the judge may give preference to victim-offender mediation (Article 37bis).
-
2.
Civil liability
In addition to potential criminal liability, depending on the system of law of a particular country, minors may be held civilly liable for ‘wrongful acts’ or acts that have caused damage. In order to assess whether this will be the case in a specific situation, a child’s age and maturity will be taken into account to determine whether he or she had the ability to discern the scope of his or her actions. In Belgium, for instance, judges have held that this may be as early as the age of seven.Footnote 33 On the basis of Article 1382 and 1383 of the Belgian Civil Code, to be held liable the victim must prove the offence and the causal link with the damage that this offence has caused. This entails that the offender has not acted as a normal, reasonable and careful person that he or she acted freely and consciously and that he or she must have been able to foresee that his or her behaviour would cause damage to the victim.Footnote 34 Judges will need to evaluate this element of foresee ability, taking into account the specific and concrete circumstances of each case. One may wonder, for instance in the case of sexting, whether minors can reasonably foresee the consequences of their actions. It is conceivable that it is hard for minors (or even adults) to grasp what it means to forward or post an intimate picture of someone else, as the loss of control over content that is made public in the digital sphere is so vast and irreversible.
-
3.
Liability of parents and teachers
Moreover, in certain circumstances parents and teachers may be held liable for the acts of their children or pupils. In Belgium, for parents as well as teachers an assumption of liability has been included in Article 1384 of the Civil Code. This means that, in order not to be held liable, the parents and teachers in question must prove that they did not commit a mistake in raising or supervising the child.Footnote 35 Walrave et al. have argued that supervision with regard to a child’s activities online is very difficult and advocate evolving towards a liability system without fault that would require an obligatory insurance.Footnote 36
3.3 Reflections
First of all, it is important to emphasise that many cases that may be perceived as involving a peer-to-peer risk will not fall inside the scope of the legislative framework because they lack gravity (even if the victim in question may experience harm). Second, whereas in theory it is possible to apply existing legislation to peer-to-peer risks in SNS, in practice the enforcement may run into various obstacles, rendering the law ineffective, or the side-effects may be undesirable. In addition it may be argued that with regard to such risks the application of criminal law provisions and the use of court procedures should be considered an ultimum remedium,Footnote 37 and be limited to very serious cases, where malignant intent is undeniable and the (moral) damage significant. Other types of intervention, both ex ante and ex post, will in most cases be more appropriate and effective.
4 The Use of Self- and Co-regulation
Policies aimed at a safer Internet for children have over the past 15 years put significant emphasis of alternative regulatory instruments such as self- and co-regulation.Footnote 38 , Footnote 39 This was again confirmed in the Commission Communication on a European strategy for a better Internet for children of May 2012, which stated that “[l]egislation will not be discarded, but preference will be given to self-regulation, which remains the most flexible framework for achieving tangible results in this area”.Footnote 40 Furthermore, the Commission underlined that “[o]ngoing effective industry self-regulation for the protection and empowerment of young people, with the appropriate benchmarks and independent monitoring systems in place, is needed to build trust in a sustainable and accountable governance model that could bring more flexible, timely and market-appropriate solutions than any regulatory initiatives”.Footnote 41
Examples of ‘ongoing’ industry self-regulation are the Safer Social Networking Principles for Europe,Footnote 42 the CEO CoalitionFootnote 43 and the ICT Coalition,Footnote 44 three ‘coalitions’ that consist of different constellations of companies (some companies, such as Facebook, are a member of all three coalitions). They put forward largely similar principles, albeit with different emphasis, to make the Internet in general, or SNS in particular, safer for children, such as the promotion of privacy-friendly default settings, age-appropriate content, reporting mechanisms, content classification and parental controls.
The reference to the need for independent monitoring systems with regard to self-regulatory initiatives in the Commission Communication is crucial. Up until now in reality the results of the coalitions’ work leave significant room for improvement. Independent assessments of the implementation of the Safer Social Networking Principles for instance have shown that with regard to reporting mechanisms, in 2010, only 9 out of 22 sites responded to complaints submitted by minors asking for help,Footnote 45 and in 2011, only 17 out of 23 services responded to complaints or reports, sometimes taking up to 10 days to do so.Footnote 46 The results of the CEO Coalition were assessed in July 2012 and in 2013. The conclusion of these assessments was that progress can be observed, but that tangible results remain limited.Footnote 47
The results of these evaluations raise the question of the effectiveness of this type of regulatory initiative: although the commitment of the SNS providers to take steps to make their services safer is to be applauded, the concrete implementation of such safety measures is of course crucial in order to achieve actual protection. It is our view that the European Commission should play a role in observing and guiding the various existing initiatives in order to avoid fragmentation, discrepancies or contradictions, and should consider moving towards a stronger co-regulatoryFootnote 48 framework if independent evaluations keep demonstrating that self-regulation does not reach the policy objectives in this area.
In addition to monitoring and evaluating self- (and/or co-)regulatory systems in this domain, it is, very important, from a human rights perspective, to be aware that if such systems have an impact on fundamental rights, such as freedom of expression and the right to privacy,Footnote 49 certain safeguards or procedural guarantees, laid down for instance in the European Convention on Human Rights (ECHR), need to be respected.Footnote 50 It has been emphasised by the Council of Europe Committee of Ministers in its Recommendation on the protection of human rights with regard to social networking services that it is important that “procedural safeguards are respected by these mechanisms, in line with the right to be heard and to review or appeal against decisions, including in appropriate cases the right to a fair trial, within a reasonable time, and starting with the presumption of innocence”.Footnote 51
5 Empowerment Strategies
Influenced by increasingly available high-quality empirical social science research, such as the EU Kids Online project, the debate on the ‘regulation’ of the digital and social media environment to protect minors has shifted its focus away from legislation and regulation towards empowerment and the improvement of digital skills and media literacy over the past 5 years. As Livingstone et al. have emphasised: “[w]hile recognising that measures to reduce specific risks have their place, it is also important to develop strategies to build children’s resilience and to provide resources which help children to cope with or recover from the effects of harm”.Footnote 52 Moreover, “the more that children are equipped to work out solutions for themselves – through skills, greater resilience or access to online resources to support them – the less others will need to step into guide or restrict their online activities”.Footnote 53
Policy documents in this area at different levels highlight the importance of empowering children and young people. The Council of Europe already issued a Recommendation on empowering children in the new information and communications environment in 2006.Footnote 54 More recently, the OECD Council Recommendation on the protection of children online, for instance, stated that “policies to protect children online should empower children and parents to evaluate and minimise risks and engage online in a secure, safe and responsible manner”.Footnote 55 Furthermore, in its Strategy for a better Internet for children the European Commission very clearly emphasises that “[r]egulation remains an option, but, where appropriate, it should preferably be avoided, in favour of more adaptable self-regulatory tools, and of education and empowerment”.Footnote 56
A number of empowerment strategies could help reduce peer-to-peer risks in SNS.
-
1.
Improving media literacy skills
Media literacyFootnote 57 and skills are of the utmost importance to children’s use of the Internet.Footnote 58 In the context of SNS, media literacy has been argued to be especially important “in order to make the users aware of their rights when using these tools, and also help them acquire or reinforce human rights values and develop the behaviour necessary to respect other people’s rights and freedoms”.Footnote 59 With regard to peer-to-peer risks such as bullying or sexting, this last element is of particular importance. This relates to a basic principle that children are taught in the offline world as well: ‘do not do to others what you would not want others do to you’. This should also be a golden rule with regard to SNS, but for children and young people it is much more difficult to estimate the consequences and potential grave impact of their actions in this environment. Hence, raising awareness of children from a very early age about the particular characteristics of SNS and the potential long-term impact of a seemingly trivial act is crucial. Furthermore, children are often completely unaware of a number of basic legal principles, such as portrait rights or the right to privacy. However, it is crucial that they have a clear understanding of the fact that certain acts in SNS may have legal implications, and this should be conveyed to them in an age-appropriate, clear and understandable manner.
-
2.
Providing information
The idiom ‘knowledge is power’ is often used in relation to the information society. It is undeniable that if we want to empower children and young people to act appropriately in SNS, providing them with information is essential. Not only parents and teachers can play a role in this. SNS providers should provide understandable and accessible information about the types of behaviour that are not tolerated in their networks or that may infringe on legal provisions.Footnote 60 This is now often included in the Terms and Conditions section of their network. However, these Terms and Conditions remain notoriously unread and un-understood.
“Rais[ing] awareness of safety education messages and acceptable use policies to users, parents, teachers and carers in a prominent, clear and age-appropriate manner” is the first principle of the Safer Social Networking Principles (supra). An independent assessment of the implementation of this principle found that whereas safety information is often available (although only in half of the cases easy to find) on SNS, the Terms of Use, Community guidelines, Statement of Rights and Responsibilities and/or House rules are “either difficult to access and/or difficult to understand, especially for younger audiences”.Footnote 61 There are, however, SNS that provide child-friendly versions of the Terms of Use, sometimes even presented in audio–visual format. Given the importance of this information, not only with regard to peer-to-peer risks but for instance also with regard to the protection of personal data and privacy, SNS providers should be encouraged to adopt innovative strategies to make children read and above all understand their Terms of Use. Empirical research on such strategies is urgently needed.
-
3.
Providing efficient reporting mechanisms
Whereas the provision of information usually takes place before certain acts are carried out (ex ante), reporting mechanisms allow users to complain about certain content or report about conduct or content ex post. With regard to social media, the use of reporting mechanisms is increasingly promoted. The Council of Europe, for example, has emphasised that in order to protect children and young people against harmful content and behaviour “while not being required to control, supervise and/or rate all content uploaded by its users,Footnote 62 social networking service providers may be required to adopt certain precautionary measures (for example, comparable to ‘adult content’ rules applicable in certain member States) or take diligent action in response to complaints (ex-post moderation)”.Footnote 63 To do this, the setting up of easily accessible reporting mechanisms is actively encouraged.Footnote 64 The CEO Coalition (supra) also put forward the development of simple and robust reporting tools for users as one of its action points, and the provision of such tools is one of the core Safer Social Networking Principles as well. In addition, the European Commission has advocated the establishment and deployment of reporting tools for users, and added that for children in particular, these mechanisms should be “visible, easy to find, recognisable, accessible to all and available at any stage of the online experience where a child may need it”.Footnote 65
With regard to peer-to-peer risks, such as sexting or cyberbullying the importance of mechanisms to report behaviour or acts that are experienced as being harmful or hurtful cannot be overestimated. At the moment, research shows that the use of these tools by children is still rather low. The EU Kids Online study found for instance that only 9 % of those upset by bullying messages have used the available reporting tools, leaving significant scope for awareness-raising concerning availability and use.Footnote 66 SNS providers, however, seem to be increasingly committed to providing users with reporting possibilities.Footnote 67 , Footnote 68 Of course, in addition to making such tools available it is also essential that if SNS providers receive complaints about problematic peer-to-peer behaviour they promptly act upon them,Footnote 69 provide support for the victims, warn the offenders that this type of behaviour is not tolerated and apply sanctions if necessary. Such sanctions (such as removing content, suspending or deleting accounts) are often included in the Terms and Conditions, another reason why it is very important that steps be taken to ensure that users are aware of these terms and that they understand them.
Moreover, the action that is taken by a SNS provider should be carefully considered. First, with regard to the removal of content there should there be transparent procedures that include the possibility to appeal certain decisions in order to keep private censorship at bay. Second, with regard to serious cases, where actual harm seems to occur,Footnote 70 SNS providers should cooperate with other actors such as law enforcement agencies (LEA). Whereas many SNS providers are already working together with LEA, it is important that the criteria that are used to assess content and to decide whether to escalate reports to LEA are made very clear.Footnote 71 Assessing to what extent certain behaviour has actual legal implications should not and cannot be left to private actors.
-
4.
Peer-to-peer strategies
In order to address peer-to-peer risks, advantage could also be taken from peer-to-peer opportunities, such as peer mentoring schemes,Footnote 72 peer-based learningFootnote 73 or peer education.Footnote 74 In such schemes (usually older) children provide support and advice to other (younger) children, based on the idea that they may be better able to get a certain message across than parents or teachers.
Currently, these types of systems are being promoted with regard to the online environment, for instance by the European Commission in its European strategy for a better Internet for children.Footnote 75 In some member states initiatives have already been taken, such as the CybermentorsFootnote 76 project in the United Kingdom, which is an online forum where ‘cybermentors’ chat with their peers about negative online experiences such as cyberbullying and provide support for each other.Footnote 77
Peer-monitoring or peer support mechanisms have been used for some time to address traditional bullying, and have generally been proven to be effective in reducing bullying, empowering children and creating more positive peer relations, for instance in a school environment.Footnote 78 However, some scholars have warned that such schemes may also have unintended consequences, such as reinforcement of aggressive behaviour and thus an increase in bullying, when implemented in certain circumstances and that their implementation should thus be carefully considered.Footnote 79 Empirical research into the uptake and success of these types of systems to reduce peer-to-peer risks in the SNS environment should be encouraged.
6 Conclusion
In the context of the protection of children and young people in the digital environment, multi-stakeholder involvement has long been put forward as a key principle. It should also be considered as such with regard to peer-to-peer risks. In many cases that involve such risks legal, and certainly criminal, action is not desirable. Moreover, although certain acts may fall within the scope of the legislative framework, the enforcement thereof, where warranted, may run into practical obstacles that undermine its effectiveness. Notwithstanding these findings, policy makers at national level need to make clear decisions regarding the application of criminal law to situations where peer-to-peer risks lead to serious harm (such as secondary sexting), taking into account the interests of both minor victims and offenders. Ambiguous situations, which leave doubt as to the possible application of certain criminal law provisions (e.g. with regard to child pornography) to minor offenders should be avoided.
Many steps can be taken, however, to attempt to prevent peer-to-peer risks from occurring: starting from instilling in children from a very early age basic principles such as empathy and respect for one another,Footnote 80 to gradually increasing their media literacy skills, which should include an understanding of the characteristics of the digital environment in general, and SNS environments in particular, as well as a basic insight into and awareness of a number of potential legal implications of certain behaviour. Whereas parents and teachers would seem the most suitable actors to do this, research has found that their capacities are limited,Footnote 81 both in relation to skills as to time. Their efforts should thus be complemented by industry commitment to keep improving their services and providing users with clear information and tools that empower them. In addition, governmental actors must encourage educational institutions and civil society organisations to implement empowerment strategies and provide them with the resources to do so.
Given the importance of providing children with a positive online environment, in our view, policy makers should consider establishing strong co-regulatory mechanisms in this context. Such mechanisms can take various forms and can be organised at different levels, but should at least entail that all initiatives that are taken are evaluated independently, and that there are safety-net procedures if these evaluations show that the actors that are involved do not take up their responsibility. Although the European Commission hints at such an approach in its 2012 European strategy on a better Internet for children, by referring to considering regulatory or legislative measures if industry initiatives fail to deliver,Footnote 82 this remains too vague and open-ended. A transparent co-regulatory framework, with an unambiguous division of responsibilities, strong incentives to comply and clearly defined evaluation criteria, would lead to more accountability and certainty for all actors involved and would thus, in our view, be in everyone’s best interest.
Finally, it remains crucial that both quantitative and qualitative empirical research is undertaken in this domain. A comprehensive and efficient strategy to reduce risks and empower young users can only be developed on the basis of sound evidence on the occurrence of certain practices, the actual harm they cause, and the concrete impact of initiatives of different actors.
Notes
- 1.
Facebook statistics: www.facebook.com/press/info.php?statistics. Statistics for the end of December 2013.
- 2.
Livingstone et al. 2011b, p. 1, www2.lse.ac.uk/media@lse/research/EUKidsOnline/ShortSNS.pdf.
- 3.
- 4.
- 5.
Internet Safety Technical Task Force 2008, p. 33, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf.
- 6.
Lampert and Donoso 2012, p. 147.
- 7.
Lievens 2010, Article 4.
- 8.
Staksrud et al. 2013, pp. 40, 48.
- 9.
Staksrud et al. 2013, p. 41.
- 10.
See also European Commission 2012, p. 5, http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0196:FIN:EN:PDF.
- 11.
Hasebrink et al. 2009, http://eprints.lse.ac.uk/24368/1/D3.2_Report-Cross_national_comparisons-2nd-edition.pdf, p. 24.
- 12.
Barbovschi et al. 2012, pp. 177 and 186: “The EU Kids Online findings show that ‘stranger danger’, although high on the Internet safety agenda, affects only a few children in Europe.”
- 13.
Internet Safety Technical Task Force 2008, p. 4; Livingstone et al. 2011a, www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20II%20(2009-11)/EUKidsOnlineIIReports/D4FullFindings.pdf, p. 6.
- 14.
Ringrose et al. 2012, p. 9.
- 15.
- 16.
They have been called ‘bully-victims’. Other additional roles children may adopt in a bullying situation have also been identified: e.g. assistants, reinforcers, defenders, onlookers. Levy et al. 2012, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/FINAL_BTWF_LitReview_091212-1.pdf, p. 15.
- 17.
- 18.
Levy et al. 2012, p. 15.
- 19.
When looking at sexting from a legal perspective it is helpful to distinguish between primary and secondary types of sexting; the first meaning that minors take pictures of themselves and share these pictures with their peers themselves, the second meaning that someone forwards or further shares a picture that was sent to him by a person that took a picture of him or herself. Whereas primary sexting can be consensual (unless of course it is the result of coercion), secondary sexting is likely not to be consensual, but rather part of a revenge action (for instance by a previous love interest) or bullying behaviour, and may have a grave impact on the person in the image.
- 20.
Ringrose et al. 2012, p. 26.
- 21.
A recent example of how fast information that is shared by teenagers on an SNS can spread and how this may lead to unintended and unforeseen consequences is the Project X Haren Party case in the Netherlands. A party invitation of a teenage girl on Facebook that was not set to private on the event page went viral, attracted several thousands of youngsters and ended in riots. For more information, cf. www.bbc.co.uk/news/world-europe-19684708.
- 22.
- 23.
In Belgium, for instance, according to Article 1124 of the Civil Code, minors are in principle legally incapable of entering into contracts. In practice, however, courts will take the level of discernment of the minor in question into account when deciding upon the nullity of contracts.
- 24.
In Belgium, the Act of 13 June 2005 on electronic communications contains an article, which criminalises ‘harassment by electronic communication means’ (Article 145 §3bis).
- 25.
Schmitz and Siry 2011, Article 3, p. 9. Note that whereas cases of secondary sexting (cf. n. 19) could be more problematic and may cause actual harm, the question remains whether this type of ‘offenses’ should be dealt with on the basis of the criminal provisions that are aimed at fighting child pornography. A new, carefully tailored legal provision, in addition to the use of empowerment strategies (discussed below) may be more appropriate to address cases where malignant intent is undeniable and the (moral) damage significant.
- 26.
Livingstone and Görzig 2012, p. 152.
- 27.
Van der Hof and Koops 2011, pp. 16–17, 19, 23.
- 28.
However, in a case in France, a judge declared himself competent in a dispute concerning Facebook (Court of Appeal of Pau, First Chamber, Judgement of 23 March 2012, www.legalis.net/spip.php?page=breves-article&id_article=3382 [in French]). It remains to be seen whether this will be upheld in the future.
- 29.
Van Bueren 2007, p. 58. Cf., Article 40 §3 United Nations Convention on the Rights of the Child: “States Parties shall seek to promote the establishment of laws, procedures, authorities and institutions specifically applicable to children alleged as, accused of, or recognized as having infringed the penal law, and, in particular: (a) The establishment of a minimum age below which children shall be presumed not to have the capacity to infringe the penal law.”
- 30.
Van Bueren 2007, p. 106.
- 31.
United Nations Standard Minimum Rules for the Administration of Juvenile Justice ("The Beijing Rules"), 1985, www.un.org/documents/ga/res/40/a40r033.htm.
- 32.
Cf. Article 40 §3 United Nations Convention on the Rights of the Child: “(b) Whenever appropriate and desirable, measures for dealing with such children without resorting to judicial proceedings, providing that human rights and legal safeguards are fully respected. 4. A variety of dispositions, such as care, guidance and supervision orders; counselling; probation; foster care; education and vocational training programmes and other alternatives to institutional care shall be available to ensure that children are dealt with in a manner appropriate to their well-being and proportionate both to their circumstances and the offence.”
- 33.
Walrave et al. 2009, www.internet-observatory.be/internet_observatory/pdf/brochures/Boek_cyberpesten_nl.pdf, pp. 101–102.
- 34.
Walrave et al. 2009, p. 102.
- 35.
Walrave et al. 2009, pp. 103–111.
- 36.
Walrave et al. 2009, p. 107.
- 37.
Van der Hof and Koops 2011, p. 13.
- 38.
Lievens 2010, p. 208. Cf. also recital 44 of the Audiovisual Media Services Directive.
- 39.
For a comprehensive overview of policy history in this field, Lievens 2010.
- 40.
European Commission 2012, p. 6.
- 41.
European Commission 2012, p. 16.
- 42.
European Social Networking Task Force 2009, http://ec.europa.eu/information_society/activities/social_networking/docs/sn_principles.pdf.
- 43.
Coalition to make the Internet a better place for kids 2011, Statement of purpose and work plan. http://ec.europa.eu/information_society/activities/sip/docs/ceo_coalition_statement.pdf.
- 44.
ICT Coalition 2012.
- 45.
Staksrud and Lobe 2010, http://ec.europa.eu/information_society/activities/social_networking/docs/final_report/first_part.pdf, p. 8.
- 46.
- 47.
- 48.
Lievens 2010.
- 49.
An example of such a situation may be where content is blocked, filtered or removed by a SNS provider.
- 50.
Lievens 2010.
- 51.
Council of Europe, Recommendation CM/Rec(2012)4 of the Committee of Ministers to member States on the protection of human rights with regard to social networking services, https://wcd.coe.int/ViewDoc.jsp?id=1929453&Site=CM.
- 52.
- 53.
Livingstone and Haddon 2012, p. 8.
- 54.
Council of Europe, Recommendation Rec(2006)12 of the Committee of Ministers to member states on empowering children in the new information and communications environment, https://wcd.coe.int/ViewDoc.jsp?Ref=Rec(2006)12&Sector=secCM&Language=lanEnglish&Ver=original&BackColorInternet=9999CC&BackColorIntranet=FFBB55&BackColorLogged=FFAC75.
- 55.
OECD Council 2012.
- 56.
European Commission 2012, p. 2.
- 57.
Media literacy has been defined as the “ability to access the media, to understand and to critically evaluate different aspects of the media and media contents and to create communications in a variety of contexts” in the Commission Communication on A European approach to media literacy in the digital environment: European Commission, Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, A European approach to media literacy in the digital environment, COM(2007) 833 final, http://ec.europa.eu/culture/media/literacy/docs/com/en.pdf.
- 58.
European Commission 2012, p. 8.
- 59.
Council of Europe 2012 at point 4.
- 60.
See also: Council of Europe 2012 at point 10: “member States should take appropriate measures to ensure children and young people’s safety and protect their dignity while also guaranteeing procedural safeguards and the right to freedom of expression and access to information, in particular by engaging with social networking providers to carry out the following actions: provide clear information about the kinds of content or content-sharing or conduct that may be contrary to applicable legal provisions; […]”.
- 61.
Donoso 2011a, at p. 8.
- 62.
Please note that on the basis of Article 15 of the E-Commerce Directive hosting providers do not have a general obligation to monitor content or search for illegal activities. In this context the European Court of Justice confirmed that Netlog, a SNS based in Belgium, could not be obliged to install a filtering/blocking system in order to prevent the unlawful use of musical and audiovisual works (European Court of Justice, SABAM v. Netlog, C-360-10. 16 February 2012).
- 63.
Council of Europe 2012 at point 8.
- 64.
Council of Europe 2012 at point 10.
- 65.
European Commission 2012, p. 10.
- 66.
Livingstone et al. 2012, p. 5.
- 67.
- 68.
Please note that there are also initiatives by NGOs and law enforcement, which enable young people to report illegal or harmful behaviour, for instance, https://www.ecops.be/ in Belgium and http://www.meldknop.nl/ in The Netherlands.
- 69.
- 70.
For instance, in cases of secondary sexting. A recent example occurred in Belgium, when suggestive (webcam) pictures of teenage girls were posted on a Facebook page titled ‘Antwerp whores’; for more information www.expatica.com/be/news/belgian-news/Antwerp-whores-Facebook-fan-page-under-investigation-_254445.html.
- 71.
X 2012b, p. 2.
- 72.
Görzig 2011, p. 1.
- 73.
- 74.
European Commission 2012, p. 9.
- 75.
European Commission 2012, p. 9.
- 76.
See: www.cybermentors.org.uk/.
- 77.
Hathcote and Hogan 2011, p. 103.
- 78.
Van der Zwaan et al. 2010, http://bnaic2010.uni.lu/Papers/Category%20A/Zwaan_et_al.pdf, p. 1; Hinduja 2010, http://cyberbullying.us/blog/peer-mentoring-as-a-strategy-to-address-cyberbullying.html; Banerjee et al. 2010, www.sussex.ac.uk/Users/robinb/bbreportsummary.pdf, p. 4; Cowie 2012, http://surrey.academia.edu/HelenCowie/Papers/1306578/Peer_support_systems_to_counteract_bullying, p. 6.
- 79.
Bradshaw and Waasdorp 2012, www.stopbullying.gov/at-risk/groups/lgbt/white_house_conference_materials.pdf, p. 47; Boyd and Palfrey 2012, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Necessary_Info.pdf, point 9.
- 80.
- 81.
Livingstone and Haddon 2012, p. 9.
- 82.
European Commission 2012, pp. 10–13.
References
Banerjee R, Robinson C, Smalley D (2010) Evaluation of the beatbully peer mentoring programme. www.sussex.ac.uk/Users/robinb/bbreportsummary.pdf
Barbovschi M, Marinescu V, Velicu A, Laszlo E (2012) Meeting new contacts online. In: Livingstone S, Haddon L, Görzig A (eds) Children, risk and safety on the internet. The Policy Press, Bristol, pp 177–189
Baym NK, Boyd D (2012) Socially mediated publicness: an introduction. J Broadcast Electron Media 56:320–329
boyd d (2008) Taken out of context: American teen sociality in networked publics. Ph.D. thesis. University of California, Berkeley. www.danah.org/papers/TakenOutOfContext.pdf
boyd d (2012) Three conversations for parents: navigating networked publics. www.aplatformforgood.org/blog/entry/three-conversations-for-parents-navigating-networked-publics
boyd d , Palfrey J (2012) What you must know to help combat youth bullying, meanness, and cruelty. http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Necessary_Info.pdf
Bradshaw C, Waasdorp T (2012) Effective strategies in combating bullying. White paper prepared for the White House Conference on bullying prevention, pp 43–49. www.stopbullying.gov/at-risk/groups/lgbt/white_house_conference_materials.pdf
Coalition to make the Internet a better place for kids (2011) Statement of purpose and work plan. http://ec.europa.eu/information_society/activities/sip/docs/ceo_coalition_statement.pdf
Council of Europe (2006) Recommendation Rec(2006)12 of the Committee of Ministers to member states on empowering children in the new information and communications environment. https://wcd.coe.int/ViewDoc.jsp?Ref=Rec(2006)12&Sector=secCM&Language=lanEnglish&Ver=original&BackColorInternet=9999CC&BackColorIntranet=FFBB55&BackColorLogged=FFAC75
Council of Europe (2012) Recommendation CM/Rec(2012)4 of the Committee of Ministers to member states on the protection of human rights with regard to social networking services. https://wcd.coe.int/ViewDoc.jsp?id=1929453&Site=CM
Cowie H (2012) Peer support systems to counteract bullying. http://surrey.academia.edu/HelenCowie/Papers/1306578/Peer_support_systems_to_counteract_bullying
De Zwart M, Lindsay D, Henderson M and Philips M (2011) Teenagers, legal risks & social networking sites. http://newmediaresearch.educ.monash.edu.au/moodle/pluginfile.php/2117/mod_label/intro/SNSandRisks_REPORT.pdf
Donoso V (2011a) Assessment of the implementation of the safer social networking principles for the EU on 14 websites: Summary report. http://ec.europa.eu/information_society/activities/social_networking/docs/final_report_11/part_one.pdf
Donoso V (2011b) Assessment of the implementation of the safer social networking principles for the EU on 9 services: Summary report. http://ec.europa.eu/information_society/activities/social_networking/docs/final_reports_sept_11/report_phase_b_1.pdf
European Commission (2007) Communication from the Commission to the European Parliament, the council, the European Economic and Social Committee and the Committee of the Regions. A European approach to media literacy in the digital environment, COM(2007) 833 final. http://ec.europa.eu/culture/media/literacy/docs/com/en.pdf
European Commission (2012) Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. European strategy for a better internet for children, COM(2012) 196 final. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0196:FIN:EN:PDF
European Social Networking Task Force (2009) Safer social networking principles for the EU. http://ec.europa.eu/information_society/activities/social_networking/docs/sn_principles.pdf
Görzig A (2011) Who bullies and who is bullied online?: a study of 9–16 year old internet users in 25 European countries. EU kids online, London. http://eprints.lse.ac.uk/39601/1/Who%20bullies%20and%20who%20is%20bullied%20online%20%28LSERO%29.pdf
Hasebrink U, Livingstone S, Haddon L, Ólafsson K (2009) Comparing children’s online opportunities and risks across Europe: cross-national comparisons for EU kids online, 2nd edn. Deliverable D3.2. LSE, EU kids online, London. http://eprints.lse.ac.uk/24368/1/D3.2_Report-Cross_national_comparisons-2nd-edition.pdf
Hathcote A, Hogan K (2011) Resource guide on cyberbullying. Preventing Sch Fail Altern Educ Child youth 55:102–104
Hinduja S (2010) Peer mentoring as a strategy to address cyberbullying. http://cyberbullying.us/blog/peer-mentoring-as-a-strategy-to-address-cyberbullying.html
ICT Coalition (2012) http://www.ictcoalition.eu
Internet Safety Technical Task Force (2008) Enhancing child safety and online technologies: final report of the ISTTF to the multi-state working group on social networking of state attorney generals of the United States. Berkman Center for Internet and Society. http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
Lampert C, Donoso V (2012) Bullying. In: Livingstone S, Haddon L, Görzig A (eds) Children, risk and safety on the internet. The Policy Press, Bristol, pp 141–150
Levy N, Cortesi S, Gasser U, Crowley E, Beaton M, Casey J, Nolan C (2012) Bullying in a networked era: a literature review. http://cyber.law.harvard.edu/publications/2012/kbw_bulling_in_a_networked_era
Lievens E (2010) Protecting children in the digital era: the use of alternative regulatory instruments. Martinus Nijhoff Online, Leiden
Livingstone S, Görzig A (2012) ‘Sexting’: the exchange of sexual messages online among European youth. In: Livingstone S, Haddon L, Görzig A (eds) Children, risk and safety on the internet. The Policy Press, Bristol, pp 151–164
Livingstone S, Haddon L (2012) Theoretical framework for children’s internet use. In: Livingstone S, Haddon L, Görzig A (eds) Children, risk and safety on the internet. The Policy Press, Bristol, pp 1–14
Livingstone S, Haddon L, Görzig A, Ólafsson K (2011a) Risks and safety on the internet: the perspective of European children: full findings. EU kids online, London. www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20II%20(2009-11)/EUKidsOnlineIIReports/D4FullFindings.pdf
Livingstone S, Ólafsson K, Staksrud E (2011b) Social networking, age and privacy. EU kids online, London. www2.lse.ac.uk/media@lse/research/EUKidsOnline/ShortSNS.pdf
Livingstone S, Ólafsson K, O’Neill B, Donoso V (2012) Towards a better internet for children. EU kids online, London. www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/EUKidsOnlinereportfortheCEOCoalition.pdf
OECD Council (2012) The Protection of Children Online: Recommendation of the OECD Council. http://www.oecd.org/sti/ieconomy/childrenonline_with_cover.pdf
Ringrose J, Gill R, Livingstone S, Harvey L (2012) A qualitative study of children, young people and ‘sexting’—a report prepared for the NSPCC. www.nspcc.org.uk/Inform/resourcesforprofessionals/sexualabuse/sexting-research-report_wdf89269.pdf
Sacco DT, Argudin R, Maguire J, Tallon (2010) Sexting: youth practices and legal implications. Cyberlaw clinic, Harvard Law School. http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Sacco_Argudin_Maguire_Tallon_Sexting_Jun2010.pdf
Schmitz S, Siry L (2011) Teenage folly or child abuse? state responses to ‘sexting’ by minors in the U.S. and Germany. Policy Internet 3:Article 3
Staksrud E and Lobe B (2010) Evaluation of the implementation of the safer social networking principles for the EU, Part 1: general report. http://ec.europa.eu/information_society/activities/social_networking/docs/final_report/first_part.pdf
Staksrud E, Ólafsson K, Livingstone S (2013) Does the use of social networking sites increase children’s risk of harm? Comput Hum Behav 29:40–50
United Nations Standard Minimum Rules for the Administration of Juvenile Justice (1985).The Beijing Rules. www.un.org/documents/ga/res/40/a40r033.htm
Van Bueren G (2007) Child rights in Europe: convergence and divergence in judicial protection. Council of Europe Publishing, Strasbourg
Van der Hof S, Koops B-J (2011) Adolescents and cybercrime: navigating between freedom and control. Policy Internet 3:Article 4
Van der Zwaan J, Dignum V, Jonker C (2010) Simulating peer support for victims of cyberbullying. Paper at the 22nd Benelux conference on artificial intelligence. http://bnaic2010.uni.lu/Papers/Category%20A/Zwaan_et_al.pdf
Walrave M, Demoulin M, Heirman W, Van der Perre A (2009) Onderzoeksrapport cyberpesten [Research report cyberbullying]. www.internet-observatory.be/internet_observatory/pdf/brochures/Boek_cyberpesten_nl.pdf
X (2012a) Report of mid-term review meeting of the CEO coalition to make the Internet a better place for kids. http://ec.europa.eu/information_society/activities/sip/docs/ceo_coalition/report_11_july.pdf
X (2012b) Action 1 simple and robust reporting tools for users progress report. http://ec.europa.eu/information_society/activities/sip/docs/ceo_coalition/reporting_tools_progress_report.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 © T.M.C. Asser Press, The Hague, The Netherlands, and the author(s)
About this chapter
Cite this chapter
Lievens, E. (2014). Children and Peer-to-Peer Risks in Social Networks: Regulating, Empowering or a Little Bit of Both?. In: van der Hof, S., van den Berg, B., Schermer, B. (eds) Minding Minors Wandering the Web: Regulating Online Child Safety. Information Technology and Law Series, vol 24. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-005-3_11
Download citation
DOI: https://doi.org/10.1007/978-94-6265-005-3_11
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-94-6265-004-6
Online ISBN: 978-94-6265-005-3
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)