Abstract
Social networking services (SNS) are an important part of many children and teenagers’ media use. As they communicate and share content by means of these services, minors may also engage in more risky behaviour, leading to reciprocal harassment which may blur the lines between victims and offenders to a greater extent than in the offline world. However, due to the specific nature of SNS, the use, and especially the implementation and enforcement of, traditional types of legislation are confronted with many obstacles. After identifying certain legal implications, this chapter examines the potential of alternative regulatory mechanisms and empowerment techniques (co-regulation, technical tools, media literacy, information provision mechanisms). The goal is to provide guidelines for the development of regulatory strategies which reduce peer-to-peer conduct and content risks in user-centric environments for children and young people while safeguarding fundamental rights and public interest goals.
Social media mirror, magnify and complicate countless aspects of everyday life, bringing into question practices that are presumed stable and shedding light on contested social phenomena.
Nancy K. Baym and Danah Boyd (Baym and Boyd 2012, p. 320).
Dr. Eva Lievens is a Senior Research Fellow of the Research Fund Flanders at the Interdisciplinary Centre for Law and ICT—KU Leuven—iMinds.
The research findings presented in this chapter are the result of her research project “Risk-reducing regulatory strategies for illegal and harmful conduct and content in online social network sites” (Postdoctoral research project funded by the Research Fund Flanders; www.fwo.be). The author wishes to thank Simone van der Hof and Bart Schermer for their valuable comments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Facebook statistics: www.facebook.com/press/info.php?statistics. Statistics for the end of December 2013.
- 2.
Livingstone et al. 2011b, p. 1, www2.lse.ac.uk/media@lse/research/EUKidsOnline/ShortSNS.pdf.
- 3.
- 4.
- 5.
Internet Safety Technical Task Force 2008, p. 33, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf.
- 6.
Lampert and Donoso 2012, p. 147.
- 7.
Lievens 2010, Article 4.
- 8.
Staksrud et al. 2013, pp. 40, 48.
- 9.
Staksrud et al. 2013, p. 41.
- 10.
See also European Commission 2012, p. 5, http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0196:FIN:EN:PDF.
- 11.
Hasebrink et al. 2009, http://eprints.lse.ac.uk/24368/1/D3.2_Report-Cross_national_comparisons-2nd-edition.pdf, p. 24.
- 12.
Barbovschi et al. 2012, pp. 177 and 186: “The EU Kids Online findings show that ‘stranger danger’, although high on the Internet safety agenda, affects only a few children in Europe.”
- 13.
Internet Safety Technical Task Force 2008, p. 4; Livingstone et al. 2011a, www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20II%20(2009-11)/EUKidsOnlineIIReports/D4FullFindings.pdf, p. 6.
- 14.
Ringrose et al. 2012, p. 9.
- 15.
- 16.
They have been called ‘bully-victims’. Other additional roles children may adopt in a bullying situation have also been identified: e.g. assistants, reinforcers, defenders, onlookers. Levy et al. 2012, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/FINAL_BTWF_LitReview_091212-1.pdf, p. 15.
- 17.
- 18.
Levy et al. 2012, p. 15.
- 19.
When looking at sexting from a legal perspective it is helpful to distinguish between primary and secondary types of sexting; the first meaning that minors take pictures of themselves and share these pictures with their peers themselves, the second meaning that someone forwards or further shares a picture that was sent to him by a person that took a picture of him or herself. Whereas primary sexting can be consensual (unless of course it is the result of coercion), secondary sexting is likely not to be consensual, but rather part of a revenge action (for instance by a previous love interest) or bullying behaviour, and may have a grave impact on the person in the image.
- 20.
Ringrose et al. 2012, p. 26.
- 21.
A recent example of how fast information that is shared by teenagers on an SNS can spread and how this may lead to unintended and unforeseen consequences is the Project X Haren Party case in the Netherlands. A party invitation of a teenage girl on Facebook that was not set to private on the event page went viral, attracted several thousands of youngsters and ended in riots. For more information, cf. www.bbc.co.uk/news/world-europe-19684708.
- 22.
- 23.
In Belgium, for instance, according to Article 1124 of the Civil Code, minors are in principle legally incapable of entering into contracts. In practice, however, courts will take the level of discernment of the minor in question into account when deciding upon the nullity of contracts.
- 24.
In Belgium, the Act of 13 June 2005 on electronic communications contains an article, which criminalises ‘harassment by electronic communication means’ (Article 145 §3bis).
- 25.
Schmitz and Siry 2011, Article 3, p. 9. Note that whereas cases of secondary sexting (cf. n. 19) could be more problematic and may cause actual harm, the question remains whether this type of ‘offenses’ should be dealt with on the basis of the criminal provisions that are aimed at fighting child pornography. A new, carefully tailored legal provision, in addition to the use of empowerment strategies (discussed below) may be more appropriate to address cases where malignant intent is undeniable and the (moral) damage significant.
- 26.
Livingstone and Görzig 2012, p. 152.
- 27.
Van der Hof and Koops 2011, pp. 16–17, 19, 23.
- 28.
However, in a case in France, a judge declared himself competent in a dispute concerning Facebook (Court of Appeal of Pau, First Chamber, Judgement of 23 March 2012, www.legalis.net/spip.php?page=breves-article&id_article=3382 [in French]). It remains to be seen whether this will be upheld in the future.
- 29.
Van Bueren 2007, p. 58. Cf., Article 40 §3 United Nations Convention on the Rights of the Child: “States Parties shall seek to promote the establishment of laws, procedures, authorities and institutions specifically applicable to children alleged as, accused of, or recognized as having infringed the penal law, and, in particular: (a) The establishment of a minimum age below which children shall be presumed not to have the capacity to infringe the penal law.”
- 30.
Van Bueren 2007, p. 106.
- 31.
United Nations Standard Minimum Rules for the Administration of Juvenile Justice ("The Beijing Rules"), 1985, www.un.org/documents/ga/res/40/a40r033.htm.
- 32.
Cf. Article 40 §3 United Nations Convention on the Rights of the Child: “(b) Whenever appropriate and desirable, measures for dealing with such children without resorting to judicial proceedings, providing that human rights and legal safeguards are fully respected. 4. A variety of dispositions, such as care, guidance and supervision orders; counselling; probation; foster care; education and vocational training programmes and other alternatives to institutional care shall be available to ensure that children are dealt with in a manner appropriate to their well-being and proportionate both to their circumstances and the offence.”
- 33.
Walrave et al. 2009, www.internet-observatory.be/internet_observatory/pdf/brochures/Boek_cyberpesten_nl.pdf, pp. 101–102.
- 34.
Walrave et al. 2009, p. 102.
- 35.
Walrave et al. 2009, pp. 103–111.
- 36.
Walrave et al. 2009, p. 107.
- 37.
Van der Hof and Koops 2011, p. 13.
- 38.
Lievens 2010, p. 208. Cf. also recital 44 of the Audiovisual Media Services Directive.
- 39.
For a comprehensive overview of policy history in this field, Lievens 2010.
- 40.
European Commission 2012, p. 6.
- 41.
European Commission 2012, p. 16.
- 42.
European Social Networking Task Force 2009, http://ec.europa.eu/information_society/activities/social_networking/docs/sn_principles.pdf.
- 43.
Coalition to make the Internet a better place for kids 2011, Statement of purpose and work plan. http://ec.europa.eu/information_society/activities/sip/docs/ceo_coalition_statement.pdf.
- 44.
ICT Coalition 2012.
- 45.
Staksrud and Lobe 2010, http://ec.europa.eu/information_society/activities/social_networking/docs/final_report/first_part.pdf, p. 8.
- 46.
- 47.
- 48.
Lievens 2010.
- 49.
An example of such a situation may be where content is blocked, filtered or removed by a SNS provider.
- 50.
Lievens 2010.
- 51.
Council of Europe, Recommendation CM/Rec(2012)4 of the Committee of Ministers to member States on the protection of human rights with regard to social networking services, https://wcd.coe.int/ViewDoc.jsp?id=1929453&Site=CM.
- 52.
- 53.
Livingstone and Haddon 2012, p. 8.
- 54.
Council of Europe, Recommendation Rec(2006)12 of the Committee of Ministers to member states on empowering children in the new information and communications environment, https://wcd.coe.int/ViewDoc.jsp?Ref=Rec(2006)12&Sector=secCM&Language=lanEnglish&Ver=original&BackColorInternet=9999CC&BackColorIntranet=FFBB55&BackColorLogged=FFAC75.
- 55.
OECD Council 2012.
- 56.
European Commission 2012, p. 2.
- 57.
Media literacy has been defined as the “ability to access the media, to understand and to critically evaluate different aspects of the media and media contents and to create communications in a variety of contexts” in the Commission Communication on A European approach to media literacy in the digital environment: European Commission, Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions, A European approach to media literacy in the digital environment, COM(2007) 833 final, http://ec.europa.eu/culture/media/literacy/docs/com/en.pdf.
- 58.
European Commission 2012, p. 8.
- 59.
Council of Europe 2012 at point 4.
- 60.
See also: Council of Europe 2012 at point 10: “member States should take appropriate measures to ensure children and young people’s safety and protect their dignity while also guaranteeing procedural safeguards and the right to freedom of expression and access to information, in particular by engaging with social networking providers to carry out the following actions: provide clear information about the kinds of content or content-sharing or conduct that may be contrary to applicable legal provisions; […]”.
- 61.
Donoso 2011a, at p. 8.
- 62.
Please note that on the basis of Article 15 of the E-Commerce Directive hosting providers do not have a general obligation to monitor content or search for illegal activities. In this context the European Court of Justice confirmed that Netlog, a SNS based in Belgium, could not be obliged to install a filtering/blocking system in order to prevent the unlawful use of musical and audiovisual works (European Court of Justice, SABAM v. Netlog, C-360-10. 16 February 2012).
- 63.
Council of Europe 2012 at point 8.
- 64.
Council of Europe 2012 at point 10.
- 65.
European Commission 2012, p. 10.
- 66.
Livingstone et al. 2012, p. 5.
- 67.
- 68.
Please note that there are also initiatives by NGOs and law enforcement, which enable young people to report illegal or harmful behaviour, for instance, https://www.ecops.be/ in Belgium and http://www.meldknop.nl/ in The Netherlands.
- 69.
- 70.
For instance, in cases of secondary sexting. A recent example occurred in Belgium, when suggestive (webcam) pictures of teenage girls were posted on a Facebook page titled ‘Antwerp whores’; for more information www.expatica.com/be/news/belgian-news/Antwerp-whores-Facebook-fan-page-under-investigation-_254445.html.
- 71.
X 2012b, p. 2.
- 72.
Görzig 2011, p. 1.
- 73.
- 74.
European Commission 2012, p. 9.
- 75.
European Commission 2012, p. 9.
- 76.
See: www.cybermentors.org.uk/.
- 77.
Hathcote and Hogan 2011, p. 103.
- 78.
Van der Zwaan et al. 2010, http://bnaic2010.uni.lu/Papers/Category%20A/Zwaan_et_al.pdf, p. 1; Hinduja 2010, http://cyberbullying.us/blog/peer-mentoring-as-a-strategy-to-address-cyberbullying.html; Banerjee et al. 2010, www.sussex.ac.uk/Users/robinb/bbreportsummary.pdf, p. 4; Cowie 2012, http://surrey.academia.edu/HelenCowie/Papers/1306578/Peer_support_systems_to_counteract_bullying, p. 6.
- 79.
Bradshaw and Waasdorp 2012, www.stopbullying.gov/at-risk/groups/lgbt/white_house_conference_materials.pdf, p. 47; Boyd and Palfrey 2012, http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Necessary_Info.pdf, point 9.
- 80.
- 81.
Livingstone and Haddon 2012, p. 9.
- 82.
European Commission 2012, pp. 10–13.
References
Banerjee R, Robinson C, Smalley D (2010) Evaluation of the beatbully peer mentoring programme. www.sussex.ac.uk/Users/robinb/bbreportsummary.pdf
Barbovschi M, Marinescu V, Velicu A, Laszlo E (2012) Meeting new contacts online. In: Livingstone S, Haddon L, Görzig A (eds) Children, risk and safety on the internet. The Policy Press, Bristol, pp 177–189
Baym NK, Boyd D (2012) Socially mediated publicness: an introduction. J Broadcast Electron Media 56:320–329
boyd d (2008) Taken out of context: American teen sociality in networked publics. Ph.D. thesis. University of California, Berkeley. www.danah.org/papers/TakenOutOfContext.pdf
boyd d (2012) Three conversations for parents: navigating networked publics. www.aplatformforgood.org/blog/entry/three-conversations-for-parents-navigating-networked-publics
boyd d , Palfrey J (2012) What you must know to help combat youth bullying, meanness, and cruelty. http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Necessary_Info.pdf
Bradshaw C, Waasdorp T (2012) Effective strategies in combating bullying. White paper prepared for the White House Conference on bullying prevention, pp 43–49. www.stopbullying.gov/at-risk/groups/lgbt/white_house_conference_materials.pdf
Coalition to make the Internet a better place for kids (2011) Statement of purpose and work plan. http://ec.europa.eu/information_society/activities/sip/docs/ceo_coalition_statement.pdf
Council of Europe (2006) Recommendation Rec(2006)12 of the Committee of Ministers to member states on empowering children in the new information and communications environment. https://wcd.coe.int/ViewDoc.jsp?Ref=Rec(2006)12&Sector=secCM&Language=lanEnglish&Ver=original&BackColorInternet=9999CC&BackColorIntranet=FFBB55&BackColorLogged=FFAC75
Council of Europe (2012) Recommendation CM/Rec(2012)4 of the Committee of Ministers to member states on the protection of human rights with regard to social networking services. https://wcd.coe.int/ViewDoc.jsp?id=1929453&Site=CM
Cowie H (2012) Peer support systems to counteract bullying. http://surrey.academia.edu/HelenCowie/Papers/1306578/Peer_support_systems_to_counteract_bullying
De Zwart M, Lindsay D, Henderson M and Philips M (2011) Teenagers, legal risks & social networking sites. http://newmediaresearch.educ.monash.edu.au/moodle/pluginfile.php/2117/mod_label/intro/SNSandRisks_REPORT.pdf
Donoso V (2011a) Assessment of the implementation of the safer social networking principles for the EU on 14 websites: Summary report. http://ec.europa.eu/information_society/activities/social_networking/docs/final_report_11/part_one.pdf
Donoso V (2011b) Assessment of the implementation of the safer social networking principles for the EU on 9 services: Summary report. http://ec.europa.eu/information_society/activities/social_networking/docs/final_reports_sept_11/report_phase_b_1.pdf
European Commission (2007) Communication from the Commission to the European Parliament, the council, the European Economic and Social Committee and the Committee of the Regions. A European approach to media literacy in the digital environment, COM(2007) 833 final. http://ec.europa.eu/culture/media/literacy/docs/com/en.pdf
European Commission (2012) Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions. European strategy for a better internet for children, COM(2012) 196 final. http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2012:0196:FIN:EN:PDF
European Social Networking Task Force (2009) Safer social networking principles for the EU. http://ec.europa.eu/information_society/activities/social_networking/docs/sn_principles.pdf
Görzig A (2011) Who bullies and who is bullied online?: a study of 9–16 year old internet users in 25 European countries. EU kids online, London. http://eprints.lse.ac.uk/39601/1/Who%20bullies%20and%20who%20is%20bullied%20online%20%28LSERO%29.pdf
Hasebrink U, Livingstone S, Haddon L, Ólafsson K (2009) Comparing children’s online opportunities and risks across Europe: cross-national comparisons for EU kids online, 2nd edn. Deliverable D3.2. LSE, EU kids online, London. http://eprints.lse.ac.uk/24368/1/D3.2_Report-Cross_national_comparisons-2nd-edition.pdf
Hathcote A, Hogan K (2011) Resource guide on cyberbullying. Preventing Sch Fail Altern Educ Child youth 55:102–104
Hinduja S (2010) Peer mentoring as a strategy to address cyberbullying. http://cyberbullying.us/blog/peer-mentoring-as-a-strategy-to-address-cyberbullying.html
ICT Coalition (2012) http://www.ictcoalition.eu
Internet Safety Technical Task Force (2008) Enhancing child safety and online technologies: final report of the ISTTF to the multi-state working group on social networking of state attorney generals of the United States. Berkman Center for Internet and Society. http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/ISTTF_Final_Report.pdf
Lampert C, Donoso V (2012) Bullying. In: Livingstone S, Haddon L, Görzig A (eds) Children, risk and safety on the internet. The Policy Press, Bristol, pp 141–150
Levy N, Cortesi S, Gasser U, Crowley E, Beaton M, Casey J, Nolan C (2012) Bullying in a networked era: a literature review. http://cyber.law.harvard.edu/publications/2012/kbw_bulling_in_a_networked_era
Lievens E (2010) Protecting children in the digital era: the use of alternative regulatory instruments. Martinus Nijhoff Online, Leiden
Livingstone S, Görzig A (2012) ‘Sexting’: the exchange of sexual messages online among European youth. In: Livingstone S, Haddon L, Görzig A (eds) Children, risk and safety on the internet. The Policy Press, Bristol, pp 151–164
Livingstone S, Haddon L (2012) Theoretical framework for children’s internet use. In: Livingstone S, Haddon L, Görzig A (eds) Children, risk and safety on the internet. The Policy Press, Bristol, pp 1–14
Livingstone S, Haddon L, Görzig A, Ólafsson K (2011a) Risks and safety on the internet: the perspective of European children: full findings. EU kids online, London. www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20II%20(2009-11)/EUKidsOnlineIIReports/D4FullFindings.pdf
Livingstone S, Ólafsson K, Staksrud E (2011b) Social networking, age and privacy. EU kids online, London. www2.lse.ac.uk/media@lse/research/EUKidsOnline/ShortSNS.pdf
Livingstone S, Ólafsson K, O’Neill B, Donoso V (2012) Towards a better internet for children. EU kids online, London. www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/EUKidsOnlinereportfortheCEOCoalition.pdf
OECD Council (2012) The Protection of Children Online: Recommendation of the OECD Council. http://www.oecd.org/sti/ieconomy/childrenonline_with_cover.pdf
Ringrose J, Gill R, Livingstone S, Harvey L (2012) A qualitative study of children, young people and ‘sexting’—a report prepared for the NSPCC. www.nspcc.org.uk/Inform/resourcesforprofessionals/sexualabuse/sexting-research-report_wdf89269.pdf
Sacco DT, Argudin R, Maguire J, Tallon (2010) Sexting: youth practices and legal implications. Cyberlaw clinic, Harvard Law School. http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/Sacco_Argudin_Maguire_Tallon_Sexting_Jun2010.pdf
Schmitz S, Siry L (2011) Teenage folly or child abuse? state responses to ‘sexting’ by minors in the U.S. and Germany. Policy Internet 3:Article 3
Staksrud E and Lobe B (2010) Evaluation of the implementation of the safer social networking principles for the EU, Part 1: general report. http://ec.europa.eu/information_society/activities/social_networking/docs/final_report/first_part.pdf
Staksrud E, Ólafsson K, Livingstone S (2013) Does the use of social networking sites increase children’s risk of harm? Comput Hum Behav 29:40–50
United Nations Standard Minimum Rules for the Administration of Juvenile Justice (1985).The Beijing Rules. www.un.org/documents/ga/res/40/a40r033.htm
Van Bueren G (2007) Child rights in Europe: convergence and divergence in judicial protection. Council of Europe Publishing, Strasbourg
Van der Hof S, Koops B-J (2011) Adolescents and cybercrime: navigating between freedom and control. Policy Internet 3:Article 4
Van der Zwaan J, Dignum V, Jonker C (2010) Simulating peer support for victims of cyberbullying. Paper at the 22nd Benelux conference on artificial intelligence. http://bnaic2010.uni.lu/Papers/Category%20A/Zwaan_et_al.pdf
Walrave M, Demoulin M, Heirman W, Van der Perre A (2009) Onderzoeksrapport cyberpesten [Research report cyberbullying]. www.internet-observatory.be/internet_observatory/pdf/brochures/Boek_cyberpesten_nl.pdf
X (2012a) Report of mid-term review meeting of the CEO coalition to make the Internet a better place for kids. http://ec.europa.eu/information_society/activities/sip/docs/ceo_coalition/report_11_july.pdf
X (2012b) Action 1 simple and robust reporting tools for users progress report. http://ec.europa.eu/information_society/activities/sip/docs/ceo_coalition/reporting_tools_progress_report.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 © T.M.C. Asser Press, The Hague, The Netherlands, and the author(s)
About this chapter
Cite this chapter
Lievens, E. (2014). Children and Peer-to-Peer Risks in Social Networks: Regulating, Empowering or a Little Bit of Both?. In: van der Hof, S., van den Berg, B., Schermer, B. (eds) Minding Minors Wandering the Web: Regulating Online Child Safety. Information Technology and Law Series, vol 24. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-005-3_11
Download citation
DOI: https://doi.org/10.1007/978-94-6265-005-3_11
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-94-6265-004-6
Online ISBN: 978-94-6265-005-3
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)