Chapter

Protecting Youth from Themselves in the Media: The Right to Be Forgotten

Authors:
To read the full-text of this research, you can request a copy directly from the author.

Abstract

Advances in telecommunications have brought many changes to our daily lives, one of which is the change in the norm of privacy. With the convenience in viewing and (re)distributing contents, on top of the permanency of contents on the Internet, privacy has become more of a concern than ever. The concern is even greater for the younger generation, because they are eager to share and less sensitive to privacy. The European Union recently has recognized that people have the right to control their own information, even after they have become publicly available. The European Union commission proposed an update in the fundamental data protection regulations, including the so-called “right to be forgotten.” However, securing the right to be forgotten is not possible with a regulation set only for one region. In the United States, where the majority of companies handling online information are based, this type of right is readily rejected because it is considered to directly violate the First Amendment’s freedom of expression. This chapter considers how to balance the freedom to express and adolescents’ right to be “forgotten.”

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

ResearchGate has not been able to resolve any citations for this publication.
Book
Full-text available
Many teens today who use the Internet are actively involved in participatory cultures—joining online communities (Facebook, message boards, game clans), producing creative work in new forms (digital sampling, modding, fan videomaking, fan fiction), working in teams to complete tasks and develop new knowledge (as in Wikipedia), and shaping the flow of media (as in blogging or podcasting). A growing body of scholarship suggests potential benefits of these activities, including opportunities for peer-to-peer learning, development of skills useful in the modern workplace, and a more empowered conception of citizenship. Some argue that young people pick up these key skills and competencies on their own by interacting with popular culture; but the problems of unequal access, lack of media transparency, and the breakdown of traditional forms of socialization and professional training suggest a role for policy and pedagogical intervention. This report aims to shift the conversation about the "digital divide" from questions about access to technology to questions about access to opportunities for involvement in participatory culture and how to provide all young people with the chance to develop the cultural competencies and social skills needed. Fostering these skills, the authors argue, requires a systemic approach to media education; schools, afterschool programs, and parents all have distinctive roles to play. The John D. and Catherine T. MacArthur Foundation Reports on Digital Media and Learning
Conference Paper
Full-text available
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2436436 The so-called "Right to Be Forgotten or Erasure" (RTBF), article 17 of the proposed General Data Protection Regulation, provides individuals with a means to oppose the often persistent digital memory of the Web. Because digital information technologies affect the accessibility of information over time and time plays a fundamental role in biological forgetting, ‘time’ is a factor that should play a pivotal role in the RTBF. This chapter explores the roles that ‘time’ plays and could play in decisions regarding the retention or erasure of data. Two roles are identified: (1) ‘time’ as the marker of a discrete moment where the grounds for retention no longer hold and ‘forgetting’ of the data should follow and (2) ‘time’ as a factor in the balance of interests, as adding or removing weight to the request to ‘forget’ personal information or its opposing interest. The chapter elaborates on these two roles from different perspectives and highlights the importance and underdeveloped understanding of the second role.
Article
Full-text available
The aim of this article is to investigate how often adolescents engage in internet-based identity experiments, with what motives they engage in such experiments and which self-presentational strategies they use while experimenting with their identity. Six hundred nine to 18-year-olds completed a questionnaire in their classroom. Of the adolescents who used the internet for chat or Instant Messaging, 50 percent indicated that they had engaged in internet-based identity experiments. The most important motive for such experiments was self-exploration (to investigate how others react), followed by social compensation (to overcome shyness) and social facilitation (to facilitate relationship formation). Age, gender and introversion were significant predictors of the frequency with which adolescents engaged in internet-based identity experiments, their motives for such experiments, and their self-presentational strategies.
Article
Full-text available
Over the past decade, technology has become increasingly important in the lives of adolescents. As a group, adolescents are heavy users of newer electronic communication forms such as instant messaging, e-mail, and text messaging, as well as communication-oriented Internet sites such as blogs, social networking, and sites for sharing photos and videos. Kaveri Subrahmanyam and Patricia Greenfield examine adolescents' relationships with friends, romantic partners, strangers, and their families in the context of their online communication activities. The authors show that adolescents are using these communication tools primarily to reinforce existing relationships, both with friends and romantic partners. More and more they are integrating these tools into their "offline" worlds, using, for example, social networking sites to get more information about new entrants into their offline world. Subrahmanyam and Greenfield note that adolescents' online interactions with strangers, while not as common now as during the early years of the Internet, may have benefits, such as relieving social anxiety, as well as costs, such as sexual predation. Likewise, the authors demonstrate that online content itself can be both positive and negative. Although teens find valuable support and information on websites, they can also encounter racism and hate messages. Electronic communication may also be reinforcing peer communication at the expense of communication with parents, who may not be knowledgeable enough about their children's online activities on sites such as the enormously popular MySpace. Although the Internet was once hailed as the savior of education, the authors say that schools today are trying to control the harmful and distracting uses of electronic media while children are at school. The challenge for schools is to eliminate the negative uses of the Internet and cell phones in educational settings while preserving their significant contributions to education and social connection.
Article
Full-text available
Little academic and policy attention has addressed the `digital divide' among children and young people. This article analyses findings from a national survey of UK 9—19-year-olds that reveal inequalities by age, gender and socioeconomic status in relation to their quality of access to and use of the internet. Since both the extent of use and the reasons for low- and non-use of the internet vary by age, a different explanation for the digital divide is required for children compared with adults. Looking beyond the idea of a binary divide, we propose instead a continuum of digital inclusion. Gradations in frequency of internet use (from non and low users through to weekly and daily users) are found to map onto a progression in the take-up of online opportunities among young people (from basic through moderate to broad and then all-round users), thus beginning to explain why differences in internet use matter, contributing to inclusion and exclusion. Demographic, use and expertise variables are all shown to play a role in accounting for variations in the breadth and depth of internet use.
Article
Full-text available
The authors examined the online construction of identity and sexuality in a large sample of conversations from monitored and unmonitored teen chat rooms. More than half of the 583 participants (identified by a distinct screen name) communicated identity information, most frequently gender. In this way, participants compensated for the text-based chat environment by providing information about themselves that would be visible and obvious in face-to-face communication. Sexual themes constituted 5% of all utterances (1 sexual comment per minute); bad or obscene language constituted 3% of the sample (1 obscenity every 2 minutes). Participants who self-identified as female produced more implicit sexual communication, participants who self-identified as male produced more explicit sexual communication. The protected environment of monitored chat (hosts who enforce basic behavioral rules) contained an environment with less explicit sexuality and fewer obscenities than the freer environment of unmonitored chat. These differences were attributable both to the monitoring process itself and to the differing populations attracted to each type of chat room (monitored: more participants self-identified as younger and female; unmonitored: more participants self-identified as older and male).
Article
The so-called "Right to Be Forgotten or Erasure" (RTBF), article 17 of the proposed General Data Protection Regulation, provides individuals with a means to oppose the often persistent digital memory of the Web. Because digital information technologies affect the accessibility of information over time and time plays a fundamental role in biological forgetting, ‘time’ is a factor that should play a pivotal role in the RTBF. This chapter explores the roles that ‘time’ plays and could play in decisions regarding the retention or erasure of data. Two roles are identified: (1) ‘time’ as the marker of a discrete moment where the grounds for retention no longer hold and ‘forgetting’ of the data should follow and (2) ‘time’ as a factor in the balance of interests, as adding or removing weight to the request to ‘forget’ personal information or its opposing interest. The chapter elaborates on these two roles from different perspectives and highlights the importance and underdeveloped understanding of the second role.
Article
Article
The popular media often presents a negative picture of young people and technology. From addiction to gaming, the distractions of the Internet, to the risks of social networking, the downsides of new technology in the lives of teenagers are often over-blown.
Article
There is much controversy about the dangers of a free media when it comes to children and adolescents. Many believe that this constitutional right should be amended, altered, or revoked entirely in order to prevent the young from being negatively influenced. Graphic violence, sexual content, and the depiction of cigarette smoking have all come under fire as being unacceptable in media that is geared toward adolescents, from television and movies to magazines and advertising. Yet not much has been written about the developmental science behind these ideas, and what effects a free media really has on adolescents. This book presents a synthesis of all current knowledge about the developmental effects of a free media on adolescents. The author first presents a full analysis of research studies into the media's effects on adolescents in four key areas: sexuality, violence, smoking, and body image. All findings are assessed within the context of normal adolescent development. The author then discusses how this knowledge can be used to inform current standards for the regulation of free speech with regard to adolescents. Both legal restrictions and less formal regulatory bodies (schools, parent groups, etc.) are reviewed in order to present a full picture of the ways in which a free media is constrained to protect adolescents' development.
Article
Book
What is online risk? How can we best protect children from it? Who should be responsible for this protection? Is all protection good? Can Internet users trust the industry? These and other fundamental questions are discussed in this book. Beginning with the premise that the political and democratic processes in a society are affected by the way in which that society defines and perceives risks, Children in the Online World offers insights into the contemporary regulation of online risk for children (including teens), examining the questions of whether such regulation is legitimate and whether it does in fact result in the sacrifice of certain fundamental human rights. The book draws on representative studies with European children concerning their actual online risk experiences as well as an extensive review of regulatory rationales in the European Union, to contend that the institutions of the western European welfare states charged with protecting children have changed fundamentally, at the cost of the level of security that they provide. In consequence, children at once have more rights with regard to their personal decision making as digital consumers, yet fewer democratic rights to participation and protection as 'digital citizens'. A theoretically informed, yet empirically grounded study of the relationship between core democratic values and the duty to protect young people in the media-sphere, Children in the Online World will appeal to scholars and students across the social sciences with interests in new technologies, risk and the sociology of childhood and youth.
Book
How young people think about the moral and ethical dilemmas they encounter when they share and use online content and participate in online communities. Fresh from a party, a teen posts a photo on Facebook of a friend drinking a beer. A college student repurposes an article from Wikipedia for a paper. A group of players in a multiplayer online game routinely cheat new players by selling them worthless virtual accessories for high prices. In Disconnected, Carrie James examines how young people and the adults in their lives think about these sorts of online dilemmas, describing ethical blind spots and disconnects. Drawing on extensive interviews with young people between the ages of 10 and 25, James describes the nature of their thinking about privacy, property, and participation online. She identifies three ways that young people approach online activities. A teen might practice self-focused thinking, concerned mostly about consequences for herself; moral thinking, concerned about the consequences for people he knows; or ethical thinking, concerned about unknown individuals and larger communities. James finds, among other things, that youth are often blind to moral or ethical concerns about privacy; that attitudes toward property range from “what's theirs is theirs” to “free for all”; that hostile speech can be met with a belief that online content is “just a joke”; and that adults who are consulted about such dilemmas often emphasize personal safety issues over online ethics and citizenship. Considering ways to address the digital ethics gap, James offers a vision of conscientious connectivity, which involves ethical thinking skills but, perhaps more important, is marked by sensitivity to the dilemmas posed by online life, a motivation to wrestle with them, and a sense of moral agency that supports socially positive online actions.
Article
This paper focuses on 25 UK teenagers’ language and literacy practices on Facebook; it draws on data from interviews as well as from Facebook ‘walls’. To explore whether Facebook provides opportunities for new literacy practices through text-making, the research considers how teenagers use the site to present themselves and ‘do friendship’. Continuities of the teenagers’ interactions were traced across the domains of school, home and Facebook and were found to reflect both ‘traditional’ and new ways of self presenting and of ‘doing friendship’.
Article
The current consensus is that information, once online, is there forever. Content permanence has led many European countries, the European Union, and even the United States to establish a right to be forgotten to protect citizens from the shackles of the past presented by the Internet. But, the Internet has not defeated time, and information, like everything, gets old, decays, and dies, even online. Quite the opposite of permanent, the Web cannot be self-preserving. One study from the field of content persistence, a body of research that has been almost wholly overlooked by legal scholars, found that 85% of content disappears in a year and that 59% disappears in a week, signifying a decrease in the lifespan of online content when compared with previous studies. Those that have debated this privacy issue have consistently done so in terms of permanence and also neglected an important consideration: the changing nature of information over time. Our efforts to address disputes arising from old personal information residing online should focus on the changing value, uses, and needs of information over time and the ethics of preservation. Understanding how information changes over time in relation to its subject, how and where personal information resides online longer than deemed appropriate, and what information is important for preservation allows regulation to be tailored to the problem, correctly framed. This understanding requires an interdisciplinary approach and the inclusion of research from telecommunications, information theory, information science, behavioral and social sciences, and computer sciences. Recognizing that information does not last forever, this article takes the initial step of outlining an information life cycle in terms of phases in relation to information needs, creating a taxonomy to help assess the competing values at stake when one seeks to have old personal information “forgotten.” Some of the proposed legislation make exceptions for historical, statistical, and public safety needs, but none of them include time, a vital element to the information life cycle. The article concludes by working through specific issues like revived interest, the integrity and objectivity of the Internet, and the importance of time in protecting the interests other information needs. Permanence is not yet upon us, and therefore, now is the time to develop policies and practices that will support good decisions, preserve our cultural history, and protect the future of the past, as well as protect the privacy rights of individuals that will live with the information and a society that may suffer from the threat of a permanent record.
Article
Online privacy, child safety, free speech and anonymity are on a collision course. The 1998 Children’s Online Privacy Protection Act (COPPA) already mandates certain online privacy protections for children under 13, but many advocate expanding online privacy protections for both adolescents and adults. Furthermore, efforts continue at both the federal and state levels to institute new regulations, such as age verification mandates, aimed at ensuring the safety of children online. There is an inherent tension between these objectives: Attempts to achieve perfectly “safe” online environments will likely require the surrender of some privacy and speech rights, including the right to speak anonymously. These tensions are coming to a head with state-based efforts to expand COPPA, which requires “verifiable parental consent” before certain sites or services may collect, or enable the sharing of, personal information from children under the age of 13. Several proposed state laws would extend COPPA’s parental-consent framework to cover all adolescents under 18. This seemingly small change would require age verification of not only adolescents and their parents, but - for the first time - large numbers of adults, thus raising grave First Amendment concerns. Such broad age verification mandates would, ironically, reduce online privacy by requiring more information to be collected from both adolescents and adults for age verification purposes, while doing little to make adolescents safer. In practical terms, the increased scale of “COPPA 2.0” efforts would present significant implementation and enforcement challenges. Finally, state-level COPPA 2.0 proposals would likely conflict with the Constitution’s Commerce Clause. Despite these profound problems, COPPA expansion has great rhetorical appeal and seems likely to be at the heart of future child safety debates - especially efforts to require mandatory age verification. There are, however, many better ways to protect children online than by expanding COPPA beyond its original, limited purpose.
Article
Questions about the nature of normative and atypical development in adolescence have taken on special significance in the last few years, as scientists have begun to recast old portraits of adolescent behavior in the light of new knowledge about brain development. Adolescence is often a period of especially heightened vulnerability as a consequence of potential disjunctions between developing brain, behavioral and cognitive systems that mature along different timetables and under the control of both common and independent biological processes. Taken together, these developments reinforce the emerging understanding of adolescence as a critical or sensitive period for a reorganization of regulatory systems, a reorganization that is fraught with both risks and opportunities.
Google to shut the door on “revenge porn
  • B Murphy
Foggy thinking about the right to oblivion
  • P Fleischer
Childhood as a Legal Status
  • Roger J R Levesque
Where are they now ? The “star wars kid” sued the people who made him famous
  • W Wei
28 Internet acronyms every parent should know
  • K Wallace
The “right to be forgotten
  • S C Bennett