Monitoring your children’s Web browsing is important. You may not be able to monitor their surfing in real time. But it’s good to know exactly where they’ve been. So, what’s the easiest way to check what sites they’ve visited? Your Web browsers hold the information you need. Every browser records a surfing history. You can see every page your children have visited.
“Computer Guru” Kim Kommando
Abstract
It has been recommended that parents should monitor their children’s Internet use, including what sites their children visit, what messages they receive, and what they post. In this paper, I claim that parents ought not to follow this advice, because to do so would violate children’s right to privacy over their on-line information exchanges. In defense of this claim, I argue that children have a right to privacy from their parents, because such a right respects their current capacities and fosters their future capacities for autonomy and relationships.
Similar content being viewed by others
Notes
Quotes are from, in order, Directgov [the UK government's digital service for people in England and Wales], “Keeping Children Safe On-line,” http://www.direct.gov.uk/en/parents/yourchildshealthandsafety/internetsafety/dg_071138, accessed June 2, 2012; Common Sense Media, “Tech tip: Checking Browser Histories,” http://www.commonsensemedia.org/advice-for-parents/tech-tip-checking-browser-histories, accessed July 23, 2012; Federal Bureau of Investigation, Cyber Division, “A Parent’s Guide to Internet Safety,” http://www.fbi.gov/stats-services/publications/parent-guide/, accessed June 2, 2012; Minor Monitor, http://www.freewaregenius.com/2011/12/11/monitor-your-childs-facebook-activity-with-minor-monitor/, accessed February 8, 2013. See also, Children’s Rights Council, “Check your Child’s Web History,” http://www.crckids.org/parents/parenting-tools/online-activity/how-to-check-your-childs-internet-history/, accessed July 10, 2012.
Numerous websites offer advice on how to do this, see e.g., http://www.wikihow.com/Surf-the-Internet-on-a-Macintosh-Without-Your-Parents-Knowing, accessed 8 February 2013.
While I focus on parents, the child’s right to privacy would also obligate others in parental roles (e.g., counselors, teachers) to respect minors’ privacy in their informational exchanges.
Admittedly there is a debate among scholars over whether “rights” is an appropriate concept to use when discussing the basis of moral obligations toward children (see e.g., O'Neill 1988, Schoeman 1980, 1983; Wolgast 1987). It is not necessary to enter into the general debates about children’s rights here. If one objects to the idea of children’s rights, one can take my arguments as intended to establish a parent’s (non-rights based) obligation to respect the privacy of their minor child.
This is not to say that this obligation cannot be outweighed by other more serious obligations. I discuss the concept of such “pro tanto” obligations below.
I am grateful to an anonymous referee for pushing me to clarify my position on this point.
The justification of a paternalistic action is the good of the individual who is being protected. Thus, actions motivated primarily by a concern with the welfare of other people (including oneself) or by a concern with some independent moral requirement are not paternalistic, properly speaking. I will assume that in the case of monitoring parents are motivated by what they believe are the best interests of the child.
Indeed, those who reject paternalistic laws, such as mandatory helmets for motorcyclists, may, at the same time, endorse such laws for minors (Jones and Bayer 2007).
There is insufficient room for a full discussion of all these possible threats here; for an in-depth discussion, see Livingstone (2009).
Some studies have found “strong evidence for exposure to pro-anorexia websites having negative effects on young women” (Bardone-Cone and Cass 2007, 544). While a number of social media organizations have banned such sites, they persist (Casilli et al. 2012). An informal Google search for “pro ana [pro anorexia] tips” yields approximately 516,000 results and “pro mia [pro bulimia] tips” yields approximately 85,600 results. The first 3 pages of these results were all links to sites that advocate bulimia. (This search was conducted by the author on 3 July 2012).
Students in my information ethics courses often make this argument.
Further support for this claim may be taken from the fact that large amounts of time and money have been dedicated to collecting, storing, and using data about people’s Internet searches to provide “personalized” service to customers (Mobasher et al. 2000). If such data provided no information about a person’s beliefs or intentions, then such data collection would be pointless. I am grateful to Tony Doyle for emphasizing this point.
Students in my information ethics courses also often make this argument.
In the case of citizens and the state, there are laws protecting citizens’ privacy from state intrusions. Given the unique features of the family context, similar laws protecting the child’s privacy from parental intrusion would likely do more harm than good.
I am grateful to an anonymous referee for pushing me to respond more fully to this concern about autonomy.
I am grateful to an anonymous referee for suggesting the importance of trust in this context.
See e.g., Common Sense Media’s “10 simple steps to Internet Safety” http://www.commonsensemedia.org/advice-for-parents/10-simple-steps-internet-safety; EU Kids Online’s “How can parents support internet safety,” http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/ParentalMediation.pdf.
References
American Library Association (2007). Privacy tool kit. Chicago, IL: American Library Association. http://www.ala.org/advocacy/privacyconfidentiality/toolkitsprivacy/introduction. Accessed 11 September 2012.
Archard, D. W. (2010). Children’s rights. In E. Zalta (Ed.), Stanford encylopedia of philosophy. http://plato.stanford.edu/archives/sum2011/entries/rights-children/. Accessed April 9 2012.
Attili, G., Vermigli, P., & Roazzi, A. (2010). Children’s social competence, peer status, and the quality of mother-child and father-child relationships: A multidimensional scaling approach. European Psychologist, 15(1), 23–33.
Bahrampour, T., & Aratani, L. (2006). Teens’ bold blogs alarm area schools. The Washington Post, 17 January, http://www.washingtonpost.com/wp-dyn/content/article/2006/01/16/AR2006011601489.html. Accessed 15 February 2013.
Bardone‐Cone, A. M., & Cass, K. M. (2007). What does viewing a pro‐anorexia website do? An experimental examination of website exposure and moderating effects. International Journal of Eating Disorders, 40(6), 537–548.
Behnke, S., & Warner, E. (2002). Confidentiality in the treatment of adolescents. Monitor on Psychology, 33(3), 44.
Benn, S. I. (1971). Privacy, freedom, and respect for persons. In J. R. Pennock & J. W. Chapman (Eds.), Nomos XIII: Privacy (pp. 1–26). Atherton Press: New York.
Benn, S. I. (1980). Privacy and respect for persons: A reply. Australasian Journal of Philosophy, 58(1), 54–61.
Benn, S. I. (1984). Privacy, freedom, and respect for persons. In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (p. 223). New York: Cambridge University Press.
Bidjerano, T., & Newman, J. (2010). Autonomy in after-school activity choice among preadolescents from Taiwan and the United States. The Journal of Early Adolescence, 30(5), 733–764.
Bloustein, E. J. (1984). Privacy as an aspect of human dignity. In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 156–202). New York: Cambridge University Press.
Bok, S. (1999). Lying: Moral choice in public and private life. New York: Vintage.
boyd, d. (2007). Why youth (heart) social network sites: The role of networked publics in teenage social life. In D. Buckingham (Ed.), Youth, identity, and digital media (pp. 119–142). Cambridge, MA: MIT Press.
Brennan, S., & Noggle, R. (1997). The moral status of children: Children’s rights, parents’ rights, and family justice. Social Theory and Practice, 23, 1–26.
Buss, E. (2004). The speech-enhancing effect of Internet regulation. Chicago-Kent Law Review, 79(103), 103.
Cantor, J. (2001). The media and children’s fears, anxieties, and perceptions of danger. In D. G. Singer & J. L. Singer (Eds.), Handbook of children and the media (pp. 207–221). Thousand Oaks, CA: Sage.
Casilli, A. A., Tubaro, P., & Araya, P. (2012). Ten years of Ana: Lessons from a transdisciplinary body of literature on online pro-eating disorder websites. Social Science Information, 51(1), 120–139.
Clarke, S. (2002). A definition of paternalism. Critical Review of International Social and Political Philosophy, 5(1), 81–91. doi:10.1080/13698230212331294554.
Cohen, S. (1972). Folk devils and moral panics: The creation of the mods and rockers. London: MacGibbon and Kee.
Davis, K., & James, C. (2013). Tweens’ conceptions of privacy online: Implications for educators. Learning, Media and Technology, 38(1), 4–25.
Dinger, D. R. (2005). Should parents be allowed to record a child’s telephone conversations when they believe the child is in danger? An examination of the federal wiretap statute and the doctrine of vicarious consent in the context of a criminal prosecution. Seattle University Law Review, 28(4), 955–1028.
Doyle, T. (2009). Privacy and perfect voyeurism. Ethics and Information Technology, 11(3), 181–189.
Drotner, K. (1999). Dangerous media? Panic discourses and dilemmas of modernity. Paedagogica Historica, 35(3), 593–619.
Duerager, A., & Livingstone, S. (2012). How can parents support children’s internet safety? EUKids Online. http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/ParentalMediation.pdf. Accessed 5 February 2013.
d’Haenens, L. Vandonink, S., & Donoso, V. (2013). How to cope and build online resilience? http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/Copingonlineresilience.pdf. Accessed 1 February 2013.
Eastin, M. S. (2008). Toward a cognitive development approach to youth perceptions of credibility. In M. J. Metzger & A. J. Flanagin (Eds.), The digital media, youth, and credibility (pp. 29–48). Cambridge, MA: The MIT Press.
Federal Communications Commission vs. Pacifica Foundation, 438 U.S. 726 (1978).
Fried, C. (1984). Privacy (A moral analysis). In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 203–222). New York: Cambridge University Press.
Friedman, M. (2000). Autonomy, social disruption, and women. In C. Mackenzie & N. Stoljar (Eds.), Relational autonomy: Feminist perspectives on automony, agency, and the social self (pp. 35–51). New York: Oxford University Press.
Gerstein, R. S. (1984). Privacy and self-incrimination. In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 245–264). New York: Cambridge University Press.
Griffin, J. (2008). On human rights. Oxford; New York: Oxford University Press.
Gutman, A. (1980). Children, paternalism, and education: A liberal argument. Philosophy & Public Affairs, 9(4), 338–358.
Himma, K. E. (2007). Privacy versus security: Why privacy is not an absolute value or right. San Diego Law Review, 44, 857.
Hunt, A. (1997). ‘Moral panic’ and moral language in the media. British Journal of Sociology, 48(6), 629–648.
Iyengar, S. S., & Lepper, M. R. (1999). Rethinking the value of choice: A cultural perspective on intrinsic motivation. Journal of Personality and Social Psychology, 76, 349–366.
Jones, M. M., & Bayer, R. (2007). Paternalism and its discontents: Motorcycle helmet laws, libertarian values, and public health. American Journal of Public Health, 97(2), 208.
Kagan, S. (1989). The limits of morality. New York: Oxford University Press.
Kerr, M., & Stattin, H. (2000). What parents know, how they know it, and several forms of adolescent adjustment: Further support for a reinterpretation of monitoring. Developmental Psychology, 36(3), 366–380.
Kirwil, L. (2009). Parental mediation of children’s internet use in different European countries. Journal of Children and Media, 3(4), 394–409.
Kramer, R. M. (1999). Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual Review of Psychology, 50(1), 569–598.
Lenhart, A. (2009). Teens and sexting: How and why minor teens are sending sexually suggestive nude or nearly nude via text messaging. Washington, DC: Pew Internet and American Life Project. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting/Overview.aspx. Accessed 1 December 2012.
Lenhart, A., Madden, M., Smith, A., Purcell, K., Zickuhr, K., & Rainie, L. (2011). Teens, kindness and cruelty on social network sites. Washington, DC: Pew Research Center. http://pewinternet.org/Reports/2011/Teens-and-social-media.aspx. Accessed 13 January 2013.
Liau, A. K., Khoo, A., & Hwaang, P. (2005). Factors influencing adolescents’ engagement in risky Internet behavior. Cyber Psychology and Behavior Cyber Psychology and Behavior, 8(6), 513–520.
Littman, S. D. (2011). Point/counterpoint: proactive parenting privacy and youth. American Library Association. http://youthprivacy.ala.org/2011/05/05/pointcounterpoint-sarah-darer-littman-on-proactive-parenting. Accessed 5 June 2012.
Livingstone, S. (2009). Children and the Internet: Great expectations, challenging realities. Cambridge, Malden, MA: Polity.
Livingstone, S., & Bober, M. (2005). UK children go online: Final report of key project findings. London School of Economics and Political Science. http://www.lse.ac.uk/collections/children-go-online/. Accessed 15 February 2013.
Livingstone, S., & Bober, M. (2006). Regulating the Internet at home: Contrasting the perspectives of children and parents. In D. Buckingham & R. Willett (Eds.), Digital generations: Children, young people, and new media (pp. 93–113). Mahwah, NJ: Lawrence Erlbaum Associates, Publishers.
Livingstone, S., Haddon, L., Görzig, A., & Ólafsson, K. (2011). Risks and safety on the Internet: The perspective of European children: Full findings. London School of Economics and Political Science. http://eprints.lse.ac.uk/33731. Accessed 20 November 2012.
Livingstone, S., & Helsper, E. J. (2008). Parental mediation of children’s Internet use. Journal of Broadcasting and Electronic Media, 52(4), 581–599.
Locke, J. (1996 [1690]) Two treatises of government. Cambridge: Cambridge University Press.
Marwick A. E. (2008). To catch a predator? The Myspace moral panic. First Monday, 13(6). http://firstmonday.org/ojs/index.php/fm/article/view/2152/1966. Accessed 22 July 2013.
Marwick, A. E., Diaz, M. D., & Palfrey, J. (2010). Youth, privacy and reputation. Berkman Center for Internet and Society. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1588163. Accessed 5 November 2012.
Mill, J. S. (1956 [1895]). On liberty. Indianapolis: Bobbs-Merrill.
Mobasher, B., Cooley, R., & Srivastava, J. (2000). Automatic personalization based on web usage mining. Communications of the ACM, 43(8), 142–151.
Montgomery, K. (2007). Generation digital: Politics, commerce, and childhood, in the age of the Internet. Cambridge, MA: MIT Press.
Moore, A. D. (2003). Privacy: Its meaning and value. American Philosophical Quarterly, 40(3), 215–227.
Moore, A. D. (2007). Toward informational privacy rights. San Diego Law Review, 44(4), 809–845.
O’Neill, O. (1988). Children’s rights and children’s lives. Ethics, 98(3), 445–463.
Palfrey, J., Boyd, D., & Sacco, D. (2010). Enhancing child safety and online technologies: Final report of the Internet Safety Technical Task Force. Durham, NC: Carolina Academic Press.
Patchin, J., & Hinduja, S. (2006). Bullies move beyond the schoolyard. Youth Violence and Juvenile Justice, 4(2), 148–169.
Pettit, P. (1995). The cunning of trust. Philosophy & Public Affairs, 24(3), 202–225.
Rachels, J. (1984). Why privacy is important. In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 290–299). New York: Cambridge University Press.
Reiman, J. H. (1976). Privacy, intimacy, and personhood. Philosophy & Public Affairs, 6(1), 26–44.
Rotenberg, K. J. (2010a). Introduction. In K. J. Rotenberg (Ed.), Interpersonal trust during childhood and adolescence (pp. 3–7). New York: Cambridge University Press.
Rotenberg, K. J. (2010b). The conceptualization of interpersonal trust: A basis, domain, and target framework. In K. J. Rotenberg (Ed.), Interpersonal trust during childhood and adolescence (pp. 8–27). New York: Cambridge University Press.
Russell, A., Pettit, G. S., & Mize, J. (1998). Horizontal qualities in parent-child relationships: Parallels with and possible consequences for children’s peer relationships. Developmental Review, 18(3), 313–352.
Scarre, G. (1980). Children and paternalism. Philosophy, 55(211), 117–124.
Schapiro, T. (2003). Childhood and personhood. Arizona Law Review, 45(3), 575–594.
Schoeman, F. (1980). Rights of children, rights of parents, and the moral basis of the family. Ethics, 91(1), 6–19.
Schoeman, F. (1983). Childhood competence and autonomy. The Journal of Legal Studies, 12(2), 267–287.
Schrag, F. (1977). The child in the moral order. Philosophy, 52(200), 167–177.
Shmueli, B., & Blecher-Prigat, A. (2011). Privacy for children. Columbia Human Rights Law Review, 42(3), 759–795.
Smetna, J. G. (2010). The role of trust in adolescent–parent relationships: To trust is to tell you. In K. J. Rotenberg (Ed.), Interpersonal trust during childhood and adolescence (pp. 223–246). New York: Cambridge University Press.
Solove, D. J. (2007). The future of reputation: Gossip, rumor, and privacy on the Internet. New Haven: Yale University Press.
Steyer, J. C. (2012). Talking back to facebook: A common sense guide to raising kids in the digital age. New York: Scribner.
Taylor, J. S. (2002). Privacy and autonomy: A reappraisal. The Southern Journal of Philosophy, 40(4), 587–604.
Welsh, M. C., Pennington, B. F., & Groisser, D. B. (1991). A normative-developmental study of executive function: A window on prefrontal function in children. Developmental Neuropsychology Developmental Neuropsychology, 7(2), 131–149.
Westin, A. (1967). Privacy and freedom. New York: Atheneum.
Wolgast, E. (1987). Wrong rights. Hypatia, 2(1), 25–44.
Acknowledgments
I would like to thank the participants at the 2012 Information Ethics Roundtable for helpful comments on an early version of the argument in this paper and Samantha Brennan, Tony Doyle, Don Fallis, Laura Lenhart, and Daniel Zelinski for written comments on various drafts. I would also like to thank two anonymous referees for extensive and very insightful comments, which helped me to improve the paper greatly.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mathiesen, K. The Internet, children, and privacy: the case against parental monitoring. Ethics Inf Technol 15, 263–274 (2013). https://doi.org/10.1007/s10676-013-9323-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10676-013-9323-4