Skip to main content
Log in

The Internet, children, and privacy: the case against parental monitoring

  • Original Article
  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Monitoring your children’s Web browsing is important. You may not be able to monitor their surfing in real time. But it’s good to know exactly where they’ve been. So, what’s the easiest way to check what sites they’ve visited? Your Web browsers hold the information you need. Every browser records a surfing history. You can see every page your children have visited.

“Computer Guru” Kim Kommando

Abstract

It has been recommended that parents should monitor their children’s Internet use, including what sites their children visit, what messages they receive, and what they post. In this paper, I claim that parents ought not to follow this advice, because to do so would violate children’s right to privacy over their on-line information exchanges. In defense of this claim, I argue that children have a right to privacy from their parents, because such a right respects their current capacities and fosters their future capacities for autonomy and relationships.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Notes

  1. Quotes are from, in order, Directgov [the UK government's digital service for people in England and Wales], “Keeping Children Safe On-line,” http://www.direct.gov.uk/en/parents/yourchildshealthandsafety/internetsafety/dg_071138, accessed June 2, 2012; Common Sense Media, “Tech tip: Checking Browser Histories,” http://www.commonsensemedia.org/advice-for-parents/tech-tip-checking-browser-histories, accessed July 23, 2012; Federal Bureau of Investigation, Cyber Division, “A Parent’s Guide to Internet Safety,” http://www.fbi.gov/stats-services/publications/parent-guide/, accessed June 2, 2012; Minor Monitor, http://www.freewaregenius.com/2011/12/11/monitor-your-childs-facebook-activity-with-minor-monitor/, accessed February 8, 2013. See also, Children’s Rights Council, “Check your Child’s Web History,” http://www.crckids.org/parents/parenting-tools/online-activity/how-to-check-your-childs-internet-history/, accessed July 10, 2012.

  2. Numerous websites offer advice on how to do this, see e.g., http://www.wikihow.com/Surf-the-Internet-on-a-Macintosh-Without-Your-Parents-Knowing, accessed 8 February 2013.

  3. While early work on children and the Internet indicated that minors do not value privacy on-line, recent studies have shown this to not be true (see e.g., Lenhart et al. 2011, 7; Davis and James 2013).

  4. While I focus on parents, the child’s right to privacy would also obligate others in parental roles (e.g., counselors, teachers) to respect minors’ privacy in their informational exchanges.

  5. Admittedly there is a debate among scholars over whether “rights” is an appropriate concept to use when discussing the basis of moral obligations toward children (see e.g., O'Neill 1988, Schoeman 1980, 1983; Wolgast 1987). It is not necessary to enter into the general debates about children’s rights here. If one objects to the idea of children’s rights, one can take my arguments as intended to establish a parent’s (non-rights based) obligation to respect the privacy of their minor child.

  6. This is not to say that this obligation cannot be outweighed by other more serious obligations. I discuss the concept of such “pro tanto” obligations below.

  7. I am grateful to an anonymous referee for pushing me to clarify my position on this point.

  8. The justification of a paternalistic action is the good of the individual who is being protected. Thus, actions motivated primarily by a concern with the welfare of other people (including oneself) or by a concern with some independent moral requirement are not paternalistic, properly speaking. I will assume that in the case of monitoring parents are motivated by what they believe are the best interests of the child.

  9. Indeed, those who reject paternalistic laws, such as mandatory helmets for motorcyclists, may, at the same time, endorse such laws for minors (Jones and Bayer 2007).

  10. There is insufficient room for a full discussion of all these possible threats here; for an in-depth discussion, see Livingstone (2009).

  11. Some studies have found “strong evidence for exposure to pro-anorexia websites having negative effects on young women” (Bardone-Cone and Cass 2007, 544). While a number of social media organizations have banned such sites, they persist (Casilli et al. 2012). An informal Google search for “pro ana [pro anorexia] tips” yields approximately 516,000 results and “pro mia [pro bulimia] tips” yields approximately 85,600 results. The first 3 pages of these results were all links to sites that advocate bulimia. (This search was conducted by the author on 3 July 2012).

  12. A “technopanic” (coined by Marwick 2008) is a form of “media panic” (Drotner 1999), which itself is a subclass of “moral panic” (Cohen 1972). A moral panic occurs when there is a perceived threat to the present moral order by some group (or, in this case, technology).

  13. Students in my information ethics courses often make this argument.

  14. Further support for this claim may be taken from the fact that large amounts of time and money have been dedicated to collecting, storing, and using data about people’s Internet searches to provide “personalized” service to customers (Mobasher et al. 2000). If such data provided no information about a person’s beliefs or intentions, then such data collection would be pointless. I am grateful to Tony Doyle for emphasizing this point.

  15. Students in my information ethics courses also often make this argument.

  16. In the case of citizens and the state, there are laws protecting citizens’ privacy from state intrusions. Given the unique features of the family context, similar laws protecting the child’s privacy from parental intrusion would likely do more harm than good.

  17. I am grateful to an anonymous referee for pushing me to respond more fully to this concern about autonomy.

  18. I am grateful to an anonymous referee for suggesting the importance of trust in this context.

  19. See e.g., Common Sense Media’s “10 simple steps to Internet Safety” http://www.commonsensemedia.org/advice-for-parents/10-simple-steps-internet-safety; EU Kids Online’s “How can parents support internet safety,” http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/ParentalMediation.pdf.

References

  • American Library Association (2007). Privacy tool kit. Chicago, IL: American Library Association. http://www.ala.org/advocacy/privacyconfidentiality/toolkitsprivacy/introduction. Accessed 11 September 2012.

  • Archard, D. W. (2010). Children’s rights. In E. Zalta (Ed.), Stanford encylopedia of philosophy. http://plato.stanford.edu/archives/sum2011/entries/rights-children/. Accessed April 9 2012.

  • Attili, G., Vermigli, P., & Roazzi, A. (2010). Children’s social competence, peer status, and the quality of mother-child and father-child relationships: A multidimensional scaling approach. European Psychologist, 15(1), 23–33.

    Article  Google Scholar 

  • Bahrampour, T., & Aratani, L. (2006). Teens’ bold blogs alarm area schools. The Washington Post, 17 January, http://www.washingtonpost.com/wp-dyn/content/article/2006/01/16/AR2006011601489.html. Accessed 15 February 2013.

  • Bardone‐Cone, A. M., & Cass, K. M. (2007). What does viewing a pro‐anorexia website do? An experimental examination of website exposure and moderating effects. International Journal of Eating Disorders, 40(6), 537–548.

    Google Scholar 

  • Behnke, S., & Warner, E. (2002). Confidentiality in the treatment of adolescents. Monitor on Psychology, 33(3), 44.

    Google Scholar 

  • Benn, S. I. (1971). Privacy, freedom, and respect for persons. In J. R. Pennock & J. W. Chapman (Eds.), Nomos XIII: Privacy (pp. 1–26). Atherton Press: New York.

  • Benn, S. I. (1980). Privacy and respect for persons: A reply. Australasian Journal of Philosophy, 58(1), 54–61.

    Article  MathSciNet  Google Scholar 

  • Benn, S. I. (1984). Privacy, freedom, and respect for persons. In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (p. 223). New York: Cambridge University Press.

    Chapter  Google Scholar 

  • Bidjerano, T., & Newman, J. (2010). Autonomy in after-school activity choice among preadolescents from Taiwan and the United States. The Journal of Early Adolescence, 30(5), 733–764.

    Article  Google Scholar 

  • Bloustein, E. J. (1984). Privacy as an aspect of human dignity. In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 156–202). New York: Cambridge University Press.

    Chapter  Google Scholar 

  • Bok, S. (1999). Lying: Moral choice in public and private life. New York: Vintage.

    Google Scholar 

  • boyd, d. (2007). Why youth (heart) social network sites: The role of networked publics in teenage social life. In D. Buckingham (Ed.), Youth, identity, and digital media (pp. 119–142). Cambridge, MA: MIT Press.

    Google Scholar 

  • Brennan, S., & Noggle, R. (1997). The moral status of children: Children’s rights, parents’ rights, and family justice. Social Theory and Practice, 23, 1–26.

    Article  Google Scholar 

  • Buss, E. (2004). The speech-enhancing effect of Internet regulation. Chicago-Kent Law Review, 79(103), 103.

    Google Scholar 

  • Cantor, J. (2001). The media and children’s fears, anxieties, and perceptions of danger. In D. G. Singer & J. L. Singer (Eds.), Handbook of children and the media (pp. 207–221). Thousand Oaks, CA: Sage.

  • Casilli, A. A., Tubaro, P., & Araya, P. (2012). Ten years of Ana: Lessons from a transdisciplinary body of literature on online pro-eating disorder websites. Social Science Information, 51(1), 120–139.

    Google Scholar 

  • Clarke, S. (2002). A definition of paternalism. Critical Review of International Social and Political Philosophy, 5(1), 81–91. doi:10.1080/13698230212331294554.

    Article  Google Scholar 

  • Cohen, S. (1972). Folk devils and moral panics: The creation of the mods and rockers. London: MacGibbon and Kee.

    Google Scholar 

  • Davis, K., & James, C. (2013). Tweens’ conceptions of privacy online: Implications for educators. Learning, Media and Technology, 38(1), 4–25.

    Article  Google Scholar 

  • Dinger, D. R. (2005). Should parents be allowed to record a child’s telephone conversations when they believe the child is in danger? An examination of the federal wiretap statute and the doctrine of vicarious consent in the context of a criminal prosecution. Seattle University Law Review, 28(4), 955–1028.

    Google Scholar 

  • Doyle, T. (2009). Privacy and perfect voyeurism. Ethics and Information Technology, 11(3), 181–189.

    Article  MathSciNet  Google Scholar 

  • Drotner, K. (1999). Dangerous media? Panic discourses and dilemmas of modernity. Paedagogica Historica, 35(3), 593–619.

    Article  Google Scholar 

  • Duerager, A., & Livingstone, S. (2012). How can parents support children’s internet safety? EUKids Online. http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/ParentalMediation.pdf. Accessed 5 February 2013.

  • d’Haenens, L. Vandonink, S., & Donoso, V. (2013). How to cope and build online resilience? http://www2.lse.ac.uk/media@lse/research/EUKidsOnline/EU%20Kids%20III/Reports/Copingonlineresilience.pdf. Accessed 1 February 2013.

  • Eastin, M. S. (2008). Toward a cognitive development approach to youth perceptions of credibility. In M. J. Metzger & A. J. Flanagin (Eds.), The digital media, youth, and credibility (pp. 29–48). Cambridge, MA: The MIT Press.

  • Federal Communications Commission vs. Pacifica Foundation, 438 U.S. 726 (1978).

  • Fried, C. (1984). Privacy (A moral analysis). In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 203–222). New York: Cambridge University Press.

  • Friedman, M. (2000). Autonomy, social disruption, and women. In C. Mackenzie & N. Stoljar (Eds.), Relational autonomy: Feminist perspectives on automony, agency, and the social self (pp. 35–51). New York: Oxford University Press.

  • Gerstein, R. S. (1984). Privacy and self-incrimination. In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 245–264). New York: Cambridge University Press.

  • Griffin, J. (2008). On human rights. Oxford; New York: Oxford University Press.

    Book  Google Scholar 

  • Gutman, A. (1980). Children, paternalism, and education: A liberal argument. Philosophy & Public Affairs, 9(4), 338–358.

    Google Scholar 

  • Himma, K. E. (2007). Privacy versus security: Why privacy is not an absolute value or right. San Diego Law Review, 44, 857.

    Google Scholar 

  • Hunt, A. (1997). ‘Moral panic’ and moral language in the media. British Journal of Sociology, 48(6), 629–648.

    Google Scholar 

  • Iyengar, S. S., & Lepper, M. R. (1999). Rethinking the value of choice: A cultural perspective on intrinsic motivation. Journal of Personality and Social Psychology, 76, 349–366.

    Google Scholar 

  • Jones, M. M., & Bayer, R. (2007). Paternalism and its discontents: Motorcycle helmet laws, libertarian values, and public health. American Journal of Public Health, 97(2), 208.

    Article  Google Scholar 

  • Kagan, S. (1989). The limits of morality. New York: Oxford University Press.

    Google Scholar 

  • Kerr, M., & Stattin, H. (2000). What parents know, how they know it, and several forms of adolescent adjustment: Further support for a reinterpretation of monitoring. Developmental Psychology, 36(3), 366–380.

    Article  Google Scholar 

  • Kirwil, L. (2009). Parental mediation of children’s internet use in different European countries. Journal of Children and Media, 3(4), 394–409.

    Google Scholar 

  • Kramer, R. M. (1999). Trust and distrust in organizations: Emerging perspectives, enduring questions. Annual Review of Psychology, 50(1), 569–598.

    Article  Google Scholar 

  • Lenhart, A. (2009). Teens and sexting: How and why minor teens are sending sexually suggestive nude or nearly nude via text messaging. Washington, DC: Pew Internet and American Life Project. http://www.pewinternet.org/Reports/2009/Teens-and-Sexting/Overview.aspx. Accessed 1 December 2012.

  • Lenhart, A., Madden, M., Smith, A., Purcell, K., Zickuhr, K., & Rainie, L. (2011). Teens, kindness and cruelty on social network sites. Washington, DC: Pew Research Center. http://pewinternet.org/Reports/2011/Teens-and-social-media.aspx. Accessed 13 January 2013.

  • Liau, A. K., Khoo, A., & Hwaang, P. (2005). Factors influencing adolescents’ engagement in risky Internet behavior. Cyber Psychology and Behavior Cyber Psychology and Behavior, 8(6), 513–520.

    Article  Google Scholar 

  • Littman, S. D. (2011). Point/counterpoint: proactive parenting privacy and youth. American Library Association. http://youthprivacy.ala.org/2011/05/05/pointcounterpoint-sarah-darer-littman-on-proactive-parenting. Accessed 5 June 2012.

  • Livingstone, S. (2009). Children and the Internet: Great expectations, challenging realities. Cambridge, Malden, MA: Polity.

    Google Scholar 

  • Livingstone, S., & Bober, M. (2005). UK children go online: Final report of key project findings. London School of Economics and Political Science. http://www.lse.ac.uk/collections/children-go-online/. Accessed 15 February 2013.

  • Livingstone, S., & Bober, M. (2006). Regulating the Internet at home: Contrasting the perspectives of children and parents. In D. Buckingham & R. Willett (Eds.), Digital generations: Children, young people, and new media (pp. 93–113). Mahwah, NJ: Lawrence Erlbaum Associates, Publishers.

    Google Scholar 

  • Livingstone, S., Haddon, L., Görzig, A., & Ólafsson, K. (2011). Risks and safety on the Internet: The perspective of European children: Full findings. London School of Economics and Political Science. http://eprints.lse.ac.uk/33731. Accessed 20 November 2012.

  • Livingstone, S., & Helsper, E. J. (2008). Parental mediation of children’s Internet use. Journal of Broadcasting and Electronic Media, 52(4), 581–599.

    Article  Google Scholar 

  • Locke, J. (1996 [1690]) Two treatises of government. Cambridge: Cambridge University Press.

  • Marwick A. E. (2008). To catch a predator? The Myspace moral panic. First Monday, 13(6). http://firstmonday.org/ojs/index.php/fm/article/view/2152/1966. Accessed 22 July 2013.

  • Marwick, A. E., Diaz, M. D., & Palfrey, J. (2010). Youth, privacy and reputation. Berkman Center for Internet and Society. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1588163. Accessed 5 November 2012.

  • Mill, J. S. (1956 [1895]). On liberty. Indianapolis: Bobbs-Merrill.

  • Mobasher, B., Cooley, R., & Srivastava, J. (2000). Automatic personalization based on web usage mining. Communications of the ACM, 43(8), 142–151.

    Article  Google Scholar 

  • Montgomery, K. (2007). Generation digital: Politics, commerce, and childhood, in the age of the Internet. Cambridge, MA: MIT Press.

    Google Scholar 

  • Moore, A. D. (2003). Privacy: Its meaning and value. American Philosophical Quarterly, 40(3), 215–227.

    Google Scholar 

  • Moore, A. D. (2007). Toward informational privacy rights. San Diego Law Review, 44(4), 809–845.

    Google Scholar 

  • O’Neill, O. (1988). Children’s rights and children’s lives. Ethics, 98(3), 445–463.

    Article  Google Scholar 

  • Palfrey, J., Boyd, D., & Sacco, D. (2010). Enhancing child safety and online technologies: Final report of the Internet Safety Technical Task Force. Durham, NC: Carolina Academic Press.

  • Patchin, J., & Hinduja, S. (2006). Bullies move beyond the schoolyard. Youth Violence and Juvenile Justice, 4(2), 148–169.

    Article  Google Scholar 

  • Pettit, P. (1995). The cunning of trust. Philosophy & Public Affairs, 24(3), 202–225.

    Article  Google Scholar 

  • Rachels, J. (1984). Why privacy is important. In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology (pp. 290–299). New York: Cambridge University Press.

  • Reiman, J. H. (1976). Privacy, intimacy, and personhood. Philosophy & Public Affairs, 6(1), 26–44.

    Google Scholar 

  • Rotenberg, K. J. (2010a). Introduction. In K. J. Rotenberg (Ed.), Interpersonal trust during childhood and adolescence (pp. 3–7). New York: Cambridge University Press.

    Chapter  Google Scholar 

  • Rotenberg, K. J. (2010b). The conceptualization of interpersonal trust: A basis, domain, and target framework. In K. J. Rotenberg (Ed.), Interpersonal trust during childhood and adolescence (pp. 8–27). New York: Cambridge University Press.

    Chapter  Google Scholar 

  • Russell, A., Pettit, G. S., & Mize, J. (1998). Horizontal qualities in parent-child relationships: Parallels with and possible consequences for children’s peer relationships. Developmental Review, 18(3), 313–352.

    Article  Google Scholar 

  • Scarre, G. (1980). Children and paternalism. Philosophy, 55(211), 117–124.

    Article  Google Scholar 

  • Schapiro, T. (2003). Childhood and personhood. Arizona Law Review, 45(3), 575–594.

    Google Scholar 

  • Schoeman, F. (1980). Rights of children, rights of parents, and the moral basis of the family. Ethics, 91(1), 6–19.

    Article  Google Scholar 

  • Schoeman, F. (1983). Childhood competence and autonomy. The Journal of Legal Studies, 12(2), 267–287.

    Article  MathSciNet  Google Scholar 

  • Schrag, F. (1977). The child in the moral order. Philosophy, 52(200), 167–177.

    Article  Google Scholar 

  • Shmueli, B., & Blecher-Prigat, A. (2011). Privacy for children. Columbia Human Rights Law Review, 42(3), 759–795.

    Google Scholar 

  • Smetna, J. G. (2010). The role of trust in adolescent–parent relationships: To trust is to tell you. In K. J. Rotenberg (Ed.), Interpersonal trust during childhood and adolescence (pp. 223–246). New York: Cambridge University Press.

    Chapter  Google Scholar 

  • Solove, D. J. (2007). The future of reputation: Gossip, rumor, and privacy on the Internet. New Haven: Yale University Press.

    Google Scholar 

  • Steyer, J. C. (2012). Talking back to facebook: A common sense guide to raising kids in the digital age. New York: Scribner.

    Google Scholar 

  • Taylor, J. S. (2002). Privacy and autonomy: A reappraisal. The Southern Journal of Philosophy, 40(4), 587–604.

    Article  Google Scholar 

  • Welsh, M. C., Pennington, B. F., & Groisser, D. B. (1991). A normative-developmental study of executive function: A window on prefrontal function in children. Developmental Neuropsychology Developmental Neuropsychology, 7(2), 131–149.

    Article  Google Scholar 

  • Westin, A. (1967). Privacy and freedom. New York: Atheneum.

    Google Scholar 

  • Wolgast, E. (1987). Wrong rights. Hypatia, 2(1), 25–44.

    Article  Google Scholar 

Download references

Acknowledgments

I would like to thank the participants at the 2012 Information Ethics Roundtable for helpful comments on an early version of the argument in this paper and Samantha Brennan, Tony Doyle, Don Fallis, Laura Lenhart, and Daniel Zelinski for written comments on various drafts. I would also like to thank two anonymous referees for extensive and very insightful comments, which helped me to improve the paper greatly.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kay Mathiesen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mathiesen, K. The Internet, children, and privacy: the case against parental monitoring. Ethics Inf Technol 15, 263–274 (2013). https://doi.org/10.1007/s10676-013-9323-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10676-013-9323-4

Keywords

Navigation