{"id":4149,"date":"2017-05-10T12:43:54","date_gmt":"2017-05-10T11:43:54","guid":{"rendered":"http:\/\/blogs.oii.ox.ac.uk\/policy\/?p=4149"},"modified":"2020-12-07T14:24:44","modified_gmt":"2020-12-07T14:24:44","slug":"how-and-why-is-childrens-digital-data-being-harvested","status":"publish","type":"post","link":"https:\/\/ensr.oii.ox.ac.uk\/how-and-why-is-childrens-digital-data-being-harvested\/","title":{"rendered":"How and why is children\u2019s digital data being harvested?"},"content":{"rendered":"<p>Everyone of a certain age remembers logging-on to a noisy dial-up modem and surfing the Web via <a href=\"https:\/\/en.wikipedia.org\/wiki\/AOL\">AOL<\/a> or <a href=\"https:\/\/en.wikipedia.org\/wiki\/AltaVista\">AltaVista<\/a>. Back then, the distinction between offline and online made much more sense. Today, three trends are conspiring to firmly confine this distinction to history.\u00a0These are the mass proliferation of Wi-Fi, the appification of the Web, and the rapid expansion of the Internet of (smart) Things. Combined they are engineering multi-layered information ecosystems that enmesh around children going about their every day lives. But it&#8217;s\u00a0time to refocus on our responsibilities to children before they are eclipsed by the commercial incentives that are driving these developments.<\/p>\n<h2>Three Trends<\/h2>\n<p>1.\u00a0The proliferation of Wi-Fi means when children can use smart phones or tablets in variety of new contexts including on buses and trains, in hotels and restaurants, in school, libraries and health centre waiting rooms.<\/p>\n<p>2. Research confirms apps on smart phones and tablets are now children\u2019s primary gateway to the Web. This is <a href=\"https:\/\/dash.harvard.edu\/bitstream\/handle\/1\/4455262\/Zittrain_Future%20of%20the%20Internet.pdf?sequence=1\">the appification of the Web that Jonathon Zittrain predicted<\/a>: the <a href=\"https:\/\/www.wechat.com\/en\/\">WeChat<\/a> app, popular in China, is becoming its full realisation.<\/p>\n<p>3. Simultaneously, the rapid expansion of the Internet of Things means everything is becoming \u2018smart\u2019 \u2013 phones, cars, toys, baby monitors, watches, toasters: we are even promised smart cities. Essentially, this means these devices have an IP address that allows to them receive, process, and transmit data on the Internet.\u00a0Often these devices (including personal assistants like <a href=\"https:\/\/en.wikipedia.org\/wiki\/Amazon_Alexa\">Alexa<\/a>, game consoles and smart TVs) are picking up data produced by children. Marketing about smart toys tells us they are enhancing children\u2019s play, augmenting children\u2019s learning, incentivising children\u2019s healthy habits and can even reclaim family time. Salient examples include <a href=\"http:\/\/hellobarbiefaq.mattel.com\">Hello Barbie<\/a> and <a href=\"http:\/\/www.smarttoy.com\">Smart Toy Bear<\/a>, which use voice and\/or image recognition and connect to the cloud to analyse, process, and respond to children\u2019s conversations and images. This sector is expanding to include app-enabled toys such as toy drones, cars, and droids (e.g. Star Wars BB-8); toys-to-life, which connect action figures to video games (e.g. Skylanders, Amiibo); puzzle and building games (e.g. Osmo, Lego Fusion); and children\u2019s GPS-enabled wearables such as smart watches and fitness trackers. We need to look beyond the marketing to see what is making this technology ubiquitous.<\/p>\n<h2>The commercial incentives to collect children&#8217;s data<\/h2>\n<p>Service providers now use free Wi-Fi as an additional enticement to their customers, including families. Apps offer companies opportunities to contain children\u2019s usage in a walled-garden so that they can capture valuable marketing data, or offer children and parents opportunities to make in-app purchases. Therefore, more and more companies, especially companies that have no background in technology such as bus operators and cereal manufactures, use Wi-Fi and apps to engage with children.<\/p>\n<p>The smart label is also a new way for companies to differentiate their products from others in saturated markets that overwhelm consumers with choice. However, security is an additional cost that manufactures of smart technologies manufacturers are unwilling to pay. The microprocessors in smart toys often don\u2019t have the processing power required for strong security measures and secure communication, such as encryption (e.g. an 8-bit microcontroller cannot support the industry standard SSL to encrypt communications). Therefore these devices are designed without the ability to accommodate software or firmware updates. Some smart toys transmit data in clear text (parents of course are unaware of such details when purchasing these toys).<\/p>\n<p>While children are using their devices they are constantly emitting data. Because this data is so valuable to businesses it has become a clich\u00e9 to <a href=\"http:\/\/www.economist.com\/news\/leaders\/21721656-data-economy-demands-new-approach-antitrust-rules-worlds-most-valuable-resource\">frame it as an exploitable \u2018natural\u2019 resource like oil<\/a>. This means every digitisable movement, transaction and interaction we make is potentially commodifiable. Moreover, the networks of specialist companies, partners and affiliates that capture, store process, broker and resell the new oil are becoming so complex they are impenetrable. This includes the involvement of commercial actors in public institutions such as schools.<\/p>\n<p><a href=\"http:\/\/journals.sagepub.com\/doi\/full\/10.1177\/1461444816686328\">Lupton &amp; Williamson (2017)<\/a> use the term \u2018datafied child\u2019 to draw attention to this creeping normalisation of harvesting data about children. As its provenance becomes more opaque the data is orphaned and vulnerable to further commodification. And when it is shared across unencrypted channels or stored using weak security (as high profile cases show) it is easily hacked. The implications of this are only beginning to emerge. In response, children\u2019s rights, privacy and protection; the particular ethics of the capture and management of children\u2019s data; and its potential for commercial exploitation are all beginning to receive more attention.<\/p>\n<h2>Refocusing on children<\/h2>\n<p>Apart from a ticked box, companies have no way of knowing if a parent or child has given their consent. Children, or their parents, will often sign away their data to quickly dispatch any impediment to accessing the Wi-Fi. When children use public Wi-Fi they are opening, often unencrypted, channels to their devices. We need to start mapping the range of actors who are collecting data in this way and find out if they have any provisions for protecting children\u2019s data.<\/p>\n<p>Similarly, when children use their apps, companies assume that a responsible adult has agreed to the terms and conditions. Parents are expected to be gatekeepers, boundary setters, and supervisors. However, for various reasons, there may not be an informed, (digitally) literate adult on hand. For example, parents may be too busy with work or too ill to stay on top of their children\u2019s complex digital lives. Children are educated in year groups but they share digital networks and practices with older children and teenagers, including siblings, extended family members, and friends who may enable risky practices.<\/p>\n<p>We may need to start looking at additional ways of protecting children that transfers the burden away from the family and to companies that are capturing and monetising the data. This includes being realistic about the efficacy of current legislation. Because children can simply enter a fake birthdate, application of the US Children\u2019s Online Privacy Protection Act to restrict the collection of children\u2019s personal data online has been fairly ineffectual (<a href=\"http:\/\/journals.uic.edu\/ojs\/index.php\/fm\/article\/view\/3850\">boyd et al., 2011<\/a>). In Europe, the incoming General Data Protection Regulation allows EU states to set a minimum age of 16 under which children cannot consent to having their data processed, <a href=\"http:\/\/blogs.lse.ac.uk\/mediapolicyproject\/2016\/10\/17\/to-be-13-or-16-that-is-the-question-the-implications-for-uk-teenagers-of-the-european-general-data-protection-regulation\/\">potentially encouraging and even larger population of minors to lie about their age online<\/a>.<\/p>\n<p>We need to ask what would data capture and management look like if it is guided by a children\u2019s framework such as this one developed <a href=\"http:\/\/journals.sagepub.com\/doi\/full\/10.1177\/1461444816686318\">here<\/a> by Sonia Livingstone and endorsed by the Children\u2019s Commissioner <a href=\"https:\/\/www.childrenscommissioner.gov.uk\/sites\/default\/files\/publications\/Growing%20Up%20Digital%20Taskforce%20Report%20January%202017_0.pdf\">here<\/a>. Perhaps only companies that complied with strong security and anonymisation procedures would be licenced to trade in UK? Given the financial drivers at work, an ideal solution would possibly make better regulation a commerical incentive. We will be exploring these and other similar questions that emerge over the coming months.<\/p>\n<hr \/>\n<p>This work is part of the OII project &#8220;<a href=\"https:\/\/www.oii.ox.ac.uk\/research\/projects\/child-safety-on-the-internet-looking-beyond-ict-actors\/\">Child safety on the Internet: looking beyond ICT actors<\/a>&#8220;, which maps the range of non-ICT companies engaging digitally with children and identifying areas where their actions might affect a child\u2019s exposure to online risks such as data theft, adverse online experiences or sexual exploitation. It is funded by the <a href=\"http:\/\/oakfnd.org\">Oak Foundation<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Everyone of a certain age remembers logging-on to a noisy dial-up modem and surfing the Web via AOL or AltaVista. Back then, the distinction between offline and online made much more sense. Today, three trends are conspiring to firmly confine this distinction to history.\u00a0These are the mass proliferation of Wi-Fi, the appification of the Web, [&hellip;]<\/p>\n","protected":false},"author":304,"featured_media":4152,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[22,21],"tags":[54,453,80,507,146,205],"_links":{"self":[{"href":"https:\/\/ensr.oii.ox.ac.uk\/wp-json\/wp\/v2\/posts\/4149"}],"collection":[{"href":"https:\/\/ensr.oii.ox.ac.uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ensr.oii.ox.ac.uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ensr.oii.ox.ac.uk\/wp-json\/wp\/v2\/users\/304"}],"replies":[{"embeddable":true,"href":"https:\/\/ensr.oii.ox.ac.uk\/wp-json\/wp\/v2\/comments?post=4149"}],"version-history":[{"count":10,"href":"https:\/\/ensr.oii.ox.ac.uk\/wp-json\/wp\/v2\/posts\/4149\/revisions"}],"predecessor-version":[{"id":4542,"href":"https:\/\/ensr.oii.ox.ac.uk\/wp-json\/wp\/v2\/posts\/4149\/revisions\/4542"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ensr.oii.ox.ac.uk\/wp-json\/wp\/v2\/media\/4152"}],"wp:attachment":[{"href":"https:\/\/ensr.oii.ox.ac.uk\/wp-json\/wp\/v2\/media?parent=4149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ensr.oii.ox.ac.uk\/wp-json\/wp\/v2\/categories?post=4149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ensr.oii.ox.ac.uk\/wp-json\/wp\/v2\/tags?post=4149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}