Mobile Communication and the Protection of Children

Mobile phones and other smart connected devices have fundamentally changed contemporary life. Globally, we see unprecedented explosion of new generation mobile phones. More precisely, mobile communication is nowadays really pervasive in social life. For instance, children and young persons are emerging as active players in the wonderful world of ringing and being ringed. Many of them are attracted by intriguing ring tones. However, the rapid mobile diffusion among children and young people raises a number of crucial questions. In what way do mobile phones pose a threat to children and young people in terms of content, contact, and commercialism? What impact does the use of mobile communication technology have on children and young people? How might we seek to address the inadequacies in the existing regulatory framework with regards to the protection of this vulnerable group? The purpose of our investigations is to compare the regulatory measures as adopted in Hong Kong with regulatory practices and arrangements of other jurisdictions. The main idea is to develop via comparison a viable regulatory strategy in mobile content regulation that is applicable in Hong Kong as well as worldwide.

[1]  L. Rowell Huesmann,et al.  The role of social information processing and cognitive schema in the acquisition and maintenance of habitual aggressive behavior , 1998 .

[2]  David G. Post,et al.  Law and Borders--The Rise of Law in Cyberspace , 1996 .

[3]  Stefan Manegold,et al.  Understanding, modeling, and improving main-memory database performance , 2002 .

[4]  M. de Rijke,et al.  Graph transformations for natural language processing , 2006 .

[5]  Hossein Bidgoli The Internet Encyclopedia , 2003 .

[6]  A. Bogaert,et al.  Personality, Individual Differences, and Preferences for the Sexual Media , 2001, Archives of sexual behavior.

[7]  Claudia Hauff,et al.  Predicting the effectiveness of queries and retrieval systems , 2010, SIGF.

[8]  M K Shields,et al.  Children and computer technology: analysis and recommendations. , 2000, The Future of children.

[9]  Davide Grossi,et al.  Designing invisible handcuffs : Formal investigations in institutions and organizations for multi-agent systems , 2007 .

[10]  Neil Weinstock Netanel,et al.  Cyberspace Self-Governance: A Skeptical View from Liberal Democratic Theory , 2000 .

[11]  D. M. Breuker Memory versus search in games , 1998 .

[12]  C. Hamilton,et al.  Regulating youth access to pornography , 2003 .

[13]  Neil Postman,et al.  Technopoly: The Surrender of Culture to Technology , 1993 .

[14]  Stuart Biegel Beyond Our Control , 2001 .

[15]  Peter P. Swire Markets, Self-Regulation, and Government Enforcement in the Protection of Personal Information, in Privacy and Self-Regulation in the Information Age by the U.S. Department of Commerce. , 1997 .

[16]  Lawrence Lessig The Law of the Horse: What Cyberlaw Might Teach , 1999 .

[17]  Jan Broersen Modal Action Logics for Reasoning about Reactive Systems , 2003 .

[18]  J. Reidenberg Lex Informatica: The Formulation of Information Policy Rules through Technology , 1997 .

[19]  David G. Post,et al.  The New 'Civic Virtue' of the Internet , 1998, First Monday.

[20]  A. Michael Froomkin,et al.  The Internet as a Source of Regulatory Arbitrage , 1997 .

[21]  Eugene V Beresin,et al.  Factors correlated with violent video game use by adolescent boys and girls. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[22]  Katherine E. Buckley,et al.  Violent Video Game Effects on Children and Adolescents: Theory, Research, and Public Policy , 2007 .

[23]  Michele L. Ybarra,et al.  Examining the overlap in internet harassment and school bullying: implications for school intervention. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[24]  S. Verhulst,et al.  Regulating the changing media : a comparative study , 1998 .

[25]  P. Valkenburg,et al.  Exposure to Sexually Explicit Internet Material 2 Adolescents ' Exposure to Sexually Explicit Internet Material , Sexual Uncertainty , and Attitudes toward Uncommitted Sexual Exploration – Is There a Link ? , 2008 .

[26]  Patti M. Valkenburg,et al.  Characteristics and Motives of Adolescents Talking with Strangers on the Internet , 2006, Cyberpsychology Behav. Soc. Netw..

[27]  Krisztian Balog,et al.  People search in the enterprise , 2007, SIGF.

[28]  J. Reidenberg Governing Networks and Rule-Making in Cyberspace , 1996 .

[29]  Barry A. Sanders A Is for Ox: Violence, Electronic Media, and the Silencing of the Written Word , 1994 .

[30]  S. Rettig,et al.  Changes in Moral Values Over Three Decades, 1929-1958 , 1959 .

[31]  Frances Cairncross The death of distance : how the communications revolution will change our lives , 1997 .

[32]  M. Sabou,et al.  Building web service ontologies , 2006 .

[33]  Stefan Visscher,et al.  Bayesian network models for the management of ventilator-associated pneumonia , 2008 .

[34]  R. Pitofsky Self regulation and antitrust , 1998 .

[35]  Stephen Saxby The Age of Information: The Past Development and Future Significance of Computing and Communications , 1990 .

[36]  Patti M. Valkenburg,et al.  Adolescents’ Exposure to a Sexualized Media Environment and Their Notions of Women as Sex Objects , 2007 .

[37]  Ronald J. Deibert,et al.  Internet Filtering: The Politics and Mechanisms of Control , 2008 .

[38]  I. Trotter Hardy,et al.  The Proper Legal Regime for 'Cyberspace' , 1994 .

[39]  Ken Rigby,et al.  Consequences of Bullying in Schools , 2003, Canadian journal of psychiatry. Revue canadienne de psychiatrie.

[40]  L. R. Huesmann,et al.  Short-term and long-term effects of violent media on aggression in children and adults. , 2006, Archives of pediatrics & adolescent medicine.

[41]  S. Livingstone,et al.  UK Children Go Online : final report of key project findings , 2005 .

[42]  Gunther Teubner,et al.  Law as an autopoietic system , 1993 .

[43]  Sonia Livingstone,et al.  Harm and Offence in Media Content: A Review of the Evidence , 2006 .

[44]  J. Wolak,et al.  Unwanted and Wanted Exposure to Online Pornography in a National Sample of Youth Internet Users , 2007, Pediatrics.

[45]  Bela Mutschler,et al.  Modeling and simulating causal dependencies on process-aware information systems from a cost perspective , 2008 .

[46]  Johan Lundin,et al.  Coordinating police work with mobile information technology , 2005 .

[47]  Simon Keizer,et al.  Reasoning under Uncertainty in Natural Language Dialogue using Bayesian Networks , 2003 .

[48]  Marilyn A. Campbell,et al.  Cyber Bullying: An Old Problem in a New Guise? , 2005, Australian Journal of Guidance and Counselling.

[49]  Eija-Liisa Kasesniemi,et al.  Mobile Messages : Young People and a New Communication Culture , 2003 .

[50]  Michele L. Ybarra,et al.  The Relative Importance of Online Victimization in Understanding Depression, Delinquency, and Substance Use , 2007, Child maltreatment.

[51]  Joseph V. Rees,et al.  Industry Self‐Regulation: An Institutional Perspective , 1997 .

[52]  A. Meltzoff,et al.  Imitation of Facial and Manual Gestures by Human Neonates , 1977, Science.

[53]  Patrick Devlin The Enforcement of Morals , 1959 .

[54]  H. Cowie,et al.  Teachers' and pupils' definitions of bullying. , 2006, The British journal of educational psychology.

[55]  Tom Forester,et al.  Megatrends or megamistakes?: whatever happened to the information society? , 1992, CSOC.

[56]  Ken Rigby,et al.  Expressed Readiness of Australian Schoolchildren to Act as Bystanders in Support of Children who are Being Bullied , 2006 .

[57]  Ronald Poppe,et al.  Discriminative vision-based recovery and recognition of human motion , 2009 .

[58]  Bob van der Vecht,et al.  Adjustable Autonomy: Controling Influences on Decision Making , 2009 .

[59]  J. Goldsmith,et al.  Unilateral Regulation of the Internet: A Modest Defence , 2000 .

[60]  T. Tietenberg,et al.  Innovation in Environmental Policy: Economic and Legal Aspects of Recent Developments in Environmental Enforcement and Liability , 1992 .

[61]  Chao-chia Liu,et al.  Society and Politics in Hong Kong , 1983 .

[62]  Per E. Pedersen,et al.  Mobile communications : re-negotiation of the social sphere , 2005 .

[63]  Roelof van Zwol Modelling and searching web-based document collections , 2002 .

[64]  T. Prosser,et al.  Privatizing Public Enterprises: Constitutions, the State, and Regulation in Comparative Perspective , 1991 .

[65]  George Comstock,et al.  Media and the American child , 2007 .

[66]  Niranjala D. Weerakkody,et al.  Mobile phones and children : an Australian perspective , 2008 .

[67]  Eva Gemzøe Mikkelsen,et al.  Individual effects of exposure to bullying at work , 2002 .

[68]  Chin Chin Wong,et al.  Mobile entertainment: review and redefine , 2005, International Conference on Mobile Business (ICMB'05).

[69]  Wolfgang Streeck,et al.  Private interest government : beyond market and state , 1988, American Political Science Review.

[70]  J. Cartwright The English Law of Contract: Time for Review? , 2009, European Review of Private Law.

[71]  M. Cave,et al.  Understanding Regulation: Theory, Strategy, and Practice , 1999 .

[72]  H. Kelsen The Law as a Specific Social Technique , 1941 .

[73]  Sylvia Kierkegaard,et al.  Cybering, online grooming and ageplay , 2008, Comput. Law Secur. Rev..

[74]  Katie Hughes,et al.  Use and value of ICTS for separated families , 2006 .

[75]  Ander de Keijzer,et al.  Management of Uncertain Data - towards unattended integration , 2008 .

[76]  Stefaan Verhulst,et al.  Self-Regulation and the Internet , 2004 .

[77]  Murray,et al.  The Regulation of Cyberspace: Control in the Online Environment , 2006 .

[78]  M. M. De Weerdt,et al.  Plan Merging in Multi-Agent Systems , 2003 .

[79]  N. Crick,et al.  Response decision processes in relational and overt aggression. , 1998, Child development.

[80]  Michael King,et al.  The Truth About Autopoiesis , 1993 .

[81]  Charlene Y. Senn,et al.  Not Wanted in the Inbox!: Evaluations of Unsolicited and Harassing E-Mail1 , 2004 .

[82]  E. Laurier The region as a socio-technical accomplishment of mobile workers , 2001 .

[83]  C. Hood,et al.  The Government of Risk: Understanding Risk Regulation Regimes , 2001 .

[84]  Trung Huu Bui,et al.  Toward affective dialogue management using partially observable Markov decision processes , 2008 .

[85]  K. Yeung Securing Compliance: A Principled Approach , 2004 .

[86]  Shin Dong Kim,et al.  Korea: personal meanings , 2002 .

[87]  David Pannick Who is Subject to Judicial Review and in Respect of What , 1992 .

[88]  H. Hoel,et al.  Workplace Bullying, Psychological Perspectives and Industrial Relations: Towards a Contextualized and Interdisciplinary Approach , 2006 .

[89]  Darren Sinclair,et al.  Self‐Regulation Versus Command and Control? Beyond False Dichotomies , 1997 .

[90]  Michele L. Ybarra,et al.  Examining Characteristics and Associated Distress Related to Internet Harassment: Findings From the Second Youth Internet Safety Survey , 2006, Pediatrics.

[91]  Chris van Aart,et al.  Organizational Principles for Multi-Agent Architectures , 2004 .

[92]  Cheryl K. Olson,et al.  Grand Theft Childhood: The Surprising Truth About Violent Video Games and What Parents Can Do , 2008 .

[93]  Ian J. Lloyd Information Technology Law , 1993 .

[94]  R. Baldwin Is better regulation smarter regulation , 2005 .

[95]  Yun Zhao Dispute Resolution In Electronic Commerce , 2005 .

[96]  Thijs Westerveld,et al.  Using generative probabilistic models for multimedia retrieval , 2005, SIGF.

[97]  F.M.H. Reul,et al.  New architectures in computer chess , 2009 .

[98]  Jane M. Healy,et al.  Failure to Connect: How Computers Affect Our Children''s Minds-for , 1998 .

[99]  Ian Grant Telecoms – convergence challenge , 2006 .

[100]  R. Baggott REGULATORY REFORM IN BRITAIN: THE CHANGING FACE OF SELF‐REGULATION , 1989 .

[101]  L. R. Huesmann,et al.  The impact of electronic media violence: scientific theory and research. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[102]  J. C. Dill,et al.  VIDEO GAME VIOLENCE: A REVIEW OF THE EMPIRICAL LITERATURE , 1998 .

[103]  W. E. Bosma,et al.  Discourse oriented summarization , 2008 .

[104]  M. Castells The rise of the network society , 1996 .

[105]  Julia Black,et al.  Really Responsive Regulation , 2007 .

[106]  Neerincx,et al.  Human-computer interaction and presence in virtual reality exposure therapy , 2003 .

[107]  Will Gardner Just One Click—Sexual Abuse of Children and Young People through the Internet and Mobile Phone Technology by Tink Palmer with Lisa Stacey, Barnardo's, Ilford, 2004. 37pp. ISBN 0‐902046‐99‐9 (Pbk), £5 , 2005 .

[108]  Tim Wu,et al.  When Code Isn't Law , 2003 .

[109]  S. W. van den Braak Sensemaking software for crime analysis , 2010 .

[110]  Colin Scott,et al.  Controlling the New Media: Hybrid Responses to New Forms of Power , 2002 .

[111]  W.C.A. Wijngaards,et al.  Agent-Based Modelling of Dynamics: Biological and Organisational Applications , 2002 .

[112]  Peter Boncz,et al.  UvA-DARE ( Digital Academic Repository ) Monet ; a next-Generation DBMS Kernel For Query-Intensive Applications , 2007 .

[113]  J. Wolak,et al.  The Exposure Of Youth To Unwanted Sexual Material On The Internet , 2003 .

[114]  Pavel Serdyukov,et al.  Search for expertise : going beyond direct evidence , 2009 .

[115]  Günter L. Huber,et al.  Media Violence and Youth Violence , 2008, J. Media Psychol. Theor. Methods Appl..

[116]  K. Berger,et al.  Update on bullying at school: Science forgotten? , 2007 .

[117]  T. Charitos,et al.  Reasoning with dynamic networks in practice , 2007 .

[118]  John Braithwaite,et al.  Responsive Regulation: Transcending the Deregulation Debate , 1992 .

[119]  Natalia Stash,et al.  Incorporating cognitive/learning styles in a general-purpose adaptive hypermedia system , 2007, LINK.

[120]  T. Flew New Media: An Introduction , 2003 .

[121]  Lawrence Lessig,et al.  Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity , 2004 .

[122]  Trevor Barr Newmedia.com.au: The changing face of Australia's media and communications , 2000 .

[123]  Melanie J. Mortensen Beyond Convergence and the New Media Decisions: Regulatory Models in Communications Law , 2003 .

[124]  Gunther Teubner,et al.  Substantive and Reflexive Elements in Modern Law , 2021, Luhmann and Law.

[125]  J. Wolak,et al.  Internet-initiated sex crimes against minors: implications for prevention based on findings from a national study. , 2004, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[126]  Michael Friedewald,et al.  Shining light on the dark side of ambient intelligence , 2007 .

[127]  Julia Black An Economic Analysis of Regulation: One View of the Cathedral , 1996 .

[128]  Patti M. Valkenburg,et al.  Adolescents’ Exposure to Sexually Explicit Material on the Internet , 2006, Commun. Res..

[129]  Roger Brownsword,et al.  Code, control, and choice: why East is East and West is West , 2005, Legal Studies.

[130]  Dennis Reidsma,et al.  Annotations and subjective machines of annotators, embodied agents, users, and other humans , 2008 .

[131]  Susan W Langdon,et al.  The relationship between levels of perceived respect and bullying in 5th through 12th graders. , 2008, Adolescence.

[132]  Herbert S. Lin,et al.  Youth, Pornography, and the Internet , 2002 .

[133]  Julia Black,et al.  Constitutionalising Self‐Regulation , 1996 .

[134]  Olga Anatoliyivna Kulyk,et al.  Do You Know What I Know? Situational Awareness of Co-located Teams in Multidisplay Environments. , 2010 .

[135]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[136]  R. Villeneuve,et al.  Measuring Global Internet Filtering , 2008 .

[137]  M. B. van Riemsdijk,et al.  Cognitive agent programming : A semantic approach , 2006 .

[138]  Martin Wigbertus Antonius Caminada For the sake of the Argument : explorations into argument-based reasoning , 1997 .

[139]  Robert C. Ellickson The Aim of Order Without Law , 1994 .

[140]  Joost Geurts,et al.  A document engineering model and processing framework for multimedia documents , 2010 .

[141]  Peter Grabosky,et al.  Regulation by Reward: On the Use of Incentives as Regulatory Instruments* , 1995 .

[142]  Volker Nannen Evolutionary Agent-Based Policy Analysis in Dynamic Environments , 2009 .

[143]  Yochai Benkler,et al.  From Consumers to Users: Shifting the Deeper Structures of Regulation Toward Sustainable Commons and User Access , 2000 .

[144]  John Harrison,et al.  Communication and new media: From broadcast to narrowcast , 2007 .

[145]  Andreas Martin Thomas Lincke,et al.  Electronic business negotiation: some experimental studies on the interaction between medium, innovation context, and culture , 2003 .

[146]  R. G. Santana Tapia,et al.  Assessing business-IT alignment in networked organizations , 2009 .

[147]  M.A.J. van Gerven,et al.  Bayesian networks for clinical decision support: A rational approach to dynamic decision-making under uncertainty , 2007 .

[148]  Anthony Ogus,et al.  Rethinking Self-Regulation , 1995 .

[149]  B. Jessop The rise of governance and the risks of failure: the case of economic development , 1998 .

[150]  Lawrence Lessig,et al.  Reading The Constitution in Cyberspace , 1997 .

[151]  Ho Personal, Portable, and Pedestrian: Mobile Phones in Japanese Life , 2007 .

[152]  Jae Woong Shim,et al.  Who Responds to Unsolicited Sexually Explicit Materials on the Internet?: The Role of Individual Differences , 2007, Cyberpsychology Behav. Soc. Netw..

[153]  Lawrence Lessig,et al.  The future of ideas - the fate of the commons in a connected world , 2002 .

[154]  Katie Hafner Where Wizards Stay Up Late , 1996 .

[155]  Bart Willem Schermer,et al.  Software Agents, Surveillance and the right to privacy , 2007 .

[156]  E. Quayle,et al.  Child Pornography: An Internet Crime , 2003 .

[157]  I. van de Weerd,et al.  Advancing in software product management: An incremental method engineering approach , 2009 .

[158]  Frithjof Staude-Müller,et al.  Hostile and Hardened? An Experimental Study on (De-)Sensitization to Violence and Suffering Through Playing Video Games , 2008 .

[159]  J. Wolak,et al.  Trends in youth reports of sexual solicitations, harassment and unwanted exposure to pornography on the Internet. , 2007, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[160]  John Braithwaite,et al.  Of manners gentle : enforcement strategies of Australian business regulatory agencies , 1986 .

[161]  M. W. van Someren Learning as problem solving , 2001 .

[162]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[163]  C. Cooper,et al.  Bullying and Emotional Abuse in the Workplace , 2003 .

[164]  Ronny Siebes,et al.  Semantic Routing in Peer-to-Peer Systems , 2006 .