Professional Documents
Culture Documents
No more basking in the afternoon sun. No more thrills amid several rounds
of patintero, luksong baka, and agawang base. Less physical, more digital.
Today, the world is new, especially for children.
Fast-paced technological innovation and widespread accessibility of
information and communication technology (ICT) have transformed
societies around the world. Children in particular have unprecedented
access to computers and mobile technologies, and have in recent decades
tended to adopt these from an early age, resulting in ICTs becoming
thoroughly embedded in their lives. Although the exploitation of children is
not a new phenomenon, the digital age has exacerbated the problem and
created more vulnerability to children.1 Take the story of 17-year old
Rosalyn and her siblings, who were rescued during a cyber-crimes police
operation in the Philippines, when their parents were caught forcing the
two oldest girls to perform sexual acts that were livestreamed on the
internet.2
With everything going digital, the world has become even perilous for
children.
are also at particular risk as they often do not fully understand threats
associated with the use of ICTs, or are not sufficiently aware that, once
shared, control over such material is effectively waived.7
According to the Global Kids Online Research Synthesis Report 2015-2016
produced by the UNICEF Office of Research-Innocenti and the London
School of Economics and Political Science, in some countries, up to two
thirds of children have seen sexual content online and others reported
harmful or hurtful experiences online. The main causes of harmful or hurtful
experiences according to the children were internet scams, pop ups or
harassment.8
Moreover, in the study conducted by Kaspersky Lab, it was found that
majority of 8 to 16 year olds have concealed from their parents something
related to their online or device activity. Up to 70% of parents whose
children have successfully hidden online activity are unaware that their kids
conceal potentially dangerous online from them, such as inappropriate
content, interacting with inappropriate people, or cyberbullying.9
The risks and harms related to online activities are synthesized in the study
conducted by Sonia Livingstone and Leslie Haddon of EU Kids Online. They
defined a set of categories to understand these risks and harms. The
groupings elucidate the features of behaviors involved and help orientate
researchers and policymakers towards their different implications: a) online
harm from content (the child as a passive recipient of pornographic or
harmful sexual content); b) harm from contact (the child targeted as a
participant by an adult or another child in activities such as sexual abuse
that is photographed and then disseminated, for online grooming for sexual
abuse, or for bullying); and c) harm from conduct (the child actively initiates
risky or abusive behavior, for example, by creating or uploading
pornographic material, physically meeting an adult met online, placing
7 Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children,
Unodc.org. Available from <http://www.unodc.org/documents/organizedcrime/cybercrime/Study_on_the_Effects.pdf>. Accessed on November 15, 2016
8 Children worldwide gain benefits, face risks online, Blogs.lse.ac.uk, November 1, 2016. Available
from <http://blogs.lse.ac.uk/gko/launching-the-global-kids-online-research-toolkit/>. Accessed on
November 15, 2016.
9 Supra at Note 4