{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:20:34Z","timestamp":1777936834392,"version":"3.51.4"},"reference-count":47,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2017,1,16]],"date-time":"2017-01-16T00:00:00Z","timestamp":1484524800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2017,5]]},"abstract":"<jats:p>The new European Union (EU) General Data Protection Regulation aims to adapt children\u2019s right to privacy to the \u2018digital age\u2019. It explicitly recognizes that children deserve specific protection of their personal data, and introduces additional rights and safeguards for children. This article explores the dilemmas that the introduction of the child-tailored online privacy protection regime creates \u2013 the \u2018empowerment versus protection\u2019 and the \u2018individualized versus average child\u2019 dilemmas. It concludes that by favouring protection over the empowerment of children, the Regulation risks limiting children in their online opportunities, and by relying on the average child criteria, it fails to consider the evolving capacities and best interests of the child.<\/jats:p>","DOI":"10.1177\/1461444816686327","type":"journal-article","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T04:06:24Z","timestamp":1484712384000},"page":"765-779","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":47,"title":["From universal towards child-specific protection of the right to privacy online: Dilemmas in the EU General Data Protection Regulation"],"prefix":"10.1177","volume":"19","author":[{"given":"Milda","family":"Macenaite","sequence":"first","affiliation":[{"name":"Tilburg University, The Netherlands"}]}],"member":"179","published-online":{"date-parts":[[2017,1,16]]},"reference":[{"key":"bibr1-1461444816686327","unstructured":"Article 29 Working Party (A29WP) (2009) Opinion 2\/2009 on the protection of children\u2019s personal data (general guidelines and the special case of schools). WP 160, 11 February. Available at: http:\/\/ec.europa.eu\/justice\/policies\/privacy\/docs\/wpdocs\/2009\/wp160_en.pdf"},{"key":"bibr2-1461444816686327","unstructured":"Article 29 Working Party (A29WP) (2011) Opinion 15\/2011 on the definition of consent. WP 187, 13 July. Available at: http:\/\/ec.europa.eu\/justice\/policies\/privacy\/docs\/wpdocs\/2011\/wp187_en.pdf"},{"key":"bibr3-1461444816686327","unstructured":"Article 29 Working Party (A29WP) (2013) Opinion 02\/2013 on apps on smart devices. WP 202, 27 February. Available at: http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/documentation\/opinion-recommendation\/files\/2013\/wp202_en.pdf"},{"key":"bibr4-1461444816686327","unstructured":"Barnett E (2010) Tim Berners-Lee criticises Facebook\u2019s \u2018walled garden\u2019. The Telegraph, 22 November. Available at: www.telegraph.co.uk\/technology\/facebook\/8151101\/tTim-Berners-Lee-criticises-Facebooks-walled-garden.html"},{"key":"bibr5-1461444816686327","doi-asserted-by":"publisher","DOI":"10.21552\/EDPL\/2015\/4\/4"},{"key":"bibr6-1461444816686327","volume-title":"It\u2019s Complicated: The Social Lives of Networked Teens","author":"boyd d","year":"2014"},{"key":"bibr7-1461444816686327","unstructured":"Boyden J, Levison D (2000) Children as economic and social actors in the development process. EGDI working paper. Stockholm: Expert Group on Development Issues. Available at: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.120.1198&rep=rep1&type=pdf"},{"key":"bibr8-1461444816686327","volume-title":"Configuring the Networked Self: Law, Code, and the Play of Everyday Practice","author":"Cohen JE","year":"2012"},{"key":"bibr9-1461444816686327","unstructured":"Committee on the Rights of the Child (CRC) (2009) The right of the child to be heard. CRC\/C\/GC\/12. Available at: http:\/\/www2.ohchr.org\/english\/bodies\/crc\/docs\/AdvanceVersions\/CRC-C-GC-12.pdf"},{"key":"bibr10-1461444816686327","first-page":"16","volume-title":"Internet Monitor 2013: Reflections on the Digital World","author":"Cortesi S","year":"2013"},{"key":"bibr11-1461444816686327","doi-asserted-by":"publisher","DOI":"10.4324\/9781315015835"},{"key":"bibr12-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1093\/ojls\/6.2.161"},{"key":"bibr13-1461444816686327","unstructured":"European Commission (EC) (2015) Stronger data protection rules for Europe. Fact sheet. Available at: http:\/\/europa.eu\/rapid\/press-release_MEMO-15-5170_en.htm"},{"key":"bibr14-1461444816686327","volume-title":"Evans v United Kingdom","author":"European Court of Human Rights (ECHR)","year":"2006"},{"key":"bibr15-1461444816686327","unstructured":"European NGO Alliance for Child Safety Online (eNACSO) (2016) When Free Isn\u2019t: Business, Children and the Internet. Rome: eNACSO. Available at: www.enacso.eu\/wp-content\/uploads\/2015\/12\/free-isnt.pdf"},{"key":"bibr16-1461444816686327","volume-title":"Children and the Law: An Interdisciplinary Approach with Cases, Materials and Comments","author":"Federle KH","year":"2013"},{"key":"bibr17-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139168625"},{"key":"bibr18-1461444816686327","volume-title":"The Rights and Wrongs of Children","author":"Freeman MDA","year":"1983"},{"key":"bibr19-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1111\/j.1099-0860.1993.tb00281.x"},{"key":"bibr20-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1093\/he\/9780199682188.001.0001"},{"key":"bibr21-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-008-0003-1"},{"key":"bibr22-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316411292"},{"key":"bibr23-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipu029"},{"key":"bibr24-1461444816686327","volume-title":"The Evolving Capacities of the Child","author":"Lansdown G","year":"2005"},{"key":"bibr25-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1177\/1461444807080335"},{"key":"bibr26-1461444816686327","volume-title":"One in three: Internet governance and children\u2019s rights","author":"Livingstone S","year":"2015"},{"key":"bibr27-1461444816686327","volume-title":"Risks and safety on the Internet: the perspective of European children","author":"Livingstone S","year":"2011"},{"key":"bibr28-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019927107203"},{"issue":"2","key":"bibr29-1461444816686327","first-page":"1","volume":"7","author":"Macenaite M","year":"2016","journal-title":"European Journal of Law and Technology"},{"key":"bibr30-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1177\/0011392102050003007"},{"key":"bibr31-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2014.09.004"},{"key":"bibr32-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1504\/IJTPL.2016.077189"},{"key":"bibr33-1461444816686327","first-page":"110","author":"Mc Cullagh K","year":"2016","journal-title":"Data Protection, Privacy and European Regulation in the Digital Age: Unigrafia"},{"key":"bibr34-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814543995"},{"key":"bibr35-1461444816686327","doi-asserted-by":"publisher","DOI":"10.21552\/EDPL\/2015\/4\/6"},{"key":"bibr36-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781107280557.007"},{"issue":"88","key":"bibr37-1461444816686327","first-page":"99","volume":"4","author":"Pierson J","year":"2012","journal-title":"Communications and Strategies"},{"key":"bibr38-1461444816686327","first-page":"221","volume-title":"The EU as a Children\u2019s Rights Actor: Law, Policy and Structural Dimensions","author":"Savirimuthu J","year":"2016"},{"key":"bibr39-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1017\/S0031819100063828"},{"issue":"2","key":"bibr40-1461444816686327","first-page":"171","volume":"16","author":"Schermer BW","year":"2014","journal-title":"Ethics and Information Technology"},{"key":"bibr41-1461444816686327","first-page":"759","volume":"42","author":"Shmueli B","year":"2011","journal-title":"Columbia Human Rights Law Review"},{"key":"bibr42-1461444816686327","volume-title":"Children and the European Union: Rights, Welfare and Accountability","author":"Stalford H","year":"2012"},{"key":"bibr43-1461444816686327","unstructured":"UK Information Commissioner\u2019s Office (ICO) (2010) Personal information online code of practice. Available at: https:\/\/ico.org.uk\/media\/for-organisations\/documents\/1591\/personal_information_online_cop.pdf"},{"key":"bibr44-1461444816686327","unstructured":"United Nations (UN) (1989) Convention on the Rights of the Child. Geneva: Office of the United Nations High Commissioner for Human Rights. Available at: www.ohchr.org\/en\/professionalinterest\/pages\/crc.aspx"},{"key":"bibr45-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-6265-005-3_7"},{"key":"bibr46-1461444816686327","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199970773.001.0001"},{"key":"bibr47-1461444816686327","volume-title":"Digital Ego: Social and Legal Aspects of Virtual Identity","author":"Van Kokswijk J","year":"2007"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816686327","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444816686327","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816686327","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:45:31Z","timestamp":1777693531000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444816686327"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,16]]},"references-count":47,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["10.1177\/1461444816686327"],"URL":"https:\/\/doi.org\/10.1177\/1461444816686327","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,16]]}}}