{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,13]],"date-time":"2026-05-13T19:41:40Z","timestamp":1778701300474,"version":"3.51.4"},"reference-count":61,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2017,1,23]],"date-time":"2017-01-23T00:00:00Z","timestamp":1485129600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2017,5]]},"abstract":"<jats:p>Children are becoming the objects of a multitude of monitoring devices that generate detailed data about them, and critical data researchers and privacy advocates are only just beginning to direct attention to these practices. In this article, we provide an overview and critique of these varied forms of datafication and dataveillance of children, from in utero through to the school years. Our approach is informed by recent calls for research on children\u2019s rights in the digital age that examines the conditions that give rise to children\u2019s needs and guide provision of resources necessary for development to their full potential, the array of specific harms they may encounter and the significance of and particular opportunities to participate in matters that affect their wellbeing and enable them to play an active part in society. There remains little evidence that specific instruments to safeguard children\u2019s rights in relation to dataveillance have been developed or implemented, and further attention needs to be paid to these issues.<\/jats:p>","DOI":"10.1177\/1461444816686328","type":"journal-article","created":{"date-parts":[[2017,1,24]],"date-time":"2017-01-24T01:27:38Z","timestamp":1485221258000},"page":"780-794","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":351,"title":["The datafied child: The dataveillance of children and implications for their rights"],"prefix":"10.1177","volume":"19","author":[{"given":"Deborah","family":"Lupton","sequence":"first","affiliation":[{"name":"University of Canberra, Australia"}]},{"given":"Ben","family":"Williamson","sequence":"additional","affiliation":[{"name":"University of Stirling, UK"}]}],"member":"179","published-online":{"date-parts":[[2017,1,23]]},"reference":[{"key":"bibr1-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1016\/j.geoforum.2013.04.016"},{"key":"bibr2-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702325"},{"key":"bibr3-1461444816686328","first-page":"1673","volume":"8","author":"Andrejevic M","year":"2014","journal-title":"International Journal of Communication"},{"key":"bibr4-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1136\/adc.2010.186668"},{"key":"bibr5-1461444816686328","doi-asserted-by":"crossref","unstructured":"boyd D, Hargittai E, Schultz J, (2011) Why parents help their children lie to Facebook about age: unintended consequences of the \u2018children\u2019s online privacy protection act\u2019. First Monday. Available at: http:\/\/journals.uic.edu\/ojs\/index.php\/fm\/article\/view\/3850","DOI":"10.5210\/fm.v16i11.3850"},{"issue":"1","key":"bibr6-1461444816686328","first-page":"93","volume":"55","author":"Crawford K","year":"2014","journal-title":"Boston College Law Review"},{"key":"bibr7-1461444816686328","unstructured":"Duggan M, Lehnhart A (2015) Parents and Social Media. Washington, DC: Pew Research Center. Available at: www.pewinternet.org\/2015\/07\/16\/parents-and-social-media\/"},{"key":"bibr8-1461444816686328","unstructured":"Electronic Frontier Foundation (EFF) (2015) Google deceptively tracks students\u2019 internet browsing, EFF says in FTC complaint. Electronic Frontier Foundation, 1 December. Available at: www.eff.org\/press\/releases\/google-deceptively-tracks-students-internet-browsing-eff-says-complaint-federal-trade"},{"key":"bibr9-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1177\/1461444803005002005"},{"key":"bibr10-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1177\/1474474015575473"},{"key":"bibr11-1461444816686328","unstructured":"Future of Privacy Forum (2016) About K-12 education. Available at: https:\/\/fpf.org\/issues\/k-12-education\/"},{"key":"bibr12-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-954X.2012.02126.x"},{"key":"bibr13-1461444816686328","first-page":"36","volume-title":"Surveillance Futures: Social and Ethical Implications of New Technologies for Children and Young People","author":"Gard M","year":"2017"},{"key":"bibr14-1461444816686328","unstructured":"Holloway D, Green L, Livingstone S (2013) Zero to Eight: Young Children and Their Internet Use. London: EU Kids Online. Available at: http:\/\/eprints.lse.ac.uk\/52630\/1\/Zero_to_eight.pdf"},{"key":"bibr15-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1080\/17439884.2014.953546"},{"key":"bibr16-1461444816686328","volume-title":"Childhood: Critical Concepts in Sociology","author":"Jenks C","year":"2005"},{"key":"bibr17-1461444816686328","doi-asserted-by":"publisher","DOI":"10.4135\/9781473909472"},{"key":"bibr18-1461444816686328","first-page":"149","volume-title":"Re-Orientation: Translingual, Transcultural, Transmedia","author":"Leaver T","year":"2016"},{"key":"bibr19-1461444816686328","volume-title":"Childhood and Society: Growing Up in an Age of Uncertainty","author":"Lee N","year":"2001"},{"key":"bibr20-1461444816686328","unstructured":"Levy K (2015) Intimate surveillance. Idaho Law Review. Available at: www.uidaho.edu\/law\/law-review\/articles"},{"key":"bibr21-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1080\/17482798.2015.1123164"},{"key":"bibr22-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1057\/fr.2009.22"},{"key":"bibr23-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1057\/9781137310729"},{"key":"bibr24-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1080\/13573322.2014.962496"},{"key":"bibr25-1461444816686328","volume-title":"Digital Sociology","author":"Lupton D","year":"2015"},{"key":"bibr26-1461444816686328","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctt1t89cfr.27"},{"key":"bibr27-1461444816686328","volume-title":"The Quantified Self: A Sociology of Self-tracking","author":"Lupton D","year":"2016"},{"key":"bibr28-1461444816686328","doi-asserted-by":"publisher","DOI":"10.4324\/9781315745664-21"},{"key":"bibr29-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1016\/j.wombi.2016.01.008"},{"key":"bibr30-1461444816686328","doi-asserted-by":"crossref","unstructured":"Lupton D, Thomas GM (2015) Playing pregnancy: the ludification and gamification of expectant motherhood in smartphone apps. M\/C Journal. Available at: http:\/\/journal.media-culture.org.au\/index.php\/mcjournal\/article\/viewArticle\/1012","DOI":"10.5204\/mcj.1012"},{"key":"bibr31-1461444816686328","volume-title":"Liquid Surveillance: A Conversation","author":"Lyon D","year":"2013"},{"key":"bibr32-1461444816686328","doi-asserted-by":"crossref","unstructured":"McCarthy M (2013) Experts warn on data security in health and fitness apps. British Medical Journal. Available at: www.bmj.com\/content\/347\/bmj.f5600","DOI":"10.1136\/bmj.f5600"},{"key":"bibr33-1461444816686328","unstructured":"Madden M, Lehnhart A, Cortesi S, (2013) Teens, Social Media, and Privacy. Washington, DC: Pew Research Center. Available at: www.pewinternet.org\/2013\/05\/21\/teens-social-media-and-privacy\/"},{"key":"bibr34-1461444816686328","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v9i4.4342"},{"key":"bibr35-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1145\/2674683.2674699"},{"key":"bibr36-1461444816686328","unstructured":"Owens C (2015) Stranger hacks family\u2019s baby monitor and talks to child at night. The San Francisco Globe, 15 December. Available at: http:\/\/sfglobe.stfi.re\/2016\/01\/06\/stranger-hacks-familys-baby-monitor-and-talks-to-child-at-night\/?sf=zpbnxl"},{"key":"bibr37-1461444816686328","unstructured":"Peterson A (2015) Toymakers are tracking more data about kids \u2013 leaving them exposed to hackers. The Washington Post, 30 November. Available at: www.washingtonpost.com\/news\/the-switch\/wp\/2015\/11\/30\/toymakers-are-tracking-more-data-about-kids-leaving-them-exposed-to-hackers\/"},{"key":"bibr38-1461444816686328","doi-asserted-by":"crossref","unstructured":"Polonetsky J, Jerome J (2014) Student Data: Trust, Transparency and the Role of Consent. Future of Privacy Forum. Available at: https:\/\/fpf.org\/wp-content\/uploads\/FPF_Education_Consent_StudentData_Oct2014.pdf","DOI":"10.2139\/ssrn.2628877"},{"key":"bibr39-1461444816686328","doi-asserted-by":"crossref","first-page":"121","DOI":"10.7551\/mitpress\/9302.003.0009","volume-title":"\u2018Raw Data\u2019 is an Oxymoron","author":"Raley R","year":"2013"},{"key":"bibr40-1461444816686328","volume-title":"Measuring and Understanding Learner Emotions: Evidence and Prospects","author":"Rientes B","year":"2015"},{"key":"bibr41-1461444816686328","unstructured":"Robinson D, Yu H, Rieke A (2014) Civil Rights, Big Data, and our Algorithmic Future. Robinson + Yu. Available at: http:\/\/centerformediajustice.org\/wp-content\/uploads\/2014\/10\/Civil-Rights_Big-Data_Our-Future.pdf"},{"key":"bibr42-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511488856"},{"key":"bibr43-1461444816686328","doi-asserted-by":"crossref","unstructured":"Rosenblat A, Wikelius K, Boyd D, (2014) Data and Civil Rights: Health Primer. Data & Society Research Institute. Available at: http:\/\/www.datacivilrights.org\/pubs\/2014-1030\/Health.pdf","DOI":"10.2139\/ssrn.2541509"},{"key":"bibr44-1461444816686328","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v10i3\/4.4528"},{"key":"bibr45-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1177\/1461444813495160"},{"key":"bibr46-1461444816686328","volume-title":"Is Technology Good for Education?","author":"Selwyn N","year":"2016"},{"key":"bibr47-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1177\/0002764213498851"},{"key":"bibr48-1461444816686328","unstructured":"Simon S (2014) Big brother: meet the parents. Politico, 5 June. Available at: www.politico.com\/story\/2014\/06\/internet-data-mining-children-107461.html"},{"key":"bibr49-1461444816686328","unstructured":"Singer N (2015a) Tools for tailored learning may expose students\u2019 personal details. The New York Times, 30 August. Available at: www.nytimes.com\/2015\/08\/31\/technology\/tools-for-tailored-learning-may-expose-students-personal-details.html?_r=0"},{"key":"bibr50-1461444816686328","unstructured":"Singer N (2015b) Uncovering security flaws in digital education products for schoolchildren. The New York Times, 8 February. Available at: www.nytimes.com\/2015\/02\/09\/technology\/uncovering-security-flaws-in-digital-education-products-for-schoolchildren.html"},{"key":"bibr51-1461444816686328","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"bibr52-1461444816686328","unstructured":"Student Privacy Pledge (2016) Available at: http:\/\/studentprivacypledge.org\/"},{"key":"bibr53-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1057\/9781137308863"},{"key":"bibr54-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1080\/13698575.2015.1127333"},{"key":"bibr55-1461444816686328","unstructured":"Timms P (2015) Hello Barbie: Wi-Fi enabled doll labelled a bedroom security risk. Available at: www.abc.net.au\/news\/2015&ndash;11\u201327.wi-fi-enabled-hello-barbie-doll-raises-security-concerns\/6981528"},{"key":"bibr56-1461444816686328","volume-title":"Convention on the Rights of the Child","author":"United Nations (UN)","year":"1989"},{"key":"bibr57-1461444816686328","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v12i2.4776"},{"key":"bibr58-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1080\/13676260902960752"},{"key":"bibr59-1461444816686328","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v11i1\/2.4454"},{"key":"bibr60-1461444816686328","doi-asserted-by":"publisher","DOI":"10.1080\/13573322.2014.962494"},{"key":"bibr61-1461444816686328","first-page":"50","volume-title":"Surveillance Futures: Social and Ethical Implications of New Technologies for Children and Young People","author":"Williamson B","year":"2017"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816686328","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444816686328","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444816686328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:45:31Z","timestamp":1777693531000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444816686328"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,23]]},"references-count":61,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["10.1177\/1461444816686328"],"URL":"https:\/\/doi.org\/10.1177\/1461444816686328","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1,23]]}}}