Preliminary Considerations on Artificial Intelligence and Democratic Cyber Safety for the Protection of Children

doi: 10.53116/pgaflr.8643

Abstract

Pervasive computing has abused information and communication technologies and created new kinds of systemic risks and societal vulnerabilities. With the rise of artificial intelligence, deep learning, machine learning, and pattern recognition systems, all those petabytes of information can be analysed and used to seriously interfere with the rights and liberties of others, and, in particular, it can be used to reveal the most intimate aspects of the lives of others. This, in turn, has offered new and unheard means of criminality, ranging from financial offenses to child exploitation. Therefore, there is a social responsibility for developing systems capable of mitigating the risks that the development of information and communications technologies poses to society. Given that this particular threat involves expression, efforts to mitigate expression-related misconduct must attend to rules that protect expression from government regulation. This article considers one particular area of expression-related misconduct, namely the online abuse of children.

Keywords:

safety security AI child protection free speech

How to Cite

Losavio, M. Preliminary Considerations on Artificial Intelligence and Democratic Cyber Safety for the Protection of Children. Public Governance, Administration and Finances Law Review. https://doi.org/10.53116/pgaflr.8643

References

Bennett, N. & O’Donohue, W. (2014). The Construct of Grooming in Child Sexual Abuse: Conceptual and Measurement Issues. Journal of Child Sexual Abuse, 23(8), 957–976. Online: https://doi.org/10.1080/10538712.2014.960632

Black, P. J., Wollis, M., Woodworth, M. & Hancock, J. T. (2015). A Linguistic Analysis of Grooming Strategies of Online Child Sex Offenders: Implications for Our Understanding of Predatory Sexual Behavior in an Increasingly Computer-Mediated World. Child Abuse & Neglect, 44, 140–149. Online: https://doi.org/10.1016/j.chiabu.2014.12.004

Cohen, L. E. & Felson, M. (1979). Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review, 44(4), 588–608. Online: https://doi.org/10.2307/2094589

Craven, S., Brown, S. & Gilchrist, E. (2006). Sexual Grooming of Children: Review of Literature and Theoretical Considerations. Journal of Sexual Aggression, 12(3), 287–299. Online: https://doi.org/10.1080/13552600601069414

Electronic Privacy Information Center (2026, March 25). Jury Finds Meta and Google Negligent in Landmark Social Media Addiction Case. Online: https://epic.org/jury-finds-meta-and-google-negligent-in-landmarksocial-media-addiction-case/

Federal Bureau of Investigation (2025, August 19). Staying One Step Ahead: How to Protect Kids from Emerging Online Threats. Online: https://www.fbi.gov/contact-us/field-offices/jacksonville/news/staying-onestep-ahead-how-to-protect-kids-from-emerging-online-threats

Fowler, M. J., Lybert, K. A., M.A., Owens, J. N., M.A. & Waterfield, J. M. (2020, August 6). Undercover Chatting with Child Sex Offenders. United States Federal Bureau of Investigation, Featured Articles. Online: https://leb.fbi.gov/articles/featured-articles/undercover-chatting-with-child-sex-offenders

Fu, Y., Peng, H., Ou, L., Sabharwal, A. & Khot, T. (2023). Specializing Smaller Language Models Towards Multi-Step Reasoning. Proceedings of the 40th International Conference on Machine Learning, PMLR 202, 10421–10430. Online: https://proceedings.mlr.press/v202/fu23d/fu23d.pdf

Kramer, J. (2024, November 5). Louisiana Signs $3M Deal for High-Tech Investigations. The Times-Picayune. Online: https://tinyurl.com/43bpjnr8

Kyrik, Kelly (2005). Trolling for Predators: More and More Law Enforcement Officers Are Actively Working the Internet to Track, Apprehend, and Prosecute Pedophiles. Police: The Law Enforcement Magazine, 29(10), 32–40.

Lorenzo-Dus, N., Kinzel, A. & Di Cristofaro, M. (2020). The Communicative Modus Operandi of Online Child Sexual Groomers: Recurring Patterns in their Language Use. Journal of Pragmatics, 155, 15–27. Online: https://doi.org/10.1016/j.pragma.2019.09.010

Mavali, S., Ricker, J., Pape, D., Fischer, A. & Schönherr, L. (2024). Fake It until You Break It: On the Adversarial Robustness of AI-generated Image Detectors. arXiv. Online: https://doi.org/10.48550/arXiv.2410.01574

Mulvaney, E. & Bobrowsky, M. (2026, March 24). Landmark Verdict Says Meta Harmed Children, Allowing Adults to Prey on Them. The Wall Street Journal. Online: https://www.wsj.com/tech/landmark-verdictsays-meta-harmed-children-allowing-adults-to-prey-on-them-cb3ad674

National Institute of Justice (2024, May 8). Unconventional Wisdom: Research Shakes up Assumptions About Sex Trafficking Clues in Online Escort Ads. Online: https://tinyurl.com/pakavj8x

O’Connell, R. (2020). Freedom of Expression. In Law, Democracy and the European Court of Human Rights (pp. 84–119). Cambridge University Press. Online: https://doi.org/10.1017/9781139547246.007

O’Keeffe, K. & McWhirter, C. (2023, September 17). New Orleans DA Fights “Terrorism” on Streets with AI Spycraft. The Wall Street Journal. Online: https://tinyurl.com/5xsv9khd

Petroff, A. (2018, April 5). Yes, Facebook Is Scanning Your Messages for Abuse. CNN Business. Online: https://tinyurl.com/4cbm6crj

Plaisance, S. (2024, November 18). Tulane Researchers Partner with Court Watch NOLA to Boost Criminal Justice Transparency. Tulane University of Science and Engineering. Online: https://tinyurl.com/54xwd4jk

Pollack, D. & MacIver, A. (2015). Understanding Sexual Grooming in Child Abuse Cases. Child Law Practice, 34(11), 166–168.

Sartain, M. (2024, June 24). Large Language Models (LLMs) vs. Small Language Models (SLMs). Rackspace Technology. Online: https://tinyurl.com/3cv6vk8s

Shackelford, S., Hiller, J., Makridis, C., Nash, I., Kisska-Schulze, K. & Travis, H. (2025). Moving Slow and Fixing Things. Indiana Law Journal, 100(4), 1611–1671. Online: https://www.repository.law.indiana.edu/ilj/vol100/iss4/8/

United States Federal Trade Commission (s. a.). Protecting Kids Online. Online: https://consumer.ftc.gov/identity-theft-and-online-security/protecting-kids-online

Wachs, S., Wolf, K. D. & Pan, C. (2012). Cybergrooming: Risk Factors, Coping Strategies and Associations with Cyberbullying. Psicothema, 24(4), 628–633. Online: https://www.psicothema.com/pdf/4064.pdf

Winters, G. M. & Jeglic, E. L. (2017). Stages of Sexual Grooming: Recognizing Potentially Predatory Behaviors of Child Molesters. Deviant Behavior, 38(6), 724–733. Online: https://doi.org/10.1080/01639625.2016.1197656

Downloads

Download data is not yet available.