The Times Australia
The Times World News

.
The Times Real Estate

.

91% of Australian teens have a phone – but many are not keeping their identity and location secure

  • Written by Yeslam Al-Saggaf, Professor in Computing, Charles Sturt University

Most Australian teenagers have their own smartphone. According to a 2023 survey[1], 91% of young people between 14 and 17 owned a phone.

At the same time, there is huge community concern[2] about young people being exposed to harms online – this includes the content they consume and the interactions they might have.

But there is also concern about their privacy and security. A 2023 UK study found[3] teenagers are overly optimistic about the degree to which they can protect their personal information online.

This is a problem because smartphones can communicate information such as identities and locations when settings are not figured correctly.

Our new project – which has been funded by the eSafety Commissioner[4] and will soon be available online – looked at how to teach students to be safer with their phones.

What are the risks?

Without changing the default settings, a phone (or smart watch, laptop or tablet) can share information[5] such as full names, current locations and the duration of their stay in those locations. This makes it easy for others with basic IT knowledge to create profiles of someone’s movements over time.

Children are at particular risk, as they often connect to free public Wi-Fi networks[6]. They may also be more likely to exchange photos with strangers online[7] and accept social media friend requests[8] without caution.

This also puts them at increased risk of having their identity or money stolen or coming into contact with people who may wish them harm.

A teenage boy in school uniform and backpack looks at a phone.
It is easy to give away your identity and location if your phone is not set up securely. POP-THAILAND/Shutterstock, CC BY[9][10]

Our research

Our project was conducted in seven high schools in regional New South Wales between August 2023 and April 2024.

First, we set up network sensors in two schools to monitor data leakage from students’ phones. We wanted to know the extent to which they were they giving away names and locations of the students. This was conducted over several weeks to establish a baseline for their typical data leakage levels.

Next, we gave 4,460 students in seven high schools lessons in how smartphones can leak sensitive information and how to stop this. The students were shown how to turn off their Bluetooth and switch off their Wi-Fi. They were also shown how to change their Bluetooth name and switch off their location services.

We then measured data leakage after the lesson in the two schools with network sensors.

We also conducted a survey on 574 students across five other schools, to measure their knowledge before and after the lesson. Of this group, about 90% of students owned a smartphone and most were aged between 14 and 16.

What did we find?

We found a significant reduction in data leakage after students were given the lessons.

At the two schools we monitored, we found the number of identifiable phones fell by about 30% after the education session.

The survey results also indicated the lessons had been effective. There was an 85% improvement in students’ “knowledge of smartphone settings” questions.

There was also a 15% improvement in students’ use of a safer, fake name as their smartphone name after the lessons – for example, instead of “Joshua’s phone”, calling it “cool dude”.

There was a 7% increase in concern about someone knowing where they were at a particular point in time, and a 10% increase in concern about someone knowing what their regular travel route to school was.

However, despite their enhanced understanding, many students continued to keep their Wi-Fi and Bluetooth settings enabled all the time, as this gave them convenient access to school and home Wi-Fi networks and headphone connections. This is an example of the “privacy paradox[11]” where individuals prioritise convenience over security, even when aware of the risks.

A smartphone screen, showing settings for Bluetook and Wi-Fi.
Our study found education sessions can improve the way teenage students use their phones. PSGflash/Shutterstock, CC BY[12][13]

How can students keep their phones safe?

There are three things young people – and others – can do to keep their smartphones safe.

1. Switch off services you don’t use

Phone owners should ask themselves: do I really need to keep all the available services on? If they are not using Wi-Fi, Bluetooth or location services (such as Snap Map, where you share your location with friends), they should turn them off.

As our research indicated, young people are unlikely to do this because it is inconvenient. Many young people want to connect to their headphones at all times so they can listen to music, watch videos and talk to friends.

2. Hide the device

If teens can’t switch off these services, they can at least de-identify their device by replacing their real name on the phone with something else. They can use a name parents and friends will recognise but will not link them to their other data.

They can also hide their device by not giving away the type of phone they are using (this can be done in general settings). This will prevent cyber attackers from linking their phone to the security vulnerabilities with their make of phone.

3. Control each app

Ideally, students should also go in and check smartphone settings for individual apps as well – and turn off services for apps that don’t require them. It is now easy to find out which apps have access to location services and your phone’s camera or microphone.

References

  1. ^ 2023 survey (www.oaic.gov.au)
  2. ^ community concern (theconversation.com)
  3. ^ UK study found (www.tandfonline.com)
  4. ^ funded by the eSafety Commissioner (www.esafety.gov.au)
  5. ^ can share information (dl.acm.org)
  6. ^ free public Wi-Fi networks (www.researchgate.net)
  7. ^ exchange photos with strangers online (web-assets.esetstatic.com)
  8. ^ social media friend requests (www.esafety.gov.au)
  9. ^ POP-THAILAND/Shutterstock (www.shutterstock.com)
  10. ^ CC BY (creativecommons.org)
  11. ^ privacy paradox (www.sciencedirect.com)
  12. ^ PSGflash/Shutterstock (www.shutterstock.com)
  13. ^ CC BY (creativecommons.org)

Read more https://theconversation.com/91-of-australian-teens-have-a-phone-but-many-are-not-keeping-their-identity-and-location-secure-237981

The Times Features

How to Choose the Perfect Outdoor Lift for Your Home

Choosing the right outdoor lift for your home is a decision that blends functionality, aesthetics, and safety. Outdoor lifts not only enhance mobility but also increase the value...

The Importance of Pre-Purchase Building Inspections

Purchasing a property is quite possibly one of the most significant financial decisions you'll ever make. The allure of a new home or investment can often overshadow the necessit...

The Legal Battle Against IP Theft: What Businesses Need to Know

So you've formulated that million-dollar idea and you're ready to take your business to the next level. You were so excited to publicize your supposedly next big thing that you...

Why Roof Replacement Is the Best Solution for Roofs with Major Leaks

When your roof is leaking extensively, the situation can be both frustrating and worrying. The constant drip-drip-drip of water, the potential for structural damage, and the risi...

Some vegetables are pretty low in fibre. So which veggies are high-fibre heroes?

Many people looking to improve their health try to boost fibre intake by eating more vegetables. But while all veggies offer health benefits, not all are particularly high i...

Why Your Tennis Game Isn’t Improving (And How to Fix It)

Tennis is a sport that demands precision, endurance, strategy, and mental toughness. Whether you play casually or competitively, you may reach a frustrating point where your prog...

Times Magazine

Why You Should Choose Digital Printing for Your Next Project

In the rapidly evolving world of print media, digital printing has emerged as a cornerstone technology that revolutionises how businesses and creative professionals produce printed materials. Offering unparalleled flexibility, speed, and quality, d...

What to Look for When Booking an Event Space in Melbourne

Define your event needs early to streamline venue selection and ensure a good fit. Choose a well-located, accessible venue with good transport links and parking. Check for key amenities such as catering, AV equipment, and flexible seating. Pla...

How BIM Software is Transforming Architecture and Engineering

Building Information Modeling (BIM) software has become a cornerstone of modern architecture and engineering practices, revolutionizing how professionals design, collaborate, and execute projects. By enabling more efficient workflows and fostering ...

How 32-Inch Computer Monitors Can Increase Your Workflow

With the near-constant usage of technology around the world today, ergonomics have become crucial in business. Moving to 32 inch computer monitors is perhaps one of the best and most valuable improvements you can possibly implement. This-sized moni...

Top Tips for Finding a Great Florist for Your Sydney Wedding

While the choice of wedding venue does much of the heavy lifting when it comes to wowing guests, decorations are certainly not far behind. They can add a bit of personality and flair to the traditional proceedings, as well as enhancing the venue’s ...

Avant Stone's 2025 Nature's Palette Collection

Avant Stone, a longstanding supplier of quality natural stone in Sydney, introduces the 2025 Nature’s Palette Collection. Curated for architects, designers, and homeowners with discerning tastes, this selection highlights classic and contemporary a...

LayBy Shopping