The Times Australia
The Times World News

.
The Times Real Estate

.

91% of Australian teens have a phone – but many are not keeping their identity and location secure

  • Written by Yeslam Al-Saggaf, Professor in Computing, Charles Sturt University

Most Australian teenagers have their own smartphone. According to a 2023 survey[1], 91% of young people between 14 and 17 owned a phone.

At the same time, there is huge community concern[2] about young people being exposed to harms online – this includes the content they consume and the interactions they might have.

But there is also concern about their privacy and security. A 2023 UK study found[3] teenagers are overly optimistic about the degree to which they can protect their personal information online.

This is a problem because smartphones can communicate information such as identities and locations when settings are not figured correctly.

Our new project – which has been funded by the eSafety Commissioner[4] and will soon be available online – looked at how to teach students to be safer with their phones.

What are the risks?

Without changing the default settings, a phone (or smart watch, laptop or tablet) can share information[5] such as full names, current locations and the duration of their stay in those locations. This makes it easy for others with basic IT knowledge to create profiles of someone’s movements over time.

Children are at particular risk, as they often connect to free public Wi-Fi networks[6]. They may also be more likely to exchange photos with strangers online[7] and accept social media friend requests[8] without caution.

This also puts them at increased risk of having their identity or money stolen or coming into contact with people who may wish them harm.

A teenage boy in school uniform and backpack looks at a phone.
It is easy to give away your identity and location if your phone is not set up securely. POP-THAILAND/Shutterstock, CC BY[9][10]

Our research

Our project was conducted in seven high schools in regional New South Wales between August 2023 and April 2024.

First, we set up network sensors in two schools to monitor data leakage from students’ phones. We wanted to know the extent to which they were they giving away names and locations of the students. This was conducted over several weeks to establish a baseline for their typical data leakage levels.

Next, we gave 4,460 students in seven high schools lessons in how smartphones can leak sensitive information and how to stop this. The students were shown how to turn off their Bluetooth and switch off their Wi-Fi. They were also shown how to change their Bluetooth name and switch off their location services.

We then measured data leakage after the lesson in the two schools with network sensors.

We also conducted a survey on 574 students across five other schools, to measure their knowledge before and after the lesson. Of this group, about 90% of students owned a smartphone and most were aged between 14 and 16.

What did we find?

We found a significant reduction in data leakage after students were given the lessons.

At the two schools we monitored, we found the number of identifiable phones fell by about 30% after the education session.

The survey results also indicated the lessons had been effective. There was an 85% improvement in students’ “knowledge of smartphone settings” questions.

There was also a 15% improvement in students’ use of a safer, fake name as their smartphone name after the lessons – for example, instead of “Joshua’s phone”, calling it “cool dude”.

There was a 7% increase in concern about someone knowing where they were at a particular point in time, and a 10% increase in concern about someone knowing what their regular travel route to school was.

However, despite their enhanced understanding, many students continued to keep their Wi-Fi and Bluetooth settings enabled all the time, as this gave them convenient access to school and home Wi-Fi networks and headphone connections. This is an example of the “privacy paradox[11]” where individuals prioritise convenience over security, even when aware of the risks.

A smartphone screen, showing settings for Bluetook and Wi-Fi.
Our study found education sessions can improve the way teenage students use their phones. PSGflash/Shutterstock, CC BY[12][13]

How can students keep their phones safe?

There are three things young people – and others – can do to keep their smartphones safe.

1. Switch off services you don’t use

Phone owners should ask themselves: do I really need to keep all the available services on? If they are not using Wi-Fi, Bluetooth or location services (such as Snap Map, where you share your location with friends), they should turn them off.

As our research indicated, young people are unlikely to do this because it is inconvenient. Many young people want to connect to their headphones at all times so they can listen to music, watch videos and talk to friends.

2. Hide the device

If teens can’t switch off these services, they can at least de-identify their device by replacing their real name on the phone with something else. They can use a name parents and friends will recognise but will not link them to their other data.

They can also hide their device by not giving away the type of phone they are using (this can be done in general settings). This will prevent cyber attackers from linking their phone to the security vulnerabilities with their make of phone.

3. Control each app

Ideally, students should also go in and check smartphone settings for individual apps as well – and turn off services for apps that don’t require them. It is now easy to find out which apps have access to location services and your phone’s camera or microphone.

References

  1. ^ 2023 survey (www.oaic.gov.au)
  2. ^ community concern (theconversation.com)
  3. ^ UK study found (www.tandfonline.com)
  4. ^ funded by the eSafety Commissioner (www.esafety.gov.au)
  5. ^ can share information (dl.acm.org)
  6. ^ free public Wi-Fi networks (www.researchgate.net)
  7. ^ exchange photos with strangers online (web-assets.esetstatic.com)
  8. ^ social media friend requests (www.esafety.gov.au)
  9. ^ POP-THAILAND/Shutterstock (www.shutterstock.com)
  10. ^ CC BY (creativecommons.org)
  11. ^ privacy paradox (www.sciencedirect.com)
  12. ^ PSGflash/Shutterstock (www.shutterstock.com)
  13. ^ CC BY (creativecommons.org)

Read more https://theconversation.com/91-of-australian-teens-have-a-phone-but-many-are-not-keeping-their-identity-and-location-secure-237981

The Times Features

10 Smart Ways Australians Can Slash Their Electricity Bills in 2025

Electricity prices in Australia continue to rise, but that does not mean you have to sacrifice your lifestyle to save money. By making a few smart changes, you can lower your pow...

Trusted Healthcare Construction Company for Modern Facilities

Achieving quality, safety, and innovative medical facilities is challenging in an ever-changing healthcare world without collaboration with a trusted healthcare construction comp...

How to Treat Hair Loss Without a Hair Transplant

Understanding Hair Loss Hair loss can significantly affect individuals, both physically and emotionally. Identifying the causes and types can help address the issue more effecti...

How to Find a Trustworthy Professional for Your Plumbing Needs

Nowra is an idyllic locality often referred to as the city of the Shoalhaven City Council in the South Coast region of New South Wales, Australia. This picturesque suburb feature...

How to Choose a Mattress for Back/Neck Pain and All Sleepers?

Waking up with a stiff neck or aching back can derail your entire day. If you're one of the millions struggling with chronic pain, a supportive mattress is more than a luxury – i...

What to Look for in a Professional Debt Collection Service

Often in life, overdue payments are accidental or caused by unusual circumstances. This can cause some temporary convenience, but everything carries on as usual. However, when th...

Times Magazine

The Essential Guide to Transforming Office Spaces for Maximum Efficiency

Why Office Fitouts MatterA well-designed office can make all the difference in productivity, employee satisfaction, and client impressions. Businesses of all sizes are investing in updated office spaces to create environments that foster collaborat...

The A/B Testing Revolution: How AI Optimized Landing Pages Without Human Input

A/B testing was always integral to the web-based marketing world. Was there a button that converted better? Marketing could pit one against the other and see which option worked better. This was always through human observation, and over time, as d...

Using Countdown Timers in Email: Do They Really Increase Conversions?

In a world that's always on, where marketers are attempting to entice a subscriber and get them to convert on the same screen with one email, the power of urgency is sometimes the essential element needed. One of the most popular ways to create urg...

Types of Software Consultants

In today's technology-driven world, businesses often seek the expertise of software consultants to navigate complex software needs. There are several types of software consultants, including solution architects, project managers, and user experienc...

CWU Assistive Tech Hub is Changing Lives: Win a Free Rollator Walker This Easter!

🌟 Mobility. Independence. Community. All in One. This Easter, the CWU Assistive Tech Hub is pleased to support the Banyule community by giving away a rollator walker. The giveaway will take place during the Macleod Village Easter Egg Hunt & Ma...

"Eternal Nurture" by Cara Barilla: A Timeless Collection of Wisdom and Healing

Renowned Sydney-born author and educator Cara Barilla has released her latest book, Eternal Nurture, a profound collection of inspirational quotes designed to support mindfulness, emotional healing, and personal growth. With a deep commitment to ...

LayBy Shopping