Tagged / internet

Conversation article: When to give your child their first mobile phone and how to keep them safe

Professor Andy Phippen answers some key questions for The Conversation about giving children mobile devices, based on his research into young people and the internet…

When to give your child their first mobile phone – and how to keep them safe

Pressmaster/Shutterstock

Andy Phippen, Bournemouth University

I spend my career researching young people and the internet: what they do online, what they think about it and how their views differ to those of their parents.

I often get questions from parents about their children’s internet use. One of the most common is when to get their child a mobile phone, as well as how to keep them safe when they have one. Here are my answers to some key questions.

How old should my child be when they get their first phone?

I’m afraid I often disappoint parents in my answer to this question by not giving them a definite number. But the key here is what your child is going to use the phone for – and when might be suitable for that individual child.

According to a 2023 report by UK communications regulator Ofcom, 20% of three year olds now own a mobile phone. But this phone may just be used for taking pictures, playing simple games and supervised video calls with family.

The more pertinent question is when children should have their own fully-connected phone, which they can use unsupervised to contact others online.

When a child is primary school age, it’s highly likely that they will be used to adult supervision in most aspects of their life. They will either be at school, at home, with friends and trusted adults or with other family members.

Their need to contact a distant adult may not be that great – but you will want to think about what the specific needs of your own child might be.

Typically the transition from primary school to secondary is when children might be more distant from home, or be involved in school activities or socialising with friends where being able to contact home becomes more important. I have spoken to plenty of young people who talk about starting secondary school as the point where they first had their own phone.

How do I make sure they use a phone safely?

First of all, it’s important that if your child is going online – at whatever age and regardless of the device they’re using – you have a conversation with them about online safety.

Parents have a role to play in educating their children and making them aware of the risks that come with being online, as well as being mindful that most online experiences are not harmful.

I have carried out extensive research with young people on online harms. As part of this research, I and colleagues developed a number of resources for parents, put together with the help of over 1,000 young people.

What these young people say the most is they want to know who to turn to when they need help. They want to be confident they will receive support, not a telling off or confiscation of their phone. This means that a key first step is to reassure your child that they can come to you with any problems they encounter and you will help them without judgment.

It’s also important to discuss with your child what they can and can’t do with their device. This could mean, for instance, setting ground rules about which apps they can have installed on their phone, and when they should stop using their phone at the end of the day.

You should also explore the privacy settings for the apps that your child uses, in order to ensure that they cannot be contacted by strangers or access inappropriate content. The NSPCC has resources for parents on how to use privacy settings.

Should I check my child’s phone?

Sometimes parents ask me about whether they should be able to check a child’s device – either by physically looking at the phone or by using “safetytech”, software on another device that can access the communications on the child’s phone.

Father and son looking at mobile phone
Open conversations about phone use are key.
Khorzhevska/Shutterstock

I believe it’s important that this is also something you discuss with your child. Trust is important to ensure that your child comes to you with any online issues, so if you want to monitor their phone, talk to them about it rather than doing so covertly.

It seems reasonable parental supervision to be accessing a child’s device when they are of primary age, in the same way a parent would check with another child’s parent before agreeing to let them visit their home.

However, as your child gets older, they might not want their parent to see all of their messages and online interactions. The UN Convention on the Rights of the Child clearly states that a child does have a right to privacy.

Should I track my child’s location through their phone?

I have spoken to some families that track each other’s devices in an open and transparent manner, and this is a decision for the family. However, I have also spoken to children who find it very creepy that a teenage friend is tracked by their parents.

The question here is whether parents are reassuring themselves that their child is safe – or whether they want to know what they are doing without them knowing. I had a particularly memorable conversation with someone who told me their friend was extremely upset because their daughter had changed device and so they could no longer track her. When I asked how old the daughter was, they said she was 22.

It’s also worth considering whether tech like this actually provides false reassurance. It may allow parents to know where their child is, but not necessarily whether they are safe.

As with monitoring a child’s phone, it is worth reflecting upon whether a surveillance approach creates the ideal conditions for them to come to you with problems, or whether this is more likely to be fostered by open conversations and an environment of mutual trust.The Conversation

Andy Phippen, Professor of IT Ethics and Digital Rights, Bournemouth University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

£4m collaborative R&D funding now open ! – Protecting data in industry

£4m collaborative R&D funding now open ! – 23 March 2015

Innovate UK is to invest up to £4 million in collaborative research and development (R&D) projects that tackle the growing risks of disruption to internet-enabled businesses and their digital supply. More information on this competition.

Competition Briefing Events – 25 March onwards at several locations

The event is an excellent opportunity for you to receive first hand information about the competition – its scope, application process, key dates etc. as well as meet and network with peers, potential partners, market leaders & innovators in the industry. More information & event registration page.

For queries about this competition, please contact support@innovateuk.gov.uk

£4m funding for ‘Protecting data in Industry’

 

£4m collaborative R&D funding opening soon – 23 March 2015

Innovate UK is to invest up to £4 million in collaborative research and development (R&D) projects that tackle the growing risks of disruption to internet-enabled businesses and their digital supply. More information on this competition.

Competition Briefing Events – 25 March onwards at several locations

The event is an excellent opportunity for you to receive first hand information about the competition – its scope, application process, key dates etc. as well as meet and network with peers, potential partners, market leaders & innovators in the industry. More information & event registration page.

For queries about this competition, please contact support@innovateuk.gov.uk

£4M Protecting Data in Industry

 

 

Innovate UK is to invest up to £4 million in collaborative research and development (R&D) projects that tackle the growing risks of disruption to internet-enabled businesses and their digital supply chains.

With the Internet of Things providing new sources of data and end-users’ ever-increasing digital footprint, it is difficult to adequately protect the interests of a business, industry or sector. There is also a lack of understanding of the effects disruption may have.  Desired proposals would address the challenge of protecting a business, industry or sector from digital disruption that could compromise data across the digital supply chain.

A series of briefing events are being run during March and April:

Belfast: 25 March 2015 – https://www.eventbrite.co.uk/e/protecting-data-in-industry-briefing-belfast-registration-15751274486

Cardiff: 30 March 2015 – https://www.eventbrite.co.uk/e/protecting-data-in-industry-briefing-cardiff-registration-15751564353

London: 31 March 2015 – https://www.etouches.com/118529

Edinburgh: 01 April 2015 – https://www.eventbrite.co.uk/e/protecting-data-in-industry-briefing-edinburgh-registration-15751602467

TSB competition – Internet of Things Ecosystem Demonstrator

The Technology Strategy Board is investing up to £4m in a competition to stimulate development of an open application and services ecosystem in the Internet of Things (IoT).

The Internet of Things – the trend for environments and objects to become more connected and to have more information associated with them – has the potential to stimulate large scale investment, create jobs and bring substantial economic growth. The number of connected objects is estimated to reach 50 billion by 2020, and the potential added value of services using the Internet of Things is likely to be counted in hundreds of billions of pounds a year, with new business models, applications and services across different sectors of the economy.

For Phase 1 of the demonstrator TSB have allocated up to £2.4m and are awarding up to £800k each to consortia to carry out 12-month projects funded at 100% of eligible costs. A further £1.6m is available in the second phase for scaling up the demonstrator.

In Phase 1 TSB are asking consortia to develop Internet of Things clusters. The clusters can be described as real-world scenarios, which include stakeholders with problems to be solved, application developers, owners of data streams from physical ‘things’ and technology businesses who can make this data available and usable via open information hubs. These clusters will form the heart of the demonstrator, tackling interoperability by agreeing and sharing data formats and external interfaces to the information hubs, and by co-ordinating and sharing their respective data.

This is a two-stage competition covering both phases of the demonstrator and is open to any consortium. Each consortium should consist of a prime contractor working with partners as sub-contractors and will need to include use case/ problem owners, data owners, and technology organisations. It opens on

15 October 2012 and the deadline for registering is noon on 14 November 2012.

Please note the deadline for receipt of expressions of interest is noon on 21 November 2012

Full proposals must be received by noon on 30 January 2013. Applicants should expect to start their projects no later than 1 April 2013.

The RKE Operations team can help you with your application. Please direct any enquiries to RKE Ops in the first instance.

Munchausen by Internet

Online health forums offer much needed support, advice and friendship for people suffering with illnesses. But within this supportive atmosphere, unwelcome visitors sometimes lurk; a breed of malicious, hurtful Internet trolls masquerading as real group members.

Munchausen by Internet (MBI) sees people faking illnesses and fabricating serious health conditions in online support groups, building relationships with genuine sufferers and generating sympathy for their invented condition.

In one case documented in 2011, a brother and sister posed as relations of a multiple sclerosis sufferer on a social networking website and created an elaborate narrative, which included diagnosis of terminal cancer and Hodgkin’s lymphoma, a baby miscarriage, pneumonia and the death of a loved one through a heart attack. They trapped their victim – a genuine MS sufferer called Elizabeth – into providing half a year of time-consuming and emotionally draining interaction with themselves and their fake personas.[i]

Events such as these can have devastating effects on online health communities, destroying trust when the hoax is exposed and sometimes damaging the communities beyond repair. But what can be done to manage this more effectively?

Andy Pulman and Dr Jacqui Taylor from Bournemouth University are the authors of a recent article on MBI and its motivation, opportunity, detection, effects and consequences. They suggest that MBI trolling should be formally acknowledged: “This will help patients, caregivers and practitioners to more effectively identify cases of MBI and minimise the growth of this behaviour as more and more people seek reassurance and support about their health in an online environment,” they explain.

Pulman and Taylor also suggest that more research is required in order to provide victims of suspected MBI trolls with the right advice and for facilitators of discussion groups to effectively manage interactions. “There is a clear, compelling need to recognise that in addition to MBI being classed as a condition in its own right, there is a subsection of people currently tagged as MBI sufferers who are MBI trolls intentionally harming well intentioned support groups and abusing members for their own pleasure or enjoyment. It is this area which needs urgent attention and action either by group users or the creators of the software that host them.”

‘Munchausen by Internet (MBI): Current research and future directions’ is published by the Journal of Medical Internet Research (JMIR). Read it online here.

[i] Case documented in Cunningham JM, Feldman MD. Munchausen by Internet: current perspectives and three new cases. Psychosomatics 2011 Apr;52(2):185-189.

FI- WARE are looking for additional partners

FI-WARE, the core platform of the future internet, invites proposals through the Directorate-General for Information Society and Media for its open call for additional partners. FI-WARE has reserved a portion of its budget to fund specific tasks carried out by a new beneficiary or beneficiaries, who will join the consortium after starting the project. Topics for this call are:

•advanced web-based user interface generic enablers, for which funding is worth up to €2.75 million;

•steam-oriented GEs, for which funding is worth up to €2.25m;

•cloud proxy extended development and management platform GE, for which funding is worth up to €1m.

The deadline is 07.11.12; to find out more info check out the FI-WARE webpage.