The Times Australia
The Times World News

.

91% of Australian teens have a phone – but many are not keeping their identity and location secure

  • Written by Yeslam Al-Saggaf, Professor in Computing, Charles Sturt University

Most Australian teenagers have their own smartphone. According to a 2023 survey[1], 91% of young people between 14 and 17 owned a phone.

At the same time, there is huge community concern[2] about young people being exposed to harms online – this includes the content they consume and the interactions they might have.

But there is also concern about their privacy and security. A 2023 UK study found[3] teenagers are overly optimistic about the degree to which they can protect their personal information online.

This is a problem because smartphones can communicate information such as identities and locations when settings are not figured correctly.

Our new project – which has been funded by the eSafety Commissioner[4] and will soon be available online – looked at how to teach students to be safer with their phones.

What are the risks?

Without changing the default settings, a phone (or smart watch, laptop or tablet) can share information[5] such as full names, current locations and the duration of their stay in those locations. This makes it easy for others with basic IT knowledge to create profiles of someone’s movements over time.

Children are at particular risk, as they often connect to free public Wi-Fi networks[6]. They may also be more likely to exchange photos with strangers online[7] and accept social media friend requests[8] without caution.

This also puts them at increased risk of having their identity or money stolen or coming into contact with people who may wish them harm.

A teenage boy in school uniform and backpack looks at a phone.
It is easy to give away your identity and location if your phone is not set up securely. POP-THAILAND/Shutterstock, CC BY[9][10]

Our research

Our project was conducted in seven high schools in regional New South Wales between August 2023 and April 2024.

First, we set up network sensors in two schools to monitor data leakage from students’ phones. We wanted to know the extent to which they were they giving away names and locations of the students. This was conducted over several weeks to establish a baseline for their typical data leakage levels.

Next, we gave 4,460 students in seven high schools lessons in how smartphones can leak sensitive information and how to stop this. The students were shown how to turn off their Bluetooth and switch off their Wi-Fi. They were also shown how to change their Bluetooth name and switch off their location services.

We then measured data leakage after the lesson in the two schools with network sensors.

We also conducted a survey on 574 students across five other schools, to measure their knowledge before and after the lesson. Of this group, about 90% of students owned a smartphone and most were aged between 14 and 16.

What did we find?

We found a significant reduction in data leakage after students were given the lessons.

At the two schools we monitored, we found the number of identifiable phones fell by about 30% after the education session.

The survey results also indicated the lessons had been effective. There was an 85% improvement in students’ “knowledge of smartphone settings” questions.

There was also a 15% improvement in students’ use of a safer, fake name as their smartphone name after the lessons – for example, instead of “Joshua’s phone”, calling it “cool dude”.

There was a 7% increase in concern about someone knowing where they were at a particular point in time, and a 10% increase in concern about someone knowing what their regular travel route to school was.

However, despite their enhanced understanding, many students continued to keep their Wi-Fi and Bluetooth settings enabled all the time, as this gave them convenient access to school and home Wi-Fi networks and headphone connections. This is an example of the “privacy paradox[11]” where individuals prioritise convenience over security, even when aware of the risks.

A smartphone screen, showing settings for Bluetook and Wi-Fi.
Our study found education sessions can improve the way teenage students use their phones. PSGflash/Shutterstock, CC BY[12][13]

How can students keep their phones safe?

There are three things young people – and others – can do to keep their smartphones safe.

1. Switch off services you don’t use

Phone owners should ask themselves: do I really need to keep all the available services on? If they are not using Wi-Fi, Bluetooth or location services (such as Snap Map, where you share your location with friends), they should turn them off.

As our research indicated, young people are unlikely to do this because it is inconvenient. Many young people want to connect to their headphones at all times so they can listen to music, watch videos and talk to friends.

2. Hide the device

If teens can’t switch off these services, they can at least de-identify their device by replacing their real name on the phone with something else. They can use a name parents and friends will recognise but will not link them to their other data.

They can also hide their device by not giving away the type of phone they are using (this can be done in general settings). This will prevent cyber attackers from linking their phone to the security vulnerabilities with their make of phone.

3. Control each app

Ideally, students should also go in and check smartphone settings for individual apps as well – and turn off services for apps that don’t require them. It is now easy to find out which apps have access to location services and your phone’s camera or microphone.

References

  1. ^ 2023 survey (www.oaic.gov.au)
  2. ^ community concern (theconversation.com)
  3. ^ UK study found (www.tandfonline.com)
  4. ^ funded by the eSafety Commissioner (www.esafety.gov.au)
  5. ^ can share information (dl.acm.org)
  6. ^ free public Wi-Fi networks (www.researchgate.net)
  7. ^ exchange photos with strangers online (web-assets.esetstatic.com)
  8. ^ social media friend requests (www.esafety.gov.au)
  9. ^ POP-THAILAND/Shutterstock (www.shutterstock.com)
  10. ^ CC BY (creativecommons.org)
  11. ^ privacy paradox (www.sciencedirect.com)
  12. ^ PSGflash/Shutterstock (www.shutterstock.com)
  13. ^ CC BY (creativecommons.org)

Read more https://theconversation.com/91-of-australian-teens-have-a-phone-but-many-are-not-keeping-their-identity-and-location-secure-237981

Times Magazine

Data Management Isn't Just About Tech—Here’s Why It’s a Human Problem Too

Photo by Kevin Kuby Manuel O. Diaz Jr.We live in a world drowning in data. Every click, swipe, medical scan, and financial transaction generates information, so much that managing it all has become one of the biggest challenges of our digital age. Bu...

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Decline of Hyper-Casual: How Mid-Core Mobile Games Took Over in 2025

In recent years, the mobile gaming landscape has undergone a significant transformation, with mid-core mobile games emerging as the dominant force in app stores by 2025. This shift is underpinned by changing user habits and evolving monetization tr...

Understanding ITIL 4 and PRINCE2 Project Management Synergy

Key Highlights ITIL 4 focuses on IT service management, emphasising continual improvement and value creation through modern digital transformation approaches. PRINCE2 project management supports systematic planning and execution of projects wit...

What AI Adoption Means for the Future of Workplace Risk Management

Image by freepik As industrial operations become more complex and fast-paced, the risks faced by workers and employers alike continue to grow. Traditional safety models—reliant on manual oversight, reactive investigations, and standardised checklist...

From Beach Bops to Alpine Anthems: Your Sonos Survival Guide for a Long Weekend Escape

Alright, fellow adventurers and relaxation enthusiasts! So, you've packed your bags, charged your devices, and mentally prepared for that glorious King's Birthday long weekend. But hold on, are you really ready? Because a true long weekend warrior kn...

The Times Features

Going Off the Beaten Path? Here's How to Power Up Without the Grid

There’s something incredibly freeing about heading off the beaten path. No traffic, no crowded campsites, no glowing screens in every direction — just you, the landscape, and the...

West HQ is bringing in a season of culinary celebration this July

Western Sydney’s leading entertainment and lifestyle precinct is bringing the fire this July and not just in the kitchen. From $29 lobster feasts and award-winning Asian banque...

What Endo Took and What It Gave Me

From pain to purpose: how one woman turned endometriosis into a movement After years of misdiagnosis, hormone chaos, and major surgery, Jo Barry was done being dismissed. What beg...

Why Parents Must Break the Silence on Money and Start Teaching Financial Skills at Home

Australia’s financial literacy rates are in decline, and our kids are paying the price. Certified Money Coach and Financial Educator Sandra McGuire, who has over 20 years’ exp...

Australia’s Grill’d Transforms Operations with Qlik

Boosting Burgers and Business Clean, connected data powers real-time insights, smarter staffing, and standout customer experiences Sydney, Australia, 14 July 2025 – Qlik®, a g...

Tricia Paoluccio designer to the stars

The Case for Nuturing Creativity in the Classroom, and in our Lives I am an actress and an artist who has had the privilege of sharing my work across many countries, touring my ...