Mobile phone safety: 91 per cent of Australian teens have a phone – but many are not keeping their identity and location secure

Most Australian teenagers have their own smartphone. According to a 2023 survey, 91 per cent of young people between 14 and 17 owned a phone. At the same time, there is huge community concern about young people being exposed to harm online – this includes the content they consume and the interactions they might have. But there is also concern about their privacy and security. A UK study found teenagers are overly optimistic about the degree to which they can protect their personal information online. This is a problem. Smartphones can communicate information such as identities and locations when settings are not configured correctly. Our project – funded by the eSafety Commissioner – looked at how to teach students mobile phone safety.

Block detailing the author of this article about mobile phone safety.


By Yeslam Al-Saggaf, Professor in Computing, Charles Sturt University
and Julie Maclean, Researcher in Computing, Charles Sturt University

This article was first published on The Conversation.

What are the risks?

A girl holding and looking at a mobile phone, with three men walking up steps in the background and one man sitting on the step.

Without changing the default settings, a phone (or smart watch, laptop or tablet) can share information such as full names, current locations and the duration of their stay in those locations. This makes it easy for others with basic IT knowledge to create profiles of someone’s movements over time.

Children are at particular risk, as they often connect to free public wi-fi networks. They may also be more likely to exchange photos with strangers online and accept social media friend requests without caution.

This also puts them at increased risk of having their identity or money stolen or coming into contact with people who may wish them harm.

Our research into mobile phone safety

We conducted our project in seven high schools in regional New South Wales between August 2023 and April 2024.

First, we set up network sensors in two schools to monitor data leakage from students’ phones. This was over several weeks to establish a baseline for their typical data leakage levels. We wanted to know the extent to which they were giving away the names and locations of the students.

Next, we gave 4,460 students in seven high schools lessons on how smartphones can leak sensitive information and how to stop this. We showed the students how to turn off their Bluetooth and switch off their wi-fi. Furthermore, we showed them how to change their Bluetooth name and switch off their location services.

We then measured data leakage after the lesson in the two schools with network sensors.

We also conducted a survey on 574 students across five other schools, to measure their knowledge before and after the lesson. Of this group, about 90 per cent of students owned a smartphone. Most were aged between 14 and 16.

What did we find?

Close-up of hands holding a smartphone, with the phone's screen visible.

We found a significant reduction in data leakage after students were given the lessons.

At the two schools we monitored, we found the number of identifiable phones fell by about 30 per cent after the education session.

The survey results also indicated the lessons had been effective. There was an 85 per cent improvement in students’ knowledge of smartphone settings questions.

Moreover, there was a 15 per cent improvement in students’ use of a safer, fake name as their smartphone name after the lessons – for example, instead of ‘Joshua’s phone’, calling it ‘cool dude’.

There was a seven per cent increase in concern about someone knowing where they were at a particular point in time, and a 10 per cent increase in concern about someone knowing what their regular travel route to school was.

However, despite their enhanced understanding, many students continued to keep their wi-fi and Bluetooth settings enabled all the time, as this gave them convenient access to school and home wi-fi networks and headphone connections. This is an example of the ‘privacy paradox’ where individuals prioritise convenience over security, even when aware of the risks.

How can students keep their phones safe?

Three university students smiling and looking at a mobile phone together on a campus.

There are three things young people – and others – can do to ensure mobile phone safety.

1. Switch off services you don’t use

Phone owners should ask themselves: do I really need to keep all the available services on? If they are not using wi-fi, Bluetooth or location services (such as Snap Map, where you share your location with friends), they should turn them off.

As our research indicated, young people are unlikely to do this because it is inconvenient. Many young people want to connect to their headphones at all times so they can listen to music, watch videos and talk to friends.

2. Hide the device

If teens can’t switch off these services, they can at least de-identify their device by replacing their real name on the phone with something else. They can use a name parents and friends will recognise but will not link them to their other data.

They can also hide their device by not giving away the type of phone they are using (this can be done in general settings). This will prevent cyber attackers from linking their phone to the security vulnerabilities with their make of phone.

3. Control each app

Ideally, students should also check smartphone settings for individual apps as well. Then turn off services for apps that don’t require them. It is now easy to find out which apps have access to location services and your phone’s camera or microphone.


Help enhance mobile phone safety

Male graduate wearing a black mortarboard and academic robe,

Eli George – Bachelor of Computer Science

You could play a part in shaping an online future that is safer and more engaging for everyone. Study Charles Sturt’s Bachelor of Computer Science and you’ll learn about the ethics, security and technologies at play in web environments. You can also major in web development or cyber security.

The Conversation