SlideShare a Scribd company logo
1 of 16
Download to read offline
Teens & Mobile Phones: Exploring safety issues as mobile phones become the  communication hub for American teens Amanda Lenhart/Pew Internet FOSI November 2010 Washington, DC
11/10/10
11/10/10
11/10/10
11/10/10
11/10/10
11/10/10
11/10/10
Sexting “sending or receiving a sexually suggestive nude or nearly nude photo or video of yourself/someone you know” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],11/10/10
Sexting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],11/10/10
11/10/10
11/10/10
11/10/10
11/10/10
Geo-location? Twitter? ,[object Object],[object Object],[object Object],[object Object],[object Object],11/10/10
11/10/10 Amanda Lenhart Pew Research Center’s Internet & American Life Project http ://pewinternet.org @amanda_lenhart photo by arcticpenguin

More Related Content

What's hot

Ws activism project
Ws activism projectWs activism project
Ws activism projectMSUM
 
The Truth about Teen Sexting--infographic
The Truth about Teen Sexting--infographicThe Truth about Teen Sexting--infographic
The Truth about Teen Sexting--infographicuKnow.com
 
2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"Frederick Lane
 
Comm488 pennsylvania
Comm488 pennsylvaniaComm488 pennsylvania
Comm488 pennsylvaniakpernick
 
Comm488 pennsylvania
Comm488 pennsylvaniaComm488 pennsylvania
Comm488 pennsylvaniamelcheng
 
Media Violence
Media ViolenceMedia Violence
Media ViolencerkCity007
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internetVictor Font
 
Internet Safety
Internet SafetyInternet Safety
Internet SafetyPHSD
 
Civil Rights Presentation
Civil Rights PresentationCivil Rights Presentation
Civil Rights PresentationMatthew Kitchin
 

What's hot (10)

Ws activism project
Ws activism projectWs activism project
Ws activism project
 
The Truth about Teen Sexting--infographic
The Truth about Teen Sexting--infographicThe Truth about Teen Sexting--infographic
The Truth about Teen Sexting--infographic
 
2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"2011-04-09 There's No Such Thing as Safe "Sext"
2011-04-09 There's No Such Thing as Safe "Sext"
 
Comm488 pennsylvania
Comm488 pennsylvaniaComm488 pennsylvania
Comm488 pennsylvania
 
Comm488 pennsylvania
Comm488 pennsylvaniaComm488 pennsylvania
Comm488 pennsylvania
 
Media Violence
Media ViolenceMedia Violence
Media Violence
 
Online safety
Online safetyOnline safety
Online safety
 
Protecting our families on the internet
Protecting our families on the internetProtecting our families on the internet
Protecting our families on the internet
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Civil Rights Presentation
Civil Rights PresentationCivil Rights Presentation
Civil Rights Presentation
 

Viewers also liked

10 things you should know about e-learning
10 things you should know about e-learning 10 things you should know about e-learning
10 things you should know about e-learning Luciano Sathler
 
Public health and safety in the use of mobile communications
Public health and safety in the use of mobile communicationsPublic health and safety in the use of mobile communications
Public health and safety in the use of mobile communicationsypatnayak
 
Health hazards of mobile phones
Health hazards of mobile phonesHealth hazards of mobile phones
Health hazards of mobile phonesArun Raj
 
CHILE: una mirada a los desafíos del e-learning para consolidar su crecimiento
CHILE: una mirada a los desafíos del e-learning para consolidar su crecimientoCHILE: una mirada a los desafíos del e-learning para consolidar su crecimiento
CHILE: una mirada a los desafíos del e-learning para consolidar su crecimientoCRISEL BY AEFOL
 
E learning presentation (update 2012)
E learning presentation (update 2012)E learning presentation (update 2012)
E learning presentation (update 2012)Santiago Moral
 

Viewers also liked (10)

Mobile Safety
Mobile SafetyMobile Safety
Mobile Safety
 
10 things you should know about e-learning
10 things you should know about e-learning 10 things you should know about e-learning
10 things you should know about e-learning
 
Public health and safety in the use of mobile communications
Public health and safety in the use of mobile communicationsPublic health and safety in the use of mobile communications
Public health and safety in the use of mobile communications
 
E learning
E learning E learning
E learning
 
ROAD SAFETY TIPS FOR BIKE RIDERS-2015
ROAD SAFETY TIPS FOR BIKE RIDERS-2015ROAD SAFETY TIPS FOR BIKE RIDERS-2015
ROAD SAFETY TIPS FOR BIKE RIDERS-2015
 
Health hazards of mobile phones
Health hazards of mobile phonesHealth hazards of mobile phones
Health hazards of mobile phones
 
CHILE: una mirada a los desafíos del e-learning para consolidar su crecimiento
CHILE: una mirada a los desafíos del e-learning para consolidar su crecimientoCHILE: una mirada a los desafíos del e-learning para consolidar su crecimiento
CHILE: una mirada a los desafíos del e-learning para consolidar su crecimiento
 
E learning ppt
E learning pptE learning ppt
E learning ppt
 
E learning presentation (update 2012)
E learning presentation (update 2012)E learning presentation (update 2012)
E learning presentation (update 2012)
 
E Learning Objectives
E Learning ObjectivesE Learning Objectives
E Learning Objectives
 

Similar to Teens and Mobile Phones: Exploring safety issues as mobile phones become the hub for American teens - FOSI 2010

prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online PedophilesJustine
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshopforensicsnation
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshopforensicsnation
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?migueltachna
 
Textual harassment and sexting FINAL
Textual harassment and sexting FINALTextual harassment and sexting FINAL
Textual harassment and sexting FINALPaul Cuaresma
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internetmalissa_1041
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 
Internetsafety
InternetsafetyInternetsafety
Internetsafetykguerrazzi
 

Similar to Teens and Mobile Phones: Exploring safety issues as mobile phones become the hub for American teens - FOSI 2010 (20)

cyberworld
cyberworld cyberworld
cyberworld
 
prt. 1...Online Pedophiles
prt. 1...Online Pedophilesprt. 1...Online Pedophiles
prt. 1...Online Pedophiles
 
Teens and Sexting
Teens and SextingTeens and Sexting
Teens and Sexting
 
Social Media and Young Adults
Social Media and Young AdultsSocial Media and Young Adults
Social Media and Young Adults
 
Social Media & Young Adults: Challenges & Opportunities for STD Prevention
Social Media & Young Adults: Challenges & Opportunities for STD PreventionSocial Media & Young Adults: Challenges & Opportunities for STD Prevention
Social Media & Young Adults: Challenges & Opportunities for STD Prevention
 
04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop04.pinpoint protect child watch workshop
04.pinpoint protect child watch workshop
 
Pinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch WorkshopPinpoint Protect Child Watch Workshop
Pinpoint Protect Child Watch Workshop
 
Internet predators:parents clueless?
Internet predators:parents clueless?Internet predators:parents clueless?
Internet predators:parents clueless?
 
Textual harassment and sexting FINAL
Textual harassment and sexting FINALTextual harassment and sexting FINAL
Textual harassment and sexting FINAL
 
The dark side of the Internet: Youth Internet victimization
The dark side of the Internet: Youth Internet victimizationThe dark side of the Internet: Youth Internet victimization
The dark side of the Internet: Youth Internet victimization
 
Invisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the InternetInvisible Preadators: Hidden Dangers of the Internet
Invisible Preadators: Hidden Dangers of the Internet
 
Teens, Adults & Sexting: Data on sending and receipt of sexually suggestive n...
Teens, Adults & Sexting: Data on sending and receipt of sexually suggestive n...Teens, Adults & Sexting: Data on sending and receipt of sexually suggestive n...
Teens, Adults & Sexting: Data on sending and receipt of sexually suggestive n...
 
The benefits and potential risks that young people face online: A look at wha...
The benefits and potential risks that young people face online: A look at wha...The benefits and potential risks that young people face online: A look at wha...
The benefits and potential risks that young people face online: A look at wha...
 
The benefits and potential risks that young people face online: A look at wha...
The benefits and potential risks that young people face online: A look at wha...The benefits and potential risks that young people face online: A look at wha...
The benefits and potential risks that young people face online: A look at wha...
 
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
Eu kids online ii safer internet forum plenary, oct 2010Risks and safety on t...
 
KidSafe - Parental Training Presentation
KidSafe  - Parental Training PresentationKidSafe  - Parental Training Presentation
KidSafe - Parental Training Presentation
 
102009
102009102009
102009
 
Week 5
Week 5Week 5
Week 5
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 
Internetsafety
InternetsafetyInternetsafety
Internetsafety
 

More from Pew Research Center's Internet & American Life Project

More from Pew Research Center's Internet & American Life Project (20)

Future of democracy and civic innovation
Future of democracy and civic innovationFuture of democracy and civic innovation
Future of democracy and civic innovation
 
American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...
 
Trust, Facts, Democracy
Trust, Facts, DemocracyTrust, Facts, Democracy
Trust, Facts, Democracy
 
Skills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 FactsSkills Requirements for Future Jobs - 10 Facts
Skills Requirements for Future Jobs - 10 Facts
 
The future of technology
The future of technologyThe future of technology
The future of technology
 
Online Harassment 2017
Online Harassment 2017Online Harassment 2017
Online Harassment 2017
 
10 facts about jobs in the future
10 facts about jobs in the future10 facts about jobs in the future
10 facts about jobs in the future
 
Education in the age of fake news and disputed facts
Education in the age of fake news and disputed factsEducation in the age of fake news and disputed facts
Education in the age of fake news and disputed facts
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 
The new landscape of facts and trust
The new landscape of facts and trustThe new landscape of facts and trust
The new landscape of facts and trust
 
The secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries addressThe secret mission that people yearn to have libraries address
The secret mission that people yearn to have libraries address
 
How People Fit Libraries Into Their Lives
How People Fit Libraries Into Their LivesHow People Fit Libraries Into Their Lives
How People Fit Libraries Into Their Lives
 
The New Age of Politics and Media
The New Age of Politics and MediaThe New Age of Politics and Media
The New Age of Politics and Media
 
Digital Divides – Feeding America
Digital Divides – Feeding AmericaDigital Divides – Feeding America
Digital Divides – Feeding America
 
Ethics and Big Data
Ethics and Big Data Ethics and Big Data
Ethics and Big Data
 
Operating in the Age of Always-On Media
Operating in the Age of Always-On MediaOperating in the Age of Always-On Media
Operating in the Age of Always-On Media
 
Digital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance ForumDigital Divides 2016 - Internet Governance Forum
Digital Divides 2016 - Internet Governance Forum
 
How the public grades libraries – and uses libraries
How the public grades libraries – and uses librariesHow the public grades libraries – and uses libraries
How the public grades libraries – and uses libraries
 
How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?How will the Internet of Things look by 2025?
How will the Internet of Things look by 2025?
 
Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)Technology Adoption by Baby Boomers (and everybody else)
Technology Adoption by Baby Boomers (and everybody else)
 

Recently uploaded

9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 

Recently uploaded (20)

9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 

Teens and Mobile Phones: Exploring safety issues as mobile phones become the hub for American teens - FOSI 2010

Editor's Notes

  1. Photo by arcticpenguin – downloaded from flickr http://www.flickr.com/photos/arcticpenguin/3764758138/sizes/l/in/photostream/ Used under creative commons