Feeds

Japanese children warned off mobiles

It's good to talk, but nothing else

The essential guide to IT transformation

Japanese children should be prevented from using their mobile phones for anything other than talking to protect them from harmful influences, according to an advisory panel to the government.

The panel is already calling on schools and parents to take a much greater role in controlling the services children can access, reports the AFP, but ultimately sees no reason why children need to use a phone for more than speaking into.

The concerns are the usual bugbears: anonymous bullying via bulletin boards, and access to inappropriate material. Apparently only about one per cent of children have some form of content blocker in place, while a third of primary school (7-12) children have mobiles, a figure that rises to 96 per cent once they reach secondary.

Mobiles present a very private interface to the internet, which may be harder for parents to police than a desktop computer they can see being used – depending on the location of that computer. In the UK Carphone Warehouse are expanding into laptop computers for just that reason - they believe the personal and private experience will drive families into multiple computer ownership.

It's hard to imagine Japan really banning children from using mobile data services, though the panel has reported to Prime Minister Yasuo Fukuda who told reporters: "It is true that the use of mobile phones causes various problems... First of all, I wonder if there is any need for children to possess mobile phones."

The average age for getting your first mobile phone is eight in the UK. The models given to children don't generally have access to the kind of data services that might delivery inappropriate content, but it's only a matter of time.

Why children need phones isn't clear, but that's not stopped over-protective parents calling them safety devices. Calling for a ban on data services might make a nice headline but less draconian measures are more likely to be used, once they've been identified. ®

The essential guide to IT transformation

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
Shoot-em-up: Sony Online Entertainment hit by 'large scale DDoS attack'
Games disrupted as firm struggles to control network
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
Netflix swallows yet another bitter pill, inks peering deal with TWC
Net neutrality crusader once again pays up for priority access
EE plonks 4G in UK Prime Minister's backyard
OK, his constituency. Brace yourself for EXTRA #selfies
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.