Feeds

Half of 10 year olds now mobile connected

HELLO? I'M IN THE WENDY HOUSE!

Seven Steps to Software Security

Half of 10 year old kids in the EU have mobile phones, a figure that rises to 95 per cent once they get to 16, but parents still reckon their kids aren't being protected from inappropriate content.

The figures come from the European Commission, which is leaning on mobile operators and member countries to implement controls agreed in 2007. Four countries - Cyprus, Estonia, Finland and Luxembourg - don't yet have "voluntary" agreements requiring operators to control access to adult-orientated material. In those countries that do, only 41 per cent of operators bother checking those measures are working.

In most places, a credit-card authorisation is used to confirm the user is over 18, though that's harder with pay-and-go handsets, especially in countries (including the UK) where no identity (and thus age) check is performed when purchasing a phone. Naming two Pink Floyd albums, while currently effective, is a little arbitrary, and it's hard to find other ways of establishing the age of a customer.

The other problem is the fact that offensive content can equally well come from other users, rather than commercial operators. Purveyors of porn don't generally want under-age customers as they lack money to pay for the content, allaying the concerns of 51 per cent of parents.

Bullying is harder to block, however, so it's surprising to hear that only 49 per cent of parents worry about mobiles being used that way.

There is also the matter of making the network operators in some way responsible for the content they provide, even through a voluntary agreement. Internet service providers have no such responsibility for protecting children, at least not yet, though as the two businesses increasingly blur it will be hard to understand how one can be exempted. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.