We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMarquez Penley
Modified over 2 years ago
Mobile Phones for Children Usefulness, Risks and Myth
© 2008 Mobile Telephone Networks. All rights reserved. Outline About MTN Mobile Phones Risks Remedies MTNs Role Myth Conclusion
© 2008 Mobile Telephone Networks. All rights reserved. MTN Confidential MTN Nigerias vision is to be the leading provider of ICT services in Nigeria and alter the way Nigerians live, work and play – our mission is to provide 1 st class network quality, customer service and superior value to our esteemed customers. MTN Nigeria is the biggest mobile operator in Nigeria and West Africa. We provide network coverage to 87.96% of Nigerias land mass, while 85.49% of the Nigeria have access to our services MTN has built Sub-Saharan Africas largest and most sophisticated Telecoms Network in Nigeria – we are the largest telecoms investor in Nigeria with over N1trillion invested in our Network. In 2012 alone, MTN is investing over N218billion on Capital Projects in Nigeria. We are thus positioned to lead the growth in intensive Data and ICT Services in Nigeria. MTN is pleased that our commitment to Nigeria and its economy has continued to build confidence for investments by other global players in our sector and in Nigeria as a whole.
© 2008 Mobile Telephone Networks. All rights reserved. Introduction Mobile phones and other wireless technologies have become an integral part of everyday life. What are the benefits of children using mobile phones, the risks and the myths.
© 2008 Mobile Telephone Networks. All rights reserved. Mobile Phones The Global System of Mobile Communication (GSM) was introduced in Nigeria in August Before then only about half a million Nigerians had phone lines in a country of about 120 million people. According to a recent report, as at July 2012, there were about 103 million active phone users. Mobile phones are becoming ubiquitous and, in line with this trend, childrens use of mobile phones has increased to the point where mobile phones are becoming commodities for them. The average age at which children get their first mobile phone is eight according to a recent study. Children today are part of the first generation to grow up with the mobile phones. This has created opportunities that simply weren't possible when their parents were growing up. The penetration of mobile phones among children indicates a change in the perception of mobile phones as tools for work based communications into commodities used for day to day communication.
© 2008 Mobile Telephone Networks. All rights reserved. Why are Children attracted to mobile phones? The personal and private nature of mobile phones, which makes parental supervision almost impossible. The always on facility offers round-the clock communication with friends and also facilitates spontaneity in responding. (Social media) It is cool to have one(image, status, fashion) The mobile phone is now both a communications device and a powerful entertainment tool. The phones themselves and access to the services they provide are within the reach of many young consumers. Parents, too, have seen benefits from allowing their children to use mobile phones: Arranging to pick up children after extracurricular activities in school. It can also be used for security, to check on childrens location and safety when they are outside the home.
© 2008 Mobile Telephone Networks. All rights reserved. Risks of using mobile phones The very features and facilities that make mobile phones particularly attractive to young users also offer the potential for misuse that could put children at risk. The new generation devices (smart phones) are no longer mobile phones only. It is now possible to do almost everything on an internet enabled phone that can be done from an internet enabled computer wherein lies the risks.
© 2008 Mobile Telephone Networks. All rights reserved. Risks Cont. Cyberbullying: Cyberbullying is harassment through electronic channels such as mobile telephones. The cyberbully uses the mobile phone in various ways. For example, they may send cruel or hostile voice or SMS messages, spread rumours or distribute embarrassing digital photos of their victim. Social media (blackberry etc) provides opportunities to make inappropriate or even dangerous contact with young users e.g. the Cynthia Case Contact Malicious or harmful content may be perfectly legal, but may nonetheless have the potential to harm children an example is the receipt of malicious images and video clips. Illegal content is the worst form of content which directly exploits children through portraying abuse particularly child sexual abuse. Content Unsolicited commercial messages could be received by children by people trying to sell or advertise products. Such commercial messages are known as spam. On a mobile phone, spam is usually in the form of an unwanted text message, picture message or . Some spam messages can end up being very expensive for a child if they are not careful. Fraudsters also send out fraudulent messages advising them that they have won a prize. SPAM A mobile phone is a valuable item which makes a target for theft and attack on the owner. Theft
© 2008 Mobile Telephone Networks. All rights reserved. Remedies (tips and advice for parents whose children have internet-enabled mobile phones: Addressing the potential problems presented by the misuse of mobile phones is a collaborative effort between the children themselves, parents, mobile operators and all relevant stakeholders. Understanding how the technology works will also help parents understand the issues that can arise when children use mobile phones. All mobile operators offer internet safeguards to prevent children from accessing unsuitable content, e.g. filtering (or blocking) technologies. Even with filtering and blocking solutions applied on the mobile phone it remains important that parents supervise their childs internet usage. Children should be careful about publishing personal details (name, address, telephone no., school) pictures online as the internet is a public place and you can never be sure who is reading the information published. Children should never arrange a real world meeting with someone they met online without first telling a parent or a trusted adult. And certainly they should never go alone to meet a stranger.
© 2008 Mobile Telephone Networks. All rights reserved. MTNs role MTN prides itself in adhering to the principles of good corporate governance and observes full compliance with all lawful enactments and regulations guiding our operations. We similarly demand a corresponding high level of compliance from our third party Value Added Service Providers to ensure appropriate content is developed and that our esteemed customers privacy is respected at all times and they are not inundated with unsolicited or other spam SMS. We limit the ability of spammers to deliver spam SMS to our esteemed customers by implementing state-of-the-art anti-spam solutions and a robust escalation process to ensure that customers who receive such SMS make a report and get such issues dealt with. All adverts are appropriate for our target market, including children, and we do not use inappropriate content to advertise our products or services. All our customer reward initiatives are restricted to children above 18 years old. MTN also maintains physical, procedural and electronic safeguards to ensure the protection and confidentiality of our customers information.
© 2008 Mobile Telephone Networks. All rights reserved. Myth: Are there any health implications to using a mobile phone? Mobile phones and other wireless technologies have become an integral part of everyday life. But does using a mobile phone regularly, or living near a base station, have any implications for our health? Some parents are concerned about whether there are health risks for children using mobile phones or where base stations are sited close to schools, day care centres or homes.
© 2008 Mobile Telephone Networks. All rights reserved. Mobile Telephony & the Environment
© 2008 Mobile Telephone Networks. All rights reserved. Myth Cont. There is no convincing scientific evidence that the use of mobile phones can cause brain tumours or other cancers in humans. It is the consensus of the world wide scientific community that the low powered radio signals produced by a mobile phone do not have sufficient intrinsic energy to affect genetic material. Considering the very low exposure levels and research results collected to date, there is no convincing scientific evidence that the weak RF signals from base stations and wireless networks cause adverse health effects. Radio signals are non-ionising, which means that they cannot directly impart enough energy to a molecule to break or change chemical bonds. This is in contrast to ionising radiation, such as x-rays, which can strip electrons from atoms and molecules, producing changes that can lead to tissue damage and possibly cancer.
© 2008 Mobile Telephone Networks. All rights reserved. Conclusion The very features and facilities that make mobile phones particularly attractive to young users also offer the potential for misuse that could put children at risk. The challenge is to ensure that the positive aspects for children far outweigh the potential negatives. Addressing these potential problems presented by the misuse of mobile phones is a collaborative effort between the children themselves, parents, mobile operators and all relevant stakeholders. There is no convincing scientific evidence that the use of mobile phones can cause brain tumours or other cancers in humans. It is the consensus of the world wide scientific community that the low powered radio signals produced by a mobile phone do not have sufficient intrinsic energy to affect genetic material.
Lifelong Learning Service Monday 30 th or Tuesday 31 st March :30pm Safe use of the Internet.
INFORMATION AND RESOURCES Internet Safety. Internet Safety: The Issues Despite the educational and social benefits of information and communication technologies,
Insert your company logo here (on slide master). Insert your company logo here (on slide master) Developed by the Department of Communications, Information.
Internet Safety for Young People Presented by: Ashwin Seegolam & Shailaja Oolun NCB.
The Parents and Carers Guide to the Internet Throughout this presentation we may refer to factsheets, parental control settings or video clips. Please.
Parenting the Online Child. Your Child Is on the Internet The Internet is a wonderful research tool. Reliance on the Internet in schools has grown rapidly.
Using Social Media to Generate Media Coverage and Improve Brand Sentiment Presented By Adeyemi Adeniyi ( B.sc, MCP, MCTS )
Facebook.com: Social Hub or Stalkers Paradise? Presented By: Teri Atkinson Makesha Harris Jenesha Penn.
Practice Ethical and Legal Use of Technology Copyright © Cannady ACOS. All rights reserved.
Communication for the open minded Study on user identification methods in card payments, e-payments and mobile payments Summary of recommendations (WP5)
Diversity College Diversity College 2006 Virtual Case Study Committee for Facebook and Cyber Community Issues Florida International University Members.
Information Systems Using Information (Higher and Intermediate 2)
PLANNING THE AUDIT Individual audits must be properly planned to ensure: Appropriate and sufficient evidence is obtained to support the auditors opinion;
Trust in E-Commerce Topic 9. Introduction Trust & Risk Strategic Thrusts Framework of Trust Questions Conclusion Related Web Sites.
UNIT I FUNDAMENTAL OF E-COMMERCE 1.1INTRODUCTION TO E-COMMERCE 1.2 DRIVING FORCES OF E-COMMERCE 1.3 BENEFITS AND LIMITATIONS OF E-COMMERCE 1.4 DATA MINING.
MGMT14 marketing U U … mnm institute … makes sense.
WCIT: Failure or success? Impasse or way forward? Richard Hill Hill & Associates ATU-ITU Seminar on the outcomes of WCIT Durban, 10 July 2013 Parts of.
1.Five years after a new product has been introduced, sales begin to level off because customers are purchasing the competitor's brand. What strategy would.
WOW! Resources Resources Time Time Paperwork Paperwork Relationships Relationships So many resources, so little time, so much paperwork, and so many relationships.
Mount Auburn Hospital Information Security Awareness Training How to protect electronic information at work and at home.
1 Security Awareness 101 ……and Beyond 20th Annual Computer Security Applications Conference December 6, 2004 Tucson, Arizona Kelley Bogart Melissa Guenther.
1 2 Consider This… Right now someone is likely to be Tweeting about your company. Right now someone is likely to be blogging about.
Nov. 2009Copyrighted Work--A. MAMBI,TCRA 1 Public Policy Meeting, Legal Issues on Cyber Security in Africa Dakar, Senegal November 2009 Presenter.
Promoting and Selling Year 9 Commerce – Option 2.
MULTI-CHANNEL APPROACH TO E-GOVERNMENT THE EGYPTIAN IMPLEMENTATION SAMEH BEDAIR E-GOV PROGRAM DIRECTOR E-APPLICATION SEMINAR, CAIRO 6-8.
Integrating Digital Citizenship in a Web 2.0 World – Poster Session Dr. Mike Ribble Author of Digital Citizenship in Schools and Raising a Digital Child.
CBR 301: Using Community-Based Research to Affect Public Policy.
Involving vulnerable people - a practical guide. Torbay Supporting People Team. June 2008.
+ Internet Safety – Overview and Discussion. + The Internet is a Great Tool The Internet is a great tool and can make your life easier and more fun: It.
© 2016 SlidePlayer.com Inc. All rights reserved.