"

6 Digital Safety and Privacy

Digital Safety and Privacy Issues

There are numerous safety concerns relative to digital behaviors. Young people, in particular, do not have the maturity to internalize the fact that there are individuals who are predatory on the web. Even when told about people impersonating another to make one feel safe, children tend not to believe there is potential danger. Young people are also less inhibited regarding posting personal information or pictures.

Digital Footprint

Youth tend not to realize the critical nature of what they post and how what they share creates a digital footprint that can follow them through adulthood and affect their access to important necessities such as housing or employment. There are also dangers related to information being used and resulting in negative outcomes such as harassment, hacking, or phishing. Many people think that restricting content shared on social media sites can protect their privacy; however, shared information can still be accessible and a risk to privacy regardless of privacy settings. Individuals have lost job opportunities and also have been let go as a result of inappropriate digital use, even if it occurred in the past.

Location Tracking

A number of apps have location capability and allow others to view where you are at any given time via your posts or your smartphone. Unfortunately, there are individuals who will utilize your information to engage in illicit behavior. Burglaries take place at residences of individuals who have posted that they are out of town on vacation. Sadly enough, thieves will even look at funeral notices to see when a house will likely be vacant. Location information has also been utilized by domestic abusers who are looking to locate their partner.

Distracted Driving

Using a smartphone while driving is dangerous as it distracts the driver from the road. Distracted driving occurs any time you take your eyes off the road, hands off the wheel, and mind off your primary task: driving safely. Any non-driving activity you engage in is a potential distraction and increases your risk of being involved in a motor vehicle crash1 and significantly increases the risk of injury or death for the driver and others. According to the National Highway Traffic Safety Administration (NHTSA), the number of car crashes and fatalities has increased significantly.

Why are phones so distracting?

Talking and texting on a phone are driving distractions. Texting while driving is especially dangerous because it combines all three types of distractions. Hands-free phones are not the solution. Research shows that they are just as distracting as handheld phones.

Your brain has a limited capacity for attention. Any non-driving task you perform while behind the wheel reduces the amount of attention available to you for detecting and reacting to potential dangers on the road.

  • Looking away for just a few seconds? At 60 miles per hour, a vehicle travels the length of an American football field in 3.4 seconds.
  • Research has shown that drivers who are using cell phones may be looking at but failing to see up to 50% of the information in their driving environment. Usually, the driver’s “field of view” is narrowed to what is directly in front of them. As a result, the missing 50% of information may include a stop sign, a stopped vehicle, or a child.[1]

Cyberbullying –

Cyberbullying has also been a continued concern for parents and educators, who cannot monitor what they cannot see. We have seen examples of problematic responses and interactions online and it seems a bit like the wild wild west. We see individuals respond with rude, angry, offensive comments. Being behind a device instead of in person has exacerbated this issue. Both youth and adults are engaging in this.

In some highly publicized cases, it has become apparent that cyberbullying, which teens can engage with in the comfort of their own home and is notoriously difficult for adults to monitor and control, can result in suicide. In addition to cyberbullying, there is the negative effect of constantly looking at social media posts showing “perfect” lives.29 Suicide rates have gone up after a two decade decline, which correlates with increased cell phone and social media use among teens. (Eden et al)

Peer Judgment – Device Status

Individuals have experienced years of judgement by others based on physical appearance, the clothes we wear, and other qualities and material possessions. “Type or brand of digital device” is now added to the list of what people are judged and bullied for. Many youth feel tremendous pressure based on whether or not they have a device and the type of device they have. Research has begun showing that a number of iPhone users indeed judge Android users and vice versa with Android users judging iPhone users as well.

Sexting

The practice of creating and sharing sexual images via technological devices, known as sexting, has received increased attention in the past years, especially due to the increase of adolescent engagement in this behavior. Although consensual sexting is not necessarily a crime, some research has shown it has the potential to be a risky behavior, and a threshold to get exposure to dangerous kinds of victimization as sextortion, online grooming or cyberbullying. In this context, teenagers represent a vulnerable group due to their limited ability of self-regulation, their high susceptibility to peer pressure and their growing sexual curiosity.[2]

Sexting is a commonly occurring sexual behavior among youth (Madigan, Ly, Rash, Van Ouytsel, & Temple, 2018). Meta-analysis has shown that youth who sexted were four times more likely than youth who did not sext to engage in sexual intercourse, five times more likely to have multiple sexual partners, and half as likely to use contraception (Mori, Temple, Browne, & Madigan, 2019). These findings lead to presumptions that youth sexting is universally harmful (Temple, Strasburger, Zimmerman, & Madigan, 2019). However, existing research shows that sexting behaviors do not apply to all adolescents (Bianchi, Morelli, Baiocco, & Chirumbolo, 2019a; Delevi & Weisskirch, 2013; Dir et al., 2013). Assessments of individual differences are crucial to gaining a comprehensive understanding of adolescent online sexual communication. Not all youth who are sexting are having sex. There should be consideration of adolescents as individuals, with education that teaches youth about sexuality and digital wellness.[3]

 

Nudes

The sharing of nude photos (as part of sexting) has increased significantly with digital technology. Youth and adults have shared nude photos with regret following negative consequences. Although initially sent to a trusted individual, there are a number of scenarios that can change the relationship. There are countless stories of a person sharing another’s nude photos resulting in significant psychological impact. There have also been scenarios where nudes shared negatively impacted employment. Despite the potential negative consequences, internet searches on the topic bring up a number of articles in the lay press that give advice regarding how to share nudes safely, supporting normalization of the behavior.[4]

Revenge porn is the term used for sexually explicit imagery that was stolen or shared without consent. Many academics and activists argue that the term “revenge porn” is misleading, as many perpetrators are not motivated by retaliation and that the term implies victim-blaming. They state that the correct term should be image-based abuse, image-based sexual abuse, or non-consensual pornography. Revenge porn occurs when a person uploads nude/semi-nude photos of someone online, often after a relationship has ended. Thus, revenge porn is included under the umbrella of nonconsensual pornography, but non-consensual pornography does not always include revenge porn.

Research has revealed that victims of revenge porn experienced negative outcomes such as; trust issues, post-traumatic stress disorder (PTSD), anxiety, depression, suicidal thoughts, and several other mental health effects.

Similarities between revenge porn and sexual assault[5]

 

Protecting Yourself from “Revenge Porn” or Image Abuse

Although the responsibility to prevent non-consensual pornography lies with those who violate another’s consent and privacy, and not with the victim, steps can be taken to help prevent its occurrence.

  • Be familiar with the policies for the apps or platforms you use
  • Be selective about who you share your images with
  • Check your privacy settings
  • Help others by reporting image abuse and refusing to share images The Federal Trade Commission offers assistance if you are a victim of non-consensual pornography.

Stalking

Stalking is any repeated and unwanted contact with you that makes you feel unsafe.3 You can be stalked by a stranger, but most stalkers are people you know — even an intimate partner. Stalking may get worse or become violent over time. Stalking may also be a sign of an abusive relationship.

Someone who is stalking you may threaten your safety by clearly saying they want to harm you. Some stalkers harass you with less threatening but still unwanted contact. The use of technology to stalk, sometimes called “cyberstalking,” involves using the Internet, email, or other electronic communications to stalk someone. Stalking and cyberstalking can lead to sleeping problems or problems at work or school. Stalking is against the law.

What are some examples of cyberstalking?

  • Sending unwanted, frightening, or obscene emails, or text messages
  • Harassing or threatening you on social media
  • Tracking your computer and internet use
  • Using technology such as GPS to track where you are

What can I do if someone is cyberstalking me?

  • Send the person one clear, written warning not to contact you again.
  • If they contact you again after you’ve told them not to, do not respond.
  • Print out copies of evidence such as emails or screenshots of your phone. Keep a record of the stalking and any contact with police.
  • Report the stalker to the authority in charge of the site or service where the stalker contacted you. For example, if someone is stalking you through Facebook, report them to Facebook.
  • If the stalking continues, get help from the police. You also can contact a domestic violence shelter and the National Center for Victims of Crime Helpline  for support and suggestions.
  • Consider blocking messages from the harasser.
  • Change your email address or screen name.
  • Never post online profiles or messages with details that someone could use to identify or locate you (such as your age, sex, address, workplace, phone number, school, or places you hang out). For more information or emotional support, call the Stalking Resource Center National Center for Victims of Crime Helpline at 800-FYI-CALL (394-2255), Monday through Friday, 10 a.m. to 6 p.m. ET.

 

Questions:

Discuss experience with any of the above safety/privacy issues or knowledge of others’ experiences.

What strategies would you implement to stay safe?

 


  1. Distracted Driving at work | NIOSH | CDC. (n.d.). https://www.cdc.gov/niosh/motorvehicle/topics/distracteddriving/
  2. Gassó, A. M., Klettke, B., Agustina, J. R., & Montiel, I. (2019). Sexting, Mental Health, and Victimization among Adolescents: A Literature review. International Journal of Environmental Research and Public Health, 16(13), 2364. https://doi.org/10.3390/ijerph16132364
  3. Mori, C., Choi, H. J., Temple, J. R., & Madigan, S. (2021). Patterns of sexting and sexual behaviors in youth: A Latent Class Analysis. Journal of Adolescence, 88(1), 97–106. https://doi.org/10.1016/j.adolescence.2021.01.010
  4. Strasburger, V. C., Zimmerman, H., Temple, J., & Madigan, S. (2019). Teenagers, sexting, and the law. Pediatrics, 143(5). https://doi.org/10.1542/peds.2018-3183
  5. Bates, S. L. (2016). Revenge porn and mental health. Feminist Criminology, 12(1), 22–42. https://doi.org/10.1177/1557085116654565

License

Icon for the Creative Commons Attribution 4.0 International License

Digital Wellness Copyright © by Cristin Finch and Kristen Killion is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book