SlideShare a Scribd company logo
1 of 17
Download to read offline
TheT Oeennlin Ide eGnetnitey rTahtieofnt| G Napo v|e mNobveerm 20b1e3r 2|0 H12a r|t HReasret aRrecshe Aarscsho cAiassteosc i|a t#efso s|i #fosi 00 
[ 
photo here 
Fraud, Security, and Steps Teens are Taking to Protect Themselves Online 
Teen Identity Theft: 
Research Conducted By:
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 1 
Overview of Key Findings 
1. 
Many teen Internet users express concerns about maintaining the privacy of their personal information and about identity theft, and their degree of concern has increased over the past year. 
2. 
The large majority of teens feel it is reasonable to think that teens could be victims of identity theft, but comparatively few teens feel that they are personally at risk of having their identity stolen and used for someone else’s financial gain. 
3. 
While most teens are using privacy settings for at least some of their online accounts and many are taking other precautions, teens could be doing more to protect the privacy of their information online. 
4. 
Teens indicate that more “traditional” forms of outreach have greater potential to get their attention about the risks of online identity theft than do those communicated through social media. 
Between October 1 and 7, 2013, Hart Research Associates conducted a nationwide online survey among 558 teens ages 13 to 17 who access the Internet. This report presents the key findings from the survey.
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 2 
Teens’ access to mobile Internet technology has increased over the past year. 
40% 
59% 
75% 
64% 
74% 
83% 
Desktop or laptop 
Cell phone or smart phone 
Gaming console 
MP3 player 
Tablet 
Own or have access to a smart phone 
98% 
92% 
90% 
72% 
67% 
2012 own/have access to 
99% 
90% 
43% 
90% 
76% 
45% 
Own 
Have access to 
+22 
+21
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 3 
There have been slight shifts in the landscape of teens’ use of online and mobile platforms. 
Proportions Saying They Have Done Each Activity in the Past 30 Days 
Sent/received a text message 
Used online social networking site 
Played mobile/online games 
Used online instant messenger 
Sent an e-mail 
Posted photo or posted/received comments on Instagram 
Sent/received messages on Twitter 
Sent/received messages on Snapchat 
Post/blog on Tumblr 
Posted video on YouTube 
Posted/received/answered questions on Ask.fm 
Posted video or posted/received comments on Vine 
Used location service to “check in” or share location 
2013 
87% 
81% 
82% 
71% 
81% 
42% 
35% 
32% 
28% 
27% 
25% 
23% 
16% 
2012 
86% 
88% 
N/A 
78% 
90% 
30% 
42% 
N/A 
23% 
29% 
N/A 
N/A 
17% 
 
 
 
 
 

Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 4 
Privacy remains teens’ greatest concern about their online activity. 
23% 
26% 
35% 
29% 
31% 
43% 
All teens 2013 
All teens 2012 
The privacy of my personal information 
My image or reputation 
My physical safety 
Proportions Saying They Are Very Concerned about the Following Areas Being Harmed by Their Online Activity 
Selected as top concern 2013 
68% 
17% 
15%
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 5 
24% 
27% 
28% 
31% 
31% 
34% 
38% 
38% 
51% 
Identity theft tops teens’ list of specific concerns about potential consequences of online activity, and concern has increased. 
Identity theft 
Stranger learning something about me 
Problems if colleges/ potential employers find 
Get in trouble w/parents 
Online behavior being tracked for marketing 
Get in trouble with teacher/coach/school 
Being bullied 
Ugly/unflattering picture posted 
Friends making fun of me 
Proportions Saying They Are Very Concerned about the Following Things Happening as a Result of Their Online Activity 
All Teens 2013 
2012 very concerned 
43% 
32% 
N/A 
31% 
27% 
24% 
23% 
23% 
19% 
+8 
+7 
+6
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 6 
More than half of teens are highly concerned about identity theft and credit card fraud. 
51% 
56% 
57% 
Someone accessing my personal information, such as my name, address, date of birth, or Social Security number, and using that information for their own financial gain by obtaining NEW credit cards, car loans, government benefits, or home mortgages in my name 
Someone accessing my personal information, such as my name, address, date of birth, or Social Security number, and using that information to pretend they are me online 
Someone obtaining my credit or debit card number and using it to charge items to my account 
Proportions Saying They Are Very Concerned about the Following Things Happening as a Result of Their Online Activity
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 7 
More than seven in 10 teens feel it is reasonable to think teens could be victims of identity theft. 
It is REASONABLE to think that teens could be victims of identity theft because they tend to have clean credit records and are unlikely to notice that their credit has been compromised. 
It is NOT REASONABLE to think that teens could be victims of identity theft because they do not have any credit cards or credit for someone to steal. 
Which statement comes closer to your view about identity theft? 
27% 
73% 
Attitudes Differ Somewhat by Age: 
Reasonable to think teens can be victims of identity theft 
Not reasonable to think teens can be victims of identity theft 
Age 13 to 15 
Boys 
60% 
40% 
Girls 
72% 
28% 
Age 16 to 17 
Boys 
80% 
20% 
Girls 
84% 
16%
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 8 
Fewer than three in 10 teens feel that they are vulnerable to having their identity stolen. 
11% 
16% 
Very vulnerable/at risk 
Somewhat vulnerable/at risk 
Vulnerability of my parents/guardians 
My personal vulnerability 
44% 
29% 
How vulnerable or at risk do you think you or your parents are to having your/their identity stolen by someone accessing personal information?* 
I Feel Very/Somewhat Vulnerable to Having My Identity Stolen: 
Boys age 13 to 15 
Girls age 13 to 15 
Boys age 16 to 17 
Girls age 16 to 17 
17% 
38% 
25% 
39% 
Girls tend to feel more vulnerable to identity theft than boys do. 
* Description prior to question: “. . . specific type of identity theft that involves someone accessing your personal information, such as your name, address, date of birth, or Social Security number, and using that information for their own financial gain by obtaining NEW credit cards, car loans, government benefits, or home mortgages in your name. To be clear, we are NOT talking about someone stealing your credit or debit card number and using it to charge items to your existing account.”
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 9 
57% 
27% 
Teens’ concern about the amount of personal information about them available on the Internet is muted. 
27% 
39% 
26% 
8% 
To what degree, if at all, are you concerned about the amount of personal information about you that is available on the Internet for others to see? 
Very concerned 
Somewhat concerned 
Not very concerned 
Not at all concerned 
However: 
Very concerned about someone accessing my personal information, such as my name, address, date of birth, or Social Security number, and using that information to obtain NEW credit cards, car loans, government benefits, or home mortgages in my name 
Very concerned about the amount of personal information about me available on the Internet for others to see
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 10 
2% 
6% 
6% 
14% 
47% 
48% 
54% 
69% 
75% 
Yet many say that personal information about them is available on the Internet for others to see. 
My first and last name 
A photo of me 
My date of birth 
The name of my school 
My e-mail address 
My cell phone number 
My home phone number 
My home address 
My Social Security Number 
For each type of information about them, proportions saying it is available on the Internet for others to see: 
5% of teens say that NONE of these nine types of information about them is available online. 
19% of teens say that all five of these types of information about them are available online. Especially likely are: 
• 
daily Instagram users 32% 
• 
daily Twitter users 31% 
• 
daily Snapchat users 29% 
• 
daily users of social 26% networking sites
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 11 
Teens with more personal information avail- able online are only slightly more concerned or feel more vulnerable. 
Teens who have all five types of info* available online (19% of all teens) 
29% 
44% 
27% 
23% 
19% 
33% 
25% 
How concerned are you about the amount of your personal information available online? 
Very concerned 
Somewhat concerned 
Less/not concerned 
How vulnerable are you to having your identity stolen? 
Very vulnerable 
Somewhat vulnerable 
Slightly vulnerable 
Not vulnerable 
* Name, photo, DOB, school, email 
Teens who don’t have all five types of info* available online (81% of all teens) 
27% 
37% 
36% 
8% 
18% 
39% 
35%
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 12 
One in three teens has shared his/her username and password for an online account with someone other than their parent or guardian. 
Have you ever given someone your username and password for any of your social networking or other online accounts? To whom have you told one of your usernames and passwords? 
Shared with someone other than parent 
27% 
40% 
27% 
43% 
Shared with friend and/or significant other 
15% 
31% 
16% 
32% 
Boys age 13 to 15 Girls age 13 to 15 Boys age 16 to 17 Girls age 16 to 17 
Have not shared usernames/ passwords 
16% 
34% 
50% 
Have shared usernames/passwords only with parents 
Have shared usernames/ passwords with others 
23% have shared with friend and/or significant other
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 13 
While most teens are using privacy settings to some degree, more than two in five have not set privacy settings for some of their online accounts. 
When you think about the social networking accounts and other online accounts you have, on how many of these accounts have you set privacy settings? 
Have privacy settings on all accounts 
48% 
57% 
60% 
67% 
Don’t have privacy settings on all accounts 
52% 
43% 
40% 
33% 
Boys age 13 to 15 
Girls age 13 to 15 
Boys age 16 to 17 
Girls age 16 to 17 
57% 
33% 
10% 
Have set privacy settings on all my accounts 
Have set privacy settings on some of my accounts 
Haven’t set privacy settings on any of my accounts 
43% have not set privacy settings on all their accounts
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 14 
There is room to improve and expand teens’ level of protection, and many teens who are not doing these things would consider doing them. 
0% 
10% 
20% 
30% 
40% 
50% 
60% 
70% 
80% 
90% 
100% 
35% 
36% 
39% 
50% 
54% 
66% 
69% 
44% 
46% 
40% 
33% 
31% 
22% 
22% 
21% 
18% 
21% 
17% 
15% 
12% 
9% 
Have done 
Have not done but would consider doing 
Have not done/won't consider 
Set auto lock with password on cell phone, computer, tablet 
Set privacy settings on social networks so only friends see 
Use variety of passwords rather than same for all 
Remove/take down personal info included in a post 
Set privacy settings on social networks so name doesn’t come up on search 
Turn off/disable cookies 
Ask friend/other to remove post with person info or photo 
Would help a lot to protect from identity theft 
61% 
58% 
69% 
52% 
60% 
49% 
44%
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 15 
10% 
12% 
17% 
42% 
45% 
56% 
Teens indicate that more traditional forms of outreach are the best ways to get their attention about the risk of identity theft. 
School assembly with a tech company on identity theft and how to protect yourself 
My parent/guardian talking to me about identity theft 
Online and TV public service campaign with teens whose identities have been stolen 
Facebook page/group with information about identity theft and teens 
Ads and pop-ups on social network sites directing me to info about identity theft 
Twitter account sending messages/tips about how teens can avoid ID theft 
Which one or two of these things would most likely get your attention about teens being at risk for online identity theft?
Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 16 
Very few teens oppose enabling parents to put a “security freeze” on their children’s credit. 
Would you favor or oppose your parent or guardian putting a “security freeze” on your credit until you are 18 years old?* 
56% 
31% 
13% 
Favor putting security freeze on my credit 
* Description prior to question: “There has been an idea to allow the parents and guardians of minors to put a “security freeze” on their children’s credit to help prevent identity theft. This means that no one, including you, would be able to get any type of credit in your name, like a credit card or loan, while the security freeze is in place, even if someone has your name and Social Security number.” 
Don’t care one way or the other 
Oppose putting security freeze on my credit

More Related Content

What's hot

Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationpaulgundersen9
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft- Mark - Fullbright
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft PreventionAlan Greggo
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Themmilfamln
 

What's hot (20)

Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Training for Foster Parents
Training for Foster ParentsTraining for Foster Parents
Training for Foster Parents
 
CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]CBSV%20INFORMATION[1]
CBSV%20INFORMATION[1]
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
Common Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid ThemCommon Consumer Frauds & How to Avoid Them
Common Consumer Frauds & How to Avoid Them
 

Similar to Teen Identity Theft Presentation - Family Online Safety Institue

Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safetyrehmannb
 
How has the digital divide changed in the last 5 years Digitaldividesandbr…
How has the digital divide changed in the last 5 years Digitaldividesandbr…How has the digital divide changed in the last 5 years Digitaldividesandbr…
How has the digital divide changed in the last 5 years Digitaldividesandbr…Melissa Bergfeld
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Ipsos UK
 
Digital civility-2020-global-report
Digital civility-2020-global-reportDigital civility-2020-global-report
Digital civility-2020-global-reportTống Bảo Hoàng
 
Digital-Civility-2020-Global-Report.pptx
Digital-Civility-2020-Global-Report.pptxDigital-Civility-2020-Global-Report.pptx
Digital-Civility-2020-Global-Report.pptxS Kunto Adi Wibowo
 
Young Canadians in a Wired World: Online Privacy, Online Publicity
Young Canadians in a Wired World: Online Privacy, Online PublicityYoung Canadians in a Wired World: Online Privacy, Online Publicity
Young Canadians in a Wired World: Online Privacy, Online PublicityMediaSmarts | HabiloMédias
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet SafetySage Lewis
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenHomeGuides
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaAndri Priyatna
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eveSimonBalle
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentationjaurisch
 
Ccia internet security presentation fin
Ccia internet security presentation finCcia internet security presentation fin
Ccia internet security presentation finLiz Gannes
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 

Similar to Teen Identity Theft Presentation - Family Online Safety Institue (20)

Internet Privacy and Safety
Internet Privacy and SafetyInternet Privacy and Safety
Internet Privacy and Safety
 
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, CoveillanceNetworked Privacy in the Age of Surveillance, Sousveillance, Coveillance
Networked Privacy in the Age of Surveillance, Sousveillance, Coveillance
 
How has the digital divide changed in the last 5 years Digitaldividesandbr…
How has the digital divide changed in the last 5 years Digitaldividesandbr…How has the digital divide changed in the last 5 years Digitaldividesandbr…
How has the digital divide changed in the last 5 years Digitaldividesandbr…
 
Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019Uk Cyber Security Survey 2019
Uk Cyber Security Survey 2019
 
Digital civility-2020-global-report
Digital civility-2020-global-reportDigital civility-2020-global-report
Digital civility-2020-global-report
 
Digital-Civility-2020-Global-Report.pptx
Digital-Civility-2020-Global-Report.pptxDigital-Civility-2020-Global-Report.pptx
Digital-Civility-2020-Global-Report.pptx
 
Young Canadians in a Wired World: Online Privacy, Online Publicity
Young Canadians in a Wired World: Online Privacy, Online PublicityYoung Canadians in a Wired World: Online Privacy, Online Publicity
Young Canadians in a Wired World: Online Privacy, Online Publicity
 
Privacy in the Digital Age
Privacy in the Digital AgePrivacy in the Digital Age
Privacy in the Digital Age
 
Family Internet Safety
Family Internet SafetyFamily Internet Safety
Family Internet Safety
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Teens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & CyberbullyingTeens, Online Stranger Contact & Cyberbullying
Teens, Online Stranger Contact & Cyberbullying
 
Pengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remajaPengaruh teknologi digital terhadap anak dan remaja
Pengaruh teknologi digital terhadap anak dan remaja
 
It’s Personal: Similarities and Differences in Online Social Network Use Betw...
It’s Personal: Similarities and Differences in Online Social Network Use Betw...It’s Personal: Similarities and Differences in Online Social Network Use Betw...
It’s Personal: Similarities and Differences in Online Social Network Use Betw...
 
E safety parents eve
E safety parents eveE safety parents eve
E safety parents eve
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
September 2014 cyber safety presentation
September 2014 cyber safety presentationSeptember 2014 cyber safety presentation
September 2014 cyber safety presentation
 
Ccia internet security presentation fin
Ccia internet security presentation finCcia internet security presentation fin
Ccia internet security presentation fin
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Parenting the Net Generation - Full Version
Parenting the Net Generation - Full VersionParenting the Net Generation - Full Version
Parenting the Net Generation - Full Version
 

More from MindMake - Parenting & Education

MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 

More from MindMake - Parenting & Education (19)

iPad In Education Results
iPad In Education ResultsiPad In Education Results
iPad In Education Results
 
What Great Principals Do Differently
What Great Principals Do DifferentlyWhat Great Principals Do Differently
What Great Principals Do Differently
 
Mindmake - Lego Education
Mindmake - Lego EducationMindmake - Lego Education
Mindmake - Lego Education
 
Parenting In The Digital Age
Parenting In The Digital AgeParenting In The Digital Age
Parenting In The Digital Age
 
Student Debt :)
Student Debt :)Student Debt :)
Student Debt :)
 
Getting Early Childhood Educators Up and Running
Getting Early Childhood Educators Up and RunningGetting Early Childhood Educators Up and Running
Getting Early Childhood Educators Up and Running
 
Moving Beyond Screen Time - Rand Corporation
Moving Beyond Screen Time - Rand CorporationMoving Beyond Screen Time - Rand Corporation
Moving Beyond Screen Time - Rand Corporation
 
Games - Problem Based Learning and Minecraft
Games - Problem Based Learning and MinecraftGames - Problem Based Learning and Minecraft
Games - Problem Based Learning and Minecraft
 
Digital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for GoodDigital Citizenship Flash Card Deck - A Platform for Good
Digital Citizenship Flash Card Deck - A Platform for Good
 
SEGURIDAD EN EL INTERNET
SEGURIDAD EN EL INTERNETSEGURIDAD EN EL INTERNET
SEGURIDAD EN EL INTERNET
 
Evaluacion de fuentes de internet
Evaluacion de fuentes de internetEvaluacion de fuentes de internet
Evaluacion de fuentes de internet
 
Social Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartzSocial Media Safety Teens - From NetSmartz
Social Media Safety Teens - From NetSmartz
 
Parents Guide to Snapchat - Connect Safely Org
Parents Guide to Snapchat - Connect Safely OrgParents Guide to Snapchat - Connect Safely Org
Parents Guide to Snapchat - Connect Safely Org
 
Smartphone Safety - tips for parents
Smartphone Safety - tips for parentsSmartphone Safety - tips for parents
Smartphone Safety - tips for parents
 
Parents' Guide to Instagram - for kids
Parents' Guide to Instagram - for kidsParents' Guide to Instagram - for kids
Parents' Guide to Instagram - for kids
 
Net Smartz - Tweens Presentation - Online Safety
Net Smartz - Tweens Presentation - Online SafetyNet Smartz - Tweens Presentation - Online Safety
Net Smartz - Tweens Presentation - Online Safety
 
Net Smartz - Parenting Internet Safety
Net Smartz - Parenting Internet SafetyNet Smartz - Parenting Internet Safety
Net Smartz - Parenting Internet Safety
 
On-line Safety for Kids
On-line Safety for KidsOn-line Safety for Kids
On-line Safety for Kids
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 

Recently uploaded

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 

Recently uploaded (20)

Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

Teen Identity Theft Presentation - Family Online Safety Institue

  • 1. TheT Oeennlin Ide eGnetnitey rTahtieofnt| G Napo v|e mNobveerm 20b1e3r 2|0 H12a r|t HReasret aRrecshe Aarscsho cAiassteosc i|a t#efso s|i #fosi 00 [ photo here Fraud, Security, and Steps Teens are Taking to Protect Themselves Online Teen Identity Theft: Research Conducted By:
  • 2. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 1 Overview of Key Findings 1. Many teen Internet users express concerns about maintaining the privacy of their personal information and about identity theft, and their degree of concern has increased over the past year. 2. The large majority of teens feel it is reasonable to think that teens could be victims of identity theft, but comparatively few teens feel that they are personally at risk of having their identity stolen and used for someone else’s financial gain. 3. While most teens are using privacy settings for at least some of their online accounts and many are taking other precautions, teens could be doing more to protect the privacy of their information online. 4. Teens indicate that more “traditional” forms of outreach have greater potential to get their attention about the risks of online identity theft than do those communicated through social media. Between October 1 and 7, 2013, Hart Research Associates conducted a nationwide online survey among 558 teens ages 13 to 17 who access the Internet. This report presents the key findings from the survey.
  • 3. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 2 Teens’ access to mobile Internet technology has increased over the past year. 40% 59% 75% 64% 74% 83% Desktop or laptop Cell phone or smart phone Gaming console MP3 player Tablet Own or have access to a smart phone 98% 92% 90% 72% 67% 2012 own/have access to 99% 90% 43% 90% 76% 45% Own Have access to +22 +21
  • 4. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 3 There have been slight shifts in the landscape of teens’ use of online and mobile platforms. Proportions Saying They Have Done Each Activity in the Past 30 Days Sent/received a text message Used online social networking site Played mobile/online games Used online instant messenger Sent an e-mail Posted photo or posted/received comments on Instagram Sent/received messages on Twitter Sent/received messages on Snapchat Post/blog on Tumblr Posted video on YouTube Posted/received/answered questions on Ask.fm Posted video or posted/received comments on Vine Used location service to “check in” or share location 2013 87% 81% 82% 71% 81% 42% 35% 32% 28% 27% 25% 23% 16% 2012 86% 88% N/A 78% 90% 30% 42% N/A 23% 29% N/A N/A 17%      
  • 5. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 4 Privacy remains teens’ greatest concern about their online activity. 23% 26% 35% 29% 31% 43% All teens 2013 All teens 2012 The privacy of my personal information My image or reputation My physical safety Proportions Saying They Are Very Concerned about the Following Areas Being Harmed by Their Online Activity Selected as top concern 2013 68% 17% 15%
  • 6. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 5 24% 27% 28% 31% 31% 34% 38% 38% 51% Identity theft tops teens’ list of specific concerns about potential consequences of online activity, and concern has increased. Identity theft Stranger learning something about me Problems if colleges/ potential employers find Get in trouble w/parents Online behavior being tracked for marketing Get in trouble with teacher/coach/school Being bullied Ugly/unflattering picture posted Friends making fun of me Proportions Saying They Are Very Concerned about the Following Things Happening as a Result of Their Online Activity All Teens 2013 2012 very concerned 43% 32% N/A 31% 27% 24% 23% 23% 19% +8 +7 +6
  • 7. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 6 More than half of teens are highly concerned about identity theft and credit card fraud. 51% 56% 57% Someone accessing my personal information, such as my name, address, date of birth, or Social Security number, and using that information for their own financial gain by obtaining NEW credit cards, car loans, government benefits, or home mortgages in my name Someone accessing my personal information, such as my name, address, date of birth, or Social Security number, and using that information to pretend they are me online Someone obtaining my credit or debit card number and using it to charge items to my account Proportions Saying They Are Very Concerned about the Following Things Happening as a Result of Their Online Activity
  • 8. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 7 More than seven in 10 teens feel it is reasonable to think teens could be victims of identity theft. It is REASONABLE to think that teens could be victims of identity theft because they tend to have clean credit records and are unlikely to notice that their credit has been compromised. It is NOT REASONABLE to think that teens could be victims of identity theft because they do not have any credit cards or credit for someone to steal. Which statement comes closer to your view about identity theft? 27% 73% Attitudes Differ Somewhat by Age: Reasonable to think teens can be victims of identity theft Not reasonable to think teens can be victims of identity theft Age 13 to 15 Boys 60% 40% Girls 72% 28% Age 16 to 17 Boys 80% 20% Girls 84% 16%
  • 9. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 8 Fewer than three in 10 teens feel that they are vulnerable to having their identity stolen. 11% 16% Very vulnerable/at risk Somewhat vulnerable/at risk Vulnerability of my parents/guardians My personal vulnerability 44% 29% How vulnerable or at risk do you think you or your parents are to having your/their identity stolen by someone accessing personal information?* I Feel Very/Somewhat Vulnerable to Having My Identity Stolen: Boys age 13 to 15 Girls age 13 to 15 Boys age 16 to 17 Girls age 16 to 17 17% 38% 25% 39% Girls tend to feel more vulnerable to identity theft than boys do. * Description prior to question: “. . . specific type of identity theft that involves someone accessing your personal information, such as your name, address, date of birth, or Social Security number, and using that information for their own financial gain by obtaining NEW credit cards, car loans, government benefits, or home mortgages in your name. To be clear, we are NOT talking about someone stealing your credit or debit card number and using it to charge items to your existing account.”
  • 10. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 9 57% 27% Teens’ concern about the amount of personal information about them available on the Internet is muted. 27% 39% 26% 8% To what degree, if at all, are you concerned about the amount of personal information about you that is available on the Internet for others to see? Very concerned Somewhat concerned Not very concerned Not at all concerned However: Very concerned about someone accessing my personal information, such as my name, address, date of birth, or Social Security number, and using that information to obtain NEW credit cards, car loans, government benefits, or home mortgages in my name Very concerned about the amount of personal information about me available on the Internet for others to see
  • 11. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 10 2% 6% 6% 14% 47% 48% 54% 69% 75% Yet many say that personal information about them is available on the Internet for others to see. My first and last name A photo of me My date of birth The name of my school My e-mail address My cell phone number My home phone number My home address My Social Security Number For each type of information about them, proportions saying it is available on the Internet for others to see: 5% of teens say that NONE of these nine types of information about them is available online. 19% of teens say that all five of these types of information about them are available online. Especially likely are: • daily Instagram users 32% • daily Twitter users 31% • daily Snapchat users 29% • daily users of social 26% networking sites
  • 12. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 11 Teens with more personal information avail- able online are only slightly more concerned or feel more vulnerable. Teens who have all five types of info* available online (19% of all teens) 29% 44% 27% 23% 19% 33% 25% How concerned are you about the amount of your personal information available online? Very concerned Somewhat concerned Less/not concerned How vulnerable are you to having your identity stolen? Very vulnerable Somewhat vulnerable Slightly vulnerable Not vulnerable * Name, photo, DOB, school, email Teens who don’t have all five types of info* available online (81% of all teens) 27% 37% 36% 8% 18% 39% 35%
  • 13. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 12 One in three teens has shared his/her username and password for an online account with someone other than their parent or guardian. Have you ever given someone your username and password for any of your social networking or other online accounts? To whom have you told one of your usernames and passwords? Shared with someone other than parent 27% 40% 27% 43% Shared with friend and/or significant other 15% 31% 16% 32% Boys age 13 to 15 Girls age 13 to 15 Boys age 16 to 17 Girls age 16 to 17 Have not shared usernames/ passwords 16% 34% 50% Have shared usernames/passwords only with parents Have shared usernames/ passwords with others 23% have shared with friend and/or significant other
  • 14. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 13 While most teens are using privacy settings to some degree, more than two in five have not set privacy settings for some of their online accounts. When you think about the social networking accounts and other online accounts you have, on how many of these accounts have you set privacy settings? Have privacy settings on all accounts 48% 57% 60% 67% Don’t have privacy settings on all accounts 52% 43% 40% 33% Boys age 13 to 15 Girls age 13 to 15 Boys age 16 to 17 Girls age 16 to 17 57% 33% 10% Have set privacy settings on all my accounts Have set privacy settings on some of my accounts Haven’t set privacy settings on any of my accounts 43% have not set privacy settings on all their accounts
  • 15. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 14 There is room to improve and expand teens’ level of protection, and many teens who are not doing these things would consider doing them. 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% 35% 36% 39% 50% 54% 66% 69% 44% 46% 40% 33% 31% 22% 22% 21% 18% 21% 17% 15% 12% 9% Have done Have not done but would consider doing Have not done/won't consider Set auto lock with password on cell phone, computer, tablet Set privacy settings on social networks so only friends see Use variety of passwords rather than same for all Remove/take down personal info included in a post Set privacy settings on social networks so name doesn’t come up on search Turn off/disable cookies Ask friend/other to remove post with person info or photo Would help a lot to protect from identity theft 61% 58% 69% 52% 60% 49% 44%
  • 16. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 15 10% 12% 17% 42% 45% 56% Teens indicate that more traditional forms of outreach are the best ways to get their attention about the risk of identity theft. School assembly with a tech company on identity theft and how to protect yourself My parent/guardian talking to me about identity theft Online and TV public service campaign with teens whose identities have been stolen Facebook page/group with information about identity theft and teens Ads and pop-ups on social network sites directing me to info about identity theft Twitter account sending messages/tips about how teens can avoid ID theft Which one or two of these things would most likely get your attention about teens being at risk for online identity theft?
  • 17. Teen Identity Theft| November 2013 | Hart Research Associates | #fosi 16 Very few teens oppose enabling parents to put a “security freeze” on their children’s credit. Would you favor or oppose your parent or guardian putting a “security freeze” on your credit until you are 18 years old?* 56% 31% 13% Favor putting security freeze on my credit * Description prior to question: “There has been an idea to allow the parents and guardians of minors to put a “security freeze” on their children’s credit to help prevent identity theft. This means that no one, including you, would be able to get any type of credit in your name, like a credit card or loan, while the security freeze is in place, even if someone has your name and Social Security number.” Don’t care one way or the other Oppose putting security freeze on my credit