{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:25:33Z","timestamp":1776083133199,"version":"3.50.1"},"reference-count":44,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T00:00:00Z","timestamp":1727827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Australian eSafety Commissioner\u2019s Online Safety Grants Program"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>While existing studies explore smartphone privacy setting risks for adolescents, they provide limited insight into the role of gender in these dynamics. This study aims to enhance adolescents\u2019 awareness of the security risks associated with smartphone privacy leakage by focusing on how a cyber safety intervention lesson can affect knowledge of smartphone privacy settings, attitudes toward smartphone settings, and concerns about smartphone privacy. This study surveyed 376 high school students before and after a cyber safety lesson. Our study found that before the cyber safety intervention, females reported lower knowledge of smartphone settings than males. After the lesson, this gap narrowed, with both genders demonstrating more consistent understanding. Both genders showed lower attitudes towards smartphone privacy compared to knowledge, with males displaying the largest gap, reflecting the privacy paradox. Females expressed greater concern regarding location privacy, especially when tracked by unknown individuals, indicating that while both genders are aware of risks, females perceive them more acutely. The results suggest that targeted educational programs can effectively enhance adolescents\u2019 knowledge, attitudes, and concerns about smartphone privacy, particularly in technical areas where gender gaps exist.<\/jats:p>","DOI":"10.3390\/info15100604","type":"journal-article","created":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T03:57:08Z","timestamp":1727841428000},"page":"604","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Smartphone Privacy and Cyber Safety among Australian Adolescents: Gender Differences"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7299-5578","authenticated-orcid":false,"given":"Yeslam","family":"Al-Saggaf","sequence":"first","affiliation":[{"name":"School of Computing, Mathematics and Engineering, Charles Sturt University, Wagga Wagga, NSW 2678, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2707-1082","authenticated-orcid":false,"given":"Julie","family":"Maclean","sequence":"additional","affiliation":[{"name":"School of Computing, Mathematics and Engineering, Charles Sturt University, Wagga Wagga, NSW 2678, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2024,10,2]]},"reference":[{"key":"ref_1","unstructured":"Taylor, P. (2024, August 14). Percentage of Teenagers in the United States Who Have Access to a Smartphone at Home as of October 2023, by Gender. 28 February 2024. Available online: https:\/\/www.statista.com\/statistics\/256501\/teen-cell-phone-and-smartphone-ownership-in-the-us-by-gender\/."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"953","DOI":"10.1177\/0093650218800915","article-title":"Exploring Motivations for Online Privacy Protection Behavior: Insights from Panel Data","volume":"48","author":"Boerman","year":"2021","journal-title":"Commun. Res."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.chb.2013.11.008","article-title":"Understanding online behavioural advertising: User knowledge, privacy concerns and online coping behaviour in Europe","volume":"32","author":"Smit","year":"2014","journal-title":"Comput. Hum. Behav."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1111\/jcom.12276","article-title":"Online Privacy Concerns and Privacy Management: A Meta-Analytical Review","volume":"67","author":"Baruh","year":"2017","journal-title":"J. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"309","DOI":"10.2753\/MIS0742-1222280309","article-title":"Factors Affecting Bloggers\u2019 Knowledge Sharing: An Investigation across Gender","volume":"28","author":"Chai","year":"2011","journal-title":"J. Manag. Inf. Syst."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"e40704","DOI":"10.2196\/40704","article-title":"Youth Perspectives on the Recommended Age of Mobile Phone Adoption: Survey Study","volume":"5","author":"Richter","year":"2022","journal-title":"JMIR Pediatr. Parent."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"2188122","DOI":"10.1080\/17517575.2023.2188122","article-title":"Cybersecurity for children: An investigation into the application of social media","volume":"17","author":"Chang","year":"2023","journal-title":"Enterp. Inf. Syst."},{"key":"ref_8","unstructured":"Radesky, J., Weeks, H.M., Schaller, A., Robb, M., Mann, S., and Lenhart, A. (2023). Constant Companion: A Week in the Life of a Young Person\u2019s Smartphone Use, Common Sense."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1002\/dev.20442","article-title":"Adolescent risk taking, impulsivity, and brain development: Implications for prevention","volume":"52","author":"Romer","year":"2010","journal-title":"Dev. Psychobiol."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1089\/cpb.2007.0240","article-title":"Gender and Online Privacy Among Teens: Risk Perception, Privacy Concerns, and Protection Behaviors","volume":"11","author":"Youn","year":"2008","journal-title":"Cyberpsychol. Behav."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Dempsey, J., Sim, G., and Cassidy, B. Designing for GDPR\u2014Investigating Children\u2019s Understanding of Privacy: A Survey Approach, In Proceedings of the BCS-HCI\u201918: 32nd Human Computer Interaction Conference, Belfast, UK, 2\u20136 July 2018.","DOI":"10.14236\/ewic\/HCI2018.26"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","article-title":"A protection motivation theory of fear appeals and attitude change","volume":"91","author":"Rogers","year":"1975","journal-title":"J. Psychol. Interdiscip. Appl."},{"key":"ref_13","unstructured":"Saunders, M.A. (2021). The Role of Video Game Play, Gender Roles, and Career Decision Self-Efficacy in Development of STEM Career Interests & Motivation. [Doctoral Dissertations, Louisiana Tech University]."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Bishop, M.J., Boling, E., Elen, J., and Svihla, V. (2020). Gender and Technology: Social Context and Intersectionality. Handbook of Research in Educational Communications and Technology, Springer.","DOI":"10.1007\/978-3-030-36119-8"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/s10648-015-9355-x","article-title":"Gender Gap in Science, Technology, Engineering, and Mathematics (STEM): Current Knowledge, Implications for Practice, Policy, and Future Directions","volume":"29","author":"Wang","year":"2017","journal-title":"Educ. Psychol. Rev."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/0890207020962326","article-title":"Men, women and STEM: Why the differences and what should be done?","volume":"35","author":"Halsey","year":"2021","journal-title":"Eur. J. Personal."},{"key":"ref_17","unstructured":"Carranza, E., Das, S., and Kotikula, A. (2023). GenderBased Employment Segregation: Understanding Causes and Policy Interventions, World Bank."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"102853","DOI":"10.1016\/j.ssresearch.2023.102853","article-title":"Tracing the Gender Confidence Gap in Computing: A Cross-National Meta-Analysis of Gender Differences in Self-Assessed Technological Ability","volume":"111","author":"Christensen","year":"2023","journal-title":"Soc. Sci. Res."},{"key":"ref_19","first-page":"672","article-title":"Are Men More Technology-Oriented Than Women? The Role of Gender on the Development of General Computer Self-Efficacy of College Students","volume":"21","author":"He","year":"2019","journal-title":"J. Inf. Syst. Educ."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Marja, L., and Over\u00e5, S. (2021). Are There Differences in Video Gaming and Use of Social Media among Boys and Girls?-A Mixed Methods Approach. Int. J. Environ. Res. Public Health, 18.","DOI":"10.3390\/ijerph18116085"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1080\/00220973.2020.1808944","article-title":"Gender Differences and Roles of Two Science Self-Efficacy Beliefs in Predicting Post-College Outcomes","volume":"90","author":"Robinson","year":"2022","journal-title":"J. Exp. Educ."},{"key":"ref_22","unstructured":"Denejkina, A. (2024, August 14). Generative AI\u2014Gender Gap Identified in Skills and Confidence. 25 August 2023. Available online: https:\/\/youthinsight.com.au\/education\/generative-ai-gender-gap-identified-in-skills-and-confidence\/#:~:text=Here%2C%20men%20were%20more%20likely,62%20per%20cent%20of%20girls."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Sebasti\u00e1n-Tirado, A., F\u00e9lix-Esbr\u00ed, S., Forn, C., and Sanchis-Segura, C. (2023). Are gender-science stereotypes barriers for women in science, technology, engineering, and mathematics? Exploring when, how, and to whom in an experimentally-controlled setting. Front. Psychol., 14.","DOI":"10.3389\/fpsyg.2023.1219012"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.chb.2018.11.046","article-title":"Gender differences in privacy tendencies on social network sites: A meta-analysis","volume":"93","author":"Tifferet","year":"2018","journal-title":"Comput. Hum. Behav."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1089\/cyber.2017.0709","article-title":"Privacy Concerns and Self-Disclosure in Private and Public Uses of Social Media","volume":"21","author":"Gruzd","year":"2018","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"key":"ref_26","unstructured":"eSatefy Commissioner (2024, August 14). State of Play\u2014Youth, Kids and Digital Dangers, Australian Government. 3 May 2018, Available online: https:\/\/www.esafety.gov.au\/sites\/default\/files\/2019-10\/State%20of%20Play%20-%20Youth%20kids%20and%20digital%20dangers.pdf."},{"key":"ref_27","unstructured":"Office of the Australian Information Commissioner (2024, August 14). Australian Community Attitudes to Privacy Survey 2020. Australian Government. September 2020, Available online: https:\/\/www.oaic.gov.au\/engage-with-us\/research-and-training-resources\/research\/australian-community-attitudes-to-privacy-survey\/australian-community-attitudes-to-privacy-survey-2020."},{"key":"ref_28","unstructured":"Office of the Australian Information Commissioner (2024, August 14). Australian Community Attitudes to Privacy Survey 2023, Australian Government. 8 August 2023, Available online: https:\/\/www.oaic.gov.au\/engage-with-us\/research-and-training-resources\/research\/australian-community-attitudes-to-privacy-survey\/australian-community-attitudes-to-privacy-survey-2023."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Savoia, E., Harriman, N.W., Su, M., Cote, T., and Shortland, N. (2021). Adolescents\u2019 Exposure to Online Risks: Gender Disparities and Vulnerabilities Related to Online Behaviors. Int. J. Environ. Res. Public Health, 18.","DOI":"10.21428\/cb6ab371.8482f257"},{"key":"ref_30","unstructured":"Livingstone, S., Stoilova, M., and Nandagiri, R. (2019). Children\u2019s Data and Privacy Online: Growing Up in a Digital Age. An Evidence Review, London School of Economics and Political Science."},{"key":"ref_31","unstructured":"Coopamootoo, K., and Ng, M. (2023, January 9\u201311). \u201cUn-Equal Online Safety?\u201d A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns. Proceedings of the 32nd USENIX Security Symposium, Anaheim, CA, USA."},{"key":"ref_32","first-page":"1","article-title":"The Myth of the Privacy Paradox","volume":"89","author":"Solove","year":"2021","journal-title":"Georg. Wash. Law Rev."},{"key":"ref_33","first-page":"2","article-title":"Why Do People Avoid Information About Privacy?","volume":"2","author":"Svirsky","year":"2021","journal-title":"J. Law Innov."},{"key":"ref_34","first-page":"21","article-title":"\u201cWhat Can I Really Do?\u201d: Explaining the Privacy Paradox with Online Apathy","volume":"10","author":"Hargittai","year":"2016","journal-title":"Int. J. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"100343","DOI":"10.1016\/j.ijcci.2021.100343","article-title":"Cybersecurity awareness for children: A systematic literature review","volume":"30","author":"Quayyum","year":"2021","journal-title":"Int. J. Child-Comput. Interact."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Pratama, A.R., and Firmansyah, F.M. (Appl. Comput. Inform., 2021). Until you have something to lose! Loss aversion and two-factor authentication adoption, Appl. Comput. Inform., ahead-of-print.","DOI":"10.1108\/ACI-12-2020-0156"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Dhir, A., Torsheim, T., Pallesen, S., and Andreassen, C.S. (2017). Do Online Privacy Concerns Predict Selfie Behavior among Adolescents, Young Adults and Adults?. Front. Psychol., 8.","DOI":"10.3389\/fpsyg.2017.00815"},{"key":"ref_38","unstructured":"Kaarakainen, M., and Hutri, H. (2024, August 01). Participating with a Real Name, a Nickname or by Being Anonymous?\u2014Anonymous and Identifiable Users\u2019 Skills and Internet Usage Habits, 2016. Available online: http:\/\/urn.fi\/URN:ISBN:978-952-03-0307-5."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Braithwaite, D.O., and Baxter, L.A. (2006). Communication Privacy Management Theory: Understanding Families. Engaging Theories in Family Communication: Multiple Perspectives, Routledge.","DOI":"10.4135\/9781452204420"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1177\/00936502221102101","article-title":"The Privacy Calculus Revisited: An Empirical Investigation of Online Privacy Decisions on Between- and Within-Person Levels","volume":"51","author":"Meier","year":"2024","journal-title":"Commun. Res."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Peng, Z. (2023). A privacy calculus model perspective that explains why parents sharent. Inf. Commun. Soc., 1\u201324.","DOI":"10.1080\/1369118X.2023.2285462"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"103049","DOI":"10.1016\/j.cose.2022.103049","article-title":"Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick\u2019s Model","volume":"125","author":"Khan","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"100144","DOI":"10.1016\/j.caeo.2023.100144","article-title":"Developing digital resilience: An educational intervention improves elementary students\u2019 response to digital challenges","volume":"5","author":"Lee","year":"2023","journal-title":"Comput. Educ. Open"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"105064","DOI":"10.1016\/j.chiabu.2021.105064","article-title":"Teaching privacy: A flawed strategy for children\u2019s online safety","volume":"117","author":"Finkelhor","year":"2021","journal-title":"Child Abus. Negl."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/10\/604\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:09:05Z","timestamp":1760112545000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/15\/10\/604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,2]]},"references-count":44,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2024,10]]}},"alternative-id":["info15100604"],"URL":"https:\/\/doi.org\/10.3390\/info15100604","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,2]]}}}