Sexting: Misuse of New Technology in the 1990s
Fast forward to the 1990s. Sending information across the Unites States, or around the world, took hours to days and was expensive or time-consuming using short-wave radio or telegraph. Then, we created high-speed data networks (the Internet) and a structure to allow people to easily share information (the Web). The entire process of sharing information became pervasive and easy for anyone to access just about any information at any time. The Internet and the Web also allowed people to misuse the new technology for child pornography, identity theft and gambling scams. Again, the new information technologies provided a wonderful way of creating and instantly sharing information around the world, but it also created a whole set of new problems-many of which required new laws to deal with them.Sure, it violates privacy but so does someone in a corporate IT department being told by management to review the information on an employee's notebook hard drive, or being told to read an employee's e-mail stored on the company server. The company owns the asset (the notebook PC) and has the right to authorize review of the employee's information if they believe the employee might be violating company policy or breaking the law. Perhaps the best policy for sexting is to discuss the problem with your kids and agree to some behavior "standards" (family policy), and then have trust until the policy is violated, with consequences given for the violations (for example, "I'm taking your phone away for the next week"). Remember, each new technology ushers in a wave of tremendous benefits, but also trailing right behind the wave of new technology is a dust cloud of new problems that need to be managed. J. Gerry Purdy, Ph.D., is the VP and Chief Analyst with the Frost & Sullivan North American Information & Communication Technologies Practice. As a nationally-recognized industry authority, he focuses on monitoring and analyzing emerging trends, technologies and market behavior in the mobile computing and wireless data communications industry in North America. Since joining Frost & Sullivan in 2006, Dr. Purdy has been specializing in mobile and wireless devices, wireless data communications and connection to the infrastructure that powers the data in the wireless handheld. He is author of Inside Mobile & Wireless, which provides industry insights and reaches over 100,000 readers per month. For more than 16 years, Dr. Purdy has been consulting, speaking, researching, networking, writing and developing state-of-the-art concepts that challenge people's mind-sets, and developing new ways of thinking and forecasting in the mobile computing and wireless data arenas. Often quoted, his ideas and opinions are followed closely by thought leaders in the mobile & wireless industry. He has a Ph.D. in Computer Science from Stanford University. He can be reached at email@example.com. Disclosure Statement: From time to time, I may have a direct or indirect equity position in a company that is mentioned in this column. If that situation happens, then I'll disclose it at that time.
Here we go again with sexting. Is a 13-year-old sending an inappropriate photo of himself or herself to a friend truly "child pornography"? Perhaps. But I know one surefire way to put an end to it: send a copy of every text message and MMS message created or received by a child to the parents who are paying the bill. Every teen in the country would yell out, "No way!"