The Open UniversitySkip to content

Whose risk? The mobile phone, risk and the looked after child

Simpson, Jenny (2014). Whose risk? The mobile phone, risk and the looked after child. In: Safeguarding Vulnerable Children and Adults: Risk and Vulnerability. International Professional Symposium., 19-20 May 2014, High Wycombe, UK.

Full text available as:
PDF (Version of Record) - Requires a PDF viewer such as GSview, Xpdf or Adobe Acrobat Reader
Download (135kB) | Preview
Google Scholar: Look up in Google Scholar


Mobile phones have become an indispensable mode of communication that allows for anytime anywhere contact. Mobile phones can be said to represent a form of technology that has evolved to become not only an expression of our social networks but also the means by which we acquire news and information. Through the theoretical deconstruction of a real case this presentation explores the dual functionality of mobile phones in terms of their being tools for security thereby lessening the sense of risk for adolescents and those who have responsibility for their care, whilst at the same time being instruments that enable negotiation and avoidance of spatial control by caregivers. Attention is also given to the perception and interpretation of risk as mediated through the possession and use of mobile phones. The final section of the presentation is given over to how social work practitioners can use existing research on mobile phones and their use by adolescents to complement their daily practice when seeking to effectively manage risk.

Item Type: Conference or Workshop Item
Extra Information: Workshop given at the conference.
Keywords: safeguarding; looked after children; mobile technologies; risk; adolescents
Academic Unit/School: Faculty of Wellbeing, Education and Language Studies (WELS) > Health, Wellbeing and Social Care
Faculty of Wellbeing, Education and Language Studies (WELS)
Item ID: 40254
Depositing User: Jenny Simpson
Date Deposited: 28 May 2014 14:00
Last Modified: 13 Dec 2018 01:42
Share this page:

Download history for this item

These details should be considered as only a guide to the number of downloads performed manually. Algorithmic methods have been applied in an attempt to remove automated downloads from the displayed statistics but no guarantee can be made as to the accuracy of the figures.

Actions (login may be required)

Policies | Disclaimer

© The Open University   contact the OU