Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3290605.3300579acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults

Published: 02 May 2019 Publication History

Abstract

Older adults are increasingly vulnerable to cybersecurity attacks and scams. Yet we know relatively little about their understanding of cybersecurity, their information-seeking behaviours, and their trusted sources of information and advice in this domain. We conducted 22 semi-structured interviews with community-dwelling older adults in order to explore their cybersecurity information seeking behaviours. Following a thematic analysis of these interviews, we developed a cybersecurity information access framework that highlights shortcomings in older adults' choice of information resources. Specifically, we find that older users prioritise social resources based on availability, rather than cybersecurity expertise, and that they avoid using the Internet for cybersecurity information searches despite using it for other domains. Finally, we discuss the design of cybersecurity information dissemination strategies for older users, incorporating favoured sources such as TV adverts and radio programming.

References

[1]
AgeUK. 2015. Only the tip of the iceberg: Fraud against older people. Technical Report. AgeUK. https://www.ageuk.org.uk/documents/en-gb/for-professionals/consumer-issues/age%20uk%20only%20the%20tip%20of%20the%20iceberg%20april%202015.pdf?dtrk=true
[2]
Murat Akçayar, Hakan Dündar, and Gökçe Akçayar. 2016. What makes you a digital native? Is it enough to be born after 1980 Computers in Human Behavior 60 (July 2016), 435--440.
[3]
Linda M Alves and Steve R Wilson. 2008. The effects of loneliness on telemarketing fraud vulnerability among older adults. Journal of elder abuse & neglect 20, 1 (2008), 63--85.
[4]
Yvonne Barnard, Mike D. Bradley, Frances Hodgson, and Ashley D. Lloyd. 2013. Learning to use new technologies by older adults: Perceived difficulties, experimentation behaviour and usability. Computers in Human Behavior 29, 4 (July 2013), 1715--1724.
[5]
Virginia Braun, Victoria Clarke, and Gareth Terry. 2014. Thematic analysis. Qual Res Clin Health Psychol 24 (2014), 95--114.
[6]
Pam Briggs, Debora Jeske, and Lynne Coventry. 2017. The Design of Messages to Improve Cybersecurity Incident Reporting. In Human Aspects of Information Security, Privacy and Trust (Lecture Notes in Computer Science), Theo Tryfonas (Ed.). Springer International Publishing, 3--13.
[7]
Rajarshi Chakraborty, Jaeung Lee, Sharmistha Bagchi-Sen, Shambhu Upadhyaya, and H. Raghav Rao. 2016. Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults. Decision Support Systems 83 (March 2016), 47--56.
[8]
Cassandra Cross. 2017. 'But I've never sent them any personal details apart from my driver's licence number...': Exploring seniors' attitudes towards identity crime. Security Journal 30, 1 (Jan. 2017), 74--88.
[9]
John D'Arcy, Tejaswini Herath, and Mindy K. Shoss. 2014. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. Journal of Management Information Systems 31, 2 (Oct. 2014), 285-- 318.
[10]
Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The Effect of Social Influence on Security Sensitivity. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2014. 15.
[11]
Sauvik Das, Adam D.I. Kramer, Laura A. Dabbish, and Jason I. Hong. 2014. Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation. In In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. ACM Press, 739--749.
[12]
Sauvik Das, Joanne Lo, Laura Dabbish, and Jason I. Hong. 2018. Breaking! A Typology of Security and Privacy News and How It's Shared. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, New York, NY, USA, 1:1--1:12.
[13]
Julie M. Donohue, Haiden A. Huskamp, Ira B. Wilson, and Joel Weissman. 2009. Whom do older adults trust most to provide information about prescription drugs? The American Journal of Geriatric Pharmacotherapy 7, 2 (April 2009), 105--116.
[14]
Rebecca Eynon and Ellen Helsper. 2011. Adults learning online: Digital choice and/or digital exclusion? New Media & Society 13, 4 (June 2011), 534--551.
[15]
A. Farooq and S. R. U. Kakakhel. 2013. Information Security Awareness: Comparing perceptions and training preferences. In 2013 2nd National Conference on Information Assurance (NCIA). 53--57.
[16]
Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, and Marian Harbach. 2016. Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2016. Usenix Association.
[17]
Steven Furnell and Kerry-Lynn Thomson. 2009. Recognising and addressing 'security fatigue'. Computer Fraud & Security 2009, 11 (Nov. 2009), 7--11.
[18]
Vaibhab Garg, Lesa Mae Lorenzen-Huber, L Jean Camp, and Kay H. Connelly. 2012. Risk communication design for older adults. Gerontechnology 11, 2 (2012). /paper/Risk-communication-design-for-older-adults-Garg-Lorenzen-Huber/ 505aebb268aa5a1516571125b4e75e3982e960bb
[19]
Galen A. Grimes, Michelle G. Hough, Elizabeth Mazur, and Margaret L. Signorella. 2010. Older Adults' Knowledge of Internet Hazards. Educational Gerontology 36, 3 (Feb. 2010), 173--192.
[20]
Galen A. Grimes, Michelle G. Hough, and Margaret L. Signorella. 2007. Email end users and spam: relations of gender and age group to attitudes and actions. Computers in Human Behavior 23, 1 (Jan. 2007), 318--332.
[21]
C. Hale. 1996. Fear of Crime: A Review of the Literature. International Review of Victimology 4, 2 (Jan. 1996), 79--150.
[22]
Julie Haney, M. and Wayne G. Lutters. 2018. "It's Scary... It's Confusing... It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2018. USENIX Association.
[23]
Bartlomiej Hanus and Yu "Andy" Wu. 2016. Impact of Users' Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective. Information Systems Management 33, 1 (Jan. 2016), 2--16.
[24]
Billy Henson and Bradford W. Reyns. 2015. The Only Thing We Have to Fear Is Fear Itself... and Crime: The Current State of the Fear of Crime Literature and Where It Should Go Next. Sociology Compass 9, 2 (Feb. 2015), 91--103.
[25]
Trevor Hughes. 2018. More fraudsters are scamming senior citizens through technology -- and it's costing them millions. https://www.usatoday.com/story/money/personalfinance/2018/03/17/more-fraudsters-scamming-senior-citizens-through-technology-and-its-costing-them-millions/428406002/
[26]
Sophie Nicholls Jones. 2018. Seniors too ashamed to report financial fraud, say experts. https://www.cpacanada.ca/en/news/canada/2018-06--15-seniors-too-ashamed-to-report-financial-fraud
[27]
I. Kirlappos, S. Parkin, and M. A. Sasse. 2014. Learning from "Shadow Security": Why understanding non-compliance provides the basis for effective security. In In Proceedings of Workshop on Usable Security.
[28]
Victoria Kisekka, Rajarshi Chakraborty, Sharmistha Bagchi-Sen, and H. Raghav Rao. 2015. Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults. Journal of Information Privacy and Security 11, 3 (July 2015), 158--173.
[29]
Richard Philip Lee, Ben Thompson, Paul Whybrow, and Tim Rapley. 2016. Talking About Looking: Three Approaches to Interviewing Carers of People With Rheumatoid Arthritis About Information Seeking. Qualitative Health Research 26, 9 (July 2016), 1229--1239.
[30]
Nigel Martin and John Rice. 2013. Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users. International Journal of Information Security and Privacy (IJISP) 7, 1 (Jan. 2013), 1--15.
[31]
Andrew R. McNeill, Lynne Coventry, Jake Pywell, and Pam Briggs. 2017. Privacy Considerations when Designing Social Network Systems to Support Successful Ageing. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 6425--6437.
[32]
National Cyber Security Centre. 2015. Password Guidance: Simplifying Your Approach. Technical Report. National Cyber Security Centre. https://www.ncsc.gov.uk/guidance/password-guidance-simplifying-your-approach
[33]
Wan Ng. 2012. Can we teach digital natives digital literacy? Computers & Education 59, 3 (Nov. 2012), 1065--1078.
[34]
James Nicholson, Lynne Coventry, and Pam Briggs. 2018. Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2018. 16.
[35]
Lorelli S Nowell, Jill M Norris, Deborah E White, and Nancy J Moules. 2017. Thematic analysis: Striving to meet the trustworthiness criteria. International Journal of Qualitative Methods 16, 1 (2017), 1609406917733847.
[36]
Norbert Nthala and Ivan Flechais. 2017. "If It's Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It": A Study into Home Data Security Decisions. In Human Aspects of Information Security, Privacy and Trust (Lecture Notes in Computer Science). Springer, Cham, 123--142.
[37]
Norbert Nthala and Ivan Flechais. 2018. Informal Support Networks: an investigation into Home Data Security Practices. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2018. 20.
[38]
Ofcom. 2017. Box Set Britain: UK's TV and online habits revealed. Technical Report. Ofcom. https://www.ofcom.org.uk/about-ofcom/latest/media/media-releases/2017/box-set-britain-tv-online-habits
[39]
Daniela Oliveira, Harold Rocha, Huizi Yang, Donovan Ellis, Sandeep Dommaraju, Melis Muradoglu, Devon Weir, Adam Soliman, Tian Lin, and Natalie Ebner. 2017. Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 6412--6424.
[40]
Sebastiaan T.M. Peek, Katrien G. Luijkx, Maurice D. Rijnaard, Marianne E. Nieboer, Claire S. van der Voort, Sil Aarts, Joost van Hoof, Hubertus J.M. Vrijhoef, and Eveline J.M. Wouters. 2016. Older Adults' Reasons for Using Technology while Aging in Place. Gerontology 62, 2 (2016), 226--237.
[41]
Emilee Rader and Rick Wash. 2015. Identifying patterns in informal sources of security information. Journal of Cybersecurity 1, 1 (Dec. 2015), 121--144.
[42]
Elissa M. Redmiles, Sean Kross, and Michelle L. Mazurek. 2016. How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior. In In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM Press, 666--677.
[43]
Elissa M. Redmiles, Sean Kross, and Michelle L. Mazurek. 2017. Where is the Digital Divide?: A Survey of Security, Privacy, and Socioeconomics. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 931--936.
[44]
Elissa M. Redmiles, Amelia R. Malone, and Michelle L. Mazurek. 2016. I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security. In In Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 272--288.
[45]
Jane Ritchie, Liz Spencer, and Liz Spencer. 1994. Qualitative data analysis for applied policy research. In Analyzing Qualitative Data. Taylor & Francis, 173--194.
[46]
David R. Roalf, Suzanne H. Mitchell, William T. Harbaugh, and Jeri S. Janowsky. 2012. Risk, Reward, and Economic Decision Making in Aging. The Journals of Gerontology: Series B 67B, 3 (May 2012), 289--298.
[47]
Lynne D. Roberts, David Indermaur, and Caroline Spiranovic. 2013. Fear of Cyber-Identity Theft and Related Fraudulent Activity. Psychiatry, Psychology and Law 20, 3 (June 2013), 315--328.
[48]
Ronald W. Rogers. 1975. A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology 91, 1 (Sept. 1975), 93--114.
[49]
Daniel Romer, Kathleen Hall Jamieson, and Sean Aday. 2003. Television News and the Cultivation of Fear of Crime. Journal of Communication 53, 1 (March 2003), 88--104.
[50]
Kathleen Schreuers, Anabel Quan-Haase, and Kim Martin. 2017. Problematizing the digital literacy paradox in the context of older adults' ICT use: Aging, media discourse, and self-determination. Canadian Journal of Communication 42, 2 (Jan. 2017), 1--34. https://ir.lib.uwo.ca/fimspub/137
[51]
Sue Stableford and Wendy Mettger. 2007. Plain Language: A Strategic Response to the Health Literacy Challenge. Journal of Public Health Policy 28, 1 (April 2007), 71--93.
[52]
S. Talib, N. L. Clarke, and S. M. Furnell. 2010. An Analysis of Information Security Awareness within Home and Work Environments. In 2010 International Conference on Availability, Reliability and Security. 196--203.
[53]
Bethany Tennant, Michael Stellefson, Virginia Dodd, Beth Chaney, Don Chaney, Samantha Paige, and Julia Alber. 2015. eHealth Literacy and Web 2.0 Health Information Seeking Behaviors Among Baby Boomers and Older Adults. Journal of Medical Internet Research 17, 3 (March 2015).
[54]
Kami E. Vaniea, Emilee Rader, and Rick Wash. 2014. Betrayed by Updates: How Negative Experiences Affect Future Security. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 2671--2674.
[55]
Kim Witte and Mike Allen. 2000. A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns. Health Education & Behavior 27, 5 (Oct. 2000), 591--615.
[56]
Yixin Zou, Abraham Mhaidli, H., Austin McCall, and Florian Schaub. 2018. "I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2018. USENIX Association.

Cited By

View all
  • (2025)"It's Like Not Being Able to Read and Write": Narrowing the Digital Divide for Older Adults and Leveraging the Role of Digital Educators in IrelandProceedings of the Nineteenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3689050.3704945(1-15)Online publication date: 4-Mar-2025
  • (2025)Securing the Silver Surfers: Cybersecurity Awareness Among Older Adults2025 19th International Conference on Ubiquitous Information Management and Communication (IMCOM)10.1109/IMCOM64595.2025.10857480(1-7)Online publication date: 3-Jan-2025
  • (2025)Cyber Literacy, Awareness, and Safety of Senior CitizensPower Devices and Internet of Things for Intelligent System Design10.1002/9781394311613.ch4(99-131)Online publication date: 13-Feb-2025
  • Show More Cited By

Index Terms

  1. "If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
    May 2019
    9077 pages
    ISBN:9781450359702
    DOI:10.1145/3290605
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 May 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Badges

    • Honorable Mention

    Author Tags

    1. cybersecurity
    2. digital literacy
    3. information seeking
    4. older adults
    5. social aspects of security

    Qualifiers

    • Research-article

    Funding Sources

    • Engineering and Physical Sciences Council (EPSRC) UK

    Conference

    CHI '19
    Sponsor:

    Acceptance Rates

    CHI '19 Paper Acceptance Rate 703 of 2,958 submissions, 24%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Upcoming Conference

    CHI 2025
    ACM CHI Conference on Human Factors in Computing Systems
    April 26 - May 1, 2025
    Yokohama , Japan

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)288
    • Downloads (Last 6 weeks)29
    Reflects downloads up to 28 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)"It's Like Not Being Able to Read and Write": Narrowing the Digital Divide for Older Adults and Leveraging the Role of Digital Educators in IrelandProceedings of the Nineteenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3689050.3704945(1-15)Online publication date: 4-Mar-2025
    • (2025)Securing the Silver Surfers: Cybersecurity Awareness Among Older Adults2025 19th International Conference on Ubiquitous Information Management and Communication (IMCOM)10.1109/IMCOM64595.2025.10857480(1-7)Online publication date: 3-Jan-2025
    • (2025)Cyber Literacy, Awareness, and Safety of Senior CitizensPower Devices and Internet of Things for Intelligent System Design10.1002/9781394311613.ch4(99-131)Online publication date: 13-Feb-2025
    • (2024)Analyzing Security and Privacy Advice During the 2022 Russian Invasion of Ukraine on TwitterProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642826(1-16)Online publication date: 11-May-2024
    • (2024)‘We Do Not Have the Capacity to Monitor All Media’: A Design Case Study on Cyber Situational Awareness in Computer Emergency Response TeamsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642368(1-16)Online publication date: 11-May-2024
    • (2024)Digital Security — A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00027(697-716)Online publication date: 19-May-2024
    • (2024)A comprehensive learnability framework for mobile application design for older adultsUniversal Access in the Information Society10.1007/s10209-024-01147-6Online publication date: 14-Sep-2024
    • (2024)Securing Cyberspace: Addressing the Dark Web and Cybercrime UnderreportingSpace Law Principles and Sustainable Measures10.1007/978-3-031-64045-2_9(185-198)Online publication date: 15-Sep-2024
    • (2024)Using Breach and Attack Demonstrations to Explain Spear Phishing Attacks to Young AdultsInformation Security Education - Challenges in the Digital Age10.1007/978-3-031-62918-1_5(65-80)Online publication date: 11-Jun-2024
    • (2024)Towards an Understanding of How Computer Skills Relate to Online Safety Across Older AdultsHCI International 2024 Posters10.1007/978-3-031-61947-2_34(324-334)Online publication date: 2-Jun-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media