Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3411764.3445078acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Training and Embedding Cybersecurity Guardians in Older Communities.

Published: 07 May 2021 Publication History

Abstract

Older adults can struggle to access relevant community expertise when faced with new situations. One such situation is the number of cyberattacks they may face when interacting online. This paper reports on an initiative which recruited, trained, and supported older adults to become community cybersecurity educators (CyberGuardians), tasked with promoting cybersecurity best practice within their communities to prevent older adults falling victim to opportunistic cyberattacks. This initiative utilised an embedded peer-to-peer information dissemination strategy, rather than expert-to-citizen, facilitating the inclusion of individuals who would ordinarily be unlikely to seek cybersecurity information and thus may be vulnerable to cyberattacks. We report on ways the CyberGuardians used informal methods to create more aware communities, served as role models for behaviour change and indirectly improved their personal wellbeing. We discuss considerations for supporting CyberGuardians, including implications for sustainability and for replicating this model in other digital contexts, e.g., recognising misinformation or improving mental health.

Supplementary Material

MP4 File (3411764.3445078_videopreview.mp4)
Preview video

References

[1]
AgeUK. 2015. Only the tip of the iceberg: Fraud against older people. AgeUK. Retrieved August 7, 2018 from https://www.ageuk.org.uk/documents/en-gb/for-professionals/consumer-issues/age%20uk%20only%20the%20tip%20of%20the%20iceberg%20april%202015.pdf?dtrk=true
[2]
AgeUK. 2019. Older person becomes victim of fraud every 40 seconds. Retrieved March 12, 2020 from https://www.ageuk.org.uk/latest-press/articles/2019/july/older-person-becomes-fraud-victim-every-40-seconds/
[3]
Nabat Arfi and Shalini Agarwal. 2013. Knowledge of Cybercrime among Elderly. International Journal of Scientific & Engineering Research 4, 7: 1463–1468.
[4]
Lucy R. Betts, Rowena Hill, and Sarah E. Gardner. 2019. “There's Not Enough Knowledge Out There”: Examining Older Adults’ Perceptions of Digital Technology Use and Digital Inclusion Classes. Journal of Applied Gerontology 38, 8: 1147–1166. https://doi.org/10.1177/0733464817737621
[5]
Michael T. Bixter, Kenneth A. Blocker, and Wendy A. Rogers. 2018. Enhancing social engagement of older adults through technology. In Aging, Technology and Health, Richard Pak and Anne Collins McLaughlin (eds.). Academic Press, San Diego, 179–214. https://doi.org/10.1016/B978-0-12-811272-4.00008-7
[6]
Carlene Blackwood-Brown, Yair Levy, and John D'Arcy. 2019. Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective. Journal of Computer Information Systems 0, 0: 1–12. https://doi.org/10.1080/08874417.2019.1579076
[7]
Leonieke C van Boekel, Sebastiaan TM Peek, and Katrien G Luijkx. 2017. Diversity in Older Adults’ Use of the Internet: Identifying Subgroups Through Latent Class Analysis. Journal of Medical Internet Research 19, 5. https://doi.org/10.2196/jmir.6853
[8]
Centers for Disease Control and Prevention. 2018. Sexually Transmitted Disease Surveillance 2017. U.S. Department of Health and Human Services. Retrieved from https://www.cdc.gov/std/stats17/2017-STD-Surveillance-Report_CDC-clearance-9.10.18.pdf
[9]
Lawrence E. Cohen and Marcus Felson. 1979. Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review 44, 4: 588–608. https://doi.org/10.2307/2094589
[10]
Cassandra Cross. 2017. ‘But I've never sent them any personal details apart from my driver's licence number …’: Exploring seniors’ attitudes towards identity crime. Security Journal 30, 1: 74–88. https://doi.org/10.1057/sj.2015.23
[11]
John D'Arcy, Tejaswini Herath, and Mindy K. Shoss. 2014. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective. Journal of Management Information Systems 31, 2: 285–318. https://doi.org/10.2753/MIS0742-1222310210
[12]
Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The Effect of Social Influence on Security Sensitivity. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2014, 15.
[13]
Sauvik Das, Joanne Lo, Laura Dabbish, and Jason I. Hong. 2018. Breaking! A Typology of Security and Privacy News and How It's Shared. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI ’18), 1:1-1:12. https://doi.org/10.1145/3173574.3173575
[14]
Thomas N. Friemel. 2014. The digital divide has grown old: Determinants of a digital divide among seniors: New Media & Society. https://doi.org/10.1177/1461444814538648
[15]
Chris Hale. 1996. Fear of Crime: A Review of the Literature. International Review of Victimology 4, 2: 79–150. https://doi.org/10.1177/026975809600400201
[16]
Julie Haney M. and Wayne G. Lutters. 2018. “It's Scary…It's Confusing…It's Dull”: How Cybersecurity Advocates Overcome Negative Perceptions of Security. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2018.
[17]
Julie M. Haney and Wayne G. Lutters. 2019. Motivating Cybersecurity Advocates: Implications for Recruitment and Retention. In Proceedings of the 2019 on Computers and People Research Conference (SIGMIS-CPR ’19), 109–117. https://doi.org/10.1145/3322385.3322388
[18]
Ann Henderson-Sellers. 1998. Climate Whispers: Media Communication About Climate Change. Climatic Change 40, 3: 421–456. https://doi.org/10.1023/A:1005384523305
[19]
Meghan E Hollis, Marcus Felson, and Brandon C Welsh. 2013. The capable guardian in routine activities theory: A theoretical and conceptual reappraisal. Crime Prevention and Community Safety 15, 1: 65–79. https://doi.org/10.1057/cpcs.2012.14
[20]
Trevor Hughes. More fraudsters are scamming senior citizens through technology — and it's costing them millions. usatoday. Retrieved September 16, 2018 from https://www.usatoday.com/story/money/personalfinance/2018/03/17/more-fraudsters-scamming-senior-citizens-through-technology-and-its-costing-them-millions/428406002/
[21]
Amanda Hunsaker and Eszter Hargittai. 2018. A review of Internet use among older adults. New Media & Society 20, 10: 3937–3954. https://doi.org/10.1177/1461444818787348
[22]
MA Rodrigo Juárez, Víctor M. González, and Jesús Favela. 2016. Effect of technology on aging perception: Health Informatics Journal. https://doi.org/10.1177/1460458216661863
[23]
Justin Kruger and David Dunning. 1999. Unskilled and unaware of it: how difficulties in recognizing one's own incompetence lead to inflated self-assessments. Journal of personality and social psychology. https://doi.org/10.1037/0022-3514.77.6.1121
[24]
Nigel Martin and John Rice. 2013. Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users. International Journal of Information Security and Privacy (IJISP) 7, 1: 1–15. https://doi.org/10.4018/jisp.2013010101
[25]
Sharan B. Merriam and Youngwha Kee. 2014. Promoting Community Wellbeing: The Case for Lifelong Learning for Older Adults. Adult Education Quarterly 64, 2: 128–144. https://doi.org/10.1177/0741713613513633
[26]
Tracy L. Mitzner, Cara Bailey Fausset, Julie B. Boron, Anne E. Adams, Katinka Dijkstra, Chin Chin Lee, Wendy A. Rogers, and Arthur D. Fisk. 2008. Older Adults’ Training Preferences for Learning to Use Technology. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 52, 26: 2047–2051. https://doi.org/10.1177/154193120805202603
[27]
National Cyber Security Centre. Password Guidance: Simplifying Your Approach. National Cyber Security Centre. Retrieved September 20, 2018 from https://www.ncsc.gov.uk/guidance/password-guidance-simplifying-your-approach
[28]
James Nicholson, Lynne Coventry, and Pamela Briggs. 2019. “If It's Important It Will Be A Headline”: Cybersecurity Information Seeking in Older Adults. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI ’19), 1–11. https://doi.org/10.1145/3290605.3300579
[29]
James Nicholson, Yousra Javed, Matt Dixon, Lynne Coventry, Opeyemi Dele-Ajayi, and Philip Anderson. 2020. Investigating Teenagers’ Ability to Detect Phishing Messages. IEEE EuroUSEC 2020: 10.
[30]
James Nicholson and Jill McGlasson. 2020. CyberGuardians: Improving Community Cyber Resilience Through Embedded Peer-to-Peer Support. In Companion Publication of the 2020 ACM Designing Interactive Systems Conference (DIS’ 20 Companion), 117–121. https://doi.org/10.1145/3393914.3395871
[31]
Norbert Nthala and Ivan Flechais. 2018. Informal Support Networks: an investigation into Home Data Security Practices. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2018, 20.
[32]
Jake Pywell, Santosh Vijaykumar, Alyson Dodd, and Lynne Coventry. 2020. Barriers to older adults’ uptake of mobile-based mental health interventions. DIGITAL HEALTH 6: 205520762090542. https://doi.org/10.1177/2055207620905422
[33]
John Martyn Ratcliffe, Paul Galdas, and Mona Kanaan. 2020. Men and loneliness in the ‘west’: A critical interpretive synthesis. Research Square. https://doi.org/10.21203/rs.3.rs-17584/v1
[34]
Arlind Reuter, Tom Bartindale, Kellie Morrissey, Thomas Scharf, and Jennifer Liddle. 2019. Older Voices: Supporting Community Radio Production for Civic Participation in Later Life. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI ’19), 1–13. https://doi.org/10.1145/3290605.3300664
[35]
Joanne Rodda, Zuzana Walker, and Janet Carter. 2011. Depression in older adults. BMJ 343. https://doi.org/10.1136/bmj.d5219
[36]
Thomas Scharf, Bernard McDonald, and Ann Marie Atkins. 2016. Promoting civic engagement in later life through the Touchstone Programme: a resource and research guide. Galway: Irish Centre for Social Gerontology.
[37]
Joseph J Simons, Noah Joshua Phillips, Rohit Chopra, Rebecca Kelly Slaughter, and Christine S Wilson. Protecting Older Consumers. Federal Trade Commission.
[38]
Vera Toepoel. 2013. Ageing, Leisure, and Social Connectedness: How could Leisure Help Reduce Social Isolation of Older People? Social Indicators Research 113, 1: 355–372. https://doi.org/10.1007/s11205-012-0097-6
[39]
Jingyi Wang, Farhana Mann, Brynmor Lloyd-Evans, Ruimin Ma, and Sonia Johnson. 2018. Associations between loneliness and perceived social support and outcomes of mental health problems: a systematic review. BMC Psychiatry 18, 1: 156. https://doi.org/10.1186/s12888-018-1736-5
[40]
Rick Wash and Molly M. Cooper. 2018. Who Provides Phishing Training? Facts, Stories, and People Like Me. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI ’18), 1–12. https://doi.org/10.1145/3173574.3174066
[41]
Hue Watson, Eyitemi Moju-Igbene, Akanksha Kumari, and Sauvik Das. 2020. “We Hold Each Other Accountable”: Unpacking How Social Groups Approach Cybersecurity and Privacy Together. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI ’20), 1–12. https://doi.org/10.1145/3313831.3376605
[42]
Anne Weibert, Konstantin Aal, Nora Oertel Ribeiro, and Volker Wulf. 2017. “This is My Story...”: Storytelling with Tangible Artifacts among Migrant Women in Germany. In Proceedings of the 2017 ACM Conference Companion Publication on Designing Interactive Systems (DIS ’17 Companion), 144–149. https://doi.org/10.1145/3064857.3079135
[43]
Etienne Wenger. 1998. Communities of Practice: Learning as a Social System. Systems Thinker 9, 5: 10.
[44]
Alma Whitten and J D Tygar. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In USENIX Security Symposium, 15.
[45]
World Health Organization. 2004. Global Burden Disease Report. World Health Organization. Retrieved September 14, 2020 from https://www.who.int/healthinfo/global_burden_disease/GBD_report_2004update_part4.pdf

Cited By

View all
  • (2025)Securing the Silver Surfers: Cybersecurity Awareness Among Older Adults2025 19th International Conference on Ubiquitous Information Management and Communication (IMCOM)10.1109/IMCOM64595.2025.10857480(1-7)Online publication date: 3-Jan-2025
  • (2024)Aging Safely Online: Unpacking Privacy & Security of Online Dating for Older AdultsProceedings of the Human Factors and Ergonomics Society Annual Meeting10.1177/1071181324126202268:1(230-235)Online publication date: 29-Aug-2024
  • (2024)Social Justice in HCI: A Systematic Literature ReviewProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642704(1-33)Online publication date: 11-May-2024
  • Show More Cited By

Index Terms

  1. Training and Embedding Cybersecurity Guardians in Older Communities.
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '21: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems
      May 2021
      10862 pages
      ISBN:9781450380966
      DOI:10.1145/3411764
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 May 2021

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Older adults
      2. civic engagement
      3. community
      4. cybersecurity
      5. information sharing

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Funding Sources

      Conference

      CHI '21
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)248
      • Downloads (Last 6 weeks)13
      Reflects downloads up to 03 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Securing the Silver Surfers: Cybersecurity Awareness Among Older Adults2025 19th International Conference on Ubiquitous Information Management and Communication (IMCOM)10.1109/IMCOM64595.2025.10857480(1-7)Online publication date: 3-Jan-2025
      • (2024)Aging Safely Online: Unpacking Privacy & Security of Online Dating for Older AdultsProceedings of the Human Factors and Ergonomics Society Annual Meeting10.1177/1071181324126202268:1(230-235)Online publication date: 29-Aug-2024
      • (2024)Social Justice in HCI: A Systematic Literature ReviewProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642704(1-33)Online publication date: 11-May-2024
      • (2024)SoK: Safer Digital-Safety Research Involving At-Risk Users2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00071(635-654)Online publication date: 19-May-2024
      • (2024)Digital Security — A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00027(697-716)Online publication date: 19-May-2024
      • (2024)A typology of cybersecurity behavior among knowledge workersComputers and Security10.1016/j.cose.2024.103741140:COnline publication date: 1-May-2024
      • (2024)Cultivating Cyber Vigilance: Shaping Employee Behavior for Security SuccessCyber Warfare, Security and Space Computing10.1007/978-3-031-73494-6_25(325-336)Online publication date: 31-Oct-2024
      • (2024)Phish and Tips:Human Aspects of Information Security and Assurance10.1007/978-3-031-72559-3_14(200-214)Online publication date: 28-Nov-2024
      • (2023)Lessons in Prevention and Cure: A User Study of Recovery from Flubot Smartphone MalwareProceedings of the 2023 European Symposium on Usable Security10.1145/3617072.3617109(126-142)Online publication date: 16-Oct-2023
      • (2023)Caring Not Scaring - An Evaluation of a Workshop to Train Apprentices as Security ChampionsProceedings of the 2023 European Symposium on Usable Security10.1145/3617072.3617099(237-252)Online publication date: 16-Oct-2023
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format.

      HTML Format

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media