Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Individually Vulnerable, Collectively Safe: The Security and Privacy Practices of Households with Older Adults

Published: 22 April 2021 Publication History

Abstract

Older adults are especially vulnerable to online cybersecurity and privacy (SP) threats, such as phishing, ransomware, and targeted misinformation campaigns. Prior work has suggested that this vulnerability may be addressed with the design of social SP interfaces, such that groups of individuals might work together on behalf of one another to manage SP threats collectively. To this end, we present findings from a qualitative inquiry conducted with older adults and members of technology-rich middle-income households in urban India, where technology users have been shown to engage in relatively more social SP practices. Our research examines the collaborative behaviors enacted by different members of the household for protection from SP threats. In particular, we show how self-appointed family technology managers straddle the line between stewardship and paternalism in their efforts to protect older adults from perceived digital threats. We also offer design implications for supporting collaborative cybersecurity within households based on the insights derived from our analysis.

References

[1]
Syed Ishtiaque Ahmed, Md Romael Haque, Jay Chen, and Nicola Dell. 2017. Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (2017), 1--20.
[2]
Syed Ishtiaque Ahmed, Md Romael Haque, Irtaza Haider, Jay Chen, and Nicola Dell. 2019. "Everyone Has Some Personal Stuff" Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--13.
[3]
Irwin Altman. 1977. Privacy regulation: Culturally universal or culturally specific? Journal of social issues 33, 3 (1977), 66--84.
[4]
Yahel Ben-David, Shaddi Hasan, Joyojeet Pal, Matthias Vallentin, Saurabh Panjwani, Philipp Gutheim, Jay Chen, and Eric A Brewer. 2011. Computing security in the developing world: A case for multidisciplinary research. In Proceedings of the 5th ACM workshop on Networked systems for developing regions. 39--44.
[5]
Hichang Cho, Bart Knijnenburg, Alfred Kobsa, and Yao Li. 2018. Collective privacy management in social media: A cross-cultural validation. ACM Transactions on Computer-Human Interaction (TOCHI) 25, 3 (2018), 1--33.
[6]
Hichang Cho, Milagros Rivera-Sánchez, and Sun Sun Lim. 2009. A multinational study on online privacy: global concerns and local responses. New media & society 11, 3 (2009), 395--416.
[7]
Chhaya Chouhan, Christy M LaPerriere, Zaina Aljallad, Jess Kropczynski, Heather Lipford, and Pamela J Wisniewski. 2019. Co-designing for Community Oversight: Helping People Make Privacy and Security Decisions Together. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1--31.
[8]
Cassandra Cross. 2017. "But I've never sent them any personal details apart from my driver's licence number. . .': Exploring seniors' attitudes towards identity crime. Security Journal 30, 1 (2017), 74--88.
[9]
Sauvik Das. 2016. Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity. it-Information Technology 58, 5 (2016), 237--245.
[10]
Sauvik Das, Laura A Dabbish, and Jason I Hong. 2019. A typology of perceived triggers for end-user security and privacy behaviors. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019).
[11]
Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The effect of social influence on security sensitivity. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 143--157.
[12]
Sauvik Das, Joanne Lo, Laura Dabbish, and Jason I Hong. 2018. Breaking! A Typology of Security and Privacy News and How It's Shared. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--12.
[13]
Paul Dourish, Rebecca E Grinter, Jessica Delgado De La Flor, and Melissa Joseph. 2004. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 8, 6 (2004), 391--401.
[14]
Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, and Rahul Telang. 2016. Do or do not, there is no try: user engagement may not improve security outcomes. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016). 97--111.
[15]
Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and security threat models and mitigation strategies of older adults. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019).
[16]
Shirley Gaw, Edward W Felten, and Patricia Fernandez-Kelly. 2006. Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In Proceedings of the SIGCHI conference on human factors in computing systems. 591--600.
[17]
Galen A. Grimes, Michelle G. Hough, Elizabeth Mazur, and Margaret L. Signorella. 2010. Older Adults' Knowledge of Internet Hazards. Educational Gerontology 36, 3 (2010), 173--192. https://doi.org/10.1080/03601270903183065 arXiv:https://doi.org/10.1080/03601270903183065
[18]
Rebecca E Grinter, W Keith Edwards, Marshini Chetty, Erika S Poole, Ja-Young Sung, Jeonghwa Yang, Andy Crabtree, Peter Tolmie, Tom Rodden, Chris Greenhalgh, et al. 2009. The ins and outs of home networking: The case for useful and usable domestic networking. ACM Transactions on Computer-Human Interaction (TOCHI) 16, 2 (2009), 1--28.
[19]
Rebecca E Grinter, W Keith Edwards, Mark W Newman, and Nicolas Ducheneaut. 2005. The work to make a home network work. In ECSCW 2005. Springer, 469--488.
[20]
Francisco J Gutierrez and Sergio F Ochoa. 2017. It takes at least two to tango: understanding the cooperative nature of elderly caregiving in Latin America. In Proceedings of the 2017 ACM Conference on computer supported cooperative work and social computing. 1618--1630.
[21]
Rayna Hollander. 2017. There's a data explosion happening in India - and Jio is at the center of it. https://www. businessinsider.com/jio-india-data-explosion-2017-7
[22]
Adele E Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska, and Zinta Byrne. 2012. The psychology of security for the home computer user. In 2012 IEEE Symposium on Security and Privacy. IEEE, 209--223.
[23]
Margaret C Jack, Pang Sovannaroth, and Nicola Dell. 2019. " Privacy is not a concept, but a way of dealing with life" Localization of Transnational Technology Platforms and Liminal Privacy Practices in Cambodia. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1--19.
[24]
Nimisha Jain, Kanika Sanghi, and Ankur Jain. 2019. Ten Trends That Are Altering Consumer Behavior in India. https://www.bcg.com/en-us/publications/2019/ten-trends-altering-consumer-behavior-india
[25]
Haiyan Jia and Heng Xu. 2016. Autonomous and interdependent: Collaborative privacy management on social networking sites. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 4286--4297.
[26]
Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy attitudes of mechanical turk workers and the us public. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 37--49.
[27]
Naveena Karusala, Apoorva Bhalla, and Neha Kumar. 2019. Privacy, Patriarchy, and Participation on Social Media. In Proceedings of the 2019 on Designing Interactive Systems Conference. 511--526.
[28]
Bart Knijnenburg and David Cherry. 2016. Comics as a medium for privacy notices. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016).
[29]
Sandhya Krishnan and Neeraj Hatekar. [n.d.]. Rise of the New Middle Class in India and Its Changing Structure. https://www.epw.in/journal/2017/22/special-articles/rise-new-middle-class-india-and-its-changing-structure.html
[30]
Ponnurangam Kumaraguru and Lorrie Cranor. 2005. Privacy in India: Attitudes and awareness. In International workshop on privacy enhancing technologies. Springer, 243--258.
[31]
Rohit KVN. 2020. Apple records stellar growth in iPhone, iPad sales in India. https://www.deccanherald.com/business/ technology/apple-records-stellar-growth-in-iphone-ipad-sales-in-india-799225.html
[32]
Nicole M Lee. 2018. Fake news, phishing, and fraud: a call for research on digital media literacy education beyond the classroom. Communication Education 67, 4 (2018), 460--466.
[33]
Nigel Martin and John Rice. 2013. Spearing high net wealth individuals: the case of online fraud and mature age internet users. International Journal of Information Security and Privacy (IJISP) 7, 1 (2013), 1--15.
[34]
Nora McDonald, Karla Badillo-Urquiola, Morgan G Ames, Nicola Dell, Elizabeth Keneski, Manya Sleeper, and Pamela J Wisniewski. 2020. Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1--8.
[35]
Nora McDonald, Alison Larsen, Allison Battisti, Galina Madjaroff, Aaron Massey, and Helena Mentis. 2020. Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges. In Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020). 99--110.
[36]
Andrew McNeill, Pam Briggs, Jake Pywell, and Lynne Coventry. 2017. Functional privacy concerns of older adults about pervasive health-monitoring systems. In Proceedings of the 10th International Conference on PErvasive Technologies Related to Assistive Environments. 96--102.
[37]
Tamir Mendel and Eran Toch. 2019. My Mom was Getting this Popup: Understanding Motivations and Processes in Helping Older Relatives with Mobile Security and Privacy. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 4 (2019), 1--20.
[38]
Helena M Mentis, Galina Madjaroff, and Aaron K Massey. 2019. Upside and downside risk in online security for older adults with mild cognitive impairment. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--13.
[39]
Sharan B Merriam. 2002. Merriam, Sharan B., ed., Qualitative Research in Practice: Examples for Discussion and Analysis. San Francisco: Jossey-Bass, 2002. (2002).
[40]
James Nicholson, Lynne Coventry, and Pamela Briggs. 2019. "If It's Important It Will Be A Headline" Cybersecurity Information Seeking in Older Adults. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. 1--11.
[41]
Daniela Oliveira, Harold Rocha, Huizi Yang, Donovan Ellis, Sandeep Dommaraju, Melis Muradoglu, Devon Weir, Adam Soliman, Tian Lin, and Natalie Ebner. 2017. Dissecting spear phishing emails for older vs young adults: On the interplay of weapons of influence and life domains in predicting susceptibility to phishing. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 6412--6424.
[42]
Sameer Patil, Alfred Kobsa, Ajita John, and Doree Seligmann. 2010. Comparing privacy attitudes of knowledge workers in the US and India. In Proceedings of the 3rd international conference on Intercultural collaboration. 141--150.
[43]
Anne Marie Piper, Raymundo Cornejo, Lisa Hurwitz, and Caitlin Unumb. 2016. Technological caregiving: Supporting online activity for adults with cognitive impairments. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. 5311--5323.
[44]
Erika Shehan Poole, Marshini Chetty, Rebecca E Grinter, and W Keith Edwards. 2008. More than meets the eye: transforming the user experience of home network management. In Proceedings of the 7th ACM conference on Designing interactive systems. 455--464.
[45]
Erika Shehan Poole, Marshini Chetty, Tom Morgan, Rebecca E Grinter, and W Keith Edwards. 2009. Computer help at home: methods and motivations for informal technical support. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 739--748.
[46]
Indira Jai Prakash. 1999. Ageing in India. Technical Report. World Health Organization Geneva.
[47]
Anabel Quan-Haase and Isioma Elueze. 2018. Revisiting the privacy paradox: Concerns and protection strategies in the social media experiences of older adults. In Proceedings of the 9th International Conference on Social Media and Society. 150--159.
[48]
Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam J Aviv. 2019. "Woe is me" Examining Older Adults' Perceptions of Privacy. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. 1--6.
[49]
Jennifer A Rode and Erika Shehan Poole. 2018. Putting the gender back in digital housekeeping. In Proceedings of the 4th Conference on Gender & IT. 79--90.
[50]
Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gaytán-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. "Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 127--142.
[51]
Yukiko Sawaya, Mahmood Sharif, Nicolas Christin, Ayumu Kubota, Akihiro Nakarai, and Akira Yamada. 2017. Self-confidence trumps knowledge: A cross-cultural study of security behavior. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. 2202--2214.
[52]
Kathleen Schreurs, Anabel Quan-Haase, and Kim Martin. 2017. Problematizing the digital literacy paradox in the context of older adults' ICT use: Aging, media discourse, and self-determination. Canadian Journal of Communication 42, 2 (2017).
[53]
Irving Seidman. 2006. Interviewing as qualitative research: A guide for researchers in education and the social sciences. Teachers college press.
[54]
Anna Cinzia Squicciarini, Mohamed Shehab, and Federica Paci. 2009. Collective privacy management in social networks. In Proceedings of the 18th international conference on World wide web. 521--530.
[55]
Anna C Squicciarini, Heng Xu, and Xiaolong Zhang. 2011. CoPE: Enabling collaborative privacy management in online social networks. Journal of the American Society for Information Science and Technology 62, 3 (2011), 521--534.
[56]
Sakari Taipale. 2019. Intergenerational connections in digital families. Springer.
[57]
Economic Times. 2018. India smartphone growth likely in double digits in 2018: IDC. https://economictimes.indiatimes. com/tech/hardware/india-smartphone-growth-likely-in-double-digits-in-2018-idc/articleshow/64157987.cms
[58]
Peter Tolmie, Andy Crabtree, Tom Rodden, Chris Greenhalgh, and Steve Benford. 2007. Making the home network at home: Digital housekeeping. In ECSCW 2007. Springer, 331--350.
[59]
Aditya Vashistha, Richard Anderson, and Shrirang Mare. 2018. Examining security and privacy research in developing regions. In Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies. 1--14.
[60]
John Vines, Gary Pritchard, Peter Wright, Patrick Olivier, and Katie Brittain. 2015. An age-old problem: Examining the discourses of ageing in HCI and strategies for future research. ACM Transactions on Computer-Human Interaction (TOCHI) 22, 1 (2015), 1--27.
[61]
Hue Watson, Eyitemi Moju-Igbene, Akanksha Kumari, and Sauvik Das. 2020. "We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--12.
[62]
Stephen D Weaver and Mark Gahegan. 2007. Constructing, visualizing, and analyzing a digital footprint. Geographical Review 97, 3 (2007), 324--350.
[63]
Daricia Wilkinson, Moses Namara, Karla Badillo-Urquiola, Pamela J Wisniewski, Bart P Knijnenburg, Xinru Page, Eran Toch, and Jen Romano-Bergstrom. 2018. Moving Beyond a "one-size fits all" Exploring Individual Differences in Privacy. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems. 1--8.
[64]
Lei Xu, Chunxiao Jiang, Nengqiang He, Zhu Han, and Abderrahim Benslimane. 2018. Trust-based collaborative privacy management in online social networks. IEEE Transactions on Information Forensics and Security 14, 1 (2018), 48--60

Cited By

View all
  • (2024)Navigating traumatic stress reactions during computer security interventionsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699013(2011-2028)Online publication date: 14-Aug-2024
  • (2024)Leveraging Chatbots to Combat Health Misinformation for Older Adults: Participatory Design StudyJMIR Formative Research10.2196/607128(e60712)Online publication date: 11-Oct-2024
  • (2024)Proxy Accounts and Behavioural Nudges: Investigating Support for Older Adults and their Financial DelegatesProceedings of the 50th Graphics Interface Conference10.1145/3670947.3670962(1-14)Online publication date: 3-Jun-2024
  • Show More Cited By

Index Terms

  1. Individually Vulnerable, Collectively Safe: The Security and Privacy Practices of Households with Older Adults

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 5, Issue CSCW1
    CSCW
    April 2021
    5016 pages
    EISSN:2573-0142
    DOI:10.1145/3460939
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 April 2021
    Published in PACMHCI Volume 5, Issue CSCW1

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. india
    2. older adults
    3. qualitative
    4. social cybsecurity and privacy

    Qualifiers

    • Research-article

    Funding Sources

    • NSF

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)184
    • Downloads (Last 6 weeks)20
    Reflects downloads up to 27 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Navigating traumatic stress reactions during computer security interventionsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699013(2011-2028)Online publication date: 14-Aug-2024
    • (2024)Leveraging Chatbots to Combat Health Misinformation for Older Adults: Participatory Design StudyJMIR Formative Research10.2196/607128(e60712)Online publication date: 11-Oct-2024
    • (2024)Proxy Accounts and Behavioural Nudges: Investigating Support for Older Adults and their Financial DelegatesProceedings of the 50th Graphics Interface Conference10.1145/3670947.3670962(1-14)Online publication date: 3-Jun-2024
    • (2024)Development and Evaluation of the Mobile Tech Support Questionnaire for Older AdultsProceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3663548.3675661(1-18)Online publication date: 27-Oct-2024
    • (2024)Localised Trust in a Globalised Knot: Designing Information Privacy for Digital-IDACM Journal on Computing and Sustainable Societies10.1145/36160242:1(1-37)Online publication date: 13-Jan-2024
    • (2024)A Framework for Reasoning about Social Influences on Security and Privacy AdoptionExtended Abstracts of the CHI Conference on Human Factors in Computing Systems10.1145/3613905.3651012(1-13)Online publication date: 11-May-2024
    • (2024)SoK: Safer Digital-Safety Research Involving At-Risk Users2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00071(635-654)Online publication date: 19-May-2024
    • (2024)Digital Security — A Question of Perspective A Large-Scale Telephone Survey with Four At-Risk User Groups2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00027(697-716)Online publication date: 19-May-2024
    • (2024)Unpaid carers’ experiences of supporting people with dementia to use social mediaAging & Mental Health10.1080/13607863.2024.230172528:7(977-984)Online publication date: 12-Jan-2024
    • (2023)Evaluating the impact of community oversight for managing mobile privacy and securityProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632210(437-456)Online publication date: 7-Aug-2023
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media