Individually Vulnerable, Collectively Safe

Older adults are especially vulnerable to online cybersecurity and privacy (SP) threats, such as phishing, ransomware, and targeted misinformation campaigns. Prior work has suggested that this vulnerability may be addressed with the design of social SP interfaces, such that groups of individuals might work together on behalf of one another to manage SP threats collectively. To this end, we present findings from a qualitative inquiry conducted with older adults and members of technology-rich middle-income households in urban India, where technology users have been shown to engage in relatively more social SP practices. Our research examines the collaborative behaviors enacted by different members of the household for protection from SP threats. In particular, we show how self-appointed family technology managers straddle the line between stewardship and paternalism in their efforts to protect older adults from perceived digital threats. We also offer design implications for supporting collaborative cybersecurity within households based on the insights derived from our analysis.

[1]  Richard J. Anderson,et al.  Examining Security and Privacy Research in Developing Regions , 2018, COMPASS.

[2]  David Nemer,et al.  "Privacy is not for me, it's for those rich women": Performative Privacy Practices on Mobile Phones by Women in South Asia , 2018, SOUPS @ USENIX Security Symposium.

[3]  Laura A. Dabbish,et al.  The Effect of Social Influence on Security Sensitivity , 2014, SOUPS.

[4]  Karla Badillo-Urquiola,et al.  Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations , 2020, CHI Extended Abstracts.

[5]  I. Altman Privacy Regulation: Culturally Universal or Culturally Specific? , 1977 .

[6]  Adam J. Aviv,et al.  "Woe is me": Examining Older Adults' Perceptions of Privacy , 2019, CHI Extended Abstracts.

[7]  Paul Dourish,et al.  Security in the wild: user strategies for managing security as an everyday, practical problem , 2004, Personal and Ubiquitous Computing.

[8]  Pamela J. Wisniewski,et al.  Moving Beyond a "one-size fits all": Exploring Individual Differences in Privacy , 2018, CHI Extended Abstracts.

[9]  Alfred Kobsa,et al.  Collective Privacy Management in Social Media , 2018, ACM Trans. Comput. Hum. Interact..

[10]  Akira Yamada,et al.  Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior , 2017, CHI.

[11]  Sergio F. Ochoa,et al.  It Takes at Least Two to Tango: Understanding the Cooperative Nature of Elderly Caregiving in Latin America , 2017, CSCW.

[12]  S. Merriam Qualitative research in practice : examples for discussion and analysis , 2002 .

[13]  Zhu Han,et al.  Trust-Based Collaborative Privacy Management in Online Social Networks , 2019, IEEE Transactions on Information Forensics and Security.

[14]  Galen A. Grimes,et al.  Older Adults' Knowledge of Internet Hazards , 2010 .

[15]  Nicole M. Lee Fake news, phishing, and fraud: a call for research on digital media literacy education beyond the classroom , 2018, Communication in Instruction.

[16]  John L. Rice,et al.  Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users , 2013, Int. J. Inf. Secur. Priv..

[17]  Mark W. Newman,et al.  The Work to Make a Home Network Work , 2005, ECSCW.

[18]  S. Taipale Intergenerational Connections in Digital Families , 2019 .

[19]  W. Keith Edwards,et al.  Computer help at home: methods and motivations for informal technical support , 2009, CHI.

[20]  Lorrie Faith Cranor,et al.  Privacy in India: Attitudes and Awareness , 2005, Privacy Enhancing Technologies.

[21]  Anna Cinzia Squicciarini,et al.  WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Collective Privacy Management in Social Networks , 2022 .

[22]  Anabel Quan-Haase,et al.  Revisiting the Privacy Paradox: Concerns and Protection Strategies in the Social Media Experiences of Older Adults , 2018, SMSociety.

[23]  Sauvik Das Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity , 2016, it Inf. Technol..

[24]  Helena M. Mentis,et al.  Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges , 2020, SOUPS @ USENIX Security Symposium.

[25]  Nicolas Christin,et al.  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes , 2016, SOUPS.

[26]  Tian Lin,et al.  Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing , 2017, CHI.

[27]  Laura A. Dabbish,et al.  A Typology of Perceived Triggers for End-User Security and Privacy Behaviors , 2019, SOUPS @ USENIX Security Symposium.

[28]  Heng Xu,et al.  CoPE: Enabling collaborative privacy management in online social networks , 2011, J. Assoc. Inf. Sci. Technol..

[29]  Eran Toch,et al.  My Mom was Getting this Popup , 2019, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[30]  Edward W. Felten,et al.  Secrecy, flagging, and paranoia: adoption criteria in encrypted email , 2006, CHI.

[31]  Nicola Dell,et al.  "Privacy is not a concept, but a way of dealing with life" , 2019, Proc. ACM Hum. Comput. Interact..

[32]  Katie Brittain,et al.  An Age-Old Problem: Examining the Discourses of Ageing in HCI and Strategies for Future Research , 2015, TCHI.

[33]  W. Keith Edwards,et al.  More than meets the eye: transforming the user experience of home network management , 2008, DIS '08.

[34]  D. Seligmann,et al.  Comparing privacy attitudes of knowledge workers in the U.S. and India , 2010, ICIC '10.

[35]  Zinta S. Byrne,et al.  The Psychology of Security for the Home Computer User , 2012, 2012 IEEE Symposium on Security and Privacy.

[36]  Cassandra Cross,et al.  ‘But I’ve never sent them any personal details apart from my driver’s licence number …’: Exploring seniors’ attitudes towards identity crime , 2017 .

[37]  Joyojeet Pal,et al.  Computing security in the developing world: a case for multidisciplinary research , 2011, NSDR '11.

[38]  Laura A. Dabbish,et al.  Breaking! A Typology of Security and Privacy News and How It's Shared , 2018, CHI.

[39]  Anabel Quan-Haase,et al.  Problematizing the Digital Literacy Paradox in the Context of Older Adults’ ICT Use: Aging, Media Discourse, and Self-Determination , 2017 .

[40]  Ashish Goel,et al.  Ageing in India , 2016 .

[41]  Steve Benford,et al.  Making the Home Network at Home: Digital Housekeeping , 2007, ECSCW.

[42]  Laura A. Dabbish,et al.  Privacy Attitudes of Mechanical Turk Workers and the U.S. Public , 2014, SOUPS.

[43]  Hichang Cho,et al.  A multinational study on online privacy: global concerns and local responses , 2009, New Media Soc..

[44]  Naveena Karusala,et al.  Privacy, Patriarchy, and Participation on Social Media , 2019, Conference on Designing Interactive Systems.

[45]  J. S. Stevenson,et al.  Older Adults , 1980, Suicide Prevention.

[46]  Serge Egelman,et al.  Privacy and Security Threat Models and Mitigation Strategies of Older Adults , 2019, SOUPS @ USENIX Security Symposium.

[47]  Jay Chen,et al.  "Everyone Has Some Personal Stuff": Designing to Support Digital Privacy with Shared Mobile Phone Use in Bangladesh , 2019, CHI.

[48]  Lynne M. Coventry,et al.  Functional privacy concerns of older adults about pervasive health-monitoring systems , 2017, PETRA.

[49]  Bart P. Knijnenburg,et al.  Comics as a Medium for Privacy Notices , 2016, WSF@SOUPS.

[50]  Steve Benford,et al.  The ins and outs of home networking: The case for useful and usable domestic networking , 2009, TCHI.

[51]  Hue Watson,et al.  "We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together , 2020, CHI.

[52]  James Nicholson,et al.  "If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults , 2019, CHI.

[53]  T. Oko Interviewing as Qualitative Research: A Guide for Researchers in Education and the Social Sciences. , 1992 .

[54]  Jay Chen,et al.  Digital Privacy Challenges with Shared Mobile Phone Use in Bangladesh , 2017, Proc. ACM Hum. Comput. Interact..

[55]  M. Gahegan,et al.  Constructing, Visualizing, and Analyzing A Digital Footprint* , 2007 .

[56]  Erika Shehan Poole,et al.  Putting the gender back in digital housekeeping , 2018, GenderIT.

[57]  Anne Marie Piper,et al.  Technological Caregiving: Supporting Online Activity for Adults with Cognitive Impairments , 2016, CHI.

[58]  Helena M. Mentis,et al.  Upside and Downside Risk in Online Security for Older Adults with Mild Cognitive Impairment , 2019, CHI.

[59]  Haiyan Jia,et al.  Autonomous and Interdependent: Collaborative Privacy Management on Social Networking Sites , 2016, CHI.