"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults
暂无分享,去创建一个
[1] Yvonne Barnard,et al. Learning to use new technologies by older adults: Perceived difficulties, experimentation behaviour and usability , 2013, Comput. Hum. Behav..
[2] Elissa M. Redmiles,et al. How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior , 2016, CCS.
[3] Haiden A Huskamp,et al. Whom do older adults trust most to provide information about prescription drugs? , 2009, The American journal of geriatric pharmacotherapy.
[4] J. S. Stevenson,et al. Older Adults , 1980, Suicide Prevention.
[5] Yu Andy Wu,et al. Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective , 2016, Inf. Syst. Manag..
[6] Elissa M. Redmiles,et al. Where is the Digital Divide?: A Survey of Security, Privacy, and Socioeconomics , 2017, CHI.
[7] C. Hale,et al. Fear of Crime: A Review of the Literature1 , 1996 .
[8] Rick Wash,et al. Identifying patterns in informal sources of security information , 2015, J. Cybersecur..
[9] Ali Farooq,et al. Information Security Awareness: Comparing perceptions and training preferences , 2013, 2013 2nd National Conference on Information Assurance (NCIA).
[10] S. Stableford,et al. Plain Language: A Strategic Response to the Health Literacy Challenge , 2007, Journal of public health policy.
[11] Ivan Flechais,et al. "If It's Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It": A Study into Home Data Security Decisions , 2017, HCI.
[12] Florian Schaub,et al. "I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach , 2018, SOUPS @ USENIX Security Symposium.
[13] Galen A. Grimes,et al. Older Adults' Knowledge of Internet Hazards , 2010 .
[14] Lynne M. Coventry,et al. Privacy Considerations when Designing Social Network Systems to Support Successful Ageing , 2017, CHI.
[15] Kay Connelly,et al. Full paper: Risk communication design for older adults , 2012 .
[16] Rick Wash,et al. Betrayed by updates: how negative experiences affect future security , 2014, CHI.
[17] Deborah E. White,et al. Thematic Analysis , 2017 .
[18] Kathleen C. Kobashi,et al. Only the ‘tip of the iceberg’ , 2019, Arab journal of urology.
[19] Steven Furnell,et al. An Analysis of Information Security Awareness within Home and Work Environments , 2010, 2010 International Conference on Availability, Reliability and Security.
[20] Laura A. Dabbish,et al. Breaking! A Typology of Security and Privacy News and How It's Shared , 2018, CHI.
[21] Rebecca Eynon,et al. Adults learning online: Digital choice and/or digital exclusion? , 2011, New Media Soc..
[22] Bradford W Reyns,et al. The Only Thing We Have to Fear Is Fear Itself…and Crime: The Current State of the Fear of Crime Literature and Where It Should Go Next , 2015 .
[23] Laura A. Dabbish,et al. Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation , 2014, CCS.
[24] Tejaswini Herath,et al. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..
[25] Steven Furnell,et al. Recognising and addressing ‘security fatigue’ , 2009 .
[26] Sil Aarts,et al. Older Adults' Reasons for Using Technology while Aging in Place , 2015, Gerontology.
[27] Lynne M. Coventry,et al. The Design of Messages to Improve Cybersecurity Incident Reporting , 2017, HCI.
[28] Samantha R. Paige,et al. eHealth Literacy and Web 2.0 Health Information Seeking Behaviors Among Baby Boomers and Older Adults , 2015, Journal of medical Internet research.
[29] Vaibhav Garg,et al. Risk communication design for older adults , 2012 .
[30] Tian Lin,et al. Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing , 2017, CHI.
[31] James Nicholson,et al. Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection , 2018, SOUPS @ USENIX Security Symposium.
[32] Wan Ng,et al. Can we teach digital natives digital literacy? , 2012, Comput. Educ..
[33] Daniel Romer,et al. Television News and the Cultivation of Fear of Crime , 2003 .
[34] Cassandra Cross,et al. ‘But I’ve never sent them any personal details apart from my driver’s licence number …’: Exploring seniors’ attitudes towards identity crime , 2017 .
[35] M. Allen,et al. A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns , 2000, Health education & behavior : the official publication of the Society for Public Health Education.
[36] Wayne G. Lutters,et al. "It's Scary...It's Confusing...It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security , 2018, SOUPS @ USENIX Security Symposium.
[37] Anabel Quan-Haase,et al. Problematizing the Digital Literacy Paradox in the Context of Older Adults’ ICT Use: Aging, Media Discourse, and Self-Determination , 2017 .
[38] Nicolas Christin,et al. Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes , 2016, SOUPS.
[39] Virginia Braun,et al. Thematic analysis , 2017 .
[40] H. Raghav Rao,et al. Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults , 2015 .
[41] Steven R. Wilson,et al. The Effects of Loneliness on Telemarketing Fraud Vulnerability Among Older Adults , 2008, Journal of elder abuse & neglect.
[42] Simon Parkin,et al. Learning from "Shadow Security": Why understanding non-compliant behaviors provides the basis for effective security , 2014 .
[43] Ivan Flechais,et al. Informal Support Networks: an investigation into Home Data Security Practices , 2018, SOUPS @ USENIX Security Symposium.
[44] H. Raghav Rao,et al. Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults , 2016, Decis. Support Syst..
[45] L. Spencer,et al. Qualitative data analysis for applied policy research , 2002 .
[46] Murat Akçayir,et al. What makes you a digital native? Is it enough to be born after 1980? , 2016, Comput. Hum. Behav..
[47] Lynne D. Roberts,et al. Fear of Cyber-Identity Theft and Related Fraudulent Activity , 2013 .
[48] Laura A. Dabbish,et al. The Effect of Social Influence on Security Sensitivity , 2014, SOUPS.
[49] Tim Rapley,et al. Talking About Looking : Three Approaches to Interviewing Carers of People With Rheumatoid Arthritis About Information Seeking , 2015 .
[50] John L. Rice,et al. Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users , 2013, Int. J. Inf. Secur. Priv..
[51] Elissa M. Redmiles,et al. I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[52] R. W. Rogers,et al. A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.
[53] Galen A. Grimes,et al. Email end users and spam: relations of gender and age group to attitudes and actions , 2007, Comput. Hum. Behav..
[54] David R Roalf,et al. Risk, reward, and economic decision making in aging. , 2012, The journals of gerontology. Series B, Psychological sciences and social sciences.