"If It's Important It Will Be A Headline": Cybersecurity Information Seeking in Older Adults

Older adults are increasingly vulnerable to cybersecurity attacks and scams. Yet we know relatively little about their understanding of cybersecurity, their information-seeking behaviours, and their trusted sources of information and advice in this domain. We conducted 22 semi-structured interviews with community-dwelling older adults in order to explore their cybersecurity information seeking behaviours. Following a thematic analysis of these interviews, we developed a cybersecurity information access framework that highlights shortcomings in older adults' choice of information resources. Specifically, we find that older users prioritise social resources based on availability, rather than cybersecurity expertise, and that they avoid using the Internet for cybersecurity information searches despite using it for other domains. Finally, we discuss the design of cybersecurity information dissemination strategies for older users, incorporating favoured sources such as TV adverts and radio programming.

[1]  Yvonne Barnard,et al.  Learning to use new technologies by older adults: Perceived difficulties, experimentation behaviour and usability , 2013, Comput. Hum. Behav..

[2]  Elissa M. Redmiles,et al.  How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior , 2016, CCS.

[3]  Haiden A Huskamp,et al.  Whom do older adults trust most to provide information about prescription drugs? , 2009, The American journal of geriatric pharmacotherapy.

[4]  J. S. Stevenson,et al.  Older Adults , 1980, Suicide Prevention.

[5]  Yu Andy Wu,et al.  Impact of Users’ Security Awareness on Desktop Security Behavior: A Protection Motivation Theory Perspective , 2016, Inf. Syst. Manag..

[6]  Elissa M. Redmiles,et al.  Where is the Digital Divide?: A Survey of Security, Privacy, and Socioeconomics , 2017, CHI.

[7]  C. Hale,et al.  Fear of Crime: A Review of the Literature1 , 1996 .

[8]  Rick Wash,et al.  Identifying patterns in informal sources of security information , 2015, J. Cybersecur..

[9]  Ali Farooq,et al.  Information Security Awareness: Comparing perceptions and training preferences , 2013, 2013 2nd National Conference on Information Assurance (NCIA).

[10]  S. Stableford,et al.  Plain Language: A Strategic Response to the Health Literacy Challenge , 2007, Journal of public health policy.

[11]  Ivan Flechais,et al.  "If It's Urgent or It Is Stopping Me from Doing Something, Then I Might Just Go Straight at It": A Study into Home Data Security Decisions , 2017, HCI.

[12]  Florian Schaub,et al.  "I've Got Nothing to Lose": Consumers' Risk Perceptions and Protective Actions after the Equifax Data Breach , 2018, SOUPS @ USENIX Security Symposium.

[13]  Galen A. Grimes,et al.  Older Adults' Knowledge of Internet Hazards , 2010 .

[14]  Lynne M. Coventry,et al.  Privacy Considerations when Designing Social Network Systems to Support Successful Ageing , 2017, CHI.

[15]  Kay Connelly,et al.  Full paper: Risk communication design for older adults , 2012 .

[16]  Rick Wash,et al.  Betrayed by updates: how negative experiences affect future security , 2014, CHI.

[17]  Deborah E. White,et al.  Thematic Analysis , 2017 .

[18]  Kathleen C. Kobashi,et al.  Only the ‘tip of the iceberg’ , 2019, Arab journal of urology.

[19]  Steven Furnell,et al.  An Analysis of Information Security Awareness within Home and Work Environments , 2010, 2010 International Conference on Availability, Reliability and Security.

[20]  Laura A. Dabbish,et al.  Breaking! A Typology of Security and Privacy News and How It's Shared , 2018, CHI.

[21]  Rebecca Eynon,et al.  Adults learning online: Digital choice and/or digital exclusion? , 2011, New Media Soc..

[22]  Bradford W Reyns,et al.  The Only Thing We Have to Fear Is Fear Itself…and Crime: The Current State of the Fear of Crime Literature and Where It Should Go Next , 2015 .

[23]  Laura A. Dabbish,et al.  Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation , 2014, CCS.

[24]  Tejaswini Herath,et al.  Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective , 2014, J. Manag. Inf. Syst..

[25]  Steven Furnell,et al.  Recognising and addressing ‘security fatigue’ , 2009 .

[26]  Sil Aarts,et al.  Older Adults' Reasons for Using Technology while Aging in Place , 2015, Gerontology.

[27]  Lynne M. Coventry,et al.  The Design of Messages to Improve Cybersecurity Incident Reporting , 2017, HCI.

[28]  Samantha R. Paige,et al.  eHealth Literacy and Web 2.0 Health Information Seeking Behaviors Among Baby Boomers and Older Adults , 2015, Journal of medical Internet research.

[29]  Vaibhav Garg,et al.  Risk communication design for older adults , 2012 .

[30]  Tian Lin,et al.  Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing , 2017, CHI.

[31]  James Nicholson,et al.  Introducing the Cybersurvival Task: Assessing and Addressing Staff Beliefs about Effective Cyber Protection , 2018, SOUPS @ USENIX Security Symposium.

[32]  Wan Ng,et al.  Can we teach digital natives digital literacy? , 2012, Comput. Educ..

[33]  Daniel Romer,et al.  Television News and the Cultivation of Fear of Crime , 2003 .

[34]  Cassandra Cross,et al.  ‘But I’ve never sent them any personal details apart from my driver’s licence number …’: Exploring seniors’ attitudes towards identity crime , 2017 .

[35]  M. Allen,et al.  A Meta-Analysis of Fear Appeals: Implications for Effective Public Health Campaigns , 2000, Health education & behavior : the official publication of the Society for Public Health Education.

[36]  Wayne G. Lutters,et al.  "It's Scary...It's Confusing...It's Dull": How Cybersecurity Advocates Overcome Negative Perceptions of Security , 2018, SOUPS @ USENIX Security Symposium.

[37]  Anabel Quan-Haase,et al.  Problematizing the Digital Literacy Paradox in the Context of Older Adults’ ICT Use: Aging, Media Discourse, and Self-Determination , 2017 .

[38]  Nicolas Christin,et al.  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes , 2016, SOUPS.

[39]  Virginia Braun,et al.  Thematic analysis , 2017 .

[40]  H. Raghav Rao,et al.  Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults , 2015 .

[41]  Steven R. Wilson,et al.  The Effects of Loneliness on Telemarketing Fraud Vulnerability Among Older Adults , 2008, Journal of elder abuse & neglect.

[42]  Simon Parkin,et al.  Learning from "Shadow Security": Why understanding non-compliant behaviors provides the basis for effective security , 2014 .

[43]  Ivan Flechais,et al.  Informal Support Networks: an investigation into Home Data Security Practices , 2018, SOUPS @ USENIX Security Symposium.

[44]  H. Raghav Rao,et al.  Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults , 2016, Decis. Support Syst..

[45]  L. Spencer,et al.  Qualitative data analysis for applied policy research , 2002 .

[46]  Murat Akçayir,et al.  What makes you a digital native? Is it enough to be born after 1980? , 2016, Comput. Hum. Behav..

[47]  Lynne D. Roberts,et al.  Fear of Cyber-Identity Theft and Related Fraudulent Activity , 2013 .

[48]  Laura A. Dabbish,et al.  The Effect of Social Influence on Security Sensitivity , 2014, SOUPS.

[49]  Tim Rapley,et al.  Talking About Looking : Three Approaches to Interviewing Carers of People With Rheumatoid Arthritis About Information Seeking , 2015 .

[50]  John L. Rice,et al.  Spearing High Net Wealth Individuals: The Case of Online Fraud and Mature Age Internet Users , 2013, Int. J. Inf. Secur. Priv..

[51]  Elissa M. Redmiles,et al.  I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[52]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[53]  Galen A. Grimes,et al.  Email end users and spam: relations of gender and age group to attitudes and actions , 2007, Comput. Hum. Behav..

[54]  David R Roalf,et al.  Risk, reward, and economic decision making in aging. , 2012, The journals of gerontology. Series B, Psychological sciences and social sciences.