skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Attention:

The NSF Public Access Repository (PAR) system and access will be unavailable from 11:00 PM ET on Friday, May 2 until 12:00 AM ET on Saturday, May 3 due to maintenance. We apologize for the inconvenience.


Title: 'Don't Fall for This': Communications about Cybersafety from the AARP
Older adults face unique risks in trying to secure their online activities. They are not only the frequent targets of scams and fraud; they are the targets of a barrage of cybersafety communiqués whose impact is unclear. AARP, the United States advocacy group focusing on issues facing older adults over the age of 50, is among those educators whose strategies remain underexplored, yet their reach makes it imperative that we understand what they are saying, to whom, and to what effect. Drawing on an analysis of AARP publications about cybersafety and privacy, we sought to better understand their discourse on the topic. We report on findings that AARP's language may have the effect of portraying bad actors (fraudsters) as individuals, rather than enterprises, which at the target end, personalizes interactions, placing too much onus on individual users to assess and deflect threats. AARP's positioning of, and guidance about, threats may sometimes prompt a thought process that puts users at the center of the narrative and may encourage engagement. Instructing older Americans, or anyone, on the forensics of cyber-sleuthing is enormously difficult. We conclude with a discussion of different approaches to cybersafety, one that involves educating older adults about the rudiments of surveillance capitalism.  more » « less
Award ID(s):
1714514
PAR ID:
10510722
Author(s) / Creator(s):
;
Publisher / Repository:
ACM Digital Library
Date Published:
Journal Name:
Proceedings of the ACM on Human-Computer Interaction
Volume:
7
Issue:
CSCW2
ISSN:
2573-0142
Page Range / eLocation ID:
1 to 21
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. To understand whether people can identify their optimal touchscreen target sizes, we asked older and younger adults to identify optimal target sizes on a questionnaire and com-pared these chosen sizes to performance on a target acquisi-tion task. We found that older individuals (60+) were better than younger adults at choosing their optimal target sizes. In fact, younger adults underestimated the smallest target size they could accurately touch by almost 6mm. This study sug-gests that older adults may be able to better configure target size settings than younger adults. 
    more » « less
  2. AbstractThis paper reports a formative evaluation of auditory representations of cyber security threat indicators and cues, referred to as sonifications, to warn users about cyber threats. Most Internet browsers provide visual cues and textual warnings to help users identify when they are at risk. Although these alarming mechanisms are very effective in informing users, there are certain situations and circumstances where these alarming techniques are unsuccessful in drawing the user’s attention: (1) security warnings and features (e.g., blocking out malicious Websites) might overwhelm a typical Internet user and thus the users may overlook or ignore visual and textual warnings and, as a result, they might be targeted, (2) these visual cues are inaccessible to certain users such as those with visual impairments. This work is motivated by our previous work of the use of sonification of security warnings to users who are visually impaired. To investigate the usefulness of sonification in general security settings, this work uses real Websites instead of simulated Web applications with sighted participants. The study targets sonification for three different types of security threats: (1) phishing, (2) malware downloading, and (3) form filling. The results show that on average 58% of the participants were able to correctly remember what the sonification conveyed. Additionally, about 73% of the participants were able to correctly identify the threat that the sonification represented while performing tasks using real Websites. Furthermore, the paper introduces “CyberWarner”, a sonification sandbox that can be installed on the Google Chrome browser to enable auditory representations of certain security threats and cues that are designed based on several URL heuristics. Article highlightsIt is feasible to develop sonified cyber security threat indicators that users intuitively understand with minimal experience and training.Users are more cautious about malicious activities in general. However, when navigating real Websites, they are less informed. This might be due to the appearance of the navigating Websites or the overwhelming issues when performing tasks.Participants’ qualitative responses indicate that even when they did not remember what the sonification conveyed, the sonification was able to capture the user’s attention and take safe actions in response. 
    more » « less
  3. Activity tracking has the potential to promote active lifestyles among older adults. However, current activity tracking technologies may inadvertently perpetuate ageism by focusing on age-related health risks. Advocating for a personalized approach in activity tracking technology, we sought to understand what activities older adults find meaningful to track and the underlying values of those activities. We conducted a reflective interview study following a 7-day activity journaling with 13 participants. We identified various underlying values motivating participants to track activities they deemed meaningful. These values, whether competing or aligned, shape the desirability of activities. Older adults appreciate low-exertion activities, but they are difficult to track. We discuss how these activities can become central in designing activity tracking systems. Our research offers insights for creating value-driven, personalized activity trackers that resonate more fully with the meaningful activities of older adults. 
    more » « less
  4. null (Ed.)
    Older adults are increasingly becoming adopters of digital technologies, such as smartphones; however, this population remains particularly vulnerable to digital privacy and security threats. To date, most research on technology used among older adults focuses on helping individuals overcome their discomfort or lack of expertise with technology to protect them from such threats. Instead, we are interested in how communities of older adults work together to collectively manage their digital privacy and security. To do this, we surveyed 67 individuals across two older adult communities (59 older adults and eight employees or volunteers) and found that the community's collective efficacy for privacy and security was significantly correlated with the individuals' self-efficacy, power usage of technology, and their sense of community belonging. Community collective efficacy is a group's mutual belief in its ability to achieve a shared goal. Using social network analysis, we further unpacked these relationships to show that many older adults interact with others who have similar technological expertise, and closer-knit older adult communities that have low technology expertise (i.e., low power usage and self-efficacy) may increase their community collective efficacy for privacy and security by embedding facilitators (e.g., employees or volunteers) who have more technical expertise within their communities. Our work demonstrates how both peer influence and outside expertise can be leveraged to support older adults in managing their digital privacy and security. 
    more » « less
  5. Abstract Over 80% of older adults want to live independently in their own homes and communities, maintaining quality of life, autonomy, and dignity as they age. We are using community engaged research methods to aid in developing in-home cost-conscious remote sensing technologies to support older adults age in place. To understand their needs, we engaged older adults in discussions on home-based sensing technologies. We used visuals and demonstrations to facilitate discussions, showing participants our sensor prototypes and a vignette describing the challenges an older adult and the family face managing a chronic condition. Participants voiced their interest in monitoring for select health conditions and situations when either they or the person(s) they care for are home alone. Discussants raised concerns about personal security/privacy, loss of independence, ethics of data collection and sharing, and being overwhelmed by collected data. Discussions have provided valuable feedback to help us develop a sensor system that is flexible enough to accommodate individuals in different life stages and comfort levels, with different home environments, levels of expendable income, and support structures. As a result, we have developed a system that uses nonvisual, non-wearable sensing that measures respiration and heart rates, and indoor location tracking to monitor the health and wellbeing of users. During this session, we will provide detailed results from our community discussions, and discuss the continuing role for community engagement as we move forward with sensor development and testing. 
    more » « less