Abstract
Security and privacy pose a serious barrier to the use of mobile technology by older adults. While support from family and friends is known to be an effective enabler in older adults' technology adoption, we know very little about the family members' motivations for providing help, the context, and the process in which they provide it. To bridge this gap, we have conducted a mixed method study, qualitatively analyzing the helpers' assistance stories and quantitatively estimating the factors that affect helpers' willingness to offer assistance to older relatives regarding mobile security and privacy problems. Our findings point to the potential for helping older relatives, i.e., people are more willing to help and guide them than other social groups. Furthermore, we show that familiarity with an older relative's preferences is essential in providing meaningful support. We discuss our findings in the context of developing a theory of collective efficacy for security and privacy and new collaborative technologies that can reduce the barriers to social help.
- Syed Ishtiaque Ahmed, Maruf Hasan Zaber, Mehrab Bin Morshed, Habibullah Bin Ismail, Dan Cosley, and Steven J. Jackson. 2015. Suhrid: A Collaborative Mobile Phone Interface for Low Literate People. Proceedings of the 2015 Annual Symposium on Computing for Development (DEV '15) (2015), 95--103. DOI:https://doi.org/http://dx.doi.org/10.1145/2830629.2830640Google ScholarDigital Library
- Tousif Ahmed, Apu Kapadia, Venkatesh Potluri, and Manohar Swaminathan. 2018. Up to a Limit? Privacy Concerns of Bystanders and Their Willingness to Share Additional Information with Visually Impaired Users of Assistive Technologies. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 3 (2018), 27. DOI:https://doi.org/10.1145/3264899Google ScholarDigital Library
- Monica Anderson and Andrew Perrin. 2017. Tech adoption climbs among older adults. Pew Research Center May (2017), 1--22. Retrieved from http://www.pewinternet.org/2017/05/17/technology-use-among-seniors/Google Scholar
- A Bandura. 1982. Self-efficacy mechanism in human agency. Amer Psych 37, 2 (1982), 122--147.Google ScholarCross Ref
- Albert Bandura. 1977. Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review 84, 191--215. DOI:https://doi.org/10.1037/0033-295X.84.2.191Google ScholarCross Ref
- Albert Bandura. 1997. Self-efficacy: The Exercise of Control.Google Scholar
- Albert Bandura. 2000. Exercise of Human Agency Through Collective Efficacy. (2000), 75--78.Google Scholar
- Yvonne Barnard, Mike D. Bradley, Frances Hodgson, and Ashley D. Lloyd. 2013. Learning to use new technologies by older adults: Perceived difficulties, experimentation behaviour and usability. Computers in Human Behavior 29, 4 (2013), 1715--1724. DOI:https://doi.org/10.1016/j.chb.2013.02.006Google ScholarDigital Library
- Ana Correia De Barros, Roxanne Leitão, and Jorge Ribeiro. 2013. Design and evaluation of a mobile user interface for older adults: Navigation, interaction and visual design recommendations. Procedia Computer Science 27, Dsai 2013 (2013), 369--378. DOI:https://doi.org/10.1016/j.procs.2014.02.041Google Scholar
- Elizabeth A. Beverly and Linda A. Wray. 2010. The role of collective efficacy in exercise adherence: A qualitative study of spousal support and Type 2 diabetes management. Health Education Research 25, 2 (2010), 211--223. DOI:https://doi.org/10.1093/her/cyn032Google ScholarCross Ref
- Linda Boise, Katherine Wild, Nora Mattek, Mary Ruhl, Hiroko H. Dodge, and Jeffrey Kaye. 2013. Willingness of older adults to share data and privacy concerns after exposure to unobtrusive in-home monitoring. 11, 3 (2013), 428--435. DOI:https://doi.org/10.4017/gt.2013.11.3.001.00.WillingnessGoogle Scholar
- Jiawei Chen, Benjamin V Hanrahan, and John M Carroll. 2019. Withshare: A Mobile Application to Support Community Coproduction Activities. International Journal of Mobile Human Computer Interaction 11, 1 (2019), 40--61. DOI:https://doi.org/10.4018/IJMHCI.2019010103Google ScholarCross Ref
- Ke Chen and Alan Hoi Shou Chan. 2013. Use or non-use of gerontechnology-A qualitative study. International Journal of Environmental Research and Public Health 10, 10 (2013), 4645--4666. DOI:https://doi.org/10.3390/ijerph10104645Google ScholarCross Ref
- Shi-yi Chen, Zhe Feng, and Xiaolian Yi. 2017. A general introduction to adjustment for multiple comparisons. 9, 6 (2017), 1725--1729. DOI:https://doi.org/10.21037/jtd.2017.05.34Google Scholar
- Wen Hui Chou, Yu Ting Lai, and Kuang Hsia Liu. 2010. Decent digital social media for senior life: A practical design approach. Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010 4, (2010), 249--253. DOI:https://doi.org/10.1109/ICCSIT.2010.5565189Google Scholar
- Regina Juchun Chu and Anita Zichun Chu. 2010. Multi-level analysis of peer support, Internet self-efficacy and e-learning outcomes - The contextual effects of collectivism and group potency. Computers and Education 55, 1 (2010), 145--154. DOI:https://doi.org/10.1016/j.compedu.2009.12.011Google ScholarDigital Library
- David Constant, Lee Sproull, and Sara Kiesler. 1996. The Kindness of Strangers: The Usefulness of Electronic Weak Ties for Technical Advice. Organization Science 7, 2 (1996), 119--135. DOI:https://doi.org/10.1287/orsc.7.2.119Google ScholarDigital Library
- Sara J. Czaja, Neil Charness, Arthur D. Fisk, Christopher Hertzog, Sankaran N. Nair, Wendy A. Rogers, and Joseph Sharit. 2006. Factors predicting the use of technology: Findings from the Center for Research and Education on Aging and Technology Enhancement (CREATE). Psychology and Aging 21, 2 (2006), 333--352. DOI:https://doi.org/10.1037/0882-7974.21.2.333Google ScholarCross Ref
- L. Damodaran, C. W. Olphert, and J. Sandhu. 2014. Falling off the bandwagon? Exploring the challenges to sustained digital engagement by older people. Gerontology 60, 2 (2014), 163--173. DOI:https://doi.org/10.1159/000357431Google ScholarCross Ref
- Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The Effect of Social Influence on Security Sensitivity. SOUPS '14: Proceedings of the Tenth Symposium On Usable Privacy and Security (2014), 143--157. DOI:https://doi.org/10.1145/2660267.2660271Google ScholarDigital Library
- Sauvik Das, Joanne Lo, Laura Dabbish, and Jason I. Hong. 2018. Breaking! A Typology of Security and Privacy News and How It's Shared. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI '18, 1--12. DOI:https://doi.org/10.1145/3173574.3173575Google Scholar
- Evelina Dimopoulou. 2012. Self Efficacy and Collective Efficacy Beliefs of Teachers for Children with Autism. Literacy Information and Computer Education Journal (LICEJ) 3, 1 (2012), 509--520. DOI:https://doi.org/10.20533/licej.2040.2589.2014.0196Google Scholar
- A. K. Doryab, A., Bellotti, V., Yousfi, A., Wu, S., Carroll, J. M., Dey. 2017. If It's Convenient: Leveraging Context in Peer-to-Peer Variable Service Transaction Recommendations. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 48--76. DOI:https://doi.org/10.1145/3130913Google ScholarDigital Library
- Michael Eraut. 2007. Learning from other people in the workplace. Oxford Review of Education 33, 4 (2007), 403--422. DOI:https://doi.org/10.1080/03054980701425706Google ScholarCross Ref
- Brynn M. Evans, Sanjay Kairam, and Peter Pirolli. 2010. Do your friends make you smarter?: An analysis of social strategies in online information seeking. Information Processing and Management 46, 6 (2010), 679--692. DOI:https://doi.org/10.1016/j.ipm.2009.12.001Google ScholarDigital Library
- Michael Fagan and Mohammad Khan Hasan Maifi. 2016. Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice. Twelfth Symposium on Usable Privacy and Security SOUPS (2016), 59--75.Google Scholar
- Paul Andor Farkas. 2010. Senior Social Platform - An application aimed to reduce the social and digital isolation of seniors. REAL CORP 2010: Cities for everyone. Liveable, Healthy, Prosperous May (2010), 1247--1252. DOI:https://doi.org/10.1017/S0033291711001772Google Scholar
- Joseph L. Fleiss, Bruce Levin, and Myunghee Cho Paik. 2003. The Measurement of Interrater Agreement. In Statistical Methods for Rates and Proportions. John Wiley & Sons, Inc., Hoboken, NJ, USA, 598--626. DOI:https://doi.org/10.1002/0471445428.ch18Google Scholar
- Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce S Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Symposium on Usable Privacy and Security (SOUPS) (2019).Google Scholar
- Joseph K Goodman, Cynthia E Cryder, and Amar Cheema. 2012. ASSOCIATION FOR CONSUMER RESEARCH Data Collection in a Flat World: Strengths and Weaknesses of Mechanical Turk Samples "Data Collection in a Flat World: Strengths and Weaknesses of Mechanical Turk Samples", in NA -Advances in. Consumer Research 40, (2012), 112--116. DOI:https://doi.org/10.1002/bdm.1753Google Scholar
- J Greer, Gordon Mccalla, J Collins, V Kumar, Paul Meagher, and Julita Vassileva. 1998. Supporting Peer Help and Collaboration in Distributed Workplace Environments. International Journal of Artificial Intelligence in Education 9, (1998), 159--177. DOI:https://doi.org/10.1111/mmi.12890Google Scholar
- Junius Gunaratne, Jeremy Burke, and Oded Nov. 2017. Empowering Investors with Social Annotation When Saving for Retirement. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17 (2017), 1066--1081. DOI:https://doi.org/10.1145/2998181.2998253Google ScholarDigital Library
- Chris Hoofnagle, Jennifer King, Su Li, and Joseph Turow. 2010. How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies? New York 4, 19 (2010), 10. DOI:https://doi.org/10.2139/ssrn.1589864Google Scholar
- Qatrunnada Ismail, Tousif Ahmed, Apu Kapadia, and Michael K. Reiter. 2015. Crowdsourced Exploration of Security Configurations. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI '15 (2015), 467--476. DOI:https://doi.org/10.1145/2702123.2702370Google Scholar
- Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy Attitudes of Mechanical Turk Workers and the U.S. Public. SOUPS '14: Proceedings of the Tenth Symposium On Usable Privacy and Security (2014), 37--49.Google Scholar
- Steven Komarov, Katharina Reinecke, and Krzysztof Z. Gajos. 2013. Crowdsourcing performance evaluations of user interfaces. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI '13 (2013), 207. DOI:https://doi.org/10.1145/2470654.2470684Google ScholarDigital Library
- Alexis Kuerbis, Adina Mulliken, Frederick Muench, Alison A. Moore, and Daniel Gardner. 2017. Older adults and mobile technology: Factors that enhance and inhibit utilization in the context of behavioral health. Mental Health and Addiction Research 2, 2 (2017). DOI:https://doi.org/10.15761/MHAR.1000136Google Scholar
- Jialiu Lin, Norman M Sadeh, Shahriyar Amini, Janne Lindqvist, Jason I Hong, and Joy Zhang. 2012. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. The 2012 {ACM} Conference on Ubiquitous Computing, Ubicomp '12, Pittsburgh, PA, USA, September 5-8, 2012 (2012), 501--510. DOI:https://doi.org/10.1145/2370216.2370290Google ScholarDigital Library
- Paul Benjamin Lowry, John D'Arcy, Bryan Hammer, and Gregory D. Moody. 2016. "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. Journal of Strategic Information Systems 25, 3 (2016), 232--240. DOI:https://doi.org/10.1016/j.jsis.2016.06.002Google ScholarDigital Library
- Gordon I. McCalla, Jim E. Greer, Vive S. Kumar, P Meagher, J A Collins, R Tkatch, and B Parkinson. 1997. A Peer Help System for Workplace Training. The Proceedings of the Conference on Artificial Intelligence in Education 97, (1997), 183--190.Google Scholar
- Andrew R. McNeill, Lynne Coventry, Jake Pywell, and Pam Briggs. 2017. Privacy Considerations when Designing Social Network Systems to Support Successful Ageing. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems - CHI '17 (2017), 6425--6437. DOI:https://doi.org/10.1145/3025453.3025861Google ScholarDigital Library
- Lukas Mecke, Sarah Prange, Daniel Buschek, Mohamed Khamis, Mariam Hassib, and Florian Alt. 2018. 'Outsourcing" Security: Supporting People to Support Older Adults'. In Proceedings of the Mobile HCI '18 Workshop on Mobile Privacy and Security for an Aging Population.Google Scholar
- T Mendel and E Toch. 2017. Susceptibility to social influence of privacy behaviors: Peer versus authoritative sources. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (2017), 581--593. DOI:https://doi.org/10.1145/2998181.2998323Google ScholarDigital Library
- Tracy L Mitzner, Julie B Boron, Cara Bailey Fausset, Anne E Adams, Sara J Czaja, Katinka Dijkstra, Arthur D Fisk, Wendy A Rogers, and Joseph Sharit. 2010. Older Adults Talk Technology: Technology Usage and Attitudes. Computers in Human Behavior 26, 6 (2010), 1710--1721. DOI:https://doi.org/10.1016/j.chb.2010.06.020.OlderGoogle ScholarDigital Library
- Tobias Nef, Raluca L. Ganea, René M. Müri, and Urs P. Mosimann. 2013. Social networking sites and older users - A systematic review. International Psychogeriatrics 25, 7 (2013), 1041--1053. DOI:https://doi.org/10.1017/S1041610213000355Google ScholarCross Ref
- Mark W. Newman, Debra Lauterbach, Sean A. Munson, Paul Resnick, and Margaret E. Morris. 2011. It's not that i don't have problems, i'm just not putting them on facebook. Proceedings of the ACM 2011 conference on Computer supported cooperative work - CSCW '11 (2011), 341. DOI:https://doi.org/10.1145/1958824.1958876Google Scholar
- James Nicholson, Lynne Coventry, and Pam Briggs. 2019. "If it's important it will be a headline": Cybersecurity information seeking in older adults. Conference on Human Factors in Computing Systems - Proceedings 3 (2019), 1--11. DOI:https://doi.org/10.1145/3290605.3300579Google ScholarDigital Library
- Tom Page. 2014. Touchscreen mobile devices and older adults: a usability study. International Journal of Human Factors and Ergonomics 3, 1 (2014), 65. DOI:https://doi.org/10.1504/IJHFE.2014.062550Google ScholarCross Ref
- Gabriele Paolacci and Jesse Chandler. 2014. Inside the Turk: Understanding Mechanical Turk as a Participant Pool. Current Directions in Psychological Science 23, 3 (2014), 184--188. DOI:https://doi.org/10.1177/0963721414531598Google ScholarCross Ref
- Samantha J Parker, Sonal Jessel, Joshua E Richardson, and M Cary Reid. 2013. Older adults are mobile too! Identifying the barriers and facilitators to older adults' use of mHealth for pain management. BMC geriatrics 13, (2013), 43. DOI:https://doi.org/10.1186/1471-2318-13-43Google Scholar
- H.a Pensas, T.a Kivimäki, A.-M.a Vainio, S.b Konakas, S.b Costicoglou, P.c Kölndorfer, K.a Summanen, H.a Moisio, and J.a Vanhala. 2013. Building a client-server social network application for elders and safety net. Proceedings of the 17th International Academic MindTrek Conference: "Making Sense of Converging Media", MindTrek 2013 (2013), 310--312. DOI:https://doi.org/10.1145/2523429.2523435Google Scholar
- E.S. Poole, M. Chetty, T. Morgan, R.E. Grinter, and W.K. Edwards. 2009. Computer help at home: Methods and motivations for informal technical support. Conference on Human Factors in Computing Systems - Proceedings (2009), 739--748. DOI:https://doi.org/10.1145/1518701.1518816Google Scholar
- Bahman Rashidi, Carol Fung, and Tam Vu. 2016. Android fine-grained permission control system with real-time expert recommendations. Pervasive and Mobile Computing 32, (2016), 62--77. DOI:https://doi.org/10.1016/j.pmcj.2016.04.013Google ScholarCross Ref
- Elissa M Redmiles, Sean Kross, and Michelle L Mazurek. 2016. How I Learned to be Secure. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 666--677. DOI:https://doi.org/10.1145/2976749.2978307Google ScholarDigital Library
- Elissa M Redmiles, Amelia R. Malone, and Michelle L. Mazurek. 2016. I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security. In 2016 IEEE Symposium on Security and Privacy (SP), 272--288. DOI:https://doi.org/10.1109/SP.2016.24Google ScholarCross Ref
- Amnon Ribak, Michal Jacovi, and Vladimir Soroka. 2002. "Ask before you search." Proceedings of the 2002 ACM conference on Computer supported cooperative work - CSCW '02 (2002), 126. DOI:https://doi.org/10.1145/587078.587097Google Scholar
- Janine van der Rijt, Piet van den Bossche, Margje W.J. van de Wiel, Sven de Maeyer, Wim H. Gijselaers, and Mien S.R. Segers. 2013. Asking for Help: A Relational Perspective on Help Seeking in the Workplace. Vocations and Learning 6, 2 (2013), 259--279. DOI:https://doi.org/10.1007/s12186-012-9095-8Google ScholarCross Ref
- J Philippe Rushton, Roland D Chrisjohn, and G Cynthia Fekken. 1981. the Altruistic Personality and the Self-Report Altruism Scale. 2, 2 (1981), 293--302.Google Scholar
- R Sampson, S Raudenbush, and F Earls. 1997. Neighborhoods and violent crime: a multilevel study of collective efficacy. Science (New York, NY) 277, 5328 (1997), 918--924. DOI:https://doi.org/10.1126/science.277.5328.918Google Scholar
- Eran Toch. 2014. Crowdsourcing privacy preferences in context-aware applications. Personal and Ubiquitous Computing 18, 1 (2014), 129--141. DOI:https://doi.org/10.1007/s00779-012-0632-0Google ScholarDigital Library
- Population Division U.S. Census Bureau. 2015. Annual Estimates of the Resident Population for Selected Age Groups by Sex for the United States, States, Counties, and Puerto Rico Commonwealth and Municipios: April 1, 2010 to July 1, 2014. Retrieved from https://factfinder.census.gov/faces/tableservices/jsf/pages/productview.xhtml?src=bkmkGoogle Scholar
- Na Wang, Jens Grossklags, and Heng Xu. 2013. An online experiment of privacy authorization dialogues for social applications. Proceedings of the 2013 conference on Computer supported cooperative work - CSCW '13 (2013), 261. DOI:https://doi.org/10.1145/2441776.2441807Google ScholarDigital Library
- Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, and Lorrie Faith Cranor. 2011. "I regretted the minute I pressed share." Proceedings of the Seventh Symposium on Usable Privacy and Security - SOUPS '11 (2011), 1. DOI:https://doi.org/10.1145/2078827.2078841Google ScholarDigital Library
- Ya-Huei Wu, Caitlin Ware, Souad Damnée, Hélène Kerhervé, and Anne-Sophie Rigaud. 2015. Bridging the digital divide in older adults: a study from an initiative to inform older adults about new technologies. Clinical Interventions in Aging (2015), 193. DOI:https://doi.org/10.2147/CIA.S72399Google Scholar
- Bo Xie and Julie M. Bugg. 2009. Public library computer training for older adults to access high-quality Internet health information. Library and Information Science Research 31, 3 (2009), 155--162. DOI:https://doi.org/10.1016/j.lisr.2009.03.004Google ScholarCross Ref
- Bo Xie, Ivan Watkins, Jen Golbeck, and Man Huang. 2012. Understanding and Changing Older Adults' Perceptions and Learning of Social Media. Educational Gerontology 38, 4 (2012), 282--296. DOI:https://doi.org/10.1080/03601277.2010.544580Google ScholarCross Ref
- Jiahuan Zheng, Xin Peng, Jiacheng Yang, Huaqian Cai, Gang Huang, Ying Zhang, and Wenyun Zhao. 2017. CollaDroid: Automatic Augmentation of Android Application with Lightweight Interactive Collaboration. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (2017), 2462--2474. DOI:https://doi.org/10.1145/2998181.2998278Google ScholarDigital Library
- Jia Zhou, Pei Luen Patrick Rau, and Gavriel Salvendy. 2014. Age-related difference in the use of mobile phones. Universal Access in the Information Society 13, 4 (2014), 401--413. DOI:https://doi.org/10.1007/s10209-013-0324-1Google ScholarDigital Library
Index Terms
- My Mom was Getting this Popup: Understanding Motivations and Processes in Helping Older Relatives with Mobile Security and Privacy
Recommendations
Social help: developing methods to support older adults in mobile privacy and security
UbiComp/ISWC '19 Adjunct: Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable ComputersOlder people experience difficulties when managing their security and privacy in mobile environments. However, support from the older adult's social network, and especially from close-tie relations such as family and close friends, is known to be an ...
An Exploratory Study of Social Support Systems to Help Older Adults in Managing Mobile Safety
MobileHCI '21: Proceedings of the 23rd International Conference on Mobile Human-Computer InteractionOlder adults face increased safety challenges, such as targeted online fraud and phishing, contributing to the growing technological divide between them and younger adults. Social support from family and friends is often the primary way older adults ...
Demo: Helping to Tackle Social Isolation and Loneliness of Older Adults Using Mobile Applications
HotMobile '19: Proceedings of the 20th International Workshop on Mobile Computing Systems and ApplicationsWe live in a society with an ageing population in which the number of 65+ will significantly increase within the next 50 years. In parallel, we observe an increasing amount of technology deployed to people - both in the form of more sophisticated mobile ...
Comments