skip to main content
research-article

My Mom was Getting this Popup: Understanding Motivations and Processes in Helping Older Relatives with Mobile Security and Privacy

Published:14 September 2020Publication History
Skip Abstract Section

Abstract

Security and privacy pose a serious barrier to the use of mobile technology by older adults. While support from family and friends is known to be an effective enabler in older adults' technology adoption, we know very little about the family members' motivations for providing help, the context, and the process in which they provide it. To bridge this gap, we have conducted a mixed method study, qualitatively analyzing the helpers' assistance stories and quantitatively estimating the factors that affect helpers' willingness to offer assistance to older relatives regarding mobile security and privacy problems. Our findings point to the potential for helping older relatives, i.e., people are more willing to help and guide them than other social groups. Furthermore, we show that familiarity with an older relative's preferences is essential in providing meaningful support. We discuss our findings in the context of developing a theory of collective efficacy for security and privacy and new collaborative technologies that can reduce the barriers to social help.

References

  1. Syed Ishtiaque Ahmed, Maruf Hasan Zaber, Mehrab Bin Morshed, Habibullah Bin Ismail, Dan Cosley, and Steven J. Jackson. 2015. Suhrid: A Collaborative Mobile Phone Interface for Low Literate People. Proceedings of the 2015 Annual Symposium on Computing for Development (DEV '15) (2015), 95--103. DOI:https://doi.org/http://dx.doi.org/10.1145/2830629.2830640Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Tousif Ahmed, Apu Kapadia, Venkatesh Potluri, and Manohar Swaminathan. 2018. Up to a Limit? Privacy Concerns of Bystanders and Their Willingness to Share Additional Information with Visually Impaired Users of Assistive Technologies. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2, 3 (2018), 27. DOI:https://doi.org/10.1145/3264899Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Monica Anderson and Andrew Perrin. 2017. Tech adoption climbs among older adults. Pew Research Center May (2017), 1--22. Retrieved from http://www.pewinternet.org/2017/05/17/technology-use-among-seniors/Google ScholarGoogle Scholar
  4. A Bandura. 1982. Self-efficacy mechanism in human agency. Amer Psych 37, 2 (1982), 122--147.Google ScholarGoogle ScholarCross RefCross Ref
  5. Albert Bandura. 1977. Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review 84, 191--215. DOI:https://doi.org/10.1037/0033-295X.84.2.191Google ScholarGoogle ScholarCross RefCross Ref
  6. Albert Bandura. 1997. Self-efficacy: The Exercise of Control.Google ScholarGoogle Scholar
  7. Albert Bandura. 2000. Exercise of Human Agency Through Collective Efficacy. (2000), 75--78.Google ScholarGoogle Scholar
  8. Yvonne Barnard, Mike D. Bradley, Frances Hodgson, and Ashley D. Lloyd. 2013. Learning to use new technologies by older adults: Perceived difficulties, experimentation behaviour and usability. Computers in Human Behavior 29, 4 (2013), 1715--1724. DOI:https://doi.org/10.1016/j.chb.2013.02.006Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ana Correia De Barros, Roxanne Leitão, and Jorge Ribeiro. 2013. Design and evaluation of a mobile user interface for older adults: Navigation, interaction and visual design recommendations. Procedia Computer Science 27, Dsai 2013 (2013), 369--378. DOI:https://doi.org/10.1016/j.procs.2014.02.041Google ScholarGoogle Scholar
  10. Elizabeth A. Beverly and Linda A. Wray. 2010. The role of collective efficacy in exercise adherence: A qualitative study of spousal support and Type 2 diabetes management. Health Education Research 25, 2 (2010), 211--223. DOI:https://doi.org/10.1093/her/cyn032Google ScholarGoogle ScholarCross RefCross Ref
  11. Linda Boise, Katherine Wild, Nora Mattek, Mary Ruhl, Hiroko H. Dodge, and Jeffrey Kaye. 2013. Willingness of older adults to share data and privacy concerns after exposure to unobtrusive in-home monitoring. 11, 3 (2013), 428--435. DOI:https://doi.org/10.4017/gt.2013.11.3.001.00.WillingnessGoogle ScholarGoogle Scholar
  12. Jiawei Chen, Benjamin V Hanrahan, and John M Carroll. 2019. Withshare: A Mobile Application to Support Community Coproduction Activities. International Journal of Mobile Human Computer Interaction 11, 1 (2019), 40--61. DOI:https://doi.org/10.4018/IJMHCI.2019010103Google ScholarGoogle ScholarCross RefCross Ref
  13. Ke Chen and Alan Hoi Shou Chan. 2013. Use or non-use of gerontechnology-A qualitative study. International Journal of Environmental Research and Public Health 10, 10 (2013), 4645--4666. DOI:https://doi.org/10.3390/ijerph10104645Google ScholarGoogle ScholarCross RefCross Ref
  14. Shi-yi Chen, Zhe Feng, and Xiaolian Yi. 2017. A general introduction to adjustment for multiple comparisons. 9, 6 (2017), 1725--1729. DOI:https://doi.org/10.21037/jtd.2017.05.34Google ScholarGoogle Scholar
  15. Wen Hui Chou, Yu Ting Lai, and Kuang Hsia Liu. 2010. Decent digital social media for senior life: A practical design approach. Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010 4, (2010), 249--253. DOI:https://doi.org/10.1109/ICCSIT.2010.5565189Google ScholarGoogle Scholar
  16. Regina Juchun Chu and Anita Zichun Chu. 2010. Multi-level analysis of peer support, Internet self-efficacy and e-learning outcomes - The contextual effects of collectivism and group potency. Computers and Education 55, 1 (2010), 145--154. DOI:https://doi.org/10.1016/j.compedu.2009.12.011Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. David Constant, Lee Sproull, and Sara Kiesler. 1996. The Kindness of Strangers: The Usefulness of Electronic Weak Ties for Technical Advice. Organization Science 7, 2 (1996), 119--135. DOI:https://doi.org/10.1287/orsc.7.2.119Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Sara J. Czaja, Neil Charness, Arthur D. Fisk, Christopher Hertzog, Sankaran N. Nair, Wendy A. Rogers, and Joseph Sharit. 2006. Factors predicting the use of technology: Findings from the Center for Research and Education on Aging and Technology Enhancement (CREATE). Psychology and Aging 21, 2 (2006), 333--352. DOI:https://doi.org/10.1037/0882-7974.21.2.333Google ScholarGoogle ScholarCross RefCross Ref
  19. L. Damodaran, C. W. Olphert, and J. Sandhu. 2014. Falling off the bandwagon? Exploring the challenges to sustained digital engagement by older people. Gerontology 60, 2 (2014), 163--173. DOI:https://doi.org/10.1159/000357431Google ScholarGoogle ScholarCross RefCross Ref
  20. Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The Effect of Social Influence on Security Sensitivity. SOUPS '14: Proceedings of the Tenth Symposium On Usable Privacy and Security (2014), 143--157. DOI:https://doi.org/10.1145/2660267.2660271Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Sauvik Das, Joanne Lo, Laura Dabbish, and Jason I. Hong. 2018. Breaking! A Typology of Security and Privacy News and How It's Shared. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems - CHI '18, 1--12. DOI:https://doi.org/10.1145/3173574.3173575Google ScholarGoogle Scholar
  22. Evelina Dimopoulou. 2012. Self Efficacy and Collective Efficacy Beliefs of Teachers for Children with Autism. Literacy Information and Computer Education Journal (LICEJ) 3, 1 (2012), 509--520. DOI:https://doi.org/10.20533/licej.2040.2589.2014.0196Google ScholarGoogle Scholar
  23. A. K. Doryab, A., Bellotti, V., Yousfi, A., Wu, S., Carroll, J. M., Dey. 2017. If It's Convenient: Leveraging Context in Peer-to-Peer Variable Service Transaction Recommendations. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 1, 3 (2017), 48--76. DOI:https://doi.org/10.1145/3130913Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Michael Eraut. 2007. Learning from other people in the workplace. Oxford Review of Education 33, 4 (2007), 403--422. DOI:https://doi.org/10.1080/03054980701425706Google ScholarGoogle ScholarCross RefCross Ref
  25. Brynn M. Evans, Sanjay Kairam, and Peter Pirolli. 2010. Do your friends make you smarter?: An analysis of social strategies in online information seeking. Information Processing and Management 46, 6 (2010), 679--692. DOI:https://doi.org/10.1016/j.ipm.2009.12.001Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Michael Fagan and Mohammad Khan Hasan Maifi. 2016. Why Do They Do What They Do?: A Study of What Motivates Users to (Not) Follow Computer Security Advice. Twelfth Symposium on Usable Privacy and Security SOUPS (2016), 59--75.Google ScholarGoogle Scholar
  27. Paul Andor Farkas. 2010. Senior Social Platform - An application aimed to reduce the social and digital isolation of seniors. REAL CORP 2010: Cities for everyone. Liveable, Healthy, Prosperous May (2010), 1247--1252. DOI:https://doi.org/10.1017/S0033291711001772Google ScholarGoogle Scholar
  28. Joseph L. Fleiss, Bruce Levin, and Myunghee Cho Paik. 2003. The Measurement of Interrater Agreement. In Statistical Methods for Rates and Proportions. John Wiley & Sons, Inc., Hoboken, NJ, USA, 598--626. DOI:https://doi.org/10.1002/0471445428.ch18Google ScholarGoogle Scholar
  29. Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce S Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Symposium on Usable Privacy and Security (SOUPS) (2019).Google ScholarGoogle Scholar
  30. Joseph K Goodman, Cynthia E Cryder, and Amar Cheema. 2012. ASSOCIATION FOR CONSUMER RESEARCH Data Collection in a Flat World: Strengths and Weaknesses of Mechanical Turk Samples "Data Collection in a Flat World: Strengths and Weaknesses of Mechanical Turk Samples", in NA -Advances in. Consumer Research 40, (2012), 112--116. DOI:https://doi.org/10.1002/bdm.1753Google ScholarGoogle Scholar
  31. J Greer, Gordon Mccalla, J Collins, V Kumar, Paul Meagher, and Julita Vassileva. 1998. Supporting Peer Help and Collaboration in Distributed Workplace Environments. International Journal of Artificial Intelligence in Education 9, (1998), 159--177. DOI:https://doi.org/10.1111/mmi.12890Google ScholarGoogle Scholar
  32. Junius Gunaratne, Jeremy Burke, and Oded Nov. 2017. Empowering Investors with Social Annotation When Saving for Retirement. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing - CSCW '17 (2017), 1066--1081. DOI:https://doi.org/10.1145/2998181.2998253Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Chris Hoofnagle, Jennifer King, Su Li, and Joseph Turow. 2010. How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies? New York 4, 19 (2010), 10. DOI:https://doi.org/10.2139/ssrn.1589864Google ScholarGoogle Scholar
  34. Qatrunnada Ismail, Tousif Ahmed, Apu Kapadia, and Michael K. Reiter. 2015. Crowdsourced Exploration of Security Configurations. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI '15 (2015), 467--476. DOI:https://doi.org/10.1145/2702123.2702370Google ScholarGoogle Scholar
  35. Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy Attitudes of Mechanical Turk Workers and the U.S. Public. SOUPS '14: Proceedings of the Tenth Symposium On Usable Privacy and Security (2014), 37--49.Google ScholarGoogle Scholar
  36. Steven Komarov, Katharina Reinecke, and Krzysztof Z. Gajos. 2013. Crowdsourcing performance evaluations of user interfaces. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI '13 (2013), 207. DOI:https://doi.org/10.1145/2470654.2470684Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Alexis Kuerbis, Adina Mulliken, Frederick Muench, Alison A. Moore, and Daniel Gardner. 2017. Older adults and mobile technology: Factors that enhance and inhibit utilization in the context of behavioral health. Mental Health and Addiction Research 2, 2 (2017). DOI:https://doi.org/10.15761/MHAR.1000136Google ScholarGoogle Scholar
  38. Jialiu Lin, Norman M Sadeh, Shahriyar Amini, Janne Lindqvist, Jason I Hong, and Joy Zhang. 2012. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. The 2012 {ACM} Conference on Ubiquitous Computing, Ubicomp '12, Pittsburgh, PA, USA, September 5-8, 2012 (2012), 501--510. DOI:https://doi.org/10.1145/2370216.2370290Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Paul Benjamin Lowry, John D'Arcy, Bryan Hammer, and Gregory D. Moody. 2016. "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. Journal of Strategic Information Systems 25, 3 (2016), 232--240. DOI:https://doi.org/10.1016/j.jsis.2016.06.002Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Gordon I. McCalla, Jim E. Greer, Vive S. Kumar, P Meagher, J A Collins, R Tkatch, and B Parkinson. 1997. A Peer Help System for Workplace Training. The Proceedings of the Conference on Artificial Intelligence in Education 97, (1997), 183--190.Google ScholarGoogle Scholar
  41. Andrew R. McNeill, Lynne Coventry, Jake Pywell, and Pam Briggs. 2017. Privacy Considerations when Designing Social Network Systems to Support Successful Ageing. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems - CHI '17 (2017), 6425--6437. DOI:https://doi.org/10.1145/3025453.3025861Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Lukas Mecke, Sarah Prange, Daniel Buschek, Mohamed Khamis, Mariam Hassib, and Florian Alt. 2018. 'Outsourcing" Security: Supporting People to Support Older Adults'. In Proceedings of the Mobile HCI '18 Workshop on Mobile Privacy and Security for an Aging Population.Google ScholarGoogle Scholar
  43. T Mendel and E Toch. 2017. Susceptibility to social influence of privacy behaviors: Peer versus authoritative sources. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (2017), 581--593. DOI:https://doi.org/10.1145/2998181.2998323Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Tracy L Mitzner, Julie B Boron, Cara Bailey Fausset, Anne E Adams, Sara J Czaja, Katinka Dijkstra, Arthur D Fisk, Wendy A Rogers, and Joseph Sharit. 2010. Older Adults Talk Technology: Technology Usage and Attitudes. Computers in Human Behavior 26, 6 (2010), 1710--1721. DOI:https://doi.org/10.1016/j.chb.2010.06.020.OlderGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  45. Tobias Nef, Raluca L. Ganea, René M. Müri, and Urs P. Mosimann. 2013. Social networking sites and older users - A systematic review. International Psychogeriatrics 25, 7 (2013), 1041--1053. DOI:https://doi.org/10.1017/S1041610213000355Google ScholarGoogle ScholarCross RefCross Ref
  46. Mark W. Newman, Debra Lauterbach, Sean A. Munson, Paul Resnick, and Margaret E. Morris. 2011. It's not that i don't have problems, i'm just not putting them on facebook. Proceedings of the ACM 2011 conference on Computer supported cooperative work - CSCW '11 (2011), 341. DOI:https://doi.org/10.1145/1958824.1958876Google ScholarGoogle Scholar
  47. James Nicholson, Lynne Coventry, and Pam Briggs. 2019. "If it's important it will be a headline": Cybersecurity information seeking in older adults. Conference on Human Factors in Computing Systems - Proceedings 3 (2019), 1--11. DOI:https://doi.org/10.1145/3290605.3300579Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Tom Page. 2014. Touchscreen mobile devices and older adults: a usability study. International Journal of Human Factors and Ergonomics 3, 1 (2014), 65. DOI:https://doi.org/10.1504/IJHFE.2014.062550Google ScholarGoogle ScholarCross RefCross Ref
  49. Gabriele Paolacci and Jesse Chandler. 2014. Inside the Turk: Understanding Mechanical Turk as a Participant Pool. Current Directions in Psychological Science 23, 3 (2014), 184--188. DOI:https://doi.org/10.1177/0963721414531598Google ScholarGoogle ScholarCross RefCross Ref
  50. Samantha J Parker, Sonal Jessel, Joshua E Richardson, and M Cary Reid. 2013. Older adults are mobile too! Identifying the barriers and facilitators to older adults' use of mHealth for pain management. BMC geriatrics 13, (2013), 43. DOI:https://doi.org/10.1186/1471-2318-13-43Google ScholarGoogle Scholar
  51. H.a Pensas, T.a Kivimäki, A.-M.a Vainio, S.b Konakas, S.b Costicoglou, P.c Kölndorfer, K.a Summanen, H.a Moisio, and J.a Vanhala. 2013. Building a client-server social network application for elders and safety net. Proceedings of the 17th International Academic MindTrek Conference: "Making Sense of Converging Media", MindTrek 2013 (2013), 310--312. DOI:https://doi.org/10.1145/2523429.2523435Google ScholarGoogle Scholar
  52. E.S. Poole, M. Chetty, T. Morgan, R.E. Grinter, and W.K. Edwards. 2009. Computer help at home: Methods and motivations for informal technical support. Conference on Human Factors in Computing Systems - Proceedings (2009), 739--748. DOI:https://doi.org/10.1145/1518701.1518816Google ScholarGoogle Scholar
  53. Bahman Rashidi, Carol Fung, and Tam Vu. 2016. Android fine-grained permission control system with real-time expert recommendations. Pervasive and Mobile Computing 32, (2016), 62--77. DOI:https://doi.org/10.1016/j.pmcj.2016.04.013Google ScholarGoogle ScholarCross RefCross Ref
  54. Elissa M Redmiles, Sean Kross, and Michelle L Mazurek. 2016. How I Learned to be Secure. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16, 666--677. DOI:https://doi.org/10.1145/2976749.2978307Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Elissa M Redmiles, Amelia R. Malone, and Michelle L. Mazurek. 2016. I Think They're Trying to Tell Me Something: Advice Sources and Selection for Digital Security. In 2016 IEEE Symposium on Security and Privacy (SP), 272--288. DOI:https://doi.org/10.1109/SP.2016.24Google ScholarGoogle ScholarCross RefCross Ref
  56. Amnon Ribak, Michal Jacovi, and Vladimir Soroka. 2002. "Ask before you search." Proceedings of the 2002 ACM conference on Computer supported cooperative work - CSCW '02 (2002), 126. DOI:https://doi.org/10.1145/587078.587097Google ScholarGoogle Scholar
  57. Janine van der Rijt, Piet van den Bossche, Margje W.J. van de Wiel, Sven de Maeyer, Wim H. Gijselaers, and Mien S.R. Segers. 2013. Asking for Help: A Relational Perspective on Help Seeking in the Workplace. Vocations and Learning 6, 2 (2013), 259--279. DOI:https://doi.org/10.1007/s12186-012-9095-8Google ScholarGoogle ScholarCross RefCross Ref
  58. J Philippe Rushton, Roland D Chrisjohn, and G Cynthia Fekken. 1981. the Altruistic Personality and the Self-Report Altruism Scale. 2, 2 (1981), 293--302.Google ScholarGoogle Scholar
  59. R Sampson, S Raudenbush, and F Earls. 1997. Neighborhoods and violent crime: a multilevel study of collective efficacy. Science (New York, NY) 277, 5328 (1997), 918--924. DOI:https://doi.org/10.1126/science.277.5328.918Google ScholarGoogle Scholar
  60. Eran Toch. 2014. Crowdsourcing privacy preferences in context-aware applications. Personal and Ubiquitous Computing 18, 1 (2014), 129--141. DOI:https://doi.org/10.1007/s00779-012-0632-0Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Population Division U.S. Census Bureau. 2015. Annual Estimates of the Resident Population for Selected Age Groups by Sex for the United States, States, Counties, and Puerto Rico Commonwealth and Municipios: April 1, 2010 to July 1, 2014. Retrieved from https://factfinder.census.gov/faces/tableservices/jsf/pages/productview.xhtml?src=bkmkGoogle ScholarGoogle Scholar
  62. Na Wang, Jens Grossklags, and Heng Xu. 2013. An online experiment of privacy authorization dialogues for social applications. Proceedings of the 2013 conference on Computer supported cooperative work - CSCW '13 (2013), 261. DOI:https://doi.org/10.1145/2441776.2441807Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Yang Wang, Gregory Norcie, Saranga Komanduri, Alessandro Acquisti, Pedro Giovanni Leon, and Lorrie Faith Cranor. 2011. "I regretted the minute I pressed share." Proceedings of the Seventh Symposium on Usable Privacy and Security - SOUPS '11 (2011), 1. DOI:https://doi.org/10.1145/2078827.2078841Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Ya-Huei Wu, Caitlin Ware, Souad Damnée, Hélène Kerhervé, and Anne-Sophie Rigaud. 2015. Bridging the digital divide in older adults: a study from an initiative to inform older adults about new technologies. Clinical Interventions in Aging (2015), 193. DOI:https://doi.org/10.2147/CIA.S72399Google ScholarGoogle Scholar
  65. Bo Xie and Julie M. Bugg. 2009. Public library computer training for older adults to access high-quality Internet health information. Library and Information Science Research 31, 3 (2009), 155--162. DOI:https://doi.org/10.1016/j.lisr.2009.03.004Google ScholarGoogle ScholarCross RefCross Ref
  66. Bo Xie, Ivan Watkins, Jen Golbeck, and Man Huang. 2012. Understanding and Changing Older Adults' Perceptions and Learning of Social Media. Educational Gerontology 38, 4 (2012), 282--296. DOI:https://doi.org/10.1080/03601277.2010.544580Google ScholarGoogle ScholarCross RefCross Ref
  67. Jiahuan Zheng, Xin Peng, Jiacheng Yang, Huaqian Cai, Gang Huang, Ying Zhang, and Wenyun Zhao. 2017. CollaDroid: Automatic Augmentation of Android Application with Lightweight Interactive Collaboration. Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (2017), 2462--2474. DOI:https://doi.org/10.1145/2998181.2998278Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Jia Zhou, Pei Luen Patrick Rau, and Gavriel Salvendy. 2014. Age-related difference in the use of mobile phones. Universal Access in the Information Society 13, 4 (2014), 401--413. DOI:https://doi.org/10.1007/s10209-013-0324-1Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. My Mom was Getting this Popup: Understanding Motivations and Processes in Helping Older Relatives with Mobile Security and Privacy

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
          Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 3, Issue 4
          December 2019
          873 pages
          EISSN:2474-9567
          DOI:10.1145/3375704
          Issue’s Table of Contents

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 September 2020
          Published in imwut Volume 3, Issue 4

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader