Retirement villages are becoming increasingly popular in developed countries largely due to the quality of life and security they can offer those of retirement age. Residents are augmenting their homes with IoT technologies such as smartphones, laptops, and tablets to help them to extend into the online world and stay connected with friends and family. However, older adults are also more at risk of social engineering attacks and their concerns may grow about keeping their personal data secure. To our knowledge, previous literature does not explore in detail the security awareness and preferences of retirement village residents. As a result, research around security related preferences of older adults are investigated. This research leads into the creation of a set of security requirements that may assist security by design for developers. A mixed methods design was used to get user input, incorporating both an online survey and a follow up semi-structured interview. Results lead to a total of fourteen different security requirements based on the user’s preferences and literature review. Recommendations for implementing security awareness training within the application are also included.
S Abraham & I Chengalur-Smith 2010 An overview of social engineering malware: Trends, tactics, and implications Technology in Society 32 183 196
M Anderson 2015 The Demographics of Device Ownership Pew Research Centre
M Anderson 2017 Technology use among seniors Pew Research Centre
C Blackwood-BrownY Levy & J D’Arcy 2019 Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective Journal of Computer Information Systems 1 12
A CeccarelliA BondavalliF BrancatiE. L Mattina Improving Security of Internet Services through Continuous and Transparent User Identity Verification 2012 IEEE 31st Symposium on Reliable Distributed Systems 8-11 Oct. 2012 2012. 201-206.
H Coolican 2014 Research methods and statistics in psychology London Psychology Press 2014 Sixth edition
S. J Czaja 2019 Usability of Technology for Older Adults: Where Are We and Where Do We Need to Be Journal of Usability Studies 14 61 64
J FrancisR. V RikardS. R CottenT Kadylak 2019 Does ICT Use matter? How information and communication technology use affects perceived mattering among a predominantly female sample of older adults residing in retirement communities Information, Communication & Society 22 1281 1294
R. D Fricker& M Schonlau 2002 Advantages and Disadvantages of Internet Research Surveys: Evidence from the Literature Great Britain SAGE PUBLICATIONS INC
S. M FurnellP BryantA. D Phippen 2007 Assessing the security perceptions of personal Internet users Computers & Security 26 410 417
S GoelK Williams & E Dincelli 2017 Got Phished? Internet Security and Human Vulnerability Journal of the Association for Information Systems 18 22 44
G. A GrimesM. G Hough& M. L Signorella 2007 Email end users and spam: relations of gender and age group to attitudes and actions Computers in Human Behavior 23 318 332
HSBC, https://www.hsbc.co.uk/help/securitycentre/fraud-guide/
X HuB XiaM SkitmoreL Buys & Y Hu 2017 What is a sustainable retirement village? Perceptions of Australian developers Journal of Cleaner Production 164 179 186
M JiangH.-Y. S Tsai., S. R CottenN. J RifonR Larose & S Alhabash 2016 Generational differences in online safety perceptions, knowledge, and practices Educational Gerontology 42 621
E. H JungJ WaldenA. C Johnson& S. S Sundar 2017 Social networking in the aging context: Why older adults use or avoid Facebook Telematics & Informatics 34 1071 1080
M KhonjiY Iraqi & A Jones 2013 Phishing Detection: A Literature Survey IEEE Communications Surveys & Tutorials 15 2091 2121
K KircanskiN NotthoffM DeliemaG. R Samanez-LarkinD ShadelG MottolaL. L CarstensenH Gotlib 2018 Emotional Arousal May Increase Susceptibility to Fraud in Older and Younger Adults United States American Psychological Association
N. M Lee 2018 Fake News, Phishing, and Fraud: A Call for Research on Digital Media Literacy Education beyond the Classroom Communication Education 67 460 466
T. L MitznerJ. B BoronC. B FaussetA. E AdamsN CharnessS. J CzajaK DijkstraA. D FiskW. A Rogers& J Sharit 2010 Older adults talk technology: Technology usage and attitudes Computers in Human Behavior 26 1710 1721
B. A MorrisonL Coventry & P Briggs 2020 Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults Frontiers in Psychology 11 623
K. E NewcomerH. P Hatry& J. S Wholey 2015 Conducting semi-structured interviews Handbook of practical program evaluation 492
J NicholsonL Coventry & P Briggs 2019 "If It's Important It Will Be A Headline" Conference on Human Factors in Computing Systems Proceedings 1
D OliveiraH RochaH YangD EllisS DommarajuM MuradogluD WeirA SolimanT Lin & N Ebner Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing. 2017 2017. Association for Computing Machinery, 6412
K Olmstead & A Smith 2017 Americans and cybersecurity Pew Research Center 26 311 327
Owasp 2017. Top 10 Web Application Security Risks. Open Web Application Security Project (OWASP)
J Platania & J Crawford 2012 Media Exposure, Juror Decision-Making, and the Availability Heuristic Jury Expert 24 53 58
A Quan-HaaseK Martin & K Schreurs 2014 Not All on the Same Page: E-Book Adoption and Technology Exploration by Seniors Information Research: An International Electronic Journal 19
S RobertsonJ Robertson 2020 Volere Requirements Specification Template Atlantic Systems Guild
R Romansky & K Kirilov 2018 Architectural Design and Modelling of a Web Based Application for GDPR Clarification AIP Conference Proceedings 2048 060006 1
D. M SarnoJ. E LewisC. J Bohil& M. B Neider 2020 Which Phish Is on the Hook? Phishing Vulnerability for Older Versus Younger Adults Human Factors 62 704 717
H.-Y. S TsaiR ShillairS. R CottenV WinsteadE Yost 2015 Getting Grandma Online: Are Tablets the Answer for Increasing Digital Inclusion for Older Adults in the U.S.? Educational Gerontology 41 695 709
P. A Wickham 2003 The representativeness heuristic in judgements involving entrepreneurial success and failure Management Decision 41 156 167
J Zerlang 2017 Feature: GDPR: a milestone in convergence for cyber-security and compliance Network Security 2017 8 11