853
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      Studying business & IT? Drive your professional career forwards with BCS books - for a 20% discount click here: shop.bcs.org

      scite_
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Cyber Security Capabilities and Requirements for a User Interface Supporting the Routines of Retirement Village Residents across US and UK

      Published
      proceedings-article
      , ,
      34th British HCI Workshop and Doctoral Consortium (HCI2021-WDC)
      Post-pandemic HCI – Living Digitally
      20th - 21st July 2021
      Cyber Security, Human Factors, Older Adults, Retirement Living, Aging Population
      Bookmark

            Abstract

            Retirement villages are becoming increasingly popular in developed countries largely due to the quality of life and security they can offer those of retirement age. Residents are augmenting their homes with IoT technologies such as smartphones, laptops, and tablets to help them to extend into the online world and stay connected with friends and family. However, older adults are also more at risk of social engineering attacks and their concerns may grow about keeping their personal data secure. To our knowledge, previous literature does not explore in detail the security awareness and preferences of retirement village residents. As a result, research around security related preferences of older adults are investigated. This research leads into the creation of a set of security requirements that may assist security by design for developers. A mixed methods design was used to get user input, incorporating both an online survey and a follow up semi-structured interview. Results lead to a total of fourteen different security requirements based on the user’s preferences and literature review. Recommendations for implementing security awareness training within the application are also included.

            Content

            Author and article information

            Contributors
            Conference
            July 2021
            : 1-6
            Affiliations
            [0001]Bournemouth University

            Fern Barrow, Poole BH12 5BB
            Article
            10.14236/ewic/HCI2021-W5.3
            1f925165-a30d-4bd4-abb7-416576ed0d6a
            © Cotterill et al. Published by BCS Learning and Development Ltd. Proceedings of the 34th British HCI Workshop and Doctoral Consortium 2021, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            34th British HCI Workshop and Doctoral Consortium
            HCI2021-WDC
            34
            London, UK
            20th - 21st July 2021
            Electronic Workshops in Computing (eWiC)
            Post-pandemic HCI – Living Digitally
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2021-W5.3
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Cyber Security,Retirement Living,Human Factors,Aging Population,Older Adults

            REFERENCES

            1. & 2010 An overview of social engineering malware: Trends, tactics, and implications Technology in Society 32 183 196

            2. 2015 The Demographics of Device Ownership Pew Research Centre

            3. 2017 Technology use among seniors Pew Research Centre

            4. & 2019 Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective Journal of Computer Information Systems 1 12

            5. Improving Security of Internet Services through Continuous and Transparent User Identity Verification 2012 IEEE 31st Symposium on Reliable Distributed Systems 8-11 Oct. 2012 2012. 201-206.

            6. 2014 Research methods and statistics in psychology London Psychology Press 2014 Sixth edition

            7. 2019 Usability of Technology for Older Adults: Where Are We and Where Do We Need to Be Journal of Usability Studies 14 61 64

            8. 2019 Does ICT Use matter? How information and communication technology use affects perceived mattering among a predominantly female sample of older adults residing in retirement communities Information, Communication & Society 22 1281 1294

            9. & 2002 Advantages and Disadvantages of Internet Research Surveys: Evidence from the Literature Great Britain SAGE PUBLICATIONS INC

            10. 2007 Assessing the security perceptions of personal Internet users Computers & Security 26 410 417

            11. & 2017 Got Phished? Internet Security and Human Vulnerability Journal of the Association for Information Systems 18 22 44

            12. & 2007 Email end users and spam: relations of gender and age group to attitudes and actions Computers in Human Behavior 23 318 332

            13. HSBC, https://www.hsbc.co.uk/help/securitycentre/fraud-guide/

            14. & 2017 What is a sustainable retirement village? Perceptions of Australian developers Journal of Cleaner Production 164 179 186

            15. ., & 2016 Generational differences in online safety perceptions, knowledge, and practices Educational Gerontology 42 621

            16. & 2017 Social networking in the aging context: Why older adults use or avoid Facebook Telematics & Informatics 34 1071 1080

            17. & 2013 Phishing Detection: A Literature Survey IEEE Communications Surveys & Tutorials 15 2091 2121

            18. 2018 Emotional Arousal May Increase Susceptibility to Fraud in Older and Younger Adults United States American Psychological Association

            19. 2018 Fake News, Phishing, and Fraud: A Call for Research on Digital Media Literacy Education beyond the Classroom Communication Education 67 460 466

            20. & 2010 Older adults talk technology: Technology usage and attitudes Computers in Human Behavior 26 1710 1721

            21. & 2020 Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults Frontiers in Psychology 11 623

            22. & 2015 Conducting semi-structured interviews Handbook of practical program evaluation 492

            23. & 2019 "If It's Important It Will Be A Headline" Conference on Human Factors in Computing Systems Proceedings 1

            24. & Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing. 2017 2017. Association for Computing Machinery, 6412

            25. & 2017 Americans and cybersecurity Pew Research Center 26 311 327

            26. Owasp 2017. Top 10 Web Application Security Risks. Open Web Application Security Project (OWASP)

            27. & 2012 Media Exposure, Juror Decision-Making, and the Availability Heuristic Jury Expert 24 53 58

            28. & 2014 Not All on the Same Page: E-Book Adoption and Technology Exploration by Seniors Information Research: An International Electronic Journal 19

            29. 2020 Volere Requirements Specification Template Atlantic Systems Guild

            30. & 2018 Architectural Design and Modelling of a Web Based Application for GDPR Clarification AIP Conference Proceedings 2048 060006 1

            31. & 2020 Which Phish Is on the Hook? Phishing Vulnerability for Older Versus Younger Adults Human Factors 62 704 717

            32. 2015 Getting Grandma Online: Are Tablets the Answer for Increasing Digital Inclusion for Older Adults in the U.S.? Educational Gerontology 41 695 709

            33. 2003 The representativeness heuristic in judgements involving entrepreneurial success and failure Management Decision 41 156 167

            34. 2017 Feature: GDPR: a milestone in convergence for cyber-security and compliance Network Security 2017 8 11

            Comments

            Comment on this article