{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T21:27:11Z","timestamp":1772400431125,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030811105","type":"print"},{"value":"9783030811112","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-81111-2_2","type":"book-chapter","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:02:42Z","timestamp":1625637762000},"page":"12-21","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Cybersecurity and Digital Exclusion of\u00a0Seniors: What Do They Fear?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8900-6139","authenticated-orcid":false,"given":"Jesper","family":"Holgersson","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2084-9119","authenticated-orcid":false,"given":"Joakim","family":"K\u00e4vrestad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5962-9995","authenticated-orcid":false,"given":"Marcus","family":"Nohlberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,8]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"1573","DOI":"10.53637\/DHUV6093","volume":"40","author":"H Al-Alosi","year":"2017","unstructured":"Al-Alosi, H.: Cyber-violence: digital abuse in the context of domestic violence. UNSWLJ 40, 1573 (2017)","journal-title":"UNSWLJ"},{"key":"2_CR2","unstructured":"Bada, M., Sasse, A.M., Nurse, J.R.: Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 (2019)"},{"issue":"24","key":"2_CR3","first-page":"333","volume":"97","author":"T Bagga","year":"2017","unstructured":"Bagga, T., Sodhi, J., Shukla, B., Qazi, M.: Smartphone security behaviour of the Indian smartphone user. Man In India 97(24), 333\u2013344 (2017)","journal-title":"Man In India"},{"key":"2_CR4","unstructured":"Berelson, B.: Content Analysis in Communication Research. Content Analysis in Communication Research, Free Press, New York (1952)"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"B\u00e9langer, F., Carter, L.: Trust and risk in e-government adoption. J. Strateg. Inf. Syst. 17(2), 165\u2013176 (2008)., https:\/\/www.sciencedirect.com\/science\/article\/B6VG3-4RN4892-1\/2\/af26a5d6a3b53b9cf437a405625045d4, https:\/\/doi.org\/10.1016\/j.jsis.2007.12.002","DOI":"10.1016\/j.jsis.2007.12.002"},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1177\/0267323115578059","volume":"30","author":"A van Deursen","year":"2015","unstructured":"van Deursen, A., Helsper, E.: A nuanced understanding of internet use and non-use among the elderly. Eur. J. Commun. 30(2), 171\u2013187 (2015). https:\/\/doi.org\/10.1177\/0267323115578059","journal-title":"Eur. J. Commun."},{"issue":"4","key":"2_CR7","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1016\/j.poetic.2006.05.004","volume":"34","author":"J van Dijk","year":"2006","unstructured":"van Dijk, J.: Digital divide research, achievements and shortcomings. Poetics 34(4), 221\u2013235 (2006)","journal-title":"Poetics"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Ebbers, W.E., Jansen, M.G.M., van Deursen, A.J.A.M.: Impact of the digital divide on e-government: Expanding from channel choice to channel usage. Gov. Inf. Q. 33(4), 685\u2013692 (2016). https:\/\/doi.org\/10.1016\/j.giq.2016.08.007, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0740624X16301460","DOI":"10.1016\/j.giq.2016.08.007"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Fortes, R.P.M., Martins, G.A., Castro, P.C.: A review of senescent\u2019s motivation in the use of tactile devices. Procedia Comput. Sci. 67, 376\u2013387 (2015). https:\/\/doi.org\/10.1016\/j.procs.2015.09.282, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050915031282","DOI":"10.1016\/j.procs.2015.09.282"},{"key":"2_CR10","unstructured":"The Sweden Internet Foundation: The swedes and the internet. Report (2019). www.svenskarnaochinternet"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Hill, R., Betts, L.R., Gardner, S.E.: Older adults\u2019 experiences and perceptions of digital technology: (dis) empowerment, wellbeing, and inclusion. Comput. Hum. Behav. 48, 415\u2013423 (2015). https:\/\/doi.org\/10.1016\/j.chb.2015.01.062, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0747563215000904","DOI":"10.1016\/j.chb.2015.01.062"},{"key":"2_CR12","unstructured":"Holgersson, J., S\u00f6derstr\u00f6m, E.: Bridging the gap: Exploring elderly citizens\u2019 perceptions of digital exclusion. In: 27th European Conference on Information Systems (ECIS), Stockholm & Uppsala, Sweden, June 8\u201314, 2019. Association for Information Systems (2019)"},{"key":"2_CR13","series-title":"Public Administration and Information Technology","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52873-7","volume-title":"Co-creating Digital Public Services for an Ageing Society","author":"J Jarke","year":"2021","unstructured":"Jarke, J.: Co-creating Digital Public Services for an Ageing Society. PAIT, vol. 6. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-52873-7"},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Krippendorff, K.: Reliability in content analysis: Some common misconceptions and recommendations. Human Commun. Res. 30(3), 411\u2013433 (2006). https:\/\/doi.org\/10.1111\/j.1468-2958.2004.tb00738.x","DOI":"10.1111\/j.1468-2958.2004.tb00738.x"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Kumar, S., Ureel, L.C., King, H., Wallace, C.: Lessons from our elders: identifying obstacles to digital literacy through direct engagement. In: Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, pp. 1\u20138 (2013)","DOI":"10.1145\/2504335.2504357"},{"key":"2_CR16","first-page":"773","volume":"27","author":"JD Ndibwile","year":"2019","unstructured":"Ndibwile, J.D., Luhanga, E.T., Fall, D., Kadobayashi, Y.: A demographic perspective of smartphone security and its redesigned notifications. J. Inf. Process. 27, 773\u2013786 (2019)","journal-title":"J. Inf. Process."},{"key":"2_CR17","doi-asserted-by":"publisher","unstructured":"Niehaves, B., Plattfaut, R.: Internet adoption by the elderly: employing is technology acceptance theories for understanding the age-related digital divide. Eur. J. Inf. Syst. 23(6), 708\u2013726 (2014). https:\/\/doi.org\/10.1057\/ejis.2013.19","DOI":"10.1057\/ejis.2013.19"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Nishijima, M., Ivanauskas, T.M., Sarti, F.M.: Evolution and determinants of digital divide in brazil (2005\u20132013). Telecommun. Policy 41(1), 12\u201324 (2017). https:\/\/doi.org\/10.1016\/j.telpol.2016.10.004, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0308596116301835","DOI":"10.1016\/j.telpol.2016.10.004"},{"key":"2_CR19","unstructured":"OECD: Going digital in sweden - oecd reviews of digital transformation. Report (2018). https:\/\/www.oecd.org\/sweden\/going-digital-in-sweden.pdf"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-319-20376-8_21","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"M Pattinson","year":"2015","unstructured":"Pattinson, M., Butavicius, M., Parsons, K., McCormac, A., Calic, D.: Factors that influence information security behavior: an Australian web-based study. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2015. LNCS, vol. 9190, pp. 231\u2013241. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-20376-8_21"},{"key":"2_CR21","unstructured":"Patton, M.Q.: Qualitative Research & Evaluation Methods. Sage, London (2002)"},{"key":"2_CR22","doi-asserted-by":"publisher","unstructured":"Polat, R.K.: Digital exclusion in turkey: a policy perspective. Gov. Inf. Q. 29(4), 589\u2013596 (2012). https:\/\/doi.org\/10.1016\/j.giq.2012.03.002, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0740624X12000950","DOI":"10.1016\/j.giq.2012.03.002"},{"issue":"8","key":"2_CR23","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1016\/j.cose.2009.05.008","volume":"28","author":"HS Rhee","year":"2009","unstructured":"Rhee, H.S., Kim, C., Ryu, Y.U.: Self-efficacy in information security: its influence on end users\u2019 information security practice behavior. Comput. Secur. 28(8), 816\u2013826 (2009)","journal-title":"Comput. Secur."},{"key":"2_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-030-57599-1_12","volume-title":"Electronic Government","author":"J Rose","year":"2020","unstructured":"Rose, J., Holgersson, J., S\u00f6derstr\u00f6m, E.: Digital inclusion competences for senior citizens: the survival basics. In: Viale Pereira, G., et al. (eds.) EGOV 2020. LNCS, vol. 12219, pp. 151\u2013163. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57599-1_12"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Silverman, D.: Interpreting Qualitative Data: Methods for Analysing Talk, Text and Interaction, vol. 2nd edn. Sage, London (2001)","DOI":"10.1177\/146879410200200111"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-81111-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T16:03:17Z","timestamp":1710864197000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-81111-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030811105","9783030811112"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-81111-2_2","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"8 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/?page=home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"60% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.43","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}