{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:48:30Z","timestamp":1767084510554,"version":"3.40.3"},"publisher-location":"Cham","reference-count":63,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031358210"},{"type":"electronic","value":"9783031358227"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-35822-7_31","type":"book-chapter","created":{"date-parts":[[2023,7,8]],"date-time":"2023-07-08T23:04:57Z","timestamp":1688857497000},"page":"467-491","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Understanding Older Adults\u2019 Safety Perceptions and Risk Mitigation Strategies when Accessing Online Services"],"prefix":"10.1007","author":[{"given":"Dandi","family":"Feng","sequence":"first","affiliation":[]},{"given":"Hiba","family":"Rafih","sequence":"additional","affiliation":[]},{"given":"Cosmin","family":"Munteanu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,9]]},"reference":[{"key":"31_CR1","doi-asserted-by":"publisher","unstructured":"Axtell, B., Munteanu, B.: Back to Real Pictures: A Cross-generational Understanding of Users' Mental Models of Photo Cloud Storage. Proc. ACM Interact. Mob. Wear. Ubiquit. Technol. 3(3), 24 (2019). Article 74. https:\/\/doi.org\/10.1145\/3351232","DOI":"10.1145\/3351232"},{"issue":"2","key":"31_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5153\/sro.2998","volume":"18","author":"B Neves","year":"2013","unstructured":"Neves, B., Amaro, F., Fonseca, J.R.: Coming of (old) age in the digital age: ICT usage and non-usage among older adults. Sociol. Res. Online 18(2), 1\u201314 (2013)","journal-title":"Sociol. Res. Online"},{"issue":"2","key":"31_CR3","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1177\/1440783318766119","volume":"54","author":"BB Neves","year":"2018","unstructured":"Neves, B.B., Waycott, J., Malta, S.: Old and afraid of new communication technologies? Reconceptualising and contesting the \u2018age-based digital divide.\u2019 J. Sociol. 54(2), 236\u2013248 (2018)","journal-title":"J. Sociol."},{"key":"31_CR4","volume-title":"Older Adults\u2019 Perceptions of Online Risk (Master of Arts, Human Computer Interaction)","author":"V Boothroyd","year":"2014","unstructured":"Boothroyd, V.: Older Adults\u2019 Perceptions of Online Risk (Master of Arts, Human Computer Interaction). Carleton University, Ottawa, Ontario, Canada (2014)"},{"key":"31_CR5","first-page":"843","volume":"2019","author":"V Braun","year":"2019","unstructured":"Braun, V., Clarke, V., Hayfield, N., Terry, G.: Thematic analysis. Handb. Res. Meth. Health Soc. Sci. 2019, 843\u2013860 (2019)","journal-title":"Handb. Res. Meth. Health Soc. Sci."},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"987","DOI":"10.1017\/S0144686X10000164","volume":"30","author":"CE Buse","year":"2010","unstructured":"Buse, C.E.: E-scaping the ageing body? Computer technologies and embodiment in later life. Ageing Soc. 30, 987\u20131009 (2010). https:\/\/doi.org\/10.1017\/S0144686X10000164","journal-title":"Ageing Soc."},{"key":"31_CR7","unstructured":"CAFC. A Brief History of the Canadian Anti-Fraud Centre (2015). http:\/\/www.antifraudcentre-centreantifraude.ca\/about-ausujet\/index-eng.htm. Accessed Sept 2019"},{"key":"31_CR8","doi-asserted-by":"publisher","unstructured":"Carpenter, B.D., Buday, S.: Computer use among older adults in a naturally occurring retirement community. Comput. Hum. Behav. 23, 3012\u20133024 (2007). https:\/\/doi.org\/10.1016\/j.chb.2006.08.015","DOI":"10.1016\/j.chb.2006.08.015"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Cavenett, W., et al.: Deploying new technology in residential aged care: staff members\u2019 perspectives. In: Proceedings of the 30th Australian Conference on Computer-Human Interaction (OzCHI 2018) (2018)","DOI":"10.1145\/3292147.3292214"},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1016\/j.jbusres.2017.11.029","volume":"88","author":"J Choudrie","year":"2018","unstructured":"Choudrie, J., Junior, C.-O., McKenna, B., Ritcher, S.: Understanding and conceptualising the adoption, use and diffusion of mobile banking in older adults: a research agenda and conceptual framework. J. Bus. Res. 88, 449\u2013465 (2018)","journal-title":"J. Bus. Res."},{"key":"31_CR11","unstructured":"Citigroup Inc. Mobile Banking One of Top Three Most Used Apps by Americans, 2018 Citi Mobile Banking Study Reveals (2018). https:\/\/www.citigroup.com\/citi\/news\/2018\/180426a.htm"},{"key":"31_CR12","volume-title":"Help! I\u2019m Stuck, and there\u2019s no F1 Key on My Tablet! Presented at the MobileHCI 2019","author":"S Conte","year":"2019","unstructured":"Conte, S., Munteanu, C.: Help! I\u2019m Stuck, and there\u2019s no F1 Key on My Tablet! Presented at the MobileHCI 2019. ACM, Taipei, Taiwan (2019)"},{"key":"31_CR13","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/s10209-006-0060-x","volume":"5","author":"SJ Czaja","year":"2007","unstructured":"Czaja, S.J., Lee, C.C.: The impact of aging on access to technology. Univ. Access Inf. Soc. 5, 341\u2013349 (2007)","journal-title":"Univ. Access Inf. Soc."},{"key":"31_CR14","doi-asserted-by":"crossref","unstructured":"Czaja, S.J., Sharit, J., Nair, S.N., Lee, C.C.: Older adults and Internet health information seeking. In: Human Factors and Ergonomics Society Annual Meeting Proceedings, pp. 126\u2013130 (2009)","DOI":"10.1518\/107118109X12524441079427"},{"key":"31_CR15","doi-asserted-by":"publisher","DOI":"10.1201\/b22189","volume-title":"Designing for Older Adults: Principles and Creative Human Factors Approaches","author":"SJ Czaja","year":"2019","unstructured":"Czaja, S.J., Boot, W.R., Charness, N., Rogers, W.A.: Designing for Older Adults: Principles and Creative Human Factors Approaches. CRC Press, Boca Raton (2019)"},{"key":"31_CR16","unstructured":"Davidson, J., Schimmele, C.: Evolving internet use among Canadian seniors. StatsCanada Analytical Studies Branch Research Paper Series. 11F0019M No. 427 (2019)"},{"key":"31_CR17","doi-asserted-by":"crossref","unstructured":"El Haddad, G., A\u00efmeur, E., Hage, H.: Understanding trust, privacy and financial fears in online payment. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/ 12th IEEE International Conference On Big Data Science And Engineering. New York, USA (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00015"},{"key":"31_CR18","unstructured":"Federal Reserve System. Consumers and Mobile Financial Services 2016. Board of Governors of the Federal Reserve System. Washington, DC. (2016). https:\/\/www.federalreserve.gov\/econresdata\/consumers-and-mobile-financial-servicesreport-201603.pdf"},{"key":"31_CR19","unstructured":"Susannah Fox. Older Americans and the internet (2004). https:\/\/www.pewinternet.org\/2004\/03\/28\/older-americans-and-the-internet\/. Accessed Sept 2019"},{"key":"31_CR20","unstructured":"Frissen, V.: Chapter 3: The myth of the digital divide. In: E-merging media: Communication and the Media Economy of the Future. Springer, Berlin (2005). https:\/\/www.dhi.ac.uk\/san\/waysofbeing\/data\/data-crone-frissen-2005.pdf"},{"issue":"5","key":"31_CR21","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.cose.2007.03.001","volume":"26","author":"S Furnell","year":"2007","unstructured":"Furnell, S., Bryant, P., Phippen, A.D.: Assessing the security perceptions of personal Internet users. Comput. Secur. 26(5), 410\u2013417 (2007). https:\/\/doi.org\/10.1016\/j.cose.2007.03.001","journal-title":"Comput. Secur."},{"key":"31_CR22","doi-asserted-by":"crossref","unstructured":"Gabriel, I., Nyshadham, E.: A cognitive map of people\u2019s online risk perceptions and attitudes: an empirical study. In: Proceedings of the 41st Hawaii International Conference on System Sciences. Waikoloa, HI, USA: IEEE (2008)","DOI":"10.1109\/HICSS.2008.6"},{"key":"31_CR23","doi-asserted-by":"publisher","unstructured":"Grimes, G.A., Hough, M.G., Mazur, E., Signorella, M.L.: Older adults\u2019 knowledge of internet hazards. Educ. Gerontol. 36, 173\u2013192 (2010). https:\/\/doi.org\/10.1080\/03601270903183065","DOI":"10.1080\/03601270903183065"},{"key":"31_CR24","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1080\/10810730.2015.1018603","volume":"20","author":"AK Hall","year":"2015","unstructured":"Hall, A.K., Bernhardt, J.M., Dodd, V.: Older adults\u2019 use of online and offline sources of health information and constructs of reliance and self-efficacy for medical decision making. J. Health Commun. 20, 751\u2013758 (2015). https:\/\/doi.org\/10.1080\/10810730.2015.1018603","journal-title":"J. Health Commun."},{"key":"31_CR25","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1016\/j.chb.2015.01.062","volume":"48","author":"R Hill","year":"2015","unstructured":"Hill, R., Betts, L.R., Gardner, S.E.: Older adults\u2019 experiences and perceptions of digital technology: (Dis) empowerment, wellbeing, and inclusion. Comput. Hum. Behav. 48, 415\u2013423 (2015). https:\/\/doi.org\/10.1016\/j.chb.2015.01.062","journal-title":"Comput. Hum. Behav."},{"key":"31_CR26","doi-asserted-by":"publisher","unstructured":"Hughes, M.E., Waite, L.J., Hawkley, L.C., Cacioppo, T.C.: A short scale for measuring loneliness in large surveys. Res. Aging 26(6), 655\u2013672 (2004). https:\/\/doi.org\/10.1177\/0164027504268574","DOI":"10.1177\/0164027504268574"},{"issue":"9","key":"31_CR27","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1080\/03601277.2016.1205408","volume":"42","author":"M Jiang","year":"2016","unstructured":"Jiang, M., Tsai, H.S., Cotten, S.R., Rifon, N.J., LaRose, R., Alhabash, S.: Generational differences in online safety perceptions, knowledge, and practices. Educ. Gerontol. 42(9), 621\u2013634 (2016). https:\/\/doi.org\/10.1080\/03601277.2016.1205408","journal-title":"Educ. Gerontol."},{"issue":"4","key":"31_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3196490","volume":"25","author":"B Knowles","year":"2018","unstructured":"Knowles, B., Hanson, V.L.: Older adults\u2019 deployment of \u2018distrust.\u2019 ACM Trans. Comput.-Hum. Interact. (TOCHI) 25(4), 1\u201325 (2018). https:\/\/doi.org\/10.1145\/3196490","journal-title":"ACM Trans. Comput.-Hum. Interact. (TOCHI)"},{"key":"31_CR29","unstructured":"Munteanu, C., Tennakoon, C., Garner, J.: Improving older adults\u2019 online security: an exercise in participatory design. In: Symposium on Usable Privacy and Security (SOUPS), Ottawa, Canada (2015)"},{"key":"31_CR30","doi-asserted-by":"crossref","unstructured":"Munteanu, C., Axtell, B., Rafih, H., Liaqat, A., Aly, Y.: Designing for older adults: overcoming barriers to a supportive, safe, and healthy retirement university of Pennsylvania press In: The Disruptive Impact of FinTech on Retirement Systems (2018)","DOI":"10.1093\/oso\/9780198845553.003.0007"},{"key":"31_CR31","doi-asserted-by":"publisher","unstructured":"Nicholson, J., Coventry, L., Briggs, P.: \u201cIf It\u2019s Important It Will Be A Headline\u201d: cybersecurity information seeking in older adults. In: CHI Conference on Human Factors in Computing Systems Proceedings, pp. 1\u201311. Glasgow, Scotland, U.K.: ACM, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3290605.3300579","DOI":"10.1145\/3290605.3300579"},{"key":"31_CR32","doi-asserted-by":"publisher","unstructured":"Nicholson, N.R.: A Review of Social Isolation: An Important but Underassessed Condition in Older Adults. The Journal of Primary Prevention, 33, 137\u2013152 (2012). https:\/\/doi.org\/10.1007\/s10935-012-0271-2","DOI":"10.1007\/s10935-012-0271-2"},{"key":"31_CR33","unstructured":"Passy, J.: More millennials reported losing money to scam in 2017 than senior citizens (2018). https:\/\/www.marketwatch.com\/story\/more-millennials-reported-losing-money-to-scams-in-2017-th-an-senior-citizens-2018-03-02. Accessed Sept 2019"},{"issue":"1","key":"31_CR34","first-page":"449","volume":"9","author":"K Passyn","year":"2011","unstructured":"Passyn, K., Diriker, M., Settle, R.B.: Images of online versus store shopping: have the attitudes of men and women, young and old really changed? J. Bus. Econ. Res. 9(1), 449\u2013465 (2011)","journal-title":"J. Bus. Econ. Res."},{"key":"31_CR35","unstructured":"Perrin, A., Anderson, M.: Tech Adoption Climbs Among Older Adults. Pew Research Center (2017). https:\/\/www.pewinternet.org\/2017\/05\/17\/technology-use-among-seniors\/"},{"key":"31_CR36","unstructured":"Pride, J.: SEEFA policy panel on later life and ageing: Summary of the key issues on valuing the older population (2013). http:\/\/ageactionalliance.org\/wordpress\/wp-content\/uploads\/2014\/05\/SEEFA-key-issues-on-Valuing-the-Older-Population.pdf. Accessed 9 Sept 2019"},{"key":"31_CR37","doi-asserted-by":"crossref","unstructured":"Quan\u2010Haase, A., Ho, D.: Online privacy concerns and privacy protection strategies among older adults in East York, Canada. J. Assoc. Inf. Sci. Technol. 71(9), 1089\u20131102 (2020)","DOI":"10.1002\/asi.24364"},{"key":"31_CR38","doi-asserted-by":"publisher","unstructured":"Robertson-Lang, L., Major, S., Hemming, H.: An exploration of search patterns and credibility issues among older adults seeking online health information. Can. J. Aging 30(4), 631\u2013645 (2011). https:\/\/doi.org\/10.1017\/S071498081100050X","DOI":"10.1017\/S071498081100050X"},{"key":"31_CR39","volume-title":"Diffusion of Innovations","author":"E Rogers","year":"2003","unstructured":"Rogers, E.: Diffusion of Innovations, 5th edn. Free Press, New York. (2003)","edition":"5"},{"issue":"7","key":"31_CR40","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1080\/03601270801949427","volume":"34","author":"RL Rosenthal","year":"2008","unstructured":"Rosenthal, R.L.: Older computer-literate women: their motivations, obstacles, and paths to success. Educ. Gerontol. 34(7), 610\u2013626 (2008). https:\/\/doi.org\/10.1080\/03601270801949427","journal-title":"Educ. Gerontol."},{"key":"31_CR41","doi-asserted-by":"crossref","unstructured":"Taha, J., Sharit, J., Czaja, S.: Use of and satisfaction with sources of health information among older Internet users and nonusers. Gerontologist 49(5), 663\u2013673 (2009)","DOI":"10.1093\/geront\/gnp058"},{"key":"31_CR42","unstructured":"City of Toronto. TORONTO SENIORS STRATEGY 2.0. Seniors Transition Office Report (2018)"},{"key":"31_CR43","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.chb.2016.12.058","volume":"70","author":"E Van Ingen","year":"2017","unstructured":"Van Ingen, E., Rains, S., Wright, K.: Does social network site use buffer against well-being loss when older adults face reduced functional ability. Comput. Hum. Behav. 70, 168\u2013177 (2017)","journal-title":"Comput. Hum. Behav."},{"issue":"2","key":"31_CR44","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manage. Sci. 46(2), 186\u2013204 (2000)","journal-title":"Manage. Sci."},{"key":"31_CR45","doi-asserted-by":"publisher","unstructured":"Venkatesh, V.: Technology acceptance model and the unified theory of acceptance and use of technology Wiley Encycl. Manage., 1\u201392015). https:\/\/doi.org\/10.1002\/9781118785317.weom070047","DOI":"10.1002\/9781118785317.weom070047"},{"key":"31_CR46","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.chb.2014.10.018","volume":"43","author":"KG Vroman","year":"2014","unstructured":"Vroman, K.G., Arthanat, S., Lysack, C.: \u201cWho over 65 is online?\u201d Older adults\u2019 dispositions toward information communication technology. Comput. Hum. Behav. 43, 156\u2013166 (2014). https:\/\/doi.org\/10.1016\/j.chb.2014.10.018","journal-title":"Comput. Hum. Behav."},{"key":"31_CR47","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1016\/j.chb.2010.03.029","volume":"26","author":"N Wagner","year":"2010","unstructured":"Wagner, N., Hassanein, K., Head, M.: Computer use by older adults: a multi-disciplinary review. Comput. Hum. Behav. 26, 870\u2013882 (2010). https:\/\/doi.org\/10.1016\/j.chb.2010.03.029","journal-title":"Comput. Hum. Behav."},{"issue":"10","key":"31_CR48","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1080\/02642069.2015.1047827","volume":"35","author":"SW Wang","year":"2015","unstructured":"Wang, S.W., Ngamsiriudom, W., Hsieh, C.-H.: Trust disposition, trust antecedents, trust, and behavioral intention. Serv. Ind. J. 35(10), 555\u2013572 (2015)","journal-title":"Serv. Ind. J."},{"key":"31_CR49","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1177\/1049731512464582","volume":"23","author":"J Wardian","year":"2012","unstructured":"Wardian, J., Robbins, D., Wolfersteig, W., Johnson, T., Dustman, P.: Validation of the DSSI-10 to measure social support in a general population. Res. Soc. Work. Pract. 23, 100\u2013106 (2012)","journal-title":"Res. Soc. Work. Pract."},{"key":"31_CR50","unstructured":"Yosowich, M.: What age is someone considered a senior? (2019). https:\/\/elder.findlaw.ca\/article\/what-age-is-someone-considered-a-senior. Accessed Sept 2019"},{"key":"31_CR51","doi-asserted-by":"publisher","unstructured":"Das, S., Lo, J., Dabbish, L., Hong, J.I.: Breaking! a typology of security and privacy news and how it\u2019s shared. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI 2018). ACM, New York, NY, USA, pp. 1:1\u20131:12 (2018). https:\/\/doi.org\/10.1145\/3173574.3173575","DOI":"10.1145\/3173574.3173575"},{"key":"31_CR52","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1089\/cyber.2016.0729","volume":"21","author":"MT Witty","year":"2018","unstructured":"Witty, M.T.: Do You Love Me? Psychological characteristics of romance scams victims. Cyberpsychol. Behav. Soc. Netw. 21, 105\u2013109 (2018)","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"key":"31_CR53","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1080\/07317115.2015.1101632","volume":"39","author":"PA Lichtenberg","year":"2016","unstructured":"Lichtenberg, P.A., Sugarman, M.A., Paulson, D., Ficker, L.J., Rahman-Filipiak, A.: Psychological and functional vulnerability predicts fraud cases in older adults: results of a longitudinal study. Clin. Gerontol. 39, 48\u201363 (2016)","journal-title":"Clin. Gerontol."},{"issue":"9","key":"31_CR54","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1089\/cyber.2016.0151","volume":"19","author":"WJ Chopik","year":"2016","unstructured":"Chopik, W.J.: The benefits of social technology use among older adults are mediated by reduced loneliness. Cyberpsychol. Behav. Soc. Netw. 19(9), 551\u2013556 (2016)","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"key":"31_CR55","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1016\/j.chb.2011.10.021","volume":"2","author":"SR Cotten","year":"2012","unstructured":"Cotten, S.R., Ford, G., Ford, S., Hale, T.M.: Internet use and depression among retired older adults in the United States: a longitudinal study. Comput. Hum. Behav. 2, 496\u2013499 (2012)","journal-title":"Comput. Hum. Behav."},{"key":"31_CR56","doi-asserted-by":"crossref","unstructured":"McNeil, A., Briggs, P., Pywell, J., Coventry, L.: Functional privacy concerns of older adults about pervasive health-monitoring Systems. In: The Pervasive Technologies Related to Assistive Environments (PETRA 2017). ACM, Island of Rhodes, Greece (2017)","DOI":"10.1145\/3056540.3056559"},{"key":"31_CR57","doi-asserted-by":"crossref","unstructured":"Mentis, H.M., Madjaroff, G., Massey, A.K.: Upside and downside risk in online security for older adults with mild cognitive impairments. In: Proceedings of CHI Conference on Human Factors and Computer Systems (CHI 2019). Glasgow, Scotland, U.K.: ACM, New York, NY, USA (2019)","DOI":"10.1145\/3290605.3300573"},{"key":"31_CR58","doi-asserted-by":"crossref","unstructured":"Franz, R.L., Findlater, L., Neves, B.B., Wobbrock, J.O.: Gender and help seeking by older adults when learning new technologies. In: Proceedings of ASSET Conference (ASSET 2019). Pittsburgh, PA, USA: ACM, New York, NY, USA (2019)","DOI":"10.1145\/3308561.3353807"},{"key":"31_CR59","doi-asserted-by":"crossref","unstructured":"Ray, H., Wolf, F., Kuber, R., Aviv, A.J.: \u201cWoe is me:\u201d examining older adults\u2019 perception of privacy. In: CHI\u201919 Extended Abstracts, 4\u20139 May 2019, Glasgow, Scotland UK (2019)","DOI":"10.1145\/3290607.3312770"},{"key":"31_CR60","doi-asserted-by":"publisher","unstructured":"Spinelli, G., Jain, S.: Designing and evaluating web interaction for older users. In: Yannacopoulos, D., Manolitzas, P., Matsatsinis, N., Grigoroudis, E. (eds.), Evaluating Websites and Web Services: Interdisciplinary Perspectives on User Satisfaction, (pp. 176\u2013202). Hershey, PA: IGI Global. (2014). https:\/\/doi.org\/10.4018\/978-1-4666-5129-6.ch011","DOI":"10.4018\/978-1-4666-5129-6.ch011"},{"key":"31_CR61","unstructured":"Toronto Seniors Strategy. Municipal survey report (2018). https:\/\/www.toronto.ca. Accessed May 2020"},{"key":"31_CR62","volume-title":"This is Service Design Thinking: Basics, Tools, Cases","author":"M Stickdorn","year":"2011","unstructured":"Stickdorn, M., Schneider, J., Andrews, K., Lawrence, A.: This is Service Design Thinking: Basics, Tools, Cases, vol. 1. Wiley, Hoboken, NJ (2011)"},{"key":"31_CR63","unstructured":"Interaction Design Foundation. The Principles of Service Design Thinking - Building Better Services. IDF Course Notes (2020). https:\/\/www.interaction-design.org\/literature\/article\/the-principles-of-service-design-thinking-building-better-services. Accessed May 2020"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-35822-7_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T20:15:07Z","timestamp":1710360907000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-35822-7_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031358210","9783031358227"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-35822-7_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"9 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7472","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1578","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"396","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}