{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:14:00Z","timestamp":1764785640988,"version":"3.41.0"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031927140"},{"type":"electronic","value":"9783031927126"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92712-6_16","type":"book-chapter","created":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T12:13:08Z","timestamp":1748434388000},"page":"248-259","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Elderly and Digital Vulnerability Predictors"],"prefix":"10.1007","author":[{"given":"Ingvar","family":"Tjostheim","sequence":"first","affiliation":[]},{"given":"Till","family":"Halbach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,25]]},"reference":[{"issue":"1","key":"16_CR1","first-page":"10","volume":"8","author":"D Bhaskaran","year":"2025","unstructured":"Bhaskaran, D.: Implementing robust security measures to protect elderly users from financial fraud. Int. J. Res. Comput. Appl. Inform. Technol. 8(1), 10\u201334218 (2025)","journal-title":"Int. J. Res. Comput. Appl. Inform. Technol."},{"key":"16_CR2","unstructured":"European Union: 1.2017. 5661. Special Eurobarometer 464a \u201cEuropean attitudes towards cyber security.\u201d (2017)"},{"key":"16_CR3","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1257\/089533005775196732","volume":"19","author":"S Frederick","year":"2005","unstructured":"Frederick, S.: Cognitive reflection and decision making. J. Econ. Persp. 19, 25\u201342 (2005)","journal-title":"J. Econ. Persp."},{"key":"16_CR4","unstructured":"Breyer, B.: Social Trust Scale (ESS) (2015). https:\/\/zis.gesis.org\/skala\/Schwartz-Breyer-Danner-Human-Values-Scale-%28ESS%29"},{"key":"16_CR5","volume-title":"Applied logistic regression","author":"W Hosmer","year":"1998","unstructured":"Hosmer, W., Lemeshow, S.: Applied logistic regression. Wiley, New York (1998)"},{"key":"16_CR6","unstructured":"Kahneman, D.: Thinking, Fast and Slow. New York, NY, Farrar, Straus and Giroux (2011)"},{"key":"16_CR7","doi-asserted-by":"publisher","unstructured":"Otero, I., Salgado, J.F., Moscoso, S.: Cognitive reflection, cognitive intelligence, and cognitive abilities: A meta-analysis. Intelligence, 90(January\u2013\u00ad February), 101614 (2022). https:\/\/doi.org\/10.1016\/j.intell.2021.101614","DOI":"10.1016\/j.intell.2021.101614"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Parti, K.: What is a capable guardian to older fraud victims? Comparison of younger and older victims\u2019 characteristics of online fraud utilizing routine activity theory. Frontiers in Psychology. Retrieved from (2023). https:\/\/www.frontiersin.org\/journals\/psychology\/articles\/10.3389\/fpsyg.2023.1118741\/full","DOI":"10.3389\/fpsyg.2023.1118741"},{"issue":"5","key":"16_CR9","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1080\/00223891.2016.1231115","volume":"99","author":"CJ Sandy","year":"2017","unstructured":"Sandy, C.J., Gosling, S.D., Schwartz, S.H., Koelkebeck, T.: The Development and Validation of Brief and Ultrabrief Measures of Values. J. Pers. Assess. 99(5), 545\u2013555 (2017). https:\/\/doi.org\/10.1080\/00223891.2016.1231115","journal-title":"J. Pers. Assess."},{"key":"16_CR10","doi-asserted-by":"publisher","unstructured":"Tjostheim, I., Waterworth, J.A.: Predicting Personal Susceptibility to Phishing. In: Rocha, \u00c1., Ferr\u00e1s ,C., Montenegro, Marin, C., Medina Garc\u00eda, V. (eds) Information Technology and Systems. ICITS 2020. Advances in Intelligent Systems and Computing, vol 1137. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-40690-5_54","DOI":"10.1007\/978-3-030-40690-5_54"},{"key":"16_CR11","first-page":"4754","volume":"57","author":"I Tjostheim","year":"2024","unstructured":"Tjostheim, I., Waterworth, J.A.: Exploring susceptibility to phishing: The Cognitive Reflection Test and other possible predictors. Proc. Ann. Hawaii Int. Conf. Syst. Sci. (HICSS) 57, 4754\u20134763 (2024)","journal-title":"Proc. Ann. Hawaii Int. Conf. Syst. Sci. (HICSS)"},{"key":"16_CR12","doi-asserted-by":"publisher","first-page":"1275","DOI":"10.3758\/s13421-011-0104-1","volume":"39","author":"ME Toplak","year":"2011","unstructured":"Toplak, M.E., West, R.F., Stanovich, K.E.: The Cognitive Reflection Test as a predictor of performance on heuristics and biases tasks. Mem. Cognit. 39, 1275\u20131289 (2011)","journal-title":"Mem. Cognit."},{"key":"16_CR13","doi-asserted-by":"publisher","unstructured":"Zhang, T., Morris, N,P., McNiel, D.E., Binder, R.: Elder Financial Exploitation in the Digital Age. J. Am. Acad. Psychiatr. Law (2023), JAAPL\u2013220047 (2023). https:\/\/doi.org\/10.29158\/JAAPL.220047\u201321","DOI":"10.29158\/JAAPL"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of IT for the Aged Population"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92712-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T22:06:53Z","timestamp":1748556413000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92712-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031927140","9783031927126"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92712-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2025.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}