{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T23:58:29Z","timestamp":1768003109197,"version":"3.49.0"},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T00:00:00Z","timestamp":1742342400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T00:00:00Z","timestamp":1742342400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004329","name":"Slovenian Research and Innovation Agency","doi-asserted-by":"crossref","award":["J5-3111"],"award-info":[{"award-number":["J5-3111"]}],"id":[{"id":"10.13039\/501100004329","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004329","name":"Slovenian Research and Innovation Agency","doi-asserted-by":"crossref","award":["J5-3111"],"award-info":[{"award-number":["J5-3111"]}],"id":[{"id":"10.13039\/501100004329","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004329","name":"Slovenian Research and Innovation Agency","doi-asserted-by":"crossref","award":["J5-3111"],"award-info":[{"award-number":["J5-3111"]}],"id":[{"id":"10.13039\/501100004329","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Adoption of smartphones by older adults (i.e., 65+ years old) is not fully understood, especially in relation to cybersecurity and cyberthreats. In this study, we focus on the perceived threat of cyberattacks (PT) as a potential barrier to smartphone adoption and use among older adults. The study also investigates the differences between users and non-users of smartphones, and the differences between older adults who are aware of smartphones and those who are not. We conducted a quantitative cross-sectional survey of older adults in Slovenia (N=535). The results of covariance-based structural equation modeling indicate consistent support for the associations of intention to use (ItU) with perceived usefulness (PU), subjective norm (SN) and attitude toward use (AtU), the association between ease of use (EoU) and PU, the association between hedonic motivation (HM) and AtU, and the association between smartphone technology anxiety (STA) and fear of use (FoU). Even though the negative association between PT and ItU was significant in the full sample, the non-user and the not aware subsamples, its role in adoption of smartphones among older adults remains puzzling. We uncovered significant positive associations between PT and AtU (except in the not aware subsample), and PT and PU which we could not fully explain. The results of our study provide some insights on how campaigns promoting smartphone adoption among older adults should focus on reducing STA, improving confidence in cybersecurity awareness, and emphasizing the PU of smartphones through practical, user-friendly training programs tailored to the needs of this population.<\/jats:p>","DOI":"10.1007\/s10207-025-01014-2","type":"journal-article","created":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:52:05Z","timestamp":1742385125000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Adoption of smartphones among older adults and the role of perceived threat of cyberattacks"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3485-5173","authenticated-orcid":false,"given":"Patrik","family":"Pucer","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5374-1609","authenticated-orcid":false,"given":"Bo\u0161tjan","family":"\u017dvanut","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6951-6369","authenticated-orcid":false,"given":"Simon","family":"Vrhovec","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,19]]},"reference":[{"key":"1014_CR1","unstructured":"United Nations Department of Economic and Social Affairs, Population Division: World population prospects 2022: Summary of results. Tech. rep., UN DESA\/POP\/2022\/TR\/NO. 3 (2022)"},{"key":"1014_CR2","unstructured":"Eurostat: Ageing Europe - statistics on population developments (2020). https:\/\/ec.europa.eu\/eurostat\/statistics-explained\/index.php?title=Ageing_Europe_-_statistics_on_population_developments#Older_people_.E2.80.94_population_overview"},{"key":"1014_CR3","unstructured":"Miheli\u010d, A., Vrhovec, S., Bernik, I., Domej, A., Fujs, D., Hovelja, T., Osolnik, S.K., Pucer, P., Vavpoti\u010d, D., \u017dvanut, B., Prislan, K.: Use of smart devices by the elderly: Nursing home residents in Slovenia. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 13(3), 68\u201380 (2022). https:\/\/doi.org\/10.22667\/JOWUA.2022.09.30.068"},{"issue":"1","key":"1014_CR4","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1057\/s41599-023-02221-9","volume":"10","author":"T Huang","year":"2023","unstructured":"Huang, T.: Using SOR framework to explore the driving factors of older adults smartphone use behavior. Humanities Soc. Sci. Commun. 10(1), 690 (2023). https:\/\/doi.org\/10.1057\/s41599-023-02221-9","journal-title":"Humanities Soc. Sci. Commun."},{"key":"1014_CR5","doi-asserted-by":"publisher","unstructured":"Yeh, T.F., Chang, Y.C., Yang, S.Y., Yang, C.C.: Effect of Successful Aging on Technology Acceptance: The Moderating Role of Selection, Optimization, and Compensation Strategies. Social Science Computer Review p. 08944393241258218 (2024). https:\/\/doi.org\/10.1177\/08944393241258218","DOI":"10.1177\/08944393241258218"},{"key":"1014_CR6","unstructured":"Bazen, A.: Cell phone statistics 2024 (2023). https:\/\/www.consumeraffairs.com\/cell_phones\/cell-phone-statistics.html"},{"key":"1014_CR7","unstructured":"Statistical Office of the Republic of Slovenia: SiStat database (2024). https:\/\/pxweb.stat.si\/SiStat\/en"},{"issue":"1","key":"1014_CR8","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s10209-022-00933-4","volume":"23","author":"X Zhu","year":"2024","unstructured":"Zhu, X., Cheng, X.: Staying connected: smartphone acceptance and use level differences of older adults in China. Univ. Access Inf. Soc. 23(1), 203\u2013212 (2024). https:\/\/doi.org\/10.1007\/s10209-022-00933-4","journal-title":"Univ. Access Inf. Soc."},{"key":"1014_CR9","doi-asserted-by":"publisher","unstructured":"McCosker, A., Bossio, D., Holcombe-James, I., Davis, H., Schleser, M., Gleeson, J.: 60+ online: Engaging seniors through social media and digital stories. Tech. rep., Swinburne University of Technology (2018). https:\/\/doi.org\/10.4225\/50\/5ACAC04852868","DOI":"10.4225\/50\/5ACAC04852868"},{"issue":"1","key":"1014_CR10","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MSEC.2021.3113726","volume":"20","author":"A Miheli\u010d","year":"2022","unstructured":"Miheli\u010d, A., \u017dvanut, B.: (In)secure smart device use among senior citizens. IEEE Secur. & Privacy 20(1), 62\u201371 (2022). https:\/\/doi.org\/10.1109\/MSEC.2021.3113726","journal-title":"IEEE Secur. & Privacy"},{"key":"1014_CR11","first-page":"1309","volume":"15","author":"P Tsatsou","year":"2021","unstructured":"Tsatsou, P.: Aging: the two faces of Janus in digital inclusion? Int. J. Commun. 15, 1309\u20131329 (2021)","journal-title":"Int. J. Commun."},{"issue":"1","key":"1014_CR12","doi-asserted-by":"publisher","DOI":"10.2196\/23313","volume":"4","author":"AA Portenhauser","year":"2021","unstructured":"Portenhauser, A.A., Terhorst, Y., Schultchen, D., Sander, L.B., Denkinger, M.D., Stach, M., Waldherr, N., Dallmeier, D., Baumeister, H., Messner, E.M.: Mobile apps for older adults: systematic search and evaluation within online stores. JMIR Aging 4(1), e23313 (2021). https:\/\/doi.org\/10.2196\/23313","journal-title":"JMIR Aging"},{"issue":"835927","key":"1014_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3389\/fcomp.2022.835927","volume":"4","author":"MT Harris","year":"2022","unstructured":"Harris, M.T., Blocker, K.A., Rogers, W.A.: Older adults and smart technology: facilitators and barriers to use. Front. Comput. Sci. 4(835927), 1\u201313 (2022). https:\/\/doi.org\/10.3389\/fcomp.2022.835927","journal-title":"Front. Comput. Sci."},{"issue":"1","key":"1014_CR14","doi-asserted-by":"publisher","DOI":"10.2196\/20427","volume":"9","author":"S Kim","year":"2021","unstructured":"Kim, S.: Exploring how older adults use a smart speaker-based voice assistant in their first interactions: qualitative study. JMIR Mhealth Uhealth 9(1), e20427 (2021). https:\/\/doi.org\/10.2196\/20427","journal-title":"JMIR Mhealth Uhealth"},{"issue":"4","key":"1014_CR15","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1177\/1357633X16649790","volume":"23","author":"CS Kruse","year":"2017","unstructured":"Kruse, C.S., Mileski, M., Moreno, J.: Mobile health solutions for the aging population: a systematic narrative analysis. J. Telemed. Telecare 23(4), 439\u2013451 (2017). https:\/\/doi.org\/10.1177\/1357633X16649790","journal-title":"J. Telemed. Telecare"},{"issue":"1","key":"1014_CR16","doi-asserted-by":"publisher","DOI":"10.2196\/21461","volume":"4","author":"HM LaMonica","year":"2021","unstructured":"LaMonica, H.M., Davenport, T.A., Roberts, A.E., Hickie, I.B.: Understanding technology preferences and requirements for health information technologies designed to improve and maintain the mental health and well-being of older adults: participatory design study. JMIR Aging 4(1), e21461 (2021). https:\/\/doi.org\/10.2196\/21461","journal-title":"JMIR Aging"},{"issue":"1","key":"1014_CR17","doi-asserted-by":"publisher","DOI":"10.2196\/mhealth.8619","volume":"6","author":"P Rasche","year":"2018","unstructured":"Rasche, P., Wille, M., Br\u00f6hl, C., Theis, S., Sch\u00e4fer, K., Knobe, M., Mertens, A.: Prevalence of health app use among older adults in Germany: national survey. JMIR Mhealth Uhealth 6(1), e8619 (2018). https:\/\/doi.org\/10.2196\/mhealth.8619","journal-title":"JMIR Mhealth Uhealth"},{"issue":"1","key":"1014_CR18","doi-asserted-by":"publisher","DOI":"10.2196\/41919","volume":"7","author":"J Zhu","year":"2023","unstructured":"Zhu, J., Weng, H., Ou, P., Li, L.: Use and acceptance of smart elderly care apps among chinese medical staff and older individuals: web-based hybrid survey study. JMIR Format. Res. 7(1), e41919 (2023). https:\/\/doi.org\/10.2196\/41919","journal-title":"JMIR Format. Res."},{"issue":"5","key":"1014_CR19","doi-asserted-by":"publisher","first-page":"1033","DOI":"10.1002\/hbe2.291","volume":"3","author":"B Morrison","year":"2021","unstructured":"Morrison, B., Coventry, L., Briggs, P.: How do older adults feel about engaging with cyber-security? Human behavior and emerging technologies 3(5), 1033\u20131049 (2021). https:\/\/doi.org\/10.1002\/hbe2.291","journal-title":"Human behavior and emerging technologies"},{"issue":"3","key":"1014_CR20","doi-asserted-by":"publisher","first-page":"245","DOI":"10.3934\/NAR.2023015","volume":"5","author":"M Huang","year":"2023","unstructured":"Huang, M., Ren, Y., Wang, X., Li, X., Li, L.: What affects the use of smartphones by the elderly? A hybrid survey from China. National Account. Rev. 5(3), 245\u2013260 (2023). https:\/\/doi.org\/10.3934\/NAR.2023015","journal-title":"National Account. Rev."},{"key":"1014_CR21","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/s12144-023-04309-6","volume":"43","author":"P Ren","year":"2024","unstructured":"Ren, P., Klausen, S.H.: Smartphone use, intergenerational support and older adults\u2019 wellbeing. Curr. Psychol. 43, 407\u2013424 (2024). https:\/\/doi.org\/10.1007\/s12144-023-04309-6","journal-title":"Curr. Psychol."},{"issue":"5","key":"1014_CR22","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1108\/LHT-12-2021-0432","volume":"41","author":"CC Yang","year":"2023","unstructured":"Yang, C.C., Liu, C., Wang, Y.S.: The acceptance and use of smartphones among older adults: differences in UTAUT determinants before and after training. Library Hi Tech 41(5), 1357\u20131375 (2023). https:\/\/doi.org\/10.1108\/LHT-12-2021-0432","journal-title":"Library Hi Tech"},{"key":"1014_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.smhl.2023.100435","volume":"31","author":"M Aranha","year":"2024","unstructured":"Aranha, M., Shemie, J., James, K., Deasy, C., Heavin, C.: Behavioural intention of mobile health adoption: a study of older adults presenting to the emergency department. Smart Health 31, 100435 (2024). https:\/\/doi.org\/10.1016\/j.smhl.2023.100435","journal-title":"Smart Health"},{"key":"1014_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2023.122319","volume":"189","author":"J Frishammar","year":"2023","unstructured":"Frishammar, J., Ess\u00e9n, A., Bergstr\u00f6m, F., Ekman, T.: Digital health platforms for the elderly? Key adoption and usage barriers and ways to address them. Technol. Forecast. Soc. Chang. 189, 122319 (2023). https:\/\/doi.org\/10.1016\/j.techfore.2023.122319","journal-title":"Technol. Forecast. Soc. Chang."},{"issue":"9","key":"1014_CR25","doi-asserted-by":"publisher","first-page":"380","DOI":"10.3390\/jrfm16090380","volume":"16","author":"R Jena","year":"2023","unstructured":"Jena, R.: Factors impacting senior citizens\u2019 adoption of E-banking post COVID-19 pandemic: an empirical study from India. J. Risk Financial Manag. 16(9), 380 (2023). https:\/\/doi.org\/10.3390\/jrfm16090380","journal-title":"J. Risk Financial Manag."},{"issue":"5","key":"1014_CR26","doi-asserted-by":"publisher","first-page":"1611","DOI":"10.1108\/INTR-10-2020-0586","volume":"31","author":"MS Talukder","year":"2021","unstructured":"Talukder, M.S., Laato, S., Islam, A.N., Bao, Y.: Continued use intention of wearable health technologies among the elderly: an enablers and inhibitors perspective. Internet Res. 31(5), 1611\u20131640 (2021). https:\/\/doi.org\/10.1108\/INTR-10-2020-0586","journal-title":"Internet Res."},{"issue":"12","key":"1014_CR27","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0295581","volume":"18","author":"T Huang","year":"2023","unstructured":"Huang, T.: Expanding the UTAUT2 framework to determine the drivers of mobile shopping behaviour among older adults. PLoS One 18(12), e0295581 (2023). https:\/\/doi.org\/10.1371\/journal.pone.0295581","journal-title":"PLoS One"},{"issue":"3","key":"1014_CR28","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1177\/0266666919854164","volume":"36","author":"MA Jarvis","year":"2020","unstructured":"Jarvis, M.A., Sartorius, B., Chipps, J.: Technology acceptance of older persons living in residential care. Inf. Dev. 36(3), 339\u2013353 (2020). https:\/\/doi.org\/10.1177\/0266666919854164","journal-title":"Inf. Dev."},{"key":"1014_CR29","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.gerinurse.2022.09.004","volume":"48","author":"T Ma","year":"2022","unstructured":"Ma, T., Zhang, S., Zhu, S., Ni, J., Wu, Q., Liu, M.: The new role of nursing in digital inclusion: reflections on smartphone use and willingness to increase digital skills among Chinese older adults. Geriatr. Nurs. 48, 118\u2013126 (2022). https:\/\/doi.org\/10.1016\/j.gerinurse.2022.09.004","journal-title":"Geriatr. Nurs."},{"key":"1014_CR30","doi-asserted-by":"publisher","unstructured":"Gallo, A.M., Laranjeira, C., Ara\u00fajo, J.P., Marques, F.R.D.M., Baccon, W.C., Salci, M.A., Carreira, L.: The experiences of daily smartphone use among older adults in Brazil: A grounded theory analysis. Heliyon 10(15) (2024). https:\/\/doi.org\/10.1016\/j.heliyon.2024.e35120","DOI":"10.1016\/j.heliyon.2024.e35120"},{"key":"1014_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106783","volume":"121","author":"PA Busch","year":"2021","unstructured":"Busch, P.A., Hausvik, G.I., Ropstad, O.K., Pettersen, D.: Smartphone usage among older adults. Comput. Hum. Behav. 121, 106783 (2021). https:\/\/doi.org\/10.1016\/j.chb.2021.106783","journal-title":"Comput. Hum. Behav."},{"key":"1014_CR32","doi-asserted-by":"publisher","DOI":"10.1016\/j.archger.2022.104706","volume":"101","author":"M Morikawa","year":"2022","unstructured":"Morikawa, M., Lee, S., Makino, K., Bae, S., Chiba, I., Harada, K., Tomida, K., Katayama, O., Shimada, H.: Association of social isolation and smartphone use on cognitive functions. Arch. Gerontol. Geriatr. 101, 104706 (2022). https:\/\/doi.org\/10.1016\/j.archger.2022.104706","journal-title":"Arch. Gerontol. Geriatr."},{"issue":"8","key":"1014_CR33","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","volume":"35","author":"FD Davis","year":"1989","unstructured":"Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manage. Sci. 35(8), 982\u20131003 (1989). https:\/\/doi.org\/10.1287\/mnsc.35.8.982","journal-title":"Manage. Sci."},{"issue":"3","key":"1014_CR34","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1111\/j.1540-5915.1996.tb01822.x","volume":"27","author":"V Venkatesh","year":"1996","unstructured":"Venkatesh, V., Davis, F.D.: A model of the antecedents of perceived ease of use: development and test. Decis. Sci. 27(3), 451\u2013481 (1996). https:\/\/doi.org\/10.1111\/j.1540-5915.1996.tb01822.x","journal-title":"Decis. Sci."},{"key":"1014_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103258","volume":"130","author":"J Lenz","year":"2023","unstructured":"Lenz, J., Bozakov, Z., Wendzel, S., Vrhovec, S.: Why people replace their aging smart devices: a push-pull-mooring perspective. Comput. & Secur. 130, 103258 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103258","journal-title":"Comput. & Secur."},{"issue":"2","key":"1014_CR36","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manage. Sci. 46(2), 186\u2013204 (2000). https:\/\/doi.org\/10.1287\/mnsc.46.2.186.11926","journal-title":"Manage. Sci."},{"key":"1014_CR37","doi-asserted-by":"publisher","unstructured":"Conci, M., Pianesi, F., Zancanaro, M.: Useful, Social and Enjoyable: Mobile Phone Adoption by Older People. In: T.\u00a0Gross, J.\u00a0Gulliksen, P.\u00a0Kotz\u00e9, L.\u00a0Oestreicher, P.\u00a0Palanque, R.O. Prates, M.\u00a0Winckler (eds.) Human-Computer Interaction - INTERACT 2009, vol. 5726, pp. 63\u201376. Springer Berlin Heidelberg, Berlin, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03655-2_7","DOI":"10.1007\/978-3-642-03655-2_7"},{"issue":"2","key":"1014_CR38","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10209-018-0642-4","volume":"19","author":"H Guner","year":"2020","unstructured":"Guner, H., Acarturk, C.: The use and acceptance of ICT by senior citizens: a comparison of technology acceptance model (TAM) for elderly and young adults. Univ. Access Inf. Soc. 19(2), 311\u2013330 (2020). https:\/\/doi.org\/10.1007\/s10209-018-0642-4","journal-title":"Univ. Access Inf. Soc."},{"issue":"4","key":"1014_CR39","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/s10209-009-0178-8","volume":"9","author":"LUS Nayak","year":"2010","unstructured":"Nayak, L.U.S., Priest, L., White, A.P.: An application of the technology acceptance model to the level of Internet usage by older adults. Univ. Access Inf. Soc. 9(4), 367\u2013374 (2010). https:\/\/doi.org\/10.1007\/s10209-009-0178-8","journal-title":"Univ. Access Inf. Soc."},{"issue":"1","key":"1014_CR40","doi-asserted-by":"publisher","DOI":"10.2196\/26652","volume":"24","author":"C Domingos","year":"2022","unstructured":"Domingos, C., Costa, P., Santos, N.C., P\u00eago, J.M.: Usability, acceptability, and satisfaction of a wearable activity tracker in older adults: observational study in a real-life context in Northern Portugal. J. Med. Internet Res. 24(1), e26652 (2022). https:\/\/doi.org\/10.2196\/26652","journal-title":"J. Med. Internet Res."},{"issue":"5","key":"1014_CR41","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1080\/00140139.2014.895855","volume":"57","author":"K Chen","year":"2014","unstructured":"Chen, K., Chan, A.H.S.: Gerontechnology acceptance by elderly Hong Kong Chinese: a senior technology acceptance model (STAM). Ergonomics 57(5), 635\u2013652 (2014). https:\/\/doi.org\/10.1080\/00140139.2014.895855","journal-title":"Ergonomics"},{"issue":"2","key":"1014_CR42","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1108\/QAOA-06-2023-0042","volume":"25","author":"EA Revollo Sarmiento","year":"2024","unstructured":"Revollo Sarmiento, E.A., Krzemien, D., L\u00f3pez Moreno, M.C., Vivas, L.: Perceptions of older people about the use of cell phones in Argentina: a contribution from the gerontotechnological perspective. Quality in Age. Older Adults 25(2), 109\u2013121 (2024). https:\/\/doi.org\/10.1108\/QAOA-06-2023-0042","journal-title":"Quality in Age. Older Adults"},{"key":"1014_CR43","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2021.103381","volume":"93","author":"K Chen","year":"2021","unstructured":"Chen, K., Lou, V.W.Q., Lo, S.S.C.: Exploring the acceptance of tablets usage for cognitive training among older people with cognitive impairments: a mixed-methods study. Appl. Ergon. 93, 103381 (2021). https:\/\/doi.org\/10.1016\/j.apergo.2021.103381","journal-title":"Appl. Ergon."},{"key":"1014_CR44","doi-asserted-by":"publisher","unstructured":"Cerda\u00a0D\u00edez, M.F., Ureta, M.D.P., Pavez, I., Benavides, C., Inostroza-Quezada, I., Epstein, L.D.: Access, use and attitudes regarding information and communication technologies among older adults during the COVID-19 pandemic. REVISTA ESPA$$\\tilde{\\rm N}$$OLA DE COMUNICACI\u00d3N EN SALUD 14(2), 7\u201320 (2023). https:\/\/doi.org\/10.20318\/recs.2023.7375","DOI":"10.20318\/recs.2023.7375"},{"key":"1014_CR45","doi-asserted-by":"publisher","first-page":"623","DOI":"10.3389\/fpsyg.2020.00623","volume":"11","author":"BA Morrison","year":"2020","unstructured":"Morrison, B.A., Coventry, L., Briggs, P.: Technological change in the retirement transition and the implications for cybersecurity vulnerability in older adults. Front. Psychol. 11, 623 (2020). https:\/\/doi.org\/10.3389\/fpsyg.2020.00623","journal-title":"Front. Psychol."},{"key":"1014_CR46","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1016\/j.ijinfomgt.2017.08.006","volume":"43","author":"Y Zhao","year":"2018","unstructured":"Zhao, Y., Ni, Q., Zhou, R.: What factors influence the mobile health service adoption? A meta-analysis and the moderating role of age. Int. J. Inf. Manage. 43, 342\u2013350 (2018). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2017.08.006","journal-title":"Int. J. Inf. Manage."},{"key":"1014_CR47","doi-asserted-by":"publisher","unstructured":"Vrhovec, S., Bernik, I., Fujs, D., Vavpoti\u010d, D.: Cybersecurity competence of older adult users of mobile devices. In: European Interdisciplinary Cybersecurity Conference, pp. 221\u2013223. ACM, Xanthi, Greece (2024). https:\/\/doi.org\/10.1145\/3655693.3656551","DOI":"10.1145\/3655693.3656551"},{"issue":"5","key":"1014_CR48","first-page":"267","volume":"86","author":"E Lutolli","year":"2019","unstructured":"Lutolli, E., Vrhovec, S.: Adoption of smarthome devices: blinded by benefits, ignoring the dangers? Elektrotehni\u0161ki vestnik \/ Electrotechnical Review 86(5), 267\u2013273 (2019)","journal-title":"Elektrotehni\u0161ki vestnik \/ Electrotechnical Review"},{"issue":"1","key":"1014_CR49","doi-asserted-by":"publisher","first-page":"111","DOI":"10.4036\/iis.2016.R.05","volume":"22","author":"PC Lai","year":"2016","unstructured":"Lai, P.C.: Design and Security impact on consumers\u2019 intention to use single platform E-payment. Interdiscip. Inf. Sci. 22(1), 111\u2013122 (2016). https:\/\/doi.org\/10.4036\/iis.2016.R.05","journal-title":"Interdiscip. Inf. Sci."},{"key":"1014_CR50","doi-asserted-by":"publisher","unstructured":"Jelov\u010dan, L., Fujs, D., Vrhovec, S., Miheli\u010d, A.: The role of information sensitivity in adoption of E2EE communication software. In: Proceedings of the European Interdisciplinary Cybersecurity Conference, pp. 1\u20132. ACM, Rennes France (2020). https:\/\/doi.org\/10.1145\/3424954.3424967","DOI":"10.1145\/3424954.3424967"},{"key":"1014_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103038","volume":"125","author":"S Vrhovec","year":"2023","unstructured":"Vrhovec, S., Bernik, I., Markelj, B.: Explaining information seeking intentions: insights from a Slovenian social engineering awareness campaign. Comput. & Secur. 125, 103038 (2023). https:\/\/doi.org\/10.1016\/j.cose.2022.103038","journal-title":"Comput. & Secur."},{"issue":"07","key":"1014_CR52","doi-asserted-by":"publisher","first-page":"394","DOI":"10.17705\/1jais.00232","volume":"11","author":"H Liang","year":"2010","unstructured":"Liang, H., Xue, Y.: Understanding security behaviors in personal computer usage: a threat avoidance perspective. J. Assoc. Inf. Syst. 11(07), 394\u2013413 (2010). https:\/\/doi.org\/10.17705\/1jais.00232","journal-title":"J. Assoc. Inf. Syst."},{"key":"1014_CR53","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.chb.2016.11.018","volume":"68","author":"A Burns","year":"2017","unstructured":"Burns, A., Posey, C., Roberts, T.L., Benjamin Lowry, P.: Examining the relationship of organizational insiders\u2019 psychological capital with information security threat and coping appraisals. Comput. Hum. Behav. 68, 190\u2013209 (2017). https:\/\/doi.org\/10.1016\/j.chb.2016.11.018","journal-title":"Comput. Hum. Behav."},{"issue":"5","key":"1014_CR54","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/0022-1031(83)90023-9","volume":"19","author":"JE Maddux","year":"1983","unstructured":"Maddux, J.E., Rogers, R.W.: Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change. J. Exp. Soc. Psychol. 19(5), 469\u2013479 (1983). https:\/\/doi.org\/10.1016\/0022-1031(83)90023-9","journal-title":"J. Exp. Soc. Psychol."},{"key":"1014_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102309","volume":"106","author":"S Vrhovec","year":"2021","unstructured":"Vrhovec, S., Miheli\u010d, A.: Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation. Comput. & Secur. 106, 102309 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102309","journal-title":"Comput. & Secur."},{"issue":"4","key":"1014_CR56","doi-asserted-by":"publisher","first-page":"467","DOI":"10.13052\/jcsm2245-1439.844","volume":"8","author":"D Fujs","year":"2019","unstructured":"Fujs, D., Miheli\u010d, A., Vrhovec, S.: Social network self-protection model: what motivates users to self-protect? J. Cyber Secur. Mob. 8(4), 467\u2013492 (2019). https:\/\/doi.org\/10.13052\/jcsm2245-1439.844","journal-title":"J. Cyber Secur. Mob."},{"issue":"2","key":"1014_CR57","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1111\/deci.12328","volume":"50","author":"AC Johnston","year":"2019","unstructured":"Johnston, A.C., Warkentin, M., Dennis, A.R., Siponen, M.: Speak their language: designing effective messages to improve employees\u2019 information security decision making. Decis. Sci. 50(2), 245\u2013284 (2019). https:\/\/doi.org\/10.1111\/deci.12328","journal-title":"Decis. Sci."},{"key":"1014_CR58","doi-asserted-by":"publisher","unstructured":"Miheli\u010d, A., Bernik, I., Vrhovec, S.: Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks. In: European Interdisciplinary Cybersecurity Conference, pp. 189\u2013190. ACM, Stavanger Norway (2023). https:\/\/doi.org\/10.1145\/3590777.3590814","DOI":"10.1145\/3590777.3590814"},{"key":"1014_CR59","doi-asserted-by":"publisher","unstructured":"Murko, A., Vrhovec, S.L.R.: Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does. In: Proceedings of the Third Central European Cybersecurity Conference, pp. 1\u20136. ACM, Munich Germany (2019). https:\/\/doi.org\/10.1145\/3360664.3360679","DOI":"10.1145\/3360664.3360679"},{"issue":"1","key":"1014_CR60","doi-asserted-by":"publisher","first-page":"157","DOI":"10.2307\/41410412","volume":"36","author":"Thong Venkatesh","year":"2012","unstructured":"Venkatesh, Thong: Xu: consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q. 36(1), 157 (2012). https:\/\/doi.org\/10.2307\/41410412","journal-title":"MIS Q."},{"issue":"3","key":"1014_CR61","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.apmrv.2021.01.001","volume":"26","author":"ME Ellis","year":"2021","unstructured":"Ellis, M.E., Downey, J.P., Chen, A.N., Lu, H.K.: Why Taiwanese seniors use technology. Asia Pac. Manag. Rev. 26(3), 149\u2013159 (2021). https:\/\/doi.org\/10.1016\/j.apmrv.2021.01.001","journal-title":"Asia Pac. Manag. Rev."},{"issue":"10","key":"1014_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0312266","volume":"19","author":"S Vrhovec","year":"2024","unstructured":"Vrhovec, S., Markelj, B.: We need to aim at the top: factors associated with cybersecurity awareness of cyber and information security decision-makers. PLoS One 19(10), 1\u201327 (2024). https:\/\/doi.org\/10.1371\/journal.pone.0312266","journal-title":"PLoS One"},{"key":"1014_CR63","unstructured":"Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E.: Multivariate Data Analysis. Always learning Prentice Hall, (2010)"},{"issue":"4","key":"1014_CR64","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1037\/0021-843X.112.4.545","volume":"112","author":"PD Allison","year":"2003","unstructured":"Allison, P.D.: Missing data techniques for structural equation modeling. J. Abnorm. Psychol. 112(4), 545\u2013557 (2003). https:\/\/doi.org\/10.1037\/0021-843X.112.4.545","journal-title":"J. Abnorm. Psychol."},{"issue":"1","key":"1014_CR65","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0297037","volume":"19","author":"LB Amusa","year":"2024","unstructured":"Amusa, L.B., Hossana, T.: An empirical comparison of some missing data treatments in PLS-SEM. PLoS One 19(1), 1\u201314 (2024). https:\/\/doi.org\/10.1371\/journal.pone.0297037","journal-title":"PLoS One"},{"issue":"11","key":"1014_CR66","doi-asserted-by":"publisher","first-page":"1933","DOI":"10.1038\/s41562-023-01705-7","volume":"7","author":"D Krpan","year":"2023","unstructured":"Krpan, D., Booth, J.E., Damien, A.: The positive-negative-competence (PNC) model of psychological responses to representations of robots. Nat. Hum. Behav. 7(11), 1933\u20131954 (2023). https:\/\/doi.org\/10.1038\/s41562-023-01705-7","journal-title":"Nat. Hum. Behav."},{"issue":"2","key":"1014_CR67","doi-asserted-by":"publisher","first-page":"iii","DOI":"10.2307\/23044042","volume":"35","author":"D Gefen","year":"2011","unstructured":"Gefen, D., Rigdon, E.E., Straub, D.: Editor\u2019s comments: An update and extension to SEM guidelines for administrative and social science research. MIS Q. 35(2), iii\u2013xiv (2011). https:\/\/doi.org\/10.2307\/23044042","journal-title":"MIS Q."},{"key":"1014_CR68","doi-asserted-by":"publisher","unstructured":"Hair, J.F., Matthews, L.M., Matthews, R.L., Sarstedt, M.: PLS-SEM or CB-SEM: updated guidelines on which method to use. Int. J. Multivariate Data Anal. 1(2), 107\u2013123 (2017). https:\/\/doi.org\/10.1504\/IJMDA.2017.087624","DOI":"10.1504\/IJMDA.2017.087624"},{"key":"1014_CR69","doi-asserted-by":"publisher","unstructured":"Hu, L.T., Bentler, P.M.: Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives. Struct. Equ. Model.: a Multidisciplinary J. 6(1), 1\u201355 (1999). https:\/\/doi.org\/10.1080\/10705519909540118","DOI":"10.1080\/10705519909540118"},{"issue":"11","key":"1014_CR70","doi-asserted-by":"publisher","first-page":"3462","DOI":"10.1108\/IJCHM-11-2017-0753","volume":"30","author":"A Usakli","year":"2018","unstructured":"Usakli, A., Kucukergin, K.G.: Using partial least squares structural equation modeling in hospitality and tourism: do researchers follow practical guidelines? Int. J. Contemp. Hosp. Manag. 30(11), 3462\u20133512 (2018). https:\/\/doi.org\/10.1108\/IJCHM-11-2017-0753","journal-title":"Int. J. Contemp. Hosp. Manag."},{"issue":"1","key":"1014_CR71","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/EBR-11-2018-0203","volume":"31","author":"JF Hair","year":"2019","unstructured":"Hair, J.F., Risher, J.J., Sarstedt, M., Ringle, C.M.: When to use and how to report the results of PLS-SEM. Eur. Bus. Rev. 31(1), 2\u201324 (2019). https:\/\/doi.org\/10.1108\/EBR-11-2018-0203","journal-title":"Eur. Bus. Rev."},{"key":"1014_CR72","doi-asserted-by":"publisher","unstructured":"Hayes, T.: R-squared change in structural equation models with latent variables and missing data. Behav. Res. Methods 53(5), 2127\u20132157 (2021). https:\/\/doi.org\/10.3758\/s13428-020-01532-y","DOI":"10.3758\/s13428-020-01532-y"},{"key":"1014_CR73","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1016\/j.chb.2017.06.013","volume":"75","author":"IM Macedo","year":"2017","unstructured":"Macedo, I.M.: Predicting the acceptance and use of information and communication technology by older adults: an empirical examination of the revised UTAUT2. Comput. Hum. Behav. 75, 935\u2013948 (2017). https:\/\/doi.org\/10.1016\/j.chb.2017.06.013","journal-title":"Comput. Hum. Behav."},{"key":"1014_CR74","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.apergo.2018.10.006","volume":"75","author":"J Li","year":"2019","unstructured":"Li, J., Ma, Q., Chan, A.H., Man, S.: Health monitoring through wearable technologies for older adults: smart wearables acceptance model. Appl. Ergon. 75, 162\u2013169 (2019). https:\/\/doi.org\/10.1016\/j.apergo.2018.10.006","journal-title":"Appl. Ergon."},{"issue":"5","key":"1014_CR75","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1016\/j.chb.2010.03.015","volume":"26","author":"S Pan","year":"2010","unstructured":"Pan, S., Jordan-Marsh, M.: Internet use intention and adoption among Chinese older adults: from the expanded technology acceptance model perspective. Comput. Hum. Behav. 26(5), 1111\u20131119 (2010). https:\/\/doi.org\/10.1016\/j.chb.2010.03.015","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"1014_CR76","doi-asserted-by":"publisher","first-page":"285","DOI":"10.25300\/MISQ\/2018\/13853","volume":"42","author":"GD Moody","year":"2018","unstructured":"Moody, G.D., Siponen, M., Pahnila, S.: Toward a unified model of information security policy compliance. MIS Q. 42(1), 285\u2013311 (2018). https:\/\/doi.org\/10.25300\/MISQ\/2018\/13853","journal-title":"MIS Q."},{"issue":"4","key":"1014_CR77","doi-asserted-by":"publisher","first-page":"224","DOI":"10.4017\/gt.2016.14.4.005.00","volume":"14","author":"S Joseph","year":"2016","unstructured":"Joseph, S., Teh, P.L., Chan, A.H., Ahmed, P.K., Cheong, S.N., Yap, W.J.: Gerontechnology usage and acceptance model (GUAM): a qualitative study of Chinese older adults in Malaysia. Gerontechnology 14(4), 224\u2013238 (2016). https:\/\/doi.org\/10.4017\/gt.2016.14.4.005.00","journal-title":"Gerontechnology"},{"key":"1014_CR78","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.ijmedinf.2016.03.002","volume":"90","author":"M Cimperman","year":"2016","unstructured":"Cimperman, M., Makovec Bren\u010di\u010d, M., Trkman, P.: Analyzing older users\u2019 home telehealth services acceptance behavior-applying an Extended UTAUT model. Int. J. Med. Inform. 90, 22\u201331 (2016). https:\/\/doi.org\/10.1016\/j.ijmedinf.2016.03.002","journal-title":"Int. J. Med. Inform."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01014-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01014-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01014-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:10:44Z","timestamp":1750500644000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01014-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,19]]},"references-count":78,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1014"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01014-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,19]]},"assertion":[{"value":"19 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This study involved human participants. Therefore, the study proposal was submitted into consideration to an institutional review board. The study proposal was deemed as ethically acceptable and in compliance with the Code of Ethics and Integrity for Researchers at the University of Maribor by the Research Ethics Committee at the Faculty of Criminal Justice and Security at the University of Maribor on 27 February 2023 [2702A-2023]. Written informed consent was obtained from the participants.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"101"}}