{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:33:33Z","timestamp":1776094413889,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/R044929\/1"],"award-info":[{"award-number":["EP\/R044929\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445078","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T05:53:19Z","timestamp":1620453199000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":41,"title":["Training and Embedding Cybersecurity Guardians in Older Communities."],"prefix":"10.1145","author":[{"given":"James","family":"Nicholson","sequence":"first","affiliation":[{"name":"NorSC Lab Northumbria University, United Kingdom"}]},{"given":"Ben","family":"Morrison","sequence":"additional","affiliation":[{"name":"University of Sunderland, United Kingdom"}]},{"given":"Matt","family":"Dixon","sequence":"additional","affiliation":[{"name":"PaCT Lab Northumbria University, United Kingdom"}]},{"given":"Jack","family":"Holt","sequence":"additional","affiliation":[{"name":"Open Lab Newcastle University, United Kingdom"}]},{"given":"Lynne","family":"Coventry","sequence":"additional","affiliation":[{"name":"PactLab, Department of Psychology, Faculty of Health and Life Sciences Northumbria University, United Kingdom"}]},{"given":"Jill","family":"McGlasson","sequence":"additional","affiliation":[{"name":"NorSC Lab Northumbria University, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Only the tip of the iceberg: Fraud against older people","author":"UK.","year":"2018","unstructured":"Age UK. 2015. Only the tip of the iceberg: Fraud against older people . Age UK. Retrieved August 7, 2018 from https:\/\/www.ageuk.org.uk\/documents\/en-gb\/for-professionals\/consumer-issues\/age%20uk%20only%20the%20tip%20of%20the%20iceberg%20april%202015.pdf?dtrk=true AgeUK. 2015. Only the tip of the iceberg: Fraud against older people. AgeUK. Retrieved August 7, 2018 from https:\/\/www.ageuk.org.uk\/documents\/en-gb\/for-professionals\/consumer-issues\/age%20uk%20only%20the%20tip%20of%20the%20iceberg%20april%202015.pdf?dtrk=true"},{"key":"e_1_3_2_2_2_1","volume-title":"Retrieved","author":"UK.","year":"2019","unstructured":"Age UK. 2019 . Older person becomes victim of fraud every 40 seconds . Retrieved March 12, 2020 from https:\/\/www.ageuk.org.uk\/latest-press\/articles\/2019\/july\/older-person-becomes-fraud-victim-every-40-seconds\/ AgeUK. 2019. Older person becomes victim of fraud every 40 seconds. Retrieved March 12, 2020 from https:\/\/www.ageuk.org.uk\/latest-press\/articles\/2019\/july\/older-person-becomes-fraud-victim-every-40-seconds\/"},{"key":"e_1_3_2_2_3_1","first-page":"1463","article-title":"Knowledge of Cybercrime among Elderly","volume":"4","author":"Arfi Nabat","year":"2013","unstructured":"Nabat Arfi and Shalini Agarwal . 2013 . Knowledge of Cybercrime among Elderly . International Journal of Scientific & Engineering Research 4 , 7: 1463 \u2013 1468 . Nabat Arfi and Shalini Agarwal. 2013. Knowledge of Cybercrime among Elderly. International Journal of Scientific & Engineering Research 4, 7: 1463\u20131468.","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/0733464817737621"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-811272-4.00008-7"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1579076"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.6853"},{"key":"e_1_3_2_2_8_1","volume-title":"Sexually Transmitted Disease Surveillance","author":"Centers for Disease Control and Prevention. 2018.","year":"2017","unstructured":"Centers for Disease Control and Prevention. 2018. Sexually Transmitted Disease Surveillance 2017 . U.S. Department of Health and Human Services . Retrieved from https:\/\/www.cdc.gov\/std\/stats17\/2017-STD-Surveillance-Report_CDC-clearance-9.10.18.pdf Centers for Disease Control and Prevention. 2018. Sexually Transmitted Disease Surveillance 2017. U.S. Department of Health and Human Services. Retrieved from https:\/\/www.cdc.gov\/std\/stats17\/2017-STD-Surveillance-Report_CDC-clearance-9.10.18.pdf"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.2307\/2094589"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2015.23"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"key":"e_1_3_2_2_12_1","volume-title":"The Effect of Social Influence on Security Sensitivity. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS)","author":"Das Sauvik","year":"2014","unstructured":"Sauvik Das , Tiffany Hyun-Jin Kim , Laura A Dabbish , and Jason I Hong . 2014 . The Effect of Social Influence on Security Sensitivity. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2014, 15. Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The Effect of Social Influence on Security Sensitivity. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2014, 15."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173575"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814538648"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/026975809600400201"},{"key":"e_1_3_2_2_16_1","volume-title":"How Cybersecurity Advocates Overcome Negative Perceptions of Security. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS)","author":"Lutters Julie","year":"2018","unstructured":"Julie Haney M. and Wayne G. Lutters . 2018. \u201cIt's Scary\u2026It's Confusing\u2026It's Dull \u201d: How Cybersecurity Advocates Overcome Negative Perceptions of Security. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2018 . Julie Haney M. and Wayne G. Lutters. 2018. \u201cIt's Scary\u2026It's Confusing\u2026It's Dull\u201d: How Cybersecurity Advocates Overcome Negative Perceptions of Security. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2018."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322385.3322388"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005384523305"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1057\/cpcs.2012.14"},{"key":"e_1_3_2_2_20_1","volume-title":"Retrieved","author":"Hughes Trevor","year":"2018","unstructured":"Trevor Hughes . More fraudsters are scamming senior citizens through technology \u2014 and it's costing them millions. usatoday . Retrieved September 16, 2018 from https:\/\/www.usatoday.com\/story\/money\/personalfinance\/2018\/03\/17\/more-fraudsters-scamming-senior-citizens-through-technology-and-its-costing-them-millions\/428406002\/ Trevor Hughes. More fraudsters are scamming senior citizens through technology \u2014 and it's costing them millions. usatoday. Retrieved September 16, 2018 from https:\/\/www.usatoday.com\/story\/money\/personalfinance\/2018\/03\/17\/more-fraudsters-scamming-senior-citizens-through-technology-and-its-costing-them-millions\/428406002\/"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818787348"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/1460458216661863"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.77.6.1121"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2013010101"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1177\/0741713613513633"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193120805202603"},{"key":"e_1_3_2_2_27_1","volume-title":"Password Guidance: Simplifying Your Approach","author":"National Cyber Security Centre.","year":"2018","unstructured":"National Cyber Security Centre. Password Guidance: Simplifying Your Approach . National Cyber Security Centre . Retrieved September 20, 2018 from https:\/\/www.ncsc.gov.uk\/guidance\/password-guidance-simplifying-your-approach National Cyber Security Centre. Password Guidance: Simplifying Your Approach. National Cyber Security Centre. Retrieved September 20, 2018 from https:\/\/www.ncsc.gov.uk\/guidance\/password-guidance-simplifying-your-approach"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300579"},{"key":"e_1_3_2_2_29_1","first-page":"10","article-title":"Investigating Teenagers\u2019 Ability to Detect Phishing Messages","volume":"2020","author":"Nicholson James","year":"2020","unstructured":"James Nicholson , Yousra Javed , Matt Dixon , Lynne Coventry , Opeyemi Dele-Ajayi , and Philip Anderson . 2020 . Investigating Teenagers\u2019 Ability to Detect Phishing Messages . IEEE EuroUSEC 2020 : 10 . James Nicholson, Yousra Javed, Matt Dixon, Lynne Coventry, Opeyemi Dele-Ajayi, and Philip Anderson. 2020. Investigating Teenagers\u2019 Ability to Detect Phishing Messages. IEEE EuroUSEC 2020: 10.","journal-title":"IEEE EuroUSEC"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3393914.3395871"},{"key":"e_1_3_2_2_31_1","volume-title":"In Proceedings of Symposium on Usable Privacy and Security (SOUPS)","author":"Nthala Norbert","year":"2018","unstructured":"Norbert Nthala and Ivan Flechais . 2018 . Informal Support Networks: an investigation into Home Data Security Practices . In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2018, 20. Norbert Nthala and Ivan Flechais. 2018. Informal Support Networks: an investigation into Home Data Security Practices. In In Proceedings of Symposium on Usable Privacy and Security (SOUPS) 2018, 20."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/2055207620905422"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-17584"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300664"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.d5219"},{"key":"e_1_3_2_2_36_1","volume-title":"Promoting civic engagement in later life through the Touchstone Programme: a resource and research guide","author":"Scharf Thomas","unstructured":"Thomas Scharf , Bernard McDonald , and Ann Marie Atkins . 2016. Promoting civic engagement in later life through the Touchstone Programme: a resource and research guide . Galway : Irish Centre for Social Gerontology . Thomas Scharf, Bernard McDonald, and Ann Marie Atkins. 2016. Promoting civic engagement in later life through the Touchstone Programme: a resource and research guide. Galway: Irish Centre for Social Gerontology."},{"key":"e_1_3_2_2_37_1","unstructured":"Joseph J Simons Noah Joshua Phillips Rohit Chopra Rebecca Kelly Slaughter and Christine S Wilson. Protecting Older Consumers. Federal Trade Commission.  Joseph J Simons Noah Joshua Phillips Rohit Chopra Rebecca Kelly Slaughter and Christine S Wilson. Protecting Older Consumers. Federal Trade Commission."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11205-012-0097-6"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12888-018-1736-5"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174066"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376605"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064857.3079135"},{"key":"e_1_3_2_2_43_1","first-page":"10","article-title":"Communities of Practice: Learning as a Social System","volume":"9","author":"Wenger Etienne","year":"1998","unstructured":"Etienne Wenger . 1998 . Communities of Practice: Learning as a Social System . Systems Thinker 9 , 5: 10 . Etienne Wenger. 1998. Communities of Practice: Learning as a Social System. Systems Thinker 9, 5: 10.","journal-title":"Systems Thinker"},{"key":"e_1_3_2_2_44_1","volume-title":"USENIX Security Symposium, 15","author":"Whitten Alma","year":"1999","unstructured":"Alma Whitten and J D Tygar . 1999 . Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 . In USENIX Security Symposium, 15 . Alma Whitten and J D Tygar. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In USENIX Security Symposium, 15."},{"key":"e_1_3_2_2_45_1","volume-title":"Global Burden Disease Report","author":"World Health Organization","year":"2020","unstructured":"World Health Organization . 2004. Global Burden Disease Report . World Health Organization . Retrieved September 14, 2020 from https:\/\/www.who.int\/healthinfo\/global_burden_disease\/GBD_report_2004update_part4.pdf World Health Organization. 2004. Global Burden Disease Report. World Health Organization. Retrieved September 14, 2020 from https:\/\/www.who.int\/healthinfo\/global_burden_disease\/GBD_report_2004update_part4.pdf"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445078","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445078","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:30Z","timestamp":1750195710000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445078"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":45,"alternative-id":["10.1145\/3411764.3445078","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445078","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}