{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:48:27Z","timestamp":1776120507634,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Singapore National Research Foundation under the National Satellite of Excellence in Mobile Systems Security and Cloud Security","award":["NRF2018NCR-NSOE004-0001"],"award-info":[{"award-number":["NRF2018NCR-NSOE004-0001"]}]},{"name":"ICRC ? Blavatnik Interdisciplinary Cyber Research Center","award":["590713"],"award-info":[{"award-number":["590713"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,9,27]]},"DOI":"10.1145\/3447526.3472047","type":"proceedings-article","created":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T19:26:52Z","timestamp":1632166012000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["An Exploratory Study of Social Support Systems to Help Older Adults in Managing Mobile Safety"],"prefix":"10.1145","author":[{"given":"Tamir","family":"Mendel","sequence":"first","affiliation":[{"name":"Industrial Engineering Tel Aviv University, Israel"}]},{"given":"Debin","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Information Systems Singapore Management University, Singapore"}]},{"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"School of Information Systems Singapore Management University, Singapore"}]},{"given":"Eran","family":"Toch","sequence":"additional","affiliation":[{"name":"IWiT Lab Tel Aviv University, Israel"}]}],"member":"320","published-online":{"date-parts":[[2021,9,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Only the tip of the iceberg: Fraud against older people We' re Age UK. Evid. Rev. April","author":"UK.","year":"2015","unstructured":"Age- UK. 2015. Only the tip of the iceberg: Fraud against older people We' re Age UK. Evid. Rev. April ( 2015 ). Age-UK. 2015. Only the tip of the iceberg: Fraud against older people We' re Age UK. Evid. Rev. April (2015)."},{"key":"e_1_3_2_1_2_1","volume-title":"Designing a Mobile Application to Support Social Processes for Privacy Decisions. February","author":"Aljallad Zaina","year":"2019","unstructured":"Zaina Aljallad , Wentao Guo , Chhaya Chouhan , Christy Laperriere , Jess Kropczynski , Pamela Wisnewski , and Heather Lipford . 2019. Designing a Mobile Application to Support Social Processes for Privacy Decisions. February ( 2019 ), 1\u201312. DOI:https:\/\/doi.org\/10.14722\/usec.2019.23016 Zaina Aljallad, Wentao Guo, Chhaya Chouhan, Christy Laperriere, Jess Kropczynski, Pamela Wisnewski, and Heather Lipford. 2019. Designing a Mobile Application to Support Social Processes for Privacy Decisions. February (2019), 1\u201312. DOI:https:\/\/doi.org\/10.14722\/usec.2019.23016"},{"key":"e_1_3_2_1_3_1","volume-title":"Tech adoption climbs among older adults. Pew Res. Cent. May","author":"Anderson Monica","year":"2017","unstructured":"Monica Anderson and Andrew Perrin . 2017. Tech adoption climbs among older adults. Pew Res. Cent. May ( 2017 ), 1\u201322. Retrieved from http:\/\/www.pewinternet.org\/2017\/05\/17\/technology-use-among-seniors\/ Monica Anderson and Andrew Perrin. 2017. Tech adoption climbs among older adults. Pew Res. Cent. May (2017), 1\u201322. Retrieved from http:\/\/www.pewinternet.org\/2017\/05\/17\/technology-use-among-seniors\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.4017\/gt.2013.11.3.001.00"},{"key":"e_1_3_2_1_5_1","volume-title":"Conf. Hum. Factors Comput. Syst. - Proc.","author":"Brewer Robin","year":"2016","unstructured":"Robin Brewer , Meredith Ringel Morris , and Anne Marie Piper . 2016 . \" Why would anybody do this?\": Older adults' understanding of and experiences with crowd work . Conf. Hum. Factors Comput. Syst. - Proc. (2016), 2246\u20132257. DOI:https:\/\/doi.org\/10.1145\/2858036.2858198 Robin Brewer, Meredith Ringel Morris, and Anne Marie Piper. 2016. \"Why would anybody do this?\": Older adults' understanding of and experiences with crowd work. Conf. Hum. Factors Comput. Syst. - Proc. (2016), 2246\u20132257. DOI:https:\/\/doi.org\/10.1145\/2858036.2858198"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858379"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph10104645"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. - 2010 3rd IEEE Int. Conf. Comput. Sci. Inf. Technol. ICCSIT 2010 4, (2010","author":"Chou Wen Hui","year":"2010","unstructured":"Wen Hui Chou , Yu Ting Lai , and Kuang Hsia Liu . 2010 . Decent digital social media for senior life: A practical design approach . Proc. - 2010 3rd IEEE Int. Conf. Comput. Sci. Inf. Technol. ICCSIT 2010 4, (2010 ), 249\u2013253. DOI:https:\/\/doi.org\/10.1109\/ICCSIT.2010.5565189 Wen Hui Chou, Yu Ting Lai, and Kuang Hsia Liu. 2010. Decent digital social media for senior life: A practical design approach. Proc. - 2010 3rd IEEE Int. Conf. Comput. Sci. Inf. Technol. ICCSIT 2010 4, (2010), 249\u2013253. DOI:https:\/\/doi.org\/10.1109\/ICCSIT.2010.5565189"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. ACM Human-Computer Interact. 3, CSCW","author":"Chouhan Chhaya","year":"2019","unstructured":"Chhaya Chouhan , Christy M. Laperriere , Zaina Aljallad , Jess Kropczynski , Heather Lipford , and Pamela J. Wisniewski . 2019. Co-designing for community oversight: Helping people make privacy and security decisions together . Proc. ACM Human-Computer Interact. 3, CSCW ( 2019 ). DOI:https:\/\/doi.org\/10.1145\/3359248 Chhaya Chouhan, Christy M. Laperriere, Zaina Aljallad, Jess Kropczynski, Heather Lipford, and Pamela J. Wisniewski. 2019. Co-designing for community oversight: Helping people make privacy and security decisions together. Proc. ACM Human-Computer Interact. 3, CSCW (2019). DOI:https:\/\/doi.org\/10.1145\/3359248"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.2005.00405.x"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1159\/000357431"},{"key":"e_1_3_2_1_12_1","volume-title":"The Effect of Social Influence on Security Sensitivity. SOUPS '14 Proc. Tenth Symp. Usable Priv. Secur.","author":"Das Sauvik","year":"2014","unstructured":"Sauvik Das , Tiffany Hyun-Jin Kim , Laura A Dabbish , and Jason I Hong . 2014 . The Effect of Social Influence on Security Sensitivity. SOUPS '14 Proc. Tenth Symp. Usable Priv. Secur. (2014), 143\u2013157. DOI:https:\/\/doi.org\/10.1145\/2660267.2660271 Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The Effect of Social Influence on Security Sensitivity. SOUPS '14 Proc. Tenth Symp. Usable Priv. Secur. (2014), 143\u2013157. DOI:https:\/\/doi.org\/10.1145\/2660267.2660271"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814538648"},{"key":"e_1_3_2_1_14_1","volume-title":"Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Symp. Usable Priv. Secur.","author":"Frik Alisa","year":"2019","unstructured":"Alisa Frik , Leysan Nurgalieva , Julia Bernd , Joyce S Lee , Florian Schaub , and Serge Egelman . 2019 . Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Symp. Usable Priv. Secur. (2019). Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce S Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Symp. Usable Priv. Secur. (2019)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025945"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557133"},{"key":"e_1_3_2_1_17_1","volume-title":"UIST Proc. Annu. ACM Symp. User Interface Softaware Technol.","author":"Huang Jeff","year":"2007","unstructured":"Jeff Huang and Michael B. Twidale . 2007. Graphstract: Minimal graphical help for computers . UIST Proc. Annu. ACM Symp. User Interface Softaware Technol. ( 2007 ), 203\u2013212. DOI:https:\/\/doi.org\/10.1145\/1294211.1294248 Jeff Huang and Michael B. Twidale. 2007. Graphstract: Minimal graphical help for computers. UIST Proc. Annu. ACM Symp. User Interface Softaware Technol. (2007), 203\u2013212. DOI:https:\/\/doi.org\/10.1145\/1294211.1294248"},{"key":"e_1_3_2_1_18_1","volume-title":"Jaelle Fuchs, Teodora Djukaric, Larissa Hugentobler, and Eszter Hargittai.","author":"Hunsaker Amanda","year":"2019","unstructured":"Amanda Hunsaker , Minh Hao Nguyen , Jaelle Fuchs, Teodora Djukaric, Larissa Hugentobler, and Eszter Hargittai. 2019 . \"He Explained It to Me and I Also Did It Myself\": How Older Adults Get Support with Their Technology Uses. Socius Sociol. Res. a Dyn. World 5, (January 2019), 237802311988786. DOI:https:\/\/doi.org\/10.1177\/2378023119887866 Amanda Hunsaker, Minh Hao Nguyen, Jaelle Fuchs, Teodora Djukaric, Larissa Hugentobler, and Eszter Hargittai. 2019. \"He Explained It to Me and I Also Did It Myself\": How Older Adults Get Support with Their Technology Uses. Socius Sociol. Res. a Dyn. World 5, (January 2019), 237802311988786. DOI:https:\/\/doi.org\/10.1177\/2378023119887866"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph17124373"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2013.06.008"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055047"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432954"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1300\/J002v35n01_11"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2399193.2399195"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.24966\/GGM-8662\/100008"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3056540.3056559"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. 2019 ACM Int. Jt. Conf. Pervasive Ubiquitous Comput. Proc. 2019 ACM Int. Symp. Wearable Comput.","author":"Mendel Tamir","year":"2019","unstructured":"Tamir Mendel . 2019 . Social help: Developing methods to support older adults in mobile privacy and security. UbiComp\/ISWC 2019- Adjun . Proc. 2019 ACM Int. Jt. Conf. Pervasive Ubiquitous Comput. Proc. 2019 ACM Int. Symp. Wearable Comput. (2019), 383\u2013387. DOI:https:\/\/doi.org\/10.1145\/3341162.3349311 Tamir Mendel. 2019. Social help: Developing methods to support older adults in mobile privacy and security. UbiComp\/ISWC 2019- Adjun. Proc. 2019 ACM Int. Jt. Conf. Pervasive Ubiquitous Comput. Proc. 2019 ACM Int. Symp. Wearable Comput. (2019), 383\u2013387. DOI:https:\/\/doi.org\/10.1145\/3341162.3349311"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998323"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369821"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.06.020"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1041610213000355"},{"key":"e_1_3_2_1_32_1","volume-title":"Fonseca","author":"Neves Barbara Barbosa","year":"2013","unstructured":"Barbara Barbosa Neves , Fausto Amaro , and Jaime R.S . Fonseca . 2013 . Coming of (old) age in the digital age: ICT usage and non-usage among older adults. Sociol. Res. Online 18, 2 (2013). DOI:https:\/\/doi.org\/10.5153\/sro.2998 Barbara Barbosa Neves, Fausto Amaro, and Jaime R.S. Fonseca. 2013. Coming of (old) age in the digital age: ICT usage and non-usage among older adults. Sociol. Res. Online 18, 2 (2013). DOI:https:\/\/doi.org\/10.5153\/sro.2998"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300579"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1609406917733847"},{"key":"e_1_3_2_1_35_1","unstructured":"OECD. 2013. Education At a Glance 2013 Israel. Retrieved from https:\/\/www.oecd.org\/education\/Israel_EAG2013 Country Note.pdf  OECD. 2013. Education At a Glance 2013 Israel. Retrieved from https:\/\/www.oecd.org\/education\/Israel_EAG2013 Country Note.pdf"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1159\/000430949"},{"key":"e_1_3_2_1_37_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings, 739\u2013748","author":"Poole Erika Shehan","year":"1870","unstructured":"Erika Shehan Poole , Marshini Chetty , Tom Morgan , Rebecca E. Grinter , and W. Keith Edwards . 2009. Computer help at home: Methods and motivations for informal technical support . In Conference on Human Factors in Computing Systems - Proceedings, 739\u2013748 . DOI:https:\/\/doi.org\/10.1145\/15 1870 1.1518816 Erika Shehan Poole, Marshini Chetty, Tom Morgan, Rebecca E. Grinter, and W. Keith Edwards. 2009. Computer help at home: Methods and motivations for informal technical support. In Conference on Human Factors in Computing Systems - Proceedings, 739\u2013748. DOI:https:\/\/doi.org\/10.1145\/1518701.1518816"},{"key":"e_1_3_2_1_38_1","volume-title":"Retrieved","author":"Poon Linda","year":"2020","unstructured":"Linda Poon and Sarah Holder . 2020 . The 'New Normal' for Many Older Adults Is on the Internet. citylab . Retrieved May 19, 2020 from https:\/\/www.citylab.com\/life\/2020\/05\/seniors-tech-online-resources-computer-video-coronavirus\/610405 Linda Poon and Sarah Holder. 2020. The 'New Normal' for Many Older Adults Is on the Internet. citylab. Retrieved May 19, 2020 from https:\/\/www.citylab.com\/life\/2020\/05\/seniors-tech-online-resources-computer-video-coronavirus\/610405"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3217804.3217907"},{"key":"e_1_3_2_1_40_1","volume-title":"Designing for the Other \"Hereafter.\" In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems","author":"Ramos Laura","unstructured":"Laura Ramos , Elise van den Hoven , and Laurie Miller . 2016. Designing for the Other \"Hereafter.\" In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems , ACM , New York, NY, USA , 721\u2013732. DOI:https:\/\/doi.org\/10.1145\/2858036.2858162 Laura Ramos, Elise van den Hoven, and Laurie Miller. 2016. Designing for the Other \"Hereafter.\" In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, ACM, New York, NY, USA, 721\u2013732. DOI:https:\/\/doi.org\/10.1145\/2858036.2858162"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"e_1_3_2_1_42_1","volume-title":"Aging and health: Effects of the sense of control. Science. 233, 4770","author":"Rodin Judith","year":"1986","unstructured":"Judith Rodin . 1986. Aging and health: Effects of the sense of control. Science. 233, 4770 ( 1986 ), 1271\u20131276. DOI:https:\/\/doi.org\/10.1126\/science.3749877 Judith Rodin. 1986. Aging and health: Effects of the sense of control. Science. 233, 4770 (1986), 1271\u20131276. DOI:https:\/\/doi.org\/10.1126\/science.3749877"},{"key":"e_1_3_2_1_43_1","volume-title":"Ownership Is Growing Rapidly Around the World, but Not Always Equally. Pew Res. Cent. February","author":"Taylor Kyle","year":"2019","unstructured":"Kyle Taylor and Laura Silver . 2019. Ownership Is Growing Rapidly Around the World, but Not Always Equally. Pew Res. Cent. February ( 2019 ). Kyle Taylor and Laura Silver. 2019. Ownership Is Growing Rapidly Around the World, but Not Always Equally. Pew Res. Cent. February (2019)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369819"},{"key":"e_1_3_2_1_45_1","volume-title":"Hou Ren Chen, Chun Yen Hsu, and Mike Y. Chen.","author":"Wang Cheng Yao","year":"2014","unstructured":"Cheng Yao Wang , Wei Chen Chu , Hou Ren Chen, Chun Yen Hsu, and Mike Y. Chen. 2014 . EverTutor: Automatically creating interactive guided tutorials on smartphones by user demonstration. In Conference on Human Factors in Computing Systems - Proceedings, Association for Computing Machinery , 4027\u20134036. DOI:https:\/\/doi.org\/10.1145\/2556288.2557407 Cheng Yao Wang, Wei Chen Chu, Hou Ren Chen, Chun Yen Hsu, and Mike Y. Chen. 2014. EverTutor: Automatically creating interactive guided tutorials on smartphones by user demonstration. In Conference on Human Factors in Computing Systems - Proceedings, Association for Computing Machinery, 4027\u20134036. DOI:https:\/\/doi.org\/10.1145\/2556288.2557407"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376605"},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 24th annual ACM symposium on User interface software and technology - UIST '11, ACM Press","author":"Yeh Tom","year":"2047","unstructured":"Tom Yeh , Tsung-Hsiang Chang , Bo Xie , Greg Walsh , Ivan Watkins , Krist Wongsuphasawat , Man Huang , Larry S. Davis , and Benjamin B. Bederson . 2011. Creating contextual help for GUIs using screenshots . In Proceedings of the 24th annual ACM symposium on User interface software and technology - UIST '11, ACM Press , New York, New York, USA. DOI:https:\/\/doi.org\/10.1145\/ 2047 196.2047214 Tom Yeh, Tsung-Hsiang Chang, Bo Xie, Greg Walsh, Ivan Watkins, Krist Wongsuphasawat, Man Huang, Larry S. Davis, and Benjamin B. Bederson. 2011. Creating contextual help for GUIs using screenshots. In Proceedings of the 24th annual ACM symposium on User interface software and technology - UIST '11, ACM Press, New York, New York, USA. DOI:https:\/\/doi.org\/10.1145\/2047196.2047214"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-013-0324-1"}],"event":{"name":"MobileHCI '21: 23rd International Conference on Mobile Human-Computer Interaction","location":"Toulouse & Virtual France","acronym":"MobileHCI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 23rd International Conference on Mobile Human-Computer Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447526.3472047","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3447526.3472047","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:19:04Z","timestamp":1750191544000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3447526.3472047"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,27]]},"references-count":48,"alternative-id":["10.1145\/3447526.3472047","10.1145\/3447526"],"URL":"https:\/\/doi.org\/10.1145\/3447526.3472047","relation":{},"subject":[],"published":{"date-parts":[[2021,9,27]]},"assertion":[{"value":"2021-09-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}