{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T07:31:09Z","timestamp":1778052669338,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,6]],"date-time":"2023-09-06T00:00:00Z","timestamp":1693958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Engineering and Physical Sciences Research Council (EPSRC)","award":["EP\/T022582\/1"],"award-info":[{"award-number":["EP\/T022582\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,6]]},"DOI":"10.1145\/3582515.3609565","type":"proceedings-article","created":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T15:02:36Z","timestamp":1692111756000},"page":"437-445","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Recognising Diversity in Older Adults' Cybersecurity Needs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2738-6498","authenticated-orcid":false,"given":"Benjamin Alan","family":"Morrison","sequence":"first","affiliation":[{"name":"PacTLab, Northumbria University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8460-8838","authenticated-orcid":false,"given":"James","family":"Nicholson","sequence":"additional","affiliation":[{"name":"PaCTLab, Northumbria University, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6600-8414","authenticated-orcid":false,"given":"Lynne","family":"Coventry","sequence":"additional","affiliation":[{"name":"Abertay university, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5028-4601","authenticated-orcid":false,"given":"Pam","family":"Briggs","sequence":"additional","affiliation":[{"name":"PaCtLab, Northumbria University, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2023,9,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Age UK.","author":"Age UK","year":"2015","unstructured":"Age-UK 2015. Over half of people aged 65 + targeted by fraudsters. Age UK. April 2015 (2015), 2015\u20132017."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.17645\/si.v8i2.2627"},{"key":"e_1_3_2_1_3_1","unstructured":"Bada M. Cyber Security Awareness Campaigns: Why do they fail to change behaviour?"},{"key":"e_1_3_2_1_4_1","volume-title":"Gerontechnology: understanding older adult information and communication technology use","author":"Birkland J.L.H.","unstructured":"Birkland, J.L.H. 2019. Gerontechnology: understanding older adult information and communication technology use. Emerald Publishing Limited."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10798-015-9348-6"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2317956.2318036"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14616\/sands-2017-1-358361"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.7401"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.7401"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Cooper A. 1999. The Inmates are Running the Asylum. 17\u201317.","DOI":"10.1007\/978-3-322-99786-9_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.2196\/21864"},{"key":"e_1_3_2_1_12_1","volume-title":"Using behavioural insights to improve the public","author":"Coventry L.","year":"2014","unstructured":"Coventry, L. 2014. Using behavioural insights to improve the public \u2019 s use of cyber security best practices improve the public \u2019 s use of cyber. Project Report. Government Office for Science. (2014), 1\u201320."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJLT.2016.077520"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"key":"e_1_3_2_1_15_1","unstructured":"Demographics of Internet and Home Broadband Usage in the United States: 2021. https:\/\/www.pewresearch.org\/internet\/fact-sheet\/internet-broadband\/?menuItem=9a15d0d3-3bff-4e9e-a329-6e328bc7bcce. Accessed: 2021-09-08."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/geroni"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818797082"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00133"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858214"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444814538648"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 15th Symposium on Usable Privacy and Security, SOUPS 2019.","author":"Frik A.","year":"2019","unstructured":"Frik, A. 2019. Privacy and security threat models and mitigation strategies of older adults. Proceedings of the 15th Symposium on Usable Privacy and Security, SOUPS 2019. (2019), 21\u201340."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.2196\/28010"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816634676"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/08946566.2013.821809"},{"key":"e_1_3_2_1_25_1","volume-title":"Changing Technologies","author":"Karaoglu G.","year":"2021","unstructured":"Karaoglu, G. 2021. Changing Technologies , Changing Lives: Older Adults \u2019 Perspectives on the Benefits of Using New Technologies. 15, (2021), 3887\u20133907."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1017\/dsi.2019.183"},{"key":"e_1_3_2_1_27_1","volume-title":"Template analysis. Qualitative methods and analysis in organizational research: A practical guide","author":"King","unstructured":"King 1998. Template analysis. Qualitative methods and analysis in organizational research: A practical guide. Sage Publications Ltd. 118\u2013134."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432954"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1325555.1325569"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.38.3.245"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1108\/MRR-04-2013-0085"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2020.102051"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/03634523.2018.1503313"},{"key":"e_1_3_2_1_34_1","unstructured":"LexisNexis 2021. Fraud - The Facts."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2021.1882577"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","unstructured":"Mariano J. 2021. Too old for technology? Stereotype threat and technology use by older adults. Behaviour and Information Technology. (2021). DOI:https:\/\/doi.org\/10.1080\/0144929X.2021.1882577.","DOI":"10.1080\/0144929X.2021.1882577"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph17072560"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.3390\/healthcare7030086"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.065"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3056540.3056559"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369821"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300573"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2011.03.003"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1002\/hbe2.291"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.00623"},{"key":"e_1_3_2_1_47_1","volume-title":"A New and Growing Problem for Older Adults. (2019)","author":"Munanga A.","year":"2017","unstructured":"Munanga, A. 2019. A New and Growing Problem for Older Adults. (2019), 2017\u20132020."},{"key":"e_1_3_2_1_48_1","volume-title":"Individually Vulnerable","author":"Murthy S.","year":"2021","unstructured":"Murthy, S. 2021. Individually Vulnerable, Collectively Safe: The Security and Privacy Practices of Households with Older Adults. 5, April (2021), 1\u201324."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300579"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445078"},{"key":"e_1_3_2_1_51_1","volume-title":"Exploring the UK s digital divide.pdf. March","author":"Office for National Statistics 2019.","year":"2019","unstructured":"Office for National Statistics 2019. Exploring the UK s digital divide.pdf. March (2019)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.003"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3582742"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/997078.997089"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.17645\/si.v8i2.2587"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.17645\/si.v8i2.3184"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2015.1012532"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICINPRO43533.2018.9096878"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.22230\/cjc.2017v42n2a3130"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1093\/geront"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/01634372.2020.1764687"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1080\/08946566.2019.1625842"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","unstructured":"Staheli D. 2014. Visualization evaluation for cyber security. (2014) 49\u201356. DOI:https:\/\/doi.org\/10.1145\/2671491.2671492.","DOI":"10.1145\/2671491.2671492"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaging.2015.02.003"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","unstructured":"Stoll J. 2008. Adapting personas for use in security visualization design. Mathematics and Visualization. (2008) 39\u201352. DOI:https:\/\/doi.org\/10.1007\/978-3-540-78243-8_3.","DOI":"10.1007\/978-3-540-78243-8_3"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","unstructured":"Strawser B.J. and Joy D.J. 2015. Cyber Security and User Responsibility: Surprising Normative Differences. Procedia Manufacturing. 3 Ahfe (2015) 1101\u20131108. DOI:https:\/\/doi.org\/10.1016\/j.promfg.2015.07.183.","DOI":"10.1016\/j.promfg.2015.07.183"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.2005.00402.x"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.02.009"},{"key":"e_1_3_2_1_69_1","unstructured":"User Personas for Privacy and Security: 2015. ."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.11.003"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2696867"},{"key":"e_1_3_2_1_72_1","unstructured":"Vuorikari R. 2016. DigComp 2.0 - The Digital Competence Framework for Citizens."}],"event":{"name":"GoodIT '23: ACM International Conference on Information Technology for Social Good","location":"Lisbon Portugal","acronym":"GoodIT '23","sponsor":["SIGCAS ACM Special Interest Group on Computers and Society"]},"container-title":["Proceedings of the 2023 ACM Conference on Information Technology for Social Good"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582515.3609565","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3582515.3609565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:15Z","timestamp":1750178835000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3582515.3609565"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,6]]},"references-count":72,"alternative-id":["10.1145\/3582515.3609565","10.1145\/3582515"],"URL":"https:\/\/doi.org\/10.1145\/3582515.3609565","relation":{},"subject":[],"published":{"date-parts":[[2023,9,6]]},"assertion":[{"value":"2023-09-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}