{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T02:49:01Z","timestamp":1773542941701,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:00:00Z","timestamp":1731283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Science Foundation Ireland","doi-asserted-by":"publisher","award":["22\/NCF\/OT\/11212"],"award-info":[{"award-number":["22\/NCF\/OT\/11212"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["3\/RC\/2077\\_P2"],"award-info":[{"award-number":["3\/RC\/2077\\_P2"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,11]]},"DOI":"10.1145\/3678884.3681894","type":"proceedings-article","created":{"date-parts":[[2024,11,13]],"date-time":"2024-11-13T18:38:08Z","timestamp":1731523088000},"page":"478-484","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing Personalised Cybersecurity Guidance for Older Adults in Ireland"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7750-9495","authenticated-orcid":false,"given":"Ashley","family":"Sheil","sequence":"first","affiliation":[{"name":"Munster Technological University, Cork, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-4912-258X","authenticated-orcid":false,"given":"Jacob","family":"Camilleri","sequence":"additional","affiliation":[{"name":"Munster Technological University, Cork, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2831-186X","authenticated-orcid":false,"given":"Moya","family":"Cronin","sequence":"additional","affiliation":[{"name":"Munster Technological University, Cork, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9332-5205","authenticated-orcid":false,"given":"Melanie","family":"Gruben","sequence":"additional","affiliation":[{"name":"Munster Technological University, Cork, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7130-9941","authenticated-orcid":false,"given":"Michelle","family":"O'Keeffe","sequence":"additional","affiliation":[{"name":"Munster Technological University, Cork, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5349-4011","authenticated-orcid":false,"given":"Hazel","family":"Murray","sequence":"additional","affiliation":[{"name":"Munster Technological University, Cork, Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"University of Denver, Denver, Colorado, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Age Action. 2021. Digital Inclusion and an Ageing Population. https:\/\/www.ageaction.ie\/sites\/default\/files\/digital_inclusion_and_an_ageing_ population.pdf."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1463423620000584"},{"key":"e_1_3_2_1_3_1","article-title":"The ''grey'' digital divide in older adults during COVID-19 in Germany: Who is most at risk","volume":"32","author":"Pedr\u00f3s Barnils N","year":"2022","unstructured":"N Pedr\u00f3s Barnils and B Sch\u00fcz. 2022. The ''grey'' digital divide in older adults during COVID-19 in Germany: Who is most at risk? European Journal of Public Health 32, Supplement_3 (2022), ckac130--059.","journal-title":"European Journal of Public Health"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.exger.2021.111678"},{"key":"e_1_3_2_1_5_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Busse Karoline","year":"2019","unstructured":"Karoline Busse, Julia Sch\u00e4fer, and Matthew Smith. 2019. Replication: No one can hack my mind revisiting a study on expert and {Non-Expert} security practices and advice. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 117--136."},{"key":"e_1_3_2_1_6_1","volume-title":"Research design: Qualitative, quantitative, and mixed methods approaches","author":"Creswell John W","unstructured":"John W Creswell and J David Creswell. 2017. Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1108\/17506161311308142"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4206-3"},{"key":"e_1_3_2_1_9_1","volume-title":"A risk-reduction-based incentivization model for human-centered multi-factor authentication","author":"Das Sanchari","unstructured":"Sanchari Das. 2020. A risk-reduction-based incentivization model for human-centered multi-factor authentication. Indiana University."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54455-3_2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_21"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 54th Hawaii International Conference on System Sciences.","author":"Das Sanchari","year":"2020","unstructured":"Sanchari Das, Andrew Kim, Ben Jelen, Lesa Huber, and L Jean Camp. 2020. Non-inclusive online security: older adults' experience with two-factor authentication. In Proceedings of the 54th Hawaii International Conference on System Sciences."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA","author":"Das Sanchari","year":"2019","unstructured":"Sanchari Das, Andrew Kim, Zachary Tingle, and Christena Nippert-Eng. 2019. All About Phishing Exploring User Research through a Systematic Literature Review. In Proceedings of the Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1093\/geroni\/igz038.1186"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1093\/geronb\/gby036"},{"key":"e_1_3_2_1_16_1","volume-title":"The digital divide has grown old: Determinants of a digital divide among seniors. New media & society 18, 2","author":"Friemel Thomas N","year":"2016","unstructured":"Thomas N Friemel. 2016. The digital divide has grown old: Determinants of a digital divide among seniors. New media & society 18, 2 (2016), 313--331."},{"key":"e_1_3_2_1_17_1","volume-title":"Fifteenth symposium on usable privacy and security (SOUPS","author":"Frik Alisa","year":"2019","unstructured":"Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and security threat models and mitigation strategies of older adults. In Fifteenth symposium on usable privacy and security (SOUPS 2019). 21--40."},{"key":"e_1_3_2_1_18_1","unstructured":"Sarah Gibbons. [n. d.]. https:\/\/www.nngroup.com\/articles\/dot-voting\/."},{"key":"e_1_3_2_1_19_1","volume-title":"Thematic coding and categorizing. Analyzing qualitative data 703, 38--56","author":"Gibbs Graham R","year":"2007","unstructured":"Graham R Gibbs. 2007. Thematic coding and categorizing. Analyzing qualitative data 703, 38--56 (2007)."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the Workshop on Usable Security and Privacy (USEC).","author":"Gopavaram Shakthidhar","year":"2021","unstructured":"Shakthidhar Gopavaram, Jayati Dev, Marthie Grobler, DongInn Kim, Sanchari Das, and L Jean Camp. 2021. Cross-national study on phishing resilience. In Proceedings of the Workshop on Usable Security and Privacy (USEC)."},{"key":"e_1_3_2_1_21_1","unstructured":"NCSC Ireland. [n. d.]. The National Cyber Security Centre. https:\/\/www.ncsc.gov.ie\/ Accessed 20-07--24."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/08946566.2013.821809"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373625.3418029"},{"key":"e_1_3_2_1_24_1","volume-title":"The role of cognition, personality, and trust in fraud victimization in older adults. Frontiers in psychology 8","author":"Judges Rebecca A","year":"2017","unstructured":"Rebecca A Judges, Sara N Gallant, Lixia Yang, and Kang Lee. 2017. The role of cognition, personality, and trust in fraud victimization in older adults. Frontiers in psychology 8 (2017), 248182."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2021.105615"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.2196\/40192"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479540"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2021.121359"},{"key":"e_1_3_2_1_29_1","volume-title":"A digital media literacy intervention for older adults improves resilience to fake news. Scientific reports 12, 1","author":"Moore Ryan C","year":"2022","unstructured":"Ryan C Moore and Jeffrey T Hancock. 2022. A digital media literacy intervention for older adults improves resilience to fake news. Scientific reports 12, 1 (2022), 6008."},{"key":"e_1_3_2_1_30_1","volume-title":"Internet use and non-use: views of older users. Universal access in the information society 6","author":"Morris Anne","year":"2007","unstructured":"Anne Morris, Joy Goodman, and Helena Brading. 2007. Internet use and non-use: views of older users. Universal access in the information society 6 (2007), 43--57."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/00469580221096272"},{"key":"e_1_3_2_1_32_1","unstructured":"Hazel Murray. 2021. Improving Authentication for Users Via Better Understanding Password use and Abuse. Ph. D. Dissertation. Maynooth University."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC.2017.7983609"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588031"},{"key":"e_1_3_2_1_35_1","unstructured":"NIST. [n. d.]. Cybersecurity. https:\/\/www.nist.gov\/cybersecurity Accessed 19-07-24."},{"key":"e_1_3_2_1_36_1","unstructured":"U.S. Department of Commerce. 1995. Falling Through The Net: A Survey of the ''Have Nots'' in Rural and Urban America. https:\/\/www.ntia.gov\/ page\/falling-through-net-survey-have-nots-rural-and-urban-america."},{"key":"e_1_3_2_1_37_1","unstructured":"Government of Ireland. 2021. https:\/\/www.adultliteracyforlife.ie\/."},{"key":"e_1_3_2_1_38_1","unstructured":"Department of the Taoiseach. 2022. https:\/\/www.gov.ie\/en\/press-release\/a36f1-publication-of-harnessing-digital-2022-progress-report\/."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/08946566.2021.1934767"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1093\/geroni\/igab046.2830"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002764218777572"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1093\/jamia\/ocaa078"},{"key":"e_1_3_2_1_43_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Ray Hirak","year":"2021","unstructured":"Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam J Aviv. 2021. Why older adults (Don't) use password managers. In 30th USENIX Security Symposium (USENIX Security 21). 73--90."},{"key":"e_1_3_2_1_44_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Redmiles Elissa M","year":"2020","unstructured":"Elissa M Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle L Mazurek. 2020. A comprehensive quality evaluation of security and privacy advice on the web. In 29th USENIX Security Symposium (USENIX Security 20). 89--108."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/0733464816669805"},{"key":"e_1_3_2_1_46_1","volume-title":"The psychology of the internet fraud victimization of older adults: A systematic review. Frontiers in psychology 13","author":"Shang Yuxi","year":"2022","unstructured":"Yuxi Shang, Zhongxian Wu, Xiaoyu Du, Yanbin Jiang, Beibei Ma, and Meihong Chi. 2022. The psychology of the internet fraud victimization of older adults: A systematic review. Frontiers in psychology 13 (2022), 912242."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/08946566.2019.1625842"},{"key":"e_1_3_2_1_48_1","volume-title":"Cuacha: Irish Cookie Banners. In 2022 33rd Irish Signals and Systems Conference (ISSC). IEEE, 1--8.","author":"Sheil Ashley","year":"2022","unstructured":"Ashley Sheil and David Malone. 2022. Fian\u00e1n, Cuacha: Irish Cookie Banners. In 2022 33rd Irish Signals and Systems Conference (ISSC). IEEE, 1--8."},{"key":"e_1_3_2_1_49_1","unstructured":"Chalita Srinuan and Erik Bohlin. 2011. Understanding the digital divide: A literature survey and ways forward. (2011)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579547"},{"key":"e_1_3_2_1_51_1","volume-title":"Digital inclusion from the perspective of teachers of older adults-expectations, experiences, challenges and supporting measures. Gerontology & geriatrics education 43, 1","author":"Tomczyk \u0141ukasz","year":"2022","unstructured":"\u0141ukasz Tomczyk, Anna Mr\u00f3z, Katarzyna Potyra\u0142a, and Joanna Wn\u0119k-Gozdek. 2022. Digital inclusion from the perspective of teachers of older adults-expectations, experiences, challenges and supporting measures. Gerontology & geriatrics education 43, 1 (2022), 132--147."},{"key":"e_1_3_2_1_52_1","volume-title":"SoK: evaluating privacy and security concerns of using web services for the disabled population. arXiv preprint arXiv:2302.13261","author":"Zezulak Alisa","year":"2023","unstructured":"Alisa Zezulak, Faiza Tazi, and Sanchari Das. 2023. SoK: evaluating privacy and security concerns of using web services for the disabled population. arXiv preprint arXiv:2302.13261 (2023)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12400"},{"key":"e_1_3_2_1_54_1","volume-title":"Cross-Contextual Examination of Older Adults' Privacy Concerns, Behaviors, and Vulnerabilities. Privacy-Enhancing Technologies (PoPETs)","author":"Zou Yixin","year":"2024","unstructured":"Yixin Zou, Kaiwen Sun, Tanisha Afnan, Ruba Abu-Salma, Robin Brewer, and Florian Schaub. 2024. Cross-Contextual Examination of Older Adults' Privacy Concerns, Behaviors, and Vulnerabilities. Privacy-Enhancing Technologies (PoPETs) (2024)."}],"event":{"name":"CSCW '24: The 27th ACM Conference on Computer-Supported Cooperative Work and Social Computing","location":"San Jose Costa Rica","acronym":"CSCW '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Companion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678884.3681894","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678884.3681894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T01:57:20Z","timestamp":1773539840000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678884.3681894"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,11]]},"references-count":54,"alternative-id":["10.1145\/3678884.3681894","10.1145\/3678884"],"URL":"https:\/\/doi.org\/10.1145\/3678884.3681894","relation":{},"subject":[],"published":{"date-parts":[[2024,11,11]]},"assertion":[{"value":"2024-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}