[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3290605.3300573acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article
Public Access

Upside and Downside Risk in Online Security for Older Adults with Mild Cognitive Impairment

Published: 02 May 2019 Publication History

Abstract

Older adults are rapidly increasing their use of online services such as banking, social media, and email - services that come with subtle and serious security and privacy risks. Older adults with mild cognitive impairment (MCI) are particularly vulnerable to these risks because MCI can reduce their ability to recognize scams such as email phishing, follow recommended password guidelines, and consider the implications of sharing personal information. Older adults with MCI often cope with their impairments with the help of caregivers, including partners, children, and professional health personnel, when using and managing online services. Yet, this too carries security and privacy risks: sharing personal information with caregivers can create issues of agency, autonomy, and even risk embarrassment and information leakage; caregivers also do not always act in their charges' best interest. Through a series of interviews conducted in the US, we identify a spectrum of safeguarding strategies used and consider them through the lens of 'upside and downside risk' where there are tradeoffs between reduced privacy and maintaining older adults' autonomy and access to online services.

References

[1]
Linda M. Alves and Steve R. Wilson. 2008. Depression and Elder Abuse and Neglect among a Community-Dwelling Chinese Elderly Population. Journal of Elder Abuse & Neglect 20, 1 (2008), 63--85.
[2]
Tawfiq Ammari, Priya Kumar, Cliff Lampe, and Sarita Schoenebeck. 2015. Managing Children's Online Identities: How Parents Decide What to Disclose About Their Children Online. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems CHI 2019, May 4--9, 2019, Glasgow, Scotland UK Helena M. Mentis, Galina Madjaroff, and Aaron K. Massey (CHI '15). ACM, New York, NY, USA, 1895--1904.
[3]
APA. 2013. Diagnostic and Statistical Manual of Mental Diorders (5th ed.). American Psychiatric Publishing, Arlington, VA.
[4]
Rachel Batchelor, Ania Bobrowicz, Robin Mackenzie, and Alisoun Milne. 2012. Challenges of ethical and legal responsibilities when technologies' uses and users change: social networking sites, decisionmaking capacity and dementia. Ethics and Information Technology 14, 2 (01 Jun 2012), 99--108.
[5]
danah boyd. 2016. Untangling Research and Practice: What Facebook's "Emotional Contagion" Study Teaches Us. 12, 1 (2016), 4--13.
[6]
Virginia Braun and Victoria Clarke. 2006. Using Thematic Analysis in Psychology. Qualitative Research in Psychology 3, 2 (Jan. 2006), 77--101.
[7]
Jed R. Brubaker and Vanessa Callison-Burch. 2016. Legacy Contact: Designing and Implementing Post-mortem Stewardship at Facebook. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 2908--2919.
[8]
Jed R. Brubaker, Lynn S. Dombrowski, Anita M. Gilbert, Nafiri Kusumakaulika, and Gillian R. Hayes. 2014. Stewarding a Legacy: Responsibilities and Relationships in the Management of Post-mortem Data. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 4157--4166.
[9]
Shelia R. Cotten, George Ford, Sherry Ford, and Timothy M. Hale. 2012. Internet use and depression among older adults. Computers in Human Behavior 28, 2 (2012), 496 -- 499.
[10]
Ray Fitzpatrick and Mary Boulton. 1994. Qualitative methods for assessing health care. Quality in health care : QHC 3, 2 (jun 1994), 107--13. http://www.ncbi.nlm.nih.gov/ /10137583http://www.central.nih.gov/articlerender.fcgi?artid=PMC1055206
[11]
Serge Gauthier, Barry Reisberg, Michael Zaudig, Ronald C Petersen, Karen Ritchie, Karl Broich, Sylvie Belleville, Henry Brodaty, David Bennett, Howard Chertkow, Jeffrey L Cummings, Mony de Leon, Howard Feldman, Mary Ganguli, Harald Hampel, Philip Scheltens, Mary C Tierney, Peter Whitehouse, and Bengt Winblad. 2006. Mild Cognitive Impairment. 367, 9518 (2006), 1262--1270.
[12]
Janice E Graham, Kenneth Rockwood, B Lynn Beattie, Robin Eastwood, Serge Gauthier, Holly Tuokko, and Ian McDowell. 1997. Prevalence and Severity of Cognitive Impairment with and without Dementia in an Elderly Population. 349, 9068 (1997), 1793--1796.
[13]
Galen A. Grimes, Michelle G. Hough, Elizabeth Mazur, and Margaret L. Signorella. 2010. Older Adults' Knowledge of Internet Hazards. 36, 3 (2010), 173--192.
[14]
Woodrow Hartzog. 2018. Privacy's Blueprint: The Battle to Control the Design of New Technologies. Harvard University Press.
[15]
Gavin W. Hougham, Greg A. Sachs, Deborah Danner, Jim Mintz, Marian Patterson, Laura W. Roberts, Laura A. Siminoff, Jeremy Sugarman, Peter J. Whitehouse, and Donna Wirshing. 2003. Empirical Research on Informed Consent with the Cognitively Impaired. 25, 5 (2003), S26--S32.
[16]
Clare-Marie Karat, John Karat, and Carolyn Brodie. 2005. Why HCI research in privacy and security is critical now. International Journal of Human-Computer Studies 63, 1 (2005), 1 -- 4. HCI research in privacy and security.
[17]
Tom Kitwood. 1997. Dementia reconsidered: The person comes first. Open University Press, Buckingham, UK.
[18]
Mary Jane Koren. 2010. Person-Centered Care For Nursing Home Residents: The Culture-Change Movement. Health Affairs 29, 2 (feb 2010), 312--317.
[19]
Amanda Lazar, Caroline Edasis, and Anne Marie Piper. 2017. Supporting People with Dementia in Digital Social Sharing. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems - CHI '17. ACM Press, New York, New York, USA, 2149--2162.
[20]
Peter Alexander Lichtenberg, Michael A. Sugarman, Daniel Paulson, Lisa J. Ficker, and Annalise Rahman-Filipiak. 2016. Psychological and Functional Vulnerability Predicts Fraud Cases in Older Adults: Results of a Longitudinal Study. Clinical Gerontologist 39, 1 (Jan. 2016), 48--63.
[21]
Tobias Luck, Francisca S. Then, Matthias L. Schroeter, Veronica Witte, Christoph Engel, Markus Loeffler, Joachim Thiery, Arno Villringer, and Steffi G. Riedel-Heller. 2017. Prevalence of DSM-5 Mild Neurocognitive Disorder in Dementia-Free Older Adults: Results of the PopulationBased LIFE-Adult-Study. 25, 4 (2017), 328--339.
[22]
G. Madjaroff and H.M. Mentis. 2017. Narratives of older adults with mild cognitive impairment and their caregivers. In ASSETS 2017 Proceedings of the 19th International ACM SIGACCESS Conference on Computers and Accessibility.
[23]
Diane F. Mahoney, Ruth B. Purtilo, Frank M. Webbe, Majd Alwan, Ashok J. Bharucha, Tim D. Adlam, Holly B. Jimison, Beverly Turner, and S. Ann Becker. 2007. In-Home Monitoring of Persons with Dementia: Ethical Guidelines for Technology Research and Development. 3, 3 (2007), 217--226.
[24]
Jennifer Mankoff, Gillian R. Hayes, and Devva Kasnitz. 2010. Disability studies as a source of critical inquiry for the field of assistive technology. In Proceedings of the 12th international ACM SIGACCESS conference on Computers and accessibility - ASSETS '10. ACM Press, New York, New York, USA, 3.
[25]
Najmeh Miramirkhani, Oleksii Starov, and Nick Nikiforakis. 2017. Dial One for Scam: a Large-Scale Analysis of Technical Support Scams. In Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017). Internet Society.
[26]
R. J. V. Montgomery, J. G. Gonyea, and N. R. Hooyman. 1985. Caregiving and the Experience of Subjective and Objective Burden. 34, 1 (1985), 19--26.
[27]
Maurice Mulvenna, Suzanne Martin, Stefan Sävenstedt, Johan Bengtsson, Franka Meiland, Rose Marie Dröes, Marike Hettinga, Ferial Moelaert, and David Craig. 2010. Designing & Evaluating a Cognitive Prosthetic for People with Mild Dementia. In Proceedings of the 28th Annual European Conference on Cognitive Ergonomics (ECCE '10). ACM, 11--18.
[28]
Tobias Nef, Raluca L. Ganea, René M. Müri, and Urs P. Mosimann. 2013. Social Networking Sites and Older Users -- a Systematic Review. 25, 7 (2013), 1041--1053.
[29]
Sandra Petronio and Irwin Altman. 2002. Boundaries of Privacy: Dialectics of Disclosure. SUNY Press.
[30]
Anne Marie Piper, Raymundo Cornejo, Lisa Hurwitz, and Caitlin Unumb. 2016. Technological Caregiving: Supporting Online Activity for Adults with Cognitive Impairments. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, 5311--5323.
[31]
Judith Rodin and Ellen Langer. 1977. Long-Term Effects of a ControlRelevant Intervention with the Institutionalized Aged. Journal of Personality and Social Psychology 35, 12 (1977), 897--902.
[32]
Yvonne Rogers, Jeni Paay, Margot Brereton, Kate L. Vaisutis, Gary Marsden, Frank Vetere, Yvonne Rogers, Jeni Paay, Margot Brereton, Upside and Downside Risk in Online Security CHI 2019, May 4--9, 2019, Glasgow, Scotland UK Kate L. Vaisutis, Gary Marsden, and Frank Vetere. 2014. Never too old. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems - CHI '14. ACM Press, New York, New York, USA, 3913--3922.
[33]
Richard M Ryan, Edward L Deci, and Wendy S Grolnick. 1995. Autonomy, relatedness, and the self: Their relation to development and psychopathology. Ariel 128, 151.189 (1995), 155.
[34]
Supriya Singh, Anuja Cabraal, Catherine Demosthenous, Gunela Astbrink, and Michele Furlong. 2007. Password Sharing: Implications for Security Design Based on Social Practice. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '07). ACM, 895--904.
[35]
Sarah Spiekermann. {n. d.}. The Challenges of Privacy by Design. 55, 7 ({n. d.}), 38--40.
[36]
S. Spiekermann and L.F. Cranor. 2009. Engineering Privacy. 35, 1 (2009), 67--82.
[37]
John Vines, Gary Pritchard, Peter Wright, Patrick Olivier, and Katie Brittain. 2015. An Age-Old Problem. ACM Transactions on ComputerHuman Interaction 22, 1 (feb 2015), 1--27.
[38]
Audrey S Weiner and Judah L Ronch. 2003. Culture change in long-term care. Routledge.
[39]
Carol J. Whitlatch, Katherine Judge, Steven H. Zarit, and Elia Femia. 2006. Dyadic Intervention for Family Caregivers and Care Receivers in Early-Stage Dementia. 46, 5 (2006), 688--694.
[40]
Alan Yu. 2016. How a 'Nightmare' Law Could Make Sharing Passwords Illegal : All Tech Considered : NPR. http: //www.npr.org/sections/alltechconsidered/2016/07/14/485735920/ how-a-nightmare-law-could-make-sharing-passwords-illegal

Cited By

View all
  • (2024)Understanding how people share passwordsProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696911(219-237)Online publication date: 12-Aug-2024
  • (2024)accessFinTech: Designing Accessible Financial TechnologyProceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3663548.3688551(1-5)Online publication date: 27-Oct-2024
  • (2024)Development and Evaluation of the Mobile Tech Support Questionnaire for Older AdultsProceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3663548.3675661(1-18)Online publication date: 27-Oct-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems
May 2019
9077 pages
ISBN:9781450359702
DOI:10.1145/3290605
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 May 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cybersecurity
  2. dementia
  3. discussion
  4. risk
  5. scams

Qualifiers

  • Research-article

Funding Sources

Conference

CHI '19
Sponsor:

Acceptance Rates

CHI '19 Paper Acceptance Rate 703 of 2,958 submissions, 24%;
Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)876
  • Downloads (Last 6 weeks)91
Reflects downloads up to 14 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Understanding how people share passwordsProceedings of the Twentieth USENIX Conference on Usable Privacy and Security10.5555/3696899.3696911(219-237)Online publication date: 12-Aug-2024
  • (2024)accessFinTech: Designing Accessible Financial TechnologyProceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3663548.3688551(1-5)Online publication date: 27-Oct-2024
  • (2024)Development and Evaluation of the Mobile Tech Support Questionnaire for Older AdultsProceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3663548.3675661(1-18)Online publication date: 27-Oct-2024
  • (2024)Reducing the Search Space on demand helps Older Adults find Mobile UI Features quickly, on par with Younger AdultsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642796(1-22)Online publication date: 11-May-2024
  • (2024)Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer ComplaintsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642033(1-20)Online publication date: 11-May-2024
  • (2024)SoK: Safer Digital-Safety Research Involving At-Risk Users2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00071(635-654)Online publication date: 19-May-2024
  • (2024)Unpaid carers’ experiences of supporting people with dementia to use social mediaAging & Mental Health10.1080/13607863.2024.230172528:7(977-984)Online publication date: 12-Jan-2024
  • (2024)Cognitively Available Cybersecurity: A Systematic Literature ReviewHuman-Centered Software Engineering10.1007/978-3-031-64576-1_9(160-170)Online publication date: 1-Jul-2024
  • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
  • (2023)‘Ought’ should not assume ‘Can’? Basic Capabilities in Cybersecurity to Ground Sen’s Capability ApproachProceedings of the 2023 New Security Paradigms Workshop10.1145/3633500.3633506(76-91)Online publication date: 18-Sep-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media