[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Online privacy concerns and privacy protection strategies among older adults in East York, Canada

Published: 06 August 2020 Publication History

Abstract

As news headlines report on high‐profile online privacy breaches and the potential negative consequences for users, users are becoming concerned about their privacy. While much research has focused on the concerns of younger generations, few studies have investigated older adults, specifically those aged 65+ years. This study analyzes in‐depth interviews with 40 older adults living in East York, Toronto, Canada, to investigate their online privacy concerns and the strategies they use to mitigate these concerns. We find that East York older adults are mostly concerned about security privacy concerns followed by institutional privacy concerns and only minimally concerned about social privacy. The greatest concerns included information misuse by unknown others and unauthorized access to their personal information. We found that, for some older adults, their high privacy concerns precluded them from taking full advantage of the potential benefits of digital media. East York older adults varied considerably in their use of privacy protection strategies; some older adults used no strategies, while others were eager to protect their privacy using all strategies at their disposal.

References

[1]
Alhabash, S., Jiang, M., Brooks, B., Rifon, N. J., Larose, R., & Cotten, S. R. (2015). Online banking for the ages. In Communication and information technologies annual studies in media and communications (Vol. 10, pp. 145–171). UK: Emerald Group Publishing Limited. https://doi.org/10.1108/S2050-206020150000010006
[2]
Anderson, M., & Perrin, A. (2017, May 17). Tech adoption climbs among older adults. Pew Research Center, Internet & Technology. Retrieved from https://www.pewresearch.org/internet/2017/05/17/tech-adoption-climbs-among-older-adults/
[3]
Barnes, S. (2006). A privacy paradox. First Monday, 11(9). Retrieved from https://doi.org/10.5210/fm.v11i9.1394
[4]
Bartsch, M., & Dienlin, T. (2016). Control your Facebook. Computers in Human Behavior, 56, 147–154.
[5]
Berg, B. L., & Lune, H. (2012). Qualitative research methods for the social sciences (8th ed.). Boston, MA: Pearson. https://doi.org/10.1177/0002764218787019
[6]
Blank, G., Bolsover, G., & Dubois, E. (2014). A new privacy paradox. Paper presented at American Sociological Association annual meeting, San Francisco, CA.
[7]
Bolimos, I. A., & Choo, K.‐K. R. (2017). Online fraud offending within an Australian jurisdiction. Journal of Financial Crime, 24(2), 277–308.
[8]
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.
[9]
Brinkmann, S. (2008). Interviewing. In L. M. Given (Ed.), The SAGE encyclopedia of qualitative research methods (pp. 471–472). London, UK: SAGE. https://doi.org/10.4135/9781412963909.n239
[10]
Bryant, A., & Charmaz, K. (2007). The SAGE handbook of grounded theory. London, UK: SAGE.
[11]
Büchi, M., Just, N., & Latzer, M. (2017). Caring is not enough. Information, Communication & Society, 20(8), 1261–1278.
[12]
Carruth, K. A., & Ginsburg, H. (2014). Social networking and privacy attitudes among college students. Psychology, Education & Society, 6(2), 82–93.
[13]
Chakraborty, R., Vishik, C., & Rao, H. R. (2013). Privacy preserving actions of older adults on social media. Decision Support Systems, 55(4), 948–956.
[14]
Courtney, K. (2008). Privacy and senior willingness to adopt smart home information technology in residential care facilities. Methods of Information in Medicine, 47(1), 76–81.
[15]
Davis, K., & James, C. (2013). Tweens' conceptions of privacy online: Implications for educators. Learning, Media and Technology, 38(1), 4–25.
[16]
Dhir, A., Kaur, P., Lonka, K., & Nieminen, M. (2016). Why do adolescents untag photos on Facebook? Computers in Human Behavior, 55, 1106–1115.
[17]
Dienlin, T., & Trepte, S. (2015). Is the privacy paradox a relic of the past? European Journal of Social Psychology, 45(3), 285–297.
[18]
Dinev, T., Hart, P., & Mullen, M. R. (2008). Internet privacy concerns and beliefs about government surveillance—An empirical investigation. Journal of Strategic Information Systems, 17(3), 214–233. https://doi.org/10.1016/j.jsis.2007.09.002
[19]
Frik, A., Nurgalieva, L., Bernd, J., Lee, J., Schaub, F., & Egelman, S. (2019). Privacy and security threat models and mitigation strategies of older adults. In Fifteenth Symposium on Usable Privacy and Security (SOUPS) 2019 (pp. 21–40).
[20]
Glaser, A. (2019, April 3). Another 540 million Facebook users' data has been exposed. Slate Magazine. Retrieved from https://slate.com/technology/2019/04/facebook-data-breach-540-million-users-privacy.html
[21]
Haight, M., Quan‐Haase, A., & Corbett, B. A. (2014). Revisiting the digital divide in Canada. Information, Communication & Society, 17(4), 503–519.
[22]
Halperin, R., & Dror, Y. (2016). Information privacy and the digital generation gap. Journal of Information Privacy and Security, 12(4), 166–180.
[23]
Hargittai, E., & Dobransky, K. (2017). Old dogs, new clicks: Digital inequality in skills and uses among older adults. Canadian Journal of Communication, 42(2), 600. https://doi.org/10.22230/cjc.2017v42n2a3176
[24]
Hargittai, E., & Marwick, A. (2016). “What can I really do?” explaining the privacy paradox with online apathy. International Journal of Communication, 10, 3737–3757.
[25]
Hoy, M. G., & Milne, G. (2013). Gender differences in privacy‐related measures for young adult Facebook users. Journal of Interactive Advertising, 10(2), 28–45. https://doi.org/10.1080/15252019.2010.10722168
[26]
Ikeda, S. (2020, January 8). LifeLabs data breach, the largest ever in Canada, may cost the company over $1 billion in class‐action lawsuit. CPO Magazine. Retrieved from https://www.cpomagazine.com/cyber-security/lifelabs-data-breach-the-largest-ever-in-canada-may-cost-the-company-over-1-billion-in-class-action-lawsuit/
[27]
Kadylak, T., & Cotten, S. (2020). United States older adults' willingness to use emerging technologies. Information, Communication & Society, 1–15. https://doi.org/10.1080/1369118X.2020.1713848
[28]
Kang, R., Dabbish, L., Fruchter, N., & Kiesler, S. (2015). My data just goes everywhere. In Eleventh symposium on usable privacy and security (SOUPS) 2015 (pp. 39–52).
[29]
Kapidzic, S., & Herring, S. (2015). Race, gender, and self‐presentation in teen profile photographs. New Media & Society, 17(6), 958–976. https://doi.org/10.1177/1461444813520301
[30]
Kezer, M., Sevi, B., Cemalcilar, Z., & Baruh, L. (2016). Age differences in privacy attitudes, literacy and privacy management on Facebook. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10(1), Article 2. https://doi.org/10.5817/CP2016-1-2
[31]
Li, X. (2018). Understanding eHealth literacy from a privacy perspective: eHealth literacy and digital privacy skills in American disadvantaged communities. American Behavioral Scientist, 62(10), 1431–1449. https://doi.org/10.1177/0002764218787019
[32]
Livingstone, S., Ólafsson, K., & Staksrud, E. (2011). Social networking, age and privacy. LSE Research Online. Retrieved from http://eprints.lse.ac.uk/35849
[33]
Lu, W., & Hampton, K. N. (2017). Beyond the power of networks: Differentiating network structure from social media affordances for perceived social support. New Media & Society, 19(6), 861–879. https://doi.org/10.1177/1461444815621514
[34]
Lüders, M., & Brandtzæg, P. B. (2017). My children tell me it's so simple. New Media & Society, 19(2), 181–198.
[35]
Lutz, C., & Ranzini, G. (2017). Where dating meets data. Social Media + Society, 3(1), 1–12. https://doi.org/10.1177/2056305117697735
[36]
Maaß, W. (2011). The elderly and the internet. In S. Trepte & L. Reinecke (Eds.), Privacy online (pp. 235–249). Heidelberg, Germany: Springer.
[37]
Madden, M. (2012). Privacy management on social media sites. Pew Research Center, Internet & Technology. Retrieved from. https://www.pewresearch.org/internet/2012/02/24/privacy-management-on-social-media-sites/
[38]
Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., & Beaton, M. (2013). Teens, social media, and privacy. Pew Research Center, Internet & Technology. Retrieved from. https://www.pewresearch.org/internet/2013/05/21/teens-social-media-and-privacy/
[39]
McNeill, A., Briggs, P., Pywell, J., & Coventry, L. (2017, June). Functional privacy concerns of older adults about pervasive health‐monitoring systems. In Proceedings of the 10th international conference on pervasive technologies related to assistive environments (pp. 96–102).
[40]
Moreno, M. A., Kelleher, E., Ameenuddin, N., & Rastogi, S. (2014). Young adult females' views regarding online privacy protection at two time points. Journal of Adolescent Health, 55(3), 347–351.
[41]
Nissenbaum, H. (2015). Respecting context to protect privacy. Science and Engineering Ethics, 24(3), 831–852.
[42]
Olphert, C., Damodaran, L., & May, A. (2005, August). Towards digital inclusion. In Proceedings of the 2005 International conference on accessible design in the digital world, Dundee, Scotland. Retrieved from https://www.researchgate.net/publication/228623727_Towards_digital_inclusion-engaging_older_people_in_the_'digital_world'
[43]
Quan‐Haase, A., & Elueze, I. (2018). Revisiting the privacy paradox: Concerns and protection strategies in the social media experiences of older adults. In Proceedings of the 9th international conference on social media and society (pp. 150–159). https://doi.org/10.1145/3217804.3217907
[44]
Quan‐Haase, A., Martin, K., & Schreurs, K. (2016). Interviews with digital seniors. Information, Communication & Society, 19(5), 691–707. https://doi.org/10.1080/1369118X.2016.1140217
[45]
Quan‐Haase, A., Mo, G., & Wellman, B. (2017). Connected seniors. Information, Communication & Society, 20(7), 967–998.
[46]
Quan‐Haase, A., Wang, H., Wellman, B., & Zhang, R. (2018). Weaving family connections on and offline. In B. B. Neves & C. Casimiro (Eds.), Connecting families? (pp. 59–79). Bristol, UK: Policy Press.
[47]
Quan‐Haase, A., Williams, C., Kicevski, M., Elueze, I., & Wellman, B. (2018). Dividing the grey divide: Deconstructing myths about older adults' online activities, skills, and attitudes. American Behavioral Scientist, 62(9), 1207–1228.
[48]
Quan‐Haase, A., Zhang, R., Wellman, B., & Wang, H. (2018). How older adults network on and offline. In M. Graham & W. H. Dutton (Eds.), Society and the internet (2nd ed.). Oxford, UK: Oxford University Press.
[49]
Ray, H., Wolf, F., Kuber, R., & Aviv, A. (2019). “Woe is me”: Examining older adults' perceptions of privacy. In CHI EA '19: Extended abstracts of the 2019 CHI conference of human factors in computer systems (pp. 1–6). https://doi.org/10.1145/3290607.3312770
[50]
Raynes‐Goldie, K. (2010). Aliases, creeping, and wall cleaning. First Monday, 15(1). Retrieved from https://firstmonday.org/article/view/2775/2432
[51]
Robinson, L., Schulz, J., Dunn, H. S., Casilli, A. A., Tubaro, P., Carveth, R., … Quan‐Haase, A. Digital inequalities 3.0. First Monday.
[52]
Statistics Canada . (2019a, October 29). Canadian internet use survey. Retrieved from https://www150.statcan.gc.ca/n1/daily-quotidien/191029/dq191029a-eng.htm
[53]
Statistics Canada . (2019b, April 29). Toronto—A data story on ethnocultural diversity and inclusion in Canada. Retrieved from https://www150.statcan.gc.ca/n1/pub/11-631-x/11-631-x2019002-eng.htm
[54]
Stutzman, F., Vitak, J., Ellison, N. B., Gray, R., & Lampe, C. (2012, May). Privacy in interaction. In Sixth international AAAI conference on weblogs and social media. (pp. 330–337) AAAI.
[55]
Suh, J., & Hargittai, E. (2015). Privacy management on Facebook. Social Media + Society, 1(2), 2056305115612783.
[56]
Taddicken, M. (2014). The “privacy paradox” in the social web. Journal of Computer‐Mediated Communication, 19(2), 248–273.
[57]
Townsend, D., Knoefel, F., & Goubran, R. (2011, August). Privacy versus autonomy. In Engineering in medicine and biology society, EMBC, 2011 annual international conference of the IEEE (pp. 4749–4752). IEEE.
[58]
Tufekci, Z. (2010). Who acquires friends through social media and why? “Rich get richer” versus “seek and ye shall find”. In Fourth international AAAI conference on weblogs and social media (pp. 170‐177). AAAI.
[59]
Van Den Broeck, E., Poels, K., & Walrave, M. (2015). Older and wiser? Facebook use, privacy concern, and privacy protection in the life stages of emerging, young, and middle adulthood. Social Media + Society, 1(2), 1–11. https://doi.org/10.1177/2056305115616149
[60]
Vitak, J., Liao, Y., Kumar, P., Zimmer, M., & Kritikos, K. (2018). Privacy attitudes and data valuation among fitness tracker users. Transforming Digital Worlds Lecture Notes in Computer Science, 10766, 229–239. https://doi.org/10.1007/978-3-319-78105-1_27
[61]
Walrave, M., Vanwesenbeeck, I., & Heirman, W. (2012). Connecting and protecting? Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 6(1), Article 3. https://doi.org/10.5817/CP2012-1-3
[62]
Whitty, M. T. (2019). Predicting susceptibility to cyber‐fraud victimhood. Journal of Financial Crime, 26(1), 277–292. https://doi.org/10.1108/JFC-10-2017-0095
[63]
Young, A. L., & Quan‐Haase, A. (2013). Privacy protection strategies on Facebook. Information, Communication & Society, 16(4), 479–500.

Cited By

View all
  • (2024)How Peer Privacy Concerns Affect Active and Passive Uses of Social Networking SitesSocial Science Computer Review10.1177/0894439323122453942:6(1440-1463)Online publication date: 1-Dec-2024
  • (2024)Proxy Accounts and Behavioural Nudges: Investigating Support for Older Adults and their Financial DelegatesProceedings of the 50th Graphics Interface Conference10.1145/3670947.3670962(1-14)Online publication date: 3-Jun-2024
  • (2024)A roadmap to achieving a healthier information ecosystem through GDPR implementation and privacy compliance technologiesJournal of the Association for Information Science and Technology10.1002/asi.2487875:10(1182-1201)Online publication date: 12-Sep-2024
  • Show More Cited By

Index Terms

  1. Online privacy concerns and privacy protection strategies among older adults in East York, Canada
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image Journal of the Association for Information Science and Technology
          Journal of the Association for Information Science and Technology  Volume 71, Issue 9
          September 2020
          152 pages
          ISSN:2330-1635
          EISSN:2330-1643
          DOI:10.1002/asi.v71.9
          Issue’s Table of Contents

          Publisher

          John Wiley & Sons, Inc.

          United States

          Publication History

          Published: 06 August 2020

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 05 Jan 2025

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)How Peer Privacy Concerns Affect Active and Passive Uses of Social Networking SitesSocial Science Computer Review10.1177/0894439323122453942:6(1440-1463)Online publication date: 1-Dec-2024
          • (2024)Proxy Accounts and Behavioural Nudges: Investigating Support for Older Adults and their Financial DelegatesProceedings of the 50th Graphics Interface Conference10.1145/3670947.3670962(1-14)Online publication date: 3-Jun-2024
          • (2024)A roadmap to achieving a healthier information ecosystem through GDPR implementation and privacy compliance technologiesJournal of the Association for Information Science and Technology10.1002/asi.2487875:10(1182-1201)Online publication date: 12-Sep-2024
          • (2023)‘Ought’ should not assume ‘Can’? Basic Capabilities in Cybersecurity to Ground Sen’s Capability ApproachProceedings of the 2023 New Security Paradigms Workshop10.1145/3633500.3633506(76-91)Online publication date: 18-Sep-2023
          • (2023)How Language Formality in Security and Privacy Interfaces Impacts Intended ComplianceProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581275(1-12)Online publication date: 19-Apr-2023
          • (2022)Promoting Information Privacy Protection Awareness for Internet of Things (IoT)Mobile Information Systems10.1155/2022/42476512022Online publication date: 1-Jan-2022
          • (2022)Privacy and Data Security in Everyday Online Services for Older AdultsProceedings of the 10th International Conference on Software Development and Technologies for Enhancing Accessibility and Fighting Info-exclusion10.1145/3563137.3563149(203-207)Online publication date: 31-Aug-2022
          • (2022)Toward Proactive Support for Older AdultsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35172496:1(1-25)Online publication date: 29-Mar-2022
          • (2022)Unofficial Proxies: How Close Others Help Older Adults with BankingProceedings of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491102.3501845(1-13)Online publication date: 29-Apr-2022
          • (2020)Editorial introductionJournal of the Association for Information Science and Technology10.1002/asi.2439471:9(997-1001)Online publication date: 6-Aug-2020

          View Options

          View options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media