1,896
Views
75
CrossRef citations to date
0
Altmetric
Original Articles

Older Adults' Knowledge of Internet Hazards

, , &
Pages 173-192 | Published online: 08 Feb 2010

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (9)

Alison M. O’Connor, Rebecca A. Judges, Kang Lee & Angela D. Evans. (2021) Can adults discriminate between fraudulent and legitimate e-mails? Examining the role of age and prior fraud experience. Journal of Elder Abuse & Neglect 33:3, pages 181-205.
Read now
Carlene Blackwood-Brown, Yair Levy & John D’Arcy. (2021) Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective. Journal of Computer Information Systems 61:3, pages 195-206.
Read now
Mengtian Jiang, Hsin-yi Sandy Tsai, Shelia R. Cotten, Nora J. Rifon, Robert LaRose & Saleem Alhabash. (2016) Generational differences in online safety perceptions, knowledge, and practices. Educational Gerontology 42:9, pages 621-634.
Read now
Victoria Kisekka, Rajarshi Chakraborty, Sharmistha Bagchi-Sen & H. Raghav Rao. (2015) Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults. Journal of Information Privacy and Security 11:3, pages 158-173.
Read now
Janet Chang, Carolyn McAllister & Rosemary McCaslin. (2015) Correlates of, and Barriers to, Internet Use Among Older Adults. Journal of Gerontological Social Work 58:1, pages 66-85.
Read now
Ivan Watkins, Bill Kules, Xiaojun Yuan & Bo Xie. (2014) Heuristic Evaluation of Healthy Eating Apps for Older Adults. Journal of Consumer Health on the Internet 18:2, pages 105-127.
Read now
Donna Lind Infeld & WilliamC. Adams. (2013) Using the Internet for Gerontology Education: Assessing and Improving Wikipedia. Educational Gerontology 39:10, pages 707-716.
Read now
Jessica Berner, Mikael Rennemark, Claes Jogréus & Johan Berglund. (2012) Distribution of personality, individual characteristics and internet usage in Swedish older adults. Aging & Mental Health 16:1, pages 119-126.
Read now

Articles from other publishers (66)

Tuğçe Karayel, Bahadır Aktaş & Adem Akbıyık. (2024) Human factors in remote work: examining cyber hygiene practices. Information & Computer Security.
Crossref
Nora McDonald & Helena M. Mentis. (2023) 'Don't Fall for This': Communications about Cybersafety from the AARP. Proceedings of the ACM on Human-Computer Interaction 7:CSCW2, pages 1-21.
Crossref
John Alagood, Gayle Prybutok & Victor R. Prybutok. (2023) Navigating Privacy and Data Safety: The Implications of Increased Online Activity among Older Adults Post-COVID-19 Induced Isolation. Information 14:6, pages 346.
Crossref
Ann-Pierre Raiche, Léanne Dauphinais, Manon Duval, Gino De Luca, David Rivest-Hénault, Thomas Vaughan, Catherine Proulx & Jean-Pierre Guay. (2023) Factors influencing acceptance and trust of chatbots in juvenile offenders’ risk assessment training. Frontiers in Psychology 14.
Crossref
Carolin Hahnel, Ulf Kroehne & Frank Goldhammer. (2023) Rule-based process indicators of information processing explain performance differences in PIAAC web search tasks. Large-scale Assessments in Education 11:1.
Crossref
Alisa Frik, Julia Bernd & Serge Egelman. (2023) A Model of Contextual Factors Affecting Older Adults’ Information-Sharing Decisions in the U.S.. ACM Transactions on Computer-Human Interaction 30:1, pages 1-48.
Crossref
Cheng-Chia Yang, Shang-Yu Yang & Yu-Chia Chang. (2023) Predicting Older Adults’ Mobile Payment Adoption: An Extended TAM Model. International Journal of Environmental Research and Public Health 20:2, pages 1391.
Crossref
Ahmad R. Pratama, Nunu Vadila & Firman M. Firmansyah. Exposing generational and gender gap in phishing awareness among young adults: A survey experiment. Exposing generational and gender gap in phishing awareness among young adults: A survey experiment.
Wilson Cheong Hin Hong, ChunYang Chi, Jia Liu, YunFeng Zhang, Vivian Ngan-Lin Lei & XiaoShu Xu. (2022) The influence of social education level on cybersecurity awareness and behaviour: a comparative study of university students and working graduates. Education and Information Technologies 28:1, pages 439-470.
Crossref
Dandi Feng, Hiba Rafih & Cosmin Munteanu. 2023. HCI for Cybersecurity, Privacy and Trust. HCI for Cybersecurity, Privacy and Trust 467 491 .
Jonas Ellefsen & Weiqin Chen. (2022) Privacy and Data Security in Everyday Online Services for Older Adults. Privacy and Data Security in Everyday Online Services for Older Adults.
Alisa Frik, Juliann Kim, Joshua Rafael Sanchez & Joanne Ma. (2022) Users’ Expectations About and Use of Smartphone Privacy and Security Settings. Users’ Expectations About and Use of Smartphone Privacy and Security Settings.
Ahmad R. Pratama, Firman M. Firmansyah & Fayruz Rahma. (2022) Security awareness of single sign-on account in the academic community: the roles of demographics, privacy concerns, and Big-Five personality. PeerJ Computer Science 8, pages e918.
Crossref
Shital Desai, Colleen McGrath, Heather McNeil, Heidi Sveistrup, Josephine McMurray & Arlene Astell. (2022) Experiential Value of Technologies: A Qualitative Study with Older Adults. International Journal of Environmental Research and Public Health 19:4, pages 2235.
Crossref
Sheri Gibson. 2022. Comprehensive Clinical Psychology. Comprehensive Clinical Psychology 114 128 .
Melvin Abraham, Michael Crabb & Saša Radomirović. 2022. Socio-Technical Aspects in Security. Socio-Technical Aspects in Security 86 107 .
Benjamin Morrison, Lynne Coventry & Pam Briggs. (2021) How do Older Adults feel about engaging with Cyber‐Security?. Human Behavior and Emerging Technologies 3:5, pages 1033-1049.
Crossref
Dr. Vasileios Karagiannopoulos, Dr. Annie Kirby, Shakiba Oftadeh-MoghadamMs.Ms. & Dr. Lisa Sugiura. (2021) Cybercrime awareness and victimisation in individuals over 60 years: A Portsmouth case study. Computer Law & Security Review 43, pages 105615.
Crossref
Shelia M. Kennison, Ian T. Jones, Victoria H. Spooner & D. Eric Chan-Tin. (2021) Who creates strong passwords when nudging fails. Computers in Human Behavior Reports 4, pages 100132.
Crossref
Zheng Yan, Yukang Xue & Yaosheng Lou. (2021) Risk and protective factors for intuitive and rational judgment of cybersecurity risks in a large sample of K-12 students and teachers. Computers in Human Behavior 121, pages 106791.
Crossref
Afroditi Pina. 2021. Forensic Psychology. Forensic Psychology 609 629 .
Ahmad R. Pratama & Firman M. Firmansyah. (2021) Until you have something to lose! Loss aversion and two-factor authentication adoption. Applied Computing and Informatics.
Crossref
Savanthi Murthy, Karthik S. Bhat, Sauvik Das & Neha Kumar. (2021) Individually Vulnerable, Collectively Safe. Proceedings of the ACM on Human-Computer Interaction 5:CSCW1, pages 1-24.
Crossref
Hirak Ray, Flynn Wolf, Ravi Kuber & Adam J. Aviv. (2021) “Warn Them” or “Just Block Them”?: Investigating Privacy Concerns Among Older and Working Age Adults. Proceedings on Privacy Enhancing Technologies 2021:2, pages 27-47.
Crossref
Shadab Kalhoro, Mobashar Rehman, Vasaki Ponnusamy & Farhan Bashir Shaikh. (2021) Extracting Key Factors of Cyber Hygiene Behaviour Among Software Engineers: A Systematic Literature Review. IEEE Access 9, pages 99339-99363.
Crossref
Cameron Coutu & Benoît Dupont. 2021. Cybercrime in Context. Cybercrime in Context 157 172 .
Fawn T. Ngo, Alex R. Piquero, Jennifer LaPrade & Bao Duong. (2020) Victimization in Cyberspace: Is It How Long We Spend Online, What We Do Online, or What We Post Online?. Criminal Justice Review 45:4, pages 430-451.
Crossref
Benjamin A. Morrison, Lynne Coventry & Pam Briggs. (2020) Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults. Frontiers in Psychology 11.
Crossref
Mª Victoria Bordonaba-Juste, Laura Lucia-Palacios & Raúl Pérez-López. (2020) Generational differences in valuing usefulness, privacy and security negative experiences for paying for cloud services. Information Systems and e-Business Management 18:1, pages 35-60.
Crossref
Lisa C. de Kok, Deborah Oosting & Marcel Spruit. (2020) The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour. Information & Security: An International Journal 46:3, pages 251-266.
Crossref
Ana Kovacevic, Nenad Putnik & Oliver Toskovic. (2020) Factors Related to Cyber Security Behavior. IEEE Access 8, pages 125140-125148.
Crossref
Kim Sawchuk & Constance Lafontaine. 2020. Human Aspects of IT for the Aged Population. Technologies, Design and User Experience. Human Aspects of IT for the Aged Population. Technologies, Design and User Experience 231 244 .
Margot J. van der Goot & Tyler Pilgrim. 2020. Chatbot Research and Design. Chatbot Research and Design 173 186 .
Yichen Dang, Cosmin Munteanu & Carrie Demmans Epp. (2019) Engaging Seniors through Automatically-Generated Photo Digests from their Families' Social Media. Engaging Seniors through Automatically-Generated Photo Digests from their Families' Social Media.
Benett Axtell & Cosmin Munteanu. (2019) Back to Real Pictures. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3:3, pages 1-24.
Crossref
Victoria Throfast, Lina Hellström, Bo Hovstadius, Göran Petersson & Lisa Ericson. (2017) e-Learning for the elderly on drug utilization: A pilot study. Health Informatics Journal 25:2, pages 227-239.
Crossref
James Nicholson, Lynne Coventry & Pamela Briggs. (2019) "If It's Important It Will Be A Headline". "If It's Important It Will Be A Headline".
René van Bavel, Nuria Rodríguez-Priego, José Vila & Pam Briggs. (2019) Using protection motivation theory in the design of nudges to improve online security behavior. International Journal of Human-Computer Studies 123, pages 29-39.
Crossref
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. Cyber Law, Privacy, and Security. Cyber Law, Privacy, and Security 20 37 .
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. National Security. National Security 60 77 .
Samantha Bordoff, Quan Chen & Zheng Yan. 2019. Multigenerational Online Behavior and Media Use. Multigenerational Online Behavior and Media Use 407 424 .
Elizabeth Mazur, Margaret L. Signorella & Michelle Hough. 2019. Advanced Methodologies and Technologies in Media and Communications. Advanced Methodologies and Technologies in Media and Communications 405 416 .
Rita Bauer, Tasha Glenn, Sergio Strejilevich, Jörn Conell, Martin Alda, Raffaella Ardau, Bernhard T. Baune, Michael Berk, Yuly Bersudsky, Amy Bilderbeck, Alberto Bocchetta, Angela M. Paredes Castro, Eric Y. W. Cheung, Caterina Chillotti, Sabine Choppin, Alessandro Cuomo, Maria Del Zompo, Rodrigo Dias, Seetal Dodd, Anne Duffy, Bruno Etain, Andrea Fagiolini, Miryam Fernández Hernandez, Julie Garnham, John Geddes, Jonas Gildebro, Michael J. Gitlin, Ana Gonzalez-Pinto, Guy M. Goodwin, Paul Grof, Hirohiko Harima, Stefanie Hassel, Chantal Henry, Diego Hidalgo-Mazzei, Anne Hvenegaard Lund, Vaisnvy Kapur, Girish Kunigiri, Beny Lafer, Erik R. Larsen, Ute Lewitzka, Rasmus W. Licht, Blazej Misiak, Patryk Piotrowski, Ângela Miranda-Scippa, Scott Monteith, Rodrigo Munoz, Takako Nakanotani, René E. Nielsen, Claire O’Donovan, Yasushi Okamura, Yamima Osher, Andreas Reif, Philipp Ritter, Janusz K. Rybakowski, Kemal Sagduyu, Brett Sawchuk, Elon Schwartz, Claire Slaney, Ahmad H. Sulaiman, Kirsi Suominen, Aleksandra Suwalska, Peter Tam, Yoshitaka Tatebayashi, Leonardo Tondo, Julia Veeh, Eduard Vieta, Maj Vinberg, Biju Viswanath, Mark Zetin, Peter C. Whybrow & Michael Bauer. (2018) Internet use by older adults with bipolar disorder: international survey results. International Journal of Bipolar Disorders 6:1.
Crossref
Ashley A. Cain, Morgan E. Edwards & Jeremiah D. Still. (2018) An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications 42, pages 36-45.
Crossref
Travis C. Pratt. (2018) The Myth of the Tech-Savvy Teen and the Clueless Senior Citizen. Criminal Justice Review 43:3, pages 360-369.
Crossref
Fabrice Kämpfen & Jürgen Maurer. (2018) Does education help “old dogs” learn “new tricks”? The lasting impact of early-life education on technology use among older adults. Research Policy 47:6, pages 1125-1132.
Crossref
Radoslaw Nielek, Konrad Godles & Bartlomiej Balcerzak. (2018) What are real problems of older adults and how to solve it with smart home devices?. What are real problems of older adults and how to solve it with smart home devices?.
Elizabeth Mazur, Margaret L. Signorella & Michelle Hough. 2018. Encyclopedia of Information Science and Technology, Fourth Edition. Encyclopedia of Information Science and Technology, Fourth Edition 7026 7035 .
Jenay M. Beer & Otis L. Owens. 2018. Aging, Technology and Health. Aging, Technology and Health 237 259 .
Bartlomiej Balcerzak, Wieslaw Kopec, Radoslaw Nielek, Kamil Warpechowski & Agnieszka Czajka. 2018. Advances in Intelligent Systems and Computing II. Advances in Intelligent Systems and Computing II 40 53 .
Hsiao‐Ying Huang & Masooda Bashir. (2019) Surfing safely: Examining older adults' online privacy protection behaviors. Proceedings of the Association for Information Science and Technology 55:1, pages 188-197.
Crossref
Samantha Bordoff, Quan Chen & Zheng Yan. (2017) Cyber Attacks, Contributing Factors, and Tackling Strategies. International Journal of Cyber Behavior, Psychology and Learning 7:4, pages 68-82.
Crossref
Yang Wang. (2017) The Third Wave?. The Third Wave?.
Claire M. White, Michaela Gummerum, Stacey Wood & Yaniv Hanoch. (2017) Internet Safety and the Silver Surfer: The Relationship Between Gist Reasoning and Adults' Risky Online Behavior. Journal of Behavioral Decision Making 30:4, pages 819-827.
Crossref
Bartlomiej Balcerzak, Wieslaw Kopec, Radoslaw Nielek, Sebastian Kruk, Kamil Warpechowski, Mateusz Wasik & Marek Wegrzyn. (2017) Press F1 for help: Participatory design for dealing with on-line and real life security of older adults. Press F1 for help: Participatory design for dealing with on-line and real life security of older adults.
Myung Ja Kim, Woo Gon Kim, Joung Man Kim & Chulwon Kim. (2016) Does knowledge matter to seniors’ usage of mobile devices? Focusing on motivation and attachment. International Journal of Contemporary Hospitality Management 28:8, pages 1702-1727.
Crossref
Rajarshi Chakraborty, Jaeung Lee, Sharmistha Bagchi-Sen, Shambhu Upadhyaya & H. Raghav Rao. (2016) Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults. Decision Support Systems 83, pages 47-56.
Crossref
Tamirat Abegaz, Edward C. DillonJr.Jr. & Juan E. Gilbert. (2016) Investigating Perceived Usability and Choice Satisfaction of Alternative Search Engine’s Presentation for Older Adults. Proceedings of the Human Factors and Ergonomics Society Annual Meeting 59:1, pages 80-84.
Crossref
Rachel L. Franz, Cosmin Munteanu, Barbara Barbosa Neves & Ronald Baecker. (2015) Time to Retire Old Methodologies? Reflecting on Conducting Usability Evaluations with Older Adults. Time to Retire Old Methodologies? Reflecting on Conducting Usability Evaluations with Older Adults.
Monica WhittyJames DoodsonSadie CreeseDuncan Hodges. (2015) Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords. Cyberpsychology, Behavior, and Social Networking 18:1, pages 3-7.
Crossref
CATRINA DENVIR, NIGEL J. BALMER & PASCOE PLEASENCE. (2012) Portal or pot hole? Exploring how older people use the ‘information superhighway’ for advice relating to problems with a legal dimension. Ageing and Society 34:4, pages 670-699.
Crossref
Jorge Arenas-Gaitán, Begoña Peral-Peral & María Ángeles Ramón-Jerónimo. 2014. Strategies in E-Business. Strategies in E-Business 67 77 .
María A. Ramón-Jerónimo, Begoña Peral-Peral & Jorge Arenas-Gaitán. (2013) Elderly Persons and Internet Use. Social Science Computer Review 31:4, pages 389-403.
Crossref
Nigel Martin & John Rice. (2013) Spearing High Net Wealth Individuals. International Journal of Information Security and Privacy 7:1, pages 1-15.
Crossref
Lucia F. O'Sullivan. (2012) Open to the Public: How Adolescents Blur the Boundaries Online Between the Private and Public Spheres of Their Lives. Journal of Adolescent Health 50:5, pages 429-430.
Crossref
Elizabeth Mazur, Margaret L. Signorella & Michelle Hough. 2012. Encyclopedia of Cyber Behavior. Encyclopedia of Cyber Behavior 608 619 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.