1,616
Views
24
CrossRef citations to date
0
Altmetric
Articles

Generational differences in online safety perceptions, knowledge, and practices

, , , , &

References

  • Agatston, P. W., Kowalski, R., & Limber, S. (2007). Students’ perspectives on cyber bullying. Journal of Adolescent Health, 41(6), S59–S60. doi:10.1016/j.jadohealth.2007.09.003
  • Alhabash, S., Cotten, S. R., Tsai, H. S., Rifon, N. J., & LaRose, R. (2014, August). Understanding generational differences in the relationship between online banking and online security. Paper presented at the Association for Education in Journalism and Mass Communication, Montreal, Canada.
  • Alhabash, S., McAlister, A. R., Hagerstrom, A., Quilliam, E. T., Rifon, N. J., & Richards, J. I. (2013). Between likes and shares: Effects of emotional appeal and virality on the persuasiveness of anticyberbullying messages on Facebook. Cyberpsychology, Behavior, and Social Networking, 16(3), 175–182. doi:10.1089/cyber.2012.0265
  • Berkowsky, R. W., Cotten, S. R., Yost, E. A., & Winstead, V. P. (2013). Attitudes towards and limitations to ICT use in assisted and independent living communities: Findings from a specially-designed technological intervention. Educational Gerontology, 39(11), 797–811. doi:10.1080/03601277.2012.734162
  • Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101. doi:10.1191/1478088706qp063oa
  • Carpenter, B. D., & Buday, S. (2007). Computer use among older adults in a naturally occurring retirement community. Computers in Human Behavior, 23(6), 3012–3024. doi:10.1016/j.chb.2006.08.015
  • Chan, M. (2015). Multimodal connectedness and quality of life: Examining the influences of technology adoption and interpersonal communication on well‐being across the life span. Journal of Computer‐Mediated Communication, 20(1), 3–18. doi:10.1111/jcc4.2015.20.issue-1
  • Clark-Wendel, P. (2014). Financial fraud: The top 4 scams against the elderly. Retrieved from http://www.forbes.com/sites/sungardas/2014/09/09/what-everyone-should-know-about-financial-fraud-against-the-elderly/
  • Cotten, S. R., Anderson, W. A., & McCullough, B. M. (2013). Impact of Internet use on loneliness and contact with others among older adults: Cross-sectional analysis. Journal of Medical Internet Research, 15(2), e39. doi:10.2196/jmir.2306
  • Cotten, S. R., Ford, G., Ford, S., & Hale, T. M. (2012). Internet use and depression among older adults. Computers in Human Behavior, 28(2), 496–499. doi:10.1016/j.chb.2011.10.021
  • Cotten, S. R., Ford, G., Ford, S., & Hale, T. M. (2014). Internet use and depression among retired older adults in the United States: A longitudinal analysis. The Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 69(5), 763–771. doi:10.1093/geronb/gbu018
  • Cotten, S. R., McCullough, B. M., & Adams, R. G. (2011). Technological influences on social ties across the life span. In K. L. Fingerman, C. A. Berg, J. Smith, & T. C. Antonucci (Eds.), Handbook of life-span development (pp. 647–671). New York, NY: Springer.
  • Czaja, S. J., Charness, N., Fisk, A. D., Hertzog, C., Nair, S. N., Rogers, W. A., & Sharit, J. (2006). Factors predicting the use of technology: Findings from the Center for Research and Education on Aging and Technology Enhancement (CREATE). Psychology and Aging, 21(2), 333–352. doi:10.1037/0882-7974.21.2.333
  • Furnell, S., Tsaganidi, V., & Phippen, A. (2008). Security beliefs and barriers for novice Internet users. Computers & Security, 27(7–8), 235–240. doi:10.1016/j.cose.2008.01.001
  • Furnell, S. M., Bryant, P., & Phippen, A. D. (2007). Assessing the security perceptions of personal Internet users. Computers & Security, 26(5), 410–417. doi:10.1016/j.cose.2007.03.001
  • Grimes, G. A., Hough, M. G., Mazur, E., & Signorella, M. L. (2010). Older adults’ knowledge of Internet hazards. Educational Gerontology, 36(3), 173–192. doi:10.1080/03601270903183065
  • Grimes, G. A., Hough, M. G., & Signorella, M. L. (2007). Email end users and spam: Relations of gender and age group to attitudes and actions. Computers in Human Behavior, 23(1), 318–332. doi:10.1016/j.chb.2004.10.015
  • Guo, R. X., Dobson, T., & Petrina, S. (2008). Digital natives, digital immigrants: An analysis of age and ICT competency in teacher education. Journal of Educational Computing Research, 38(3), 235–254. doi:10.2190/EC.38.3.a
  • Gursoy, D., Maier, T. A., & Chi, C. G. (2008). Generational differences: An examination of work values and generational gaps in the hospitality workforce. International Journal of Hospitality Management, 27(3), 448–458. doi:10.1016/j.ijhm.2007.11.002
  • Heinz, M., Martin, P., Margrett, J. A., Yearns, M., Franke, W., Yang, H., & Chang, C. K. (2013). Perceptions of technology among older adults. Journal of Gerontological Nursing, 39(1), 42–51. doi:10.3928/00989134-20121204-04
  • Hoofnagle, C., King, J., Li, S., & Turow, J. (2010). How different are young adults from older adults when it comes to information privacy attitudes and policies? Retrieved from http://ssrn.com/abstract=1589864
  • Jones, C., Ramanau, R., Cross, S., & Healing, G. (2010). Net generation or digital natives: Is there a distinct new generation entering university? Computers & Education, 54(3), 722–732. doi:10.1016/j.compedu.2009.09.022
  • Karavidas, M., Lim, N. K., & Katsikas, S. L. (2005). The effects of computers on older adult users. Computers in Human Behavior, 21(5), 697–711. doi:10.1016/j.chb.2004.03.012
  • LaRose, R., Alhabash, S., Jiang, M., Shillair, R., Tsai, H. S., Cotten, S. R., & Rifon, N. J. (2015). Communicating online safety: Protecting our good life on the net. In H. Wang (Ed.), Communication and “the good life” (International Communication Association Theme Book Series, Vol. 2) (pp. 161–181). New York, NY: Peter Lang.
  • LaRose, R., Rifon, N. J., & Enbody, R. (2008). Promoting personal responsibility for Internet Safety. Communications of the ACM, 51(3), 71–76. doi:10.1145/1325555.1325569
  • Lee, B., Chen, Y., & Hewitt, L. (2011). Age differences in constraints encountered by seniors in their use of computers and the Internet. Computers in Human Behavior, 27(3), 1231–1237. doi:10.1016/j.chb.2011.01.003
  • Lenhart, A., & Madden, M. (2007). Teens, privacy and online social networks. Washington, DC: Pew Internet & American Life Project. Retrieved from http://www.pewinternet.org/2007/04/18/teens-privacy-and-online-social-networks/
  • Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413.
  • Mannheim, K. (1952). The sociological problem of generations. In P. Kecskemeti (Ed.), Essays on the sociology of knowledge (pp. 276–322). London, UK: Routledge & Kegan Paul.
  • Martin, N., & Rice, J. (2013). Spearing high net wealth individuals: The case of online fraud and mature age internet users. International Journal of Information Security and Privacy (IJISP), 7(1), 1–15. doi:10.4018/jisp.2013010101
  • McAfee-NCSA. (2007). McAfee-NCSA online safety study – Newsworthy analysis. Retrieved from http://staysafeonline.org/pdf/McAfee_NCSA_analysis.pdf
  • Miltgen, C. L., & Peyrat-Guillard, D. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23(2), 103–125. doi:10.1057/ejis.2013.17
  • Moscardelli, D. M., & Divine, R. (2007). Adolescents’ concern for privacy when using the Internet: An empirical analysis of predictors and relationships with privacy-protecting behaviors. Family and Consumer Sciences Research Journal, 35(3), 232–252. doi:10.1177/1077727X06296622
  • National Cyber Security & Alliance (NCSA). (2012). 2012 NCSA /McAfee online safety survey. Retrieved from https://www.staysafeonline.org/download/datasets/3890/2012_ncsa_mcafee_online_safety_study.pdf
  • National Telecommunications and Information Administration (NTIA). (2013). Exploring the digital nation: America’s emerging online experience. Retrieved from http://www.ntia.doc.gov/files/ntia/publications/exploring_the_digital_nation_-_americas_emerging_online_experience.pdf
  • Palfrey, J., & Gasser, U. (2008). Born digital: Understanding the first generation of digital natives. New York, NY: Basic Books.
  • Perrin, A., & Duggan, M. (2015). Americans’ Internet access: 2000–2015. Pew Research Center. Retrieved from http://www.pewinternet.org/files/2015/06/2015-06-26_internet-usage-across-demographics-discover_FINAL.pdf
  • Rainie, L. (2012). Baby boomers and digital technology. Paper presented at the Silver Summit, March. Washington, DC. Retrieved from http://www.pewinternet.org/2012/03/28/baby-boomers-and-technology/
  • Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93–114. doi:10.1080/00223980.1975.9915803
  • Rosenthal, R. L. (2008). Older computer-literate women: Their motivations, obstacles, and paths to success. Educational Gerontology, 34(7), 610–626. doi:10.1080/03601270801949427
  • Sessa, V. I., Kabacoff, R. I., Deal, J., & Brown, H. (2007). Generational differences in leader values and leadership behaviors. The Psychologist-Manager Journal, 10(1), 47–74. doi:10.1080/10887150709336612
  • Shillair, R., Cotten, S. R., Tsai, H. S., Alhabash, S., Larose, R., & Rifon, N. J. (2015). Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior, 48, 199–207. doi:10.1016/j.chb.2015.01.046
  • Simirenko, A. (1966). Mannheim’s generational analysis and acculturation. The British Journal of Sociology, 17, 292–299. doi:10.2307/588776
  • Smith, A. (2014). Older adults and technology use. Pew Research Center. Retrieved from http://www.pewinternet.org/2014/04/03/older-adults-and-technology-use/
  • Smola, W. K., & Sutton, C. D. (2002). Generational differences: Revisiting generational work values for the new millennium. Journal of Organizational Behavior, 23(4), 363–382. doi:10.1002/(ISSN)1099-1379
  • Symantec Corporation. (2014). 2014 Internet security threat report, Volume 19. Retrieved from http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf
  • Tsai, H. S., Jiang, M., Alhabash, S., LaRose, R., Rifon, N. J., & Cotten, S. R. (2016). Understanding online safety behaviors: A protection motivation theory perspective. Computers & Security, 59, 138–150. doi:10.1016/j.cose.2016.02.009
  • Tsai, H. S., Shillair, R., Cotten, S. R., Winstead, V., & Yost, E. (2015). Getting grandma online: Are tablets the answer for increasing digital inclusion for older adults in the U.S.? Educational Gerontology, 41, 695–709. doi:10.1080/03601277.2015.1048165
  • U.S. Census. (2011). 2010 Census Briefs: The White population 2010. Retrieved from http://www.census.gov/prod/cen2010/briefs/c2010br-05.pdf
  • U.S. Census. (2014). S0201: 2014 American Community Survey 1-Year estimates. Retrieved from http://factfinder.census.gov/faces/tableservices/jsf/pages/productview.xhtml?pid=ACS_14_1YR_S0201&prodType=table
  • Van der Kaay, C. D., & Young, W. (2012). Age-related differences in technology usage among community college faculty. Community College Journal of Research and Practice, 36(8), 570–579. doi:10.1080/10668920903054865
  • Vaniea, K., Rader, E., & Wash, R. (2014, May) Mental models of software updates. Paper presented at the International Communication Association, Seattle, WA.
  • Youn, S. (2009). Determinants of online privacy concern and its influence on privacy protection behaviors among young adolescents. Journal of Consumer Affairs, 43(3), 389–418. doi:10.1111/j.1745-6606.2009.01146.x
  • Zickhur, K. (2010). Generations 2010. Pew Research Center. Retrieved from http://www.pewinternet.org/~/media//Files/Reports/2010/PIP_Generations_and_Tech10.pdf

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.