1,842
Views
10
CrossRef citations to date
0
Altmetric
Research Article

Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective

, ORCID Icon &

References

  • Abawajy J. User preference of cybersecurity awareness delivery methods. Behav Inf Technol. 2014;33(3):236–47. doi:10.1080/0144929X.2012.708787.
  • D’Arcy J, Hovav A, Galletta D. User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inf Syst Res. 2009;20(1):79–98. doi:10.1287/isre.1070.0160.
  • Purkait S, Kumar De S, Suar D. An empirical investigation of the constructs that influence Internet user’s ability to correctly identify a phishing. Inf Manage Comput Secur. 2014;22(3):194–234. doi:10.1108/IMCS-05-2013-0032. website.
  • Hong J. The state of phishing attacks. Commun Assoc Comput Mach. 2012;55(1):74–81. doi:10.1145/2063176.2063197.
  • Futcher ALL. A framework to assist email users in the identification of phishing attacks. Inf Comput Secur. 2015;23:1–14.
  • Noor MM, Hassan WH. Wireless networks: developments, threats and countermeasures. Int J Digital Inf Wirel Commun (IJDIWC). 2013;3:119–34.
  • Claar CL, Johnson J. Analyzing home PC security adoption behavior. J Comput Inf Syst. 2012;52:20–29.
  • Grimes GA, Hough MG, Mazur E, Signorella ML. Older adults’ knowledge of Internet hazards. Educ Gerontology. 2010;36(3):173–92. doi:10.1080/03601270903183065.
  • Choo -K-KR. The cyber threat landscape: challenges and future research directions. Comput Secur. 2011;30(8):719–31. doi:10.1016/j.cose.2011.08.004.
  • Rahim NHA, Hamid S, Kiah LM, Shamshirband S, Furnell S. A systematic review of approaches to assessing cybersecurity awareness. Kybernetes. 2015;44(4):606–22. doi:10.1108/K-12-2014-0283.
  • Ng C. Motivation among older adults in learning computing technologies: a grounded model. Educ Gerontology. 2007;34(1):1–14. doi:10.1080/03601270701763845.
  • Shillair R, Cotten SR, Tsai H-YS, Alhabash S, LaRose R, Rifon NJ. Online safety begins with you and me: convincing Internet users to protect themselves. Comput Hum Behav. 2015;48:199–207. doi:10.1016/j.chb.2015.01.046.
  • Kritzinger E, von Solms SH. Cybersecurity for home users: a new way of protection through awareness enforcement. Comput Secur. 2010;29(8):840–47. doi:10.1016/j.cose.2010.08.001.
  • Iyer R, Eastman JK. The elderly and their attitudes toward the Internet: the impact on Internet use, purchase, and comparison shopping. J Marketing Theory Pract. 2006;14(1):57–67. doi:10.2753/MTP1069-6679140104.
  • Perrin P, Duggan M (2015). Americans’ internet access: 2000–2015. Pew research center. Retrieved from http://www.pewinternet.org/2015/06/26/americans-internet-access-2000-2015/
  • Willis DP (2015, June 15). 5 steps for seniors to avoid financial fraud. McClatchy - Tribune Business News Retrieved from http://www.app.com/story/money/business/consumer/2015/06/15/senior-financial-fraud/71264182/
  • Greengard S. Facing an age-old problem. Commun Assoc Comput Mach. 2009;52(9):20–22. doi:10.1145/1562164.1562173.
  • Jones TL. Protecting the elderly. Law & Order. 2001;49:102–06.
  • Mensch S, Wilkie L. Information security activities of college students: an exploratory study. Acad Inf Manage Sci J. 2011;14:91–116.
  • White GL. Education and prevention relationships on security incidents for home computers. J Comput Inf Syst. 2015;55(3):29–37. doi:10.1080/08874417.2015.11645769.
  • Anderson CL, Agarwal R. Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Q. 2010;34(3):613–A15. doi:10.2307/25750694.
  • Denning T, Kohno T, Levy HM. Computer security and the modern home. Commun Assoc Comput Mach. 2013;56(1):94–103. doi:10.1145/2398356.2398377.
  • Albrechtsen E, Hovden J. Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study. Comput Secur. 2010;29(4):432–45. doi:10.1016/j.cose.2009.12.005.
  • Carlton M, Levy Y (2015). Expert assessment of the top platform independent cybersecurity skills for non-IT professionals. Proceedings of the 2015 IEEE SoutheastCon, Ft. Lauderdale, Florida, pp.1–6.
  • Boss S, Kirsch L, Angermeier I, Shingler R, Boss R. If someone is watching, I’ll do what I’m asked: mandatoriness, control, and information security. Eur J Inf Syst. 2009;18(2):151–64. doi:10.1057/ejis.2009.8.
  • Holt J, Turner G. Examining risks and protective constructs of on-line identity theft. Deviant Behav. 2012;33(4):308–23. doi:10.1080/01639625.2011.584050.
  • Johnston AC, Warkentin M. Fear appeals and information security behaviors: an empirical study. MIS Q. 2010;34(3):549–A4. doi:10.2307/25750691.
  • McCrohan KF, Engel K, Harvey JW. Influence of awareness and training on cyber security. J Int Commerce. 2010;9(1):23–41. doi:10.1080/15332861.2010.487415.
  • Hall MT, Marshall JE. Intrinsic and extrinsic motivation within the context of modern education. In: Railean E, Walker G, Elçi A, Jackson L, editors. Handbook of research on applied learning theory and design in modern education. Hershey (PA): IGI Global; 2016. p. 292–308.
  • Ryan RM, Deci EL. Intrinsic and extrinsic motivations: classic definitions and new directions. Contemp Educ Psychol. 2000;25(1):54–67. doi:10.1006/ceps.1999.1020.
  • Chris Zhao Y, Zhu Q. Effects of extrinsic and intrinsic motivation on participation in crowdsourcing contest. Online Inf Rev. 2014;38(7):896–917. doi:10.1108/OIR-08-2014-0188.
  • Deci EL, Ryan RM. Intrinsic motivation and self-determination in human behavior. New York, NY: Plenum; 1985.
  • Deci EL. Effects of externally mediated rewards on intrinsic motivation. J Personality and Social Psychol. 1971;18(1):105–15. doi:10.1037/h0030644.
  • Feng X, Fu S, Qin J. Determinants of consumers’ attitudes toward mobile advertising: the mediating roles of intrinsic and extrinsic motivations. Comput Hum Behav. 2016;63:334–41. doi:10.1016/j.chb.2016.05.024.
  • Lee MKO, Cheung CMK, Chen Z. Acceptance of Internet-based learning medium: the role of extrinsic and intrinsic motivation. Inf Manage. 2005;42(8):1095–104. doi:10.1016/j.im.2003.10.007.
  • Cota TT, Ishitani L, Vieira JN. Mobile game design for the elderly: a study with focus on the motivation to play. Comput Hum Behav. 2015;51(A):96–105. doi:10.1016/j.chb.2015.04.026.
  • Lee Y, Lee J, Hwang Y. Relating motivation to information and communication technology acceptance: self-determination theory perspective. Comput Hum Behav. 2015;51(Part A):418–28. doi:10.1016/j.chb.2015.05.021.
  • Wolf M, Haworth D, Pietron L. Measuring an information security awareness program. Rev Bus Inf Syst. 2011;15(3):9–22. doi:10.19030/rbis.v15i3.5398.
  • Bhatnagar N, Madden H, Levy Y. Initial empirical testing of potential constructs contributing to patient use of secure medical teleconferencing. J Comput Inf Syst. 2016;57(1):89–95. doi:10.1080/08874417.2016.1181504.
  • Compeau D, Higgins C. Computer self-efficacy: development of a measure and initial test. MIS Q. 1995;19(2):189–211. doi:10.2307/249688.
  • D’Arcy J, Hovav A. Does one size fit all? Examining the differential effects of IS security countermeasures. J Bus Ethics. 2009;89(1):59–71. doi:10.1007/s10551-008-9909-7.
  • Rhee H, Kim C, Ryu YU. Self-efficacy in information security: its influence on end users’ information security practice behavior. Comput Secur. 2009;28(8):816–26. doi:10.1016/j.cose.2009.05.008.
  • Lai F, Li D, Hsieh C-T. Fighting identity theft: the coping perspective. Decis Support Syst. 2012;52(2):353–63. doi:10.1016/j.dss.2011.09.002.
  • Nemati HR, Van Dyke T. Do privacy statements really work? The effect of privacy statements and fair information practices on trust and perceived risk in E-commerce. International Journal of Information Security and Privacy. 2009;3(1):45–64. doi:10.4018/IJISP.
  • Roberts LD, Indermaur D, Spiranovic C. Fear of cyberidentity theft and related fraudulent activity. Psychiatry, Psychol Law. 2013;20(3):315–28. doi:10.1080/13218719.2012.672275.
  • Liang H, Xue Y. Understanding security behaviors in personal computer usage: a threat avoidance perspective. J Assoc Inf Syst. 2010;11(7):394–413. doi:10.17705/1jais.
  • Workman M, Bommer WH, Straub D. Security lapses and the omission of information security measures: a threat control model and empirical test. Comput Hum Behav. 2008;24(6):2799–816. doi:10.1016/j.chb.2008.04.005.
  • Yazdipour R, Neace WP. Operationalizing a behavioral finance risk model: a theoretical and empirical framework. J Entrepreneurial Finance. 2013;16:1–32.
  • Wagner N, Hassanein K, Head M. Computer use by older adults: a multi-disciplinary review. Comput Hum Behav. 2010;26(5):870–82. doi:10.1016/j.chb.2010.03.029.
  • Chen K, Chan AH. Use or non-use of gerontechnology – a qualitative study. Int J Environ Res Public Health. 2013;10(10):4645–66. doi:10.3390/ijerph10104645.
  • Gonzalez A, Maria PR, Viadel V. ICT learning by older adults and their attitudes toward computer use. Current Gerontology Geriatrics Res. 2015;1–7. doi:10.1155/2015/849308.
  • Schmidt LI, Wahl H, Plischke H. Older adults’ performance in technology-based tasks: cognitive ability and beyond. J Gerontological Nurs. 2014;40(4):18–24. doi:10.3928/00989134-20140218-02.
  • Inan FA, Namin AS, Pogrund RL, Jones KS. Internet use and cybersecurity concerns of individuals with visual impairments. J Educ Technol Soc. 2016;19:28–40.
  • Mohamed N, Ahmad IH. Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia. Comput Hum Behav. 2012;28(6):2366–75. doi:10.1016/j.chb.2012.07.008.
  • Choi MS (2013). Assessing the role of user computer self-efficacy, cybersecurity countermeasures awareness, and cybersecurity skills toward computer misuses intention at government agencies ( Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses. ( UMI No. 3599848).
  • Rezgui Y, Marks A. Information security awareness in higher education: an exploratory study. Comput Secur. 2008;27(7–8):241–53. doi:10.1016/j.cose.2008.07.008.
  • Carlton M, Levy Y, Ramim MM. Mitigating cyber attacks through the measurement of non-IT professionals’ cybersecurity skills. Inf Comput Secur. 2019;27(x):xx–xx. forthcoming
  • Adams M, Makramalla M. Cybersecurity skills training: an attacker-centric gamified approach. Technol Innovation Manage Rev. 2015;5(1):5–14. doi:10.22215/timreview/861.
  • Nagarajan A, Allbeck JM, Sood A, Janssen TL (2012). Exploring game design for cybersecurity training. 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), Bangkok, pp. 256–62.
  • Phipps STA, Prieto LC, Ndinguri EN. Teaching an old dog new tricks: investigating how age, ability, and self-efficacy influence intentions to learn and learning among participants in adult education. Acad Educ Leadership J. 2013;17:13–25.
  • Dinev T, Xu H, Smith JH, Hart P. Information privacy and correlates: an empirical attempt to bridge and distinguish privacy-related concepts. Eur J Inf Syst. 2013;22(3):295–316. doi:10.1057/ejis.2012.23.
  • Mertler C, Vannatta RA. Advanced and multivariate statistical methods. Glendale (CA): Pyrczak Publishing; 2013.
  • Anderson KB. Who are the victims of identity theft? The effect of demographics. J Public Policy Marketing. 2006;25(2):160–71. doi:10.1509/jppm.25.2.160.
  • Carlton M (2016). Development of a cybersecurity skills index: a scenarios-based, hands-on measure of non-IT professionals’ cybersecurity skills (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses. (UMI No. 10240271).
  • Furnell SM, Bryant P, Phippen AD. Assessing the security perceptions of personal Internet users. Comput Secur. 2007;26(5):410–17. doi:10.1016/j.cose.2007.03.001.
  • Furnell S, Tsaganidi V, Phippen A. Security beliefs and barriers for novice Internet users. Comput Secur. 2008;27(7–8):235–40. doi:10.1016/j.cose.2008.01.001.
  • Gatto SL, Tak SH. Computer, Internet, and e-mail use among older adults: benefits and barriers. Edu Gerontology. 2008;34(9):800–11. doi:10.1080/03601270802243697.
  • Imgraben J, Engelbrecht A, Choo KR. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behav Inf Technol. 2014;33(12):1347–60. doi:10.1080/0144929X.2014.934286.
  • Maddison J, Jeske D. Fear and perceived likelihood of victimization in traditional and cyber settings. Int J Cyber Behav, Psychol Learn (IJCBPL). 2014;4(4):23–40. doi:10.4018/IJCBPL.
  • Morgan J, Ravindran S. An examination of home Internet and mobile device use in the U.S. Interdiscip J Inf, Knowl Manage. 2014;9:1–18. doi:10.28945/1935.
  • Reisig M, Pratt T, Holtfreter K. Perceived risk of Internet theft victimization: examining the effects of social vulnerability and financial impulsivity. Criminal Justice Behav. 2009;36(4):369–84. doi:10.1177/0093854808329405.
  • Kumar N, Mohan K, Holowczak R. Locking the door but leaving the computer vulnerable: constructs inhibiting home users’ adoption of software firewalls. Decis Support Syst. 2008;46(1):254–64. doi:10.1016/j.dss.2008.06.010.
  • Wall JD, Palvia P, Lowry PB. Control-related motivations and information security policy compliance: the role of autonomy and efficacy. J Inf Privacy Secur. 2013;9(4):52–79. doi:10.1080/15536548.2013.10845690.
  • Creswell JW. Research design: qualitative, quantitative, and mixed methods approaches. 4th Edition. Thousand Oaks (CA): Sage Publication; 2014.
  • Straub DW. Validating instruments in MIS research. MIS Q. 1989;13(2):147–69. doi:10.2307/248922.
  • Kajzer M, D’Arcy J, Crowell CR, Striegel A, Bruggen DV. An exploratory investigation of message-person congruence in information security awareness campaigns. Comput Secur. 2014;43:64–76. doi:10.1016/j.cose.2014.03.003.
  • Zhao AL, Hanmer-Lloyd S, Ward P, Goode MMH. Perceived risk and Chinese consumers’ internet banking services adoption. Int J Bank Marketing. 2008;26(7):505–25. doi:10.1108/02652320810913864.
  • Laganá L, Oliver T, Ainsworth A, Edwards M. Enhancing computer self-efficacy and attitudes in multi-ethnic older adults: a randomized controlled study. Ageing Soc. 2011;31(6):911–33. doi:10.1017/S0144686X10001340.
  • Nausheen M. An adaptation of the Motivated Strategies for Learning Questionnaire (MSLQ) for postgraduate students in Pakistan: results of an exploratory factor analysis. Bull Edu Res. 2016;38:1–16.
  • Pintrich PR, Smith DA, Garcia T, McKeachie WJ. Reliability and predictive validity of the motivation strategies for learning questionnaire (MSLQ). Edu Psychol Meas. 1993;53(3):801–13. doi:10.1177/0013164493053003024.
  • Cicchetti DV, Shoinralter D, Tyrer PJ. The effect of number of rating scale categories on levels of interrater reliability: a Monte Carlo investigation. Appl Psychol Meas. 1985;9(1):31–36. doi:10.1177/014662168500900103.
  • Levy Y. A case study of management skills comparison in online MBA programs. Int J Inf Commun Technol Edu. 2005;1(3):1–20. doi:10.4018/jicte.2005070101.
  • Torkzadeh G, Lee J. Measures of perceived end-user computing skills. Inf Manage. 2003;40(7):607–15. doi:10.1016/S0378-7206(02)00090-3.
  • Rea LM, Parker RA. Designing and conducting survey research: a comprehensive guide. 4th edn. San Francisco (CA): Jossey-Bass; 2014.
  • Levy Y. Assessing the value of e-learning systems. Hershey (PA): Information Science Publishing; 2006.
  • Hair JF, Hult JTM, Ringle CM, Sarstedt M. A primer on partial least squares structural equation modeling (PLS-SEM). Thousand Oaks (CA): Sage Publication; 2014.
  • Levy Y, Danet T. Implementation success model in government agencies: a case of a centralized identification system at NASA. Int J Inf Syst Serv Sect. 2010;2(2):19–32. doi:10.4018/IJISSS.
  • Goodwin CL. Use of the computer and the Internet by well older adults. Act Adapt Aging. 2013;37(1):63–78. doi:10.1080/01924788.2012.729186.
  • Lam JC, Lee MO. Digital inclusiveness – longitudinal study of Internet adoption by older adults. J Manage Inf Syst. 2006;22(4):177–206. doi:10.2753/MIS0742-1222220407.
  • Lepper MR, Corpus JH, Iyengar SS. Intrinsic and extrinsic motivational orientations in the classroom: age differences and academic correlates. J Edu Psychol. 2005;97(2):184–96. doi:10.1037/0022-0663.97.2.184.
  • Hasan B, Ali JMH. An empirical examination of a model of computer learning performance. J Comput Inf Syst. 2004;44:27–33.
  • Zhang Y, Espinoza S. Relationships among computer-self-efficacy, attitudes toward computers, and desirability of learning computer skills. J Res Comput Edu. 1998;30(4):420–38. doi:10.1080/08886504.1998.10782236.
  • Bandura A. Social foundation of thought and action: a social cognitive theory. Englewood Cliffs (NJ): Prentice Hall; 1986.
  • Herath T, Rao HR. Protection motivation and deterrence: a framework for security policy compliance in organizations. Eur J Inf Syst. 2009;18(2):106–25. doi:10.1057/ejis.2009.6.
  • Jones BH, Heinrichs LR. Do business students practice smartphone security? J Comput Inf Syst. 2012;53:22–30.
  • Statista. (2017). Resident population of the United States by sex and age as of July 1 (in millions). Retrieved from: https://www.statista.com/statistics/241488/population-of-the-us-by-sex-and-age/

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.