411
Views
3
CrossRef citations to date
0
Altmetric
Original Articles

Continuance in online participation following the compromise of older adults’ identity information: a literature review

ORCID Icon, , &
Pages 637-657 | Received 24 Apr 2017, Accepted 22 Jan 2018, Published online: 21 Feb 2018

References

  • ABS (Australian Bureau of Statistics). 2000. 8146.0 – Household Use of Information Technology, Australia, 1999. http://www.abs.gov.au/AUSSTATS/[email protected]/DetailsPage/8146.01999?OpenDocument
  • ABS (Australian Bureau of Statistics). 2014a. 8146.0 – Household Use of Information Technology, Australia, 2010-11. http://www.abs.gov.au/AUSSTATS/[email protected]/Previousproducts/01B5AC65512C0960CA25796600152D04?opendocument
  • ABS (Australian Bureau of Statistics). 2014b. 8146.0 – Household Use of Information Technology, Australia, 2012-13. http://www.abs.gov.au/ausstats/[email protected]/Lookup/8146.0Chapter32012-13
  • ABS (Australian Bureau of Statistics). 2016a. 4528.0 – Personal Fraud, 2014-15. http://www.abs.gov.au/ausstats/[email protected]/Latestproducts/4528.0Main%20Features152014-15?opendocument&tabname=Summary&prodno=4528.0&issue=2014-15&num=&view=
  • ABS (Australian Bureau of Statistics). 2016b. 4528.0 – Personal Fraud, 2014-15. In Focus: Experiences of Personal Fraud for Persons aged 55 and over. http://www.abs.gov.au/AUSSTATS/[email protected]/Lookup/4528.0Main+Features172014-15?OpenDocument
  • ACC (Australian Crime Commission). 2013. Identity Crime. https://www.crimecommission.gov.au/sites/default/files/IDENTITY%20CRIME%20JULY%202013.pdf
  • ACMA (Australian Communications and Media Authority). 2009. Australia in the Digital Economy, Report 1: Trust and Confidence. http://www.acma.gov.au/webwr/aba/about/recruitment/trust_and_confidence_aust_in_digital_economy.pdf
  • ACORN (Australian Cybercrime Online Reporting Network). 2015. Identity Theft. Accessed 15 June 2015. http://www.acorn.gov.au/what-is-cybercrime/identity-theft/
  • ACPR (Australian Centre for Policing Research). 2006. Standardisation of Definitions of Identity Crime Terms: A Step towards Consistency. Payneham, SA: Australian Centre for Policing Research.
  • Akhter, Syed H. 2012. “Who Spends More Online? The Influence of Time, Usage Variety, and Privacy Concern on Online Spending.” Journal of Retailing and Consumer Services 19(1): 109–115. doi:10.1016/j.jretconser.2011.10.002.
  • Anderson, Keith B. 2006. “Who are the Victims of Identity Theft? The Effect of Demographics.” Journal of Public Policy & Marketing 25(2): 160–171. doi:10.1509/jppm.25.2.160.
  • Baek, Young Min, Young Bae, Irkwon Jeong, Eunmee Kim, and June Woong Rhee. 2014. “Changing the Default Setting for Information Privacy Protection: What and Whose Personal Information can be Better Protected?.” Social Science Journal 51(4): 523–533. doi: 10.1016/j.soscij.2014.07.002.
  • Beanland, Vanessa, Michael G. Lenné, Paul M. Salmon, and Neville A. Stanton. 2016. “Variability in Decision-Making and Critical Cue Use by Different Road Users at Rail Level Crossings.” Ergonomics 59(6): 754–766. doi: 10.1080/00140139.2015.1095356.
  • Becker, Laura, and Key Pousttchi. 2012. “Social Networks: The Role of Users’ Privacy Concerns.” In Proceedings of the 14th International Conference on Information Integration and Web-based Applications & Services - IIWAS ’12. edited by D. Taniar E. Pardede M. Steinbauer and I. Khalil 187–195. New York, NY: ACM.
  • Bergström, Annika. 2015. “Online Privacy Concerns: A Broad Approach to Understanding the Concerns of Different Groups for Different Uses.” Computers in Human Behavior 53: 419–426. doi: 10.1016/j.chb.2015.07.025.
  • Böhme, Rainer, and Tyler Moore. 2012. “How do Consumers React to Cybercrime?.” Paper presented at the 7th APWG eCrime Researchers Summit, eCRS 2012. Las Croabas, Puerto Rico: October 22-25.
  • Button, Mark, Chris Lewis, and Jacki Tapley. 2009. A Better Deal for Fraud Victims. Research Into Victims’ Needs and Experiences. National Fraud Authority. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/118468/better-deal-for-fraud-victims.pdf.
  • Carden, Tony, Natassia Goode, and Paul M. Salmon. 2017. “Not as Simple as it Looks: Led Outdoor Activities are Complex Sociotechnical Systems.” Theoretical Issues in Ergonomics Science 18(4): 318–337. doi:10.1080/1463922X.2017.1278806.
  • Cassano-Piche, A. L., K. J. Vicente, and G. A. Jamieson. 2009. “A Test of Rasmussen's Risk Management Framework in the Food Safety Domain: BSE in the UK.” Theoretical Issues in Ergonomics Science 10(4): 283–304. doi:10.1080/14639220802059232.
  • Chan, Michael. 2015. “Multimodal Connectedness and Quality of Life: Examining the Influences of Technology Adoption and Interpersonal Communication on Well-Being Across the Life Span.” Journal of Computer-Mediated Communication 20(1): 3–18. doi:10.1111/jcc4.12089.
  • Chattaraman, Veena, Wi-Suk Kwon, and Juan Gilbert. 2012. “Internet Use and Perceived Impact on Quality of Life Among Older Adults: A Phenomenological Investigation.” International Journal of Health, Wellness & Society 2(3): 1–13.
  • Choudrie, Jyoti, and Amit Vyas. 2014. “Silver Surfers Adopting and Using Facebook? A Quantitative Study of Hertfordshire, UK Applied to Organizational and Social Change.” Technological Forecasting and Social Change 89: 293–305. doi:10.1016/j.techfore.2014.08.007.
  • Cifas. 2016. Criminals Target UK Youth As Identity Fraud Rises. Accessed 7 March 2017. https://www.cifas.org.uk/press_centre/criminals_target_UK_youth_as_dentity_fraud_rises
  • Cotten, Shelia R., George Ford, Sherry Ford, and Timothy M. Hale. 2012. “Internet Use and Depression Among Older Adults.” Computers in Human Behavior 28(2): 496–499. doi:10.1016/j.chb.2011.10.021.
  • Cotten, Shelia R., William A. Anderson, and Brandi M. McCullough. 2013. “Impact of Internet Use on Loneliness and Contact with Others Among Older Adults: Cross-Sectional Analysis.” Journal of Medical Internet Research 15(2): e39. doi: 10.2196/jmir.2306.
  • Cotten, Shelia R., George Ford, Sherry Ford, and Timothy M. Hale. 2014. “Internet Use and Depression Among Retired Older Adults in the United States: A Longitudinal Analysis.” Journals of Gerontology, Series B: Psychological Sciences and Social Science 69(5): 763–771. doi:10.1093/geronb/gbu018.
  • Cross, Cassandra, Russell G. Smith, and Kelly Richards. 2014. Challenges of Responding to Online Fraud Victimisation in Australia. Trends and Issues in Crime and Criminal Justice, No. 474. Canberra: Australian Institute of Criminology. http://aic.gov.au/publications/current%20series/tandi/461-480/tandi474.html
  • Damodaran, L., C. W. Olphert, and J. Sandhu. 2014. “Falling off the Bandwagon? Exploring the Challenges to Sustained Digital Engagement by Older People.” Gerontology 60(2): 163–173. doi:10.1159/000357431.
  • Dashti, Ali, Izak Benbasat, and Andrew Burton-Jones. 2009. “Developing Trust Reciprocity in Electronic Government: The Role of Felt Trust.” Paper presented at the European and Mediterranean Conference on Information Systems, EMCIS 2009. Izmir, Turkey: July 13–14. https://www.researchgate.net/profile/Andrew_Burton-Jones/publication/228479792_DEVELOPING_TRUST_RECIPROCITY_IN_ELECTRONIC-GOVERNMENT_THE_ROLE_OF_FELT_TRUST/links/0deec52293bb38f755000000.pdf
  • Dear, Blake F., Judy Zou, Nickolai Titov, Carolyn Lorian, Luke Johnston, Jay Spence, Tracy Anderson, Perminder Sachdev, Henry Brodaty, and Robert G. Knight. 2013. “Internet-Delivered Cognitive Behavioural Therapy for Depression: A Feasibility Open Trial for Older Adults.” Australian and New Zealand Journal of Psychiatry 47(2): 169–176. doi:10.1177/0004867412466154.
  • Dekker, Sidney W. A., Peter A. Hancock, and Peter Wilkin. 2013. “Ergonomics and Sustainability: Towards an Embrace of Complexity and Emergence.” Ergonomics 56(3): 357–364. doi:10.1080/00140139.2012.718799.
  • Eisenstein, Eric M. 2008. “Identity theft: An Exploratory Study with Implications for Marketers.” Journal of Business Research 61(11): 1160–1172. doi:10.1016/j.jbusres.2007.11.012.
  • Harrell, E. 2015. Victims of Identity Theft, 2014. Washington, US: The Bureau of Justice Statistics of the U.S. Department of Justice. http://www.bjs.gov/content/pub/pdf/vit14.pdf
  • Hasan, Helen, and Henry Linger. 2016. “Enhancing the Wellbeing of the Elderly: Social Use of Digital Technologies in Aged Care.” Educational Gerontology 1277(July): doi:10.1080/03601277.2016.1205425.
  • Hille, Patrick, Gianfranco Walsh, Simon Brach, and David Dose. 2011. “Why Online Identity Theft Poses a Major Threat to e-Business.” Proceedings of the ACM WebSci’11 1–2: http://journal.webscience.org/518/1/207_paper.pdf
  • IDCARE. 2015. Strategic Intelligence Assessment; Australian Identity within the Dark Net Market. Queensland: IDCARE.
  • Janda, Swinder. 2008. “Does Gender Moderate the Effect of Online Concerns on Purchase Likelihood?.” Journal of Internet Commerce 7(3): 339–358. doi:10.1080/15332860802250401.
  • Kisekka, Victoria, Rajarshi Chakraborty, Sharmistha Bagchi-Sen, and H. Raghav Rao. 2015. “Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults.” Journal of Information Privacy and Security 11(3): 158–173. doi:10.1080/15536548.2015.1073534.
  • Kleiner, Brian M., Lawrence J. Hettinger, David M. DeJoy, Yuang-Hsiang Huang, and Peter E. D. Love. 2015. “Sociotechnical Attributes of Safe and Unsafe Work Systems.” Ergonomics 58(4): 635–649. doi:10.1080/00140139.2015.1009175.
  • Lacey, David. 2015. “Guilty Before Proven Innocent: The Truth About Identity Theft Customer-Organization Dynamic.” Paper presented at the 2015 Global Forum on Identity. University of Texas, Austin: May 5-6.
  • Lee, Chaiwoo, and Joseph F. Coughlin. 2015. “Perspective: Older Adults’ Adoption of Technology: An Integrated Approach to Identifying Determinants and Barriers. ” Journal of Product Innovation Management 32(5): 747–759. doi:10.1111/jpim.12176.
  • Lee, Samuel, Young Bo Moh, Maryam Tabibzadeh, and Najmedin Meshkati. 2017. “Applying the AcciMap methodology to investigate the tragic Sewol Ferry accident in South Korea.” Applied Ergonomics 59: 517–525. doi:10.1016/j.apergo.2016.07.013.
  • Leveson, Nancy. 2004. “A New Accident Model for Engineering Safer Systems.” Safety Science 42(4): 237–270. doi:10.1016/S0925-7535(03)00047-X.
  • Leveson, Nancy, Nicolas Dulac, Karen Marais, and John Carroll. 2009. “Moving Beyond Normal Accidents and High Reliability Organizations: A Systems Approach to Safety in Complex Systems.” Organization Studies 30(2-3): 227–249. doi:10.1177/0170840608101478.
  • Li, Yi-Chang. 2015. “Review of Empirical Research in Recent Decade About the Use of IT for Older Adults.” In Human Aspects of IT for the Aged Population. Design for Aging. edited by J. Zhou and G. Salvendy, 221–229. Cham, Switzerland: Springer International Publishing.
  • Lian, Jiunn-Woei, and David C. Yen. 2014. “Online Shopping Drivers and Barriers for Older Adults: Age and Gender Differences.” Computers in Human Behavior 37: 133–143. doi:10.1016/j.chb.2014.04.028.
  • Liébana-Cabanillas, Francisco, Francisco Muñoz-Leiva, Juan Sánchez-Fernández, and Maria I. Viedma-del Jesús. 2016. “The Moderating Effect of User Experience on Satisfaction with Electronic Banking: Empirical Evidence from the Spanish Case.” Information Systems and e-Business Management 14(1): 141–165. doi:10.1007/s10257-015-0277-4.
  • Lim, Rosemary H. M., Janet E. Anderson, and Peter W. Buckle. 2016. “Work Domain Analysis for Understanding Medication Safety in Care Homes in England: An Exploratory Study.” Ergonomics 59(1): 15–26. doi:10.1080/00140139.2015.1057542.
  • Lloyd, Rachel, and Anthea BIll. 2001. Australia Online: How Australians are Using Computers and The Internet. (ABS Cat. no. 2056.0). Canberra: ABS.
  • Lynch, Jennifer. 2005. “Identity Theft in Cyberspace: Crime Control Methods and Their Effectiveness in Combating Phishing Attacks.” Berkeley Technology Law Journal 20(1): 259–300. http://www.jstor.org/stable/24117505
  • McCausland, Lauren, and Nancy L. Falk. 2012. “From Dinner Table to Digital Tablet Technology's Potential for Reducing Loneliness in Older Adults.” Journal of Psychosocial Nursing and Mental Health Services 50(5): 22–26. doi:10.3928/02793695-20120410-01.
  • Mewton, Louise, Perminder S. Sachdev, and Gavin Andrews. 2013. “A Naturalistic Study of the Acceptability and Effectiveness of Internet-Delivered Cognitive Behavioural Therapy for Psychiatric Disorders in Older Australians.” PloS One 8(8): 1–6. doi:10.1371/journal.pone.0071825.
  • Mickelson, Robin Sue, and Richard J. Holden. 2017. “Medication Adherence: Staying within the Boundaries of Safety.” Ergonomics. Advance online publication. doi:10.1080/00140139.2017.1301574.
  • Miltgen, Caroline Lancelot, and H. Jeff Smith. 2015. “Exploring Information Privacy Regulation, Risks, Trust, and Behavior.” Information & Management 52(6): 741–759. doi:10.1016/j.im.2015.06.006.
  • Minotra, Dev, and Catherine M. Burns. 2017. “Understanding safe performance in rapidly evolving systems: A risk management analysis of the 2010 US financial market Flash Crash with Rasmussen's risk management framework.” Theoretical Issues in Ergonomics Science 18(6): 608–630. doi:10.1080/1463922X.2016.1254837.
  • Moher, David, Alessandro Liberati, Jennifer Tetzlaff, and Douglas G. Altman.The PRISMA Group. 2009. “Preferred Reporting Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement.” PLoS Med 6(7): e1000097. doi:10.1371/journal.pmed.1000097.
  • Neves, Barbara Barbosa, Fausto Amaro, and Jaime R. S. Fonseca. 2013. “Coming of (Old) Age in the Digital Age: ICT Usage and Non-Usage among Older Adults.” Sociological Research Online 18(2): 6–25. doi:10.5153/sro.2998.
  • Newnam, Sharon, and Natassia Goode. 2015. “Do not Blame the Driver: A Systems Analysis of the Causes of Road Freight Crashes.” Accident Analysis and Prevention 76: 141–151. doi:10.1016/j.aap.2015.01.016.
  • Nimrod, Galit. 2014. “The Benefits of and Constraints to Participation in Seniors’ Online Communities.” Leisure Studies 33(3): 247–266. doi:10.1080/02614367.2012.697697.
  • Pak, Richard, Ericka Rovira, Anne Collins McLaughlin, and Natalee Baldwin. 2017. “Does the Domain of Technology Impact User Trust? Investigating Trust in Automation Across Different Consumer-Oriented Domains in Young Adults, Military, and Older Adults.” Theoretical Issues in Ergonomics Science 18(3): 199–220. doi:10.1080/1463922X.2016.1175523.
  • Park, Yong Jin. 2013. “Digital Literacy and Privacy Behavior Online.” Communication Research 40(2): 215–236. doi:10.1177/0093650211418338.
  • Parnell, Katie Joanne, Neville A. Stanton, and Katherine Plant. 2017. “Where are we on Driver Distraction? Methods, Approaches and Recommendations.” Theoretical Issues in Ergonomics Science. Advance online publication. doi:10.1080/1463922X.2017.1414333.
  • Perrow, Charles. 1984. Normal Accidents: Living with High-Risk Technologies. Princeton, NJ: Princeton University Press.
  • Plant, Katherine L., and Neville A. Stanton. 2016. “Distributed Cognition in Search and Rescue: Loosely coupled Tasks and Tightly Coupled Roles.” Ergonomics 59(10): 1353–1376. doi:10.1080/00140139.2016.1143531.
  • Pratt, Travis C., Kristy Holtfreter, and Michael D. Reisig. 2010. “Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory.” Journal of Research in Crime and Delinquency 47(3): 267–296. doi:10.1177/0022427810365903.
  • Rasmussen, Jens. 1997. “Risk Management in a Dynamic Society: A Modelling Problem.” Safety Science 27(2-3): 183–213. doi:10.1016/S0925-7535(97)00052-0.
  • Rasmussen, Jens. 2000. “Human Factors in a Dynamic Information Society: Where are we Heading?.” Ergonomics 43(7): 869–879. doi:10.1080/001401300409071.
  • Read, Gemma J. M., Paul M. Salmon, Michael G. Lenné, and Neville A Stanton. 2015. “Designing Sociotechnical Systems with Cognitive Work Analysis: Putting Theory Back into Practice.” Ergonomics 58(5): 822–851. doi:10.1080/00140139.2014.980335.
  • Reason, James. 1997. Managing the Risks of Organisational Accidents. Burlington, VT: Ashgate Publishing Ltd.
  • Reisig, Michael D., Travis C. Pratt, and Kristy Holtfreter. 2009. “Perceived Risk of Internet Theft Victimization: Examining the Effects of Social Vulnerability and Financial Impulsivity.” Criminal Justice and Behavior 36(4): 369–384. doi:10.1177/0093854808329405.
  • Reyns, Bradford W. 2013. “Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory Beyond Direct-Contact Offenses.” Journal of Research in Crime and Delinquency 50(2): 216–238. doi:10.1177/0022427811425539.
  • Rughiniş, Cosima, and Razvan Rughiniş. 2014. “Nothing Ventured, Nothing Gained. Profiles of Online Activity, Cyber-Crime Exposure, and Security Measures of End-Users in European Union.” Computers & Security 43: 111–125. doi:10.1016/j.cose.2014.03.008.
  • Salmon, Paul M., Guy H. Walker, Gemma J. M. Read, Natassia Goode, and Neville A. Stanton. 2017. “Fitting Methods to Paradigms: Are Ergonomics Methods Fit for Systems Thinking?.” Ergonomics 60(2): 194–205. doi:10.1080/00140139.2015.1103385.
  • Salmon, Paul M., Natassia Goode, Natalie Taylor, Michael G. Lenné, Clare E. Dallat, and Caroline F. Finch. 2017. “Rasmussen's Legacy in the Great Outdoors: A New Incident Reporting and Learning System for Led Outdoor Activities.” Applied Ergonomics 59(Part B): 637–648. doi:10.1016/j.apergo.2015.07.017.
  • Shay, Richard, Iulia Ion, Robert W. Reeder, and Sunny Consolvo. 2014. “‘My Religious Aunt asked why I was trying to sell her Viagra’: Experiences with Account Hijacking.” In Proceedings of the 2014 ACM Computer-Human Interaction Conference. 2657–2666. New York: ACM.
  • Shillair, Ruth, R. V. Rikard, Shelia R. Cotten, and Hsin-Yi Sandy Tsai. 2015. “Not So Lonely Surfers: Loneliness, Social Support, Internet Use and Life Satisfaction in Older Adults.” In iConference 2015 Proceedings. http://hdl.handle.net/2142/73666
  • Smith, Russell G., and Alice Hutchings. 2014. Identity Crime and Misuse in Australia: Results of the 2013 Online Survey. Canberra: Australian Institute of Criminology.
  • Stanton, Neville A. 2014. “Representing Distributed Cognition in Complex Systems: How a Submarine Returns to Periscope Depth.” Ergonomics 57(3): 403–418. doi:10.1080/00140139.2013.772244.
  • Stanton, Neville A., and Catherine Harvey. 2017. “Beyond Human Error Taxonomies in Assessment of Risk in Sociotechnical Systems: A New Paradigm with the EAST ‘Broken-Links’ Approach.” Ergonomics 60(2): 221–233. doi:10.1080/00140139.2016.1232841
  • Stanton, N. A., R. Stewart, D. Harris, R. J. Houghton, C. Baber, R. McMaster, P. Salmon, G Hoyle, G. Walker, M. S. Young, et al. 2007. “Distributed Situation Awareness in Dynamic Systems: Theoretical Development and Application of an Ergonomics Methodology.” Ergonomics 49(12–13): 1288–1311. doi:10.1080/00140130600612762.
  • Steege, Linsey M., Kalyan S. Pasupathy, and Diane A. Drake. 2017. “A Work Systems Analysis Approach to Understanding Fatigue in Hospital Nurses.” Ergonomics. Advance online publication. doi:10.1080/00140139.2017.1280186.
  • Sterman, John D. 1994. “Learning In and About Complex Systems.” System Dynamics Review 10(2–3): 291–330. doi:10.1002/sdr.4260100214.
  • Stevens, Nicholas J., and Paul M. Salmon. 2016. “Sand, Sun and Sideways: A Systems Analysis of Beach Driving.” Safety Science 85: 152–162. doi:10.1016/j.ssci.2016.01.009.
  • Sum, Shima, R. Mark Mathews, Ian Hughes, and Andrew Campbell. 2008. “Internet Use and Loneliness in Older Adults.” Cyberpsychology & Behavior 11(2): 208–211. doi:10.1089/cpb.2007.0010.
  • Sum, Shima, R. Mark Mathews, Mohsen Pourghasem, and Ian Hughes. 2009. “Internet Use as a Predictor of Sense of Community in Older People.” Cyberpsychology & Behavior 12(2): 235–239. doi:10.1089/cpb.2008.0150
  • Svedung, I., and J. Rasmussen. 2002. “Graphic Representation of Accident Scenarios: Mapping System Structure and the Causation of Accidents.” Safety Science 40(5): 397–417. doi:10.1016/S0925-7535(00)00036-9.
  • Tajpour, Atefeh, Suhaimi Ibrahim, and Mazdak Zamani. 2013. “Identity Theft Methods and Fraud Types.” International Journal of Information Processing and Management 4(7): 51–58.
  • Tsai, Hsin-yi Sandy, Ruth Shillair, Shelia R. Cotten, Vicki Winstead, and Elizabeth Yost. 2015. “Getting Grandma Online: Are Tablets the Answer for Increasing Digital Inclusion for Older Adults in the U.S.?.” Educational Gerontology 41(10): 695–709. doi:10.1080/03601277.2015.1048165.
  • van Wilsem, Johan. 2013. “Bought It, but Never Got It. Assessing Risk Factors for Online Consumer Fraud Victimization.” European Sociological Review 29(2): 168–178. doi:10.1093/esr/jcr053.
  • Vicente, K.J., and K. Christoffersen. 2006. “The Walkerton E. Coli Outbreak: A Test of Rasmussen's Framework for Risk Management in a Dynamic Society.” Theoretical Issues in Ergonomics Science 7(2): 93–112. doi:10.1080/14639220500078153.
  • Wagner, Nicole, Khaled Hassanein, and Milena Head. 2010. “Computer Use by Older Adults: A Multi-Disciplinary Review.” Computers in Human Behavior 26(5): 870–882. doi:10.1016/j.chb.2010.03.029.
  • Walker, Guy H., Neville A. Stanton, Paul M. Salmon, and Daniel P. Jenkins. 2008. “A Review of Sociotechnical Systems Theory: A Classic Concept for New Command and Control Paradigms.” Theoretical Issues in Ergonomics Science 9(6): 479–499. doi:10.1080/14639220701635470.
  • Walker, Guy H., Neville A. Stanton, Paul M. Salmon, Daniel P. Jenkins, and Laura Rafferty. 2010. “Translating Concepts of Complexity to the Field of Ergonomics.” Ergonomics 53(10): 1175–1186. doi:10.1080/00140139.2010.513453.
  • Williams, Damien J., and Jan M. Noyes. 2007. “How does Our Perception of Risk Influence Decision-Making? Implications for the Design of Risk Information.” Theoretical Issues in Ergonomics Science 8(1): 1–35. doi:10.1080/14639220500484419.
  • Zou, Judy B., Blake F. Dear, Nickolai Titov, Carolyn N. Lorian, Luke Johnston, Jay Spence, Robert G. Knight, Tracy Anderson, and Perminder Sachdev. 2012. “Brief Internet-Delivered Cognitive Behavioral Therapy for Anxiety in Older Adults: A Feasibility Trial.” Journal of Anxiety Disorders 26(6): 650–655. doi:10.1016/j.ja

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.