84
Views
3
CrossRef citations to date
0
Altmetric
Articles

Investigating Factors Influencing Web-Browsing Safety Efficacy (WSE) Among Older Adults

, , &

REFERENCES

  • Adams, N., Stubbs, D., & Woods, V. (2005). Psychological barriers to Internet usage among older adults in the UK. Informatics for Health and Social Care, 30(1), 3–17. doi:10.1080/14639230500066876
  • Bagozzi, R. P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science, 16(1), 74–94. doi:10.1007/BF02723327
  • Bandura, A. (1990). Perceived self-efficacy in the exercise of control over AIDS infection. Evaluation and Program Planning, 13(1), 9–17. doi:10.1016/0149-7189(90)90004-G
  • Bandura, A. (1993). Perceived self-efficacy in cognitive development and functioning. Educational Psychologist, 28(2), 117–148. doi:10.1207/s15326985ep2802_3
  • Berner, J., Rennemark, M., Jogréus, C., & Berglund, J. ( 2012). Distribution of personality, individual characteristics and internet usage in Swedish older adults. Aging & Mental Health, 16(1), 119–126. doi:10.1080/13607863.2011.602958
  • Broady, T., Chan, A., & Caputi, P. (2010). Comparison of older and younger adults’ attitudes towards and abilities with computers: Implications for training and learning. British Journal of Educational Technology, 41(3), 473–485. doi:10.1111/bjet.2010.41.issue-3
  • Brown, S. A., & Venkatesh, V. (2005). A model of adoption of technology in the household: A baseline model test and extension incorporating household life cycle. Management Information Systems Quarterly, 29(3), 4.
  • Carlson, E. L. (2006). Phishing for elderly victims: As the elderly migrate to the Internet fraudulent schemes targeting them follow. Elder LJ, 14, 423.
  • Charness, N., & Boot, W. R. (2009). Aging and information technology use: Potential and barriers. Current Directions in Psychological Science, 18(5), 253–258. doi:10.1111/cdir.2009.18.issue-5
  • Chattaraman, V., Kwon, W.-S., & Gilbert, J. E. (2012). Virtual agents in retail web sites: Benefits of simulated social interaction for older users. Computers in Human Behavior, 28(6), 2055–2066. doi:10.1016/j.chb.2012.06.009
  • Choo, -K.-K. R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(8), 719–731. doi:10.1016/j.cose.2011.08.004
  • Chu, A., & Mastel-Smith, B. (2010). The outcomes of anxiety, confidence, and self-efficacy with internet health information retrieval in older adults: A pilot study. CIN: Computers, Informatics, Nursing, 28(4), 222–228. doi:10.1097/NCN.0b013e3181e1e271
  • Cody, M. J., Dunn, D., Hoppin, S., & Wendt, P. (1999). Silver surfers: Training and evaluating internet use among older adult learners. Communication Education, 48(4), 269–286. doi:10.1080/03634529909379178
  • Compeau, D., & Higgins, C. A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 19(2), 189–211. doi:10.2307/249688
  • Compeau, D., Higgins, C. A., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly, 23, 145–158. doi:10.2307/249749
  • Cotten, S. R., Ford, G., Ford, S., & Hale, T. M. (2012). Internet use and depression among older adults. Computers in Human Behavior, 28(2), 496–499. doi:10.1016/j.chb.2011.10.021
  • Crabb, R. M., Rafie, S., & Weingardt, K. R. (2012). Health-related internet use in older primary care patients. Gerontology, 58(2), 164–170. doi:10.1159/000329340
  • Cutler, S. J., Hendricks, J., & Guyer, A. (2003). Age differences in home computer availability and use. The Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 58(5), S271–S280. doi:10.1093/geronb/58.5.S271
  • Desimone, L. M., & Le Floch, K. C. (2004). Are we asking the right questions? Using cognitive interviews to improve surveys in education research. Educational Evaluation and Policy Analysis, 26(1), 1–22. doi:10.3102/01623737026001001
  • Gatto, S. L., & Tak, S. H. (2008). Computer, Internet, and E-mail use among older adults: benefits and barriers. Educational Gerontology, 34(9), 800–811. doi:10.1080/03601270802243697
  • Gaul, S., & Ziefle, M. (2009). Smart home technologies: Insights into generation-specific acceptance motives. In A. Holzinger, & K. Miesenberger (Eds.), HCI and usability for e-Inclusion (pp. 312–332). Berlin, Germany: Springer Berlin/Heidelberg.
  • Gist, M. E., & Mitchell, T. R. (1992). Self-efficacy: A theoretical analysis of its determinants and malleability. Academy of Management Review, 17(2), 183–211.
  • Goldfarb, A., & Tucker, C. (2011). Shifts in privacy concerns (Available at SSRN 1976321).
  • Grimes, G. A., Hough, M. G., Mazur, E., & Signorella, M. L. (2010). Older adults’ knowledge of internet hazards. Educational Gerontology, 36(3), 173–192. doi:10.1080/03601270903183065
  • Gurung, A., Luo, X., & Raja, M. (2008). An empirical investigation on customer’s privacy perceptions, trust and security awareness in E-commerce environment. Journal of Information Privacy and Security, 4(1), 42–60. doi:10.1080/2333696X.2008.10855833
  • Haigh, K. Z., Kiff, L. M., & Ho, G. (2006). The independent lifestyle assistant: Lessons learned. Assistive Technology, 18(1), 87–106. doi:10.1080/10400435.2006.10131909
  • Hair, J. F., Ringle, C. M., & Sarstedt, M. (2011). PLS-SEM: Indeed a silver bullet. The Journal of Marketing Theory and Practice, 19(2), 139–152. doi:10.2753/MTP1069-6679190202
  • Internet Crime Complaint Center. (2012). 2012 IC3 annual report. Internet Crime Complaint Center.
  • Jay, G. M., & Willis, S. L. (1992). Influence of direct computer experience on older adults’ attitudes toward computers. Journal of Gerontology, 47(4), PP250–P257. doi:10.1093/geronj/47.4.P250
  • Johnston, A. C., & Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly, 34(3), 549.
  • Kisekka, V., Bagchi-Sen, S., & Rao, H. R. (2013). Extent of private information disclosure on online social networks: An exploration of Facebook mobile phone users. Computers in Human Behavior, 29(6), 2722–2729. doi:10.1016/j.chb.2013.07.023
  • Kite, M. E., Stockdale, G. D., Whitley, B. E., & Johnson, B. T. (2005). Attitudes toward younger and older adults: An updated meta-analytic review. Journal of Social Issues, 61(2), 241–266. doi:10.1111/josi.2005.61.issue-2
  • Kraut, R., Patterson, M., Lundmark, V., Kiesler, S., Mukophadhyay, T., & Scherlis, W. (1998). Internet paradox: A social technology that reduces social involvement and psychological well-being? American Psychologist, 53(9), 1017–1031. doi:10.1037/0003-066X.53.9.1017
  • Krueger, N., & Dickson, P. R. (1994). How believing in ourselves increases risk taking: Perceived self-efficacy and opportunity recognition. Decision Sciences, 25(3), 385–400. doi:10.1111/deci.1994.25.issue-3
  • Lehtinen, V., Näsänen, J., & Sarvas, R. (2009). A little silly and empty-headed: Older adults’ understandings of social networking sites. Proceedings of the 23rd British HCI Group Annual Conference on People and Computers: Celebrating People and Technology, British Computer Society, pp. 45–54.
  • Madden, M. (2010). Older adults and social media. Pew Internet & American Life Project. Retrieved from http://pewinternet.org/Reports/2010/Older-Adults-and-Social-Media/Report.aspx
  • Manna, W. C., Belchior, P., Tomita, M., & Kemp, B. (2005). Computer use by middle-aged and older adults with disabilities. Technology and Disability, 17(1), 1–9.
  • Marcoulides, G. A., & Saunders, C. (2006). PLS: A silver bullet? Management Information Systems Quarterly, 30(2), 1.
  • McClure, C. R., Jaeger, P. T., & Bertot, J. C. (2007). The looming infrastructure plateau? Space, funding, connection speed, and the ability of public libraries to meet the demand for free Internet access. First Monday, 12(12). doi:10.5210/fm.v12i12.2017
  • Miller, L. M. S., & Bell, R. A. (2012). Online health information seeking: The influence of age, information trustworthiness, and search challenges. Journal of Aging and Health, 24(3), 525–541. doi:10.1177/0898264311428167
  • Morris, M. G., & Venkatesh, V. (2000). Age differences in technology adoption decisions: Implications for a changing work force. Personnel Psychology, 53(2), 375–403. doi:10.1111/peps.2000.53.issue-2
  • Mun, Y. Y., & Hwang, Y. (2003). Predicting the use of web-based information systems: self-efficacy, enjoyment, learning goal orientation, and the technology acceptance model. International Journal of Human-Computer Studies, 59(4), 431–449.
  • Ng, B.-Y., Kankanhalli, A., & Xu, Y. (2009). Studying users’ computer security behavior: A health belief perspective. Decision Support Systems, 46(4), 815–825. doi:10.1016/j.dss.2008.11.010
  • Percy, L. (1976). A look at personality profiles and the personality-attitude-behavior link in predicting Consumer Behavior. Advances in Consumer Research, 3(1), 119–124.
  • Phang, C. W., Sutanto, J., Kankanhalli, A., Li, Y., Tan, B. C. Y., & Teo, H.-H. (2006). Senior citizens’ acceptance of information systems: A study in the context of e-government services. IEEE Transactions on Engineering Management, 53(4), 555–569. doi:10.1109/TEM.2006.883710
  • Phillips, J. M., & Gully, S. M. (1997). Role of goal orientation, ability, need for achievement, and locus of control in the self-efficacy and goal–setting process. Journal of Applied Psychology, 82(5), 792. doi:10.1037/0021-9010.82.5.792
  • Podsakoff, P. M., MacKenzie, S. B., Lee, J.-Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: A critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903. doi:10.1037/0021-9010.88.5.879
  • Reisenwitz, T., Iyer, R., Kuhlmeier, D., & Eastman, J. (2007). The elderly’s internet usage: An updated look. Journal of Consumer Marketing, 24(7), 406–418. doi:10.1108/07363760710834825
  • Rifon, N. J., LaRose, R. J., & Lewis, M. L. (2007). Resolving the privacy paradox: Toward a social-cognitive theory of consumer privacy protection. Mimeo, Michigan State University. Retrieved from https://www.msu.edu/˜wirthch1/privacyparadox07.pdf
  • Slovic, P. (1987). Perception of risk. Science, 236(4799), 280–285. doi:10.1126/science.3563507
  • Smith, A. (2014). Older Adults and Technology Use (Pew Research Internet Project). Retrieved from http://www.pewinternet.org/2014/04/03/older-adults-and-technology-use/
  • Stajkovic, A. D., & Luthans, F. (1998). Self-efficacy and work-related performance: A meta-analysis. Psychological Bulletin, 124(2), 240–261. doi:10.1037/0033-2909.124.2.240
  • Stanton, J. M., Stam, K. R., Mastrangelo, P., & Jolton, J. (2005). Analysis of end user security behaviors. Computers & Security, 24(2), 124–133. doi:10.1016/j.cose.2004.07.001
  • Subrahmanyam, K., Reich, S. M., Waechter, N., & Espinoza, G. (2008). Online and offline social networks: Use of social networking sites by emerging adults. Journal of Applied Developmental Psychology, 29(6), 420–433. doi:10.1016/j.appdev.2008.07.003
  • Sum, S., Mathews, R. M., & Hughes, I. (2009). Participation of older adults in cyberspace: How Australian older adults use the Internet. Australasian Journal on Ageing, 28(4), 189–193. doi:10.1111/aja.2009.28.issue-4
  • Torkzadeh, G., Chang, -J. C.-J., & Demirhan, D. (2006). A contingency model of computer and Internet self-efficacy. Information & Management, 43(4), 541–550. doi:10.1016/j.im.2006.02.001
  • Torkzadeh, G., & Van Dyke, T. P. (2002). Effects of training on Internet self-efficacy and computer user attitudes. Computers in Human Behavior, 18(5), 479–494. doi: http://dx.doi.org/10.1016/S0747-5632(02)00010-9
  • Venkatesh, V., & Davis, F. D. (1996). A model of the antecedents of perceived ease of use: Development and test*. Decision Sciences, 27(3), 451–481. doi:10.1111/deci.1996.27.issue-3
  • Wagner, N., Hassanein, K., & Head, M. (2010). Computer use by older adults: A multi-disciplinary review. Computers in Human Behavior, 26(5), 870–882. doi:10.1016/j.chb.2010.03.029
  • Wang, L., Rau, P.-L. P., & Salvendy, G. (2011). Older adults’ acceptance of information technology. Educational Gerontology, 37(12), 1081–1099. doi:10.1080/03601277.2010.500588
  • Weatherall, J. W. A. (2000). A grounded theory analysis of older adults and information technology. Educational Gerontology, 26(4), 371–386. doi:10.1080/036012700407857
  • Wilson, G. D., & Brazendale, A. H. (1973). Social Attitude Correlates of Eysencks Personality Dimensions. Social Behavior and Personality: an international journal, 1(2), 115–118.
  • White, H., McConnell, E., Clipp, E., Bynum, L., Teague, C., Navas, L. … Halbrecht, H. (1999). Surfing the net in later life: A review of the literature and pilot study of computer use and quality of life. Journal of Applied Gerontology, 18(3), 358–378. doi:10.1177/073346489901800306
  • Wu, Y.-T., & Tsai, C.-C. (2006). University Students’ Internet attitudes and Internet self-efficacy: A study at Three Universities in Taiwan. Cyberpsychology & Behavior, 9(4), 441–450. doi:10.1089/cpb.2006.9.441
  • Xue, Y. (2009). Avoidance of information technology threats: A Theoretical Perspective. MIS Quarterly, 33(1), 71–90.
  • Zickuhr, K., & Madden, M. (2012). Older adults and internet use. Pew Internet & American Life Project. Retrieved from http://pewinternet.org/Reports/2012/Older-adults-and-internet-use.aspx
  • Zickuhr, K., & Smith, A. (2012). Digital differences. Pew Internet & American Life Project. Retrieved from http://pewinternet.org/Reports/2012/Digital-differences/Overview.aspx

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.