Skip to main content

Intermediate Help with Using Digital Devices and Online Accounts: Understanding the Needs, Expectations, and Vulnerabilities of Young Adults

  • Conference paper
  • First Online:
HCI for Cybersecurity, Privacy and Trust (HCII 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13333))

Included in the following conference series:

Abstract

With the revolution in digital technologies, users face challenges to learn, understand, and use modern devices and online services. Thus, they seek intermediate help, i.e., assistance from others to avail the benefits of technological advancement. The prior studies showed that people with special needs, including the users with visual impairments, and older adults ask for help from their caregivers as they encounter problems with technology use. However, there is a gap in existing literature to systematically investigate the expectations, and challenges of users in availing help from others with using digital devices (e.g., computers, mobile phones) and online accounts. We addressed this gap in our work, where we focused on the young adults. The findings from our study unpacked the contexts of availing intermediate help with using devices and accounts, where we identified the corresponding challenges, concerns, and the security and privacy risks of users.

H. Atashpanjeh and A. Behfar—contributed equally to this paper

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ahmed, T., Hoyle, R., Connelly, K., Crandall, D., Kapadia, A.: Privacy concerns and behaviors of people with visual impairments. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 3523–3532 (2015)

    Google Scholar 

  2. Akter, T., Dosono, B., Ahmed, T., Kapadia, A., Semaan, B.: I am uncomfortable sharing what i can’t see: privacy concerns of the visually impaired with camera based assistive applications. In: 29th USENIX Security Symposium, pp. 1929–1948 (2020)

    Google Scholar 

  3. Al-Ameen, M.N., Chauhan, A., Ahsan, M.M., Kocabas, H.: A look into user’s privacy perceptions and data practices of IoT devices. Inf. Comput. Secur. (2021)

    Google Scholar 

  4. Al-Ameen, M.N., Fatema, K., Wright, M., Scielzo, S.: Leveraging real-life facts to make random passwords more memorable. In: Pernul, G., Ryan, P.Y.A., Weippl, E. (eds.) ESORICS 2015. LNCS, vol. 9327, pp. 438–455. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-24177-7_22

    Chapter  Google Scholar 

  5. Al-Ameen, M.N., Kocabas, H., Nandy, S., Tamanna, T.: we, three brothers have always known everything of each other: a cross-cultural study of sharing digital devices and online accounts. Proc. Priv. Enhancing Technol. 2021(4), 203–224 (2021)

    Article  Google Scholar 

  6. Al-Ameen, M.N., Kocabas, H.M.: A first look into users’ perceptions of digital medicine technology. In: Conference Companion Publication of the 2020 on Computer Supported Cooperative Work and Social Computing, pp. 203–207 (2020)

    Google Scholar 

  7. Al-Ameen, M.N., Tamanna, T., Nandy, S., Kocabas, H.: Understanding user behavior, information exposure, and privacy risks in managing old devices. In: Moallem, A. (ed.) HCII 2021. LNCS, vol. 12788, pp. 281–296. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-77392-2_18

    Chapter  Google Scholar 

  8. Baxter, K., Courage, C., Caine, K.: Understanding Your Users: A Practical Guide to User Research Methods, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2015)

    Google Scholar 

  9. Boyatzis, R.E.: Transforming Qualitative Information: Thematic Analysis and Code Development. sage, Thousand Oaks (1998)

    Google Scholar 

  10. Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77–101 (2006)

    Article  Google Scholar 

  11. Dror, I.E., Mnookin, J.L.: The use of technology in human expert domains: challenges and risks arising from the use of automated fingerprint identification systems in forensic science. Law Probab. Risk 9(1), 47–67 (2010)

    Article  Google Scholar 

  12. Erikson, E.H.: Childhood and Society. WW Norton & Company (1993)

    Google Scholar 

  13. Hayes, J., Kaushik, S., Price, C.E., Wang, Y.: Cooperative privacy and security: Learning from people with visual impairments and their allies. In: Fifteenth Symposium on Usable Privacy and Security, pp. 1–20 (2019)

    Google Scholar 

  14. Johnson, S.U., Ulvenes, P.G., Øktedalen, T., Hoffart, A.: Psychometric properties of the general anxiety disorder 7-item (GAD-7) scale in a heterogeneous psychiatric sample. Front. Psychol. 10, 1713 (2019)

    Article  Google Scholar 

  15. Kiesler, S., Zdaniuk, B., Lundmark, V., Kraut, R.: Troubles with the internet: the dynamics of help at home. Hum.-Comput. Interact. 15(4), 323–351 (2000)

    Article  Google Scholar 

  16. Kocabas, H., Nandy, S., Tamanna, T., Al-Ameen, M.N.: Understanding User’s behavior and protection strategy upon losing, or identifying unauthorized access to online account. In: Moallem, Abbas (ed.) HCII 2021. LNCS, vol. 12788, pp. 310–325. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-77392-2_20

    Chapter  Google Scholar 

  17. Kropczynski, J., Aljallad, Z., Elrod, N.J., Lipford, H., Wisniewski, P.J.: Towards building community collective efficacy for managing digital privacy and security within older adult communities. Proc. ACM Hum.-Comput. Inter. 4(CSCW3), 1–27 (2021)

    Article  Google Scholar 

  18. Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching Johnny not to fall for phish. ACM Trans. Internet Technol. (TOIT) 10(2), 1–31 (2010)

    Article  Google Scholar 

  19. Lambert, S.R., Hoyt, C.S., Narahara, M.H.: Optic nerve hypoplasia. Surv. Ophthalmol. 32(1), 1–9 (1987)

    Article  Google Scholar 

  20. Madden, C., Halsted, M., Benton, C., Greinwald, J., Choo, D.: Enlarged vestibular aqueduct syndrome in the pediatric population. Otol. Neurotology 24(4), 625–632 (2003)

    Article  Google Scholar 

  21. Marne, S.T., Al-Ameen, M.N., Wright, M.K.: Learning system-assigned passwords: a preliminary study on the people with learning disabilities. In: SOUPS (2017)

    Google Scholar 

  22. Mayer, R.E., Anderson, R.B.: The instructive animation: helping students build connections between words and pictures in multimedia learning. J. Educ. Psychol. 84(4), 444 (1992)

    Article  Google Scholar 

  23. Mentis, H.M., Madjaroff, G., Massey, A., Trendafilova, Z.: The illusion of choice in discussing cybersecurity safeguards between older adults with mild cognitive impairment and their caregivers. Proc. ACM Hum.-Comput. Inter. 4(CSCW2), 1–19 (2020)

    Article  Google Scholar 

  24. Moore, D.R., Ferguson, M.A., Edmondson-Jones, A.M., Ratib, S., Riley, A.: Nature of auditory processing disorder in children. Pediatrics 126(2), e382–e390 (2010)

    Article  Google Scholar 

  25. Poole, E.S., Chetty, M., Morgan, T., Grinter, R.E., Edwards, W.K.: Computer help at home: methods and motivations for informal technical support. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 739–748 (2009)

    Google Scholar 

  26. Seng, S., Al-Ameen, M.N., Wright, M.: A first look into users’ perceptions of facial recognition in the physical world. Comput. Secur. 105, 102227 (2021)

    Article  Google Scholar 

  27. Shaywitz, S.E.: Dyslexia. N. Engl. J. Med. 338(5), 307–312 (1998)

    Article  Google Scholar 

  28. Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., Furlong, M.: Password sharing: implications for security design based on social practice. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 895–904 (2007)

    Google Scholar 

  29. Sjøberg, S.: Science and technology education: current challenges and possible solutions. Innovations Sci. Technol. Educ. 8, 296–307 (2002)

    Google Scholar 

  30. Wahidin, H., Waycott, J., Baker, S.: The challenges in adopting assistive technologies in the workplace for people with visual impairments. In: Proceedings of the 30th Australian Conference on Computer-Human Interaction, pp. 432–442 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hanieh Atashpanjeh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Atashpanjeh, H., Behfar, A., Haverkamp, C., Verdoes, M.M., Al-Ameen, M.N. (2022). Intermediate Help with Using Digital Devices and Online Accounts: Understanding the Needs, Expectations, and Vulnerabilities of Young Adults. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2022. Lecture Notes in Computer Science, vol 13333. Springer, Cham. https://doi.org/10.1007/978-3-031-05563-8_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-05563-8_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-05562-1

  • Online ISBN: 978-3-031-05563-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics