Abstract
Digitalization and ageing population are two of the main trends of the 21st century. Most people, including older adults, are now digitally connected to the world for e.g., managing health and finances and this has become indispensable parts of our lives. A device like a smartphone is easily at hand and ready to use anytime, anywhere. However, this widespread usage produces huge amounts of data, which is not without risks, especially for older users in terms of data protection and privacy. This paper investigates behaviours, attitudes, and experiences regarding privacy settings and take a closer look at the phenomenon of resignation and the privacy paradox within the research project Easierphone. Easierphone app Easierphone aims to simplify smartphone use for older adults and other vulnerable people by replacing the Android surface with an easier one. For data collection, 30 qualitative interviews and diaries were used during installation and testing of the app. Regarding privacy and data protection, most of our participants stated that they generally do not read the terms of use in the digital world carefully. Nonetheless, they still agree to them, so they can use an app or a digital service which clearly illustrates the privacy paradox.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Pew Research Center: Smartphone Ownership Is Growing Rapidly Around the World, but Not Always Equally (2019). https://www.pewglobal.org/wp-content/uploads/sites/2/2019/02/Pew-Research-Center_Global-Technology-Use-2018_2019-02-05.pdf
Seifert, A., Martin, M., Perrig-Chiello, P.: Bildungs- und Lernbedürfnisse im Alter: Bericht zur nationalen Befragungsstudie in der Schweiz (2021)
Seifert, A., Ackermann, T.P., Schelling, H.R.: Digitale Senioren 2020: Nutzung von Informations- und Kommunikationstechnologien durch Personen ab 65 Jahren in der Schweiz (2020)
Zeissig, E.-M., Lidynia, C., Vervier, L., et al.: Online privacy perceptions of older adults. In: Zhou, J., Salvendy, G. (eds.) ITAP 2017. LNCS, vol. 10298, pp. 181–200. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-58536-9_16
Bartol, J., Prevodnik, K., Vehovar, V., et al.: The roles of perceived privacy control, Internet privacy concerns and Internet skills in the direct and indirect Internet uses of older adults: conceptual integration and empirical testing of a theoretical model. New Med. Soc. 146144482211227 (2022). https://doi.org/10.1177/14614448221122734
van Dijk, J.: The one-dimensional network society of manuel castells. New Media Soc. 1, 127–138 (1999). https://doi.org/10.1177/1461444899001001015
Kwasny, M.N., Caine, K.E., Rogers, W.A., et al.: Privacy and technology: folk definitions and perspectives. In: CHI 2008 ACM, pp. 3290–3296 (2008)
Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41, 100–126 (2007). https://doi.org/10.1111/j.1745-6606.2006.00070.x
Rauschnabel, P.A., He, J., Ro, Y.K.: Antecedents to the adoption of augmented reality smart glasses: a closer look at privacy risks. J. Bus. Res. 92, 374–384 (2018). https://doi.org/10.1016/j.jbusres.2018.08.008
Ghaiumy Anaraky, R., Byrne, K.A., Wisniewski, P.J., et al.: To disclose or not to disclose: examining the privacy decision-making processes of older vs. younger adults. In: Kitamura, Y., Quigley, A., Isbister, K. et al. (eds.) Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, pp. 1–14 (2021)
Stephanidis, C., Salvendy, G., Antona, M., et al.: Seven HCI grand challenges. Int. J. Hum.-Comput. Interact. 35, 1229–1269 (2019). https://doi.org/10.1080/10447318.2019.1619259
Elueze, I., Quan-Haase, A.: Privacy attitudes and concerns in the digital lives of older adults: Westin’s privacy attitude typology revisited. Am. Behav. Sci. 62(10), 1372–1391 (2018). https://doi.org/10.1177/0002764218787026
Speck, S., Pauli, C., Ursprung, C., et al.: Easierphone: participative development of a senior-friendly smartphone application. In: Proceedings of the 9th International Conference on Information and Communication Technologies for Ageing Well and e-Health, pp. 199–207 (2023)
Colnago, J., Cranor, L., Acquisti, A.: Is there a reverse privacy paradox? An exploratory analysis of gaps between privacy perspectives and privacy-seeking behaviors. Proc. Priv. Enhancing Technol. 2023(1), 455–476 (2023). https://doi.org/10.56553/popets-2023-0027
Karat, C.-M., Brodie, C., Karat, J.: Human-computer interaction viewed from the intersection of privacy, security, and trust. In: Sears, A., Jacko, J. (eds.) The Human-Computer Interaction Handbook, vol. 20071544, pp. 639–658. CRC Press (2007)
Altman, I.: The Environment and Social Behavior: Privacy, Personal Space, Territory. Brooks/Cole Publishing Company, Monterey, California, Crowding (1975)
Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)
Olson, J.S., Grudin, J., Horbitz, E.: A study on preferences on sharing and privacy. In: Proceedings of the SIGCHI Conference on Human factors in Computing Systems, San Jose, California, USA (2005)
Ludford, R.J., Priedhorsky, R., Reily, K., et al.: Capturing, sharing, and using local place information. In: Proceedings of the SIGCHI Conference, San Jose, California, USA (2007)
Bélanger, C.: Privacy in the digital age: a review of information privacy research in information systems. MIS Q. 35, 1017 (2011). https://doi.org/10.2307/41409971
Li, Y.: Empirical studies on online information privacy concerns: literature review and an integrative framework. Commun. Assoc. Inform. Syst. (2011). https://doi.org/10.17705/1CAIS.02828
Jeff Smith, H., Dinev, T., Xu, H.: Information privacy research: an interdisciplinary review. MIS Q. 35(4), 989 (2011). https://doi.org/10.2307/41409970
Nissenbaum, H.: Protecting privacy in an information age: the problem of privacy in public. Law Philos. 17, 559–596 (1998). https://doi.org/10.1023/A:1006184504201
Courtney, K.L.: Privacy and senior willingness to adopt smart home information technology in residential care facilities. Methods Inf. Med. 47, 76–81 (2008). https://doi.org/10.3414/me9104
Tsai, H.-Y.S., Shillair, R., Cotten, S.R.: Social support and “playing around”: an examination of how older adults acquire digital literacy with tablet computers. J. Appl. Gerontol. 36, 29–55 (2017). https://doi.org/10.1177/0733464815609440
Kwasny, M.N., Caine, K.E., Rogers, W.A., et al.: Privacy and Technology: Folk Definitions and Perspectives. In: Proceedings of teh SIGCHI Conference Human Factor Computer System, pp. 3291–3296 (2008). https://doi.org/10.1145/1358628.1358846
Sayre, S., Horne, D.A.: Trading secrets for savings: how concerned are consumers about club cards as a privacy threat? In: ACR North American Advances (2000)
Phelps, J., Nowak, G., Ferrell, E.: Privacy concerns and consumer willingness to provide personal information. J. Public Policy Mark. 19, 27–41 (2000). https://doi.org/10.1509/jppm.19.1.27.16941
Kokolakis, S.: Privacy attitudes and privacy behaviour: a review of current research on the privacy paradox phenomenon. Comput. Secur. 64, 122–134 (2017). https://doi.org/10.1016/j.cose.2015.07.002
White, T.B.: Consumer disclosure and disclosure avoidance: a motivational. Framework 14, 41–51 (2004)
Earp, J.B., Baumer, D.: Innovative web use to learn about consumer behavior and online privacy. Commun. ACM 46, 81–83 (2003). https://doi.org/10.1145/641205.641209
Schomakers, E.-M., Lidynia, C., Ziefle, M.: A typology of online privacy personalities. J. Grid Comput. 17, 727–747 (2019). https://doi.org/10.1007/s10723-019-09500-3
Lutz, C., Hoffmann, C.P., Ranzini, G.: Data capitalism and the user: an exploration of privacy cynicism in Germany. New Media Soc. 22, 1168–1187 (2020). https://doi.org/10.1177/1461444820912544
Tullis, T., Albert, B.: Measuring the user experience: Collecting, analyzing, and presenting usability metrics, 2nd edn. Elsevier/Morgan Kaufmann, Amsterdam, Boston (2013)
Misoch, S.: Qualitative Interviews. De Gruyter (2019)
Nørgaard, M., Hornbæk. K.: What do usability evaluators do in practice? In: Carroll, J.M., Bødker. S., Coughlin, J. (eds.) Proceedings of the 6th conference on Designing Interactive systems. ACM, New York, NY, USA, pp. 209–218 (2006)
Ericsson, K.A., Simon, H.A.: Protocol Analysis. The MIT Press (1993)
Mayring, P.: Qualitative Content Analysis [28 paragraphs]. Forum Qualitative Sozialforschung/Forum: Qualitative Social Research (2000)
Scholz, J.T., Lubell, M.: Trust and taxpaying: testing the heuristic approach to collective action. Am. J. Political Sci. 42, 398 (1998). https://doi.org/10.2307/2991764
Acknowledgements
We thank all older participants and their tandem partners without whom we could not have undertaken this research, we would like to extend our sincere thanks for their openness, interest, and valuable time in all interviews in pilot 1 and 2. Further, we thank the European AAL Programme (EU Active Assisted Living Programme) for funding this research project.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Speck, S., Pauli, C., Ursprung, C., Wallimann, M., Huber, R., Misoch, S. (2023). “I Simply Accept the Terms and Conditions so that I Can Use an App at All”: Smartphone Use and Privacy Among Older Adults in Switzerland. In: Gao, Q., Zhou, J., Duffy, V.G., Antona, M., Stephanidis, C. (eds) HCI International 2023 – Late Breaking Papers. HCII 2023. Lecture Notes in Computer Science, vol 14055. Springer, Cham. https://doi.org/10.1007/978-3-031-48041-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-031-48041-6_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-48040-9
Online ISBN: 978-3-031-48041-6
eBook Packages: Computer ScienceComputer Science (R0)