Abstract
There are significant differences between older and younger adults in terms of risk perception and risk behaviors offline. The previously unexplored existence of this dissimilitude online is the motivation for our work. What are the risk perceptions of older adults? How are these correlated with the classic dimensions of risk perception offline? Can we leverage episodic memory, particularly relevant for older adults, to increase the efficacy of risk communication? We conduct a survey based experiment with two groups: video (n=136) and text (113). We find that leveraging episodic memory using video risk communication can improve the ability of elders to avoid phishing attacks and downloading malware. The applicability of the dimensions of risk were different based not only the risk but also the mode of risk communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Acquisti, A.: Privacy in electronic commerce and the economics of immediate gratification. In: Proceedings of the 5th ACM Conference on Electronic Commerce, pp. 21–29. ACM (2004)
Acquisti, A.: Nudging privacy: The behavioral economics of personal information. IEEE Security & Privacy 7(6), 82–85 (2009)
Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Security & Privacy 3(1), 26–33 (2005)
Anderson, K.: Consumer fraud in the United States: An FTC survey. Federal Trade Commission (2004)
Anderson, N., Craik, F.: Memory in the aging brain. The Oxford Handbook of Memory, 411–425 (2000)
Asgharpour, F., Liu, D., Camp, L.J.: Mental Models of Security Risks. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 367–377. Springer, Heidelberg (2007)
Aslan, A., Bäuml, K.H., Pastötter, B.: No inhibitory deficit in older adults’ episodic memory. Psychological Science 18(1), 72 (2007)
Bachman, K.: Study: Internet user adoption of dnt hard to predict. Tech. rep., AdWeek (March 2012), http://www.adweek.com/news/technology/study-internet-user-adoption-dnt-hard-predict-139091
Bernstein, P.: Against the gods: The remarkable story of risk. John Wiley & Sons Inc. (1998)
Bertoni, D.: Identity Theft: Governments Have Acted to Protect Personally Identifiable Information, But Vulnerabilities Remain: Congressional Testimony. DIANE Publishing (2009)
Bonneau, J., Preibusch, S.: The privacy jungle: On the market for data protection in social networks. Economics of Information Security and Privacy, 121–167 (2010)
Brandimarte, L., Acquisti, A., Loewenstein, G.: Misplaced confidences: Privacy and the control paradox. In: Workshop of Economics and Information Security (WEIS). Harvard University (2010)
Breau, C.: Projected population of the united states, by age and sex: 2000 to 2050. Tech. rep., U. S. Census Bureau (2000), http://www.census.gov/population/www/projections/usinterimproj/
Brodie, C., Karat, C.M., Karat, J., Feng, J.: Usable security and privacy: a case study of developing privacy management tools. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS 2005, pp. 35–43. ACM, New York (2005)
Camp, L.J.: Reliable, usable signaling to defeat masquerade attacks. ISJLP 3, 211 (2007)
Camp, L.J.: Mental models of privacy and security. IEEE Technology and Society Magazine 28(3), 37–46 (2009)
Camp, L., McGrath, C., Genkina, A.: Security and morality: A tale of user deceit. In: Models of Trust for the Web (MTW 2006), Edinburgh, Scotland, vol. 22 (2006)
Clark, J., Van Oorschot, P., Adams, C.: Usability of anonymous web browsing: an examination of Tor interfaces and deployability. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 41–51. ACM (2007)
Cranor, L., Garfinkel, S.: Security and usability: Designing secure systems that people can use. O’Reilly Media, Inc. (2005)
Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and the network effect. In: Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK (June 2006)
Farahmand, F., Spafford, E.H.: Understanding insiders: An analysis of risk-taking behavior. Information Systems Frontiers, 1–11 (2010)
Fischhoff, B., Slovic, P., Lichtenstein, S., Read, S., Combs, B.: How safe is safe enough? a psychometric study of attitudes towards technological risks and benefits. Policy Sciences 9(2), 127–152 (1978)
Fisk, A.D., Rogers, W.A., Charness, N., Sharit, J.: Designing for older adults: Principles and creative human factors approaches, vol. 2. CRC (2009)
Flynn, J., Slovic, P., Mertz, C.K.: Gender, race, and perception of environmental health risks. Risk Analysis 14(6), 1101–1108 (1994)
Garg, V., Camp, L.J.: End user perception of online risk under uncertainty. In: 45th Hawaii International Conference on System Sciences. IEEE (2012)
Garg, V., Camp, L.J.: Heuristics and biases: Implications for security and privacy (2012), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1933957
Garg, V., Camp, L.J., Lorenzen-Huber, L.M., Connelly, K.: Risk communication design for older adults. In: ISG*ISARC 2012. International Society for Gerontechnology (in press, 2012)
Gürses, S., Berendt, B.: Pets in the surveillance society: A critical review of the potentials and limitations of the privacy as confidentiality paradigm. Data Protection in a Profiled World, 301–321 (2010)
Hasher, L., Stoltzfus, E., Zacks, R., Rypma, B.: Age and inhibition. Journal of Experimental Psychology: Learning, Memory, and Cognition 17(1), 163–169 (1991)
Herron, C., York, H., Corrie, C., Cole, S.: A comparison study of the effects of a story-based video instructional package versus a text-based instructional package in the intermediate-level foreign language classroom. Calico Journal 23(2), 281 (2006)
Hoofnagle, C.J., King, J., Li, S., Turow, J.: How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies? SSRN eLibrary (2010)
Johnson, B.B., Slovic, P.: Presenting uncertainty in health risk assessment: initial studies of its effects on risk perception and trust. Risk Analysis 15(4), 485–494 (1995)
Jonah, B.A., Thiessen, R., Au-Yeung, E.: Sensation seeking, risky driving and behavioral adaptation. Accident Analysis & Prevention 33(5), 679–684 (2001)
Kahneman, D., Frederick, S.: Representativeness revisited: Attribute substitution in intuitive judgment. Heuristics and Biases: The Psychology of Intuitive Judgment, 49–81 (2002)
Lövdén, M., Rönnlund, M., Wahlin, Å., Bäckman, L., Nyberg, L., Nilsson, L.G.: The extent of stability and change in episodic and semantic memory in old age: Demographic predictors of level and change. The Journals of Gerontology Series B: Psychological Sciences and Social Sciences 59(3), 130 (2004)
Nissenbaum, H.F.: Privacy in context: Technology, policy, and the integrity of social life. Stanford Law & Politics (2010)
Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41(1), 100–126 (2007)
Phelps, J., Nowak, G., Ferrell, E.: Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 27–41 (2000)
Posner, R.A.: Right of privacy, the. Ga. L. Rev. 12, 393 (1977)
Posner, R.A.: The economics of privacy. The American Economic Review 71(2), 405–409 (1981)
Schneier, B.: The psychology of security. Communications of the ACM 50(5), 128 (2007)
Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L., Hong, J., Nunge, E.: Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 88–99. ACM (2007)
Sherman, S.J.: On the self-erasing nature of errors of prediction. Journal of Personality and Social Psychology 39(2), 211–221 (1980)
Sloman, S.A.: The empirical case for two systems of reasoning. Psychological Bulletin 119(1), 3 (1996)
Smetters, D.K., Grinter, R.E.: Moving from the design of usable security technologies to the design of useful secure applications. In: Proceedings of the 2002 Workshop on New Security Paradigms, NSPW 2002, pp. 82–89. ACM, New York (2002)
Spencer, W.D., Raz, N.: Differential effects of aging on memory for content and context: A meta-analysis. Psychology and Aging 10(4), 527 (1995)
Tulving, E.: What is episodic memory? Current Directions in Psychological Science 2(3), 67–70 (1993)
Tversky, A., Kahneman, D.: Judgment under uncertainty: Heuristics and biases. Science 185(4157), 1124 (1974)
Wang, Y., Komanduri, S., Leon, P., Norcie, G., Acquisti, A., Cranor, L.: I regretted the minute I pressed share.: A qualitative study of regrets on Facebook. In: Symposium on Usable Privacy and Security (2011)
Whitten, A., Tygar, J.: Why Johnny cant encrypt: A usability evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium, vol. 99 (1999)
Wild, K., Boise, L., Lundell, J., Foucek, A.: Unobtrusive in-home monitoring of cognitive and physical health: Reactions and perceptions of older adults. Journal of Applied Gerontology 27(2), 181–200 (2008)
Willis, S., Schaie, K., Martin, M.: Cognitive plasticity. Handbook of Theories of Aging, 295–322 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Garg, V., Camp, L.J., Connelly, K., Lorenzen-Huber, L. (2012). Risk Communication Design: Video vs. Text. In: Fischer-Hübner, S., Wright, M. (eds) Privacy Enhancing Technologies. PETS 2012. Lecture Notes in Computer Science, vol 7384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31680-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-31680-7_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31679-1
Online ISBN: 978-3-642-31680-7
eBook Packages: Computer ScienceComputer Science (R0)