Abstract
In the U.S., consumers increasingly turn to the internet and mobile apps to complete essential personal transactions, ranging from financial payments to job applications. This shift to digital transactions can create challenges for those without reliable home internet connections or with limited digital literacy by requiring them to submit sensitive information on public computers or on unfamiliar websites. Using interviews with 52 families from high-poverty communities in the mid-Atlantic region of the U.S., we explore the compounding privacy and security challenges that economically disadvantaged individuals face when navigating online services. We describe the real, perceived, and unknown risks they face as they navigate online transactions with limited technical skills, as well as the strategies and heuristics they employ to minimize these risks. The findings highlight a complex relationship between participants' negative experiences and their general mistrust of sharing data through online channels. We also describe a range of strategies participants use to try and protect their personal information. Based on these findings, we offer design recommendations to inform the creation of educational resources that we will develop in the next phase of this project.
- Annette Baier. 1986. Trust and antitrust. Ethics, 96, 2 (1986), 231--260.Google ScholarCross Ref
- Jonathan Ben-Naim, Jean-François Bonnefon, Andreas Herzig, Sylvie Leblois and Emiliano Lorini. 2017. Computer-mediated trust in self-interested expert recommendations. AI & Society, 25, 4 (2010), 413--422.Google ScholarCross Ref
- Denis Besnard, David Greathead and Gordon Baxter. 2004. When mental models go wrong: co-occurrences in dynamic, critical systems. International Journal of Human-Computer Studies, 60, 1 (2004), 117--128. Google ScholarDigital Library
- Jasmine Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, and Kevin Butler. 2017. Regulators, mount up! Analysis of privacy policies for mobile money services. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (pp. 97--114). USENIX Association. Google ScholarDigital Library
- Jay Chen, Michael Paik, and Kelly McCabe. 2014. Exploring internet security perceptions and practices in urban Ghana. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (pp. 129--142). USENIX Association. Google ScholarDigital Library
- Wei Chen and Simon Fong. 2010. Social network collaborative filtering framework and online trust factors: A case study on Facebook. Proceedings of the Fifth International Conference on Digital Information Management (ICDIM) (pp. 266--273). IEEE.Google ScholarCross Ref
- Erika Chin, Adrienne Porter Felt, Vyas Sekar and David Wagner. 2012. Measuring user confidence in smartphone security and privacy. Proceedings of the Eighth Symposium on Usable Privacy and Security (Article No. 1). New York: ACM. Google ScholarDigital Library
- Catherine Dwyer, Starr Hiltz and Katia Passerini. 2007. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 proceedings (2007), Article 339.Google Scholar
- Matthew S Eastin and Robert LaRose. 2000. Internet self-efficacy and the psychology of the digital divide. Journal of Computer-Mediated Communication, 6, 1 (2000), n.p.Google Scholar
- Andrew J Flanagin and Miriam J Metzger. 2008. Digital media and youth: Unparalleled opportunity and unprecedented responsibility. Digital Media, Youth, and Credibility, Edited by Miriam J. Metzger and Andrew J. Flanagin. The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning. Cambridge, MA: The MIT Press, 2008 (pp. 5--28).Google Scholar
- Qin Gao, Ye Tian and Mengyuan Tu. 2015. Exploring factors influencing Chinese user's perceived credibility of health and safety information on Weibo. Computers in Human Behavior, 45 (2015), 21--31. Google ScholarDigital Library
- Karen Glanz and Donald B. Bishop. 2010. The role of behavioral science theory in development and implementation of public health interventions. Annual Review of Public Health, 31 (2010), 399--418.Google ScholarCross Ref
- Shawn Glynn. 1997. Drawing mental models. The Science Teacher, 64, 1 (1997), 30--32.Google Scholar
- Ricardo Gomez and Elizabeth Gould. 2010. The 'cool factor" of public access to ICT: Users' perceptions of trust in libraries, telecentres and cybercafés in developing countries. Information Technology & People, 23, 3 (2010), 247--264.Google ScholarCross Ref
- Eszter Hargittai. 2002. Second-level digital divide: Mapping differences in people's online skills. First Monday, 7, 4 (2002), n.p.Google Scholar
- Eszter Hargittai. 2003. The digital divide and what to do about it. New economy handbook, 2003 (2003), 821--839.Google Scholar
- Eszter Hargittai. 2005. Survey measures of Web-oriented digital literacy. Social Science Computer Review, 23 3, (2005), 371--379. Google ScholarDigital Library
- Eszter Hargittai and Yuli Patrick Hsieh. 2012. Succinct survey measures of web-use skills. Social Science Computer Review, 30, 1 (2012), 95--107. Google ScholarDigital Library
- Amanda Hess. 2017. How privacy became a commodity for the rich and powerful. New York Times Magazine (May 9, 2017).Google Scholar
- Donna L Hoffman, Thomas P Novak and Marcos Peralta. 1999. Building consumer trust online. Communications of the ACM, 42, 4 (1999), 80--85. Google ScholarDigital Library
- John B Horrigan. 2016. Digital readiness gaps. Pew Research Center (2016).Google Scholar
- Adele E Howe, Indrajit Ray, Mark Roberts, Malgorzata Urbanska and Zinta Byrne. 2012. The psychology of security for the home computer user. Proceedings of the 2012 IEEE Symposium on Security and Privacy (pp. 209--223). IEEE. Google ScholarDigital Library
- Internet Crime Complaint Center. 2016. Internet Crime Report Internet Crime Complaint Center. Available: https://pdf.ic3.gov/2016_IC3Report.pdfGoogle Scholar
- Iulia Ion, Rob Reeder and Sunny Consolvo. 2015. '... No one Can Hack My Mind": Comparing Expert and Non-Expert Security Practices. City.Google Scholar
- Paul T Jaeger, John Carlo Bertot, Kim M Thompson, Sarah M Katz and Elizabeth J DeCoster. 2012. The intersection of public policy and public access: Digital divides, digital literacy, digital inclusion, and public libraries. Public Library Quarterly, 31, 1 (2012), 1--20.Google ScholarCross Ref
- Joseph W Jerome. 2013. Buying and selling privacy: Big data's difference burdens and benefits. Stanfor. Law Review Online, 66 (2013), 47--53Google Scholar
- Kyung Kyu Kim and Bipin Prabhakar. 2004. Initial trust and the adoption of B2C e-commerce: The case of internet banking. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 35, 2 (2004), 50--64. Google ScholarDigital Library
- Kimberly Kindy. May 30, 2017. How Congress dismantled federal Internet privacy rules. Washington Post. Available: https://www.washingtonpost.com/politics/how-congress-dismantled-federal-internet-privacy-rules/2017/05/29/7ad06e14--2f5b-11e7--8674--437ddb6e813e_story.html?utm_term=.7de600dbda1cGoogle Scholar
- Joshua Klayman and Young-Won Ha. 1987. Confirmation, disconfirmation, and information in hypothesis testing. Psychological Review, 94, 2 (1987), 211--228.Google ScholarCross Ref
- Joshua Klayman and Young-won Ha. 1989. Hypothesis testing in rule discovery: Strategy, structure, and content. Journal of Experimental Psychology: Learning, Memory, and Cognition, 15, 4 (1989), 596--604.Google ScholarCross Ref
- Andrew Large, Valerie Nesset, Jamshid Beheshti and Leanne Bowler. 2006. 'Bonded design": A novel approach to intergenerational information technology design. Library & Information Science Research, 28, 1 (2006), 64--82.Google ScholarCross Ref
- Jialiu Lin, Shahriyar Amini, Jason I Hong, Norman Sadeh, Janne Lindqvist and Joy Zhang. 2012. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. Proceedings of the 2012 ACM Conference on Ubiquitous Computing (UbiComp '12) (pp. 501--510). New York: ACM. Google ScholarDigital Library
- Yvonna S. Lincoln and Egon G. Guba. Naturalistic inquiry. Sage Publications, Beverly Hills, CA, 1985.Google Scholar
- Linlin Liu, Matthew KO Lee, Renjing Liu and Jiawen Chen. 2018. Trust transfer in social media brand communities: The role of consumer engagement. International Journal of Information Management, 41 (2018), 1--13.Google ScholarCross Ref
- Niklas Luhmann. 2000. Vertrauen: Ein mechanismus der reduktion sozialer komplexität. Grove/Atlantic, Inc.Google Scholar
- Michael Mackert, LeeAnn Kahlor, Diane Tyler and Jamie Gustafson. 2009. Designing e-health interventions for low-health-literate culturally diverse parents: addressing the obesity epidemic. Telemedicine and e-Health, 15, 7 (2009), 672--677.Google ScholarCross Ref
- Madden. 2017. Privacy, security, and digital inequality. Data & Society, https://datasociety.net/pubs/prv/DataAndSociety_PrivacySecurityandDigitalInequality.pdfGoogle Scholar
- Mary Madden, Michele Gilman, Karen Levy and Alice Marwick. 2017. Privacy, poverty, and big data: a matrix of vulnerabilities for poor Americans. Wash. UL Rev., 95 (2017), 53--125.Google Scholar
- Michael Muller. 2009. Participatory design: The third space in HCI. Boca Raton, FL: CRC Press.Google Scholar
- New York Police Department. n.d. NYPD crime prevention alert: Beware of scams using Green Dot MoneyPak cards. Available: http://www.nyc.gov/html/nypd/downloads/pdf/crime_prevention/greendot.pdfGoogle Scholar
- Kenneth Olmstead and Aaron Smith. 2017. Americans and cybersecurity. Pew Research Center (2017).Google Scholar
- Yong Jin Park. 2013. Digital literacy and privacy behavior online. Communication Research, 40 2 (2013), 215--236.Google ScholarCross Ref
- Emilee Rader and Rick Wash. 2015. Identifying patterns in informal sources of security information. Journal of Cybersecurity, 1, 1 (2015), 121--144.Google Scholar
- Emilee Rader, Rick Wash, and Brandon Brooks. 2012. Stories as informal lessons about security. Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS) (Article 6). New York: ACM. Google ScholarDigital Library
- Lee Rainie, Sara Kiesler, Ruogu Kang, Mary Madden, Maeve Duggan, Stephanie Brown and Laura Dabbish. 2013. Anonymity, privacy, and security online. Pew Research Center (2013). Available: http://www.pewinternet.org/2013/09/05/anonymity-privacy-and-security-online/Google Scholar
- Elissa M Redmiles, Sean Kross and Michelle L Mazurek. 2017. Where is the digital divide?: A survey of security, privacy, and socioeconomics. Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (pp. 931--936). New York: ACM. Google ScholarDigital Library
- Dina Ribbink, Allard CR Van Riel, Veronica Liljander and Sandra Streukens. 2004. Comfort your online customer: quality, trust and loyalty on the internet. Managing Service Quality: An International Journal, 14, 6 (2004), 446--456.Google ScholarCross Ref
- Ronald E Rice and James EKatz. 2003. Comparing internet and mobile phone usage: digital divides of usage, adoption, and dropouts. Telecommunications Policy, 27, 8--9 (2006), 597--823.Google ScholarCross Ref
- Soo Young Rieh. 2010. Credibility and cognitive authority of information. In M. Bates & M. N. Maack (Eds.) Encyclopedia of Library and Information Sciences, 3rd Ed. (pp. 1337--1344), New York: Taylor and Francis Group, LLC. (2010).Google Scholar
- Irwin M Rosenstock, Victor J Strecher, and Marshall H Becker. 1988. Social learning theory and the health belief model. Health Education Quarterly, 15 2, (1988) 175--183.Google ScholarCross Ref
- Aaron Shaw and Eszter Hargittai. 2018. The pipeline of online participation inequalities: The case of Wikipedia editing. Journal of Communication, 68 1 (2018), 143--168.Google ScholarCross Ref
- Wanita Sherchan, Surya Nepal and Cecile Paris. 2013. A survey of trust in social networks. ACM Computing Surveys (CSUR), 45, 4 (2013), Article No. 47. Google ScholarDigital Library
- Michael Siegrist and George Cvetkovich. 2000. Perception of hazards: The role of social trust and knowledge. Risk Analysis, 20, 5 (2000), 713--720.Google ScholarCross Ref
- Aaron Smith. 2017. What the public knows about cybersecurity. Pew Research Center on Internet and American Life (March 22, 2017). Available: http://www.pewinternet.org/2017/03/22/what-the-public-knows-about-cybersecurity/Google Scholar
- Laura D Stanley. 2003. Beyond access: psychosocial barriers to computer literacy special issue: ICTs and community networking. The Information Society, 19, 5 (2003), 407--416.Google ScholarCross Ref
- Bradley D Stein, Sheryl Kataoka, Lisa H Jaycox, Marleen Wong, Marleen, et al. 2002. Theoretical basis and program design of a school-based mental health intervention for traumatized Immigrant children: A collaborative research partnership. The Journal of Behavioral Health Services & Research, 29, 3 (2002), 318--326.Google ScholarCross Ref
- Mega Subramaniam, Natalie Greene Taylor, Beth St. Jean, Rebecca Follman, Christie Kodama and Dana Casciotti. 2015. As simple as that?: Tween credibility assessment in a complex online world. Journal of Documentation, 71, 3 (2015), 550--571.Google ScholarCross Ref
- Paul Taylor, Cary Funk and April Clark. 2007. Americans and social trust: Who, where and why. Pew Research Center. (2007). Available: http://www.pewsocialtrends.org/2007/02/22/americans-and-social-trust-who-where-and-why/Google Scholar
- Kim M Thompson, Paul T Jaeger, Natalie Greene Taylor, Mega Subramaniam and John Carlo Bertot. 2014. Digital literacy and digital inclusion: Information policy and the public library. Rowman & Littlefield. Google ScholarDigital Library
- Ola Hodne Titlestad, Knut Staring and Jørn Braa. 2009. Distributed development to enable user participation: Multilevel design in the HISP network. Scandinavian Journal of Information Systems, 21, 1 (2009), Article 3.Google Scholar
- Craig W Trumbo and Katherine A McComas. 2003. The function of credibility in information processing for risk perception. Risk Analysis, 23, 2 (2003), 343--353.Google ScholarCross Ref
- Alexander van Deursen, Ellen Helsper, Rebecca Eynon and Jan van Dijk. 2017. The compoundness and sequentiality of digital inequality. International Journal of Communication, 11 (2017), 452--473.Google Scholar
- Jan Van Dijk and Kenneth Hacker. 2003. The digital divide as a complex and dynamic phenomenon. The Information Society, 19, 4 (2003), 315--326.Google ScholarCross Ref
- Jan AGM Van Dijk. 2005. The deepening divide: Inequality in the information society. Sage Publications.Google Scholar
- Andreas Vårheim. 2011. Gracious space: Library programming strategies towards immigrants as tools in the creation of social capital. Library & Information Science Research, 33, 1 (2011), 12--18.Google ScholarCross Ref
- Andreas Vårheim. 2014. Trust in libraries and trust in most people: Social capital creation in the public library. The Library Quarterly, 84, 3 (2014), 258--277.Google ScholarCross Ref
- Aditya Vashistha, Richard Anderson, and Shrirang Mare. 2018. Examining security and privacy research in developing regions. COMPASS '18: ACM SIGCAS Conference on Computing and Sustainable Societies (Article No. 25). Menlo Park and San Jose, CA, USA. ACM, New York. Google ScholarDigital Library
- Jessica Vitak, Yuting Liao, Priya Kumar and Mega Subramaniam. 2018. Librarians as Information Intermediaries: Navigating Tensions Between Being Helpful and Being Liable. Proceedings of the 13th Annual iConference, Lecture Notes in Computer Science, vol 10766 (pp. 693--702). London: Springer.Google Scholar
- Jessica Vitak, Yuting Liao, Priya Kumar, Michael Zimmer, and Katie Kritikos. 2018. Privacy attitudes and data valuation among fitness tracker users. Proceedings of the 13th Annual iConference, Lecture Notes in Computer Science, vol 10766 (pp. 229--239). London: Springer.Google ScholarCross Ref
- Rick Wash. 2010. Folk models of home computer security. Proceedings of the Sixth Symposium on Usable Privacy and Security (Article No. 11). New York: ACM. Google ScholarDigital Library
- Rick Wash and Emilee Rader. 2011. Influencing mental models of security: a research agenda. Proceedings of the 2011 New Security Paradigms Workshop (pp. 57--66). New York: ACM. Google ScholarDigital Library
- Rick Wash and Emilee J Rader. 2015. Too much knowledge? security beliefs and protective behaviors among united states internet users. Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (pp. 309--325). Usenix Association. Google ScholarDigital Library
Index Terms
- 'I Knew It Was Too Good to Be True": The Challenges Economically Disadvantaged Internet Users Face in Assessing Trustworthiness, Avoiding Scams, and Developing Self-Efficacy Online
Recommendations
Digital Literacy of Older People and the Role of Intergenerational Approach in Supporting Their Competencies in Times of COVID-19 Pandemic
Human Aspects of IT for the Aged Population. Design, Interaction and Technology AcceptanceAbstractThis paper presents the preliminary results of two research projects conducted in Croatia and Europe that tackle the issues of digital literacy and the digital divide among older citizens. This methodology combines both quantitative and ...
Bridging the Age-based Digital Divide
An increasing reliance on digital technology in one's everyday life necessitates the development of digital literacy skills to enable one's continued participation in the Internet information-age. As existing services, such as banking and shopping, move ...
Perceptions of Digital Tools and Creativity in the Classroom
We explore how digital tools can support children's creativity in classroom. In response to a growing need for tools to support children's digital literacy, we take a step forward to explore digital tools to support children's digital creativity. We ...
Comments