skip to main content
10.1145/3491102.3501845acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Unofficial Proxies: How Close Others Help Older Adults with Banking

Published:29 April 2022Publication History

ABSTRACT

We present results of a survey (n=42) investigating how close others (family members, friends, or other community members) assist older adults with banking tasks in Canada. We asked what types of banking tasks they help with and what modalities they used. Our results show many close others help older adults by leveraging online banking, and this is especially true when the close other is an older adult themselves. We also found that close others who help older adults via online banking often know the online banking credentials for the older adults they assist, which presents privacy and security issues and could open the door to financial exploitation. Our results demonstrate the need for the design of online banking mechanisms that more explicitly acknowledge the nuanced and temporally changing role of close others in helping older adults with banking.

Skip Supplemental Material Section

Supplemental Material

3491102.3501845-talk-video.mp4

mp4

40.4 MB

References

  1. Eiman Ahmed, Brandon DeLuca, Emily Hirowski, Connor Magee, Ivan Tang, and Jean F Coppola. 2017. Biometrics: Password replacement for elderly?. In 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT). IEEE, 1–6.Google ScholarGoogle Scholar
  2. Jason Allen, Walter Engert, 2007. Efficiency and competition in Canadian banking. Bank of Canada Review 2007, Summer (2007), 33–45.Google ScholarGoogle Scholar
  3. Hilary Arksey, Anne Corden, Caroline Glendinning, and Michael Hirst. 2008. Managing money in later life: help from relatives and friends. Benefits 16, 1 (2008), 47–59.Google ScholarGoogle Scholar
  4. Belén Barros Pena, Rachel E Clarke, Lars Erik Holmquist, and John Vines. 2021. Circumspect Users: Older Adults as Critical Adopters and Resistors of Technology. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1–14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Nienke Bleijenberg, Alexander K Smith, Sei J Lee, Irena Stijacic Cenzer, John W Boscardin, and Kenneth E Covinsky. 2017. Difficulty managing medications and finances in older adults: A 10-year cohort study. Journal of the American Geriatrics Society 65, 7 (2017), 1455–1461.Google ScholarGoogle ScholarCross RefCross Ref
  6. Lilian Bernadina Josefina Bosch and Marije Kanis. 2016. Design Opportunities for Supporting Informal Caregivers. In Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems (San Jose, California, USA) (CHI EA ’16). ACM, New York, NY, USA, 2790–2797. https://doi.org/10.1145/2851581.2892354Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Vela Canada. 2021. What is a Microboard?https://velacanada.org/services/microboards/Google ScholarGoogle Scholar
  8. Jonathan Chagnon, Carol D’Aoust, Patrice Dion, Nora Galbraith, Elham Sirag, and Yu Zhang. 2019. Population Projections for Canada (2018 to 2068), Provinces and Territories (2018 to 2043). https://www150.statcan.gc.ca/n1/pub/91-520-x/91-520-x2019001-eng.htmGoogle ScholarGoogle Scholar
  9. Athena CY Chan and Marlene S Stum. 2020. The state of theory in elder family financial exploitation: A systematic review. Journal of Family Theory & Review 12, 4 (2020), 492–509.Google ScholarGoogle ScholarCross RefCross Ref
  10. Yunan Chen, Victor Ngo, and Sun Young Park. 2013. Caring for Caregivers: Designing for Integrality. In Proceedings of CSCW ’13 (San Antonio, Texas, USA). ACM, New York, NY, USA, 91–102.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Dan Ciuriak. 2013. Canadian and US Financial Sector Stability Differences over Long History: Is There a Unifying Explanation?(2013).Google ScholarGoogle Scholar
  12. Marguerite DeLiema. 2018. Elder fraud and financial exploitation: Application of routine activity theory. The Gerontologist 58, 4 (2018), 706–718. Significantly more fraud victims were childless compared with financial exploitation victims. Fraud perpetrators took advantage of elders when they had no trustworthy friends or relatives to safeguard their assets..Google ScholarGoogle ScholarCross RefCross Ref
  13. Paul Dunphy, Andrew Monk, John Vines, Mark Blythe, and Patrick Olivier. 2014. Designing for spontaneous and secure delegation in digital payments. Interacting with Computers 26, 5 (2014), 417–432.Google ScholarGoogle ScholarCross RefCross Ref
  14. Paul Dunphy, John Vines, Lizzie Coles-Kemp, Rachel Clarke, Vasilis Vlachokyriakos, Peter Wright, John McCarthy, and Patrick Olivier. 2014. Understanding the experience-centeredness of privacy and security technologies. In Proceedings of the 2014 New Security Paradigms Workshop. 83–94.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Paul Dunphy, John Vines, Andrew Monk, Mark Blythe, and Patrick Olivier. 2014. Understanding Financial Practices: Experiences with ‘Eighty Somethings’ and the Underbanked. In Proceedings of CHI 2014 Conference on Human Factors in Computer Systems. ACM New York, NY.Google ScholarGoogle Scholar
  16. Lisa L. Engel, Dorcas E. Beaton, Robin E. Green, and Deirdre R. Dawson. 2019. Financial Management Activity Process: Qualitative inquiry of adults with acquired brain injury. Canadian Journal of Occupational Therapy 86, 3 (2019), 196–208. arXiv:https://doi.org/10.1177/0008417419833839Google ScholarGoogle ScholarCross RefCross Ref
  17. Véronique Faucounau, Ya-Huei Wu, Mélodie Boulay, Marina Maestrutti, Anne-Sophie Rigaud, 2009. Caregivers’ requirements for in-home robotic agent for supporting community-living elderly subjects with cognitive impairment. Technology and Health Care 17, 1 (2009), 33–40.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Dinei Florencio and Cormac Herley. 2007. A large-scale study of web password habits. In Proceedings of WWW ’07. ACM, 657–666.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Rachel L. Franz, Cosmin Munteanu, Barbara Barbosa Neves, and Ronald Baecker. 2015. Time to Retire Old Methodologies? Reflecting on Conducting Usability Evaluations with Older Adults. In Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct(Copenhagen, Denmark) (MobileHCI ’15). ACM, New York, NY, USA, 912–915. https://doi.org/10.1145/2786567.2794303 When creating tech for OAs with daily use in mind, their support network aka close others should be kept in mind when designing the product. As they will be helping the OAs use the system..Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Alisa Frik, Julia Bernd, Noura Alomar, and Serge Egelman. 2020. A qualitative model of older adults’ contextual decision-making about information sharing. In Workshop on the Economics of Information Security (WEIS 2020).Google ScholarGoogle Scholar
  21. Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce S. Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and Security Threat Models and Mitigation Strategies of Older Adults. In Proceedings of the Fifteenth USENIX Conference on Usable Privacy and Security (Santa Clara, CA, USA) (SOUPS’19). USENIX Association, Berkeley, CA, USA, 21–40. http://dl.acm.org/citation.cfm?id=3361476.3361479Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Reza Ghaiumy Anaraky, Kaileigh Angela Byrne, Pamela J Wisniewski, Xinru Page, and Bart Knijnenburg. 2021. To Disclose or Not to Disclose: Examining the Privacy Decision-Making Processes of Older vs. Younger Adults. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1–14.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Jarod T Giger and Martha Markward. 2011. The need to know caregiver perspectives toward using smart home technology. Journal of social work in disability & rehabilitation 10, 2(2011), 96–114.Google ScholarGoogle ScholarCross RefCross Ref
  24. John Greenwood. 2013. Canadian banks win top marks from World Economic Forum. https://financialpost.com/news/fp-street/canadian-banks-win-top-marks-from-world-economic-forumGoogle ScholarGoogle Scholar
  25. Peter A Hall, Lizzie Coles-Kemp, Claude Heath, 2018. Holding onto Dissensus: the participatory co-design of security. Strategic Design Research Journal 11, 2 (2018). using lego to model security in home-banking, UK, participatory design.Google ScholarGoogle Scholar
  26. Vicki L. Hanson. 2009. Age and Web Access: The Next Generation. In Proceedings of the 2009 International Cross-Disciplinary Conference on Web Accessibililty (W4A) (Madrid, Spain) (W4A ’09). ACM, New York, NY, USA, 7–15. https://doi.org/10.1145/1535654.1535658Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Paul A Harris, Robert Taylor, Robert Thielke, Jonathon Payne, Nathaniel Gonzalez, and Jose G Conde. 2009. Research electronic data capture (REDCap)—a metadata-driven methodology and workflow process for providing translational research informatics support. Journal of biomedical informatics 42, 2 (2009), 377–381.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Dominik Hornung, Claudia Müller, Irina Shklovski, Timo Jakobi, and Volker Wulf. 2017. Navigating Relationships and Boundaries: Concerns Around ICT-uptake for Elderly People. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI ’17). ACM, New York, NY, USA, 7057–7069. https://doi.org/10.1145/3025453.3025859Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Amanda Hunsaker, Minh Hao Nguyen, Jaelle Fuchs, Gökçe Karaoglu, Teodora Djukaric, and Eszter Hargittai. 2020. Unsung helpers: older adults as a source of digital media support for their peers. The Communication Review 23, 4 (2020), 309–330.Google ScholarGoogle ScholarCross RefCross Ref
  30. Mark S Lachs and S Duke Han. 2015. Age-associated financial vulnerability: An emerging public health issue. Annals of internal medicine 163, 11 (2015), 877–878.Google ScholarGoogle ScholarCross RefCross Ref
  31. Celine Latulipe, Syeda Fatema Mazumder, Rachel KW Wilson, Jennifer W Talton, Alain G Bertoni, Sara A Quandt, Thomas A Arcury, and David P Miller. 2020. Security and Privacy Risks Associated With Adult Patient Portal Accounts in US Hospitals. JAMA Internal Medicine 180, 6 (2020), 845–849.Google ScholarGoogle ScholarCross RefCross Ref
  32. Celine Latulipe, Sara A Quandt, Kathryn Altizer Melius, Alain Bertoni, David P Miller Jr, Douglas Smith, and Thomas A Arcury. 2018. Insights into older adult patient concerns around the caregiver proxy portal use: qualitative interview study. Journal of medical Internet research 20, 11 (2018), e10524.Google ScholarGoogle ScholarCross RefCross Ref
  33. M Powell Lawton and Elaine M Brody. 1969. Assessment of older people: self-maintaining and instrumental activities of daily living. The gerontologist 9, 3_Part_1 (1969), 179–186.Google ScholarGoogle Scholar
  34. Raeann G LeBlanc. 2017. Reciprocity in Caregiving Relationships: Contexts in Later Life. International Journal of Human Caring 21, 3 (2017), 151–158.Google ScholarGoogle ScholarCross RefCross Ref
  35. Peter Alexander Lichtenberg, Michael A Sugarman, Daniel Paulson, Lisa J Ficker, and Annalise Rahman-Filipiak. 2016. Psychological and functional vulnerability predicts fraud cases in older adults: Results of a longitudinal study. Clinical Gerontologist 39, 1 (2016), 48–63.Google ScholarGoogle ScholarCross RefCross Ref
  36. Brian D Loader, Michael Hardey, and Leigh Keeble. 2009. Digital welfare for the third age: Health and social care informatics for older people. Routledge.Google ScholarGoogle Scholar
  37. Sana Maqbool and Cosmin Munteanu. 2018. Understanding Older Adults’ Long-term Financial Practices: Challenges and Opportunities for Design. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI EA ’18). ACM, New York, NY, USA, Article LBW546, 6 pages. https://doi.org/10.1145/3170427.3188677Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Pauline Marsh and Lisa Kelly. 2018. Dignity of risk in the community: a review of and reflections on the literature. Health, Risk & Society 20, 5-6 (2018), 297–311.Google ScholarGoogle ScholarCross RefCross Ref
  39. Nora McDonald and Helena M Mentis. 2021. Building for ‘We’: Safety Settings for Couples with Memory Concerns. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1–11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Nora Mcdonald and Helena M. Mentis. 2021. “Citizens Too”: Safety Setting Collaboration Among Older Adults with Memory Concerns. ACM Trans. Comput.-Hum. Interact. 28, 5, Article 31 (Aug. 2021), 32 pages. https://doi.org/10.1145/3465217Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Andrew McNeill, Pam Briggs, Jake Pywell, and Lynne Coventry. 2017. Functional Privacy Concerns of Older Adults About Pervasive Health-monitoring Systems. In Proceedings of the 10th International Conference on PErvasive Technologies Related to Assistive Environments (Island of Rhodes, Greece) (PETRA ’17). ACM, New York, NY, USA, 96–102. https://doi.org/10.1145/3056540.3056559Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Andrew R. McNeill, Lynne Coventry, Jake Pywell, and Pam Briggs. 2017. Privacy Considerations when Designing Social Network Systems to Support Successful Ageing. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems (Denver, Colorado, USA) (CHI ’17). ACM, New York, NY, USA, 6425–6437. https://doi.org/10.1145/3025453.3025861Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Tamir Mendel and Eran Toch. 2019. My mom was getting this popup: Understanding motivations and processes in helping older relatives with mobile security and privacy. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3, 4 (2019), 1–20.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Helena M. Mentis, Galina Madjaroff, and Aaron K. Massey. 2019. Upside and Downside Risk in Online Security for Older Adults with Mild Cognitive Impairment. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI ’19). ACM, New York, NY, USA, Article 343, 13 pages. https://doi.org/10.1145/3290605.3300573 The research found that cognitively impaired OAs do have some basic level of security in place although they may be unaware of it. These are implemented in different ways and some of them are independent of a close other..Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. David R. Millen, Claudio Pinhanez, Jofish Kaye, Silvia Cristina Sardela Bianchi, and John Vines. 2015. Collaboration and Social Computing in Emerging Financial Services. In Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative Work & Social Computing (Vancouver, BC, Canada) (CSCW’15 Companion). ACM, New York, NY, USA, 309–312. https://doi.org/10.1145/2685553.2685562Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Savanthi Murthy, Karthik S Bhat, Sauvik Das, and Neha Kumar. 2021. Individually Vulnerable, Collectively Safe: The Security and Privacy Practices of Households with Older Adults. Proceedings of the ACM on Human-Computer Interaction 5, CSCW1(2021), 1–24.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Galit Nimrod. 2018. Technophobia among older Internet users. Educational Gerontology 44, 2-3 (2018), 148–162.Google ScholarGoogle ScholarCross RefCross Ref
  48. Galit Nimrod. 2018. Technostress: measuring a new threat to well-being in later life. Aging & mental health 22, 8 (2018), 1086–1093.Google ScholarGoogle Scholar
  49. Leysan Nurgalieva, Alisa Frik, Francesco Ceschel, Serge Egelman, and Maurizio Marchese. 2019. Information Design in An Aged Care Context: Views of Older Adults on Information Sharing in a Care Triad. In Proceedings of PervasiveHealth’19 (Trento, Italy). ACM, New York, NY, USA, 101–110.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Financial Consumer Agency of Canada. 2019. Survey on Banking of Canadians. https://www.canada.ca/en/financial-consumer-agency/programs/research/highlights-survey-banking-of-canadians.htmlGoogle ScholarGoogle Scholar
  51. UNECE Working Group on Ageing. 2021. Ageing in the Digital Era: Policy Brief. https://unece.org/sites/default/files/2021-07/PB26-ECE-WG.1-38_1.pdfGoogle ScholarGoogle Scholar
  52. Pavithren VS Pakianathan and Simon Perrault. 2020. Towards Inclusive Design for Privacy and Security Perspectives from an Aging Society. arXiv preprint arXiv:2007.13117(2020).Google ScholarGoogle Scholar
  53. Janey C Peterson, David PR Burnes, Paul L Caccamise, Art Mason, Charles R Henderson, Martin T Wells, Jacquelin Berman, Ann Marie Cook, Denise Shukoff, Patricia Brownell, 2014. Financial exploitation of older adults: a population-based prevalence study. Journal of general internal medicine 29, 12 (2014), 1615–1623.Google ScholarGoogle ScholarCross RefCross Ref
  54. Ilana Polyak. 2018. Preventing elder fraud. Journal of Accountancy 226, 2 (2018), 14–14.Google ScholarGoogle Scholar
  55. Anabel Quan-Haase and Dennis Ho. 2020. Online privacy concerns and privacy protection strategies among older adults in East York, Canada. Journal of the Association for Information Science and Technology 71, 9(2020), 1089–1102.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. The Daily Quotidien. 2019. Canadian Internet Use Survey. https://www150.statcan.gc.ca/n1/daily-quotidien/191029/dq191029a-eng.htmGoogle ScholarGoogle Scholar
  57. The Daily Quotidien. 2020. Canada’s population estimates: Age and sex, July 1, 2020. https://www150.statcan.gc.ca/n1/daily-quotidien/200929/dq200929b-eng.htmGoogle ScholarGoogle Scholar
  58. Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam J. Aviv. 2019. ”Woe is Me”: Examining Older Adults’ Perceptions of Privacy. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI EA ’19). ACM, New York, NY, USA, Article LBW2611, 6 pages. https://doi.org/10.1145/3290607.3312770Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam J Aviv. 2021. Why Older Adults (Don’t) Use Password Managers. In 30th {USENIX} Security Symposium ({USENIX} Security 21).Google ScholarGoogle Scholar
  60. Karen Renaud and Judith Ramsay. 2007. Now what was that password again? A more flexible way of identifying and authenticating our seniors. Behaviour & Information Technology 26, 4 (2007), 309–322.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Jeanne Rentezelas and Larry Santucci. 2018. Combining Forces to Combat Elder Financial Victimization How Consumers Can Avoid the Financial Pitfalls of Cognitive Aging and What They Should Be Asking Their Financial Institutions. FRB of Philadelphia Payment Cards Center Discussion Paper18-2 (2018).Google ScholarGoogle Scholar
  62. Marén Schorch, Lin Wan, David William Randall, and Volker Wulf. 2016. Designing for Those Who Are Overlooked: Insider Perspectives on Care Practices and Cooperative Work of Elderly Informal Caregivers. In Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (San Francisco, California, USA) (CSCW ’16). ACM, New York, NY, USA, 787–799. https://doi.org/10.1145/2818048.2819999Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. DEBORAH Setterlund, CHERYL TILSE, JILL WILSON, ANNE-LOUISE MCCAWLEY, and LINDA ROSENMAN. 2007. Understanding financial elder abuse in families: the potential of routine activities theory. Ageing and Society 27, 4 (2007), 599–614. https://doi.org/10.1017/S0144686X07006009Google ScholarGoogle ScholarCross RefCross Ref
  64. Kalpana Shankar, L Camp, Kay Connelly, and Lesa Huber. 2012. Aging, Privacy, and Home-Based Computing: Developing a Design Framework. IEEE Pervasive Computing 11, 4 (Oct. 2012), 46–54. https://doi.org/10.1109/MPRV.2011.19Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Jaisie Sin, Rachel L. Franz, Cosmin Munteanu, and Barbara Barbosa Neves. 2021. Digital Design Marginalization: New Perspectives on Designing Inclusive Interfaces. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1–11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. C Spencer. 1995. Diminishing Returns: Financial Decision Making and Financial Abuse among Seniors in British Columbia (Canada): Preliminary Results from a Province-wide Study. Gerontology Research Centre, Simon Fraser University, British Columbia (1995). financial abuse: use of funds/assets without consent, in a situation in which victim trusts the perpetrator..Google ScholarGoogle Scholar
  67. Tim Stainton. 2016. Supported decision-making in Canada: principles, policy, and practice. Research and practice in Intellectual and developmental Disabilities 3, 1(2016), 1–11.Google ScholarGoogle Scholar
  68. Cheryl Tilse, Deborah Setterlund, Jill Wilson, and Linda Rosenman. 2005. Minding the money: a growing responsibility for informal carers. Ageing & Society 25, 2 (2005), 215–227.Google ScholarGoogle ScholarCross RefCross Ref
  69. Myrra Vernooij-Dassen, Sheila Leatherman, and Marcel Olde Rikkert. 2011. Quality of care in frail older people: the fragile balance between receiving and giving. Bmj 342(2011), d403.Google ScholarGoogle ScholarCross RefCross Ref
  70. John Vines, Mark Blythe, Paul Dunphy, and Andrew Monk. 2011. Eighty something: banking for the older old. In Proceedings of HCI 2011 The 25th BCS Conference on Human Computer Interaction 25. 64–73.Google ScholarGoogle ScholarCross RefCross Ref
  71. John Vines, Mark Blythe, Stephen Lindsay, Paul Dunphy, Andrew Monk, and Patrick Olivier. 2012. Questionable concepts: critique as resource for designing with eighty somethings. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 1169–1178. The results showed that OAs have the ability to understand and critique new ideas but are wary of using them. Implies that the use of technologies most familiar to them would be best however their critiques provide valuable insight into alternative ways to approach new tech development..Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. John Vines, Stephen Lindsay, Gary W. Pritchard, Mabel Lie, David Greathead, Patrick Olivier, and Katie Brittain. 2013. Making Family Care Work: Dependence, Privacy and Remote Home Monitoring Telecare Systems. In Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (Zurich, Switzerland) (UbiComp ’13). ACM, New York, NY, USA, 607–616. https://doi.org/10.1145/2493432.2493469Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. John Vines, Gary Pritchard, Peter Wright, Patrick Olivier, and Katie Brittain. 2015. An Age-Old Problem: Examining the Discourses of Ageing in HCI and Strategies for Future Research. ACM Trans. Comput.-Hum. Interact. 22, 1, Article 2 (Feb. 2015), 27 pages. https://doi.org/10.1145/2696867Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Xiying Wang, Tiffany Knearem, Fanlu Gui, Srishti Gupta, Haining Zhu, Michael Williams, and John M. Carroll. 2018. The Safety Net of Aging in Place: Understanding How Older Adults Construct, Develop, and Maintain Their Social Circles. In Proceedings of the PervasiveHealth ’18 (New York, NY, USA). ACM, New York, NY, USA, 191–200.Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. Naomi Yamashita, Hideaki Kuzuoka, Takashi Kudo, Keiji Hirata, Eiji Aramaki, and Kazuki Hattori. 2018. How Information Sharing About Care Recipients by Family Caregivers Impacts Family Communication. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI ’18). ACM, New York, NY, USA, Article 222, 13 pages. https://doi.org/10.1145/3173574.3173796Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Unofficial Proxies: How Close Others Help Older Adults with Banking

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems
        April 2022
        10459 pages
        ISBN:9781450391573
        DOI:10.1145/3491102

        Copyright © 2022 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 April 2022

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate6,199of26,314submissions,24%

        Upcoming Conference

        CHI '24
        CHI Conference on Human Factors in Computing Systems
        May 11 - 16, 2024
        Honolulu , HI , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format