skip to main content
10.1145/3590777.3590814acmotherconferencesArticle/Chapter ViewAbstractPublication PageseiccConference Proceedingsconference-collections
poster

Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks

Published:14 June 2023Publication History

ABSTRACT

This work reports on a preliminary analysis of an ongoing study on adoption of tablet computers (tablets) among older adults. Results indicate that only perceived usefulness and knowledge (a dimension of facilitating conditions) are directly associated with older adults’ intention to use tablets. While perceived threat of cyber attacks may not be directly associated, it plays a significant role in predicting older adults’ fear of tablet use and their rejection of tablets’ benefits.

References

  1. FBI. 2022. 2021 Elder Fraud Report. Technical Report. FBI.Google ScholarGoogle Scholar
  2. Anže Mihelič, Simon Vrhovec, Igor Bernik, Andrej Domej, Damjan Fujs, Tomaž Hovelja, Sanja Kerznar Osolnik, Patrik Pucer, Damjan Vavpotič, Boštjan Žvanut, and Kaja Prislan. 2022. Use of smart devices by the elderly: Nursing home residents in Slovenia. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 13, 3 (2022), 68–80. https://doi.org/10.22667/JOWUA.2022.09.30.068Google ScholarGoogle Scholar
  3. Anže Mihelič and Boštjan Žvanut. 2022. (In)secure Smart Device Use Among Senior Citizens. IEEE Security & Privacy 20, 1 (2022), 62–71. https://doi.org/10.1109/MSEC.2021.3113726Google ScholarGoogle ScholarCross RefCross Ref
  4. Gregory D. Moody, Mikko Siponen, and Seppo Pahnila. 2018. Toward a unified model of information security policy compliance. MIS Quarterly 42, 1 (2018), 285–311. https://doi.org/10.25300/MISQ/2018/13853Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      EICC '23: Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference
      June 2023
      205 pages
      ISBN:9781450398299
      DOI:10.1145/3590777

      Copyright © 2023 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 June 2023

      Check for updates

      Qualifiers

      • poster
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)43
      • Downloads (Last 6 weeks)3

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format