Mobile Privacy and Security for an Ageing Population:

Workshop at MobileHCI 2018: September 3 Barcelona, Spain

Workshop Submissions

The submissions below (in author alphabetical order) will be presented on the morning of the workshop. This workshop is supported by the Cybersecurity Across the Lifespan (cSALSA) project. For more information about cSALSA please go to the project website.

Autors Affiliations Title (& PDF) Abstract
R. Abu-Salma University College London, UK Designing for the Elderly: Understanding the Role of Age on the Adoption and Use of Secure Communication Tools Lack of usable security has long been considered an obstacle to the adoption of secure communication tools. However, user studies conducted to evaluate the usability of secure tools have usually overlooked the needs and practices of elderly people. We argue that, to design and build communication tools that can effectively protect all users, we need to understand how elderly people manage their communications, as well as investigate their security needs and practices.
B. Ahmad
I. Richardson
S. McLoughlin
S. Beecham
University of Limerick, Ireland Older Adults' Interaction with Mobile Devices in Ireland: A Survey Mobile Devices can be beneficial for older adults (OAs) if used effectively. Yet current research suggests a low level of take-up. We investigated the extent to which OAs use mobile devices to identify their likes, dislikes and expectations in order to find new ways to increase their interaction. We conducted a survey with 202 OAs (aged 50-86). Many OAs are using mobile phones for communication and information seeking technology. However, without asking a direct question, privacy concerns were raised as a potential barrier towards adoption. When designing mobile apps, privacy must be a primary consideration and built in feature.
B. Corsetti
R. Blanco-Gonzalo
E. Ellavarason
R. Sanchez-Reillo
University Carlos III of Madrid, Spain;
University of Kent, UK
Mobile Access Control System through Biometric Recognition for Elderly We propose a biometric recognition- based system that helps people to perform one of the most common daily task: opening a door. The system has been developed particularly for elderly people with accessibility concerns.
A. Frik
S. Egelman
F. Schaub
J. Lee
N. Malkin
University of California, Berkeley, USA;
University of Michigan, USA
Usable Security of Emerging Healthcare Technologies for Seniors Older adults were found to have a very diverse set of privacy and security attitudes and concerns compared to younger population. Seniors per se constitute a more diverse group of population than younger adults. With increasing longevity and advances in medicine, older adults are becoming the main end users of emerging healthcare technologies (EHT). Yet not all EHT are designed for the needs of geriatric population. Due to novelty, complexity, and collection of vast amount of sensitive healthcare information, EHT pose serious privacy and security concerns. To address those concerns, a better understanding of seniors’ privacy and security mental models is needed. We plan to conduct a series of semi-structured interviews and surveys with senior citizens and their formal and informal caregivers to explore the tension between their views regarding the use of EHT, related privacy and security attitudes, mental and threat models. We also will involve senior users into participatory design and experimental testing to make recommendations for effective privacy and security EHT control systems.
L. Fritsch
I. Tjostheim
A. Kitkowska
Karlstad University, Sweeden;
Norwegian Computing Center, Norway
I'm Not That Old Yet! The Elderly and Us in HCI and Assistive Technology Recent HCI research in information security and privacy focuses on the Elderly. It aims at the provision of inclusive, Elderly-friendly interfaces for security and data protection features. Much attention is put on care situations where the image of the Elderly is that of sick or disabled persons not mastering contemporary information technology. That population is however a fraction of the group called the Elderly. In this position pa- per, we argue that the Elderly are a very diverse population. We discuss issues rising from researchers and software architects’ misconception of the Elderly as technology-illiterate and unable. We suggest a more nuanced approach that includes changing personal abil- ities over the course of life.
I. Tjostheim
L. Fritsch
Norwegian Computing Center, Norway;
Karlstad University, Sweeden
Similar Information Privacy Behavior in 60-65s vs. 50-59ers - Findings From A European Survey on The Elderly In this article, we present findings from a European survey with 10 countries on the subject sharing of personal information and con- cerns of the citizens. We compare the age group 60-65 years old with the age group 50-59, and in addition compare the Nordic region with the non-nordic popula- tion. There are more similarities than differences. The survey indicates that many of the elderly 60-65 take steps to protect their personal data.
Y. Javed
M. Shehab
B. Davis
Illinois State University, USA;
University of North Carolina, USA
Seniors' Media Preference for Receiving Internet Security Information: A Pilot Study Due to the increasing use of Internet by older adults and their low computer and Internet security literacy, their sus- ceptibility to online fraud has also increased. This suggests in turn that there are still too few Internet education mate- rials targeting seniors. We take a first step towards devel- oping interactive security information materials for seniors by determining which media they prefer and can easily comprehend. We studied the reception of two media, text and audio, as they communicated information about email- based phishing attacks. Our preliminary study of 34 seniors shows that the participants personally preferred the text over the audio. However, the comprehension score was not significantly different for participants who read the phishing text script as compared to the participants who listened to the phishing audio script.
L. Mecke
S. Prange
D. Buschek
M. Khamis
M. Hassib
F. Alt
Munich University of Applied Sciences, Germany;
LMU Munich, Germany;
University of Glasgow, UK;
Bundeswehr University Munich, Germany
"Outsourcing" Security: Supporting People to Support Older Adults Older adults often rely on the support of trusted individuals (e.g., younger family members) when performing complex tasks on their mobile devices, such as configuring privacy settings. However, a prominent problem is that systems are designed with the intention of a single "main user" using them, with little to no support for cases where the user would like to get external help from others. In this work, we provide anecdotal evidence of problems faced by support- ers who try to help older adults in privacy and security re- lated tasks. We outline multiple suggestions for future work in this area, and discuss how systems can support people who support older adults.
J. Pywell
S. Vijaykumar
Northumbria University, UK Digital Mental Health for Older Adults: Privacy Considerations from an Implementation Perspective Older adults with depression face a number of barriers to accessing treatment. However, the introduction of computerised Cognitive Behavioural Therapy is a promising salutation to a number of obstacles that older adults encounter. Despite this, older adults are underrepresented in the current literature. Older adults do not engage with technology in the same way as other demographics and have privacy concerns about sharing mental health information which may deter older adults from engaging with interventions and hinder implementation. This paper draws on privacy literature to highlight the need for a greater focus on privacy considerations that older adults may face when engaging with online treatment in order to achieve successful dissemination amongst older adults and to inform policy and design of online mental health interventions.
K. Renaud
K. Scott-Brown
A. Szymkowiak
Abertay University, UK Designing Authentication with Seniors in Mind Developers typically adopt perceived best practice, and in the case of authentication this means password security. However, given the wide range of technical solutions available and the diverse needs and limitations of older users, we suggest that the default adoption of electronic “username and password” authentication may not be 'best practice' or even good practice. This paper highlights some challenges faced by three seniors, each of whom has multiple age- related disabilities and concomitant life challenges. The result is that they cannot authenticate themselves when they need to access their devices and accounts. We conclude by suggesting a number of research directions calculated to address some of these challenges and promote inclusive design and allow for diverse user authentication.