See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
S Abraham & I Chengalur-Smith 2010 An overview of social engineering malware: Trends, tactics, and implications Technology in Society 32 183 196
M Anderson 2015 The Demographics of Device Ownership Pew Research Centre
M Anderson 2017 Technology use among seniors Pew Research Centre
C Blackwood-BrownY Levy & J D’Arcy 2019 Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective Journal of Computer Information Systems 1 12
A CeccarelliA BondavalliF BrancatiE. L Mattina Improving Security of Internet Services through Continuous and Transparent User Identity Verification 2012 IEEE 31st Symposium on Reliable Distributed Systems 8-11 Oct. 2012 2012. 201-206.
H Coolican 2014 Research methods and statistics in psychology London Psychology Press 2014 Sixth edition
S. J Czaja 2019 Usability of Technology for Older Adults: Where Are We and Where Do We Need to Be Journal of Usability Studies 14 61 64
J FrancisR. V RikardS. R CottenT Kadylak 2019 Does ICT Use matter? How information and communication technology use affects perceived mattering among a predominantly female sample of older adults residing in retirement communities Information, Communication & Society 22 1281 1294
R. D Fricker& M Schonlau 2002 Advantages and Disadvantages of Internet Research Surveys: Evidence from the Literature Great Britain SAGE PUBLICATIONS INC
S. M FurnellP BryantA. D Phippen 2007 Assessing the security perceptions of personal Internet users Computers & Security 26 410 417
S GoelK Williams & E Dincelli 2017 Got Phished? Internet Security and Human Vulnerability Journal of the Association for Information Systems 18 22 44
G. A GrimesM. G Hough& M. L Signorella 2007 Email end users and spam: relations of gender and age group to attitudes and actions Computers in Human Behavior 23 318 332
HSBC, https://www.hsbc.co.uk/help/securitycentre/fraud-guide/
X HuB XiaM SkitmoreL Buys & Y Hu 2017 What is a sustainable retirement village? Perceptions of Australian developers Journal of Cleaner Production 164 179 186
M JiangH.-Y. S Tsai., S. R CottenN. J RifonR Larose & S Alhabash 2016 Generational differences in online safety perceptions, knowledge, and practices Educational Gerontology 42 621
E. H JungJ WaldenA. C Johnson& S. S Sundar 2017 Social networking in the aging context: Why older adults use or avoid Facebook Telematics & Informatics 34 1071 1080
M KhonjiY Iraqi & A Jones 2013 Phishing Detection: A Literature Survey IEEE Communications Surveys & Tutorials 15 2091 2121
K KircanskiN NotthoffM DeliemaG. R Samanez-LarkinD ShadelG MottolaL. L CarstensenH Gotlib 2018 Emotional Arousal May Increase Susceptibility to Fraud in Older and Younger Adults United States American Psychological Association
N. M Lee 2018 Fake News, Phishing, and Fraud: A Call for Research on Digital Media Literacy Education beyond the Classroom Communication Education 67 460 466
T. L MitznerJ. B BoronC. B FaussetA. E AdamsN CharnessS. J CzajaK DijkstraA. D FiskW. A Rogers& J Sharit 2010 Older adults talk technology: Technology usage and attitudes Computers in Human Behavior 26 1710 1721
B. A MorrisonL Coventry & P Briggs 2020 Technological Change in the Retirement Transition and the Implications for Cybersecurity Vulnerability in Older Adults Frontiers in Psychology 11 623
K. E NewcomerH. P Hatry& J. S Wholey 2015 Conducting semi-structured interviews Handbook of practical program evaluation 492
J NicholsonL Coventry & P Briggs 2019 "If It's Important It Will Be A Headline" Conference on Human Factors in Computing Systems Proceedings 1
D OliveiraH RochaH YangD EllisS DommarajuM MuradogluD WeirA SolimanT Lin & N Ebner Dissecting Spear Phishing Emails for Older vs Young Adults: On the Interplay of Weapons of Influence and Life Domains in Predicting Susceptibility to Phishing. 2017 2017. Association for Computing Machinery, 6412
K Olmstead & A Smith 2017 Americans and cybersecurity Pew Research Center 26 311 327
Owasp 2017. Top 10 Web Application Security Risks. Open Web Application Security Project (OWASP)
J Platania & J Crawford 2012 Media Exposure, Juror Decision-Making, and the Availability Heuristic Jury Expert 24 53 58
A Quan-HaaseK Martin & K Schreurs 2014 Not All on the Same Page: E-Book Adoption and Technology Exploration by Seniors Information Research: An International Electronic Journal 19
S RobertsonJ Robertson 2020 Volere Requirements Specification Template Atlantic Systems Guild
R Romansky & K Kirilov 2018 Architectural Design and Modelling of a Web Based Application for GDPR Clarification AIP Conference Proceedings 2048 060006 1
D. M SarnoJ. E LewisC. J Bohil& M. B Neider 2020 Which Phish Is on the Hook? Phishing Vulnerability for Older Versus Younger Adults Human Factors 62 704 717
H.-Y. S TsaiR ShillairS. R CottenV WinsteadE Yost 2015 Getting Grandma Online: Are Tablets the Answer for Increasing Digital Inclusion for Older Adults in the U.S.? Educational Gerontology 41 695 709
P. A Wickham 2003 The representativeness heuristic in judgements involving entrepreneurial success and failure Management Decision 41 156 167
J Zerlang 2017 Feature: GDPR: a milestone in convergence for cyber-security and compliance Network Security 2017 8 11