Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective

作者: Carlene Blackwood-Brown , Yair Levy , John D’Arcy

DOI: 10.1080/08874417.2019.1579076

关键词:

摘要: Senior citizens are one of the most vulnerable groups Internet users who prone to cyberattacks. Thus, assessing senior citizens’ motivation acquire cybersecurity skills is critical hel...

参考文章(68)
Nicole Wagner, Khaled Hassanein, Milena Head, Review: Computer use by older adults: A multi-disciplinary review Computers in Human Behavior. ,vol. 26, pp. 870- 882 ,(2010) , 10.1016/J.CHB.2010.03.029
Noor Hayani Abd Rahim, Suraya Hamid, Miss Laiha Mat Kiah, Shahaboddin Shamshirband, Steven Furnell, A systematic review of approaches to assessing cybersecurity awareness Kybernetes. ,vol. 44, pp. 606- 622 ,(2015) , 10.1108/K-12-2014-0283
Yixin Zhang, Sue Espinoza, Relationships Among Computer Self-Efficacy, Attitudes Toward Computers, and Desirability of Learning Computing Skills Journal of Research on Computing in Education. ,vol. 30, pp. 420- 436 ,(1998) , 10.1080/08886504.1998.10782236
Yuxiang Chris Zhao, Qinghua Zhu, Effects of extrinsic and intrinsic motivation on participation in crowdsourcing contest Online Information Review. ,vol. 38, pp. 896- 917 ,(2014) , 10.1108/OIR-08-2014-0188
Detmar W. Straub, Validating instruments in MIS research Management Information Systems Quarterly. ,vol. 13, pp. 147- 169 ,(1989) , 10.2307/248922
Antonio González, María Paz Ramírez, Vicente Viadel, ICT Learning by Older Adults and Their Attitudes toward Computer Use Current Gerontology and Geriatrics Research. ,vol. 2015, pp. 849308- 849308 ,(2015) , 10.1155/2015/849308
Michael Wolf, Dwight Haworth, Leah Pietron, Measuring An Information Security Awareness Program business information systems. ,vol. 15, pp. 9- 22 ,(2011) , 10.19030/RBIS.V15I3.5398
Scott R Boss, Laurie J Kirsch, Ingo Angermeier, Raymond A Shingler, R Wayne Boss, If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security European Journal of Information Systems. ,vol. 18, pp. 151- 164 ,(2009) , 10.1057/EJIS.2009.8
Ke Chen, Alan Chan, Use or non-use of gerontechnology--a qualitative study. International Journal of Environmental Research and Public Health. ,vol. 10, pp. 4645- 4666 ,(2013) , 10.3390/IJERPH10104645
John D’Arcy, Anat Hovav, None, Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures. Journal of Business Ethics. ,vol. 89, pp. 59- 71 ,(2009) , 10.1007/S10551-008-9909-7