Skip to main content

Exploring Older Adult Susceptibility to Fraudulent Computer Pop-Up Interruptions

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity (AHFE 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 782))

Included in the following conference series:

Abstract

The proliferation of Internet connectivity and accessibility has been accompanied by an increase in cyber-threats, including fraudulent communications. Fake computer updates, which attempt to persuade people to download malicious software by mimicking trusted brands and/or instilling urgency, are one way in which fraudsters try to infiltrate systems. A recent study of young university students (M 18.52-years) found that when such pop-ups interrupt a demanding cognitive task, participants spent little time viewing them and were more likely to miss suspicious cues and accept these updates compared to when they were viewed without the pressure to resume a suspended task [1]. The aim of the current experiment was to test an older adult sample (N = 29, all >60 years) using the same paradigm. We predicted that they would be more susceptible to malevolent pop-ups [2]; trusting them more than younger adults (e.g., [3]), and would attempt to resume the interrupted task faster to limit forgetting of encoded items. Phase 1 involved serial recall memory trials interrupted by genuine, mimicked, and low authority pop-ups. During phase 2, participants rated messages with unlimited time and gave reasons for their decisions. It was found that more than 70% of mimicked and low authority pop-ups were accepted in Phase 1 vs ~80% genuine pop-ups (and these were all approximately 10% higher than [1]). This was likely due to a greater tendency to ignore or miss suspicious content when performing under pressure, despite spending longer with messages and reporting high awareness of scam techniques than younger adults. Older adult participants were more suspicious during Phase 2 performing comparably to the younger adults in [1]. Factors that may impact older adult decisions relating to fraudulent computer communications are discussed, as well as theoretical and practical implications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Williams, E.J., Morgan, P.L., Joinson, A.J.: Press accept to update now: individual differences in susceptibility to malevolent interruptions. Decis. Support Syst. 96, 119–129 (2017)

    Article  Google Scholar 

  2. Roberts, J., John, S., Bussell, C., Grajzel, K., Zhao, R., Karas, S., Six, D., Yue, C., Gavett, B.: Age group, not executive functioning, predicts past susceptibility to Internet phishing scams. Arch. Clin. Neuropsychol. 30(6), 572–573 (2015)

    Article  Google Scholar 

  3. Castle, E., Eisenberger, N.I., Seeman, T.E., Moons, W.G., Boggero, I.A., Grinblatt, M.S., Taylor, S.E.: Neural and behavioral bases of age differences in perceptions of trust. Proc. Natl. Acad. Sci. U.S.A. 109(51), 20848–29852 (2012)

    Article  Google Scholar 

  4. Gatto, S.L., Tak, S.H.: Computer, Internet, and email use among older adults: benefits and barriers. Educ. Gerontol. 34(9), 800–811 (2008)

    Article  Google Scholar 

  5. Office for National Statistics: Internet users in the UK: 2017 (2017). https://www.ons.gov.uk/businessindustryandtrade/itandinternetindustry/bulletins/internetusers/2017

  6. Infosecurity Magazine: 45% of consumers are victims of cybercrime (2016). https://www.infosecurity-magazine.com/news/45-of-consumers-are-victims-of/

  7. McAfee: What is fake antivirus software? (2014). https://securingtomorrow.mcafee.com/consumer/family-safety/fake-antivirus-software/

  8. Atkins, B., Huang, W.: A study of social engineering in online frauds. Open J. Soc. Sci. 1(3), 23 (2013)

    Google Scholar 

  9. Workman, M.: Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security. J. Am. Soc. Inform. Sci. Technol. 59(4), 662–674 (2008)

    Article  Google Scholar 

  10. Deem, D.L.: Notes from the field: observations in working with the forgotten victims of personal financial crimes. J. Elder Abuse Negl. 12(2), 33–48 (2000)

    Article  Google Scholar 

  11. Smith, A.D.: Cybercriminal impacts on online business and consumer confidence. Online Inf. Rev. 28(3), 224–234 (2004)

    Article  Google Scholar 

  12. James, B.D., Boyle, P.A., Bennett, D.A.: Correlates of susceptibility to scams in older adults without dementia. J. Elder Adult Abuse Negl. 26(2), 107–122 (2014)

    Article  Google Scholar 

  13. Lichtenberg, P.A., Stickney, L., Paulson, D.: Is psychological vulnerability related to the experience of fraud in older adults? Clin. Gerontol. 36(2), 132–146 (2013)

    Article  Google Scholar 

  14. Levine, T.R.: Truth-default theory: a theory of human deception and deception detection. J. Lang. Soc. Psychol. 33, 378–392 (2014)

    Article  Google Scholar 

  15. Gavett, B.E., Zhao, R., John, S.E., Bussell, C.A., Roberts, J.R., Yue, C.: Phishing suspiciousness in older and younger adults: the role of executive functioning. PLoS ONE 12(2), e0171620 (2017)

    Article  Google Scholar 

  16. Bruine de Bruin, W., Parker, A.M., Fischhoff, B.: Explaining adult age differences in decision making competence. J. Behav. Decis. Mak. 24, 1–14 (2010)

    Google Scholar 

  17. Bäckman, L., Molander, B.: Adult age differences in the ability to cope with situations of high arousal in a precision sport. Psychol. Aging 1(2), 133–139 (1986)

    Article  Google Scholar 

  18. Verhaeghen, P., Cerella, J.: Aging, executive control, and attention: a review of meta-analyses. Neurosci. Biobehav. Rev. 26(7), 849–857 (2002)

    Article  Google Scholar 

  19. Charness, N.: Aging and problem-solving performance. In: Charness, N. (ed.) Aging and Human Performance, pp. 225–259. Wiley, New York (1985)

    Google Scholar 

  20. McDowd, J.M., Vercruyssen, M., Birren, J.E.: Aging, divided attention, and dual-task performance. In: Multiple-Task Performance, pp. 387–414 (1991)

    Google Scholar 

  21. Vishwanath, A., Herath, T., Chen, R., Wang, J., Rao, H.R.: Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis. Support Syst. 51, 576–586 (2011)

    Article  Google Scholar 

  22. Vishwanath, A., Harrison, B., Ng, Y.J.: Suspicion, cognition, and automaticity model of phishing susceptibility. Commun. Res., online pre-print, pp. 1–21 (2016)

    Google Scholar 

  23. Mata, R., Schooler, L.J., Rieskamp, J.: The aging decision maker: cognitive aging and the adaptive selection of decision strategies. Psychol. Aging 22(4), 796–810 (2007)

    Article  Google Scholar 

  24. Nasreddine, Z.S., Phillips, N.A., Bedirian, V., Charbonneau, S., Whitehead, V., Collin, I., Cummings, J.L., Chertkow, H.: The Montreal Cognitive Assessment, MoCA: a brief screening tool for mild cognitive impairment. J. Am. Geriatr. Soc. 53(4), 695–699 (2005)

    Article  Google Scholar 

  25. Cohen, J.: Statistical Power Analysis for the Behavioural Sciences. Lawrence Earlbaum Associates, Hillside (1988)

    MATH  Google Scholar 

  26. Shneiderman, B., Plaisant, C., Cohen, M., Jacobs, S., Elmqvist, N.: Designing the User Interface: Strategies for Effective Human-Computer Interaction, 6th edn. Pearson, London (2016)

    Google Scholar 

  27. Nielsen, J.: Heuristic evaluation. In: Nielsen, J., Mack, R.L. (eds.) Usability Inspection Methods. Wiley, New York (1994)

    Chapter  Google Scholar 

  28. Farage, M.A., Miller, K.W., Ajayi, F., Hutchins, D.: Design principles to accommodate older adults. Global J. Health Sci. 4(2), 2–25 (2012)

    Google Scholar 

  29. Sharit, J., Czaja, S.J., Nair, S., Lee, C.C.: Effects of age, speech rate, and environmental support in using telephone voice menu systems. Hum. Factors 45(2), 234–251 (2003)

    Article  Google Scholar 

  30. Zaphiris, P., Kurniawan, S., Ghiawadwala, M.: A systematic approach to the development of research-based web design guidelines for older people. Univ. Access Inf. Soc. 6(1), 59–75 (2007)

    Article  Google Scholar 

Download references

Acknowledgments

The reported research forms part of a United Kingdom BRACE funded project (2016–17) – Measuring executive functioning predictive of real world behaviours in older adults. We thank a number of people for assistance with preparing materials and data collection including: Emma Gaskin, Hardeep Adams, Janet Watkins, Kiren Bains, Laura Bishop, Michael Carmody-Baker, Zahra Dahnoun, Ellie MacFarlane, Katerina Stankova, and Rose Vincent.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Phillip L. Morgan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Morgan, P.L., Williams, E.J., Zook, N.A., Christopher, G. (2019). Exploring Older Adult Susceptibility to Fraudulent Computer Pop-Up Interruptions. In: Ahram, T., Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2018. Advances in Intelligent Systems and Computing, vol 782. Springer, Cham. https://doi.org/10.1007/978-3-319-94782-2_6

Download citation

Publish with us

Policies and ethics