Abstract
The proliferation of Internet connectivity and accessibility has been accompanied by an increase in cyber-threats, including fraudulent communications. Fake computer updates, which attempt to persuade people to download malicious software by mimicking trusted brands and/or instilling urgency, are one way in which fraudsters try to infiltrate systems. A recent study of young university students (M 18.52-years) found that when such pop-ups interrupt a demanding cognitive task, participants spent little time viewing them and were more likely to miss suspicious cues and accept these updates compared to when they were viewed without the pressure to resume a suspended task [1]. The aim of the current experiment was to test an older adult sample (N = 29, all >60 years) using the same paradigm. We predicted that they would be more susceptible to malevolent pop-ups [2]; trusting them more than younger adults (e.g., [3]), and would attempt to resume the interrupted task faster to limit forgetting of encoded items. Phase 1 involved serial recall memory trials interrupted by genuine, mimicked, and low authority pop-ups. During phase 2, participants rated messages with unlimited time and gave reasons for their decisions. It was found that more than 70% of mimicked and low authority pop-ups were accepted in Phase 1 vs ~80% genuine pop-ups (and these were all approximately 10% higher than [1]). This was likely due to a greater tendency to ignore or miss suspicious content when performing under pressure, despite spending longer with messages and reporting high awareness of scam techniques than younger adults. Older adult participants were more suspicious during Phase 2 performing comparably to the younger adults in [1]. Factors that may impact older adult decisions relating to fraudulent computer communications are discussed, as well as theoretical and practical implications.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Williams, E.J., Morgan, P.L., Joinson, A.J.: Press accept to update now: individual differences in susceptibility to malevolent interruptions. Decis. Support Syst. 96, 119–129 (2017)
Roberts, J., John, S., Bussell, C., Grajzel, K., Zhao, R., Karas, S., Six, D., Yue, C., Gavett, B.: Age group, not executive functioning, predicts past susceptibility to Internet phishing scams. Arch. Clin. Neuropsychol. 30(6), 572–573 (2015)
Castle, E., Eisenberger, N.I., Seeman, T.E., Moons, W.G., Boggero, I.A., Grinblatt, M.S., Taylor, S.E.: Neural and behavioral bases of age differences in perceptions of trust. Proc. Natl. Acad. Sci. U.S.A. 109(51), 20848–29852 (2012)
Gatto, S.L., Tak, S.H.: Computer, Internet, and email use among older adults: benefits and barriers. Educ. Gerontol. 34(9), 800–811 (2008)
Office for National Statistics: Internet users in the UK: 2017 (2017). https://www.ons.gov.uk/businessindustryandtrade/itandinternetindustry/bulletins/internetusers/2017
Infosecurity Magazine: 45% of consumers are victims of cybercrime (2016). https://www.infosecurity-magazine.com/news/45-of-consumers-are-victims-of/
McAfee: What is fake antivirus software? (2014). https://securingtomorrow.mcafee.com/consumer/family-safety/fake-antivirus-software/
Atkins, B., Huang, W.: A study of social engineering in online frauds. Open J. Soc. Sci. 1(3), 23 (2013)
Workman, M.: Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security. J. Am. Soc. Inform. Sci. Technol. 59(4), 662–674 (2008)
Deem, D.L.: Notes from the field: observations in working with the forgotten victims of personal financial crimes. J. Elder Abuse Negl. 12(2), 33–48 (2000)
Smith, A.D.: Cybercriminal impacts on online business and consumer confidence. Online Inf. Rev. 28(3), 224–234 (2004)
James, B.D., Boyle, P.A., Bennett, D.A.: Correlates of susceptibility to scams in older adults without dementia. J. Elder Adult Abuse Negl. 26(2), 107–122 (2014)
Lichtenberg, P.A., Stickney, L., Paulson, D.: Is psychological vulnerability related to the experience of fraud in older adults? Clin. Gerontol. 36(2), 132–146 (2013)
Levine, T.R.: Truth-default theory: a theory of human deception and deception detection. J. Lang. Soc. Psychol. 33, 378–392 (2014)
Gavett, B.E., Zhao, R., John, S.E., Bussell, C.A., Roberts, J.R., Yue, C.: Phishing suspiciousness in older and younger adults: the role of executive functioning. PLoS ONE 12(2), e0171620 (2017)
Bruine de Bruin, W., Parker, A.M., Fischhoff, B.: Explaining adult age differences in decision making competence. J. Behav. Decis. Mak. 24, 1–14 (2010)
Bäckman, L., Molander, B.: Adult age differences in the ability to cope with situations of high arousal in a precision sport. Psychol. Aging 1(2), 133–139 (1986)
Verhaeghen, P., Cerella, J.: Aging, executive control, and attention: a review of meta-analyses. Neurosci. Biobehav. Rev. 26(7), 849–857 (2002)
Charness, N.: Aging and problem-solving performance. In: Charness, N. (ed.) Aging and Human Performance, pp. 225–259. Wiley, New York (1985)
McDowd, J.M., Vercruyssen, M., Birren, J.E.: Aging, divided attention, and dual-task performance. In: Multiple-Task Performance, pp. 387–414 (1991)
Vishwanath, A., Herath, T., Chen, R., Wang, J., Rao, H.R.: Why do people get phished? Testing individual differences in phishing vulnerability within an integrated, information processing model. Decis. Support Syst. 51, 576–586 (2011)
Vishwanath, A., Harrison, B., Ng, Y.J.: Suspicion, cognition, and automaticity model of phishing susceptibility. Commun. Res., online pre-print, pp. 1–21 (2016)
Mata, R., Schooler, L.J., Rieskamp, J.: The aging decision maker: cognitive aging and the adaptive selection of decision strategies. Psychol. Aging 22(4), 796–810 (2007)
Nasreddine, Z.S., Phillips, N.A., Bedirian, V., Charbonneau, S., Whitehead, V., Collin, I., Cummings, J.L., Chertkow, H.: The Montreal Cognitive Assessment, MoCA: a brief screening tool for mild cognitive impairment. J. Am. Geriatr. Soc. 53(4), 695–699 (2005)
Cohen, J.: Statistical Power Analysis for the Behavioural Sciences. Lawrence Earlbaum Associates, Hillside (1988)
Shneiderman, B., Plaisant, C., Cohen, M., Jacobs, S., Elmqvist, N.: Designing the User Interface: Strategies for Effective Human-Computer Interaction, 6th edn. Pearson, London (2016)
Nielsen, J.: Heuristic evaluation. In: Nielsen, J., Mack, R.L. (eds.) Usability Inspection Methods. Wiley, New York (1994)
Farage, M.A., Miller, K.W., Ajayi, F., Hutchins, D.: Design principles to accommodate older adults. Global J. Health Sci. 4(2), 2–25 (2012)
Sharit, J., Czaja, S.J., Nair, S., Lee, C.C.: Effects of age, speech rate, and environmental support in using telephone voice menu systems. Hum. Factors 45(2), 234–251 (2003)
Zaphiris, P., Kurniawan, S., Ghiawadwala, M.: A systematic approach to the development of research-based web design guidelines for older people. Univ. Access Inf. Soc. 6(1), 59–75 (2007)
Acknowledgments
The reported research forms part of a United Kingdom BRACE funded project (2016–17) – Measuring executive functioning predictive of real world behaviours in older adults. We thank a number of people for assistance with preparing materials and data collection including: Emma Gaskin, Hardeep Adams, Janet Watkins, Kiren Bains, Laura Bishop, Michael Carmody-Baker, Zahra Dahnoun, Ellie MacFarlane, Katerina Stankova, and Rose Vincent.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Morgan, P.L., Williams, E.J., Zook, N.A., Christopher, G. (2019). Exploring Older Adult Susceptibility to Fraudulent Computer Pop-Up Interruptions. In: Ahram, T., Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. AHFE 2018. Advances in Intelligent Systems and Computing, vol 782. Springer, Cham. https://doi.org/10.1007/978-3-319-94782-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-94782-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94781-5
Online ISBN: 978-3-319-94782-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)