Phillip Morgan
Exploring Older Adult Susceptibility to Fraudulent Computer Pop-Up Interruptions
Morgan, Phillip; Williams, Emma; Zook, Nancy; Christopher, Gary
Authors
Emma Williams
Nancy Zook Nancy.Zook@uwe.ac.uk
Associate Professor in Psychology
Gary Christopher Gary.Christopher@uwe.ac.uk
Occasional Associate Lecturer - CHSS - AHP
Contributors
T Ahram
Editor
D Nicholson
Editor
Abstract
© 2019, Springer International Publishing AG, part of Springer Nature. The proliferation of Internet connectivity and accessibility has been accompanied by an increase in cyber-threats, including fraudulent communications. Fake computer updates, which attempt to persuade people to download malicious software by mimicking trusted brands and/or instilling urgency, are one way in which fraudsters try to infiltrate systems. A recent study of young university students (M 18.52-years) found that when such pop-ups interrupt a demanding cognitive task, participants spent little time viewing them and were more likely to miss suspicious cues and accept these updates compared to when they were viewed without the pressure to resume a suspended task [1]. The aim of the current experiment was to test an older adult sample (N = 29, all >60 years) using the same paradigm. We predicted that they would be more susceptible to malevolent pop-ups [2]; trusting them more than younger adults (e.g., [3]), and would attempt to resume the interrupted task faster to limit forgetting of encoded items. Phase 1 involved serial recall memory trials interrupted by genuine, mimicked, and low authority pop-ups. During phase 2, participants rated messages with unlimited time and gave reasons for their decisions. It was found that more than 70% of mimicked and low authority pop-ups were accepted in Phase 1 vs ~80% genuine pop-ups (and these were all approximately 10% higher than [1]). This was likely due to a greater tendency to ignore or miss suspicious content when performing under pressure, despite spending longer with messages and reporting high awareness of scam techniques than younger adults. Older adult participants were more suspicious during Phase 2 performing comparably to the younger adults in [1]. Factors that may impact older adult decisions relating to fraudulent computer communications are discussed, as well as theoretical and practical implications.
Presentation Conference Type | Conference Paper (published) |
---|---|
Acceptance Date | May 28, 2018 |
Online Publication Date | Jun 24, 2018 |
Publication Date | Jan 1, 2019 |
Deposit Date | Jul 23, 2018 |
Publicly Available Date | Jun 24, 2019 |
Journal | Advances in Intelligent Systems and Computing |
Electronic ISSN | 2194-5357 |
Publisher | Springer Verlag |
Peer Reviewed | Peer Reviewed |
Volume | 782 |
Pages | 56-68 |
Series Title | Advances in Intelligent Systems and Computing |
DOI | https://doi.org/10.1007/978-3-319-94782-2_6 |
Keywords | cyber security, susceptibility, older adults, task interruption |
Public URL | https://uwe-repository.worktribe.com/output/865305 |
Publisher URL | https://doi.org/10.1007/978-3-319-94782-2_6 |
Additional Information | Additional Information : This is the author's accepted manuscript. The final published version is available here: https://doi.org/10.1007/978-3-319-94782-2_6. |
Contract Date | Jul 23, 2018 |
Files
Morgan et al (2018) Older Adults Susceptibility Pop Ups AHFE June 2018.pdf
(653 Kb)
PDF
You might also like
Neurocognitive function following out-of-hospital cardiac arrest: A systematic review
(2021)
Journal Article
Social robots: The influence of human and robot characteristics on acceptance
(2019)
Journal Article
A neuroscience-informed approach equipping educators to support young learners affected by trauma through music in the classroom
(2020)
Presentation / Conference Contribution
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search