{"id":29071,"date":"2022-03-22T01:48:00","date_gmt":"2022-03-22T01:48:00","guid":{"rendered":"https:\/\/www.lifeandnews.com\/articles\/?p=29071"},"modified":"2022-03-23T01:53:24","modified_gmt":"2022-03-23T01:53:24","slug":"older-americans-are-given-the-wrong-idea-about-online-safety-heres-how-to-help-them-help-themselves","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/older-americans-are-given-the-wrong-idea-about-online-safety-heres-how-to-help-them-help-themselves\/","title":{"rendered":"Older Americans are given the wrong idea about online safety \u2013 here\u2019s how to help them help themselves"},"content":{"rendered":"\n<p><a href=\"https:\/\/theconversation.com\/profiles\/nora-mcdonald-1157126\">Nora McDonald<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-cincinnati-1717\">University of Cincinnati<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/helena-m-mentis-1075210\">Helena M. Mentis<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-maryland-baltimore-county-1667\">University of Maryland, Baltimore County<\/a><\/em><\/p>\n\n\n\n<p>Recently, the U.S. Social Security Administration <a href=\"https:\/\/blog.ssa.gov\/my-social-security-what-to-know-about-signing-up-or-signing-in\/\">sent out an email<\/a> to subscribers of its official blog explaining how to access social security statements online. Most people know to be suspicious of seemingly official emails with links to websites asking for credentials.<\/p>\n\n\n\n<p>But for older adults who are wary of the prevalence of scams targeting their demographic, such an email can be particularly alarming since they have been told that the SSA <a href=\"https:\/\/www.aarp.org\/money\/scams-fraud\/info-2020\/social-security-email.html#:%7E:text=Social%20Security%20will%20never%20send,in%20exchange%20for%20a%20payment.\">never sends emails<\/a>. From <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3465217\">our research<\/a> designing <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445071\">cybersecurity safeguards<\/a> for older adults, we believe there is legitimate cause for alarm.<\/p>\n\n\n\n<p>This population has been schooled in a tactical approach to online safety grounded in fear and mistrust \u2013 even of themselves \u2013 and focused on specific threats rather than developing strategies that enable them to be online safely. Elders have been taught this approach by organizations they tend to trust, including <a href=\"https:\/\/www.aarp.org\/about-aarp\/info-2021\/oats-senior-planet.html\">nonprofits that teach older adults how to use technology<\/a>.<\/p>\n\n\n\n<p>These organizations promote a view of older adults as highly vulnerable while also encouraging them to take gratuitous risks in defending themselves. As <a href=\"https:\/\/scholar.google.com\/citations?user=_VdWyEcAAAAJ&amp;hl=en\">information technology<\/a> <a href=\"https:\/\/scholar.google.com\/citations?user=u3BoLzgAAAAJ&amp;hl=en\">researchers<\/a>, we believe it doesn\u2019t need to be this way.<\/p>\n\n\n\n<h2>Older adults and online safety<\/h2>\n\n\n\n<p>Older adults may be at heightened risk of cybersecurity breaches and <a href=\"https:\/\/www.lifelock.com\/learn\/identity-theft-resources\/seniors-victims-of-identity-theft\">fraudulent behavior<\/a> because they lack experience with internet technology and represent a <a href=\"https:\/\/www.huffpost.com\/entry\/scams-older-adults_n_1317285\">financially attractive target<\/a>. Older adults may also be more susceptible because they struggle with their confidence in using technology even as <a href=\"https:\/\/doi.org\/10.1016\/j.chb.2010.06.020\">they recognize its benefits<\/a>.<\/p>\n\n\n\n<p>We have been <a href=\"https:\/\/doi.org\/10.1145\/3411764.3445071\">developing technology tools<\/a> that help aging Americans maintain their own online safety no matter what challenges they may face, <a href=\"https:\/\/www.usenix.org\/system\/files\/soups2020-mcdonald.pdf\">including cognitive decline<\/a>. To do so, we needed to understand what and how the people we study are <a href=\"https:\/\/doi.org\/10.1145\/3465217\">learning about cybersecurity threats<\/a> and what strategies they are being taught to <a href=\"https:\/\/doi.org\/10.1145\/3290605.3300573\">reduce their vulnerabilities<\/a>.<\/p>\n\n\n\n<p>We have found that older adults attempt to <a href=\"https:\/\/doi.org\/10.1145\/3465217\">draw on personal experience<\/a> to develop strategies to reduce privacy violations and security threats. For the most part, they are successful at detecting threats by being on the lookout for activities they did not initiate \u2014 for example, an account they do not have. However, outside experts <a href=\"https:\/\/doi.org\/10.1145\/3432954\">have an inordinate amount of influence<\/a> on those with less perceived ability or experience with technology.<\/p>\n\n\n\n<h2>What \u2018experts\u2019 are telling older Americans<\/h2>\n\n\n\n<p>Unfortunately, the guidance that older adults are getting from those who presumably have authority on the matter is less than ideal.<\/p>\n\n\n\n<p>Perhaps the loudest of those voices is the <a href=\"https:\/\/www.aarp.org\/\">AARP<\/a>, a U.S. advocacy group that has been carrying out a mission to \u201cempower\u201d individuals as they age for over six decades. In that time, it has established a commanding print and online presence. Its magazine reached <a href=\"https:\/\/www.prnewswire.com\/news-releases\/aarp-the-magazine-has-the-highest-readership-of-all-us-magazines-mri-finds-300573427.html\">over 38 million mailboxes in 2017<\/a>, and it is an <a href=\"https:\/\/www.washingtonpost.com\/opinions\/heres-why-ill-never-ever-join-the-aarp\/2016\/11\/11\/f95c14de-a790-11e6-8042-f4d111c862d1_story.html\">effective advocacy group<\/a>.<\/p>\n\n\n\n<p>What we found was that the AARP communiqu\u00e9s on cybersecurity use storytelling to create cartoonish folktales of internet deception. A regularly featured diet of sensational titles like \u201c<a href=\"https:\/\/www.aarp.org\/money\/scams-fraud\/info-2017\/military-scams-fd.html\">Grandparent Gotchas<\/a>,\u201d \u201c<a href=\"https:\/\/www.aarp.org\/money\/scams-fraud\/info-05-2010\/spring_swindles.html\">Sweepstakes Swindles<\/a>\u201d and \u201c<a href=\"https:\/\/www.aarp.org\/money\/scams-fraud\/info-10-2011\/fraud-scams-to-watch-for-2012.html\">Devilish Diagnoses<\/a>\u201d depict current and emerging threats.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/images.theconversation.com\/files\/453433\/original\/file-20220321-27-jwsvp9.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip\"><img src=\"https:\/\/images.theconversation.com\/files\/453433\/original\/file-20220321-27-jwsvp9.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" alt=\"a man wearing a hooded sweatshirt and sunglasses types on a laptop computer\" \/><\/a><figcaption>Much of the cybersecurity advice given to elders fosters the cartoonish misconception that flesh-and-blood scam artists lurk in their midst. <a href=\"https:\/\/www.gettyimages.com\/detail\/photo\/hacker-man-with-laptop-stealing-personal-data-from-royalty-free-image\/1093756844\">5m3photos\/Moment via Getty Images<\/a><\/figcaption><\/figure>\n\n\n\n<p>These scenarios appeal to readers the way crime shows have historically appealed to TV audiences: by using narrative devices to alarm and thrill. Ultimately they also delude viewers by leaving them with the misconception that they can use what they\u2019ve learned in those stories to defend themselves against criminal threats.<\/p>\n\n\n\n<h2>Folktales and foibles<\/h2>\n\n\n\n<p>One job of folktales is to spell out the hazards that a culture wants its members to learn in childhood. But by presenting cyber-risk as a set of ever-evolving stories that focuses on particular risks, the AARP shifts attention away from basic principles to anecdotes. This requires its members to compare their online experiences with specific stories.<\/p>\n\n\n\n<p>Readers are implicitly encouraged to assess the plausibility of particular scenarios with questions like, Is it possible that I have any unpaid back taxes? And, Do I actually have an extended warranty? It requires people to catalogue each of these stories and then work out for themselves each time whether an unsolicited message is a real threat based on its content, rather than the person\u2019s circumstances.<\/p>\n\n\n\n<h2>No, it\u2019s not personal<\/h2>\n\n\n\n<p>Through this inventory of stories and characters, we also found that the AARP was personalizing what is, at root, a set of structural threats, impersonal by nature. The stories often characterize scammers as people in the reader\u2019s very midst who use local news to manipulate older adults.<\/p>\n\n\n\n<p>Real threats are not \u201csweepstake swindlers\u201d or \u201cFacebook unfriendlies,\u201d with a live scam artist sensitive to the needs and foibles of each intended victim. There is rarely a human relationship between the cyber-scammer and the victim \u2014 no con artists behind the notorious \u201cgrandparents scam.\u201d The AARP bulletins and advisories imply that there is \u2014 or, at least, implicitly foster that old-fashioned view of a direct relationship between swindler and victim.<\/p>\n\n\n\n<h2>Don\u2019t engage<\/h2>\n\n\n\n<p>Perhaps even more worrisome, AARP advisories appear to encourage investigation into scenarios, when engagement of any sort puts people at risk.<\/p>\n\n\n\n<p>In one post alerting people to \u201c<a href=\"https:\/\/www.aarp.org\/money\/scams-fraud\/info-2017\/military-scams-fd.html\">8 Military-Themed Imposter Scams<\/a>,\u201d they discuss \u201cprices too good to be true,\u201d when the very concept of buying a car on Craigslist, or an \u201cactive-duty service member\u201d urgently selling a car, should be a red flag discouraging any form of engagement.<\/p>\n\n\n\n<p>Internet users of any age, but especially more vulnerable populations, should be urged to withdraw from threats, not be cast as sleuths in their own suspense stories.<\/p>\n\n\n\n<h2>Protecting older adults in the age of surveillance capitalism<\/h2>\n\n\n\n<p>In order to reduce everyone\u2019s risk while online, we believe it\u2019s important to provide a set of well-curated principles rather than presenting people with a set of stories to learn. Everyone exposed to threats online, but especially those most at risk, needs a checklist of cautions and strong rules against engagement whenever there is doubt.<\/p>\n\n\n\n<p>In short, the best strategy is to simply ignore unsolicited outreach altogether, particularly from organizations you don\u2019t do business with. People need to be reminded that their own context, behaviors and relationships are all that matter.<\/p>\n\n\n\n<p>[<em>Get the best of The Conversation, every weekend.<\/em> <a href=\"https:\/\/memberservices.theconversation.com\/newsletters\/?nl=weekly&amp;source=inline-weeklybest\">Sign up for our weekly newsletter<\/a>.]<\/p>\n\n\n\n<p>Because, in the end, it\u2019s not just about tools, it\u2019s about worldview. Ultimately, for everyone to make effective, consistent use of security tools, people need a theory of the online world that educates them about the <a href=\"https:\/\/theconversation.com\/explainer-what-is-surveillance-capitalism-and-how-does-it-shape-our-economy-119158\">rudiments of surveillance capitalism<\/a>.<\/p>\n\n\n\n<p>We believe people should be taught to see their online selves as reconstructions made out of data, as unreal as bots. This is admittedly a difficult idea because people have a hard time imagining themselves as separate from the data they generate, and recognizing that their online lives are affected by algorithms that analyze and act on that data.<\/p>\n\n\n\n<p>But it is an important concept \u2014 and one that we see older adults embracing in our research when they tell us that while they are frustrated with receiving spam, they are learning to ignore the communications that reflect \u201cselves\u201d they don\u2019t identify with.<\/p>\n\n\n\n<p><a href=\"https:\/\/theconversation.com\/profiles\/nora-mcdonald-1157126\">Nora McDonald<\/a>, Assistant Professor of Information Technology, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-cincinnati-1717\">University of Cincinnati<\/a><\/em> and <a href=\"https:\/\/theconversation.com\/profiles\/helena-m-mentis-1075210\">Helena M. Mentis<\/a>, Professor of Information Systems, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-maryland-baltimore-county-1667\">University of Maryland, Baltimore County<\/a><\/em><\/p>\n\n\n\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/older-americans-are-given-the-wrong-idea-about-online-safety-heres-how-to-help-them-help-themselves-177215\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nora McDonald, University of Cincinnati and Helena M. Mentis, University of Maryland, Baltimore County Recently, the U.S. Social Security Administration sent out an email to subscribers of its official blog explaining how to access social security statements online. Most people know to be suspicious of seemingly official emails with links to websites asking for credentials. [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":29072,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3410,8],"tags":[11541,558,7712,549,9159,11540,3116,11539,8607,4894],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/29071"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=29071"}],"version-history":[{"count":1,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/29071\/revisions"}],"predecessor-version":[{"id":29073,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/29071\/revisions\/29073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/29072"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=29071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=29071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=29071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}