Authors :
Seth Nti Berko; Loveth A. Odozor
Volume/Issue :
Volume 10 - 2025, Issue 9 - September
Google Scholar :
https://tinyurl.com/yc2wfunr
Scribd :
https://tinyurl.com/3j8dvak2
DOI :
https://doi.org/10.38124/ijisrt/25sep709
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Note : Google Scholar may take 30 to 40 days to display the article.
Abstract :
As digital technology becomes increasingly integral to daily life, older adults face unique cybersecurity challenges
that require specialized attention and innovative solutions. This comprehensive review examines the intersection of aging
and cybersecurity, exploring how age-related changes in cognition, technology adoption patterns, and digital literacy impact
vulnerability to cyber threats. Through analysis of recent research spanning 2010-2025, this article identifies critical gaps
in current cybersecurity approaches and proposes age-inclusive design principles that enhance protection for older adults
while maintaining usability and autonomy. The findings reveal that traditional cybersecurity measures often fail to account
for the diverse needs, capabilities, and preferences of older users, necessitating a paradigm shift toward more inclusive and
adaptive security frameworks. Key recommendations include developing age-appropriate training programs, implementing
intuitive security interfaces, and creating community-based support systems that leverage collective efficacy in cybersecurity
practices.
Keywords :
Age-Inclusive Design, Cybersecurity, Older Adults, Digital Literacy, Human Factors, Security Usability.
References :
- Al-Daeef, M. M., Basir, N., & Saudi, M. M. (2017). Security awareness training: A review. World Congress on Internet Security (WorldCIS-2017), 51-55. https://doi.org/10.1109/WorldCIS.2017.8357168
- Aletras, N., Karyotis, C., Tsagkias, M., Aroyo, L., & Moens, M. F. (2021). Leveraging human factors in cybersecurity: An integrated methodological approach. Cognition, Technology & Work, 23(2), 317-336. https://doi.org/10.1007/s10111-021-00683-y
- Blackwood-Brown, C., Levy, Y., & D'Arcy, J. (2021). Cybersecurity awareness and skills of senior citizens: A motivation perspective. Journal of Computer Information Systems, 61(3), 195-206.
- Branley-Bell, D., Coventry, L., Dixon, M., Joinson, A., & Briggs, P. (2021). Exploring age and gender differences in ICT cybersecurity behaviour. Information & Computer Security, 29(5), 850-865. https://doi.org/10.1108/ICS-07-2020-0125
- Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand Journal of Criminology, 47(3), 391-408. https://doi.org/10.1177/0004865814521224
- Carstens, D. S., McCauley-Bell, P., Malone, L. C., & DeMara, R. F. (2004). Evaluation of the human impact of password authentication practices on information security. Informing Science, 7, 67-85.
- Chakraborty, R., Lee, J., Bagchi-Sen, S., Upadhyaya, S., & Rao, H. R. (2016). Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults. Decision Support Systems, 83, 47-56. https://doi.org/10.1016/j.dss.2015.12.007
- Chen, C. C., Shu, D., Ravishankar, H., Li, X., Agarwal, Y., & Cranor, L. F. (2025). Watch my health, not my data: Understanding perceptions, barriers, emotional impact, & coping strategies pertaining to IoT privacy and security in health monitoring for older adults. Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems. https://doi.org/10.1145/3706598.3714019
- Chhetri, C., & Motti, V. G. (2021). Identifying vulnerabilities in security and privacy of smart home devices. In International Conference on Human-Computer Interaction (pp. 211-231). Springer.
- Coventry, L., Briggs, P., Jeske, D., & van Moorsel, A. (2014). SCENE: A structured approach to creating cybersecurity behavioural interventions. Computers & Security, 59, 164-175. https://doi.org/10.1016/j.cose.2016.02.010
- Cross, C. (2017). 'But I've never sent them any personal details apart from my driver's licence number…': Exploring seniors' attitudes towards identity crime. Security Journal, 30(1), 74-88. https://doi.org/10.1057/sj.2015.23
- Ebner, N. C., Ellis, D. M., Lin, T., Rocha, H. A., Yang, H., Dommaraju, S., Soliman, A., Woodard, D. L., Turner, G. R., Spreng, R. N., & Oliveira, D. (2020). Uncovering susceptibility risk to online deception in aging. The Journals of Gerontology: Series B, 75(3), 522-533. https://doi.org/10.1093/geronb/gbz076
- Fujs, D., Mihelič, A., & Vrhovec, S. L. R. (2025). SmartICST: A smart information and cyber security training approach for older adults. Education and Information Technologies. https://doi.org/10.1007/s10639-025-13564-y
- Grilli, M. D., McVeigh, K. S., Hakim, Z. M., Wank, A. A., Getz, S. J., Levin, B. E., Ebner, N. C., & Wilson, R. C. (2021). Is this phishing? Older age is associated with greater difficulty discriminating between safe and malicious emails. The Journals of Gerontology: Series B, 76(9), 1854-1864. https://doi.org/10.1093/geronb/gbaa228
- Grimes, G. A., Hough, M. G., Mazur, E., & Signorella, M. L. (2010). Older adults' knowledge of internet hazards. Educational Gerontology, 36(3), 173-192. https://doi.org/10.1080/03601270903183065
- Jeske, D., Briggs, P., & Coventry, L. (2016). Exploring the relationship between impulsivity and decision-making on mobile devices. Personal and Ubiquitous Computing, 20(4), 545-557. https://doi.org/10.1007/s00779-016-0938-4
- Kropczynski, J., Linehan, C., Nir, B., Wisniewski, P., & Carroll, J. M. (2021). Towards building community collective efficacy for managing digital privacy and security within older adult communities. Proceedings of the ACM on Human-Computer Interaction, 4(CSCW3), 1-27. https://doi.org/10.1145/3432954
- Loi, D., Iversen, A., & Røed, J. (2019). Improving cybersecurity awareness: Tweet length matters. Computers & Security, 86, 139-149. https://doi.org/10.1016/j.cose.2019.06.006
- Mentis, H. M., Madjaroff, G., & Massey, A. K. (2019). Upside and downside risk in online security for older adults with mild cognitive impairment. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1-13. https://doi.org/10.1145/3290605.3300573
- Mihelič, A., Vrhovec, S. L. R., & Fujs, D. (2024). Cybersecurity competence of older adult users of mobile devices. arXiv preprint arXiv:2403.02459.
- Morrison, B. A., Coventry, L., & Briggs, P. (2020). Technological change in the retirement transition and the implications for cybersecurity vulnerability in older adults. Frontiers in Psychology, 11, 623. https://doi.org/10.3389/fpsyg.2020.00623
- Morrison, B. A., Coventry, L., & Briggs, P. (2021). How do older adults feel about engaging with cyber-security? Human Behavior and Emerging Technologies, 3(5), 1033-1049. https://doi.org/10.1002/hbe2.291
- Morrison, B. A., Nicholson, J., Coventry, L., & Briggs, P. (2023). Recognising diversity in older adults' cybersecurity needs. In ACM International Conference on Information Technology for Social Good (GoodIT '23), September 06-08, 2023, Lisbon, Portugal. ACM. https://doi.org/10.1145/3582515.3609565
- Nägle, S., & Schmidt, L. (2012). Computer acceptance of older adults. Work, 41(Suppl 1), 3541-3548. https://doi.org/10.3233/WOR-2012-0633-3541
- Nicholson, J., Coventry, L., & Briggs, P. (2013). Age-related performance issues for PIN and face-based authentication systems. Conference on Human Factors in Computing Systems - Proceedings, 323-332. https://doi.org/10.1145/2470654.2470701
- Nicholson, J., Coventry, L., & Briggs, P. (2019). If it's important it will be a headline: Cybersecurity information seeking in older adults. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1-11. https://doi.org/10.1145/3290605.3300579
- Ökereafor, K., & Mekovec, R. (2023). Navigating privacy and data safety: The implications of increased online activity among older adults post-COVID-19 induced isolation. Information, 14(6), 346. https://doi.org/10.3390/info14060346
- Pacheco, E. (2024). Older adults' safety and security online: A post-pandemic exploration of attitudes and behaviors. Journal of Digital Media and Interaction, 7(17), 107-126. https://doi.org/10.34624/jdmi.v7i17.37825
- Percy Campbell, J., Yu, L., Duggan, J., Mentis, H. M., & Thapa, N. (2024). User perception of smart home surveillance among adults aged 50 years and older: Scoping review. JMIR mHealth and uHealth, 12, e48526. https://doi.org/10.2196/48526
- Prümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Computers & Security, 136, 103585. https://doi.org/10.1016/j.cose.2023.103585
- Ray, H., Wolf, F., Kuber, R., & Aviv, A. J. (2021). Why older adults (don't) use password managers. 30th USENIX Security Symposium (USENIX Security 21), 73-90.
- Roque, N. A., & Boot, W. R. (2018). A new tool for assessing mobile device proficiency in older adults: The mobile device proficiency questionnaire. Journal of Applied Gerontology, 37(2), 131-156. https://doi.org/10.1177/0733464816642582
- Shillair, R., Cotten, S. R., Tsai, H. S., Winstead, V., Yost, E., & Berkowsky, R. W. (2015). Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior, 48, 199-207. https://doi.org/10.1016/j.chb.2015.01.062
- Tural, E., Lu, D., & Cole, D. A. (2021). Safely and actively aging in place: Older adults' attitudes and intentions toward smart home technologies. Journal of Applied Gerontology, 40(12), 1650-1659. https://doi.org/10.1177/23337214211017340
- Whitty, M. T., & Buchanan, T. (2012). The online romance scam: A serious cybercrime. Cyberpsychology, Behavior, and Social Networking, 15(3), 181-183. https://doi.org/10.1089/cyber.2011.0352
As digital technology becomes increasingly integral to daily life, older adults face unique cybersecurity challenges
that require specialized attention and innovative solutions. This comprehensive review examines the intersection of aging
and cybersecurity, exploring how age-related changes in cognition, technology adoption patterns, and digital literacy impact
vulnerability to cyber threats. Through analysis of recent research spanning 2010-2025, this article identifies critical gaps
in current cybersecurity approaches and proposes age-inclusive design principles that enhance protection for older adults
while maintaining usability and autonomy. The findings reveal that traditional cybersecurity measures often fail to account
for the diverse needs, capabilities, and preferences of older users, necessitating a paradigm shift toward more inclusive and
adaptive security frameworks. Key recommendations include developing age-appropriate training programs, implementing
intuitive security interfaces, and creating community-based support systems that leverage collective efficacy in cybersecurity
practices.
Keywords :
Age-Inclusive Design, Cybersecurity, Older Adults, Digital Literacy, Human Factors, Security Usability.