Designing Age-Inclusive Cybersecurity: Enhancing Protection for Older Adults in Digital Environments


Authors : Seth Nti Berko; Loveth A. Odozor

Volume/Issue : Volume 10 - 2025, Issue 9 - September


Google Scholar : https://tinyurl.com/yc2wfunr

Scribd : https://tinyurl.com/3j8dvak2

DOI : https://doi.org/10.38124/ijisrt/25sep709

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.

Note : Google Scholar may take 30 to 40 days to display the article.


Abstract : As digital technology becomes increasingly integral to daily life, older adults face unique cybersecurity challenges that require specialized attention and innovative solutions. This comprehensive review examines the intersection of aging and cybersecurity, exploring how age-related changes in cognition, technology adoption patterns, and digital literacy impact vulnerability to cyber threats. Through analysis of recent research spanning 2010-2025, this article identifies critical gaps in current cybersecurity approaches and proposes age-inclusive design principles that enhance protection for older adults while maintaining usability and autonomy. The findings reveal that traditional cybersecurity measures often fail to account for the diverse needs, capabilities, and preferences of older users, necessitating a paradigm shift toward more inclusive and adaptive security frameworks. Key recommendations include developing age-appropriate training programs, implementing intuitive security interfaces, and creating community-based support systems that leverage collective efficacy in cybersecurity practices.

Keywords : Age-Inclusive Design, Cybersecurity, Older Adults, Digital Literacy, Human Factors, Security Usability.

References :

  1. Al-Daeef, M. M., Basir, N., & Saudi, M. M. (2017). Security awareness training: A review. World Congress on Internet Security (WorldCIS-2017), 51-55. https://doi.org/10.1109/WorldCIS.2017.8357168
  2. Aletras, N., Karyotis, C., Tsagkias, M., Aroyo, L., & Moens, M. F. (2021). Leveraging human factors in cybersecurity: An integrated methodological approach. Cognition, Technology & Work, 23(2), 317-336. https://doi.org/10.1007/s10111-021-00683-y
  3. Blackwood-Brown, C., Levy, Y., & D'Arcy, J. (2021). Cybersecurity awareness and skills of senior citizens: A motivation perspective. Journal of Computer Information Systems, 61(3), 195-206.
  4. Branley-Bell, D., Coventry, L., Dixon, M., Joinson, A., & Briggs, P. (2021). Exploring age and gender differences in ICT cybersecurity behaviour. Information & Computer Security, 29(5), 850-865. https://doi.org/10.1108/ICS-07-2020-0125
  5. Button, M., Nicholls, C. M., Kerr, J., & Owen, R. (2014). Online frauds: Learning from victims why they fall for these scams. Australian & New Zealand Journal of Criminology, 47(3), 391-408. https://doi.org/10.1177/0004865814521224
  6. Carstens, D. S., McCauley-Bell, P., Malone, L. C., & DeMara, R. F. (2004). Evaluation of the human impact of password authentication practices on information security. Informing Science, 7, 67-85.
  7. Chakraborty, R., Lee, J., Bagchi-Sen, S., Upadhyaya, S., & Rao, H. R. (2016). Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults. Decision Support Systems, 83, 47-56. https://doi.org/10.1016/j.dss.2015.12.007
  8. Chen, C. C., Shu, D., Ravishankar, H., Li, X., Agarwal, Y., & Cranor, L. F. (2025). Watch my health, not my data: Understanding perceptions, barriers, emotional impact, & coping strategies pertaining to IoT privacy and security in health monitoring for older adults. Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems. https://doi.org/10.1145/3706598.3714019
  9. Chhetri, C., & Motti, V. G. (2021). Identifying vulnerabilities in security and privacy of smart home devices. In International Conference on Human-Computer Interaction (pp. 211-231). Springer.
  10. Coventry, L., Briggs, P., Jeske, D., & van Moorsel, A. (2014). SCENE: A structured approach to creating cybersecurity behavioural interventions. Computers & Security, 59, 164-175. https://doi.org/10.1016/j.cose.2016.02.010
  11. Cross, C. (2017). 'But I've never sent them any personal details apart from my driver's licence number…': Exploring seniors' attitudes towards identity crime. Security Journal, 30(1), 74-88. https://doi.org/10.1057/sj.2015.23
  12. Ebner, N. C., Ellis, D. M., Lin, T., Rocha, H. A., Yang, H., Dommaraju, S., Soliman, A., Woodard, D. L., Turner, G. R., Spreng, R. N., & Oliveira, D. (2020). Uncovering susceptibility risk to online deception in aging. The Journals of Gerontology: Series B, 75(3), 522-533. https://doi.org/10.1093/geronb/gbz076
  13. Fujs, D., Mihelič, A., & Vrhovec, S. L. R. (2025). SmartICST: A smart information and cyber security training approach for older adults. Education and Information Technologies. https://doi.org/10.1007/s10639-025-13564-y
  14. Grilli, M. D., McVeigh, K. S., Hakim, Z. M., Wank, A. A., Getz, S. J., Levin, B. E., Ebner, N. C., & Wilson, R. C. (2021). Is this phishing? Older age is associated with greater difficulty discriminating between safe and malicious emails. The Journals of Gerontology: Series B, 76(9), 1854-1864. https://doi.org/10.1093/geronb/gbaa228
  15. Grimes, G. A., Hough, M. G., Mazur, E., & Signorella, M. L. (2010). Older adults' knowledge of internet hazards. Educational Gerontology, 36(3), 173-192. https://doi.org/10.1080/03601270903183065
  16. Jeske, D., Briggs, P., & Coventry, L. (2016). Exploring the relationship between impulsivity and decision-making on mobile devices. Personal and Ubiquitous Computing, 20(4), 545-557. https://doi.org/10.1007/s00779-016-0938-4
  17. Kropczynski, J., Linehan, C., Nir, B., Wisniewski, P., & Carroll, J. M. (2021). Towards building community collective efficacy for managing digital privacy and security within older adult communities. Proceedings of the ACM on Human-Computer Interaction, 4(CSCW3), 1-27. https://doi.org/10.1145/3432954
  18. Loi, D., Iversen, A., & Røed, J. (2019). Improving cybersecurity awareness: Tweet length matters. Computers & Security, 86, 139-149. https://doi.org/10.1016/j.cose.2019.06.006
  19. Mentis, H. M., Madjaroff, G., & Massey, A. K. (2019). Upside and downside risk in online security for older adults with mild cognitive impairment. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1-13. https://doi.org/10.1145/3290605.3300573
  20. Mihelič, A., Vrhovec, S. L. R., & Fujs, D. (2024). Cybersecurity competence of older adult users of mobile devices. arXiv preprint arXiv:2403.02459.
  21. Morrison, B. A., Coventry, L., & Briggs, P. (2020). Technological change in the retirement transition and the implications for cybersecurity vulnerability in older adults. Frontiers in Psychology, 11, 623. https://doi.org/10.3389/fpsyg.2020.00623
  22. Morrison, B. A., Coventry, L., & Briggs, P. (2021). How do older adults feel about engaging with cyber-security? Human Behavior and Emerging Technologies, 3(5), 1033-1049. https://doi.org/10.1002/hbe2.291
  23. Morrison, B. A., Nicholson, J., Coventry, L., & Briggs, P. (2023). Recognising diversity in older adults' cybersecurity needs. In ACM International Conference on Information Technology for Social Good (GoodIT '23), September 06-08, 2023, Lisbon, Portugal. ACM. https://doi.org/10.1145/3582515.3609565
  24. Nägle, S., & Schmidt, L. (2012). Computer acceptance of older adults. Work, 41(Suppl 1), 3541-3548. https://doi.org/10.3233/WOR-2012-0633-3541
  25. Nicholson, J., Coventry, L., & Briggs, P. (2013). Age-related performance issues for PIN and face-based authentication systems. Conference on Human Factors in Computing Systems - Proceedings, 323-332. https://doi.org/10.1145/2470654.2470701
  26. Nicholson, J., Coventry, L., & Briggs, P. (2019). If it's important it will be a headline: Cybersecurity information seeking in older adults. Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 1-11. https://doi.org/10.1145/3290605.3300579
  27. Ökereafor, K., & Mekovec, R. (2023). Navigating privacy and data safety: The implications of increased online activity among older adults post-COVID-19 induced isolation. Information, 14(6), 346. https://doi.org/10.3390/info14060346
  28. Pacheco, E. (2024). Older adults' safety and security online: A post-pandemic exploration of attitudes and behaviors. Journal of Digital Media and Interaction, 7(17), 107-126. https://doi.org/10.34624/jdmi.v7i17.37825
  29. Percy Campbell, J., Yu, L., Duggan, J., Mentis, H. M., & Thapa, N. (2024). User perception of smart home surveillance among adults aged 50 years and older: Scoping review. JMIR mHealth and uHealth, 12, e48526. https://doi.org/10.2196/48526
  30. Prümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Computers & Security, 136, 103585. https://doi.org/10.1016/j.cose.2023.103585
  31. Ray, H., Wolf, F., Kuber, R., & Aviv, A. J. (2021). Why older adults (don't) use password managers. 30th USENIX Security Symposium (USENIX Security 21), 73-90.
  32. Roque, N. A., & Boot, W. R. (2018). A new tool for assessing mobile device proficiency in older adults: The mobile device proficiency questionnaire. Journal of Applied Gerontology, 37(2), 131-156. https://doi.org/10.1177/0733464816642582
  33. Shillair, R., Cotten, S. R., Tsai, H. S., Winstead, V., Yost, E., & Berkowsky, R. W. (2015). Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior, 48, 199-207. https://doi.org/10.1016/j.chb.2015.01.062
  34. Tural, E., Lu, D., & Cole, D. A. (2021). Safely and actively aging in place: Older adults' attitudes and intentions toward smart home technologies. Journal of Applied Gerontology, 40(12), 1650-1659. https://doi.org/10.1177/23337214211017340
  35. Whitty, M. T., & Buchanan, T. (2012). The online romance scam: A serious cybercrime. Cyberpsychology, Behavior, and Social Networking, 15(3), 181-183. https://doi.org/10.1089/cyber.2011.0352

As digital technology becomes increasingly integral to daily life, older adults face unique cybersecurity challenges that require specialized attention and innovative solutions. This comprehensive review examines the intersection of aging and cybersecurity, exploring how age-related changes in cognition, technology adoption patterns, and digital literacy impact vulnerability to cyber threats. Through analysis of recent research spanning 2010-2025, this article identifies critical gaps in current cybersecurity approaches and proposes age-inclusive design principles that enhance protection for older adults while maintaining usability and autonomy. The findings reveal that traditional cybersecurity measures often fail to account for the diverse needs, capabilities, and preferences of older users, necessitating a paradigm shift toward more inclusive and adaptive security frameworks. Key recommendations include developing age-appropriate training programs, implementing intuitive security interfaces, and creating community-based support systems that leverage collective efficacy in cybersecurity practices.

Keywords : Age-Inclusive Design, Cybersecurity, Older Adults, Digital Literacy, Human Factors, Security Usability.

CALL FOR PAPERS


Paper Submission Last Date
31 - December - 2025

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe