{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:24:48Z","timestamp":1776115488252,"version":"3.50.1"},"reference-count":63,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T00:00:00Z","timestamp":1618272000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1755625"],"award-info":[{"award-number":["1755625"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,4,13]]},"abstract":"<jats:p>Older adults are especially vulnerable to online cybersecurity and privacy (SP) threats, such as phishing, ransomware, and targeted misinformation campaigns. Prior work has suggested that this vulnerability may be addressed with the design of social SP interfaces, such that groups of individuals might work together on behalf of one another to manage SP threats collectively. To this end, we present findings from a qualitative inquiry conducted with older adults and members of technology-rich middle-income households in urban India, where technology users have been shown to engage in relatively more social SP practices. Our research examines the collaborative behaviors enacted by different members of the household for protection from SP threats. In particular, we show how self-appointed family technology managers straddle the line between stewardship and paternalism in their efforts to protect older adults from perceived digital threats. We also offer design implications for supporting collaborative cybersecurity within households based on the insights derived from our analysis.<\/jats:p>","DOI":"10.1145\/3449212","type":"journal-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T17:49:24Z","timestamp":1619113764000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Individually Vulnerable, Collectively Safe"],"prefix":"10.1145","volume":"5","author":[{"given":"Savanthi","family":"Murthy","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Karthik S.","family":"Bhat","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Sauvik","family":"Das","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Neha","family":"Kumar","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134652"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300410"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1977.tb01883.x"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999927.1999939"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3193120"},{"key":"e_1_2_1_6_1","volume-title":"A multinational study on online privacy: global concerns and local responses. New media & society 11, 3","author":"Cho Hichang","year":"2009","unstructured":"Hichang Cho, Milagros Rivera-S\u00e1nchez, and Sun Sun Lim. 2009. A multinational study on online privacy: global concerns and local responses. New media & society 11, 3 (2009), 395--416."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359248"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2015.23"},{"key":"e_1_2_1_9_1","volume-title":"Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity. it-Information Technology 58, 5","author":"Das Sauvik","year":"2016","unstructured":"Sauvik Das. 2016. Social cybersecurity: Understanding and leveraging social influence to increase security sensitivity. it-Information Technology 58, 5 (2016), 237--245."},{"key":"e_1_2_1_10_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Das Sauvik","year":"2019","unstructured":"Sauvik Das, Laura A Dabbish, and Jason I Hong. 2019. A typology of perceived triggers for end-user security and privacy behaviors. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019)."},{"key":"e_1_2_1_11_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Das Sauvik","year":"2014","unstructured":"Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The effect of social influence on security sensitivity. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 143--157."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173575"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_2_1_14_1","volume-title":"Twelfth Symposium on Usable Privacy and Security ({SOUPS}","author":"Forget Alain","year":"2016","unstructured":"Alain Forget, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor, Serge Egelman, Marian Harbach, and Rahul Telang. 2016. Do or do not, there is no try: user engagement may not improve security outcomes. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016). 97--111."},{"key":"e_1_2_1_15_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Frik Alisa","year":"2019","unstructured":"Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and security threat models and mitigation strategies of older adults. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019)."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124862"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1080\/03601270903183065"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1534903.1534905"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-4023-7_24"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998314"},{"key":"e_1_2_1_21_1","unstructured":"Rayna Hollander. 2017. There's a data explosion happening in India - and Jio is at the center of it. https:\/\/www. businessinsider.com\/jio-india-data-explosion-2017-7"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.23"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359230"},{"key":"e_1_2_1_24_1","unstructured":"Nimisha Jain Kanika Sanghi and Ankur Jain. 2019. Ten Trends That Are Altering Consumer Behavior in India. https:\/\/www.bcg.com\/en-us\/publications\/2019\/ten-trends-altering-consumer-behavior-india"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858415"},{"key":"e_1_2_1_26_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Kang Ruogu","year":"2014","unstructured":"Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy attitudes of mechanical turk workers and the us public. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 37--49."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322355"},{"key":"e_1_2_1_28_1","volume-title":"Twelfth Symposium on Usable Privacy and Security ({SOUPS}","author":"Knijnenburg Bart","year":"2016","unstructured":"Bart Knijnenburg and David Cherry. 2016. Comics as a medium for privacy notices. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016)."},{"key":"e_1_2_1_29_1","unstructured":"Sandhya Krishnan and Neeraj Hatekar. [n.d.]. Rise of the New Middle Class in India and Its Changing Structure. https:\/\/www.epw.in\/journal\/2017\/22\/special-articles\/rise-new-middle-class-india-and-its-changing-structure.html"},{"key":"e_1_2_1_30_1","volume-title":"International workshop on privacy enhancing technologies. Springer, 243--258","author":"Kumaraguru Ponnurangam","year":"2005","unstructured":"Ponnurangam Kumaraguru and Lorrie Cranor. 2005. Privacy in India: Attitudes and awareness. In International workshop on privacy enhancing technologies. Springer, 243--258."},{"key":"e_1_2_1_31_1","unstructured":"Rohit KVN. 2020. Apple records stellar growth in iPhone iPad sales in India. https:\/\/www.deccanherald.com\/business\/ technology\/apple-records-stellar-growth-in-iphone-ipad-sales-in-india-799225.html"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/03634523.2018.1503313"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2013010101"},{"key":"e_1_2_1_34_1","volume-title":"Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1--8.","author":"McDonald Nora","year":"2020","unstructured":"Nora McDonald, Karla Badillo-Urquiola, Morgan G Ames, Nicola Dell, Elizabeth Keneski, Manya Sleeper, and Pamela J Wisniewski. 2020. Privacy and Power: Acknowledging the Importance of Privacy Research and Design for Vulnerable Populations. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems. 1--8."},{"key":"e_1_2_1_35_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"McDonald Nora","year":"2020","unstructured":"Nora McDonald, Alison Larsen, Allison Battisti, Galina Madjaroff, Aaron Massey, and Helena Mentis. 2020. Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges. In Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020). 99--110."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3056540.3056559"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3369821"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300573"},{"key":"e_1_2_1_39_1","volume-title":"Qualitative Research in Practice: Examples for Discussion and Analysis","author":"Merriam Sharan B","year":"2002","unstructured":"Sharan B Merriam. 2002. Merriam, Sharan B., ed., Qualitative Research in Practice: Examples for Discussion and Analysis. San Francisco: Jossey-Bass, 2002. (2002)."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300579"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1841853.1841875"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858260"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394445.1394494"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518816"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3217804.3217907"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312770"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196839.3196845"},{"key":"e_1_2_1_50_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. \"Privacy is not for me, it's for those rich women\": Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 127--142."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.22230\/cjc.2017v42n2a3130"},{"key":"e_1_2_1_53_1","unstructured":"Irving Seidman. 2006. Interviewing as qualitative research: A guide for researchers in education and the social sciences. Teachers college press."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526780"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21473"},{"key":"e_1_2_1_56_1","volume-title":"Intergenerational connections in digital families","author":"Taipale Sakari","unstructured":"Sakari Taipale. 2019. Intergenerational connections in digital families. Springer."},{"key":"e_1_2_1_57_1","unstructured":"Economic Times. 2018. India smartphone growth likely in double digits in 2018: IDC. https:\/\/economictimes.indiatimes. com\/tech\/hardware\/india-smartphone-growth-likely-in-double-digits-in-2018-idc\/articleshow\/64157987.cms"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-031-5_18"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3209818"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2696867"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376605"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1931-0846.2007.tb00509.x"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3170617"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2840488"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3449212","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3449212","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3449212","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:22Z","timestamp":1750195702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3449212"}},"subtitle":["The Security and Privacy Practices of Households with Older Adults"],"short-title":[],"issued":{"date-parts":[[2021,4,13]]},"references-count":63,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2021,4,13]]}},"alternative-id":["10.1145\/3449212"],"URL":"https:\/\/doi.org\/10.1145\/3449212","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,13]]},"assertion":[{"value":"2021-04-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}