Individual Strategies for Managing Privacy Risk

Strategy Illustration 1.png

01

Be wary. Before clicking on suspicious links (email or text messages), hover your cursor over the link to view the destination URL. If it doesn’t match the website, you normally use, don’t click. It is probably a phishing scam, trying to gain access to your data. Alternatively, try to go to your account with that specific service (e.g., ATO) and find the information you need there.

02

Laptop camera. Increase your privacy online by turning your camera and voice recognition off, utilising privacy settings on your devices and social media accounts and the incognito/private mode when searching online. Use a search engine to study how to do so.

03

Further research. If you are interested in privacy and security risks, there are several online resources, website and YouTube videos that can help you better understand privacy and security issues.

04

Search engines. Most web users rely heavily on Google as their search engine, but you might be better off with using private – or anonymous –search engines. Private Search engines do not collect or share your search history or clicks. Anonymous search engines can also block ad trackers on the websites you visit.

05

Incognito. Consider using the Incognito/private function in your internet browser when searching online.

06

Scams. If you experience a scam on any social media platforms – contact the platform and immediately inform them of the scam.

07

Banking. Go onto your financial institutions’ website and explore their tutorials on online banking.

08

Antivirus software. Consider using antivirus software (e.g., Norton or Kaspersky). Consult your friends or specialist about the most adequate antivirus for you.

09

Be aware. It is important to keep updating yourself with news on scams from https://www.scamwatch.gov.au/ or https://www.snopes.com/). Subscribe to scam alerts such as Scamwatch Radar. It can help you recognise and avoid scams.

10

Social media. Review the information you have shared on social media to see if you are sharing too much personal information. If in doubt, delete or hide what you have shared.

11

Social media. Don’t overshare on social media. Providing too much information on Facebook, Twitter, and Instagram could make it easier for cybercriminals to obtain identifying information, which could allow them to steal your identity or to access your financial information.

Relational Strategies for Managing Privacy Risk

Strategy Illustration 2.png

01

Seek assistance. Ask your friends and/or family members to help you on you make your accounts safe and secure. Some tasks happen only once (e.g., install an anti-virus, install a password manager). Whereas other tasks are common and repetitive (e.g., signing in your email; using double authentication; updating your system). Ask family or friends go slowly, explain it step by step and be patient with you. Take notes so you can practice your own

02

Support groups. Privacy and security issue are a common feature of using ICT. One can never fully master these issues. So, consider forming support groups with other tech savvy seniors where you can discuss scams, security, and privacy issues. Helping others can also help you learn and sharpen your ICT skills.

03

Scams. If you experience a scam on any social media platform – contact the platform and immediately inform them of the scam.

04

Cyber legacy. If you are not able to operate your accounts anymore, you need to consider who is going to have access to your data and accounts. Check this online resource : How to prepare your digital legacy plan (esafety.gov.au)

05

Scamwatch. Consider creating a family club for Scamwatch, where you all share scams you are being exposed to. It turns a threat into an opportunity to build relationship with your family members.
 

Strategies to Managing Perceived Privacy Risk

Privacy risk is aligned both with the person’s ICT ability and the person’s confidence to overcome the perceived risk and try to engage with the digital device. There are individual strategies people can do themselves to manage this risk, as well as relational strategies which consider the role of social influence on a person’s ability to try new things and interact with ICT.

tool-23 (2)-19.png
tool-23 (2)-15.png

You may be interested in
Other potential risks that Dawn is facing:

will this digital device work the way I want it to – it includes forgetting instructions and managing passwords.
worries about online transactions, not receiving the purchased goods and processing errors.
concerns that digital devices encourage physical inactivity and becoming addicted to the devices as well as the strains on eyesight.
fear of buying too much online and the costs with upgrading software and devices.
concerns about feeling incompetent, getting frustrated and being overwhelmed with digital technology.