top of page

Perceived Privacy Risk

Privacy risks encompass fears around perceptions of privacy, security, and identity-theft. It is exhibited through a lack of confidence in the online environment and a reluctance to share anything private through digital means. This risk includes concerns about data security, scams and the fear of being tracked online as well as accidently signing up to subscriptions and automatic monthly payments that can be confusing.

For Rosa these perceptions of risk manifest in the following ways:

Top
Example 1
“I worry that people can see my personal details when I go online to transact.”
Rosa-2

Example 1

Privacy risks include the fears about personal details being entered online. For example, Rosa recently purchased a pair of shoes for her grandson online. She is concerned that her privacy has been invaded as she is seeing lots of children’s shoe adverts popping up on her screen.

Example 2
“I’m worried that people might be able to access my account or credit card information if I were to shop online.”
Rosa 1

Example 2

Privacy risks also include fear of unknown third parties hacking into accounts or credit card information while online. For example, Rosa likes to shop online, but she never lets any of the apps or stores she visits remember her credit card details. She can see the convenience benefit, but she does not know how her information is stored, used, and protected.

“I fear buying ICT related products online without really understanding what I paid for, and I won’t be able to cancel my online subscriptions (e.g., magazine, antivirus service) if I need to.”
Rosa-3

Example 3

This risk is where the person fears buying ICT related products, and then if they want to cancel, they are afraid they will be unable to. For instance, Rosa keeps getting emails from Amazon thanking her for signing up for ‘Amazon Prime’. However, she cannot recall subscribing to the service and can’t figure out the benefits, how much it costs, when she will be charged, and how to cancel the service.

Example 3

Can you relate to those example above?  Go to strategies to learn about how Rosa can address these issues.

Answer

Individual Strategies for Managing Privacy Risk

Rosa Strategy-1

01

Personal information. Avoid providing personal information by email or phone if you do not know who is asking for the information or if you are contacted without prior knowledge. Do not share your passwords or give your date of birth.

02

Call them up. If you have a specific question or concern, it may be beneficial to take this up directly with the business. Look for a phone number on the website. You may find this under ‘contact’ at the top or the bottom of the site. Consider using a ‘chat function’ or email option if they do not have a phone number.

03

Passwords. Use highly secure passwords and frequently change your passwords. You can use a password book (e.g., a traditional notebook or encrypted excel file) to keep track of your passwords. Other options are keychain or password manager. Keep your password book secured, updated, and consider having a backup of your password book.

04

Incognito. Consider using the Incognito/private function in your internet browser when searching online.

05

Search engines. Most web users rely heavily on Google as their search engine, but you might be better off using private – or anonymous –search engines. Private Search engines do not collect or share your search history or clicks. Anonymous search engines can also block ad trackers on the websites you visit.

06

Further research. If you are interested in privacy, security risks and tracking cookies, there are several online resources, websites and YouTube videos that can help you better understand privacy, cookies, and security issues.

07

When scammed. Do not feel embarrassed if you are being scammed. It is very common. Be careful online and keep updating with news on scams from https://www.scamwatch.gov.au/ or https://www.snopes.com/). Subscribe to scam alerts such as Scamwatch Radar to help you recognise and avoid scams.

08

Be wary. Before clicking on suspicious links (email or text messages), hover your cursor over the link to view the destination URL. If it doesn’t match a website you normally use, don’t click. It is probably a phishing scam trying to gain access to your data. Alternatively, try to go to your account with that specific service (e.g., ATO) and find the information you need there.

09

Banking. Go onto your financial institutions’ website and explore their tutorials on online banking.

10

Antivirus software. Consider using antivirus software (e.g., Norton or Kaspersky). Consult your friends or specialist about an adequate antivirus for you.

11

Social media. Don’t overshare on social media. Providing too much information on Facebook, Twitter, and Instagram could make it easier for cybercriminals to obtain identifying information, allowing them to steal your identity or access your financial information.

Relational Strategies for Managing Privacy Risk

Rosa Strategy-2

01

Be wary. If you are suspicious of anything, stop and find someone to ask. If you receive a suspicious email from your bank, financial institution or accountant, call them and check if the email is valid. If you receive unusual emails/messages from your friends, phone them to check.

02

Banking and financial institutions. Contact your bank if you are suspicious that you are being scammed immediately. Banks can stop transactions in your account and prevent you from losing money

03

Seek assistance. Ask your partner, friends and/or family members to help make your accounts safe and secure. Some tasks happen only once (e.g., install an antivirus, install a password manager). Whereas other tasks are common and repetitive (e.g., signing in your email, using double authentication, updating your system). Ask family or friends to go slowly, explain it step by step and be patient with you. Take notes so you can practise your own.

04

Partner involvement. Your partner can be an ally on the journey to keeping your life private and secure. Try to engage in learning tasks together as one can support the other in their issues about privacy and security. Agree to consult each other before moving forward on a risky movement online.

05

Courses. Join ICT courses for beginners developed for older adults. Ask for classes that discuss scams, privacy, and security issues. Discuss your issues with tutors and learning buddies.

06

Cyber legacy. If you cannot operate your accounts anymore, you need to consider who is going to have access to your data and accounts. Check this online resource: How to prepare your digital legacy plan (esafety.gov.au)

07

Scamwatch. Consider creating a family club for Scamwatch, where you all share the scams you are being exposed to. It turns a threat into an opportunity to build a relationship with your family members.

08

Support groups. Privacy and security issues are standard features of using ICT. One can never fully master these issues. So, consider forming support groups with other tech-savvy seniors where you can discuss scams, security, and privacy issues. Helping others can also help you learn and sharpen your ICT skills.
Anker 1

Strategies to Managing Perceived Privacy Risk

Privacy risk is aligned both with the person’s ICT ability and the person’s confidence to overcome the perceived risk and try to engage with the digital device. There are individual strategies people can do themselves to manage this risk, as well as relational strategies which consider the role of social influence on a person’s ability to try new things and interact with ICT.

Rosa-2
Rosa Risk 3
Rosa-1

You may be interested in
Other potential risks that Rosa is facing:

will this digital device work the way I want it to – it includes forgetting instructions and managing passwords.
concerns about feeling incompetent, getting frustrated and being overwhelmed with digital technology.
worries about online transactions, not receiving the purchased goods and processing errors.
fear of buying too much online and the costs with upgrading software and devices.
concerns that digital devices encourage physical inactivity and becoming addicted to the devices as well as the strains on eyesight.
bottom of page