A Light Review on Cyber Security Awareness Models for the Elderly
Millions of people use the internet daily, including the elderly, who are among the most at-risk groups for cybercrime, such as fraud, hacking, and cyberbullying. However, there has been a lack of cybercrime studies focusing on them. Additionally, various cybersecurity models deployed by governments...
Published in: | Journal of Advanced Research in Applied Sciences and Engineering Technology |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Published: |
Semarak Ilmu Publishing
2025
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85192837149&doi=10.37934%2faraset.44.1.3145&partnerID=40&md5=a934a8e865bd74aadd66c6270e70c3b3 |
id |
2-s2.0-85192837149 |
---|---|
spelling |
2-s2.0-85192837149 Azam N.A.; Buja A.G.; Sahri N.M.; Ahmad R.; Habidin N.F.; Latip S.F.A.; Darus M.Y.; Hussin M.S.; Saat S. A Light Review on Cyber Security Awareness Models for the Elderly 2025 Journal of Advanced Research in Applied Sciences and Engineering Technology 44 1 10.37934/araset.44.1.3145 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85192837149&doi=10.37934%2faraset.44.1.3145&partnerID=40&md5=a934a8e865bd74aadd66c6270e70c3b3 Millions of people use the internet daily, including the elderly, who are among the most at-risk groups for cybercrime, such as fraud, hacking, and cyberbullying. However, there has been a lack of cybercrime studies focusing on them. Additionally, various cybersecurity models deployed by governments and organizations are found to be inconvenient and too technical for the elderly, especially those with impairments or conditions that require special attention. This subsequently leads to an increasing number of cybercrimes. Therefore, this paper presents a light review of existing cybersecurity models suitable for the elderly. Three methods were used to review existing cybersecurity awareness models. First, a feasibility study was conducted following several works of literature related to cybersecurity, types of cybercrimes involving the elderly, characteristics of the elderly commonly targeted by cybercriminals, cybersecurity awareness models, and the elderly's learning styles. Second, based on the literature review, the elderly's learning styles were analyzed. Finally, the cybersecurity awareness model suitable for the elderly was chosen and analyzed with respect to their phases, validity, and technicality. In conclusion, the SCSAM-Elderly was selected as the most suitable model for the elderly to learn and spread awareness of cybersecurity. This study could increase cybersecurity awareness and encourage educating the elderly to maximize their knowledge of cybersecurity. The findings from this study can guide organizations, agencies, governments, and educational institutions in their endeavours to educate the elderly about cybercrime and cyberattacks. © 2025, Semarak Ilmu Publishing. All rights reserved. Semarak Ilmu Publishing 24621943 English Article All Open Access; Hybrid Gold Open Access |
author |
Azam N.A.; Buja A.G.; Sahri N.M.; Ahmad R.; Habidin N.F.; Latip S.F.A.; Darus M.Y.; Hussin M.S.; Saat S. |
spellingShingle |
Azam N.A.; Buja A.G.; Sahri N.M.; Ahmad R.; Habidin N.F.; Latip S.F.A.; Darus M.Y.; Hussin M.S.; Saat S. A Light Review on Cyber Security Awareness Models for the Elderly |
author_facet |
Azam N.A.; Buja A.G.; Sahri N.M.; Ahmad R.; Habidin N.F.; Latip S.F.A.; Darus M.Y.; Hussin M.S.; Saat S. |
author_sort |
Azam N.A.; Buja A.G.; Sahri N.M.; Ahmad R.; Habidin N.F.; Latip S.F.A.; Darus M.Y.; Hussin M.S.; Saat S. |
title |
A Light Review on Cyber Security Awareness Models for the Elderly |
title_short |
A Light Review on Cyber Security Awareness Models for the Elderly |
title_full |
A Light Review on Cyber Security Awareness Models for the Elderly |
title_fullStr |
A Light Review on Cyber Security Awareness Models for the Elderly |
title_full_unstemmed |
A Light Review on Cyber Security Awareness Models for the Elderly |
title_sort |
A Light Review on Cyber Security Awareness Models for the Elderly |
publishDate |
2025 |
container_title |
Journal of Advanced Research in Applied Sciences and Engineering Technology |
container_volume |
44 |
container_issue |
1 |
doi_str_mv |
10.37934/araset.44.1.3145 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85192837149&doi=10.37934%2faraset.44.1.3145&partnerID=40&md5=a934a8e865bd74aadd66c6270e70c3b3 |
description |
Millions of people use the internet daily, including the elderly, who are among the most at-risk groups for cybercrime, such as fraud, hacking, and cyberbullying. However, there has been a lack of cybercrime studies focusing on them. Additionally, various cybersecurity models deployed by governments and organizations are found to be inconvenient and too technical for the elderly, especially those with impairments or conditions that require special attention. This subsequently leads to an increasing number of cybercrimes. Therefore, this paper presents a light review of existing cybersecurity models suitable for the elderly. Three methods were used to review existing cybersecurity awareness models. First, a feasibility study was conducted following several works of literature related to cybersecurity, types of cybercrimes involving the elderly, characteristics of the elderly commonly targeted by cybercriminals, cybersecurity awareness models, and the elderly's learning styles. Second, based on the literature review, the elderly's learning styles were analyzed. Finally, the cybersecurity awareness model suitable for the elderly was chosen and analyzed with respect to their phases, validity, and technicality. In conclusion, the SCSAM-Elderly was selected as the most suitable model for the elderly to learn and spread awareness of cybersecurity. This study could increase cybersecurity awareness and encourage educating the elderly to maximize their knowledge of cybersecurity. The findings from this study can guide organizations, agencies, governments, and educational institutions in their endeavours to educate the elderly about cybercrime and cyberattacks. © 2025, Semarak Ilmu Publishing. All rights reserved. |
publisher |
Semarak Ilmu Publishing |
issn |
24621943 |
language |
English |
format |
Article |
accesstype |
All Open Access; Hybrid Gold Open Access |
record_format |
scopus |
collection |
Scopus |
_version_ |
1809677880558354432 |