Lynne Coventry

Lynne Coventry
Northumbria University · Department of Psychology

About

105
Publications
46,200
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,015
Citations
Additional affiliations
July 2009 - present
Northumbria University
Position
  • Director of PaCT Lab
February 1993 - September 1994
Heriot-Watt University
Position
  • Research Associate
Description
  • Firstly i was coordinator of a multimedia for education postgraduate training programme. Secondly I was a research Fellow in the Institute for Computer Based Learning investigating the role of technology in Higher Education
September 1987 - August 1991
University of Stirling
Position
  • Wang Research Fellow and Lecturer

Publications

Publications (105)
Article
Full-text available
Background The emerging landscape of patient-generated data (PGData) provides an opportunity to collect large quantities of information that can be used to develop our understanding of different health conditions and potentially improve the quality of life for those living with long-term health condition (LTHCs). If the potential benefits of PGData...
Article
Full-text available
Background Phishing is a major threat to the data and infrastructure of healthcare organizations and many cyberattacks utilize this socially engineered pathway. Phishing simulation is used to identify weaknesses and risks in the human defences of organizations. There are many factors influencing the difficulty of detecting a phishing email includin...
Article
Full-text available
Background The growing popularity of collecting self-generated health and lifestyle data presents a valuable opportunity to develop our understanding of long-term health conditions and improve care. Barriers remain to the effective sharing of health and lifestyle data by those living with long-term health conditions which include beliefs around con...
Article
Full-text available
Using digital technology to share patient-generated health data has the potential to improve the self-management of multiple long-term health conditions. Sharing these data can allow patients to receive additional support from healthcare professionals and peer communities, as well as enhance their understanding of their own health. A deeper underst...
Article
Full-text available
Older adults are increasingly a target for cyber-attacks; however, very little research has investigated how they feel about engaging in protective cyber-security behaviors. We developed and applied a novel card-sorting task to elicit how older adults feel about protective cyber-security behaviors and to identify the factors that impact their confi...
Article
Full-text available
Business disruption from cyberattacks is a growing concern, yet cyberinsurance uptake remains low. Using an online behavioural economics experiment with 4800 participants across four EU countries, this study tests a predictive model of cyberinsurance adoption, incorporating elements of Protection Motivation Theory (PMT) and the Theory of Planned Be...
Conference Paper
Background Understanding data-sharing in HIV care is timely given the shift to remote consultations during COVID-19. We describe the ‘data-sharing ecosystem’ in HIV care by analysing HIV healthcare professional (HCP) beliefs and practices around sharing diverse types of service user and clinic-generated data across multiple contexts. Methods Durin...
Article
The impacts of COVID-19 are not evenly distributed in society. Understanding demographic and occupational differences in personal experiences and information seeking and how these shape perceptions of COVID-19 related risk may help to improve the effectiveness of public health strategies in the future. We surveyed a nationally representative sample...
Article
Full-text available
Aim Understanding COVID-19 risk perceptions and their impact on behaviour can improve the effectiveness of public health strategies. Prior evidence suggests that, when people perceive uncontrollable risks to their health, they are less likely to engage in healthful behaviour. This article aims to understand the extent to which COVID-19 is perceived...
Article
Full-text available
Active aging technologies are increasingly designed to support an active lifestyle. However, the way in which they are designed can raise different barriers to acceptance of and use by older adults. Their designers can adopt a negative stereotype of aging. Thorough understanding of user requirements is central to this problem. This paper investigat...
Preprint
Full-text available
Active aging technologies are increasingly designed to support an active lifestyle. However, the way in which they are designed can raise different barriers to acceptance of and use by older adults. Their designers can adopt a negative stereotype of aging. Thorough understanding of user requirements is central to this problem. This paper investigat...
Article
Full-text available
Staff behaviour plays a key role in the cybersecurity position of an organisation. Despite this, behaviour-change interventions are not commonly applied within the field of cybersecurity. Behaviour change technique could be particularly beneficial given increasing concerns around healthcare cybersecurity risks; particularly following the 2017 Wanna...
Preprint
Full-text available
Background The impacts of COVID-19 are not evenly distributed in society. Understanding the differences in the experiences and perceptions of COVID-19 related risk may help to improve the effectiveness of public health strategies in the future. Method We surveyed a nationally representative sample of 496 participants during the strictest period of...
Preprint
Full-text available
Background Understanding COVID-19 risk perceptions and their impact on behaviour can improve the effectiveness of public health strategies in the future. Prior evidence suggests that, when people perceive uncontrollable risks to their health, they are less likely to make efforts to protect their health in those ways which they can control (e.g. thr...
Chapter
Full-text available
There are increasing concerns relating to cybersecurity of healthcare data and medical devices. Cybersecurity in this sector is particularly important given the criticality of healthcare systems, the impacts of a breach or cyberattack (including in the worst instance, potential physical harm to patients) and the value of healthcare data to criminal...
Chapter
Artificial intelligence (AI) is increasingly being integrated into different areas of our lives. AI has the potential to increase productivity and relieve workload on staff in high-pressure jobs such as healthcare. However, most AI healthcare tools have failed. For AI to be effective, it is vital that users can understand how the system is processi...
Article
Full-text available
Retirement is a major life transition, which leads to substantial changes across almost all aspects of day-to-day life. Although this transition has previously been seen as the normative marker for entry into older adulthood, its influence on later life has remained relatively unstudied in terms of technology use and cybersecurity behaviours. This...
Article
Full-text available
Third-sector organizations, an important support for people living with HIV, increasingly use digital technology to improve service efficiency and reach. However, there is limited empirical evidence on this use by women living with HIV. The 4M Network (4MNet) is a peer-run UK-wide network of trained Mentor Mothers (MMs) living with HIV; it uses the...
Article
Full-text available
Background: To address increasing demand of mental healthcare treatments for older adults and the need to reduce delivery costs, healthcare providers are turning to mobile applications. The importance of psychological barriers have been highlighted in the uptake of mobile-based mental health interventions and efforts have been made to identify the...
Article
Full-text available
Several technological devices have been developed over the last decade to support an active lifestyle as people age. Despite substantial investment, they have failed to reach widespread acceptance. Limited adoption can be linked to little involvement of prospective users in the design process and overreliance on deficit models of ageing that portra...
Poster
Full-text available
The poster describes a semi-structured interview study co-conducted by PhD candidate Kiersten Hay of Northumbria University, with Longret Kwardem, peer researcher of the 4MNetwork. The research explored the use of a WhatsApp group by 4M Network members - all women living with HIV. The benefits and drawbacks of this social media app for this use are...
Conference Paper
In this paper we describe how we engaged a group of healthy older adults in lifelogging and how we used their data to help design a healthy-aging intervention. 35 participants (mean age = 73.6, age range 59-88, Men=15, Women = 20) were tracked longitudinally for 18 months. Participants provided data at three time points. This involved the use of ac...
Conference Paper
Older adults are increasingly vulnerable to cybersecurity attacks and scams. Yet we know relatively little about their understanding of cybersecurity, their information-seeking behaviours, and their trusted sources of information and advice in this domain. We conducted 22 semi-structured interviews with community-dwelling older adults in order to e...
Conference Paper
Full-text available
Many security experts bemoan that consumers behave insecurely. Yet, current approaches to improving behavior either fail to consider when people may be most receptive to an intervention, or only consider experiences of threat (e.g., getting hacked) when identifying opportune moments for behavior change. We instead explore how an exemplar, positive...
Preprint
Full-text available
Older adults are increasingly vulnerable to cybersecurity attacks and scams. Yet we know relatively little about their understanding of cybersecurity, their information-seeking behaviours, and their trusted sources of information and advice in this domain. We conducted 22 semi-structured interviews with community-dwelling older adults in order to e...
Chapter
This paper considers some of the issues around autonomous systems and the different types of risk involved in their implementation. These risks are both barriers to the implementation of a successful autonomous system and risks that are consequences of the use of such systems. The different levels of automation, and different approaches to categori...
Conference Paper
Full-text available
Despite increased awareness of cybersecurity incidents and consequences, organisations still struggle to convince employees to comply with information security policies and engage in effective cyber prevention. Here we introduce and evaluate The Cybersurvival Task, a ranking task that highlights cybersecurity misconceptions amongst employees and th...
Conference Paper
Full-text available
Recent security breaches have highlighted the consequences of reusing passwords across online accounts. Recent guidance on password policies by the UK government recommend an emphasis on password length over an extended character set for generating secure but memorable passwords without cognitive overload. This paper explores the role of three nudg...
Article
A cross sectional survey examined an extended version of Protection Motivation Theory (PMT) to identify factors that influence employees’ intentions to perform three anti-malware behaviours. 526 employees completed an online survey that measured an employees’ threat (severity and susceptibility) and coping (self-efficacy, response efficacy and resp...
Article
The current paper outlines an exploratory case study in which we examined the extent to which specific communities of Twitter users engaged with the debate about the security threat known as “Heartbleed” in the first few days after this threat was exposed. The case study explored which professional groups appeared to lead the debate about Heartblee...
Conference Paper
Full-text available
Phishing continues to be a problem for both individuals and organisations, with billions of dollars lost every year. We propose the use of nudges-more specifically social saliency nudges-that aim to highlight important information to the user when evaluating emails. We used Signal Detection Theory to assess the effects of both sender saliency (high...
Conference Paper
Technologies designed to support ageing can be deemed to be ageist in that they often exhibit a benevolent paternalism that tries to 'protect' older people. Often this involves gathering extensive data to monitor physical and cognitive decline at the expense of an individual's privacy, with an underlying, often implicit, assumption that older adult...
Conference Paper
Cybersecurity suffers from the problem of poor incident reporting. We explored message influences on incident reporting rate. Participants were presented with messages that differed in terms of (i) whether the problem was framed as a technical or a security issue and (ii) the perceived beneficiaries of making a report (benefit to the user, to other...
Conference Paper
A number of interventions exist to support older adults in ageing well and these typically involve support for an active and sociable ageing process. We set out to examine the privacy implications of an intervention that would monitor mobility and share lifestyle and health data with a community of trusted others. We took a privacy-by-design approa...
Article
A quantitative empirical online study examined a set of 16 security hazards on the Internet and two comparisons in 436 UK- and US students, measuring perceptions of risk and other risk dimensions. First, perceived risk was highest for identity theft, keylogger, cyber-bullying and social engineering. Second, consistent with existing theory, signific...
Chapter
While behavior change methods have become relatively commonplace in the health domain, they have only recently been applied to the cybersecurity field. In this chapter we review two fundamentally different approaches to behavior change in cybersecurity. First we explore “nudging” and behavioral interventions arising from the MINDSPACE framework. Se...
Article
Full-text available
Access article is available for free (the article is open access!). Abstract: Despite their best intentions, people struggle with the realities of privacy protection and will often sacrifice privacy for convenience in their online activities. Individuals show systematic, personality dependent differences in their privacy decision making, which mak...
Article
Full-text available
The article has open access status and freely available from the Springer website! Mobile devices offer a common platform for both leisure and work-related tasks, but this has resulted in a blurred boundary between home and work. In this paper, we explore the security implications of this blurred boundary, both for the worker and the employer. Mob...
Conference Paper
New technologies offer an opportunity to improve the wellbeing and independence of older adults, but many of the potential benefits, have not yet been realised. Some technologies suggest a lifestyle of constant monitoring, controlling and nudging - transformations that could be perceived as threatening. To better understand older adult perceptions...
Conference Paper
Full-text available
A wide spectrum of research has been in done in designing technologies for older people that address different aspects of the ageing process, such as physical, mental, and emotional health. Recently, technology-based interventions that promote physical activity have gained momentum. Prior to designing the interventions, the key questions we need to...
Conference Paper
Full-text available
Research on marketing and deception has identified principles of persuasion that influence human decisions. However, this research is scattered: it focuses on specific contexts and produces different taxonomies. In regard to frauds and scams, three taxonomies are often referred in the literature: Cialdini’s principles of influence, Gragg’s psycholo...
Conference Paper
Full-text available
Walker-use among older adults is often avoided because of the stigma of using one. Drawing on the appraisal theory of stress, we argue that stigma associated with walker-use is subject to various cognitive appraisals that affect whether the user sees the walker as stigmatizing and the extent to which they can cope with that stigma. We followed a pa...
Conference Paper
Full-text available
People make security choices on a daily basis without fully considering the security implications of those choices. In this paper we present a prototype application which promotes the choice of secure wireless network options, specifically when users are unfamiliar with the wireless networks available. The app was developed based on behavioural the...
Patent
Full-text available
Described and illustrated herein is an exemplary method of operating an analyte measurement device having a display, user interface, processor, memory, and user interface buttons. Such method can be achieved by measuring an analyte with the analyte measurement device, displaying a value representative of the analyte, querying a user to select a pre...
Conference Paper
Full-text available
The body of research that focuses on employees' Information Security Policy compliance is problematic as it treats compliance as a single behavior. This study explored the underlying behavioral context of information security in the workplace, exploring how individual and organizational factors influence the interplay of the motivations and barrier...
Article
In this work we address the main issues of Information Technology (IT) consumerization that are related to security risks, and vulnerabilities of devices used within Bring Your Own Device (BYOD) strategy in particular. We propose a 'soft' mitigation strategy for user actions based on nudging, widely applied to health and social behavior influence....
Conference Paper
Cyberbullying is a growing social problem especially amongst school aged children facilitated by the prevalent use of communication technology. This paper examines (a) the extent to which cyberbullying incidents are distinguishable by perceived severity and (b) the role of perpetrator anonymity on such perceptions of severity. Sixty six female scho...
Conference Paper
Full-text available
Cyberbullying is a growing social problem especially amongst school aged children facilitated by the prevalent use of communication technology. This paper examines (a) the extent to which cyberbullying incidents are distinguishable by perceived severity and (b) the role of perpetrator anonymity on such perceptions of severity. Sixty six female scho...
Article
Full-text available
In this work we address the main issues of IT consumerisation that are related to security risks, and propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behaviour influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk asse...
Conference Paper
Full-text available
In this work we address the main issues of IT consumerisation that are related to security risks, and propose a 'soft' mitigation strategy for user actions based on nudging, widely applied to health and social behaviour influence. In particular, we propose a complementary, less strict, more flexible Information Security policies, based on risk asse...
Conference Paper
Full-text available
A number of security risks are associated with the selection of wireless networks. We examined wireless network choices in a study involving 104 undergraduate social science students. One research goal was to examine the extent to which features (such as padlocks) and colours could be used to ‘nudge’ individuals towards more secure network and away...
Conference Paper
Full-text available
Exploring the link between privacy and behaviour has been difficult, as many contextual and other variables lead to a schism between privacy attitudes and behaviour. We propose that one possible means forward is to consider risk perceptions as an important additional dimension when exploring individual differences in privacy concern. Using cluster...
Conference Paper
Full-text available
Behavior-change interventions are common in some areas of human-computer interaction, but rare in the domain of cybersecurity. This paper introduces a structured approach to working with organisations in order to develop such behavioral interventions or ‘nudges’. This approach uses elements of co-creation together with a set of prompts from the beh...
Conference Paper
Full-text available
This paper considers the utility of employing behavioural nudges to change security-related behaviours. We examine the possibility that the effectiveness of nudges may depend on individual user characteristics – which represents a starting point for more personalized behaviour change in security. We asked participants to select from a menu of publi...
Conference Paper
This paper outlines the design and evaluation of a haptic interface intended to convey non audio-visual directions to an ATM (Automated Teller Machine) user. The haptic user interface is incorporated into an ATM test apparatus on the keypad. The system adopts a well known 'clock face' metaphor and is designed to provide haptic prompts to the user i...
Article
Full-text available
Recall of knowledge-based authentication codes such as passwords and PINs can be problematic, particularly for older adults given the known memory decline associated with ageing. We explored the extent to which recognition-based Graphical Authentication Systems were effective alternatives to PINs and passwords in a study in which users were asked t...
Conference Paper
The EU-funded multi-disciplinary DALi (Devices for Assisted Living) project aims to develop a semi-autonomous, intelligent mobility aid for older adults, which supports navigation in crowded and unstructured environments. We demonstrate the necessity to consider hitherto underexplored user-inclusive requirements which address psychological and soci...
Conference Paper
Full-text available
Graphical authentication systems typically claim to be more usable than PIN or password-based systems, but these claims often follow limited, single-stage paradigm testing on a young, student population. We present a more demanding test paradigm in which multiple codes are learned and tested over a three-week period. We use this paradigm with two u...
Article
Full-text available
The number of over 65s in the European Union (EU) is predicted to almost double by 2060. Those over 80 will be almost triple 2008 figures (European Commission, 2009). Mobility per se, but particularly physical activity, is related to independent living, wellbeing and reduced mortality (Mänty et al., 2007). Shopping is a useful way for individuals t...
Conference Paper
Full-text available
Behaviour change is difficult to achieve and there are many models identifying the factors to affect such change but few have been applied in the security domain. This paper discusses the use of serious games to improve the security behaviour of end-users. A new framework, based upon literature findings, is proposed for future game design. The trus...
Conference Paper
Mobility is fundamental to aging well, maintaining independence and quality of life. Physical mobility is a fundamental component of overall mobility. This paper presents our "technology tea party" methodology. We have used this method to explore older adults' reaction to utilizing different technologies to maintain their mobility, in particular, g...
Article
Social media and online communication encourage social interaction but do little to strengthen community relations between people who live in the same area. The aim of this work is to develop a set of req