<?xml version="1.0" encoding="UTF-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "journalpublishing.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" dtd-version="2.0" xml:lang="en" article-type="research-article"><front><journal-meta><journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id><journal-id journal-id-type="publisher-id">jmir</journal-id><journal-id journal-id-type="index">1</journal-id><journal-title>Journal of Medical Internet Research</journal-title><abbrev-journal-title>J Med Internet Res</abbrev-journal-title><issn pub-type="epub">1438-8871</issn><publisher><publisher-name>JMIR Publications</publisher-name><publisher-loc>Toronto, Canada</publisher-loc></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">v27i1e69806</article-id><article-id pub-id-type="doi">10.2196/69806</article-id><article-categories><subj-group subj-group-type="heading"><subject>Original Paper</subject></subj-group></article-categories><title-group><article-title>The Prevalence and Predictors of Digital Proxy Behavior in the United States: Cross-Sectional Survey Study</article-title></title-group><contrib-group><contrib contrib-type="author" corresp="yes" equal-contrib="yes"><name name-style="western"><surname>Foong</surname><given-names>Pin Sym</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref><xref ref-type="fn" rid="equal-contrib1">*</xref></contrib><contrib contrib-type="author" equal-contrib="yes"><name name-style="western"><surname>Zakaria</surname><given-names>Camellia</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff2">2</xref><xref ref-type="fn" rid="equal-contrib1">*</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Pakianathan</surname><given-names>Pavithren</given-names></name><degrees>MEng</degrees><xref ref-type="aff" rid="aff3">3</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Phua</surname><given-names>Andrew Ian-Hong</given-names></name><degrees>MPH</degrees><xref ref-type="aff" rid="aff4">4</xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Koh</surname><given-names>Gerald CH</given-names></name><degrees>PhD</degrees><xref ref-type="aff" rid="aff1">1</xref></contrib></contrib-group><aff id="aff1"><institution>Telehealth Core, National University of Singapore</institution><addr-line>12 Science Drive 2, #10-01</addr-line><addr-line>Singapore</addr-line><country>Singapore</country></aff><aff id="aff2"><institution>Dalla Lana School of Public Health, University of Toronto</institution><addr-line>Toronto</addr-line><addr-line>ON</addr-line><country>Canada</country></aff><aff id="aff3"><institution>Ludwig Boltzmann Institut f&#x00FC;r digitale Gesundheit und Pr&#x00E4;vention</institution><addr-line>Salzburg</addr-line><country>Austria</country></aff><aff id="aff4"><institution>National University Health System</institution><addr-line>Singapore</addr-line><country>Singapore</country></aff><contrib-group><contrib contrib-type="editor"><name name-style="western"><surname>Mavragani</surname><given-names>Amaryllis</given-names></name></contrib></contrib-group><contrib-group><contrib contrib-type="reviewer"><name name-style="western"><surname>He</surname><given-names>Chengyuan</given-names></name></contrib><contrib contrib-type="reviewer"><name name-style="western"><surname>Celine</surname><given-names>Latulipe</given-names></name></contrib></contrib-group><author-notes><corresp>Correspondence to Pin Sym Foong, PhD, Telehealth Core, National University of Singapore, 12 Science Drive 2, #10-01, Singapore, 117549, Singapore, 65 6516 4988; <email>pinsym@nus.edu.sg</email></corresp><fn fn-type="equal" id="equal-contrib1"><label>*</label><p>these authors contributed equally</p></fn></author-notes><pub-date pub-type="collection"><year>2025</year></pub-date><pub-date pub-type="epub"><day>18</day><month>8</month><year>2025</year></pub-date><volume>27</volume><elocation-id>e69806</elocation-id><history><date date-type="received"><day>09</day><month>12</month><year>2024</year></date><date date-type="rev-recd"><day>07</day><month>06</month><year>2025</year></date><date date-type="accepted"><day>08</day><month>06</month><year>2025</year></date></history><copyright-statement>&#x00A9; Pin Sym Foong, Camellia Zakaria, Pavithren Pakianathan, Andrew Ian-Hong Phua, Gerald CH Koh. Originally published in the Journal of Medical Internet Research (<ext-link ext-link-type="uri" xlink:href="https://www.jmir.org">https://www.jmir.org</ext-link>), 18.8.2025. </copyright-statement><copyright-year>2025</copyright-year><license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (<ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">https://creativecommons.org/licenses/by/4.0/</ext-link>), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research (ISSN 1438-8871), is properly cited. The complete bibliographic information, a link to the original publication on <ext-link ext-link-type="uri" xlink:href="https://www.jmir.org/">https://www.jmir.org/</ext-link>, as well as this copyright and license information must be included.</p></license><self-uri xlink:type="simple" xlink:href="https://www.jmir.org/2025/1/e69806"/><abstract><sec><title>Background</title><p>As dependent adults increasingly require help with managing web-based financial and medical tasks, caregivers often step in to assist&#x2014;sometimes informally, by sharing login credentials. Despite growing reliance on such digital proxies, limited data exist on the scale of this behavior, who performs it, and how they access accounts. Informal access practices may pose privacy and security risks and increase the potential for elder abuse.</p></sec><sec><title>Objective</title><p>The aim of this study is to quantify the prevalence of digital proxy behavior in the United States, identify demographic and caregiving predictors of proxy roles, and examine the extent of formal versus informal access methods in medical and financial domains.</p></sec><sec sec-type="methods"><title>Methods</title><p>A nationally representative survey (n=657) was conducted among US adults from December 2022 to February 2023. The survey assessed the participants&#x2019; life experience of digital proxy behavior, physical caregiving, demographics, and methods and motivations for accessing others&#x2019; digital accounts. Logistic regression models were used to analyze predictors of financial and medical digital proxy behavior separately.</p></sec><sec sec-type="results"><title>Results</title><p>In the United States, digital proxy behavior is prevalent and often driven by usability challenges rather than the care recipient&#x2019;s physical or cognitive limitations. Roughly 49% of respondents reported having had digital proxy duties, with 59% assisting in both medical and financial domains. Predictors of being a digital proxy included being younger, male, more educated, and providing physical care. Additionally, higher income predicted financial proxy behavior, while having more siblings and being from a majority ethnicity predicted medical proxy behavior. Approximately one-third of digital proxies used informal access methods&#x2014;translating to about 18 million adults nationally. About 10% of the sample logged on by knowing the account owner&#x2019;s credentials, and about 7% of the sample used the accounts without the owner&#x2019;s presence. Older female proxies were more likely to use formal access methods.</p></sec><sec sec-type="conclusions"><title>Conclusions</title><p>Informal access practices are widespread and pose potential risks to vulnerable adults. Although most proxies used formal access when available, a significant portion have used insecure, informal methods. Policymakers and system designers should aim to promote secure, user-friendly proxy features and balance access with monitoring mechanisms that balance usability, privacy, and abuse prevention.</p></sec></abstract><kwd-group><kwd>digital proxy</kwd><kwd>caregivers</kwd><kwd>patients</kwd><kwd>survey</kwd><kwd>aging</kwd></kwd-group></article-meta></front><body><sec id="s1" sec-type="intro"><title>Introduction</title><p>The rise in chronic illnesses and an aging global population have placed increasing demands on health care systems, leaving caregivers to fill growing care gaps. In the United States, the economic contribution of unpaid caregivers was valued at approximately $600 billion in 2021, reflecting a 27% increase since 2017 [<xref ref-type="bibr" rid="ref1">1</xref>]. In aging societies such as the United States, China, and Japan, caregivers frequently support older adults who experience declining cognitive or physical abilities due to aging, illness, or sudden medical events like stroke [<xref ref-type="bibr" rid="ref2">2</xref>]. These caregiving duties increasingly include managing digital tasks&#x2014;such as accessing health portals or financial services&#x2014;which require knowledge of sensitive login credentials [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref4">4</xref>].</p><p>Although caregivers may adopt informal digital access methods out of necessity, such practices introduce potential risks, including financial abuse. In the United States, the National Elder Mistreatment Study found that financial abuse by a family member had a 1-year prevalence of 5.2% [<xref ref-type="bibr" rid="ref5">5</xref>], and financial abuse was involved in 98% of all abusive relationships [<xref ref-type="bibr" rid="ref6">6</xref>]. The shift toward web-based medical and financial services may exacerbate these risks if proper access mechanisms are lacking. Moreover, even well-intentioned caregivers may overstep boundaries [<xref ref-type="bibr" rid="ref7">7</xref>]. For example, studies show that some patients do not wish to share all their medical information with caregivers [<xref ref-type="bibr" rid="ref8">8</xref>], and caregivers may selectively report information to health professionals [<xref ref-type="bibr" rid="ref9">9</xref>].</p><p>Formalized proxy access can improve transparency and reduce misuse by clearly and explicitly authorizing caregivers to act on behalf of care recipients. This access typically involves separate caregiver logins or permissions (eg, joint accounts or caregiver-specific health portal accounts) where activity is trackable, while informal methods&#x2014;such as sharing usernames and passwords&#x2014;often lack oversight and accountability.</p><p>On the other hand, the literature also suggests that even formal caregiver access raises privacy concerns. Studies show that patients may avoid disclosing sensitive issues if a proxy has full access [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref10">10</xref>]. Although caregivers recognize the benefits of access, they also acknowledge discomfort if it includes financial or stigmatized information [<xref ref-type="bibr" rid="ref11">11</xref>]. These findings highlight the tension between autonomy and necessary caregiving support. Despite the known benefits of formal access, its implementation is inconsistent, requiring policy informed by larger-scale data on who digital proxies are, how they access accounts, and under what conditions.</p><p>We now turn to describing the related work in this area. We present current quantitative data on proxy behavior, then consider previously reported behaviors that promote and challenge proxy behavior.</p><p>Prior research in human computer-interaction has examined digital proxy behavior using mostly qualitative methods such as in a previous study by Hunsaker et al [<xref ref-type="bibr" rid="ref12">12</xref>]. Where quantitative method have been used, the data is not nationally represenative. For example, a Canadian study by Latulipe et al [<xref ref-type="bibr" rid="ref13">13</xref>] involving 42 participants found that 28% had formal proxy access, yet 59% knew the care recipient&#x2019;s login credentials, raising concerns about misuse. A US-based survey study showed that 45% of hospital staff supported password sharing between patients and caregivers [<xref ref-type="bibr" rid="ref14">14</xref>]. Existing national-level surveys tend to focus on general caregiving intensity or caregiver use of digital tools [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref>], rather than the access behaviors involved.</p><p>However, a comprehensive understanding of the scale of digital proxy behavior&#x2014;particularly informal proxying&#x2014;remains absent, leading to wide deviations in reported prevalence. For example, surveys examining patient behavior showed that most patients (79%) were open to sharing access to personal health records with kin, most commonly a spouse, child, or family member [<xref ref-type="bibr" rid="ref17">17</xref>]. On the other hand, going by the estimates of older adults with medical directives, the prevalence of proxies is at about one-third of the US population [<xref ref-type="bibr" rid="ref18">18</xref>]. In contrast, in Germany, 64.6% had assigned medical powers of attorney&#x2014;mostly to adult children or grandchildren [<xref ref-type="bibr" rid="ref10">10</xref>].</p><p>Beyond prevalence, knowledge is also incomplete regarding the factors that influence who becomes a digital proxy. Qualitative studies suggest that younger individuals and those closely related to the care recipient are more likely to help with digital tasks [<xref ref-type="bibr" rid="ref19">19</xref>-<xref ref-type="bibr" rid="ref21">21</xref>]. Others note that even non-kin or older adults can be involved [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref22">22</xref>] and that the eldest children in families often act on behalf of the care recipient [<xref ref-type="bibr" rid="ref23">23</xref>]. One small quantitative study found that younger users with high technological self-efficacy were more likely to offer digital help, but factors like income, gender, and education were not strong predictors [<xref ref-type="bibr" rid="ref24">24</xref>].</p><p>In terms of barriers, low usability of health portals is consistently cited. Quinn et al [<xref ref-type="bibr" rid="ref25">25</xref>] found that both patients and caregivers struggled with poorly designed portals, suggesting that training and design improvements are needed. Wolff et al [<xref ref-type="bibr" rid="ref26">26</xref>] note that while the Health Insurance Portability and Accountability Act permits reasonable information sharing with caregivers, security protocols can make access cumbersome&#x2014;particularly for older users [<xref ref-type="bibr" rid="ref27">27</xref>].</p><p>In summary, although digital proxying is a common and growing practice, there is little national data on who engages in it and how. Usability challenges frequently motivate informal proxy behavior, and proxies are often younger, technologically savvy kin. This study offers the first nationally representative picture of digital proxy behavior in the United States, clarifying the scale, access methods, and predictors in medical and financial domains&#x2014;two areas where decision-making capacity is often transferred to caregivers [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]. By distinguishing between formal and informal proxying, this research provides critical insights for the development of safer, more inclusive systems that empower caregivers while protecting vulnerable users. We sought to answer three key questions: (1) What is the prevalence of digital proxies? (2) What factors predict the likelihood of someone acting as a proxy? and (3) How common are informal methods when carrying out their digital proxy duties?</p><p>The rest of the paper is divided as follows: We first describe methods, explaining the design of the survey and data collected and processed prior to our analysis. We then report the results of our analyses in two parts. First, we discuss the demographic and caregiving factors significant to digital proxies, and second, we delve into the informal and formal digital practices engaged by these proxies. Finally, we discuss the need to protect care recipients while accommodating caregiving realities.</p></sec><sec id="s2" sec-type="methods"><title>Methods</title><sec id="s2-1"><title>Overview</title><p>We conducted a survey of adults on financial proxies, medical proxies, and medical decision-making with 107 questions in the United States. It included all demographic data and items relevant to digital finance and medical proxies. The current analysis excluded survey items on medical decision-making. The entire survey is available in <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>. The study was reviewed by the institutional review board of the National University of Singapore, with approval number NUS-IRB-2022&#x2010;412. The Checklist for Reporting Results of Internet E-Surveys (CHERRIES) can be seen in <xref ref-type="supplementary-material" rid="app2">Checklist 1</xref>.</p><p>We designed the survey questions to capture the lived experience of caregivers over time. We did not take the more common approach to capture a snapshot of care associated with one care recipient, only at the time of the survey. Instead, we focused on gathering information about peak experiences and the experience of caregiving over a period of time. For example, we asked about the highest frequency of physical care supplied and allowed participants to report the methods they have ever used to access accounts. As a result, we phrase outcomes in terms of patterns of behavior, rather than instances of behavior&#x2014;&#x201C;participants who have ever had higher physical care duties are more likely to be also having digital care duties.&#x201D; This approach introduces some limitations, which we discuss in the Limitations section.</p></sec><sec id="s2-2"><title>Ethical Considerations</title><p>The study was reviewed by the institutional review board of the National University of Singapore, with approval number NUS-IRB-2022&#x2010;412. Participants indicated consent via a web-based form prior to the survey. The consent did not include consent for secondary analysis. We preserved the privacy and confidentiality of the participants by anonymizing the survey at source, with no personally identifiable information being collected. Participants were compensated by Qualtrics, the survey panel company. They compensated the respondents with either cash, vouchers, or coupons.</p><p>In the next section, we describe the definitions of the terms used, the survey design, and sources of the items we used, where available.</p></sec><sec id="s2-3"><title>Language and Definitions</title><p>In this survey, we conceived of a <italic>proxy</italic> as someone who carries out tasks on behalf of another adult. We divided the tasks into physical and digital tasks.</p><p>In this paper, we use the term <italic>delegator</italic> to refer to the adult who requires help with these tasks, but in the survey, we used the simpler language of &#x201C;helping another adult&#x201D; to refer to the delegator (see <xref ref-type="fig" rid="figure1">Figure 1</xref> Figure 1  and , <xref ref-type="fig" rid="figure2">Figure 2</xref>). Additionally, we used this phrasing because we wanted participants to distinguish helping behavior from parenting duties where a person below 21 years old is helped.</p><fig position="float" id="figure1"><label>Figure 1.</label><caption><p> Research questions regarding financial digital proxies and formal access and the survey items that were used to identify them.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig01.png"/></fig><fig position="float" id="figure2"><label>Figure 2.</label><caption><p> Research questions regarding medical digital proxies and formal access and the survey items that were used to identify them.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig02.png"/></fig><p>We define <italic>formal access</italic> using the concept of delegation of authority in role-based access control [<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref31">31</xref>] models. Hence, when a caregiver has formal access, they are authorized to perform specific actions on behalf of the care recipient (eg, through a proxy caregiver account in the MyUPMC app [<xref ref-type="bibr" rid="ref32">32</xref>]). On the other hand, the National Institute of Standards and Technology defines unauthorized access as the act of gaining logical or physical access without official permission to a network, a system, an application, data, or another resource [<xref ref-type="bibr" rid="ref33">33</xref>]. Throughout this paper, we use the term <italic>informal access</italic> to describe these methods that are not authorized by the organization, such as sharing credentials or using the account on behalf of the care recipient.</p><p><xref ref-type="table" rid="table1">Table 1</xref> shows the types of demographic data that we surveyed and the reasons for inclusion.</p><table-wrap id="t1" position="float"><label>Table 1.</label><caption><p>Demographic items included in the survey based on existing literature about possible predictors.<sup><xref ref-type="table-fn" rid="table1fn1">a</xref></sup></p></caption><table id="table1" frame="hsides" rules="groups"><thead><tr><td align="left" valign="top">Survey items</td><td align="left" valign="top">Reason for inclusion</td></tr></thead><tbody><tr><td align="left" valign="top">Demographics (age, gender, education, income, housing, siblings, birth order, employment, marital status, ethnicity)</td><td align="left" valign="top"><list list-type="bullet"><list-item><p>Age and gender were previously reported as relevant</p></list-item><list-item><p>Regarding siblings and birth order, Ong et al [<xref ref-type="bibr" rid="ref23">23</xref>] suggested some influence of being the oldest sibling</p></list-item><list-item><p>Education and income were previously associated with financial literacy</p></list-item><list-item><p>The remaining demographics were included for complete reporting</p></list-item></list></td></tr><tr><td align="left" valign="top">Support for Instrumental Activities of Daily Living, Support for Activities of Daily Living</td><td align="left" valign="top">Physical caregiving is a common measure of caregiver behaviors. We want to contextualize digital caregiver behaviors against physical caregiving.</td></tr></tbody></table><table-wrap-foot><fn id="table1fn1"><p><sup>a</sup>The items are related to research question 2: What factors predict the likelihood of being a digital proxy?</p></fn></table-wrap-foot></table-wrap></sec><sec id="s2-4"><title>Survey Design</title><p>The demographics collected are summarized in <xref ref-type="table" rid="table2">Table 2</xref>. We included predictors previously identified in the literature such as <italic>income</italic>, <italic>ethnicity</italic>, <italic>employment</italic>, <italic>education</italic>, <italic>housing</italic>, <italic>age</italic>, <italic>marital status</italic>, <italic>birth order</italic>, and <italic>gender</italic>.</p><table-wrap id="t2" position="float"><label>Table 2.</label><caption><p>Summary of 657 verified participants&#x2019; demographics, gender, marital status, age, housing, income, siblings, ethnicity, employment, and educational attainment.</p></caption><table id="table2" frame="hsides" rules="groups"><tbody><tr><td align="left" valign="top">Participants</td><td align="left" valign="top">675 total, 657 verified US nationals/residents over multiple rounds of collection between December 2022 and February 2023</td></tr><tr><td align="left" valign="top">Gender</td><td align="left" valign="top">Female (332), male (325)</td></tr><tr><td align="left" valign="top">Marital status</td><td align="left" valign="top">Married (266); unmarried (262); widowed, divorced, separated (129)</td></tr><tr><td align="left" valign="top">Age (years)</td><td align="left" valign="top">21&#x2010;24 (56), 25&#x2010;29 (47), 30&#x2010;34 (77), 35&#x2010;39 (63), 40&#x2010;44 (62), 45&#x2010;49 (65), 50&#x2010;54 (56), 55&#x2010;59 (49), 60&#x2010;64 (56), 65&#x2010;69 (63), &#x003E;70 (63)</td></tr><tr><td align="left" valign="top">Housing</td><td align="left" valign="top">Single family home (435), 2 or more units (177), mobile/trailer homes (45)</td></tr><tr><td align="left" valign="top">Income (US $)</td><td align="left" valign="top">&#x003C;30,000 (193), 30,000&#x2010;49,000 (150), 50,000&#x2010;99,000 (197), 100,000&#x2010;159,000 (74), 150,000&#x2010;199,000 (28), &#x003E;200,000 (15)</td></tr><tr><td align="left" valign="top">Number of siblings</td><td align="char" char="." valign="top">0 (84), 1 (176), 2 (163), 3 (99), 4 or more (135)</td></tr><tr><td align="left" valign="top">Ethnicity</td><td align="left" valign="top">White (418), Black (107), mixed (40), Hispanic/Latino (42), Asian (36), Native American (8), others (6)</td></tr><tr><td align="left" valign="top">Employment</td><td align="left" valign="top">Employed: full-time (279), part-time (87), self-employed (7); unemployed: retired (141), disabled (20), unemployed (119), student (4)</td></tr><tr><td align="left" valign="top">Education</td><td align="left" valign="top">Degree and above (300), high school (329), below high school (28)</td></tr></tbody></table></table-wrap><p>We adapted two functional assessment scales to assess the prevalence of physical helping behaviors. The first is the Instrumental Activities of Daily Living (IADL) scale, which measures function in 8 areas of independent living, such as driving, housekeeping, and laundry [<xref ref-type="bibr" rid="ref34">34</xref>]. The second scale is the Activities of Daily Living (ADL) scale. There are 6 ADL in the scale (washing, dressing, feeding, toileting, walking/moving, transferring) that make up independent living [<xref ref-type="bibr" rid="ref35">35</xref>]. In both scales, the absence of any of these activities is used to measure disability in the adult being helped. In adapting these scales for participants of this survey, we framed the question to first describe the task, then ask what the highest frequency is of help the participants have offered (<xref ref-type="fig" rid="figure3">Figure 3</xref>). The options ranged from <italic>daily</italic>, <italic>weekly</italic>, <italic>monthly</italic>, <italic>yearly</italic>, to <italic>never</italic>. The intention was to capture the highest reported intensity of helping behavior in a person&#x2019;s lifetime.</p><fig position="float" id="figure3"><label>Figure 3.</label><caption><p>The left side of the figure shows the actual scale in the Katz Index of Independence in ADL [<xref ref-type="bibr" rid="ref35">35</xref>], which is adapted in our survey instrument (right side of the figure) to capture the frequency at which caregivers are involved with helping another adult in ADL. ADL: Activities of Daily Living.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig03.png"/></fig><p>We asked about financial digital helping behaviors in the next block of items in . Participants were asked if they had financial proxy duties using any variation of a joint account from a bank. Then, we asked if participants had ever helped another adult with digital financial accounts. Finally, we asked about the method of access, ways of helping with use, and the reasons for helping with access. We reviewed studies on potential barriers to adopting financial, legal, medical, and digital services and extracted possible options [<xref ref-type="bibr" rid="ref36">36</xref>-<xref ref-type="bibr" rid="ref44">44</xref>].</p><p>To identify the methods of helping with login, we asked: <italic>How have you helped another adult to log on to their financial/legal digital services? You may select more than one option</italic>.</p><list list-type="bullet"><list-item><p><italic>I know the username and password for their online account(s</italic>)</p></list-item><list-item><p><italic>The adult logs in with a username and password and I help them (I don&#x2019;t know the username and password</italic>)</p></list-item><list-item><p><italic>The adult uses their fingerprint (or other biometrics) to log in</italic></p></list-item><list-item><p><italic>The institution has given me my own separate login and password to help manage manage their online account(s</italic>)</p></list-item></list><p>To identify the methods of helping with using the digital services, we asked: <italic>How have you helped another adult use their financial/legal digital services online? You may select more than one option</italic>.</p><list list-type="bullet"><list-item><p><italic>I offer some help, but the person does it mostly independently</italic></p></list-item><list-item><p><italic>I provide ongoing assistance while next to the person</italic></p></list-item><list-item><p><italic>I use the person&#x2019;s account on their behalf, while they are present</italic></p></list-item><list-item><p><italic>I use the person&#x2019;s account on their behalf, even when they are not present</italic></p></list-item></list><p>To identify the reasons for helping with access, we asked: <italic>Provide the reason(s) why you think your help was needed to manage a digital service for another adult. You may choose more than one answer</italic>.</p><list list-type="bullet"><list-item><p><italic>The app is not user friendly for them</italic></p></list-item><list-item><p><italic>They are unfamiliar with using a technology device to access the app</italic>.</p></list-item><list-item><p><italic>They do not have a device or equipment to access their digital accounts</italic>.</p></list-item><list-item><p><italic>They have cognitive limitations (eg, existing conditions and cognitive decline with age) that constrain their ability to use the app</italic>.</p></list-item><list-item><p><italic>They have concerns about sharing their data with third parties</italic>.</p></list-item><list-item><p><italic>They have physical limitations (eg, poor vision and poor motor skills) that constrain their ability to use the app</italic>.</p></list-item><list-item><p><italic>They see using the app as a difficult task that should be avoided</italic>.</p></list-item></list><p>In the last block of items, we asked about medical digital helping behaviors. The participants were asked if they had a caregiver account for assisting with medical matters. Then, we went on to ask if participants had ever helped another adult with digital medical accounts (). Finally, we asked about the method of access and their perceived reasons they needed to proxy, as listed above.</p><p>Survey items were not randomized, and adaptive questioning was used to make the survey less complex for respondents. Completeness checks were built into the survey instrument. Participants could review and change their responses with the review function.</p><p><xref ref-type="table" rid="table3">Tables 5</xref> and <xref ref-type="table" rid="table4">6</xref> show how the participants were classified as having no digital proxy duties, informal digital proxy duties, and formal digital proxy duties for financial and medical domains, respectively. Note that respondents who answered &#x201C;Unsure&#x201D; were classified as &#x201C;No&#x201D; in our sample to increase our certainty that formal proxies have a clear report of formal access. In the sample, 189 participants were both financial and medical digital proxies, while 72 were financial (only) and 59 were medical (only) digital proxies.</p><table-wrap id="t3" position="float"><label>Table 3.</label><caption><p>Questions and responses identifying participants who had no digital proxy duties, informal duties, and formal digital proxy duties related to financial duties (N=657).</p></caption><table id="table3" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Survey items</td><td align="left" valign="bottom">Not proxy</td><td align="left" valign="bottom" colspan="4">Conditions for financial digital proxies</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">Informal proxy behavior</td><td align="left" valign="top" colspan="3">Formal proxy behavior (possible answer combinations)</td></tr></thead><tbody><tr><td align="left" valign="top">Q5.17 <italic>I have helped with digital financial access</italic></td><td align="left" valign="top">No</td><td align="left" valign="top">Yes</td><td align="left" valign="top">Yes</td><td align="left" valign="top">Yes</td><td align="left" valign="top">Yes</td></tr><tr><td align="left" valign="top">Q5.15 <italic>I have a joint account</italic></td><td align="left" valign="top"/><td align="left" valign="top">No</td><td align="left" valign="top">Yes</td><td align="left" valign="top">No</td><td align="left" valign="top">Yes</td></tr><tr><td align="left" valign="top">Q5.19 <italic>I have my own separate account</italic></td><td align="left" valign="top"/><td align="left" valign="top">No</td><td align="left" valign="top">Yes</td><td align="left" valign="top">Yes</td><td align="left" valign="top">No</td></tr><tr><td align="left" valign="top">Total, n (%)</td><td align="left" valign="top">396 (60.3)</td><td align="left" valign="top">89 (13.5)</td><td align="left" valign="top" colspan="3">172 (26.2)</td></tr></tbody></table></table-wrap><table-wrap id="t4" position="float"><label>Table 4.</label><caption><p>Questions and responses identifying participants who had no digital proxy duties, informal duties, and formal digital proxy duties related to medical duties (N=657).</p></caption><table id="table4" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Survey items</td><td align="left" valign="bottom">Not proxy</td><td align="left" valign="bottom" colspan="4">Conditions for medical digital proxies</td></tr><tr><td align="left" valign="top"/><td align="left" valign="top"/><td align="left" valign="top">Informal proxy behavior</td><td align="left" valign="top" colspan="3">Formal proxy behavior (possible answer combinations)</td></tr></thead><tbody><tr><td align="left" valign="top">Q6.36 <italic>I have assisted another adult with digital medical services</italic></td><td align="left" valign="top">No</td><td align="left" valign="top">Yes</td><td align="left" valign="top">Yes</td><td align="left" valign="top">Yes</td><td align="left" valign="top">Yes</td></tr><tr><td align="left" valign="top">Q6.33 <italic>I have a digital caregiver account</italic></td><td align="left" valign="top"/><td align="left" valign="top">No</td><td align="left" valign="top">Yes</td><td align="left" valign="top">No</td><td align="left" valign="top">Yes</td></tr><tr><td align="left" valign="top">Q6.38 <italic>I have my own separate account</italic></td><td align="left" valign="top"/><td align="left" valign="top">No</td><td align="left" valign="top">Yes</td><td align="left" valign="top">Yes</td><td align="left" valign="top">No</td></tr><tr><td align="left" valign="top">Total, n (%)</td><td align="left" valign="top">409 (60.3)</td><td align="left" valign="top">89 (13.5)</td><td align="left" valign="top" colspan="3">159 (24.2)</td></tr></tbody></table></table-wrap></sec><sec id="s2-5"><title>Recruitment</title><p>The survey was sent to Qualtrics, a panel survey company that was tasked with recruiting a nationally representative sample of US respondents from December 2022 to February 2023. The company invites respondents by email (indicating research purpose, incentives, and duration) or through advertisements on the respondents&#x2019; login panel. To avoid self-selection bis, the survey invitations are kept general without specific details about the survey. The company compensated the respondents with either cash, vouchers, or coupons. Exclusion criteria were participants who were not residents of the United States and were aged below 21 years at the time of the survey. Attention checks such as &#x201C;<italic>Do you commit to providing thoughtful answers to the questions throughout the survey?</italic>&#x201D; were built in to ensure response robustness. Cookies were used on the last page, valid for a week, with duplicate entries avoided by preventing users with the same IP address access to the survey twice. A manual log file was also checked for multiple entries. No minimal timestamp was used&#x2014;we grouped related items across multiple pages and mixed mandatory and optional items to maintain engagement. Residency was checked by verification performed by our research team, where we excluded responses with embedded data that failed the quality check for IP addresses and the participant&#x2019;s self-report.</p></sec><sec id="s2-6"><title>Participant Summary</title><p>Our sample participants were nationally representative. We established this by comparing the various parameters (income, age, ethnicity, and housing) to the data from the most recent national census data by the US Census Bureau from 2020 [<xref ref-type="bibr" rid="ref45">45</xref>], as per <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref>. Note that the US census data percentage is reported as is and may not add up to 100%.</p><p><xref ref-type="table" rid="table2">Table 2</xref> summarizes the key details of our data collection. The participation rate was 64%. The completion rate was 77% and 675 participants completed the survey, with 657 respondents passing verification tests. Our analysis, moving forward, accounts for these 657 respondents. The average time these participants took to complete the survey was 18.24 minutes.</p></sec><sec id="s2-7"><title>Scoring Procedure</title><sec id="s2-7-1"><title>Frequency of Physical Care Assistance</title><p>In adapting the IADL and ADL functional assessment scales, our scores were on a 0&#x2010;4 Likert scale (0=never, = yearly, 2=monthly, 3=weekly, 4=daily). We normalized the sum of the frequency of all IADL and ADL components to a range of 0&#x2010;1, where 0 denotes a person never assisting in any key life tasks of another adult, and 1 denotes a person assisting in all aspects of IADL or ADL daily.</p></sec><sec id="s2-7-2"><title>Digital Proxy Behavior</title><p>In , we demonstrated how we separated formal and informal proxies. We classified formal proxies as participants who reported having had any kind of formal access, such as having a joint account, having a digital caregiver account, and/or having their &#x201C;own separate account.&#x201D;</p></sec></sec></sec><sec id="s3" sec-type="results"><title>Results</title><sec id="s3-1"><title>Prevalence of Digital Proxy Behavior</title><p>In our sample, the total unique number of participants reporting digital proxy behavior was 320 of 657. Of these, 261 were classified as financial digital proxies (<xref ref-type="table" rid="table3">Table 3</xref>), and 248 were classified as medical digital proxies (<xref ref-type="table" rid="table4">Table 4</xref>). These groups had a substantial overlap, with 189 (59%) reporting both financial and medical digital proxy tasks.</p><p>We further subdivided the respondents into those who reported using formal versus informal access methods. Overall, 89 of 657 participants reported that they have been informal financial proxies (<xref ref-type="table" rid="table3">Table 3</xref>), and the number was coincidentally the same for informal medical proxies (<xref ref-type="table" rid="table4">Table 4</xref>). Of these, 32 informal proxies have had both duties, making a total of 146 unique informal digital proxies, which represented 22.2% of our population sample.</p><p>Next, we were interested in understanding who the delegators were (relative to the proxy). As plotted in <xref ref-type="fig" rid="figure4">Figure 4</xref>, of all 657 respondents, 68% (n=449) reported ever helping an immediate family member, and approximately 30% supported a relative (n=202) or a friend (n=205). We observed that digital proxy behavior was mainly for helping immediate family and relatives, whereas physical helping behavior also extended to helping friends. For example, digital proxies made up 62% (227/449) of the respondents who helped with physical care matters for an immediate family member.</p><fig position="float" id="figure4"><label>Figure 4.</label><caption><p>Counts of digital helping in the population, categorized by reported relationship to the person who is being helped. The total is larger than 320 (unique digital proxies) as respondents could select more than one option.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig04.png"/></fig><p>The rest of this paper investigates this subsample of digital proxies (financial digital proxies n=261; medical digital proxies n=248), uncovering tension points in digital proxies to promote safe practice.</p></sec><sec id="s3-2"><title>Modeling Types of Digital Proxies</title><p>We used generalized linear models to investigate the relationship between participants&#x2019; demographic factors and physical care behavior (independent variables) in taking up proxy duties related to financial and medical matters (dependent variables) for their delegator. This model choice is due to many predictors not being normally distributed and a mix of continuous and discrete values.</p><p>Our model specifies the logit link between both sets of variables to clarify how the combination of IVs as linear predictors relates to participants&#x2019; response values in being a proxy (<italic>Yes=1</italic> or <italic>No=0</italic>), for two types of digital duties, as per <xref ref-type="table" rid="table3">Table 3</xref> (financial) and <xref ref-type="table" rid="table4">Table 4</xref> (medical). <xref ref-type="fig" rid="figure5">Figure 5</xref> shows the correlations between all predictors, with all correlations no more than <italic>r</italic>=0.71. For this reason, we considered all variables in our model.</p><fig position="float" id="figure5"><label>Figure 5.</label><caption><p>Correlation matrix of predictors showing no correlation higher than <italic>r</italic>=0.71<italic>.</italic> ADL: Activities of Daily Living; IADL: Instrumental Activities of Daily Living.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig05.png"/></fig><sec id="s3-2-1"><title>Goodness of Fit</title><p>We performed step-wise regression to procedurally determine the best combination of predictors and verify the goodness of fit for both models. Performing a backward selection resulted in a simplified model with the lowest Akaike information criterion (AIC). The lowest AIC value quantifies information loss due to model simplification without compromising performance. A lower value emphasizes a lesser tendency for the model to overfit our data.</p><p>In measuring the goodness of fit, unlike linear regression in which <italic>R</italic><sup>2</sup> represents the proportion of variance explained by predictors in a model, there is no agreed-upon measure in logistic regression analysis analogous to <italic>R</italic><sup>2</sup>. Still, several competing measures of pseudo-<italic>R</italic><sup>2</sup> exist. We calculated McFadden pseudo-<italic>R</italic><sup>2</sup> to measure how well the model fits.</p><p>Defined as <inline-formula><mml:math id="ieqn1"><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mi>p</mml:mi><mml:msubsup><mml:mi>R</mml:mi><mml:mrow><mml:mi>M</mml:mi><mml:mi>F</mml:mi></mml:mrow><mml:mn>2</mml:mn></mml:msubsup><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>d</mml:mi><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mrow><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>d</mml:mi><mml:mi>u</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mrow><mml:mi>d</mml:mi><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mrow><mml:mi>n</mml:mi><mml:mi>u</mml:mi><mml:mi>l</mml:mi><mml:mi>l</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mtext>&#x00A0;</mml:mtext><mml:mi>d</mml:mi><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mrow><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>d</mml:mi><mml:mi>u</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:mrow></mml:mrow></mml:msub></mml:mrow></mml:mstyle></mml:math></inline-formula> denotes the maximized likelihood value from the current model that includes all predictors and <inline-formula><mml:math id="ieqn2"><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mi>d</mml:mi><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>u</mml:mi><mml:mi>l</mml:mi><mml:mi>l</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mstyle></mml:math></inline-formula> denotes the maximized likelihood value from the model with only an intercept and no covariates. A good model should produce a log-likelihood close to 0 since the ratio of the two log-likelihoods,</p><p><italic><inline-formula><mml:math id="ieqn3"><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mi>d</mml:mi><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>i</mml:mi><mml:mi>d</mml:mi><mml:mi>u</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mstyle></mml:math></inline-formula></italic> and <inline-formula><mml:math id="ieqn4"><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mi>d</mml:mi><mml:msub><mml:mi>f</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>u</mml:mi><mml:mi>l</mml:mi><mml:mi>l</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mstyle></mml:math></inline-formula>, will be close to 1. Values of 0.2 to 0.4 for <inline-formula><mml:math id="ieqn5"><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mi>p</mml:mi><mml:msubsup><mml:mi>R</mml:mi><mml:mrow><mml:mi>M</mml:mi><mml:mi>F</mml:mi></mml:mrow><mml:mn>2</mml:mn></mml:msubsup></mml:mrow></mml:mstyle></mml:math></inline-formula> represent excellent model fit [<xref ref-type="bibr" rid="ref46">46</xref>].</p><p><xref ref-type="table" rid="table5">Table 5</xref> provides the model summary for predicting each type of digital proxy duty. Simplifying our models to only selected predictors reduced AIC to 683.58 (from 690.9 in the finance digital proxy model) and 666.73 (from 668.13 in the medical digital proxy model). The <italic>pR<sup>2</sup></italic> for the financial and medical models were 0.25 and 0.27, respectively, indicating excellent model fit. Further, calculating the chi-square statistic, <italic>&#x03C7;<sup>2</sup></italic>, for both models, resulted in <italic>P</italic>&#x003C;.001. The coefficient estimates for these models are summarized in <xref ref-type="table" rid="table6">Tables 6</xref> and <xref ref-type="table" rid="table7">7</xref>.</p><table-wrap id="t5" position="float"><label>Table 5.</label><caption><p>Model summary for financial and medical digital proxy, showing similarities and differences in the predicting factors.</p></caption><table id="table5" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Model</td><td align="left" valign="bottom">Physical care</td><td align="left" valign="bottom">Demographics</td><td align="left" valign="bottom">AIC<sup><xref ref-type="table-fn" rid="table5fn1">a</xref></sup></td><td align="left" valign="bottom">Deviances (<italic>df</italic>)</td><td align="left" valign="bottom"><italic>pR<sup>2</sup></italic></td><td align="left" valign="bottom">Chi-square</td><td align="left" valign="bottom"><italic>P</italic> value</td></tr></thead><tbody><tr><td align="left" valign="top">Financial digital proxy</td><td align="left" valign="top">IADL<sup><xref ref-type="table-fn" rid="table5fn2">b</xref></sup>, ADL<sup><xref ref-type="table-fn" rid="table5fn3">c</xref></sup></td><td align="left" valign="top">Age; income; gender: male; education; marital: married, unmarried</td><td align="left" valign="top">683.58</td><td align="left" valign="top">Null: 882.86 (656); residual: 665.58 (648)</td><td align="left" valign="top">0.25</td><td align="left" valign="top">217.28</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top">Medical digital proxy</td><td align="left" valign="top">IADL, ADL</td><td align="left" valign="top">Age; gender: male; education; employment: unemployed; siblings; ethnicity: underrepresented; marital: married, unmarried</td><td align="left" valign="top">666.73</td><td align="left" valign="top">Null: 870.94 (656); residual: 644.73 (646)</td><td align="left" valign="top">0.27</td><td align="left" valign="top">226.21</td><td align="left" valign="top">&#x003C;.001</td></tr></tbody></table><table-wrap-foot><fn id="table5fn1"><p><sup>a</sup>AIC: Akaike information criterion.</p></fn><fn id="table5fn2"><p><sup>b</sup>IADL: Instrumental Activities of Daily Living.</p></fn><fn id="table5fn3"><p><sup>c</sup>ADL: Activities of Daily Living.</p></fn></table-wrap-foot></table-wrap><table-wrap id="t6" position="float"><label>Table 6.</label><caption><p>Coefficient summary to predict a proxy undertaking financial digital duties.</p></caption><table id="table6" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Coefficient</td><td align="left" valign="bottom">Estimate</td><td align="left" valign="bottom">95% CI</td><td align="left" valign="bottom">Standard error</td><td align="left" valign="bottom"><italic>z</italic>-score</td><td align="left" valign="bottom"><italic>P</italic> value</td></tr></thead><tbody><tr><td align="left" valign="top">(Intercept)</td><td align="left" valign="top">&#x2212;4.25</td><td align="left" valign="top">&#x2212;5.54 to &#x2212;3.02</td><td align="left" valign="top">0.64</td><td align="left" valign="top">&#x2212;6.63</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top">Age</td><td align="left" valign="top">&#x2212;0.07</td><td align="left" valign="top">&#x2212;0.14 to &#x2212;0.00</td><td align="left" valign="top">0.04</td><td align="left" valign="top">&#x2212;2.06</td><td align="left" valign="top">.04</td></tr><tr><td align="left" valign="top">Income</td><td align="left" valign="top">0.18</td><td align="left" valign="top">0.01 to 0.36</td><td align="left" valign="top">0.09</td><td align="left" valign="top">2.08</td><td align="left" valign="top">.04</td></tr><tr><td align="left" valign="top">Gender: male</td><td align="left" valign="top">0.57</td><td align="left" valign="top">0.19 to 0.96</td><td align="left" valign="top">0.19</td><td align="left" valign="top">2.94</td><td align="left" valign="top">.003</td></tr><tr><td align="left" valign="top">Education</td><td align="left" valign="top">0.36</td><td align="left" valign="top">0.00 to 0.72</td><td align="left" valign="top">0.18</td><td align="left" valign="top">1.96</td><td align="left" valign="top">.05</td></tr><tr><td align="left" valign="top">Marital: married</td><td align="left" valign="top">0.18</td><td align="left" valign="top">&#x2212;0.36 to 0.73</td><td align="left" valign="top">0.28</td><td align="left" valign="top">0.66</td><td align="left" valign="top">.51</td></tr><tr><td align="left" valign="top">Marital: unmarried</td><td align="left" valign="top">&#x2212;0.32</td><td align="left" valign="top">&#x2212;0.91 to 0.27</td><td align="left" valign="top">0.30</td><td align="left" valign="top">&#x2212;1.06</td><td align="left" valign="top">.29</td></tr><tr><td align="left" valign="top">Instrumental Activities of Daily Living</td><td align="left" valign="top">3.49</td><td align="left" valign="top">2.51 to 4.53</td><td align="left" valign="top">0.52</td><td align="left" valign="top">6.78</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top">Activities of Daily Living</td><td align="left" valign="top">0.82</td><td align="left" valign="top">0.20 to 1.45</td><td align="left" valign="top">0.32</td><td align="left" valign="top">2.59</td><td align="left" valign="top">.009</td></tr></tbody></table></table-wrap><table-wrap id="t7" position="float"><label>Table 7.</label><caption><p>Coefficient summary to predict a proxy undertaking medical digital duties.</p></caption><table id="table7" frame="hsides" rules="groups"><thead><tr><td align="left" valign="bottom">Coefficient</td><td align="left" valign="bottom">Estimate</td><td align="left" valign="bottom">95% CI</td><td align="left" valign="bottom">Standard error</td><td align="left" valign="bottom"><italic>z</italic>-score</td><td align="left" valign="bottom"><italic>P</italic> value</td></tr></thead><tbody><tr><td align="left" valign="top">(Intercept)</td><td align="left" valign="top">&#x2212;3.77</td><td align="left" valign="top">&#x2212;5.21 to &#x2212;2.38</td><td align="left" valign="top">0.72</td><td align="left" valign="top">&#x2212;5.22</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top">Age</td><td align="left" valign="top">&#x2212;0.13</td><td align="left" valign="top">&#x2212;0.21 to &#x2212;0.05</td><td align="left" valign="top">0.04</td><td align="left" valign="top">&#x2212;3.36</td><td align="left" valign="top">.001</td></tr><tr><td align="left" valign="top">Gender: male</td><td align="left" valign="top">0.61</td><td align="left" valign="top">0.22 to 1.01</td><td align="left" valign="top">0.20</td><td align="left" valign="top">3.03</td><td align="left" valign="top">.002</td></tr><tr><td align="left" valign="top">Education</td><td align="left" valign="top">0.42</td><td align="left" valign="top">0.06 to 0.78</td><td align="left" valign="top">0.18</td><td align="left" valign="top">2.30</td><td align="left" valign="top">.02</td></tr><tr><td align="left" valign="top">Employment: unemployed</td><td align="left" valign="top">&#x2212;0.34</td><td align="left" valign="top">&#x2212;0.78 to 0.09</td><td align="left" valign="top">0.22</td><td align="left" valign="top">&#x2212;1.56</td><td align="left" valign="top">.12</td></tr><tr><td align="left" valign="top">Siblings</td><td align="left" valign="top">0.22</td><td align="left" valign="top">0.07 to 0.37</td><td align="left" valign="top">0.08</td><td align="left" valign="top">2.84</td><td align="left" valign="top">.004</td></tr><tr><td align="left" valign="top">Ethnicity: underrepresented</td><td align="left" valign="top">&#x2212;0.47</td><td align="left" valign="top">&#x2212;0.90 to &#x2212;0.04</td><td align="left" valign="top">0.22</td><td align="left" valign="top">&#x2212;2.12</td><td align="left" valign="top">.03</td></tr><tr><td align="left" valign="top">Marital: married</td><td align="left" valign="top">0.13</td><td align="left" valign="top">&#x2212;0.42 to 0.68</td><td align="left" valign="top">0.28</td><td align="left" valign="top">0.47</td><td align="left" valign="top">.64</td></tr><tr><td align="left" valign="top">Marital: unmarried</td><td align="left" valign="top">&#x2212;0.46</td><td align="left" valign="top">&#x2212;1.07 to 0.16</td><td align="left" valign="top">0.31</td><td align="left" valign="top">&#x2212;1.46</td><td align="left" valign="top">.14</td></tr><tr><td align="left" valign="top">Instrumental Activities of Daily Living</td><td align="left" valign="top">2.69</td><td align="left" valign="top">1.69 to 3.75</td><td align="left" valign="top">0.53</td><td align="left" valign="top">5.13</td><td align="left" valign="top">&#x003C;.001</td></tr><tr><td align="left" valign="top">Activities of Daily Living</td><td align="left" valign="top">1.39</td><td align="left" valign="top">0.74 to 2.04</td><td align="left" valign="top">0.33</td><td align="left" valign="top">4.18</td><td align="left" valign="top">&#x003C;.001</td></tr></tbody></table></table-wrap></sec></sec><sec id="s3-3"><title>Demographic Profile</title><p>Our results yielded <italic>age</italic>, <italic>gender</italic>, and <italic>education</italic> as common demographic factors across finance and medical digital proxies at <italic>P</italic>&#x2264;.05. To delve deeper into this predictor, we plotted the distribution of unique digital proxies (n=320) across <italic>age</italic> and <italic>gender</italic> (<xref ref-type="fig" rid="figure6">Figure 6</xref>). Overall, we observed a majority of (finance and medical) digital proxies as male respondents; however, there is a decreasing participation trend among those over 55 years old. The log odds of a younger person and a male assisting with financial digital matters increased by 0.07 (age) and 0.57 (gender), respectively. Similarly, a younger person of the male gender was more likely to take up medical digital duties, with a 0.13 (age) and 0.61 (gender) increase in log odds. Interestingly, as per <xref ref-type="fig" rid="figure6">Figure 6</xref>, this situation is reversed for digital proxies above 60 years old, with a predominance of female digital proxies.</p><fig position="float" id="figure6"><label>Figure 6.</label><caption><p>Bar chart plotting the percentages of unique digital proxies by age and gender. The chart shows a preponderance of younger, male adults reporting digital proxy behavior. However, the trend line suggests an increase in female digital proxies above age 60.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig06.png"/></fig><p>In terms of <italic>education</italic>, as per <xref ref-type="fig" rid="figure7">Figure 7</xref>, most finance digital proxies attained a college degree. We observed a similar trend among medical digital proxies, where 54% (n=134) were college-educated. For a one-unit increase in one&#x2019;s education bracket, the log odds of having assisted with finance and medical digital duties increased by 0.18 and 0.42, respectively. <italic>Income</italic> was additionally a significant predictor for finance digital duties at <italic>P</italic>&#x003C;.05. As per <xref ref-type="fig" rid="figure8">Figure 8</xref>, most proxies earned within the range of $50,000-$99,000, which includes the national average of about $70,000 per household [<xref ref-type="bibr" rid="ref45">45</xref>]. Specifically, the log odds of reporting assisting in financial digital duties increased by 0.36 for a one-unit increase in one&#x2019;s income and education bracket. In contrast, most participants who had no experience with finance digital proxies reported a household income threshold of less than $30,000 annually.</p><fig position="float" id="figure7"><label>Figure 7.</label><caption><p>Bar chart of all respondents (n=657) comparing percentage of highest educational attainment for financial digital proxies versus nonfinancial digital proxies, normalized across proxy type, showing most proxies attaining higher education.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig07.png"/></fig><fig position="float" id="figure8"><label>Figure 8.</label><caption><p>Bar chart of all respondents (n=657), showing percentage of household income distribution among financial digital proxies versus nonproxies, showing most nonfinancial digital proxies coming from lower-income households.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig08.png"/></fig><p>Additional significant predictors relevant in determining having experience as medical digital proxies included the number of <italic>sibling</italic>(s) a person has and <italic>ethnicity</italic>. As per <xref ref-type="fig" rid="figure9">Figure 9</xref>, we observed an increasing trend of medical digital proxies with more siblings. For every one-unit change in the number of siblings, the log odds of a person assisting with medical digital duties increased by 0.22. Black, Native, Asian, Latino, Hispanic, and mixed ethnic groups made up the minority (n=239, 36%) of medical proxies (<xref ref-type="fig" rid="figure10">Figure 10</xref>). Although we observed negligible differences in the percentage distribution of ethnically White respondents ever taking up medical digital duties, the underrepresented communities seemed less likely to have ever taken up medical digital proxy duties, with log odds decreasing by 0.47. <xref ref-type="fig" rid="figure10">Figure 10</xref> suggests that there may be some variation among underrepresented ethnic groups, but the differences between proxies and nonproxies were not significant (<italic>P</italic>&#x003E;.50).</p><fig position="float" id="figure9"><label>Figure 9.</label><caption><p>Bar chart of all respondents (n=657) showing the distribution of the number of siblings among medical digital proxies and nonproxies, normalized across proxy type.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig09.png"/></fig><fig position="float" id="figure10"><label>Figure 10.</label><caption><p>Bar chart of all respondents (n=657) showing the distribution in ethnic groups among medical digital proxies and nonproxies, normalized across proxy type. His/Lat: Hispanic/Latino.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig10.png"/></fig></sec><sec id="s3-4"><title>Involvement With Key Life Tasks</title><p>Recall that our scoring in the frequency of IADL and ADL assistance spans from 0 to 1, where 0 denotes a person never assisting in any key life tasks of another adult and 1 denotes a person assisting in all aspects of IADL or ADL daily.</p><p><xref ref-type="fig" rid="figure11">Figure 11</xref> compares involvement in two types of key life tasks, IADL and ADL, among finance and medical digital proxies. The median frequency of IADL assistance was 0.83 among finance (mean 0.77, SD 0.19) and 0.79 among medical (mean 0.77, SD 0.18) digital proxies. In contrast, the distribution of ADL assistance scores spanned a broader range, with the median frequency equal to 0.75 among both digital proxies (finance: mean 0.65, SD 0.34; medical: mean 0.67, SD 0.32). Note that we did not remove outliers as they represent natural variations in the population.</p><fig position="float" id="figure11"><label>Figure 11.</label><caption><p>Distribution of IADL and ADL assistance score among digital proxies. ADL: Activities of Daily Living; IADL: Instrumental Activities of Daily Living.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig11.png"/></fig><p>IADL and ADL are significant predictors of finance and medical digital proxies, achieving <italic>P</italic>&#x003C;.01 significance, that is to say, the more a person had previously experienced assisting another adult with their physical care activities (IADL and ADL), the log odds of them reporting financial digital proxy behavior increased by 3.49 and 0.82, respectively. Correspondingly, the log odds of a person reporting medical digital proxy behavior increased by 2.69 and 1.39 with increasing experience with IADL and ADL responsibilities.</p></sec><sec id="s3-5"><title>Summary of Findings on Predictors of Reporting Digital Proxy Behavior</title><p>In this section, we ran a regression analysis to investigate the predictors of reporting financial and medical digital proxy duties for another adult. The evidence indicated a strong tendency for those who have experience assisting others with IADL and ADL to also report undertaking digital financial and medical responsibilities. Further, our results found <italic>age</italic>, <italic>gender</italic>, and <italic>education</italic> as common nonmodifiable factors significantly influencing a person reporting financial and medical digital proxy duties. We noted additionally that after age 60, female respondents were more likely to report being digital proxies. A person with a higher <italic>income</italic> bracket was more likely to have taken up financial digital proxy duties, though <italic>income</italic> played no role in predicting medical digital proxies. Nevertheless, most proxies were in the household income bracket that included the national average household income or more. A person from an underrepresented ethnic group was less likely to take up medical proxy duties.</p></sec><sec id="s3-6"><title>Behaviors of Digital Proxies</title><p>Respondents who identified themselves as digital proxies were asked to choose the most common reasons they had to manage accounts for others. Participants could choose more than one option. We note that across financial and medical digital proxies, the adult&#x2019;s lack of familiarity with an app (finance n=118; medical n=120), perceived task difficulty (finance n=94; medical n=94), and low usability (finance n=89; medical n=97) were the main reported reasons for the proxy behavior (<xref ref-type="fig" rid="figure12">Figure 12</xref>). We also note that less modifiable reasons, such as physical or cognitive limitations of the account owner, were present but not the top reported reasons.</p><fig position="float" id="figure12"><label>Figure 12.</label><caption><p>Count of reasons that digital proxies reported that required them to manage digital accounts for other adults, showing a predominance of usability-linked reasons over cognitive and physical limitations. Refer to the Survey Design section for the full questions.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig12.png"/></fig><p>With these challenges in mind, our analysis now turns to the usage practices of informal digital proxies (who reported access to the delegators&#x2019; accounts without having proxy accounts). Recall that we observed an unanticipated reversed effect of increasing participation among female digital proxies above 60. We used this split to further investigate the profiles of digital proxies, and our results yielded a remarkable and intriguing tendency among older female respondents to more often report formal digital proxy practices. As per <xref ref-type="fig" rid="figure13">Figures 13</xref> and <xref ref-type="fig" rid="figure14">14</xref>, the ratio of formal versus informal practices was highest for older females (about 3:1), which goes against the general trend of about 2:1.</p><fig position="float" id="figure13"><label>Figure 13.</label><caption><p>Distribution among all financial digital proxies (n=261), normalized across practice type, showing a higher percentage of formal account usage by female proxies aged 60 years and above.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig13.png"/></fig><fig position="float" id="figure14"><label>Figure 14.</label><caption><p>Distribution among medical digital proxies (n=248), normalized across practice type, showing a higher percentage of formal account usage by female proxies aged 60 years and above.</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig14.png"/></fig></sec><sec id="s3-7"><title>Informal Proxies&#x2019; Login Methods</title><p>In what follows, we examine the behaviors of all informal proxies (n=146). In this section, we examine how informal proxies, who make up 22.2% of the total sample, helped their delegators with <italic>logging into</italic> digital accounts.</p><p>We asked about 3 login methods and report them in <xref ref-type="fig" rid="figure15">Figure 15</xref>. Participants could select more than one option, relabeled in the following order: (1) I know the username and password for their online account(s) &#x2013; <italic>have knowledge</italic>; (2) the adult logs in with a username and password and I help them (I don&#x2019;t know the username and password) &#x2013; <italic>no knowledge</italic>; and (3) the adult uses their fingerprint (or other biometrics) to log in <italic>&#x2013; require biometrics</italic>.</p><fig position="float" id="figure15"><label>Figure 15.</label><caption><p>Counts of reported methods of logging in to digital accounts by informal proxies (n=146).</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig15.png"/></fig><p>We can see that for both financial and medical informal proxies, more than 5 in 10 informal proxies reported knowing both the username and password of the delegator, while about 3 in 10 informal proxies reported that they have assisted the delegator to log in without knowing their credentials. Finally, about 2 in 10 mentioned that the delegator used biometrics to log in. In other words, about half of informal proxies (or roughly 10% of the total sample) reported having had knowledge of the delegator&#x2019;s credentials, which potentially may lead to a high risk of misuse.</p></sec><sec id="s3-8"><title>Help With Using Digital Accounts</title><p>In this section, we examine how informal proxies have helped other adults with <italic>using</italic> their digital accounts, as reported in <xref ref-type="fig" rid="figure16">Figure 16</xref>. Participants could choose more than one of the following options, relabeled in the following order: (1) I offer some help, but the person does it mostly independently &#x2013; <italic>partial help</italic>; (2) I provide ongoing assistance while next to the person &#x2013; <italic>ongoing assistance</italic>; (3) I use the person&#x2019;s account on their behalf, even when they are not present &#x2013; <italic>usage without presence</italic>; and (4) I use the person&#x2019;s account on their behalf, while they are present &#x2013; <italic>usage with presence</italic>.</p><fig position="float" id="figure16"><label>Figure 16.</label><caption><p>Count of reported methods of using digital accounts by informal proxies (n=146).</p></caption><graphic alt-version="no" mimetype="image" position="float" xlink:type="simple" xlink:href="jmir_v27i1e69806_fig16.png"/></fig><p>We report the distribution of methods practiced by informal proxies when using delegators&#x2019; accounts in <xref ref-type="fig" rid="figure16">Figure 16</xref>. Most of the informal proxies provided some form of assistance while being beside the delegator. However, about one third (n=34) of informal proxies or roughly 7% of the entire sample reported using the account on their behalf without the presence of the delegator.</p></sec><sec id="s3-9"><title>Qualitative Insights</title><p>Each section of the survey had an open-ended question asking for other reasons for helping, other methods of logging in, and other methods of helping with using accounts. However, there were only a handful (n=3) of responses, and these did not offer any further insight into the survey data. Hence, we do not report any findings here.</p></sec></sec><sec id="s4" sec-type="discussion"><title>Discussion</title><sec id="s4-1"><title>Principal Findings</title><p>This study aimed to quantify the predictors of digital proxies in financial and medical services. We found that nearly half of all respondents had acted as digital proxies, with most performing both medical and financial proxy roles. Digital proxies were typically younger, male, and better educated, and physical caregiving was strongly associated with proxy behavior.</p><p>Our findings align with prior qualitative studies suggesting that digital caregiving tasks are often delegated to younger [<xref ref-type="bibr" rid="ref21">21</xref>] and male [<xref ref-type="bibr" rid="ref24">24</xref>] tech-savvy individuals. Notably, the predominance of male proxies contrasts with traditional caregiving trends that show women as primary caregivers [<xref ref-type="bibr" rid="ref2">2</xref>]. Financial proxies were more likely to have higher incomes and less frequent physical caregiving duties, likely due to the remote nature of financial management. Meanwhile, medical proxies were more closely linked with frequent hands-on care. The different predictors and patterns across domains consistent with previous literature [<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref48">48</xref>] suggested distinct forms of engagement and responsibility in digital proxying. One critical concern emerging from our data is the large proportion of informal digital proxies&#x2014;approximately one-third&#x2014;which may mean that there are millions of individuals in the United States potentially using accounts without proper authorization. This poses risks, particularly in financial services, where informal access may enable elder financial abuse. Although usability barriers are linked to informal delegation, simply introducing more formal mechanisms may not be sufficient. Drawing from the Routine Activities Theory [<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref50">50</xref>] and system security literature [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref52">52</xref>], we argue that effective proxy systems should integrate monitoring, transparency, and capacity-assessing features. Legacy contacts and multiproxy support systems may offer paths forward. The data support recent calls for formal access tools [<xref ref-type="bibr" rid="ref7">7</xref>] that protect care recipients while accommodating caregiving realities.</p></sec><sec id="s4-2"><title>Limitations</title><p>This study relies on self-reported data, which is subject to recall bias and social desirability effects, potentially underestimating the prevalence of informal proxying. Additionally, our models were not validated with external datasets, and we did not explore the full range of abuse scenarios or remote care dynamics. Future research should examine these gaps using more diverse and representative samples, explore the motivations of abusers, and evaluate how ongoing access to another adult&#x2019;s digital accounts might predict harmful behavior.</p></sec><sec id="s4-3"><title>Conclusion</title><p>Digital proxying is a widespread but understudied caregiving activity with distinct patterns across financial and medical domains. Our findings highlight the growing reliance on younger, educated caregivers to manage digital responsibilities, often without formal authorization. As caregiving demands rise alongside aging populations, policymakers and service designers must develop systems that enable formal proxy access while safeguarding against misuse. Inclusive design, user education, and built-in gatekeeping mechanisms will be critical to balance caregiver support and care recipient autonomy in digital contexts.</p></sec></sec></body><back><ack><p>We thank our early readers of this paper for their feedback and the participants of this study for their valuable contribution. We thank Christine Latulipe for generously sharing their financial proxy survey. This work was supported by the Singapore Ministry of Health&#x2019;s National Medical Research Council, grants number NMRC/CG1/009/2022-NUH and CareEco21-0030.</p></ack><notes><sec><title>Data Availability</title><p>The data that support the findings of this study are not available from the authors, as permission to reuse the data was not obtained.</p></sec></notes><fn-group><fn fn-type="conflict"><p>None declared.</p></fn></fn-group><glossary><title>Abbreviations</title><def-list><def-item><term id="abb1">ADL</term><def><p>Activities of Daily Living</p></def></def-item><def-item><term id="abb2">CHERRIES</term><def><p>Checklist for Reporting Results of Internet E-Surveys</p></def></def-item><def-item><term id="abb3">IADL</term><def><p>Instrumental Activities of Daily Living</p></def></def-item></def-list></glossary><ref-list><title>References</title><ref id="ref1"><label>1</label><nlm-citation citation-type="web"><article-title>Fast facts: health and economic costs of chronic diseases</article-title><source>Centers for Disease Control and Prevention</source><access-date>2025-07-31</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.cdc.gov/chronic-disease/data-research/facts-stats/index.html">https://www.cdc.gov/chronic-disease/data-research/facts-stats/index.html</ext-link></comment></nlm-citation></ref><ref id="ref2"><label>2</label><nlm-citation citation-type="report"><person-group person-group-type="author"><collab>National Alliance for Caregiving</collab></person-group><article-title>2020 report. Caregiving in the U.S</article-title><year>2020</year><publisher-name>AARP</publisher-name><pub-id pub-id-type="doi">10.26419/ppi.00103.001</pub-id></nlm-citation></ref><ref id="ref3"><label>3</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Dunphy</surname><given-names>P</given-names> </name><name name-style="western"><surname>Monk</surname><given-names>A</given-names> </name><name name-style="western"><surname>Vines</surname><given-names>J</given-names> </name><name name-style="western"><surname>Blythe</surname><given-names>M</given-names> </name><name name-style="western"><surname>Olivier</surname><given-names>P</given-names> </name></person-group><article-title>Designing for spontaneous and secure delegation in digital payments</article-title><source>Interact Comput</source><year>2014</year><month>09</month><day>1</day><volume>26</volume><issue>5</issue><fpage>417</fpage><lpage>432</lpage><pub-id pub-id-type="doi">10.1093/iwc/iwt038</pub-id></nlm-citation></ref><ref id="ref4"><label>4</label><nlm-citation citation-type="web"><article-title>Old-age dependency ratio</article-title><source>OECD</source><year>2023</year><access-date>2023-08-22</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://data.oecd.org/pop/old-age-dependency-ratio.htm">https://data.oecd.org/pop/old-age-dependency-ratio.htm</ext-link></comment></nlm-citation></ref><ref id="ref5"><label>5</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Acierno</surname><given-names>R</given-names> </name><name name-style="western"><surname>Hernandez</surname><given-names>MA</given-names> </name><name name-style="western"><surname>Amstadter</surname><given-names>AB</given-names> </name><etal/></person-group><article-title>Prevalence and correlates of emotional, physical, sexual, and financial abuse and potential neglect in the United States: the National Elder Mistreatment Study</article-title><source>Am J Public Health</source><year>2010</year><month>02</month><volume>100</volume><issue>2</issue><fpage>292</fpage><lpage>297</lpage><pub-id pub-id-type="doi">10.2105/AJPH.2009.163089</pub-id><pub-id pub-id-type="medline">20019303</pub-id></nlm-citation></ref><ref id="ref6"><label>6</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Adams</surname><given-names>AE</given-names> </name></person-group><article-title>Measuring the effects of domestic violence on women&#x2019;s financial wellbeing</article-title><source>MINDS @ UW</source><year>2011</year><access-date>2025-04-14</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://minds.wisconsin.edu/handle/1793/90734">https://minds.wisconsin.edu/handle/1793/90734</ext-link></comment></nlm-citation></ref><ref id="ref7"><label>7</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Havens</surname><given-names>Z</given-names> </name><name name-style="western"><surname>Latulipe</surname><given-names>C</given-names> </name></person-group><article-title>Proxy accounts and behavioural nudges: investigating support for older adults and their financial delegates</article-title><year>2024</year><month>06</month><day>3</day><conf-name>GI &#x2019;24</conf-name><conf-date>Jun 3-6, 2024</conf-date><conf-loc>Halifax, NS</conf-loc><fpage>1</fpage><lpage>14</lpage><pub-id pub-id-type="doi">10.1145/3670947.3670962</pub-id></nlm-citation></ref><ref id="ref8"><label>8</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ancker</surname><given-names>JS</given-names> </name><name name-style="western"><surname>Sharko</surname><given-names>M</given-names> </name><name name-style="western"><surname>Hong</surname><given-names>M</given-names> </name><name name-style="western"><surname>Mitchell</surname><given-names>H</given-names> </name><name name-style="western"><surname>Wilcox</surname><given-names>L</given-names> </name></person-group><article-title>Should parents see their teen&#x2019;s medical record? Asking about the effect on adolescent-doctor communication changes attitudes</article-title><source>J Am Med Inform Assoc</source><year>2018</year><month>12</month><day>1</day><volume>25</volume><issue>12</issue><fpage>1593</fpage><lpage>1599</lpage><pub-id pub-id-type="doi">10.1093/jamia/ocy120</pub-id><pub-id pub-id-type="medline">30247699</pub-id></nlm-citation></ref><ref id="ref9"><label>9</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Foong</surname><given-names>PS</given-names> </name><name name-style="western"><surname>Lim</surname><given-names>CA</given-names> </name><name name-style="western"><surname>Wong</surname><given-names>J</given-names> </name><name name-style="western"><surname>Lim</surname><given-names>CS</given-names> </name><name name-style="western"><surname>Perrault</surname><given-names>S</given-names> </name><name name-style="western"><surname>Koh</surname><given-names>GCH</given-names> </name></person-group><article-title>'You cannot offer such a suggestion': designing for family caregiver input in home care systems</article-title><conf-name>CHI &#x2019;20: CHI Conference on Human Factors in Computing Systems</conf-name><conf-date>Apr 25-30, 2020</conf-date><conf-loc>Honolulu, HI</conf-loc><pub-id pub-id-type="doi">10.1145/3313831.3376607</pub-id></nlm-citation></ref><ref id="ref10"><label>10</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Weis</surname><given-names>A</given-names> </name><name name-style="western"><surname>Pohlmann</surname><given-names>S</given-names> </name><name name-style="western"><surname>Poss-Doering</surname><given-names>R</given-names> </name><etal/></person-group><article-title>Caregivers&#x2019; role in using a personal electronic health record: a qualitative study of cancer patients and caregivers in Germany</article-title><source>BMC Med Inform Decis Mak</source><year>2020</year><month>07</month><day>13</day><volume>20</volume><issue>1</issue><fpage>158</fpage><pub-id pub-id-type="doi">10.1186/s12911-020-01172-4</pub-id><pub-id pub-id-type="medline">32660600</pub-id></nlm-citation></ref><ref id="ref11"><label>11</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Latulipe</surname><given-names>C</given-names> </name><name name-style="western"><surname>Quandt</surname><given-names>SA</given-names> </name><name name-style="western"><surname>Melius</surname><given-names>KA</given-names> </name><etal/></person-group><article-title>Insights into older adult patient concerns around the caregiver proxy portal use: qualitative interview study</article-title><source>J Med Internet Res</source><year>2018</year><month>11</month><day>2</day><volume>20</volume><issue>11</issue><fpage>e10524</fpage><pub-id pub-id-type="doi">10.2196/10524</pub-id><pub-id pub-id-type="medline">30389654</pub-id></nlm-citation></ref><ref id="ref12"><label>12</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Hunsaker</surname><given-names>A</given-names> </name><name name-style="western"><surname>Nguyen</surname><given-names>MH</given-names> </name><name name-style="western"><surname>Fuchs</surname><given-names>J</given-names> </name><name name-style="western"><surname>Karaoglu</surname><given-names>G</given-names> </name><name name-style="western"><surname>Djukaric</surname><given-names>T</given-names> </name><name name-style="western"><surname>Hargittai</surname><given-names>E</given-names> </name></person-group><article-title>Unsung helpers: older adults as a source of digital media support for their peers</article-title><source>The Communication Review</source><year>2020</year><month>10</month><day>1</day><volume>23</volume><issue>4</issue><fpage>309</fpage><lpage>330</lpage><pub-id pub-id-type="doi">10.1080/10714421.2020.1829307</pub-id></nlm-citation></ref><ref id="ref13"><label>13</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Latulipe</surname><given-names>C</given-names> </name><name name-style="western"><surname>Dsouza</surname><given-names>R</given-names> </name><name name-style="western"><surname>Cumbers</surname><given-names>M</given-names> </name></person-group><article-title>Unofficial proxies: how close others help older adults with banking</article-title><year>2022</year><month>04</month><day>29</day><conf-name>CHI &#x2019;22</conf-name><conf-date>Apr 29 to May 5, 2022</conf-date><conf-loc>New Orleans, LA</conf-loc><pub-id pub-id-type="doi">10.1145/3491102.3501845</pub-id></nlm-citation></ref><ref id="ref14"><label>14</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Latulipe</surname><given-names>C</given-names> </name><name name-style="western"><surname>Mazumder</surname><given-names>SF</given-names> </name><name name-style="western"><surname>Wilson</surname><given-names>RKW</given-names> </name><etal/></person-group><article-title>Security and privacy risks associated with adult patient portal accounts in US hospitals</article-title><source>JAMA Intern Med</source><year>2020</year><month>06</month><day>1</day><volume>180</volume><issue>6</issue><fpage>845</fpage><lpage>849</lpage><pub-id pub-id-type="doi">10.1001/jamainternmed.2020.0515</pub-id><pub-id pub-id-type="medline">32364562</pub-id></nlm-citation></ref><ref id="ref15"><label>15</label><nlm-citation citation-type="web"><article-title>Pew: caregivers are top digital health users, but only 59 percent find online tools helpful</article-title><source>MobiHealthNews</source><year>2013</year><access-date>2023-06-20</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.mobihealthnews.com/23234/pew-caregivers-are-top-digital-health-users-but-only-59-percent-find-online-tools-helpful">https://www.mobihealthnews.com/23234/pew-caregivers-are-top-digital-health-users-but-only-59-percent-find-online-tools-helpful</ext-link></comment></nlm-citation></ref><ref id="ref16"><label>16</label><nlm-citation citation-type="web"><article-title>Caregiving in the US</article-title><source>The National Alliance for Caregiving</source><access-date>2023-06-20</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.caregiving.org/research/caregiving-in-the-us/">https://www.caregiving.org/research/caregiving-in-the-us/</ext-link></comment></nlm-citation></ref><ref id="ref17"><label>17</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Zulman</surname><given-names>DM</given-names> </name><name name-style="western"><surname>Nazi</surname><given-names>KM</given-names> </name><name name-style="western"><surname>Turvey</surname><given-names>CL</given-names> </name><name name-style="western"><surname>Wagner</surname><given-names>TH</given-names> </name><name name-style="western"><surname>Woods</surname><given-names>SS</given-names> </name><name name-style="western"><surname>An</surname><given-names>LC</given-names> </name></person-group><article-title>Patient interest in sharing personal health record information: a web-based survey</article-title><source>Ann Intern Med</source><year>2011</year><month>12</month><day>20</day><volume>155</volume><issue>12</issue><fpage>805</fpage><lpage>810</lpage><pub-id pub-id-type="doi">10.7326/0003-4819-155-12-201112200-00002</pub-id><pub-id pub-id-type="medline">22184687</pub-id></nlm-citation></ref><ref id="ref18"><label>18</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Yadav</surname><given-names>KN</given-names> </name><name name-style="western"><surname>Gabler</surname><given-names>NB</given-names> </name><name name-style="western"><surname>Cooney</surname><given-names>E</given-names> </name><etal/></person-group><article-title>Approximately one on three US adults completes any type of advance directive for end-of-life care</article-title><source>Health Aff (Millwood)</source><year>2017</year><month>07</month><day>1</day><volume>36</volume><issue>7</issue><fpage>1244</fpage><lpage>1251</lpage><pub-id pub-id-type="doi">10.1377/hlthaff.2017.0175</pub-id><pub-id pub-id-type="medline">28679811</pub-id></nlm-citation></ref><ref id="ref19"><label>19</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mendel</surname><given-names>T</given-names> </name><name name-style="western"><surname>Toch</surname><given-names>E</given-names> </name></person-group><article-title>My mom was getting this popup: understanding motivations and processes in helping older relatives with mobile security and privacy</article-title><source>Proc ACM Interact Mob Wearable Ubiquitous Technol</source><year>2019</year><volume>3</volume><issue>4</issue><fpage>1</fpage><lpage>20</lpage><pub-id pub-id-type="doi">10.1145/3369821</pub-id></nlm-citation></ref><ref id="ref20"><label>20</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Mendel</surname><given-names>T</given-names> </name><name name-style="western"><surname>Toch</surname><given-names>E</given-names> </name></person-group><article-title>Social support for mobile security: comparing close connections and community volunteers in a field experiment</article-title><year>2023</year><month>04</month><day>19</day><conf-name>CHI &#x2019;23</conf-name><conf-date>Apr 23-28, 2023</conf-date><conf-loc>Hamburg, Germany</conf-loc><fpage>1</fpage><lpage>18</lpage><pub-id pub-id-type="doi">10.1145/3544548.3581183</pub-id></nlm-citation></ref><ref id="ref21"><label>21</label><nlm-citation citation-type="book"><person-group person-group-type="author"><name name-style="western"><surname>Huber</surname><given-names>LL</given-names> </name><name name-style="western"><surname>Watson</surname><given-names>C</given-names> </name><name name-style="western"><surname>Roberto</surname><given-names>KA</given-names> </name><name name-style="western"><surname>Walker</surname><given-names>BA</given-names> </name></person-group><source>Aging in Intra- and Intergenerational Contexts: The Family Technologist</source><year>2020</year><access-date>2025-07-10</access-date><publisher-name>Springer Publishing Company</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://connect.springerpub.com/content/book/978-0-8261-2889-8/part/part01/chapter/ch04">https://connect.springerpub.com/content/book/978-0-8261-2889-8/part/part01/chapter/ch04</ext-link></comment></nlm-citation></ref><ref id="ref22"><label>22</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Marler</surname><given-names>W</given-names> </name><name name-style="western"><surname>Hargittai</surname><given-names>E</given-names> </name></person-group><article-title>Division of digital labor: partner support for technology use among older adults</article-title><source>New Media &#x0026; Society</source><year>2024</year><month>02</month><volume>26</volume><issue>2</issue><fpage>978</fpage><lpage>994</lpage><pub-id pub-id-type="doi">10.1177/14614448211068437</pub-id></nlm-citation></ref><ref id="ref23"><label>23</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Ong</surname><given-names>ML</given-names> </name><name name-style="western"><surname>Foong</surname><given-names>PS</given-names> </name><name name-style="western"><surname>Tan</surname><given-names>SM</given-names> </name><name name-style="western"><surname>Xia</surname><given-names>X</given-names> </name><name name-style="western"><surname>Koh</surname><given-names>GCH</given-names> </name></person-group><article-title>Hearing, sharing and applying: a qualitative study of the experiences of family caregivers&#x2019; end-of-life decision-making in Singapore</article-title><source>BMJ Public Health</source><year>2024</year><month>06</month><volume>2</volume><issue>1</issue><fpage>e000646</fpage><pub-id pub-id-type="doi">10.1136/bmjph-2023-000646</pub-id><pub-id pub-id-type="medline">40018195</pub-id></nlm-citation></ref><ref id="ref24"><label>24</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Kropczynski</surname><given-names>J</given-names> </name><name name-style="western"><surname>Ghaiumy Anaraky</surname><given-names>R</given-names> </name><name name-style="western"><surname>Akter</surname><given-names>M</given-names> </name><name name-style="western"><surname>Godfrey</surname><given-names>AJ</given-names> </name><name name-style="western"><surname>Lipford</surname><given-names>H</given-names> </name><name name-style="western"><surname>Wisniewski</surname><given-names>PJ</given-names> </name></person-group><article-title>Examining collaborative support for privacy and security in the broader context of tech caregiving</article-title><source>Proc ACM Hum-Comput Interact</source><year>2021</year><month>10</month><day>13</day><volume>5</volume><issue>CSCW2</issue><fpage>1</fpage><lpage>23</lpage><pub-id pub-id-type="doi">10.1145/3479540</pub-id></nlm-citation></ref><ref id="ref25"><label>25</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Quinn</surname><given-names>CC</given-names> </name><name name-style="western"><surname>Staub</surname><given-names>S</given-names> </name><name name-style="western"><surname>Barr</surname><given-names>E</given-names> </name><name name-style="western"><surname>Gruber-Baldini</surname><given-names>A</given-names> </name></person-group><article-title>Mobile support for older adults and their caregivers: dyad usability study</article-title><source>JMIR Aging</source><year>2019</year><month>05</month><day>23</day><volume>2</volume><issue>1</issue><fpage>e12276</fpage><pub-id pub-id-type="doi">10.2196/12276</pub-id><pub-id pub-id-type="medline">31518271</pub-id></nlm-citation></ref><ref id="ref26"><label>26</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wolff</surname><given-names>JL</given-names> </name><name name-style="western"><surname>Darer</surname><given-names>JD</given-names> </name><name name-style="western"><surname>Larsen</surname><given-names>KL</given-names> </name></person-group><article-title>Family caregivers and consumer health information technology</article-title><source>J Gen Intern Med</source><year>2016</year><month>01</month><volume>31</volume><issue>1</issue><fpage>117</fpage><lpage>121</lpage><pub-id pub-id-type="doi">10.1007/s11606-015-3494-0</pub-id><pub-id pub-id-type="medline">26311198</pub-id></nlm-citation></ref><ref id="ref27"><label>27</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>Frik</surname><given-names>A</given-names> </name><name name-style="western"><surname>Nurgalieva</surname><given-names>L</given-names> </name><name name-style="western"><surname>Bernd</surname><given-names>J</given-names> </name><name name-style="western"><surname>Lee</surname><given-names>J</given-names> </name><name name-style="western"><surname>Schaub</surname><given-names>F</given-names> </name><name name-style="western"><surname>Egelman</surname><given-names>S</given-names> </name></person-group><article-title>Privacy and security threat models and mitigation strategies of older adults</article-title><source>Usenix Association</source><year>2019</year><access-date>2023-08-30</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.usenix.org/conference/soups2019/presentation/frik">https://www.usenix.org/conference/soups2019/presentation/frik</ext-link></comment></nlm-citation></ref><ref id="ref28"><label>28</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Bleijenberg</surname><given-names>N</given-names> </name><name name-style="western"><surname>Smith</surname><given-names>AK</given-names> </name><name name-style="western"><surname>Lee</surname><given-names>SJ</given-names> </name><name name-style="western"><surname>Cenzer</surname><given-names>IS</given-names> </name><name name-style="western"><surname>Boscardin</surname><given-names>JW</given-names> </name><name name-style="western"><surname>Covinsky</surname><given-names>KE</given-names> </name></person-group><article-title>Difficulty managing medications and finances in older adults: a 10-year cohort study</article-title><source>J Am Geriatr Soc</source><year>2017</year><month>07</month><volume>65</volume><issue>7</issue><fpage>1455</fpage><lpage>1461</lpage><pub-id pub-id-type="doi">10.1111/jgs.14819</pub-id><pub-id pub-id-type="medline">28378345</pub-id></nlm-citation></ref><ref id="ref29"><label>29</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Sabatino</surname><given-names>CP</given-names> </name></person-group><article-title>The evolution of health care advance planning law and policy</article-title><source>Milbank Q</source><year>2010</year><month>06</month><volume>88</volume><issue>2</issue><fpage>211</fpage><lpage>239</lpage><pub-id pub-id-type="doi">10.1111/j.1468-0009.2010.00596.x</pub-id><pub-id pub-id-type="medline">20579283</pub-id></nlm-citation></ref><ref id="ref30"><label>30</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Barka</surname><given-names>E</given-names> </name><name name-style="western"><surname>Sandhu</surname><given-names>R</given-names> </name></person-group><article-title>A role-based delegation model and some extensions</article-title><conf-name>Proceedings of the 23rd National Information Systems Security Conference</conf-name><conf-date>Oct 16-19, 2000</conf-date><conf-loc>Baltimore, MA</conf-loc><fpage>49</fpage><lpage>58</lpage></nlm-citation></ref><ref id="ref31"><label>31</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Ferraiolo</surname><given-names>DF</given-names> </name><name name-style="western"><surname>Cugini</surname><given-names>JA</given-names> </name><name name-style="western"><surname>Kuhn</surname><given-names>DR</given-names> </name></person-group><article-title>Role-based access control (RBAC): features and motivations</article-title><access-date>2025-07-26</access-date><conf-name>11th Annual Computer Security Applications Proceedings</conf-name><conf-date>Dec 11-15, 1995</conf-date><conf-loc>New Orleans, LA</conf-loc><fpage>241</fpage><lpage>248</lpage><comment><ext-link ext-link-type="uri" xlink:href="https://csrc.nist.gov/pubs/conference/1995/12/15/rolebased-access-control-rbac-features-and-motivat/final">https://csrc.nist.gov/pubs/conference/1995/12/15/rolebased-access-control-rbac-features-and-motivat/final</ext-link></comment></nlm-citation></ref><ref id="ref32"><label>32</label><nlm-citation citation-type="web"><article-title>MyUPMC Manage your UPMC health care</article-title><source>Google Play</source><year>2023</year><access-date>2025-07-26</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://play.google.com/store/search?q=MyUPMC&#x0026;c=apps&#x0026;hl=en_US&#x0026;gl=US&#x0026;pli=1">https://play.google.com/store/search?q=MyUPMC&#x0026;c=apps&#x0026;hl=en_US&#x0026;gl=US&#x0026;pli=1</ext-link></comment></nlm-citation></ref><ref id="ref33"><label>33</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Stouffer</surname><given-names>K</given-names> </name><name name-style="western"><surname>Lightman</surname><given-names>S</given-names> </name><name name-style="western"><surname>Pillitteri</surname><given-names>V</given-names> </name><name name-style="western"><surname>Abrams</surname><given-names>M</given-names> </name><name name-style="western"><surname>Hahn</surname><given-names>A</given-names> </name></person-group><article-title>NIST special publication 800-82, revision 2: guide to industrial control systems (ICS) security</article-title><source>Natl Inst Stand Technol</source><year>2014</year><access-date>2025-07-26</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://csrc.nist.gov/pubs/sp/800/82/r2/final">https://csrc.nist.gov/pubs/sp/800/82/r2/final</ext-link></comment></nlm-citation></ref><ref id="ref34"><label>34</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Cahn-Weiner</surname><given-names>DA</given-names> </name><name name-style="western"><surname>Boyle</surname><given-names>PA</given-names> </name><name name-style="western"><surname>Malloy</surname><given-names>PF</given-names> </name></person-group><article-title>Tests of executive function predict instrumental activities of daily living in community-dwelling older individuals</article-title><source>Appl Neuropsychol</source><year>2002</year><volume>9</volume><issue>3</issue><fpage>187</fpage><lpage>191</lpage><pub-id pub-id-type="doi">10.1207/S15324826AN0903_8</pub-id><pub-id pub-id-type="medline">12584085</pub-id></nlm-citation></ref><ref id="ref35"><label>35</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wallace</surname><given-names>M</given-names> </name><name name-style="western"><surname>Shelkey</surname><given-names>M</given-names> </name><collab>Hartford Institute for Geriatric Nursing</collab></person-group><article-title>Katz Index of Independence in Activities of Daily Living (ADL)</article-title><source>Urol Nurs</source><year>2007</year><month>02</month><volume>27</volume><issue>1</issue><fpage>93</fpage><lpage>94</lpage><pub-id pub-id-type="medline">17390935</pub-id></nlm-citation></ref><ref id="ref36"><label>36</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Carpenter</surname><given-names>BD</given-names> </name><name name-style="western"><surname>Buday</surname><given-names>S</given-names> </name></person-group><article-title>Computer use among older adults in a naturally occurring retirement community</article-title><source>Comput Human Behav</source><year>2007</year><month>11</month><volume>23</volume><issue>6</issue><fpage>3012</fpage><lpage>3024</lpage><pub-id pub-id-type="doi">10.1016/j.chb.2006.08.015</pub-id></nlm-citation></ref><ref id="ref37"><label>37</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Chang</surname><given-names>SI</given-names> </name><name name-style="western"><surname>Yen</surname><given-names>DC</given-names> </name><name name-style="western"><surname>Chang</surname><given-names>IC</given-names> </name><name name-style="western"><surname>Chou</surname><given-names>JC</given-names> </name></person-group><article-title>Study of the digital divide evaluation model for government agencies&#x2013;a Taiwanese local government&#x2019;s perspective</article-title><source>Inf Syst Front</source><year>2012</year><month>07</month><volume>14</volume><issue>3</issue><fpage>693</fpage><lpage>709</lpage><pub-id pub-id-type="doi">10.1007/s10796-011-9297-x</pub-id></nlm-citation></ref><ref id="ref38"><label>38</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Choudrie</surname><given-names>J</given-names> </name><name name-style="western"><surname>Pheeraphuttranghkoon</surname><given-names>S</given-names> </name><name name-style="western"><surname>Davari</surname><given-names>S</given-names> </name></person-group><article-title>The digital divide and older adult population adoption, use and diffusion of mobile phones: a quantitative study</article-title><source>Inf Syst Front</source><year>2020</year><month>06</month><volume>22</volume><issue>3</issue><fpage>673</fpage><lpage>695</lpage><pub-id pub-id-type="doi">10.1007/s10796-018-9875-2</pub-id></nlm-citation></ref><ref id="ref39"><label>39</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Fox</surname><given-names>G</given-names> </name><name name-style="western"><surname>Connolly</surname><given-names>R</given-names> </name></person-group><article-title>Mobile health technology adoption across generations: narrowing the digital divide</article-title><source>Information Systems Journal</source><year>2018</year><month>11</month><volume>28</volume><issue>6</issue><fpage>995</fpage><lpage>1019</lpage><pub-id pub-id-type="doi">10.1111/isj.12179</pub-id></nlm-citation></ref><ref id="ref40"><label>40</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Mann</surname><given-names>WC</given-names> </name><name name-style="western"><surname>Belchior</surname><given-names>P</given-names> </name><name name-style="western"><surname>Tomita</surname><given-names>MR</given-names> </name><name name-style="western"><surname>Kemp</surname><given-names>BJ</given-names> </name></person-group><article-title>Computer use by middle-aged and older adults with disabilities</article-title><source>TAD</source><year>2005</year><volume>17</volume><issue>1</issue><fpage>1</fpage><lpage>9</lpage><pub-id pub-id-type="doi">10.3233/TAD-2005-17101</pub-id></nlm-citation></ref><ref id="ref41"><label>41</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Peacock</surname><given-names>SE</given-names> </name><name name-style="western"><surname>K&#x00FC;nemund</surname><given-names>H</given-names> </name></person-group><article-title>Senior citizens and Internet technology</article-title><source>Eur J Ageing</source><year>2007</year><month>11</month><day>12</day><volume>4</volume><issue>4</issue><fpage>191</fpage><lpage>200</lpage><pub-id pub-id-type="doi">10.1007/s10433-007-0067-z</pub-id></nlm-citation></ref><ref id="ref42"><label>42</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Saunders</surname><given-names>EJ</given-names> </name></person-group><article-title>Maximizing computer use among the elderly in rural senior centers</article-title><source>Educ Gerontol</source><year>2004</year><month>08</month><volume>30</volume><issue>7</issue><fpage>573</fpage><lpage>585</lpage><pub-id pub-id-type="doi">10.1080/03601270490466967</pub-id></nlm-citation></ref><ref id="ref43"><label>43</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Selwyn</surname><given-names>N</given-names> </name><name name-style="western"><surname>Gorard</surname><given-names>S</given-names> </name><name name-style="western"><surname>Furlong</surname><given-names>J</given-names> </name><name name-style="western"><surname>Madden</surname><given-names>L</given-names> </name></person-group><article-title>Older adults&#x2019; use of information and communications technology in everyday life</article-title><source>Ageing Soc</source><year>2003</year><month>09</month><volume>23</volume><issue>5</issue><fpage>561</fpage><lpage>582</lpage><pub-id pub-id-type="doi">10.1017/S0144686X03001302</pub-id></nlm-citation></ref><ref id="ref44"><label>44</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Wildenbos</surname><given-names>GA</given-names> </name><name name-style="western"><surname>Peute</surname><given-names>L</given-names> </name><name name-style="western"><surname>Jaspers</surname><given-names>M</given-names> </name></person-group><article-title>Facilitators and barriers of electronic health record patient portal adoption by older adults: a literature study</article-title><source>Stud Health Technol Inform</source><year>2017</year><volume>235</volume><fpage>308</fpage><lpage>312</lpage><pub-id pub-id-type="medline">28423804</pub-id></nlm-citation></ref><ref id="ref45"><label>45</label><nlm-citation citation-type="web"><person-group person-group-type="author"><collab>Population</collab></person-group><source>United States Census Bureau</source><year>2022</year><access-date>2022-07-22</access-date><comment><ext-link ext-link-type="uri" xlink:href="https://www.census.gov/topics/population.html">https://www.census.gov/topics/population.html</ext-link></comment></nlm-citation></ref><ref id="ref46"><label>46</label><nlm-citation citation-type="web"><person-group person-group-type="author"><name name-style="western"><surname>McFadden</surname><given-names>D</given-names> </name></person-group><article-title>Quantitative methods for analyzing travel behaviour of individuals: some recent developments</article-title><source>Cowles Foundation Discussion Papers</source><year>1977</year><access-date>2025-07-26</access-date><publisher-name>EliScholar</publisher-name><comment><ext-link ext-link-type="uri" xlink:href="https://elischolar.library.yale.edu/cowles-discussion-paper-series/707/">https://elischolar.library.yale.edu/cowles-discussion-paper-series/707/</ext-link></comment></nlm-citation></ref><ref id="ref47"><label>47</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Scheunemann</surname><given-names>LP</given-names> </name><name name-style="western"><surname>Ernecoff</surname><given-names>NC</given-names> </name><name name-style="western"><surname>Buddadhumaruk</surname><given-names>P</given-names> </name><etal/></person-group><article-title>Clinician-family communication about patients&#x2019; values and preferences in intensive care units</article-title><source>JAMA Intern Med</source><year>2019</year><month>05</month><day>1</day><volume>179</volume><issue>5</issue><fpage>676</fpage><lpage>684</lpage><pub-id pub-id-type="doi">10.1001/jamainternmed.2019.0027</pub-id><pub-id pub-id-type="medline">30933293</pub-id></nlm-citation></ref><ref id="ref48"><label>48</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Trees</surname><given-names>AR</given-names> </name><name name-style="western"><surname>Ohs</surname><given-names>JE</given-names> </name><name name-style="western"><surname>Murray</surname><given-names>MC</given-names> </name></person-group><article-title>Family communication about end-of-life decisions and the enactment of the decision-maker role</article-title><source>Behav Sci (Basel)</source><year>2017</year><month>06</month><day>7</day><volume>7</volume><issue>2</issue><fpage>36</fpage><pub-id pub-id-type="doi">10.3390/bs7020036</pub-id><pub-id pub-id-type="medline">28590407</pub-id></nlm-citation></ref><ref id="ref49"><label>49</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Setterlund</surname><given-names>D</given-names> </name><name name-style="western"><surname>Tilse</surname><given-names>C</given-names> </name><name name-style="western"><surname>Wilson</surname><given-names>J</given-names> </name><name name-style="western"><surname>Mccawley</surname><given-names>AL</given-names> </name><name name-style="western"><surname>Rosenman</surname><given-names>L</given-names> </name></person-group><article-title>Understanding financial elder abuse in families: the potential of routine activities theory</article-title><source>Ageing Soc</source><year>2007</year><month>07</month><volume>27</volume><issue>4</issue><fpage>599</fpage><lpage>614</lpage><pub-id pub-id-type="doi">10.1017/S0144686X07006009</pub-id></nlm-citation></ref><ref id="ref50"><label>50</label><nlm-citation citation-type="journal"><person-group person-group-type="author"><name name-style="western"><surname>Peterson</surname><given-names>JC</given-names> </name><name name-style="western"><surname>Burnes</surname><given-names>DPR</given-names> </name><name name-style="western"><surname>Caccamise</surname><given-names>PL</given-names> </name><etal/></person-group><article-title>Financial exploitation of older adults: a population-based prevalence study</article-title><source>J Gen Intern Med</source><year>2014</year><month>12</month><volume>29</volume><issue>12</issue><fpage>1615</fpage><lpage>1623</lpage><pub-id pub-id-type="doi">10.1007/s11606-014-2946-2</pub-id><pub-id pub-id-type="medline">25103121</pub-id></nlm-citation></ref><ref id="ref51"><label>51</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Brubaker</surname><given-names>JR</given-names> </name><name name-style="western"><surname>Callison-Burch</surname><given-names>V</given-names> </name></person-group><article-title>Legacy contact: designing and implementing post-mortem stewardship at Facebook</article-title><conf-name>CHI&#x2019;16: CHI Conference on Human Factors in Computing Systems</conf-name><conf-date>May 7-12, 2016</conf-date><conf-loc>San Jose, CA</conf-loc><fpage>2908</fpage><lpage>2919</lpage><pub-id pub-id-type="doi">10.1145/2858036.2858254</pub-id></nlm-citation></ref><ref id="ref52"><label>52</label><nlm-citation citation-type="confproc"><person-group person-group-type="author"><name name-style="western"><surname>Mentis</surname><given-names>HM</given-names> </name><name name-style="western"><surname>Madjaroff</surname><given-names>G</given-names> </name><name name-style="western"><surname>Massey</surname><given-names>AK</given-names> </name></person-group><article-title>Upside and downside risk in online security for older adults with mild cognitive impairment</article-title><year>2019</year><month>05</month><day>2</day><conf-name>CHI &#x2019;19</conf-name><conf-date>May 4-9, 2019</conf-date><conf-loc>Glasgow, Scotland, UK</conf-loc><fpage>1</fpage><lpage>13</lpage><pub-id pub-id-type="doi">10.1145/3290605.3300573</pub-id></nlm-citation></ref></ref-list><app-group><supplementary-material id="app1"><label>Multimedia Appendix 1</label><p>Nationally representative survey sample.</p><media xlink:href="jmir_v27i1e69806_app1.docx" xlink:title="DOCX File, 20 KB"/></supplementary-material><supplementary-material id="app2"><label>Checklist 1</label><p>CHERRIES checklist.</p><media xlink:href="jmir_v27i1e69806_app2.docx" xlink:title="DOCX File, 21 KB"/></supplementary-material></app-group></back></article>