Abstract
WeChat tweets have become an important way to spread knowledge of the importance of personal information security and to enhance older Chinese adults’ awareness of information security. Based on the knowledge adoption model and the elaboration likelihood model, this study identifies two types of tweets’ source features, that is, publisher type (official or unofficial) and author type (expert or non-expert). In addition, based on cognitive fit theory, this study explores the effects of the consistency and inconsistency between the two types of source features on the knowledge adoption intentions of older Chinese adults. The proposed research model is validated by carrying out a 2 × 2 between-subjects experiment, which also takes into account the three control variables of: “amount of readership,” “gender,” and “the perceived credibility of WeChat.” The results show that, compared with non-official tweets or non-expert tweets, official tweets or expert tweets are more conducive to enhancing older adults’ perception of the credibility and usefulness of the tweets and thus improve their knowledge-adoption intentions. However, the inconsistent combinations of unofficial and expert tweets and official and non-expert tweets can weaken the positive impact of official or expert sources on perceived credibility and usefulness. In addition, as the older adults’ perception of the relevance to themselves of personal information security increases and as their ability to process tweets strengthens, the influence of source features on perceived credibility and usefulness diminishes.
Keywords
Introduction
With the comprehensive implementation of various policies, such as strengthening the research and development of age-friendly information technology equipment and providing community training to promote older adults’ information skills, the barriers that previously stopped older adults from accessing the internet have been significantly reduced (Zhang et al., 2023). Widespread penetration of the internet by the older population is driving their growing demand for internet connectivity, browsing, and utilization (AARP Research, 2022). Nevertheless, the significant gap in information technology ownership, usage, and proficiency between older adults and other age groups means the awareness and practice of information security within the older demographic significantly lag behind their internet engagement (Bayne et al., 2023). The prevalence of internet scams has seen older adults falling prey to fake short videos or getting trapped in fraudulent schemes. This continues to undermine their sense of security in cyberspace (Moore & Hancock, 2020). Consequently, addressing the issue of how to enhance information security education is imperative (Bayne et al., 2023; Moore & Hancock, 2020). Steps must be taken to foster greater awareness among older adults and to facilitate their optimal utilization of the internet’s many advantages.
In 2019, China implemented the national strategy of “Strengthening Cybersecurity Awareness and Skills for All People.” Now, social media platforms such as WeChat (the predominant social media platform in China) have emerged as prominent and original channels through which personal information security knowledge can be disseminated (National Computer Network Emergency Response Coordination Center [CNCERT/CC], 2021). Via tweets, authoritative institutions and self-publishers utilize their WeChat public accounts to share with the public valuable knowledge on information security. Such knowledge can enhance older adults’ information literacy (Kim & Lee, 2023), transform their mindsets, and influence their behaviors regarding information security, ultimately contributing to their overall security posture. As a result, WeChat tweets have become the most efficient, cost-effective, and impactful means of promoting public information security education. WeChat serves as the primary gateway for older Chinese adults to access the internet (Shang et al., 2020), and therefore, WeChat tweets have also naturally become the main source of information security education for older adults. However, existing studies have emphasized that knowledge dissemination performance through social media is highly dependent on the recipients’ willingness to adopt knowledge (Hajli, 2016; Sussman & Siegal, 2003). This means that social media operators and tweet content creators need to fully understand the factors that influence recipients’ knowledge adoption intentions. This is also the critical path to effectively creating content and improving the performance of personal information security knowledge transfer. However, existing studies have only focused on exploring the factors that influence the adoption of social media–based health knowledge among older adults (Huo, Ma, et al., 2018; Huo, Zhang, & Ma, 2018; Shang et al., 2020). Consequently, there is an urgent need to systematically explore the influencing factors and the mechanism associated with older adults’ adoption intentions regarding social media–based personal information security knowledge.
Existing research based on the knowledge adoption model has emphasized the critical role of recipients’ perceptions of the credibility and usefulness of the information in shaping recipients’ knowledge adoption intentions (Hajli, 2016; Sussman & Siegal, 2003). Basing their studies on the elaboration likelihood model (ELM), some researchers have further proposed that, except for argument quality (which acts on the central route), source credibility (which acts on the peripheral route) is also an important factor in improving the recipient’s perceptions of information’s credibility and usefulness (Shahab et al., 2021). These studies have summarized the heuristic cues that are beneficial for improving source credibility (Sundar, 2008). The cues are manifested as various source features, such as reviewers’ ratings, reviewers’ reliability, and expertise (Hlee et al., 2019). Notably, older adults exhibit a higher level of trust (compared to other age groups) in information sources such as experts and official sources (Fung et al., 2023). Consequently, this study examines the influence of source credibility, characterized by a tweet’s publisher type (official or unofficial) and author type (expert or non-expert) on older adults’ perceived credibility, perceived usefulness, and knowledge adoption intention with regard to the published information. Inconsistency of information may undoubtedly interfere with recipients’ information decision-making (Mohammad et al., 2017). In spite of this fact, only a limited number of studies have paid attention to the potential effects of inconsistency between cues on perceived usefulness and perceived credibility (Li et al., 2024). In this vein, this study fills the abovementioned research gap by exploring the interaction effect of these two source features on perceived usefulness and perceived credibility.
Furthermore, existing researchers have found that the recipients’ information processing capability (Arendt et al., 2018; Shahab et al., 2021) and information involvement (Tang, 2016; Tang & Wu, 2022) can potentially diminish the positive effect of peripheral cues (such as source credibility) on knowledge adoption. However, due to age-related cognitive limitations, older adults generally possess lower levels of information processing capability than other age groups (Fung et al., 2023). In addition, due to the prevalence of cyber fraud and scams that target older adults, the elderly often consider themselves as marginal groups in cyberspace (Bayne et al., 2023; Van den Broeck et al., 2015). This results in the elderly’s generally low awareness of and limited attention to information security (Ebner et al., 2020), which may create obstacles to their involvement in learning about personal information security. Therefore, this study further investigates whether these two factors can continue to weaken the facilitating effect of peripheral cues on older adults’ knowledge adoption intentions. The results provide more empirical evidence that helps to deepen the understanding of the influence mechanism of peripheral cues on older adults’ adoption intentions toward social media–based personal information security knowledge.
Theoretical Foundation and Literature Review
Knowledge Adoption Model
Knowledge transfer encompasses activities that facilitate the flow of knowledge from one person, group, or organization to another (Sussman & Siegal, 2003). At the individual level, knowledge transfer focuses on how individuals apply the knowledge acquired in one context to another context (Sussman & Siegal, 2003). Knowledge adoption, a crucial process in the knowledge management cycle, refers to the internalization phase of knowledge transfer (Chou et al., 2015). During this phase, individuals transform explicit information into internalized knowledge and meaning (Hardy et al., 2018). This transformation reflects the extent to which individuals utilize (adopt) the transferred knowledge (Huo, Zhang, & Ma, 2018). Therefore, in the context of online platforms, knowledge adoption is defined as the willingness of recipients to accept, implement, or utilize the knowledge they acquired online (Chou et al., 2015).
The knowledge adoption model emphasizes the recipient’s perception of information usefulness and credibility as the primary factors influencing the recipient’s knowledge adoption (Sussman & Siegal, 2003). This model has been extensively applied in the study of knowledge adoption across various domains. Examples include information adoption behavior in online virtual communities (Chou et al., 2015), social media platforms (Erkan & Evans, 2016; Huo, Zhang, & Ma, 2018), and e-commerce reviews (Tang & Wu, 2022). The widespread use of this model confirms its universal relevance in understanding various knowledge adoption phenomena. Studies based on this model have further proposed that, for a given piece of information, apart from the quality of the information itself, both the perceived usefulness and the trustworthiness of that information are primarily influenced by the source credibility of the information (Sussman & Siegal, 2003). “Source credibility” refers to the extent to which users believe that a source can provide objective and relevant information or knowledge, and the degree of that belief is based on the source’s expertise and authenticity (Chou et al., 2015). To be specific, “expertise” refers to the level of knowledge and experience that the source possesses regarding the topic related to the user’s information needs (Sussman & Siegal, 2003). For instance, information published by experts plays a vital role in promoting users’ comprehension of scientific texts (Tzu-Jung et al., 2014) and positively influences users’ evaluation of online health information (Huo, Ma, et al., 2018; Kostagiolas et al., 2014), which in turn facilitates knowledge adoption in these contexts. In addition, “authenticity” emphasizes the integrity and honesty of the information source (Sussman & Siegal, 2003). For example, e-commerce websites that acquire third-party authentication enhance consumers’ perception of the credibility of the platform’s information sources (Filieri et al., 2018). Similarly, information published by official hospital publications (as opposed to health care business-like publications) is more likely to contribute to the public’s perception of source credibility, thereby facilitating knowledge adoption (Huo, Zhang, & Ma, 2018).
ELM and the Knowledge Adoption Behavior of Older Adults
The ELM provides a solid theoretical foundation for studying this phenomenon and explains how people’s attitudes change through both the central and peripheral routes (Kitchen et al., 2014; Shahab et al., 2021). The model offers valuable insights for this study since the process by which older adults decide whether to adopt knowledge, based on their needs after reading tweets, can be viewed as the process of individual attitude change. The ELM is widely recognized as one of the most influential theoretical models for explaining consumers’ information processing behavior (Kitchen et al., 2014). The ELM elucidates the two ways in which individuals process cognitive information, namely the central route and the peripheral route (Petty & Cacioppo, 1986). The central route involves individuals carefully considering and evaluating the received information, based on their previous experiences and knowledge, thereby engaging in in-depth processing of that information (Petty & Cacioppo, 1986). Conversely, the peripheral route offers a quick way for individuals to accept or reject information. Taking this route emphasizes that individuals do not actively invest significant cognitive resources or effort in processing information events. Instead, they process the information briefly, relying on heuristic cues and other shortcuts (Petty & Cacioppo, 1986). Furthermore, the ELM posits that the outcome of an individual’s attitude change is influenced by three factors: (1) content strength, which refers to the quality of the information itself; (2) peripheral cues, such as source credibility; and (3) the likelihood of elaborate processing (Kitchen et al., 2014). Thus, when the likelihood of elaborate processing is high, individuals will be more inclined to thoroughly examine the content and consider other relevant material related to the news event. In these instances, such individuals are more susceptible to factors like content quality. Conversely, when the likelihood of elaborate processing is low, individuals tend to minimize cognitive effort and become more influenced by heuristic cues (Musuva et al., 2019; Shahab et al., 2021).
In this age of information explosion, it is hugely challenging and somewhat infeasible that information users will expend significant effort in reading every argument or topic in a tweet (Özkan & Tolon, 2015). Going a step further, older adults, who belong to the information-disadvantaged group, inherently struggle with screening and judging the quality of information (Zhang et al., 2023). Consequently, when evaluating arguments, older adults rarely engage in elaborate processing and are more influenced by heuristic cues (Bayne et al., 2023; Shao et al., 2019). Therefore, this study primarily focuses on examining the mechanism through which source features impact older adults’ willingness to adopt knowledge. However, existing research based on the ELM has also suggested that an individual’s motivation to engage in elaborate information processing (Tang & Wu, 2022) and their ability to process content (Arendt et al., 2018) are crucial factors that negatively influence the effect of heuristic cues. Therefore, this study further investigates whether older adults’ level of information involvement and their information processing capability both mitigate the impact of heuristic cues (such as source features) on their willingness to adopt knowledge.
Hypotheses Development and Research Model
Source Features of Tweets and Perceived Credibility
Perceived credibility refers to the overall perception of information receivers with regard to the credibility of transferred information (Tzu-Jung et al., 2014). Source credibility, as a core component of perceived credibility, is a fundamental requirement for the formation of users’ willingness to adopt information and knowledge (Chou et al., 2015). Sussman and Siegal (2003) highlighted how individuals consider various source characteristics—such as the expertise and credibility of the information publisher—when making judgments about source credibility. These two types of source features have consistently emerged as the most influential heuristic cues in terms of shaping user credibility judgments (Kitchen et al., 2014). Similarly, older adults, being an information-disadvantaged group, face inherent challenges in screening and identifying information (Bayne et al., 2023). This leads older adults to rely more heavily on heuristic cues during the knowledge acquisition process (Huo, Ma, et al., 2018).
Compared to unofficial public accounts, such as personal self-media, official public accounts associated with government agencies and public service organizations are better positioned to signify the authority and authenticity of the information source. This is particularly relevant in the field of information security, an area that, in recent years, has experienced increased regulation in China (CNCERT/CC, 2021). The complex, comprehensive, and important nature of information security has reinforced older individuals’ perception of the professionalism of the knowledge published within this domain (AARP Research, 2022). Consequently, older adults are more inclined to perceive the content of information security tweets published by official public accounts as being more credible. Furthermore, authorship serves as a critical cue for users when assessing content quality (Saarinen & Vakkari, 2013; Tang, 2016). The author’s expertise and popularity also contribute to the perceived professionalism and authority of the information (Tang, 2016). Therefore, providing information about the author’s expertise in tweets can reduce older adults’ uncertainty about the information and enhance their trust in both the source and content and ultimately increase the perceived credibility of the information (Huo, Ma, et al., 2018; Huo, Zhang, & Ma, 2018). Based on this, the following hypotheses are proposed:
H1: Compared to unofficial public accounts, older adults perceive that the credibility is higher when the tweet related to personal information security knowledge is published by official public accounts.
H2: Compared to non-expert authors, older adults perceive that the credibility is higher when the tweet related to personal information security knowledge is published by expert authors.
Source Features and Perceived Usefulness
Perceived usefulness refers to the extent to which information recipients perceive the information as being valuable in enhancing their knowledge in a specific domain (Li et al., 2024). Source expertise, on the other hand, stems from the information recipient’s overall perception of the skills or knowledge possessed by the source in a particular domain (Sussman & Siegal, 2003). The latter serves as a crucial determinant of the information recipient’s perception of the usefulness of the information (Sussman & Siegal, 2003).
In traditional environments, individuals can evaluate the professionalism of the publisher and author of the released information based on tangible cues, such as the physical office address of the organization and the actual title of the information publisher. By comparison, assessing the source’s professionalism becomes significantly challenging in an online environment (Chou et al., 2015; Filieri et al., 2018). For example, in an online environment, information is often disseminated through anonymous relationships and predominantly takes the form of asynchronous communication activities (Filieri et al., 2018). This leads older adults to rely more on other discernible cues within tweets, such as whether the tweets originate from an official organization or have been authored by an expert in a specific field. Older adults use such information to better evaluate the source’s professionalism.
In addition, the professionalism of personal information security knowledge goes significantly beyond the cognitive scope of ordinary people’s daily work and life (Van den Broeck et al., 2015). This unknown field of knowledge can enhance older adults’ risk perception (Ebner et al., 2020) and improve their inherent dependence on the concept of information being “official.” This provides them with a greater sense of confidence in the truthfulness (Carstensen & Hershfield, 2021) and utility (Fung et al., 2023) of the information being disseminated. Such higher risk perception also encourages older adults to trust “experts” and view the associated content as professional (Huo, Ma, et al., 2018). This trust in turn can lead older adults to find that the information source is substantially more credible and reliable (Arendt et al., 2018), consequently fostering a greater belief that the information can provide valuable insights to enhance their knowledge of information security. Thus, older adults’ perceived usefulness is higher when tweets are written by experts. The following hypotheses are therefore proposed:
H3: Compared to unofficial public accounts, older adults’ perceived usefulness is higher when the tweet related to personal information security knowledge is published in official public accounts.
H4: Compared to non-expert authors, older adults’ perceived usefulness is higher when the tweet related to personal information security knowledge is published by expert authors.
Interactive Effects of Publisher Type and Author Type on Perceived Credibility and Perceived Usefulness
According to cognitive fit theory, the key to influencing individual performance decisions lies in the matching relationship between problem representation and task type (Vessey & Galletta, 1991). The term “problem representation” refers to the ways in which problems are expressed, such as symbolic representations of tables or spatial representations of graphs. Meanwhile, problem-solving tasks are categorized into symbolic tasks (such as numerical retrieval) and spatial tasks (such as trend retrieval; Vessey, 1991). Previous research has suggested that cognitive fit only occurs when the problem representation and the problem-solving task are of the same type. This leads to consistent mental representations for problem-solving and facilitates faster and more accurate decision-making (Vessey & Galletta, 1991). Similarly, whether or not older adults adopt personal information security knowledge through tweets can be viewed as an information processing problem for the recipients. The processing performance of this problem is also influenced by the matching relationship between the representation of tweets and the task type. Specifically, due to the professionalism of personal information security knowledge, when older adults receive tweets about such knowledge, this task is represented as a retrieval task for professional text information. To enhance the quality of information processing efficiency, older adults will actively seek out symbolic representation-class information that aligns with the task type. However, if internal inconsistency is found within the symbolic class of information that defines the problem, this can hinder older adults’ extraction and comprehension of such information (Li et al., 2024). Hence, the consistency in the form of issue representation, which encompasses tweet publisher type and author type, plays a crucial role in older adults’ overall processing of the source feature information. This, in turn, impacts older adults’ overall perception of the source’s credibility and subsequently influences their evaluation of the credibility and usability of the content.
Specifically, the combination of official publishing bodies and expert authors, characterized by authority, formality, and professionalism, best exemplifies consistency in the representation of an issue (Shahab et al., 2021; Sussman & Siegal, 2003). Therefore, compared to the other three source feature combinations, the combination of these two types of source features best reflects the consistency of professionalism and authenticity connotations of problem characterization information. This combination also facilitates the cognitive fit between the issue representation and the task of processing tweet information (Guo & Li, 2022; Vessey, 1991; Vessey & Galletta, 1991), thereby enhancing older adults’ perception of the tweet content’s credibility and usability (Rafique et al., 2024). Based on this, the following hypothesis is proposed:
H5: Among the four combinations of source features, tweets published by an official public source and authored by an expert have the greatest impact on enhancing older adults’ perceived credibility (a) and perceived usefulness (b).
The current combination of non-professionals and non-experts also ensures a high level of consistency in the representational information that tweets lack in terms of expertise and authenticity. This consistency helps to reduce the cognitive effort required for older adults to evaluate the source of any given tweet (Li et al., 2024; Rafique et al., 2024). This consistency will further reduce the professional attributes of the content, enhance the tweets’ experiential attributes (Ebner et al., 2020), and make older people more likely to perceive the tweet as a casual conversation about personal information security, rather than a professional domain article on related knowledge (Kelton et al., 2010). All of this will serve to reduce older adults’ perception of the usefulness and credibility of the tweet (Rafique et al., 2024). Hence, the following hypothesis is proposed:
H6: Tweets posted by unofficial publishers and written by non-experts enhance the negative impact of existing source features (unofficial publisher or non-expert authors) on the perceived credibility (a) and usefulness (b) among older adults.
However, the combinations of official publishers and non-expert authors on the one hand and unofficial publishers and expert authors on the other hand are ambivalent representations of the two dimensions of publishing type and author type in terms of expertise (Li et al., 2024; Mohammad et al., 2017). These combinations increase the cognitive effort required for older adults to process the overall information from the source (Özkan & Tolon, 2015; Vessey & Galletta, 1991), causing them to question the authenticity of the publishing organization’s public account. They may even doubt the plausibility and professionalism of the experts. The use of such combinations may even lead to a sense of aversion toward the experts’ information. Therefore, for older adults, the combination of source features that exhibit inconsistent problem representation information adds to the cognitive burden when processing problem representation information (Guo & Li, 2022). Such combinations of source features interfere with the realization process of cognitive matching and consequently diminish the influence of each of these features in enhancing older adults’ perceived trustworthiness and usability. Hence, the following hypothesis is proposed:
H7: The combinations of unofficial publishers and expert authors and official publishers and non-expert authors diminish the positive effects of existing source features (official publisher or expert authors) on perceived credibility (a) and perceived usefulness (b).
Perceived Credibility, Perceived Usefulness, and Knowledge Adoption Intention
Previous studies have demonstrated that the features of credible sources (such as experts and authorities) play a crucial role in guiding information receivers’ decision-making processes through a peripheral path rather than complex cognitive processes (Sussman & Siegal, 2003). Therefore, the higher the perceived credibility of personal information security knowledge tweets among older adults is, the more motivated those older adults will be to actively adopt the knowledge conveyed in the tweets. Furthermore, information recipients perceive that content that helps them familiarize themselves with the information and evaluate its quality before making decisions encourages them to be more willing to adopt the content (Filieri et al., 2018). This suggests that older adults’ willingness to adopt knowledge is stronger when they perceive that the content in the tweets is beneficial to enhancing their awareness of information security. Based on these observations, the following hypotheses are proposed:
H8: Perceived credibility positively influences older adults’ adoption intentions of personal information security knowledge from tweets.
H9: Perceived usefulness positively influences older adults’ adoption intentions of personal information security knowledge from tweets.
Moderating Effect of Information Processing Capability on Source Features, Perceived Credibility, and Perceived Usefulness
The term “information processing capability” refers to an individual’s capacity to engage in mental processing tasks, such as discovering, categorizing, organizing, and ultimately making decisions about information (Özkan & Tolon, 2015). However, when individuals are exposed to large amounts of information—both in terms of quantity and quality—than their information processing capacity allows, they may experience information overload. This will lead to suboptimal decision-making and non-exhaustive evaluation processes (Özkan & Tolon, 2015). In other words, individuals with weaker information processing capabilities are more likely to encounter information overload when exposed to the same amount of information as individuals with stronger abilities. This will result in there being insufficient time to evaluate all the information and potentially missing critical components (Gao et al., 2012). This limited capacity to process, respond to, and comprehend information increases the likelihood that, when there is insufficient information, individuals will rely more heavily on heuristic cues to assess the overall content (Arendt et al., 2018; Gao et al., 2012). What is evident is that the weaker an older person’s information processing skills are, the more difficult it is for them to handle the content of tweets. This, in turn, makes it more difficult for them to assess the credibility and usefulness of the content of tweets using the central pathway. Consequently, they are more likely to rely on the peripheral pathway, where heuristic cues (such as the publication type, topic, and author’s expertise) play a more prominent role in influencing their evaluations. Hence, the following hypotheses are proposed:
H10: The weaker the information processing capability of older adults, the stronger the effect of publisher type on perceived credibility (a) and perceived usefulness (b).
H11: The weaker the information processing capability of older adults, the stronger the effect of author type on perceived credibility (a) and perceived usefulness (b).
Moderating Effect of Information Involvement on Source Features With Perceived Credibility and Perceived Usefulness
The term “information involvement” refers to the degree to which individuals perceive the content of information as relevant to their own interests and needs (Tang, 2016). Previous research has demonstrated that, when individuals perceive low involvement or low relevance to themselves, they engage in less elaborate information processing. Conversely, when individuals perceive high involvement or high relevance to themselves, they are highly motivated to process the information and exert cognitive efforts to thoroughly analyze that information (Sussman & Siegal, 2003). Consequently, individuals who deem themselves to be highly involved in the information are more likely to utilize the central route of processing (Tang & Wu, 2022). Conversely, in their evaluation processes, individuals with lower involvement are more inclined to rely on peripheral cues, such as the credibility of the information source (Kitchen et al., 2014). Similarly, although older adults often perceive themselves as being marginalized in the digital society, the increasing instances of older adults falling victim to online fraud have heightened their risk perceptions in the realm of cyberspace (Bayne et al., 2023). As a result, more older adults have developed a heightened sense of involvement in information security tweets. The greater the level of information involvement is, the more likely older adults are to perceive the content of tweets as personally relevant. This increased motivation to process the information leads them to rely more heavily on the quality of the content and arguments, rather than the source characteristics, when assessing the credibility and usefulness of the information. Based on these observations, the following hypotheses are proposed:
H12: The stronger the information involvement of older adults, the weaker the effect of publisher type on perceived credibility (a) and perceived usefulness (b).
H13: The stronger the information involvement of older adults, the weaker the effect of author type on perceived credibility (a) and perceived usefulness (b).
The research framework is shown in Figure 1.

The research framework.
Research Methodology
Experimental Design
In this study, the scenario experiment method is employed to validate the research model. The experimental design consists of a between-group experiment with a 2 (publisher type: official, unofficial) × 2 (author type: expert, non-expert) framework. Preventing elderly people from being scammed online is a key focus of information security education in China (CNCERT/CC, 2021). Therefore, the tweet is themed around authentic materials pertaining to the improvement of personal financial information security for older adults.
The manipulation design of specific variables is illustrated in Figure A1 (in Appendix A). For information sourced from official public accounts, a prompt was displayed to participants, stating: “The following is a tweet related to personal information security knowledge, which was published by the Public Account ‘Network Information Security Education’. This public account is registered by the Level Evaluation Center of Information Security Protection Education. The center is a third-party testing and evaluation organization approved by the Personnel Department of the Ministry of Education of China. The center is also affiliated with the Education Management Information Center of the Ministry of Education of China, which provides a range of security services, such as information system security level evaluation, risk assessment, confidential evaluation, off-site disaster recovery services, information security protection training and education, and so on.” In contrast, for information originating from an unofficial public account, the prompt displayed was: “The following is a tweet related to personal information security education, which was issued by the public account ‘Information Security DaWenjing.’ The public account ‘Information Security Dawenjing’ focuses on popularizing and promoting security and provides the public with the latest information on information security and review articles.” After carefully reading all the experiment materials, each participant was required to fill in the questionnaire.
The questionnaire used in this study incorporated various items from relevant literature. Minor modifications were incorporated to align with the themes of the scenarios. To assess perceived usefulness, three items were adapted from the work of Sussman and Siegal (2003). These items include: “I believe that adopting this tweet’s content can enhance personal awareness of financial information security protection.” “I believe that adopting this tweet’s content can improve the effectiveness of financial information security protection for myself.” “I believe that adopting this tweet’s content is beneficial for my own financial information security protection.” Perceived credibility was evaluated using three items from the study by Sussman and Siegal (2003). These items were: “I believe the tweet’s content is true.” “I believe the tweet’s content is accurate.” “I believe the tweet’s content is trustworthy.”
Furthermore, information processing capability was measured using six items from Özkan and Tolon (2015). The items include: “It is difficult for me to comprehend the content of this tweet.” “It is challenging for me to internalize the content of this tweet.” “Sometimes, I find it difficult to concentrate on the content of this tweet.” “I feel anxious when evaluating the content of this tweet.” “I feel overwhelmed when evaluating the content of this tweet.” “I do not feel in control when evaluating the content of this tweet.”
Information involvement was measured by using two items from the study by Sussman and Siegal (2003), including “The topic of this tweet is very relevant to me” and “Much of this tweet is something I have thought about recently.” Knowledge adoption intention was measured using three items from the study by Sussman and Siegal (2003), including: “I will focus on increasing my awareness of information security in finance.” “I will take steps to prevent information security incidents in finance.” “I will actively take steps to protect the security of my personal information in finance.”
A manipulation check was adopted to assess the correctness of the experimental design. Table B1 (in Appendix B) shows the detail regarding the manipulation of the test questions for each variable. Finally, participants’ evaluations of the authenticity of the experimental scenarios were tested with the item, “I think the tweet-reading scenarios described in this questionnaire are authentic.” All of the above items were measured using a seven-point Likert-type scale.
Experimental Procedure
Pre-Experiment
In accordance with the World Health Organization’s definition of older adults (i.e., individuals aged 60 years and above), a pre-experiment was conducted to ensure the validity and accuracy of the experimental design. Due to the fact that the amount of readership often affects a reader’s first impression of the quality and dissemination of tweets, which may interfere with the effectiveness of source features, the amount of readership was considered as a control variable. Thus, a 12-group experimental scenario was formed with a 2 (publisher type: official or unofficial) × 2 (author type: expert or non-expert) × 3 (information about the amount of readership: none, high, or low) design.
From May 20 to May 27, 2022, a total of 120 older adults were invited to participate in this pre-experiment. A professional questionnaire collection platform (wenjuanxing.com) was employed to distribute the questionnaires. Participants who successfully completed the survey were compensated with US $2 per questionnaire. The 120 participants were randomly assigned to 12 groups of 10 individuals each. To ensure the questionnaire’s validity, participants were required to spend a minimum of 120 seconds completing it.
The findings from the pre-experiment indicate that the questionnaire has high reliability. The Cronbach’s α values range from .799 to .823 for each variable, suggesting a high level of reliability. In addition, as shown in Table B1 in Appendix B, the manipulation test results confirm the validity of the different scenario designs concerning the publisher type, author type, and the amount of readership. However, the mean score for participants’ perceived authenticity of the scenarios in the “no information about the amount of readership” group was observed to be significantly lower (
Formal Experiment
Based on the conclusions of the pre-experiment, a formal experiment with 2 (publisher type: official or unofficial) × 2 (author type: expert or non-expert) × 2 (information about the amount of readership: high or low) design was conducted from June 10 to June 20, 2022. Due to the readers’ perceived credibility of WeChat also affecting their perception of the quality and trustworthiness of the tweets published on this platform, this factor was considered as another control variable. One item “I believe that WeChat is trustworthy” with a seven-point Likert-type scale was adopted to measure this variable. In all, 281 participants were recruited through the previously-mentioned professional questionnaire collection platform (wenjuanxing.com). To ensure the validity of the data, 22 questionnaires that were completed in less than 120 seconds and 19 questionnaires that consistently provided the same answer to all questions were deemed invalid and were therefore excluded from the analysis. Ultimately, 240 valid questionnaires were obtained. The participants were randomly assigned to eight groups, with each group consisting of 30 individuals. Table 1 provides a summary of the sample information.
Basic Information About the Samples.
Experimental Result
Assessing the Measurement Model
The measurement model was rigorously evaluated using structural equation modeling with AMOS 22.0 software. The results of the confirmatory factor analysis yielded the following statistical values:
The Questionnaire’s Reliability and Validity Test Results.
Manipulation Test
Table B1 in Appendix B shows the results of the manipulation test, which indicate that the experimental scenario design is aligned with this study’s expectations. In addition, the results of an independent samples
Hypothesis Testing
To test Hypotheses H1–H7, MANCOVA (multivariate analysis of covariance) was conducted using SPSS 23.0 software. The Pearson correlation coefficient of perceived credibility and usefulness is 0.493 (
The results of the MANCOVA analysis reveal a significant covariate of perceived credibility of WeChat (
The interaction effects of both publisher type and author type on perceived credibility (

The interactive impact of publisher type and author type on perceived credibility.

The interactive impact of publisher type and author type on perceived usefulness.
The results of the simple effect analysis (see Tables 3 and 4) further reveal the interaction effects. The findings show that when inconsistencies occur between source features, the readers’ perceptions of the credibility (
The Simple Effect Analysis Results of Publisher Type and Author Type on Perceived Credibility.
The Simple Effect Analysis Results of Publisher Type and Author Type on Perceived Usefulness.
However, the influence of publisher type on perceived credibility was significant only when the information was written by an expert (
A MANCOVA was also adopted to evaluate the effects of the other two control variables (i.e., the amount of readership and gender). As shown in Table B2 (Appendix B), the interaction effects of these two control variables with the two independent variables were not significant. This indicates that the influence of these two control variables was controlled, thus further validating the robustness of the model.
Hypotheses H8 and H9 were tested using Amos 22.0 software. The results indicate that a positive relationship exists between the perceived credibility of information among older adults and their knowledge adoption intentions (
Test of Moderating Effects
To verify Hypotheses H10 and H11, this study first categorized the publisher type as either official (coded as “1”) or unofficial (coded as “0”); the author type was categorized as either experts (coded as “1”) or non-experts (coded as “0”). Then, the product terms were calculated by multiplying these dummy variables with information processing capability. The moderating effect of information processing capability was tested using hierarchical regression analysis. The results are presented in Tables 5–8. The product term of publisher type and information processing capability show a significant effect on both perceived credibility (
The Moderating Effect of Information Processing Capability on the Relationship Between Publisher Type and Perceived Credibility.
The Moderating Effect of Information Processing Capability on the Relationship Between Publisher Type and Perceived Usefulness.
The Moderating Effect of Information Processing Capability on the Relationship Between Author Type and Perceived Credibility.
The Moderating Effect of Information Processing Capability on the Relationship Between Author Type and Perceived Usefulness.
Similarly, this study employed hierarchical regression analysis to examine the moderating effect of information involvement. In Tables 9–12, the results indicate that the interaction between the publisher type and information involvement significantly impacts perceived credibility (
The Moderating Effect of Information Involvement on the Relationship Between Publisher Type and Perceived Credibility.
The Moderating Effect of Information Involvement on the Relationship Between Publisher Type and Perceived Usefulness.
The Moderating Effect of Information Involvement on the Relationship Between Author Type and Perceived Credibility.
The Moderating Effect of Information Involvement on the Relationship Between Author Type and Perceived Usefulness.
Discussion
The results of this study reveal that the two kinds of source features of WeChat tweets about personal information security knowledge (i.e., publisher type and author type) affect older adults’ perception of the credibility and usefulness of the tweet content. This in turn affects their knowledge adoption intention. Compared to unofficial tweets and/or tweets written by non-experts, official tweets and/or tweets written by experts are perceived by older adults as being more credible and useful. This finding indicates that older adults rely on heuristic cues and tend to process tweet information through the peripheral path. Several factors contribute to this preference for heuristic cues. First, older adults may lack confidence in their ability to discern accurate information. This is evidenced by lower self-report scores and lower information literacy, compared to younger groups (Kim & Lee, 2023; Van den Broeck et al., 2015). Consequently, older adults are more inclined to avoid detailed processing of content from the central pathway (Musuva et al., 2019). Furthermore, older adults tend to place blind trust in authoritative sources (Ebner et al., 2020). This is especially due to the highly professional and novel nature of personal information security knowledge. These factors reinforce Chinese older adults’ feeling of unfamiliarity with this type of knowledge, as well as their perception of a gap between this type of knowledge and their own existing body of knowledge (Zhang et al., 2023). Therefore, information published by officials or written by experts is more likely to be perceived by older adults as being both credible and useful, subsequently increasing their knowledge adoption intention.
However, the impact of source features on older adults’ perception of the credibility and usefulness of WeChat tweets on personal information security knowledge is influenced by the two source features’ internal consistency. This consistency is reflected in whether these source features equally transmit credible and available information to the older adults. When WeChat tweets are both officially published and written by experts, older adults perceive the tweets to be highly credible and useful. However, when tweets are unofficially published but written by experts, or when the tweets are officially published but written by non-experts, both the perceived credibility and perceived usefulness diminish among older adults. This finding emphasizes the importance of cognitive matching in older adults’ information processing of WeChat tweets. When inconsistent information is presented by two different types of sources (specifically in terms of authority and expertise), this hampers the ability of older adults to judge the credibility of the information. This inconsistency increases the cognitive load on the representation of the problem, which in turn makes matching the problem type with its representation challenging (Vessey, 1991; Vessey & Galletta, 1991). Consequently, the older adults’ perception of the credibility and usefulness of the overall content is affected. Furthermore, inconsistent information about sources weakens the positive impact of authoritative and expert information on perceived credibility and usefulness. This may be due to the fact that information that may appear to have contradictory meanings raises doubts about previously-acquired information, leading to self-skepticism (Li et al., 2024; Mohammad et al., 2017). As a result, not only does this self-doubt reduce the evaluation of the credibility of the source; self-doubt also causes older adults to focus their attention on inconsistent information features or to shift to the central path of information processing. Consequently, the positive effect of prior information on perceived credibility and usefulness is diminished, possibly to a level even lower than that of unofficial WeChat tweets written by non-experts. This finding further explains the positive impact of internal consistency in information presentation on the information-task fit, which is favored as a way to reduce cognitive load (Guo & Li, 2022). Thus, this study fully echoes calls from previous research to pay attention to the influence of the presentation of diverse information on cognitive fit in task-specific contexts (Kelton et al., 2010).
In addition, in the context of aging and decreasing cognitive ability, older adults generally have weaker information processing abilities (Bayne et al., 2023). Despite this fact, this study still finds that the stronger the information processing capability of older adults is, the less they are influenced by source features. This ability means the older adults are more likely to shift their processing path from the peripheral path to the central path. They are also less likely to be swayed by the type of publisher and author when it comes to their perceptions of tweets’ credibility and perceived usefulness. Conversely, older adults with weaker information processing abilities tend to experience information overload in information-rich cyberspace (Özkan & Tolon, 2015). This causes such adults to rely more on heuristic cues to organize and judge the credibility and usefulness of tweets.
This study also delves deeper into the impact of information involvement on the relationship between source features and the way individuals perceive the credibility and usefulness of content. The findings reveal that, when older adults perceive information security knowledge in WeChat tweets as being important and relevant to their lives, their high level of information involvement weakens the influence of source features on the older adults’ perceptions of the credibility and usefulness of those tweets. This finding suggests the existence of selective cognition in the process of knowledge adoption, wherein individuals are inclined to pay attention to information that aligns with their existing interests, habits, and needs (Carstensen & Hershfield, 2021). Consequently, under the influence of selective cognition, older adults’ information processing shifts from a broad overview to a more detailed analysis. This, in turn, diminishes the role of heuristic cues in promoting knowledge adoption.
Implications and Limitations
Theoretical Implications
This study makes significant contributions by constructing a comprehensive research model based on the knowledge adoption model and the ELM. The research model focuses on the dissemination of personal information security knowledge through WeChat public account tweets. In addition, the model systematically examines the features of tweet sources that enhance the older adults’ knowledge adoption intentions. The contributions can be divided into three main parts.
First, this study explains the influence of two types of source features—the publisher type and the author type—on the knowledge adoption intention of older adults. The study reveals that older adults tend to trust authoritative and professional information sources, such as official public accounts and expert authors. Consequently, older adults perceive the content of such tweets to be credible and usable, which in turn enhances their intention to adopt knowledge. This study therefore expands the application of the knowledge adoption model and the ELM in explaining the information processing behavior of older adults. In addition, this study also addresses the gap in existing research that has predominantly focused on the health-information-seeking behavior of older adults, while neglecting their information security knowledge learning behavior.
Second, some researchers have found that the consistency between the heuristic cues and the argument itself is essential for reducing the difficulty of individual information processing. However, this study focuses on examining the impact of the inherent consistency of source features, such as authority and expertise, in interacting with perceived credibility and perceived usefulness among older adults. The results lead to an enhancement of the understanding of how heuristic cues influence information processing. In addition, this study reveals the negative effect of inconsistency on trustworthiness and usefulness features. These findings provide new explanatory variables for comprehending the cognitive pathways of information processing in older adults. This is because, compared to other age groups, processing WeChat tweets on personal information security knowledge can lead to higher cognitive pressure for older adults.
Furthermore, this study introduces new variables to help elucidate the role of heuristic cues in the information processing process of older adults. This is done by discovering how both information processing capability and information involvement moderate the relationship between tweet source features and older adults’ perceptions of the credibility and usefulness of the tweets. This highlights the importance of considering individual differences in information processing abilities when examining the influence of source characteristics. By understanding these dynamics, relevant parties can better tailor information-dissemination strategies to meet the needs of older adults with different processing abilities. In addition, the findings of this study underscore the importance of considering the role of information involvement, particularly among older adults, when designing effective communication strategies. By recognizing the selective nature of information processing, communicators can tailor their messages to align with the specific interests and needs of their target audience, thereby enhancing the likelihood of knowledge adoption.
Managerial Implications
The findings of this study offer valuable insights into how personal information security education for older adults can be enhanced through the use of WeChat public accounts. First, considering that older adults tend to place greater trust in tweets from professional and authoritative sources, this study recommends that official organizations leverage this inclination by establishing official public accounts specifically dedicated to personal information security. These public accounts should focus on disseminating authoritative, scientific, and reliable information. By doing so, these accounts can effectively address the information needs of the elderly population. Also crucial is ensuring that tweet authors are aligned with the official background and that they maintain consistency in their expertise. Industry experts and institutional professionals should be encouraged to actively participate in writing tweets on personal information security knowledge, based on their own professional characteristics. This could contribute greatly to the dissemination of scientifically sound and practical information to older adults through official public accounts. Also important is that relevant organizations prioritize the professional verifications of tweet authors. This type of scrutiny is necessary to avoid any inconsistencies between an author’s expertise and their official background. Such inconsistencies not only undermine the credibility and usability of the content and knowledge evaluated by older adults, but also damage the official and professional image of actual officials and experts.
In addition, the impact of source characteristics on older adults’ willingness to accept tweets highlights the need for collaboration between WeChat public account management organizations and relevant departments. This is necessary to enhance the management of WeChat public accounts and their tweets and will be crucial in preventing fake public accounts from exploiting older adults’ inclination to trust officials and experts. This step would also help prevent the dissemination of false information on information security. Furthermore, strengthening personal information security education for older adults and increasing their awareness in this domain are imperative. The operators of WeChat public accounts should also focus on developing content that is suitable for older adults, avoiding the complexity of current personal information security education tweets. By doing so, the cognitive load associated with processing the content will be reduced, thereby enabling older adults to more effectively process the information. This approach will help diminish the influence of heuristic cues on older adults’ information processing, encouraging them to utilize the central path for processing tweets. By avoiding excessive reliance on peripheral paths, which may result in shallow or superficial knowledge adoption or even blind acceptance, older adults can make more informed decisions regarding the information they encounter.
Research Limitations
This study has three primary research limitations that need to be acknowledged. First, this study only focuses on the elderly population in China and the information security education of China’s largest social media platform as the background. Therefore, future research can apply the research model of this study to other countries and social media platforms, to verify the universality of this study’s research conclusions. Second, it is worth noting that previous studies have suggested dividing the older population into two groups: younger senior adults (aged 60–75 years) and older senior adults (aged 75 years and above). This division would allow for a more in-depth exploration of the impact of physiological aging on the information processing behavior of older adults. Subsequent studies could therefore expand on this aspect to gain a more comprehensive understanding of the subject matter. Finally, due to the weaker information-screening ability of older adults (compared to other age groups), the experimental design of this study only considers tweet materials with authentic and reliable content. Consequently, tweets containing false information are not taken into account. To complement the role of authenticity in tweeted information on the perceived credibility and usefulness among older adults, future research could conduct a comparative study.
Footnotes
Appendix A
Appendix B
Results of Tests of Between-Subjects Effects (Considering the Other Two Control Variables).
| DV | IV |
|
|
|
|---|---|---|---|---|
| Perceived credibility | Author type | 26.039 | *** | 0.109 |
| Publisher type | 16.206 | *** | 0.071 | |
| Readership | 1.605 | 0.207 | 0.008 | |
| Gender | 0.506 | 0.679 | 0.007 | |
| Readership × Author type | 0.152 | 0.697 | 0.001 | |
| Readership × Publisher type | 1.778 | 0.184 | 0.008 | |
| Gender × Author type | 0.252 | 0.860 | 0.004 | |
| Gender × Publisher type | 0.763 | 0.516 | 0.011 | |
| Perceived usefulness | Author type | 22.319 | *** | 0.095 |
| Publisher type | 13.894 | *** | 0.062 | |
| Readership | 1.197 | 0.275 | 0.006 | |
| Gender | 0.729 | 0.536 | 0.010 | |
| Readership × Author type | 0.533 | 0.466 | 0.003 | |
| Readership × Publisher type | 0.036 | 0.849 | 0.000 | |
| Gender × Author type | 0.785 | 0.504 | 0.011 | |
| Gender × Publisher type | 0.196 | 0.899 | 0.003 |
Declaration of Conflicting Interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: The authors thank the support from the Natural Science Foundation Project of China (no. 72302029), the Science and Technology Research Program of Chongqing Municipal Education Commission (no. KJZD-K202400611), and Chongqing Spoken and Written Language Research Project (no. yyk24103).
