Establishing the Human Dimension of the Digital Divide

Establishing the Human Dimension of the Digital Divide

Helen Partridge (Queensland University of Technology, Australia)
Copyright: © 2004 |Pages: 25
DOI: 10.4018/978-1-59140-286-7.ch002
OnDemand PDF Download:
$37.50

Abstract

This chapter will explore the human dimension of the digital divide. It argues that existing digital divide research takes primarily a socio-economic perspective and that few studies have considered the social, psychological or cultural barriers that may contribute to digital inequality within community. This chapter will discuss an ongoing research project that explores the psychological factors that contribute to the digital divide. Using the Social Cognitive Theory, the research examines the Internet self-efficacy of Internet users and non-users in Brisbane, Australia and San Jose, California, USA. Developing a psychological perspective of the digital divide will expand current understanding of a phenomenon that has far reaching social and economic implications. It will allow a more precise understanding of what is and who represents the digital divide in community. Organisations who are involved in bridging the digital divide will be better placed to develop strategies and programs that can more effectively narrow the gap between ICT “haves” and “have-nots”.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Acknowledgments
Marian Quigley
Chapter 1
Barbara A. Schuldt
This chapter introduces ethical considerations that are especially relevant for the current networked world. It discusses the use of a mnemonic... Sample PDF
MAMA on the Web: Ethical Considerations for Our Networked World
$37.50
Chapter 2
Helen Partridge
This chapter will explore the human dimension of the digital divide. It argues that existing digital divide research takes primarily a... Sample PDF
Establishing the Human Dimension of the Digital Divide
$37.50
Chapter 3
Rasool Azari, James Pick
This chapter examines the influence of socio-economic factors on the employment, payroll, and number of enterprises of three technology sectors for... Sample PDF
Socio-economic Influence on Information Technology: The Case of California
$37.50
Chapter 4
Jack S. Cook, Laura Cook
Web accessibility is really not a technological issue but rather a cultural problem. A Web site is said to be Web accessible if anyone, regardless... Sample PDF
The Ethics of Web Design: Ensuring Access for Everyone
$37.50
Chapter 5
Alfreda Dudley-Sponaugle, Jonathan Lazar
When designing information systems, it is important to consider the needs of users with disabilities, including those with visual impairment... Sample PDF
Web Accessibility for Users with Disabilities: A Multi-faceted Ethical Analysis
$37.50
Chapter 6
Trisha Woolley, Craig Fisher
When designing information systems, it is important to consider the needs of users with disabilities, including those with visual impairment... Sample PDF
Internet Voting: Beyond Technology
$37.50
Chapter 7
Geoffrey A. Sandy
The Internet provides access to speech both conventional and unconventional. Some speech is considered harmful to minors. This chapter discusses the... Sample PDF
Protection of Minors from Harmful Internet Content
$37.50
Chapter 8
Marian Quigley
The rapid appropriation of mobile phone technology by young people is occurring at the same time as critics are debating the so-called demise of... Sample PDF
Mobile Communities and the "Generation that Beeps and Hums"
$37.50
Chapter 9
Laura Lally
In the post-9/11 environment, there has been an increasing awareness of the need for information security. This chapter presents an analysis of the... Sample PDF
Insights from Y2K and 9/11 for Enhancing IT Security
$37.50
Chapter 10
Leslie Leong, Andrzej T. Jarmoszko
The emphasis and increased awareness of information security require an understanding and knowledge of the technology that supports it. As the risks... Sample PDF
Cryptography: Deciphering Its Progress
$37.50
Chapter 11
Malcolm R. Pattinson
This chapter introduces a method of assessing the state of an organization’s information system security by evaluating the effectiveness of the... Sample PDF
A Method of Assessing Information System Security Controls
$37.50
Chapter 12
Neil F. Doherty, Heather Fulford
While the importance of the information security policy (ISP) is widely acknowledged in the academic literature, there has, to date, been little... Sample PDF
Information Security Policies in Large Organizations: The Development of a Conceptual Framework to Explore Their Impact
$37.50
Chapter 13
James E. Goldman, Vaughn R. Christie
This chapter introduces the Metrics Based Security Assessment (MBSA) as a means of measuring an organization’s information security maturity. It... Sample PDF
Metrics Based Security Assessment
$37.50
Chapter 14
Margherita Pagani
This chapter sets out to analyze the impact generated by the adoption of Digital Rights Management (DRM) processes on the typical Digital Media... Sample PDF
The Critical Role of Digital Rights Management Process
$37.50
About the Authors