Search results

1 – 10 of over 20000
Book part
Publication date: 12 December 2015

Kuo-Ting Huang, Laura Robinson and Shelia R. Cotten

This paper makes a significant contribution to the growing field of digital inequality research by developing an operational definition of emotional costs. To examine this…

Abstract

Purpose

This paper makes a significant contribution to the growing field of digital inequality research by developing an operational definition of emotional costs. To examine this understudied aspect of digital inequalities, we build on Van Dijk’s concept of mental access. We define emotional costs as anxiety toward using information and communication technologies instigated by a lack of prior technology experience and limited computer access.

Methodology/approach

We examined the influence of emotional costs on lower-income students’ technology efficacy, academic efficacy, and computer application proficiency in the context of a computing intervention. Specifically, we examined the relationship between home and school computer usage with self-perceived technology efficacy, computer application proficiency, and academic efficacy. Data from surveys of 972 students were analyzed in order to better understand the importance of technology access on our outcome variables. We also investigated the possible mediation effects of emotional costs on our outcome variables.

Findings

The results revealed that home computer usage was a determinant of students’ self-perceived technology efficacy while shared school access was not. After conducting mediation tests, the results further indicated that emotional costs mediate the effects of home computer usage on technology efficacy.

Originality/value

We conclude that emotional costs might help explain why access inequalities lead to skill inequalities in the context of computing interventions and offer a replicable operational definition for future studies.

Details

Communication and Information Technologies Annual
Type: Book
ISBN: 978-1-78560-381-5

Keywords

Article
Publication date: 22 April 1993

Marwan A. Wafa, J. Michael McDonald and Mahmoud M. Yasin

This study examines computer usage patterns in the U.S. construction industry. One hundred and seven subjects, consisting of managers at different managerial levels and…

64

Abstract

This study examines computer usage patterns in the U.S. construction industry. One hundred and seven subjects, consisting of managers at different managerial levels and professional support staff, participated in this study. This study shows that the subjects exhibit significant differences with regard to their extent of use, nature of use, and degree of satisfaction with decision support systems. Implications of these findings to decision support systems design and effective utilization are discussed.

Details

American Journal of Business, vol. 8 no. 1
Type: Research Article
ISSN: 1935-5181

Keywords

Article
Publication date: 1 June 1997

Thompson S.H. Teo and Vivien K.G. Lim

In the 1960s, the Pentagon commissioned several computer scientists to build a systems of decentralised communication network that could remain functional in the event of a…

Abstract

In the 1960s, the Pentagon commissioned several computer scientists to build a systems of decentralised communication network that could remain functional in the event of a nuclear war. The result is the Arpanet, which initially linked up four universities. Over time, this network grew rapidly to interconnect numerous universities, research centres and commercial organisations, and became the technological underpinnings of the Internet.

Details

Equal Opportunities International, vol. 16 no. 6/7
Type: Research Article
ISSN: 0261-0159

Article
Publication date: 8 June 2012

Joyce Chapman and David Woodbury

The purpose of this paper is to encourage administrators of device‐lending programs to leverage existing quantitative data for management purposes by integrating analysis of…

1905

Abstract

Purpose

The purpose of this paper is to encourage administrators of device‐lending programs to leverage existing quantitative data for management purposes by integrating analysis of quantitative data into the day‐to‐day workflow.

Design/methodology/approach

This is a case study of NCSU Libraries' efforts to analyze and visualize transactional data to aid in the on‐going management of a device‐lending program.

Findings

Analysis and visualization of qualitative data related to technology lending revealed patterns in lending over the course of the semester, day, and week that had previously gone unrecognized. With more concrete data about trends in wait times, capacity lending, and circulation volume, staff are now able to make more informed purchasing decisions, modify systems and workflows to better meet user needs, and begin to explore new ideas for services and staffing models.

Practical implications

The concepts and processes described here can be replicated by other libraries that wish to leverage transactional data analysis and data visualization to aid in management of a device‐lending program.

Originality/value

Although much literature exists on the implementation and qualitative evaluation of device‐lending programs, this paper is the first to provide librarians with ideas for leveraging analysis of transactional data to improve management of a device‐lending program.

Article
Publication date: 1 February 2006

Esharenana E. Adomi and Silvester O. Anie

To assess the computer literacy skills/competencies of professional librarians in Nigerian university libraries.

1833

Abstract

Purpose

To assess the computer literacy skills/competencies of professional librarians in Nigerian university libraries.

Design/methodology/approach

Employs descriptive design using questionnaires to collect data from 57 professional librarians in four Nigerian university libraries.

Findings

Reveals the personal characteristics of the respondents, assessment of their levels of computer skills, computer use experience, avenues of computer literacy, software used, library routines computer is used for, benefits derived from computer and problems associated with computer use, recommendations are made in light of the findings.

Originality/value

Its findings will assist librarians and library managers to have insight into state of computer literacy among professionals in Nigerian university libraries and assist relevant authorities to plan how librarians, especially in developing countries, can become computer literate.

Details

Library Hi Tech News, vol. 23 no. 2
Type: Research Article
ISSN: 0741-9058

Keywords

Article
Publication date: 1 April 1981

B.H. RUDALL

ADA DEVELOPMENTS The ADA programming language project, which is supported by the U.S. Department of Defence, will have far reaching effects on both the programming and the design…

Abstract

ADA DEVELOPMENTS The ADA programming language project, which is supported by the U.S. Department of Defence, will have far reaching effects on both the programming and the design of future computers. Its original objects were to cater for the production of reliable, readable programs for communicating with computer systems. There was to be a formality of language definition and even simplicity in its concept. Whether these aims have been achieved at the design level is, as discussed in Kybernetes (10(3), 156, 1981), still the subject of controversy. Certainly Prof. C. A. R. Hoare (Oxford University, U.K.) has reservations.

Details

Kybernetes, vol. 10 no. 4
Type: Research Article
ISSN: 0368-492X

Article
Publication date: 20 November 2007

Ian Rowlands, David Nicholas, Hamid R. Jamali and Paul Huntington

The purpose of this article is to report on a large‐scale survey that was carried out to assess academic users' awareness, perceptions and existing levels of use of e‐books. The…

6371

Abstract

Purpose

The purpose of this article is to report on a large‐scale survey that was carried out to assess academic users' awareness, perceptions and existing levels of use of e‐books. The survey also seeks to find out about the purposes to which electronic books were put, and to obtain an understanding of the most effective library marketing and communication channels.

Design/methodology/approach

An e‐mail invitation to participate in the survey was distributed to all UCL staff and students (approximately 27,000) in November 2006, and 1,818 completions were received, an effective response rate of at least 6.7 per cent. Statistical analyses were carried out on the data using Software Package for Social Sciences (SPSS).

Findings

The survey findings point to various ways in which user uptake and acceptance of e‐books may be encouraged. Book discovery behaviour, a key issue for publishers and librarians in both print and electronic environments, emerges as a critical focus for service delivery and enhancement.

Originality/value

The survey is part of an action research project, CIBER's SuperBook, that will further investigate the issues raised in this initial benchmarking survey using deep log analysis and qualitative methods. The paper partly fills the gap in the literature on e‐books which has mainly focused on usage and not the users.

Details

Aslib Proceedings, vol. 59 no. 6
Type: Research Article
ISSN: 0001-253X

Keywords

Book part
Publication date: 27 January 2012

Kent J. Smith, Jennifer Grimm, Anne E. Lombard and Brandon Wolfe

On September 22, 2010, a young man stood in distress on the New Jersey side of the George Washington Bridge not far from his home in Ridgewood, New Jersey, looking 600ft below at…

Abstract

On September 22, 2010, a young man stood in distress on the New Jersey side of the George Washington Bridge not far from his home in Ridgewood, New Jersey, looking 600ft below at the Hudson River. He was ready to act on the decision he had announced just minutes before on Facebook. His first semester at Rutgers University, the State University of New Jersey, located 27 miles southwest of New York City, had brought an unexpected challenge: his roommate had streamed two live Internet videos of his intimate encounters with another man. These were very private moments, and it was simply too much to bear. Tyler Clementi jumped to his death, leaving behind broken-hearted friends and family members, and shocking an entire nation with his tragic story (Kolowich, 2010; Foderaro, 2010).

Tyler probably had no idea how his death would shed light on a serious college issue – cyberbullying. In this chapter, the authors address this issue in detail. This is done first by providing a review of relevant literature that defines cyberbullying, explaining its presence in higher education, and describing various factors that should be considered when dealing with it. The literature review includes discussion regarding key electronic resources that college students use to cyber bully, as well as various legal and judicial issues that relate to this cultural phenomenon. Following the literature review, cyberbullying is examined through a research study at Ohio University, a large public institution located in southeastern Ohio. This is accomplished by setting forth research questions and hypotheses, describing the research instrument and design, and explaining the findings from an Ohio University undergraduate student survey. The chapter concludes with suggestions that practitioners might consider implementing on campus, as well as recommendations for future research on this topic.

Details

Misbehavior Online in Higher Education
Type: Book
ISBN: 978-1-78052-456-6

Article
Publication date: 1 June 2015

Khorshed Alam and Sophia Imran

– The purpose of this paper is to examine the factors which influence refugee migrants’ adoption of digital technology and its relevance to their social inclusion in Australia.

8271

Abstract

Purpose

The purpose of this paper is to examine the factors which influence refugee migrants’ adoption of digital technology and its relevance to their social inclusion in Australia.

Design/methodology/approach

This research developed a conceptual framework keeping the “use” of digital technology as the centre-piece of the digital divide. The empirical data were derived from a series of focus group discussions with refugee migrants in an Australian regional city, Toowoomba in Queensland.

Findings

There is a digital divide among refugee migrant groups and it is based on inequalities in physical access to and use of digital technology, the skills necessary to use the different technologies effectively and the ability to pay for the services. The opportunities to use digital technology could support the social inclusion of refugee migrant groups in the broader Australian community.

Research limitations/implications

Further research is required to examine whether this digital divide is unique in the regional context or common to Australian society and to confirm factors that might contribute significantly to refugee migrants’ social inclusion.

Originality/value

This paper determined the role digital technology can play in building social capital and hence social inclusion among refugee migrant groups. Many of the factors identified as influencing refugee migrants’ use of digital technology can inform the Australian government and the information and communication technology industry in devising supportive policies and plans to reduce the risk of social exclusion, alienation and marginalisation among refugee migrant groups.

Details

Information Technology & People, vol. 28 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 25 May 2010

Peter Williams, David Nicholas and Ian Rowlands

The purpose of this paper is to summarise and evaluate the literature on digital consumer behaviour and attitudes towards digital piracy.

6066

Abstract

Purpose

The purpose of this paper is to summarise and evaluate the literature on digital consumer behaviour and attitudes towards digital piracy.

Design/methodology/approach

The paper presents a review and synthesis of the academic literature on the subject, using the authors' unique “pro‐forma” approach to the evaluation of individual papers.

Findings

A major limitation in the studies reported became apparent. They are almost exclusively concerned with the behaviours and attitudes of young people. There is a dearth of studies looking at demographic differences, and also a lack of longitudinal work. Given these constraints, the literature strongly suggests that social and situational factors impact on the likelihood of illegally obtaining digital content more than ethical considerations. Anonymity is a strong indicator, “de‐individualising” people and releasing them from traditional societal constraints and making the digital world far different from the physical one. The literature is ambiguous on whether punishment acts as a deterrent.

Practical implications

The main point that comes out of these studies is that the digital world is not the same as the physical world. It is changing basic assumptions about the idea of ownership, sharing, and copying content. Laws prohibiting all unauthorised downloading potentially criminalise millions of people, so new and creative business models are needed to resolve the problem.

Originality/value

The authors believe this to be the first systematic review of current literature in this area since the issue became topical with the Pirate Bay trial and the Government's Digital Britain report.

Details

Aslib Proceedings, vol. 62 no. 3
Type: Research Article
ISSN: 0001-253X

Keywords

1 – 10 of over 20000