Search results
1 – 10 of over 20000Kuo-Ting Huang, Laura Robinson and Shelia R. Cotten
This paper makes a significant contribution to the growing field of digital inequality research by developing an operational definition of emotional costs. To examine this…
Abstract
Purpose
This paper makes a significant contribution to the growing field of digital inequality research by developing an operational definition of emotional costs. To examine this understudied aspect of digital inequalities, we build on Van Dijk’s concept of mental access. We define emotional costs as anxiety toward using information and communication technologies instigated by a lack of prior technology experience and limited computer access.
Methodology/approach
We examined the influence of emotional costs on lower-income students’ technology efficacy, academic efficacy, and computer application proficiency in the context of a computing intervention. Specifically, we examined the relationship between home and school computer usage with self-perceived technology efficacy, computer application proficiency, and academic efficacy. Data from surveys of 972 students were analyzed in order to better understand the importance of technology access on our outcome variables. We also investigated the possible mediation effects of emotional costs on our outcome variables.
Findings
The results revealed that home computer usage was a determinant of students’ self-perceived technology efficacy while shared school access was not. After conducting mediation tests, the results further indicated that emotional costs mediate the effects of home computer usage on technology efficacy.
Originality/value
We conclude that emotional costs might help explain why access inequalities lead to skill inequalities in the context of computing interventions and offer a replicable operational definition for future studies.
Details
Keywords
Marwan A. Wafa, J. Michael McDonald and Mahmoud M. Yasin
This study examines computer usage patterns in the U.S. construction industry. One hundred and seven subjects, consisting of managers at different managerial levels and…
Abstract
This study examines computer usage patterns in the U.S. construction industry. One hundred and seven subjects, consisting of managers at different managerial levels and professional support staff, participated in this study. This study shows that the subjects exhibit significant differences with regard to their extent of use, nature of use, and degree of satisfaction with decision support systems. Implications of these findings to decision support systems design and effective utilization are discussed.
Details
Keywords
Thompson S.H. Teo and Vivien K.G. Lim
In the 1960s, the Pentagon commissioned several computer scientists to build a systems of decentralised communication network that could remain functional in the event of a…
Abstract
In the 1960s, the Pentagon commissioned several computer scientists to build a systems of decentralised communication network that could remain functional in the event of a nuclear war. The result is the Arpanet, which initially linked up four universities. Over time, this network grew rapidly to interconnect numerous universities, research centres and commercial organisations, and became the technological underpinnings of the Internet.
Joyce Chapman and David Woodbury
The purpose of this paper is to encourage administrators of device‐lending programs to leverage existing quantitative data for management purposes by integrating analysis of…
Abstract
Purpose
The purpose of this paper is to encourage administrators of device‐lending programs to leverage existing quantitative data for management purposes by integrating analysis of quantitative data into the day‐to‐day workflow.
Design/methodology/approach
This is a case study of NCSU Libraries' efforts to analyze and visualize transactional data to aid in the on‐going management of a device‐lending program.
Findings
Analysis and visualization of qualitative data related to technology lending revealed patterns in lending over the course of the semester, day, and week that had previously gone unrecognized. With more concrete data about trends in wait times, capacity lending, and circulation volume, staff are now able to make more informed purchasing decisions, modify systems and workflows to better meet user needs, and begin to explore new ideas for services and staffing models.
Practical implications
The concepts and processes described here can be replicated by other libraries that wish to leverage transactional data analysis and data visualization to aid in management of a device‐lending program.
Originality/value
Although much literature exists on the implementation and qualitative evaluation of device‐lending programs, this paper is the first to provide librarians with ideas for leveraging analysis of transactional data to improve management of a device‐lending program.
Details
Keywords
Esharenana E. Adomi and Silvester O. Anie
To assess the computer literacy skills/competencies of professional librarians in Nigerian university libraries.
Abstract
Purpose
To assess the computer literacy skills/competencies of professional librarians in Nigerian university libraries.
Design/methodology/approach
Employs descriptive design using questionnaires to collect data from 57 professional librarians in four Nigerian university libraries.
Findings
Reveals the personal characteristics of the respondents, assessment of their levels of computer skills, computer use experience, avenues of computer literacy, software used, library routines computer is used for, benefits derived from computer and problems associated with computer use, recommendations are made in light of the findings.
Originality/value
Its findings will assist librarians and library managers to have insight into state of computer literacy among professionals in Nigerian university libraries and assist relevant authorities to plan how librarians, especially in developing countries, can become computer literate.
Details
Keywords
ADA DEVELOPMENTS The ADA programming language project, which is supported by the U.S. Department of Defence, will have far reaching effects on both the programming and the design…
Abstract
ADA DEVELOPMENTS The ADA programming language project, which is supported by the U.S. Department of Defence, will have far reaching effects on both the programming and the design of future computers. Its original objects were to cater for the production of reliable, readable programs for communicating with computer systems. There was to be a formality of language definition and even simplicity in its concept. Whether these aims have been achieved at the design level is, as discussed in Kybernetes (10(3), 156, 1981), still the subject of controversy. Certainly Prof. C. A. R. Hoare (Oxford University, U.K.) has reservations.
Ian Rowlands, David Nicholas, Hamid R. Jamali and Paul Huntington
The purpose of this article is to report on a large‐scale survey that was carried out to assess academic users' awareness, perceptions and existing levels of use of e‐books. The…
Abstract
Purpose
The purpose of this article is to report on a large‐scale survey that was carried out to assess academic users' awareness, perceptions and existing levels of use of e‐books. The survey also seeks to find out about the purposes to which electronic books were put, and to obtain an understanding of the most effective library marketing and communication channels.
Design/methodology/approach
An e‐mail invitation to participate in the survey was distributed to all UCL staff and students (approximately 27,000) in November 2006, and 1,818 completions were received, an effective response rate of at least 6.7 per cent. Statistical analyses were carried out on the data using Software Package for Social Sciences (SPSS).
Findings
The survey findings point to various ways in which user uptake and acceptance of e‐books may be encouraged. Book discovery behaviour, a key issue for publishers and librarians in both print and electronic environments, emerges as a critical focus for service delivery and enhancement.
Originality/value
The survey is part of an action research project, CIBER's SuperBook, that will further investigate the issues raised in this initial benchmarking survey using deep log analysis and qualitative methods. The paper partly fills the gap in the literature on e‐books which has mainly focused on usage and not the users.
Details
Keywords
Kent J. Smith, Jennifer Grimm, Anne E. Lombard and Brandon Wolfe
On September 22, 2010, a young man stood in distress on the New Jersey side of the George Washington Bridge not far from his home in Ridgewood, New Jersey, looking 600ft below at…
Abstract
On September 22, 2010, a young man stood in distress on the New Jersey side of the George Washington Bridge not far from his home in Ridgewood, New Jersey, looking 600ft below at the Hudson River. He was ready to act on the decision he had announced just minutes before on Facebook. His first semester at Rutgers University, the State University of New Jersey, located 27 miles southwest of New York City, had brought an unexpected challenge: his roommate had streamed two live Internet videos of his intimate encounters with another man. These were very private moments, and it was simply too much to bear. Tyler Clementi jumped to his death, leaving behind broken-hearted friends and family members, and shocking an entire nation with his tragic story (Kolowich, 2010; Foderaro, 2010).
Tyler probably had no idea how his death would shed light on a serious college issue – cyberbullying. In this chapter, the authors address this issue in detail. This is done first by providing a review of relevant literature that defines cyberbullying, explaining its presence in higher education, and describing various factors that should be considered when dealing with it. The literature review includes discussion regarding key electronic resources that college students use to cyber bully, as well as various legal and judicial issues that relate to this cultural phenomenon. Following the literature review, cyberbullying is examined through a research study at Ohio University, a large public institution located in southeastern Ohio. This is accomplished by setting forth research questions and hypotheses, describing the research instrument and design, and explaining the findings from an Ohio University undergraduate student survey. The chapter concludes with suggestions that practitioners might consider implementing on campus, as well as recommendations for future research on this topic.
Khorshed Alam and Sophia Imran
– The purpose of this paper is to examine the factors which influence refugee migrants’ adoption of digital technology and its relevance to their social inclusion in Australia.
Abstract
Purpose
The purpose of this paper is to examine the factors which influence refugee migrants’ adoption of digital technology and its relevance to their social inclusion in Australia.
Design/methodology/approach
This research developed a conceptual framework keeping the “use” of digital technology as the centre-piece of the digital divide. The empirical data were derived from a series of focus group discussions with refugee migrants in an Australian regional city, Toowoomba in Queensland.
Findings
There is a digital divide among refugee migrant groups and it is based on inequalities in physical access to and use of digital technology, the skills necessary to use the different technologies effectively and the ability to pay for the services. The opportunities to use digital technology could support the social inclusion of refugee migrant groups in the broader Australian community.
Research limitations/implications
Further research is required to examine whether this digital divide is unique in the regional context or common to Australian society and to confirm factors that might contribute significantly to refugee migrants’ social inclusion.
Originality/value
This paper determined the role digital technology can play in building social capital and hence social inclusion among refugee migrant groups. Many of the factors identified as influencing refugee migrants’ use of digital technology can inform the Australian government and the information and communication technology industry in devising supportive policies and plans to reduce the risk of social exclusion, alienation and marginalisation among refugee migrant groups.
Details
Keywords
Peter Williams, David Nicholas and Ian Rowlands
The purpose of this paper is to summarise and evaluate the literature on digital consumer behaviour and attitudes towards digital piracy.
Abstract
Purpose
The purpose of this paper is to summarise and evaluate the literature on digital consumer behaviour and attitudes towards digital piracy.
Design/methodology/approach
The paper presents a review and synthesis of the academic literature on the subject, using the authors' unique “pro‐forma” approach to the evaluation of individual papers.
Findings
A major limitation in the studies reported became apparent. They are almost exclusively concerned with the behaviours and attitudes of young people. There is a dearth of studies looking at demographic differences, and also a lack of longitudinal work. Given these constraints, the literature strongly suggests that social and situational factors impact on the likelihood of illegally obtaining digital content more than ethical considerations. Anonymity is a strong indicator, “de‐individualising” people and releasing them from traditional societal constraints and making the digital world far different from the physical one. The literature is ambiguous on whether punishment acts as a deterrent.
Practical implications
The main point that comes out of these studies is that the digital world is not the same as the physical world. It is changing basic assumptions about the idea of ownership, sharing, and copying content. Laws prohibiting all unauthorised downloading potentially criminalise millions of people, so new and creative business models are needed to resolve the problem.
Originality/value
The authors believe this to be the first systematic review of current literature in this area since the issue became topical with the Pirate Bay trial and the Government's Digital Britain report.
Details