SlideShare a Scribd company logo
1 of 9
The Long Tail of Digital Exclusion:
        Narrow, Proxy and Non-Users
       Ellen J. Helsper, London School of Economics
           Social Digital Research Symposium #3

                  Based on a collaborative project with
         Sergio Godoy-Etcheverry, UC School of Communications
                    Funded by the conference board

                    The Linked World Book available at:
http://fi3p.eu/assets/pdf/Research%20report_The%20Linked%20World.pdf
Who uses by proxy?
                           ex-user proxy
About 4 in 5 non-users have a proxy user
                                5%

available
                           ex-user no
    never-user proxy         proxy
                              15%
1 in 5 have used proxy users in the last year
          22%

(1 in 3 out of those who have one available)
                       never-user no
                          proxy
Who are these proxy users? 58%
                                           Source: OxIS 2011
                                           Base: Non-users who have proxy user available N=373
Who are the proxies
                  100

                  80
% used as proxy




                  60                                                      57

                  40
                                                                     26
                  20                         14      16         17
                        3     3   4
                   0




                                      Base: Proxy users N=102
Inequality by proxy?
                    100%
                                             Seconday         Further        Higher
100%
                    80%
                                                             Source: OxIS 2011
      80%                                                    Base: Non-users who have proxy user available N=373
% that used proxy




                    60%                           54%                                                    59% 58%
      60%                        50%
                                                                                                        44%
                    40%                                                                36%
      40%
                                                                    27%
                                                                                       24%   25% 23%
      20% 20%                                                        15% 16%     16%
                           12%         12%        12%
                      2%         2%          3%         3%
                                                              0%
            0%
                     0%
                      Internet Library Colleague Parent Sibling                  Partner Friend    Child
                             Under 25    26 thru 40   41 thru 55                  56 thru 65    Over 65
                         caf
Social pressures/facilitators of
                 engagement
 Men and women felt missing the boat if they did not belong to
  professional and social networks enabling them to engage with ICTs.
 All groups believed technology was inevitable, and that youngsters with
  low digital and traditional literacy levels would be excluded.
 In the UK many regarded engagement not as a free and positive choice.
 The need to ask others for help created a strong feeling of exclusion even
  within the family
 Mothers talked about digital exclusion/inclusion in relation to their
  children (homework , future jobs) while fathers expressed a wider
  repertoire of topics.
 For parent users, children were a powerful driver for ICT access. Children
  were regarded as the more proficient in both countries, yet they were
  poor trainers and their less proficient parents felt ashamed and irritated
  by this.
                            Source Helsper & Godoy (2011)                  5
A specific case of proxy use…

ARE CHILDREN GOOD FOR
PARENTS?       With Rebecca Eynon (OII)
Economic
                 circumstances
                   household




                                                         Access
Socio-cultural
 background       Use                             ,   experience
                                                       and   skill




                    Children


                                 Base. OxIS 2011, Internet Users N=1,498
Parent and child characteristics and parental
                  internet use
                                  Parent’s →
                                               Self-efficacy   Frequency   Locations
Age parent                                          -0.05         -0.02       -0.06

Education parent                                   0.14**         0.02        0.19**

Household SES                                       -0.01         -0.02       0.20**

Age child                                           0.04          -0.06       -0.05

Comparative self-efficacy child                    -0.19**       -0.12**       0.05

Ego centric self-efficacy child                     0.05          0.09*        0.08

Skills child                                        0.01          0.06         0.06

Frequency use parent                               0.38**                     0.17**

Access points parent                               0.17**         0.17**

Digital self-efficacy parent                                      0.41**      0.18**
Summary: Children as proxies
Presence of children in the household:
  – Has an influence on quality of Internet access and
    basic use of the Internet
  – has no impact on adult levels of self-efficacy / skill
  – has an influence in the uptake of Internet uses
    beneficial to children
“Usual suspects” are still more important than
 the child:
  – age, education, gender, SES, self-efficacy

More Related Content

Similar to The long tail of digital exclusion

E moms blogher and parenting 8 2, jkc
E moms  blogher and parenting 8 2, jkcE moms  blogher and parenting 8 2, jkc
E moms blogher and parenting 8 2, jkc
Elisa Camahort Page
 
Integration present
Integration presentIntegration present
Integration present
ting0631
 
Leveraging Social Media as presented at NCHELP
Leveraging Social Media as presented at NCHELPLeveraging Social Media as presented at NCHELP
Leveraging Social Media as presented at NCHELP
Christopher Penn
 
Social Networking in ireland an amárach report - august 2010
Social Networking in ireland   an amárach report - august 2010Social Networking in ireland   an amárach report - august 2010
Social Networking in ireland an amárach report - august 2010
Amarach Research
 

Similar to The long tail of digital exclusion (20)

E expectations 2012 for Chapman University
E expectations 2012 for Chapman UniversityE expectations 2012 for Chapman University
E expectations 2012 for Chapman University
 
E-expectations 2012 for EduWeb
E-expectations 2012 for EduWebE-expectations 2012 for EduWeb
E-expectations 2012 for EduWeb
 
Intro to social and mobile
Intro to social and mobileIntro to social and mobile
Intro to social and mobile
 
High Ed Web Ark - E-Expectations #hewebar
High Ed Web Ark - E-Expectations #hewebarHigh Ed Web Ark - E-Expectations #hewebar
High Ed Web Ark - E-Expectations #hewebar
 
Student attitudes on dictaphones
Student attitudes on dictaphonesStudent attitudes on dictaphones
Student attitudes on dictaphones
 
Teens, Kindness and Cruelty on Social Network Sites
Teens, Kindness and Cruelty on Social Network SitesTeens, Kindness and Cruelty on Social Network Sites
Teens, Kindness and Cruelty on Social Network Sites
 
Mobile, Address Book, & Backup Trends
Mobile, Address Book, & Backup Trends Mobile, Address Book, & Backup Trends
Mobile, Address Book, & Backup Trends
 
Michael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentationMichael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentation
 
E moms blogher and parenting 8 2, jkc
E moms  blogher and parenting 8 2, jkcE moms  blogher and parenting 8 2, jkc
E moms blogher and parenting 8 2, jkc
 
Choreosity opportunity execution project
Choreosity opportunity execution projectChoreosity opportunity execution project
Choreosity opportunity execution project
 
Using Mobile Devices to Build Community in the Classroom
Using Mobile Devices to Build Community in the ClassroomUsing Mobile Devices to Build Community in the Classroom
Using Mobile Devices to Build Community in the Classroom
 
Mobile is the needle; Social is the thread
Mobile is the needle; Social is the threadMobile is the needle; Social is the thread
Mobile is the needle; Social is the thread
 
The Rise of E-Reading
The Rise of E-ReadingThe Rise of E-Reading
The Rise of E-Reading
 
Integration present
Integration presentIntegration present
Integration present
 
What people living with rare disease can teach us
What people living with rare disease can teach usWhat people living with rare disease can teach us
What people living with rare disease can teach us
 
Mobile Learning Presentation - VWBPE
Mobile Learning Presentation - VWBPEMobile Learning Presentation - VWBPE
Mobile Learning Presentation - VWBPE
 
Leveraging Social Media as presented at NCHELP
Leveraging Social Media as presented at NCHELPLeveraging Social Media as presented at NCHELP
Leveraging Social Media as presented at NCHELP
 
3D:TLC
3D:TLC3D:TLC
3D:TLC
 
Social Networking in ireland an amárach report - august 2010
Social Networking in ireland   an amárach report - august 2010Social Networking in ireland   an amárach report - august 2010
Social Networking in ireland an amárach report - august 2010
 
Social Networking in Ireland - an Amrach report August2010
Social Networking in Ireland - an Amrach report August2010Social Networking in Ireland - an Amrach report August2010
Social Networking in Ireland - an Amrach report August2010
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

The long tail of digital exclusion

  • 1. The Long Tail of Digital Exclusion: Narrow, Proxy and Non-Users Ellen J. Helsper, London School of Economics Social Digital Research Symposium #3 Based on a collaborative project with Sergio Godoy-Etcheverry, UC School of Communications Funded by the conference board The Linked World Book available at: http://fi3p.eu/assets/pdf/Research%20report_The%20Linked%20World.pdf
  • 2. Who uses by proxy? ex-user proxy About 4 in 5 non-users have a proxy user 5% available ex-user no never-user proxy proxy 15% 1 in 5 have used proxy users in the last year 22% (1 in 3 out of those who have one available) never-user no proxy Who are these proxy users? 58% Source: OxIS 2011 Base: Non-users who have proxy user available N=373
  • 3. Who are the proxies 100 80 % used as proxy 60 57 40 26 20 14 16 17 3 3 4 0 Base: Proxy users N=102
  • 4. Inequality by proxy? 100% Seconday Further Higher 100% 80% Source: OxIS 2011 80% Base: Non-users who have proxy user available N=373 % that used proxy 60% 54% 59% 58% 60% 50% 44% 40% 36% 40% 27% 24% 25% 23% 20% 20% 15% 16% 16% 12% 12% 12% 2% 2% 3% 3% 0% 0% 0% Internet Library Colleague Parent Sibling Partner Friend Child Under 25 26 thru 40 41 thru 55 56 thru 65 Over 65 caf
  • 5. Social pressures/facilitators of engagement  Men and women felt missing the boat if they did not belong to professional and social networks enabling them to engage with ICTs.  All groups believed technology was inevitable, and that youngsters with low digital and traditional literacy levels would be excluded.  In the UK many regarded engagement not as a free and positive choice.  The need to ask others for help created a strong feeling of exclusion even within the family  Mothers talked about digital exclusion/inclusion in relation to their children (homework , future jobs) while fathers expressed a wider repertoire of topics.  For parent users, children were a powerful driver for ICT access. Children were regarded as the more proficient in both countries, yet they were poor trainers and their less proficient parents felt ashamed and irritated by this. Source Helsper & Godoy (2011) 5
  • 6. A specific case of proxy use… ARE CHILDREN GOOD FOR PARENTS? With Rebecca Eynon (OII)
  • 7. Economic circumstances household Access Socio-cultural background Use , experience and skill Children Base. OxIS 2011, Internet Users N=1,498
  • 8. Parent and child characteristics and parental internet use Parent’s → Self-efficacy Frequency Locations Age parent -0.05 -0.02 -0.06 Education parent 0.14** 0.02 0.19** Household SES -0.01 -0.02 0.20** Age child 0.04 -0.06 -0.05 Comparative self-efficacy child -0.19** -0.12** 0.05 Ego centric self-efficacy child 0.05 0.09* 0.08 Skills child 0.01 0.06 0.06 Frequency use parent 0.38** 0.17** Access points parent 0.17** 0.17** Digital self-efficacy parent 0.41** 0.18**
  • 9. Summary: Children as proxies Presence of children in the household: – Has an influence on quality of Internet access and basic use of the Internet – has no impact on adult levels of self-efficacy / skill – has an influence in the uptake of Internet uses beneficial to children “Usual suspects” are still more important than the child: – age, education, gender, SES, self-efficacy

Editor's Notes

  1. Children in the household has almost no impact on adult levels of Use. Experience, skill, age, gender and the socio-economic circumstances (education) most strongly related to internet use.
  2. Presence of children in the household does have an influence on quality of Internet access and use of the Internet(particularly when children are aged 10-13)The strongest predictors of skills and self efficacyare age, gender and education+veeGov & formal learning (education & self-efficacy more imp) -ve for Web 2.0 and entertainment (age, SES, socialisation, home access and self efficacy more imp)