SlideShare a Scribd company logo
1 of 9
The Long Tail of Digital Exclusion:
        Narrow, Proxy and Non-Users
       Ellen J. Helsper, London School of Economics
           Social Digital Research Symposium #3

                  Based on a collaborative project with
         Sergio Godoy-Etcheverry, UC School of Communications
                    Funded by the conference board

                    The Linked World Book available at:
http://fi3p.eu/assets/pdf/Research%20report_The%20Linked%20World.pdf
Who uses by proxy?
                           ex-user proxy
About 4 in 5 non-users have a proxy user
                                5%

available
                           ex-user no
    never-user proxy         proxy
                              15%
1 in 5 have used proxy users in the last year
          22%

(1 in 3 out of those who have one available)
                       never-user no
                          proxy
Who are these proxy users? 58%
                                           Source: OxIS 2011
                                           Base: Non-users who have proxy user available N=373
Who are the proxies
                  100

                  80
% used as proxy




                  60                                                      57

                  40
                                                                     26
                  20                         14      16         17
                        3     3   4
                   0




                                      Base: Proxy users N=102
Inequality by proxy?
                    100%
                                             Seconday         Further        Higher
100%
                    80%
                                                             Source: OxIS 2011
      80%                                                    Base: Non-users who have proxy user available N=373
% that used proxy




                    60%                           54%                                                    59% 58%
      60%                        50%
                                                                                                        44%
                    40%                                                                36%
      40%
                                                                    27%
                                                                                       24%   25% 23%
      20% 20%                                                        15% 16%     16%
                           12%         12%        12%
                      2%         2%          3%         3%
                                                              0%
            0%
                     0%
                      Internet Library Colleague Parent Sibling                  Partner Friend    Child
                             Under 25    26 thru 40   41 thru 55                  56 thru 65    Over 65
                         caf
Social pressures/facilitators of
                 engagement
 Men and women felt missing the boat if they did not belong to
  professional and social networks enabling them to engage with ICTs.
 All groups believed technology was inevitable, and that youngsters with
  low digital and traditional literacy levels would be excluded.
 In the UK many regarded engagement not as a free and positive choice.
 The need to ask others for help created a strong feeling of exclusion even
  within the family
 Mothers talked about digital exclusion/inclusion in relation to their
  children (homework , future jobs) while fathers expressed a wider
  repertoire of topics.
 For parent users, children were a powerful driver for ICT access. Children
  were regarded as the more proficient in both countries, yet they were
  poor trainers and their less proficient parents felt ashamed and irritated
  by this.
                            Source Helsper & Godoy (2011)                  5
A specific case of proxy use…

ARE CHILDREN GOOD FOR
PARENTS?       With Rebecca Eynon (OII)
Economic
                 circumstances
                   household




                                                         Access
Socio-cultural
 background       Use                             ,   experience
                                                       and   skill




                    Children


                                 Base. OxIS 2011, Internet Users N=1,498
Parent and child characteristics and parental
                  internet use
                                  Parent’s →
                                               Self-efficacy   Frequency   Locations
Age parent                                          -0.05         -0.02       -0.06

Education parent                                   0.14**         0.02        0.19**

Household SES                                       -0.01         -0.02       0.20**

Age child                                           0.04          -0.06       -0.05

Comparative self-efficacy child                    -0.19**       -0.12**       0.05

Ego centric self-efficacy child                     0.05          0.09*        0.08

Skills child                                        0.01          0.06         0.06

Frequency use parent                               0.38**                     0.17**

Access points parent                               0.17**         0.17**

Digital self-efficacy parent                                      0.41**      0.18**
Summary: Children as proxies
Presence of children in the household:
  – Has an influence on quality of Internet access and
    basic use of the Internet
  – has no impact on adult levels of self-efficacy / skill
  – has an influence in the uptake of Internet uses
    beneficial to children
“Usual suspects” are still more important than
 the child:
  – age, education, gender, SES, self-efficacy

More Related Content

Similar to The long tail of digital exclusion

E expectations 2012 for Chapman University
E expectations 2012 for Chapman UniversityE expectations 2012 for Chapman University
E expectations 2012 for Chapman UniversityStephaneGeyer
 
E-expectations 2012 for EduWeb
E-expectations 2012 for EduWebE-expectations 2012 for EduWeb
E-expectations 2012 for EduWebStephaneGeyer
 
Intro to social and mobile
Intro to social and mobileIntro to social and mobile
Intro to social and mobilehluecke
 
High Ed Web Ark - E-Expectations #hewebar
High Ed Web Ark - E-Expectations #hewebarHigh Ed Web Ark - E-Expectations #hewebar
High Ed Web Ark - E-Expectations #hewebarJeremy Rex
 
Student attitudes on dictaphones
Student attitudes on dictaphonesStudent attitudes on dictaphones
Student attitudes on dictaphonesSimona Katholnig
 
Mobile, Address Book, & Backup Trends
Mobile, Address Book, & Backup Trends Mobile, Address Book, & Backup Trends
Mobile, Address Book, & Backup Trends Plaxo
 
Michael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentationMichael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentationswissnex San Francisco
 
E moms blogher and parenting 8 2, jkc
E moms  blogher and parenting 8 2, jkcE moms  blogher and parenting 8 2, jkc
E moms blogher and parenting 8 2, jkcElisa Camahort Page
 
Choreosity opportunity execution project
Choreosity opportunity execution projectChoreosity opportunity execution project
Choreosity opportunity execution projectNoah Freedman
 
Using Mobile Devices to Build Community in the Classroom
Using Mobile Devices to Build Community in the ClassroomUsing Mobile Devices to Build Community in the Classroom
Using Mobile Devices to Build Community in the ClassroomJackie Gerstein, Ed.D
 
Integration present
Integration presentIntegration present
Integration presentting0631
 
Mobile Learning Presentation - VWBPE
Mobile Learning Presentation - VWBPEMobile Learning Presentation - VWBPE
Mobile Learning Presentation - VWBPEJackie Gerstein, Ed.D
 
Leveraging Social Media as presented at NCHELP
Leveraging Social Media as presented at NCHELPLeveraging Social Media as presented at NCHELP
Leveraging Social Media as presented at NCHELPChristopher Penn
 
Social Networking in ireland an amárach report - august 2010
Social Networking in ireland   an amárach report - august 2010Social Networking in ireland   an amárach report - august 2010
Social Networking in ireland an amárach report - august 2010Amarach Research
 
Social Networking in Ireland - an Amrach report August2010
Social Networking in Ireland - an Amrach report August2010Social Networking in Ireland - an Amrach report August2010
Social Networking in Ireland - an Amrach report August2010Brendan Mc Coy
 

Similar to The long tail of digital exclusion (20)

E expectations 2012 for Chapman University
E expectations 2012 for Chapman UniversityE expectations 2012 for Chapman University
E expectations 2012 for Chapman University
 
E-expectations 2012 for EduWeb
E-expectations 2012 for EduWebE-expectations 2012 for EduWeb
E-expectations 2012 for EduWeb
 
Intro to social and mobile
Intro to social and mobileIntro to social and mobile
Intro to social and mobile
 
High Ed Web Ark - E-Expectations #hewebar
High Ed Web Ark - E-Expectations #hewebarHigh Ed Web Ark - E-Expectations #hewebar
High Ed Web Ark - E-Expectations #hewebar
 
Student attitudes on dictaphones
Student attitudes on dictaphonesStudent attitudes on dictaphones
Student attitudes on dictaphones
 
Teens, Kindness and Cruelty on Social Network Sites
Teens, Kindness and Cruelty on Social Network SitesTeens, Kindness and Cruelty on Social Network Sites
Teens, Kindness and Cruelty on Social Network Sites
 
Mobile, Address Book, & Backup Trends
Mobile, Address Book, & Backup Trends Mobile, Address Book, & Backup Trends
Mobile, Address Book, & Backup Trends
 
Michael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentationMichael Stoner - swissnexSF presentation
Michael Stoner - swissnexSF presentation
 
E moms blogher and parenting 8 2, jkc
E moms  blogher and parenting 8 2, jkcE moms  blogher and parenting 8 2, jkc
E moms blogher and parenting 8 2, jkc
 
Choreosity opportunity execution project
Choreosity opportunity execution projectChoreosity opportunity execution project
Choreosity opportunity execution project
 
Using Mobile Devices to Build Community in the Classroom
Using Mobile Devices to Build Community in the ClassroomUsing Mobile Devices to Build Community in the Classroom
Using Mobile Devices to Build Community in the Classroom
 
Mobile is the needle; Social is the thread
Mobile is the needle; Social is the threadMobile is the needle; Social is the thread
Mobile is the needle; Social is the thread
 
The Rise of E-Reading
The Rise of E-ReadingThe Rise of E-Reading
The Rise of E-Reading
 
Integration present
Integration presentIntegration present
Integration present
 
What people living with rare disease can teach us
What people living with rare disease can teach usWhat people living with rare disease can teach us
What people living with rare disease can teach us
 
Mobile Learning Presentation - VWBPE
Mobile Learning Presentation - VWBPEMobile Learning Presentation - VWBPE
Mobile Learning Presentation - VWBPE
 
Leveraging Social Media as presented at NCHELP
Leveraging Social Media as presented at NCHELPLeveraging Social Media as presented at NCHELP
Leveraging Social Media as presented at NCHELP
 
3D:TLC
3D:TLC3D:TLC
3D:TLC
 
Social Networking in ireland an amárach report - august 2010
Social Networking in ireland   an amárach report - august 2010Social Networking in ireland   an amárach report - august 2010
Social Networking in ireland an amárach report - august 2010
 
Social Networking in Ireland - an Amrach report August2010
Social Networking in Ireland - an Amrach report August2010Social Networking in Ireland - an Amrach report August2010
Social Networking in Ireland - an Amrach report August2010
 

Recently uploaded

State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024Stephen Perrenod
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 

Recently uploaded (20)

State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

The long tail of digital exclusion

  • 1. The Long Tail of Digital Exclusion: Narrow, Proxy and Non-Users Ellen J. Helsper, London School of Economics Social Digital Research Symposium #3 Based on a collaborative project with Sergio Godoy-Etcheverry, UC School of Communications Funded by the conference board The Linked World Book available at: http://fi3p.eu/assets/pdf/Research%20report_The%20Linked%20World.pdf
  • 2. Who uses by proxy? ex-user proxy About 4 in 5 non-users have a proxy user 5% available ex-user no never-user proxy proxy 15% 1 in 5 have used proxy users in the last year 22% (1 in 3 out of those who have one available) never-user no proxy Who are these proxy users? 58% Source: OxIS 2011 Base: Non-users who have proxy user available N=373
  • 3. Who are the proxies 100 80 % used as proxy 60 57 40 26 20 14 16 17 3 3 4 0 Base: Proxy users N=102
  • 4. Inequality by proxy? 100% Seconday Further Higher 100% 80% Source: OxIS 2011 80% Base: Non-users who have proxy user available N=373 % that used proxy 60% 54% 59% 58% 60% 50% 44% 40% 36% 40% 27% 24% 25% 23% 20% 20% 15% 16% 16% 12% 12% 12% 2% 2% 3% 3% 0% 0% 0% Internet Library Colleague Parent Sibling Partner Friend Child Under 25 26 thru 40 41 thru 55 56 thru 65 Over 65 caf
  • 5. Social pressures/facilitators of engagement  Men and women felt missing the boat if they did not belong to professional and social networks enabling them to engage with ICTs.  All groups believed technology was inevitable, and that youngsters with low digital and traditional literacy levels would be excluded.  In the UK many regarded engagement not as a free and positive choice.  The need to ask others for help created a strong feeling of exclusion even within the family  Mothers talked about digital exclusion/inclusion in relation to their children (homework , future jobs) while fathers expressed a wider repertoire of topics.  For parent users, children were a powerful driver for ICT access. Children were regarded as the more proficient in both countries, yet they were poor trainers and their less proficient parents felt ashamed and irritated by this. Source Helsper & Godoy (2011) 5
  • 6. A specific case of proxy use… ARE CHILDREN GOOD FOR PARENTS? With Rebecca Eynon (OII)
  • 7. Economic circumstances household Access Socio-cultural background Use , experience and skill Children Base. OxIS 2011, Internet Users N=1,498
  • 8. Parent and child characteristics and parental internet use Parent’s → Self-efficacy Frequency Locations Age parent -0.05 -0.02 -0.06 Education parent 0.14** 0.02 0.19** Household SES -0.01 -0.02 0.20** Age child 0.04 -0.06 -0.05 Comparative self-efficacy child -0.19** -0.12** 0.05 Ego centric self-efficacy child 0.05 0.09* 0.08 Skills child 0.01 0.06 0.06 Frequency use parent 0.38** 0.17** Access points parent 0.17** 0.17** Digital self-efficacy parent 0.41** 0.18**
  • 9. Summary: Children as proxies Presence of children in the household: – Has an influence on quality of Internet access and basic use of the Internet – has no impact on adult levels of self-efficacy / skill – has an influence in the uptake of Internet uses beneficial to children “Usual suspects” are still more important than the child: – age, education, gender, SES, self-efficacy

Editor's Notes

  1. Children in the household has almost no impact on adult levels of Use. Experience, skill, age, gender and the socio-economic circumstances (education) most strongly related to internet use.
  2. Presence of children in the household does have an influence on quality of Internet access and use of the Internet(particularly when children are aged 10-13)The strongest predictors of skills and self efficacyare age, gender and education+veeGov & formal learning (education & self-efficacy more imp) -ve for Web 2.0 and entertainment (age, SES, socialisation, home access and self efficacy more imp)