Você está na página 1de 11

ARTICLE IN PRESS

Telecommunications Policy ] (]]]]) ]]]–]]]

Contents lists available at ScienceDirect

Telecommunications Policy
URL: www.elsevierbusinessandmanagement.com/locate/telpol

Profiling the non-user: Rethinking policy initiatives stimulating


ICT acceptance
Pieter Verdegem a,, Pascal Verhoest b
a
Research Group MICT—Ghent University (UGent)—Interdisciplinary Institute for Broadband Technology (IBBT), Korte Meer 7/9/11, B-9000 Ghent, Belgium
b
The Federal Agency for Information and Communication Technology (Fedict)/Free University of Brussels (VUB), Brussels, Belgium

a r t i c l e in fo abstract

Business strategies and policies that were successful in increasing internet penetration
Keywords: in the early days may no longer be appropriate. This is most probably so in countries
Non-users where a bigger proportion of the population is already connected to the internet. As
Policy initiatives more people are online, it becomes more likely that the remaining fraction of non-users
ICT acceptance is either hard to convince, under-skilled or simply lacking the financial resources to
E-inclusion afford a connection. In view of this, a new policy approach is proposed to increase ICT
User research acceptance. The approach is based on strategies of segmentation and differentiation.
PC and internet penetration
This entails that policy initiatives are specifically targeted towards different groups in
ICT literacy
the population. This article demonstrates that being a non-user can be explained by a
combination of access problems, lack of ICT skills or rather negative attitudes towards
ICT or by the outweighing effect of one of them. It also provides a framework for setting
up new policy measures.
& 2009 Elsevier Ltd. All rights reserved.

1. Introduction

The pervasiveness of ICT in society and the increasing dependency on ICT in everyday life makes the capacity to use ICT
at home a more important condition for social participation (van Dijk, 2005; Warschauer, 2003). The goal of any e-inclusion
policy should therefore be to achieve meaningful internet access for all. This will require a continuous effort on behalf of
policy makers (Milner, 2006, pp. 178–179). Indeed, inequalities in ICT adoption and usage are not likely to diminish or
disappear of their own accord (Selwyn & Facer, 2007, p. 25).
In societies that have already reached higher levels of internet adoption,1 increasing internet penetration may require
specific measures that differ from those of the early days of the internet. The fraction of remaining non-users may be
structurally lacking financial resources to afford a connection (Martin & Robinson, 2007), they may be poorly educated
or under-skilled (Livingstone, 2004) or they may be hard to convince to use ICT because of emotional reasons
(e.g. technophobia, van Dijk, 2005, pp. 35–44) or simply because they resent using it (Selwyn, 2006).
Bearing this in mind, a research track for new policy initiatives concerning ICT acceptance is set up. The approach is born
out of a confrontation of theory with political practice. This affects the way in which the research is organized and
conducted. The approach is characterized by two main features. Firstly, unlike many e-inclusion policies the approach

 Corresponding author. Tel.: þ32 9 264 84 77; fax: þ32 9 264 69 92.
E-mail addresses: Pieter.Verdegem@UGent.be (P. Verdegem), Pascal.Verhoest@Fedict.be (P. Verhoest).
1
The research is conducted in Belgium. In 2007 67% of households (with at least one person between 16 and 74 years old) in Belgium owned at least
one computer, while 60% of households had internet access at home (FOD Economie, 2007). The information society is thus more developed than on
average in the EU; however, Belgium is not one of the frontrunners.

0308-5961/$ - see front matter & 2009 Elsevier Ltd. All rights reserved.
doi:10.1016/j.telpol.2009.08.009

Please cite this article as: Verdegem, P., & Verhoest, P. Profiling the non-user: Rethinking policy initiatives stimulating
ICT acceptance. Telecommunications Policy (2009), doi:10.1016/j.telpol.2009.08.009
ARTICLE IN PRESS
2 P. Verdegem, P. Verhoest / Telecommunications Policy ] (]]]]) ]]]–]]]

proposed does not only aims at removing barriers but equally, or alternatively, at increasing the value of ICT for end-users.
Indeed, a starting assumption is that the (perceived) added value of using ICT products may have a decisive influence on
actual usage.
Secondly, the input for new policy measures developed within this approach is specifically targeted towards different
segments of the population, taking into account the specificities of characteristics of different groups of non-users.
Therefore, it may be assumed that policy initiatives based on strategies of group segmentation and differentiation might be
more effective and less expensive than generic policy measures. Prerequisites for these kinds of policies, however, are that
these groups are relatively homogeneous (especially with regard to determinants that are of major influence on ICT
appropriation) and that they can be easily targeted and reached by policy makers (preferably groups with some form of
formal organization and representation).
In the first part of this article the considerations that have inspired the research approach are explained and
contextualized. In the second part, the research outline and its methodological base are explained. The third and main part
describes the most important findings of the research and evaluates their significance and illustrates how the findings can
be transposed into concrete policy measures.

2. Research outline

2.1. Field experience with stimulating ICT acceptance

The proposed approach is mainly inspired by the ‘Internet for All’ campaign of the Belgian government in 2006. This
initiative consisted of providing an affordable package deal to potential buyers, comprising a personal computer (PC), an
internet connection plus a training session (OECD, 2008, p. 198). The main ‘political’ difficulty seemed to be to convince the
industry (PC manufacturers, ISPs and retailers) to participate in this campaign. The main resistance was from the
organization of small retailers, who feared the low profit margins would cause an unacceptable loss of income.
Nevertheless, three consortia, including well-known PC manufacturers and ISPs, offered a package.
On evaluation, the Internet for All campaign proved to be advantageous for the retailers as well as for other parties
involved. It has been calculated that the project contributed 16% of the increase of new internet connections over a period
of 1 year. The slipstream of the project is estimated to be 50%. The slipstream consists of buyers who were initially
interested in the package but eventually opted for another (generally more expensive) commercial offering. The sum total is
that the project contributed to almost a quarter of the increase of internet connections between March 2006 and March
2007.
A critical evaluation of the Internet for All campaign revealed different elements, two of which inspired the research that
is presented within this article. The first was merely confirmation of what could be expected. Not all of the groups in
society were equally well served by the offer. Some buyers preferred to buy better-performing and more-expensive
equipment whilst for other people the packages were too expensive, either because the up-front entry cost was too high or
because of the recurrent costs of an internet connection. The second source of inspiration was an incidental call of a
representative of a professional organization for physical therapists who proposed to target the campaign also towards
members of his organization. These two apparently banal observations triggered a reflection that inspired the new policy
approach and adjoining research.

2.2. Traditional parameters of digital inequalities

The concept ‘digital divide’ has become very popular in the last decade, both in scholarly studies as well as in political
speeches and in the popular press and media. Gunkel (2003, p. 500) states that this attention appears to be ‘‘an obvious
advance over the euphoric ‘cyberbole’ that characterized much of the rhetoric of computer technology since the mid-
1980s.’’ Overcoming digital inequalities is now considered to be one of the key drivers for social and economic welfare, in
order to improve social participation and to increase competitiveness and productivity (Brants & Frissen, 2005, pp. 22–23).
Nevertheless, innovation studies have traditionally paid relatively little attention to phenomena such as non-use of ICT
(Selwyn, 2004, pp. 342–343; Wyatt, 2005, pp. 77–78).
Although the metaphor of the digital divide appeared to be very successful in putting the issue on the agenda of social,
political and scholarly discussion, it is a simplification of reality and thus risks introducing several misunderstandings
(van Dijk & Hacker, 2003). More specifically, the dichotomous portrayal (the divide between ‘haves’ versus ‘have-nots’ or
between ‘technologically rich’ versus ‘poor’) is no longer tenable, as these conceptualizations are too limited and
rudimentary in analysis (Barzilai-Nahon, 2006, p. 270; Norris, 2001, pp. 3–4; Selwyn, 2004, pp. 343–346; van Dijk, 2006,
pp. 221–222; Warschauer, 2003, pp. 11–12).
Research in this context often focuses on ‘traditional’ parameters of digital inequalities. A wealth of scientific studies
exists that scrutinizes the most important variables for explaining these traditional inequalities. Income or socio-economic
status remains one of the most important factors in explaining differences in ICT adoption and usage (Martin & Robinson,
2007, p. 2). Even in highly industrialized societies, lower levels of income are consistently shown to be associated with ICT
inequalities (Fuchs, 2009; Selwyn, 2004, pp. 344–345; Warschauer, 2003, pp. 42–54).

Please cite this article as: Verdegem, P., & Verhoest, P. Profiling the non-user: Rethinking policy initiatives stimulating
ICT acceptance. Telecommunications Policy (2009), doi:10.1016/j.telpol.2009.08.009
ARTICLE IN PRESS
P. Verdegem, P. Verhoest / Telecommunications Policy ] (]]]]) ]]]–]]] 3

Other dimensions for explaining different levels of engagement with ICT are:

 gender (men having more access and using ICT more than women, although recent research indicates declining gender
differences; Selwyn, 2006, pp. 279–283; van Dijk & Hacker, 2003, pp. 319–320);
 age (increased age is associated with lower levels of access, limited modes of use and patterns of connecting;
Roe & Broos, 2005, p. 92; van Dijk & Hacker, 2003, pp. 317–318);
 education (lower levels of education seem to be corresponding with divides related to access and use of a range of ICT;
Roe & Broos, 2005, p. 94; Servon, 2002, p. 33);
 family structure (the presence of school-age children tends to increase contacts with ICT; Kennedy, Wellman, &
Klement, 2003, pp. 87–88; Van Rompaey, Struyf, & Roe, 2002).

In addition to these variables there are others such as race (Kvasny, 2005), geography/rural–urban location (Warren,
2007), cultural/social participation (Sassi, 2005), etc. that determine access to and usage of ICT. A thorough understanding
of these parameters and their mutual dependencies must be the keystone of any e-inclusion policy.
Over the years, these (traditional) socio-demographic parameters have been used, on the basis of some evidence, to
explain differences in ICT adoption and use. Many scholarly publications aimed to describe and thoroughly explain digital
inequalities among individuals and groups (Rice & Katz, 2003; Vehovar, Sicherl, Hüsing, & Dolnicar, 2006; Yu, 2006). In
order to set up effective measures in support of e-inclusion, however, these parameters are no longer sufficient. So, new and
creative theoretical frames of mind are needed, especially in societies that already have higher levels of computer and
internet penetration.
Hence, equal attention should be given to non-usage of ICT. ‘‘Analyzing users is important, but by focusing on users
and producers we run the risk of accepting a worldview in which adoption of new technology is the norm,’’ as Wyatt
(2005, pp. 77–78) states. In addition, insights into these distinctive profiles of non-users should be linked to appropriate
policy measures.

2.3. Utility in ICT acceptance: towards an alternative interpretation

Utility is a concept that is often used in technology adoption studies. Rogers (2003, p. 265) incorporates ‘relative
advantage’ (‘‘the degree to which an innovation is perceived as better than the idea it supersedes’’) as one of the innovation
characteristics in his Diffusion of Innovations theory. Davis (1989, p. 320) places ‘perceived usefulness’ (‘‘the degree to
which a person believes that using a particular system would enhance his/her job performance’’) at the centre of his
TAM—Technology Acceptance Model—in which perceived usefulness and perceived ease of use are the most important
determinants of an individual’s adoption decision. According to the Social Cognitive Theory—a theory from social
psychology (Bandura, 1986)—‘outcome expectations’ (‘‘the perceived likely consequences of using ICT’’) (Compeau,
Higgins, & Huff, 1999, p. 147) is a central concept together with computer/internet self-efficacy.
Here the interpretation of the utility concept differs from these definitions. Firstly, utility is defined as all perceived
benefits of ICT. Secondly, and most importantly, the perceived utility of using ICT is looked at in relation to the perceived
cost for using it. Hence, the notion of ‘relative utility’ is preferred. In other words, the relative utility of a product is the
perceived increase of utility obtained by appropriating a product in relation to all emotional, cognitive and material
resources available to an individual.
Based on these ideas, it becomes possible to determine a hypothetical ‘turning point’ for ICT appropriation, namely the
point at which the benefits will outweigh the costs for appropriating an ICT product. The notion of ‘cost’ is extended to any
effort needed for ICT adoption, which is not only money but also, for example, the time required to acquire skills. By
exploring this turning point for certain categories of non-users, policy makers would be able to focus their efforts to
stimulate ICT acceptance. Consequently, the balance between perceived benefits and perceived costs is likely to differ for
different categories of individuals. This is based on the assumption that benefits and costs are similar for homogeneous
socio-demographic and socio-economic groups. Homogeneity, in this context, means that people share the same
characteristics in terms of the most important resources that determine the use of ICT: access, skills and attitudes (ASA).

ACCESS SKILLS
ICT
APPROPRIATION

ATTITUDES

Fig. 1. The ASA approach.

Please cite this article as: Verdegem, P., & Verhoest, P. Profiling the non-user: Rethinking policy initiatives stimulating
ICT acceptance. Telecommunications Policy (2009), doi:10.1016/j.telpol.2009.08.009
ARTICLE IN PRESS
4 P. Verdegem, P. Verhoest / Telecommunications Policy ] (]]]]) ]]]–]]]

A specific combination of conditions in terms of access to ICT, skills to master the devices and attitudes towards the
technology is called an ‘ASA profile’ (Fig. 1).
On a practical level, in order to set up effective e-inclusion measures, the advantage of this method is that groups of
individuals with relatively homogeneous ASA profiles can easily be identified and reached by policy makers. Very often
they are represented by professional or social organizations that know how to reach them and are willing to collaborate
with government. A specific offering can then be proposed to these groups, taking into account the specificities of their ASA
profile and their socio-economic background. Additional advantage of the group-based approach is that measures can
incorporate the influence of the social network of individuals. The latter is of major importance when it comes to ICT
acceptance (Dutta-Bergman, 2005; Frissen, 2000).

2.4. Methodological base

The proposed approach is based on a research project comprising three consecutive research stages. Phase I is aimed at
refining the assumption that members of homogeneous socio-demographic and socio-economic groups share similar ASA
profiles. It consists of a quantitative survey designed to gain insight into the perceptions of ASA by groups of individuals
with shared socio-demographic and socio-economic characteristics. Phase II of the project consists of qualitative in-depth
and focus group interviews with respondents from each group. The main objective of this phase is to improve the
understanding of why people do not use ICT at home and to examine possible incentives to lift people over the turning
point between non-usage and usage. Phase III intended to validate the findings of the previous two phases through a
confrontation of respondents with policy options inferred from their profiles. The latter is also investigated via a
quantitative survey.
Individuals are recruited as they are members of groups in society with a certain level of organization and can be
reached through a legitimate point of contact. These groups are sampled in a theoretical way, meaning that the selection of
individuals is based on a limited number of characteristics, that is, variables for which literature research has shown to be
of major importance for (non-)adoption of ICT (see Section 2.2). This results in certain prototypical profiles that are
exemplary of the societal diversity without being representative of the overall population.
In the theoretical sampling the following groups are selected: (1) single mothers with children; (2) people who just
started basic computer and internet training; (3) people who manage a micro-company (in this case butchers); (4) liberal
professions (in this case physical therapists); (5) lowly educated people with a technical background (in this case
labourers); (6) highly skilled people with a technical education (in this case mostly with an engineering degree); (7)
unemployed people; (8) people who work in the social sector (in this case nurses); (9) civil servants and (10) people who
are aged 60 years and older. The decision to include these groups is based on two criteria: firstly, the groups correspond
with a good (hypothetical) distribution of the main characteristics that may influence non-usage of ICT (e.g. for some
groups the financial part could be the main issue while for others the lack of ICT literacy or motivation to use ICT is more of
a determinant), and secondly, the individual respondents belong to a group that has some kind of formal organization
(through which they can be targeted by policy makers).
During Phase I, the quantitative survey, 200 individuals2 completed the questionnaire of which 184 valid questionnaires
are retained (after data cleaning). Data collection is organized via personal interviews. For the in-depth (qualitative)
personal interviews and focus groups of Phase II, interviews were conducted with 42 respondents in total. Overall 110
respondents returned a validly filled-in questionnaire for the validation study in Phase III.
All users except for groups 2 and 6 are self-declared non-users. Nevertheless, a majority of them indicated that they
have access to a computer and have an internet connection at their disposal. A preliminary conclusion is that non-use of
computer and internet in the household is not only a question of access but also that usage of ICT will not automatically
result from access (Brown, Venkatesh, & Bala, 2006, pp. 206–208; Selwyn, 2004, pp. 348–349).

3. Understanding the non-users

3.1. Main findings

3.1.1. ASA statements: perceptions towards ICT at home


An important first goal of the research is to map the respondents’ perceptions towards computer and internet at home.
To examine their perceptions, each is presented with a list of 37 statements. The list of statements is based on prior
research (De Marez, 2006) in which a large-scale meta-analysis of determinants for ICT appropriation has been conducted.
Starting from Rogers’ innovation characteristics (Rogers, 2003) the list is further elaborated with determinants from
different studies and existing theoretical models in the field of communication, social psychology and marketing. This
results in a basic list of 19 determinants, taking into account both innovation-related characteristics (e.g. complexity), and

2
Given the specific recruitment criteria and the data collection method (via personal interviews), it was a difficult task to reach a large sample size.
The objective was to assemble at least 10 respondents in each group. In this non-probabilistic way, a sample population of 200 respondents was reached,
making it possible to set up a mixed quantitative–qualitative research approach, within which there is a need to be cautious with generalizations.

Please cite this article as: Verdegem, P., & Verhoest, P. Profiling the non-user: Rethinking policy initiatives stimulating
ICT acceptance. Telecommunications Policy (2009), doi:10.1016/j.telpol.2009.08.009
ARTICLE IN PRESS
P. Verdegem, P. Verhoest / Telecommunications Policy ] (]]]]) ]]]–]]] 5

Table 1
Results of cluster analysis (K-Means Cluster Analysis).

1 Cluster 1 Cluster 2 Cluster 3 Cluster 4 Cluster 5 5


(N=39) (N=34) (N=13) (N=30) (N=68)

ENJOYMENT—using PC/internet at home seems funny to me At 2.95 3.09 4.69 4.50 4.07 Atþ
SOCIAL INFLUENCE—when everyone in my social environment is using PC/internet 2.36 2.56 4.15 4.17 3.87
at home, I will consider starting to use it myself
COMPLEXITY—PC/internet seems user friendly to me S 2.85 3.68 4.23 4.20 3.99 Sþ
MARKET STRATEGY—if I would buy a PC/internet, it is important to me that it is 3.21 3.50 4.69 3.90 3.99
supplied by a well-known brand
COST—using PC/internet at home seems expensive to me Acþ 3.79 3.68 3.69 4.10 4.10 Ac
TANGIBLES—if I would consider buying a PC, its design would be an important 2.13 2.15 3.00 2.77 3.16
argument for buying to me
IMAGE/PRESTIGE—using PC/internet at home has a positive impact on my image 1.56 1.59 3.23 2.00 2.71
and social status
PRODUCT KNOWLEDGE—I consider myself well informed about the possibilities S 2.23 3.41 2.38 4.00 3.00 Sþ
and (dis)advantages of using PC/internet
COMPLEXITY—I fear that using PC/internet at home is rather complicated for me Sþ 3.90 1.79 3.77 1.30 3.37 S
OPTIMISM—the fast technological developments are a good thing At 3.03 2.97 4.23 3.97 3.79 Atþ
SELF-EFFICACY—I have no problem to sort out how to use PC/internet by myself S 2.03 3.00 2.38 3.93 2.85 Sþ
SOCIAL INFLUENCE—using PC/internet at home is certainly a topic of discussion 2.41 2.41 4.54 3.20 3.28
among my friends and family
OBSERVABILITY—I am perfectly able to explain the strengths and weaknesses of S 1.44 2.56 1.85 3.67 2.46 Sþ
PC/internet to others
RELATIVE ADVANTAGE—I do not know when I would use PC/internet at home Atþ 2.97 2.79 1.85 1.27 2.74 At
WILLINGNESS-TO-PAY—even if it costs a bit more, using PC/internet at home is 2.38 2.74 4.15 3.93 3.79
something I really want
RELIABILITY–I doubt the reliability and proper functioning of using PC/internet at Atþ 3.46 2.47 2.92 2.30 3.40 At
home
PERCEIVED RISK—if I would have to use PC/internet at home on my own, I do not Sþ 4.33 2.03 3.38 1.57 3.34 S
think I would manage that
MARKET STRATEGY—if I would consider buying a PC/internet, I would first check 3.95 2.65 3.62 2.87 3.71
the ads, brochures and promotions
RELATIVE ADVANTAGE—the advantages of using PC/internet at home are more At 2.72 2.88 4.00 3.57 3.37 Atþ
important than the disadvantages for me
COMPATIBILITY—if I buy a PC, it has to be a model that fits with my personality 2.05 1.85 1.23 2.73 3.34
COST—using PC/internet at home will probably be too expensive for many Acþ 3.92 3.18 4.31 3.60 4.04 Ac
people
TRIALABILITY—I would like to try out PC/internet before buying it for myself 4.03 2.09 2.31 2.60 3.82
SOCIAL INFLUENCE—I am interested in buying a PC/internet for home, but only if 2.51 1.97 1.92 1.80 3.00
there are enough people in my social environment doing so
SOCIAL INFLUENCE—if I use PC/internet at home, it would certainly explain 1.97 1.76 2.00 2.53 3.01
something about me and my personality
COMPLEXITY—I fear that using PC/internet offers different possibilities, which Sþ 3.82 1.79 3.23 1.70 3.37 S
makes it too complicated to me
INNOVATIVENESS—based on what I already know about PC/internet, I will At 2.59 2.47 3.08 3.63 3.85 Atþ
certainly look for more information in order to buy a PC/internet
OPINION LEADERSHIP—people in my environment will certainly come to me for S 1.49 1.82 1.15 3.47 2.79 Sþ
advice concerning the usage of PC/internet
RELATIVE ADVANTAGE—using PC/internet at home would make life easier for me At 2.62 3.29 4.46 4.47 4.22 Atþ
OPTIMISM—If you do not want to run behind, adoption of new technologies is At 3.26 2.59 4.00 3.87 4.24 Atþ
necessary
VOLUNTARINESS—if I would buy a PC/internet, it would completely be my own 3.97 3.74 3.92 4.10 4.01
decision. Nobody can influence that decision
PERCEIVED SOCIAL RISK—if I would use PC/internet at home, people in my 3.46 2.03 2.62 1.63 2.82
environment would look odd at me
COMPATIBILITY—using PC/internet at home fits in my lifestyle At 1.69 2.29 3.23 3.83 3.24 Atþ
TRIALABILITY—before buying a PC/internet, I would like the advice of some 4.56 3.38 4.31 3.63 4.24
people
PERCEIVED FINANCIAL RISK—I fear that using PC/internet at home would exceed Acþ 3.18 2.06 2.31 3.07 3.01 Ac
my budget
SOCIAL INFLUENCE—even if I am interested, I would not buy a PC/internet if my 2.00 1.68 1.08 1.37 2.31
environment would be negative towards it
SOCIAL INFLUENCE—most people in my environment are certainly enthusiastic 3.92 3.82 4.77 4.23 4.15
about using PC/internet at home
RELIABILITY—I doubt about the safety of using PC/internet at home (internet Atþ 4.00 3.29 3.00 3.00 4.00 At
transactions and/or privacy)

Ac=access, S=skills and At=attitudes, see Table 2.


 Statistically significant difference (po0.01).
 Statistically significant difference (po0.05).
 No statistically significant difference.

Please cite this article as: Verdegem, P., & Verhoest, P. Profiling the non-user: Rethinking policy initiatives stimulating
ICT acceptance. Telecommunications Policy (2009), doi:10.1016/j.telpol.2009.08.009
ARTICLE IN PRESS
6 P. Verdegem, P. Verhoest / Telecommunications Policy ] (]]]]) ]]]–]]]

adopter-related characteristics (e.g. innovativeness) as the impact of the marketing strategy (De Marez, Vyncke, Berte,
Schuurman, & De Moor, 2007, p. 82).
These 19 determinants are translated to the specific context of computer and internet use at home and results in a list of
37 statements (see Table 1) aimed at obtaining information about the respondents’ specific ASA profile. (1) Some of the
statements are aimed at examining whether individuals have positive or negative attitudes towards computer and internet
at home, measured, for example, via ‘relative advantage’ (‘‘Computer and internet at home will certainly make life easier for
me’’) or ‘optimism’ (‘‘Fast technological developments are a good thing’’). (2) Other statements focus on the presence or
lack of skills and competences, measured, for example, via ‘complexity’ (‘‘Computer and internet at home seem user-
friendly for me’’) or ‘perceived risk’ (‘‘If I would have to use computer and internet at home on my own, I do not think I
would manage that’’). (3) Statements also aimed at detecting the presence or absence of barriers to access ICT, measured
through ‘cost’ (‘‘Computer and internet at home seem expensive to me’’) or ‘perceived financial risk’ (‘‘I fear that using
computer and internet at home would exceed my budget’’).
Other statements serve as measurement scales to gain insight into the influence of more generic factors such as, for
example, the influence of social networks (‘‘Before buying a PC/internet, I would like the advice of some people’’) or
marketing strategies of the ICT industry (‘‘If I would consider adoption of computer and internet at home, I would first
check the ads, brochures and promotions’’). Respondents are asked whether or not they could agree with these statements,
measured via a five-point Likert scale varying from ‘I do not agree at all’ to ‘I fully agree’.

3.1.2. Costs and attitudes towards computer and internet


Based on the mean scores of each statement, the perception of all users alike is that computers and internet are quite
expensive. In addition, most respondents believe that ICT may be too expensive for a larger part of the population. The high
cost of ICT infrastructure is still perceived as an important barrier for adoption of technology in households (Brown &
Venkatesh, 2005). The negative perception of the price factor, however, only weakly relates to people’s attitudes towards
ICT. Indeed, even though respondents are selected as non-users (at home), it can be observed that a larger number of them
have positive attitudes towards ICT. They think that using computers and internet at home makes their life easier. The
respondents indicate that most of the members of their social network are enthusiastic about ICT at home. Social influence
plays an important role but for most respondents negative perceptions of members of their social network will not prevent
them from adopting computers and internet into the household.

3.1.3. Actual skills to master the devices


Responses are much more divided on skills, measured via statements such as ‘complexity’ or ‘self-efficacy’ (‘‘people’s
judgments of their capabilities to organize and execute courses of action required to attain designated types of
performances’’; Bandura, 1986, p. 391). Some report that they lack basic skills (which prevents them from starting to use a
computer at home), whilst others can be considered as sufficiently ICT competent, for example because they (have to) use
the computer at work. In addition to the perceptions of the respondents towards complexity and usability of ICT,
the respondents’ actual skills are also examined. For this purpose they are shown a list of ICT-related tasks (based on
Duimel & De Haan, 2007, pp. 66–78), varying from very basic (for example, sending and receiving e-mail) to very complex
(for example, installing a new version of Windows).

3.1.4. Social network analysis


Another part of the survey examines the influence of social network of respondents on the use of PCs and internet at
home. The number of interactions with family, friends, acquaintances, colleagues and neighbours is investigated and,
additionally, the ‘social resources’ that people have at their disposal within their social network are mapped out (social
resources are social contacts that people can rely on to ask for advice when purchasing equipment or get assistance from in
case of computer problems) (van Dijk, 2005, p. 53). Some scholars who have studied the role of social resources in ICT
acceptance call them ‘warm experts’ (Bakardjieva, 2005, p. 99) or ‘local experts’ (Stewart, 2007, p. 551).
In addition, attention is also given to the ‘technological culture’ of people’s social network, which is the way people deal
with technological artefacts and applications in their social relations and in the everyday culture of their households
(Punie, 2000, p. 558). The results of this analysis show that family is still the most important (social) determinant for the
appropriation of computers and internet at home. People prefer getting help from family members for commercial advice
and for troubleshooting as well as to learn new skills. The presence of these experts is not only important for the domestic
use of computers and internet but also for taking full advantage of it, for example to help interpret and to make sense of the
new information or services that become available (Wyatt, Henwood, Hart, & Smith, 2005, p. 211).

3.2. Quantification: further analysis

An important goal of the first research stage is to test the assumption that socio-demographically and socio-
economically related respondents yield similar profiles in terms of access, skills and attitudes (ASA). Furthermore, of
interest is the question—is it possible to draw-up a consistent ASA profile for people who are more connected through
affiliation with a representative social (or professional) organisation?

Please cite this article as: Verdegem, P., & Verhoest, P. Profiling the non-user: Rethinking policy initiatives stimulating
ICT acceptance. Telecommunications Policy (2009), doi:10.1016/j.telpol.2009.08.009
ARTICLE IN PRESS
P. Verdegem, P. Verhoest / Telecommunications Policy ] (]]]]) ]]]–]]] 7

Table 2
ASA bipolarity.

Ac(cess) þ People have no problem with access to computer and internet at home
Ac(cess)  People have problems with access to computer and internet at home
S(kills) þ People are skilled sufficiently to master the devices
S(kills)  People lack skills to master the devices
At(titudes) þ People have positive attitudes towards the technology
At(titudes)  People have negative attitudes towards the technology

Table 3
ASA profiles.

LABEL N

1 INCAPABLE REFUSERS 39
2 SELF-CONSCIOUS INDIFFERENTS 34
3 THE WILLING BUT INCAPABLE 13
4 SKILLED ICT LOVERS WITH LIMITED ACCESS 30
5 PRICE-SENSITIVE PRAGMATISTS 68

Table 4
Membership of ASA profiles.

GROUP MEMBERSHIP MEMBERSHIP ASA PROFILES

Civil servants Skilled ICT lovers with limited access


Unemployed people Skilled ICT lovers with limited access
Highly skilled technical education Skilled ICT lovers with limited access
Single mothers with children Skilled ICT lovers with limited access
Physical therapists Self-conscious indifferents
PC and internet students Price-sensitive pragmatists
Elderly people Incapable refusers
Butchers Incapable refusers
Nurses
Lower education with technical diploma

The 37 statements on ASA in the quantitative survey are coded in the following way. Positive answers were attributed a
plus (þ) and negative answers a minus (; see Table 1). For example, a person who fully agreed with the statement
‘‘Computers and internet are user-friendly technologies’’ is considered to provide an indication of a positive attitude and
got an Atþ. This way of working (for each of the 37 statements) allowed the ability to distinguish the respondents’ answers
in terms of bipolarities between Acþ, Ac, Sþ, S, Atþ and At, as illustrated in Table 2.
Adding up these scores for each of the 37 statements allows the profiling of the respondents in terms of their ASA
characterization. Subsequently, a K-Means Cluster Analysis (SPSS) is performed, based on the respondents’ answers on this
list of 37 statements concerning their perceptions of computer and internet at home (see Table 1).
The clusters demonstrate the existence of different typologies in terms of ASA profiles. Each label in this classification
(Table 3) represents a specific combination of the factors investigated, in which each factor carries a different weight.
Statistical testing is conclusive about the relation between the ASA profile and the group affiliation. The results of
Chi-Square Test (Pearson Chi-Square) show a clear-cut relationship (statistical significance po0.01) between the
membership of the groups (of the theoretical sampling) and the membership of the ASA profiles. In Table 4 an overview is
presented for which groups the hypothesis could be accepted and indicates which ASA profile corresponds to a majority of
the group members.
As shown in Table 4, there are two cases in which the socio-professional affiliation of people does not correspond with a
specific ASA profile: the nurses and the people with a lower technical education. Both groups are distributed across
different clusters. The fact that none of the majority of the groups can be classified as ‘willing but incapable’ could easily be
explained by the smaller number of respondents of this ASA profile.

3.3. Description of classification

The goal of the qualitative research is to refine the insights into the different profiles of non-users. The aim is to
understand why certain groups contain a majority of people who belong to a specific ASA profile and why other groups do

Please cite this article as: Verdegem, P., & Verhoest, P. Profiling the non-user: Rethinking policy initiatives stimulating
ICT acceptance. Telecommunications Policy (2009), doi:10.1016/j.telpol.2009.08.009
ARTICLE IN PRESS
8 P. Verdegem, P. Verhoest / Telecommunications Policy ] (]]]]) ]]]–]]]

not. Another aim is to examine which possible incentives could lift people over the turning point between non-usage and
usage. The qualitative research allows the ASA scores of the respondents to be put into perspective, to reflect their
specificity and to make suggestions as to how policy can approach these groups.

 Incapable refusers: for these people, computer prices and internet tariffs are not a major obstacle for acceptance, but they
lack the skills to master ICT and they have rather negative attitudes towards ICT. Their ICT illiteracy and their lack of
interest reinforce each other, which renders it difficult to persuade this group to start using ICT at home.
 Self-conscious indifferents: the non-use of individuals of this group can be mainly explained by their negative attitudes.
Access is not a major problem and they are sufficiently skilled to deal with ICT. Since they potentially have access and
know how to use ICT, these individuals could also be categorised as ‘want nots’ (Selwyn, 2004, p. 348; van Dijk & Hacker,
2003, p. 317).
 The willing but incapable: members of this group are motivated to use computer and internet at home, but they lack the
necessary skills and they have difficulties accessing ICT.
 Skilled ICT lovers with limited access: these people have positive attitudes towards ICT and they are ICT literate.
Consequently, their main problem resides in obtaining access to ICT at home.
 Price-sensitive pragmatists: individuals of this group have average ICT skills and are moderately motivated. The
(perceived) high prize of infrastructure and the connection to internet seems to be the main barrier for technology
appropriation in the household for them.

The descriptions still leave the question unanswered of why a generic ASA profile could not be detected for two groups?
A sensible explanation could be that these groups are in fact heterogeneous in composition. This could partially account for
the ‘lowly skilled with technical education’, but not for the nurses. Closer examination of these two groups during the
qualitative interviews revealed that the decisions of these people not to adopt and use ICT at home is particularly strongly
motivated by a lack of skills along with low expectations with regard to the added value of ICT usage. In other words, the
expected benefits do not outweigh the ‘cost’ of acquiring the necessary skills.
Based on the observations about these two low(er) income and education groups it is possible to conclude that the
perception of costs is indeed related to the perception of utility. It can be assumed that a relatively low perception of utility
will have less negative impact on persons with more resources available. The reason is that the cost of ICT appropriation
takes a lower proportion out of the budget that could otherwise be spent on other utilities that may be (rightfully)
perceived as more essential. On the contrary, when the perceived added value is more obvious, individuals will be more
motivated to acquire that utility despite their limited resources.
For policy makers, the observation that attitudes towards ICT differ strongly in groups with relatively less resources
suggests that adoption may be stimulated not only by lowering costs, but also by increasing the (real or perceived) utility of
ICT for these people, as this would legitimise their expenses for ICT.

3.4. Heuristic reinterpretation

In Fig. 2, the 37 ASA scores are condensed, in order to obtain a heuristic instrument that allows a comparison between
the different profiles in terms of their ASA characteristics. A four-point scale is used, ranging from very positive (þþ), to
positive (þ) over negative () to very negative () for perceptions of problems with respect to ASA. As illustrated in Fig. 2,
reflection on the qualitative findings also yields the insight that a negative perception of one of the ASA dimensions may
influence the perception of other ASA dimensions. Indeed, the research shows that the three ASA pillars are mutually
connected, i.e. they influence each other. More specifically, initiatives to increase skills would allow people to get a more
profound understanding of what the benefits of particular applications could be. Policy makers could take advantage of

Ac(cess) S(kills) At(titudes)

ASA 1: INCAPABLE REFUSERS ->+ -- -

ASA 2: SELF-CONSCIOUS INDIFFERENTS + +>++ --

ASA 3: THE WILLING BUT INCAPABLE - - ++

ASA 4: SKILLED ICT LOVERS WITH LIMITED ACCESS - +>++ ++

ASA 5: PRICE-SENSITIVE PRAGMATISTS ->+ ->+ ->+

ICT UNDER-SKILLED ---

REJECTIONISTS/REFUSNIKS ---

ECONOMICALLY LESS FAVOURED ---

(Legend: + = positive / - = negative / > = varying from X to Y / = influence

Fig. 2. Heuristic scheme.

Please cite this article as: Verdegem, P., & Verhoest, P. Profiling the non-user: Rethinking policy initiatives stimulating
ICT acceptance. Telecommunications Policy (2009), doi:10.1016/j.telpol.2009.08.009
ARTICLE IN PRESS
P. Verdegem, P. Verhoest / Telecommunications Policy ] (]]]]) ]]]–]]] 9

these observations as purposeful measures can be set up especially with regard to enabling people to transfer over the
turning point from non-usage to usage. The challenge then is to detect what the incentive to go across this turning point
needs to be for a specific group.
The original ASA profiles were complemented with three additional profiles of people who have extremely negative
scores on one of the ASA dimensions. This addition is inspired by the case of the nurses, who could be found in all profiles,
except the ‘skilled ICT lovers’. The nurses’ case thus falls under the category of ‘ICT under-skilled’. The other two categories
are poorly represented in the research sample but are known to exist. ‘Rejectionists/refusniks’ are people who consciously
refuse to use ICT for cultural or ideological reasons (Selwyn, 2004, p. 348). The category of ‘economically less favoured’ is
self-explanatory. As is illustrated in the nurses’ case, an extremely negative score on one of the ASA dimensions may
constitute a blockage, regardless of how positive the scores are on the other two categories. A targeted approach based on
segmentation techniques is certainly recommend in these cases.

3.5. Exploring input for effective e-inclusion initiatives

A final round of in-depth interviews with respondents offers the opportunity to explore possible scenarios that could lift
them over the turning point between non-usage and usage. In other words, this research aimed at obtaining a clearer view
on e-inclusion measures that are more adapted to specific conditions that apply of non-users. On the basis of these
findings, specific sets of measures can be composed for each group. In order to test the validity of these findings, an extra
(quantitative) research phase is set up, to which 110 respondents reply.3 This survey allowed a more accurate investigation
into how different policy actions are perceived by people belonging to different profiles and whether these findings are
consistent with their profiles.
These in-depth interviews provided support for the group-based approach in stimulating ICT acceptance. Respondents
with similar perceptions concerning computer and internet (ASA profiles) share specific expectations towards policy
measures. These initiatives should take into account the insights concerning the three ASA dimensions that characterize
each group.
For some ASA profiles (ASA profile 4—skilled ICT lovers with limited access, ASA profile 5—price-sensitive pragmatists
and ASA profile 3—the willing but incapable) e-inclusion measures should focus in the first place on offering more
affordable computer and internet infrastructure. This should be combined, however, with other actions that are specific for
each ASA profile: respondents of ASA profile 3 would benefit from initiatives to improve their skills, while respondents of
ASA profile 5 would merely take advantage of actions to increase their perception of the utility of ICT products.
Other ASA profiles (ASA profile 1—incapable refusers) can hardly detect the added value of ICT use and would therefore
benefit from awareness-raising initiatives combined with ICT initiatives to familiarize them with (basic) applications
(in which they then perceive added value). Increasing the perception of utility is the major challenge for members of ASA
profile 2—self-conscious indifferents. This could probably be obtained through more and better communication about
services that are likely to add value to their lives (e.g. more convenience and avoiding loss of time).
Based on the specific preferences towards policy measures it is suggested that actions should primarily focus at
increasing utility that can be offered by ICT use in everyday life. Perception of the added value, however, is dependent on
the perceptions towards ASA by members of each group. As a consequence, policy actions should primarily focus on
benefits that could overcome the major blockage of each segment.

4. Conclusion

In this article a new policy approach for stimulating ICT acceptance is proposed. It is based on strategies of segmentation
and differentiation, demonstrating and emphasizing the viewpoint that non-users may not be seen as one generic group.
Empirical foundation is found for the assumption that members of homogeneous groups share similar profiles in terms of
conditions to access to ICT (Ac), skills to master the devices (S) and attitudes towards the technology (At). Based on a list of
technology acceptance determinants, each group can be profiled in terms of ASA characteristics.
The article provides support for an alternative interpretation towards the utility notion. The relative utility of a product
is seen as the perceived increase of utility obtained by appropriating a product in relation to all emotional, cognitive and
material resources available to an individual. ICT adoption/usage can be explained through the relation of the perceived
cost of ICT and the perceived utility. In addition, this benefits versus costs relation is determined by individuals’ perceptions
towards ASA and the interplay between them. A relatively low perception of utility may have less negative effect on
individuals having more resources available than on individuals with less resources at their disposal, because the costs of
ICT use represent a lower proportion of individuals with more resources and therefore takes a lower proportion out of the
available resources, which could be spent on other utilities.
This approach is born out of a confrontation between theory and political practice. It is inspired by an alternative
interpretation of the utility notion. This framework may inspire policy makers to set up creative measures stimulating ICT

3
These respondents are recruited from the sample of the first research stage. The advantage is that information is available about ASA profiles that
each respondent belongs to.

Please cite this article as: Verdegem, P., & Verhoest, P. Profiling the non-user: Rethinking policy initiatives stimulating
ICT acceptance. Telecommunications Policy (2009), doi:10.1016/j.telpol.2009.08.009
ARTICLE IN PRESS
10 P. Verdegem, P. Verhoest / Telecommunications Policy ] (]]]]) ]]]–]]]

acceptance. Firstly, the findings suggest the need for a shift in focus of traditional inclusion away from ‘removing barriers’
towards ‘adding value’. The research indeed recommends that measures that increase the (perceived) utility of ICT usage
for users may be as effective as measures that reduce the cost of using ICT. Secondly, the findings suggest that policies
might be more effective and relatively less expensive if measures are not generic but targeted to specific audiences.
Last but not least, the approach offers practical tools that make it possible to cluster groups into a limited number of
non-user profiles comprising and combining several groups with common characteristics in terms of ASA. By compensating
for their specific shortcomings, all groups in society can be equally served with a specific offering that will allow them to
become ICT users at home.

Acknowledgements

The authors gratefully acknowledge the support and input of the members of the advisory group of the research project
of which this article is the result: Jan Deprest (Chairman of Fedict), Mila Druwe (Fedict), Bregt Bourgeus (Fluor), Patrick
Slaets (Agoria), Laurence Hauttekeete (Ghent University) and Eric Van Heesvelde (Ghent University).

References

Bakardjieva, M. (2005). Internet society: The internet in everyday life. London: Sage.
Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Englewood Cliffs: Prentice-Hall.
Barzilai-Nahon, K. (2006). Gaps and bits: Conceptualizing measurements for digital divide/s. The Information Society, 22(5), 267–278.
Brants, K., & Frissen, V. (2005). Inclusion and exclusion in the information society. In R. Silverstone (Ed.), Media, technology and everyday life in Europe.
London: Ashgate Publishing.
Brown, S., & Venkatesh, V. (2005). Model of adoption of technology in households: A baseline model test and extension incorporating household life cycle.
MIS Quarterly, 29(3), 399–426.
Brown, S., Venkatesh, V., & Bala, H. (2006). Household technology use: Integrating life cycle and the model of adoption of technology in households. The
Information Society, 22(4), 205–218.
Compeau, D., Higgins, C., & Huff, S. (1999). Social cognitive theory and individual reactions to computing technology: A longitudinal study. MIS Quarterly,
23(2), 145–158.
Davis, F. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.
De Marez, L. (2006). Diffusie van ICT-innovaties: Accurater gebruikersinzicht voor betere introductiestrategieën. Ph.D. dissertation, Department of
Communication Studies, Ghent University, unpublished.
De Marez, L., Vyncke, P., Berte, K., Schuurman, D., & De Moor, K. (2007). Adopter segments, adoption determinants and mobile marketing. Journal of
Targeting, Measurement and Analysis for Marketing, 16(1), 78–95.
Duimel, M., & De Haan, J. (2007). Nieuwe links in het gezin. De digitale leefwereld van tieners en de rol van hun ouders. Sociaal en Cultureel Planbureau
(SCP), Den Haag.
Dutta-Bergman, M. (2005). Access to the internet in the context of community participation and community satisfaction. New Media and Society, 7(1),
89–109.
FOD Economie, M. (2007). Statistieken over de informatie- en communicatietechnologie (ICT), Enquête bij de Belgische bevolking. Brussel: FOD Economie,
Algemene Directie Statistiek en Economische Informatie.
Frissen, V. (2000). ICTs in the rush hour of life. The Information Society, 16(1), 65–75.
Fuchs, C. (2009). The role of income inequality in a multivariate cross-national analysis of the digital divide. Social Science Computer Review, 27(1), 41–58.
Gunkel, D. J. (2003). Second thoughts: Toward a critique of the digital divide. New Media and Society, 5(4), 499–522.
Kennedy, T., Wellman, B., & Klement, K. (2003). Gendering the digital divide. IT and Society, 1(5), 72–96.
Kvasny, L. (2005). The role of the habitus in shaping discourses about the digital divide. Journal of Computer-Mediated Communication, 10(2).
Livingstone, S. (2004). Media literacy and the challenge of new information and communication technologies. The Communication Review, 7(1), 3–14.
Martin, S., & Robinson, J. (2007). The income digital divide: Trends and predictions for levels of internet use. Social Problems, 54(1), 1–22.
Milner, H. (2006). The digital divide: The role of political institutions in technology diffusion. Comparative Political Studies, 39(2), 176–199.
Norris, P. (2001). Digital divide, civic engagement, information poverty and the internet worldwide. Cambridge: University Press.
OECD, P. (2008). Belgium. OECD e-government studies. Paris: OECD Publishing.
Punie, Y. (2000). Domesticatie van informatie- en communicatietechnologie. Adoptie, gebruik en betekenis van media in het dagelijks leven: continue
beperking of discontinue bevrijding? Ph.D. dissertation, Free University Brussels (VUB), Brussels, unpublished.
Rice, R. E., & Katz, J. E. (2003). Comparing internet and mobile phone usage: Digital divides of usage, adoption, and dropouts. Telecommunications Policy,
27(8–9), 597–623.
Roe, K., & Broos, A. (2005). Marginality in the information society: The socio-demographics of computer disquietude. Communications: The European
Journal of Communication, 30(1), 91–96.
Rogers, E. M. (2003). Diffusion of innovations (5th ed). New York: The Free Press.
Sassi, S. (2005). Cultural differentiation or social segregation? Four approaches to the digital divide. New Media and Society, 7(5), 684–700.
Selwyn, N. (2004). Reconsidering political and popular understandings of the digital divide. New Media and Society, 6(3), 341–362.
Selwyn, N. (2006). Digital division or digital decision? A study of non-users and low-users of computers. Poetics, 34(4–5), 273–292.
Selwyn, N., & Facer, K. (2007). Beyond the digital divide: Rethinking digital inclusion for the 21st century. Opening Education series, Futurelab.
Servon, L. J. (2002). Bridging the digital divide: Technology, community and public policy. Oxford: Blackwell.
Stewart, J. (2007). Local experts in the domestication of information and communication technologies. Information, Communication and Society, 10(4),
547–569.
van Dijk, J., & Hacker, K. (2003). The digital divide as a complex and dynamic phenomenon. The Information Society, 19(4), 315–326.
van Dijk, J. (2005). The deepening divide: Inequality in the information society. Thousand Oaks, CA: Sage.
van Dijk, J. (2006). Digital divide research, achievements and shortcomings. Poetics, 34(4–5), 221–235.
Van Rompaey, V., Struyf, K., & Roe, K. (2002). Children’s influence on internet access at home: Adoption and use in the family context. Information,
Communication and Society, 5(2), 189–206.
Vehovar, V., Sicherl, P., Hüsing, T., & Dolnicar, V. (2006). Methodological challenges of digital divide measurements. The Information Society, 22(5), 279–290.
Warren, M. (2007). The digital vicious cycle: Links between social disadvantage and digital exclusion in rural areas. Telecommunications Policy, 31(6–7),
374–388.
Warschauer, M. (2003). Technology and social inclusion: Rethinking the digital divide. Cambridge: MIT Press.

Please cite this article as: Verdegem, P., & Verhoest, P. Profiling the non-user: Rethinking policy initiatives stimulating
ICT acceptance. Telecommunications Policy (2009), doi:10.1016/j.telpol.2009.08.009
ARTICLE IN PRESS
P. Verdegem, P. Verhoest / Telecommunications Policy ] (]]]]) ]]]–]]] 11

Wyatt, S. (2005). Non-users also matter: The construction of users and non-users of the internet. In N. Oudshoorn, & T. Pinch (Eds.), How users matter. The
co-construction of users and technology (pp. 67–79). Cambridge: MIT Press.
Wyatt, S., Henwood, F., Hart, A., & Smith, J. (2005). The digital divide, health information and everyday life. New Media and Society, 7(2), 199–218.
Yu, L. (2006). Understanding information inequality: Making sense of the literature of the information and digital divides. Journal of Librarianship and
Information Science, 38(4), 229–252.

Please cite this article as: Verdegem, P., & Verhoest, P. Profiling the non-user: Rethinking policy initiatives stimulating
ICT acceptance. Telecommunications Policy (2009), doi:10.1016/j.telpol.2009.08.009

Você também pode gostar