Public Sector Transformation Through E-Government

Home > Other > Public Sector Transformation Through E-Government > Page 26
Public Sector Transformation Through E-Government Page 26

by Christopher G Reddick


  and Keil (2008) cite van Dijk’s model. Van Dijk (1999) outlines four kinds

  of access which surround the digital divide:

  1.

  Psychological Access—low digital experience caused by lack of inter-

  est, computer fear, and unattractiveness of the new technology;

  2.

  Material Access—little to no access to computers and network

  connections;

  3. Skills Access—lack of digital skills caused by inadequate education;

  4. Usage Access—little to no signifi

  ficant usage opportunities within the

  home or workplace.

  Psychological access, the “mental barrier,” is commonly thought to only affec

  ff t

  old people (van Dijk & Hacker, 2000). However, the “mental barrier” affec

  ff ts

  other groups of people like housewives and illiterates (van Dijk & Hacker,

  2000). Researchers hardly address this type of access divide (van Dijk, 2006).

  Van Dijk (1999) refers to material access as “hurdles” or “barriers” to the information and network society. Material access is seen to describe both

  access to computers and network infrastructure (Epstein et al., 2011). Van

  Dijk and Hacker (2000) argue that public policy is “engrossed” with material

  access and think the problem of information inequality is solved with just giv-

  ing computer and Internet access to the population. The lack of digital skills

  is described as inadequate knowledge to operate the technology and manage

  hardware and software (van Dijk & Hacker, 2000). Van Dijk (1999) argues

  that the skills access is a temporary phenomenon and people overcome the

  lack of knowledge after using the technology over a period of time. According

  to van Dijk (2006), access problems gradually shift from psychological access

  and material access to skills access and usage access. The shift in access prob-

  lems results in a larger usage gap where the population is split into those who

  gain significan

  fi

  t benefi t

  fi s from technological advancements and those who only

  use the technology for basic applications (van Dijk & Hacker, 2000). About

  16 percent of non-users live in households where an individual uses the Inter-

  net (Smith, 2010a). Those with low interactions with computers cite usability

  and availability as the key reasons they do not access the Internet (Smith,

  Rational Choice Theory 143

  2010a). According to Kettemann (2008), a Working Group on e-inclusion

  established within the eEurope Advisory Group approach the divide as “both

  a technical (‘access’) and a personal dimension (‘inclusion’, ‘ability’).”

  One approach to understanding the full concept is to study the phenom-

  enon in a continuum alongside other socioeconomic inequities (Barzilai-

  Nahon, 2006). The fi

  first step to identifying a problem concerning equality

  according to Sen (1992) is answering the question: what inequality does

  the digital divide concept refer to? Although social and economic literature

  have pointed out ten potential answers to that question, the most popular

  is still physical or material access (van Dijk, 2006). A problem with focus-

  ing on physical access is the never ending evolution of the technology on

  the market (Vehovar, Sicherl, Husing, & Dolnicar, 2006). Van Dijk (2006)

  suggests the digital divide phenomenon is always as new as the technology

  it is linked to at a particular time.

  Dewan and Riggins (2005) link access to ICT to community interac-

  tion and e-commerce as well as improving social welfare. Belanger and

  Carter (2009) point out the concerns about the digital divide and its impact

  on the growth of e-services. Studies found that the digital divide hindered

  e-government services (Belanger & Carter, 2009; Fang, 2002). By analyz-

  ing the digital divide at three levels—individual level, organizational level,

  and global level—researchers found overlapping topics which include the

  impact on economies, social opportunities and human capital (Dewan &

  Riggins, 2005; Korupp & Szydlik, 2005; Wattal et al., 2011). One general

  fi

  finding across the digital divide is that the widening or closing of the gap is

  parallel to economic inequality and choice (Fontenay & Beltran, 2008).

  2.2 Rational Choice Theory

  Rational choice theory (RCT) is an approach used to understand human

  behavior. RCT is based on the assumption that people make choices that

  help them achieve their objective and maximize their utility (Simon, 1955).

  Rational choice theorists have become increasingly mathematical and for-

  mal (Scott, 2002). However, the trend towards more formal models of ratio-

  nal action has not discouraged researchers from adapting the models to

  explain diverse domains including political science (Johnson, 1997; Riker,

  1990; Simon, 1985), criminology (Akers, 1990; Becker, 1968; Cornish &

  Clarke, 1987), and economic growth (North, 1994; Sidrauski, 1967). Soci-

  ologists and political scientists now adapt theories around the assumption

  that people are essentially rational in character (Masatilioglu & Ok, 2005).

  Scott (2002) states that rational choice theory denies the existence of any

  actions not directed by ration which distinguishes RCT from other forms

  of theory.

  One popular study that focuses extensively on behavior and rational

  choice theory is Becker (1968). Becker (1968) uses rational choice theory to

  understand the impact of human behavior on public and private policies on

  144 Porche

  Millington and Lemuria Carter

  illegal behavior (Becker, 1968). Becker (1978), Hogarth and Reder (1987),

  and Green and Shapiro (1996) discuss rational choice theory beyond con-

  ventional economic issues. The theory developed by Becker (1968) can be

  applied to any eff or

  ff t to impede or support human behavior (Li, Zhang, &

  Sarathy, 2010).

  Various studies apply rational choice theory to explain a multitude of

  behavioral topics from security policy compliance to consumption (Chai,

  2008; Li et al., 2010; Vale, 2010). Li et al. (2010) applied rational choice

  theory to examine employees’ intentions to comply with their workplace

  Internet use policy. According to Li et al. (2010), employees’ compliance

  intentions are based on competing perceived benefi ts

  fi and security risks.

  D’Arcy, Hovav, and Galletta (2009) also explores IS security using rational

  choice. Vale (2010) analyzes rational choice theory and the standard model

  of inter-temporal decision making to reduce the gap between the theory and

  clinical defi

  finition of addiction. The study also emphasizes one of the theory’s

  assumptions—individuals are “forward-looking and their decisions ratio-

  nal” (Vale, 2010).

  Previous predictive models of behavior have involved economic theory

  intertwined with a social dilemma by using rational choice theory as its

  framework. According to Chai (2008), further discussion and the call for

  more robust knowledge on applying RCT to other disciplines prompted

  researchers to use it in more social and economic issues. The subsequent

  develo
pment of rational choice theory took place in economics, political

  science and sociology (Chai, 2008). Chai (2008) argues that the predictive

  behavioral modeling could apply to social sciences as well as hard scientists

  like computer scientists approach to technology diffusion. RCT is believed

  to assist in the dialogue between social and hard science studying a social

  phenomenon (Chai, 2008). Chai (2008) states that “no other existing major

  theoretical approach equals conventional rational choice in meeting a com-

  bination of criteria” which justifi

  fies the dominance the theory has in social

  and economic studies. The ability to predict behavior around choosing to

  connect to a network or to gain the skills to enhance usage would be an

  advantage in closing the technology gap known as the digital divide.

  3 RCT AND THE DIGITAL DIVIDE

  We draw upon rational choice theory to understand the four types of access

  divides. Prior to physical access comes the desire to own a computer and to

  be connected to a network. In 2011, the two most commonly cited reasons

  for not having Internet access in the home are that the access is not needed

  and the access is too expensive (NTIA, 2011). Researchers can use RCT to

  develop techniques to engage the population with low motivation. Table

  11.1 shows the four types of access divides and examples of each. Table 11.2

  includes diverse research questions related to the interaction of the digital

  divide and RCT. Each access divide has factors that hinder the population

  Rational Choice Theory 145

  from receiving the full benefi

  fits of technology innovation. We use RCT to

  formulate research questions that address how to tackle narrowing each

  type of access divide. Backed by the idea that people make decisions based

  on rationality, we recommend using research questions to understand the

  thought process to reach a rational decision. Tables 11.1 and 11.2 can be used to direct future research on the diverse types of access divides.

  Table 11.1 Four Types of Access Divides

  Psychological Access

  Material Access

  • Fear of the unknown

  • No network connection

  • Lack of interest

  • No access to a computer

  • Unattractive technology

  • Lack of income to purchase computer

  or network connection

  Skills Access

  Usage Access

  • Inability to navigate computer system • Limited technology use in the workplace

  • Low social support

  • Little opportunity to use the computer

  • No assistance to grasp digital skills

  for personal tasks

  • Low interaction with computers

  Table 11.2 Rational Choice Theory to Understand the Access Divide

  Psychological Access

  Material Access

  1. How can training be used to mini-

  1. What impact will computer/technology

  mize computer anxiety in the elderly

  subsidies from the government have

  population?

  on the diff usion of computer

  ff

  -based

  2. How can user awareness programs

  systems and services?

  be used to increase the perceived

  2. Should technology providers be held

  benefi

  fits of adopting technological

  responsible for helping to close the

  innovations?

  digital divide?

  3. What factors entice non-users to try

  3. What is the impact of community

  technological innovations?

  centers equipped with computers and

  network connection on the desire to

  own a personal computer?

  Skills Access

  Usage Access

  1. What types of programs should be

  1. Does access to computers in the

  implemented to increase digital skills?

  workplace enhance usage at home?

  2. What impact does technology design

  2. Will the availability of e-services

  and the user-interface have on the digi-

  increase the use of technology?

  tal divide? How can the IS community 3. What types of technological innova-

  make technology more user-friendly?

  tions promote more computer usage

  3. What types of training are most effec-

  ff

  beyond basic tasks such as sending an

  tive at reducing the skill divide?

  email?

  146 Porche Millington and Lemuria Carter

  This chapter explores the growth and use of Internet-based technology as

  well as the disparity associated with it. The digital divide is a multifaceted

  issue and requires solutions to address all four of the access divides. For this

  reason, the identifi

  fication of non-user and user groups is an essential step

  toward implementing proper policies and recommendations. The quadrant

  in the table below provides an initial framework of gaps associated with

  each access divide. According to Fuller, Vician, and Brown (2006), there is

  a correlation between computer self-effi

  fficacy and technology usage. Com-

  puter self-effi

  fficacy refers to an individual’s judgment of his capabilities to

  use computers and complete goals (Venkatesh & Davis, 2000). Researchers

  suggest that socio-economic status is the most signifi

  ficant power in distin-

  guishing non-users from users (Hsieh et al., 2008; Lenhart et al., 2003).

  Table 11.3 highlights the relationship between socio-economic status and computer self-effi

  fficacy with the four access divides.

  We propose this quadrant as an eff

  ffort to identify common barriers to

  access among certain groups of people. Individuals with high socio-eco-

  nomic status and low computer self-effi

  fficacy face barriers associated with

  psychological and skill access divides. The usage access divide is a potential

  barrier for individuals with high socio-economic status and high computer

  self-effi

  fficacy. Individuals with low socio-economic status and low computer

  self-effi

  fficacy face barriers associated with material access. Individuals with

  low socio-economic status and high computer self-effi

  fficacy also face barri-

  ers associated with material access but not in its traditional sense. Although

  income level and geographical location plays a role in their material access,

  they still have access to the Internet through alternative devices. African

  Table 11.3 Gaps Associated with the Four Access Divides

  1. Age groups

  1. Lack of interest

  Low

  (“Grey Digital Divide”)

  2. Computer anxiety or

  2. Lack of perceived benefit

  fi s

  Status

  computer fear

  Psychological and Skills Access Divides

  Usage Access Divide

  1. Education level

  1. Income level

  Socio Economic

  2. ICT knowledge

  2. Geographical location

  3. Income level

  High

  Material Access Divide

  Material Access Divide

&nbs
p; Low

  High

  Computer Self-Effi

  cacy

  ffi

  Rational Choice Theory 147

  Americans and Latinos continue to outpace Caucasians in their use of

  handheld devices. According to Smith (2010b), minority Americans lead

  the way in mobile access using handheld devices. Additionally, minorities

  tend to take advantage of their phones’ data functions compared to Cauca-

  sian cell phone owners (Smith, 2010b). This would explain why minorities

  with low socio-economic status often have high computer self-effi

  c

  ffi acy.

  As previously stated, rational choice theory assumes that people are essen-

  tially rational in character (Masatilioglu & Ok, 2005). Rational choice theory

  defi

  fines rationality diff eren

  ff

  t from the philosophical use—behaving sane or in

  clear-minded manner. Rationality is defi

  fined as an individual’s ability to bal-

  ance costs against benefits

  fi to arrive at a rational decision (Herrnstein, 1990).

  Using rational choice theory to understand individuals who are aff ec

  ff ted by

  access barriers, garners understanding of their motivations. Individuals with

  high socio-economic status but low computer self-effi

  c

  ffi acy would use rational

  choice to weigh the perceived benefi t

  fi s against the costs of overcoming their

  fear or anxiety. Individuals with high socio-economic status and computer

  self-effi

  c

  ffi acy would be most susceptible to intervention because the benefit

  fi s

  would most likely outweigh the costs. Individuals with low socio-economic

  status as well as low computer self-effi

  c

  ffi acy might not buy into government

  initiatives or social policies to increase their access to ICTs. This group might

  be hesitant because the benefi t

  fi s might not balance the costs of participating.

  Individuals with low socio-economic status but high computer self-effi

  ca

  ffi cy

  would buy into community and pricing initiatives. The perceived benefits

  fi of

  participating could outweigh costs—if the costs of ICTs were within their

  budget or access was free within the community.

  Discussion & Limitations

  This chapter represents an initial response to Chai’s (2008) call for more

 

‹ Prev