8,323
Views
10
CrossRef citations to date
0
Altmetric
Articles

Inequality in digital skills and the adoption of online safety behaviors

ORCID Icon &
Pages 712-728 | Received 06 Sep 2017, Accepted 11 Jan 2018, Published online: 06 Feb 2018

References

  • AARP. (2014). Caught in the scammer’s net: Risk factors that may lead to becoming an Internet fraud victim, AARP survey of American adults age 18 and older, database. Retrieved from http://www.aarp.org/research/topics/economics/info-2014/internet-fraud-victimization-attitudes-behavior-national.html
  • Anderson, R., Barton, C., Böhme, R., Clayton, R., van Eeten, M. J., Levi, M., … Savage, S. (2013). Measuring the cost of cybercrime. In R. Böhme (Ed.), The economics of information security (pp. 265–300). Berlin: Springer-Verlag.
  • Baram, G. (2017). Israeli defense in the age of Cyber war. The Middle East Quarterly, 24, 1.
  • Bawden, D. (2008). Origins and concepts of digital literacy. In C. Lankshear, & M. Knobel (Eds.), Digital literacies: Concepts, policies and practices (pp. 17–32). New York, NY: Peter Lang.
  • Blank, G., & Groselj, D. (2015). Digital divide examining Internet use through a Weberian lens. International Journal of Communication, 9, 2763–2783.
  • Blank, G., & Lutz, C. (2016). Benefits and harms from Internet use: A differentiated analysis of Great Britain. New Media & Society, 1–23. http://journals.sagepub.com/doi/pdf/10.1177/1461444816667135
  • Büchi, M., Just, N., & Latzer, M. (2016). Caring is not enough: The importance of Internet skills for online privacy protection. Information, Communication & Society, 20(8), 1267–1278.
  • Choi, K. S. (2008). Computer crime victimization and integrated theory: An empirical assessment. International Journal of Cyber Criminology, 2(1), 308–333.
  • Clough, J. (2010). Principles of cybercrime. Cambdrige: Cambridge University Press.
  • Cobo, C. (2009). Strategies to promote the development of e-competences in the next generation of professionals: European and international trends. SKOPE issues paper series.
  • Cohen, M. S., Freilich, C. D., & Siboni, G. (2016). Israel and cyberspace: Unique threat and response. International Studies Perspectives, 17(3,1), 307–321.
  • Correa, T. (2016). Digital skills and social media use: How Internet skills are related to different types of Facebook use among ‘digital natives’. Information, Communication & Society, 19(8), 1095–1107. doi: 10.1080/1369118X.2015.1084023
  • Dunahee, M., & Lebo, H. (2016). The world Internet project international report 6th edition. Center for the digital future. Los Angeles, CA: University of Southern California. Retrieved from http://www.digitalcenter.org/wp-content/uploads/2013/06/2015-World-Internet-Report.pdf
  • European Union. (2012). Special Eurobarometer 390, cyber security (Report).
  • Hargittai, E. (2005). Survey measures of web-oriented digital literacy. Social Science Computer Review, 23(3), 371–379. doi: 10.1177/0894439305275911
  • Hargittai, E. (2008). The digital reproduction on inequality. In D. Grusky (Ed.), Social stratification: Class, race, and gender in sociological perspective (pp. 936–944). Boulder: Westview Press.
  • Hargittai, E., & Hinnant, A. (2008). Digital inequality differences in young adults’ use of the Internet. Communication Research, 35(5), 602–621. doi: 10.1177/0093650208321782
  • Hargittai, E., & Hsieh, Y. P. (2012). Succinct survey measures of web-use skills. Social Science Computer Review, 30(1), 95–107. doi: 10.1177/0894439310397146
  • ITU. (2014). Manual for measuring ICT access and use by households and individuals (2014 ed.).
  • Kritzinger, E., & von Solms, S. H. (2010). Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), 840–847. doi: 10.1016/j.cose.2010.08.001
  • Levi, M. (2017). Assessing the trends, scale and nature of economic cybercrimes: Overview and issues. Crime, Law and Social Change, 67(1), 3–20. doi: 10.1007/s10611-016-9645-3
  • Liang, H., & Xue, Y. (2010). Understanding security behaviors in personal computer usage: A threat avoidance perspective. Journal of the Association for Information Systems, 11(7), 394–413. doi: 10.17705/1jais.00232
  • Litt, E., & Hargittai, E. (2014). A bumpy ride on the information superhighway: Exploring turbulence online. Computers in Human Behavior, 36, 520–529. doi: 10.1016/j.chb.2014.04.027
  • Livingstone, S., & Helsper, E. J. (2010). Balancing opportunities and risks in teenagers’ use of the Internet: The role of online skills and Internet self-efficacy. New Media & Society, 12(2), 309–329. doi: 10.1177/1461444809342697
  • Livingstone, S., & Helsper, E. J. (2013). Children, Internet and risk in comparative perspective. Journal of Children and Media, 7(1), 1–8. doi: 10.1080/17482798.2012.739751
  • McGuire, M., & Dowling, S. (2013a). Cybercrime: A review of the evidence. Chapter1: Cyber-dependent crime (Home Office Research Report, 75).
  • McGuire, M., & Dowling, S. (2013b). Cybercrime: A review of the evidence. Summary of key findings and implications (Home Office Research Report, 75).
  • Norris, P. (2001). Digital divide: Civic engagement, information poverty, and the Internet worldwide. Cambridge: Cambridge University Press.
  • Park, Y. J. (2013). Offline status, online status: Reproduction of social categories in personal information skill and knowledge. Social Science Computer Review, 31(6), 680–702. doi: 10.1177/0894439313485202
  • Ragnedda, M., & Muschert, G. W. (2015). Digital divide Max Weber and digital divide studies – introduction. International Journal of Communication, 9(January), 6.
  • Reynolds, T., & Stryszowski, P. (2014). Skills and jobs in the Internet economy (OECD Digital Economy Papers No. 242).
  • Robinson, L., Cotten, S. R., Ono, H., Quan-Haase, A., Mesch, G., Chen, W., … Stern, M. J. (2015). Digital inequalities and why they matter. Information, Communication & Society, 18(5), 569–582. doi: 10.1080/1369118X.2015.1012532
  • Rowe, B., Halpern, M., & Lentz, T. (2012). Understanding cyber security risk preferences: A case study analysis inspired by public health research.
  • Van Deursen, A. J., Helsper, E. J., & Eynon, R. (2016). Development and validation of the Internet Skills Scale (ISS). Information, Communication & Society, 19(6), 804–823. doi: 10.1080/1369118X.2015.1078834
  • Van Deursen, A. J., Helsper, E., Eynon, R., & van Dijk, J. A. (2017). The compoundness and sequentiality of digital inequality. International Journal of Communication.
  • Van Deursen, A. J., & van Dijk, J. A. (2015a). Internet skill levels increase, but gaps widen: A longitudinal cross-sectional analysis (2010–2013) among the Dutch population. Information, Communication & Society, 18(7), 782–797. doi: 10.1080/1369118X.2014.994544
  • Van Deursen, A. J., & Van Dijk, J. A. (2015b). Toward a multifaceted model of Internet access for understanding digital divides: An empirical investigation. The Information Society, 31(5), 379–391. doi: 10.1080/01972243.2015.1069770
  • Van Deursen, A. J. A. M., van Dijk, J. A., & Peters, O. (2011). Rethinking Internet skills: The contribution of gender, age, education, Internet experience, and hours online to medium-and content-related Internet skills. Poetics, 39(2), 125–144. doi: 10.1016/j.poetic.2011.02.001
  • Van Dijk, J. A. (2005). The deepening divide: Inequality in the information society. Sage.
  • Van Ingen, E., & Matzat, U. (2017). Inequality in mobilizing online help after a negative life event: The role of education, digital skills, and capital-enhancing Internet use. Information, Communication & Society, 21, 421–498.
  • Weinstein, N. D. (1987). Cross-hazard consistencies: Conclusions about self-protective behavior. In N. D. Weinstein (Ed.), Taking care: Understanding and encouraging self-protective behavior (pp. 325–335). Cambridge: Cambridge University Press.
  • Witte, J. C., & Mannon, S. E. (2010). The Internet and social inequalities. New York, NY: Routledge.
  • Yar, M. (2013). Cybercrime and society. London: Sage.
  • Zillien, N., & Hargittai, E. (2009). Digital distinction: Status-specific types of Internet usage. Social Science Quarterly, 90(2), 274–291. doi: 10.1111/j.1540-6237.2009.00617.x

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.