{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T05:28:01Z","timestamp":1774934881980,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,8,16]],"date-time":"2010-08-16T00:00:00Z","timestamp":1281916800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000690","name":"Research Councils UK","doi-asserted-by":"publisher","award":["EP\/H006834\/1EP\/G066019\/1"],"award-info":[{"award-number":["EP\/H006834\/1EP\/G066019\/1"]}],"id":[{"id":"10.13039\/501100000690","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,8,16]]},"DOI":"10.1145\/1858171.1858202","type":"proceedings-article","created":{"date-parts":[[2010,9,14]],"date-time":"2010-09-14T14:53:20Z","timestamp":1284476000000},"page":"175-178","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":61,"title":["Engaging the disengaged"],"prefix":"10.1145","author":[{"given":"Graeme W.","family":"Coleman","sequence":"first","affiliation":[{"name":"University of Dundee, Dundee, UK"}]},{"given":"Lorna","family":"Gibson","sequence":"additional","affiliation":[{"name":"University of Dundee, Dundee, UK"}]},{"given":"Vicki L.","family":"Hanson","sequence":"additional","affiliation":[{"name":"University of Dundee, Dundee, UK"}]},{"given":"Ania","family":"Bobrowicz","sequence":"additional","affiliation":[{"name":"The University of Kent, Canterbury, UK"}]},{"given":"Alison","family":"McKay","sequence":"additional","affiliation":[{"name":"University of Leeds, Leeds, UK"}]}],"member":"320","published-online":{"date-parts":[[2010,8,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"1Mb Broadband Access Becomes Legal Right. http:\/\/yle.fi\/uutiset\/news\/2009\/10\/lmb_broadband_access_becomes_legal_right_1080940.html?origin=rss 1Mb Broadband Access Becomes Legal Right . http:\/\/yle.fi\/uutiset\/news\/2009\/10\/lmb_broadband_access_becomes_legal_right_1080940.html?origin=rss"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/0882-7974.21.2.333"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/03601270701363877"},{"key":"e_1_3_2_1_5_1","unstructured":"Digital Britain. 2009. Available at http:\/\/interactive.bis.gov.uk\/digitalbritain\/ Digital Britain . 2009. Available at http:\/\/interactive.bis.gov.uk\/digitalbritain\/"},{"key":"e_1_3_2_1_6_1","unstructured":"Green M. 2005. Unpacking \"I don't want It\" -- Why novices and non-users don't use the Internet. First Monday {Online} Volume 11 Number 9 (4 September 2006).  Green M. 2005. Unpacking \"I don't want It\" -- Why novices and non-users don't use the Internet. First Monday {Online} Volume 11 Number 9 (4 September 2006)."},{"key":"e_1_3_2_1_7_1","volume-title":"Second-level digital divide: Differences in people's online skill. First Monday {Online}","author":"Hargittai E.","year":"2002","unstructured":"Hargittai , E. 2002. Second-level digital divide: Differences in people's online skill. First Monday {Online} , Volume 7 Number 4 (1 April 2002 ). Hargittai, E. 2002. Second-level digital divide: Differences in people's online skill. First Monday {Online}, Volume 7 Number 4 (1 April 2002)."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1535654.1535658"},{"key":"e_1_3_2_1_9_1","volume-title":"Home broadband adoption","author":"Horrigan J.","year":"2009","unstructured":"Horrigan , J. 2009. Home broadband adoption 2009 . http:\/\/www.pewinternet.org\/Reports\/2009\/10-Home-Broadband-Adoption-2009.aspx Horrigan, J. 2009. Home broadband adoption 2009. http:\/\/www.pewinternet.org\/Reports\/2009\/10-Home-Broadband-Adoption-2009.aspx"},{"key":"e_1_3_2_1_10_1","unstructured":"Jones S. and Fox S. 2009. Generations online in 2009. http:\/\/www.pewinternet.org\/PPF\/r\/275\/report_display.asp  Jones S. and Fox S. 2009. Generations online in 2009. http:\/\/www.pewinternet.org\/PPF\/r\/275\/report_display.asp"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518962"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1037\/0882-7974.21.1.190"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-006-0057-5"},{"key":"e_1_3_2_1_14_1","unstructured":"Needs of older users. http:\/\/www.w3.org\/WAI\/WAI-AGE\/needs.html  Needs of older users. http:\/\/www.w3.org\/WAI\/WAI-AGE\/needs.html"},{"key":"e_1_3_2_1_15_1","volume-title":"The Invisible Computer","author":"Norman D. A.","year":"1998","unstructured":"Norman , D. A. The Invisible Computer . MIT Press , Cambridge, MA , 1998 . Norman, D. A. The Invisible Computer. MIT Press, Cambridge, MA, 1998."},{"key":"e_1_3_2_1_16_1","unstructured":"Ofcom. 2009. Accessing the internet at home: A quantitative and qualitative study among people without the internet at home. http:\/\/www.ofcom.org.uk\/research\/telecoms\/reports\/bbresearch\/bbathome.pdf  Ofcom. 2009. Accessing the internet at home: A quantitative and qualitative study among people without the internet at home. http:\/\/www.ofcom.org.uk\/research\/telecoms\/reports\/bbresearch\/bbathome.pdf"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1467247.1467265"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0144686X03001302"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1243441.1243453"}],"event":{"name":"DIS '10: Designing Interactive Systems Conference 2010","location":"Aarhus Denmark","acronym":"DIS '10","sponsor":["IFIP International Federation for Information Processing","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 8th ACM Conference on Designing Interactive Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1858171.1858202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1858171.1858202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:52Z","timestamp":1750244392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1858171.1858202"}},"subtitle":["how do we design technology for digitally excluded older adults?"],"short-title":[],"issued":{"date-parts":[[2010,8,16]]},"references-count":19,"alternative-id":["10.1145\/1858171.1858202","10.1145\/1858171"],"URL":"https:\/\/doi.org\/10.1145\/1858171.1858202","relation":{},"subject":[],"published":{"date-parts":[[2010,8,16]]},"assertion":[{"value":"2010-08-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}