{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T22:17:29Z","timestamp":1767046649897,"version":"3.38.0"},"reference-count":71,"publisher":"SAGE Publications","issue":"7","license":[{"start":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T00:00:00Z","timestamp":1254787200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2009,11]]},"abstract":"<jats:p> Gender differences exist in both general and specific uses of information and communication technologies (ICTs). Most of this research has focused on computers and the internet to the exclusion of mobile phones. Little research has examined gender differences in specific types of mobile phone usage, especially among youth. This issue is examined using data from a random sample of middle-school students. Although gender differences exist at the bivariate level, the picture changes in multivariate models. Boys exhibited greater frequency of use for non-social, gadget-like features of mobile phones; no gender differences existed in more traditional communicative mobile phone uses. <\/jats:p>","DOI":"10.1177\/1461444809342056","type":"journal-article","created":{"date-parts":[[2009,10,7]],"date-time":"2009-10-07T03:00:27Z","timestamp":1254884427000},"page":"1163-1186","source":"Crossref","is-referenced-by-count":36,"title":["Old wine in a new technology, or a different type of digital divide?"],"prefix":"10.1177","volume":"11","author":[{"given":"Shelia R.","family":"Cotten","sequence":"first","affiliation":[{"name":"University of Alabama at Birmingham, USA,"}]},{"given":"William A.","family":"Anderson","sequence":"additional","affiliation":[{"name":"University of Alabama at Birmingham, USA,"}]},{"given":"Zeynep","family":"Tufekci","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, USA,"}]}],"member":"179","published-online":{"date-parts":[[2009,10,6]]},"reference":[{"volume-title":"Tech-Savvy: Educating Girls in the New Computer Age","year":"2000","author":"American Association of University Women Educational Foundation","key":"atypb1"},{"key":"atypb2","doi-asserted-by":"publisher","DOI":"10.1080\/15391523.2006.10782476"},{"volume-title":"\u2018Women and Information Technology: A Seven Year Longitudinal Study of Young Women from Middle Grades into College\u2019","year":"2004","author":"Berenson, S.","key":"atypb3"},{"key":"atypb4","doi-asserted-by":"publisher","DOI":"10.1177\/00027640121957204"},{"key":"atypb5","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.19.6.255"},{"key":"atypb6","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2005.8.21"},{"volume-title":"paper presented at the Social Change in the 21st Century Conference","author":"Campbell, M.","key":"atypb7"},{"key":"atypb8","doi-asserted-by":"publisher","DOI":"10.1177\/1461444807075016"},{"key":"atypb9","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3125.001.0001"},{"key":"atypb10","doi-asserted-by":"crossref","unstructured":"Charles, M. and K. Bradley ( 2006) \u2018A Matter of Degree: Female Underrepresentation in Computer Science Programs Cross-nationally\u2019, in J. Cohoon and W. Aspray (eds) Women and Information Technology, pp. 183-204. Cambridge, MA : MIT Press.","DOI":"10.7551\/mitpress\/7272.003.0008"},{"volume-title":"Gender and Technology in the Making","year":"1993","author":"Cockburn, C.","key":"atypb11"},{"key":"atypb12","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2729.2006.00185.x"},{"key":"atypb13","doi-asserted-by":"publisher","DOI":"10.1615\/JWomenMinorScienEng.v10.i1.50"},{"key":"atypb14","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2004.04.001"},{"key":"atypb15","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v8i3.1039"},{"key":"atypb16","doi-asserted-by":"publisher","DOI":"10.1080\/0013188950370301"},{"key":"atypb17","doi-asserted-by":"publisher","DOI":"10.1002\/cd.146"},{"journal-title":"Pew Internet & American Life Project","year":"2005","author":"Fallows, D.","key":"atypb18"},{"key":"atypb19","doi-asserted-by":"publisher","DOI":"10.1016\/S0277-5395(00)00166-7"},{"key":"atypb20","doi-asserted-by":"publisher","DOI":"10.1525\/9780520915008"},{"volume-title":"Trends in Educational Equity of Girls and Women: 2004, No. NCES 2005-016","year":"2004","author":"Freeman, C.E.","key":"atypb21"},{"key":"atypb22","doi-asserted-by":"publisher","DOI":"10.1145\/1111646.1111648"},{"issue":"4","key":"atypb23","first-page":"2","volume":"16","author":"Gupta, U.G.","year":"2000","journal-title":"Journal of Industrial Technology"},{"key":"atypb24","doi-asserted-by":"publisher","DOI":"10.1145\/543812.543844"},{"issue":"4","key":"atypb25","first-page":"387","volume":"2","author":"Haddon, L.G.","year":"2000","journal-title":"New Media & Society"},{"volume-title":"paper presented at the Berkman Center Luncheon Series","author":"Hargittai, E.","key":"atypb26"},{"key":"atypb27","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6237.2006.00389.x"},{"key":"atypb28","unstructured":"Henwood, F. ( 1993) \u2018Establishing Gender Perspectives on Information Technology: Problems, Issues and Opportunities\u2019, in E. Green, J. Owen and D. Pain (eds) Gendered by Design? Information Technology and Office Systems, pp. 31-49. Washington, DC: Taylor and Francis."},{"key":"atypb29","doi-asserted-by":"crossref","unstructured":"Hou, W., M. Kaur, A. Komlodi, W.G. Lutters, L. Boot, S. Cotten, C. Morrell, A. Ozok and Z. Tufekci ( 2006) \u2018\"Girls Don\u2019t Waste Time\": Pre-adolescent Attitudes toward ICT\u2019, in Extended Abstracts of the ACM Conference on Human Factors in Computing Systems (CHI 2006), pp. 875-80. New York: Association for Computing Machinery Press .","DOI":"10.1145\/1125451.1125622"},{"volume-title":"paper presented at Mobile Communication and Social Change: 2004 International Conference on Mobile Communications","author":"Ito, M.","key":"atypb30"},{"key":"atypb31","doi-asserted-by":"publisher","DOI":"10.1007\/1-84628-248-9_9"},{"volume-title":"\u2018Kids & Media @ the New Millennium\u2019","year":"1999","author":"Kaiser Family Foundation","key":"atypb32"},{"key":"atypb33","doi-asserted-by":"publisher","DOI":"10.1080\/13691180701409960"},{"key":"atypb34","doi-asserted-by":"publisher","DOI":"10.3102\/0013189X034008003"},{"key":"atypb35","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(01)00030-9"},{"volume-title":"paper presented at the American Psychological Association Annual Meeting","author":"Lenhart, A.","key":"atypb36"},{"journal-title":"Pew Internet & American Life Project","year":"2005","author":"Lenhart, A.","key":"atypb37"},{"volume-title":"Teens and Technology","year":"2005","author":"Lenhart, A.","key":"atypb38"},{"volume-title":"\u2018Writing, Technology and Teens\u2019","year":"2008","author":"Lenhart, A.","key":"atypb39"},{"volume-title":"\u2018Teens, Video Games, and Civics\u2019","year":"2008","author":"Lenhart, A.","key":"atypb40"},{"key":"atypb41","doi-asserted-by":"publisher","DOI":"10.1006\/jvbe.1994.1027"},{"key":"atypb42","doi-asserted-by":"publisher","DOI":"10.1108\/09593840010339844"},{"key":"atypb43","doi-asserted-by":"publisher","DOI":"10.1007\/s007790170015"},{"volume-title":"paper presented at the Machines That Become Us Conference","author":"Ling, R.","key":"atypb44"},{"volume-title":"paper presented at the Conference on the Social Consequences of Mobile Telephony","author":"Ling, R.","key":"atypb45"},{"key":"atypb46","doi-asserted-by":"publisher","DOI":"10.1177\/1461444807080335"},{"volume-title":"Unlocking the Clubhouse: Women in Computing","year":"2002","author":"Margolis, J.","key":"atypb47"},{"issue":"2","key":"atypb48","first-page":"125","volume":"10","author":"Miller, L.M.","year":"2001","journal-title":"Journal of Educational Multimedia and Hypermedia"},{"volume-title":"A Nation Online: How Americans Are Expanding Their Use of the Internet","year":"2002","author":"National Telecommunications and Information Administration (NTIA)","key":"atypb49"},{"volume-title":"A Nation Online: Entering the Broadband Age","year":"2004","author":"National Telecommunications and Information Administration (NTIA)","key":"atypb50"},{"volume-title":"\u2018Prospects: The Congressionally Mandated Study of Educational Growth and Opportunity\u2019","year":"1993","author":"Puma, M.J.","key":"atypb51"},{"key":"atypb52","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9927"},{"key":"atypb53","unstructured":"Rice, R.E. and J.E. Katz ( 2003) \u2018Digital Divides of the Internet and Mobile Phone\u2019 , in J.E. Katz (ed.) Machines that Become Us: The Social Context of Personal Communication Technology , pp. 91-104. New Brunswick, NJ: Transaction Publishers."},{"key":"atypb54","doi-asserted-by":"crossref","unstructured":"Robbins, K.A. and M.A. Turner ( 2002) \u2018United States: Popular, Pragmatic and Problematic\u2019 , in J.E. Katz and M.A. Aakhus (eds) Perpetual Contact: Mobile Communication, Private Talk, Public Performance, pp. 80-93. Cambridge : Cambridge University Press.","DOI":"10.1017\/CBO9780511489471.008"},{"volume-title":"\u2018Generation M: Media in the Lives of 8-18 year-olds\u2019","year":"2005","author":"Roberts, D.F.","key":"atypb55"},{"volume-title":"\u2018The ECAR Study of Undergraduate Students and Information Technology, 2007\u2019, EDUCAUSE","year":"2007","author":"Salaway, G.","key":"atypb56"},{"key":"atypb57","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(00)00032-7"},{"volume-title":"paper presented at the ITU\/MIC Workshop, \u2018Shaping the Future Mobile Information Society\u2019","author":"Selian, A.N.","key":"atypb58"},{"key":"atypb59","doi-asserted-by":"publisher","DOI":"10.1007\/s11199-007-9191-7"},{"key":"atypb60","doi-asserted-by":"publisher","DOI":"10.1089\/109493102321018150"},{"key":"atypb61","first-page":"21","volume":"15","author":"Skelton, F.","year":"1989","journal-title":"Australian Journal of Communications"},{"key":"atypb62","doi-asserted-by":"publisher","DOI":"10.2307\/2695871"},{"key":"atypb63","doi-asserted-by":"publisher","DOI":"10.3102\/00346543061004475"},{"key":"atypb64","unstructured":"Turkle, S. ( 1988) \u2018Computational Reticence: Why Women Fear the Intimate Machine\u2019, in C. Kramarae (ed.) Technology and Women\u2019s Voices, pp. 41-61. London: Routledge."},{"key":"atypb65","doi-asserted-by":"publisher","DOI":"10.2307\/3250981"},{"key":"atypb66","doi-asserted-by":"publisher","DOI":"10.3102\/00346543071004613"},{"volume-title":"Feminism Confronts Technology","year":"1991","author":"Wajcman, J.","key":"atypb67"},{"volume-title":"TechnoFeminism","year":"2004","author":"Wajcman, J.","key":"atypb68"},{"key":"atypb69","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(96)00026-X"},{"key":"atypb70","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026331016172"},{"key":"atypb71","doi-asserted-by":"publisher","DOI":"10.1080\/08886504.2000.10782310"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444809342056","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444809342056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T10:13:53Z","timestamp":1740824033000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444809342056"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,6]]},"references-count":71,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2009,11]]}},"alternative-id":["10.1177\/1461444809342056"],"URL":"https:\/\/doi.org\/10.1177\/1461444809342056","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"type":"print","value":"1461-4448"},{"type":"electronic","value":"1461-7315"}],"subject":[],"published":{"date-parts":[[2009,10,6]]}}}