{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:19:58Z","timestamp":1777936798698,"version":"3.51.4"},"reference-count":58,"publisher":"SAGE Publications","issue":"4","license":[{"start":{"date-parts":[[2015,11,9]],"date-time":"2015-11-09T00:00:00Z","timestamp":1447027200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2017,4]]},"abstract":"<jats:p>Increasing broadband adoption among members of underserved populations remains a high priority among policymakers, advocates, corporations, and affected communities. But questions about the risks entailed in the flow of personal information are beginning to surface and shine light on the tension between broadband\u2019s benefits and harms. This article examines broadband adoption programs at community-based and public institutions in the United States in order to understand the ways in which privacy and surveillance issues emerge and are engaged in these settings. While adults who enroll in introductory digital literacy classes and access the Internet at public terminals feel optimistic about broadband \u201copportunities,\u201d they encounter \u201cprivacy-poor, surveillance-rich\u201d broadband. Users experience myriad anxieties, while having few meaningful options to meet their concerns.<\/jats:p>","DOI":"10.1177\/1461444815614053","type":"journal-article","created":{"date-parts":[[2015,11,9]],"date-time":"2015-11-09T21:33:41Z","timestamp":1447104821000},"page":"597-615","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":98,"title":["The downside of digital inclusion: Expectations and experiences of privacy and surveillance among marginal Internet users"],"prefix":"10.1177","volume":"19","author":[{"given":"Seeta Pe\u00f1a","family":"Gangadharan","sequence":"first","affiliation":[{"name":"London School of Economics and Political Science, UK"}]}],"member":"179","published-online":{"date-parts":[[2015,11,9]]},"reference":[{"key":"bibr1-1461444815614053","first-page":"363","volume-title":"Digital Privacy: Theory, Technologies, and Practices","author":"Acquisti A","year":"2008"},{"key":"bibr2-1461444815614053","unstructured":"Barocas S, Selbst A (2015) Big data\u2019s disparate impact. California Law Review 104, 2016. Available at: http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2477899 (accessed 11 September 2015)."},{"key":"bibr3-1461444815614053","volume-title":"The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our Culture","author":"Battelle J","year":"2005"},{"key":"bibr4-1461444815614053","unstructured":"Bond-Graham D, Winston A (2014) From Fallujah to San Fernando Valley, police use analytics to target \u201chigh crime\u201d areas. Truth Out, 5 March. Available at: http:\/\/www.truth-out.org\/news\/item\/22357-predictive-policing-from-fallujah-to-the-san-fernando-valley-military-grade-software-used-to-wage-wars-abroad-is-making-its-impact-on-americas-streets# (accessed 26 September 2014)."},{"key":"bibr5-1461444815614053","unstructured":"Budka P, Bell B, Fiser A (2009) MyKnet.org: how northern Ontario\u2019s first nation communities made themselves at home on the World Wide Web. The Journal of Community Informatics 5(2) Available at: http:\/\/ci-journal.net\/index.php\/ciej\/article\/view\/568\/450 (accessed 13 May 2015)."},{"key":"bibr6-1461444815614053","unstructured":"Center for Democracy and Technology, Consumer Action Consumer Federation of America, The Cryptorights Foundation, Inc., National Workrights Institute, Privacy Journal and Pasquale FA (2010) Joint Comments of Public Interest Groups. Washington, DC: Center for Democracy and Technology. Available at: https:\/\/www.cdt.org\/files\/pdfs\/20100122_fcc_general.pdf (accessed 1 September 2015)."},{"key":"bibr7-1461444815614053","volume-title":"Digital Destiny: New Media and the Future of Democracy","author":"Chester J","year":"2007"},{"key":"bibr8-1461444815614053","first-page":"342","volume-title":"Research Methods in Mass Communication","author":"Christians CG","year":"1989"},{"key":"bibr9-1461444815614053","volume-title":"Broadband Adoption in Low-income Communities","author":"Dailey D","year":"2010"},{"key":"bibr10-1461444815614053","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/8073.001.0001"},{"key":"bibr11-1461444815614053","unstructured":"Eubanks V (2013) Caseworkers vs. computers. Poptech, 11 December Available at: https:\/\/virginiaeubanks.wordpress.com\/tag\/automated-eligibility-welfare-rights-economic-justice\/ (accessed 10 April 2015)."},{"issue":"1","key":"bibr12-1461444815614053","first-page":"121","volume":"18","author":"Fisher L","year":"2009","journal-title":"Brooklyn Law Journal"},{"key":"bibr13-1461444815614053","first-page":"7","volume-title":"Redistribution or Recognition? A Political-Philosophical Exchange","author":"Fraser N","year":"2003"},{"key":"bibr14-1461444815614053","volume-title":"Coming to Terms with Chance Engaging Rational Discrimination and Cumulative Disadvantage","author":"Gandy OH","year":"2009"},{"key":"bibr15-1461444815614053","unstructured":"Gangadharan SP (2012) Digital inclusion and data profiling. First Monday 17(5). Available at: http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/3821\/3199 (accessed 29 September 2015)."},{"key":"bibr16-1461444815614053","volume-title":"Joining the Surveillance Society?","author":"Gangadharan SP","year":"2013"},{"key":"bibr17-1461444815614053","volume-title":"Virtually Unused: Virtual Private Networks and Public Internet Users","author":"Gangadharan SP","year":"2013"},{"key":"bibr18-1461444815614053","volume-title":"Information and Communication Technology Geographies: Strategies for Bridging the Digital Divide","author":"Gilbert MR","year":"2011"},{"key":"bibr19-1461444815614053","volume-title":"Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy","author":"Gilliom J","year":"2001"},{"key":"bibr20-1461444815614053","unstructured":"Hardt M (2014) How big data is unfair. Medium, 24 September. Available at: https:\/\/medium.com\/@mrtz\/how-big-data-is-unfair-9aa544d739de (accessed 24 October 2014)."},{"key":"bibr21-1461444815614053","volume-title":"Broadband adoption and use in America","author":"Horrigan JB","year":"2010"},{"key":"bibr22-1461444815614053","unstructured":"Kang C (2009) Biden announces $4 billion in grants and loans in first round of funding for broadband expansion. Washington Post, 2 July. Available at: http:\/\/wapo.st\/1IDr2le (accessed 6 April 2015)."},{"key":"bibr23-1461444815614053","first-page":"138","volume-title":"Handbook of Qualitative Research","author":"Kincheloe JL","year":"1994"},{"key":"bibr24-1461444815614053","doi-asserted-by":"publisher","DOI":"10.1080\/13691180600630740"},{"key":"bibr25-1461444815614053","unstructured":"Leadership Conference on Civil and Human Rights (2014) Civil rights and Big data: background material. Available at: http:\/\/www.civilrights.org\/press\/2014\/civil-rights-and-big-data.html (accessed 14 April 2015)."},{"key":"bibr26-1461444815614053","doi-asserted-by":"publisher","DOI":"10.1145\/2658983"},{"key":"bibr27-1461444815614053","volume-title":"The Surveillance Society: Monitoring Everyday Life","author":"Lyon D","year":"2001"},{"issue":"3","key":"bibr28-1461444815614053","first-page":"540","volume":"4","author":"Macdonald AM","year":"2008","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"bibr29-1461444815614053","first-page":"26","volume":"32","author":"Marx GT","year":"1985","journal-title":"Dissent"},{"key":"bibr30-1461444815614053","unstructured":"Mayer JR (2012) Safari trackers. The Center for Internet & Society. Available at: https:\/\/cyberlaw.stanford.edu\/blog\/2012\/02\/safari-trackers (accessed 13 May 2015)."},{"key":"bibr31-1461444815614053","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"bibr32-1461444815614053","unstructured":"Narayanan A (2011) There is no such thing as anonymous online tracking. The Center for Internet & Society. Available at: https:\/\/cyberlaw.stanford.edu\/blog\/2011\/07\/there-no-such-thing-anonymous-online-tracking (accessed 24 October 2014)."},{"key":"bibr33-1461444815614053","volume-title":"Privacy in Context Technology, Policy, and the Integrity of Social Life","author":"Nissenbaum HF","year":"2010"},{"key":"bibr34-1461444815614053","unstructured":"Obama BH (2011) Remarks by the President in State of Union Address. Available at: https:\/\/www.whitehouse.gov\/the-press-office\/2011\/01\/25\/remarks-president-state-union-address (accessed 24 April 2014)."},{"key":"bibr35-1461444815614053","first-page":"1701","volume":"57","author":"Ohm P","year":"2010","journal-title":"UCLA Law Review"},{"key":"bibr36-1461444815614053","volume-title":"Black Box Society: The Secrets That Control Money and Information","author":"Pasquale F","year":"2014"},{"key":"bibr37-1461444815614053","unstructured":"Pew Internet & American Life Project (2008) Online shopping. Available at: http:\/\/www.pewinternet.org\/2008\/02\/13\/online-shopping\/ (accessed 26 September 2014)."},{"key":"bibr38-1461444815614053","unstructured":"Pew Internet & American Life Project (2010) 65% of Internet users have paid for online content. Available at: http:\/\/www.pewinternet.org\/files\/old-media\/\/Files\/Reports\/2010\/PIP-Paying-for-Online-Content_final.pdf (accessed 26 September 2014)."},{"key":"bibr39-1461444815614053","unstructured":"Pew Research Center (2013a) Anonymity, privacy, and security online, 5 September. Available at: http:\/\/pewinternet.org\/Reports\/2013\/Anonymity-online.aspx"},{"key":"bibr40-1461444815614053","unstructured":"Pew Research Center ( 2013b) Who\u2019s not online and why, 25 September. Available at: http:\/\/www.pewinternet.org\/2013\/09\/25\/whos-not-online-and-why\/ (accessed 26 September 2014)."},{"key":"bibr41-1461444815614053","unstructured":"Pew Research Center (2014) Public perceptions of privacy and security in the Post-Snowden era, 12 November. Available at: http:\/\/www.pewinternet.org\/files\/2014\/11\/PI_PublicPerceptionsofPrivacy_111214.pdf (accessed 10 April 2015)."},{"key":"bibr42-1461444815614053","volume-title":"Regulating the Poor: The Functions of Public Welfare","author":"Piven FF","year":"1971"},{"key":"bibr43-1461444815614053","unstructured":"Science Magazine\n                      (2013) Online job ads report vs. Bureau of Labor Statistics report: half-full, half-empty. Science Career Blogs, 6 July. Available at: http:\/\/blogs.sciencemag.org\/sciencecareers\/2012\/07\/online-job-ads-1.html (accessed 26 September 2014)."},{"key":"bibr44-1461444815614053","unstructured":"Seifert M (2009) Testimony.hearing on oversight of the American recovery and reinvestment act of 2009: broadband, 2 April. Available at: http:\/\/www.ntia.doc.gov\/legacy\/congress\/2009\/NTIA_Seifert_Testimony_20090402.html (accessed 6 April 2015)."},{"key":"bibr45-1461444815614053","doi-asserted-by":"publisher","DOI":"10.1177\/1461444804042519"},{"key":"bibr46-1461444815614053","first-page":"1083","volume":"75","author":"Solove D","year":"2002","journal-title":"Southern California Law Review"},{"key":"bibr47-1461444815614053","unstructured":"Stoller M (2014) The plot to maim Google: how AT&T and Comcast plan to upend the Internet. Salon, 17 October. Available at: http:\/\/www.salon.com\/2014\/10\/17\/the_plot_to_maim_google_how_att_and_comcast_plan_to_upend_the_internet\/ (accessed 29 September 2014)."},{"key":"bibr48-1461444815614053","first-page":"A19","author":"Super D","year":"2014","journal-title":"The New York Times"},{"key":"bibr49-1461444815614053","unstructured":"Turow J, Feldman L, Meltzer K (2005) Open to exploitation: American Shoppers online and offline. Report, Annenberg Public Policy Center of the University of Pennsylvania. Available at: http:\/\/repository.upenn.edu\/asc_papers\/35 (accessed 16 March 2015)."},{"key":"bibr50-1461444815614053","volume-title":"Broadband Technology Opportunities Program Notice of Funds Availability\u2014Fact Sheet","author":"US Department of Commerce National Telecommunications and Information Administration (NTIA)","year":"2009"},{"key":"bibr51-1461444815614053","volume-title":"Exploring a Digital Nation: Home Broadband Internet Adoption in the United States","author":"US Department of Commerce National Telecommunications and Information Administration (NTIA)","year":"2009"},{"key":"bibr52-1461444815614053","volume-title":"Exploring the Digital Nation. America\u2019s Emerging Online Experience","author":"US Department of Commerce National Telecommunications and Information Administration (NTIA)","year":"2011"},{"key":"bibr53-1461444815614053","unstructured":"US Federal Trade Commission (2012) Diploma mills, July. Available at: http:\/\/www.consumer.ftc.gov\/articles\/0206-diploma-mills (accessed 30 October 2014)."},{"key":"bibr54-1461444815614053","volume-title":"In the Matter of Inquiry Concerning the Deployment of Advanced Telecommunications Capability to All Americans in a Reasonable and Timely Fashion, and Possible Steps to Accelerate Such Deployment Pursuant to Section 706 of the Telecommunications Act of 1996, as Amended by the Broadband Data Improvement Act","author":"US Federal Trade Commission","year":"2014"},{"key":"bibr55-1461444815614053","doi-asserted-by":"publisher","DOI":"10.1080\/1369118042000208924"},{"key":"bibr56-1461444815614053","unstructured":"Wofford C (2013) This veterans day, Help a vet avoid a GI Bill scam. U.S. News & World Report, 11 November. Availble at: http:\/\/www.usnews.com\/opinion\/blogs\/carrie-wofford\/2013\/11\/11\/this-veterans-day-help-a-vet-avoid-a-gi-bill-for-profit-college-scam (accessed 30 October 2014)."},{"key":"bibr57-1461444815614053","first-page":"A1","author":"Woodhouse M","year":"2015","journal-title":"Boston Globe"},{"key":"bibr58-1461444815614053","volume-title":"How Errors by Criminal Background Checking Companies Harm Workers and Businesses","author":"Yu PS","year":"2012"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444815614053","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444815614053","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444815614053","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:43:52Z","timestamp":1777693432000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444815614053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,9]]},"references-count":58,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["10.1177\/1461444815614053"],"URL":"https:\/\/doi.org\/10.1177\/1461444815614053","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,9]]}}}