{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T21:06:29Z","timestamp":1775163989652,"version":"3.50.1"},"reference-count":30,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2018,4,4]],"date-time":"2018-04-04T00:00:00Z","timestamp":1522800000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Sociology"],"published-print":{"date-parts":[[2018,6]]},"abstract":"<jats:p> Despite sociological attempts to critically address an age-based digital divide, older adults (65+) continue to be portrayed in the academic literature and public discourse as a homogeneous group characterised by technophobia, digital illiteracy, and technology non-use. Additionally, the role of socioeconomic factors and personal contexts in later life are often overlooked in studies on technology adoption and use. For example, older adults who are identified as least likely to use technology (frail, care-dependent, low socioeconomic\/educational backgrounds) are typically described as a uniform cluster. Yet, research on digital technology use with this group remains scant \u2013 so what can we learn from studying technology adoption among them? This article discusses long-term deployment of new communication technologies with such a group of older adults, shedding light on the dynamics of technology adoption and contexts of use\/non-use. It is based on a case study approach and a cross-cultural perspective, using Canadian and Australian mixed-methods research from two projects that included interviews, psychometric scales, and field observations. We present cases from these projects and contest the simplistic notion of an age-based digital divide, by drawing on Strong Structuration Theory to explore the interconnection of agency, structure, and context in the sociotechnical process of technology adoption and use\/non-use among older adults. <\/jats:p>","DOI":"10.1177\/1440783318766119","type":"journal-article","created":{"date-parts":[[2018,4,4]],"date-time":"2018-04-04T13:56:49Z","timestamp":1522850209000},"page":"236-248","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":148,"title":["Old and afraid of new communication technologies? Reconceptualising and contesting the \u2018age-based digital divide\u2019"],"prefix":"10.1177","volume":"54","author":[{"given":"Barbara Barbosa","family":"Neves","sequence":"first","affiliation":[{"name":"University of Melbourne, Parkville, Victoria, Australia"}]},{"given":"Jenny","family":"Waycott","sequence":"additional","affiliation":[{"name":"University of Melbourne, Parkville, Victoria, Australia"}]},{"given":"Sue","family":"Malta","sequence":"additional","affiliation":[{"name":"National Ageing Research Institute and University of Melbourne, Parkville, Victoria, Australia"}]}],"member":"179","published-online":{"date-parts":[[2018,4,4]]},"reference":[{"key":"bibr1-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1145\/2661334.2661375"},{"key":"bibr2-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1145\/2996267.2996271"},{"key":"bibr3-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.02.006"},{"key":"bibr4-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20913-5_36"},{"key":"bibr5-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-006-0060-x"},{"key":"bibr6-1440783318766119","volume-title":"Where the Action Is: The Foundations of Embodied Interaction","author":"Dourish P.","year":"2004"},{"key":"bibr7-1440783318766119","unstructured":"Eurostat (2016) \u2018Internet Access and Use Statistics \u2013 Households and Individuals\u2019, URL (consulted March 2018): http:\/\/ec.europa.eu\/eurostat\/statistics-explained\/index.php\/Internet_access_and_use_statistics_-_households_and_individuals#Internet_activity_by_age_group"},{"key":"bibr8-1440783318766119","volume-title":"The Constitution of Society: Outline of the Theory of Structure","author":"Giddens G.","year":"1984"},{"key":"bibr9-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1016\/j.socscimed.2009.12.034"},{"key":"bibr10-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780199256044.001.0001"},{"key":"bibr11-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1057\/9781137271372_9"},{"key":"bibr12-1440783318766119","doi-asserted-by":"publisher","DOI":"10.15353\/joci.v8i1.3061"},{"key":"bibr13-1440783318766119","doi-asserted-by":"publisher","DOI":"10.5153\/sro.2998"},{"key":"bibr14-1440783318766119","volume-title":"Proceedings of the Conference on Human Factors in Computing Systems","author":"Neves B.B.","year":"2015"},{"key":"bibr15-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2017.1348534"},{"key":"bibr16-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1177\/0733464817741369."},{"key":"bibr17-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1159\/000430949"},{"key":"bibr18-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2015.1012532"},{"key":"bibr19-1440783318766119","volume-title":"Older Adults and Technology Use","author":"Smith A.","year":"2014"},{"key":"bibr20-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-230-21364-7"},{"key":"bibr21-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1080\/03601277.2015.1048165"},{"issue":"2","key":"bibr22-1440783318766119","volume":"22","author":"Vines J.","year":"2015","journal-title":"ACM Transactions on Computer\u2013Human Interaction"},{"key":"bibr23-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.10.018"},{"key":"bibr24-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1145\/2414536.2414633"},{"key":"bibr25-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470662"},{"key":"bibr26-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557290"},{"key":"bibr27-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1177\/1049732315570136"},{"key":"bibr28-1440783318766119","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858458"},{"key":"bibr29-1440783318766119","volume-title":"paper presented at Refusing, Limiting, Departing: A CHI 2014 Workshop Considering Why We Should Study Technology Non-use","author":"Wyatt S.","year":"2014"},{"key":"bibr30-1440783318766119","volume-title":"Case Study Research: Design and Methods","author":"Yin R.K.","year":"2013"}],"container-title":["Journal of Sociology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1440783318766119","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1440783318766119","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1440783318766119","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T13:03:10Z","timestamp":1741006990000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1440783318766119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,4]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["10.1177\/1440783318766119"],"URL":"https:\/\/doi.org\/10.1177\/1440783318766119","relation":{},"ISSN":["1440-7833","1741-2978"],"issn-type":[{"value":"1440-7833","type":"print"},{"value":"1741-2978","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,4]]}}}