recommended reading

Age gap narrowing in use of mobile devices

A new report by the Pew Research Center released Thursday shows that older Americans are catching up to younger generations in their use and ownership of electronic devices.

According to the report, 85 percent of adults own cell phones, with 90 percent of all adults living in a household with at least one mobile phone. Perhaps more surprising, more than 60 percent of adults 75 and older live in households with cell phones.

Despite the increase in mobile electronics, desktop computers remain the most popular with adults ages 35-65, while 70 percent of younger adults own a laptop, the report states. Mp3 players are also most popular among adults ages 18-34, but almost half of all adults say they rock out with a mobile music player.

Where do the generations agree? On game consoles, tablets and e-book readers, according to the report. Sixty-three percent of American adults say they own an electronic game system. E-books and tablets readers remain new, and relatively rare, electronic devices for Americans. Only 4 percent of adults said they own an iPad or other tablet computer and 5 percent reported owning e-book readers.

As expected, the oldest Americans tend to lag behind their younger neighbors in use of new technologies. While 9 percent of all Americans said they do not own any of the devices in the study, 43 percent of adults over 75 say they don't own any such devices.

According to the study, younger "Millennials" between 18 and 34 years old not only owned more devices, but used a wider range of functions.

"For instance, most cell phone owners only use two of the main non-voice functions on their phones: taking pictures and text messaging," the report states. "However, most Millennials also use their phones to surf the internet, send email, play games, listen to music, and record videos."

The study, which included 1,000 interviews by cell phone, was based on a survey of 3,001 American adults and was conducted in August and September 2010. It has a margin of error of plus or minus 3 percentage points.

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.