recommended reading

Are You an IT Omnivore? Take the Quiz

ARCHIVES

By David Perera May 8, 2007

recent posts

Are you a "deep user" of technology? Click this link to take an online quiz developed by the Pew Internet & American Life Project to see how you compare with fellow Americans in information and communications technology adoption.

According to new research by the project, 8 percent of Americans are “omnivore” consumers of online gadgets and services and heavy participants in Web 2.0 activities.

At a broader level of generalization, the survey categorizes U.S. adults into three main groups: 31 percent of adults are “elite tech users” (including omnivores); about 20 percent are “middle of the road tech users;” and about 49 percent of the adult population is comprised of individuals who have “few tech assets."

Pew describes this latter group has having a “distant or non-existent relationship” with modern information technology. It includes the 27 percent of the population that doesn’t have a cell phone.

Omnivores, it should come as no surprise, have the youngest median age: 28 years old, versus a median age of 53 of the “light but satisfied” group that least uses information and communications technology.

“Some of this diffidence is driven by people’s concerns about information overload; some is related to people’s sense that their gadgets have more capacity than users can master; some is connected to people’s sense that things like blogging and creating home-brew videos for YouTube is not for them; and some is rooted in people’s inability to afford or their unwillingness to buy the gear that would bring them into the digital age,” according to Pew.

The survey, released on May 7, sampled 4,001 people aged 18 and older via telephone interviews earlier this year and has a sampling error of 2 percentage points.

Hat tip: Physorg.com

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.