This website uses cookies to ensure you have the best experience. Learn more

A Review Of Homeless Persons' Access To And Use Of Information Technologies

1449 words - 6 pages

OPPORTUNITIES FOR ENGAGING LOW-INCOME, VULNERABLE POPULATIONS IN HEALTH CARE:

Opportunities for Engaging Low-Income, Vulnerable Populations in Health Care: A Systematic Review of Homeless Persons’ Access to and Use of Information Technologies

The purpose of the research was to determine and figure out if homeless individuals have access to information technology and if so, are they fully utilizing it. The researchers were guided by three main research questions. The first was “What is the prevalence of access to and use of information technology (Internet, mobile phones, texting etc) by homeless populations”? The second was “What are homeless persons purpose for using information technologies. Finally, “what are the barriers to and facilitators of access to and use of information technologies by homeless individuals”?
The questions and procedures were non random including nine articles representing six studies Conducted between 2006 and 2012 which presented data on access to use of technologies by homeless persons. Within the questions and study by EyrichGarg, 44% rates of mobile phones were long term among 100 unsheltered street homeless persons in Philadelphia Pennsylvania. Rice et al also reported 62% of mobile phone ownership among 169 homeless adolescents in Los Angeles California. While this is a good sample size, the problem lies with the distribution and location of the data collection. A much larger sample with regard to all categories taken into consideration would have aided in the data analysis, particularly and most importantly, when looking for possible economic growth differences between different cities.
The modus operandi used by the references in the article was random collection if data which has proven to be ineffective in certain areas in the United States. This is a technique where individuals are asked to take surveys by total strangers on the streets. Contrary to popular belief, most individuals who are homeless own or have access to digital or information technology such as computer, mobile phones and some even have personal laptops. The publics response to seeing this may be too judgmental and damning because the would immediately come to a conclusion that “if a homeless individual could afford luxury such as computers and mobile phones, then why cant they afford to pay their rents as at when due. This analysis is based on multiple misunderstandings or misconcepts, many individuals believe that most homeless people are fakes and should not enjoy any type of luxury. For this reason and other factors mentioned earlier, technology will be hidden among homeless individuals. There was really no information regarding the honesty, credibility and authenticity of the homeless persons who took or answered the surveys.
Analysis of variance was also used to analyze the data collected by different sources in the article. This has proven not to be consistent with the type...

Find Another Essay On A Review of Homeless Persons' Access to and Use of Information Technologies

BOOK REVIEW: "THE ORDERING OF JUSTICE: A STUDY ACCUSED PERSONS AS DEPENDANTS IN THE CRIMINAL PROCESS"

3320 words - 13 pages is the role the police play. He argues that just as the police have access to a main computer with records and arrests (CPIC, Canadian Police Information Center) of accused persons to aid the crown attorneys. He believes that defence attorneys should have a main computer to check up on police officers involved in cases, what he calls CDICK (Canadian Defense Information Concerning Kops). Because he does not like actions by police during the pre

Unfair Access to Information Essay

910 words - 4 pages In Hong Kong, about 40% of households do not have a computer, while 70% do not use the Internet. Despite the rapid development and widespread use of information and communication technologies in recent years, scholars have drawn attention to the fact that access to these innovations is by no means even [1], and this has raised concerns about an emerging information gap in a society based on income and education. The issue of whether equitable

The Unintended Cosequences of Information Age Technologies

1550 words - 6 pages guides the military's adoption of information technologies involves the provision of vastly increased access to information at all echelons. The full implications and consequences of achieving the stated goals and objectives of C4IFTW will, of course, not be clear for years to come. The analysis reported upon herein was initiated as a result of concerns expressed by the Chairman of the Joint Chiefs of Staff regarding the unintended consequences of

Gender and Information Technologies

1176 words - 5 pages positions (Wajcman, 2010). Thus this brings me to my hypothesis that Information and communication technologies breed a culture of misogyny. Within this research it is shown that women are largely excluded from the technical design processes that shape the world we live in. In Ecofeminism (1993) authors Vandana Shiva, Maria Mies Critique and Evan Bond, they view the dominant stream of modern science as a projection of Western men's values. The

Biography of a Homeless Man

697 words - 3 pages makes my stomach squirm with desire. I inhale the biscuits and gravy they have served me and wish for more. I don’t bother asking for more because I know there answer is no.      I make my way down the road to McDonalds because my stomach still aches from the lack of food lately. Luckily I made over ten dollars panhandling by a freeway entrance for about an hour. I also use their bathroom to wash my face and clean my self up somewhat

Access Technologies: Connecting to the Internet

979 words - 4 pages encompass a range of different methods of access. Narrowband technologies refers to data download capabilities up to 128kbps and includes dial up connections, leased circuit using modems, fractional T1 data circuits, and Integrated Services Digital Networks (ISDNs). (Comer, 2009). Broadband technologies refer to higher download-capable technologies. DSL and cable modems are considered broadband along with wireless technologies and Data circuits

Impact of Information Technologies on Leadership A short survey of E-Leadership

1006 words - 4 pages , 200). Communication technologies have enabled a new economic eraknown as the Participation Age in less than a decade.The speed of doing business, using broad access to information and knowledge, has increasedsignificantly. Pulley, McCarthy and Taylor (2000) states that between 1997 and 2000, the averageproduct development cycle had dropped to six months and the pace continues to accelerate.These disruptive factors forced a profound paradigm shift

Persons of Mean and Vile Condition

683 words - 3 pages By: Mikayla Madden 9/20/14Persons of Mean and Vile ConditionDuring the sixteen and seventeen hundreds, there was a huge unrest between socialclasses. Bacon's Rebellion is an early example of this as well as other rebellions between slavesand servants and their owners.Bacon's Rebellion occurred in 1676 and was led by a man of the name of NathanielBacon. "Bacon's Rebellion began with conflict over how to deal with the Indians, who wereclose by, on

Barriers to access to information

952 words - 4 pages position of disabled person. So there are different types of barriers that an information worker had to consider: political, when there is an undemocratic political system that no supports the right to information; economic, when a poor country cannot afford to create and maintain means of information; technological, it occurs when information tools are new technologies that several people are ignorant of its use; physical, when there are, for example

Do Barriers in Promoting Access to Health and Social Care Services Affect Young Homeless People?

2047 words - 9 pages Introduction This discussion will explore how health and social care services are accessed by analysing a widespread variety of underlying issues that affect the planning and delivery of health and social care services for young homeless service user groups also differentiating the similarities and differences of young homeless people’s needs and assess the quality of care offered by professionals when they use their interpersonal skills to this

The purpose of this paper is to investigate and evaluate the effectiveness of several GICT's (Global Information and Communications Technologies) projects

889 words - 4 pages The purpose of this paper is to investigate and evaluate the effectiveness of several GICT's (Global Information and Communications Technologies) projects. GICT provides governments, private companies, and community organizations with the capital and expertise needed to develop and apply information and communication technologies to reduce poverty and foster development in countries throughout the globe via satellites. The countries that will be

Similar Essays

The Evolvement Of Information Sharing And Access

1387 words - 6 pages society functions through the ability to share and access information at a faster rate. Information sharing and access can be seen all throughout history, however the evolvement of this was not heavily seen until the 1300-1400s when the production and desire for books became controversial. In the 1300-1400s the idea of the book was for holy use and when individuals desired fictional books it was seen as a devilish act. Through much debate, the book

Diffusion Of New Information Technologies Essay

2650 words - 11 pages The adoption of new information technologies, ideas or innovations is a generally slow and arduous process of waiting for an entire population to comply with a proposed change. The leisurely pace with which these acceptances occur prompts scholars and practitioners to make educated predictions about its diffusion. One of the most popular adoption models is describes research that revolves around the likelihood of community acceptance of an idea

The Importance Of Information And Communication Technologies In Education

890 words - 4 pages identified access. For examples research, profetional and peers all over world .furthermore, it contains many hundreds of books. For example Barr Smith Library in South Australia is provide to students an online directory and that allow them to read and borrow the book online. Moreover, the use of databases and public libraries grow rapidly in the system of education because students are give a lot of information in short time and less effort

Review Of A Library And Information Science Periodical

560 words - 2 pages results were that users typically prefer to use recommendations only when they struggled to do a search or perform a task related to research. This is evidence in support of the Principle of Least Effort, and it also raises the idea that collaborative recommendations are a sort of “social information” that bypasses that barrier to information retrieval. Another article that reached out and grabbed me was one regarding naturalistic decision