The Arachnet Electronic Journal on Virtual Culture
__________________________________________________________________
ISSN 1068-5723 July 26, 1994 Volume 2 Issue 3
BALKA V2N3
THE ACCESSIBILITY OF COMPUTERS TO ORGANIZATIONS SERVING
WOMEN IN THE PROVINCE OF NEWFOUNDLAND:
PRELIMINARY STUDY RESULTS[1]
Ellen Balka & Laurel Doucette
Women's Studies Programme,
Memorial University of Newfoundland
ebalka@kean.ucs.mun.ca
1. ABSTRACT
2. A great deal of the writing about computer
networking begins with a declaration that computer
networks are a democratizing technology (Knight, 1983;
Leary 1984; Gabree 1984; Ruthven, 1983). More recent
work (Balka, 1993a) however suggests that the
inaccessibility of computer technology in general and
computer networking technology in particular prohibits
women's organizations from realizing the potential
benefits associated with computer networking.
3. In this paper, the accessibility of computer
networks to women's organizations will be considered
through an in-depth case study of women's organizations
in Newfoundland and Labrador. Two related areas of
access will be addressed: i) the extent to which
women's organizations have access to computer hardware
and software; and ii), the extent to which these groups
have access to knowledge required to successfully
utilize computer equipment. In discussing these issues
we also consider some of the social and technical
problems faced by workers in organizations serving
women as they attempt to use computer equipment.
4. Material in the paper draws on research carried
out in Newfoundland in 1992. Results are based
primarily on responses to a mail survey of all
provincial women's organizations (a 78% response rate
was achieved), as well as interviews with key
informants in women's organizations.
5.
_____________________________________________________
6. PART 1:
INTRODUCTION
7. In her introduction to Democratic Communications
in the Information Age, Wasko (1992) identifies several
questions addressed in the collected articles. They
include:
8. * How are new information technologies enhancing
(or inhibiting) democratic communications?
9. * How are communications resources enhancing (or
inhibiting) democratic progressive movements devoted to
social change?
10. * What is the prognosis for democratized
communication, as well as for democratization through
media or information systems? (Wasco, 1992, p. 6).
11. An understanding of democracy is central to
Wasko's (1992) questions. Mosco (1989) has
characterized democracy as "the fullest possible public
participation in the decisions that affect our lives"
(p.67). In discussing democracy, Mosco makes three
important points. First, he points out that democracy
depends upon participation in decisions related to the
social goal of obtaining equality. Second, Mosco points
out that participatory democracy is not limited to the
political arena, but that it is a process which
involves citizens actively creating economic,
sociocultural, and political participation and
equality (p.68). Finally, Mosco points out that
democracy is a public process that flourshies when
individuals are able to transcend themselves and meet
in public or community gatherings to develop an
alternative view of society. Refering to the work of
Lowi and Lytel (1986), Mosco argues that a positive
relationship exists between computers and democracy
when citizens are able to communicate freely in a
political community.
12. Wasko's (1992) questions, and Mosco's (1989)
discussion of computers and democracy reflect a growing
concern that assumptions about new information
technology, which are often uncritically accepted by
both the government and non-profit sectors, (for
example, that it will lead to a more participatory
democracy, that it will lessen communication costs,
that increased access to information will result in
increased business efficiency and contribute to
economic development, that it will lead to a more
participatory democracy), are problematic. In the paper
that follows, the questions posed by Wasko (1992) are
addressed in a general sense through a focus on the
accessibility of computers and computer networks to
women's organizations in Newfoundland.
13. Background
14. The province of Newfoundland, Canada's most
easterly province and the eastern most portion of North
America, consists of the island of Newfoundland, and
the vast and sparsely populated Labrador peninsula.
With just over a half million people spread over an
area slightly larger than Japan, the population density
of the problem is 1.5 people per square kilometer. This
low population density presents a number of challenges
in terms of communication, and makes the prospect of a
low cost decentralized computer network particularly
appealing to both the government and non-profit
sectors. In Newfoundland the potential of computer
networks has received considerable attention. In the
mid 1980s the government of Newfoundland commissioned a
study on provincial employment and unemployment.
15. By 1986, the official provincial unemployment rate
had risen to 19.9 percent, with 45,000 Newfoundlanders
actively seeking employment. It was estimated that
another 30,000 potential workers had ceased looking for
work in the absence of any real hope of obtaining
employment (p. 18, Royal Commission, 1986). Within this
context a Royal Commission on Employment and
Unemployment was formed to investigate and document
several aspects of unemployment in Newfoundland (see p.
461-464 of Royal Commission, 1986 for terms of
reference).
16. In 1986, in the final report of the Royal
Commission on Employment and Unemployment, Newfoundland
was described as "displaying signs of both social well-
being and social and economic malaise." Rural
Newfoundland (with around sixty percent of the
provincial population) was made up of 700 communities
with populations of less than 5,000 (p. 365, Royal
Commission, 1986).
17. The final report of the Royal Commission on
Employment and Unemployment (1986) Building on Our
Strengths included several comments about the
development of a stronger communications and computer
infrastructure for the province, as well as a
recommendation "to devise and implement a strategy for
accelerating the modernization of the
communications/information and computer systems of all
regions and communities in Newfoundland" (p. 202, Royal
Commission, 1986).
18.One of the recommendations of this study was to encourage
the development of an information technology industry, with
the end goal of providing support for decentralized
community-based economic development. Subsequently,
several government initiatives were taken in this area.
The potential economic benefits of computer
communications technology have been recognized by
partners in the Enterprise Network, [2] who identified
in their mission statement the need to "make
commercial, technical and industrial information
equally accessible to individuals and organizations in
urban, rural and remote regions of the Province,
regardless of their technical knowledge and skills"
(Newfoundland/Labrador Development Corporation, 1990,
p. [i]).
19. This kind of thinking follows in a long tradition
of linking computer technology to progressive social
change. Since the appearance of the first computer
network, ARPANET, in 1968, many constituencies have
asserted that computers and computer networks will be
essential to future social and economic development.
Early in their evolution, computer networks were viewed
as convivial and participatory, by both the government
and non-profit sectors. For example, Tony Benn, a
former British Minister of Technology, argued that
computer communications technology would provide the
means for an effective, participatory, democracy
(Ruthven, 1983).
20. Computers have been greeted with enthusiasm by the
non-profit social change sector as well. McCullough
(1991) points out that as the cost of personal
computers has declined, resource-poor community groups
engaged in organizing for social change have become the
inadvertent [3] beneficiaries of computer technology.
Computer networks, described as a "communications
medium that can be shared by all" (Knight, 1983, p.
123), are often viewed as having the potential to "make
a horizontal cut through the standard vertical
organizational chart" (Brilliant, 1985, p. 174). Thus,
they are particularly appealing to social change
organizations, which are frequently structured and
managed non-hierarchically.
21. At the same time as they acknowledge that computer
technology is embedded in political, economic and
cultural structures of domination, Downing, Fasano,
Friedland, McCullough, Mizrahi and Shapiro (1991) argue
that computers "can now be appropriated into organizing
for progressive social change" (p. 8). Popular debates
about computer networking technology suggest that it
ought to meet a diverse array of needs, including those
of women's organizations. In theory, computer networks
ought to be consistent with the democratic,
decentralized, participatory structures of women's
organizations dedicated to social change. Theory
suggests that computer networks should be accessible to
a wide range of women, and that they can enhance the
flow of information between members of women's
organizations, as well as between organizations.
22. Building on work by Rubinyi (1989) we began our
current research by examining contradictory claims: on
the one, that under-resourced community groups engaged
in organizing for social change have become the
inadvertent beneficiaries of computer technology
(Downing et.al., 1991); and on the other hand that
groups with a decentralized structure experienced
difficulty utilizing computer equipment (Rubinyi). In
general, we wanted to know if computer networks would
be accessible to women's groups in Newfoundland and
Labrador, and to what extent (if any) organizational
structure came to bear on the ability of groups to
utilize equipment.
23. In light of government interest in information
technology and extensive public funding of computer
resources in Newfoundland, it was particularly pertinent
to know whether or not provincial women's organizations
were in a position to realize some of the potential
benefits of the new technology. Given Brilliant's
(1985) observation about the appeal of computer
networks to non-hierarchically structured
organizations, a starting point of our investigation
was the general accessibility of computer
communications to organizations serving women, and
whether the structure of these organizations influenced
this constituency's utilization of computer technology.
24. This work grew from a desire to ascertain whether
or not claims made about the democratizing potential of
computer technology in general and computer networking
technology in particular held truth when women and
women's organizations attempted to utilize the
technology. Thus, the general line of inquiry described
below derives from a critical view of communications
that considers (in addition to the questions Wasko
identifies above) who owns the technology, who controls
it and who has access to it (Wasko, 1992). At issue is
whether communications technology reinforces existing
social relations or allows for social transformation
and new social formations (Mosco & Wasko, 1988).
25. Although it would be tempting to make a
distinction here between communicative social processes
(such as democracy) and mediating technological tools
(such as computer networks), doing so might imply that
social and technological activities are separate
(rather than interdependent) processes. In this piece
we assume that there is a complex relationship between
communicative social processes and mediating
technological tools. Balka (1991 & 1993a) and Benston &
Balka (1993) have discussed the communicative processes
surrounding women's use of computer networks and their
relationship to various computer network configurations
elsewhere. Thus, our intention here is not to discuss
the role of computer networks in mediating social
processes. We assume that if it is possible to
enhance our culture's ability to communicate
democratically via computer networks, that such an
outcome will require that women's organizations at the
very least, have access to that technology. Thus, our
goal here is simply to explore whether or not women's
groups working for equality in Newfoundland have access
to computer networking technology.
26. In this piece we have focused our discussion on
access to computer networking technology, as this is
one pre-requisite of a democratic communication system
(if we understand democratic communications in terms
outlined by Mosco, 1989). However, we recognize that
there are other pre-requisites to a democratic
communication system. These might include
correspondence between the design of a communications
infrastructure and the social processes and goals
identified as desirable (see Balka, 1991), public
policies that promote rather than constrain the use of
communication technologies by numerous interest groups
concerned with equality, and recognition of a number of
other social factors (such as linguistic preference,
literacy, access to technical competence and expertise)
that may come to bear on a particular group's ability
to easily use a communication system. [4]
27. Project History and Methodology
28. This project grew from a provincial conference
titled The Campus and the Community, which was co-
sponsored by the Institute for Social and Economic
Research at Memorial University of Newfoundland (ISER),
the Dean of Arts, (Memorial University of
Newfoundland), the Women's Policy Office (Government of
Newfoundland and Labrador), and the Newfoundland
chapter of the Canadian Research Institute for the
Advancement of Women. The 1991 conference brought women
from around the province together with women academics
to discuss ways both groups could work together. On
that occasion, representatives from several women's
groups identified the need for improved information
provision to their constituencies, as well as improved
communication between women's organizations in the
province.
29. Funding from ISER allowed us to develop a project
to investigate these questions. In investigating these
questions, we collected data that describes a) existing
access to computer and telecommunication resources in
women's groups and groups serving women; b) current
organizational structure and staffing arrangements of
these potential users of a computer network; c)
patterns of computer use anticipated by women's
organizations and actual computer use and maintenance
patterns; d) the level of interest in and need for
computer networking resources; and e) informational
material available for possible inclusion in a database
of holdings. In addition, we completed a review of
existing computer networking resources available in the
province, with an emphasis on the institutional
relationships that might affect the accessibility of
these networks to women's organizations. We also began
working with representatives from provincial women's
organizations to develop a participatory design process
to be followed in the future implementation of a
computer network to serve the needs of organizations
serving women.
30. The data summarized here was collected through a
mail survey, using methods outlined by Dillman (1978),
in Mail and telephone surveys: The total design method.
Methodological issues are discussed in further detail
in footnote [5] below. Using Dillman's (1978) system of
multiple follow-ups, we obtained a response rate of
seventy-eight percent.
31. PART 2:
FINDINGS
32. AVAILABILITY OF COMPUTERS TO WOMEN'S ORGANIZATIONS
IN NEWFOUNDLAND
33. Our questions about access to computers assumed
little or no knowledge about computers. We began by
asking if the group had access to a personal computer,
and if so, what type of computer the group had access
to. 71.3% (n=92) of the groups responding to the survey
had access to one or more personal computers. Because
we were interested in the possibility of implementing a
computer network to serve these groups in the future,
we were interested in what type of personal computer
groups had access to. Perhaps because of the lower cost
of IBM compatible computers compared to Apple
computers, provincial organizations serving women in
Newfoundland overwhelmingly use IBM compatible
computers (92.4% of groups, n=85), while only six
groups (6.5% of those with access to a computer) use
Apple computers. 3.3% of groups with access to a
computer indicated they used a brand other than an IBM
or Apple. In two cases respondents were unable to
identify the brand of computer their group used, and in
a few cases groups indicating access to a computer
other than an IBM or compatible listed the brand name
of an IBM compatible (such as Epson).
34. Given the settlement and commercial patterns in
Newfoundland, the delivery of technical computer
support is a critical issue. In many communities
throughout the province, no computer hardware or
software vendors exist. Thus, the provision of informal
forms of support may become more critical than would be
the case in densely populated regions where access to
support may be gained through the commercial sector
(through computer shops, for example).
35. The data on type of computers being used (together
with our data about software being utilized to complete
a variety of tasks) suggests that it would be
relatively easy to develop a mechanism for delivering
technical support pertaining to the use of computer
programs to those groups who have invested in IBM or
compatible machines. To the extent that software
support can be delivered through informal peer
networks, groups contemplating the purchase of computer
equipment in Newfoundland may want to acquire IBM
compatible equipment as they are likely to obtain
support from similar organizations more easily with
this type of equipment (a strategy advocated by
Cordero, 1991).
36. Perhaps because of high staff turnover (another
difficulty also identified by Cordero, 1991) and a
dearth of organizational records (frequent
characteristics of organizations in this sector), 8
groups (8.8% of those with access to computer
equipment) could not say when their group had first
obtained access to a computer. Thus, the response to
this question was somewhat lower than other questions.
Based on responses provided however, it appears that
the acquisition of computers by women's organizations
in Newfoundland occurred in two waves. The dates of
acquisition range from 1970 to 1992. Four groups
acquired access to a computer prior to 1982 (4.7% of
those groups with access). 33.7% of groups (n=29) with
computers acquired their first computer between 1983
and 1987. 58.1% of groups with access (n=50) acquired
their computers between 1988 and the implementation of
the survey in 1992.
37. Initial computer access started slowly, picked up
in the early 1980s, peaked at the turn of the decade,
and started to drop in 1991. This may indicate that
groups that are now still without computer access may
have either no use for a computer, or little chance of
acquiring access to one. This also suggests that the
possibility of this population enjoying shared
communications via computer network has only recently
emerged as a possibility. Compared to commercial users,
corporate users and computer hobbyists, women's
organizations have probably lagged behind in their
acquisition of computers.
38. Because Rubiniyi's (1989) earlier work indicated
that community groups with a decentralized structure
may have a more difficult time taking advantage of
computer equipment than those with a centralized
hierarchical structure, we asked several questions
about organizational structure.[6] We also asked
respondents questions about the services their
organization or group provided, and who (paid staff,
steering committees and/or board members, or other
volunteers) did what kinds of tasks.
39. Groups with no paid staff had access to computer
equipment in 50.9% of cases (n=29). Not surprisingly,
groups with paid staff were much more likely to have
access to computer equipment. 87.5% of groups with paid
staff (n=63) had access to computer equipment, while
only 12.5% of groups with paid staff lacked access to
computer equipment (n=9). 75.7% of groups with no access
to computers had no paid staff (n=28) while only 24.3%
of those groups with paid staff (n=9) lacked access to
computer equipment.
40. In our experiences working with women's
organizations we had observed several situations where
groups had access to computer equipment, but they did
not own it. One of the potential consequences of this
is that groups that do not own their computer equipment
are particularly vulnerable to losing their access to
it. In addition, these groups may not have a say in
what hardware or software is available, or to what
extent equipment is maintained. In light of the
potential ramifications of using (but not owning) a
computer, we included a question in our survey about
ownership of computer equipment.
41. In 59.8% of cases where groups indicated they had
access to a computer (n=55), those groups indicated
they owned the computer. However, in 14.1% of cases
where groups had access (n=13), the equipment the group
had access to was owned by a member of the group, while
in 9.8% of the groups (n=9) the computer the group used
was owned by another organization. 10.9% of groups with
access to a computer (n=10) indicated that their
computer was owned by someone other than the group, a
group member or another organization, and 5.4% of those
groups with access (n=5) indicated they had access to a
computer through more than one of the avenues
identified. In the case of those groups indicating some
arrangement for access other than those we had
identified on the survey, responses were particularly
interesting. For example, 4 groups indicated that
members use their own computer, at home or at their
places of work, though there was no indication of
whether or not the place of employment was aware that
its equipment is being used in this way). In one
instance, a group used a computer located at the place
of work of a group member's spouse.
42. Some aspects of organizational structure (such as
whether or not an organization has any paid staff, and
whether, in the event that paid staff were present,
they had position titles) appear to have a
statistically significant relationship to the ownership
of the computer equipment in use by groups. For
example, amongst those groups with paid staff that had
access to a computer, whether or not paid staff had
position titles was a reasonably good predictor
(Cramer's V=.57657) of whether or not the computer the
group used was owned by the group (as opposed to
another organization, a group member etc.).
43. Whether or not a group has paid staff is an even
better predictor of ownership of the computer equipment
used by the group (Cramer's V=.78656). In 96.4% of
cases where a group owned the computer equipment it
used (n=53), the group also had paid staff. In
contrast, in only 3.6% percent of cases where computer
equipment used by a group was owned by a group (n=2),
were no paid staff present. Consistent with these
findings, in 92.3% of cases (n=12) where the computer
equipment in use by a group is owned by a member of the
group, the group does not enjoy the luxury of paid
staff.
44. In groups where paid staff did not have position
titles, in only 18.8% of cases (n=3) was the computer
owned by the group. In contrast, in groups where paid
staff had position titles, 81% of groups (n=51) used
computer equipment owned by the group. In other words,
for groups with paid staff members, whether or not paid
staff have position titles is a reasonably good
predictor of whether or not the computer the group uses
is owned by the group, as opposed to used by the group
through some other arrangement other than ownership.
Further analysis of data is required to determine to
what extent (if any) this and other organizational
variables may be associated with groups' experiences
with computer equipment.
45. The implications of this are that in the vast
majority of cases when an organization in our
population had no paid staff, computer equipment in use
by the group was owned by a group member or entity
other than the group itself. In turn, this meant that
those groups without paid staff were particularly
vulnerable to losing their access to computer
equipment. So, in the event that we are able to develop
a computer communications infrastructure to support the
needs of women's groups in Newfoundland, we will need
to ensure that those groups without paid staff (44.2%,
n=57 at the time the survey was conducted) have
unhindered access to computer equipment.
46. Access to Fax Machines, Modems and Computer
Networks
47. Some previous research (Asseshton-Smith, 1988)
indicates that when some users have difficulty with
computer networks, they may resort to the often more
familiar technology of fax machines. Fax machines may
also be useful in terms of providing technical support
and encouragement to potential computer network users.
Finally, fax machines may be an invaluable backup
technology to computer networks in the event that
computer networks are temporarily inaccessible to users,
either because of network failures, or an inability to
access a specific networking system. Asseshton-Smith
also pointed out that in one instance where a potential
computer network user was unable to gain direct access
to a computer network, she was able to participate in
discussions that took place largely via computer
network by faxing contributions to a network
participant who placed her faxed material on the
computer network, and faxed network discussions to her.
With this in mind, we were interested in whether or not
fax machines could be used as an alternative to some
forms of communication that took place via computer
network.
48. We asked organizations if they owned or had access
to a fax machine in order to gain a better sense of the
communications environment that organizations serving
women in Newfoundland worked within. Our respondents
were generally positive about the use of fax machines,
and their responses would seem to indicate that amongst
this population, fax machines are viewed as a
relatively user-friendly technology.
49. We asked respondents if they had access to a fax
machine, what their fax number was, and, in the event
that they did not own a fax machine, where the fax
machine they used was located. 18.6% of respondents
(n=24) indicated that they did not have access to a fax
machine. 48.1% of groups (n=62) in our population
indicated that they owned a fax machine, while 33.3
(n=43) indicated that they had access to a fax machine
owned by another group or through an individual.
50. Nearly a third of the groups provided some open-
ended information about their fax access. Some groups
reported that they use more than one fax number. In
some cases, fax numbers were shared by two, three or
four groups. Information provided in response to the
open ended question about fax use revealed that the
organizations have utilized a variety of means to
obtain access to this technology. 12.9% of respondents
(n=10) use the fax machine of another organization,
institution or business. In 6% of cases (n=8), the
group gains access to a fax machine through the
employment of a member or members.
51. Five groups use the fax number of a parent
organization or institution, and 4 groups use the fax
number of another women's organization. There are a
few cases where access to a fax is gained through a
provincial office, government office or through a
municipal office. One group uses the fax number of
their national head office in Ottawa. One group has
access through the personal home fax of a group member,
and another group reports access to a fax machine
through the employment of a spouse or friend.
52. Of the 28.7% of respondents who lacked access to a
computer, (n=37), 45.9% (n=17) also do not have their
own fax machine. However, most of these groups (16 of
17, or 43.2% of groups without access to a computer)
have access to a fax machine at another location. Only
10.8% of groups (n=4) without access to a computer own
their own fax machine. In contrast, 93.5% of those
groups that own a fax machine (n=58) also have access
to a personal computer. 62.8% of these groups (n=58)
which have access to a fax machine at another location
have access to a computer. However, 13.2% (n=17) of our
population lacked access to both a computer and a fax
machine. Clearly this sub-set of the population will
require special attention if they are to be included in
communication which occurs through either fax or
computer network.
53. Although we found that access to personal
computers was quite high amongst the population
studied, access to modems (and consequently computer
networks) was significantly lower than access to
personal computers. And, although Asseshton-Smith
(1988) indicated described a situation where a fax
machine was used as an alternative to a direct link to
a computer network, this practice did not appear to be
common, at least among the population discussed here.
54. Although 71.8% of groups (n=92) had access to a
computer, only 28.7% of our population (n=37),
representing 39.8 % of those with access to a computer,
have access to a modem, which is required in order to
utilize a computer network. 5 groups, representing 5.4%
of groups with access to a computer indicated that they
did not know if they had access to a modem. Since it is
possible for groups to gain access to a computer
network through a large computer system located
elsewhere, we also asked respondents if they had access
to a large central mainframe computer system and
gave respondents five options for a response. 70.9% of
respondents (n=90) lacked access to such a system. 11%
(n=14) of groups had access to such a computer system
at a university or community college, and 11.8% (n=15)
had access to such a system through a government
office. None of the groups indicated that they had
access to a commercial computer network, although they
were given this as an option. However, 6.3% of groups
(n=8) indicated they had access to such a system by
selecting the category for other. This suggests that
there were perhaps some problems with the level of
knowledge of computer networks we assumed in asking
this question. This anomaly may indicate that among our
constituents, many lack an understanding of whether the
computer network they use is commercial or non-profit,
where it is located and how it is configured, and so
on.
55. In addition to asking groups whether or not they
had access to a modem and/or a mainframe computer, we
also asked whether or not groups had access to
electronic mail or computer conferencing. 68.5% of
respondents (n=87) did not have access to electronic
mail or computer conferencing while 24.4% of groups
(n=31) did have access to computer communications. 7.1%
of respondents (n=9) did not know if they had access to
electronic mail or computer conferencing.
56. We asked those groups that had used a computer
network to indicate what they had used a computer
network for. Responses were varied. The activities
mentioned fell into several categories, which included
electronic mail and general, unspecified information
exchange (5 groups); sending local messages between
offices (3 groups); communication within the province
(4 groups); communication with branch offices in other
provinces (1 group); interprovincial communication
(other than with head office), (1 group); international
communication (1 group); file transfer (4 groups);
consultation of resource library (4 groups);
consultation of databases, including Statistics Canada
(3 groups); general access to research/information
sources (1 group); bulletin board type use (1 group);
educational usage (participation in a distance course)
(1 group). In addition, one group noted that they could
use an electronic mail or message system, but did not.
Thus, although only a small percentage of our
population was at the time of the survey using computer
networking facilities, of those, 41.4% (n=12) were
using the ACOA/Enterprise Network, which offers a
fairly wide range of services, many of which are
mentioned above, such as access to the Statistics
Canada database and consultation of resource library.
57. Although responses to open ended questions
described above seem to indicate thorough use of
features other than electronic mail, patterns of use
reported by the ACOA/Enterprise Network (1994) indicate
a general under utilization of database facilities, and
a substantially higher than anticipated demand for
communication via electronic mail and file transfer.
For example, 60.1% (ACOA/Enterprise Network, 1994:32)
of the Women's Enterprise Bureau's use of the
ACOA/Enterprise Network involved the use of
communication tools (electronic mail and file
transfer), which is somewhat higher than the use of
those on-line facilities by all user groups (46% of
total network use). (ACOA/Enterprise Network,
1994:30).
58. Although 24.4% of respondents indicated that they
had access to electronic mail, when asked whether their
group had an electronic address, only 13.2% of all
respondents (54.5% of those indicating that they had
access to electronic mail) indicated that they had an
electronic mail address (n=17). We asked those groups
that indicated that they had an electronic mail address
to supply their addresses. From respondent supplied
electronic mail addresses we were able to determine two
things. First, we were able to ascertain that amongst
those groups using electronic mail, two systems were
used more than others. Seven groups indicated that they
had electronic mail addresses through the Memorial
University computer system, and five groups indicated
that they had access to electronic mail through the
ACOA/Enterprise Network. (Three additional groups had
individual addresses: a federally supported community
development agency, a provincial government office, and
a Native people's association).
59. Secondly, most of these addresses were not given
in complete and accurate form. From this fact, along
with responses to a question that solicited information
about what network(s) groups had used (many respondents
could not identify which computer communication systems
they had used), we have ascertained that at the time of
the survey (Spring, 1992), despite access to equipment
required for computer communications, most groups in
our census lacked knowledge that would allow them to
avail themselves of the potential connectivity afforded
by their equipment. Previous research (Balka, 1991 &
1993a & 1993b; Benston, 1989; Benston & Balka, 1993)
suggested that access to knowledge required to use
computer communication systems is often overlooked. We
address this issue in detail below.
60. ACCESS TO KNOWLEDGE REQUIRED TO SUCCESSFULLY USE
COMPUTER EQUIPMENT
61. Background
62. In efforts to understand and overcome the
limitations associated with integrating users into the
process of developing technology, several researchers
have examined the theoretical basis of the design
process, and developed a number of approaches aimed at
creating a development process that supports
cooperative systems design. Researchers working in this
area (Bermann & Thoresen, 1988; Floyd, 1987; Grudin,
1988; Kyng, 1988; Suchman & Jordan, 1988) have argued
that much of the early work concerned with human-
computer interaction failed to develop a critical
assessment of the technology that would lead
researchers to study the ways that social context,
power relations, and social bias may affect the actual
systems that are created.
63. Work by Suchman and Jordan (1988) begins to bring
together material concerned with cooperative systems
design, and gender and technology. They begin by
pointing out that both the design and use of technology
involve appropriation. Most technologies are designed
at a distance from the situation of their use. This
leads to an inevitable gap between scenarios of design
and circumstances of use. Regardless of the accuracy of
the designer's understanding of end use, the gap exists
and has to be filled by users; hence design is only
fully completed in use. Suchman and Jordan have
observed that women lack both the authoritative
knowledge in relation to computers as well as
involvement with the implementation and use of
computers. These shortcomings prohibit women from
appropriating this technology.
64. Suchman and Jordan (1988) point out that in
settings where women are primary participants, the
legitimacy of their knowledge is subordinated to claims
on authoritative knowledge put forth by men. Balka
(1991) found evidence of this in her research about the
use of computer networks in the context of feminist
social change. Among the examples she cites was the
situation of one computer network (The Amazon Line)
targeted for women users which failed due to an
inability to foresee the special training needs of
women as a user group. Balka also attributed the
relative success of another computer network (The
Women's Bulletin Board System in New York City) partly
to the provision of ample support to users by Women's
Bulletin Board staff.
65. So, despite the lack of attention given to gender
by scholars and activists working in the participatory
design framework (see for example all but Eastman's
contribution to Downing, Fasano, Friedland, McCullough,
Mizrahi & Shapiro, 1991, and all but Bravo's
contribution to Schuler & Namioka, 1993), we felt that
expertise and gender warranted a special focus in our
study of women's access to computers in Newfoundland.
66. Based on past experiences working with women's
groups to solve computer problems, we designed a series
of questions aimed at determining who was solving the
inevitable computer problems that arise in normal
organizational use of computers, the gender of that
person or persons, and their relationship to the group,
along with answering a number of other questions
related to who in groups uses computer equipment, how
they learned to use that equipment and what (if any)
problems they encountered. We were also interested in
who helped make the initial decision about what type of
computer to get, and who initially set up the computer.
We were particularly interested in this line of inquiry
because past experience working with women's
organizations where someone external to the group set
up computer equipment, and was not subsequently
available when changes had to be made.[7]
67. Computer acquisition
68. Many respondents had problems in answering the
question of who had helped them decide what kind of
computer to get, since many groups did not make any
decision--they used the computers of members, member
groups, or sponsoring bodies, or had the decision made
for them by a parent body within a large institution.
In addition, 17.4% of groups (n=16) indicated that they
did not know who had helped make the decision about
what type of computer to get.
69. Following the advice of a member of the group was
a popular path to follow amongst respondents to our
survey. 19.6% of groups (n=14) indicated that one
member of the group had helped make the decision about
computer acquisition, while 13% of respondents (n=12)
indicated that more than one group member provided
advice about computer acquisition.
70. To our surprise, 19.6% of groups (n=14) indicated
that they had gotten assistance from a source other
than those we provided as response options on the
survey. Respondents selecting this option described a
wide range of options in relation to how decisions
about the acquisition of computer equipment had been
made. Responses provided by those groups that indicated
"other" included that the decision about what type of
computer to acquire was made by paid staff or members
of parent group or informal (or even unwitting)
"godparent" groups. In one case a group was using a
donated computer, and thus had not been involved in
deciding what type of computer their group would use.
In one instance the decision about what type of
computer to acquire had been made by the spouse of a
group member. Finally, in two cases where "other" was
selected the respondent indicated that a group member
owned the group's computer (and thus presumably made
the decision about what type of computer to acquire).
71. Fourteen percent of respondents indicated they had
received help in deciding what type of computer to buy
from more than one source listed in the group of
possible responses. In these cases, groups who reported
help from a combination of sources typically obtained
help from one or more members of the group and a paid
consultant. 8.7% of respondents (n=8) indicated that no
one had assisted them in making this decision, while
non-member volunteers, paid consultants and computer
vendors were identified as providing assistance in 3.3%
(n=3), 2.2% (n=2) and 2.2% (n=2) of cases respectively.
72. Perhaps reflecting the lack of institutional
memory and record keeping endemic to women's
organizations (which may well be tied to rapid staff
turnover), in 31% of valid responses to this question
(n=26)8 (which represented 28.3% of those groups with
access to a computer,) respondents did not know whether
the person or people who helped decide what type of
computer to get was a man or a woman. This is somewhat
surprising in light of the fact that 58.1% of groups
with access (n=50) acquired their computers between
1988 and the implementation of the survey in 1992. In
31% of cases (n=26) assistance in setting up the
group's computer was provided by a woman, while in
26.2% of cases (n=22) this support was provided by a
man. 10 groups (11.9% of those with computers)
indicated that either a man and a woman had assisted,
or the gender of one person who helped set up the
computer was unknown.
73. All respondent groups with computers provided an
answer to the question of who set up their computer
equipment. In light of previous response patterns it
was not surprising that 27.2% of groups (n=25) with
access to a computer did not know who had helped set
that computer up. In cases where it was known who had
set up the group's computer equipment, the most
commonly cited source of assistance for setting up the
computer equipment was paid staff (22.8%, n=21),
followed by a paid consultant (13%, n=12). Computer
vendors were used to help set up computers almost as
often as paid consultants (10.9% of cases, n=10), while
8 groups (8.7%) relied on assistance from more than one
source. Volunteer members and non-members of the group
were used in 7.6% (n=7) and 6.5% of cases (n=6)
respectively. In the 3 cases where "other" was
selected, (3.3% of groups with computers) setting up
the computer equipment in use by the group was handled
by the organization or individual that owned the
computer equipment.
74. Access to Computer Training
75. Previous research (Balka, 1986) indicated that,
although the introduction of computers into a workplace
often requires that workers learn new work procedures
related to computer use, that in many instances
computers are introduced into a workplace and workers
are not provided with training to use the new
technology. This appeared to be particularly true when
jobs commonly held by women were involved, perhaps
reflecting social beliefs that such jobs require little
skill, and thus little training. This phenomenon,
combined with observations from working with women's
groups, led us to ask how those people in a group who
used a computer learned to use the equipment.
76. Consistent with some of Balka's (1986) findings,
the most popular response to this question was
everyone learns on their own, which garnered 36.5% of
responses to this question (n=24). In 18.8% of cases
groups indicated that people taught one another how to
use the equipment (n=16). In-house training was
provided in only 8 instances (9.4%), and in 6 instances
(7.1% of cases), group staff were sent to courses to
learn to use computers. In 28.2% of groups with
computers, more than one of the above mechanisms for
acquiring computer skill was used. Although our data
does not indicate why self learning and peer learning
are popular forms of computer skill acquisition among
this population, one implication is that those groups
that purchase software and thus have access to
manufacturer's manuals as well as proper software
installations are likely to be more successful in
utilizing their equipment.
77. Computer Use
78. We asked a series of questions concerning what
groups anticipated they would use the computer for,
what they actually did use the computer for, and who
used the computer for what types of tasks. We were
interested in determining the extent to which groups'
pre-acquisition plans for their computer equipment were
met. We also thought these questions would help us
document unusual patterns of use of computer equipment.
For example, in one women's organization in another
province, volunteers use the organization's computer
equipment, but paid staff do not. Also, in many
instances problems with computer hardware and software
result in substantially different patterns of use than
those initially anticipated.
79. Of the 92 groups with access to a computer, one
reported that they did not actually use the computer.
Not surprisingly, in 72.5% of cases (n=66), computers
were used by paid staff. In 33% of cases where groups
had access to computers (n=30), volunteers used
computers to do work for the group. In 25% of cases
(n=23) group members did their own (private, as opposed
to group) work on the computer equipment accessible to
the group. Perhaps more surprising is that in 8.8% of
cases computers were used exclusively by group members
to do their own (as opposed to the group's) work. For
these groups it is possible that despite the presence
of computer equipment, computers have not become
integral to how group tasks are carried out.
80. Further information was sought about computer use
through questions on planned and actual computer use
for specific tasks. Because some groups acquired
access to a computer without actively "planning" on
using one, they had difficulty responding to the
question on planned usage, and three of the 92 groups
with computer access did not respond.
81. Where planning occurred, it concentrated on the
more routine office work. In order of prevalence, the
planned tasks were as follows: typing (92.2%, n=83);
preparing mailing lists and/or labels (78.9%, n=71);
accounting (48.9%, n=44); graphics (27.8%, n=25);
electronic mail (26.7%, n=24); desktop publishing
(25.6%, n=23); training (22.2%, n=20). In 5.6% of
cases (n=5), survey respondents did not know for which
tasks the computer had been acquired. Through an open
ended response associated with this question we also
found that groups used the computer for the following
tasks: to access and maintain a resource inventory, to
automate a library for purposes of developing a
province-wide network, to conduct bibliographic
research on-line, to maintain files (including client
information and computerized psychological assessment
data), to maintain a data base, to prepare leaflets, to
maintain registration information for a professional
association, and to conduct research (within a medical
agency), and perform statistical analyses. On the
subject of actual (as opposed to anticipated) use of
the computer, two groups reported they do not use the
computer for any tasks. Other responses suggest that,
at least where routine office jobs are concerned, the
majority of groups are using the computer more or less
as they had planned.
82. We provided respondents with a list of common
office tasks adjacent to a series of blank lines, and
asked respondents to indicate on the blank lines what
software they used to complete which tasks. A glance
through the responses to this question suggests that
there may be a high level of confusion concerning the
use of computer programmes (or software). For example,
the programme Lotus is listed not only under
accounting, but also under typing (1 instance),
graphics (2 instances), and other tasks which are not
specified (2 instances). Keeping in mind the potential
problems with this response, it appears that most
organizations in the study population (87%, n=80) use
WordPerfect for word processing. Another widely used
programme is dBASE, which was used for preparing
mailing lists and/or labels (7 instances), accounting
(1 instance), training (2 instances), and other uses
such as maintaining a database of employee information
and of statistics (4 instances). It appears that dBASE
III, III Plus, and IV are actively in use.
83. Computer Maintenance And Expertise
84. Our previous work with women's organizations
suggested that maintenance of computer equipment was a
chronic problem. Also, even within the participatory
design paradigm the social relations of expertise
seldom face critical scrutiny (Downing et.al., 1991
provide a good example of uncritical acceptance of the
role of the expert in maintaining computer equipment.
Benston (1986) and Suchman and Jordan (1988) provide
critiques of these relations). Thus we were interested
not only in the relation to the group of people who
performed computer maintenance to the group, but also
the gender of these people.
85. On the question of computer maintenance, a number
of respondent groups made multiple choices from the
given options, or indicated a combination of
maintenance persons. Returns from the 92 valid cases
reported indicate that, as with the setting up of
equipment, paid staff, (either of the group itself or
of a parent organization) are the most likely delivery
mechanisms for computer maintenance. However, as was
the case with installation of groups' computers, the
picture is quite varied. To our surprise, paid staff
took care of maintenance needs in 41.3% of cases
(n=38). Computer vendors handled maintenance needs for
19.6% of groups (n=18), while paid consultants handled
computer problems in only 12% of the groups (n=11).
Also in 12% of the groups computer maintenance was
performed by a volunteer member, and in 12% of cases
respondents did not know who dealt with computer
maintenance. As was the case with deciding what type of
computer to acquire, maintenance of equipment was
performed in some instances by a parent organization
(6.7%; n=6) that owned the computer equipment, and
maintenance was provided by private owners in 4.3% of
cases (n=4). In 2 cases no one provided maintenance, in
one case it was provided by a non-member of the group,
and in one case it was handled by a vendor until the
warranty expired, and then it was handled by a paid
consultant.
86. We asked respondents if anyone had emerged as a
computer expert for their group, and if so, who filled
that role, and whether that person was male or female.
These questions were partly aimed at ascertaining
whether Rubiniyi's (1989) findings that groups with a
centralized structure were better able to take
advantage of computer equipment held true. Also, these
questions sought to explore whether or not groups in
our population reflected patterns advocated by authors
in Downing et. al. (1991). For example, Cordero (1991)
reported that one organization she worked with
benefitted from having one person assigned the
responsibility of managing computer use. Similarly,
Kramer advocates making sure that someone in-house is
willing to "keep up with the technology" (Kramer,
1991:125). Finally, one consultant who frequently works
with small social change sector organizations quoted in
Fasano and Shapiro (1991:132) indicates that she won't
even take jobs now unless an organization has one
person who is the computer champion/guru.
87. In 56.6% of groups with computer access (n=51),
respondents indicated that a computer expert had
emerged for their group, while in 44% of cases (n=40)
no expert had emerged. In cases where respondents
indicated that a computer expert had emerged for their
group, they were invited to proceed to the next
question and indicate the relationship of the expert to
their group. In response to this question, 68.6% (n=35)
of those indicating an expert had emerged identified a
member of their group as the group's computer expert.
In 13.7% (n=7) of groups with an expert, the expert was
identified as a non-member of the group acting
voluntarily. Paid consultants served as experts for
7.8% (n=4) of groups with an expert, and for 3.9% of
groups with an expert, that role was filled by a
computer vendor. Seven groups, representing 13.7% of
those groups with an expert, indicated that the person
filling that role did not fit into any of our pre-
defined categories. Among the responses listed here
were family of a staff member, the organization's
computer committee, or a combination of people filling
some of the roles previously identified. To our
surprise, in instances where a computer expert had been
identified by groups in our population, that role was
filled by women in 78.4% of cases (n=40), and by a man
in 37.3% of cases (n=19). (Some groups reported more
than one response to this question, and thus totals may
appear to be inconsistent).
88. Respondent's Impressions of Their Use of Computer
Equipment
89. A number of groups reported positive experiences
with computers. They faced no major problems, were
happy with the quality of the work they could produce,
and looked forward to learning more so that they could
fully exploit the technology. Some felt it was easy to
expand on skills, once a basic level of ability was
achieved. Groups who were part of the ACOA/Enterprise
Network were particularly pleased with what they could
do with that system. Others who used other networks or
used electronic mail were similarly pleased. Some
groups without access to a network expressed a wish to
have "information at their fingertips" through a
network.
90. Many groups and their members have a positive view
of computers. They feel computers have increased their
efficiency, they are happy with their own systems and
they can see potential applications of computer
technology, both in-house and on-line. A number of
respondents indicated that they were currently
upgrading their skills, either as individuals or as a
group. People who have support for managing their
computer system within their parent organization or
within their own agency are particularly satisfied.
91. There was only one report of fear of a computer
that "eats documents"; and only one group used the term
"computer illiterate" in describing themselves.
However, some groups have had hardware problems. Three
groups reported crashed hard drives, including one on a
new machine. One group reported that the motor of their
printer had given out, while another group reported
that a tape back-up system had broken after only 8
months.
92. Other groups reported software problems. These
included an inability to retrieve files within one
system on a regular basis, and software upgrades that
did not work properly. One organization had a piece of
software designed just for them only to find that it
did not work well enough for their uses and was hard to
fix. Another group indicated that they wanted a better
software package for mailing lists in order to do
selective mail-outs from a base list.
93. Several groups complained about the lack of funds:
for software, for sending staff to training, and for a
computer itself. Lack of training seemed to be a
common problem. In addition, many groups felt they were
not using their computer to its potential, because they
did not have the skills. They were restricted to typing
and mailing list uses. One group reported the loss of
the one staff person who had computer skills, which
suggests that some groups may come to rely heavily on
one person for support. For some groups, finding a
suitable consultant to help with maintenance and give
advice was a problem. Other complaints included that
one group's computers were over-used (and thus the
group needed more computers), and that one group's
various computers were not integrated with each other,
nor with the printer, and this reduced efficiency.
94. CONCLUSION
95. To the extent that when computers are used by
organizations in the service of "democratic struggles"
(McCullough, 1991: 10) they are used in an
organizational (and thus social) context, it is
imperative that we consider the extent to which
computers are accessible to various constituencies
prior to making proclamations about the democratizing
potential of information technologies or the
communications they support. The democratic potential
of new information technologies lies in part in the
social context and social relations of their use, which
includes social relations that govern access to systems
of expertise, as well as patterns of ownership. These
in turn are located within larger webs of economic and
social relations.
96. Our focus here on the accessibility of computers
and computer communications to organizations serving
women has been limited. We have yet to explore the
accessibility of these technologies to this
constituency in relation to literacy levels, linguistic
differences, settlement patterns (urban as opposed to
outport communities), and the federal and provincial
regulatory policies that contribute to patterns of use.
However the material presented here should clearly
illustrate the need to question popular assumptions
about the accessibility of technology to various
sectors, especially women.
97. To the extent that we assume that democratized
communication will be a requisite for social and
economic participation and growth, it is essential that
we continue to ask the kind of questions posed in the
study whose findings have been reported here. Although
we have restricted our focus to a sector of potential
users of computer technology in the context of computer
communications, the kinds of questions posed here
should be treated as pertinent to all sectors and
constituencies that must work together to effect social
and economic justice. Democratic communications, as
outlined by Wasko and Mosco (1992), will require
ongoing critical reflection about the dynamic social
and economic nature of technologic change. A failure to
recognize how context-dependent technology is, and to
account for differences in that context (such as
organizational structure) may result in a superficial
acceptance of new communications technology which may
restrict rather than enhance our ability to have our
voices heard.
98. BIBLIOGRAPHY
99. _Proceedings of the conference on computer-
supported cooperative work_ (pp. 178-188). Portland:
CSCW.
100. ACOA/Enterprise Network, (1994). _Evaluation
of the Canada/Newfoundland ACOA/Enterprise Network
Cooperation
101. Agreement_. St.John's: ACOA/Enterprise Netork.
February.
102. Assheton-Smith, M.(1988). _Communicating: The
feminist and electronic mail_. 12th Annual
Conference of the CRIAW. Nov.12, 1988. Quebec City.
103. Balka E. & Doucette, L. (in progress) _Final
Report to the Insititute for Social and Economic
Research_. St. Johns: ISER.
104. Balka, E. (1986). _Women and workplace
technology: Educational Strategies for change_.
Unpublished M.A. thesis. Simon Fraser University,
Burnaby, B.C.
105. Balka, E. (1991). _Womentalk goes on-line: The
use of computer netowrks in the context of feminist
organizing_. Unpublished Doctoral. thesis. Simon
Fraser University, Burnaby, B.C.
106. Balka, E. (1993) "Women's access to on-line
discussions about feminism" _The Electronic
Journal of Communication/LaRevue Electronique de
Communication_(Special Issue titled Women and
Media: A Feminist Sampler).
107. Balka, E. (1993)."Cappuccino, community and
technology: Technology in the everyday life of
Margaret Benston" _Canadian Woman Studies
Journal/les cahiers de la femme_. vol. 13 #2, 62-
65.
108. Benston, M. & Balka, E. Participatory Design
by Non- Profit Groups _Canadian Woman Studies
Journal/les cahiers de la femme_. vol. 13 #2, 100-
103.
109. Benston, M. (1986). Questioning authority:
Feminism and scientific expertise. _Resorces for
feminist research, (3), 71-73.
110. Benston, M. (1989). Feminism and systems
design: Questions of control. In Tomm, W. (Ed.).
_The effects of feminist approaches on research
methodologies_ (pp. 205-) . Calgary: University of
Calgary.
111. Bermann, T. & Thoresen, K. (1988). Can networks
make an organization? In _Proceedings of the
conference on computer-supported cooperative work_
(pp. 153-166). Portland: CSCW.
112. Brilliant, L.B. (1985). Computer conferencing:
The global connection. _Byte v.10 # 13._
113. Dillman, D.A. (1978). _Mail and telephone
surveys: The total design method_ New York: John A.
Wiley & Sons.
114. Downing, J., Fasano, R., Friedland, P.A.,
McCullough, , Mizrahi, T. & Shapiro, J.J. (Eds.).
(1991). _Computers for social change and community
organizing_. New York: Haworth.
115. Downing, R. Fasano, P.A. Friedland, M.
McCullough, T. Mizrahi, & Shapiro, J. (Eds.),
_Computers for social change and community
organizing_ New York: Haworth.
116. Eastman, B. (1991). Women, computers and social
change. In J. Downing, R. Fasano, P.A. Friedland, M.
McCullough, Mizrahi, & Shapiro, J. (Eds.),
_Computers for social change and community
organizing_ (pp. 41-54). New York: Haworth.
117. Ehn, P. & Kyng, M. (1987). The collective resource
approach to systems design. In G. Bjerknes, P. Ehn,
& M. Kyng, (Eds.), _Computers and democracy: A
Scandinavian challenge_ (pp. 17-58). Aldershot:
Avebury.
118. Fasano, R. & Shapiro, J. (1991). Computerizing the
small non-profit: Computer consultantRs perspective.
In J. Downing, R. Fasano, P.A. Friedland, M.
McCullough, T. Mizrahi, & J.J. Shapiro, (Eds.).
(1991). _Computers for social change and community
organizing_ (pp. 119-145). New York: Haworth.
119. Floyd, C. (1987). Outline of a paradigm change in
software engineering. In Bjerknes et.al., _Computers
and democracy_ (pp. 191-210). Avebury: Aldershot.
120. Garbee, John (1984). Computers, cable and the
future. In S.Ditlea (Ed.), _Digital Deli_ (pp.364-
365). New York:Workman.
121. Grudin, J. (1988). Why CSCW applications fail:
Problems in the design and evaluation of
organizational interfaces. In _Proceedings of the
conference on computer-supported cooperative work_
(pp. 85-93). Portland: CSCW.
122. Knight, Timothy O. (1983). _The world connection_.
Indianapolis, IN.: Howard W. Sams.
123. Kramer, F. (1991). "Warm hearts/cold type: Desktop
publishing arrives. In J. Downing, R. Fasano, P.A.
Friedland, M. McCullough, T. Mizrahi, & J.J.
Shapiro, (Eds.). (1991). _Computers for social
change and community organizing_ (pp. 119-128). New
York: Haworth.
124. Leary, T. (1974). Personal computers/personal
freedom. In S.Ditlea (Ed.), _Digital Deli_ (pp. 359-
361). New York: Workman.
125. Linton, M. & Gallo, P.S. Jr. (1975). _The
practical statistician: Simplified handbook of
statistics_. Monteray, CA.: Brookes/Cole.
126. Lowi, T.J. & Lytel, D. "Comments on 'Democracy
in an information society': Making it a real
revolution," _The information society, IV (1,2)_
(1986), 91-99.
127. McCullough, M. (1991). Democratic questions for
the computer age. In J. Downing, R. Fasano, P.A.
Friedland, M. McCullough, T. Mizrahi, & J.J.
Shapiro, (Eds.). (1991). _Computers for social
change and community organizing_ (9-18). New York:
Haworth.
128. Mosco, V. & Wasko, J. (1988). (Eds.). _The
political economy of information._Madison: U. of
Wiscounssin Press.
129. Mosco, V. (1989). _The pay-per society:
Computers and communication in the information age_.
Toronto: Garamond.
130. Norusis, M.J. (1983). _Introductory statistics
guide: SPSSx_. New York: McGraw Hill.
131. Raboy, M. & Bruck, P.A. (Eds.). (1989).
_Communication for and against democracy_. Montreal:
Black Rose.
132. Royal commission, (1986). Final report: Building
on our strengths. Report of the Royal Commission
on Employment and Unemployment. St.John`s: Queen's
Printer.
133. Rubinyi, R.W. (1989). Computers and community:
The organizational impact. In _The information
gap: How computers and other new communication
technology affects the social distribution of
power_ (pp. 110-123). London: Oxford University
Press.
134. Ruthven, K. (1983). _Society and the new
technology_. Cambridge: Cambridge University
Press.
135. Schuler, D. & Namioka, A. (Eds.). (1993).
_Participatory design: Perspectives on systems and
designs_. Hillsdale N.J.: Lawrence Earlbaum.
136. SPSS Inc. (1983). _SPSSx User's Guide_.Chicago:
SPSS Inc.
137. Suchman, L. & Jordan, B. (1988). Computerization
and women's knowledge. In _Women, work and
computerization: IFIP conference proceedings_,
1988. Amsterdam.
138. Thiessen, V. (1993). _Arguing with
numbers:Statistics for the social sciences_.
Halifax: Fernwood.
139. Wasko, J. & Mosco, V. (1992) (Eds.).
_Democraticcommunications in the information age._
Toronto:Garamond.
140. Wasko, J. (1992). "Introduction: Go tell it to
the Spartans." In J. Wasko & V. Mosco (Eds.).
_Democratic communications in the information
age._ Toronto:Garamond.
141. END NOTES
_______________________________
142. [1] We are grateful to the Institute for
Social and Economic Research (ISER) at Memorial
University for providing funding for this project. In
addition we would like to acknowledge both the
financial and intellectual support of those
organizations that supported the workshop The Campus
and the Community, from which this project grew.
Finally, we would like to acknowledge the contributions
of Beverly Brown who maintained a sense of humour while
transcribing interviews and entering data from
questionnaires into the computer, and provided useful
comments on earlier drafts of this paper.
143. [2] The Enterprise Network is a joint
project of the Newfoundland and Labrador Development
Corporation and the federally-fundedAtlantic Canada
Opportunities Agency to "promote development in rural
and remote regions of the province through the
application of Information Technology concepts and
services" (Newfoundland/Labrador Development
Corporation, 1990, p.1).
144. [3] Social change groups have become the
inadvertent beneficiaries to the extent that the
technology was not initially designed for use by this
sector. Computer technology in general and computer
communications technology in particular were initially
developed as military technologies. Despite such
military roots, progressive social change groups have
made frequent proclamations about the technology's
democratizing potential, which was in many cases
overlooked initially by the commercial sector. See
Balka, 1991 (chapter 2) for an extended discussion of
the social history of computer networking.
145. [4] For a more detailed discussion of
democratic communications see Mosco, 1989; Mosco &
Wasko, 1988; Raboy & Bruck, 1989 and Wasko & Mosco,
1992.
146. [5] Data was collected through the use
of mail surveys, sent out with a letter outlining the
project objectives, and a postage paid return envelope.
Dillman's procedures were followed with the exception
that follow-up letters and calls were used rather than
registered mail, for the third and final follow-up. Two
issues had to be addressed prior to sending out the
survey. First, the population of potential respondents
had to be identified, and second, addresses and names
of contacts had to be located.
147. In light of the settlement and
communication patterns that are intrinsic to
Newfoundland, extensive use of a variety of social and
employment networks enabled us to identify groups to be
included in the survey along with contact people and
mailing addresses for those groups. For example, we
began identifying our survey population with a province-
wide mailing list of women's organizations maintained
by Memorial University's Women's Studies Programme. We
cross checked groups and addresses on this list against
similar lists provided by the Provincial Advisory
Council on the Status of Women and the Women's Policy
Office. We took our list to events which drew
representatives from women's groups across the province
and sought corrections and additions to our list. We
also drew on the cumulative knowledge of our advisory
board to make additions and corrections as well as
identify instances of duplication.
148. Although this process allowed us to
assemble an address list of potential survey
respondents, it failed to address the fundamental issue
of just what a women's organization was, and
consequently which groups would be included in our
project. We realize that how one defines "women's
organization" is likely to vary with the context in
which the term is used, with the population responsible
for delimiting and defining what a women's organization
is, with the geographic location. After extensive
discussion, we decided to use a fairly broad definition
of women's organization, one that reflected the
realities of feminist organizing in the province of
Newfoundland, where there is a high degree of awareness
of activities carried out in various sectors, with many
women working for more than one organization and
members of organizations often collaborating on
projects. After some consideration, we decided to
include organizations which in a broad sense were
dedicated to obtaining social justice for women. Some
of these organizations (such as Oxfam) are not
specifically womens organizations, but have made
consistent contributions to the womens movement in the
province. Some organizations (such as the Womens
Institutes) may not see themselves as feminist
organizations, but have contributed substantially to
women's social and economic well being.
149. We identified 166 groups that met our
criteria. These groups included women's groups and
centres (including native women's groups), craft
organizations, business and development groups (for
example, the Women's Enterprise Bureau), government
offices serving women (such as the Women's Policy
Office, and the Secretary of State Women's Program
office), organizations concerned with violence
(including advocacy groups, shelters and hostels for
women), and family, general and religious
organizations (for example the Day Care Advocates
Association, Oxfam and Anglican Church Women,
respectively). In addition, we included organizations
involved in health promotion that often serve women
(such as the Canadian Mental Health Association),
organizations concerned with reproductive rights (such
as the Morgantaler Clinic), educational and research
institutions and organizations (such as the Women's
Studies Programme at Memorial University), literacy
organizations, labour union women's committees,
professional associations composed primarily of women
(such as the Association of Registered Nurses and Women
in Trades and Technology), Aboriginal organizations
(such as the Labrador Inuit Association), groups
concerned with poverty such as Single Mom's Against
Poverty, and political groups, such as the women's
committees of provincial political parties represented
in Newfoundland.
150. Prior to mailing, the surveys were pre-
tested extensively. Nonetheless, as is often the case
with self-administered surveys, we did not always
anticipate the variety of possible responses. As a
consequence, some adaptations to our coding scheme were
made to reflect the realities of our data set. (Mostly
these amounted to allowing for multiple responses to
questions where we had not anticipated multiple
responses). Survey data was entered into a database
that was programmed to screen for errors. In light of
the relatively small data set (129 cases and 60
questions), rather than randomly check for errors as is
commonly done, we were able to check the entire data
set, and make corrections accordingly.
151. Typically, social science data collected
through surveys represents a random sampling of a
larger population. Analysis of such data requires
statistical techniques that are designed to minimize
the effects of the sample size, and allow the analyst
to infer the characteristics of the entire population
on the basis of the sample. In light of our ability to
define and identify all potential respondents to our
survey (commonly known in statistics as the "census" or
"population"), and the high response rate we achieved,
the use of commonly used inferential statistics (such
as the chi2) were deemed inappropriate. Because we were
working with a population ("the total universe of all
possible observations that can be identified by a given
set of rules" (Linton & Gallo, 1975, p. 14), in
addition to looking at simple percentages, we conducted
cross-tabulations of data, and analyzed the cross-
tabulated data with the aid of proportional reduction
of error (PRE) statistics to test measures of
association (which indicate more clearly than chi2
based measures the association between two variables).
152. Because they are used less commonly than
inferential statistics, it is difficult to find good
discussion of the use of PRE statistics. In addition to
Linton & Gallo (1978), sources used included Norusis,
1983 & 1992); SPSS Inc. (1983) and Thiessen, (1993).
Generally we considered values of Cramer's V and Lambda
for nominal data(except when a table was 2 x 2, in
which case Phi was used), Gamma or Kendall's tau for
ordinal data and Pearson's R for interval data. Eta was
used for tables that had one nominal variable and one
interval variable.
153. [6] These included questions about how
groups were organized (e.g., an executive is elected or
appointed, a steering committee is elected or
appointed, the group has a loose structure etc.),
whether or not various terms (such as president,
treasurer, chairperson etc.) were used to identify
offices held within the organization, whether or not
the group had paid staff members, whether paid staff
had position titles, how decisions were made within the
group (e.g., by one person with explicit management
responsibility, by a group such as a board or steering
committee with explicit management responsibilities, by
staff and members reaching an agreement etc.), whether
the organization had any paid staff, and if so, how
many and so on. In addition, we asked questions about
what services the groups offered, whether or not the
organizations had members, and whether or not the
groups participated in government job training
programs. A full explanation of the rationale behind
these questions can be found in Balka & Doucette, (in
progress).
154. [7] The classic example here is that a
consultant installs and programmes dBase, a database
programme well known as being difficult for novice
users. Eventually the organization wants to change some
aspect of the database, and the consultant who did the
programming work has disappeared, having used an
unknown password to secure access to the database prior
to departing.
155. [8] 8 groups skipped this question for
unknown reasons.
_____
Articles and Sections of this issue of the _Electronic Journal on Virtual
Culture_ may be retrieved via anonymous ftp to byrd.mu.wvnet.edu
or via e-mail message addressed to LISTSERV@KENTVM
or LISTSERV@KENTVM.KENT.EDU (instructions below)
or GOPHER gopher.cic.net
Papers may be submitted at anytime by email or send/file to:
Ermel Stepp - Editor-in-Chief, _Electronic Journal on Virtual Culture_
M034050@MARSHALL.WVNET.EDU
_________________________________
*Copyright Declaration*
Copyright of articles published by Electronic Journal on Virtual Culture
is held by the author of a given article. If an article is re-published
elsewhere it must include a statement that it was originally published
by Electronic Journal on Virtual Culture. The EJVC Editors reserve the
right to maintain permanent archival copies of all submissions and
to provide print copies to appropriate indexing services for
for indexing and microforming.
_________________________________
_________________________________
_THE ELECTRONIC JOURNAL ON VIRTUAL CULTURE_
ISSN 1068-5327
Ermel Stepp, Marshall University, Editor-in-Chief
M034050@Marshall.wvnet.edu
Diane (Di) Kovacs, Kent State University, Co-Editor
DKOVACS@Kentvm.Kent.edu
____________________________
GOPHER Instructions
____________________________
GOPHER to gopher.cic.net 70
____________________________
Anonymous FTP Instructions
____________________________
ftp byrd.mu.wvnet.edu
login anonymous
password: users' electronic address
cd /pub/ejvc
type EJVC.INDEX.FTP
get filename (where filename = exact name of file in INDEX)
quit
LISTSERV Retrieval Instructions
_______________________________
Send e-mail addressed to LISTSERV@KENTVM (Bitnet) or
LISTSERV@KENTVM.KENT.EDU
Leave the subject line empty. The message must read:
GET EJVCV2N3 CONTENTS
Use this file to identify particular articles or sections then send e-mail
to LISTSERV@KENTVM or LISTSERV@KENTVM.KENT.EDU with the command:
GET
where is the name of the article or section (e.g., author
name) and is the V#N# of that issue of EJVC