10–50 m
MmWave is a very high band spectrum between 30 to 300 GHz. As it is a significantly less used spectrum, it provides very high-speed wireless communication. MmWave offers ultra-wide bandwidth for next-generation mobile networks. MmWave has lots of advantages, but it has some disadvantages, too, such as mmWave signals are very high-frequency signals, so they have more collision with obstacles in the air which cause the signals loses energy quickly. Buildings and trees also block MmWave signals, so these signals cover a shorter distance. To resolve these issues, multiple small cell stations are installed to cover the gap between end-user and base station [ 18 ]. Small cell covers a very shorter range, so the installation of a small cell depends on the population of a particular area. Generally, in a populated place, the distance between each small cell varies from 10 to 90 meters. In the survey [ 20 ], various authors implemented small cells with massive MIMO simultaneously. They also reviewed multiple technologies used in 5G like beamforming, small cell, massive MIMO, NOMA, device to device (D2D) communication. Various problems like interference management, spectral efficiency, resource management, energy efficiency, and backhauling are discussed. The author also gave a detailed presentation of all the issues occurring while implementing small cells with various 5G technologies. As shown in the Figure 7 , mmWave has a higher range, so it can be easily blocked by the obstacles as shown in Figure 7 a. This is one of the key concerns of millimeter-wave signal transmission. To solve this issue, the small cell can be placed at a short distance to transmit the signals easily, as shown in Figure 7 b.
Pictorial representation of communication with and without small cells.
Beamforming is a key technology of wireless networks which transmits the signals in a directional manner. 5G beamforming making a strong wireless connection toward a receiving end. In conventional systems when small cells are not using beamforming, moving signals to particular areas is quite difficult. Beamforming counter this issue using beamforming small cells are able to transmit the signals in particular direction towards a device like mobile phone, laptops, autonomous vehicle and IoT devices. Beamforming is improving the efficiency and saves the energy of the 5G network. Beamforming is broadly divided into three categories: Digital beamforming, analog beamforming and hybrid beamforming. Digital beamforming: multiuser MIMO is equal to digital beamforming which is mainly used in LTE Advanced Pro and in 5G NR. In digital beamforming the same frequency or time resources can be used to transmit the data to multiple users at the same time which improves the cell capacity of wireless networks. Analog Beamforming: In mmWave frequency range 5G NR analog beamforming is a very important approach which improves the coverage. In digital beamforming there are chances of high pathloss in mmWave as only one beam per set of antenna is formed. While the analog beamforming saves high pathloss in mmWave. Hybrid beamforming: hybrid beamforming is a combination of both analog beamforming and digital beamforming. In the implementation of MmWave in 5G network hybrid beamforming will be used [ 84 ].
Wireless signals in the 4G network are spreading in large areas, and nature is not Omnidirectional. Thus, energy depletes rapidly, and users who are accessing these signals also face interference problems. The beamforming technique is used in the 5G network to resolve this issue. In beamforming signals are directional. They move like a laser beam from the base station to the user, so signals seem to be traveling in an invisible cable. Beamforming helps achieve a faster data rate; as the signals are directional, it leads to less energy consumption and less interference. In [ 21 ], investigators evolve some techniques which reduce interference and increase system efficiency of the 5G mobile network. In this survey article, the authors covered various challenges faced while designing an optimized beamforming algorithm. Mainly focused on different design parameters such as performance evaluation and power consumption. In addition, they also described various issues related to beamforming like CSI, computation complexity, and antenna correlation. They also covered various research to cover how beamforming helps implement MIMO in next-generation mobile networks [ 85 ]. Figure 8 shows the pictorial representation of communication with and without using beamforming.
Pictorial Representation of communication with and without using beamforming.
Mobile Edge Computing (MEC) [ 24 ]: MEC is an extended version of cloud computing that brings cloud resources closer to the end-user. When we talk about computing, the very first thing that comes to our mind is cloud computing. Cloud computing is a very famous technology that offers many services to end-user. Still, cloud computing has many drawbacks. The services available in the cloud are too far from end-users that create latency, and cloud user needs to download the complete application before use, which also increases the burden to the device [ 86 ]. MEC creates an edge between the end-user and cloud server, bringing cloud computing closer to the end-user. Now, all the services, namely, video conferencing, virtual software, etc., are offered by this edge that improves cloud computing performance. Another essential feature of MEC is that the application is split into two parts, which, first one is available at cloud server, and the second is at the user’s device. Therefore, the user need not download the complete application on his device that increases the performance of the end user’s device. Furthermore, MEC provides cloud services at very low latency and less bandwidth. In [ 23 , 87 ], the author’s investigation proved that successful deployment of MEC in 5G network increases the overall performance of 5G architecture. Graphical differentiation between cloud computing and mobile edge computing is presented in Figure 9 .
Pictorial representation of cloud computing vs. mobile edge computing.
Security is the key feature in the telecommunication network industry, which is necessary at various layers, to handle 5G network security in applications such as IoT, Digital forensics, IDS and many more [ 88 , 89 ]. The authors [ 90 ], discussed the background of 5G and its security concerns, challenges and future directions. The author also introduced the blockchain technology that can be incorporated with the IoT to overcome the challenges in IoT. The paper aims to create a security framework which can be incorporated with the LTE advanced network, and effective in terms of cost, deployment and QoS. In [ 91 ], author surveyed various form of attacks, the security challenges, security solutions with respect to the affected technology such as SDN, Network function virtualization (NFV), Mobile Clouds and MEC, and security standardizations of 5G, i.e., 3GPP, 5GPPP, Internet Engineering Task Force (IETF), Next Generation Mobile Networks (NGMN), European Telecommunications Standards Institute (ETSI). In [ 92 ], author elaborated various technological aspects, security issues and their existing solutions and also mentioned the new emerging technological paradigms for 5G security such as blockchain, quantum cryptography, AI, SDN, CPS, MEC, D2D. The author aims to create new security frameworks for 5G for further use of this technology in development of smart cities, transportation and healthcare. In [ 93 ], author analyzed the threats and dark threat, security aspects concerned with SDN and NFV, also their Commercial & Industrial Security Corporation (CISCO) 5G vision and new security innovations with respect to the new evolving architectures of 5G [ 94 ].
AuthenticationThe identification of the user in any network is made with the help of authentication. The different mobile network generations from 1G to 5G have used multiple techniques for user authentication. 5G utilizes the 5G Authentication and Key Agreement (AKA) authentication method, which shares a cryptographic key between user equipment (UE) and its home network and establishes a mutual authentication process between the both [ 95 ].
Access Control To restrict the accessibility in the network, 5G supports access control mechanisms to provide a secure and safe environment to the users and is controlled by network providers. 5G uses simple public key infrastructure (PKI) certificates for authenticating access in the 5G network. PKI put forward a secure and dynamic environment for the 5G network. The simple PKI technique provides flexibility to the 5G network; it can scale up and scale down as per the user traffic in the network [ 96 , 97 ].
Communication Security 5G deals to provide high data bandwidth, low latency, and better signal coverage. Therefore secure communication is the key concern in the 5G network. UE, mobile operators, core network, and access networks are the main focal point for the attackers in 5G communication. Some of the common attacks in communication at various segments are Botnet, message insertion, micro-cell, distributed denial of service (DDoS), and transport layer security (TLS)/secure sockets layer (SSL) attacks [ 98 , 99 ].
Encryption The confidentiality of the user and the network is done using encryption techniques. As 5G offers multiple services, end-to-end (E2E) encryption is the most suitable technique applied over various segments in the 5G network. Encryption forbids unauthorized access to the network and maintains the data privacy of the user. To encrypt the radio traffic at Packet Data Convergence Protocol (PDCP) layer, three 128-bits keys are applied at the user plane, nonaccess stratum (NAS), and access stratum (AS) [ 100 ].
In this section, various issues addressed by investigators in 5G technologies are presented in Table 13 . In addition, different parameters are considered, such as throughput, latency, energy efficiency, data rate, spectral efficiency, fairness & computing capacity, transmission rate, coverage, cost, security requirement, performance, QoS, power optimization, etc., indexed from R1 to R14.
Summary of 5G Technology above stated challenges (R1:Throughput, R2:Latency, R3:Energy Efficiency, R4:Data Rate, R5:Spectral efficiency, R6:Fairness & Computing Capacity, R7:Transmission Rate, R8:Coverage, R9:Cost, R10:Security requirement, R11:Performance, R12:Quality of Services (QoS), R13:Power Optimization).
Approach | R1 | R2 | R3 | R4 | R5 | R6 | R7 | R8 | R9 | R10 | R11 | R12 | R13 | R14 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Panzner et al. [ ] | Good | Low | Good | - | Avg | - | - | - | - | - | - | - | - | - |
Qiao et al. [ ] | - | - | - | - | - | - | - | Avg | Good | Avg | - | - | - | - |
He et al. [ ] | Avg | Low | Avg | - | - | - | - | - | - | - | - | - | - | - |
Abrol and jha [ ] | - | - | Good | - | - | - | - | - | - | - | - | - | - | Good |
Al-Imari et al. [ ] | - | - | - | - | Good | Good | Avg | - | - | - | - | - | - | - |
Papadopoulos et al. [ ] | Good | Low | Avg | - | Avg | - | - | - | - | - | - | - | - | - |
Kiani and Nsari [ ] | - | - | - | - | Avg | Good | Good | - | - | - | - | - | - | - |
Beck [ ] | - | Low | - | - | - | - | - | Avg | - | - | - | Good | - | Avg |
Ni et al. [ ] | - | - | - | Good | - | - | - | - | - | - | Avg | Avg | - | - |
Elijah [ ] | Avg | Low | Avg | - | - | - | - | - | - | - | - | - | - | - |
Alawe et al. [ ] | - | Low | Good | - | - | - | - | - | - | - | - | - | Avg | - |
Zhou et al. [ ] | Avg | - | Good | - | Avg | - | - | - | - | - | - | - | - | - |
Islam et al. [ ] | - | - | - | - | Good | Avg | Avg | - | - | - | - | - | - | - |
Bega et al. [ ] | - | Avg | - | - | - | - | - | - | - | - | - | - | Good | - |
Akpakwu et al. [ ] | - | - | - | Good | - | - | - | - | - | - | Avg | Good | - | - |
Wei et al. [ ] | - | - | - | - | - | - | - | Good | Avg | Low | - | - | - | - |
Khurpade et al. [ ] | - | - | - | Avg | - | - | - | - | - | - | - | Avg | - | - |
Timotheou and Krikidis [ ] | - | - | - | - | Good | Good | Avg | - | - | - | - | - | - | - |
Wang [ ] | Avg | Low | Avg | Avg | - | - | - | - | - | - | - | - | - | - |
Akhil Gupta & R. K. Jha [ ] | - | - | Good | Avg | Good | - | - | - | - | - | - | Good | Good | - |
Pérez-Romero et al. [ ] | - | - | Avg | - | - | - | - | - | - | - | - | - | - | Avg |
Pi [ ] | - | - | - | - | - | - | - | Good | Good | Avg | - | - | - | - |
Zi et al. [ ] | - | Avg | Good | - | - | - | - | - | - | - | - | - | - | - |
Chin [ ] | - | - | Good | Avg | - | - | - | - | - | Avg | - | Good | - | - |
Mamta Agiwal [ ] | - | Avg | - | Good | - | - | - | - | - | - | Good | Avg | - | - |
Ramesh et al. [ ] | Good | Avg | Good | - | Good | - | - | - | - | - | - | - | - | - |
Niu [ ] | - | - | - | - | - | - | - | Good | Avg | Avg | - | - | - | |
Fang et al. [ ] | - | Avg | Good | - | - | - | - | - | - | - | - | - | Good | - |
Hoydis [ ] | - | - | Good | - | Good | - | - | - | - | Avg | - | Good | - | - |
Wei et al. [ ] | - | - | - | - | Good | Avg | Good | - | - | - | - | - | - | - |
Hong et al. [ ] | - | - | - | - | - | - | - | - | Avg | Avg | Low | - | - | - |
Rashid [ ] | - | - | - | Good | - | - | - | Good | - | - | - | Avg | - | Good |
Prasad et al. [ ] | Good | - | Good | - | Avg | - | - | - | - | - | - | - | - | - |
Lähetkangas et al. [ ] | - | Low | Av | - | - | - | - | - | - | - | - | - | - | - |
This survey article illustrates the emergence of 5G, its evolution from 1G to 5G mobile network, applications, different research groups, their work, and the key features of 5G. It is not just a mobile broadband network, different from all the previous mobile network generations; it offers services like IoT, V2X, and Industry 4.0. This paper covers a detailed survey from multiple authors on different technologies in 5G, such as massive MIMO, Non-Orthogonal Multiple Access (NOMA), millimeter wave, small cell, MEC (Mobile Edge Computing), beamforming, optimization, and machine learning in 5G. After each section, a tabular comparison covers all the state-of-the-research held in these technologies. This survey also shows the importance of these newly added technologies and building a flexible, scalable, and reliable 5G network.
This article covers a detailed survey on the 5G mobile network and its features. These features make 5G more reliable, scalable, efficient at affordable rates. As discussed in the above sections, numerous technical challenges originate while implementing those features or providing services over a 5G mobile network. So, for future research directions, the research community can overcome these challenges while implementing these technologies (MIMO, NOMA, small cell, mmWave, beam-forming, MEC) over a 5G network. 5G communication will bring new improvements over the existing systems. Still, the current solutions cannot fulfill the autonomous system and future intelligence engineering requirements after a decade. There is no matter of discussion that 5G will provide better QoS and new features than 4G. But there is always room for improvement as the considerable growth of centralized data and autonomous industry 5G wireless networks will not be capable of fulfilling their demands in the future. So, we need to move on new wireless network technology that is named 6G. 6G wireless network will bring new heights in mobile generations, as it includes (i) massive human-to-machine communication, (ii) ubiquitous connectivity between the local device and cloud server, (iii) creation of data fusion technology for various mixed reality experiences and multiverps maps. (iv) Focus on sensing and actuation to control the network of the entire world. The 6G mobile network will offer new services with some other technologies; these services are 3D mapping, reality devices, smart homes, smart wearable, autonomous vehicles, artificial intelligence, and sense. It is expected that 6G will provide ultra-long-range communication with a very low latency of 1 ms. The per-user bit rate in a 6G wireless network will be approximately 1 Tbps, and it will also provide wireless communication, which is 1000 times faster than 5G networks.
Author contributions.
Conceptualization: R.D., I.Y., G.C., P.L. data gathering: R.D., G.C., P.L, I.Y. funding acquisition: I.Y. investigation: I.Y., G.C., G.P. methodology: R.D., I.Y., G.C., P.L., G.P., survey: I.Y., G.C., P.L, G.P., R.D. supervision: G.C., I.Y., G.P. validation: I.Y., G.P. visualization: R.D., I.Y., G.C., P.L. writing, original draft: R.D., I.Y., G.C., P.L., G.P. writing, review, and editing: I.Y., G.C., G.P. All authors have read and agreed to the published version of the manuscript.
This paper was supported by Soonchunhyang University.
Informed consent statement, data availability statement, conflicts of interest.
The authors declare no conflict of interest.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About the authors, author note.
Scott C. D’Urso, The Past, Present, and Future of Human Communication and Technology Research: An Introduction, Journal of Computer-Mediated Communication , Volume 14, Issue 3, 1 April 2009, Pages 708–713, https://doi.org/10.1111/j.1083-6101.2009.01459.x
The study of computer-mediated communication (CMC) and new communication technologies (NCTs) is an established and growing field not only with respect to the new technologies becoming available, but also in the many ways we are adopting them for use. Historically, I have contended that this area of communication research deserves recognition as a primary area of communication studies alongside that of interpersonal, organizational, health, and rhetorical studies among others. While the CMC area is still in its infancy, its impact on a variety of areas of human existence cannot be ignored. That said, when I began to work on this special section of the Journal of Computer-Mediated Communication ( JCMC ), it led me to more systematically consider the question of its place within the larger discipline of communication. This line of research has been gathering strength for more than 25 years and is now a strong and healthy subdiscipline in communication. This special section of JCMC seeks to tie together its rich past, diverse present, and an exciting future of possibilities and challenges. This takes place through a series of essays by some of the key contributors in the field today.
Most of the established areas of research in communication are centered on a solid base of theories. The CMC field is no different. From the work on social presence ( Short, Williams, & Christie, 1976 ), information (media) richness ( Daft & Lengel, 1984 , 1986 ), critical mass ( Markus, 1987 ), social influence ( Fulk, Schmitz, & Steinfeld, 1990 ), social information processing (SIP) ( Walther, 1992 ), social identity and deindividuation (SIDE) ( Spears & Lea, 1992 ), adaptive structuration ( DeSanctis & Poole, 1994 ), hyperpersonal interaction ( Walther, 1996 ), and channel expansion ( Carlson & Zmud, 1999 ) to the mindfulness/mindlessness work of Timmerman (2002) , theory development is central to CMC research. While it can be argued that some CMC theories are not exclusive to the study of CMC, the same can be said of some of the core theories of other primary areas such as interpersonal and organizational communication. What is more important is that scholars in this field of research are using these theories as the basis for research today.
CMC research continues to find its way into many top journals today (see, for example, Gong & Nass, 2007 ; Katz, 2007 ; Ramirez & Wang, 2008 ; Stephens, 2007 ) within our discipline, as well as in sociology, social psychology, and business management (see, for example, D’Urso & Rains, 2008 ; Katz, Rice, & Aspen, 2001 ; Walther, Loh, & Granka, 2005 ). Key contributions to this field date back over 25 years (see, for example, Barnes & Greller, 1992; Baym, 1995; Chesebro, 1985 ; Hunter & Allen, 1992 ; Jones, 1995 ; Korzenny, 1978 ; Parks & Floyd, 1996 ; Reese, 1988 ; Rice, 1980 ; Rice, 1984 ; Sproull & Kiesler, 1986 ; Steinfield, 1992 ). This diversity of publication outlets and the longevity of this research line are but a few of the examples of the breath and depth of CMC research. One key trait of most established fields is the existence of a flagship journal that is the home for that genre of research. In the case of CMC research, JCMC is considered by many to fulfill that role. Published in an online format since 1995, JCMC is now an official publication of the International Communication Association (ICA). Beyond journal publications, it is rather difficult these days to peruse the bookshelves in communication research and not notice the plethora of volumes dedicated to the study of CMC. The importance of the Internet in today's society has undoubtedly played a role in this publication trend; however, many of the books are scholarly and present some of today's best research in this area.
As has been seen with the number of articles and books published on this topic, the numbers of scholars who study CMC are also increasing. Though a number of the key scholars in this field are housed in other areas such as organizational and interpersonal communication, their work routinely looks at how CMC impacts communication (see Contractor & Eisenberg, 1990 ; Fulk, Flanagin, Kalman, Monge, & Ryan, 1996 ; Rice, 1993 ). One key factor in determining if CMC research should be a distinct subset of communication research can be seen at annual conferences such as the National Communication Association (NCA) and ICA. Here, graduate students who are preparing to enter the job market are seeing more and more openings for faculty positions with CMC as a potential area of specialization. This trend does not appear to be going away anytime soon.
Both NCA and ICA have prominent divisions in their respective organizations concerned with understanding CMC. In ICA, the Communication and Technology Division is now the largest in the entire association. In NCA, the Human Communication and Technology Division has a sustained membership of over 500. Looking back at the past several NCA conference programs, one cannot help but notice the presence of this division through the sponsorship of numerous panels and papers. As the recent Cochair for this division, I felt it was time that we made our presence more prominent within NCA. In 2007, we invited a number of prominent scholars to participate in a unique double-length panel discussion. Each of the 10 panelists, featured in the special section, presented and discussed their thoughts on the past, present and future of research in CMC with the audience. The success of the panel, and the interest generated by the panel, led to this special section.
Having reconsidered my original thoughts on identifying CMC research as a primary area of communication research, I have come to the conclusion that it may have become a moot point. CMC scholars are uniquely positioned to study the vast impact that communication technologies have had and are having on our society. Looking back at the past volumes of JCMC , the diversity of topics covered includes: interpersonal, medical, psychological, organizational, political, behavioral, and management studies. This diversity of research across disciplines places the CMC field in a unique position to be at the heart of many disciplinary endeavors in communication. However, is it a distinct and separate field of communication research? Yes, but without its cross-disciplinary approach, its overall impact on communication research may be seen as implausible.
To highlight the varied aspects of CMC research, this special section presents the thoughts of some of the prominent scholars in today's field of CMC. Rice (this issue) begins with what is most likely unique common experience for many as we struggle with our day-to-day interactions with technology. The particular story that Rice relates to us focuses on the embeddedness of CMC in our lives today and the challenges we face in understanding them in a larger context. These experiences and our understanding of their importance to our research are of particular interest to Baym (this issue) who notes that our interactions with technology are seen as a welcome trend. However, we must remain cautious as to what and how we research CMC, both now and in the future. Parks (this issue) offers that a microlevel approach to studying CMC may be problematic as compared to a broader approach to the technologies and their usage over time. To illustrate this point, Jackson's (this issue) discussion of the blending of technologies and concepts through “mashups” drives home the need for a broader approach to how we not only use, but research CMC.
One of the fastest growing areas of CMC research, social networking, represents what Barnes (this issue) considers another aspect of the convergence of CMC and human interaction. This falls in line with Contractor's (this issue) call for understanding the motivations behind why we seek these networked connections through mediated means. The development of future theory and research in this area will have the potential for far reaching implications across the CMC discipline.
From a theory standpoint, Walther (this issue) wonders whether our fields' development suffers from efforts at theoretical consolidation, rather than diversification of explanations and their boundary conditions that are critical in CMC research. Scott (this issue) provides potential directions for research and theory development, but does so with caution, because as he explains, “we can't keep up” with the technological innovations, and it may not be in our best interest to do so. Poole (this issue) sees consolidation of our efforts as a potential route through a combined process of data collection and sharing similar to how other disciplines operate. However we choose to proceed, it is clear, as Fulk and Gould (this issue) note, that we face many challenges ahead, but that the potential to really enhance the field of CMC research lies in our ability to meet these challenges.
I hope you enjoy what we have assembled here in this special section. There are many areas of research, theory development, and new communication technologies for us to ponder now and in the future. We find ourselves in an exciting period in CMC research history and the future looks very promising.
Barnes , S. , & Greller , L. M. ( 1994 ). Computer-mediated communication in the organization . Communication Education , 43 , 129 – 142 .
Google Scholar
Baym , N. K. ( 1999 ). Tune in, log on: Soaps, fandom, and online community . Thousand Oaks, CA : Sage .
Google Preview
Carlson , J. R. , & Zmud , R. W. ( 1999 ). Channel expansion theory and the experimental nature of media richness perceptions . Academy of Management Journal , 42 , 153 – 170 .
Chesebro , J. W. ( 1985 ). Computer-mediated interpersonal communication . In B. D. Ruben (Ed.), Information and behavior (Vol. 1, pp. 202 – 222 ). New Brunswick, NJ : Transaction Books .
Contractor , N. S. , & Eisenberg , E. M. ( 1990 ). Communication networks and new media in organizations . In J. Fulk & C. W. Steinfield (Eds.) Organizations and Communication Technology (pp. 145 – 174 ). Newbury Park, CA : Sage .
DeSanctis , G. , & Poole , M. S. ( 1994 ). Capturing the complexity in advanced technology use: Adaptive structuration theory . Organization Science , 5 , 121 – 147 .
Daft , R. L. , & Lengel , R. H. ( 1984 ). Information richness: A new approach to managerial behavior and organization design . In B. M. Staw & L. L. Cummings (Eds.), Research in Organizational Behavior (Vol. 6, pp. 191 – 233 ). Greenwich, CT : JAI Press .
Daft , R. L. , & Lengel , R. H. ( 1986 ). Organizational information requirements, media richness, and structural determinants . Management Science , 32 , 554 – 571 .
D’Urso , S. C. , & Rains , S. A. ( 2008 ). Examining the scope of channel expansion: A test of channel expansion theory with new and traditional communication media . Management Communication Quarterly , 21 , 486 – 507 .
Fulk , J. , Flanagin , A. J. , Kalman , M. E. , Monge , P. R. , & Ryan , T. ( 1996 ). Connective and communal public goods in interactive communication systems . Communication Theory , 6 , 60 – 87 .
Fulk , J. , Schmitz , J. , & Steinfield , C. W. ( 1990 ). A social influence model of technology use . In J. Fulk & C. Steinfield (Eds.), Organization and communication technology (pp. 117 – 140 ). Newbury Park, CA : Sage .
Gong , L. & Nass , C. ( 2007 ). When a talking-face computer agent is half-human and half-humanoid: Human identity and consistency preference . Human Communication Research , 33 , 163 – 193 .
Hunter , J. , & Allen , M. ( 1992 ). Adaptation to electronic mail . Journal of Applied Communication Research , 20 , 254 – 274 .
Jones , S. G. ( 1995 ). Understanding community in the information age . In S. G. Jones (Ed.), Cybersociety: Computer-mediated communication and community (pp. 10 – 35 ). Thousand Oaks, CA : Sage .
Katz , J. E. ( 2007 ). Mobile media and communication: Some important questions . Communication Monographs , 74 , 389 – 394 .
Katz , J. E. , Rice , R. E. , & Aspden , P. ( 2001 ). The Internet, 1995-2000: Access, civic involvement, and social interaction . American Behavioral Scientist , 45 , 405 – 419 .
Korzenny , F. ( 1978 ). A theory of electronic propinquity: Mediated communication in organizations . Communication Research , 5 , 3 – 23 .
Markus , M. L. ( 1987 ). Toward a “critical mass” theory of interactive media: Universal access, interdependence and diffusion . Communication Research , 14 , 491 – 511 .
Parks , M. R. , Floyd , K. ( 1996 ). Making friends in cyberspace . Journal of Communication , 46 , 80 – 97 .
Ramirez , A. & Wang , Z. ( 2008 ). When online meets offline: An expectancy violations theory perspective on modality switching . Journal of Communication , 58 , 20 – 39 .
Reese , S. D. ( 1988 ). New communication technologies and the information worker: The influence of occupation . Journal of Communication , 38 , 59 – 70 .
Rice , R. E. ( 1980 ). The impacts of computer-mediated organizational and interpersonal communication . In M. Williams (Ed.), Annual review of information science and technology , 15 (pp. 221 – 249 ). White Plains, NY : Knowledge Industry Publications .
Rice , R. E. & Associates . ( 1984 ). The new media: Communication, research and technology . Beverly Hills, CA : Sage .
Rice , R. E. ( 1993 ). Media appropriateness: Using social presence theory to compare traditional and new organizational media . Human Communication Research , 19 , 451 – 484 .
Short , J. , Williams , E. , & Christie , B. ( 1976 ). The social psychology of telecommunication . London : John Wiley .
Spears , R , & Lea , M. ( 1992 ). Social influence and the influence of the “social” in computer-mediated communication . In M. Lea (Ed.), Contexts of computer-mediated communication (pp. 30 – 65 ). London : Harvester-Wheatsheaf .
Sproull , L. , & Kiesler , S. ( 1986 ). Reducing social context cues: Electronic mail in organizational communication . Management Science , 32 , 1492 – 1512 .
Steinfield , C. ( 1992 ). Computer-mediated communications in organizational settings: Emerging conceptual frameworks and directions for research . Management Communication Quarterly , 5 , 348 – 365 .
Stephens , K. K. ( 2007 ). The successive use of information and communication technologies at work . Communication Theory , 17 , 486 – 507 .
Timmerman , C. E. ( 2002 ). The moderating effect of mindlessness/mindfulness upon media richness and social influence explanations of organizational media use . Communication Monographs , 69 , 111 – 131 .
Walther , J. B. ( 1992 ). Interpersonal effects in computer-mediated interaction: A relational perspective . Communication Research , 19 , 52 – 90 .
Walther , J. B. ( 1996 ). Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction . Communication Research , 23 , 1 – 43 .
Walther , J. B. , Loh , T. , Granka , L. ( 2005 ). Let me count the ways: The interchange of verbal and nonverbal cues in computer-mediated and face-to-face affinity . Journal of Language and Social Psychology , 24 , 36 – 65 .
Scott C. D’Urso (Ph.D., 2004, University of Texas at Austin) is an Assistant Professor of Communication Studies at Marquette University, where he teaches courses focused on organizational and corporate communication and new communication technology. Scott's primary research interests include organizational use of communication technologies such as e-mail, instant messaging and chat. He has published manuscripts on privacy and surveillance in the workplace, communication channel selection, crisis communication and stakeholder issues. He is currently working on several projects including digital divides in organizations, virtual team decision-making, and the role of online identity creation and privacy concerns with social networking websites. Prior to a career in academia, Scott worked for several years as a multimedia specialist/manager of a multimedia production department for a government defense contractor in the Southwest.
The author wishes to thank Yun Xia, and all of the officers of the Human Communication and Technology Division of NCA (past and present) as well as all of the authors who contributed to this special section, and finally, Aimee R. Hardinger, who served as editorial assistant for this special section.
Month: | Total Views: |
---|---|
December 2017 | 18 |
January 2018 | 4 |
February 2018 | 12 |
March 2018 | 104 |
April 2018 | 219 |
May 2018 | 289 |
June 2018 | 160 |
July 2018 | 169 |
August 2018 | 256 |
September 2018 | 244 |
October 2018 | 246 |
November 2018 | 224 |
December 2018 | 140 |
January 2019 | 92 |
February 2019 | 119 |
March 2019 | 127 |
April 2019 | 115 |
May 2019 | 66 |
June 2019 | 39 |
July 2019 | 62 |
August 2019 | 48 |
September 2019 | 87 |
October 2019 | 228 |
November 2019 | 224 |
December 2019 | 176 |
January 2020 | 185 |
February 2020 | 136 |
March 2020 | 116 |
April 2020 | 106 |
May 2020 | 46 |
June 2020 | 65 |
July 2020 | 67 |
August 2020 | 66 |
September 2020 | 130 |
October 2020 | 563 |
November 2020 | 216 |
December 2020 | 140 |
January 2021 | 67 |
February 2021 | 86 |
March 2021 | 114 |
April 2021 | 72 |
May 2021 | 73 |
June 2021 | 43 |
July 2021 | 51 |
August 2021 | 58 |
September 2021 | 150 |
October 2021 | 192 |
November 2021 | 87 |
December 2021 | 36 |
January 2022 | 61 |
February 2022 | 62 |
March 2022 | 49 |
April 2022 | 56 |
May 2022 | 41 |
June 2022 | 38 |
July 2022 | 26 |
August 2022 | 24 |
September 2022 | 41 |
October 2022 | 50 |
November 2022 | 44 |
December 2022 | 31 |
January 2023 | 38 |
February 2023 | 41 |
March 2023 | 93 |
April 2023 | 46 |
May 2023 | 53 |
June 2023 | 59 |
July 2023 | 17 |
August 2023 | 39 |
September 2023 | 69 |
October 2023 | 49 |
November 2023 | 51 |
December 2023 | 80 |
January 2024 | 67 |
February 2024 | 82 |
March 2024 | 86 |
April 2024 | 101 |
May 2024 | 103 |
June 2024 | 145 |
July 2024 | 70 |
August 2024 | 63 |
Citing articles via.
Oxford University Press is a department of the University of Oxford. It furthers the University's objective of excellence in research, scholarship, and education by publishing worldwide
Sign In or Create an Account
This PDF is available to Subscribers Only
For full access to this pdf, sign in to an existing account, or purchase an annual subscription.
Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 754))
Included in the following conference series:
241 Accesses
Information and Communication Technology (ICT) has revolutionized the way researchers conduct their work. It has enabled them to access a wealth of information through online databases, collaborate with colleagues across the globe, and analyze vast amounts of data quickly and accurately. This paper explores the role of ICT in enhancing research tools, highlighting the benefits it provides to researchers in terms of increased efficiency, improved accuracy, and greater access to resources. It also discusses some of the challenges associated with using ICT in research, such as data security and privacy concerns, and offers potential solutions. Overall, the paper concludes that ICT is an essential tool for researchers and will continue to play an increasingly important role in advancing scientific knowledge and innovation.
This is a preview of subscription content, log in via an institution to check access.
Subscribe and save.
Tax calculation will be finalised at checkout
Purchases are for personal use only
Institutional subscriptions
Abdulkarim SA, Hasan SR (2023) Teachers and students attitude and challenges on applications of ICT tools. QALAAI ZANIST J 8(2):1253–1265
Google Scholar
Alkamel MAA, Chouthaiwale SS (2018) The use of ICT tools in English language teaching and learning: a literature review. Veda’s J Engl Lang Lit JOELL 5(2):29–33
Fisher A, Exley K, Ciobanu D (2014) Using technology to support learning and teaching. Routledge, London
Fricker RD (2016) Sampling methods for online surveys. The SAGE handbook of online research methods, pp 162–183
Jonassen D, Spector MJ, Driscoll M, Merrill MD, van Merrienboer J, Driscoll MP (2008) Handbook of research on educational communications and technology: a project of the association for educational communications and technology. Routledge, London
Lu D, Xie YN (2022) Critical thinking cultivation in TESOL with ICT tools: a systematic review. Comput Assist Lang Learn 1–21
Macfarlane B (2010) Researching with integrity: the ethics of academic enquiry. Routledge, London
Maharjan M, Dahal N, Pant BP (2022) ICTs into mathematical instructions for meaningful teaching and learning. Adv Mob Learn Educ Res 2(2):341–350
Article Google Scholar
Morze N, Makhachashvili R, Smyrnova-Trybulska E (2016) Communication in education: ICT tools assessment. In: Proceedings from DIVAI, pp 351–354
Omar M, Ahmad M, Yasin A, Ibrahim H, Soulignavong L, Vongsouangtham B et al (2022) The needs of information and communication technology (ICT) tools for research development: a case in Laos. J Adv Res Appl Sci Eng Technol 28(3):49–56
Strutynska O, Umryk M (2017) ICT tools and trends in research, education and science: local survey, no 3, pp 150–160
Toma F, Ardelean A, Grădinaru C, Nedelea A, Diaconu DC (2023) Effects of ICT integration in teaching using learning activities. Sustainability 15(8):6885
Wirajing MAK, Nchofoung TN (2023) The role of education in modulating the effect of ICT on governance in Africa. Educ Inf Technol 1–34
Download references
Authors and affiliations.
Christ University, Bangalore, Karnataka, India
M. Vinay & J. Jayapriya
You can also search for this author in PubMed Google Scholar
Correspondence to M. Vinay .
Editors and affiliations.
Singidunum University, Belgrade, Serbia
ITM University, Gwalior, Madhya Pradesh, India
Shyam Akashe
Global Knowledge Research Foundation, Ahmedabad, Gujarat, India
Reprints and permissions
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
Cite this paper.
Vinay, M., Jayapriya, J. (2023). Probing the Role of Information and Communication Technology (ICT) in Enhancing Research: An Epilogue of Accessible Research Tools. In: Tuba, M., Akashe, S., Joshi, A. (eds) ICT Infrastructure and Computing. ICT4SD 2023. Lecture Notes in Networks and Systems, vol 754. Springer, Singapore. https://doi.org/10.1007/978-981-99-4932-8_47
DOI : https://doi.org/10.1007/978-981-99-4932-8_47
Published : 26 September 2023
Publisher Name : Springer, Singapore
Print ISBN : 978-981-99-4931-1
Online ISBN : 978-981-99-4932-8
eBook Packages : Intelligent Technologies and Robotics Intelligent Technologies and Robotics (R0)
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
Policies and ethics
International Journal of Educational Technology in Higher Education volume 17 , Article number: 34 ( 2020 ) Cite this article
16k Accesses
5 Citations
3 Altmetric
Metrics details
While information and communication technologies (ICT) are prominent in educational practices at most levels of formal learning, there is relatively little known about the skills and understandings that underlie their effective and efficient use in research higher degree settings. This project aimed to identify doctoral supervisors’ and students’ perceptions of their roles in using ICT. Data were gathered through participative drawing and individual discussion sessions. Participants included 11 students and two supervisors from two New Zealand universities. Focus of the thematic analysis was on the views expressed by students about their ideas, practices and beliefs, in relation to their drawings. The major finding was that individuals hold assumptions and expectations about ICT and their use; they make judgements and take action based on those expectations and assumptions. Knowing about ICT and knowing about research processes separately form only part of the work of doctoral study. Just as supervision cannot be considered independently of the research project and the student involved, ICT skills and the use of ICT cannot be considered in the absence of the people and the project. What is more important in terms of facilitating the doctoral research process is students getting their “flow” right. This indicates a need to provide explicit support to enable students to embed ICT within their own research processes.
Information and communication technologies (ICT) can bring either joy or challenge to well-versed academic practices, and either create barriers to learning and development or be the answer to needs. While some grasp and pursue opportunities to make use of various ICT for study, research and teaching, others struggle. Despite documented and anecdotal positive urges to adopt ICT to increase and improve efficiency and effectiveness, staff and students struggle experience ICT as needless and difficult-to-use interruptions. There is often little need seen to change practices by introducing ICT into ways of working. Exploring these views and experiences was the focus of this project. Being empathetic to views such as those expressed by Castañeda and Selwyn ( 2018 ), we did not approach this investigation from a position that assumes that ICT are natural and needed solutions to problems related to improving and facilitating effective learning, teaching and research. Rather, we took a more neutral stance, wishing to explore the experiences of those involved, namely, students and staff, through discussion with them about their ICT practices and views, and with a specific focus on doctoral study and supervision.
Doctoral supervision and the role, place and nature of the doctorate are receiving increasing attention in higher education research literature. A wide range of topics have been covered from, for example, the importance and types of support for students throughout candidature (e.g., Zhou & Okahana, 2019 ); to the teaching and supervision aspects of doctoral supervision (e.g., Åkerlind & McAlpine, 2017 ; Cotterall, 2011 ; Lee, 2008 ).
With advancements in, accessibility to, and development of, ICT within education settings has come a plethora of research into online and blended learning. These studies often highlight the capacity of ICT for facilitating teaching, learning and administrative activity within educational institutions and systems (e.g., Marshall & Shepherd, 2016 ). They cover numerous areas of importance from theoretical, practical, and philosophical angles and include the perspectives and needs of learners, educators and institutions (e.g., Nichols, Anderson, Campbell, & Thompson, 2014 ).
There are also studies on student use of ICT, though not necessarily doctoral students, and these cover a wide range of topics including specific ICT skills (e.g., Stensaker, Maassen, Borgan, Oftebro, & Karseth, 2007 ). Where postgraduate research students are concerned, some studies on ICT skill development and support provide some insights about students (e.g., Dowling & Wilson, 2017 ), and institutional ICT systems (Aghaee et al., 2016 ).
Notable about the many of these studies cited above is the use of self-reporting tools as mechanisms for gathering data about student use and views about ICT. While self-reports are valuable ways to collect such data about self-efficacy, they do have limits. In online learning environments, the role of self-efficacy, for example, is still being contested. It has been argued that learners from a variety of disciplines and learning settings will tend to overestimate claims about their performance and/or knowledge and skills (e.g., Mahmood, 2016 ).
All these studies help to ‘map the territory’ of ICT, their use at individual and institutional levels and related practices. Much advice and guidance can be gleaned from the literature as well, although relatively little for the specific integration of ICT within the doctoral research and supervision environment. Based on the literature that is available though, all indications are that (doctoral) students adopt educational practices incorporating limited ICT use, even though the use of ICT has grown enormously in the last 10 to 20 years. With the current interest in ensuring success of students and completion of doctoral degrees being closely related to high quality supervision, there is a need to improve supervision practices and within that, advance understandings about how to support students in their use of ICT for their doctoral research.
This project aimed to explore doctoral student and supervisor views and use of ICT within the doctoral process. The intention was to bring to light perceptions that could give clues as to how to make practical modifications to the content and scope of professional development support for supervisors and students, in order to help them to make best use of ICT. In addition, consideration was given to the way data would be collected to ensure that more than just the self-reported perspectives of the participants were included.
An interpretivist research approach (Erickson, 2012 ) framed this study to support a focus on understanding the world from the perspectives of those who live it. Thus, the approach was well-suited to exploring perceptions about the use of ICT in our context.
Thus, this study did not commence with any hypotheses related to the influence of ICT in doctoral research in mind. Instead, as the interpretive frame of the research implies, this study investigated ways in which participants expressed their experiences of engaging and integrating ICT in support of their doctoral research processes. The data tapped into the participants’ (PhD students and doctoral supervisors) perspectives, as they expressed them. The research approach thus defined and shaped all aspects of the data gathering, analyses and presentation. In this way, alignment was ensured among the ontological, epistemological and practical implementation of the research project.
The study took place in two New Zealand universities where participants were either employees or students. Both universities are research-intensive, with histories of producing high-level research across many disciplines. Both institutions have clear and well-formulated policies and practices governing doctoral study - PhD and professional doctorate - and these include supporting that study through supervision. A specialised unit in each institution manages the administration of the doctoral degree. Couching “supervision” as essentially a (specialised) teaching activity, each unit also provides or coordinates professional development for staff in the art of supervision, and for students in the skills and processes of undertaking doctoral degree study.
Participants included doctoral students and supervisors from the two universities. As a result of an invitation to all students and supervisors, in total, 11 students and two supervisors responded. The students were PhD students at varying levels of completion. There was a mix of part time and full-time students from a variety of discipline backgrounds including health sciences, sciences, commerce and humanities. The supervisors were experienced and were from humanities and sciences.
Data were collected using a 3-tier participative drawing process (Wetton & McWhirter, 1998 ). This strategy involved a series of two or three interview/discussions, along with participant-made drawings, which formed the focus of the interview/discussions.
This strategy generated two sources of data - interview transcripts and participant drawings – and involved the following (3-tier) phases:
Initial semi-structured interview/discussion to ascertain information about participants’ backgrounds and other details they saw relevant to share. In addition, they were asked about their use of ICT generally as well as within the doctoral process. It was a chance for the researchers to gain some understanding of participants’ views and practices in relation to ICT and their doctoral/supervision journeys.
Participant drawing . The participants were asked to make a drawing in their own time and before the second interview/discussion. Guidelines for the drawing suggested that they think of a way to illustrate their research process first, then to add onto the drawing any ICT (such as devices, websites, programmes, applications) that they make use of in the process.
Follow-up interview/discussion . During this phase, each participant was asked to explain the drawing’s features and how it made sense in terms of the project he or she was undertaking. This included discussion about how their supervision was working, how they worked with supervisors, and how the ICT they had included in the drawing worked within the process. They were also asked about elements that were not in the drawing, for example, certain ICT or activities that might have appeared in a typical account of a doctoral research process but were not included.
All interview/discussions were audio recorded and transcriptions of the recordings were returned to the participants for checking. The drawings were scanned and stored electronically.
In line with the interpretive approach that framed and governed our study, the data were analysed shortly after being gathered. Analysis of the data contributed to the development of ideas about participants’ perceptions, and these were refined progressively across the instances that researchers met with participants. Perceptions were thus checked, rechecked and refined against each data set.
This iterative and inductive approach (Thomas, 2006 ) involved thematic analysis (Silverman, 2001 ) and the capture of major and common ideas (Mayring, 2000 ) expressed by participants about how ICT are perceived and used in doctoral research processes. This approach helped to operationalise a process of co-construction between researchers and participants. Through checking, rechecking, refining and confirming, the researchers were able to articulate their understanding of participant perceptions that matched participants’ expressed thoughts.
The outcome of the analysis process was four assertions concerning ways the students perceived and understood ICT within doctoral study. Because there were only two supervisor participants, the data from the supervisors served to support the assertions we were more confidently able to make about student perceptions.
Despite the (what might be argued, small) number of volunteer participants who showed interest in, and committed themselves to, this study (i.e., no drop-outs or selection being made from a pool), it is worth noting that the researchers worked with each participant over an extended period of time (prolonged engagement), focused on investigating and gathering identifiable, as well as documentable, aspects of the participants’ ICT understandings and practices (persistent observation), and employed analysis techniques that incorporated peer debriefing, member checking, and fair presentation of assertions (Guba & Lincoln, 1989 ).
The aim was to unlock and identify views of reality held by the participants. The empirical evidence was used to help develop commentary and critique of the phenomenon which was the focus of the study (i.e., ICT use), including what the phenomenon is and how it occurs/is enacted/revealed in a particular context (viz., in doctoral research). This was, therefore, a different kind of study from one that might commence with a hypothesis, which would be concerned more with objectivity, explanation and testable propositions. In short, the methods employed in the current study fitted the intention to solve a “puzzle” about a phenomenon in relation to a particular context.
As this study involved human participants, ethical approval was gained through the institutional processes. This approval (University of Otago Human Ethics Committee reference number D17/414 and Victoria University of Wellington, Ethics Committee reference number 0000023415) enabled data collection methods described in the previous section to be carried out for any doctoral students and supervisors who volunteered to participate in this study. Ethical consent, use and care of the data as well as the ethical treatment of students and staff as participants were integral to the research design, planning and implementation of the whole study.
The four assertions are now presented. Each assertion is described and quotations from the interview/discussions along with examples of drawings from the student participants are used to illustrate aspects of each assertion.
Assertion 1: ICT are impartial tools; it does not matter how ICT are used, because the endpoint, that is, thesis completion, is the justification. ICT and people are separate and separated entities.
Students talked about how they worked on their thesis document and on the process of the study they were undertaking. Comments focused on various ICT being used and often on skills needed in order to use them. Some students expressed the view that ICT were tools, separate from the project and the person involved, to be used to achieve an endpoint. For example,
So long as it's formatted – it shouldn't matter - that's their [editors’] responsibility, not mine.
There’s probably a bit more about Zoom [web conferencing application] I could learn but again for me unless it’s a problem, I’m not going to go looking for it… not just for the sake of it at the moment.
Motivation to achieve an outcome was a focus of comments that support this assertion. For many participants, the aim to complete the study and write a thesis was, naturally, a large driver for how they were managing their study. Time was precious, and they would do what they had to do to reach their goal. To be motivated to learn about a new ICT, there needed to be a purpose that sharply focussed on achieving that end.
If the technologies are suddenly not available] I’m happy to sit down with a typewriter and learn it… If I’m not driven, I won’t bother.
This focus is illustrated in Fig. 1 . The drawing shows clearly identified components that make up major elements within the stages of producing the research for the thesis. ICT are listed in relation to those components.
ICT and people are separate and separated entities
Supervisors too, tended to focus on thesis production rather than on the process of producing a thesis that includes the use of ICT (i.e., as opposed to their very clear and explicit focus on the research process). An example illustrating this is:
Generally, people think the standard of the people getting or earning a PhD is that this person should be an independent researcher. [But no] After all, we only examine a particular thesis [and] there are lots of inputs from supports and supervision from supervisors.
In summary, this assertion focusses strongly on the experience of doctoral study being about getting the project done within a research journey that gives minimal regard to the affordances of ICT. ICT are framed as necessary but also fraught, especially due to the effort and time that draw attention away from the primary goal.
Assertion 2: ICT are tools or mechanisms that prompt active thought on practices with respect to planning and managing thesis writing and project execution. ICT and individuals work alongside each other.
Views that expressed notions of there being a close interactive relationship between students and ICT came through in several of the discussions with the participants. The focus on achieving goals and endpoints was strong, but the expression of how to achieve those goals, capitalising upon the affordances that ICT present, was different from the way views were expressed in relation to Assertion 1.
On a simple level, this student describes the checking he did when weighing up the merits of a piece of software to meet his needs.
I normally do a trial version… have a play with it. And if I think they are useful then I might try it on a project. And if then I feel it’s definitely worth investing… then I’ll go buy it.
Others simply liked to explore, to see whether there was potential in any ICT they encountered, as in,
Sometimes I just like playing with stuff to see what they can do and then if they tick my boxes then I keep them and if they don't, I move on. So it's more kind of ‘search and discover’ than kind of looking for something, you know.
Describing a deeper level of activity, a degree of critique and active reflection were indicated by another student when he said,
…we tried an electronic version of putting together a programme for a New Zealand conference and I was surprised how long it took us. Whereas in the past I’ve worked with [colleagues] and we’ve just moved pieces of paper around on the floor for abstracts and we were done really quickly.
These sentiments are well-captured in Fig. 2 . Here, the focus is on experimenting with ICT rather than the research process. The process of working things out to suit the individual is foregrounded.
ICT and individuals work alongside each other
Whereas Assertion 1-type expressions presented effort in a generally negative light, Assertion 2-type expressions couched effort as an assumed part of learning something new. There was a sense expressed in comments that there will be a way to manage the “problem” to be solved, which then generated the necessary motivation to engage effort. For example,
You just know what you know when you start off; when you're unsure about what you need to do. There's a bit of a barrier in front of you. It feels a bit intimidating and overwhelming, and then you get into it and it just works. And you just kind of put all the pieces together and get something out at the end.
There was a sense that supervisors’ perspectives of ICT might support this assertion too. For instance,
[ICT are] integral to everything now – there's no such thing as doing it without [them] anymore – these are the tools with which we do all the things we do.
In summary, this assertion captures the views of students who engage actively in making decisions about which, how and why they incorporate ICT into doctoral research practices.
Assertion 3: Knowing about ICT is only part of the thinking; what is more important is getting the “flow” right. ICT and the individual are in a complementary partnership.
Perhaps prompted by the nature of the drawing task, which was to illustrate how ICT fitted within the whole process of doctoral study, several students described the challenges to bringing everything together into one process made up of many parts, sections and subsections. One participant focussed on her “workflow” in order to manage the multiple documents, tasks and schedule involved in her doctoral research journey.
What systems do I use, what's my workflow? So, I actually spent some weeks looking at … ideas from other PhD students about their workflows and how they manage it.
Similar to Assertion 2-type comments, ‘getting one’s flow right’ involved exploration and an amount of reflective decision-making. For example,
So I did a play around with that [ICT] and found it was quite useful … So I’m trying to be quite disciplined about when I’ve got a document, entering it at the time, reading an article, throw in heaps of tags rather than not …And I simply keep a note, cross referencing to the actual articles. I like to have the articles and for some key ones I like to make a note. So, if it’s a seminal paper that I know I’ll be referring back to.
Thus, students talked about how hard they worked to set up routines and processes to enable them to manage time and their research projects. As in the above excerpts, they referred to categorising documents, searching for resources, undertaking analysis, managing data, and producing the thesis itself.
In working out one’s system or flow, this student highlighted the need to know about the affordances of ICT and how others had made use of them.
…you do need to know a bit about each of the individual … capabilities of the different systems to know what's even possible… but alongside that you're kind of reading other people's ideas of how they did it, and you think that bit might work for me oh, but that bit won't… so then you can kind of mix and match a bit.
The drawing in Fig. 3 highlights the “flow”. Absent of all words, this illustration draws attention to the movement of ideas, thoughts, processes and actions, from a number of different points but all ultimately converging or contributing to the one path.
ICT and the individual are in a complementary partnership
There was a hint that at least one of the supervisors saw the need for a workflow in this same vein: “So long as [the students are] happy with what they’re using – they should use ‘a’ system,”
In summary, this assertion highlights that what is important with respect to ICT and the doctoral process is how it all comes together within one’s flow. That flow incorporates active effort on the part of the individual in finding ICT and practices that suit the individual’s approaches as well as their project demands.
Assertion 4: ICT are not neutral; there is a two-way interaction between technologies as artefacts and the use of them to achieve ends. ICT and the person are intricately linked through multiple active, practical, goal-oriented connections.
This assertion draws attention to the nature of technology as a phenomenon; that technology is not an impartial tool that has no influence on the way humans act and react. This assertion presents ICT as an artefact of technological design activity; as a source of improving efforts to achieve an endpoint; but also as an influencer and even determiner of the thinking and practices of the person interacting with the ICT (e.g., Baird, 2002 ).
On what could be argued a superficial level, this student noted some active connection between the person and the software application, beyond simple use, when he commented:
I think it goes both ways, the product has to be intuitive and you’ve got to have a little bit of inclination to try out different things.
Others went beyond the superficial to describe more in-depth relationships between themselves and the ICT they were using. When discussing her use of software to help her manage her project and her time, this student talked about how the ICT she was using supported and enhanced her thinking.
Using the application] really changed the way I started to think about [my research]. I started to be less worried about the big overwhelming long term stuff that was out there and just think, okay, this week, what am I going to do this week, how am I going to be really efficient and targeted, and I think that really helped me.
Following is another example of how ICT helped solve a problem while simultaneously having an influence on behaviour; in this instance with organising notes, ideas and documents.
“… and it's the same with my note-taking because [the programme] that I use has a similar sort of functionality that it can search text that you've written but also search notes and PDF docs and those kind of things, so it means that when you've had a random thought and put it somewhere you can find it again. Which is huge for me, so I guess that … the power of the search engine is probably the thing that drove me to become paperless, so it helps me to organize myself much better. … filing paper is a skill that I have not mastered whereas filing digital stuff is not as important because you can always just find it again.
Figure 4 illustrates this intricately intertwined interactivity among person, purpose, project, ICT and outcomes.
ICT and the person are intricately linked through multiple active, practical, goal-oriented connections
While we did not find strong evidence for supervisors’ thoughts about this integrated and embedded notion of ICT, one supervisor did note “I could probably build them into my system, but I just never have”.
In summary, Assertion 4 highlights the integral role that ICT can be perceived to play in doctoral research processes. This is more than the working-alongside connection illustrated by Assertion 2 and the complementary partnership characterised by Assertion 3.
Assertions 1 and 2 highlight that individuals hold assumptions about, and have expectations of, ICT use; and those expectations and assumptions influence and determine their judgements about ICT and their use of ICT. The assertions point to connections between perceptions and practices. Assertion 1 describes a perception that ICT are separate from the person and the task-at-hand, while Assertion 2 presents a perception in which the person and the ICT are working alongside each other in harmony or at least in a loose partnership. Both assertions focus on endpoints, but the endpoints vary according to the perception of where ICT fit into the journey towards their achievement. For Assertion 1-type expressions, there is one major endpoint. For Assertion 2-type expressions, there are multiple, shorter-term endpoints that build towards achieving the major goal of completing the thesis.
Building on Assertions 1 and 2 are Assertions 3 and 4, which highlight what may be argued as more complex levels of perceiving and working with ICT. Both assertions give some focus to inter-connections, where people and ICT partner or collaborate. Assertion 3 depICT a perception that is about complementarity; where ICT affordances are seen as worthwhile when they support and enhance the work of the individual in ways that make sense to that individual. Assertion 4 builds on Assertion 3 by bringing to light the relationship in which the person alters and changes thinking or practices because of the influence that ICT affordances can have. No evidence was found to support a possible additional claim that as well as ICT causing individuals to alter and modify thinking and behaviours due to their existence, ICT, in turn, are perceived to be able to alter their ways of responding to the people who use them. This is not out of the realms of possibility of course, with ICT increasingly being designed and built to be able to respond to users’ needs.
It is also worth mentioning that the ‘types’ of ICT and the extent of their use by the participants was not the focus of this study. However, the findings suggested that the participants’ ICT use, regardless of their PhD phase and broad discipline background, might have reflected their inability to realise the advantages of learning how to use current ICT-related devices, tools, and applications to enhance the process of undertaking their doctoral research. The evidence that emerged in this study indicated that participants’ perspectives of ICT determined their adoption practices in general (i.e., as illustrated through the four assertions). The boarder higher education context including the specific institution and supervisors, might have neglected the explicit support of PhD students’ ICT capability development in this process.
In addition, while there is no similar study being found thus far, the insights gained from this study are actually similar to the findings in the research studies into the role of ICT in undergraduate education (Butson & Sim, 2013 ; Sim & Butson, 2013 , 2014 ). Results in those studies, demonstrated students’ low levels of ICT use, may be an indication that digital devices and digital tools do not play a significant role in daily study practices. Researchers such as Esposito, Sangrà & Maina ( 2013 ) also show that the PhD students’ learning to become researchers in the digital age is much more complex than is often suggested (e.g., the skills of Prenksy ( 2001 ) “digital natives”). Becoming a researcher involves developing a complex set of knowledge, intellectual abilities, techniques and professional standards. The Researcher Development Framework (Careers Research and Advisory Centre (CRAC), 2010 ) illustrates one useful attempt at mapping out that complexity. It could be that both students’ and supervisors’ adoption of ICT for academic purposes has been overshadowed or taken for granted as a consequence of their advanced academic level.
The four assertions can be used to provide some guidance to those supporting and participating in doctoral research processes. Students and supervisors do possess a vast array of skills, knowledge and abilities. They have a variety of experiences as well as varying reasons and levels of motivation. Their skills and capacity to make use of ICT to support their roles in the research process vary as well. The assertions that have emerged from this study will inform the planning for support activities to enhance supervisors’ and students’ professional development, whatever their background and needs.
Depending on the perceptions held about ICT and the relationship between ICT and the person in the context of the task and its goals (i.e., the doctoral study) within the doctoral research process as depicted in the four assertions, ICT tend to be seen as a challenge, a change or an opportunity. In the context of ICT use, doctoral students and supervisors may:
assume that if they do not already know how to use something it is not worth learning or exploring as that learning brings with it risk to quality, efficiency and effectiveness of the doctoral research process; and/or.
assume that students will work out the place that ICT play within the research process for themselves.
The findings of this study suggest the need to.
challenge existing ICT knowledge and skill, and to support acceptance of the need to change practices;
teach technological thinking, to enable choice and decision making about ICT;
embed ICT into practices in meaningful ways to suit individual and project needs;
highlight (explicit) responsibilities about thinking and planning skills with respect to making the best use of ICT, to ensure efficiency and effectiveness;
realise that the research process is as much about how it happens as what happens;
recast assumptions about the doctoral research process to embed ICT within it;
reflect on the meaning of effectiveness and efficiency in the context of doctoral research; and the effects of ICT in supporting and facilitating them;
understand that there is a link among ICT thinking and practice: using ICT can enhance or raise ideas that were never thought of before.
This study explored perceptions of doctoral supervisors and students of the role and place of ICT in supervision and study. It generated four assertions characterising those perceptions the relationships among people, ICT and the task-at-hand, that is, the supervised research process. As Castañeda and Selwyn ( 2018 ) argue, it is important that we have an active commitment to ‘think otherwise’ about how ICT might be better implemented across higher education settings” (p. 8). We should not assume that ICT are not important enough to let them fade into the background as they become normalised, without questioning the interrelationships that are happening between the person and the ICT. In the doctoral research setting, as one example of a higher education context, ICT do have a role to play. They cannot and should not be ignored. But seeing ICT in relationship to the person and to the setting is essential.
This project has provided insights into the doctoral students and supervisors’ perceptions of the roles played by ICT during doctoral research process. There are complex human factors, including assumptions, attitudes and conceptions about academic practices, influencing and determining perspectives as well as how ICT are incorporated into doctoral research process, behaviours and practices. Just as Kandiko and Kinchin ( 2012 ) argue that supervision cannot be looked at in the absence of the research work in which it occurs, we argue that doctoral students’ understanding and use of ICT cannot be considered independently of their research work; and that work includes relationships with their project, their supervisors, within the context of the institution, and with the ICT they do and could engage with.
Directly associated with the outcomes of this study, future studies and further exploration could focus on:
ICT use by larger and more diverse groups of doctoral students from a range of fields within discipline areas at institutions outside New Zealand;
building on the findings in order to determine how intensity of ICT use might change for students across the course of their candidature, and in relation to the nature of their research projects;
the role of supervisors, academic departments, and institutions in supporting and enhancing students’ practices and beliefs about ICT in research processes;
the ways in which supervisors engage ICT in their daily academic practices, with a view to exploring how, or if, their ICT use is an influence on PhD students’ beliefs and behaviours in using ICT.
Studying ICT in these directions could offer fresh perspectives and opportunities to think differently and reveal an active way of understanding the role of ICT in doctoral education.
These are not available for open access as their access is bound by the ethical agreement approved by the two institutions and made with the participants in the study.
Aghaee, N., Jobe, W. B., Karunaratne, T., Smedberg, Å., Hansson, H., & Tee, M. (2016). Interaction gaps in PhD education and ICT as a way forward: Results from a study in Sweden. International Review of Research in Open and Distance Learning , 17 (3) Retrieved from https://search.proquest.com/docview/1805463156?accountid=14700 .
Åkerlind, G., & McAlpine, L. (2017). Supervising doctoral students: Variation in purpose and pedagogy. Studies in Higher Education , 42 (9), 1686–1698. https://doi.org/10.1080/03075079.2015.1118031 .
Article Google Scholar
Baird, D. (2002). Thing knowledge: Function and truth. Techné: Research in Philosophy and Technology , 6 (2), 96–105. https://scholar.lib.vt.edu/ejournals/SPT/v6n2/ .
MathSciNet Google Scholar
Butson, R., & Sim, K. N. (2013). The role of personal computers in undergraduate education. International Journal of Digital Literacy and Digital Competence , 4 (3), 1–9. https://doi.org/10.4018/ijdldc.201307010 .
Careers Research and Advisory Centre (CRAC) (2010). Researcher development framework , (pp. 1–22) Retrieved from https://www.vitae.ac.uk/vitae-publications/rdf- related/researcher-development-framework-rdf-vitae.pdf .
Castañeda, L., & Selwyn, N. (2018). More than tools? Making sense of the ongoing digitizations of higher education. International Journal of Educational Technology in Higher Education , 15 (22), 1–10. https://doi.org/10.1186/s41239-018-0109-y .
Cotterall, S. (2011). Doctoral students writing: Where's the pedagogy? Teaching in Higher Education , 16 (4), 413–425. https://doi.org/10.1080/13562517.2011.560381 .
Dowling, R., & Wilson, M. (2017). Digital doctorates? An exploratory study of PhD candidates’ use of online tools. Innovations in Education and Teaching International , 54 (1), 76–86. https://doi.org/10.1080/14703297.2015.1058720 .
Erickson F. (2012). Qualitative research methods for science education. In Fraser, B., Tobin, K., & McRobbie, C. J. (Eds.), Second international handbook of science education . (Springer International Handbooks of Education, Vol. 2, pp. 1451–69). Dordrecht: Springer. https://doi.org/10.1007/978-1-4020-9041-7_93 .
Google Scholar
Esposito, A., Sangrà, A., & Maina, M. (2013). How Italian PhD students reap the benefits of instiutional resources and digital services in the open web. Proceedings of the International technology, education and development (INTED) conference , pp. 6490-6500. Valencia: Spain. ISBN: 978-84-616-2661-8.
Guba, E. G., & Lincoln, Y. S. (1989). Fourth generation evaluation . Newbury Park: Sage.
Kandiko, C. B., & Kinchin, I. M. (2012). What is a doctorate? A concept-mapped analysis of process versus product in the supervision of lab-based PhDs. Educational Research , 54 (1), 3–16. https://doi.org/10.1080/00131881.2012.658196 .
Lee, A. (2008). How are doctoral students supervised? Concepts of doctoral research supervision. Studies in Higher Education , 33 (3), 267–281. https://doi.org/10.1080/03075070802049202 .
Mahmood, K. (2016). Do people overestimate their information literacy skills? A systematic review of empirical evidence on the Dunning-Kruger effect. Communications in Information Literacy , 10 (2), 199–212. https://doi.org/10.15760/comminfolit.2016.10.2.24 .
Marshall, S., & Shepherd, D. (2016). E-learning in tertiary education. Highlights from Ako Aotearoa projects . Wellington: Ako Aotearoa https://akoaotearoa.ac.nz/download/ng/file/group-4/e-learning-in-tertiary-education-highlights-from-ako-aotearoa-research.pdf .
Mayring, P. (2000). Qualitative content analysis. Forum: Qualitative Social Research , 1 (2) Retrieved from https://search.proquest.com/docview/867646667?accountid=14700 .
Nichols, M., Anderson, B., Campbell, M., & Thompson, J. (2014). An online orientation to open, flexible and distance learning Ako Aotearoa and the distance education Association of New Zealand (DEANZ). https://ako.ac.nz/knowledge-centre/an-online-orientation-to-open-flexible-and-distance-learning/ .
Prenksy, M. (2001). Digital natives, digital immigrants, part II. Do they really think differently? On the . Horizon , 9 (6), 1–6.
Silverman, D. (2001). Interpreting qualitative data. 2nd Ed. London: Sage.
Sim, K. N., & Butson, R. (2013). Do undergraduates use their personal computers to support learning? Procedia - Social and Behavioral Sciences , 103 , 330–339. https://doi.org/10.1016/j.sbspro.2013.10.341 .
Sim, K. N., & Butson, R. (2014). To what degree are undergraduate students using their personal computers to support their daily study practices? IAFOR Journal of Education , 2 (1), 158–171 Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=eric&AN=EJ1080348&site=ehost-live .
Stensaker, B., Maassen, P., Borgan, M., Oftebro, M., & Karseth, B. (2007). Use, updating and integration of ICT in higher education: Linking purpose, people and pedagogy. Higher Education , 54 , 417–433. https://doi.org/10.1007/s10734-006-9004-x .
Thomas, D. R. (2006). A general inductive approach for analyzing qualitative evaluation data. American Journal of Evaluation , 27 (2), 237–246. https://doi.org/10.1177/1098214005283748 .
Wetton, N. M., & McWhirter, J. (1998). Images and curriculum development in health education. In J. Prosser (Ed.), Image-based research: A sourcebook for qualitative researcher , (pp. 263–283). London: Falmer Press.
Zhou, E., & Okahana, H. (2019). The role of department supports on doctoral completion and time-to-degree. Journal of College Student Retention: Research, Theory & Practice , 20 (4), 511–529. https://doi.org/10.1177/1521025116682036 .
Download references
We thank the students and supervisors who shared their reflections and willingly engaged with us in this project.
We acknowledge the support of Ako Aotearoa, The National Centre for Tertiary Teaching Excellence, New Zealand through its Regional Hub Project Fund (RHPF), and the support of our institutions, University of Otago and Victoria University of Wellington.
Authors and affiliations.
Distance Learning, University of Otago, Dunedin, New Zealand
Sarah J. Stein
Centre for Academic Development, Victoria University of Wellington, Wellington, New Zealand
Kwong Nui Sim
You can also search for this author in PubMed Google Scholar
The authors are responsible for the entire project that is reported in this paper. The writing of the manuscript was led by the first author in collaboration with the second author. The authors read and approved the final manuscript.
Correspondence to Sarah J. Stein .
Competing interests.
The authors declare no competing interests.
Publisher’s note.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .
Reprints and permissions
Cite this article.
Stein, S.J., Sim, K.N. Enhancing the roles of information and communication technologies in doctoral research processes. Int J Educ Technol High Educ 17 , 34 (2020). https://doi.org/10.1186/s41239-020-00212-3
Download citation
Received : 02 February 2020
Accepted : 05 May 2020
Published : 10 September 2020
DOI : https://doi.org/10.1186/s41239-020-00212-3
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
This list of communication technology research paper topics provides the list of 10 potential topics for research papers and an overview article on the history of communications technology.
Fundamental to the expansion of telephone service was the widespread use of automatic telephone switches. Initial telephone service sought to connect every telephone directly with every other instrument in the same market. Soon manual switchboards were installed for more efficient operation. As more telephones entered service, switchboards became larger and more operators were required. Replacing often-slow manual operators, automatic devices were electromechanical for most of the first century of telephone usage, slowly being replaced by more efficient electronic (and eventually digital) systems.
Get 10% off with 24start discount code, 2. communications.
To the many technological inventions of the nineteenth century that improved communications, such as the telegraph and the telephone, the twentieth century added motion pictures, radio, television, and the Internet. Most of the products created for improving communication in the nineteenth century improved communication between individuals. During the twentieth century, new technologies added ways for groups or organizations to communicate to other groups, marking the birth of mass communications. These new media would have profound effects on entertainment, how people received news, and politics. See the article below for the history and overview of communications technology.
Digital telephony is the digital transmission of voice over a communications network. This technology entails digital encoding of voice and digital transmission with regenerating repeaters, switches, and handsets. Using digitally enabled multiplexing, voice is integrated with computer data and digitized images, video, and other information in current telephone and computer networks. Digital telephony has rapidly replaced analog telephony due to many factors: VSLI technology provides lower costs; discrete values sampled by receivers and regenerating repeaters enable recovery from most transmission noise; digital methods of multiplexing, such as time division multiplexing (TDM) and code division multiple access (CDMA), afford higher throughput. As VoIP, the PSTN, and satellite telephony continue to develop, will packet switching and circuit switching continue to coexist and will a single technology dominate in digital telephony?
The development of digital computing and communication technology in the 1940s and 1950s was largely driven by Cold War military needs in the midst of closed-world politics. Extensive funding was provided for large-scale research and development projects during this period by the U.S. military. The origins of the communication of digital information can be attributed to the Whirlwind computer, which was developed under these conditions at the Massachusetts Institute of Technology (MIT) in Boston. This was a powerful general-purpose digital computer orientated toward real-time control and flight simulation. However, it eventually found use as the control computer in the semiautomatic ground environment (SAGE) air defense system. SAGE connected remote early-warning radar stations in the far reaches of the Arctic with control centers in the heartland to automatically direct fighter aircraft to intercept the perceived onslaught of Soviet bombers carrying doomsday nuclear arsenals. A means had to be invented to communicate digital information over long distances between the radar stations and the SAGE control centers, and this resulted in the techniques for the long-distance communication of digital data being developed. This is the origin of the modem (as it later became known) and the system became operational in 1952. The name is derived from the process of the modulation and demodulation, whereby a waveform of digital data (ones and zeros) are superimposed onto a sinusoidal carrier wave, since the square waveform of digital data cannot be sent over distances. This information is then extracted with the process of demodulation on the receiver side. It should also be noted that many other key computing technological developments resulted from the SAGE project, such as video displays, magnetic core memory, and networking among others. This technology diffused into civilian use with the SABRE airlines reservation system built by IBM for American Airlines in 1964, which inherited a lot of technological developments from SAGE. The system used modems to transmit data signals over ordinary analog telephone channels and was an early example of the general trend of the diffusion of military-sponsored computing technology into broader society.
Fax, or facsimile, technology refers to the concept of replicating printed documents across long distances and dates back to the nineteenth century, along with the advent of the telegraph. Embracing the emerging electromechanical technology of the time, several devices were developed; however, diffusion was limited due to the elaborate and intricate mechanism required as well as interoperability between disparate devices. Among the first on record was Alexander Bain’s ‘‘chemical telegraph,’’ patented in America in 1843. The device used a metallic contact that sensed the raised text, which triggered the flow of electric current. In 1847 Frederick Bakewell invented the ‘‘copying telegraph,’’ which introduced the concept of scanning the source document line by line. Both systems required pendulums and electromagnets for synchronization. However, fierce competition with Samuel Morse over long-distance telegraph lines led to legal disputes and Bain’s patent was declared invalid. Although the facsimile technology did not proliferate along with the telegraph, the concept of facsimile transmission did, and isolated systems continued to emerge wherever telegraphic networks were set up. A successful system was demonstrated in France in 1862 by Abbe Casselli, and a network of commercial stations was established. In America, Elisha Gray developed a system comprised of rheostats and electromagnets. Despite some successes, the largely mechanical technology was cumbersome, and lack of international interoperability and slowness of the system compared to Morse’s telegraph prevented commercial success and widespread proliferation.
Originally a means of communication suited only for small or medium distances, from about 1920, cable and wire telephony—soon to be supplemented by radio telephony—began to conquer the longer distances as well. Advances in telephone telephony, such as the post-World War II transoceanic cables, became a key factor in the trend towards the global information society. Much of the progress was based in new scientific knowledge or transformation of such knowledge into technological methods and artifacts. During the last three decades of the 20th century, an increasing part of intercontinental telephony was transmitted wirelessly through satellites rather than through cables. Many experts believe that future long-distance communications will rely on a mixture of optical-fiber cables and satellites, with a major part of the telephone traffic going through the satellite service.
In the last two decades of the twentieth century, mobile or cell phones developed from a minority communication tool, characterized by its prevalence in the 1980s among young professionals, to a pervasive cultural object. In many developed countries, more than three quarters of the population owned a cell phone by the end of the century. Cell phone technology is a highly evolved form of the personal radio systems used by truck drivers (citizens band, or CB, radio) and police forces in which receiver/transmitter units communicate with one another or a base antenna. Such systems work adequately over short distances with a low volume of traffic but cannot be expanded to cope with mass communication due to the limited space (bandwidth) available in the electromagnetic spectrum. Transmitting and receiving on one frequency, they allow for talking or listening but not both simultaneously. For mobile radio systems to make the step up to effective telephony, a large number of two-way conversations needed to be accommodated, requiring a duplex channel (two separate frequencies, taking up double the bandwidth). In order to establish national mobile phone networks without limiting capacity or the range of travel of handsets, a number of technological improvements had to occur.
Radio was originally conceived as a means for interpersonal communications, either person-to-person, or person-to-people, using analog waveforms containing either Morse code or actual sound. The use of radio frequencies (RF) designed to carry digital data in the form of binary code rather than voice and to replace physical wired connections between devices began in the 1970s, but the technology was not commercialized until the 1990s through digital cellular phone networks known as personal communications services (PCS) and an emerging group of wireless data network technologies just reaching commercial viability. The first of these is a so-called wireless personal area network (WPAN) technology known as Bluetooth. There are also two wireless local area networks (WLANs), generally grouped under the name Wi-Fi (wireless fidelity): (1) Wi-Fi, also known by its Institute of Electrical and Electronic Engineers (IEEE) designation 802.11b, and (2) Wi-Fi5 (802.11a).
Although the concept of wireless data networks is fairly new, the basic technology was created during World War II by two unlikely ‘‘scientists’’: Austrian-born actress Hedy Lamarr and orchestra leader George Antheil. Their U.S. patent described frequency-hopping, radio-controlled torpedoes that could not be jammed by the Nazis.
Arthur C. Clarke, a science-fiction writer and an early member of the British Interplanetary Society, is credited as first stating the theoretical possibility of satellite communications. The February 1945 issue of the British technical journal Wireless World included a letter from Clarke under the title ‘‘V-2 for Ionospheric Research’’ in which he explained that three artificial satellites positioned 120 degrees apart in geosynchronous orbit could provide television and microwave coverage to the entire planet. Three months later, he privately circulated six typewritten copies of a paper titled ‘‘The Space Station: Its Radio Applications.’’ A refined version, where Clarke gave a detailed, technical analysis of the orbital geometry and communications links, appeared under the title ‘‘Extra-Terrestrial Relays’’ in the October 1945 issue of Wireless World. Clark, however, acknowledged that the forerunner of the concept came from Hermann Potocnik, whose 1929 book Das Problem der Befahrung des Weltraums [The Problem of Space Travel ], published under the pseudonym Noordung, described ‘‘stationary circling.’’
The USSR’s launch in 1957 of Sputnik-1, which transmitted an electronic signal back to earth simply for tracking purposes, sparked serious efforts by the U.S. to develop satellite communications for both military and commercial use. Score, developed by the Advanced Research Projects Agency and launched in December 1958, became the world’s first active communications satellite. It received messages transmitted from a ground station and stored them on a tape recorder for retransmission back to earth. Launched in August 1960, the National Aeronautics American and Space Administration’s (NASA’s) Echo-1 first tested the merits of using a passive ‘‘reflector’’ satellite—a 30-meter-diameter, aluminized mylar balloon—for the transmission of voice, data, and photographs between ground terminals. The U.S. Army’s Courier satellite, launched in October 1960, operated on much the same principles as Score but carried solar cells and rechargeable batteries to extend its potential lifetime. Stemming from its interest in transoceanic communication, AT&T launched Telstar-1 in June 1962 to experiment with telegraph, facsimile, television, and multichannel telephone transmissions between the U.S. and Europe, as well as Japan. With the launch of NASA’s Syncom-2 in July 1963, the world finally had its first geosynchronous communications satellite. Not until 1975 would the USSR achieve a similar feat with its Raduga spacecraft for military and governmental communications, followed by its Ekran series in 1976 for direct television broadcasting and its Gorizont series in 1979 for domestic and international telecommunications.
The history of two-way communication is embedded in a series of much deeper histories: technology, imperialism, and the rise of the nation state, to name but a few. These, in turn, are embedded in a discourse that returns theory to a central place in non-Marxist histories. Several theoretical enterprises emerging from the academic disciplines of economics and political science look to technology as one of the major engines that drive history and to telecommunications technology as the most significant technology in the current world economy.
Although the global telecommunications system was shaped by the spectacular growth of the British submarine cable system after the first successful transatlantic cable opened for business in 1866, the 1900s saw considerable improvement of a system that had reached much of its modern shape by the late 1800s. Seven innovations stand out: 1. Low-frequency wireless telegraphy, starting around 1900 2. High-frequency wireless, which allowed telephony as well as telegraphy, in the 1920s 3. Microwave wireless, which led to radar, in the 1930s 4. Submarine telephone cables in the 1950s 5. Satellites in the 1960s 6. Fiber-optic submarine cables in the 1980s 7. Cellular wireless telephones in the 1990s. These seven innovations have increased the capacity or convenience of the global communications system and have trended towards radically lowered costs. Developments in two-way communications often encouraged one-way communications, such as the development of broadcast radio entertainment out of wireless telecommunications. Occasionally the flow of innovation has reversed, as in the importance of electronic television technology to the development of radar.
The first major communication improvement to be commercialized in the twentieth century was the motion picture. Thomas Edison invented the first practical motion picture camera in the U.S., and in 1896 he showed a motion picture to the public in the New York City Music Hall. The U.S. was the pacesetter for the film industry and New York City was the early center of the motion picture business. The first narrative film was The Great Train Robbery (1903). During World War I, Hollywood began to replace New York as the home of the movie industry. By the 1920s, Hollywood had clearly become the movie-making capital of the world and silent-film stars such as Charlie Chaplin, Buster Keaton, and Mary Pickford established themselves there.
Technological developments in the early twentieth century made sound motion pictures possible and greatly changed the film industry. In 1926, Warner Brothers, then a relatively minor studio, released the film Don Juan with a synchronized orchestral accompaniment. The studio had purchased the sound-on-disk Vitaphone system from American Telephone and Telegraph (AT&T). Warner Brothers sought to make short-term profits by supplying the technology to theaters that could not afford to hire live orchestras. This first attempt was successful enough that the first talking movie—The Jazz Singer staring Al Jolson—was released in 1927. In addition to the orchestral accompaniment, this film also featured popular songs and dialogue. The new sound films enjoyed great success and almost all Hollywood films included sound by the late 1920s, leading to greatly increased profits for the studios.
The introduction of sound did lead to some problems and changes in the film industry. Problems included the tremendous expense now involved in the production of motion pictures and the primitive nature of microphones, which forced actors to remain almost stationary and would pick up the sound of cameras and other set noise. Changes included the replacement of many silentera actors with new actors with stage experience due to the fact that with sound, film actors had to have pleasant sounding voices without strong foreign accents. Sound led to the production of more realistic films, including crime epics and historical biographies. Musicals also became an important film genre, including the animated musicals of Walt Disney.
Movies would become the world’s leading form of entertainment until the advent of television after World War II. For many, films represented the decadence of twentieth century society, displaying modern sexual mores on the screen. Along with radio, the film industry also became big business. Furthermore, the motion picture industry centered in Hollywood served to export the culture of the U.S., as moviegoers around the world viewed U.S.- made films.
Although motion pictures were mostly used for entertainment, showings often included such current news events as wars, parades, and speeches. In the 1930s, after sound had been added, newsreels covering the week’s major events were shown in most theaters along with the movies. Authoritarian governments that emerged between the two world wars became particularly adept at utilizing film as a propaganda tool. The Bolsheviks in the Soviet Union and the Nazis in Germany successfully used motion pictures for political ends. The most famous example of this political use is Triumph of the Will, a 1934 film by the German filmmaker Leni Riefenstahl that depicted a Nazi rally at Nuremberg.
During the war, film was used to support the war aims of governments. In the U.S., for example, Hollywood backed the government’s information campaign through the Bureau of Motion Picture Affairs, which produced commercial features with patriotic themes. Hollywood also produced documentaries such as Frank Capra’s Why We Fight, which sought to explain the war to both soldiers and civilians.
Immediately after the war, Hollywood enjoyed a brief boom, as two-thirds of Americans went to the movies at least once a week. Soon, however, antitrust legislation, protectionist quotas abroad, and the rise of television cut into Hollywood’s profits. The Cold War also greatly affected the film industry, as many suspected communists were blacklisted by the studios and film-making became more conservative. Traditional genres such as musicals and westerns continued after the war, while others grew in importance, including many lower-budget films that dealt with social problems such as racism or alcoholism. Also popular was film noir, which offered a dark interpretation of American society.
World War II devastated the film industries in much of Europe, the Soviet Union, and Japan. A postwar renaissance was led by Italy and its neorealist movement that attempted to show the reality of a country afflicted by warfare. Great Britain and France soon followed in reviving their film industries. Japan also was able to restore its motion picture industry after the war, as many studios were left intact. Akira Kurosawa led the Japanese revival with numerous films, including Rashoman.
A film industry developed in many Third World countries. India had a vibrant film industry led by director Satyajit Ray. Many of India’s films provided an alternative cinema with artistic merit. At the same time, India also became the world’s largest producer of low-quality films for domestic consumption, making more than 700 motion pictures in sixteen languages each year. Film was often the only access to audiovisual entertainment for the many poor and illiterate Indians.
Latin America and Africa also developed sometimes militant, alternative forms of film; for example, in Cuba during the 1960s, when the country’s revolution influenced world-renowned directors such as Toma´ s Gutıerrez Alea and Humberto Sola´ s. The so-called Cinema Novo (New Cinema) developed in Brazil during the 1960s and spread to other Third World countries. While many Third World nations created sometimes revolutionary film genres, military dictatorships also repressed motion pictures in numerous countries such as Argentina.
By the early twentieth century, wireless communication began to appear. The first example of wireless communication was the radio. In 1895, Italian inventor Guglielmo Marconi transmitted the first wireless telegraph message. Starting in 1901, Marconi used radio telegrams to communicate with ships on the Atlantic Ocean. The usefulness of radio was seen in its use during the Russo–Japanese War in 1905. In the U.S., experimental broadcasting to a mass audience started in 1910 with a program by the famous singer Enrico Caruso at the Metropolitan Opera House in New York City. Perhaps the most dramatic example of radio’s value in spreading information was its use in reporting on the sinking of the Titanic in 1912, which demonstrated radio’s ability to allow people to experience distant events as they occurred. World War I interrupted some radio research, however the demands of military communications sped up the development of radio technology.
During the 1920s, what had been more of a hobby became a mass medium that played a central role in news reporting and entertainment. A number of experimental broadcasting stations had converted to commercial stations by broadcasting programs on a regular basis, including news such as the results of the 1920 presidential election in the U.S. In the U.S., because radio was a good way to communicate with large groups of people, broadcasting rapidly consolidated into national networks in order to attract advertising revenue to support news and entertainment programming. The Radio Corporation of America (RCA) created the first nationwide broadcast network, the National Broadcasting Company (NBC), in 1926. In Europe and some other parts of the world, governments generally controlled radio broadcasting.
Radio played an important role in twentieth century communications, as it allowed people much easier access to entertainment since many families owned radios. By the end of the 1920s, two-thirds of homes in the U.S. owned radio receivers. People no longer had to go to a concert, play, or sporting event to be entertained. Instead, they could now enjoy many forms of entertainment from the comfort of their own homes. Despite the fact that radio broadcasts could reach millions of people, the medium gave those in their homes a sense of immediacy and intimacy. Furthermore, unlike written forms of communication, no formal education was needed to enjoy radio programs. Many forms of popular entertainment shifted to the radio, allowing them to maintain and even expand their audiences. Radio offered a wide variety of entertainment genres, including dramas, comedies, sports, and music.
Besides providing entertainment, supplying news, and making money for entrepreneurs, radio also proved to be an important tool for politicians, better enabling them to mobilize the masses. Perhaps best known are Franklin Roosevelt’s ‘‘Fireside Chats,’’ which allowed the president of the U.S. to reach the public directly during the Great Depression and World War II. As was the case with film, authoritarian regimes in particular made use of radio technology. Italy’s Benito Mussolini pioneered the use of radio to address the nation. In the Soviet Union, the first experimental radio broadcasts began in 1919. In 1922, a central radio station in Moscow began broadcasting. By 1924, regular broadcasts could be heard throughout most of the USSR and by 1937, there were some 90 radio transmitters in operation in Stalin’s Soviet Union. Leaders in Nazi Germany also made effective use of the radio during the 1930s and 1940s. In Japan, the right-wing government utilized radio to promote its goals leading up to World War II.
Radio has also become an important means of communications in other parts of the world. In Latin America, for example, radio, along with television, is the main medium for transmitting information. In most Latin American countries, radio reaches far more people than print media, due to lower rates of literacy and lack of purchasing power. From the 1930s to the 1960s, many radio stations broadcast radionovelas, serial radio programs similar to soap operas. Since the 1960s, such programming has largely moved to television. As was the case elsewhere, early Latin American radio also featured variety shows, dramas, sports, talk shows, and news.
Radio also contributed to the spread of Latin American culture to other parts of the world, especially in the realm of dance and music. Argentine tango, Mexican boleros, salsa from New York’s Latin community, and Brazilian samba all became popular beyond the borders of Latin America in large part because of radio airtime. Samba, for example, emerged as a musical and dance form from the poor sections of Rio de Janeiro, the capital of Brazil at the time. From its Afro-Brazilian roots, samba emerged from a locally popular form to one that had a national importance in Brazil. As samba received increased radio airplay, it seemed to unite the country and came to represent Brazilian nationalism. Performers such as Carmen Miranda, who later also became a Hollywood film star, popularized the music on the Brazilian airwaves. Soon, listeners heard samba on their radios throughout the world, demonstrating that mass culture could spread from poorer countries to elite consumers around the globe due to communications technology such as radio.
From the 1990s, radio stations in Latin America have often become more specialized as they seek audiences. Amplitude modulation (AM) stations tend to carry news, talk, and local popular music. Also, they often cater to the interests of groups outside of the cultural and linguistic mainstream. For example, radio stations in Lima, Peru feature ethnic music and news in Quechua or Aymara languages for recent migrants from the highlands. Frequency modulation (FM) stations emphasize music, particularly national popular music or international music. International music tends to be popular among the young and affluent, while national music appeals to an older, more working-class audience.
Another important twentieth century development was television, which would soon overshadow radio and motion pictures. In the U.S. during the late 1920s, many attempts were made to create an experimental telecast, and a few met with success, particularly RCA’s efforts. In 1936, NBC provided 150 experimental television sets to homes in New York City and sent telecasts to them, the first show being the cartoon ‘‘Felix the Cat.’’ By 1939, NBC was providing regular telecasts but to a limited market. When the U.S. entered World War II in 1941, however, all television projects were suspended until the war ended in 1945.
After the war, television development continued where it left off, with the invention of better television sets, creative programming, and larger markets. The first coast-to-coast program was President Harry Truman’s opening speech at the Japanese Peace Treaty Conference in 1951. By the 1950s, television had become a profitable industry. Television enjoyed a ‘‘golden age’’ and increasingly replaced radio as the principal mass medium. Indeed, television became a key part of social life in the U.S. and other parts of the world. Following World War II, a growing number of people had more money and more leisure time, both of which were often spent on television.
While early televisions in the U.S. were largely affordable, they were often unreliable. Technological improvements soon made television much more reliable and appealing. These improvements included the replacement of vacuum tubes with the transistor and the development of color sets. In 1953, the first color telecast was made, which spread so fast that by the 1960s, most telecasts were in color. Later advancements include the spread of cable television in the 1980s, which gave viewers access to dozens of specialized channels and challenged the power of the traditional television networks. Many of the newly available cable channels, such as MTV and CNN, would have important effects on society and culture. The end of the twentieth century witnessed the rise of satellite and high-definition television, which offered viewers even more choices and improved the technical quality of television.
Television continued the process of the globalization of U.S. culture, as viewers around the world watched comedies and dramas produced in the U.S. Sporting events also helped to spread the U.S.’s cultural values. The National Basketball Association (NBA) was particularly successful in its international marketing efforts, popularizing its sport around the globe and creating stars such as Michael Jordan, who arguably became the most recognized athlete in the world. In addition, U.S.- based businesses, such as Nike, benefited from the globalization of basketball through television, as the sport helped to sell more of its athletic shoes. Yet it was not only basketball and the U.S. that dominated the use of television. During the 1986 soccer World Cup in Mexico, games were played under the midday sun in order to be broadcast during primetime in European countries.
Television grew more slowly in the Soviet Union than in the U.S. and Western Europe. As late as 1960, only five percent of the Soviet population could watch television. Television audiences grew during the 1970s and 1980s, often at the expense of film and theater audiences. By 1991, 97 percent of the population could view television, and a typical audience for the nightly news from Moscow numbered 150 million.
Television also became available in Latin American countries during the 1950s, when it was largely restricted to an upper- and middle-class urban audience. In this early phase, programming was limited to live, local productions. From the 1960s, television became much more of a mass medium. In this period, much of the programming was imported from abroad, especially the U.S. By the 1970s and 1980s, high-quality national production appeared, especially in Brazil, Colombia, Mexico, and Venezuela. The most important and successful productions were telenovelas, a form of the soap opera. By 2000, in some countries, such as Brazil and Mexico, perhaps 90 percent of the population had regular access to television. While the figure is lower in rural areas, even this began to change in the 1980s when satellite dishes linked to repeater transmitters allowed for increased access in remote areas.
While film, radio, and television all had dramatic effects on communications in the twentieth century, all three were still ‘‘one-way’’ media that lacked any sort of interactive capabilities. The advent of the computer revolution and in particular the Internet changed this situation in the late twentieth century. While early computers had been large and slow, by the 1970s and 1980s, engineers centered in California’s so-called Silicon Valley created increasingly smaller computers with greater memory capacity. After these hardware developments, improvements in software followed that allowed computer users to word process, play games, and run businesses. These technological improvements in computer hardware and software would soon have a profound effect on communications and commerce with the development of the Internet.
The creation of the Internet was the result of attempts to connect research networks in the U.S. and Europe. In the 1960s, the U.S. Department of Defense created an open network to help academic, contract, and government employees communicate unclassified information related to defense work. After crucial technological advances in the 1970s, in 1980 the Department of Defense adopted the transmission control protocol/Internet protocol (TCP/IP) standard, which allowed networks to route and assemble data packets and also send data to its ultimate destination through a global addressing mechanism.
During the 1980s, the defense functions were removed from the network, and the National Science Foundation operated the remainder, adding many new features to the network and expanding its use around the world. While government agencies were the principal early users of the Internet, by the 1980s its use had spread to the scientific and academic community. By the 1990s, the Internet had become increasingly commercialized and privatized. The rise in the use of personal computers and the development of local area networks to connect these computers contributed to the expansion of the Internet. Starting in 1988, commercial electronic mail (e-mail) services were connected to the Internet, leading to a boom in traffic. The creation of the World Wide Web and easy to use Web browsers made the Internet more accessible so that by the late 1990s, there were more than 10,000 Internet providers around the world with more than 350 million users.
In the early twenty-first century, the Internet is a critical component of the computer revolution, offering e-mail, chat rooms, access to the wealth of information on the Web, and many Internet-supported applications. The Internet has had a dramatic impact on global society. E-mail is rapidly replacing long-distance telephone calls, and chat rooms have created social groups dedicated to specific subjects, but with members living around the world. The Internet has not only changed how people communicate but also how they work, purchase, and play. Many people now work at home, using the Internet to stay in touch with the office. People have also begun to use the Internet for banking and shopping services rather than so-called ‘‘brick and mortar’’ locations.
The communications revolution of the twentieth century created many new social problems that will have to be addressed in the twenty-first century. While people have access to more information than ever before, that information, often unfiltered and invalidated, has created several generations of children who are seemingly immune to extreme violence. Health concerns are also an issue, as people spend less time in outdoor activities and more time sitting in front of the television or computer. The online nature of the Internet will also make privacy one of the major issues of the near future.
Browse other Technology Research Paper Topics .
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.
Humanities and Social Sciences Communications volume 11 , Article number: 1115 ( 2024 ) Cite this article
Metrics details
The rapid expansion of information technology and the intensification of population aging are two prominent features of contemporary societal development. Investigating older adults’ acceptance and use of technology is key to facilitating their integration into an information-driven society. Given this context, the technology acceptance of older adults has emerged as a prioritized research topic, attracting widespread attention in the academic community. However, existing research remains fragmented and lacks a systematic framework. To address this gap, we employed bibliometric methods, utilizing the Web of Science Core Collection to conduct a comprehensive review of literature on older adults’ technology acceptance from 2013 to 2023. Utilizing VOSviewer and CiteSpace for data assessment and visualization, we created knowledge mappings of research on older adults’ technology acceptance. Our study employed multidimensional methods such as co-occurrence analysis, clustering, and burst analysis to: (1) reveal research dynamics, key journals, and domains in this field; (2) identify leading countries, their collaborative networks, and core research institutions and authors; (3) recognize the foundational knowledge system centered on theoretical model deepening, emerging technology applications, and research methods and evaluation, uncovering seminal literature and observing a shift from early theoretical and influential factor analyses to empirical studies focusing on individual factors and emerging technologies; (4) moreover, current research hotspots are primarily in the areas of factors influencing technology adoption, human-robot interaction experiences, mobile health management, and aging-in-place technology, highlighting the evolutionary context and quality distribution of research themes. Finally, we recommend that future research should deeply explore improvements in theoretical models, long-term usage, and user experience evaluation. Overall, this study presents a clear framework of existing research in the field of older adults’ technology acceptance, providing an important reference for future theoretical exploration and innovative applications.
Introduction.
In contemporary society, the rapid development of information technology has been intricately intertwined with the intensifying trend of population aging. According to the latest United Nations forecast, by 2050, the global population aged 65 and above is expected to reach 1.6 billion, representing about 16% of the total global population (UN 2023 ). Given the significant challenges of global aging, there is increasing evidence that emerging technologies have significant potential to maintain health and independence for older adults in their home and healthcare environments (Barnard et al. 2013 ; Soar 2010 ; Vancea and Solé-Casals 2016 ). This includes, but is not limited to, enhancing residential safety with smart home technologies (Touqeer et al. 2021 ; Wang et al. 2022 ), improving living independence through wearable technologies (Perez et al. 2023 ), and increasing medical accessibility via telehealth services (Kruse et al. 2020 ). Technological innovations are redefining the lifestyles of older adults, encouraging a shift from passive to active participation (González et al. 2012 ; Mostaghel 2016 ). Nevertheless, the effective application and dissemination of technology still depends on user acceptance and usage intentions (Naseri et al. 2023 ; Wang et al. 2023a ; Xia et al. 2024 ; Yu et al. 2023 ). Particularly, older adults face numerous challenges in accepting and using new technologies. These challenges include not only physical and cognitive limitations but also a lack of technological experience, along with the influences of social and economic factors (Valk et al. 2018 ; Wilson et al. 2021 ).
User acceptance of technology is a significant focus within information systems (IS) research (Dai et al. 2024 ), with several models developed to explain and predict user behavior towards technology usage, including the Technology Acceptance Model (TAM) (Davis 1989 ), TAM2, TAM3, and the Unified Theory of Acceptance and Use of Technology (UTAUT) (Venkatesh et al. 2003 ). Older adults, as a group with unique needs, exhibit different behavioral patterns during technology acceptance than other user groups, and these uniquenesses include changes in cognitive abilities, as well as motivations, attitudes, and perceptions of the use of new technologies (Chen and Chan 2011 ). The continual expansion of technology introduces considerable challenges for older adults, rendering the understanding of their technology acceptance a research priority. Thus, conducting in-depth research into older adults’ acceptance of technology is critically important for enhancing their integration into the information society and improving their quality of life through technological advancements.
Reviewing relevant literature to identify research gaps helps further solidify the theoretical foundation of the research topic. However, many existing literature reviews primarily focus on the factors influencing older adults’ acceptance or intentions to use technology. For instance, Ma et al. ( 2021 ) conducted a comprehensive analysis of the determinants of older adults’ behavioral intentions to use technology; Liu et al. ( 2022 ) categorized key variables in studies of older adults’ technology acceptance, noting a shift in focus towards social and emotional factors; Yap et al. ( 2022 ) identified seven categories of antecedents affecting older adults’ use of technology from an analysis of 26 articles, including technological, psychological, social, personal, cost, behavioral, and environmental factors; Schroeder et al. ( 2023 ) extracted 119 influencing factors from 59 articles and further categorized these into six themes covering demographics, health status, and emotional awareness. Additionally, some studies focus on the application of specific technologies, such as Ferguson et al. ( 2021 ), who explored barriers and facilitators to older adults using wearable devices for heart monitoring, and He et al. ( 2022 ) and Baer et al. ( 2022 ), who each conducted in-depth investigations into the acceptance of social assistive robots and mobile nutrition and fitness apps, respectively. In summary, current literature reviews on older adults’ technology acceptance exhibit certain limitations. Due to the interdisciplinary nature and complex knowledge structure of this field, traditional literature reviews often rely on qualitative analysis, based on literature analysis and periodic summaries, which lack sufficient objectivity and comprehensiveness. Additionally, systematic research is relatively limited, lacking a macroscopic description of the research trajectory from a holistic perspective. Over the past decade, research on older adults’ technology acceptance has experienced rapid growth, with a significant increase in literature, necessitating the adoption of new methods to review and examine the developmental trends in this field (Chen 2006 ; Van Eck and Waltman 2010 ). Bibliometric analysis, as an effective quantitative research method, analyzes published literature through visualization, offering a viable approach to extracting patterns and insights from a large volume of papers, and has been widely applied in numerous scientific research fields (Achuthan et al. 2023 ; Liu and Duffy 2023 ). Therefore, this study will employ bibliometric methods to systematically analyze research articles related to older adults’ technology acceptance published in the Web of Science Core Collection from 2013 to 2023, aiming to understand the core issues and evolutionary trends in the field, and to provide valuable references for future related research. Specifically, this study aims to explore and answer the following questions:
RQ1: What are the research dynamics in the field of older adults’ technology acceptance over the past decade? What are the main academic journals and fields that publish studies related to older adults’ technology acceptance?
RQ2: How is the productivity in older adults’ technology acceptance research distributed among countries, institutions, and authors?
RQ3: What are the knowledge base and seminal literature in older adults’ technology acceptance research? How has the research theme progressed?
RQ4: What are the current hot topics and their evolutionary trajectories in older adults’ technology acceptance research? How is the quality of research distributed?
Research method.
In recent years, bibliometrics has become one of the crucial methods for analyzing literature reviews and is widely used in disciplinary and industrial intelligence analysis (Jing et al. 2023 ; Lin and Yu 2024a ; Wang et al. 2024a ; Xu et al. 2021 ). Bibliometric software facilitates the visualization analysis of extensive literature data, intuitively displaying the network relationships and evolutionary processes between knowledge units, and revealing the underlying knowledge structure and potential information (Chen et al. 2024 ; López-Robles et al. 2018 ; Wang et al. 2024c ). This method provides new insights into the current status and trends of specific research areas, along with quantitative evidence, thereby enhancing the objectivity and scientific validity of the research conclusions (Chen et al. 2023 ; Geng et al. 2024 ). VOSviewer and CiteSpace are two widely used bibliometric software tools in academia (Pan et al. 2018 ), recognized for their robust functionalities based on the JAVA platform. Although each has its unique features, combining these two software tools effectively constructs mapping relationships between literature knowledge units and clearly displays the macrostructure of the knowledge domains. Particularly, VOSviewer, with its excellent graphical representation capabilities, serves as an ideal tool for handling large datasets and precisely identifying the focal points and hotspots of research topics. Therefore, this study utilizes VOSviewer (version 1.6.19) and CiteSpace (version 6.1.R6), combined with in-depth literature analysis, to comprehensively examine and interpret the research theme of older adults’ technology acceptance through an integrated application of quantitative and qualitative methods.
Web of Science is a comprehensively recognized database in academia, featuring literature that has undergone rigorous peer review and editorial scrutiny (Lin and Yu 2024b ; Mongeon and Paul-Hus 2016 ; Pranckutė 2021 ). This study utilizes the Web of Science Core Collection as its data source, specifically including three major citation indices: Science Citation Index Expanded (SCIE), Social Sciences Citation Index (SSCI), and Arts & Humanities Citation Index (A&HCI). These indices encompass high-quality research literature in the fields of science, social sciences, and arts and humanities, ensuring the comprehensiveness and reliability of the data. We combined “older adults” with “technology acceptance” through thematic search, with the specific search strategy being: TS = (elder OR elderly OR aging OR ageing OR senile OR senior OR old people OR “older adult*”) AND TS = (“technology acceptance” OR “user acceptance” OR “consumer acceptance”). The time span of literature search is from 2013 to 2023, with the types limited to “Article” and “Review” and the language to “English”. Additionally, the search was completed by October 27, 2023, to avoid data discrepancies caused by database updates. The initial search yielded 764 journal articles. Given that searches often retrieve articles that are superficially relevant but actually non-compliant, manual screening post-search was essential to ensure the relevance of the literature (Chen et al. 2024 ). Through manual screening, articles significantly deviating from the research theme were eliminated and rigorously reviewed. Ultimately, this study obtained 500 valid sample articles from the Web of Science Core Collection. The complete PRISMA screening process is illustrated in Fig. 1 .
Presentation of the data culling process in detail.
Raw data exported from databases often contain multiple expressions of the same terminology (Nguyen and Hallinger 2020 ). To ensure the accuracy and consistency of data, it is necessary to standardize the raw data (Strotmann and Zhao 2012 ). This study follows the data standardization process proposed by Taskin and Al ( 2019 ), mainly executing the following operations:
(1) Standardization of author and institution names is conducted to address different name expressions for the same author. For instance, “Chan, Alan Hoi Shou” and “Chan, Alan H. S.” are considered the same author, and distinct authors with the same name are differentiated by adding identifiers. Diverse forms of institutional names are unified to address variations caused by name changes or abbreviations, such as standardizing “FRANKFURT UNIV APPL SCI” and “Frankfurt University of Applied Sciences,” as well as “Chinese University of Hong Kong” and “University of Hong Kong” to consistent names.
(2) Different expressions of journal names are unified. For example, “International Journal of Human-Computer Interaction” and “Int J Hum Comput Interact” are standardized to a single name. This ensures consistency in journal names and prevents misclassification of literature due to differing journal names. Additionally, it involves checking if the journals have undergone name changes in the past decade to prevent any impact on the analysis due to such changes.
(3) Keywords data are cleansed by removing words that do not directly pertain to specific research content (e.g., people, review), merging synonyms (e.g., “UX” and “User Experience,” “aging-in-place” and “aging in place”), and standardizing plural forms of keywords (e.g., “assistive technologies” and “assistive technology,” “social robots” and “social robot”). This reduces redundant information in knowledge mapping.
Distribution power (rq1), literature descriptive statistical analysis.
Table 1 presents a detailed descriptive statistical overview of the literature in the field of older adults’ technology acceptance. After deduplication using the CiteSpace software, this study confirmed a valid sample size of 500 articles. Authored by 1839 researchers, the documents encompass 792 research institutions across 54 countries and are published in 217 different academic journals. As of the search cutoff date, these articles have accumulated 13,829 citations, with an annual average of 1156 citations, and an average of 27.66 citations per article. The h-index, a composite metric of quantity and quality of scientific output (Kamrani et al. 2021 ), reached 60 in this study.
The number of publications and citations are significant indicators of the research field’s development, reflecting its continuity, attention, and impact (Ale Ebrahim et al. 2014 ). The ranking of annual publications and citations in the field of older adults’ technology acceptance studies is presented chronologically in Fig. 2A . The figure shows a clear upward trend in the amount of literature in this field. Between 2013 and 2017, the number of publications increased slowly and decreased in 2018. However, in 2019, the number of publications increased rapidly to 52 and reached a peak of 108 in 2022, which is 6.75 times higher than in 2013. In 2022, the frequency of document citations reached its highest point with 3466 citations, reflecting the widespread recognition and citation of research in this field. Moreover, the curve of the annual number of publications fits a quadratic function, with a goodness-of-fit R 2 of 0.9661, indicating that the number of future publications is expected to increase even more rapidly.
A Trends in trends in annual publications and citations (2013–2023). B Overlay analysis of the distribution of discipline fields.
Figure 2B shows that research on older adults’ technology acceptance involves the integration of multidisciplinary knowledge. According to Web of Science Categories, these 500 articles are distributed across 85 different disciplines. We have tabulated the top ten disciplines by publication volume (Table 2 ), which include Medical Informatics (75 articles, 15.00%), Health Care Sciences & Services (71 articles, 14.20%), Gerontology (61 articles, 12.20%), Public Environmental & Occupational Health (57 articles, 11.40%), and Geriatrics & Gerontology (52 articles, 10.40%), among others. The high output in these disciplines reflects the concentrated global academic interest in this comprehensive research topic. Additionally, interdisciplinary research approaches provide diverse perspectives and a solid theoretical foundation for studies on older adults’ technology acceptance, also paving the way for new research directions.
A dual-map overlay is a CiteSpace map superimposed on top of a base map, which shows the interrelationships between journals in different domains, representing the publication and citation activities in each domain (Chen and Leydesdorff 2014 ). The overlay map reveals the link between the citing domain (on the left side) and the cited domain (on the right side), reflecting the knowledge flow of the discipline at the journal level (Leydesdorff and Rafols 2012 ). We utilize the in-built Z-score algorithm of the software to cluster the graph, as shown in Fig. 3 .
The left side shows the citing journal, and the right side shows the cited journal.
Figure 3 shows the distribution of citing journals clusters for older adults’ technology acceptance on the left side, while the right side refers to the main cited journals clusters. Two knowledge flow citation trajectories were obtained; they are presented by the color of the cited regions, and the thickness of these trajectories is proportional to the Z-score scaled frequency of citations (Chen et al. 2014 ). Within the cited regions, the most popular fields with the most records covered are “HEALTH, NURSING, MEDICINE” and “PSYCHOLOGY, EDUCATION, SOCIAL”, and the elliptical aspect ratio of these two fields stands out. Fields have prominent elliptical aspect ratios, highlighting their significant influence on older adults’ technology acceptance research. Additionally, the major citation trajectories originate in these two areas and progress to the frontier research area of “PSYCHOLOGY, EDUCATION, HEALTH”. It is worth noting that the citation trajectory from “PSYCHOLOGY, EDUCATION, SOCIAL” has a significant Z-value (z = 6.81), emphasizing the significance and impact of this development path. In the future, “MATHEMATICS, SYSTEMS, MATHEMATICAL”, “MOLECULAR, BIOLOGY, IMMUNOLOGY”, and “NEUROLOGY, SPORTS, OPHTHALMOLOGY” may become emerging fields. The fields of “MEDICINE, MEDICAL, CLINICAL” may be emerging areas of cutting-edge research.
Table 3 provides statistics for the top ten journals by publication volume in the field of older adults’ technology acceptance. Together, these journals have published 137 articles, accounting for 27.40% of the total publications, indicating that there is no highly concentrated core group of journals in this field, with publications being relatively dispersed. Notably, Computers in Human Behavior , Journal of Medical Internet Research , and International Journal of Human-Computer Interaction each lead with 15 publications. In terms of citation metrics, International Journal of Medical Informatics and Computers in Human Behavior stand out significantly, with the former accumulating a total of 1,904 citations, averaging 211.56 citations per article, and the latter totaling 1,449 citations, with an average of 96.60 citations per article. These figures emphasize the academic authority and widespread impact of these journals within the research field.
Countries and collaborations analysis.
The analysis revealed the global research pattern for country distribution and collaboration (Chen et al. 2019 ). Figure 4A shows the network of national collaborations on older adults’ technology acceptance research. The size of the bubbles represents the amount of publications in each country, while the thickness of the connecting lines expresses the closeness of the collaboration among countries. Generally, this research subject has received extensive international attention, with China and the USA publishing far more than any other countries. China has established notable research collaborations with the USA, UK and Malaysia in this field, while other countries have collaborations, but the closeness is relatively low and scattered. Figure 4B shows the annual publication volume dynamics of the top ten countries in terms of total publications. Since 2017, China has consistently increased its annual publications, while the USA has remained relatively stable. In 2019, the volume of publications in each country increased significantly, this was largely due to the global outbreak of the COVID-19 pandemic, which has led to increased reliance on information technology among the elderly for medical consultations, online socialization, and health management (Sinha et al. 2021 ). This phenomenon has led to research advances in technology acceptance among older adults in various countries. Table 4 shows that the top ten countries account for 93.20% of the total cumulative number of publications, with each country having published more than 20 papers. Among these ten countries, all of them except China are developed countries, indicating that the research field of older adults’ technology acceptance has received general attention from developed countries. Currently, China and the USA were the leading countries in terms of publications with 111 and 104 respectively, accounting for 22.20% and 20.80%. The UK, Germany, Italy, and the Netherlands also made significant contributions. The USA and China ranked first and second in terms of the number of citations, while the Netherlands had the highest average citations, indicating the high impact and quality of its research. The UK has shown outstanding performance in international cooperation, while the USA highlights its significant academic influence in this field with the highest h-index value.
A National collaboration network. B Annual volume of publications in the top 10 countries.
Analyzing the number of publications and citations can reveal an institution’s or author’s research strength and influence in a particular research area (Kwiek 2021 ). Tables 5 and 6 show the statistics of the institutions and authors whose publication counts are in the top ten, respectively. As shown in Table 5 , higher education institutions hold the main position in this research field. Among the top ten institutions, City University of Hong Kong and The University of Hong Kong from China lead with 14 and 9 publications, respectively. City University of Hong Kong has the highest h-index, highlighting its significant influence in the field. It is worth noting that Tilburg University in the Netherlands is not among the top five in terms of publications, but the high average citation count (130.14) of its literature demonstrates the high quality of its research.
After analyzing the authors’ output using Price’s Law (Redner 1998 ), the highest number of publications among the authors counted ( n = 10) defines a publication threshold of 3 for core authors in this research area. As a result of quantitative screening, a total of 63 core authors were identified. Table 6 shows that Chen from Zhejiang University, China, Ziefle from RWTH Aachen University, Germany, and Rogers from Macquarie University, Australia, were the top three authors in terms of the number of publications, with 10, 9, and 8 articles, respectively. In terms of average citation rate, Peek and Wouters, both scholars from the Netherlands, have significantly higher rates than other scholars, with 183.2 and 152.67 respectively. This suggests that their research is of high quality and widely recognized. Additionally, Chen and Rogers have high h-indices in this field.
Research knowledge base.
Co-citation relationships occur when two documents are cited together (Zhang and Zhu 2022 ). Co-citation mapping uses references as nodes to represent the knowledge base of a subject area (Min et al. 2021). Figure 5A illustrates co-occurrence mapping in older adults’ technology acceptance research, where larger nodes signify higher co-citation frequencies. Co-citation cluster analysis can be used to explore knowledge structure and research boundaries (Hota et al. 2020 ; Shiau et al. 2023 ). The co-citation clustering mapping of older adults’ technology acceptance research literature (Fig. 5B ) shows that the Q value of the clustering result is 0.8129 (>0.3), and the average value of the weight S is 0.9391 (>0.7), indicating that the clusters are uniformly distributed with a significant and credible structure. This further proves that the boundaries of the research field are clear and there is significant differentiation in the field. The figure features 18 cluster labels, each associated with thematic color blocks corresponding to different time slices. Highlighted emerging research themes include #2 Smart Home Technology, #7 Social Live, and #10 Customer Service. Furthermore, the clustering labels extracted are primarily classified into three categories: theoretical model deepening, emerging technology applications, research methods and evaluation, as detailed in Table 7 .
A Co-citation analysis of references. B Clustering network analysis of references.
The top ten nodes in terms of co-citation frequency were selected for further analysis. Table 8 displays the corresponding node information. Studies were categorized into four main groups based on content analysis. (1) Research focusing on specific technology usage by older adults includes studies by Peek et al. ( 2014 ), Ma et al. ( 2016 ), Hoque and Sorwar ( 2017 ), and Li et al. ( 2019 ), who investigated the factors influencing the use of e-technology, smartphones, mHealth, and smart wearables, respectively. (2) Concerning the development of theoretical models of technology acceptance, Chen and Chan ( 2014 ) introduced the Senior Technology Acceptance Model (STAM), and Macedo ( 2017 ) analyzed the predictive power of UTAUT2 in explaining older adults’ intentional behaviors and information technology usage. (3) In exploring older adults’ information technology adoption and behavior, Lee and Coughlin ( 2015 ) emphasized that the adoption of technology by older adults is a multifactorial process that includes performance, price, value, usability, affordability, accessibility, technical support, social support, emotion, independence, experience, and confidence. Yusif et al. ( 2016 ) conducted a literature review examining the key barriers affecting older adults’ adoption of assistive technology, including factors such as privacy, trust, functionality/added value, cost, and stigma. (4) From the perspective of research into older adults’ technology acceptance, Mitzner et al. ( 2019 ) assessed the long-term usage of computer systems designed for the elderly, whereas Guner and Acarturk ( 2020 ) compared information technology usage and acceptance between older and younger adults. The breadth and prevalence of this literature make it a vital reference for researchers in the field, also providing new perspectives and inspiration for future research directions.
Burst citation is a node of literature that guides the sudden change in dosage, which usually represents a prominent development or major change in a particular field, with innovative and forward-looking qualities. By analyzing the emergent literature, it is often easy to understand the dynamics of the subject area, mapping the emerging thematic change (Chen et al. 2022 ). Figure 6 shows the burst citation mapping in the field of older adults’ technology acceptance research, with burst citations represented by red nodes (Fig. 6A ). For the ten papers with the highest burst intensity (Fig. 6B ), this study will conduct further analysis in conjunction with literature review.
A Burst detection of co-citation. B The top 10 references with the strongest citation bursts.
As shown in Fig. 6 , Mitzner et al. ( 2010 ) broke the stereotype that older adults are fearful of technology, found that they actually have positive attitudes toward technology, and emphasized the centrality of ease of use and usefulness in the process of technology acceptance. This finding provides an important foundation for subsequent research. During the same period, Wagner et al. ( 2010 ) conducted theory-deepening and applied research on technology acceptance among older adults. The research focused on older adults’ interactions with computers from the perspective of Social Cognitive Theory (SCT). This expanded the understanding of technology acceptance, particularly regarding the relationship between behavior, environment, and other SCT elements. In addition, Pan and Jordan-Marsh ( 2010 ) extended the TAM to examine the interactions among predictors of perceived usefulness, perceived ease of use, subjective norm, and convenience conditions when older adults use the Internet, taking into account the moderating roles of gender and age. Heerink et al. ( 2010 ) adapted and extended the UTAUT, constructed a technology acceptance model specifically designed for older users’ acceptance of assistive social agents, and validated it using controlled experiments and longitudinal data, explaining intention to use by combining functional assessment and social interaction variables.
Then the research theme shifted to an in-depth analysis of the factors influencing technology acceptance among older adults. Two papers with high burst strengths emerged during this period: Peek et al. ( 2014 ) (Strength = 12.04), Chen and Chan ( 2014 ) (Strength = 9.81). Through a systematic literature review and empirical study, Peek STM and Chen K, among others, identified multidimensional factors that influence older adults’ technology acceptance. Peek et al. ( 2014 ) analyzed literature on the acceptance of in-home care technology among older adults and identified six factors that influence their acceptance: concerns about technology, expected benefits, technology needs, technology alternatives, social influences, and older adult characteristics, with a focus on differences between pre- and post-implementation factors. Chen and Chan ( 2014 ) constructed the STAM by administering a questionnaire to 1012 older adults and adding eight important factors, including technology anxiety, self-efficacy, cognitive ability, and physical function, based on the TAM. This enriches the theoretical foundation of the field. In addition, Braun ( 2013 ) highlighted the role of perceived usefulness, trust in social networks, and frequency of Internet use in older adults’ use of social networks, while ease of use and social pressure were not significant influences. These findings contribute to the study of older adults’ technology acceptance within specific technology application domains.
Recent research has focused on empirical studies of personal factors and emerging technologies. Ma et al. ( 2016 ) identified key personal factors affecting smartphone acceptance among older adults through structured questionnaires and face-to-face interviews with 120 participants. The study found that cost, self-satisfaction, and convenience were important factors influencing perceived usefulness and ease of use. This study offers empirical evidence to comprehend the main factors that drive smartphone acceptance among Chinese older adults. Additionally, Yusif et al. ( 2016 ) presented an overview of the obstacles that hinder older adults’ acceptance of assistive technologies, focusing on privacy, trust, and functionality.
In summary, research on older adults’ technology acceptance has shifted from early theoretical deepening and analysis of influencing factors to empirical studies in the areas of personal factors and emerging technologies, which have greatly enriched the theoretical basis of older adults’ technology acceptance and provided practical guidance for the design of emerging technology products.
Core keywords analysis.
Keywords concise the main idea and core of the literature, and are a refined summary of the research content (Huang et al. 2021 ). In CiteSpace, nodes with a centrality value greater than 0.1 are considered to be critical nodes. Analyzing keywords with high frequency and centrality helps to visualize the hot topics in the research field (Park et al. 2018 ). The merged keywords were imported into CiteSpace, and the top 10 keywords were counted and sorted by frequency and centrality respectively, as shown in Table 9 . The results show that the keyword “TAM” has the highest frequency (92), followed by “UTAUT” (24), which reflects that the in-depth study of the existing technology acceptance model and its theoretical expansion occupy a central position in research related to older adults’ technology acceptance. Furthermore, the terms ‘assistive technology’ and ‘virtual reality’ are both high-frequency and high-centrality terms (frequency = 17, centrality = 0.10), indicating that the research on assistive technology and virtual reality for older adults is the focus of current academic attention.
Using VOSviewer for keyword co-occurrence analysis organizes keywords into groups or clusters based on their intrinsic connections and frequencies, clearly highlighting the research field’s hot topics. The connectivity among keywords reveals correlations between different topics. To ensure accuracy, the analysis only considered the authors’ keywords. Subsequently, the keywords were filtered by setting the keyword frequency to 5 to obtain the keyword clustering map of the research on older adults’ technology acceptance research keyword clustering mapping (Fig. 7 ), combined with the keyword co-occurrence clustering network (Fig. 7A ) and the corresponding density situation (Fig. 7B ) to make a detailed analysis of the following four groups of clustered themes.
A Co-occurrence clustering network. B Keyword density.
Cluster #1—Research on the factors influencing technology adoption among older adults is a prominent topic, covering age, gender, self-efficacy, attitude, and and intention to use (Berkowsky et al. 2017 ; Wang et al. 2017 ). It also examined older adults’ attitudes towards and acceptance of digital health technologies (Ahmad and Mozelius, 2022 ). Moreover, the COVID-19 pandemic, significantly impacting older adults’ technology attitudes and usage, has underscored the study’s importance and urgency. Therefore, it is crucial to conduct in-depth studies on how older adults accept, adopt, and effectively use new technologies, to address their needs and help them overcome the digital divide within digital inclusion. This will improve their quality of life and healthcare experiences.
Cluster #2—Research focuses on how older adults interact with assistive technologies, especially assistive robots and health monitoring devices, emphasizing trust, usability, and user experience as crucial factors (Halim et al. 2022 ). Moreover, health monitoring technologies effectively track and manage health issues common in older adults, like dementia and mild cognitive impairment (Lussier et al. 2018 ; Piau et al. 2019 ). Interactive exercise games and virtual reality have been deployed to encourage more physical and cognitive engagement among older adults (Campo-Prieto et al. 2021 ). Personalized and innovative technology significantly enhances older adults’ participation, improving their health and well-being.
Cluster #3—Optimizing health management for older adults using mobile technology. With the development of mobile health (mHealth) and health information technology, mobile applications, smartphones, and smart wearable devices have become effective tools to help older users better manage chronic conditions, conduct real-time health monitoring, and even receive telehealth services (Dupuis and Tsotsos 2018 ; Olmedo-Aguirre et al. 2022 ; Kim et al. 2014 ). Additionally, these technologies can mitigate the problem of healthcare resource inequality, especially in developing countries. Older adults’ acceptance and use of these technologies are significantly influenced by their behavioral intentions, motivational factors, and self-management skills. These internal motivational factors, along with external factors, jointly affect older adults’ performance in health management and quality of life.
Cluster #4—Research on technology-assisted home care for older adults is gaining popularity. Environmentally assisted living enhances older adults’ independence and comfort at home, offering essential support and security. This has a crucial impact on promoting healthy aging (Friesen et al. 2016 ; Wahlroos et al. 2023 ). The smart home is a core application in this field, providing a range of solutions that facilitate independent living for the elderly in a highly integrated and user-friendly manner. This fulfills different dimensions of living and health needs (Majumder et al. 2017 ). Moreover, eHealth offers accurate and personalized health management and healthcare services for older adults (Delmastro et al. 2018 ), ensuring their needs are met at home. Research in this field often employs qualitative methods and structural equation modeling to fully understand older adults’ needs and experiences at home and analyze factors influencing technology adoption.
To gain a deeper understanding of the evolutionary trends in research hotspots within the field of older adults’ technology acceptance, we conducted a statistical analysis of the average appearance times of keywords, using CiteSpace to generate the time-zone evolution mapping (Fig. 8 ) and burst keywords. The time-zone mapping visually displays the evolution of keywords over time, intuitively reflecting the frequency and initial appearance of keywords in research, commonly used to identify trends in research topics (Jing et al. 2024a ; Kumar et al. 2021 ). Table 10 lists the top 15 keywords by burst strength, with the red sections indicating high-frequency citations and their burst strength in specific years. These burst keywords reveal the focus and trends of research themes over different periods (Kleinberg 2002 ). Combining insights from the time-zone mapping and burst keywords provides more objective and accurate research insights (Wang et al. 2023b ).
Reflecting the frequency and time of first appearance of keywords in the study.
An integrated analysis of Fig. 8 and Table 10 shows that early research on older adults’ technology acceptance primarily focused on factors such as perceived usefulness, ease of use, and attitudes towards information technology, including their use of computers and the internet (Pan and Jordan-Marsh 2010 ), as well as differences in technology use between older adults and other age groups (Guner and Acarturk 2020 ). Subsequently, the research focus expanded to improving the quality of life for older adults, exploring how technology can optimize health management and enhance the possibility of independent living, emphasizing the significant role of technology in improving the quality of life for the elderly. With ongoing technological advancements, recent research has shifted towards areas such as “virtual reality,” “telehealth,” and “human-robot interaction,” with a focus on the user experience of older adults (Halim et al. 2022 ). The appearance of keywords such as “physical activity” and “exercise” highlights the value of technology in promoting physical activity and health among older adults. This phase of research tends to make cutting-edge technology genuinely serve the practical needs of older adults, achieving its widespread application in daily life. Additionally, research has focused on expanding and quantifying theoretical models of older adults’ technology acceptance, involving keywords such as “perceived risk”, “validation” and “UTAUT”.
In summary, from 2013 to 2023, the field of older adults’ technology acceptance has evolved from initial explorations of influencing factors, to comprehensive enhancements in quality of life and health management, and further to the application and deepening of theoretical models and cutting-edge technologies. This research not only reflects the diversity and complexity of the field but also demonstrates a comprehensive and in-depth understanding of older adults’ interactions with technology across various life scenarios and needs.
To reveal the distribution of research quality in the field of older adults’ technology acceptance, a strategic diagram analysis is employed to calculate and illustrate the internal development and interrelationships among various research themes (Xie et al. 2020 ). The strategic diagram uses Centrality as the X-axis and Density as the Y-axis to divide into four quadrants, where the X-axis represents the strength of the connection between thematic clusters and other themes, with higher values indicating a central position in the research field; the Y-axis indicates the level of development within the thematic clusters, with higher values denoting a more mature and widely recognized field (Li and Zhou 2020 ).
Through cluster analysis and manual verification, this study categorized 61 core keywords (Frequency ≥5) into 11 thematic clusters. Subsequently, based on the keywords covered by each thematic cluster, the research themes and their directions for each cluster were summarized (Table 11 ), and the centrality and density coordinates for each cluster were precisely calculated (Table 12 ). Finally, a strategic diagram of the older adults’ technology acceptance research field was constructed (Fig. 9 ). Based on the distribution of thematic clusters across the quadrants in the strategic diagram, the structure and developmental trends of the field were interpreted.
Classification and visualization of theme clusters based on density and centrality.
As illustrated in Fig. 9 , (1) the theme clusters of #3 Usage Experience and #4 Assisted Living Technology are in the first quadrant, characterized by high centrality and density. Their internal cohesion and close links with other themes indicate their mature development, systematic research content or directions have been formed, and they have a significant influence on other themes. These themes play a central role in the field of older adults’ technology acceptance and have promising prospects. (2) The theme clusters of #6 Smart Devices, #9 Theoretical Models, and #10 Mobile Health Applications are in the second quadrant, with higher density but lower centrality. These themes have strong internal connections but weaker external links, indicating that these three themes have received widespread attention from researchers and have been the subject of related research, but more as self-contained systems and exhibit independence. Therefore, future research should further explore in-depth cooperation and cross-application with other themes. (3) The theme clusters of #7 Human-Robot Interaction, #8 Characteristics of the Elderly, and #11 Research Methods are in the third quadrant, with lower centrality and density. These themes are loosely connected internally and have weak links with others, indicating their developmental immaturity. Compared to other topics, they belong to the lower attention edge and niche themes, and there is a need for further investigation. (4) The theme clusters of #1 Digital Healthcare Technology, #2 Psychological Factors, and #5 Socio-Cultural Factors are located in the fourth quadrant, with high centrality but low density. Although closely associated with other research themes, the internal cohesion within these clusters is relatively weak. This suggests that while these themes are closely linked to other research areas, their own development remains underdeveloped, indicating a core immaturity. Nevertheless, these themes are crucial within the research domain of elderly technology acceptance and possess significant potential for future exploration.
Over the past decade, academic interest and influence in the area of older adults’ technology acceptance have significantly increased. This trend is evidenced by a quantitative analysis of publication and citation volumes, particularly noticeable in 2019 and 2022, where there was a substantial rise in both metrics. The rise is closely linked to the widespread adoption of emerging technologies such as smart homes, wearable devices, and telemedicine among older adults. While these technologies have enhanced their quality of life, they also pose numerous challenges, sparking extensive research into their acceptance, usage behaviors, and influencing factors among the older adults (Pirzada et al. 2022 ; Garcia Reyes et al. 2023 ). Furthermore, the COVID-19 pandemic led to a surge in technology demand among older adults, especially in areas like medical consultation, online socialization, and health management, further highlighting the importance and challenges of technology. Health risks and social isolation have compelled older adults to rely on technology for daily activities, accelerating its adoption and application within this demographic. This phenomenon has made technology acceptance a critical issue, driving societal and academic focus on the study of technology acceptance among older adults.
The flow of knowledge at the level of high-output disciplines and journals, along with the primary publishing outlets, indicates the highly interdisciplinary nature of research into older adults’ technology acceptance. This reflects the complexity and breadth of issues related to older adults’ technology acceptance, necessitating the integration of multidisciplinary knowledge and approaches. Currently, research is primarily focused on medical health and human-computer interaction, demonstrating academic interest in improving health and quality of life for older adults and addressing the urgent needs related to their interactions with technology. In the field of medical health, research aims to provide advanced and innovative healthcare technologies and services to meet the challenges of an aging population while improving the quality of life for older adults (Abdi et al. 2020 ; Wilson et al. 2021 ). In the field of human-computer interaction, research is focused on developing smarter and more user-friendly interaction models to meet the needs of older adults in the digital age, enabling them to actively participate in social activities and enjoy a higher quality of life (Sayago, 2019 ). These studies are crucial for addressing the challenges faced by aging societies, providing increased support and opportunities for the health, welfare, and social participation of older adults.
This study analyzes leading countries and collaboration networks, core institutions and authors, revealing the global research landscape and distribution of research strength in the field of older adults’ technology acceptance, and presents quantitative data on global research trends. From the analysis of country distribution and collaborations, China and the USA hold dominant positions in this field, with developed countries like the UK, Germany, Italy, and the Netherlands also excelling in international cooperation and research influence. The significant investment in technological research and the focus on the technological needs of older adults by many developed countries reflect their rapidly aging societies, policy support, and resource allocation.
China is the only developing country that has become a major contributor in this field, indicating its growing research capabilities and high priority given to aging societies and technological innovation. Additionally, China has close collaborations with countries such as USA, the UK, and Malaysia, driven not only by technological research needs but also by shared challenges and complementarities in aging issues among these nations. For instance, the UK has extensive experience in social welfare and aging research, providing valuable theoretical guidance and practical experience. International collaborations, aimed at addressing the challenges of aging, integrate the strengths of various countries, advancing in-depth and widespread development in the research of technology acceptance among older adults.
At the institutional and author level, City University of Hong Kong leads in publication volume, with research teams led by Chan and Chen demonstrating significant academic activity and contributions. Their research primarily focuses on older adults’ acceptance and usage behaviors of various technologies, including smartphones, smart wearables, and social robots (Chen et al. 2015 ; Li et al. 2019 ; Ma et al. 2016 ). These studies, targeting specific needs and product characteristics of older adults, have developed new models of technology acceptance based on existing frameworks, enhancing the integration of these technologies into their daily lives and laying a foundation for further advancements in the field. Although Tilburg University has a smaller publication output, it holds significant influence in the field of older adults’ technology acceptance. Particularly, the high citation rate of Peek’s studies highlights their excellence in research. Peek extensively explored older adults’ acceptance and usage of home care technologies, revealing the complexity and dynamics of their technology use behaviors. His research spans from identifying systemic influencing factors (Peek et al. 2014 ; Peek et al. 2016 ), emphasizing familial impacts (Luijkx et al. 2015 ), to constructing comprehensive models (Peek et al. 2017 ), and examining the dynamics of long-term usage (Peek et al. 2019 ), fully reflecting the evolving technology landscape and the changing needs of older adults. Additionally, the ongoing contributions of researchers like Ziefle, Rogers, and Wouters in the field of older adults’ technology acceptance demonstrate their research influence and leadership. These researchers have significantly enriched the knowledge base in this area with their diverse perspectives. For instance, Ziefle has uncovered the complex attitudes of older adults towards technology usage, especially the trade-offs between privacy and security, and how different types of activities affect their privacy needs (Maidhof et al. 2023 ; Mujirishvili et al. 2023 ; Schomakers and Ziefle 2023 ; Wilkowska et al. 2022 ), reflecting a deep exploration and ongoing innovation in the field of older adults’ technology acceptance.
Through co-citation analysis and systematic review of seminal literature, this study reveals the knowledge foundation and thematic progress in the field of older adults’ technology acceptance. Co-citation networks and cluster analyses illustrate the structural themes of the research, delineating the differentiation and boundaries within this field. Additionally, burst detection analysis offers a valuable perspective for understanding the thematic evolution in the field of technology acceptance among older adults. The development and innovation of theoretical models are foundational to this research. Researchers enhance the explanatory power of constructed models by deepening and expanding existing technology acceptance theories to address theoretical limitations. For instance, Heerink et al. ( 2010 ) modified and expanded the UTAUT model by integrating functional assessment and social interaction variables to create the almere model. This model significantly enhances the ability to explain the intentions of older users in utilizing assistive social agents and improves the explanation of actual usage behaviors. Additionally, Chen and Chan ( 2014 ) extended the TAM to include age-related health and capability features of older adults, creating the STAM, which substantially improves predictions of older adults’ technology usage behaviors. Personal attributes, health and capability features, and facilitating conditions have a direct impact on technology acceptance. These factors more effectively predict older adults’ technology usage behaviors than traditional attitudinal factors.
With the advancement of technology and the application of emerging technologies, new research topics have emerged, increasingly focusing on older adults’ acceptance and use of these technologies. Prior to this, the study by Mitzner et al. ( 2010 ) challenged the stereotype of older adults’ conservative attitudes towards technology, highlighting the central roles of usability and usefulness in the technology acceptance process. This discovery laid an important foundation for subsequent research. Research fields such as “smart home technology,” “social life,” and “customer service” are emerging, indicating a shift in focus towards the practical and social applications of technology in older adults’ lives. Research not only focuses on the technology itself but also on how these technologies integrate into older adults’ daily lives and how they can improve the quality of life through technology. For instance, studies such as those by Ma et al. ( 2016 ), Hoque and Sorwar ( 2017 ), and Li et al. ( 2019 ) have explored factors influencing older adults’ use of smartphones, mHealth, and smart wearable devices.
Furthermore, the diversification of research methodologies and innovation in evaluation techniques, such as the use of mixed methods, structural equation modeling (SEM), and neural network (NN) approaches, have enhanced the rigor and reliability of the findings, enabling more precise identification of the factors and mechanisms influencing technology acceptance. Talukder et al. ( 2020 ) employed an effective multimethodological strategy by integrating SEM and NN to leverage the complementary strengths of both approaches, thus overcoming their individual limitations and more accurately analyzing and predicting older adults’ acceptance of wearable health technologies (WHT). SEM is utilized to assess the determinants’ impact on the adoption of WHT, while neural network models validate SEM outcomes and predict the significance of key determinants. This combined approach not only boosts the models’ reliability and explanatory power but also provides a nuanced understanding of the motivations and barriers behind older adults’ acceptance of WHT, offering deep research insights.
Overall, co-citation analysis of the literature in the field of older adults’ technology acceptance has uncovered deeper theoretical modeling and empirical studies on emerging technologies, while emphasizing the importance of research methodological and evaluation innovations in understanding complex social science issues. These findings are crucial for guiding the design and marketing strategies of future technology products, especially in the rapidly growing market of older adults.
By analyzing core keywords, we can gain deep insights into the hot topics, evolutionary trends, and quality distribution of research in the field of older adults’ technology acceptance. The frequent occurrence of the keywords “TAM” and “UTAUT” indicates that the applicability and theoretical extension of existing technology acceptance models among older adults remain a focal point in academia. This phenomenon underscores the enduring influence of the studies by Davis ( 1989 ) and Venkatesh et al. ( 2003 ), whose models provide a robust theoretical framework for explaining and predicting older adults’ acceptance and usage of emerging technologies. With the widespread application of artificial intelligence (AI) and big data technologies, these theoretical models have incorporated new variables such as perceived risk, trust, and privacy issues (Amin et al. 2024 ; Chen et al. 2024 ; Jing et al. 2024b ; Seibert et al. 2021 ; Wang et al. 2024b ), advancing the theoretical depth and empirical research in this field.
Keyword co-occurrence cluster analysis has revealed multiple research hotspots in the field, including factors influencing technology adoption, interactive experiences between older adults and assistive technologies, the application of mobile health technology in health management, and technology-assisted home care. These studies primarily focus on enhancing the quality of life and health management of older adults through emerging technologies, particularly in the areas of ambient assisted living, smart health monitoring, and intelligent medical care. In these domains, the role of AI technology is increasingly significant (Qian et al. 2021 ; Ho 2020 ). With the evolution of next-generation information technologies, AI is increasingly integrated into elder care systems, offering intelligent, efficient, and personalized service solutions by analyzing the lifestyles and health conditions of older adults. This integration aims to enhance older adults’ quality of life in aspects such as health monitoring and alerts, rehabilitation assistance, daily health management, and emotional support (Lee et al. 2023 ). A survey indicates that 83% of older adults prefer AI-driven solutions when selecting smart products, demonstrating the increasing acceptance of AI in elder care (Zhao and Li 2024 ). Integrating AI into elder care presents both opportunities and challenges, particularly in terms of user acceptance, trust, and long-term usage effects, which warrant further exploration (Mhlanga 2023 ). These studies will help better understand the profound impact of AI technology on the lifestyles of older adults and provide critical references for optimizing AI-driven elder care services.
The Time-zone evolution mapping and burst keyword analysis further reveal the evolutionary trends of research hotspots. Early studies focused on basic technology acceptance models and user perceptions, later expanding to include quality of life and health management. In recent years, research has increasingly focused on cutting-edge technologies such as virtual reality, telehealth, and human-robot interaction, with a concurrent emphasis on the user experience of older adults. This evolutionary process demonstrates a deepening shift from theoretical models to practical applications, underscoring the significant role of technology in enhancing the quality of life for older adults. Furthermore, the strategic coordinate mapping analysis clearly demonstrates the development and mutual influence of different research themes. High centrality and density in the themes of Usage Experience and Assisted Living Technology indicate their mature research status and significant impact on other themes. The themes of Smart Devices, Theoretical Models, and Mobile Health Applications demonstrate self-contained research trends. The themes of Human-Robot Interaction, Characteristics of the Elderly, and Research Methods are not yet mature, but they hold potential for development. Themes of Digital Healthcare Technology, Psychological Factors, and Socio-Cultural Factors are closely related to other themes, displaying core immaturity but significant potential.
In summary, the research hotspots in the field of older adults’ technology acceptance are diverse and dynamic, demonstrating the academic community’s profound understanding of how older adults interact with technology across various life contexts and needs. Under the influence of AI and big data, research should continue to focus on the application of emerging technologies among older adults, exploring in depth how they adapt to and effectively use these technologies. This not only enhances the quality of life and healthcare experiences for older adults but also drives ongoing innovation and development in this field.
Based on the above research findings, to further understand and promote technology acceptance and usage among older adults, we recommend future studies focus on refining theoretical models, exploring long-term usage, and assessing user experience in the following detailed aspects:
Refinement and validation of specific technology acceptance models for older adults: Future research should focus on developing and validating technology acceptance models based on individual characteristics, particularly considering variations in technology acceptance among older adults across different educational levels and cultural backgrounds. This includes factors such as age, gender, educational background, and cultural differences. Additionally, research should examine how well specific technologies, such as wearable devices and mobile health applications, meet the needs of older adults. Building on existing theoretical models, this research should integrate insights from multiple disciplines such as psychology, sociology, design, and engineering through interdisciplinary collaboration to create more accurate and comprehensive models, which should then be validated in relevant contexts.
Deepening the exploration of the relationship between long-term technology use and quality of life among older adults: The acceptance and use of technology by users is a complex and dynamic process (Seuwou et al. 2016 ). Existing research predominantly focuses on older adults’ initial acceptance or short-term use of new technologies; however, the impact of long-term use on their quality of life and health is more significant. Future research should focus on the evolution of older adults’ experiences and needs during long-term technology usage, and the enduring effects of technology on their social interactions, mental health, and life satisfaction. Through longitudinal studies and qualitative analysis, this research reveals the specific needs and challenges of older adults in long-term technology use, providing a basis for developing technologies and strategies that better meet their requirements. This understanding aids in comprehensively assessing the impact of technology on older adults’ quality of life and guiding the optimization and improvement of technological products.
Evaluating the Importance of User Experience in Research on Older Adults’ Technology Acceptance: Understanding the mechanisms of information technology acceptance and use is central to human-computer interaction research. Although technology acceptance models and user experience models differ in objectives, they share many potential intersections. Technology acceptance research focuses on structured prediction and assessment, while user experience research concentrates on interpreting design impacts and new frameworks. Integrating user experience to assess older adults’ acceptance of technology products and systems is crucial (Codfrey et al. 2022 ; Wang et al. 2019 ), particularly for older users, where specific product designs should emphasize practicality and usability (Fisk et al. 2020 ). Researchers need to explore innovative age-appropriate design methods to enhance older adults’ usage experience. This includes studying older users’ actual usage preferences and behaviors, optimizing user interfaces, and interaction designs. Integrating feedback from older adults to tailor products to their needs can further promote their acceptance and continued use of technology products.
This study conducted a systematic review of the literature on older adults’ technology acceptance over the past decade through bibliometric analysis, focusing on the distribution power, research power, knowledge base and theme progress, research hotspots, evolutionary trends, and quality distribution. Using a combination of quantitative and qualitative methods, this study has reached the following conclusions:
Technology acceptance among older adults has become a hot topic in the international academic community, involving the integration of knowledge across multiple disciplines, including Medical Informatics, Health Care Sciences Services, and Ergonomics. In terms of journals, “PSYCHOLOGY, EDUCATION, HEALTH” represents a leading field, with key publications including Computers in Human Behavior , Journal of Medical Internet Research , and International Journal of Human-Computer Interaction . These journals possess significant academic authority and extensive influence in the field.
Research on technology acceptance among older adults is particularly active in developed countries, with China and USA publishing significantly more than other nations. The Netherlands leads in high average citation rates, indicating the depth and impact of its research. Meanwhile, the UK stands out in terms of international collaboration. At the institutional level, City University of Hong Kong and The University of Hong Kong in China are in leading positions. Tilburg University in the Netherlands demonstrates exceptional research quality through its high average citation count. At the author level, Chen from China has the highest number of publications, while Peek from the Netherlands has the highest average citation count.
Co-citation analysis of references indicates that the knowledge base in this field is divided into three main categories: theoretical model deepening, emerging technology applications, and research methods and evaluation. Seminal literature focuses on four areas: specific technology use by older adults, expansion of theoretical models of technology acceptance, information technology adoption behavior, and research perspectives. Research themes have evolved from initial theoretical deepening and analysis of influencing factors to empirical studies on individual factors and emerging technologies.
Keyword analysis indicates that TAM and UTAUT are the most frequently occurring terms, while “assistive technology” and “virtual reality” are focal points with high frequency and centrality. Keyword clustering analysis reveals that research hotspots are concentrated on the influencing factors of technology adoption, human-robot interaction experiences, mobile health management, and technology for aging in place. Time-zone evolution mapping and burst keyword analysis have revealed the research evolution from preliminary exploration of influencing factors, to enhancements in quality of life and health management, and onto advanced technology applications and deepening of theoretical models. Furthermore, analysis of research quality distribution indicates that Usage Experience and Assisted Living Technology have become core topics, while Smart Devices, Theoretical Models, and Mobile Health Applications point towards future research directions.
Through this study, we have systematically reviewed the dynamics, core issues, and evolutionary trends in the field of older adults’ technology acceptance, constructing a comprehensive Knowledge Mapping of the domain and presenting a clear framework of existing research. This not only lays the foundation for subsequent theoretical discussions and innovative applications in the field but also provides an important reference for relevant scholars.
To our knowledge, this is the first bibliometric analysis concerning technology acceptance among older adults, and we adhered strictly to bibliometric standards throughout our research. However, this study relies on the Web of Science Core Collection, and while its authority and breadth are widely recognized, this choice may have missed relevant literature published in other significant databases such as PubMed, Scopus, and Google Scholar, potentially overlooking some critical academic contributions. Moreover, given that our analysis was confined to literature in English, it may not reflect studies published in other languages, somewhat limiting the global representativeness of our data sample.
It is noteworthy that with the rapid development of AI technology, its increasingly widespread application in elderly care services is significantly transforming traditional care models. AI is profoundly altering the lifestyles of the elderly, from health monitoring and smart diagnostics to intelligent home systems and personalized care, significantly enhancing their quality of life and health care standards. The potential for AI technology within the elderly population is immense, and research in this area is rapidly expanding. However, due to the restrictive nature of the search terms used in this study, it did not fully cover research in this critical area, particularly in addressing key issues such as trust, privacy, and ethics.
Consequently, future research should not only expand data sources, incorporating multilingual and multidatabase literature, but also particularly focus on exploring older adults’ acceptance of AI technology and its applications, in order to construct a more comprehensive academic landscape of older adults’ technology acceptance, thereby enriching and extending the knowledge system and academic trends in this field.
The datasets analyzed during the current study are available in the Dataverse repository: https://doi.org/10.7910/DVN/6K0GJH .
Abdi S, de Witte L, Hawley M (2020) Emerging technologies with potential care and support applications for older people: review of gray literature. JMIR Aging 3(2):e17286. https://doi.org/10.2196/17286
Article PubMed PubMed Central Google Scholar
Achuthan K, Nair VK, Kowalski R, Ramanathan S, Raman R (2023) Cyberbullying research—Alignment to sustainable development and impact of COVID-19: Bibliometrics and science mapping analysis. Comput Human Behav 140:107566. https://doi.org/10.1016/j.chb.2022.107566
Article Google Scholar
Ahmad A, Mozelius P (2022) Human-Computer Interaction for Older Adults: a Literature Review on Technology Acceptance of eHealth Systems. J Eng Res Sci 1(4):119–126. https://doi.org/10.55708/js0104014
Ale Ebrahim N, Salehi H, Embi MA, Habibi F, Gholizadeh H, Motahar SM (2014) Visibility and citation impact. Int Educ Stud 7(4):120–125. https://doi.org/10.5539/ies.v7n4p120
Amin MS, Johnson VL, Prybutok V, Koh CE (2024) An investigation into factors affecting the willingness to disclose personal health information when using AI-enabled caregiver robots. Ind Manag Data Syst 124(4):1677–1699. https://doi.org/10.1108/IMDS-09-2023-0608
Baer NR, Vietzke J, Schenk L (2022) Middle-aged and older adults’ acceptance of mobile nutrition and fitness apps: a systematic mixed studies review. PLoS One 17(12):e0278879. https://doi.org/10.1371/journal.pone.0278879
Article PubMed PubMed Central CAS Google Scholar
Barnard Y, Bradley MD, Hodgson F, Lloyd AD (2013) Learning to use new technologies by older adults: Perceived difficulties, experimentation behaviour and usability. Comput Human Behav 29(4):1715–1724. https://doi.org/10.1016/j.chb.2013.02.006
Berkowsky RW, Sharit J, Czaja SJ (2017) Factors predicting decisions about technology adoption among older adults. Innov Aging 3(1):igy002. https://doi.org/10.1093/geroni/igy002
Braun MT (2013) Obstacles to social networking website use among older adults. Comput Human Behav 29(3):673–680. https://doi.org/10.1016/j.chb.2012.12.004
Article MathSciNet Google Scholar
Campo-Prieto P, Rodríguez-Fuentes G, Cancela-Carral JM (2021) Immersive virtual reality exergame promotes the practice of physical activity in older people: An opportunity during COVID-19. Multimodal Technol Interact 5(9):52. https://doi.org/10.3390/mti5090052
Chen C (2006) CiteSpace II: Detecting and visualizing emerging trends and transient patterns in scientific literature. J Am Soc Inf Sci Technol 57(3):359–377. https://doi.org/10.1002/asi.20317
Chen C, Dubin R, Kim MC (2014) Emerging trends and new developments in regenerative medicine: a scientometric update (2000–2014). Expert Opin Biol Ther 14(9):1295–1317. https://doi.org/10.1517/14712598.2014.920813
Article PubMed Google Scholar
Chen C, Leydesdorff L (2014) Patterns of connections and movements in dual‐map overlays: A new method of publication portfolio analysis. J Assoc Inf Sci Technol 65(2):334–351. https://doi.org/10.1002/asi.22968
Chen J, Wang C, Tang Y (2022) Knowledge mapping of volunteer motivation: A bibliometric analysis and cross-cultural comparative study. Front Psychol 13:883150. https://doi.org/10.3389/fpsyg.2022.883150
Chen JY, Liu YD, Dai J, Wang CL (2023) Development and status of moral education research: Visual analysis based on knowledge graph. Front Psychol 13:1079955. https://doi.org/10.3389/fpsyg.2022.1079955
Chen K, Chan AH (2011) A review of technology acceptance by older adults. Gerontechnology 10(1):1–12. https://doi.org/10.4017/gt.2011.10.01.006.00
Chen K, Chan AH (2014) Gerontechnology acceptance by elderly Hong Kong Chinese: a senior technology acceptance model (STAM). Ergonomics 57(5):635–652. https://doi.org/10.1080/00140139.2014.895855
Chen K, Zhang Y, Fu X (2019) International research collaboration: An emerging domain of innovation studies? Res Policy 48(1):149–168. https://doi.org/10.1016/j.respol.2018.08.005
Article CAS Google Scholar
Chen X, Hu Z, Wang C (2024) Empowering education development through AIGC: A systematic literature review. Educ Inf Technol 1–53. https://doi.org/10.1007/s10639-024-12549-7
Chen Y, Chen CM, Liu ZY, Hu ZG, Wang XW (2015) The methodology function of CiteSpace mapping knowledge domains. Stud Sci Sci 33(2):242–253. https://doi.org/10.16192/j.cnki.1003-2053.2015.02.009
Codfrey GS, Baharum A, Zain NHM, Omar M, Deris FD (2022) User Experience in Product Design and Development: Perspectives and Strategies. Math Stat Eng Appl 71(2):257–262. https://doi.org/10.17762/msea.v71i2.83
Dai J, Zhang X, Wang CL (2024) A meta-analysis of learners’ continuance intention toward online education platforms. Educ Inf Technol 1–36. https://doi.org/10.1007/s10639-024-12654-7
Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319–340. https://doi.org/10.2307/249008
Delmastro F, Dolciotti C, Palumbo F, Magrini M, Di Martino F, La Rosa D, Barcaro U (2018) Long-term care: how to improve the quality of life with mobile and e-health services. In 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 12–19. IEEE. https://doi.org/10.1109/WiMOB.2018.8589157
Dupuis K, Tsotsos LE (2018) Technology for remote health monitoring in an older population: a role for mobile devices. Multimodal Technol Interact 2(3):43. https://doi.org/10.3390/mti2030043
Ferguson C, Hickman LD, Turkmani S, Breen P, Gargiulo G, Inglis SC (2021) Wearables only work on patients that wear them”: Barriers and facilitators to the adoption of wearable cardiac monitoring technologies. Cardiovasc Digit Health J 2(2):137–147. https://doi.org/10.1016/j.cvdhj.2021.02.001
Fisk AD, Czaja SJ, Rogers WA, Charness N, Sharit J (2020) Designing for older adults: Principles and creative human factors approaches. CRC Press. https://doi.org/10.1201/9781420080681
Friesen S, Brémault-Phillips S, Rudrum L, Rogers LG (2016) Environmental design that supports healthy aging: Evaluating a new supportive living facility. J Hous Elderly 30(1):18–34. https://doi.org/10.1080/02763893.2015.1129380
Garcia Reyes EP, Kelly R, Buchanan G, Waycott J (2023) Understanding Older Adults’ Experiences With Technologies for Health Self-management: Interview Study. JMIR Aging 6:e43197. https://doi.org/10.2196/43197
Geng Z, Wang J, Liu J, Miao J (2024) Bibliometric analysis of the development, current status, and trends in adult degenerative scoliosis research: A systematic review from 1998 to 2023. J Pain Res 17:153–169. https://doi.org/10.2147/JPR.S437575
González A, Ramírez MP, Viadel V (2012) Attitudes of the elderly toward information and communications technologies. Educ Gerontol 38(9):585–594. https://doi.org/10.1080/03601277.2011.595314
Guner H, Acarturk C (2020) The use and acceptance of ICT by senior citizens: a comparison of technology acceptance model (TAM) for elderly and young adults. Univ Access Inf Soc 19(2):311–330. https://doi.org/10.1007/s10209-018-0642-4
Halim I, Saptari A, Perumal PA, Abdullah Z, Abdullah S, Muhammad MN (2022) A Review on Usability and User Experience of Assistive Social Robots for Older Persons. Int J Integr Eng 14(6):102–124. https://penerbit.uthm.edu.my/ojs/index.php/ijie/article/view/8566
He Y, He Q, Liu Q (2022) Technology acceptance in socially assistive robots: Scoping review of models, measurement, and influencing factors. J Healthc Eng 2022(1):6334732. https://doi.org/10.1155/2022/6334732
Heerink M, Kröse B, Evers V, Wielinga B (2010) Assessing acceptance of assistive social agent technology by older adults: the almere model. Int J Soc Robot 2:361–375. https://doi.org/10.1007/s12369-010-0068-5
Ho A (2020) Are we ready for artificial intelligence health monitoring in elder care? BMC Geriatr 20(1):358. https://doi.org/10.1186/s12877-020-01764-9
Hoque R, Sorwar G (2017) Understanding factors influencing the adoption of mHealth by the elderly: An extension of the UTAUT model. Int J Med Inform 101:75–84. https://doi.org/10.1016/j.ijmedinf.2017.02.002
Hota PK, Subramanian B, Narayanamurthy G (2020) Mapping the intellectual structure of social entrepreneurship research: A citation/co-citation analysis. J Bus Ethics 166(1):89–114. https://doi.org/10.1007/s10551-019-04129-4
Huang R, Yan P, Yang X (2021) Knowledge map visualization of technology hotspots and development trends in China’s textile manufacturing industry. IET Collab Intell Manuf 3(3):243–251. https://doi.org/10.1049/cim2.12024
Article ADS Google Scholar
Jing Y, Wang C, Chen Y, Wang H, Yu T, Shadiev R (2023) Bibliometric mapping techniques in educational technology research: A systematic literature review. Educ Inf Technol 1–29. https://doi.org/10.1007/s10639-023-12178-6
Jing YH, Wang CL, Chen ZY, Shen SS, Shadiev R (2024a) A Bibliometric Analysis of Studies on Technology-Supported Learning Environments: Hotopics and Frontier Evolution. J Comput Assist Learn 1–16. https://doi.org/10.1111/jcal.12934
Jing YH, Wang HM, Chen XJ, Wang CL (2024b) What factors will affect the effectiveness of using ChatGPT to solve programming problems? A quasi-experimental study. Humanit Soc Sci Commun 11:319. https://doi.org/10.1057/s41599-024-02751-w
Kamrani P, Dorsch I, Stock WG (2021) Do researchers know what the h-index is? And how do they estimate its importance? Scientometrics 126(7):5489–5508. https://doi.org/10.1007/s11192-021-03968-1
Kim HS, Lee KH, Kim H, Kim JH (2014) Using mobile phones in healthcare management for the elderly. Maturitas 79(4):381–388. https://doi.org/10.1016/j.maturitas.2014.08.013
Article MathSciNet PubMed Google Scholar
Kleinberg J (2002) Bursty and hierarchical structure in streams. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 91–101. https://doi.org/10.1145/775047.775061
Kruse C, Fohn J, Wilson N, Patlan EN, Zipp S, Mileski M (2020) Utilization barriers and medical outcomes commensurate with the use of telehealth among older adults: systematic review. JMIR Med Inform 8(8):e20359. https://doi.org/10.2196/20359
Kumar S, Lim WM, Pandey N, Christopher Westland J (2021) 20 years of electronic commerce research. Electron Commer Res 21:1–40. https://doi.org/10.1007/s10660-021-09464-1
Kwiek M (2021) What large-scale publication and citation data tell us about international research collaboration in Europe: Changing national patterns in global contexts. Stud High Educ 46(12):2629–2649. https://doi.org/10.1080/03075079.2020.1749254
Lee C, Coughlin JF (2015) PERSPECTIVE: Older adults’ adoption of technology: an integrated approach to identifying determinants and barriers. J Prod Innov Manag 32(5):747–759. https://doi.org/10.1111/jpim.12176
Lee CH, Wang C, Fan X, Li F, Chen CH (2023) Artificial intelligence-enabled digital transformation in elderly healthcare field: scoping review. Adv Eng Inform 55:101874. https://doi.org/10.1016/j.aei.2023.101874
Leydesdorff L, Rafols I (2012) Interactive overlays: A new method for generating global journal maps from Web-of-Science data. J Informetr 6(2):318–332. https://doi.org/10.1016/j.joi.2011.11.003
Li J, Ma Q, Chan AH, Man S (2019) Health monitoring through wearable technologies for older adults: Smart wearables acceptance model. Appl Ergon 75:162–169. https://doi.org/10.1016/j.apergo.2018.10.006
Article ADS PubMed Google Scholar
Li X, Zhou D (2020) Product design requirement information visualization approach for intelligent manufacturing services. China Mech Eng 31(07):871, http://www.cmemo.org.cn/EN/Y2020/V31/I07/871
Google Scholar
Lin Y, Yu Z (2024a) An integrated bibliometric analysis and systematic review modelling students’ technostress in higher education. Behav Inf Technol 1–25. https://doi.org/10.1080/0144929X.2024.2332458
Lin Y, Yu Z (2024b) A bibliometric analysis of artificial intelligence chatbots in educational contexts. Interact Technol Smart Educ 21(2):189–213. https://doi.org/10.1108/ITSE-12-2022-0165
Liu L, Duffy VG (2023) Exploring the future development of Artificial Intelligence (AI) applications in chatbots: a bibliometric analysis. Int J Soc Robot 15(5):703–716. https://doi.org/10.1007/s12369-022-00956-0
Liu R, Li X, Chu J (2022) Evolution of applied variables in the research on technology acceptance of the elderly. In: International Conference on Human-Computer Interaction, Cham: Springer International Publishing, pp 500–520. https://doi.org/10.1007/978-3-031-05581-23_5
Luijkx K, Peek S, Wouters E (2015) “Grandma, you should do it—It’s cool” Older Adults and the Role of Family Members in Their Acceptance of Technology. Int J Environ Res Public Health 12(12):15470–15485. https://doi.org/10.3390/ijerph121214999
Lussier M, Lavoie M, Giroux S, Consel C, Guay M, Macoir J, Bier N (2018) Early detection of mild cognitive impairment with in-home monitoring sensor technologies using functional measures: a systematic review. IEEE J Biomed Health Inform 23(2):838–847. https://doi.org/10.1109/JBHI.2018.2834317
López-Robles JR, Otegi-Olaso JR, Porto Gomez I, Gamboa-Rosales NK, Gamboa-Rosales H, Robles-Berumen H (2018) Bibliometric network analysis to identify the intellectual structure and evolution of the big data research field. In: International Conference on Intelligent Data Engineering and Automated Learning, Cham: Springer International Publishing, pp 113–120. https://doi.org/10.1007/978-3-030-03496-2_13
Ma Q, Chan AH, Chen K (2016) Personal and other factors affecting acceptance of smartphone technology by older Chinese adults. Appl Ergon 54:62–71. https://doi.org/10.1016/j.apergo.2015.11.015
Ma Q, Chan AHS, Teh PL (2021) Insights into Older Adults’ Technology Acceptance through Meta-Analysis. Int J Hum-Comput Interact 37(11):1049–1062. https://doi.org/10.1080/10447318.2020.1865005
Macedo IM (2017) Predicting the acceptance and use of information and communication technology by older adults: An empirical examination of the revised UTAUT2. Comput Human Behav 75:935–948. https://doi.org/10.1016/j.chb.2017.06.013
Maidhof C, Offermann J, Ziefle M (2023) Eyes on privacy: acceptance of video-based AAL impacted by activities being filmed. Front Public Health 11:1186944. https://doi.org/10.3389/fpubh.2023.1186944
Majumder S, Aghayi E, Noferesti M, Memarzadeh-Tehran H, Mondal T, Pang Z, Deen MJ (2017) Smart homes for elderly healthcare—Recent advances and research challenges. Sensors 17(11):2496. https://doi.org/10.3390/s17112496
Article ADS PubMed PubMed Central Google Scholar
Mhlanga D (2023) Artificial Intelligence in elderly care: Navigating ethical and responsible AI adoption for seniors. Available at SSRN 4675564. 4675564 min) Identifying citation patterns of scientific breakthroughs: A perspective of dynamic citation process. Inf Process Manag 58(1):102428. https://doi.org/10.1016/j.ipm.2020.102428
Mitzner TL, Boron JB, Fausset CB, Adams AE, Charness N, Czaja SJ, Sharit J (2010) Older adults talk technology: Technology usage and attitudes. Comput Human Behav 26(6):1710–1721. https://doi.org/10.1016/j.chb.2010.06.020
Mitzner TL, Savla J, Boot WR, Sharit J, Charness N, Czaja SJ, Rogers WA (2019) Technology adoption by older adults: Findings from the PRISM trial. Gerontologist 59(1):34–44. https://doi.org/10.1093/geront/gny113
Mongeon P, Paul-Hus A (2016) The journal coverage of Web of Science and Scopus: a comparative analysis. Scientometrics 106:213–228. https://doi.org/10.1007/s11192-015-1765-5
Mostaghel R (2016) Innovation and technology for the elderly: Systematic literature review. J Bus Res 69(11):4896–4900. https://doi.org/10.1016/j.jbusres.2016.04.049
Mujirishvili T, Maidhof C, Florez-Revuelta F, Ziefle M, Richart-Martinez M, Cabrero-García J (2023) Acceptance and privacy perceptions toward video-based active and assisted living technologies: Scoping review. J Med Internet Res 25:e45297. https://doi.org/10.2196/45297
Naseri RNN, Azis SN, Abas N (2023) A Review of Technology Acceptance and Adoption Models in Consumer Study. FIRM J Manage Stud 8(2):188–199. https://doi.org/10.33021/firm.v8i2.4536
Nguyen UP, Hallinger P (2020) Assessing the distinctive contributions of Simulation & Gaming to the literature, 1970–2019: A bibliometric review. Simul Gaming 51(6):744–769. https://doi.org/10.1177/1046878120941569
Olmedo-Aguirre JO, Reyes-Campos J, Alor-Hernández G, Machorro-Cano I, Rodríguez-Mazahua L, Sánchez-Cervantes JL (2022) Remote healthcare for elderly people using wearables: A review. Biosensors 12(2):73. https://doi.org/10.3390/bios12020073
Pan S, Jordan-Marsh M (2010) Internet use intention and adoption among Chinese older adults: From the expanded technology acceptance model perspective. Comput Human Behav 26(5):1111–1119. https://doi.org/10.1016/j.chb.2010.03.015
Pan X, Yan E, Cui M, Hua W (2018) Examining the usage, citation, and diffusion patterns of bibliometric map software: A comparative study of three tools. J Informetr 12(2):481–493. https://doi.org/10.1016/j.joi.2018.03.005
Park JS, Kim NR, Han EJ (2018) Analysis of trends in science and technology using keyword network analysis. J Korea Ind Inf Syst Res 23(2):63–73. https://doi.org/10.9723/jksiis.2018.23.2.063
Peek ST, Luijkx KG, Rijnaard MD, Nieboer ME, Van Der Voort CS, Aarts S, Wouters EJ (2016) Older adults’ reasons for using technology while aging in place. Gerontology 62(2):226–237. https://doi.org/10.1159/000430949
Peek ST, Luijkx KG, Vrijhoef HJ, Nieboer ME, Aarts S, van der Voort CS, Wouters EJ (2017) Origins and consequences of technology acquirement by independent-living seniors: Towards an integrative model. BMC Geriatr 17:1–18. https://doi.org/10.1186/s12877-017-0582-5
Peek ST, Wouters EJ, Van Hoof J, Luijkx KG, Boeije HR, Vrijhoef HJ (2014) Factors influencing acceptance of technology for aging in place: a systematic review. Int J Med Inform 83(4):235–248. https://doi.org/10.1016/j.ijmedinf.2014.01.004
Peek STM, Luijkx KG, Vrijhoef HJM, Nieboer ME, Aarts S, Van Der Voort CS, Wouters EJM (2019) Understanding changes and stability in the long-term use of technologies by seniors who are aging in place: a dynamical framework. BMC Geriatr 19:1–13. https://doi.org/10.1186/s12877-019-1241-9
Perez AJ, Siddiqui F, Zeadally S, Lane D (2023) A review of IoT systems to enable independence for the elderly and disabled individuals. Internet Things 21:100653. https://doi.org/10.1016/j.iot.2022.100653
Piau A, Wild K, Mattek N, Kaye J (2019) Current state of digital biomarker technologies for real-life, home-based monitoring of cognitive function for mild cognitive impairment to mild Alzheimer disease and implications for clinical care: systematic review. J Med Internet Res 21(8):e12785. https://doi.org/10.2196/12785
Pirzada P, Wilde A, Doherty GH, Harris-Birtill D (2022) Ethics and acceptance of smart homes for older adults. Inform Health Soc Care 47(1):10–37. https://doi.org/10.1080/17538157.2021.1923500
Pranckutė R (2021) Web of Science (WoS) and Scopus: The titans of bibliographic information in today’s academic world. Publications 9(1):12. https://doi.org/10.3390/publications9010012
Qian K, Zhang Z, Yamamoto Y, Schuller BW (2021) Artificial intelligence internet of things for the elderly: From assisted living to health-care monitoring. IEEE Signal Process Mag 38(4):78–88. https://doi.org/10.1109/MSP.2021.3057298
Redner S (1998) How popular is your paper? An empirical study of the citation distribution. Eur Phys J B-Condens Matter Complex Syst 4(2):131–134. https://doi.org/10.1007/s100510050359
Sayago S (ed.) (2019) Perspectives on human-computer interaction research with older people. Switzerland: Springer International Publishing. https://doi.org/10.1007/978-3-030-06076-3
Schomakers EM, Ziefle M (2023) Privacy vs. security: trade-offs in the acceptance of smart technologies for aging-in-place. Int J Hum Comput Interact 39(5):1043–1058. https://doi.org/10.1080/10447318.2022.2078463
Schroeder T, Dodds L, Georgiou A, Gewald H, Siette J (2023) Older adults and new technology: Mapping review of the factors associated with older adults’ intention to adopt digital technologies. JMIR Aging 6(1):e44564. https://doi.org/10.2196/44564
Seibert K, Domhoff D, Bruch D, Schulte-Althoff M, Fürstenau D, Biessmann F, Wolf-Ostermann K (2021) Application scenarios for artificial intelligence in nursing care: rapid review. J Med Internet Res 23(11):e26522. https://doi.org/10.2196/26522
Seuwou P, Banissi E, Ubakanma G (2016) User acceptance of information technology: A critical review of technology acceptance models and the decision to invest in Information Security. In: Global Security, Safety and Sustainability-The Security Challenges of the Connected World: 11th International Conference, ICGS3 2017, London, UK, January 18-20, 2017, Proceedings 11:230-251. Springer International Publishing. https://doi.org/10.1007/978-3-319-51064-4_19
Shiau WL, Wang X, Zheng F (2023) What are the trend and core knowledge of information security? A citation and co-citation analysis. Inf Manag 60(3):103774. https://doi.org/10.1016/j.im.2023.103774
Sinha S, Verma A, Tiwari P (2021) Technology: Saving and enriching life during COVID-19. Front Psychol 12:647681. https://doi.org/10.3389/fpsyg.2021.647681
Soar J (2010) The potential of information and communication technologies to support ageing and independent living. Ann Telecommun 65:479–483. https://doi.org/10.1007/s12243-010-0167-1
Strotmann A, Zhao D (2012) Author name disambiguation: What difference does it make in author‐based citation analysis? J Am Soc Inf Sci Technol 63(9):1820–1833. https://doi.org/10.1002/asi.22695
Talukder MS, Sorwar G, Bao Y, Ahmed JU, Palash MAS (2020) Predicting antecedents of wearable healthcare technology acceptance by elderly: A combined SEM-Neural Network approach. Technol Forecast Soc Change 150:119793. https://doi.org/10.1016/j.techfore.2019.119793
Taskin Z, Al U (2019) Natural language processing applications in library and information science. Online Inf Rev 43(4):676–690. https://doi.org/10.1108/oir-07-2018-0217
Touqeer H, Zaman S, Amin R, Hussain M, Al-Turjman F, Bilal M (2021) Smart home security: challenges, issues and solutions at different IoT layers. J Supercomput 77(12):14053–14089. https://doi.org/10.1007/s11227-021-03825-1
United Nations Department of Economic and Social Affairs (2023) World population ageing 2023: Highlights. https://www.un.org/zh/193220
Valk CAL, Lu Y, Randriambelonoro M, Jessen J (2018) Designing for technology acceptance of wearable and mobile technologies for senior citizen users. In: 21st DMI: Academic Design Management Conference (ADMC 2018), Design Management Institute, pp 1361–1373. https://www.dmi.org/page/ADMC2018
Van Eck N, Waltman L (2010) Software survey: VOSviewer, a computer program for bibliometric mapping. Scientometrics 84(2):523–538. https://doi.org/10.1007/s11192-009-0146-3
Vancea M, Solé-Casals J (2016) Population aging in the European Information Societies: towards a comprehensive research agenda in eHealth innovations for elderly. Aging Dis 7(4):526. https://doi.org/10.14336/AD.2015.1214
Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: Toward a unified view. MIS Q 27(3):425–478. https://doi.org/10.2307/30036540
Wagner N, Hassanein K, Head M (2010) Computer use by older adults: A multi-disciplinary review. Comput Human Behav 26(5):870–882. https://doi.org/10.1016/j.chb.2010.03.029
Wahlroos N, Narsakka N, Stolt M, Suhonen R (2023) Physical environment maintaining independence and self-management of older people in long-term care settings—An integrative literature review. J Aging Environ 37(3):295–313. https://doi.org/10.1080/26892618.2022.2092927
Wang CL, Chen XJ, Yu T, Liu YD, Jing YH (2024a) Education reform and change driven by digital technology: a bibliometric study from a global perspective. Humanit Soc Sci Commun 11(1):1–17. https://doi.org/10.1057/s41599-024-02717-y
Wang CL, Dai J, Zhu KK, Yu T, Gu XQ (2023a) Understanding the Continuance Intention of College Students Toward New E-learning Spaces Based on an Integrated Model of the TAM and TTF. Int J Hum-comput Int 1–14. https://doi.org/10.1080/10447318.2023.2291609
Wang CL, Wang HM, Li YY, Dai J, Gu XQ, Yu T (2024b) Factors Influencing University Students’ Behavioral Intention to Use Generative Artificial Intelligence: Integrating the Theory of Planned Behavior and AI Literacy. Int J Hum-comput Int 1–23. https://doi.org/10.1080/10447318.2024.2383033
Wang J, Zhao W, Zhang Z, Liu X, Xie T, Wang L, Zhang Y (2024c) A journey of challenges and victories: a bibliometric worldview of nanomedicine since the 21st century. Adv Mater 36(15):2308915. https://doi.org/10.1002/adma.202308915
Wang J, Chen Y, Huo S, Mai L, Jia F (2023b) Research hotspots and trends of social robot interaction design: A bibliometric analysis. Sensors 23(23):9369. https://doi.org/10.3390/s23239369
Wang KH, Chen G, Chen HG (2017) A model of technology adoption by older adults. Soc Behav Personal 45(4):563–572. https://doi.org/10.2224/sbp.5778
Wang S, Bolling K, Mao W, Reichstadt J, Jeste D, Kim HC, Nebeker C (2019) Technology to Support Aging in Place: Older Adults’ Perspectives. Healthcare 7(2):60. https://doi.org/10.3390/healthcare7020060
Wang Z, Liu D, Sun Y, Pang X, Sun P, Lin F, Ren K (2022) A survey on IoT-enabled home automation systems: Attacks and defenses. IEEE Commun Surv Tutor 24(4):2292–2328. https://doi.org/10.1109/COMST.2022.3201557
Wilkowska W, Offermann J, Spinsante S, Poli A, Ziefle M (2022) Analyzing technology acceptance and perception of privacy in ambient assisted living for using sensor-based technologies. PloS One 17(7):e0269642. https://doi.org/10.1371/journal.pone.0269642
Wilson J, Heinsch M, Betts D, Booth D, Kay-Lambkin F (2021) Barriers and facilitators to the use of e-health by older adults: a scoping review. BMC Public Health 21:1–12. https://doi.org/10.1186/s12889-021-11623-w
Xia YQ, Deng YL, Tao XY, Zhang SN, Wang CL (2024) Digital art exhibitions and psychological well-being in Chinese Generation Z: An analysis based on the S-O-R framework. Humanit Soc Sci Commun 11:266. https://doi.org/10.1057/s41599-024-02718-x
Xie H, Zhang Y, Duan K (2020) Evolutionary overview of urban expansion based on bibliometric analysis in Web of Science from 1990 to 2019. Habitat Int 95:102100. https://doi.org/10.1016/j.habitatint.2019.10210
Xu Z, Ge Z, Wang X, Skare M (2021) Bibliometric analysis of technology adoption literature published from 1997 to 2020. Technol Forecast Soc Change 170:120896. https://doi.org/10.1016/j.techfore.2021.120896
Yap YY, Tan SH, Choon SW (2022) Elderly’s intention to use technologies: a systematic literature review. Heliyon 8(1). https://doi.org/10.1016/j.heliyon.2022.e08765
Yu T, Dai J, Wang CL (2023) Adoption of blended learning: Chinese university students’ perspectives. Humanit Soc Sci Commun 10:390. https://doi.org/10.1057/s41599-023-01904-7
Yusif S, Soar J, Hafeez-Baig A (2016) Older people, assistive technologies, and the barriers to adoption: A systematic review. Int J Med Inform 94:112–116. https://doi.org/10.1016/j.ijmedinf.2016.07.004
Zhang J, Zhu L (2022) Citation recommendation using semantic representation of cited papers’ relations and content. Expert Syst Appl 187:115826. https://doi.org/10.1016/j.eswa.2021.115826
Zhao Y, Li J (2024) Opportunities and challenges of integrating artificial intelligence in China’s elderly care services. Sci Rep 14(1):9254. https://doi.org/10.1038/s41598-024-60067-w
Article ADS MathSciNet PubMed PubMed Central CAS Google Scholar
Download references
This research was supported by the Social Science Foundation of Shaanxi Province in China (Grant No. 2023J014).
Authors and affiliations.
School of Art and Design, Shaanxi University of Science and Technology, Xi’an, China
Xianru Shang, Zijian Liu, Chen Gong, Zhigang Hu & Yuexuan Wu
Department of Education Information Technology, Faculty of Education, East China Normal University, Shanghai, China
Chengliang Wang
You can also search for this author in PubMed Google Scholar
Conceptualization, XS, YW, CW; methodology, XS, ZL, CG, CW; software, XS, CG, YW; writing-original draft preparation, XS, CW; writing-review and editing, XS, CG, ZH, CW; supervision, ZL, ZH, CW; project administration, ZL, ZH, CW; funding acquisition, XS, CG. All authors read and approved the final manuscript. All authors have read and approved the re-submission of the manuscript.
Correspondence to Chengliang Wang .
Competing interests.
The authors declare no competing interests.
Ethical approval was not required as the study did not involve human participants.
Informed consent was not required as the study did not involve human participants.
Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/ .
Reprints and permissions
Cite this article.
Shang, X., Liu, Z., Gong, C. et al. Knowledge mapping and evolution of research on older adults’ technology acceptance: a bibliometric study from 2013 to 2023. Humanit Soc Sci Commun 11 , 1115 (2024). https://doi.org/10.1057/s41599-024-03658-2
Download citation
Received : 20 June 2024
Accepted : 21 August 2024
Published : 31 August 2024
DOI : https://doi.org/10.1057/s41599-024-03658-2
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
Suggestions or feedback?
Press contact :.
Previous image Next image
Imagine how a phone call works: Your voice is converted into electronic signals, shifted up to higher frequencies, transmitted over long distances, and then shifted back down so it can be heard clearly on the other end. The process enabling this shifting of signal frequencies is called frequency mixing, and it is essential for communication technologies like radio and Wi-Fi. Frequency mixers are vital components in many electronic devices and typically operate using frequencies that oscillate billions (GHz, gigahertz) to trillions (THz, terahertz) of times per second.
Now imagine a frequency mixer that works at a quadrillion (PHz, petahertz) times per second — up to a million times faster. This frequency range corresponds to the oscillations of the electric and magnetic fields that make up light waves. Petahertz-frequency mixers would allow us to shift signals up to optical frequencies and then back down to more conventional electronic frequencies, enabling the transmission and processing of vastly larger amounts of information at many times higher speeds. This leap in speed isn’t just about doing things faster; it’s about enabling entirely new capabilities.
Lightwave electronics (or petahertz electronics) is an emerging field that aims to integrate optical and electronic systems at incredibly high speeds, leveraging the ultrafast oscillations of light fields. The key idea is to harness the electric field of light waves, which oscillate on sub-femtosecond (10 -15 seconds) timescales, to directly drive electronic processes. This allows for the processing and manipulation of information at speeds far beyond what is possible with current electronic technologies. In combination with other petahertz electronic circuitry, a petahertz electronic mixer would allow us to process and analyze vast amounts of information in real time and transfer larger amounts of data over the air at unprecedented speeds. The MIT team’s demonstration of a lightwave-electronic mixer at petahertz-scale frequencies is a first step toward making communication technology faster, and progresses research toward developing new, miniaturized lightwave electronic circuitry capable of handling optical signals directly at the nanoscale.
In the 1970s, scientists began exploring ways to extend electronic frequency mixing into the terahertz range using diodes. While these early efforts showed promise, progress stalled for decades. Recently, however, advances in nanotechnology have reignited this area of research. Researchers discovered that tiny structures like nanometer-length-scale needle tips and plasmonic antennas could function similarly to those early diodes but at much higher frequencies.
A recent open-access study published in Science Advances by Matthew Yeung, Lu-Ting Chou, Marco Turchetti, Felix Ritzkowsky, Karl K. Berggren, and Phillip D. Keathley at MIT has demonstrated a significant step forward. They developed an electronic frequency mixer for signal detection that operates beyond 0.350 PHz using tiny nanoantennae. These nanoantennae can mix different frequencies of light, enabling analysis of signals oscillating orders of magnitude faster than the fastest accessible to conventional electronics. Such petahertz electronic devices could enable developments that ultimately revolutionize fields that require precise analysis of extremely fast optical signals, such as spectroscopy and imaging, where capturing femtosecond-scale dynamics is crucial (a femtosecond is one-millionth of one-billionth of a second).
The team’s study highlights the use of nanoantenna networks to create a broadband, on-chip electronic optical frequency mixer. This innovative approach allows for the accurate readout of optical wave forms spanning more than one octave of bandwidth. Importantly, this process worked using a commercial turnkey laser that can be purchased off the shelf, rather than a highly customized laser.
While optical frequency mixing is possible using nonlinear materials, the process is purely optical (that is, it converts light input to light output at a new frequency). Furthermore, the materials have to be many wavelengths in thickness, limiting the device size to the micrometer scale (a micrometer is one-millionth of a meter). In contrast, the lightwave-electronic method demonstrated by the authors uses a light-driven tunneling mechanism that offers high nonlinearities for frequency mixing and direct electronic output using nanometer-scale devices (a nanometer is one-billionth of a meter).
While this study focused on characterizing light pulses of different frequencies, the researchers envision that similar devices will enable one to construct circuits using light waves. This device, with bandwidths spanning multiple octaves, could provide new ways to investigate ultrafast light-matter interactions, accelerating advancements in ultrafast source technologies.
This work not only pushes the boundaries of what is possible in optical signal processing but also bridges the gap between the fields of electronics and optics. By connecting these two important areas of research, this study paves the way for new technologies and applications in fields like spectroscopy, imaging, and communications, ultimately advancing our ability to explore and manipulate the ultrafast dynamics of light.
The research was initially supported by the U.S. Air Force Office of Scientific Research. Ongoing research into harmonic mixing is based upon work supported by the U.S. Department of Energy, Office of Science, Office of Basic Energy Sciences. Matthew Yeung acknowledges fellowship support from MathWorks, the U.S. National Science Foundation Graduate Research Fellowship Program, and MPS-Ascend Postdoctoral Research Fellowship. Lu-Ting Chou acknowledges financial support from the China's Ministry of Education for the Overseas Internship Program from the Chinese National Science and Technology Council for the doctoral fellowship program. This work was carried out, in part, through the use of MIT.nano.
Related links.
Previous item Next item
Read full story →
Massachusetts Institute of Technology 77 Massachusetts Avenue, Cambridge, MA, USA
COMMENTS
However, the successive introduction of upgraded and more capable electronic communications networks is both a matter of technological innovation and governance solutions (Manganelli and Nicita, 2020).Cellular technologies evolve within a set of interdependent institutional environments, such as research systems (universities, public research institutes, corporate laboratories, etc.) and ...
Journal of Communications Technology and Electronics encompasses the study, design, development, and application of technologies related to communication systems and electronic devices. Covers electromagnetics, wave propagation theory, signal processing, transmission lines, and telecommunications. Explores physical processes in electron devices ...
Abstract. In wireless communication, Fifth Generation (5G) Technology is a recent generation of mobile networks. In this paper, evaluations in the field of mobile communication technology are presented. In each evolution, multiple challenges were faced that were captured with the help of next-generation mobile networks.
The demand for wireless connectivity has grown exponentially over the last few decades. Fifth-generation (5G) communications, with far more features than fourth-generation communications, will soon be deployed worldwide. A new paradigm of wireless communication, the sixth-generation (6G) system, with the full support of artificial intelligence, is expected to be implemented between 2027 and ...
1. Introduction. Over the last three decades, mobile communication networks have undergone significant revolutionary development [1], [2], [3].Several emerging applications and sectors have rapidly grown to include the internet of everything (IoE), virtual reality (VR), three-dimensional (3D) media, artificial intelligence (AI), machine-to-machine (M2M) communication, enhanced mobile broadband ...
Digital transformation is the use of information and communication technology, not when trivial automation is performed, but in the case where fundamentally new capabilities are created in business, public government, and in the lives of people and society. ... Due to this topic's increasing presence in research, this paper seeks to provide a ...
The focus of wireless research is increasingly shifting toward 6G as 5G deployments get underway. At this juncture, it is essential to establish a vision of future communications to provide guidance for that research. In this paper, we attempt to paint a broad picture of communication needs and technologies in the timeframe of 6G. The future of connectivity is in the creation of digital twin ...
Along with the achieved breakthrough study results by top telecommunication corporations, a series of research labs around the world are also driving the research process to find promising solutions for IoT in 5G aim enhance data rate, exploit spectrum more efficiently, extend communication distances, optimize energy consumption, and extend ...
Communication Research (CR), peer-reviewed and published bi-monthly, has provided researchers and practitioners with the most up-to-date, comprehensive and important research on communication and its related fields.It publishes articles that explore the processes, antecedents, and consequences of communication in a broad range of societal systems.
With the high demand for advanced services and the increase in the number of connected devices, current wireless communication systems are required to expand to meet the users' needs in terms of quality of service, throughput, latency, connectivity, and security. 5G, 6G, and Beyond (xG) aim at bringing new radical changes to shake the wireless communication networks where everything will be ...
In NCA, the Human Communication and Technology Division has a sustained membership of over 500. Looking back at the past several NCA conference programs, one cannot help but notice the presence of this division through the sponsorship of numerous panels and papers.
Andrea L Guzman is an assistant professor of communication at Northern Illinois University where her research focuses on Human-Machine Communication, including artificial intelligence, digital assistants, and automated journalism. She is the editor of Human-Machine Communication: Rethinking Communication, Technology, and Ourselves.
This paper concludes that Information and Communication Technology (ICT) tools have greatly enhanced the research process, making it faster, easier, and more efficient. These tools provide researchers with access to vast amounts of data, allow for easy collaboration and communication, and offer a wide range of tools for data analysis and ...
Abstract: The Internet of Things (IoT)-centric concepts like augmented reality, high-resolution video streaming, self-driven cars, smart environment, e-health care, etc. have a ubiquitous presence now. These applications require higher data-rates, large bandwidth, increased capacity, low latency and high throughput. In light of these emerging concepts, IoT has revolutionized the world by ...
6G W ireless Communications: Future T echnologies. and Research Challenges. Samar El meadawy 1and RaedM .S hubair 23. 1 Information Engineering and Technology Department, German University in ...
Abstract—Ultra-wideband (UWB) technology is a wireless communication technology designed for short-range applications. It is characterized by its ability to generate and transmit radio-frequency energy over an extensive frequency range. This paper provides an overview of UWB technology including its defini-
See our list of technology and communication research paper topics. The relationship between technology and communication can be studied analytically at any time in human history. With the Internet, personal computers, the world wide web, mobile communications, and smart phones and tablets, digitization has been seen as contributing to the ...
term ICT includes any communication device or application, encompassing, radio, TV, cellular. phones, computers and network, hardware and software, satellite systems and so on, as well as. the ...
Technology is. the fuel that enables these trends to grow. Mobile devices, the cloud, collaborative software, and. other advances allow for greater flexibility inside and outside of the physical ...
The Journal of Information Technology (JIT) is a top-ranked journal, focused on new research addressing information, management, and communications technologies as applied to the digital worlds of business, government and non-governmental enterprises. View full journal description. This journal is a member of the Committee on Publication Ethics ...
The seventh paper, An exploratory study of the determinants of information technology hardware production: a country-level analysis, by Namchul Shin and Jason Dedrick examines the factors that impact hardware production in various countries. The results of this research indicate that hardware production in a country is related to its IT demand ...
While information and communication technologies (ICT) are prominent in educational practices at most levels of formal learning, there is relatively little known about the skills and understandings that underlie their effective and efficient use in research higher degree settings. This project aimed to identify doctoral supervisors' and students' perceptions of their roles in using ICT.
This list of communication technology research paper topics provides the list of 10 potential topics for research papers and an overview article on the history of communications technology.. 1. Automatic Telephony Systems. Fundamental to the expansion of telephone service was the widespread use of automatic telephone switches.
Following the worldwide pandemic, the next age will bring with it never-before-seen possibilities as well as problems due to the revolutionary merging of the biological, digital, and physical domains of human experience. In order to seamlessly link these realms, a whole new infrastructure is needed to envision 6 G, a dramatic paradigm change. Breaking down architecture into its component parts ...
In summary, research on older adults' technology acceptance has shifted from early theoretical deepening and analysis of influencing factors to empirical studies in the areas of personal factors ...
The demonstration of a lightwave-electronic mixer at petahertz-scale frquencies is a first step toward making communication technology faster and progresses research toward developing new, miniaturized lightwave electronic circuitry capable of handling optical signals directly at the nanoscale.
The ubiquity of current market news in that decade is seen in the fact that by 1882 the Cincinnati Merchants' Exchange was leasing three Western Union ticker-tape devices that provided up-to-the-minute reports throughout the day for commodities and stocks from major US cities and foreign markets as well (Scharlott, "Communication Technology ...