A Review of Homeless Persons' Access to and Use of Information Technologies

A Review of Homeless Persons' Access to and Use of Information Technologies

Length: 1273 words (3.6 double-spaced pages)

Rating: Strong Essays

Open Document

Essay Preview


OPPORTUNITIES FOR ENGAGING LOW-INCOME, VULNERABLE POPULATIONS IN HEALTH CARE:

Opportunities for Engaging Low-Income, Vulnerable Populations in Health Care: A Systematic Review of Homeless Persons’ Access to and Use of Information Technologies

The purpose of the research was to determine and figure out if homeless individuals have access to information technology and if so, are they fully utilizing it. The researchers were guided by three main research questions. The first was “What is the prevalence of access to and use of information technology (Internet, mobile phones, texting etc) by homeless populations”? The second was “What are homeless persons purpose for using information technologies. Finally, “what are the barriers to and facilitators of access to and use of information technologies by homeless individuals”?
The questions and procedures were non random including nine articles representing six studies Conducted between 2006 and 2012 which presented data on access to use of technologies by homeless persons. Within the questions and study by EyrichGarg, 44% rates of mobile phones were long term among 100 unsheltered street homeless persons in Philadelphia Pennsylvania. Rice et al also reported 62% of mobile phone ownership among 169 homeless adolescents in Los Angeles California. While this is a good sample size, the problem lies with the distribution and location of the data collection. A much larger sample with regard to all categories taken into consideration would have aided in the data analysis, particularly and most importantly, when looking for possible economic growth differences between different cities.
The modus operandi used by the references in the article was r...


... middle of paper ...


...erestimate the ability of many homeless people. More than 70% of homeless individuals now own or have access to mobile phone and many also use the computers in libraries and other locations. Homeless individuals can be engaged and empowered to use this type of technologies. This idea will help more of them voice out their opinion, enhance their capabilities and expedite communication. This can also be used to personalize and improve medical assistance tailored to their needs. Where information technology does not exist, it is due to chaotic lifestyle but not problems with digital literacy.












References
Mclnnes, D. K., Alice, E., & Hogan, T. (2013). Opportunities for Engaging Low-Income, Vulnerable Populations in Health Care: A Systematic Review of Homeless Persons’ Access to and Use of Information Technologies. Sytematic Review, 103(2).


Need Writing Help?

Get feedback on grammar, clarity, concision and logic instantly.

Check your paper »

Current issues of Accessibility Essay

- Introduction Distance education has and continues to play an essential role in educational access. It is characterized as teaching and learning via technology, where the students and instructor are not in the same space and time during learning. The integration of technology provides the mechanisms to facilitate interaction between the students and the professor, and the learning infrastructure. Whatever the methodology, distance education is a mode of delivery that ensures access to education to those not able to attend traditional education venues, or denied access based on social or ethnic status....   [tags: distance education, educational access]

Strong Essays
922 words (2.6 pages)

Information and Communication Technologies (ICTs) and Youth Entrepreneurship

- Introduction Suhas Gopinath’s mother feared for his future. He was more interested in website development than his academics. He spent hours in an internet café peering over online tutorials after school hours in India. When he failed his mathematics exam, his mother ordered him to focus only on academics. Left with no option, Suhas waited for his summers. Soon, at a young age of 14, he was a website development freelancer for many companies in the United States. He welcomed adulthood by registering his venture “Globals Inc” in the United States....   [tags: youth entrepreneurship]

Strong Essays
2652 words (7.6 pages)

Questions And Access Of Personal Information Essay

- ... Helping you manage corrections Whether we made the mistake or someone else made it, we are required to help you ask for the information to be corrected. So we can do this, we might need to talk to others. However, the most efficient way for you to make a correction request is to send it to the organisation that made the mistake. Where we correct information If we are able to correct the information, we will let you know within five business days of deciding to do this. We will also let the relevant third parties know as well as any others you tell us about....   [tags: Security, Computer security, Access control]

Strong Essays
1141 words (3.3 pages)

Access to Review Essay

- When it comes to our courts there are many rules and regulations that our Supreme Court Justices must abide by. There are many restraints placed upon them and their ability to legally hear a case. Justices are restrained by the types of cases before them as well as jurisdiction, legitimacy and capacity, judicial role, and access to review. Under access to review there are many interesting caveats to the law that must be looked at with a critical eye and an understanding that not all cases are able to be heard by the Supreme Court....   [tags: Supreme Court]

Strong Essays
987 words (2.8 pages)

Essay Remote Intercom Access

- I. INTRODUCTION Modern networking technologies are dramatically making major contributions to our Information Technology industry. Remote systems are acknowledged as a standout amongst the most climbing innovations in today's reality. The cheapest known stand-alone device used for communication is Intercom. Nearly all of your workplaces in addition to houses contain these kinds of convenient products. These plans are mounted for safety purposes so authenticated person easily identified. Nevertheless, very much development is necessary inside these types of technologies along with devices....   [tags: modern networking technologies]

Strong Essays
2646 words (7.6 pages)

The Famous Five and the Persons Case Essay

- ... She was supported by the Federated Women’s Institute and National Council of Women. Also, over 500 000 people wrote letters and signed petitions to support Murphy being appointed as a senator (Alberta Online Encyclopedia, 2004). However, Robert Borden, the Prime Minister during that time, refused to appoint Murphy into the Senate as women weren’t “persons”. Two other prime ministers, Meighen and Mackenzie both promised to make changes to the British North American Act to include women as persons, but both failed to do so....   [tags: women, persons, senate, rights]

Strong Essays
796 words (2.3 pages)

Essay about Peer-to-Peer Technologies in Distance Learning

- Brief Introduction of Peer-to-Peer Technologies What Is Peer-to-Peer. The term “peer-to-peer” has various meanings under different circumstances, when mentioned in the context of digital and network settings, especially nowadays with the popularity of Internet usage, this term is often used to describe a type of decentralized and distributed network architecture, in which individual nodes in the network act as both suppliers and consumers of data resources (ref.); these nodes, i.e. the “peers”, are actually end-user devices, such as personal computers, PDAs, iPads, and mobile devices with accessibility to Internet....   [tags: Digital, Network Settings, Technologies]

Strong Essays
2398 words (6.9 pages)

The Dynamism of Access Control Essay

- Heterogeneous and dynamic environments creates a need for a viable access control system in such a way that the security of data and information will be solidly ensured. Organizations have various types of resources that need access regulation. The purpose of which is to make sure that only the intended can access the resources while keeping the unauthorized person out of the loop. Even at that, hierarchy, type and the degree of task delegated to a user will determine the level of access that he or she will be granted....   [tags: security, level, access, control]

Strong Essays
2713 words (7.8 pages)

PERSONA OF INTERNET TECHNOLOGIES IN ELECTRONIC BUSINESS MANAGEMENT Essay examples

- 1. INTRODUCTION The Internet is a very popular Information Technology means for exchange of information and transaction data between businesses and customers all around the world. For over three decades now, internet has become a prime business market area. The US Government had initially developed the internet for the purpose of research and education within the country. However, today this evolving technology has spurred drastically and has reached out to all the aspects of business and social circles of our daily lives....   [tags: Information Technology ]

Strong Essays
2130 words (6.1 pages)

Reproductive Technologies Essay

- Throughout the past several years, the gap between technological change and policy development has continued to grow at a rapid pace. As this gap continues to widen, Canadians continue to face important questions involving the social, legal and ethical issues involving newly developed technologies. Canadians are concerned with how these technologies will impact society as they are faced with the situation of technology developing at a faster pace than the issues they raise can be addressed. Many people are beginning to wonder if the federal government is doing its part to develop policies that will protect and promote human dignity and rights, ensure the health and safety of all Canadians an...   [tags: Government Reproductive Technologies Canada]

Free Essays
948 words (2.7 pages)