ICT Use in the Developing World: An Analysis of Differences in Computer and Internet Penetration
15 Pages Posted: 18 Jan 2010
There are 4 versions of this paper
ICT Use in the Developing World: An Analysis of Differences in Computer and Internet Penetration
ICT Use in the Developing World: An Analysis of Differences in Computer and Internet Penetration
ICT Use in the Developing World: An Analysis of Differences in Computer and Internet Penetration
Abstract
Using panel data for 161 countries, we explore the determinants of cross-country disparities in personal computer and Internet penetration. We find evidence indicating that income, human capital, the youth dependency ratio, telephone density, legal quality, and banking sector development are associated with technology penetration rates. Estimates from Blinder–Oaxaca decompositions comparing rates in the developed-country total to developing countries (Total, Brazil, China, Indonesia, India, Mexico, and Nigeria) reveal that the main factors responsible for low rates of technology penetration rates in developing countries are disparities in income, telephone density, legal quality, and human capital. In terms of dynamics, our results indicate fairly rapid reversion to long-run equilibrium for Internet use, and somewhat slower reversion for computer use.
Suggested Citation: Suggested Citation
Do you have a job opening that you would like to promote on SSRN?
Recommended Papers
-
Policy Reform, Economic Growth, and the Digital Divide:An Econometric Analysis
By David Wheeler, Susmita Dasgupta, ...
-
Telecommunication Reforms, Access Regulation, and Internet Adoption in Latin America
By Antonio Estache, Marco Manacorda, ...
-
Gender Differences in Information Technology Usage: A U.S.-Japan Comparison
By Hiroshi Ono and Madeline Zavodny
-
Broadband Access and Content Consumption
By Lorin M. Hitt and Prasanna Tambe
-
ICT Use in the Developing World: An Analysis of Differences in Computer and Internet Penetration
-
ICT Use in the Developing World: An Analysis of Differences in Computer and Internet Penetration