<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "http://jats.nlm.nih.gov/publishing/1.1d1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">RW</journal-id>
<journal-title-group>
<journal-title>Reading &#x0026; Writing - Journal of the Reading Association of South Africa</journal-title>
</journal-title-group>
<issn pub-type="ppub">2079-8245</issn>
<issn pub-type="epub">2308-1422</issn>
<publisher>
<publisher-name>AOSIS</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">RW-9-187</article-id>
<article-id pub-id-type="doi">10.4102/rw.v9i1.187</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Navigating the unbeaten track from digital literacy to digital citizenship: A case of university students in South Africa&#x2019;s Eastern Cape province</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-0845-0677</contrib-id>
<name>
<surname>Takavarasha</surname>
<given-names>Sam</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<contrib contrib-type="author" corresp="yes">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-9493-4311</contrib-id>
<name>
<surname>Cilliers</surname>
<given-names>Liezel</given-names>
</name>
<xref ref-type="aff" rid="AF0001">1</xref>
</contrib>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-4139-4224</contrib-id>
<name>
<surname>Chinyamurindi</surname>
<given-names>Willie</given-names>
</name>
<xref ref-type="aff" rid="AF0002">2</xref>
</contrib>
<aff id="AF0001"><label>1</label>Department of Information Systems, University of Fort Hare, South Africa</aff>
<aff id="AF0002"><label>2</label>Department of Business Management, University of Fort Hare, South Africa</aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><bold>Corresponding author:</bold> Liezel Cilliers, <email xlink:href="liezelcilliers@yahoo.com">liezelcilliers@yahoo.com</email></corresp>
</author-notes>
<pub-date pub-type="epub"><day>06</day><month>11</month><year>2018</year></pub-date>
<pub-date pub-type="collection"><year>2018</year></pub-date>
<volume>9</volume>
<issue>1</issue>
<elocation-id>187</elocation-id>
<history>
<date date-type="received"><day>10</day><month>12</month><year>2017</year></date>
<date date-type="accepted"><day>18</day><month>06</month><year>2018</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2018. The Authors</copyright-statement>
<copyright-year>2018</copyright-year>
<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>Licensee: AOSIS. This work is licensed under the Creative Commons Attribution License.</license-p>
</license>
</permissions>
<abstract>
<p>Unlike the millennials from the industrialised world who were raised amidst an increasingly online and socially networked society, their South African counterparts at previously disadvantaged universities have some weaknesses similar to those of digital migrants. These weaknesses are caused by the limited exposure millennials in South Africa have to digital devices and Internet connectivity. In spite of these impediments, their future careers in an increasingly globalised world require them to behave like, transact and engage with full-fledged digital citizens from the global north. Digital citizenship is the ability to use technology safely, responsibly, critically, productively and civically. This raises intellectual curiosity about the extent to which the African millennial is prepared for a world that expects them to be digital citizens. This article, therefore, investigates the challenges faced by the South African millennial as they navigate an unusual route to digital citizenship. We adopted the activity theory for a mixed-methods study that consists of a survey of 148 questionnaires and 15 in-depth interviews. The findings show that while university-going millennials acquire digital literacy, their development of digital citizenship is affected by lack of mentors and access (i.e. connectivity and devices) at home and lack of soft skills training (i.e. online safety, digital etiquette and inadequate information literacy) at the university.</p>
</abstract>
</article-meta>
</front>
<body>
<sec id="s0001">
<title>Introduction</title>
<disp-quote>
<p>Each day the world is becoming increasingly digital/Your students begin to use more and more technology devices at home and in the classroom. But, are they prepared to be good digital citizens? Just as you teach your students the rules of society, it is imperative that you teach them the rules of the digital world, and how to be safe and responsible with technology. (Ribble <xref ref-type="bibr" rid="CIT0050">2011</xref>:14)</p>
</disp-quote>
<p>The digital competence of young people has been addressed in the literature from different perspectives (Howard <xref ref-type="bibr" rid="CIT0020">2011</xref>; Kritzinger <xref ref-type="bibr" rid="CIT0030">2016</xref>; Mcmahon <xref ref-type="bibr" rid="CIT0038">2014</xref>; Mossberger, Tolbert &#x0026; Mamilton <xref ref-type="bibr" rid="CIT0040">2012</xref>; Ribble <xref ref-type="bibr" rid="CIT0051">2014</xref>; Takavarasha, Chinyamurindi &#x0026; Cilliers <xref ref-type="bibr" rid="CIT0055">2017</xref>; White <xref ref-type="bibr" rid="CIT0061">2013</xref>). White (<xref ref-type="bibr" rid="CIT0061">2013</xref>) posits that the 21st century educators need to teach new skills in addition to the traditional ones for them to address the needs of the new era as articulated by Howard (<xref ref-type="bibr" rid="CIT0020">2011</xref>).</p>
<p>Drawing from scholars who suggest that technology has changed the mind of people, White (<xref ref-type="bibr" rid="CIT0061">2013</xref>) posits that educators must revisit what they teach and how they teach in the information age where students are constantly exposed to technologies. Based on the McLuhan&#x2019;s (<xref ref-type="bibr" rid="CIT0037">1964</xref>) dictum which suggests that humans shape their tools and the tools, in turn, shape humans, White (<xref ref-type="bibr" rid="CIT0061">2013</xref>) posits that the current state of communication technologies calls for the training of new skills for students to fit in a new paradigm. On this basis, he proposes a new module, &#x2018;digital fluency&#x2019;, that must address the continuously evolving needs of the information age students.</p>
<p>This article will argue that what is taught must depend on the needs and background of the learner. The information age student from the global south faces different circumstances and therefore requires peculiar training. In the context of digital exposure, the term &#x2018;millennial&#x2019; is an age-specific term that simplifies and masks the skills and resource gaps between youths from the global north and global south. The assumption that millennials have higher digital competence than their older counterparts has also been debunked by practitioners who found no link between digital nativity and digital skill (IDCL <xref ref-type="bibr" rid="CIT0011">2014</xref>). As will be discussed later, such differences in resources and skills are the ones that shape the millennials&#x2019; paths to digital citizenship. Farmer (<xref ref-type="bibr" rid="CIT0015">2011</xref>:292) defines digital citizenship as &#x2018;the ability to use technology safely, responsibly, critically, productively, and civically&#x2019;.</p>
<p>As the well-being of people in the information age increasingly depend on the use of information and communication technology (ICT), it is important for educators and parents to promote the acquisition of digital skills. More than mere digital literacy, this paper focuses on digital citizenship as a culmination of both digital fluency and online etiquette (Batista <xref ref-type="bibr" rid="CIT0005">2003</xref>; Jackson <xref ref-type="bibr" rid="CIT0022">2003</xref>). It discusses digital citizenship in the context of developing nations where both digital literacy and access are limited by low income and poor infrastructure. We use Engestr&#x00F6;m&#x2019;s (<xref ref-type="bibr" rid="CIT0012">2001</xref>) activity theory (AT) sensitising an investigation of the importance of social background on the pathway from digital literacy to digital citizenship by South African millennials from disadvantaged backgrounds.</p>
<p>As part of its developmental agenda in an increasingly connected world, the United Nations has set targets for improving ICT skills and access over the next 15 years. For instance, Sustainable Development Goals (SDG) 16.10 aims to ensure public access to information. On the other hand, national governments have also set targets that are aligned with the agenda for 2030 in order to fight poverty and enhance the capabilities of their citizens. In the context of an information-driven economy, it is critical to close the ICT skills and usage capacity gap among their citizens. This calls on educators to focus on the millennials in the underprivileged parts of the developing world who constitute the majority of the young population of the world (United Nations <xref ref-type="bibr" rid="CIT0057">2015</xref>).</p>
<p>In 2013, the government of South Africa launched the National Development Plan 2030 with a view to address livelihoods and capacity gaps among other things (NDP 2030, <xref ref-type="bibr" rid="CIT0044">2013</xref>). The NDP 2030 proposes improvements in school infrastructure including full access to high-speed broadband as well as human capacity. This leaves the ball in the court of educators and parents who are expected to complement each other in developing the millennials into the full digital citizens.</p>
<p>Such an endeavour commences with an in-depth understanding of the unusual road that the young people from previously disadvantaged communities must travel on their way to becoming the information age actor, dubbed the digital citizen. It is only through such an understanding that we the educators can develop digital literacy programmes and bridge the capacity gap between the millennials from previously disadvantaged communities and their counterparts in egalitarian societies.</p>
<p>The route taken by developing countries has been a subject of intellectual debate among digital divides scholars of information systems. That may question our intentions to expect the African digital citizens to be similar to their Western counterparts. Some scholars have problematised the notion of catching up with the West as another doomed attempt to mimic the West at the expense of following our own context development trajectories (Rapley <xref ref-type="bibr" rid="CIT0049">2004</xref>). Whether one views digital citizenship through the lens of context or not, this paper seeks to provide a background for either of the options by investigating how the African millennials are navigating their way to digital citizenship. The authors contend that human development strategies are strongest when they are informed by a solid understanding of past and present states of a phenomenon against the desired outcomes.</p>
<p>In order to investigate the plight of the millennials from previously disadvantaged communities in developing countries, we conducted this research at a previously disadvantaged university in the Eastern Cape province of South Africa. Most of the students at the university&#x2019;s three campuses come from rural areas that lack electricity and connectivity in the homesteads. There has been a drive by the South African government to improve ICT access as part of its development plan (NDP 2030, <xref ref-type="bibr" rid="CIT0044">2013</xref>). These improvements have not yet reached the wider population and there is a huge cohort of the millennials that will have to acquire digital literacy under difficult conditions. This has been caused by a lack of infrastructure and material and instructional support at both the home and educational institution level.</p>
<p>This article adopts AT for analysing the route that millennials from previously disadvantaged countries navigate on their way to full digital citizenship. The study is meant to unpack the way they develop digital citizenship and then analyses how it differs from the ideal situation that colleagues from privileged communities and developing countries face. It investigates the rules of the community and the tools available to the millennials who are currently enrolled at a previously disadvantaged university in the Eastern Cape province of South African. The study assumes that the difference in their development will be because of the rules at home and school, support of community at home and school, and access to tools (ICT access) at home and school. This study uses university students because they are an appropriate unit of analysis for accessing digital citizenship. This is also because they are millennials who have ICT training and constant Internet access at their universities. Because of the aforementioned reasons, it is fair to say that university students have basic qualities of digital citizens as articulated by Mossberger et al. (<xref ref-type="bibr" rid="CIT0040">2012</xref>).</p>
<p>The objectives of this research will be met by addressing the following question: what challenges do South African millennials experience in their attempt to become digital citizens and what steps are being taken at the home and educational institutions to develop millennials into digital citizens? To answer this question, mixed-methods research consisting of a survey and in-depth interviews was used at two university campuses in Eastern Cape province. After this introduction, the rest of the study is organised as follows: literature review, theoretical grounding, research methods, findings and discussion.</p>
</sec>
<sec id="s0002">
<title>Literature review</title>
<p>Digital literacy has been a critical issue since the advent of web 2.0 environment when Internet users became potential contributors of information instead of mere recipients. After web 2.0, the Internet occupies an unprecedented stature as a convivial tool as articulated by Ameripour, Nicholson and Newman (2010). This is because of the continuous convergence of audio, visual and textual technologies, which allows it to surpass Illich&#x2019;s (<xref ref-type="bibr" rid="CIT0021">1973</xref>) characterisation of the telephone as a convivial tool. A tool of conviviality is technology, which allows each user to &#x2018;enrich the environment with the fruits of his or her own vision&#x2019; (Illich&#x2019;s <xref ref-type="bibr" rid="CIT0021">1973</xref>:21). It is, however, disturbing to note that the African millennial is yet to fully experience the business, social, and educational benefits of the Internet because of the lack of digital fluency and other constraints (Counted &#x0026; Arawole <xref ref-type="bibr" rid="CIT0009">2016</xref>). The activity of millennials on social media is an appropriate unit of analysis for assessing the development of digital citizenship by South African millennials. This is because over three-quarters of millennials are on social media (Mackey <xref ref-type="bibr" rid="CIT0034">2016</xref>; Pew Research <xref ref-type="bibr" rid="CIT0046">2010</xref>).</p>
<p>This article presents the ethical, competent, civil and safe user and beneficiary of online facilities as a digital citizen that the African millennial must endeavour to become. As digital citizenship is often confused with many digital competence terms like &#x2018;digital nativity&#x2019;, &#x2018;digital literacy&#x2019; and &#x2018;digital fluency&#x2019;, it is important to clarify its usage in the context of this study. The terminological confusion emanates from the fact that these terms overlap and they are often associated with a demographic segment that shares age and ICT competence. These are the so called millennials or digital natives as described below. Prensky (<xref ref-type="bibr" rid="CIT0047">2001</xref>) refers to digital natives as a generation of technologically savvy people who were born in the digital era. This population segment is also known as the next generation, generation Y and Google generation. They are contrasted with digital immigrants who were born before the widespread use of computers. Unlike the natives, the digital migrants are the Internet users who adopted computing in their adult life.</p>
<p>When Prensky invented the term &#x2018;digital natives&#x2019;, he was referring to people born after 1980 (Prensky <xref ref-type="bibr" rid="CIT0047">2001</xref>). His subsequent definition of digital nativity includes &#x2018;digital wisdom&#x2019; to the age component. Digital wisdom goes beyond knowing how to use technologies to include the capacity to critically evaluate and to make pragmatic and ethical decisions in cyberspace. A close reading of Wang, Myres and Sandram (<xref ref-type="bibr" rid="CIT0060">2012</xref>) shows that they equate digital fluency with digital nativity. We problematise that definition because we believe that digital fluency can be achieved through training, yet digital nativity is an age-related characteristic that can neither be lost nor acquired.</p>
<p>Another related term is &#x2018;digital literacy&#x2019;, which refers to one&#x2019;s capability of, and competence or skill for using ICTs (Gilster <xref ref-type="bibr" rid="CIT0017">1997</xref>). Other scholars use it interchangeably with terms like &#x2018;computer literacy&#x2019;, &#x2018;information technology (IT) literacy&#x2019;, &#x2018;digital competence&#x2019; and &#x2018;ICT competency&#x2019; as articulated by Wang et al. (<xref ref-type="bibr" rid="CIT0060">2012</xref>). Many scholars define digital literacy as a combination of technological expertise and information literacy. In addition, they include the capacity to transform and communicate digital information in a competent way. This includes critical thinking and evaluation, e-safety, creativity, collaboration, effective communication, functional skills, ability to find and select information, and cultural and social understanding (Binkley et al. <xref ref-type="bibr" rid="CIT0007">2011</xref>; Erstad <xref ref-type="bibr" rid="CIT0014">2010</xref>). Such a definition leaves little difference between digital literacy and digital citizenship and highlights the lack of consensus on the definition of both terms. Ribble (<xref ref-type="bibr" rid="CIT0051">2014</xref>) also identifies nine qualities of digital citizenship that are strikingly similar to those of digital literacy. These include etiquette, communication, education, access, commerce, responsibility, rights, safety, and security or self-protection.</p>
</sec>
<sec id="s0003">
<title>The relationship between exposure and digital skills</title>
<p>There is a perception that the people of the industrialised countries are more technologically savvy than those of developing countries. This is based on the fact that ICT access and skills training are better in industrialised countries than they are in developing countries. ECDL (<xref ref-type="bibr" rid="CIT0011">2014</xref>) suggests that ICT skills are neither age nor access determined. This questions any idea that the millennials in countries that provide the highest levels of access are any better than those who lack it. They propose that only standardised training can improve superior ICT literacy. While there is an obvious nexus between ICT training and digital literacy, there is no evidence that disconfirms that standardised training is more prevalent in industrialised countries. This calls for an investigation of the effect of access and skills, and hence digital citizenship.</p>
<p>Against this background, the incumbent study endeavours to investigate the digital skill development process of students from previously marginalised universities who also hail from disadvantaged communities. While the literature has shown that they are less exposed than their counterparts from privileged societies, it is important to assess how their underprivileged backgrounds shape their route to digital citizenship (Counted &#x0026; Arawole <xref ref-type="bibr" rid="CIT0009">2016</xref>). Arguing from a functionalist perspective, Van Dijk and Hacker (<xref ref-type="bibr" rid="CIT0058">2003</xref>) identified three Internet inequalities that they related to access. These include psychological access, material access and usage access. Psychological access refers to a lack of basic digital experience because of their lack of interest, computer phobia and the unattractiveness of the new technology. Material access refers to a lack of computing equipment and connectivity. Finally, usage access refers to a lack of digital opportunities by a user who possesses both psychological and material access (Van Dijk &#x0026; Hacker <xref ref-type="bibr" rid="CIT0058">2003</xref>).</p>
<p>Other studies have related poor digital access to the socio-historical contours of the social exclusionary policies of the apartheid era (Kruger et al. <xref ref-type="bibr" rid="CIT0031">2006</xref>). The long-term effect of these policies contributes to the lack of awareness and low income of the previously disenfranchised communities of South Africa.</p>
<p>Digital training: According to Jochems, van Merrienboer and Koper (<xref ref-type="bibr" rid="CIT0023">2004</xref>), optimum implementation of e-learning must combine pedagogical, technological and organisational imperatives. Digital training may be formal or informal; the organisational perspective must include the university and the home environment. The pedagogical perspective is, however, restricted to the formal university and school curriculum. Many computer literate people did not undergo any ICT training. They learned how to use ICTs in school, home or work. This informal training must be viewed as exposure because the prominence of its role suggests that it cannot be downplayed in any assessment of the development of digital citizenship. The other vital perspective of digital training is the tools discussed below.</p>
<p>Access to digital tools: These are the devices, gadgets and various software and hardware artefacts that influence one&#x2019;s ability to learn how to use digital platforms for engaging in social, business and educational activities in a responsible and safe manner.</p>
</sec>
<sec id="s0004">
<title>Relating digital citizenship to development</title>
<p>The focus of information systems (IS) research has been around the potential of IS to improve people&#x2019;s livelihoods using ICTs. Digital divide studies, in particular, have compiled a list of impediments to ICT-enabled development that includes poor access and low ICT literacy among other things. As given as it may seem, it is important to assess the difference between the digital literacy of millennials from the developing world and those from the industrialised world. This will, among other things, show where the gaps are and it is a critical step towards addressing these gaps through the education system.</p>
<p>The Australian Council for Educational Research (<xref ref-type="bibr" rid="CIT0003">2016</xref>) identified parameters for measuring digital literacy across different countries. It posits that any global learning assessment of digital and ICT literacy must include aspects of digital and ICT skills that range from basic skill to advanced competent use of ICTs. In view of this, we suggest that the competence of the African millennials must be assessed from diverse levels of digital and ICT skills. The council also suggests that digital learning and ICT literacy should be comparable across industrialised, low-income and developing countries. Finally, it posits that it should permit assessment of all subgroups of people in a population but continue to produce comparable standards across a diverse people.</p>
<p>Research on digital literacy in developing countries like South Africa must follow the Australian Council for Educational Research (<xref ref-type="bibr" rid="CIT0003">2016</xref>) model because it captures digital literacy and ICT literacy. This will take the curriculum development approach above the trap of technological determinism, which has been problematised as technological determinism for assuming that social change can take place because of technological deployment alone (Avgerou <xref ref-type="bibr" rid="CIT0004">2010</xref>). The literature suggests that there is a complex socio-technical interplay where the human actors shape the tools that open possibilities for higher levels of human creativity (Kuutti <xref ref-type="bibr" rid="CIT0032">1996</xref>; Leont&#x2019;ev 1978). A digital curriculum that acknowledges the dualism between technical competence and information literacy will situate the digital literacy training above the product model of curriculum development which is ideal for artisanal crafts. It will enable the process model, which is amenable to the socio-technical realms of education and information systems (Bednar &#x0026; Welch <xref ref-type="bibr" rid="CIT0006">2017</xref>).</p>
<p>It must be argued that the information systems domain has been viewed as a craft that requires technical skills development. As a result, some digital literacy educators teach it as another artisanal trade arguably because their graduates are expected to be able to perform certain technical skills in the workplace. Computing or computer science can be a natural science subject which fits the positivist epistemological school. However, its application to different industries has created several new e-world domains that are not amenable to positivism (Klein &#x0026; Hirschheim <xref ref-type="bibr" rid="CIT0028">2012</xref>). The integration of computing into these disciplines invokes the need to train soft skills, like digital etiquette from the socio-technological lens as articulated by Ciborra (<xref ref-type="bibr" rid="CIT0008">2004</xref>).</p>
<p>The research context: The unit of analysis for this study is an institution of higher learning in the Eastern Cape province of South Africa. It is one of the institutions that were underprivileged during the apartheid era. South Africa is a sub-Saharan African country that became a democracy in 1994. The socio-political environment of the apartheid era resulted in social inequalities that still affect South Africans. It has a Gini-coefficient of 0.66&#x2013;0.7, which makes it one of the most highly unequal countries in the world (Mail &#x0026; Guadian <xref ref-type="bibr" rid="CIT0035">2018</xref>).</p>
<p>South Africa&#x2019;s apartheid has been widely documented for its impact on the social progress of previously disadvantaged communities of black people. In addition to their educational (Hale <xref ref-type="bibr" rid="CIT0018">2010</xref>; Keswell <xref ref-type="bibr" rid="CIT0027">2004</xref>) and economic endeavours for these communities, through its homeland policy, the apartheid system separated South African education along the lines of the ethnic enclaves that shaped separate economies for black people and white people. It also resulted in the migrant black labour force which left schoolgoing kids under infirm and elderly people. This is said to have created social ills that negatively affected the education of black students (Rakhometsi <xref ref-type="bibr" rid="CIT0048">2008</xref>). The same phenomenon is said to have also affected the post-apartheid reconstruction efforts that were meant to reverse the institutionalised inequalities (Thobejane <xref ref-type="bibr" rid="CIT0056">2013</xref>).</p>
<p>The institution under study is a previously disadvantaged university, which is mainly attended by students from impoverished rural areas in the Eastern Cape. It is situated in the former Ciskei. The Eastern Cape has been reported to have the second lowest Internet access at 37&#x0025; in South Africa. At least 11.3&#x0025; of the population access the Internet through educational institutions and Internet cafes, while in 2014 the majority of the population (80&#x0025;) accessed the Internet through mobile devices (MyBroadband <xref ref-type="bibr" rid="CIT0043">2015</xref>). While the institution has three campuses, this study was conducted at the two biggest campuses. Most of the students who are enrolled at these two campuses are below the age of 23, unlike the third campus where the student profile tends to lean towards more mature, working adults who are outside the target population of this study.</p>
</sec>
<sec id="s0005">
<title>Conceptual framework: Activity theory</title>
<p>The interaction between human actors and technology has been analysed through different socio-technical theoretical lenses by IS scholars. Of particular interest are Latour&#x2019;s (<xref ref-type="bibr" rid="CIT0033">1994</xref>) actor&#x2013;network theory (ANT), which sees no difference between human actors and artefacts, and Vygotsky&#x2019;s (<xref ref-type="bibr" rid="CIT0059">1978</xref>) cultural-historical activity theory (CHAT), which draws a distinction between the two. In this study, we adopt AT, as it allows us to analyse the development of digital citizenship in the context of developing countries. Activity theory is ideal for this process because of its ability to conceptualise human actors&#x2019; use of tools (like ICTs) to act upon objects in order to get a certain outcome in an activity system which is governed by contextual rules and roles or agency of different actors.</p>
<p>We adopt AT for the purpose of analysing the way human subjects (i.e. young people in the developing world) interact with ICT tools as they navigate a particularly unique route to digital citizenship. Activity theory also allows us to assess this interaction in a context-specific manner. Various IS scholars have emphasised the need for contextualism in unlocking the ingredients of appropriate policy and emancipation of its users (Johnson et al. <xref ref-type="bibr" rid="CIT0024">2009</xref>).</p>
<p>Activity theory suggests that a subject uses tools to act upon an object within the context of an activity system. It was founded in 1920 by Vygotsky, Luria and Leont; entered the Western world in the 1970s; and was popularised in the Western world by Yrjo Engestrom through his work at the Center for Research on Activity, Development and Learning (CRADLE). This theory has evolved from the first generation to the third generation and there is an ongoing effort to develop its fourth generation version. The first-generation AT is presented in <xref ref-type="fig" rid="F0001">Figure 1</xref>, while the second-generation AT is presented in <xref ref-type="fig" rid="F0002">Figure 2</xref>.</p>
<fig id="F0001">
<label>FIGURE 1</label>
<caption><p>First-generation activity theory.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="RW-9-187-g001.tif"/>
</fig>
<fig id="F0002">
<label>FIGURE 2</label>
<caption><p>Second-generation activity theory.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="RW-9-187-g002.tif"/>
</fig>
<p>Activity theory provides a rich analytical technique for identifying tensions and contradictions that arise from the interaction of actors in an activity system. It is based on the assumption that knowledge is built through an understanding of the interaction between tools and artefacts. In addition to the transformation that the subject inflicts upon the object, the subject is also influenced by the object, thereby forming an interactionist activity system (Kuutti <xref ref-type="bibr" rid="CIT0032">1996</xref>; Leont&#x2019;ev 1978). This interaction takes place in an activity system and it presents the activity as its key unit of analysis. As the activity is key, the analysis must identify the significant activities and their subject and object (Hasan &#x0026; Kazlauskas <xref ref-type="bibr" rid="CIT0019">2014</xref>).</p>
<p>Activity: An activity is defined as a holistic and high-level construct like conducting a project (Leont&#x2019;ev 1981). It is a more comprehensive process than the word &#x2018;activity&#x2019; is understood in English. Hasan and Kazlauskas (<xref ref-type="bibr" rid="CIT0019">2014</xref>) posit that the activity is situated much higher up the hierarchy of subactivities or goal-oriented actions and operations that are executed in the process of achieving the overriding goal. Kaptelinin (<xref ref-type="bibr" rid="CIT0025">1996</xref>) posits that an activity must be understood in the context of the cultural and historical environment in which it is embedded.</p>
<p>The subject is the doer that acts upon the object and it is the central actor in a particular activity. As a result, the researcher must analyse the activity from the subject&#x2019;s perspective. The object is the deed or the thing being done. It is, therefore, the endeavour that the activity is meant to achieve. It embodies the problem situation or the objective of the activity system (Spinuzzi 2011). The tools are the apparatus that mediates between the subject and the object to bring out the outcome, which is the desired result (see <xref ref-type="fig" rid="F0001">Figure 1</xref>).</p>
<p>The rules are the cultural norms and regulations that determine or shape the interaction of players with the activity. These include the government policy, strategic plans of the institution or organisation, and discipline-specific rules that must be complied with by the subject in the process of executing the activity. The division of labour component captures the different roles that are performed by different players towards the execution of the activity. It is, therefore, critical to assess which player performs what role in the activity. Finally, the community represents the environment and the context under which the activity is being carried out.</p>
<p><italic>Activity theory</italic> is depicted in three distinct generations, namely, the first, second and third generations. The first-generation AT simply consists of a subject and an object that are mediated by tools (Robertson <xref ref-type="bibr" rid="CIT0052">2008</xref>) (see <xref ref-type="fig" rid="F0001">Figure 1</xref>). The second-generation AT, however, places the activity at a collective level by including the rules, community and division of labour that affect the undertaking of the activity (Engestr&#x00F6;m <xref ref-type="bibr" rid="CIT0012">2001</xref>).</p>
<p>Finally, the third-generation AT expands on the second-generation AT by including connected activities (see <xref ref-type="fig" rid="F0003">Figure 3</xref>). The dual-activity system depicts the outcome of the interaction of two activities when they come into contact with each other to produce an outcome (Engestr&#x00F6;m <xref ref-type="bibr" rid="CIT0012">2001</xref>). This study, therefore, adopts the third-generation AT because of the two digital exposure activity systems (school system and home system) that we analyse in the development of the emerging African digital citizen.</p>
<fig id="F0003">
<label>FIGURE 3</label>
<caption><p>Third-generation activity theory.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="RW-9-187-g003.tif"/>
</fig>
</sec>
<sec id="s0006">
<title>Applying activity theory to the development of digital citizenship in South Africa</title>
<p>Mwanza and Engestrom (<xref ref-type="bibr" rid="CIT0042">2003</xref>) present eight parameters that can be used for identifying and analysing the contradictions and tensions that can arise from the interaction of actors in an activity system. In the following section, we discuss each of them as they apply to the development of digital citizenship in South Africa:</p>
<list list-type="bullet">
<list-item><p>Activity: when analysing an activity system, Mwanza and Engestrom (<xref ref-type="bibr" rid="CIT0042">2003</xref>) propose that we ask what sort of activity we are interested in. Our application of AT to the development of digital citizenship in South Africa is interested in analysing the learning process that young South Africans undergo in their endeavour to become digital citizens. This must open the challenges and opportunities they experience as they endeavour to become full digital citizens.</p></list-item>
<list-item><p>Object(ive): in answer to the objective component of AT, Mwanza and Engestrom (<xref ref-type="bibr" rid="CIT0042">2003</xref>) admonish the researcher to ask &#x2018;Why is the activity taking place?&#x2019; The activity (development of digital citizenship) is taking place because the brick and mortar world is now shifting into the e-world where social, business and educational activities are now taking place in cyberspace. Digital citizenship will enable young South Africans to fully participate in the digital era with the right &#x2018;norms of behaviour for the use of technology&#x2019; (Ribble <xref ref-type="bibr" rid="CIT0051">2014</xref>:2) and to have &#x2018;a sensible and reasonable approach to online interaction&#x2019; (Miles <xref ref-type="bibr" rid="CIT0039">2011</xref>:1).</p></list-item>
<list-item><p>Subjects: this refers to who is involved in carrying out the activity. The young South African university student is the one from whose perspective the activity will be analysed. We contend that this must not be taken literally because when viewing the activity through the lens of the subject like a student, the subjects may not have an all-round view of the entire system. As a result, our analysis of critical elements that the subjects are not exposed to will lack verbatim evidence but rather the reviewers&#x2019; analysis.</p></list-item>
<list-item><p>Tools: this refers to by what means the subjects are performing the activity. The tools in this activity are ICTs and online platforms such as social media and commercial as well as educational sites. Our application also includes the technological gadgets like mobile phones, personal computers and Internet connectivity. This is because we view connectivity as an enabler without which communication modes like social media will be impossible.</p></list-item>
<list-item><p>Rules and regulations: these indicate any cultural norms, rules or regulations governing the performance of the activity. The rules and regulations include the rules that govern access to and use of ICT tools and the platforms like social media and commercial as well as educational sites. These constitute a key aspect of context as they define what is possible in the current environment.</p></list-item>
<list-item><p>Division of labour: this component indicates who is responsible for what when carrying out an activity and how those roles are organised. This refers to the various roles that are being played by teachers and parents and/or guardians in helping the development of digital citizenship. We also include the students on the list of the specialist actors that perform the above roles.</p></list-item>
<list-item><p>Community: it refers to the environment in which the activity is being carried out. The community and the environment in which the activity is unfolding are the university community and the home community. The university includes the halls of residence because they are part of the university system. The home environment is the area where the student comes from, whether village or urban, and its community, like public libraries, shopping centres and community amenities. This includes the parents, guardians, teachers, neighbours and friends of the young people.</p></list-item>
<list-item><p>Outcomes: It refers to what is the desired outcome of carrying out the activity. The desired outcome is for the emerging South African digital citizen to develop the full qualities of a digital citizen that are described in the next section, that is, to identify and strategise the execution of what is necessary to develop a millennial who can participate in the digital engagement safely, responsibly, productively and civically (Mwanza &#x0026; Engestrom <xref ref-type="bibr" rid="CIT0042">2003</xref>).</p></list-item>
</list>
</sec>
<sec id="s0007">
<title>Methods and approach</title>
<p>This study used Engestr&#x00F6;m&#x2019;s (<xref ref-type="bibr" rid="CIT0012">2001</xref>) AT as a conceptual lens for identifying and analysing the challenges that are faced by South African millennials in their attempt to become digital citizens. We used the third-generation AT for assessing any tensions and contradictions (Engestrom &#x0026; Sannino <xref ref-type="bibr" rid="CIT0013">2011</xref>) that may exist between the university and the home communities that are grooming the African millennials into digital citizens. The study operationalised the components of third-generation AT on the home and university activity systems. We adopted an interpretivist paradigm as articulated by Klein and Myres (<xref ref-type="bibr" rid="CIT0029">1999</xref>). As a result, this led to our writing style in the first person to declare the internal realism perspective from which we (the authors) interpret the research findings. While AT is often viewed as an epistemological stance, we complemented it with two key principles of interpretive case studies to enhance the conceptualisation of both contradictions and contextualisation (Klein &#x0026; Myres <xref ref-type="bibr" rid="CIT0029">1999</xref>). These are the principle of dialogical reasoning, which requires &#x2018;sensitivity to possible contradictions between the theoretical preconceptions guiding the research design and actual findings&#x2019;, and the principle of contextualisation, which calls for &#x2018;critical reflection of the social and historical background of the research setting&#x2019; (Klein &#x0026; Myres <xref ref-type="bibr" rid="CIT0029">1999</xref>:72).</p>
<p>In addition to the challenges faced, we investigated the capacity gap by assessing the African millennials&#x2019; situation against the ideal expectations of the digital citizen as articulated by Al-Zahrani (<xref ref-type="bibr" rid="CIT0001">2015</xref>). A sequential mixed-methods research approach consisting of a low-resource survey and interviews (Creswell <xref ref-type="bibr" rid="CIT0010">2009</xref>) was used for collecting data on the capacity gap of the upcoming South African digital citizen. A sequential mixed-methods design was chosen to enable the researchers to analyse and reflect on the findings from the first phase before proceeding to the second phase. This was done through a research design that combines exploratory and confirmatory research phases.</p>
<p>A total of 148 questionnaires were administered to students at two campuses of a university in the Eastern Cape province, followed by 15 interviews. The interview guide for the qualitative research phase was, therefore, designed for getting an in-depth understanding of the reasons behind the survey findings. While the interview phase was mainly confirmatory, it was also used for exploring the gaps emanating from the methodological limitations of the quantitative phase. This, therefore, employed the in-depth interview for conducting both exploratory and confirmatory investigations on the themes which could not be investigated using closed questions that were employed in the survey phase.</p>
<p>The quantitative phase uses a survey for investigating quantifiable aspects of digital citizenship through a self-assessment of digital competence on a Likert scale. It focuses on Facebook since it was found to be the main driver of Internet uptake in Africa (RIA <xref ref-type="bibr" rid="CIT0053">2012</xref>; Stork et al. 2013). It is the most highly used Internet site by the millennials who constitute 42&#x0025; of South Africa&#x2019;s Facebook users (Kemp <xref ref-type="bibr" rid="CIT0026">2016</xref>; Mackey <xref ref-type="bibr" rid="CIT0034">2016</xref>). This probes digital citizenship themes like personal security, digital skills and frequency of usage, while digital etiquette and information literacy are assessed through semi-structured interviews. The questionnaire was designed as closed questions in the form of a Likert scale with four options, which include disagree = 1, disagree strongly = 2, agree = 3 and agree strongly = 4. Based on our previous experience, the neutral option was excluded in order to discourage students from using it to avoid answering survey questions.</p>
<p>We attempted to design simple and easy questions to ensure that the respondents would get the same message without misunderstanding them. A pilot study was conducted in order to validate the questionnaire for user-friendliness. A few snags were identified through user feedback and these were documented and used for refining the final version of the questionnaire. The ethical approval to conduct the study was granted by the University of Fort Hare Research and Ethics Committee.</p>
</sec>
<sec id="s0008">
<title>Data analysis</title>
<p>Quantitative data were analysed using SPSS, while qualitative data used a drawing from selective use of grounded theory analysis approach. The data were cleaned and imported into SPSSV24 where descriptive and test statistics were conducted using frequencies. The qualitative phase used selective coding (Glaser <xref ref-type="bibr" rid="CIT0016">1992</xref>) by drawing from the selective use of grounded theory methodology for analysis only as articulated by Matavire and Brown (<xref ref-type="bibr" rid="CIT0036">2011</xref>). After the first two interviews, a preliminary coding of the data was conducted. The coding process was repeated after each interview to assess the emergence of new codes. The process seemed to have reached saturation after the researchers conducted 15 interviews.</p>
</sec>
<sec id="s0009">
<title>Research findings</title>
<p>This section presents the results of both the survey and interviews. In <xref ref-type="table" rid="T0001">Table 1</xref>, the demographic distribution of the participants shows that more female students (56&#x0025;) participated than male students (44&#x0025;). It also shows that more second- and third-year students (84&#x0025;) participated than fourth- and first-year (16&#x0025;) students. About 81&#x0025; had a good and excellent experience with social media, while over 70&#x0025; used social media several times a day.</p>
<table-wrap id="T0001">
<label>TABLE 1</label>
<caption><p>Demographics and frequencies.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Item</th>
<th valign="top" align="left">Category</th>
<th valign="top" align="center">Frequency</th>
<th valign="top" align="center">&#x0025;</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left" rowspan="3">Gender</td>
<td align="left">Male</td>
<td align="center">65</td>
<td align="center">43.9</td>
</tr>
<tr>
<td align="left">Female</td>
<td align="center">83</td>
<td align="center">56.1</td>
</tr>
<tr>
<td align="left"><bold>Total</bold></td>
<td align="center"><bold>148</bold></td>
<td align="center"><bold>100</bold></td>
</tr>
<tr>
<td align="left" rowspan="5">Current year of study</td>
<td align="left">1st year</td>
<td align="center">3</td>
<td align="center">2.1</td>
</tr>
<tr>
<td align="left">2nd year</td>
<td align="center">64</td>
<td align="center">43.2</td>
</tr>
<tr>
<td align="left">3rd year</td>
<td align="center">61</td>
<td align="center">41.2</td>
</tr>
<tr>
<td align="left">4th year</td>
<td align="center">20</td>
<td align="center">13.5</td>
</tr>
<tr>
<td align="left"><bold>Total</bold></td>
<td align="center"><bold>148</bold></td>
<td align="center"><bold>100.0</bold></td>
</tr>
<tr>
<td align="left" rowspan="6">How often do you use social media?</td>
<td align="left">Several times a day</td>
<td align="center">104</td>
<td align="center">70.3</td>
</tr>
<tr>
<td align="left">Daily</td>
<td align="center">13</td>
<td align="center">8.8</td>
</tr>
<tr>
<td align="left">Several times a week</td>
<td align="center">25</td>
<td align="center">16.8</td>
</tr>
<tr>
<td align="left">Once a week</td>
<td align="center">4</td>
<td align="center">2.7</td>
</tr>
<tr>
<td align="left">Less than once a week</td>
<td align="center">2</td>
<td align="center">1.4</td>
</tr>
<tr>
<td align="left"><bold>Total</bold></td>
<td align="center"><bold>148</bold></td>
<td align="center"><bold>100.0</bold></td>
</tr>
<tr>
<td align="left" rowspan="5">Please indicate your level of experience with social media</td>
<td align="left">Excellent</td>
<td align="center">47</td>
<td align="center">31.8</td>
</tr>
<tr>
<td align="left">Good</td>
<td align="center">73</td>
<td align="center">49.3</td>
</tr>
<tr>
<td align="left">Average</td>
<td align="center">26</td>
<td align="center">17.4</td>
</tr>
<tr>
<td align="left">Poor</td>
<td align="center">2</td>
<td align="center">1.4</td>
</tr>
<tr>
<td align="left"><bold>Total</bold></td>
<td align="center"><bold>148</bold></td>
<td align="center"><bold>100.0</bold></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>The descriptive statistics show that most of the student (55&#x0025;) were aware of how the personal information posted on the Internet will be accessible to other people. Only 51&#x0025; knew that the junk mail they received was related to the information they posted on Internet sites. The descriptive statistics for the rest of the questionnaire is provided in <xref ref-type="table" rid="T0002">Table 2</xref>.</p>
<table-wrap id="T0002">
<label>TABLE 2</label>
<caption><p>Frequencies.</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left" rowspan="2">Description</th>
<th valign="top" align="center" colspan="2">Strongly agree<hr/></th>
<th valign="top" align="center" colspan="2">Agree<hr/></th>
<th valign="top" align="center" colspan="2">Strongly disagree<hr/></th>
<th valign="top" align="center" colspan="2">Disagree<hr/></th>
</tr>
<tr>
<th valign="top" align="center">Frequency</th>
<th valign="top" align="center">&#x0025;</th>
<th valign="top" align="center">Frequency</th>
<th valign="top" align="center">&#x0025;</th>
<th valign="top" align="center">Frequency</th>
<th valign="top" align="center">&#x0025;</th>
<th valign="top" align="center">Frequency</th>
<th valign="top" align="center">&#x0025;</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">I am not concerned about the privacy of the information about me that is posted on Facebook.</td>
<td align="center">18</td>
<td align="center">12.2</td>
<td align="center">24</td>
<td align="center">16.2</td>
<td align="center">49</td>
<td align="center">33.1</td>
<td align="center">53</td>
<td align="center">35.8</td>
</tr>
<tr>
<td align="left">I feel confident that I have the skills to protect my privacy on Internet sites.</td>
<td align="center">17</td>
<td align="center">11.9</td>
<td align="center">42</td>
<td align="center">29.4</td>
<td align="center">34</td>
<td align="center">23.8</td>
<td align="center">50</td>
<td align="center">35.0</td>
</tr>
<tr>
<td align="left">It is very important to me that I am aware and knowledgeable about how my personal information will be used when I post it on Facebook.</td>
<td align="center">58</td>
<td align="center">39.2</td>
<td align="center">67</td>
<td align="center">45.3</td>
<td align="center">9</td>
<td align="center">6.1</td>
<td align="center">8</td>
<td align="center">5.4</td>
</tr>
<tr>
<td align="left">I am not aware of how my social network may use information that I post on my profile.</td>
<td align="center">25</td>
<td align="center">16.9</td>
<td align="center">69</td>
<td align="center">46.6</td>
<td align="center">41</td>
<td align="center">27.7</td>
<td align="center">11</td>
<td align="center">7.4</td>
</tr>
<tr>
<td align="left">I know the extent to which my information will be accessible to other people.</td>
<td align="center">22</td>
<td align="center">15.2</td>
<td align="center">57</td>
<td align="center">39.3</td>
<td align="center">18</td>
<td align="center">12.4</td>
<td align="center">47</td>
<td align="center">32.4</td>
</tr>
<tr>
<td align="left">Advertisers use my social network profile information to send me ads targeted to me.</td>
<td align="center">29</td>
<td align="center">19.6</td>
<td align="center">55</td>
<td align="center">37.2</td>
<td align="center">44</td>
<td align="center">29.7</td>
<td align="center">17</td>
<td align="center">11.5</td>
</tr>
<tr>
<td align="left">I would not mind if an employer saw what I posted on my profile.</td>
<td align="center">33</td>
<td align="center">22.3</td>
<td align="center">51</td>
<td align="center">34.5</td>
<td align="center">33</td>
<td align="center">22.3</td>
<td align="center">29</td>
<td align="center">19.6</td>
</tr>
<tr>
<td align="left">I am careful about the pictures I post of myself on my profile.</td>
<td align="center">99</td>
<td align="center">66.9</td>
<td align="center">37</td>
<td align="center">25.0</td>
<td align="center">7</td>
<td align="center">4.7</td>
<td align="center">5</td>
<td align="center">3.4</td>
</tr>
<tr>
<td align="left">I read the privacy statement provided by the site before I enter personal information.</td>
<td align="center">22</td>
<td align="center">15.7</td>
<td align="center">58</td>
<td align="center">41.4</td>
<td align="center">19</td>
<td align="center">13.6</td>
<td align="center">41</td>
<td align="center">29.3</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec id="s20010">
<title>Phase 2 result</title>
<p>This section presents a summary of the results of the qualitative research phase in <xref ref-type="table" rid="T0003">Table 3</xref>. The findings on each of the components of the AT are categorised according to both home and the university activity systems. This is meant to make it easier for the reader to compare and contrast the findings from the two activity systems.</p>
<table-wrap id="T0003">
<label>TABLE 3</label>
<caption><p>Quotes form interviews divided per variable</p></caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th valign="top" align="left">Variable</th>
<th valign="top" align="left">University</th>
<th valign="top" align="left">Home</th>
</tr>
</thead>
<tbody valign="top">
<tr>
<td align="left">Subject</td>
<td align="left"><list list-type="bullet"><list-item><p>&#x2018;I am from a very small town called Flagstaff. I grew up in rural areas and I came here when I was 19 years and there was a course for computers in my first year and that was the first time I learned to use a computer&#x2019;. (Ai1, Female, 19)</p></list-item>
<list-item><p>&#x2018;I was 19 years in 2012 and I learned for the first time in university.</p></list-item>
<list-item><p>There was an orientation day and we were supposed to write a test during our first-year registration. I wrote the test and failed but then it was just a test to check if I am able to use the Internet and computer and then I learned by myself&#x2019;. (Ti4, Male, 20)</p></list-item>
<list-item><p>&#x2018;I haven&#x2019;t been formally trained but just from my general knowledge I am able to identify valuable information just by looking at the source of the information and the content of the information&#x2019;. (Si8, Female, 20)</p></list-item>
<list-item><p>&#x2018;No I have never been taught on how to buy online or how to treat others; I have bought something online and I wouldn&#x2019;t really say I have been taught. On how to protect myself or my own privacy because I think for me it comes with what you want to be exposed to on the Internet and I just limit the information I put on the Internet especially about myself, so I would say for me it has always been a self-taught skill&#x2019;. (Si5, Male, 19)</p></list-item></list></td>
<td align="left"><list list-type="bullet"><list-item><p>&#x2018;&#x2026; No, I got my first smartphone this year and at home I had my first phone when I was doing grade-10 called V360 for calls and text messages&#x2019;. (Ai1, Female, 19)</p></list-item>
<list-item><p>&#x2018;There is a huge gap and need for training. If I can give you an example of my Dj career, some other things that DJs write are too offensive&#x2026;because those guys are illiterate.&#x2019; They just know how to play music and they can&#x2019;t really deal with criticisms from social media and other people. It&#x2019;s like you are running a business and so some people will always complain that they don&#x2019;t like this and that&#x2026;and these guys would take it negatively but me I would always take it differently because I have got those skills&#x2019;. (Mi3, Male, 21)</p></list-item>
<list-item><p>&#x2018;I have never used the Internet to buy anything, you know when you are not used to these digital things and you hear people saying there are scams in buying things online, then you become scared even when you want to buy &#x2026;&#x2019;. (Si8, Female, 20)</p></list-item>
<list-item><p>&#x2018;Yes, she did teach me and even at school we were taught that we must not just use the Internet anyhow because one day you are going to get a job and they will check your character on the Internet and even Facebook. Then it will be difficult for you if they find something negative to be hired for certain job position or even at all because of what you once posted on the Internet&#x2019;. (Mi3, Male, 21)</p></list-item></list></td>
</tr>
<tr>
<td align="left">Subject conclusions</td>
<td align="left"><list list-type="bullet"><list-item><p>Learned Internet at university</p></list-item>
<list-item><p>No e-commerce exposure</p></list-item>
<list-item><p>No information literacy training</p></list-item></list></td>
<td align="left"><list list-type="bullet"><list-item><p>Late smartphone adopter</p></list-item>
<list-item><p>No digital etiquette training</p></list-item>
<list-item><p>No e-commerce exposure</p></list-item>
<list-item><p>Warned to be modest on social media</p></list-item></list></td>
</tr>
<tr>
<td align="left">Rules</td>
<td align="left"><list list-type="bullet"><list-item><p>&#x2018;&#x2026; they restricted us to not download movies or listening to music online. Well it&#x2019;s good for the institution but for us, it&#x2019;s not because sometimes when studying we need to take a break and listen to music or watch something to refresh&#x2019;. (Ki14, Female, 20)</p></list-item>
<list-item><p>&#x2018;&#x2026; there are rules which one has to agree to when logging in to the university networks and these rules govern what you can do here. The rules state that you can&#x2019;t do things like visit porn sites, downloading movies and other stuff&#x2019;. (Pi15, Male, 22)</p></list-item>
<list-item><p>&#x2018;We are allowed to use our devices in class as long they don&#x2019;t disturb lectures&#x2019;. (Mi3, Male, 21)</p></list-item>
<list-item><p>&#x2018;&#x2026; we are only allowed to do things that are regarded as part of school work and doing things like watching movies online is forbidden&#x2019;. (SI9, Female, 19)</p></list-item>
<list-item><p>&#x2018;I think the Wi-Fi needs to be improved, the software needs to be updated to the current versions, and also they should allow us to use some services like torrents. We should be allowed to enter the labs with our own laptops as currently, they won&#x2019;t allow us because they don&#x2019;t want people stealing the laptops in the labs.&#x2019; (Si9, Female, 19)</p></list-item></list></td>
<td align="left"><list list-type="bullet"><list-item><p>&#x2018;No there are no rules and that is because they have no much knowledge about the Internet and the only thing that they would say is that I am old enough to know not to do something that would be offensive to other people or too private. Also that you can stay on the phone while you have something you should be doing or you can&#x2019;t be on the phone while eating, so the rules are such things only&#x2019;. (Si8, Female, 20)</p></list-item>
<list-item><p>&#x2018;Yes, I think there are rules [<italic>home</italic>] because you can&#x2019;t really do those things, you have to ask for permission to use the internet for academic purposes only and maybe you can then when they are not around do your other stuff but you can&#x2019;t access the internet for anything other than academic [purpose]&#x2019;. (Mi3, Male, 21)</p></list-item>
<list-item><p>It depends because we are not allowed to be on our phone while dining as a family or during the sleeping time but our parents don&#x2019;t really have much control on that so there are no rules I can say&#x2019;. (Ti3, Male, 22)</p></list-item>
<list-item><p>&#x2018;&#x2026; not rules but WhatsApp is always an issue with parents when you always on it but then when they refuse me WhatsApp I can always go out and be with my friends and do my WhatsApp, as long as I have done all my duties and back in the house at right time&#x2019;. (Ai1, Female, 19)</p></list-item></list></td>
</tr>
<tr>
<td align="left">Rules conclusions</td>
<td align="left"><list list-type="bullet"><list-item><p>Access to bad sites is blocked</p></list-item>
<list-item><p>Not allowed to download drama series</p></list-item>
<list-item><p>Allowed to use own devices</p></list-item></list></td>
<td align="left"><list list-type="bullet"><list-item><p>No parental rules about Internet use</p></list-item>
<list-item><p>Excessive use and use during dinner</p></list-item></list></td>
</tr>
<tr>
<td align="left">Community</td>
<td align="left"><list list-type="bullet"><list-item><p>&#x2018;No, I don&#x2019;t have friends who know better than me in using the internet &#x2026; Yes, they [Lecturers] do give me enough information I need because most of the things I know is because of them&#x2019;. (Ti3, Male, 22)</p></list-item>
<list-item><p>I learned here a lot from my friends, I didn&#x2019;t learn anything from ICT and lecturers because even though there is a computer lab in my department we were told to do books when we want to access it&#x2019;. (Ai1, Female, 19)</p></list-item>
<list-item><p>&#x2018;Yes, I had two friends: one doing a B.Comm General and the other Economics. We used to do CLT practical together and since I was struggling with computers a lot they helped me a lot&#x2019;. (Ki14, Female, 20)</p></list-item>
<list-item><p>&#x2018;&#x2026; but I have friends who still post their nude pictures online or share derogatory statement online which are things that may cost them in the future because I heard employers look at your online activities. I think they need to be taught more about avoiding things like that&#x2019;. (Pi15, Male, 22)</p></list-item>
<list-item><p>&#x2018;Yes, I remember very well the lecture was by Dr N. She spoke about cyberbullying and that we should respect others. She also spoke about restricting the amount of information you give out online and on social media to avoid cyber bullies&#x2019;. (Ki14, Female, 20)</p></list-item></list></td>
<td align="left"><list list-type="bullet"><list-item><p>&#x2018;In the rural areas there is really nothing much you can learn there; there&#x2019;s not much support they can give you like in my rural community most people are illiterate and even my own parents are not educated, so they don&#x2019;t really know much about those things to be able to offer any support&#x2019;. (Mi3, Male, 21)</p></list-item>
<list-item><p>&#x2018;Specifically using the internet I was never taught at home, using Microsoft I was taught that at a community centre but unfortunately they didn&#x2019;t have internet; they were just teaching basic Microsoft Word and Excel. Accessing internet there was no one to teach, you would go to the internet caf&#x00E9; and get someone to assist you by connection, how you do it is your struggle, no one teaches you&#x2019;. (Mi2, Male, 22)</p></list-item>
<list-item><p>&#x2018;In rural areas one thing is that people who have already acquired skills should be able to teach those who don&#x2019;t have the skills, but; they move out of the village to the city and we are left alone to hustle the skills on our own; when they come back, we have already got the skills on our own and some of them become very interested to assist there and there in improving what we already have&#x2019;. (Mi2, Male, 22)</p></list-item>
<list-item><p>&#x2018;In my township community some of my friends have access to these things and I can go to their homes and be able to access the internet as much as I want unlike at my home where it is limited and restricted by rules and I can get also skills and knowledge from them by asking of what I don&#x2019;t know and they tell me because they are much informed&#x2019;.&#x2019;(Mi3, Male, 21)</p></list-item></list></td>
</tr>
<tr>
<td align="left">Community conclusions</td>
<td align="left"><list list-type="bullet"><list-item><p>Educators</p></list-item>
<list-item><p>Friends and/or fellow students</p></list-item></list></td>
<td align="left"><list list-type="bullet"><list-item><p>Parents, siblings; friends</p></list-item>
<list-item><p>Internet cafes, libraries</p></list-item></list></td>
</tr>
<tr>
<td align="left">Division of labour</td>
<td align="left"><list list-type="bullet"><list-item><p>&#x2018;They [<italic>ICT support</italic>] give me support like ICT when I have a problem with my laptop I do go to them and they fix it for me so that I can be able to use it and also access the internet &#x2026;&#x2019;. (Ni6, Female, 20)</p></list-item>
<list-item><p>&#x2018;[<italic>ICT support</italic>] they do not assist us with the learning but they help with setting up our login profiles, our emails and printing our student cards&#x2019;. (Si9, Female, 19)</p></list-item>
<list-item><p>&#x2018;Lecturers also do support like they give us support on how to access information especially about certain projects that they give us.&#x2019; (Ni6, Female, 20)</p></list-item>
<list-item><p>&#x2018;The tutors move around helping the struggling students but often we are taught as a group and some people can&#x2019;t understand things quickly and the class may even end and they still do not understand what we were learning.&#x2019; (Si9, Female, 19)</p></list-item></list></td>
<td align="left"><list list-type="bullet"><list-item><p>&#x2018;[<italic>Siblings</italic>] my sister who is 5 years older than me taught me most of the things about technology, how to use a phone and most of the things I know now I learned from her&#x2019;. (Si8, Female, 20)</p></list-item>
<list-item><p>&#x2018;[<italic>Friend</italic>] I can&#x2019;t say I learned something (from friends) because the community I come from is a bit behind; in fact, I had to be the one teaching them when I went home&#x2019;. (Si15, Female, 22)</p></list-item>
<list-item><p>&#x2018;[<italic>Neighbours</italic>] I had a neighbour who was studying engineering at Ibika. He was advanced in technology so I used to follow him. He owned a computer and a smartphone and I was always with him. However, I was young then and all I knew about technology was watching movies on his laptop. He was the person who motivated me to get an interest in the computer world&#x2019;. (Si10, Male, 22)</p></list-item>
<list-item><p>&#x2018;[<italic>Parents</italic>] at my home there is no one to help me with the money to buy bundles because no one has it&#x2019;. (Oi6, Male, 19)</p></list-item></list></td>
</tr>
<tr>
<td align="left">Division of labour conclusions</td>
<td align="left"><list list-type="bullet"><list-item><p>Technical support from ICT Helpdesk</p></list-item>
<list-item><p>Academic content from lecturers</p></list-item>
<list-item><p>Practical assistance from fellow students</p></list-item></list></td>
<td align="left"><list list-type="bullet"><list-item><p>Parents provide funding</p></list-item>
<list-item><p>Siblings and friends give assistance</p></list-item>
<list-item><p>Internet cafes and libraries provide access</p></list-item></list></td>
</tr>
<tr>
<td align="left">Tools</td>
<td align="left"><list list-type="bullet"><list-item><p>&#x2018;&#x2026; here at school, I have free Wi-Fi all the time&#x2026; So on a daily basis, I would say I get about 9&#x2013;10 h of internet access&#x2019;. (Si8, Female, 20)</p></list-item>
<list-item><p>&#x2018;&#x2026; almost 90&#x0025; of my classmates have laptops and 99.5&#x0025; have smartphones&#x2019;. (Ai1, Female, 19)</p></list-item></list></td>
<td align="left"><list list-type="bullet"><list-item><p>&#x2018;At home [<italic>access</italic>] is a struggle with expensive data as you know&#x2026; I can&#x2019;t even use my laptop because connecting it to the internet is very expensive at home, so I use my phone&#x2019;. (Ai1, Female, 19)</p></list-item>
<list-item><p>&#x2018;Flexibility is serious caution and the fact that you can&#x2019;t compare desktop with the phone then you can&#x2019;t really be flexible on the phone as you would do on a desktop&#x2019;. (Mi2, Male, 22)</p></list-item>
<list-item><p>&#x2018;We have limited resources when it comes to technology in the Eastern Cape and the teachers seem to not take technology serious and they do not dedicate time to teach students how to use computers. There is also a lack of internet connectivity. I started to hear about Wi-Fi when I got to university&#x2019;. (Ki14, Female, 21)</p></list-item></list></td>
</tr>
<tr>
<td align="left">Tools conclusions</td>
<td align="left"><list list-type="bullet"><list-item><p>Computers</p></list-item>
<list-item><p>Smartphones</p></list-item>
<list-item><p>Free Wi-Fi</p></list-item></list></td>
<td align="left"><list list-type="bullet"><list-item><p>Smartphones</p></list-item>
<list-item><p>Data Bundles</p></list-item></list></td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
</sec>
<sec id="s0011">
<title>The interaction between the university and the home systems</title>
<p>Activity outcomes: The university and the home systems are complementing each other to produce an incomplete digital citizen who has more technical skills than digital etiquette. This is because of inadequacies on both university and home communities (see <xref ref-type="fig" rid="F0004">Figure 4</xref>).</p>
<fig id="F0004">
<label>FIGURE 4</label>
<caption><p>University and home activity systems.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="RW-9-187-g004.tif"/>
</fig>
<p>The university activity system: It is teaching technical skills for students to be productive during their university education and future work.</p>
<p>The home activity system: This system is funding the student&#x2019;s education and giving no further assistance than the values and the mores that are inculcated during the student&#x2019;s upbringing. It is failing, however, to complement the skills developed at university because of inadequate connectivity, mentorship and lack of devices in some cases.</p>
<p>Tools: The ICT tools that are available to the students at home are fewer than what they have in the university activity system. In addition to the personal devices like laptops and smartphones that some of them also have at home, they also have university Wi-Fi and computer labs at their disposal.</p>
<p>One participant puts it:</p>
<disp-quote>
<p>&#x2018;At home [<italic>access</italic>] is a struggle with expensive data as you know&#x2026; I can&#x2019;t even use my laptop because connecting it to the internet is very expensive at home, so I use my phone.<italic>&#x2019;</italic> (Ai1, Female, 19)</p>
</disp-quote>
<p>There is, therefore, no continuity of access which is essential for continuous digital exposure.</p>
<p>Rules: The home activity system has no rules that control the online activity of the millennials. The rules at home tend to regulate when not to use ICTs rather than the student&#x2019;s online behaviour, as one participant advised:</p>
<disp-quote>
<p>&#x2018;No, there are no rules, and that is because they have no much knowledge about the internet and the only thing that they would say is that I am old enough to know not to do something that would be offensive to other people or too private. Also that you cannot stay on the phone while you have something you should be doing or you can&#x2019;t be on the phone while eating, so the rules are such things only.&#x2019; (Mi3, Male, 21)</p>
</disp-quote>
<sec id="s20012">
<title>Division of labour</title>
<p>The findings show less enabling actors in the home compared to the university activity system. For instance, very few participants had any influence from friends, neighbours and institutions like libraries while they are at home. This is because of the lack of capacity, as well as rural to urban migration, as respondent Mi2 put it:</p>
<disp-quote>
<p>&#x2018;In rural areas one thing is that people who have already acquired skills they would be able to teach those who don&#x2019;t have; they move out of the village to better city and we are left alone to hustle the skills on our own.&#x2019; (Mi2, Male, 22)</p>
</disp-quote>
<p>Participant Si10 who comes from an urban community had a different experience:</p>
<disp-quote>
<p>&#x2018;I had a neighbour who was studying engineering at Ibika. He was advanced in technology, so I used to follow him. He owned a computer and a smartphone, and I was always with him. However, I was young then, and all I knew about technology was watching movies on his laptop. He was the person who motivated me to get an interest in the computer world.&#x2019; (Si10, Male, 22)</p>
</disp-quote>
<p>As discussed later, the university system had technical training, helpdesk backup and peer assistance.</p>
</sec>
<sec id="s20013">
<title>Community</title>
<p>Unlike the university, which had an ICT helpdesk, lecturers and peers that can help, the home activity system had some parental guidance and little technical help from a few libraries and Internet cafes.</p>
<p>Participant Mi2:</p>
<disp-quote>
<p>&#x2018;Specifically using the internet I was never taught at home, using Microsoft I was taught that at a community centre but unfortunately they didn&#x2019;t have internet; they were just teaching basic Microsoft Word and Excel. Accessing internet there was no one to teach, you would go to the internet caf&#x00E9; and get someone to assist you with connection; how you do it is your struggle, no one teaches you.&#x2019; (Mi2, Male, 22)</p>
</disp-quote>
</sec>
</sec>
<sec id="s0014">
<title>Discussion</title>
<p>In this section, we discuss the findings presented in the previous section in line with the objectives of this study. Our analysis shows that the challenges that are being faced by the South African millennials in their endeavour to become digital citizens emanate from university curriculum, as well as their historical background and socio-economic situation. While our research findings show that they must make do with inadequate Internet access at home, their digital skills are acceptable. This is because they are compelled to acquire digital literacy at university and also because they are active on social media. They, however, lack digital citizenship qualities, for example, the ability to protect their personal privacy on Internet sites. About 81&#x0025; rated their social media experience as excellent or good, while only 41&#x0025; of them were confident in their ability to protect themselves on Internet sites. They also need to teach themselves the soft skills (like digital etiquette) and e-commerce that they are not being taught at university. Our research revealed that while the university system has scope for incubating good digital citizenship, the current syllabus, unenforced rules and poor access on the home front make it difficult for millennials to develop digital citizenship. <xref ref-type="fig" rid="F0005">Figure 5</xref> presents a high-level summary of the main barriers that inhibit the development of digital citizenship both at home and university activity systems.</p>
<fig id="F0005">
<label>FIGURE 5</label>
<caption><p>The barriers that inhibit the development of digital citizenship.</p></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="RW-9-187-g005.tif"/>
</fig>
<p>Third-generation AT enabled a comparative investigation of the home and university systems that are expected to complement each other in the process of developing South Africa&#x2019;s millennials into digital citizens. The research findings show tensions and shortcomings between the two systems. These tensions and some constraints &#x2013; socio-economic and historical contextual factors &#x2013; have a negative impact on the development of digital citizenship. The university system was technocentric and the home system had an indirect impact on ethics. Instead of collaborating in both training and provision of technology, that is, connectivity and ICT devices, we found that the home community did not allow the students to perpetuate the technical training acquired at university. On the other hand, the university was not enhancing the ethical values from home. This is because of the lack of mentors and digital tool (i.e. devices and connectivity) at home, as well as the technical focus of the university curriculum.</p>
<p>As a result, the combination of both systems failed to produce digital etiquette. This leaves it all to chance as interviewee Mi3 put it:</p>
<disp-quote>
<p>&#x2018;I think it is a state of mind because, on my Facebook, some people would post things that I feel they are offensive to others. To me, I think it is a different story which goes with who you are and whether or not you care about other people. So I wasn&#x2019;t really taught how to behave on the internet, I think I do my best and maybe I am not doing right according to other people.&#x2019; (Mi3, Male, 21)</p>
</disp-quote>
<p>The contradiction within the home activity system is that the student has morally unfettered access without any cyber ethics rules at home where their ubuntu (humanness) is expected to come from. Olinger, Britz and Olivier (<xref ref-type="bibr" rid="CIT0045">2005</xref>) describe &#x2018;ubuntu&#x2019; as an African ideology whose ethical values are capable of solving Africa&#x2019;s political strife and ethnic conflict. We found that some ubuntu cultural values from one&#x2019;s upbringing (i.e. from the home system) were said to contribute towards responsible online behaviour. This is, however, affected by the knowledge gap that develops between parents and students. It is also exacerbated by the concomitant change in the students&#x2019; status when they return from university to their underprivileged community. The students acquire respect as the educated digital expert; yet they still need the community&#x2019;s moral guidance in their ongoing transition from digital literacy to digital citizenship.</p>
<p>As the interviewee Ki14 put it:</p>
<disp-quote>
<p>&#x2018;at home, there are no rules they don&#x2019;t mind if I&#x2019;m using my laptop.&#x2019; (Ki14, Female, 20)</p>
</disp-quote>
<p>We found that this is because the parents have no capacity to monitor the student&#x2019;s online behaviour as they do on offline platforms. The irony is that where connectivity allows, the students are freer at home to do what they cannot do at university; yet the home is supposedly the bastion of ubuntu. These contradictions in the activity system (Engestrom &#x0026; Sannino <xref ref-type="bibr" rid="CIT0013">2011</xref>) must be viewed from the causal effects of their historical context as articulated by Moulder (<xref ref-type="bibr" rid="CIT0041">2016</xref>). South Africa&#x2019;s apartheid legacy is responsible for the illiterate parentage, access gap and resource gap identified in the underprivileged communities where the majority of millennials came from.</p>
<p>The university activity system was found to be playing a significant role in providing basic skills, exposure to mentors and unlimited access. The university was, however, lacking in the development of millennials who can use technologies responsibly, safely, critically, productively and civically as expected from digital citizens (Ribble <xref ref-type="bibr" rid="CIT0051">2014</xref>). This is arguably because the university operates in silos and therefore no department has a specific endeavour to train the virtues of digital citizenship to every student. The students, therefore, need to develop these virtues on their own.</p>
<p>As participant Pi15 advised, they were never taught to post positive content. He does it because his sister was once raped:</p>
<disp-quote>
<p>&#x2018;I can&#x2019;t say I have been taught but I would like to believe some of the content I post on my twitter is productive. For example, when I post about things like rape because it is a subject I care about sharing since my sister was once raped.&#x2019; (Pi15, Male, 22)</p>
</disp-quote>
<p>Another respondent Ti4 expected students to learn digital etiquette on their own. She suggested that those who suffer cyberbullying are unaware of the tools provided by social media platforms. In her words, she said:</p>
<disp-quote>
<p>&#x2018;&#x2026; it&#x2019;s just that people are ignorant, for example, if you are using Facebook, it tells you that this is how you should conduct yourself, like if someone posts something that I don&#x2019;t like then I have a right to report it so it can be removed. So everyone who is using the internet knows, it is just that they are reluctant to learn about how to conduct themselves.&#x2019; (Ti4, Male, 20)</p>
</disp-quote>
<p>An analysis of the university&#x2019;s rules shows the contradiction of willingness to tackle cyber mischief, as well as an unwillingness to teach their students to confront it and overcome it when they get exposed on unrestricted platforms like their own devices. In other words, they impose rules that address the symptoms without developing the student&#x2019;s capacity to withstand the online vices that they will face outside the university network. By blocking access to unacceptable sites without teaching civility and responsibility, they are missing the opportunity to prepare their students for the unbridled access that they have on the home system. This may arrest some contagion at the university, but it forfeits the opportunity to teach digital citizenship, more so because there is no university curriculum that teaches digital etiquette.</p>
<p>Our research reveals that the ethics and etiquette that the participants purport to possess emanate from their upbringing and less from formal training. There are, however, some isolated degree programmes that were found to be instilling values that may foster digital civility in the students. This includes a course in nursing and another in information systems.</p>
<p>A nursing student Mi3 said:</p>
<disp-quote>
<p>&#x2018;We are also taught in our courses in nursing departments how to interact with other people and not harm them&#x2019;. (Mi3, Male, 21)</p>
</disp-quote>
<p>An information systems student also advised that they had learnt about personal security and cyberbullying:</p>
<disp-quote>
<p>&#x2018;&#x2026; yes I remember very well the lecture was by Dr Ni. She spoke about cyberbullying and that we should respect others. She also spoke about restricting the amount of information you give out online and on social media to avoid cyber bullies.&#x2019; (Mi3, Male, 21)</p>
</disp-quote>
<p>As can be seen in <xref ref-type="fig" rid="F0002">Figure 2</xref>, the tools that facilitate access and training and usage do not facilitate continuous learning. The access limitations of the home system do not complement unlimited access at the university. When the student leaves university for semester break or after-hours as well as on completion of studies, they access changes from unlimited (Wi-Fi) to intermittent if not non-existent (data bundles). Continuous learning is necessary in a fast-changing domain like ICT literacy where new technologies must be matched with further studies. Our concern is that the inhibitors (like access cost and lack of devices and electricity) that millennials face at home, that is, when they are not at the university, are capable of negating the progress made at university.</p>
<p>The university system provides basic aspects of literacy through two courses, namely CLT and Basic Computer Literacy. At the university of (name withheld), CLT is a compulsory module that contributes credits to the university degree, whereas Basic Computer Literacy is an optional course that one can skip by simply writing the exemption test. However, if one skips BCL there are no repercussions as it has no credits. Both courses prepare the student for the technical skills that enable the students to do their assignments on computer irrespective of the fact that they had no prior knowledge of computing. While it may give room for computer literate students to avoid the BCL module, there is no clearly defined route to exemption, just as there is no enforcement for those who need to take both CLT and BCL.</p>
<p>The students were found to have different levels of computer skills. For instance, one student, Si5, advised that she was far behind colleagues from better off backgrounds. In her own words, she said:</p>
<disp-quote>
<p>&#x2018;There was a huge gap &#x2026; they had that privilege of knowing how to use a computer, for example, typing and me I still had to first familiarise myself with the keyboard. &#x2026; they knew how to use the internet which I did not know, so there was a lot of catching up on my side even though we were of same age I was way behind with knowledge of computer use and internet.&#x2019; (Si5, Male, 19)</p>
</disp-quote>
<p>The university community was also found to have a vast capacity to develop digital citizenship if its resources were coordinated to do so. It has educators, ICT helpdesk technicians and fellow students who can foster the development of the millennials&#x2019; digital fluency. These aspects of the university activity system need to be harnessed for developing digital citizenship. For instance, we found that students help each other informally. Respondent Mi2 said:</p>
<disp-quote>
<p>&#x2018;Actually, some of them (friends) learned a lot of things from me because I am curious by nature and so that&#x2019;s how I know things then I shared the skills I got, I would say I have learnt some things from them and gave them some things. We teach each other.&#x2019; (Mi2, Male, 22)</p>
</disp-quote>
<p>This opportunity for the cross-pollination of skills in the university could be formalised through the teaching and learning centre where students work as tutors.</p>
<p>The ICT helpdesk also had the underutilised capacity to help develop digital skills. According to respondent Ni6, they were helpful:</p>
<disp-quote>
<p>&#x2018;They [<italic>ICT support</italic>] give me support like ICT when I have a problem with my laptop I do go to them and they fix it for me so that I can be able to use it and also access the internet.&#x2019; (Si5, Male, 19)</p>
</disp-quote>
<p>This potential was not being utilised by all who could benefit from it. For instance, respondent Mi2 a fourth-year student, had never benefited from the ICT helpdesk:</p>
<disp-quote>
<p>&#x2018;&#x2026; the ICT staff I have never been engaged with them for help with internet or computer use, I just know they work with these digital staff around campus and I don&#x2019;t know anything about them having to do with students.&#x2019; (Mi2, Male, 22)</p>
</disp-quote>
<p>The university activity system would realise its full capacity by advising all students about the role of the ICT helpdesk.</p>
<p>We also found that the students lacked the skill to conduct e-commerce, which is an important aspect of digital citizenship. This was, however, a rare exception of some IS students. The rest of the participants had not received any training to buy and sell on the Internet. Most of the respondents had not bought anything online. One student confirmed that he had taught himself how to buy online. About 59&#x0025; suggested that they feared financial loss on the Internet.</p>
<p>This was confirmed by an interviewee, Si8:</p>
<disp-quote>
<p>&#x2018;not yet but I am looking to buy something right now, but I am still sceptical because I don&#x2019;t trust it that much&#x2019;. (Si8, Female, 20)</p>
</disp-quote>
<p>This suggests that the key aspects of digital citizenship could only be developed by chance rather than through formal training.</p>
<p>Our comparison of the home and the university activity systems showed that the home activity system suffers from the lack of access and low exposure to other Internet users that students can learn from. Unlike the university where they have friends and lecturers to help with skills training, at home most have no computer literate friends who can mentor them. Their parents are not computer literate and they lack Internet access. As stated by one participant:</p>
<disp-quote>
<p>&#x2018;&#x2026; [<italic>in</italic>] my hometown Bizana most people know nothing about using mobile devices or the internet. As a result, even when I asked for money to go to the library they would not understand why I need to go to the library. Most of them advised that they use mobile data bundles for accessing the internet.&#x2019; (Mi2, Male, 22)</p>
</disp-quote>
<p>In terms of rules of Internet access and usage, we found that there were no rules on the home activity systems, basically because the parents are totally uninvolved in the children&#x2019;s online activity. There were some rules on the university system which forbade them to access illegal sites and to watch television (TV) series. The rest of the forbidden sites are blocked by the system.</p>
</sec>
<sec id="s0015">
<title>Conclusion and implications</title>
<p>This article makes its contribution by highlighting the challenges that the African millennials face on their way to digital citizenship. While the home activity system has socio-historical challenges, the university has an opportunity to refocus and help reduce the challenges that their students face. By focusing on digital skills while marginalising information literacy and digital etiquette, the educators are upholding temporary tools above their permanent purpose. Such technological determinism is downplaying the ephemeral nature of technologies and the need to inculcate transferable skills that will help the student to safely and civically process information in a continuously evolving information age with new cyberspace vices and new technological devices. Teaching the millennials about how to use technology without teaching them online safety, information literacy and civility will make them victims and perpetrators of cybercrime. Their productivity in the information age jobs will be lower than expected as they suffer from the effect of cybercrime. This calls for a revision of ICT literacy training modules to include the digital fluency that is required for good digital citizens. It also calls for the need to change teaching strategies by using learners to support other millennials in the communities of both the university and the home activity systems.</p>
</sec>
<sec id="s0016">
<title>Research limitations and future research</title>
<p>This research was conducted among university students. While they have the age and access which are expected of digital citizens, their situation cannot be uncritically inferred to the rest of South African millennials. The findings of this research, therefore, need to be read with due cognisance that university students have better training and better access than other millennials who come from the same backgrounds.</p>
<p>Future research must investigate how the ubuntu cultural virtues can be transferred to the digital front. It must also use practical testing exercises for assessing both the information literacy and digital wisdom (Prensky <xref ref-type="bibr" rid="CIT0047">2001</xref>) of African millennials. This will show the inadequacy of the current university training that marginalises soft skills like information literacy and digital etiquette.</p>
<p>This article has operationalised the use of Engestr&#x00F6;m&#x2019;s (<xref ref-type="bibr" rid="CIT0012">2001</xref>) activity system by presenting the South African millennial as the subject or human doer, the digital training process as the &#x2018;object&#x2019; or the thing being done, while the development of digital citizenship as the outcome. We have found that the millennials are walking a tightrope to digital citizenship because of inadequacies on both the home and the university systems. The home system lacks access (i.e. mentors, connectivity and devices), while the university system lacks soft skills training (i.e. information literacy, safety and etiquette). The two activity systems under consideration have the capacity to produce digital citizens if the home community improves digital tool and rules, while the university must include digital etiquette in its compulsory digital literacy curriculum.</p>
</sec>
</body>
<back>
<ack>
<title>Acknowledgements</title>
<sec id="s20017" sec-type="COI-statement">
<title>Competing interests</title>
<p>The authors declare that they have no financial or personal relationships which may have inappropriately influenced them in writing this article.</p>
</sec>
<sec id="s20018">
<title>Authors&#x2019; contributions</title>
<p>W.C. conceptualised the study and collected the data. L.C. conceptualised the study, did the data analysis and assisted with the final editing of the manuscript. S.T. conducted the literature review, wrote the manuscript and assisted with the editing of the manuscript.</p>
</sec>
</ack>
<ref-list id="references">
<title>References</title>
<ref id="CIT0001"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Al-Zahrani</surname>, <given-names>A</given-names></string-name>.</person-group>, <year>2015</year>, &#x2018;<article-title>Toward digital citizenship: Examining factors affecting participation and involvement in the internet society among higher education</article-title>&#x2019;, <source><italic>International Education Studies</italic></source> <volume>8</volume>(<issue>12</issue>), <fpage>203</fpage>&#x2013;<lpage>217</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5539/ies.v8n12p203">https://doi.org/10.5539/ies.v8n12p203</ext-link></comment></mixed-citation></ref>
<ref id="CIT0002"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Ameripour</surname>, <given-names>A</given-names></string-name>., <string-name><surname>Nicholson</surname>, <given-names>B</given-names></string-name>. &#x0026; <string-name><surname>Newman</surname>, <given-names>M</given-names></string-name>.</person-group>, <year>2009</year>, <source><italic>Internet usage under authoritarian regimes: Conviviality, community, blogging and online campaigning in Iran</italic></source>, <publisher-name>Manchester Centre for Development Informatics</publisher-name>, <publisher-loc>Manchester</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0003"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Australian Council for Educational Research</collab></person-group>, <year>2016</year>, &#x2018;<article-title>A global measure of digital and ICT literacy skills</article-title>&#x2019;, <comment>Background paper prepared for the 2016 Global Education Monitoring Report Education for people and planet: Creating sustainable futures for all, viewed 20 March 2017, from <ext-link ext-link-type="uri" xlink:href="http://unesdoc.unesco.org/images/0024/002455/245577E.pdf">http://unesdoc.unesco.org/images/0024/002455/245577E.pdf</ext-link></comment></mixed-citation></ref>
<ref id="CIT0004"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Avgerou</surname>, <given-names>C</given-names></string-name>.</person-group>, <year>2010</year>, &#x2018;<article-title>Discourses on ICT and development</article-title>&#x2019;, <source><italic>Information technologies and international development</italic></source> <volume>6</volume>(<issue>3</issue>), <fpage>1</fpage>&#x2013;<lpage>18</lpage>.</mixed-citation></ref>
<ref id="CIT0005"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Batista</surname>, <given-names>E</given-names></string-name>.</person-group>, <year>2003</year>, <source><italic>New privacy menace: Cell phones? Wired</italic></source>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="http://www.wired.com/news/business/0,1367,57692,00.html">http://www.wired.com/news/business/0,1367,57692,00.html</ext-link></comment></mixed-citation></ref>
<ref id="CIT0006"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Bednar</surname>, <given-names>P</given-names></string-name>. &#x0026; <string-name><surname>Welch</surname>, <given-names>C</given-names></string-name>.</person-group>, <year>2017</year>, &#x2018;<article-title>The innovation-Diffusion cycle: Time for a sociotechnical agenda</article-title>&#x2019;, <conf-name>Twenty-Fifth European Conference on Information Systems (ECIS)</conf-name>, <conf-loc>Guimar&#x00E3;es, Portugal</conf-loc>, <conf-date>June 5&#x2013;10, 2017</conf-date>.</mixed-citation></ref>
<ref id="CIT0007"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Binkley</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Erstad</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Herman</surname>, <given-names>J</given-names></string-name>., <string-name><surname>Raizen</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Ripley</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Miller-Ricci</surname>, <given-names>M</given-names></string-name>. <etal>et al.</etal></person-group>, <year>2011</year>, &#x2018;<chapter-title>Defining 21st century skills</chapter-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>P.</given-names> <surname>Griffin</surname></string-name>, <string-name><given-names>B.</given-names> <surname>McGaw</surname></string-name> &#x0026; <string-name><given-names>E.</given-names> <surname>Care</surname></string-name> (eds.)</person-group>, <source><italic>Assessment and teaching of 21st century skills</italic></source>, pp. <fpage>17</fpage>&#x2013;<lpage>66</lpage>, <publisher-name>Springer</publisher-name>, <publisher-loc>Dordrecht</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0008"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Ciborra</surname>, <given-names>C</given-names></string-name>.</person-group>, <year>2004</year>, &#x2018;<chapter-title>Encountering Information Systems as a phenomenon</chapter-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>C.</given-names> <surname>Avgerou</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Ciborra</surname></string-name> &#x0026; <string-name><given-names>F.</given-names> <surname>Land</surname></string-name> (eds.)</person-group>, <source><italic>The social study of information and communication technology: Innovation, actors, and contexts</italic></source>, pp. <fpage>18</fpage>&#x2013;<lpage>19</lpage>, <publisher-name>Oxford University Press</publisher-name>, Chapter 1.</mixed-citation></ref>
<ref id="CIT0009"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Counted</surname>, <given-names>V.A</given-names></string-name>. &#x0026; <string-name><surname>Arawole</surname>, <given-names>J.O</given-names></string-name>.</person-group>, <year>2016</year>, &#x2018;<article-title>We are connected, but constrained&#x2019;: Internet inequality and the challenges of millennials in Africa as actors in innovation</article-title>&#x2019;, <source><italic>Journal of Innovation and Entrepreneurship</italic></source> <volume>5</volume>(<issue>3</issue>), <fpage>1</fpage>&#x2013;<lpage>21</lpage>.</mixed-citation></ref>
<ref id="CIT0010"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Creswell</surname>, <given-names>J.W</given-names></string-name>.</person-group>, <year>2009</year>, &#x2018;<article-title>Editorial: Mapping the field of mixed methods research</article-title>&#x2019;, <source><italic>Journal of Mixed Methods Research</italic></source> <volume>3</volume>, <fpage>95</fpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1177/1558689808330883">https://doi.org/10.1177/1558689808330883</ext-link></comment></mixed-citation></ref>
<ref id="CIT0011"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>ECDL Foundation</collab></person-group>, <year>2014</year>, <source><italic>The fallacy of digital nativity: Why young people need to develop their digital skills</italic></source>, <publisher-name>ECDL Foundation</publisher-name>, <publisher-loc>Dublin</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0012"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Engestrom</surname>, <given-names>Y</given-names></string-name>.</person-group>, <year>2001</year>, &#x2018;<article-title>Expansive learning at work: Toward an activity-theoretical reconceptualization</article-title>&#x2019;, <source><italic>Journal of Education and Work</italic></source> <volume>14</volume>(<issue>1</issue>), <fpage>133</fpage>&#x2013;<lpage>156</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/13639080020028747">https://doi.org/10.1080/13639080020028747</ext-link></comment></mixed-citation></ref>
<ref id="CIT0013"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Engestrom</surname>, <given-names>Y</given-names></string-name>. &#x0026; <string-name><surname>Sannino</surname>, <given-names>A</given-names></string-name>.</person-group>, <year>2011</year>, &#x2018;<article-title>Discursive manifestations of contradictions in organizational change efforts. A methodological framework</article-title>&#x2019;, <source><italic>Journal of Organizational Change Management</italic></source> <volume>24</volume>(<issue>3</issue>), <fpage>368</fpage>&#x2013;<lpage>387</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/09534811111132758">https://doi.org/10.1108/09534811111132758</ext-link></comment></mixed-citation></ref>
<ref id="CIT0014"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Erstad</surname>, <given-names>O</given-names></string-name>.</person-group>, <year>2010</year>, &#x2018;<chapter-title>Conceptions of technology literacy and fluency</chapter-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>P.</given-names> <surname>Peterson</surname></string-name>, <string-name><given-names>E.</given-names> <surname>Baker</surname></string-name> &#x0026; <string-name><given-names>B.</given-names> <surname>McGaw</surname></string-name> (eds.)</person-group>, <source><italic>International encyclopedia of education</italic></source>, <edition>3rd</edition> edn., <publisher-name>Elsevier</publisher-name>, <publisher-loc>Oxford</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0015"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Farmer</surname>, <given-names>L</given-names></string-name>.</person-group>, <year>2011</year>, &#x2018;<article-title>Teaching digital citizenship</article-title>&#x2019;, <source>Paper presented at the Global TIME 2011</source>, pp. <fpage>34</fpage>&#x2013;<lpage>41</lpage>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="http://www.editlib.org/p/37093">http://www.editlib.org/p/37093</ext-link></comment></mixed-citation></ref>
<ref id="CIT0016"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Glaser</surname>, <given-names>B.G</given-names></string-name>.</person-group>, <year>1992</year>, <source><italic>Basics of grounded theory analysis</italic></source>, <publisher-name>Sociology Press</publisher-name>, <publisher-loc>MillValley</publisher-loc>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="http://www.sciencedirect.com/science/article/pii/S0040162510002489">http://www.sciencedirect.com/science/article/pii/S0040162510002489</ext-link></comment></mixed-citation></ref>
<ref id="CIT0017"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Gilster</surname>, <given-names>P</given-names></string-name>.</person-group>, <year>1997</year>, <source><italic>Digital literacy</italic></source>, <publisher-name>Wiley</publisher-name>, <publisher-loc>New York</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0018"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hale</surname>, <given-names>F</given-names></string-name>.</person-group>, <year>2010</year>, &#x2018;<article-title>The impact of apartheid on the educational endeavours of two missionary agencies</article-title>&#x2019;, <source><italic>Studia Historiae Ecclesiasticae</italic></source> <volume>36</volume>(<issue>2</issue>), <fpage>167</fpage>&#x2013;<lpage>185</lpage>.</mixed-citation></ref>
<ref id="CIT0019"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Hasan</surname>, <given-names>H</given-names></string-name>. &#x0026; <string-name><surname>Kazlauskas</surname>, <given-names>A</given-names></string-name>.</person-group>, <year>2014</year>, &#x2018;<chapter-title>Activity theory: Who is doing what, why and how</chapter-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>H.</given-names> <surname>Hasan</surname></string-name> (eds.)</person-group>, <source><italic>Being practical with theory: A window into business research</italic></source>, pp. <fpage>9</fpage>&#x2013;<lpage>14</lpage>, <publisher-name>THEORI</publisher-name>, <publisher-loc>Wollongong, Australia</publisher-loc>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="http://eurekaconnection.files.wordpress.com/2014/02/p-09-14-activity-theory-theori-ebook-2014.pdf">http://eurekaconnection.files.wordpress.com/2014/02/p-09-14-activity-theory-theori-ebook-2014.pdf</ext-link></comment></mixed-citation></ref>
<ref id="CIT0020"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Howard</surname>, <given-names>G</given-names></string-name>.</person-group>, <year>2011</year>, <source><italic>Truth, beauty, and goodness reframed: Educating for the virtues in the twenty-first century</italic></source>, <publisher-name>Basic Books</publisher-name>, <publisher-loc>New York</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0021"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Illich</surname>, <given-names>I</given-names></string-name>.</person-group>, <year>1973</year>, <source><italic>Tools for conviviality</italic></source>, <publisher-name>Harper Collins</publisher-name>, <publisher-loc>New York</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0022"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Jackson</surname>, <given-names>M</given-names></string-name>.</person-group>, <year>2003</year>, &#x2018;<article-title>Turn off that cellphone. It&#x2019;s meeting time</article-title>&#x2019;, <source><italic>New York Times</italic></source>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="http://www.nytimes.com/2003/03/02/business/yourmoney/02EXLIhtml?ex=1063339200&#x0026;en=3c1c4fad2b3a67ba&#x0026;ei=5070">http://www.nytimes.com/2003/03/02/business/yourmoney/02EXLIhtml?ex=1063339200&#x0026;en=3c1c4fad2b3a67ba&#x0026;ei=5070</ext-link></comment></mixed-citation></ref>
<ref id="CIT0023"><mixed-citation publication-type="book"><person-group person-group-type="editor"><string-name><surname>Jochems</surname>, <given-names>W</given-names></string-name>., <string-name><surname>van Merri&#x00EB;nboer</surname>, <given-names>J.J.G</given-names></string-name>. &#x0026; <string-name><surname>Koper</surname>, <given-names>R</given-names></string-name>. (Eds.)</person-group>, <year>2004</year>, <source><italic>Integrated e-learning: Implications for pedagogy, technology and organisation</italic></source>, <publisher-name>Routledge</publisher-name>, <publisher-loc>London, UK</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0024"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Johnson</surname>, <given-names>R.W</given-names></string-name>., <string-name><surname>Floyd</surname>, <given-names>M</given-names></string-name>., <string-name><surname>Pilling</surname>, <given-names>D</given-names></string-name>., <string-name><surname>Boyce</surname>, <given-names>M.J</given-names></string-name>., <string-name><surname>Grove</surname>, <given-names>B</given-names></string-name>., <string-name><surname>Secker</surname>, <given-names>J</given-names></string-name>. <etal>et al.</etal></person-group>, <year>2009</year>, &#x2018;<article-title>Service users&#x2019; perceptions of the effective ingredients in supported employment</article-title>&#x2019;, <source><italic>Journal of Mental Health</italic></source> <volume>18</volume>(<issue>2</issue>), <fpage>121</fpage>&#x2013;<lpage>128</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1080/09638230701879151">https://doi.org/10.1080/09638230701879151</ext-link></comment></mixed-citation></ref>
<ref id="CIT0025"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Kaptelinin</surname>, <given-names>V</given-names></string-name>.</person-group>, <year>1996</year>, &#x2018;<chapter-title>Activity theory: Implications for human computer interaction</chapter-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>B.</given-names> <surname>Nardi</surname></string-name> (ed.)</person-group>, <source><italic>Context and consciousness: Activity theory and human-Computer interaction</italic></source>, pp. <fpage>103</fpage>&#x2013;<lpage>116</lpage>, <publisher-name>MIT Press</publisher-name>, <publisher-loc>Cambridge, MA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0026"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Kemp</surname>, <given-names>S</given-names></string-name>.</person-group>, <year>2016</year>, <source><italic>We are social: Digital in 2016</italic></source>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="https://wearesocial.com/uk/special-reports/digital-in-2016">https://wearesocial.com/uk/special-reports/digital-in-2016</ext-link></comment></mixed-citation></ref>
<ref id="CIT0027"><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><surname>Keswell</surname>, <given-names>M</given-names></string-name>.</person-group>, <year>2004</year>, <source><italic>Education and racial inequality in post-apartheid South Africa</italic></source>, <comment>Santa Fe Institute Working Paper, No. 2004-02-008</comment>.</mixed-citation></ref>
<ref id="CIT0028"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Klein</surname>, <given-names>H</given-names></string-name>. &#x0026; <string-name><surname>Hirschheim</surname>, <given-names>R</given-names></string-name>.</person-group>, <year>2012</year>, &#x2018;<article-title>A glorious and not-so-short history of the information systems field</article-title>&#x2019;, <source><italic>Journal of the Association for Information Systems</italic></source> <volume>13</volume>(<issue>4</issue>), <fpage>188</fpage>&#x2013;<lpage>235</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.17705/1jais.00294">https://doi.org/10.17705/1jais.00294</ext-link></comment></mixed-citation></ref>
<ref id="CIT0029"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Klein</surname>, <given-names>H</given-names></string-name>. &#x0026; <string-name><surname>Myres</surname>, <given-names>D</given-names></string-name>.</person-group>, <year>1999</year>, &#x2018;<article-title>A set of principles for conducting and evaluating interpretive field studies in information systems</article-title>&#x2019;, <source><italic>MIS Quarterly</italic></source> <volume>23</volume>(<issue>1</issue>), <fpage>67</fpage>&#x2013;<lpage>94</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.2307/249410">https://doi.org/10.2307/249410</ext-link></comment></mixed-citation></ref>
<ref id="CIT0030"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kritzinger</surname>, <given-names>E</given-names></string-name>.</person-group>, <year>2016</year>, &#x2018;<article-title>Short-term initiatives for enhancing cyber-safety within South African schools</article-title>&#x2019;, <source><italic>South African Computer Journal</italic></source> <volume>28</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>17</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.18489/sacj.v28i1.369">https://doi.org/10.18489/sacj.v28i1.369</ext-link></comment></mixed-citation></ref>
<ref id="CIT0031"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Kruger</surname>, <given-names>S</given-names></string-name>., <string-name><surname>du Toit</surname>, <given-names>A</given-names></string-name>. &#x0026; <string-name><surname>Ponte</surname>, <given-names>S</given-names></string-name>.</person-group>, <year>2006</year>, <source><italic>De-racialising exploitation: &#x2018;Black economic empowerment&#x2019; in the South African wine sector</italic></source>, <comment>DIIS working Paper no 2006/34</comment>, <publisher-name>Danish Institute for International Studies</publisher-name>, <publisher-loc>Copenhagen</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0032"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Kuutti</surname>, <given-names>K</given-names></string-name>.</person-group>, <year>1996</year>, &#x2018;<chapter-title>Activity theory as a potential framework for human computer interaction research</chapter-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>B.A.</given-names> <surname>Nardi</surname></string-name> (ed.)</person-group>, <source><italic>Context and consciousness: Activity theory and human-computer interaction</italic></source>, <publisher-name>The MIT Press</publisher-name>, <publisher-loc>Cambridge, MA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0033"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Latour</surname>, <given-names>B</given-names></string-name>.</person-group>, <year>1994</year>, &#x2018;<article-title>On technical mediation: Philosophy, sociology, genealogy</article-title>&#x2019;, <source><italic>Common Knowledge</italic></source> <volume>3</volume>(<issue>2</issue>), <fpage>29</fpage>&#x2013;<lpage>64</lpage>.</mixed-citation></ref>
<ref id="CIT0034"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Mackey</surname>, <given-names>A</given-names></string-name>.</person-group>, <year>2016</year>, &#x2018;<article-title>Sticky emotional connections: Young people, social media, and the re-orientation of affect</article-title>&#x2019;, <source><italic>Safundi: The Journal of South African and American Studies</italic></source>, <comment>viewed 30 September 2016, from <ext-link ext-link-type="uri" xlink:href="http://www.tandfonline.com/doi/full/10.1080/17533171.2016.1176398">http://www.tandfonline.com/doi/full/10.1080/17533171.2016.1176398</ext-link></comment></mixed-citation></ref>
<ref id="CIT0035"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Mail &#x0026; Guardian</collab></person-group>, <year>2018</year>, <source><italic>Is South Africa the most unequal society in the world?</italic></source> <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="https://mg.co.za/article/2015-09-30-is-south-africa-the-most-unequal-society-in-the-world">https://mg.co.za/article/2015-09-30-is-south-africa-the-most-unequal-society-in-the-world</ext-link></comment></mixed-citation></ref>
<ref id="CIT0036"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Matavire</surname>, <given-names>R</given-names></string-name>. &#x0026; <string-name><surname>Brown</surname>, <given-names>I</given-names></string-name>.</person-group>, <year>2011</year>, &#x2018;<article-title>Profiling grounded theory approaches in information systems research</article-title>&#x2019;, <source><italic>European Journal of Information Systems</italic></source> <volume>22</volume>(<issue>1</issue>), <fpage>119</fpage>&#x2013;<lpage>129</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1057/ejis.2011.35">https://doi.org/10.1057/ejis.2011.35</ext-link></comment></mixed-citation></ref>
<ref id="CIT0037"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>McLuhan</surname>, <given-names>M</given-names></string-name>.</person-group>, <year>1964</year>, <source><italic>Understanding media: The extensions of man</italic></source>, <publisher-name>McGraw-Hill</publisher-name>, <publisher-loc>New York</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0038"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Mcmahon</surname>, <given-names>M.T</given-names></string-name>.</person-group>, <year>2014</year>, &#x2018;<article-title>Ensuring the development of Digital Literacy in higher education curricula</article-title>&#x2019;, in <conf-name>Proceedings of Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education</conf-name>, <conf-name>Dunedin, NZ</conf-name>, <conf-loc>November 23&#x2013;26, 2014</conf-loc>, pp. <fpage>524</fpage>&#x2013;<lpage>528</lpage>.</mixed-citation></ref>
<ref id="CIT0039"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Miles</surname>, <given-names>D</given-names></string-name>.</person-group>, <year>2011</year>, &#x2018;<article-title>Youth protection: Digital citizenship&#x2013;principles and new resources</article-title>&#x2019;, <conf-name>Paper presented at the Cybersecurity Summit (WCS), 2011 Second Worldwide</conf-name>, <conf-loc>London, UK</conf-loc>, <conf-date>1&#x2013;2 June</conf-date>.</mixed-citation></ref>
<ref id="CIT0040"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Mossberger</surname>, <given-names>K</given-names></string-name>., <string-name><surname>Tolbert</surname>, <given-names>C</given-names></string-name>. &#x0026; <string-name><surname>Mamilton</surname>, <given-names>A</given-names></string-name>.</person-group>, <year>2012</year>, &#x2018;<article-title>Measuring digital citizenship: Mobile access and broadband</article-title>&#x2019;, <source><italic>International Journal of Communication</italic></source> <volume>6</volume>(<issue>2012</issue>), <fpage>2492</fpage>&#x2013;<lpage>2528</lpage>.</mixed-citation></ref>
<ref id="CIT0041"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Moulder</collab></person-group>, <year>2016</year>, &#x2018;<article-title>Apartheid: The effects, history, and end of institutionalized racism in South Africa</article-title>&#x2019;, <comment>Fall 2016 - Matthew Unangst, History 105, viewed n.d., from <ext-link ext-link-type="uri" xlink:href="https://history105.libraries.wsu.edu/fall2016-unangst">https://history105.libraries.wsu.edu/fall2016-unangst</ext-link></comment></mixed-citation></ref>
<ref id="CIT0042"><mixed-citation publication-type="conference"><person-group person-group-type="author"><string-name><surname>Mwanza</surname>, <given-names>D</given-names></string-name>. &#x0026; <string-name><surname>Engestrom</surname>, <given-names>Y</given-names></string-name>.</person-group>, <year>2003</year>, &#x2018;<article-title>Pedagogical adeptness in the design of e-learning environments: Experiences from Lab@Future project</article-title>&#x2019;, <conf-name>Paper presented at the E-Learn 2003 International Conference on E-Learning in Corporate, Government, Healthcare, &#x0026; Higher Education</conf-name>, <conf-loc>Phoenix, AR</conf-loc>, <conf-date>7&#x2013;11th November</conf-date>.</mixed-citation></ref>
<ref id="CIT0043"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>My Broadband</collab></person-group>, <year>2015</year>, <source><italic>Internet access in South Africa: best and worst provinces</italic></source>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="https://mybroadband.co.za/news/telecoms/127450-internet-access-in-south-africa-best-and-worst-provinces.html">https://mybroadband.co.za/news/telecoms/127450-internet-access-in-south-africa-best-and-worst-provinces.html</ext-link></comment></mixed-citation></ref>
<ref id="CIT0044"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>NDP 2030</collab></person-group>, <year>2013</year>, <source><italic>The future is ours, we must make it work</italic></source>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="https://heaids.org.za/site/assets/files/1267/npc_national_development_plan_vision_2030_-lo-res.pdf">https://heaids.org.za/site/assets/files/1267/npc_national_development_plan_vision_2030_-lo-res.pdf</ext-link></comment></mixed-citation></ref>
<ref id="CIT0045"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Olinger</surname>, <given-names>H.N</given-names></string-name>., <string-name><surname>Britz</surname>, <given-names>J.J</given-names></string-name>. &#x0026; <string-name><surname>Olivier</surname>, <given-names>M.S</given-names></string-name>.</person-group>, <year>2005</year>, &#x2018;<article-title>Western privacy and ubuntu -influences in the forthcoming data privacy bill</article-title>&#x2019;, in <person-group person-group-type="editor"><string-name><given-names>P.</given-names> <surname>Brey</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Grodzinsky</surname></string-name> &#x0026; <string-name><given-names>L.</given-names> <surname>Introna</surname></string-name> (eds.)</person-group>, <source><italic>Ethics of new information technologynn &#x2013; Proceedings of the Sixth International Conference of Computer Ethics: Philosophical Enquiry (CEPE2005)</italic></source>, pp. <fpage>291</fpage>&#x2013;<lpage>306</lpage>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="http://mo.co.za/abstract/ubuntu.htm">http://mo.co.za/abstract/ubuntu.htm</ext-link></comment></mixed-citation></ref>
<ref id="CIT0046"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>Pew Research</collab></person-group>, <year>2010</year>, <source><italic>Millennials: Confident. connected. Open to change</italic></source>, <publisher-name>Pew Research Center Internet &#x0026; American Life Project</publisher-name>, <publisher-loc>WA, Washington D.C</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0047"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Prensky</surname>, <given-names>M</given-names></string-name>.</person-group>, <year>2001</year>, &#x2018;<article-title>Digital natives, digital immigrants</article-title>&#x2019;, <source><italic>On the Horizon</italic></source> <volume>9</volume>(<issue>5</issue>), <fpage>1</fpage>&#x2013;<lpage>6</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1108/10748120110424816">https://doi.org/10.1108/10748120110424816</ext-link></comment></mixed-citation></ref>
<ref id="CIT0048"><mixed-citation publication-type="thesis"><person-group person-group-type="author"><string-name><surname>Rakhometsi</surname>, <given-names>M.S</given-names></string-name>.</person-group>, <year>2008</year>, &#x2018;<article-title>The transformation of black school education in South Africa</article-title>&#x2019;, <comment>Unpublished PhD thesis, viewed n.d., from <ext-link ext-link-type="uri" xlink:href="http://www.sahistory.org.za/sites/default/files/RakometsiMS.pdf">http://www.sahistory.org.za/sites/default/files/RakometsiMS.pdf</ext-link></comment></mixed-citation></ref>
<ref id="CIT0049"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rapley</surname>, <given-names>J</given-names></string-name>.</person-group>, <year>2004</year>, &#x2018;<article-title>Development studies and the post-development critique</article-title>&#x2019;, <source><italic>Progress in Development Studies</italic></source> <volume>4</volume>(<issue>4</issue>), <fpage>350</fpage>&#x2013;<lpage>354</lpage>. <comment><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.1191/1464993404ps095pr">https://doi.org/10.1191/1464993404ps095pr</ext-link></comment></mixed-citation></ref>
<ref id="CIT0050"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Ribble</surname>, <given-names>M</given-names></string-name>.</person-group>, <year>2011</year>, <source><italic>Digital citizenship in schools</italic></source>, <publisher-name>International Society for Technology in Education</publisher-name>, <publisher-loc>Arlington, VA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0051"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Ribble</surname>, <given-names>M</given-names></string-name>.</person-group>, <year>2014</year>, <source><italic>Digital citizenship: Using technology appropriately</italic></source>, <comment>viewed 13 February 2014, from <ext-link ext-link-type="uri" xlink:href="http://digitalcitizenship.net/Home_Page.html">http://digitalcitizenship.net/Home_Page.html</ext-link></comment></mixed-citation></ref>
<ref id="CIT0052"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Robertson</surname>, <given-names>I</given-names></string-name>.</person-group>, <year>2008</year>, &#x2018;<article-title>Sustainable e-learning, activity theory and professional development. In Hello! Where are you in the landscape of educational technology?</article-title>&#x2019;, <source><italic>Proceedings ascilite Melbourne 2008</italic></source>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="http://www.ascilite.org.au/confersences/melbourne08/procs/robertson.pdf">http://www.ascilite.org.au/confersences/melbourne08/procs/robertson.pdf</ext-link></comment></mixed-citation></ref>
<ref id="CIT0053"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab>RIA</collab></person-group>, <year>2012</year>, <source><italic>Household and individual ICT access and use survey, 2011&#x2013;12</italic></source>, <publisher-name>Data</publisher-name>, <publisher-loc>Cape Town</publisher-loc>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="https://researchictafrica.net/ict-access-and-use-surveys/">https://researchictafrica.net/ict-access-and-use-surveys/</ext-link></comment></mixed-citation></ref>
<ref id="CIT0054"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Stork</surname>, <given-names>C</given-names></string-name>., <string-name><surname>Esselaar</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Chair</surname>, <given-names>C</given-names></string-name>. &#x0026; <string-name><surname>Khan</surname>, <given-names>S</given-names></string-name>.</person-group>, <year>2016</year>, <source><italic>OTT &#x2013; threat or opportunity for African telcos?</italic></source> <comment>Working Paper 1, Broadband 4 Africa, viewed n.d., from <ext-link ext-link-type="uri" xlink:href="http://researchictafrica.net/publications/Other_publications/2016&#x0025;20_Working_paper_1_OTT-threat&#x0025;20or&#x0025;20opportunity&#x0025;20for&#x0025;20African&#x0025;20Telcos.pdf">http://researchictafrica.net/publications/Other_publications/2016&#x0025;20_Working_paper_1_OTT-threat&#x0025;20or&#x0025;20opportunity&#x0025;20for&#x0025;20African&#x0025;20Telcos.pdf</ext-link></comment></mixed-citation></ref>
<ref id="CIT0055"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Takavarasha</surname>, <given-names>S</given-names></string-name>., <string-name><surname>Chinyamurindi</surname>, <given-names>W</given-names></string-name>. &#x0026; <string-name><surname>Cilliers</surname>, <given-names>L</given-names></string-name>.</person-group>, <year>2017</year>, <source><italic>Investigating the privacy concerns and protection behaviour of young people on Face Book in South Africa&#x2019;s Eastern Cape Province</italic></source>, <publisher-name>ACIST</publisher-name>, <publisher-loc>Cape Town</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0056"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Thobejane</surname>, <given-names>T.D</given-names></string-name>.</person-group>, <year>2013</year>, &#x2018;<article-title>History of apartheid education and the problems of reconstruction in South Africa</article-title>&#x2019;, <source><italic>Sociology Study</italic></source> <volume>3</volume>(<issue>1</issue>), <fpage>1</fpage>&#x2013;<lpage>12</lpage>.</mixed-citation></ref>
<ref id="CIT0057"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>United Nations</collab></person-group>, <year>2015</year>, <source><italic>Youth population trends and sustainable development</italic></source>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="http://www.un.org/esa/socdev/documents/youth/fact-sheets/YouthPOP.pdf">http://www.un.org/esa/socdev/documents/youth/fact-sheets/YouthPOP.pdf</ext-link></comment></mixed-citation></ref>
<ref id="CIT0058"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Van Dijk</surname>, <given-names>J</given-names></string-name>. &#x0026; <string-name><surname>Hacker</surname>, <given-names>K</given-names></string-name>.</person-group>, <year>2003</year>, <source><italic>The digital divide as a complex, dynamic phenomenon</italic></source>, <publisher-name>The Information Society</publisher-name>, <publisher-loc>Geneva</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0059"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Vygotsky</surname>, <given-names>L</given-names></string-name>.</person-group>, <year>1978</year>, <source><italic>Mind in society: The development of higher psychological processes</italic></source>, <publisher-name>Harvard University Press</publisher-name>, <publisher-loc>Cambridge, MA</publisher-loc>.</mixed-citation></ref>
<ref id="CIT0060"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Wang</surname>, <given-names>E</given-names></string-name>., <string-name><surname>Myers</surname>, <given-names>M.D</given-names></string-name>. &#x0026; <string-name><surname>Sundaram</surname>, <given-names>D</given-names></string-name>.</person-group>, <year>2012</year>, &#x2018;<article-title>Digital natives and digital immigrants: Towards a model of digital fluency</article-title>&#x2019;, <source><italic>ECIS 2012 Proceedings</italic></source>, vol. <volume>39</volume>, <comment>viewed n.d., from <ext-link ext-link-type="uri" xlink:href="http://aisel.aisnet.org/ecis2012/39">http://aisel.aisnet.org/ecis2012/39</ext-link></comment></mixed-citation></ref>
<ref id="CIT0061"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>White</surname>, <given-names>G.K</given-names></string-name>.</person-group>, <year>2013</year>, <source><italic>Digital fluency: Skills necessary for learning in the digital age</italic></source>, <publisher-name>ACER</publisher-name>, <publisher-loc>Melbourne</publisher-loc>.</mixed-citation></ref>
</ref-list>
<fn-group>
<fn><p><bold>How to cite this article:</bold> Takavarasha, S., Cilliers, L. &#x0026; Chinyamurindi, W., 2018, &#x2018;Navigating the unbeaten track from digital literacy to digital citizenship: A case of university students in South Africa&#x2019;s Eastern Cape province&#x2019;, <italic>Reading &#x0026; Writing</italic> 9(1), a187. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.4102/rw.v9i1.187">https://doi.org/10.4102/rw.v9i1.187</ext-link></p></fn>
</fn-group>
</back>
</article>