1 Introduction

In social sciences, inclusion refers to a process, de facto and/or de jure, of including people in a given social structure, most often, in society at large. Conversely, social exclusion describes “The inability of our society to keep all groups and individuals within reach of what we expect as a society …. [or] to realize their full potential” (Power and Wilson 2000, p.1). in this context, e-Inclusion is broadly defined as social inclusion in a knowledge society (Yu et al. 2018; Kaplan 2005) and in Europe, it remains one of the three strategic pillars of the i2010 inclusion strategic plan, which specifies primary goals of growth, employment, and quality of life (Helbig et al. 2009). The European strategy is to ensure that the benefits of the information society can be enjoyed by everyone, including people who are disadvantaged due to limited resources or education, age, gender, ethnicity and by people with disabilities as well as those living in less favoured areas. According to Wright and Wadhwa (2010) the term e-Inclusion has its roots in European Commission documents published in 1999 in which it is stated that, the objective of e-Inclusion is to bring every citizen, every school, and every company in Europe online.

Policies of e-inclusion in the UK have followed the European agenda. Since the introduction of e-government in the UK in the mid 1990’s, successive governments have defined policies and invested on digital inclusion initiatives with the ambition that all citizens and institutions will have access to digital content and technologies that enable them to create and support healthy, prosperous, and cohesive twenty-first century communities (Cabinet Office 2012). Moreover, to exploit the educational, economic, and social opportunities available through affordable ICTs, successive governments have looked at digital inclusion to support many policy areas such as social inclusion, community development, transformational government, product and service accessibility, data sharing and skills. In addition, the UK has always been active to explore ICT and digital inclusion policies to improve efficiency in operational services and cut cost of public services. However, challenges have remained from the beginning (i.e. for the last two decades) leaving important questions unanswered as to how all members of a community benefits equally from digital inclusion policies. Indeed, high usage rates are essential and a prerequisite for successful adoption and diffusion of e-government within a digital-national environment. While 97% of public services were available online in the UK for the last 8 years since 2010, this has not resulted in greater use of these services by citizens (Seybert 2011; Waller and Weerakkody 2016). By 2013, although 87% of UK households had Internet access (broadband connection) and 87% of individuals were regularly using the Internet and 77% purchased or ordered online, interaction with public authorities did not reach more than 33% for obtaining information, 22% for downloading forms, and 22% for returning filled forms (Information society statistics website 2014). This gap has continued to widen with the UK government’s digital by default policy (GDS 2015) - meaning a group that needs public services the most continue to struggle. The resulting calls by stakeholders such as local authorities and citizen advise services to maintain multiple channels of citizen-to-government interaction, including face-to-face and paper-based transactions, raises the important question of how to balance ‘digital by default’ with inclusion in the UK.

A review of relevant research over the last decade identifies several factors that influence citizens engagement with e-government (e.g. costs, trust, lack of skills, lack of access and disinterest) (El-Haddadeh et al. 2019; Mahmood et al. 2019; Cruz-Jesus et al. 2017; Helsper 2008; Helsper 2014; Becker et al. 2008; Carter et al. 2016). However, these factors are not all exclusive to e-government, some address the participation in information society in general (Becker et al. 2008). Becker et al. (2008) has distinguished different steps of participation in the information society by analysing citizens’ use of different Internet activities where they identified four gaps between different Internet activities used by citizens in Germany. We draw from Becker’s study to look at citizens’ use of different Internet activities and level of participation in information society and e-Inclusion based on the latest available data (UK E-Government Fact Sheet 2018). The first gap is between the total population and the Internet users – around 8 % of the UK population never used the Internet. The second gap is between the Internet users and the e-commerce users - while around 92% of individuals use the Internet at least once a week, only around 75% of the population have used it for buying or ordering goods. The third gap is between the e-commerce users and the e-government users – although around 75% of the population used e-commerce at least once every 3 months only around 49% of them have used it for e-government services (UK E-Government Fact Sheet 2018). This is only a 9 % rise compared to 2014. The fourth gap between people who use e-government for the purpose of information and those who use e-government for the purpose of transactions was omitted since data was not available to assess this. Although Becker’s approach was successful in identifying the specific e-inclusion gaps between citizens, the approach could not determine which measures to undertake in order to increase inclusiveness within e-government use. To address this research gap from a theoretical angle and to find out the critical e-Inclusion factors that influence citizens’ use of online government services within a digital nation (UK), the present research was undertaken.

Given the parallels between e-government and e-inclusion, it helps to understand how policies, society, organisations, and information technologies come together and how e-Inclusion factors influences e-government use. This is particularly important as there is limited theoretical understanding of the complexities and challenges facing e-inclusion. Given this context, this study aims to answer the research question: What are the key factors that influence e-inclusion in the context of e-government within its digital-by-default environment in the UK? In answering the research question, this study attempts to examine the theoretical and practical intersections of e-inclusion and e-adoption (within a digital by default context) and to extrapolate how they complement and possibly enrich the potential of both e-inclusion and e-government research.

In realise the above, the rest of the paper is structured as follows. The next section presents a brief background to e-government and conceptualises e-inclusion through a review of relevant theoretical models and discussion of current gaps and challenges in studying e-inclusion. This is followed by the development of a conceptual framework and a set of research hypotheses for evaluating the factors influencing e-inclusion in section 3. Thereafter, the research methodology used for the study is outlined in section 4. A discussion follows in section 6, which reflects on the empirical results presented in the previous section 5 of a survey of UK citizens. The paper concludes by outlining the main contributions to literature and lessons to policy makers.

2 Research Context and Theoretical Background

2.1 Digital Government and Digital Inclusion: The Context

It is evident that there is a close linkage between inclusion and digital inclusion (e-inclusion) (Yu et al. 2018; Wright and Wadhwa 2010; Helbig et al. 2009; Kaplan 2005). In this regard, e-Inclusion is essentially about social inclusion in a knowledge society (Kaplan 2005). In Europe, e-inclusion remains one of the three strategic pillars of the i2010 inclusion strategic plan, which specifies primary goals of growth, employment, and quality of life (Helbig et al. 2009). The European strategy is to ensure that the benefits of the information society can be enjoyed by everyone, including people who are disadvantaged due to limited resources or education, age, gender, ethnicity disabilities as well as those living in less favoured areas (i2010 European Strategic Plan 2007). According to Wright and Wadhwa (2010) the term e-inclusion has its roots in European Commission documents published in 1999 in which it is stated that, the objective of e-inclusion is to bring every citizen, every school, and every company in Europe online.

Definitions of e-inclusion are important for both practice and research. In practice, if e-inclusion is understood as multi-faceted then e-inclusion practices will need to reflect this in order to be successful. On the other hand, in e-inclusion research there are dangers in viewing e-inclusion too simplistically (Damarin 2000; Saebø et al. 2008). Therefore, it is important to define the boundaries of e-inclusion and identify the core concepts for e-Inclusion that can cater for a wide range of influencing factors. Within this context, it is also critically importance to distinguish between e-inclusion and e-adoption, (e.g. the uptake of ICT tools and services by the population at large). E-Inclusion is mostly concerned with the social impact of relative differences in ICT use between different socioeconomic groups and individuals while e-adoption focuses instead on absolute and average figures of ICT uptake and their economic impact (Kaplan 2005).

The debate has been ongoing for nearly two decades now about policies such as digital-by-default in the UK and whether they can promote social inclusion through access to government services from anywhere in a transparent, efficient and cost-effective manner (Helsper 2008; Helsper 2012; Helsper 2014; Shelley II et al. 2006; Waller and Weerakkody 2016). Consequently, for e-government to be inclusive, it must reach out to all segments of population with e-services that meet the needs of the digitally disadvantaged. Although e-adoption has a positive impact on e-Inclusion as it draws more people and services online, with a series of positive economic benefits, it is not the case with inclusion. The quantitative growth of the online population may leave out large numbers of groups and individuals. For this reason, e-inclusion should not be reduced to e-adoption, which would only look at levels of ICT at large and miss the social impact of relative differences in ICT use between various socio-economic groups and individuals (Mancinelli 2008). There are many theoretical and empirical difficulties of bringing together e-inclusion and e-government fields. E-Inclusion and e-government fields seem to be moving toward more complex and sophisticated understandings of each phenomenon and there are important similarities between their philosophical stances and theoretical lenses. However, there are relatively few explicit examples of e-inclusion research findings in published e-government research and vice versa (Helbig et al. 2009). E-Inclusion issues should be considered as important components in e-government theoretical models, either as assessing the social desirability of information technologies in a certain policy domain, affecting the demand of e-government services, or limiting the usefulness of certain government applications.

2.2 Conceptualising E-Inclusion: Relevant Theories and Models

The study of adoption and usage of information technology (IT) is considered to be one of the most mature areas of research within the information systems (IS) discipline (Benbasat and Zmud 1999; Hu et al. 1999; Venkatesh et al. 2003). Subsequently, a number of theories and models have been adopted from diverse disciplines such as social psychology, sociology and marketing, and have been modified, developed and validated by IS researchers in order to understand and predict technology adoption and usage (Benbasat and Zmud 1999; Venkatesh et al. 2003). Theory of Reasoned Action (TRA) (Fishbein and Ajzen 1975); the Theory of Planned Behaviour (TPB) (Ajzen 1991; Ajzen 1988; Ajzen 1985; Ajzen and Fishbein 1980; Ajzen and Madden 1986); the Technology Acceptance Model (TAM) (Davis 1989; Davis et al. 1989); and the Diffusion of Innovation (DOI) Theory (Rogers 1995) are some of the theories and models that have been taken from other disciplines and further modified, extended and integrated according to the needs of IS research. These models usually extend the technology adoption models by including various additional constructs to account for the multi-disciplinary nature of the field. For example, Taylor and Todd (1995) proposed the decomposed TPB by modifying TPB and integrating the diffusion of innovation constructs within it in order to understand various factors in detail. Likewise, Venkatesh and Morris (2000) extended TAM by integrating gender and subjective norm constructs with the original TAM model in order to understand the role of gender and social influence in technology adoption.

A selection of an appropriate model or various constructs from different models posed to be a problem for this research due to the large numbers of choices of theories and models (e. g. TRA, TPB, TAM, DOI). Venkatesh et al. (2003) argued that researchers are confronted with a choice amongst a multitude of models and find that they must “pick and choose” constructs across the models or choose a “favoured model” and largely ignore the contributions from alternative models. Furthermore, it has been noted that there is a missing link between the studies of e-inclusion and e-government adoption, particularly from citizens’ perspective. Consequently, through a critical review of these bodies of literature, it has been possible to identify six important gaps in the literature, which this study will attempt to fill.

Indeed, several studies have attempted to conceptualise e-inclusion (see, for example, Becker et al. 2008; Bentivegna and Guerrieri 2010; Hargittai 2004; Hargittai and Hinnant 2008; Helsper 2008; Helsper and Eynon 2010; Mancinelli 2008; Almuwil et al. 2011; Weerakkody et al. 2012). However, Van Dijk (2006) argues rather forcefully that there has been a lack of theorisation in e-Inclusion research. Largely, e-inclusion research has remained at a descriptive level, underlining the demographics of income, education, age, sex, and ethnicity. Consequently, there is a need for deeper research to find out the social, cultural, and psychological causes behind the inequality of access. Many researchers have argued that e-Inclusion has multidimensional constructs, which adds more complexity when attempting to simplify the concept (e.g. Cullen et al. 2007; Codagnone 2009; Wright and Wadhwa 2010). In order to examine the impact of e-inclusion, it is important to identify appropriate assessments and indicative measures. At present, most existing indicators are still centred on broad measurements such as access to ICTs and Internet connection, availability and level of digital literacy skills and ICT usage rates. Although such indicators on e-access, e-skills and e-usage are useful for national benchmarks and trans-national comparisons, they fail to present an integrated view of the real life worlds of citizens (Cullen et al. 2007). We posit that greater elaboration and refinement of variables is needed in the assessment of e-Inclusion due to is multi-dimensional perspective.

A review of literature indicates that there are a few relevant frameworks that are focused on e-inclusion; while the available frameworks are useful for evaluating the impact of electronic services on general populations, they tend to be less applicable for evaluating the needs of disadvantaged people with more complex needs (Cullen et al. 2007). Bradbrook and Fisher (2004) advocate the ‘5 Cs’ of e-Inclusion Connection, Capability, Content, Confidence and Continuity. On the other hand, Van Dijk (2006) was one of the first academics to point out the multi-dimensional aspect of digital divide. He conceptualized access to a fourfold unit that comprises four barriers namely; motivational access, material access, skills access and usage access. Helsper (2008) focusing on digital resources grouped e-inclusion into four broad categories namely; ICT access, skills, attitudes and extent of engagement with technologies. The framework by Verdegem and Verhoest (2008) explains the relation between the socio-demographic and socio-economic characteristics of non-users or the disadvantaged group. Bentivegna and Guerrieri (2010) presented an e-Inclusion Index which is a multi-focus approach. The main objective of this index is to track progress in the development of ICTs and to monitor and capture the level of advancement of e-Inclusion. Table 1 presents a summary of various theories and models adopted in examining e-inclusion.

Table 1 various theories and models adopted for e-inclusion

3 A Conceptual Model for E-Inclusion

The literature review found that the lack of conceptual definitions and theoretical frameworks for e-inclusion has prevented the development of reliable measurement and identification of specific factors that influence e-Inclusion. Drawing from the available literature, a conceptual taxonomy of the key inhibitors for e-inclusion can identified, namely: demographical, economic, social, cultural, political, and infrastructural (See Table 2). Notably, these themes emerged in the literature from actual citizens’ behaviour in their day-to-day life situations while using electronic-government services.

Table 2 Key inhibitors for e-Inclusion in the context of e-government

By combining e-inclusion models and those used in e-government adoption, a research model is developed in the present study based on the Decomposed Theory of Planned Behaviour (DTPB) and Uses and Gratifications Theory (U&G). The rationale for choosing these two theories is explained in detail in the following sections (3.1 to 3.4).

3.1 Uses and Gratifications Theory (U&G)

The Use and Gratifications Theory (U&G) originated from the functionalist perspective on mass media communication. U&G was first developed in research on the effectiveness of the radio medium in the 1940s. The main focus of U&G -at that time- was on the explanations for audience members’ motivations and associated behaviours. Similarly, Herzog (1944) used the term gratifications to depict the specific dimensions of usage satisfaction of radio audiences. Following that, mass communication theorists applied the U&G perspective in the context of various mass media such as television and electronic bulletins. The U&G research has been quite fruitful in understanding consumers’ motivations and concerns for using various media such as radio, TV, and electronic bulletins (Eighmey and McCord 1998). Many theorists believe that uses and gratifications is a research tradition highly suited for Internet studies (See, Johnson and Kaye 2003; Weiser 2001). U&G has been widely applied to examine consumer experience associated with websites (Chen and Wells 1999; Korgaonkar and Wolin 1999; Eighmey and McCord 1998; Mukherji et al. 1998). According to Stafford et al. (2004) U&G guides the assessment of user motivations for media usage and access and explains how needs motivate individual’s adoption of information technology. Moreover, U&G has increasingly being used to investigate the adoption of web-based information services (Stafford et al. 2004; Diddi and LaRose 2006; Ko et al. 2005; Moon and Kim 2001). A basic assumption of U&G theory is that users are actively involved in media usage and interact highly with the communication media. Since the interactive nature of the Web requires high user involvement, the application of uses and gratification theory to improve our understanding of eInclusion and e-government users’ behaviour seems legitimate.

U&G studies on the Internet have identified multiple dimensions of Internet usage gratifications. For example, Stafford et al. (2004) have identified three key dimensions related to consumer use of the Internet and they are; process gratification (e.g., playing with the technology, resources, search engines, browsing), content gratification (e.g., information, education, knowledge, learning, research and entertainment), and social gratification (chatting, friends, interaction, and people). Content gratifications concern the messages carried by the medium, and processes gratifications concern actual use of the medium itself. Finally, the social gratifications which concern the interaction have been identified by Stafford as a new dimension of Internet gratification. Stafford dimensions of U&G is adopted for this study to construct the conceptual basis and research hypothesis for the arguments presented in this research. The reason behind adopting Stafford dimensions that he identified three key dimensions of gratifications related specifically to consumers’ use of the Internet as a medium. Moreover, the important contribution of Stafford was the identification of the social gratification construct which provides opportunities for the advancement of Internet access services.

Scholars have also argued that e-inclusion is not merely about digital access, digital literacy, or cost anymore. Fuchs (2009) posits that there are groups of people who although having access and skills to use the internet and e-government services, do not do so because they don’t see the relevance of, or do not trust in government websites. Therefore, understanding the citizens’ motivations and gratifications to use the Internet is a critical factor in the context of e-Inclusion and e-government adoption. In this respect, U&G can help to better understand citizens’ motivation for e-government use (Ruggiero 2000). This study suggests that citizens use the Internet for several reasons. The Internet usage for different gratifications are associated with the level of e-Inclusion and the four stages of e-government development (information available online, one-way interaction, two-way interaction, and full online transaction) because there is inherent interrelation between degree of use and degree of gratification (Johnson and Kaye 2003). These gratifications can be divided into three dimensions based on Internet-specific U&G measures which have been demonstrated in the management information system literature (Stafford et al. 2004; Stafford and Stafford 2001). The first dimension covers gratifications based on the content of the Internet (content gratifications) which is related to the repeated use of a media. The second dimension covers gratifications based on the actual experience of using the Internet (process gratifications). The third dimension covers gratifications arising from Internet use as a social environment and provides communication and interaction (social gratifications). Fuchs (2009) called lack the interest for using the Internet, ecommerce or e-government “motivational access”. This psychological aspect of the e-Inclusion is often neglected in literature (Fuchs 2009; Bruno et al. 2010). Moreover, motivational access is the first stage in Van Dijk (2005; 2006) cumulative “successive types of access” model. In this model the concept of access evolves into successive types of access to digital technologies: motivational access, physical access, skills access, and usage access. According to Van Dijk’s model, adoption starts with sufficient attractiveness of the innovation and the motivation for adoption. These arguments in the literature offer a strong justification for the author to consider U&G as a conceptual lens to study e-Inclusion. In Table 3, various uses of U&G theory in IS studies is presented.

Table 3 Constructs definition and sources

3.2 Decomposed Theory of Planned Behaviour (DTPB)

The DTPB (Taylor and Todd 1995) is derived from the theory of planned behaviour (Ajzen 1991) with its fundamental belief and structure (See Fig. 3). Taylor and Todd (1995) have proposed the DTPB to explain user’s acceptance of information system. The DTPB term exactly means that this theoretical model can explore more completely the dimensions of attitudes, subjective norm, and perceived behavioural control in TPB by decomposing them into specific belief dimensions (Taylor and Todd 1995). Later, several studies have also accepted this term to explore user acceptance of a range of information systems (Chau and Hu 2001; Hsu and Chiu 2004). Consequently, DTPB is expected to provide a more comprehensive understanding of user acceptance of intergovernmental e-government services for e-government services practitioners and researchers. This study adopted the decomposed theory of planned behaviour (DTPB) for the following reasons. First the DTPB was developed especially for understanding information technology use (Taylor and Todd 1995) and effectively explained individual intentions and behaviour in adopting e-government services (Hung et al. 2006) and mobile services (Yulong and Wenli 2009). In DTPB, attitude, subjective norm, and perceived behavioural control are further decomposed into some more specific constructs (Lau and Kwok 2007). Taylor and Todd (1995) demonstrated that DTPB has the enhanced descriptive power than theory of reason action and TPB models. Moreover, DTPB provides a better gratifying explanation of adoption intention (Shih and Fang 2004), a complete understanding of usage, and a complete understanding of adoption behaviour (Lau and Kwok 2007). The DTPB allows researchers to decompose the attitudinal, normative and control categories to better understand the reasons of adoption and non- adoption (Taylor and Todd 1995).

In this research, usage behaviour in the e-inclusion model is determined by behavioural intention, gratifications and the three major determinants: attitude, subjective norm, and perceived behavioural control which are used to determine the behavioural intention. The three major determinants are further decomposed into detailed belief constructs. Perceived usefulness, perceived ease of use and compatibility are the constructs that determine attitude. Interpersonal influence, media influence, and government influences are the constructs that determine subjective norm. Capacity, accessibility, affordability, and availability are the constructs that determine perceived behavioural control. According to DiMaggio and Hargittai (2001) inequality in e-Inclusion encompasses five main variables: technical means; autonomy; skill; social support; and purpose. In this study, we propose U&G to cover the purpose variables and DTPB to cover the technical, autonomy, skill, and social variables. Access is fundamental and basic to e-inclusion. According to Van Dijk (2005; 2006), the concept of access evolves into successive types of access to digital technologies: motivational access, physical access, skills access, and usage access. Motivational access is covered by the U&G, physical access is covered by accessibility, skill access is covered by capacity, and usage access is covered by the behavioural intention in DTPB.

3.3 Conceptual Framework

To explore the factors that influence e-inclusion in the context of digital-by-default for government services in the UK, U&G, DTPB, trust and risk are integrated to propose the research model for e-inclusion. (DTPB) is adapted from social psychology and integrated with the (U&G) in addition to theoretical findings from prior e-inclusion research to theorize a model of e-inclusion. Specifically, the research model brings together all (DTPB) constructs from the literature without the fear of losing theoretical plausibility of the model. The research model decomposes the perceived behavioural control components of (DTPB) into accessibility, affordability, availability, and capacity, the subjective norm component into interpersonal influence, media influence and government influence, and the attitude component into perceived usefulness, perceived ease of use, and compatibility. Three gratifications construct has been added to the model; process gratification, content gratifications, and social gratifications. Trust in e-government, trust in Internet and perceived risk were added to the model subsequently after conducting a pilot study. Finally, the use is examined in terms of two key conceptualisations; frequency, and intensity. Figure 1 outlines the research model that will examine the factors that influence e-Inclusion in the context of the UK by combining (U&G) with (DTPB). In this research, Stafford et al. (2004) gratification dimensions have been adopted. He identified three key dimensions of gratifications related to consumers’ use of the Internet; process gratifications (e.g., resources, search engines, searching for specific information, technology, website), content gratifications (e.g., information, education, knowledge, learning, research), and social gratifications (live chatting, interaction, and social interaction with people in general). The important contribution of Stafford was the identification of the social gratification construct which provides opportunities for the advancement of Internet access services. Content gratifications concern the messages carried by the medium, and processes gratifications concern actual use of the medium itself (Cutler and Danowski 1980). Moreover, the social gratifications for the Internet concern with the interaction (Stafford et al. 2004). Consistent with DTPB, the proposed model of e-inclusion consists of three predictor types, namely attitudinal beliefs, normative beliefs and control beliefs and dependent variables that include behavioural intention (BI), content gratifications, process gratifications, social gratifications, use behaviour, satisfaction, and continuity. Since TPB is a generalised theory and can be applied to a wide variety of contexts for predicting the adoption of different types of IT (Benbasat and Zmud 1999), the relationship between dependent and independent variables is hypothesised according to TPB. Therefore, TPB is considered a basic guiding theory for this research. The components of the proposed model hypothesises that the behavioural intention to use behaviour is determined by the following four types of constructs: (1) attitudinal constructs (COMP, PEOU, PU) represent the citizens’ favourable or unfavourable evaluation of the behaviour in question (i. e. use of e-government services); (2) normative constructs (Interpersonal influence, media influence, and government influence) represent the perceived pressure by family, friends, media, and government to perform the behaviour in question; (3) control constructs (Capacity, availability, affordability, and accessibility) represent the perceived control over the personal or external factors that may facilitate or constrain the behavioural performance (Tam et al. 2018; Ajzen 1991; Rogers 1995; Taylor and Todd 1995); (4) gratifications (content gratifications which represents gratifications related to the repeated use of a media, process gratifications which represent gratifications based on the actual experience of using the Internet, and social gratifications which arise from Internet use as a social environment and provide communication and interaction). The predictor variables from the four categories are expected to determine and explain the behaviour intention to adopt and use e-government, which in turn is expected to predict the actual use behaviour (Ajzen 1991; Rogers 1995; Taylor and Todd 1995). A list of constructs with definition of each construct is presented in Table 3.

Fig. 1
figure 1

The proposed research model

3.4 Research Hypothesis

There are thirty distinct relationships that can be identified from the conceptual framework and it is important to explore these relationships. The proposed research model includes; six variables affecting attitude, three variables affecting subjective norm, and four variables affecting perceived behavioural control. The selection of these variables is supported by previous studies in IS or e-Inclusion literature. Figure 1 illustrates the research model and hypotheses for e-Inclusion in the context of e-government based on U&G and DTPB. The focus for both theories is explaining user acceptance and use of technology. Citizens’ behavioural intention towards e-government use has been usually examined by drawing on the concept of various technology acceptance models without sufficient attention being given to other factors (Lean et al. 2009). In this context, U&G has been quite effective in explaining motivations and needs for using the Internet (Ko et al. 2005; Korgaonkar and Wolin 1999; Papacharissi and Rubin 2000). The DTPB allows researchers to decompose the attitudinal, normative and control categories to better understand the reasons of adoption and non- adoption (Taylor and Todd 1995). However, some scholars have criticized user acceptance models for their inability to better account for the factors that explain users’ motivations toward technology. For example; Davis (1989) argues that research should also incorporate additional variables that could affect user acceptance. Therefore, in this study we extend DTPB to include motivational constructs from U&G to study e-inclusion. Moreover, in our proposed conceptualization and hypothesis development, we include three additional constructs (perceived trust, perceived risk, satisfaction, and continuity) to better understand the factors that influence citizens’ e-inclusion. In this study, U&G focuses on individual levels of psychological needs and motivations. U&G suggests that citizens’ selection and continuance use of the Internet activities (specifically, e-government) is based on their needs or gratification. In our conceptualization, we propose that content, process and social gratifications affects citizens’ attitude toward using the e-government. We posit that different users are driven by different motivations and the understanding of why people do not adopt or do not use ICT is strongly relevant in the light of the development of an inclusive information society. Table 4 draws from seminal literature and presents the hypothesis for this study.

Table 4 Research hypotheses

4 Methodology

To test the proposed hypotheses, we used a survey-based research within a quantitative paradigm (Creswell 2008) with a Likert scale (Bryman and Bell 2011) for rating the questions when collecting the respondent’s opinion. A seven-point rating scale is used in where 1 is extremely disagree and 7 is extremely agree. Both positive and negative questions are used to ensure that the respondents read each question carefully and think about which scale to select (Saunders et al. 2011). As the aim of this research was to examine the factors affecting e-inclusion in the context of digital-by-default in the UK, collecting data from as many participants from across the country is required. Thus, the survey approach was selected for the study and the sampling frame constituted citizens from across the UK (south, west, north, and east) representing an overall sample of the population. To institute the sample frame of citizens, a list of respondents was selected from all different backgrounds including students, housewives, employees, unemployed individuals, pensioners. Furthermore, due to the reason that not every unit (i.e. citizens) of the population is guaranteed to be selected in the sample, the survey was voluntary where only the interested respondents were invited to take part. Moreover, as this study focusing on e-inclusion, the survey has been designed to consider the responses of only the Internet adopters and potential adopters of the e-government services.

In this context, convenience sampling was used to draw from the part of the population that is close to hand, readily available, obtainable, or suitable to the researcher to conduct (Bhattacherjee 2000). The researchers handed out the questionnaire physically to the participants in different locations - concentrated community markets, community schools, public library, cafes, universities, and public transportation (trains) - and collected the completed questionnaires subsequently. This resulted in a well distributed sample in terms of demographic information. Moreover, this enabled the researchers to clarify any ambiguity to participants enabling them to understand the importance of the research, can encourage a higher response rate. Structural equation modeling (SEM) (Tabachnick and Fidell 2001; Comrey and Lee 1992; Schaupp et al. 2010; Horst et al. 2007; Hung et al. 2009) was used for data analysis from a collected sample of 510 surveys.

Following ethical guidelines, respondents were ensured about the anonymity of their personal information and advised not to reveal any of their personal information on the questionnaire. All the questions were close-ended to make sure that the respondents did not face any difficulty while responding. Prior to the actual data collection, a pilot study was conducted. This pilot study aimed both to evaluate the level of content validity and to ensure that the instructions, questions and scale items were clear. Seventy copies of the questionnaire were distributed through personal contacts on a convenience sample. Fifty-six valid responses were acquired with response rate of 80%. To test the reliability of the items measuring the same construct, Cronbach’s α was calculated for these items. After collecting the questionnaires, suggestions for possible improvements and appropriate modifications were discussed with respondents. According to Gliem and Gliem (2003), a factor loading between seventy to 80 %, points to a good internal consistency, whereas a loading above 80 % indicates an excellent internal consistency. The α tests revealed that all constructs except for one had α values above 70 %, revealing that all constructs had good internal consistency. The instrument was refined to increase the α values, after which nine items were removed from the instrument, leaving 63 items. Factorial validity could not be assessed at this stage because of the sample size requirements. The questionnaire was altered to eliminate any possible misunderstandings due to wording. Description of some tasks and minor wording details in survey items have been altered according to the feedback from the subjects.

5 Results and Analysis

A total of 800 questionnaires were distributed and 570 questionnaires were returned, which included 60 incomplete questionnaires, leaving a total of 510 usable questionnaires representing a response rate of 63.75% - an effective response rate within the field of IS research (Cornford and Smithson 2006). The results highlight that average respondent’s age ranged from 18 to 74 or above, with males accounting for 48.4% and females 51.6% of the sample. Half of the respondents (50.5%) were employed and held a secondary school degree (or above). Of the 510 respondents, 358 (70.2%) were e-government users and 152 (29.8%) were Internet users but not e-government users. Table 5 presents the demographic data obtained from the respondents.

Table 5 Respondents’ demographic profile

With regard to digital-by-default services, seven e-government services were listed at the beginning of the questionnaire to give a clear idea to the respondents about some of the digital government services provided by the UK government. These services were selected carefully by the researchers. This included; Council Tax, Inland Revenue, Driving License, Register to Vote, Register with GP, Apply for School Public e-Library services (see Fig. 2 for breakdown of their use). 382 (74.9%) of them have accessed government services online in the last 12 months.

Fig. 2
figure 2

Overview of citizens use of e-government services in the UK

Becker’s approach to identifying E-Inclusion gaps in the context of Germany was applied to the UK using secondary data (Eurostat and UK office for national statistics). The results indicate that both the UK and Germany share the same e-Inclusion gaps. Four e-Inclusion gaps were identified, and the deepest gap is between e-commerce users and e-government users. The same approach was applied to the research data which was collected from citizens in different cities in the UK. The findings in the UK were consistent with the German results. Moreover, a new gap was identified between use of e-commerce and use of e-banking (See Fig. 3) and this indicates and assures that e-government is the deepest gap among other Internet activities.

Fig. 3
figure 3

Level of e-inclusion gaps in the UK

A conclusion can be drawn from the above findings; the factors that determine and influence people to use e-government in general and e-government for transaction will help to address and better explain the factors that influence e-Inclusion and better explain possible inclusion gaps. There are many reasons behind the above differences in using different Internet activities that need to be clarified and which this research aimed to examine. First, a clarification needs to be made regarding the sample used for this research. The sample consists mainly Internet users, this was purposely to help fulfil the aim of this research. 40% of the respondents come from age group 25–44 and the rest of the group is older than 44. Respondents come from different employment, 40% of them are full time employees, 20% each for other categories.

The respondents indicate that the main reason for not using e-government is security concerns (See Fig. 4). Security concerns came first as the main reason for not using e-government service among respondents, lack of skills come second followed by high cost and finally lack of access. The results revealed that the main reasons that prevent people from using e-government is security concern. This is related to trust in e-government issue and consistent with the findings in the next section. The path from trust in e-government to attitude toward using e-government is significant. The second reason for not using e-government services is lack of skills. Moreover, the path from capacity to attitude toward using e-government was highly significant. This indicates the importance of skills. From the e-Inclusion gap model, it is clear that respondents are happy to adopt complex Internet activities that require skills, such as transaction services provided from business or banks. Moreover, using these Internet activities require trust in these activities as transactions are involved. A conclusion can be drawn from the findings that two main reasons for not using the e-government service are security concern and lack of skills. Moreover, people who are familiar with e-government services and their benefits are more likely to use e-government (See Fig. 4).

Fig. 4
figure 4

Reasons for citizens not using e-government in the UK

The finding reveals that the path between trust in Internet and attitude toward using e-government is not significant while the path from trust in e-government and the attitude toward using e- government is significant. This indicates that one of the reasons that prevent participants from using e-government services is trust in government.

5.1 Descriptive Statistics

Table 6 shows the Cronbach’s alpha (α), mean, and standard deviation (S.D) for 25 constructs considered for e-Inclusion model. The number of items considered for all these constructs varies from a minimum of two to a maximum of six.

Table 6 Reliability of measurements

5.2 Confirmatory Factor Analysis

A confirmatory factor analysis using AMOS 20.0 was conducted to test the full measurement model. Seven common model-fit measures were used to assess the model’s overall goodness of fit: the ratio of Chi square (χ2) to degrees-of-freedom (df), goodness-of-fit index (GFI), adjusted goodness-of-fit index (AGFI), Tucker-Lewis Index (TLI), Incremental Index of Fit (IFI), comparative fit index (CFI), and root mean square error of approximation (RMSEA). As shown in Table 7, all the model-fit indices exceeded their respective common acceptance levels suggested by previous research, thus demonstrating that the measurement model exhibited a fairly good fit with the data collected (χ2 = 90.28 with df = 62, CMIN/DF = 1.246, GFI = 0.980, AGFI = 0.961, IFI = 0.993, TLI = 0.989, CFI = 0.993, RMSEA = 0.040).

Table 7 Overall fit indices of measurement model with all constructs

From the above, the measurement model with all constructs showed a good fit for all indices. Table 8 shows path loadings, critical ratios (C.R.), and R square values in the measurement model.

Table 8 Summary results of convergent validity

As a rule, the significant factor loading should not be less than 0.5. The results indicate that all the standardised loading estimates are higher than 0.5, with the lowest value equaling 0.667. All the critical ratios (t-value) were significant above the threshold of ±1.96 (p < 0.001). The results also indicate that all the SMC are less than 0.90, with the highest value equaling 0.869. Once the model is specified and the fit indices indicate good fit, the construct validity should be assessed. Construct validity is assessed by convergent validity, and discriminant validity (Hair et al. 2006). Convergent validity means assigned indicators to measure certain factor are loading relatively high. Discriminant validity refers to the degree of distinctiveness between two constructs (Hair et al. 2006).

5.2.1 Validity Assessment

Validity is related with the accuracy of measures (Sekaran 2003). Validity is defined by Zikmund (2003) as “the ability of a scale to measure what it intended to be measured” (p.331). In other words, it determines the extent to which a construct and its corresponding measurement indicators are related, and the extent to which these set of items actually reflect the construct they were designed to measure (Hair et al. 2006). According to Neuman (2006), the better the fit between theoretical latent construct and measured items, the greater establishment of validity. Assessing the construct validity is one of the main objectives of using CFA (Hair et al. 2006). Construct validity can be examined by assessing the convergent validity and the discriminant validity which are explained as follows.

Convergent Validity

The convergent validity means the indicators measuring certain construct share the high proportion of variance in common (Hair et al. 2006). For this study, convergent validity was assessed by examining: 1) factor loadings, which relate significantly all indicators to their respective constructs; all the absolute values of critical ratios (C.R.) of all the indicators should be greater than 1.96, at the 0.05 level of significance, 2) standardized regression coefficients, which should be greater than 0.50, and 3) the average variance extracted (AVE), which reflects the overall amount of variance in the indicators accounted for by the latent construct. Thus, higher values of the AVE indicate that the items are truly representative of the latent construct. An average variance extracted (AVE) of at least 0.50 provides support for convergent validity. The rule of thumb indicates that good AVE starts from the value of 0.5 (Hair et al. 2016). As a rule, for factor loading, the significant factor should not be less than 0.5. The results indicate that all the standardised loading estimates are higher than 0.5, with the lowest value equalling 0.627. All the critical ratios (t-value) were significant above the threshold of ±1.96 (p < 0.001). Table 8 presents summary results of convergent validity.

The standardised factor loading was above the minimum of 0.5, with significant t-values. Also, the average variance extracted was above 0.5 for all constructs, suggesting good convergence. The reliability of the constructs was above 0.7, ranging from 0.712 to 0.924, indicating good reliability.

Discriminant Validity

The discriminant validity was introduced by Hair et al. (2006: p. 771) as “the extent to which a construct is truly distinct from other construct”. For this study, discriminant validity was assessed by comparing the squared correlation between two constructs with their respective average variance extracted (AVE). The average variance extracted (AVE) of both constructs should be greater than the squared correlation between the two constructs. Discriminant validity can be assessed using a rigorous test by comparing the average variance extracted values for any two constructs with the square of the correlation estimate between these two constructs. The rule that verifies discriminant validity is: AVE > squared correlation estimate. Therefore, the AVE calculated will be compared with the square of the correlation estimate between constructs, as depicted in Table 9. The results of the Table 7 support the existence of discriminant validity between constructs since the AVE between any two constructs is greater than the squared correlation estimate. In summary, the measurement model demonstrated adequate reliability, convergent validity, and discriminant validity.

Table 9 Discriminant validity

5.3 Structural Model and Hypotheses Testing

In order to test the relationships between constructs as hypothesised in the proposed theory, the measurement model is transformed to a structural model by assigning the relationships between constructs based on theory (Hair et al. 2006). The hypotheses are represented by the specified relationships among constructs. The structural model moves from the stage of specifying the relationship between the latent constructs and measured variables in the measurement model to an advanced level; at which the nature and strength of the relationships between constructs are determined (Hair et al. 2006). In other words, it moves from using CFA to the use of SEM to test the hypotheses.

The first step in model testing is to estimate the goodness-of-fit of the research model. The similar set of fit indices used to examine the measurement model will be used to examine the structural model: the ratio of Chi square (χ2) to degrees-of-freedom (df), (GFI), (AGFI), (TLI), (IFI), (CFI), and (RMSEA). All of the fit indexes indicate that the structural model has a good fit: Chi-square/d.f. (≦ 3.0) = 2.086, GFI (≧0.90) = 0.900, AGFI (≧0.80) = 0.800, IFI (≧0.90) = 0.932, TLI (≧0.90) = 0.925, RMSEA (≦0.08) = 0.046, CFI (≧0.90) = 0.931.

The second step in model estimation is to examine the path significance of each hypothesized association in the research model and variance explained (R2) by each path. The parameter estimates were used to produce the estimated population covariance matrix for the structural model. The model was defined by 77 measurement items that identified the eleven latent constructs. The covariance matrix among the constructs was applied to test the model. When the critical ratios (CRs or t-value) is higher than 1.96 for an estimate (regression weight), then the parameter coefficient value is statistically significant at the .05 levels (Hair et al. 2006). Critical ratios or t-value was obtained by dividing the regression weight estimate by the estimate of its standard error (S.E). Using the path estimates and CRs values, thirty causal paths were examined in this study. For 24 causal path estimates t-values were above the 1.96 critical values at (p ≤ .05). The t-values for remaining six constructs were found statically not significant. The overall structural model is depicted in Fig. 5, and parameter estimates are presented in Table 10. It is to be noted that the measurement items and error terms associated with latent constructs are not shown for clarity.

Fig. 5
figure 5

Path coefficient for structural model

Table 10 Path loadings and critical ratios within constructs in the structural model

Results presented in Table 10 indicate that the twenty four of 30 hypothesized paths between independent and dependent variables were significant. For instance, the hypothesised path between perceived ease of use and perceived usefulness with CR value of 14.885 (>1.96) was statistically significant (p = 0.001). Similarly, paths between perceived usefulness and attitude; perceived ease of use and attitude; trust government and attitude; perceived risk and trust government; capacity and perceived behavioural control; availability and perceived behavioural control; interpersonal influence and subjective norm; attitude and behaviour intention; perceived behavioural control and behaviour intention; subjective norm and behaviour intention; social gratification and continuity; satisfaction and continuity; process gratification and continuity were statistically significant at (p = 0.001). The hypothesized paths between accessibility and use; media influence and subjective norm; content gratification and satisfaction; process gratification and use; process gratification and satisfaction; behaviour intention and use; use and satisfaction; use and continuity; content gratification and continuity were statistically significant at p = <.05. The hypothesized paths between perceived risk and attitude; trust internet and attitude; accessibility and perceived behaviour control; content gratification and use; social gratification and use indicated that their t-values did not exceed the cut-off point required for statistical significance. Thus, these paths were not statistically significant. Figure 5 presents path coefficient for the structural model.

6 Discussion and Reflection

Two decades of digital divide research reveal that access is associated with age (Loges and Jung 2001), gender (Wasserman and Richmond-Abbott 2005; Wilson et al. 2003), education (Bucy 2000), income (Rice and Haythornthwaite 2006), ethnicity (Hoffman et al. 1999; Carter et al. 2016), and geography (Hindman 2000; Wei and Zhang 2008; Mahmood et al. 2018). This was a legitimate focus of inquiry in the early phases of Internet diffusion and contributed to our understanding of digital inclusion research. The empirical findings in this study are consistent with the literature and confirm the variations in demographic profile when it comes to use of e-government services in the UK.

Using the study of Becker et al. (2008) as the basis, the empirical data collected in the UK was analysed to identify e-inclusion gaps. The first gap is the gap between Internet use (Total respondents) and e-commerce use, 4% of the respondents who are already Internet users have never shopped online. The second gap is between Internet users and the e-commerce users, while 83% of the total population have used the Internet only 60% of the population have used it for buying or ordering goods. The individuals in this gap fulfil the elementary requirement of having access to the internet; however, they do not engage in transactions. The third gap is between the e-commerce users and the e-government users; while 60% of the population used e-commerce only 40% of them have used it for e-government services. People in this gap are performing transactions using the internet. Therefore, they have the qualification necessary to engage in more complex actions and have no trust issues with the internet. However, they do not participate in e-government at all. This gap could be explained through a general preference for personal contact when performing government transactions or missing knowledge about the available e-government information and services. In common models of e-government service development the provision of information is the first step when deploying e-government services. Accordingly, the retrieval of this information is the first step in using e-government services while transactional activities are seen as full engagement; the latter was visibly limited based on our empirical findings.

6.1 Implications to Literature

A review of literature found that the lack of conceptual definitions and theoretical frameworks for e-Inclusion has prevented the development of reliable measurement and identification of specific factors that influence e-Inclusion. To this end, it is hoped that the developed taxonomy in this study offers greater elaboration and refinement of the variables that can be used to assess e-Inclusion and will thus contribute towards addressing these gaps in the literature and current e-Inclusion research. In order to assist selection of an appropriate model and constructs for current research, the theories that are used in e-government adoption and e-Inclusion research were discussed with their focus, description and limitations. Based on this, a research model was developed to capture and examine the e-Inclusion factors that influence citizens’ use of e-government services based on the Decomposed Theory of Planned Behaviour (DTPB) and Uses and Gratifications Theory (U&G). Although successive governments have introduced league tables and other evaluation methods to identify and support good practice, the measures and methods used have often been subjective. In this context, this research used established theoretical norms to develop a conceptual basis and applied this in practice to better understand the various dimensions of e-inclusion. Six dimensions were identified as key inhibitors for e-Inclusion in the UK namely: demographical, economic, social, cultural, political, and infrastructural.

This study posits that identifying the reasons which prevent people from using e-government will help to enhance our understanding of the critical factors that influence e-Inclusion and why people keep using other Internet activities that required qualification and trust to engage in advanced online activities (such as e-commerce) but they do not use e-government services.

6.2 Implications to Policy and Practice

For practitioners, particularly policymakers, this study has important implications especially when E-inclusion has become a prerequisite for policy initiatives and actions carried out by European Member States. The findings here challenge assumptions guiding typical ICT policy formulation that technology access and infrastructure facilities alone are enough and provide actionable recommendations for addressing e-inclusion. They suggest that policymakers should acknowledge the complexity and dynamics of the phenomenon and look at e-Inclusion well beyond the technology access issues to recognize key aspects of behaviour that characterize potential adopters and not-adopters and design policy interventions to address identified gaps.

From our research findings, it can be argued that the UK government does not have influence on citizens’ decision to use e-government services and 76% of non- e-government users are not familiar with the services provided by the government and the benefits from using these services. Trust in the Internet as a medium is not an issue anymore, while trust in e-government plays a role on citizens decision to use e-government. In this context, the results offer policy makers and practitioners a better overview of the broader dimensions of e-Inclusion as well as the most critical factors that prevent people from being part of the digital-by-default environment in the UK (e.g. trust in e-government, process gratifications, perceived ease of use, media influence, interpersonal influence, and capacity). To ensure citizens use e-government, it is important to give attention to the process gratifications to ensure satisfaction of citizens and attention should be given to the content gratifications; and to ensure continuity of use, both content and social gratifications should be given attention. Finally, from an infrastructural dimension, it is imperative for policy makers to ensure the availability and affordability of e-government services by utilizing multiple channels (e.g., mobile phones, televisions, kiosks) including face-to-face interaction to accommodate the diverse needs of citizens. It is hoped that these findings will offer policy makers and practitioners insights into e-inclusion that will allow them to meet both users and non-users’ needs when faced with the task of deciding the delivery of e-government services to their communities.

Policies and initiatives that take digital-by-default as a starting point are in danger of ignoring the complexity of the field. Worse, they lead to a real danger that a large part of the population will become digitally excluded by default. In this respect, aspects of inclusion other than infrastructure and skills should be built into digital inclusion policies. UK digital policy previously (late 1990s to early 2000s) involved much more government involvement. It included policies and initiatives geared towards guaranteeing infrastructure for all and improving opportunities for digital participation. Key policies and research were situated within several government departments (e.g. The Cabinet Office, BIS, and the regulator Ofcom). Currently, the most obvious involvement from government is in promoting superfast broadband and 4G (and experimenting with 5G testbeds) on the existing and new infrastructures through the Department of Culture, Media and Sport and acquisition of employment related digital skills through the Department of Business, Innovations and Skills. This means policy has been situated outside the social, educational, cultural and political sphere and is therefore not able to address the motivational and socio-cultural factors that so strongly predict engagement with ICTs. In this context, the findings in this study should motivate policy makers to take into consideration the alignment of e-government initiatives with e-inclusion policies that encapsulate individual and behavioural needs. If not, policies and initiatives that take digital by default as a starting point are in danger of ignoring the complexity of the field. Worse, they lead to a real danger that a large part of the population will become digitally excluded by default.

7 Conclusion

Despite the large investments in digital inclusion policies, including The Digital-by-Default in the UK, the impact of electronic services is yet to be systematically evaluated. From the empirical quantitative work undertaken in the UK to verity the main identified dimensions for this study, it can be posited that although successive governments have introduced league tables and other evaluation methods to identify and support good practice, the measures and methods used have often been subjective. In this context, this research used established theoretical norms to develop a conceptual basis and applied this in practice to better understand the various dimensions of e-inclusion. Through analysing the Internet activities use in the UK and identifying existence gaps in e-government use by the citizens in the UK, four gaps were found. The use of e-government was the deepest gap that exists in the Internet activities used by the citizens. The authors suggest that finding out the factors that prevent people from using e-government will help to enhance our understanding of the critical factors that influence e-Inclusion and why people keep using other Internet activities that required qualification and trust to engage in advance online actions, but not e-government services.

7.1 Research Limitations and Future Focus

Although the findings of this study are encouraging and useful, the authors acknowledge that this research has limitations, and therefore the conclusions drawn should be interpreted as such. The empirical conclusions in this study are drawn from a sample of 510 surveys in the UK. Nevertheless, the research approach taken was purposeful for this study, as the key empirical objective was to evaluate the conceptual taxonomy and associated factors among a sample of citizens who were knowledgeable with ICT and e-government services, and to explain the adoption gaps in using different Internet activities by citizens, specifically the gap between using e-government services and other Internet activities. Moreover, the demographic analysis indicates that the above e-Inclusion criteria are realistically covered within the survey sample used.

A future research can consider probability sampling for collecting the data, which suggests that every unit in the population will have some probability (non-zero probability) of being selected in the sample (Bhattacherjee 2000). It can also examine the impacts of independent variables such as accessibility, Interpersonal influence, facilitating conditions, trust in e-government and perceived risk under the moderating effects on age, gender, experience, education, and income. Prior research (e.g Wang and Shih 2008) on e-government has also shown that moderating variables might provide the differences on the relationships between the determinants and intention to use Internet activities (e.g. e-government, e-banking, and e-shopping). The data for this research should be collected from more diversified geographical locations to make the research outcome truly generalizable as far as the sample of this research is concerned. Most studies on uses and gratifications have been quantitative (Ruggiero 2000), Internet research being no exception (Grace-Farfaglia et al. 2006). Future research should focus on composing a suitable set of gratifications (for e-adoption domains in particular) through qualitative research which include in depth interviews. This will overcome the limited information available about the gratifications of new media such as e-government (Ruggiero 2000; Stafford et al. 2004). It will be interesting to test and explore the model developed for this study in other national settings across Europe and elsewhere. This will be valuable in providing evidence concerning the robustness of the research model across different settings.