Intervention (Hidden)
Introduction to the project:
In each school, two digital librarians held a presentation to introduce the project. This introduction was conducted for one form at a time. All students received the same information. The presentation included the following information:
• Not everyone will have access to the digital library.
• Only students in forms (grade levels) 2, 3 and 4 are eligible for the project.
• The selection of the participants will be random and everyone has a chance to participate in the project.
• Selected students will only have access to Wikipedia.
• Selected students will be allowed to share the information they find, and others may ask selected students to search for information for them.
• We will conduct additional surveys throughout the year, with both selected and non-selected students.
We provided examples of types of information available on Wikipedia, including school topics (photosynthesis, equations and volcanos), sports, culture and health.
Baseline and randomization:
After introducing the project to all students, we conducted baseline surveys. Our team of eight enumerators attempted to survey every student in forms 2, 3 and 4. We performed the randomization on a computer (additional details provided below) and informed the students of the results. The selected students then took part in a mandatory induction session.
Induction:
The students in the treatment group attended a mandatory induction session in the digital library. The induction was done in small groups and aimed at informing the students about the digital library, the rules and how to use the phones and access to Wikipedia. The students drew from an envelop a personal username and had to choose a password. The students were informed that they should remember their username and password and not share this information with their friends. Then, the librarians showed them how to access Wikipedia and practiced with them. Finally, we told the students that the searches were anonymous and that we (librarians, researchers and teachers) will not be able to identify individual information on who accessed each page they searched in Wikipedia. Finally, we told the students we could suspend or remove them from the digital library if they would not follow the rules.
Digital library:
Each digital library was equipped with 12 phones. These phones were shared among approximately 75 treatment students in each school. The opening hours were from 4pm-8pm on most weekdays (four days per week) and from 8am-4pm on weekends. At least one digital librarian was always present to supervise the digital library. While the librarian supervised phone use, he or she did not monitor the content browsed by students.
A student wishing to use a phone would first sign in with the librarian. If a phone was available, students would sign the attendance book and borrow a phone for use within the digital library. If all phones were in use, they would join the waitlist or come back later. If there were students waiting, phone use was restricted to 35-40 minutes. The mobile librarian recorded arrival time as well as phone use time for each student. Only selected (intervention arm) students used the mobile library; the librarians used student photos to verify a student’s identity. Every week, the lead enumerator would visit each digital library to spot check the identities of the students and verify that no student in the control group was given access to the digital library. We also conducted spot checks, comparing student signatures to the baseline survey. We did not encounter a case where a control arm student gained access to the digital library.
Students used the phones one by one (not in pairs or groups), and were not permitted to leave the digital library with a phone. Students could ask the digital librarian for technical help, but were not permitted to talk among themselves inside the digital library. Students were allowed to take notes while using the phones. We restricted access to Wikipedia, Simple English Wikipedia and Wiktionary.
Students logged into the phones using a personal and unique username and password. The username was unrelated to other student identifiers. This username allows the researchers to link anonymous browsing data to a bin of coarsened student characteristics. During the induction, each student within a bin chose their username from the same hat, to make it clear that browsing data obtained by the researchers would not be linked to a particular student.