A new generational framework

Issue 3 2025 Editor's Choice, Training & Education

Generational theory offers a practical framework for understanding how collective experiences shape human behaviour across time. Scholars have traditionally delineated Baby Boomers, Generation X, and Millennials based on birth year. Yet, as technology accelerates, these broad categories are perhaps oversimplified, much like a one-size-fits-all suit that fits no one perfectly.

In this article, I am indulging the idea of a model that is based on seven generations, each linked to a decade from 1960 to 2030, and defined by the technological and digital transformations that marked their formative or professional years. This exploration blends academic research with personal reflection (my own multi-email enthusiasm at the age of 62, versus a colleague’s single-inbox caution at the age of 72), offering a fresh perspective on how tech can rewire us.


Dr Chris Blair.

I have used as a framework the major works in generational theory and digital transformation. Mannheim’s (1952) concept of generational identity, forged by shared historical contexts, provides a theoretical backbone. Tapscott’s (1998) analysis of the Net Generation, and Autry & Berge’s (2011) digital native-immigrant dichotomy gives us a view through a technological lens. Selwyn’s (2012) work on education’s digital shift and Vial’s work (2021) on organisational transformation both add richness to the framework.

Each decade from 1960 to 2030 anchors a generation, inferring its identity from the dominant tech of the period and the impact it has on society. My personal example – my decentralised email strategy in the 1990s, versus my colleague’s centralised mistrust – illustrates how these shifts manifest across people of different ages.

1960s: The Mainframe Cohort (born 1945 – 1960)

The 1960s was an era of bold innovation, from moon landings to mainframe computers like the IBM 360. The Mainframe Cohort, born between 1945 and 1960, encountered technology as a monolithic, centralised force. These machines, operated via punch cards and esoteric commands, were the preserve of specialists only. Mannheim (1952) argues that early experiences imprint lasting traits, and for this group, tech was a distant authority to be managed, rather than embraced.

My 72-year-old colleague, who in the 1990s insisted on a single email address for his staff, epitomises this mindset. Control was paramount, and trust in tech was tenuous. Their digital transformation was minimal, reflecting a world where computing remained an organisational endeavour, rather than a personal one.

1970s: The Microchip Pioneers (born 1955 – 1970)

The 1970s introduced the microchip, shrinking tech from room-sized monsters to desk-friendly devices like the Apple II. The Microchip Pioneers, born between 1955 and 1970, were the first to tinker with personal computing, a shift Tapscott (1998) links to an emergent DIY culture. This cohort adapts and innovates – comfortable with tech as a tool rather than as a tyrant.

At 62, I find myself in this cohort, my 1990s adoption of multiple email addresses reflecting a willingness to decentralise, a stark contrast to my colleague’s mainframe-era caution. Research by Bennett et al. (2008) cautions against over-generalising the adoption of tech, yet the pioneers’ hands-on ethos marks a pivotal transition in digital engagement.

1980s: The Floppy Disk Practitioners (born 1965 – 1980)

By the 1980s, technology became more accessible, with the floppy disk and the IBM PC. The Floppy Disk Practitioners, born between 1965 and1980, navigated a world where tech moved from labs to living rooms. Autry & Berge (2011) calls this cohort the Digital Immigrants, adept at adopting – rather than inheriting – tech fluency.

Their era saw the rise of practical computing, word processors, spreadsheets, and the dot-matrix hum, tools that bridged analogue and digital realms. My email proliferation in the 1990s gives a nod to their pragmatism, though with a slightly forward tilt. Selwyn (2012) underscores how this decade democratised tech, yet for practitioners, it remained a means to an end, not a lifestyle.

1990s: The Dial-Up Innovators (born 1975 – 1990)

The 1990s unleashed the internet, epitomised by the modem’s dial-up tune, which is permanently engraved in the memories of all who were there at the time. The Dial-Up Innovators, born 1975 to 1990, surfed the Web’s early waves via Netscape and AOL, earning Tapscott’s (1998) title of the Net Generation.

This cohort blended their analogue upbringing with digital exploration, mastering email, chatrooms, and rudimentary sites. My multi-email approach aligns with this collaborative spirit, while my colleague’s resistance highlights a generational fault line.

Vial (2021) notes how connectivity redefined work and play, and the innovators thrived in this space. They were essentially digital pioneers who were tethered to a pre-digital past.

2000s: The Smartphone Forerunners (born 1985 – 2000)

The 2000s thrust technology into people’s pockets with the advent of the smartphone. Apple’s iPhone (2007) was a defining artefact. The Smartphone Forerunners, born between 1985 and 2000, embody Autry & Berge’s (2011) Digital Natives, intuitively navigating a world of apps, social media, and instant messaging.

My 1990s email habits predate this multi-platform fluency. This cohort integrated tech into identity itself. Facebook and Twitter shifted digital transformation from utility to intimacy. For the forerunners, connectivity was not a choice, but rather a constant, a generational hallmark that my colleague would find bewildering.

2010s: The Cloud Integrators (born 1995 – 2010)

The 2010s elevated tech to the ethereal with cloud computing, epitomised by Google Drive and streaming giants. The Cloud Integrators, born between 1995 and 2010, grew up in a seamless digital ecosystem – smartphones, wearables, and AI assistants were standard.

Vial’s (2021) analysis of digital transformation as boundary-blurring resonates here; physical constraints dissolved as data floated freely. My email juggling seems archaic beside their cloud-synced lives, where multitasking spans devices and platforms. Selwyn (2012) highlights educations’ parallel shift, yet for integrators, tech is less learned than lived – a fluid, ever-present reality.

2020s: The AI Navigators (born 2005 – 2020, Maturing 2020 – 2030)

The 2020s, our current frontier, is defined by artificial intelligence and interconnected systems – think ChatGPT and the metaverse. The AI Navigators, born between 2005 and 2020, are emerging into a world where tech anticipates our needs, from autonomous vehicles to virtual realms.

Vial (2021) describes this decade’s transformation as ecosystem-driven, a notion that these navigators embody as they partner with AI. My email habits and my colleague’s reticence are quaint relics to them; their digital landscape is adaptive, predictive, and immersive. Mannheim’s (1952) lens suggests their identity will fuse with this tech, crafting a generation that is uniquely attuned to artificial agency.

Conclusion: A reflective synthesis

This seven-decade model is a way of looking at generational theory through the lens of technological evolution, from mainframes to AI. Each cohort, from the Mainframe Cohort to the AI Navigators, reflects a distinct dance with digital transformation, shaped by the tools and contexts of its time.

My own journey at 62, embracing email multiplicity, and my colleague’s at 72, clinging to singularity, is a good example of how age can define the way we embrace technology. As Mannheim (1952) posits, shared epochs forge us, yet within each, individual rhythms vary. Using this framework invites the question – how will the navigators continue to redefine work, learning, and connection? For now, this framework offers us a brief hint at how this may unfold: academic yet alive, reflective yet forward-looking.

This article is based on research conducted by Dr Chris Blair (B.Sc. Chem. Eng., MBA – Leadership & Sustainability, PhD – Leadership & Management) of 21st Century, one of the largest remuneration and HR consultancies in Africa.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
The HR Trap
Security Services & Risk Management Training & Education
When human resources becomes a risk factor. Andre du Venage examines why your CCTV security and other technology risks are covered, but human resources are often overlooked.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.