facebook linkedin twitter

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

This is one of the symptoms of technology addiction, also commonly known as Internet addiction disorder (IAD). Even though the Diagnostic and Statistical manual of Mental Disorders (DSM) hasn’t necessarily labeled IAD as a problem yet, health professionals have been drawn to it since the early 1990s saw an increase in technology use--particularly in regards to the Internet and gaming.

Why is IAD a Problem?
Some of the most dangerous traits of today’s applications, such as autoplay, in-app purchases, and notifications, are ways to make it seem like the device is actively taking away the user’s self-control. Basically, these concepts are meant to give the illusion of choice, when in reality they are far too tempting to not take advantage of, whether for fear of inconvenience or missing out on something great.

There is a big difference between needing to use technology for work purposes and being addicted to devices on a personal level. Either way, it’s clear that this is an issue that transcends the age barrier, affecting both children and grown adults. A poll showcased that 66 percent of parents felt that their teens have been investing too much time on their mobile device--a believable statistic to say the least. However, this same poll measured that 54 percent of children believe that their own parents are checking their devices too often.

Symptoms of IAD
There are few warning signs indicating that IAD has begun to manifest in victims, with most of them being rooted in behavioral or mood changes. Users might check for incoming text messages or updates subconsciously without even realizing it, or they may check social media too often, so be sure to keep an eye out for these warning signs.

Those who suffer from IAD also tend to feel a sense of relief and euphoria from the use of technology. When they aren’t using it, they may feel restless or anxious. IAD victims also tend to suffer from social withdrawal or find no joy in social activities. Other times, they may find themselves simply bored with tasks that are unrelated to the device. Some schools have technology fasts that keep students from using their devices for extended periods of time. Some students even display physical symptoms of anxiety, such as shaking and sweating.

How to Cut Back on Addictive Tasks
Devices and applications these days tend to nurture dependence, even if they seem like they are being a huge help. However, you can take steps to make sure that your devices aren’t creating a problem through your habits. You can start by deactivating certain non-essential applications and notifications. If the information you’re receiving isn’t terribly important, you can turn them off so that your attention isn’t always being grabbed. If it’s a mobile game, you can bet that you don’t need it reminding you to take certain actions. Just mute them so that you can focus on what’s really important.

Many of these apps that spam you with notifications are the same ones that will constantly target users to make in-app purchases for something that they don’t want or need. This is particularly the case for free versions of apps, so if you want to use one, it’s more economical in the long run to simply pay for the application up-front.

Would (or could) you go for a week without your technology? Let us know in the comments.

Technology Basics: Bits and Bytes
A Close Examination of Cyberterrorism
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Hackers Business Computing Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Business Network Security Saving Money Email Malware IT Services Hosted Solutions Efficiency IT Support Google Small Business Computer Quick Tips Mobile Devices User Tips Smartphones Gadgets Innovation Business Continuity Disaster Recovery Android Social Media Microsoft Office Virtualization Network VoIP Mobile Office Data Backup Server Smartphone Mobile Device Management Collaboration Communication Miscellaneous Productivity Data Recovery Upgrade Tech Term Ransomware Windows 10 IT Support Unified Threat Management Windows Holiday Facebook communications Remote Monitoring Operating System Passwords Cybersecurity Mobile Computing Managed IT services BYOD Remote Computing Vendor Management Apps Users Phishing BDR WiFi Marketing Mobile Device Analytics Automation The Internet of Things Outsourced IT History Apple Firewall Internet of Things Alert Artificial Intelligence Data Management Managed IT Services Browser Save Money Big data Encryption IT Consultant App Office Bandwidth Maintenance Bring Your Own Device Printer Antivirus Spam Health Gmail Content Filtering Going Green Cost Management Managed IT Help Desk Office 365 Windows 10 Tech Support Virus Wireless Technology Budget Cloud Computing Search Two-factor Authentication Hiring/Firing Hard Drives Cybercrime Lithium-ion Battery Saving Time Best Practice Information Technology Business Technology Windows 8 Outlook IBM Travel Blockchain Hacking Update Money Phone System Document Management Access Control Recovery Employer-Employee Relationship Computers Training VPN Twitter Intranet Education Law Enforcement Hard Drive Humor Risk Management Compliance Data storage Information Mobility Administration Save Time Healthcare Customer Service Legal Networking Website Government Running Cable Applications Regulations Proactive IT It Management Managed Service SaaS Value Hosted Solution Fax Server Password Cortana End of Support Patch Management Customer Relationship Management Data Loss Robot Scam Hacker Securty Augmented Reality File Sharing PowerPoint Solid State Drive Google Maps Data Breach User Black Market Business Intelligence Digital Flexibility Social Engineering Project Management Cryptocurrency Digital Payment Websites Laptop Router Downtime Social Business Growth Wireless Avoiding Downtime Comparison Tablet DDoS Current Events Company Culture Computer Repair iPhone Paperless Office Machine Learning Social Networking Data Security Sports Telephone Systems Word Disaster Computing Excel Public Cloud Lifestyle Monitoring Identity Theft Streaming Media IT service Gaming Console Processors Redundancy USB Net Neutrality Management Presentation Vendor Virtual Reality Text Messaging Evernote Bluetooth Politics Webcam Automobile Emails Chrome Virtual Desktop Vulnerabilities Specifications Safety Chromebook Start Menu Tech Terms Google Docs Computing Infrastructure Hack Experience How To Mobile Technology Documents Computer Accessories Heating/Cooling Cleaning Private Cloud Entertainment Monitors Download Inbound Marketing Software as a Service Trending Uninterrupted Power Supply Storage Office Tips Co-managed IT User Error Telephony Mouse Pain Points YouTube Microchip Taxes Bitcoin Settings Statistics Data Protection Retail Distributed Denial of Service Programming Unified Communications Conferencing Network Congestion eWaste Cost Shortcut Upselling Licensing WannaCry Downloads Software License Trends Directions Hacks Physical Security Multi-Factor Security SSID Permissions Language Relocation Tablets Corporate Profile Fraud Tactics Troubleshooting Dark Web Banking Botnet Video Surveillance Time Management Freedom of Information Devices Entrepreneur HIPAA Health IT Sync Analytic Assessment SharePoint Best Practives UTM Content Environment Processing Saving ZTime Recycling Legislation Error Competition Music Product Reviews Google Calendar IT Plan Enterprise Resource Planning Electronic Payment Managed IT Service switches Writing Notifications CCTV Tip of the week Reliable Computing Harddrive VoIP Microserver email scam Addiction Business Owner Bookmark Upgrades Business Metrics Computer Malfunction Debate Read Touchscreen News Accountants A.I. Knowledge IP Address In Internet of Things GPS Consultation Multi-factor Authentication Google Play LiFi Virtual Assistant Wireless Headphones Telephone Application Technology Tips Get More Done Migration Connected Devices Processor Human Resources External Harddrive Device Management Work/Life Balance Scalability Business Managemenet Audit Turn Key Network Management Browsers Deep Learning Motion Sickness Content Management Fake News Printer Server Equifax Fleet Tracking Tracking Thin CLient User Tip 3D Ebay Data Warehousing Trojan Device security MSP Security Cameras Visible Light Communication Memory Messenger Emergency Hard Drive Disposal Organize Nanotechnology Social Network Digital Signature Access Desktop Finance Navigation IT consulting Rental Service Smart Phones Meetings online Currency Teamwork Cabling Computer Care Business Cards Service Level Agreement Data Analysis Web Server Microsoft Excel Startup Asset Tracking Books Workers Leadership LinkedIn Unified Threat Management Backup and Disaster Recovery CIO Wi-Fi Administrator Adminstration Pirating Information Google Drive Windows Server 2008 Username GDPR Advertising Flash Vulnerability Screen Reader Customer Resource management Staffing Google Wallet Spyware Mobile Payment Gamification PDF Tech Windows XP Supercomputer Best Available Keyboard Society Worker Skype Electricity Printing Piracy Upload Fileless Malware Displays Archive Webinar Smart Tech Distribution Reading Samsung Fiber-Optic Database Proxy Server Domains Micrsooft Windows 7 HTML Modem Telephone System Electronic Medical Records Public Speaking Drones G Suite Point of Contact cache Television Mobile Security Term Employer Employee Relationship Regulation CrashOverride Cooperation Medical IT Capital 3D Printing Productuvuty Printers Managing Stress

toner1