Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

This is one of the symptoms of technology addiction, also commonly known as Internet addiction disorder (IAD). Even though the Diagnostic and Statistical manual of Mental Disorders (DSM) hasn’t necessarily labeled IAD as a problem yet, health professionals have been drawn to it since the early 1990s saw an increase in technology use--particularly in regards to the Internet and gaming.

Why is IAD a Problem?
Some of the most dangerous traits of today’s applications, such as autoplay, in-app purchases, and notifications, are ways to make it seem like the device is actively taking away the user’s self-control. Basically, these concepts are meant to give the illusion of choice, when in reality they are far too tempting to not take advantage of, whether for fear of inconvenience or missing out on something great.

There is a big difference between needing to use technology for work purposes and being addicted to devices on a personal level. Either way, it’s clear that this is an issue that transcends the age barrier, affecting both children and grown adults. A poll showcased that 66 percent of parents felt that their teens have been investing too much time on their mobile device--a believable statistic to say the least. However, this same poll measured that 54 percent of children believe that their own parents are checking their devices too often.

Symptoms of IAD
There are few warning signs indicating that IAD has begun to manifest in victims, with most of them being rooted in behavioral or mood changes. Users might check for incoming text messages or updates subconsciously without even realizing it, or they may check social media too often, so be sure to keep an eye out for these warning signs.

Those who suffer from IAD also tend to feel a sense of relief and euphoria from the use of technology. When they aren’t using it, they may feel restless or anxious. IAD victims also tend to suffer from social withdrawal or find no joy in social activities. Other times, they may find themselves simply bored with tasks that are unrelated to the device. Some schools have technology fasts that keep students from using their devices for extended periods of time. Some students even display physical symptoms of anxiety, such as shaking and sweating.

How to Cut Back on Addictive Tasks
Devices and applications these days tend to nurture dependence, even if they seem like they are being a huge help. However, you can take steps to make sure that your devices aren’t creating a problem through your habits. You can start by deactivating certain non-essential applications and notifications. If the information you’re receiving isn’t terribly important, you can turn them off so that your attention isn’t always being grabbed. If it’s a mobile game, you can bet that you don’t need it reminding you to take certain actions. Just mute them so that you can focus on what’s really important.

Many of these apps that spam you with notifications are the same ones that will constantly target users to make in-app purchases for something that they don’t want or need. This is particularly the case for free versions of apps, so if you want to use one, it’s more economical in the long run to simply pay for the application up-front.

Would (or could) you go for a week without your technology? Let us know in the comments.

Technology Basics: Bits and Bytes
A Close Examination of Cyberterrorism


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Workplace Tips Productivity Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Quick Tips Gadgets Mobile Devices Business Continuity User Tips Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office VoIP Social Media Android Server Innovation Mobile Device Management Smartphone Miscellaneous Windows 10 Upgrade Unified Threat Management Windows Ransomware Remote Monitoring Operating System Collaboration Communication Holiday Passwords Mobile Computing Remote Computing WiFi Cybersecurity Vendor Management Apps BYOD The Internet of Things Managed IT services Marketing Facebook Users Apple IT Support Analytics Firewall History Productivity Data Backup Data Management communications Automation Data Recovery Internet of Things Alert App Phishing Outsourced IT Tech Term IT Consultant Artificial Intelligence Managed IT Services Save Money Content Filtering Going Green Health Mobile Device Gmail Bandwidth Office Bring Your Own Device Big data Spam BDR Maintenance Printer Hiring/Firing Virus Hard Drives Tech Support Lithium-ion Battery Best Practice Information Technology Budget Managed IT Wireless Technology Browser Cybercrime Antivirus Search Outlook Windows 8 Encryption Cost Management Money Document Management Office 365 IBM Computers Phone System Help Desk Recovery Update Employer-Employee Relationship Hacking Humor Regulations Training Running Cable Proactive IT SaaS Saving Time Customer Service Two-factor Authentication VPN It Management Travel Law Enforcement Hard Drive Intranet Business Technology Education Government Compliance Website Data storage Risk Management Cloud Computing Administration Windows 10 Save Time Legal Networking Hacker iPhone Comparison Tablet Paperless Office Company Culture Telephone Systems Computer Repair Excel Social Networking Disaster User Access Control Hosted Solution End of Support Customer Relationship Management Robot Wireless Twitter Securty Data Security Augmented Reality DDoS PowerPoint Current Events Solid State Drive Mobility Patch Management Blockchain Social Engineering Data Loss Black Market Flexibility Word Fax Server Business Intelligence Laptop Data Breach Password Cortana Digital Payment Business Growth Project Management Avoiding Downtime Downtime Telephony Websites Office Tips Computer Accessories Taxes Processors Machine Learning Start Menu Tech Terms Mobile Technology Trending USB Pain Points YouTube Vulnerabilities Distributed Denial of Service Unified Communications Settings Software as a Service Sports Healthcare Presentation Mouse Public Cloud Uninterrupted Power Supply Computing Specifications Safety Statistics Virtual Desktop Programming Social Bitcoin Network Congestion Identity Theft Documents Data Protection IT service Applications Google Maps Heating/Cooling Gaming Console User Error Politics Streaming Media Co-managed IT Virtual Reality Storage Bluetooth Emails Webcam Automobile Text Messaging Scam Chromebook Net Neutrality Cryptocurrency Redundancy Computing Infrastructure Hack Retail eWaste Google Docs How To Chrome Lifestyle Experience Private Cloud Value Download Digital Inbound Marketing Cleaning Router Monitors Advertising Flash Multi-factor Authentication Supercomputer Environment Fake News Leadership CIO Management HIPAA Audit Adminstration Pirating Information online Currency Electronic Payment Data Warehousing Staffing Google Wallet Wireless Headphones Worker Competition Microserver Windows XP Migration Connected Devices Microchip Business Owner Access LinkedIn Society Equifax Reading Samsung Emergency Hard Drive Disposal Displays Network Management Get More Done Device security Employer Employee Relationship Microsoft Excel Micrsooft G Suite IP Address Computer Care Hacks Physical Security Human Resources Google Drive Windows Server 2008 Skype Printer Server Drones Nanotechnology Licensing Application Archive Turn Key Desktop Finance Spyware Mobile Payment Trojan Startup Relocation Tablets Vulnerability Upselling Business Cards Service Level Agreement Banking Botnet Permissions Language File Sharing Point of Contact Organize Unified Threat Management Backup and Disaster Recovery Sync Electricity Printing Video Surveillance Gamification Notifications CCTV Windows 7 Saving ZTime Screen Reader Digital Signature Entertainment cache Television Music Smart Tech Reliable Computing Teamwork switches Writing Piracy Upload Business Metrics Computer Malfunction Recycling Debate HTML Harddrive Analytic Upgrades Fiber-Optic Database In Internet of Things WannaCry Downloads Mobile Security PDF Time Management Freedom of Information Product Reviews Webinar Conferencing Corporate Profile GPS LiFi Assessment SharePoint External Harddrive Multi-Factor Security Scalability Best Available Keyboard Read Software License Trends Motion Sickness Google Calendar Work/Life Balance Devices Messenger Tracking Tip of the week Deep Learning Fraud Tactics Domains Visible Light Communication Memory UTM Content Rental Service Meetings Touchscreen News Thin CLient Monitoring Public Speaking VoIP 3D Device Management Ebay Consultation Evernote Smart Phones Business Managemenet Legislation Cabling Shortcut Knowledge Content Management IT consulting IT Plan Enterprise Resource Planning Web Server Technology Tips Best Practives Accountants Books Workers Entrepreneur Virtual Assistant email scam Addiction Wi-Fi Administrator Troubleshooting Capital Productuvuty Managing Stress CrashOverride 3D Printing