facebook linkedin twitter

Computerware Blog

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

This is one of the symptoms of technology addiction, also commonly known as Internet addiction disorder (IAD). Even though the Diagnostic and Statistical manual of Mental Disorders (DSM) hasn’t necessarily labeled IAD as a problem yet, health professionals have been drawn to it since the early 1990s saw an increase in technology use--particularly in regards to the Internet and gaming.

Why is IAD a Problem?
Some of the most dangerous traits of today’s applications, such as autoplay, in-app purchases, and notifications, are ways to make it seem like the device is actively taking away the user’s self-control. Basically, these concepts are meant to give the illusion of choice, when in reality they are far too tempting to not take advantage of, whether for fear of inconvenience or missing out on something great.

There is a big difference between needing to use technology for work purposes and being addicted to devices on a personal level. Either way, it’s clear that this is an issue that transcends the age barrier, affecting both children and grown adults. A poll showcased that 66 percent of parents felt that their teens have been investing too much time on their mobile device--a believable statistic to say the least. However, this same poll measured that 54 percent of children believe that their own parents are checking their devices too often.

Symptoms of IAD
There are few warning signs indicating that IAD has begun to manifest in victims, with most of them being rooted in behavioral or mood changes. Users might check for incoming text messages or updates subconsciously without even realizing it, or they may check social media too often, so be sure to keep an eye out for these warning signs.

Those who suffer from IAD also tend to feel a sense of relief and euphoria from the use of technology. When they aren’t using it, they may feel restless or anxious. IAD victims also tend to suffer from social withdrawal or find no joy in social activities. Other times, they may find themselves simply bored with tasks that are unrelated to the device. Some schools have technology fasts that keep students from using their devices for extended periods of time. Some students even display physical symptoms of anxiety, such as shaking and sweating.

How to Cut Back on Addictive Tasks
Devices and applications these days tend to nurture dependence, even if they seem like they are being a huge help. However, you can take steps to make sure that your devices aren’t creating a problem through your habits. You can start by deactivating certain non-essential applications and notifications. If the information you’re receiving isn’t terribly important, you can turn them off so that your attention isn’t always being grabbed. If it’s a mobile game, you can bet that you don’t need it reminding you to take certain actions. Just mute them so that you can focus on what’s really important.

Many of these apps that spam you with notifications are the same ones that will constantly target users to make in-app purchases for something that they don’t want or need. This is particularly the case for free versions of apps, so if you want to use one, it’s more economical in the long run to simply pay for the application up-front.

Would (or could) you go for a week without your technology? Let us know in the comments.

Technology Basics: Bits and Bytes
A Close Examination of Cyberterrorism


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, May 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Data Microsoft Workplace Tips Backup Hardware Managed Service Provider Productivity Network Security Business Email Hosted Solutions Saving Money Malware IT Services Efficiency Google IT Support User Tips Small Business Computer Innovation Smartphones Mobile Devices Quick Tips Social Media Business Continuity Gadgets Microsoft Office Network Disaster Recovery Android Productivity VoIP Data Backup Mobile Office Server Virtualization Collaboration Communication Smartphone Data Recovery Mobile Device Management communications Upgrade IT Support Miscellaneous Ransomware Windows 10 Tech Term Phishing Cybersecurity Unified Threat Management Facebook Windows Holiday Vendor Management Operating System Passwords Remote Monitoring Apps Analytics BYOD Remote Computing Mobile Computing Automation Managed IT services WiFi BDR Users Mobile Device Outsourced IT Apple Internet of Things Data Management Marketing The Internet of Things Artificial Intelligence History Firewall Managed IT Services Browser Alert Save Money App Encryption Cloud Computing IT Consultant Big data Gmail Health Windows 10 Bring Your Own Device Help Desk Office Antivirus Content Filtering Office 365 Spam Bandwidth Maintenance Going Green Printer Two-factor Authentication Saving Time Wireless Technology Cybercrime Search Cost Management Windows 8 Outlook Training Business Technology Best Practice Information Technology Lithium-ion Battery Managed IT Budget Hiring/Firing Hard Drives Tech Support Virus Computers VPN Travel Networking Recovery Employer-Employee Relationship Phone System Education Healthcare Update Hacking Access Control It Management Money Blockchain Document Management IBM Customer Service Augmented Reality PowerPoint Mobility Website Government Legal Twitter Information Intranet Administration Regulations Password Risk Management SaaS iPhone Applications Save Time Law Enforcement Managed Service Humor Compliance Data storage File Sharing Proactive IT Hard Drive Running Cable Google Maps Cryptocurrency Wireless Social Networking DDoS Laptop Data Breach Business Growth Social Engineering Project Management Management Digital Websites Retail Current Events Vulnerabilities Word Paperless Office Cortana Sports Value Avoiding Downtime Disaster Telephony Computing Machine Learning Hosted Solution Business Intelligence End of Support Hacker Digital Payment Fax Server Telephone Systems Robot Securty Data Security Router Downtime Patch Management Solid State Drive Comparison Tablet Excel User Data Loss Company Culture Scam Black Market Social Computer Repair Flexibility Customer Relationship Management Redundancy Monitoring Documents Gaming Console Entertainment Statistics Virtual Reality Google Docs Heating/Cooling Programming Politics Cooperation Automobile Experience Network Congestion Emails Evernote Storage Cleaning Virtual Assistant Text Messaging Vendor Chromebook Monitors Webcam Computing Infrastructure Hack Office Tips How To Start Menu Tech Terms Streaming Media Co-managed IT Private Cloud eWaste User Error Download YouTube Mobile Technology Software as a Service Unified Communications Settings Net Neutrality Uninterrupted Power Supply Inbound Marketing Chrome Vulnerability Microchip Taxes Bitcoin Processors Lifestyle Distributed Denial of Service Pain Points Voice over Internet Protocol Distribution Data Protection USB Windows 7 IT service Computer Accessories Public Cloud Presentation Conferencing Bluetooth Specifications Safety Trending Identity Theft Virtual Desktop Mouse Reliable Computing Tip of the week Work/Life Balance Health IT Employee/Employer Relationship Skype Get More Done Business Metrics Computer Malfunction Google Calendar Deep Learning Saving ZTime UTM Digital Signature Processing Content Archive Touchscreen Visible Light Communication News Memory Legislation Logistics Error Turn Key In Internet of Things VoIP IT Plan Teamwork Managed IT Service Enterprise Resource Planning Printer Server A.I. Knowledge email scam Debate Bookmark Addiction Point of Contact Trojan Consultation IT consulting Harddrive Accountants Organize Scalability GPS PDF Motion Sickness Technology Tips Multi-factor Authentication Google Play Tracking Advertising Fake News Flash Wireless Headphones Microsoft 365 Telephone CIO Audit External Harddrive Migration Best Available Processor Connected Devices Keyboard Messenger Equifax Medical IT Fleet Tracking Domains Recycling Staffing Google Wallet Browsers Network Management Analytic Rental Service Meetings Windows XP Data Warehousing Cabling Emergency Society Hard Drive Disposal 3D Ebay User Tip Product Reviews Web Server Access Displays Thin CLient Device security Security Cameras MSP Public Speaking Books Workers Microsoft Excel Nanotechnology Solutions Social Network Wi-Fi Administrator Computer Care Micrsooft Smart Phones Desktop Navigation Finance Shortcut Read Webinar Startup Troubleshooting Professional Services Asset Tracking Drones Business Cards Data Analysis Service Level Agreement Entrepreneur Supercomputer Google Drive Windows Server 2008 Worker Adminstration Unified Threat Management Pirating Information Backup and Disaster Recovery Environment Spyware Mobile Payment Leadership HIPAA GDPR Username Device Management Reading Samsung Permissions Language Screen Reader Electronic Payment Integration Customer Resource management Business Managemenet Electricity Printing Tech Gamification Competition Content Management Smart Tech Business Owner G Suite Piracy Fileless Malware Upload Employer Employee Relationship online Currency Licensing Music Fiber-Optic Proxy Server Database Best Practives Hacks Physical Security cache switches Television Writing HTML Modem IP Address Relocation Tablets Electronic Medical Records Transportation Telephone System Human Resources Banking Botnet WannaCry Downloads Upgrades Mobile Security Term Application Freedom of Information Upselling Multi-Factor Security Recording Cost LinkedIn Microserver Sync Corporate Profile Software License Directions Trends Time Management LiFi Fraud Video Surveillance Dark Web Tactics Notifications CCTV Assessment SharePoint Devices SSID CrashOverride 3D Printing Capital Productuvuty Printers Managing Stress Regulation