facebook linkedin twitter

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

This is one of the symptoms of technology addiction, also commonly known as Internet addiction disorder (IAD). Even though the Diagnostic and Statistical manual of Mental Disorders (DSM) hasn’t necessarily labeled IAD as a problem yet, health professionals have been drawn to it since the early 1990s saw an increase in technology use--particularly in regards to the Internet and gaming.

Why is IAD a Problem?
Some of the most dangerous traits of today’s applications, such as autoplay, in-app purchases, and notifications, are ways to make it seem like the device is actively taking away the user’s self-control. Basically, these concepts are meant to give the illusion of choice, when in reality they are far too tempting to not take advantage of, whether for fear of inconvenience or missing out on something great.

There is a big difference between needing to use technology for work purposes and being addicted to devices on a personal level. Either way, it’s clear that this is an issue that transcends the age barrier, affecting both children and grown adults. A poll showcased that 66 percent of parents felt that their teens have been investing too much time on their mobile device--a believable statistic to say the least. However, this same poll measured that 54 percent of children believe that their own parents are checking their devices too often.

Symptoms of IAD
There are few warning signs indicating that IAD has begun to manifest in victims, with most of them being rooted in behavioral or mood changes. Users might check for incoming text messages or updates subconsciously without even realizing it, or they may check social media too often, so be sure to keep an eye out for these warning signs.

Those who suffer from IAD also tend to feel a sense of relief and euphoria from the use of technology. When they aren’t using it, they may feel restless or anxious. IAD victims also tend to suffer from social withdrawal or find no joy in social activities. Other times, they may find themselves simply bored with tasks that are unrelated to the device. Some schools have technology fasts that keep students from using their devices for extended periods of time. Some students even display physical symptoms of anxiety, such as shaking and sweating.

How to Cut Back on Addictive Tasks
Devices and applications these days tend to nurture dependence, even if they seem like they are being a huge help. However, you can take steps to make sure that your devices aren’t creating a problem through your habits. You can start by deactivating certain non-essential applications and notifications. If the information you’re receiving isn’t terribly important, you can turn them off so that your attention isn’t always being grabbed. If it’s a mobile game, you can bet that you don’t need it reminding you to take certain actions. Just mute them so that you can focus on what’s really important.

Many of these apps that spam you with notifications are the same ones that will constantly target users to make in-app purchases for something that they don’t want or need. This is particularly the case for free versions of apps, so if you want to use one, it’s more economical in the long run to simply pay for the application up-front.

Would (or could) you go for a week without your technology? Let us know in the comments.

Technology Basics: Bits and Bytes
A Close Examination of Cyberterrorism


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Managed Service Provider Backup Productivity Workplace Tips Data Hardware Business Saving Money Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer Smartphones User Tips Quick Tips Gadgets Business Continuity Mobile Devices Disaster Recovery Innovation Microsoft Office Mobile Office Virtualization Network Android Social Media Server Mobile Device Management VoIP Collaboration Communication Smartphone Miscellaneous Ransomware Windows 10 Upgrade Data Recovery Unified Threat Management Windows Data Backup Tech Term Passwords Operating System IT Support Remote Monitoring Vendor Management BYOD Remote Computing Holiday Mobile Computing Managed IT services WiFi Productivity Apps Cybersecurity Facebook communications Analytics The Internet of Things Marketing BDR Automation History Firewall Apple Users Alert Outsourced IT Internet of Things Data Management Managed IT Services Mobile Device Phishing IT Consultant Browser Save Money App Artificial Intelligence Encryption Health Bring Your Own Device Gmail Antivirus Office Content Filtering Maintenance Bandwidth Going Green Big data Spam Help Desk Hiring/Firing Two-factor Authentication Wireless Technology Hard Drives Search Cybercrime Windows 8 Outlook Cost Management Lithium-ion Battery Best Practice Information Technology Printer Tech Support Office 365 Managed IT Virus Budget Money Document Management Phone System Computers Recovery Saving Time Training VPN Employer-Employee Relationship Business Technology Travel Update Hacking IBM Cloud Computing Customer Service Access Control Running Cable Networking Administration Proactive IT Legal Government Website Regulations It Management Intranet Education SaaS Hard Drive Humor Risk Management Law Enforcement Windows 10 Compliance Data storage Save Time PowerPoint Laptop Comparison Tablet Company Culture Wireless Business Growth Computer Repair Current Events Applications DDoS Machine Learning Social Networking Telephone Systems Data Security Paperless Office Word Sports Avoiding Downtime Patch Management Blockchain Twitter Data Loss Computing Fax Server Disaster iPhone End of Support File Sharing Password Cortana Hosted Solution Robot Data Breach Hacker Securty Excel Information Mobility Social Engineering Solid State Drive Project Management Business Intelligence Customer Relationship Management Digital Payment Downtime User Flexibility Augmented Reality Black Market Virtual Desktop Gaming Console Mobile Technology Computer Accessories Specifications Safety Cryptocurrency How To Google Docs Download Vendor Private Cloud Software as a Service Social Uninterrupted Power Supply Webcam Text Messaging Trending Documents Experience Heating/Cooling Monitors Telephony Mouse Cleaning Office Tips Co-managed IT Taxes Storage User Error Bitcoin Distributed Denial of Service Data Protection Programming Managed Service Statistics Network Congestion YouTube Conferencing Retail Unified Communications Settings Public Cloud Inbound Marketing Lifestyle eWaste Scam Streaming Media Value Identity Theft Monitoring Pain Points Redundancy IT service Google Maps Politics Net Neutrality Processors Virtual Reality Management USB Emails Digital Chrome Automobile Vulnerabilities Chromebook Presentation Bluetooth Websites Start Menu Tech Terms Router Computing Infrastructure Healthcare Hack Deep Learning Desktop Rental Service Finance Meetings Bookmark Access online Currency Work/Life Balance Trojan Nanotechnology Social Network Emergency Hard Drive Disposal Organize Business Cards Service Level Agreement Web Server Harddrive Computer Care Visible Light Communication Memory Startup Asset Tracking Cabling Microsoft Excel Debate Backup and Disaster Recovery Administrator Digital Signature IT consulting Books Username Workers Google Drive GPS Windows Server 2008 LinkedIn Unified Threat Management Wi-Fi Teamwork Gamification Supercomputer Browsers Spyware Mobile Payment Entertainment Screen Reader Customer Resource management External Harddrive Vulnerability CIO Piracy Microchip Upload User Tip Electricity Printing Archive Advertising Flash Smart Tech Distribution Worker Skype Fiber-Optic Database Thin CLient Windows XP HTML Reading Samsung 3D Windows 7 Ebay PDF Staffing Google Wallet Webinar Point of Contact Best Available Keyboard Displays Mobile Security Employer Employee Relationship cache Television Society G Suite Telephone System Smart Phones Micrsooft Software License Hacks Trends Physical Security WannaCry Downloads Domains Multi-Factor Security Cost Licensing Fraud Banking Tactics Botnet Corporate Profile Leadership Public Speaking Devices Relocation Tablets Time Management Adminstration Freedom of Information Pirating Information Drones Analytic Shortcut UTM Content Assessment SharePoint Recycling Sync Entrepreneur IT Plan Notifications Enterprise Resource Planning CCTV Proxy Server Google Calendar Troubleshooting Permissions Language Best Practives Legislation Error Tip of the week Product Reviews email scam Business Metrics Addiction Computer Malfunction Electronic Medical Records VoIP Read HIPAA Accountants Reliable Computing A.I. Touchscreen News Environment Knowledge Competition switches Writing Microserver Multi-factor Authentication Consultation Evernote Electronic Payment Music In Internet of Things Upgrades Migration Connected Devices Dark Web Upselling Technology Tips Device Management Business Owner Wireless Headphones Telephone Virtual Assistant Network Management Motion Sickness Health IT Audit Content Management IP Address LiFi Get More Done Equifax Scalability Fleet Tracking Fake News Video Surveillance Business Managemenet Saving ZTime Application Turn Key Device security Messenger MSP Tracking Data Warehousing Human Resources Printer Server Productuvuty 3D Printing Managing Stress Data Analysis Printers Regulation CrashOverride Capital