Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

This is one of the symptoms of technology addiction, also commonly known as Internet addiction disorder (IAD). Even though the Diagnostic and Statistical manual of Mental Disorders (DSM) hasn’t necessarily labeled IAD as a problem yet, health professionals have been drawn to it since the early 1990s saw an increase in technology use--particularly in regards to the Internet and gaming.

Why is IAD a Problem?
Some of the most dangerous traits of today’s applications, such as autoplay, in-app purchases, and notifications, are ways to make it seem like the device is actively taking away the user’s self-control. Basically, these concepts are meant to give the illusion of choice, when in reality they are far too tempting to not take advantage of, whether for fear of inconvenience or missing out on something great.

There is a big difference between needing to use technology for work purposes and being addicted to devices on a personal level. Either way, it’s clear that this is an issue that transcends the age barrier, affecting both children and grown adults. A poll showcased that 66 percent of parents felt that their teens have been investing too much time on their mobile device--a believable statistic to say the least. However, this same poll measured that 54 percent of children believe that their own parents are checking their devices too often.

Symptoms of IAD
There are few warning signs indicating that IAD has begun to manifest in victims, with most of them being rooted in behavioral or mood changes. Users might check for incoming text messages or updates subconsciously without even realizing it, or they may check social media too often, so be sure to keep an eye out for these warning signs.

Those who suffer from IAD also tend to feel a sense of relief and euphoria from the use of technology. When they aren’t using it, they may feel restless or anxious. IAD victims also tend to suffer from social withdrawal or find no joy in social activities. Other times, they may find themselves simply bored with tasks that are unrelated to the device. Some schools have technology fasts that keep students from using their devices for extended periods of time. Some students even display physical symptoms of anxiety, such as shaking and sweating.

How to Cut Back on Addictive Tasks
Devices and applications these days tend to nurture dependence, even if they seem like they are being a huge help. However, you can take steps to make sure that your devices aren’t creating a problem through your habits. You can start by deactivating certain non-essential applications and notifications. If the information you’re receiving isn’t terribly important, you can turn them off so that your attention isn’t always being grabbed. If it’s a mobile game, you can bet that you don’t need it reminding you to take certain actions. Just mute them so that you can focus on what’s really important.

Many of these apps that spam you with notifications are the same ones that will constantly target users to make in-app purchases for something that they don’t want or need. This is particularly the case for free versions of apps, so if you want to use one, it’s more economical in the long run to simply pay for the application up-front.

Would (or could) you go for a week without your technology? Let us know in the comments.

Technology Basics: Bits and Bytes
A Close Examination of Cyberterrorism


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 16, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Microsoft Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Google Network Security Small Business Efficiency Smartphones Quick Tips Gadgets User Tips Business Continuity Mobile Devices Computer Disaster Recovery Microsoft Office Mobile Office Virtualization Network Android Innovation Mobile Device Management Server VoIP Social Media Miscellaneous Smartphone Ransomware Windows 10 Upgrade Unified Threat Management Windows Collaboration Communication Remote Monitoring Operating System Remote Computing Data Backup Passwords Data Recovery Holiday Managed IT services Mobile Computing BYOD WiFi Vendor Management Cybersecurity IT Support Tech Term Apps Facebook Marketing communications The Internet of Things Automation Apple Firewall Analytics Users BDR History Internet of Things Alert Data Management Productivity App Outsourced IT IT Consultant Managed IT Services Save Money Artificial Intelligence Mobile Device Phishing Health Gmail Content Filtering Bandwidth Going Green Office Big data Bring Your Own Device Maintenance Spam Hard Drives Lithium-ion Battery Best Practice Information Technology Managed IT Browser Cybercrime Outlook Windows 8 Encryption Cost Management Wireless Technology Antivirus Printer Virus Tech Support Search Budget Hiring/Firing Two-factor Authentication Phone System Computers Recovery Travel IBM Employer-Employee Relationship Update Help Desk Hacking Office 365 Money Document Management SaaS Running Cable Proactive IT Customer Service Law Enforcement Saving Time Hard Drive Government VPN Access Control Website Intranet Compliance Education Data storage It Management Cloud Computing Business Technology Risk Management Humor Legal Networking Save Time Administration Regulations Windows 10 Training Company Culture Disaster Avoiding Downtime Computing Computer Repair Hosted Solution End of Support Wireless iPhone File Sharing Robot Social Networking Securty Current Events DDoS Solid State Drive Excel Mobility Applications Twitter Social Engineering Word Black Market Customer Relationship Management Data Security Flexibility Fax Server Augmented Reality PowerPoint Patch Management Blockchain Laptop Password Cortana Business Growth Data Loss Hacker Business Intelligence Digital Payment Downtime Data Breach Machine Learning Telephone Systems Paperless Office Project Management User Comparison Tablet Websites Virtual Desktop Vulnerabilities Trending Public Cloud Specifications Safety Inbound Marketing Social Healthcare Mouse Start Menu Tech Terms Documents Mobile Technology Identity Theft Programming Software as a Service Heating/Cooling Pain Points Statistics IT service Network Congestion User Error Uninterrupted Power Supply Co-managed IT Google Maps Storage Virtual Reality Politics Bitcoin Emails Automobile Bluetooth Streaming Media Chromebook Data Protection Retail Lifestyle Computing Infrastructure Hack eWaste Cryptocurrency Value Google Docs Gaming Console How To Download Experience Net Neutrality Private Cloud Cleaning Webcam Monitoring Chrome Scam Monitors Text Messaging Redundancy Telephony Office Tips Processors Router Taxes USB Distributed Denial of Service Management Computer Accessories Presentation YouTube Unified Communications Settings Sports Digital Equifax Fleet Tracking Trojan Fake News Hacks Physical Security Drones Network Management LinkedIn Audit Licensing Data Warehousing Banking Botnet Leadership Organize Relocation Tablets Adminstration Pirating Information Device security MSP Sync Permissions Language Nanotechnology Archive Emergency Hard Drive Disposal Digital Signature Desktop Finance Skype Access Startup Asset Tracking Microsoft Excel Notifications CCTV Teamwork Business Cards Service Level Agreement Computer Care Entertainment Point of Contact Google Drive Windows Server 2008 Business Metrics Computer Malfunction Music Unified Threat Management Backup and Disaster Recovery Reliable Computing switches Writing Username Mobile Payment In Internet of Things PDF Screen Reader Vulnerability Webinar Upgrades Gamification Spyware Smart Tech Distribution Best Available Keyboard Upselling Piracy Upload Electricity Printing LiFi HTML Managed Service Analytic Windows 7 Motion Sickness Fiber-Optic Database Recycling Scalability Domains Video Surveillance cache Television Work/Life Balance Saving ZTime Conferencing Messenger Tracking Public Speaking Deep Learning Mobile Security Product Reviews Memory Multi-Factor Security Cost Read Rental Service Meetings Shortcut Software License Trends WannaCry Downloads Visible Light Communication Devices Time Management Best Practives Freedom of Information Web Server Entrepreneur Harddrive Fraud Tactics Corporate Profile Cabling Troubleshooting IT consulting Debate Assessment SharePoint Wi-Fi Administrator Environment Device Management Books Workers HIPAA GPS UTM Content Advertising Flash External Harddrive Legislation Error Content Management Tip of the week Supercomputer Competition CIO IT Plan Enterprise Resource Planning Business Managemenet Google Calendar Microserver Electronic Payment Accountants A.I. Touchscreen News Microchip Staffing Google Wallet email scam Addiction VoIP Worker Business Owner Windows XP Consultation Get More Done Evernote Society Thin CLient online Currency Knowledge Reading Samsung IP Address Displays 3D Ebay Multi-factor Authentication Information Human Resources Smart Phones Wireless Headphones Printer Server Virtual Assistant Employer Employee Relationship Application Micrsooft Migration Connected Devices Technology Tips Turn Key G Suite Capital Productuvuty Managing Stress Regulation 3D Printing CrashOverride