shutterstock 99713225 TEST SIZE V8 051016

 

 "Only the Client can define Quality."

Have IT Questions?
Call us now (888) 894-6411

Blog

TWINTEL Solutions has been serving the Orange County, Los Angeles County, Riverside County, and San Diego County, areas. Since 2005, TWINTEL has provided IT Support such as technical help desk support, computer support, and overall IT consulting to small and medium-sized businesses.

Technology Addiction is a Very Real, Very Scary Thing

Technology Addiction is a Very Real, Very Scary Thing

Technology has become essential to workplace functionality and personal productivity, but while the long hours spent glued to our tech during the workday are a necessity, the time we spend at home with our personal devices is definitely voluntary. However, more and more people - children especially - are finding it harder to let their devices power down.

This is the hallmark of technology addiction, or Internet addiction disorder (IAD). While it isn’t yet officially recognized in the Diagnostic and Statistical Manual of Mental Disorders (DSM), IAD caught the attention of health professionals in the 1990s and 2013 saw the addition of Internet Use Gaming Disorder to the DSM-5.

What Makes IAD a Problem
Many of the features and trends that are widely taken for granted in applications today - autoplay, in-app purchases, and even notifications - are actually undermining our self-control. Instead of being able to set down the device and move on to something else, these tactics have made it so that we feel compelled to compulsively check these devices.

After all, you never know what you may miss if you don’t check right now.

Of course, needing to use technology for work and being addicted to technology are two very different things, but that doesn’t change the fact that children and adults alike have increasingly presented the warning signs of this addiction in their personal lives. That’s right - as much as the attachment to technology has stereotypically been framed as a young person’s problem, it can affect adults just as easily.

In a poll, 66 percent of parents felt that their teens were investing too much time into using their mobile device. No real surprise there, right? However, the same poll measured that 54 percent of children believed that their parents were checking their own devices too frequently as well.

Symptoms of IAD
IAD has a few warning signs and symptoms that present themselves in the behavior and mood of the person affected. Repeatedly checking for incoming text messages or updates and excessive social media use are common behaviors to keep an eye out for in your loved ones, and possibly in yourself.

Those afflicted with IAD also frequently feel euphoric while using their technology, and when they aren’t, often feel restless. IAD sufferers are prone to social withdrawal and experience diminished interest in activities not centered around a gadget. Some schools have even implemented technology fasts, where students have gone without their precious devices for a week. Teachers have noted that these students often exhibit physical symptoms of anxiety while their devices aren’t accessible. Students will reach for a device that isn’t there, all the while shaking and sweating.

How to Reduce Addictive Tactics
Above, we mentioned how many modern applications have features that encourage this kind of pervasive presence and dependence. To avoid these affects, it is probably best that these features are deactivated for non-essential applications.

Notifications are some of the biggest culprits of encouraging persistent use, so if the information isn’t essential to your professional or personal life, you don’t need an app trying to get your attention. Ask yourself: do you really need to be informed that your energy has been refilled in that mobile game you play more than you should? At the very least, using the mute notifications feature will help keep your attention from being pulled away when it shouldn’t be.

Many of the same apps that spam you with notifications are also the ones that encourage users to make those tempting in-app purchases that give the user an edge, or more frequently, extend the amount of time you can use the app before you have to wait again. This is most common in the free versions of these applications, so if you insist on using the app, it is more economical in the long run to just bite the bullet and pay for the app itself.

What piece of technology can you not bear to be without? Share it with us in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, June 23 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Backup Hackers Network Security Malware Hosted Solutions Microsoft Google VoIP Software bgc roundup nonprofit Alert Email Managed IT Services Disaster Recovery Business Business Continuity Mobile Devices Data Outsourced IT Internet Windows 10 communications Ransomware Smartphones Hardware Android Browser IT Services Cybercrime Innovation Saving Money Computers Efficiency Small Business IT Support Managed IT Services Server Computer Office Cloud Computing Data Backup Smartphone Business Management Productivity Internet of Things BYOD Windows Passwords User Tips Tech Term Mobile Device Management Money Quick Tips Social Engineering Telephone Systems BDR Recovery Managed IT Cybersecurity Data Recovery Phishing Vulnerability Hacking Network Virtualization Collaboration Law Enforcement Productivity Artificial Intelligence Save Money Upgrade Mobility Communication Work/Life Balance Office 365 Social Media Remote Monitoring Facebook Private Cloud Bandwidth Office Tips Budget IT Support App Automation Wi-Fi Managed Service Provider Holiday VPN Two-factor Authentication Proactive IT Miscellaneous Flexibility Bring Your Own Device Data Protection Avoiding Downtime How To Firewall Health Chrome Data Breach Workplace Tips Applications Information Technology History Router Gadgets Value Mobile Device Password Safety Identity Theft Redundancy Windows 10 Business Intelligence Google Drive Word Microsoft Office HaaS Remote Computing Connectivity Apps Operating System Black Market Compliance Data Security Hiring/Firing Servers Update Cleaning PDF Emergency Solid State Drive Computer Care Legal Patch Management The Internet of Things Samsung HIPAA Scam Spam Sports Website Data Storage Worker Physical Security Mobile Computing IT Management USB Wireless Technology Business Owner Entertainment CES SaaS IT Plan Data storage Workers Document Management Government Computing Infrastructure Content Management Big Data Marketing Credit Cards Save Time OneNote Windows 7 Automobile Charger Risk Management Unsupported Software Electronic Medical Records Data Management Infrastructure End of Support Battery Employer-Employee Relationship Spam Blocking Keyboard YouTube Comparison Content Filtering Education Hard Drives Online Shopping Business Mangement Windows 10s Experience Twitter Encryption Specifications HBO Downtime webinar Flash Employer Employee Relationship Reputation Relocation Evernote Gmail Public Cloud WiFi Screen Mirroring Addiction Files Instant Messaging Robot Accountants Millennials IBM Outlook Conferencing Sync Users Computer Accessories Customers Humor Wireless Charging Recycling Google Docs Content Cast Best Practice Laptop Cache Search Workforce Supercomputer Netflix Telephony Virtual Reality Bluetooth Fiber-Optic eWaste Audit Touchpad Wireless Internet How to Transportation NarrowBand Practices Telecommuting Current Events Frequently Asked Questions Skype Worker Commute Audiobook Cables User Error Criminal Computer Fan Voice over Internet Protocol Loyalty Video Games Wire Benefits Wireless Hosted Computing Remote Work Knowledge Excel Start Menu Rootkit Unified Communications Colocation FENG Multi-Factor Security Troubleshooting Smart Office Smart Technology Inventory Network Congestion Tip of the week Tools Training Techology Nanotechnology Theft Trending Paperless Office Shadow IT Two Factor Authentication Monitor Access Control Windows Server 2008 Vendor Management Smart Tech Cortana Hacker Blockchain Lifestyle Assessment Data Warehousing Books Machine Learning Chromecast Authentication Fraud IT Consultant Settings Mobile Apple Google Apps Internet Exlporer Human Resources CrashOverride Television Hosted Solution HVAC Amazon Leadership Regulations Professional Services Politics Devices iPhone Staff Meetings Public Computer Software Tips Amazon Web Services Software as a Service Unified Threat Management Going Green Thought Leadership Password Manager Advertising Digital Signature Data loss Scalability Password Management Thank You NIST Congratulations nonprofits Networking Enterprise Content Management