Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

This is one of the symptoms of technology addiction, also commonly known as Internet addiction disorder (IAD). Even though the Diagnostic and Statistical manual of Mental Disorders (DSM) hasn’t necessarily labeled IAD as a problem yet, health professionals have been drawn to it since the early 1990s saw an increase in technology use--particularly in regards to the Internet and gaming.

Why is IAD a Problem?
Some of the most dangerous traits of today’s applications, such as autoplay, in-app purchases, and notifications, are ways to make it seem like the device is actively taking away the user’s self-control. Basically, these concepts are meant to give the illusion of choice, when in reality they are far too tempting to not take advantage of, whether for fear of inconvenience or missing out on something great.

There is a big difference between needing to use technology for work purposes and being addicted to devices on a personal level. Either way, it’s clear that this is an issue that transcends the age barrier, affecting both children and grown adults. A poll showcased that 66 percent of parents felt that their teens have been investing too much time on their mobile device--a believable statistic to say the least. However, this same poll measured that 54 percent of children believe that their own parents are checking their devices too often.

Symptoms of IAD
There are few warning signs indicating that IAD has begun to manifest in victims, with most of them being rooted in behavioral or mood changes. Users might check for incoming text messages or updates subconsciously without even realizing it, or they may check social media too often, so be sure to keep an eye out for these warning signs.

Those who suffer from IAD also tend to feel a sense of relief and euphoria from the use of technology. When they aren’t using it, they may feel restless or anxious. IAD victims also tend to suffer from social withdrawal or find no joy in social activities. Other times, they may find themselves simply bored with tasks that are unrelated to the device. Some schools have technology fasts that keep students from using their devices for extended periods of time. Some students even display physical symptoms of anxiety, such as shaking and sweating.

How to Cut Back on Addictive Tasks
Devices and applications these days tend to nurture dependence, even if they seem like they are being a huge help. However, you can take steps to make sure that your devices aren’t creating a problem through your habits. You can start by deactivating certain non-essential applications and notifications. If the information you’re receiving isn’t terribly important, you can turn them off so that your attention isn’t always being grabbed. If it’s a mobile game, you can bet that you don’t need it reminding you to take certain actions. Just mute them so that you can focus on what’s really important.

Many of these apps that spam you with notifications are the same ones that will constantly target users to make in-app purchases for something that they don’t want or need. This is particularly the case for free versions of apps, so if you want to use one, it’s more economical in the long run to simply pay for the application up-front.

Would (or could) you go for a week without your technology? Let us know in the comments.

Technology Basics: Bits and Bytes
A Close Examination of Cyberterrorism
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Hackers IT Support Business Computing Cybersecurity Tech Term Android Google Smartphone Business Management Malware User Tips Internet Software Backup Email Small Business Managed IT Services Ransomware Data Recovery Innovation Productivity Artificial Intelligence Data Windows 10 Phishing Communications Cost Management IT Management Business Cloud Cybercrime Data Backup Efficiency Business Technology Network Computer Hard Drive Update Outsourced IT Managed IT Services Saving Money App Blockchain Hardware Data Security Encryption IT Services Gadgets Antivirus Mobile Device Management Collaboration Patch Management Laptop Microsoft Data Breach Office 365 Websites Start Menu Law Enforcement Passwords Browser Applications Smartphones Tech Terms Business Continuity Project Management Data Management Internet of Things Access Control Bitcoin Disaster Recovery Social Engineering Data Protection Windows BDR Gmail Alert VPN Vulnerabilities Automation Server Operating System Apps Bandwidth Facebook Maintenance Holiday Remote Monitoring Microsoft Office SaaS Spam Word Money Search Digital Social Media Data loss Document Management Hacking Touchscreen Save Money Mobile Device Scam Backup and Disaster Recovery Going Green Unified Communications Hard Drive Disposal Redundancy Spyware Compliance Budget Bluetooth Piracy Knowledge Specifications Running Cable Tablet Download Printing Microsoft Excel Software as a Service email scam Solid State Drive Analytics WiFi Regulations Wireless Headphones Software License Television Telephone Systems Cabling How to IT Support Printer Upload Mobile Security Government Cryptocurrency Mobile Devices Wireless Accountants Comparison Cleaning Mouse Google Drive Consultant Paperless Office Trends Two-factor Authentication Legal Virus eWaste Managed Service Provider Uninterrupted Power Supply Big Data Training Computers Information Technology Google Maps Telephony Worker YouTube Database Gamification Multi-factor Authentication Downloads Robot Emergency Equifax Nanotechnology Mobile Technology VoIP Cloud Computing Settings Samsung Tactics Device security VoIp Excel Vulnerability History Unified Threat Management Startup Augmented Reality Audit SharePoint Administration Addiction Content Website Mobility Tip of the week Computing Infrastructure DDoS IBM Corporate Profile Automobile Screen Reader Virtual Reality Distributed Denial of Service Time Management Hosted Solutions Managed IT Machine Learning Legislation Networking Password Best Practice Communication Company Culture Computer Care Freedom of Information Employer-Employee Relationship Cortana HTML Google Calendar Virtualization Business Cards Unsupported Software Conferencing Network Management Identity Theft News Unified Threat Management Virtual Assistant Outlook Apple Disaster Vendor Mangement Chromebook Service Level Agreement Desktop Fake News Access Devices Google Docs Emails Downtime Business Mangement Upgrades Windows 10 Twitter Marketing Managing Stress Multi-Factor Security CrashOverride BYOD Office Users Office Tips

Latest Blog

IT support is one of the most important parts of any modern business simply because it’s just not feasible to run a business without any form of technology at its core. For example, most businesses rely on email and other forms of communication, whereas stores might require ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.