(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','https://www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-78946278-1', 'auto'); ga('send', 'pageview');
407-478-6600    Get SUPPORT

TaylorWorks Blog

TaylorWorks has been serving the Longwood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Very Real, Very Scary Thing

Technology Addiction is a Very Real, Very Scary Thing

Technology has become essential to workplace functionality and personal productivity, but while the long hours spent glued to our tech during the workday are a necessity, the time we spend at home with our personal devices is definitely voluntary. However, more and more people - children especially - are finding it harder to let their devices power down.

This is the hallmark of technology addiction, or Internet addiction disorder (IAD). While it isn’t yet officially recognized in the Diagnostic and Statistical Manual of Mental Disorders (DSM), IAD caught the attention of health professionals in the 1990s and 2013 saw the addition of Internet Use Gaming Disorder to the DSM-5.

What Makes IAD a Problem
Many of the features and trends that are widely taken for granted in applications today - autoplay, in-app purchases, and even notifications - are actually undermining our self-control. Instead of being able to set down the device and move on to something else, these tactics have made it so that we feel compelled to compulsively check these devices.

After all, you never know what you may miss if you don’t check right now.

Of course, needing to use technology for work and being addicted to technology are two very different things, but that doesn’t change the fact that children and adults alike have increasingly presented the warning signs of this addiction in their personal lives. That’s right - as much as the attachment to technology has stereotypically been framed as a young person’s problem, it can affect adults just as easily.

In a poll, 66 percent of parents felt that their teens were investing too much time into using their mobile device. No real surprise there, right? However, the same poll measured that 54 percent of children believed that their parents were checking their own devices too frequently as well.

Symptoms of IAD
IAD has a few warning signs and symptoms that present themselves in the behavior and mood of the person affected. Repeatedly checking for incoming text messages or updates and excessive social media use are common behaviors to keep an eye out for in your loved ones, and possibly in yourself.

Those afflicted with IAD also frequently feel euphoric while using their technology, and when they aren’t, often feel restless. IAD sufferers are prone to social withdrawal and experience diminished interest in activities not centered around a gadget. Some schools have even implemented technology fasts, where students have gone without their precious devices for a week. Teachers have noted that these students often exhibit physical symptoms of anxiety while their devices aren’t accessible. Students will reach for a device that isn’t there, all the while shaking and sweating.

How to Reduce Addictive Tactics
Above, we mentioned how many modern applications have features that encourage this kind of pervasive presence and dependence. To avoid these affects, it is probably best that these features are deactivated for non-essential applications.

Notifications are some of the biggest culprits of encouraging persistent use, so if the information isn’t essential to your professional or personal life, you don’t need an app trying to get your attention. Ask yourself: do you really need to be informed that your energy has been refilled in that mobile game you play more than you should? At the very least, using the mute notifications feature will help keep your attention from being pulled away when it shouldn’t be.

Many of the same apps that spam you with notifications are also the ones that encourage users to make those tempting in-app purchases that give the user an edge, or more frequently, extend the amount of time you can use the app before you have to wait again. This is most common in the free versions of these applications, so if you insist on using the app, it is more economical in the long run to just bite the bullet and pay for the app itself.

What piece of technology can you not bear to be without? Share it with us in the comments.

Tip of the Week: Creating Canned Responses in Gmai...
Is Cloud Storage Going to Work for Your Business?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, July 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Technology Cloud Best Practices Network Security Managed IT Services Privacy Business Computing Data Backup Hackers Malware VoIP Hosted Solutions Email Data Recovery Google Outsourced IT Microsoft Backup Mobile Devices Cloud Computing Software Tech Term Business Continuity Saving Money Internet of Things Data IT Support Innovation Internet BDR Android Small Business Efficiency Cybersecurity Cybercrime Disaster Recovery Communications Ransomware User Tips Business Managed IT Communication IT Services Router Law Enforcement Smartphones Hardware How To Browser Money Managed IT Services Data Protection Collaboration BYOD Virtualization Artificial Intelligence Computers Business Intelligence Productivity Smartphone Network Business Management Windows Phishing Mobile Device Management Chrome Two-factor Authentication Avoiding Downtime Data Security Redundancy Bandwidth Document Management Alert Connectivity Vulnerability Compliance Social Engineering Save Money Computer Mobility Proactive IT Telephone Systems Applications Office 365 Remote Monitoring Windows 10 Spam Identity Theft Word Blockchain App Apps IT Support Productivity Gadgets Big Data Mobile Device Employer-Employee Relationship Networking Upgrade Workers Social Media Comparison Data Storage Server Firewall Wi-Fi Update Paperless Office Analysis Passwords Facebook Smart Tech Flexibility Information Technology VPN Education Microsoft Office IT Management Bring Your Own Device Website CES Work/Life Balance IT Plan Windows 7 Content Management Unsupported Software OneNote Servers Data Breach Credit Cards Access Control Spam Blocking Solid State Drive Infrastructure Business Owner Data loss Password Private Cloud Budget Operating System Value Holiday Amazon Recovery Root Cause Analysis Password Manager Screen Mirroring Nanotechnology HBO Wire Public Cloud Windows 10s Digital Signature Users Amazon Web Services Sync HVAC Meetings Business Mangement Software as a Service Save Time Cast Outlook Sports Encryption SaaS Risk Management Online Shopping Telephony Enterprise Content Management Wireless Current Events Windows 10 Gmail Training Government Devices Frequently Asked Questions Smart Office PDF Audit Strategy Specifications Knowledge Evernote Skype Black Market Password Management IoT Emails Recycling Hacking HaaS Thought Leadership Content Filtering Excel Cortana Google Drive Millennials HIPAA Network Congestion Wireless Charging Start Menu Battery NIST Wireless Technology Streaming Media Managed Service Provider eWaste Charger Data Warehousing Tip of the week Remote Computing Students Hacker Computer Fan Marketing Workforce IT Consultant Fiber-Optic Electronic Medical Records Mobile Cryptocurrency Insurance Content Filter Computing Infrastructure Criminal Google Docs Data Management Windows Server 2008 Healthcare Technology Tips FENG Accountants Telecommuting Leadership Cables Professional Services Safe Mode Practices Storage Netflix Unified Threat Management Voice over Internet Protocol Keyboard Electronic Health Records Remote Work Unified Communications Tools File Sharing Hosted Computing Hard Drives End of Support Settings Cleaning Multi-Factor Security Patch Management Regulations Workplace Tips Machine Learning Health webinar Theft Virtual Reality Business Technology Office Tips Inventory Addiction Computer Care Trending Software Tips Scam YouTube Conferencing Google Apps Botnet Worker Commute Virtual Assistant Legal Cache Human Resources Samsung Lifestyle Entertainment Physical Security Fraud Flash Downtime Automation The Internet of Things Travel Telephone System Authentication Wireless Internet Staff Mobile Computing USB Benefits Managing Stress Competition Worker Techology Fun Loyalty Troubleshooting Smart Technology Shadow IT Miscellaneous User Error Rootkit Hybrid Cloud Hosted Solution Search Politics Two Factor Authentication Quick Tips Presentation Vendor Management Video Games Assessment 5G Colocation IBM Webinar WiFi Automobile Books Television Customer Relationship Management IT solutions Scalability IP Address Public Computer Internet Exlporer Customer Service Emergency Office Mobile Office Domains Employer Employee Relationship Twitter Content Experience Relocation Public Speaking Computer Accessories Internet exploMicrosoft Audiobook Music Instant Messaging Humor Lithium-ion battery CrashOverride Files Bluetooth Augmented Reality Advertising Tech Support Wearable Technology Transportation How to Company Culture Safety History Best Practice Hiring/Firing

      Mobile? Grab this Article!

      QR-Code dieser Seite