ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

This is one of the symptoms of technology addiction, also commonly known as Internet addiction disorder (IAD). Even though the Diagnostic and Statistical manual of Mental Disorders (DSM) hasn’t necessarily labeled IAD as a problem yet, health professionals have been drawn to it since the early 1990s saw an increase in technology use--particularly in regards to the Internet and gaming.

Why is IAD a Problem?
Some of the most dangerous traits of today’s applications, such as autoplay, in-app purchases, and notifications, are ways to make it seem like the device is actively taking away the user’s self-control. Basically, these concepts are meant to give the illusion of choice, when in reality they are far too tempting to not take advantage of, whether for fear of inconvenience or missing out on something great.

There is a big difference between needing to use technology for work purposes and being addicted to devices on a personal level. Either way, it’s clear that this is an issue that transcends the age barrier, affecting both children and grown adults. A poll showcased that 66 percent of parents felt that their teens have been investing too much time on their mobile device--a believable statistic to say the least. However, this same poll measured that 54 percent of children believe that their own parents are checking their devices too often.

Symptoms of IAD
There are few warning signs indicating that IAD has begun to manifest in victims, with most of them being rooted in behavioral or mood changes. Users might check for incoming text messages or updates subconsciously without even realizing it, or they may check social media too often, so be sure to keep an eye out for these warning signs.

Those who suffer from IAD also tend to feel a sense of relief and euphoria from the use of technology. When they aren’t using it, they may feel restless or anxious. IAD victims also tend to suffer from social withdrawal or find no joy in social activities. Other times, they may find themselves simply bored with tasks that are unrelated to the device. Some schools have technology fasts that keep students from using their devices for extended periods of time. Some students even display physical symptoms of anxiety, such as shaking and sweating.

How to Cut Back on Addictive Tasks
Devices and applications these days tend to nurture dependence, even if they seem like they are being a huge help. However, you can take steps to make sure that your devices aren’t creating a problem through your habits. You can start by deactivating certain non-essential applications and notifications. If the information you’re receiving isn’t terribly important, you can turn them off so that your attention isn’t always being grabbed. If it’s a mobile game, you can bet that you don’t need it reminding you to take certain actions. Just mute them so that you can focus on what’s really important.

Many of these apps that spam you with notifications are the same ones that will constantly target users to make in-app purchases for something that they don’t want or need. This is particularly the case for free versions of apps, so if you want to use one, it’s more economical in the long run to simply pay for the application up-front.

Would (or could) you go for a week without your technology? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware Smartphone communications Smartphones Small Business Upgrade Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Passwords Holiday Covid-19 Disaster Recovery Apps IT Support Managed Service Browser Windows 10 Cloud Computing Outsourced IT Miscellaneous Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Networking Artificial Intelligence Workplace Strategy Windows Managed IT services Gadgets Bandwidth Business Technology Encryption Information WiFi App Virtualization Server Spam Remote Blockchain Mobile Device Management Apple Information Technology Gmail Office Two-factor Authentication Office 365 Budget Employee/Employer Relationship History BDR Health Conferencing Cybercrime Analytics Big Data Access Control Data Security Wi-Fi Compliance Cost Management Voice over Internet Protocol IT Management Remote Computing Training Vendor Document Management Help Desk Hacking Save Money Patch Management Hacker Employer-Employee Relationship Remote Monitoring Firewall Vendor Management Retail Hard Drive Alert Augmented Reality Word Hiring/Firing Mobile Office Outlook IBM Website Legal Password Managed Services Applications Data storage Vulnerabilities Search... BYOD Money Best Practice Project Management Customer Service Computing Data loss Unified Threat Management Websites iPhone Mobility Education Cortana Meetings Twitter Remote Workers User Content Filtering Law Enforcement Google Maps End of Support Data Breach Windows 7 Free Resource Scam Printer Router Chrome How To VPN The Internet of Things YouTube Windows 11 Update Travel Monitoring Virtual Reality Healthcare Mobile Computing Social Engineering Cryptocurrency Laptop Black Market Marketing Cleaning Paperless Office Running Cable Robot Antivirus Maintenance Storage Sports Social SaaS DDoS Virtual Machines Start Menu Computer Repair Drones Downloads Computer Care Chromebook Professional Services Disaster Vulnerability Automobile HIPAA Virtual Assistant Software as a Service Data Protection How To Lithium-ion battery Managed Services Provider Microchip Flexibility Virtual Private Network Processor Processors Current Events Hack Identity Theft Notifications Unified Communications Solutions Tech Terms Google Docs PowerPoint Images 101 Bluetooth Administration Multi-factor Authentication Integration Managed IT Display Digital Distributed Denial of Service Office Tips Presentation Wireless Technology Private Cloud eWaste Memory Specifications Taxes Saving Time IT Consultant Employees Avoiding Downtime Downtime Computers Customer Relationship Management Bitcoin Safety Politics Holidays Co-Managed IT Machine Learning Settings Telephone Entertainment Virtual Desktop Physical Security Cooperation Experience Solid State Drive Video Conferencing Excel Books Security Cameras Shopping Trends Mobile Technology Medical IT Touchscreen Staffing Emergency Point of Sale IP Address Computer Malfunction Paperless Language Customer Resource management Society Devices SQL Server PCI DSS Licensing Tip of the week Vendor Mangement Fileless Malware Samsung Reading Gig Economy Monitors Gamification Troubleshooting Humor Visible Light Communication Company Culture Shortcuts Azure Uninterrupted Power Supply Webcam Business Communications Telephone System Internet Service Provider Windows 8 Regulations Regulations Compliance Backup and Disaster Recovery Managed IT Service Business Mangement Directions Tablets Competition Relocation Displays Content Memes Advertising Desktop Recovery Be Proactive Human Resources Work/Life Balance Electronic Medical Records Net Neutrality Tech Support Accountants Financial Data Database Google Calendar LiFi Supercomputer Entrepreneur Application Risk Management Business Owner IT Virus Documents Workplace Strategies In Internet of Things Motion Sickness Business Intelligence Google Apps Health IT Equifax Telework Network Congestion Tactics Comparison Hard Drive Disposal Google Drive Hacks Reliable Computing Smartwatch Writing Username Communitications Microsoft 365 Securty Startup Knowledge Freedom of Information Corporate Profile Domains Procurement Navigation FinTech Addiction Television email scam Telephony Employer Employee Relationship Smart Technology Cabling Scalability CES Inbound Marketing IT Assessment Mobile Security Legislation Value News Tablet Administrator G Suite Text Messaging User Tip Supply Chain Management Proactive IT Evernote Organization Network Management Cyber security Mouse VoIP Tracking Bring Your Own Device Public Speaking Smart Devices Emails Streaming Media Fake News Web Server Proxy Server Electronic Payment Remote Working Music AI Service Level Agreement Trend Micro SharePoint Computing Infrastructure Digital Payment Keyboard Supply Chain Worker Hard Drives Digital Security Cameras Management Electronic Health Records Device security Transportation Wireless Headphones Phone System Wasting Time Microsoft Excel Access Botnet intranet Tech Micrsooft Going Green eCommerce Business Cards Modem Time Management Wireless Public Cloud Shortcut Rental Service Workplace Heating/Cooling Environment Videos Flash Error Surveillance Managing Costs Audit Windows XP Spyware Social Networking Telephone Systems Bookmark Business Growth Term Download Piracy SSID File Sharing Scams Media Development HTML Computer Accessories Employer/Employee Relationships Redundancy Google Wallet Nanotechnology Virtual Machine Cache Banking Browsers Messenger Google Play Reviews Deep Learning Upload Optimization Software License Unified Threat Management Workers Cables 2FA Social Network Teamwork Hosted Solution Screen Reader Hypervisor Printing CCTV Business Metrics Data Analysis Data Storage

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?