ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

This is one of the symptoms of technology addiction, also commonly known as Internet addiction disorder (IAD). Even though the Diagnostic and Statistical manual of Mental Disorders (DSM) hasn’t necessarily labeled IAD as a problem yet, health professionals have been drawn to it since the early 1990s saw an increase in technology use--particularly in regards to the Internet and gaming.

Why is IAD a Problem?
Some of the most dangerous traits of today’s applications, such as autoplay, in-app purchases, and notifications, are ways to make it seem like the device is actively taking away the user’s self-control. Basically, these concepts are meant to give the illusion of choice, when in reality they are far too tempting to not take advantage of, whether for fear of inconvenience or missing out on something great.

There is a big difference between needing to use technology for work purposes and being addicted to devices on a personal level. Either way, it’s clear that this is an issue that transcends the age barrier, affecting both children and grown adults. A poll showcased that 66 percent of parents felt that their teens have been investing too much time on their mobile device--a believable statistic to say the least. However, this same poll measured that 54 percent of children believe that their own parents are checking their devices too often.

Symptoms of IAD
There are few warning signs indicating that IAD has begun to manifest in victims, with most of them being rooted in behavioral or mood changes. Users might check for incoming text messages or updates subconsciously without even realizing it, or they may check social media too often, so be sure to keep an eye out for these warning signs.

Those who suffer from IAD also tend to feel a sense of relief and euphoria from the use of technology. When they aren’t using it, they may feel restless or anxious. IAD victims also tend to suffer from social withdrawal or find no joy in social activities. Other times, they may find themselves simply bored with tasks that are unrelated to the device. Some schools have technology fasts that keep students from using their devices for extended periods of time. Some students even display physical symptoms of anxiety, such as shaking and sweating.

How to Cut Back on Addictive Tasks
Devices and applications these days tend to nurture dependence, even if they seem like they are being a huge help. However, you can take steps to make sure that your devices aren’t creating a problem through your habits. You can start by deactivating certain non-essential applications and notifications. If the information you’re receiving isn’t terribly important, you can turn them off so that your attention isn’t always being grabbed. If it’s a mobile game, you can bet that you don’t need it reminding you to take certain actions. Just mute them so that you can focus on what’s really important.

Many of these apps that spam you with notifications are the same ones that will constantly target users to make in-app purchases for something that they don’t want or need. This is particularly the case for free versions of apps, so if you want to use one, it’s more economical in the long run to simply pay for the application up-front.

Would (or could) you go for a week without your technology? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Ransomware Data Backup communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Facebook Business Continuity Windows 10 Disaster Recovery Covid-19 Passwords Holiday IT Support Browser Managed Service Apps Windows 10 Cloud Computing Outsourced IT Miscellaneous Data Management Remote Work Internet of Things Managed Service Provider Saving Money Government Operating System Artificial Intelligence Managed IT services Workplace Strategy Networking Gadgets Windows App Blockchain Virtualization Spam Server Information Remote WiFi Bandwidth Encryption Mobile Device Management Business Technology Office History Apple Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship Budget Gmail Health Conferencing Access Control Analytics Data Security Cybercrime Wi-Fi BDR Big Data Help Desk IT Management Hacking Cost Management Employer-Employee Relationship Training Document Management Remote Computing Hacker Save Money Patch Management Vendor Compliance Remote Monitoring Voice over Internet Protocol Best Practice Managed Services Retail Data loss Alert Legal Hiring/Firing Outlook Data storage Money Password Customer Service Unified Threat Management Applications Firewall Augmented Reality Project Management Vulnerabilities Word BYOD IBM Website Computing Mobile Office Search... Vendor Management Hard Drive Free Resource Storage Google Maps The Internet of Things Scam YouTube Twitter How To Law Enforcement VPN Laptop End of Support Printer Update User Data Breach Social Sports Travel SaaS DDoS Virtual Reality Chrome Paperless Office Antivirus Social Engineering Cryptocurrency Black Market Maintenance iPhone Cleaning Windows 11 Education Cortana Monitoring Mobile Computing Robot Content Filtering Healthcare Websites Marketing Remote Workers Meetings Router Mobility Running Cable Windows 7 Chromebook Drones Virtual Private Network Telephone Automobile Current Events Excel Solutions How To Wireless Technology Microchip eWaste Flexibility Tech Terms Images 101 Integration HIPAA Display Managed IT Downtime Safety Identity Theft Digital Virtual Assistant Hack Notifications Unified Communications Employees Taxes Avoiding Downtime Virtual Desktop Experience Google Docs Holidays Bluetooth Distributed Denial of Service Processor Office Tips Memory Cooperation Private Cloud Physical Security Video Conferencing PowerPoint Disaster Administration Virtual Machines Computer Repair Presentation Multi-factor Authentication Politics Settings Lithium-ion battery Specifications Start Menu Professional Services Machine Learning Computer Care Downloads IT Consultant Vulnerability Saving Time Solid State Drive Customer Relationship Management Processors Software as a Service Managed Services Provider Co-Managed IT Entertainment Data Protection Computers Bitcoin Supercomputer Piracy Google Calendar Term Google Apps Download Visible Light Communication Virus Telework HTML Reading Monitors Windows 8 Browsers Smartwatch Nanotechnology Communitications Motion Sickness Microsoft 365 Cables Software License Comparison Google Play Google Drive Upload Procurement Advertising Social Network FinTech Relocation Public Speaking Displays Work/Life Balance Tech Support Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Point of Sale Streaming Media Employer Employee Relationship Mobile Technology Value Keyboard Television Security Cameras Telephony Trends Supply Chain Management Customer Resource management Organization Troubleshooting Cabling Devices Cyber security Shortcuts Hard Drives intranet Fileless Malware Tablet Smart Devices G Suite Tip of the week In Internet of Things Tracking Company Culture Wireless Hacks Shortcut Network Congestion Mouse VoIP Gamification Remote Working Environment Telephone System AI Regulations Trend Micro Be Proactive Reliable Computing Heating/Cooling Writing Social Networking Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Windows XP Digital Payment Desktop Wasting Time SharePoint Content Electronic Medical Records Business Owner Worker Accountants eCommerce Modem Workplace Strategies Scalability Text Messaging Proactive IT Videos Access Database Surveillance Administrator Public Cloud Managing Costs Bring Your Own Device Time Management Health IT Equifax SSID Music Audit Media Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships Username File Sharing Virtual Machine Staffing IP Address Redundancy Reviews Inbound Marketing Startup Optimization Freedom of Information Smart Technology email scam Teamwork Botnet Navigation 2FA Cache Addiction Unified Threat Management Data Storage Workers Mobile Security Hypervisor Rental Service Micrsooft Flash User Tip Shopping Legislation News Medical IT CCTV SQL Server Telephone Systems Business Growth Printing Evernote Paperless Electronic Payment Network Management Touchscreen PCI DSS Licensing Recovery Competition Emergency Proxy Server Gig Economy Emails Humor Computer Malfunction Fake News Supply Chain Computing Infrastructure Azure LiFi Banking Entrepreneur Google Wallet Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Phone System Management Regulations Compliance Samsung Device security Managed IT Service Documents Messenger Application Deep Learning Business Intelligence Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Business Cards Business Metrics Hosted Solution Tech Human Resources Business Mangement Going Green Net Neutrality Error Financial Data Tablets Securty Books Domains Language Society Bookmark Risk Management IT Computer Accessories Scams

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?