Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

This is one of the symptoms of technology addiction, also commonly known as Internet addiction disorder (IAD). Even though the Diagnostic and Statistical manual of Mental Disorders (DSM) hasn’t necessarily labeled IAD as a problem yet, health professionals have been drawn to it since the early 1990s saw an increase in technology use--particularly in regards to the Internet and gaming.

Why is IAD a Problem?
Some of the most dangerous traits of today’s applications, such as autoplay, in-app purchases, and notifications, are ways to make it seem like the device is actively taking away the user’s self-control. Basically, these concepts are meant to give the illusion of choice, when in reality they are far too tempting to not take advantage of, whether for fear of inconvenience or missing out on something great.

There is a big difference between needing to use technology for work purposes and being addicted to devices on a personal level. Either way, it’s clear that this is an issue that transcends the age barrier, affecting both children and grown adults. A poll showcased that 66 percent of parents felt that their teens have been investing too much time on their mobile device--a believable statistic to say the least. However, this same poll measured that 54 percent of children believe that their own parents are checking their devices too often.

Symptoms of IAD
There are few warning signs indicating that IAD has begun to manifest in victims, with most of them being rooted in behavioral or mood changes. Users might check for incoming text messages or updates subconsciously without even realizing it, or they may check social media too often, so be sure to keep an eye out for these warning signs.

Those who suffer from IAD also tend to feel a sense of relief and euphoria from the use of technology. When they aren’t using it, they may feel restless or anxious. IAD victims also tend to suffer from social withdrawal or find no joy in social activities. Other times, they may find themselves simply bored with tasks that are unrelated to the device. Some schools have technology fasts that keep students from using their devices for extended periods of time. Some students even display physical symptoms of anxiety, such as shaking and sweating.

How to Cut Back on Addictive Tasks
Devices and applications these days tend to nurture dependence, even if they seem like they are being a huge help. However, you can take steps to make sure that your devices aren’t creating a problem through your habits. You can start by deactivating certain non-essential applications and notifications. If the information you’re receiving isn’t terribly important, you can turn them off so that your attention isn’t always being grabbed. If it’s a mobile game, you can bet that you don’t need it reminding you to take certain actions. Just mute them so that you can focus on what’s really important.

Many of these apps that spam you with notifications are the same ones that will constantly target users to make in-app purchases for something that they don’t want or need. This is particularly the case for free versions of apps, so if you want to use one, it’s more economical in the long run to simply pay for the application up-front.

Would (or could) you go for a week without your technology? Let us know in the comments.

Technology Basics: Bits and Bytes
A Close Examination of Cyberterrorism


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, June 21, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Computers Business Computing Software Networking IT Management Powerful Technology Solutions Project Management IT Consultant Specifications Accidental deletion Antivirus Piracy IT consulting Accountants Office 365 IT consulting Staten Island Business Cards Retail Desktop malware worms Google Hiring/Firing Conferencing Cabling data recovery Monitors Bluetooth History Downtime Apple Data Protection Redundancy Mobile Device Management Mobility Malware malware Hard disk Hack Collaboration Firewall CCTV Flash Start Menu Webcam IT support NYC IT services NYC Samsung Touchscreen Windows 10 Machine Learning Laptop Business Continuity Chromebook Network SharePoint Encryption Productivity Document Management Equifax Managed Service Provider it support Sports computer support Employer Employee Relationship IT support Staten Island IT consulting company Taxes Update computer repair Privacy Database tech support Motion Sickness Printing Employer-Employee Relationship Managed IT Services Hard Drive Cost Management Deep Learning IT support Staten Islans staten island managed services Paperless Office Nanotechnology Business Growth Apps Digital Spam Backup and Disaster Recovery Bring Your Own Device Microchip Browser Supercomputer Outlook Staffing Digital Payment Windows XP Settings Smartphones Virtual Assistant Internet Virtualization Save Money Office Devices Blockchain Access Corporate Profile Office Tips Excel Software as a Service Disaster Recovery Advertising Solid State Drive Education Lenovo Comparison Network Management Upgrade Smartphone SaaS managed services Staten Island Google Drive Backup Displays Technology Managed IT ransomware attacks Customer Service IT services New York City Relocation IT support New York City datto Legal Multi-Factor Security Cloud CryptoLocker Vulnerability Notifications Writing Android IT support firms Gamification IT Support Password Data Backup 3D Printing Phishing Unified Communications Tactics Google Maps VoIP Augmented Reality Managed IT Services Microsoft Excel Cybersecurity Word Business Management Access Control Data storage CrashOverride Thank You Cortana Hacking Hardware Solutions computer services Government Windows 10 Music Money Regulations Device security Social Web Server Public Cloud IBM Data Management BYOD Holiday Miscellaneous Disaster Data Security Printer Politics Meetings Big Data Staten Island computer support Service Level Agreement PDF end-user files Facebook G Suite Training Search Business Banking Gadgets Staten Island IT support data loss Google Wallet Tip of the week Twitter Cache Scalability Automobile Vendor Management Screen Reader VoIP Business Metrics computer services Staten Island Gmail Securty Visible Light Communication How To Information Technology Computer Domains Virtual Desktop Health Wi-Fi Emergency Cloud computing Staten Island Television Physical Security Network Security Hacker WiFi Time Management Budget Automation Startup Tracking Staten Island tech support Botnet Mouse Workplace Tips today ’s organizations Saving Money Passwords managed IT services NYC data recovery Staten Island Cybercrime Software License Wireless Headphones Internet of Things Private Cloud Tablet Cleaning Windows 8 Wireless Google Calendar managed it services Website Streaming Media In Internet of Things Business Mangement Multi-factor Authentication Text Messaging Hosted Solution Two-factor Authentication Proactive IT End of Support Windows Downloads Wireless Technology Hardware BDR Computer Care Small Business Microsoft Law Enforcement computer repair Staten Island managed IT services staten island IT consulting NYC Memory Download Business Technology Language Content App YouTube Workers Telephone Systems Innovation email scam Mobile Device Cryptocurrency Websites Cloud Computing Remote Monitoring Compliance Unified Threat Management tech support Staten Isalnd Ransomware Freedom of Information LiFi Spyware Hosted Solutions Content Filtering Workstations Best Practice Managing Stress Experience Rental Service Worker User Tips Analytics Hackers Social Engineering Security Company Culture Patch Management Society Unified Threat Management Network Congestion Computer Malfunction Data Help Desk Emails Administration computer support Staten Island Audit Staten Island IT consulting Scam Efficiency Applications Tech Terms Robot Mobile Security Fake News The Internet of Things Maintenance Virtual Reality VPN HTML Mobile Devices computer support NYC Social Media Trends Email Best Practices Recovery Virus Quick Tips Tech Support Lithium-ion battery Microsoft Office Vulnerabilities Tip of the Week IT consulting firm Google Docs eWaste Server Addiction Travel Computing Infrastructure Going Green Safety IT support IT consulting Staten island Communication Black Market Legislation Bandwidth Congratulations DDoS Identity Theft Upload tech support Staten Island Reliable Computing Drones Administrator Uninterrupted Power Supply Distributed Denial of Service Work/Life Balance Processors IT services Staten Island File Sharing Hacks Data Breach Hard Drive Disposal Mobile Technology Tablets Laptops IT consulting firms IT Services Remote Computing Artificial Intelligence Bitcoin Productivity managed services computer support firms Tech Term Alert Documents Operating System Running Cable Telephony Outsourced IT Flexibility Computing Knowledge Vendor Mangement News communications

Newsletter Sign Up