Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (347) 830-7322



Tekie Geek Blogs

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

This is one of the symptoms of technology addiction, also commonly known as Internet addiction disorder (IAD). Even though the Diagnostic and Statistical manual of Mental Disorders (DSM) hasn’t necessarily labeled IAD as a problem yet, health professionals have been drawn to it since the early 1990s saw an increase in technology use--particularly in regards to the Internet and gaming.

Why is IAD a Problem?
Some of the most dangerous traits of today’s applications, such as autoplay, in-app purchases, and notifications, are ways to make it seem like the device is actively taking away the user’s self-control. Basically, these concepts are meant to give the illusion of choice, when in reality they are far too tempting to not take advantage of, whether for fear of inconvenience or missing out on something great.

There is a big difference between needing to use technology for work purposes and being addicted to devices on a personal level. Either way, it’s clear that this is an issue that transcends the age barrier, affecting both children and grown adults. A poll showcased that 66 percent of parents felt that their teens have been investing too much time on their mobile device--a believable statistic to say the least. However, this same poll measured that 54 percent of children believe that their own parents are checking their devices too often.

Symptoms of IAD
There are few warning signs indicating that IAD has begun to manifest in victims, with most of them being rooted in behavioral or mood changes. Users might check for incoming text messages or updates subconsciously without even realizing it, or they may check social media too often, so be sure to keep an eye out for these warning signs.

Those who suffer from IAD also tend to feel a sense of relief and euphoria from the use of technology. When they aren’t using it, they may feel restless or anxious. IAD victims also tend to suffer from social withdrawal or find no joy in social activities. Other times, they may find themselves simply bored with tasks that are unrelated to the device. Some schools have technology fasts that keep students from using their devices for extended periods of time. Some students even display physical symptoms of anxiety, such as shaking and sweating.

How to Cut Back on Addictive Tasks
Devices and applications these days tend to nurture dependence, even if they seem like they are being a huge help. However, you can take steps to make sure that your devices aren’t creating a problem through your habits. You can start by deactivating certain non-essential applications and notifications. If the information you’re receiving isn’t terribly important, you can turn them off so that your attention isn’t always being grabbed. If it’s a mobile game, you can bet that you don’t need it reminding you to take certain actions. Just mute them so that you can focus on what’s really important.

Many of these apps that spam you with notifications are the same ones that will constantly target users to make in-app purchases for something that they don’t want or need. This is particularly the case for free versions of apps, so if you want to use one, it’s more economical in the long run to simply pay for the application up-front.

Would (or could) you go for a week without your technology? Let us know in the comments.

Technology Basics: Bits and Bytes
A Close Examination of Cyberterrorism


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 21, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

In Internet of Things Hosted Solutions Vulnerability Information Data Backup Social Smartphone History Hosted Solution IT Consultant data recovery Staten Island Office Tips Relocation Virtual Assistant Worker Hacker CCTV Virtual Desktop managed IT services NYC Document Management Television Supercomputer Efficiency Rental Service Cloud Computing Upload Motion Sickness VoIP Downtime CryptoLocker The Internet of Things Staten Island tech support Law Enforcement Collaboration Quick Tips Websites Reliable Computing Audit Best Practices Google Maps Budget Samsung Cortana Mouse Fake News Privacy Public Cloud Communication Screen Reader Computing Infrastructure Corporate Profile BYOD Cybersecurity Upgrade Drones Disaster Recovery Managed Service News SharePoint Managed IT Services Going Green Social Engineering Data Business Metrics Automation Downloads Virtualization Conferencing IT support Information Technology Scam Lenovo Business Mangement Windows 8 Monitoring malware Hard disk Save Money Unified Threat Management Managed Service Provider Managed IT Services DDoS email scam Windows 10 Regulation Touchscreen Staffing Workplace Tips IT support NYC Education Social Media it support Powerful Technology Solutions SaaS 3D Printing Compliance Staten Island IT consulting Mobile Devices Congratulations staten island managed services Nanotechnology Webcam Email ransomware attacks Emergency Search Bandwidth Remote Monitoring Windows Multi-Factor Security Society Flash Black Market Business Cards IT consulting Innovation Computer Malfunction Device security Domains Business Computing computer support firms eWaste WiFi Redundancy Software License Specifications VPN Multi-factor Authentication How To Government Data Security Gadgets Staten Island computer support Google Calendar Machine Learning Hiring/Firing Software Hack Analytics Private Cloud Google Docs Web Server Telephone Cleaning tech support Legislation Retail Network today ’s organizations Managed IT IT consulting NYC Cache Twitter Printer Applications IT support firms Scalability Virtual Reality Office 365 Telephone Systems Small Business Vendor Mangement Managing Stress IT consulting Staten Island Hardware managed IT services staten island Computers Data Protection Deep Learning Travel Business Management IT support Staten Island Hackers Botnet Backup Encryption datto Administrator IT Services Ransomware Microsoft Office IT Support data loss malware worms Work/Life Balance Vulnerabilities Content Settings Mobile Technology Documents Remote Computing Regulations Tech Term VoIP Laptop Apple Facebook Company Culture Customer Service Robot Monitors Paperless Office Excel Devices Hardware Solutions Thank You managed services Staten Island computer support Staten Island Mobile Device Microsoft Flexibility Solid State Drive Music Google Drive Passwords computer services Update IT services Staten Island Social Network IT Management Cloud computing Staten Island Computing Writing Securty Tech Terms communications Laptops Digital Tablet Employer Employee Relationship Streaming Media Banking Augmented Reality Telephony Desktop computer support Accountants Uninterrupted Power Supply G Suite IT support New York City Trends IT consulting Staten island Displays Meetings Tablets Holiday Comparison Advertising Database Unified Threat Management Emails Malware Language end-user files computer services Staten Island User Tips Distributed Denial of Service Google Windows XP Technology CrashOverride Business Continuity IT support Staten Islans YouTube IBM Cryptocurrency Sports Data storage Staten Island IT support Username Two-factor Authentication Legal Network Management Patch Management Hacking BDR Cybercrime End of Support Antivirus Cloud Addiction Workstations Internet Workers Gamification Chromebook Physical Security Experience Operating System Service Level Agreement Artificial Intelligence Wi-Fi File Sharing Alert Proactive IT Spyware Big Data App Network Security Wireless Software as a Service Productivity Processors Tech Support Miscellaneous Equifax Freedom of Information IT consulting company Employer-Employee Relationship Cabling Security Computer Care Text Messaging Business Health Knowledge Visible Light Communication Maintenance Accidental deletion Startup Computer Help Desk Best Practice PDF Hacks LiFi computer support NYC Office Tracking Administration Bluetooth Outsourced IT Business Technology Lithium-ion battery Automobile Tip of the week Microchip managed it services IT consulting firms Customer Resource management Browser Network Congestion Safety Google Wallet Disaster Data Breach Digital Payment Download Data Management Vendor Management tech support Staten Isalnd Apps Tactics Piracy Microsoft Excel Mobile Device Management Productivity data recovery Word tech support Staten Island Wireless Technology Windows 10 Business Growth Website Running Cable Mobile Security Time Management Politics Blockchain Hard Drive Server Virus Hard Drive Disposal IT services NYC Training Start Menu Money Unified Communications Access Control Tip of the Week IT services New York City Memory Saving Money computer repair Wireless Headphones Taxes HTML Bring Your Own Device Mobility Smartphones Backup and Disaster Recovery Networking Printing Password Content Filtering Access Management Project Management Spam Firewall Identity Theft Notifications Internet of Things Gmail Outlook Android Cost Management Phishing managed services Recovery Error Bitcoin computer repair Staten Island IT consulting firm

Newsletter Sign Up