Attend IT Limited Blog

Taking a Look at the Problems Behind Smartphone Addiction

Taking a Look at the Problems Behind Smartphone Addiction

If you were to mention the term “smartphone addiction” to an incoming college freshmen (if you could get their attention), it would either illicit laughter or they would scoff at the notion that it is possible. We live in mobile times, and as a result, most of us actively use a smartphone. That’s not to say that most people are addicted to their device. This month, we wanted to look at the phenomenon that is smartphone addiction and take a look at its effects. 

Addicts in Plain Sight

There is a stigma that comes along with being an addict. Whether a person is addicted to smoking cigarettes, having sex, or something much worse, the notion that they have lost the ability to moderate their behavior is a big deal, and carries with it serious problems. 

Using a mobile phone can be an addictive behavior. The problem becomes, how can you tell smartphone addiction and what negative consequences does this addiction have? The normal person probably uses the smartphone more than is healthy, but people use it for work, to keep in contact with the people in their lives, to recreate, to read, or to interact with their digital community. If your smartphone is both a personal and a work hub, how can using it all the time be problematic?

Telltale Signs of Smartphone Addiction

Smartphone addiction is similar to drug addiction according to the DSM-5. Using the device releases dopamine creating a physical dependence on having the device at the ready. Some of the most prevalent symptoms include:

  • Conscious use of smartphone in dangerous situations or when it is prohibited to use (driving, walking stairs)
  • causes social conflict
  • A loss of interest in other social or group activities
  • Withdrawal, panic, and anxiety when smartphone isn’t in hand
  • Lack of focus
  • Social anxiety
  • Relationship stress
  • Eye pain
  • Neck pain
  • Insomnia
  • Dependence on digital validation

Smartphone Addiction’s Effects

While it can be something as benign as not getting enough sleep, smartphone addiction can also have many negative effects on a person’s day-to-day wellbeing. Serious problems such as depression and anxiety can develop, even when the phone is nearby. One study suggests that people with smartphone addiction can have as much as a 270-percent higher-than-normal chance of developing depression.

If you think that someone you love has a smartphone addiction, here are some things you can do to aid them: 

  • Monitor usage - if you can, help them monitor their use of their phone. 
  • Don’t use your phone for everything - Phones have very useful features, so substituting the things that a smartphone emulates can work. Things like an alarm clock or physical books can cut down on the dependence on the mobile device. 
  • Turn off notifications - Most people have a steady flow of notifications that come in during the day. Turning off these notifications can go a long way toward getting someone’s mind off their device. 

Do you know someone that could use some help controlling their use of their smartphone? Call our consultants at 020 8626 4485 today to find out more ways you can go about working around a smartphone addiction. 

Phishing Attacks Masquerading as VoIP Voicemails
Losing Data in 2020 is Inexcusable

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Network Security Business Computing Tip of the Week Cloud Productivity Best Practices Data Backup Data Recovery Managed IT Services Disaster Recovery Hackers Privacy communications Hosted Solutions VoIP Backup Data Malware Business Continuity Business Small Business Mobile Devices IT Services IT Support Outsourced IT Email Software Innovation Computer Cybersecurity Internet Cloud Computing Efficiency Phishing Productivity IT Support Saving Money Hardware Ransomware Business Management BDR Automation Information Technology Smartphone Upgrade Server Internet of Things Mobile Device Management Covid-19 Managed IT services Collaboration Microsoft Managed IT BYOD Smartphones Risk Management Budget Network Mobility Compliance Meetings User Tips Workplace Tips Gadgets Managed Service Provider Artificial Intelligence Quick Tips Avoiding Downtime Windows 7 Save Money Wi-Fi Mobile Device Communication Firewall History Users Spam Hosted Solution Wireless Virtual Private Network Training Employee-Employer Relationship Google Remote Computing Remote Work Data Management Human Resources MSP Passwords Cost Management Password Computers Managed Service Employer-Employee Relationship Value Time Management Instant Messaging Document Management Hybrid Cloud Paperless Office Manufacturing Personal Information VPN Saving Time Content Filtering Data Breach Devices Data Security Printer Business Technology Microsoft Office Windows 10 Telephone Systems Router Software as a Service Printing Conferencing Audit Telephony End of Support Wireless Internet Remote Workers Big Data Computing Hard Drives Maintenance Automobile Redundancy Solid State Drive Tech Term IT Service Machine Learning Android Marketing Recovery Networking Work/Life Balance Alexa for Business Legal Data Loss Voice over Internet Protocol Commerce Bitcoin Phone System Management Printers Upgrades Hacking Professional Services Workers Entertainment Smart Tech Samsung Vendor Business Intelligence Administration Blockchain Business Telephone Application Students Utility Computing Office 365 Information Workstations Wireless Technology Customer Service e-waste Fiber Optics Disaster Azure Dark Web Finance Backup and Disaster Recovery Financial Technology Proactive Mobile Office Save Time Smart Technology Transportation Travel Remote Working Cybersecurty HIPAA Connectivity App Colocation Lifestyle Smartwatch Computer Repair Two-factor Authentication Unified Communications Government WPA3 Social Media Money Copier Project Management Windows Server 2008 Encryption Electronic Medical Records Proactive IT Private Cloud SMB Active Directory Going Green Infrastructure Spyware Break/Fix Window 10 Virtualization Mobile Computing Applications PCI DSS Black Market Development Wasting Money Downtime Streaming Media Company Culture SaaS Managed IT Service Hacker IoT Remote Monitoring Vulnerability Regulation File Storage OneNote Flexibility Employees Laptop Windows Server Office Amazon Nanotechnology iPhone Apple Videoconferencing Online Storage Shadow IT Data Protection Regulations Compliance Help Desk Leadership E-Commerce Content Filter Windows 10 Cybercrime Payroll Antivirus Bandwidth Browser Facebook Video Conferencing intranet Copiers Gamification Operating System Cost Evernote Analysis Virtual Assistant AI User Error Streaming Customer Relationship Management Telephone Managed Services Word Payment Cards Monitoring Advertising Social Engineering The Internet of Things Holiday Chromebook Outsource IT Update Voiceover Internet Protocol Education Cleaning Mobile Remote App store Augmented Reality Windows Computer Tips Edge eCommerce Virtual Reality Computer Forensics Hyperlink Policy Credit Cards Digital Signage Social Windows Ink Device Security Employee Managed Services Provider Miscellaneous Cast Solutions Sales Virus Windows Server 2008 R2 Smart Devices Computer Fan Innovations Business Strategy Internet Service Provider Humor Cortana PC Worker Hard Disk Drive Shortcut Mobile Security Search Google Docs Ciminal Gmail Wasting Time Procedure FAQ Google Maps Facebook Privacy Music Consultant PDF Best Practice Retail Troubleshooting Updates How To Identities Battery Keyboard Shortcuts Excel Identity Computer Accessories Television CrashOverride Microsoft Excel YouTube PowerPoint Accessory Emails IT Solutions Adobe Organization Wireless Charging Computer Care Relocation Analytics Display HBO Apps Websites CRM Law Enforcement Tablets Reviews Microsoft Word Myths Testing Google Drive Workstation Current Events Legislation Server Maintenance Inventory Point of Sale Data Privacy Chrome Net Neutrality File Sharing Work Holidays Safety Peripheral Webinar WIndows Server 2008 WannaCry Unsupported Software Video Games Tech Support 5G Google Assistant Co-Managed Services Alert Touchscreen Text Messaging Gifts Data Theft Keyboard Identity Theft Reputation NFL Threats Politics Charger Camera WiFi Data Storage Telework Comparison Language Investment Communitications Financial iOS Sync Hard Drive Vendor Management Scalability Storage OneDrive Managing Stress Emergency Access Control IT solutions Patch Management Licensing Security Cameras Processor Worker Commute Scam Robot Root Cause Analysis Health Fraud Medical IT USB Books Twitter IT Management Office Tips Micrsosoft Biometrics eWaste Scams Experience Projects Unified Threat Management Screen Mirroring Audits Specifications ROI Hosted Desktop Bring Your Own Device Benchmarks Settings Internet Exlporer Sports IT budget Sabotage Memory Admin Windows 10s Outlook HaaS