Attend IT Limited Blog

By accepting you will be accessing a service provided by a third-party external to https://www.attendit.net/

Taking a Look at the Problems Behind Smartphone Addiction

Taking a Look at the Problems Behind Smartphone Addiction

If you were to mention the term “smartphone addiction” to an incoming college freshmen (if you could get their attention), it would either illicit laughter or they would scoff at the notion that it is possible. We live in mobile times, and as a result, most of us actively use a smartphone. That’s not to say that most people are addicted to their device. This month, we wanted to look at the phenomenon that is smartphone addiction and take a look at its effects. 

Addicts in Plain Sight

There is a stigma that comes along with being an addict. Whether a person is addicted to smoking cigarettes, having sex, or something much worse, the notion that they have lost the ability to moderate their behavior is a big deal, and carries with it serious problems. 

Using a mobile phone can be an addictive behavior. The problem becomes, how can you tell smartphone addiction and what negative consequences does this addiction have? The normal person probably uses the smartphone more than is healthy, but people use it for work, to keep in contact with the people in their lives, to recreate, to read, or to interact with their digital community. If your smartphone is both a personal and a work hub, how can using it all the time be problematic?

Telltale Signs of Smartphone Addiction

Smartphone addiction is similar to drug addiction according to the DSM-5. Using the device releases dopamine creating a physical dependence on having the device at the ready. Some of the most prevalent symptoms include:

  • Conscious use of smartphone in dangerous situations or when it is prohibited to use (driving, walking stairs)
  • causes social conflict
  • A loss of interest in other social or group activities
  • Withdrawal, panic, and anxiety when smartphone isn’t in hand
  • Lack of focus
  • Social anxiety
  • Relationship stress
  • Eye pain
  • Neck pain
  • Insomnia
  • Dependence on digital validation

Smartphone Addiction’s Effects

While it can be something as benign as not getting enough sleep, smartphone addiction can also have many negative effects on a person’s day-to-day wellbeing. Serious problems such as depression and anxiety can develop, even when the phone is nearby. One study suggests that people with smartphone addiction can have as much as a 270-percent higher-than-normal chance of developing depression.

If you think that someone you love has a smartphone addiction, here are some things you can do to aid them: 

  • Monitor usage - if you can, help them monitor their use of their phone. 
  • Don’t use your phone for everything - Phones have very useful features, so substituting the things that a smartphone emulates can work. Things like an alarm clock or physical books can cut down on the dependence on the mobile device. 
  • Turn off notifications - Most people have a steady flow of notifications that come in during the day. Turning off these notifications can go a long way toward getting someone’s mind off their device. 

Do you know someone that could use some help controlling their use of their smartphone? Call our consultants at 020 8626 4485 today to find out more ways you can go about working around a smartphone addiction. 

Phishing Attacks Masquerading as VoIP Voicemails
Losing Data in 2020 is Inexcusable
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 07 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Network Security Technology Business Computing Tip of the Week Cloud Best Practices Productivity Managed IT Services Disaster Recovery Privacy Hosted Solutions communications Hackers Data Malware Data Recovery Business Data Backup Innovation VoIP Outsourced IT Backup IT Services Cloud Computing Email Small Business Software Productivity Mobile Devices IT Support Computer Efficiency Cybersecurity IT Support Internet Business Continuity Automation Upgrade Saving Money Internet of Things Hardware Business Management Microsoft Managed IT Information Technology Managed IT services Server Smartphone Phishing BDR User Tips Mobility Mobile Device Management Collaboration Artificial Intelligence Avoiding Downtime Save Money Managed Service Provider BYOD Risk Management Budget Windows 7 Network Passwords Computers Ransomware Firewall Gadgets History Smartphones Quick Tips Cost Management Meetings Hosted Solution Virtual Private Network Remote Computing Data Management Communication Password Spam Compliance Printing Data Security Human Resources Windows 10 Redundancy Personal Information Tech Term Android Networking Marketing Recovery Document Management Telephone Systems Router Paperless Office Manufacturing Content Filtering IT Service Managed Service Training Devices Microsoft Office Google Hybrid Cloud Hard Drives Remote Work Value Audit Conferencing Business Technology Workplace Tips Remote Workers Solid State Drive MSP Saving Time Automobile Data Breach Wasting Money Dark Web E-Commerce Legal Antivirus Instant Messaging Evernote Streaming Media Browser App Copiers intranet Remote Monitoring Video Conferencing File Storage Customer Relationship Management User Error Wireless Internet Administration Computing Amazon Social Engineering Payment Cards Word Education Cleaning Wireless Technology Holiday AI Regulation Machine Learning Mobile Content Filter SaaS Managed IT Service Wireless Voiceover Internet Protocol Work/Life Balance Employer-Employee Relationship Payroll Vulnerability Phone System Outsource IT Bandwidth Mobile Device OneNote Government Voice over Internet Protocol Data Loss Hacking Gamification Colocation Time Management Analysis Virtual Assistant Nanotechnology Application Data Protection Money Entertainment Samsung Black Market Professional Services Workers Disaster Monitoring Business Telephone Office 365 Azure Chromebook Users VPN e-waste Fiber Optics Save Time Smart Technology Hacker Workstations Alexa for Business Transportation Backup and Disaster Recovery Two-factor Authentication End of Support Flexibility Mobile Office Proactive HIPAA The Internet of Things Cybersecurty Travel Encryption Electronic Medical Records Management Printers iPhone Computer Repair Lifestyle Wi-Fi SMB Active Directory Virtualization Covid-19 Smart Tech Social Media Vendor Windows Server 2008 Project Management Students Proactive IT Utility Computing Private Cloud Windows 10 Cybercrime Going Green Operating System Break/Fix Window 10 Software as a Service Spyware Mobile Computing Applications Commerce Facebook Development Downtime Financial Technology Upgrades IoT Telephony Advertising Windows Server Shadow IT Big Data Connectivity Employee-Employer Relationship Business Intelligence Employees Office Unified Communications WPA3 Online Storage Apple Update Help Desk Threats NFL Maintenance Managing Stress Emergency Regulations Compliance Display Consultant Windows Investment Communitications Comparison Language Vendor Management Security Cameras Processor Licensing USB Books Telework Testing Social OneDrive Storage Worker Commute Scam Excel Experience Data Privacy Robot Television CrashOverride Medical IT Fraud Peripheral Emails IT Solutions Humor Micrsosoft Computer Care Scams eWaste Managed Services Google Assistant Co-Managed Services HBO Search ROI Hosted Desktop Specifications PDF Best Practice Benchmarks Virtual Reality Audits Camera Sabotage Sports IT budget Financial Credit Cards Hard Drive eCommerce Edge Access Control Webinar WIndows Server 2008 How To Digital Signage Unsupported Software Employee Managed Services Provider Windows Ink Device Security Worker Policy Twitter Telephone Miscellaneous Touchscreen Windows Server 2008 R2 Smart Devices Sales Virus iOS Sync Apps Solutions Projects WiFi Data Storage Relocation PC Cortana Blockchain Bring Your Own Device FAQ Music Internet Service Provider Law Enforcement Google Docs Ciminal Memory Admin IT solutions Patch Management Current Events App store Root Cause Analysis Facebook Privacy Google Maps Battery Procedure Computer Forensics Hyperlink IT Management Troubleshooting Retail Text Messaging Updates Printer Unified Threat Management Screen Mirroring Video Games Smartwatch Identities Computer Accessories Adobe Wireless Charging Analytics Settings Reputation YouTube Microsoft Excel Windows 10s Outlook Company Culture Mobile Security Information Augmented Reality Point of Sale Gmail Wasting Time Scalability CRM Websites Computer Fan Office Tips Myths Tablets Microsoft Word Safety PCI DSS Google Drive Cast Health Server Maintenance Inventory Legislation WannaCry Workstation Chrome Business Strategy Holidays File Sharing Identity Theft Keyboard Shortcuts Hard Disk Drive Shortcut Data Theft Politics Charger Net Neutrality Identity HaaS 5G Tech Support PowerPoint Accessory Alert Internet Exlporer Keyboard Gifts