Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Long Can You Go for Without Your Smartphone?

b2ap3_thumbnail_smartphone_addiction_400.jpgYour smartphone is, without a doubt, a valuable business asset. It keeps you connected to your business at all times, even when you’re home; but is this a good thing? Have you ever considered what your significant other might feel if you answer your phone while out to dinner? Thanks to the indisputable power of social science research, it’s been proven that smartphones are bad for our personal relationships. Gasp!

This revelation, albeit somewhat obvious, was the result of a test led by Virginia Tech’s Shalini Misra. 100 pairs of strangers were set up to have 10-minute conversations in the Washington D.C. area. Half of the pairs were told to make small talk, while the other half discussed more personal, feeling-oriented topics. During the duration of the test, the research team recorded when, and how often, participants took out their mobile devices.

Following the survey, the participants were asked to complete a survey commenting on the quality of the conversation experienced. The results show that people feel smartphones reduce the quality of conversation, which in turn produces weakened relationships. Here are some of the observations that were made:

  • Pairs who frequently used their mobile devices during conversation had a decreased sense of “interconnectedness,” which was determined by the survey with answers like “I felt close to my conversation partner.”
  • Even the simple act of placing the device on the table worked against the test participants.
  • Feelings of “empathetic concern,” which were measured by whether or not the conversationalists really understood the feelings of each other, also decreased.

It might seem inconsequential, but even the sight of a mobile device can make a situation feel less social. This can be detrimental to building new relationships, and maintaining previously-existing ones. If you think your smartphone is hampering your ability to be social, it might be time to examine your phone etiquette.

Challenge: Attempt to Go a Single Day Without Your Phone
A 2012 study from Time magazine asked nearly 5,000 smartphone users to judge how reliant they were on their smartphones. The results revealed that society certainly does have a problem with smartphone addiction.

smartphone_one.jpg

smartphone_two.jpg


smartphone_three.jpg

Take a Smartphone Break
Whether or not you’re using your smartphone for work or for sheer entertainment, you need to take a break from your smartphone once in a while. Unfortunately, the business owner might feel reluctant to separate from their mobile device. The important thing to remember is that a break from technology now and again is beneficial to your overall health and mental state. According to Scientific American, a certain amount of downtime is required in order to replenish productive, creative thought capabilities.

Instead of relying on your smartphone all of the time, it might not be a bad idea to let go and see how much you can get done without it. Andrew Smart’s book titled Autopilot: The Art and Science of Doing Nothing details how it can be beneficial to do this. According to Smart, this can lead to a better understanding of what your unconscious self wants, and can lead to you using that knowledge to your advantage.

Do you think you can keep the productivity up without being tethered to your device at all times? What are some of your tips for dealing with smartphone addiction? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud User Tips Network Security Internet Hardware Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Cybersecurity Microsoft Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Android Business Management VoIP Smartphones communications Managed Service Upgrade Mobile Devices Disaster Recovery Browser Data Recovery Managed IT Services Social Media Microsoft Office Windows Remote Tech Term Network Internet of Things Current Events Automation Artificial Intelligence Facebook Productivity Covid-19 Gadgets Cloud Computing Remote Work Server Managed Service Provider Miscellaneous AI Holiday Outsourced IT Information Employee/Employer Relationship Encryption Spam Office Windows 10 Compliance Training Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Chrome Gmail Budget Managed Services Voice over Internet Protocol Apple Networking App Employer-Employee Relationship BYOD Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 IT Support Tip of the week Conferencing WiFi How To BDR Computers Router Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Augmented Reality Retail Storage Password Bring Your Own Device Healthcare Managed IT Services Big Data Operating System HIPAA Solutions Physical Security Display Printer Paperless Office Infrastructure Monitoring Windows 11 2FA Firewall Document Management Excel Telephone Remote Workers The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring Vulnerability End of Support Microsoft 365 Vendor Management Customer Service Cybercrime Presentation VPN YouTube Meetings Cryptocurrency Employees Wireless Technology User Tip Modem Integration Computer Repair Mobile Security Processor Virtual Desktop Data storage LiFi Holidays Word Smart Technology Data Storage Outlook Machine Learning Supply Chain Money Saving Time Video Conferencing Managed Services Provider Humor Virtual Machines Professional Services Managed IT Service Safety Maintenance Antivirus Sports Downloads Mouse Licensing iPhone Entertainment Administration Vulnerabilities Data Privacy Telephone System Images 101 Robot Customer Relationship Management Cost Management Settings Multi-Factor Authentication Mobility Printing Wireless Content Filtering Hacking IT Management Videos Electronic Health Records Network Congestion Specifications Workforce Knowledge Fraud Wasting Time Threats Google Drive User Error Microchip User Internet Exlporer Username Trend Micro Security Cameras Workplace Strategies Point of Sale Software as a Service 5G Black Friday Meta Experience Managing Costs Amazon IP Address Google Docs Unified Communications Database Bitcoin Network Management Running Cable Tech Support IT Technicians eCommerce SSID Google Wallet Proxy Server Cookies Surveillance Monitors Cyber Monday Virtual Assistant Outsource IT Hotspot Virtual Machine Environment Media Recovery Tactics Hard Drives Windows 8 Reviews Laptop Websites Mirgation Medical IT Domains Drones Nanotechnology Development Transportation Small Businesses Electronic Medical Records Language Hypervisor Displays SharePoint Addiction Refrigeration Management Shopping Halloween Chatbots Optimization PowerPoint Employer/Employee Relationships Outsourcing Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service PCI DSS Virtual Reality Computing Infrastructure Navigation Lithium-ion battery Service Level Agreement Hacks Server Management Gig Economy Entrepreneur Scary Stories Private Cloud Identity Workplace Teamwork Hiring/Firing Superfish Bookmark Identity Theft Smart Tech Internet Service Provider Fun Regulations Compliance Twitter Alerts Evernote Paperless Deep Learning Download Undo Error Memes Co-managed IT SQL Server Technology Care Browsers Education Connectivity Net Neutrality Social Engineering Break Fix Upload Financial Data Remote Computing History Business Communications Mobile Computing Social Network Smartwatch IT Multi-Factor Security Scams Search Dark Web Azure Hybrid Work Tablet IoT Procurement Application Best Practice Trends Telework Alert Cyber security Tech Human Resources Managed IT Customer Resource management CES Buisness File Sharing Regulations Communitications Dark Data Google Calendar Cables How To Microsoft Excel IBM Legal Data Analysis IT solutions Star Wars Supply Chain Management Business Growth Gamification FinTech Notifications Staff Term Google Apps Travel Social Networking IT Assessment Legislation IT Maintenance Cortana Value Business Intelligence Techology Fileless Malware Google Maps Flexibility Alt Codes Content Organization Wearable Technology Shortcuts Competition Health IT Digital Security Cameras Downtime Unified Threat Management Motherboard Smart Devices Comparison Ransmoware Permissions Memory Vendors Unified Threat Management Directions Hosted Solution Assessment Remote Working Typing Data Breach Google Play Be Proactive

Blog Archive