Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Technology Addiction is a Problem in Children and Adults

Technology Addiction is a Problem in Children and Adults

Technology has become so ingrained in society and the workplace that it can be difficult, borderline impossible, to consider a life without it. Hours on end are spent in front of computer screens during the workday, but even after hours in the comfort of your own home, you might notice that you have a hard time putting down your devices.

This is one of the symptoms of technology addiction, also commonly known as Internet addiction disorder (IAD). Even though the Diagnostic and Statistical manual of Mental Disorders (DSM) hasn’t necessarily labeled IAD as a problem yet, health professionals have been drawn to it since the early 1990s saw an increase in technology use--particularly in regards to the Internet and gaming.

Why is IAD a Problem?
Some of the most dangerous traits of today’s applications, such as autoplay, in-app purchases, and notifications, are ways to make it seem like the device is actively taking away the user’s self-control. Basically, these concepts are meant to give the illusion of choice, when in reality they are far too tempting to not take advantage of, whether for fear of inconvenience or missing out on something great.

There is a big difference between needing to use technology for work purposes and being addicted to devices on a personal level. Either way, it’s clear that this is an issue that transcends the age barrier, affecting both children and grown adults. A poll showcased that 66 percent of parents felt that their teens have been investing too much time on their mobile device--a believable statistic to say the least. However, this same poll measured that 54 percent of children believe that their own parents are checking their devices too often.

Symptoms of IAD
There are few warning signs indicating that IAD has begun to manifest in victims, with most of them being rooted in behavioral or mood changes. Users might check for incoming text messages or updates subconsciously without even realizing it, or they may check social media too often, so be sure to keep an eye out for these warning signs.

Those who suffer from IAD also tend to feel a sense of relief and euphoria from the use of technology. When they aren’t using it, they may feel restless or anxious. IAD victims also tend to suffer from social withdrawal or find no joy in social activities. Other times, they may find themselves simply bored with tasks that are unrelated to the device. Some schools have technology fasts that keep students from using their devices for extended periods of time. Some students even display physical symptoms of anxiety, such as shaking and sweating.

How to Cut Back on Addictive Tasks
Devices and applications these days tend to nurture dependence, even if they seem like they are being a huge help. However, you can take steps to make sure that your devices aren’t creating a problem through your habits. You can start by deactivating certain non-essential applications and notifications. If the information you’re receiving isn’t terribly important, you can turn them off so that your attention isn’t always being grabbed. If it’s a mobile game, you can bet that you don’t need it reminding you to take certain actions. Just mute them so that you can focus on what’s really important.

Many of these apps that spam you with notifications are the same ones that will constantly target users to make in-app purchases for something that they don’t want or need. This is particularly the case for free versions of apps, so if you want to use one, it’s more economical in the long run to simply pay for the application up-front.

Would (or could) you go for a week without your technology? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 29 November 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade Smartphones VoIP AI Business Management Mobile Devices Data Recovery communications Disaster Recovery Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Internet of Things Tech Term Remote Automation Information Facebook Artificial Intelligence Gadgets Training Covid-19 Cloud Computing Miscellaneous Holiday Server Managed Service Provider Remote Work Compliance Outsourced IT Spam Encryption Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Data Management Government Business Technology Blockchain Wi-Fi Windows 10 Virtualization Bandwidth Apps Mobile Office Data Security Vendor Two-factor Authentication Managed Services Employer-Employee Relationship Voice over Internet Protocol Apple Tip of the week App Networking Mobile Device Management Gmail BYOD Chrome Budget Conferencing Access Control Hacker Avoiding Downtime Marketing Computing How To Information Technology HIPAA BDR Applications Office 365 WiFi Storage Password Health Bring Your Own Device Healthcare Computers Retail Website Operating System Managed IT Services Risk Management Router 2FA Analytics Office Tips Augmented Reality Help Desk Big Data Virtual Private Network Printer Paperless Office Remote Workers Infrastructure Telephone Customer Service Document Management Going Green Cooperation Free Resource Project Management Windows 7 Scam Cybercrime Microsoft 365 Data loss Solutions Firewall Windows 11 Patch Management Save Money Remote Monitoring Vulnerability Excel End of Support Vendor Management The Internet of Things Monitoring Physical Security Social Display Saving Time Computer Repair Virtual Machines Professional Services Sports Mouse Managed IT Service Customer Relationship Management Data Privacy Administration Downloads iPhone Machine Learning Hacking Licensing Presentation Entertainment Vulnerabilities Wireless Technology Images 101 Settings Maintenance Wireless Antivirus Printing Multi-Factor Authentication Content Filtering Mobility Telephone System Cost Management YouTube Word Cryptocurrency Employees Integration Robot Virtual Desktop LiFi Modem Supply Chain Data storage User Tip Safety Processor Mobile Security Holidays Outlook IT Management VPN Meetings Money Data Storage Humor Smart Technology Video Conferencing Managed Services Provider Gig Economy Deep Learning Screen Reader Distributed Denial of Service Scams IBM Network Management Tech Support Service Level Agreement Internet Service Provider Computing Infrastructure Hybrid Work Teamwork Education Identity Human Resources Evernote Monitors Regulations Compliance Bookmark Smart Tech Memes Cables Websites Mobile Computing Download Net Neutrality Alerts SQL Server History Search Google Apps Competition Financial Data Browsers Electronic Medical Records Smartwatch Best Practice Connectivity IT Break Fix SharePoint IT Maintenance Upload Procurement Buisness Business Intelligence Azure IT solutions Cyber security Multi-Factor Security Lenovo Shortcuts Tech Legal Social Network Writing Telework Virtual Reality User CES Business Growth IoT Communitications Dark Web Ransmoware Server Management Private Cloud Trends Supply Chain Management Vendors FinTech Regulations Cortana Google Calendar Superfish Be Proactive Term Identity Theft Customer Resource management IP Address Data Analysis Twitter Alt Codes Star Wars IT Assessment Microsoft Excel Workforce Value Error Gamification Flexibility Downtime Staff Threats Organization Hosted Solution Social Networking Legislation Workplace Strategies Social Engineering Fileless Malware Remote Computing Recovery Digital Security Cameras Typing Smart Devices Meta Memory Hard Drives Content Remote Working Wearable Technology Amazon Motherboard Data Breach Knowledge Comparison Google Play Tablet Domains Google Drive Health IT Directions Alert Videos Assessment Electronic Health Records Permissions Outsource IT Environment Wasting Time 5G Managed IT Media File Sharing Refrigeration Dark Data Unified Communications Trend Micro Experience Specifications Security Cameras Public Speaking Google Docs How To Lithium-ion battery Microchip Notifications Bitcoin Internet Exlporer Software as a Service Running Cable Fraud Small Businesses Displays Managing Costs Travel Google Wallet Username Entrepreneur eCommerce Black Friday Techology SSID Google Maps Windows 8 Database Surveillance Laptop Outsourcing Virtual Assistant Virtual Machine Unified Threat Management Undo Drones IT Technicians Proxy Server Reviews Cookies Cyber Monday Unified Threat Management Workplace Medical IT Tactics Development Halloween Hotspot Hiring/Firing Transportation Mirgation Hypervisor Paperless Network Congestion Shopping Nanotechnology Optimization User Error Co-managed IT PowerPoint Application Hacks Addiction Scary Stories Language Technology Care Employer/Employee Relationships Chatbots Fun Business Communications Navigation Point of Sale Management PCI DSS

Blog Archive