Language Selection

English French German Italian Portuguese Spanish

Computer Addiction or Healthy Enthusiam?

Filed under
-s

Are you a computer addict? ... or is someone you love a computer addict?

If so, you are not alone.

I have this friend who I believe has become addicted to her computer. It started out innocently enough with the purchase of a computer to do her bookkeeping, keep in touch with long distant friends and relatives, or a little light reading. Over the next year or so she began to spend more and more time on it and less and less with her friends. She became withdrawn from society and stopped participating in activities she used to enjoy. Call her anytime day or night and in asking "wha'cha doing?" she states "playing on the computer". I jokingly told her "I think you are addicted to that thing".

As time went on, I began to suspect this wasn't a joking matter and perhaps she could have a real condition with serious repercussions. Termed "Internet Addiction Disorder" by some, or "Computer Addiction" by others, this affliction knows no age or sex boundaries. It isn't confined to any social class, race, or country. It doesn't discriminate.

It doesn't discrimate, but different demographics tend to be addicted to certain elements under the massive umbrella we'll term "computers". Youngsters tend to become so entrenched in their video games that they withdraw from friends, lose sleep, and cease all semblance of learning in school. Teenage females lean towards chat rooms and instant messaging. Housewives and women in general might become addicted to ebay or other on-line purchasing and sometimes incur massive debt, neglect the family unit, and her household chores. Many men, age not being a factor, become addicted to porn and the ilk, computer hacking/cracking, irc or discussion forums or even online gambling. Many neglect work, friends and family. All age groups spend countless hours "surfing". In actuality these examples cross demographic lines and are meant only as a loose generalization. "As a trained cognitive behavior therapist, I often treat gamblers, alcoholics and people with obsessive-compulsive disorder, and have also studied mood changes resulting from the recreational use of psychotropic medication. I concluded that this inappropriate and excessive use of the computer might be a distinct disorder" (Orzack et al., 1988).

Symptoms can include feelings of euphoria or contentment when on the computer and depression or loss when not, craving more and more time on the computer and lying to everyone about their computer usage. Ailments can appear physically as well in the form of carpal tunnel syndrome, back and neck soreness, migrains, eating and sleeping disorders, and even neglecting personal hygiene.

Computers have become a constant in our society and in fact they are present in about every aspect of our lives. They are a convenience, a help, even a necessity. Like food or possibly alcohol, one may need or want to partake in order to sustain or enjoy life, but when it becomes an incontrollable excess it can be defined as an addiction. Webster's Revised Unabridged Dictionary (1913) defines addicted as "To apply habitually; to devote; to habituate". Addiction becomes a problem as it interferes with normal life processes. "But as in all addictions, the problem is where to draw the line between "normal" enthusiasm and "abnormal" preoccupation (Suler, 1999).

"We have no idea what levels or kinds of computer usage are "normal." Therefore, we cannot state which behavior is always pathological" (Orzack, 1998). To establish a baseline of normalcy I asked a random sample of 47 people encountered over a three day period throughout the course of my daily life, "how much time do you spend on the computer outside of work within each 24-hour period?". Among this group were friends, co-workers, strangers, and relatives. To minimize bias I asked anyone I encountered regardless of any demographic indicators. Simply put, I asked everyone I ran into, that I hadn't already asked, over the course of three days. Answers ranged from 0 to 12 hours. The average and the number I'm using as a baseline is roughly 2.3 hours per day.

I asked those whose time on the computer each day was greater than 4 hours if they would fill out a survey to help me on a research project and 14 complied. Granted this is a small sample and as such my findings are not exactly scientifically valid. For the scope of this article the results are interesting. Each of the 14 respondants fell into the computer addicted range. That would indicate almost 30% of the given sample was what I considered addicted. Gaming consoles and handhelds were also included as computers.

John M. Grohol, Psy.D. states, "Since the aspects of the Internet where people are spending the greatest amount of time online have to do with social interactions, it would appear that socialization is what makes the Internet so "addicting." That's right -- plain old hanging out with other people and talking with them. Whether it's via e-mail, a discussion forum, chat, or a game online (such as a MUD), people are spending this time exchanging information, support, and chit-chat with other people like themselves" (Grohol, 2004).

Unfortunately it's difficult to locate any real work in this area as most still think of it as a joke. It hasn't become a stigma in our society yet and as such it's being treated nonchalantly or with humor. In phoning local psychologists and mental treatment centers I found only one out of twelve that would even grant a consultation. Among the responses I received, two initially laughed, four referred to me to another doctor, two just said I don't treat that (paraphrasing), two that said they'd get back to me (another paraphrase) and one referred me to Alcoholics Anonymous.

Very few professionals are beginning to consider computer addiction a real affliction such as eating disorders, alcoholism, or conpulsive gambling. Dr. Orzack has founded Computer Addiction Services at McLean Hospital in Belmont, Massachusetts. But this is rare. One of the few serious papers found on the subject described the disorder as "theorized". Even more rare were suggestions for treatment.

For this newly emerging disorder, one might adapt some other basic techniques used in other addiction treatments. Other than using alcoholism as an example and just pulling the plug "cold turkey", some basic suggestions might include:

  • Setting time limits and sticking to them

  • Perhaps scheduling set blocks of time - like appointments
  • No more skipping meals or eating at the computer
  • Don't refuse invitations from family and friends (get out of the house!)
  • Dust off that bowflex or dig out the old football (then use them)
  • Downgrade your connection speed
  • If feasible get a new pet or new hobby
  • Move the computer to a busy, less private part of the house
  • Reinstall Windows! (just kidding).

Unfortunately at this time there is very little work in this area and as such there are few real scientifically valid studies or treatment programs. Whether you believe there is really such a thing or not, perhaps the following survey can be food for thought.




References

Computer Addiction Services [online: http://www.computeraddiction.com/]

International Journal of Applied Psychoanalytic Studies, Computer and cyberspace addiction, John Suler, Ph.D. (March 1999, Vol. Sleepy

Internet Addiction guide [online: http://psychcentral.com/netaddiction/]

Psychiatric Times, Computer Addiction: What Is It?, Maressa Hecht Orzack, Ph.D. (August 1998, Vol. XV, Issue 8)



I'm not a doctor and don't pretend this study is scientifically valid. The sample was small and the questionable methodology of the research and results weren't well documented. It only reflects my personal research and thoughts on the subject.

re: Im not an addict

lolol /Me/ tooo!

----
You talk the talk, but do you waddle the waddle?

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

today's leftovers

  • iTWire - Microsoft to reduce global workforce
  • Microsoft Faces Two Lawsuits For Aggressive Windows 10 Upgrade Campaign
    The series of lawsuits against Microsoft doesn’t seem to terminate sooner.
  • Controlling access to the memory cache
    Access to main memory from the processor is mediated (and accelerated) by the L2 and L3 memory caches; developers working on performance-critical code quickly learn that cache utilization can have a huge effect on how quickly an application (or a kernel) runs. But, as Fenghua Yu noted in his LinuxCon Japan 2016 talk, the caches are a shared resource, so even a cache-optimal application can be slowed by an unrelated task, possibly running on a different CPU. Intel has been working on a mechanism that allows a system administrator to set cache-sharing policies; the talk described the need for this mechanism and how access to it is implemented in the current patch set.
  • Why Blockchain Matters
    If your familiarity with Bitcoin and Blockchain is limited to having heard about the trial of Silk Road’s Ross Ulbricht, you can be forgiven -- but your knowledge is out of date. Today, Bitcoin and especially Blockchain are moving into the mainstream, with governments and financial institutions launching experiments and prototypes to understand how they can take advantage of the unique characteristics of the technology.
  • Our Third Podcast, with Cybik, is Out Now
    Cybik comes back on how he came to know and use Linux in the first place, his gaming habits, how he got involved into the Skullgirls port, and shares with us his outlook on the Linux gaming landscape. The podcast is just an hour long and you can either download it below, and use our RSS feed (that has the additional benefit of making it easy for you to get new episodes from now on):
  • GSoC: final race and multi-disc implementation
    It’s been a while since I wrote a post here. A lot has happened since then. Now Gnome-games fully supports PlayStation games, with snapshoting capabilities. The next thing I’m working on is multi-disc support, specially for PlayStation titles. So far, there’s a working propotity although a lot needs to be re-engineered and polished. This last part of the project has involved working both in UI, persistance and logic layers.
  • This Week in GTK+ – 11
    In this last week, the master branch of GTK+ has seen 22 commits, with 6199 lines added and 1763 lines removed.
  • [Solus] Replacement of Release Schedule
    In the not so distant past, Solus followed a static point release model. Our most current release at this time is 1.2, with a 1.2.1 planned to drop in the near future. However, we also recently announced our move to a rolling release model. As such, these two schools of thought are in contradiction of one another.
  • First release of official ArchStrike ISO files! [Ed: last week]
  • July ’16 security fixes for Java 8
    On the heels of Oracle’s July 2016 security updates for Java 8, the icedtea folks have released version 3.1.0 of their build framework so that I could create packages for OpenJDK 8u101_b13 or “Java 8 Update 101 Build 13” (and the JRE too of course).
  • Pipelight update
    I decided to do an update of my “pipelight” package. I had not looked at it for a long time, basically because I do not use it anymore, but after I upgraded my “wine” package someone asked if I could please write up what could be done for wine-pipelight. As you know, pipelight is a Linux plugin wrapper for Mozilla-compatible browsers which lets you install and use Windows plugins on Linux. This configuration enables you to access online services which would otherwise be unavailable to you on a Linux platform. The pipelight plugin wrapper uses wine to load the Windows software.
  • Red Hat, Inc. (NYSE:RHT) Current Analyst Ratings
  • Friday Session Wrap for Red Hat, Inc. (NYSE:RHT)
  • Fedora @ EuroPython 2016 - event report
  • Android 7.0 Nougat could be release as soon as next month
  • Android gains anti-spam caller ID feature
  • Amazon Cloud Revenue Hits $2.9B
  • ServerMania – Discover High Availability Cloud Computing, powered by OpenStack
    Cloud computing is fast growing in the world of computer and Internet technology, many companies, organizations and even individuals are opting for shared pool of computing resources and services. For starters, Cloud computing is a type of Internet-based computing where users consume hosted services on shared server resources. There are fundamentally three types of cloud computing available today: private, public and hybrid cloud computing.

Leftovers: OSS and Sharing

  • Student survey data shows Open Source training uptake amongst women and young people remains extreme
    Future Cert, the UK and Ireland representative for the LPI (Linux Professional Institute), is calling for more awareness of Open Source software training amongst the under 21s and especially women, which the industry is so desperately in need of. New figures from a recent Future Cert student survey reveals that the number of women and young people taking LPI Certification in Open Source computing remains extremely low. Of those questioned, 98% were male, and just 2% were female, taking an LPI exam. This figure is significantly less than an already low figure of around 15% to 17% of women in IT careers in general. It raises the question, what does the industry need to do to make an Open Source career attractive to women?
  • Quality in open source: testing CRIU
    Checkpoint/Restore In Userspace, or CRIU, is a software tool for Linux that allows freezing a running application (or part of it) and checkpointing it to disk as a collection of files. The files can then be used to restore and run the application from the point where it was frozen. The distinctive feature of the CRIU project is that it is mainly implemented in user space. Back in 2012, when Andrew Morton accepted the first checkpoint/restore (C/R) patches to the Linux kernel, the idea to implement saving and restoring of running processes in user space seemed kind of crazy. Yet, four years later, not only is CRIU working, it has also attracted more and more attention. Before CRIU, there had been other attempts to implement checkpoint/restore in Linux (DMTCP, BLCR, OpenVZ, CKPT, and others), but none were merged into the mainline. Meanwhile CRIU survived, which attests to its viability. Some time ago, I implemented support for the Test Anything Protocol format into the CRIU test runner; creating that patch allowed me to better understand the nature of the CRIU testing process. Now I want to share this knowledge with LWN readers. [...] The CRIU tests are quite easy to use and available for everyone. Moreover, the CRIU team has a continuous-integration system that consists of Patchwork and Jenkins, which run the required test configurations per-patch and per-commit. Patchwork also allows the team to track the status of patch sets to make the maintainer's work easier. The developers from the team always keep an eye on regressions. If a commit breaks a tree, the patches in question will not be accepted.
  • Open-source Wire messenger gets encrypted screen-sharing
    Chat app Wire has been rapidly adding feature as of late as it looks to gain some traction against the myriad of competitors out there. The latest trick in its arsenal is screen sharing. Now you can click on the new screen-sharing button to, well, share your screen during a call (if you’re on a desktop, that is). It works during group chats too and, as with all Wire communications, is encrypted end-to-end. Wire believes it’s the first messaging app to include end-to-end encryption.
  • SPI board election results are available
    Software in the Public Interest (SPI) has completed its 2016 board elections. There were two open seats on the board in addition to four board members whose terms were expiring. The six newly elected members of the board are Luca Filipozzi, Joerg Jaspert, Jimmy Kaplowitz, Andrew Tridgell, Valerie Young, and Martin Zobel-Helas. The full results, including voter statistics, are also available.
  • SFK 2016 - Call for Speakers
    Software Freedom Kosova is an annual international conference in Kosovo organized to promote free/libre open source software, free culture and open knowledge, now in its 7th edition. It is organized by FLOSSK, a non governmental, not for profit organization, dedicated to promote software freedom and related philosophies.
  • Microsoft's Next Open Source Target Could Be PowerShell: Report
  • Open-source drug discovery project advances drug development
  • The First-Ever Test of Open-Source Drug-Discovery
  • Open-Source Drug Discovery a Success
  • CNS - Open-Source Project Spurs New Drug Discoveries
    Medicines for Malaria Venture, a nonprofit group based in Geneva, Switzerland, distributed 400 diverse compounds with antimalarial activity — called the Malaria Box — to 200 labs in 30 nations in late 2011. The findings from subsequent studies and analyses were published Thursday in the journal PLOS Pathogens. Distributing the Malaria Box to various labs enabled scientists to analyze the compounds and develop findings that have led to more than 30 new drug-development projects for a variety of diseases. As a stipulation to receiving the samples, the various research groups had to deposit the information from their studies in the public domain.
  • Wire and Launchkit go open source, a water flow monitoring system, and more news
  • Apache, astsu, Biscuit, Python, Puppet 4, systemd & more!
  • The Onion Omega2: The Latest Router Dev Board
  • Build a $700 open source bionic prosthesis with new tutorial by Nicolas Huchet of Bionico
    The 3D printing community has already successfully taken over the market for cosmetic prostheses, as fantastic initiatives like E-NABLE have proven. But the world of bionics is a different place and just a handful of makers have gone there with any form of success, such as the very inspiring Open Bionics. But even 3D printed bionic prostheses are definitely within our reach, as French open source fanatic Nicolas Huchet of Bionico has proven. Though by no means a making expert himself, he 3D printed his own open source bionic hand during a three month residency at FabLab Berlin and has now shared all the files – including an extensive tutorial – online. This means you can now 3D print your very own bionic prosthesis at home for just $700.
  • BCN3D Technologies develops open source 3D printed 'Moveo' robotic arm for schools
    Designed from scratch and developed by BCN3D engineers in collaboration with the Generalitat de Catalunya’s Departament d’Ensenyament (Department of Education), the BCN3D Moveo is an Arduino Mega 2560-powered, 3D printed robotic arm which could enable schools and colleges in Spain and elsewhere to teach students the basics of robotics, mechanical design, and industrial programming. When the Departament d’Ensenyament approached BCN3D one year ago regarding the possibility of an educative robotics project, the tech organization jumped at the chance to get on board.

Security Leftovers

10 hot Android smartphones that got price cuts recently

With numerous smartphone getting launched each month, brands always adjust prices to give slightly competitive edge to older smartphone models and also to clear inventories. Here are 10 smartphones that got price cuts recently. Read more