Language Selection

English French German Italian Portuguese Spanish

Computer Addiction or Healthy Enthusiam?

Filed under
-s

Are you a computer addict? ... or is someone you love a computer addict?

If so, you are not alone.

I have this friend who I believe has become addicted to her computer. It started out innocently enough with the purchase of a computer to do her bookkeeping, keep in touch with long distant friends and relatives, or a little light reading. Over the next year or so she began to spend more and more time on it and less and less with her friends. She became withdrawn from society and stopped participating in activities she used to enjoy. Call her anytime day or night and in asking "wha'cha doing?" she states "playing on the computer". I jokingly told her "I think you are addicted to that thing".

As time went on, I began to suspect this wasn't a joking matter and perhaps she could have a real condition with serious repercussions. Termed "Internet Addiction Disorder" by some, or "Computer Addiction" by others, this affliction knows no age or sex boundaries. It isn't confined to any social class, race, or country. It doesn't discriminate.

It doesn't discrimate, but different demographics tend to be addicted to certain elements under the massive umbrella we'll term "computers". Youngsters tend to become so entrenched in their video games that they withdraw from friends, lose sleep, and cease all semblance of learning in school. Teenage females lean towards chat rooms and instant messaging. Housewives and women in general might become addicted to ebay or other on-line purchasing and sometimes incur massive debt, neglect the family unit, and her household chores. Many men, age not being a factor, become addicted to porn and the ilk, computer hacking/cracking, irc or discussion forums or even online gambling. Many neglect work, friends and family. All age groups spend countless hours "surfing". In actuality these examples cross demographic lines and are meant only as a loose generalization. "As a trained cognitive behavior therapist, I often treat gamblers, alcoholics and people with obsessive-compulsive disorder, and have also studied mood changes resulting from the recreational use of psychotropic medication. I concluded that this inappropriate and excessive use of the computer might be a distinct disorder" (Orzack et al., 1988).

Symptoms can include feelings of euphoria or contentment when on the computer and depression or loss when not, craving more and more time on the computer and lying to everyone about their computer usage. Ailments can appear physically as well in the form of carpal tunnel syndrome, back and neck soreness, migrains, eating and sleeping disorders, and even neglecting personal hygiene.

Computers have become a constant in our society and in fact they are present in about every aspect of our lives. They are a convenience, a help, even a necessity. Like food or possibly alcohol, one may need or want to partake in order to sustain or enjoy life, but when it becomes an incontrollable excess it can be defined as an addiction. Webster's Revised Unabridged Dictionary (1913) defines addicted as "To apply habitually; to devote; to habituate". Addiction becomes a problem as it interferes with normal life processes. "But as in all addictions, the problem is where to draw the line between "normal" enthusiasm and "abnormal" preoccupation (Suler, 1999).

"We have no idea what levels or kinds of computer usage are "normal." Therefore, we cannot state which behavior is always pathological" (Orzack, 1998). To establish a baseline of normalcy I asked a random sample of 47 people encountered over a three day period throughout the course of my daily life, "how much time do you spend on the computer outside of work within each 24-hour period?". Among this group were friends, co-workers, strangers, and relatives. To minimize bias I asked anyone I encountered regardless of any demographic indicators. Simply put, I asked everyone I ran into, that I hadn't already asked, over the course of three days. Answers ranged from 0 to 12 hours. The average and the number I'm using as a baseline is roughly 2.3 hours per day.

I asked those whose time on the computer each day was greater than 4 hours if they would fill out a survey to help me on a research project and 14 complied. Granted this is a small sample and as such my findings are not exactly scientifically valid. For the scope of this article the results are interesting. Each of the 14 respondants fell into the computer addicted range. That would indicate almost 30% of the given sample was what I considered addicted. Gaming consoles and handhelds were also included as computers.

John M. Grohol, Psy.D. states, "Since the aspects of the Internet where people are spending the greatest amount of time online have to do with social interactions, it would appear that socialization is what makes the Internet so "addicting." That's right -- plain old hanging out with other people and talking with them. Whether it's via e-mail, a discussion forum, chat, or a game online (such as a MUD), people are spending this time exchanging information, support, and chit-chat with other people like themselves" (Grohol, 2004).

Unfortunately it's difficult to locate any real work in this area as most still think of it as a joke. It hasn't become a stigma in our society yet and as such it's being treated nonchalantly or with humor. In phoning local psychologists and mental treatment centers I found only one out of twelve that would even grant a consultation. Among the responses I received, two initially laughed, four referred to me to another doctor, two just said I don't treat that (paraphrasing), two that said they'd get back to me (another paraphrase) and one referred me to Alcoholics Anonymous.

Very few professionals are beginning to consider computer addiction a real affliction such as eating disorders, alcoholism, or conpulsive gambling. Dr. Orzack has founded Computer Addiction Services at McLean Hospital in Belmont, Massachusetts. But this is rare. One of the few serious papers found on the subject described the disorder as "theorized". Even more rare were suggestions for treatment.

For this newly emerging disorder, one might adapt some other basic techniques used in other addiction treatments. Other than using alcoholism as an example and just pulling the plug "cold turkey", some basic suggestions might include:

  • Setting time limits and sticking to them

  • Perhaps scheduling set blocks of time - like appointments
  • No more skipping meals or eating at the computer
  • Don't refuse invitations from family and friends (get out of the house!)
  • Dust off that bowflex or dig out the old football (then use them)
  • Downgrade your connection speed
  • If feasible get a new pet or new hobby
  • Move the computer to a busy, less private part of the house
  • Reinstall Windows! (just kidding).

Unfortunately at this time there is very little work in this area and as such there are few real scientifically valid studies or treatment programs. Whether you believe there is really such a thing or not, perhaps the following survey can be food for thought.




References

Computer Addiction Services [online: http://www.computeraddiction.com/]

International Journal of Applied Psychoanalytic Studies, Computer and cyberspace addiction, John Suler, Ph.D. (March 1999, Vol. Sleepy

Internet Addiction guide [online: http://psychcentral.com/netaddiction/]

Psychiatric Times, Computer Addiction: What Is It?, Maressa Hecht Orzack, Ph.D. (August 1998, Vol. XV, Issue 8)



I'm not a doctor and don't pretend this study is scientifically valid. The sample was small and the questionable methodology of the research and results weren't well documented. It only reflects my personal research and thoughts on the subject.

re: Im not an addict

lolol /Me/ tooo!

----
You talk the talk, but do you waddle the waddle?

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Videos/Shows: Ubuntu Cinnamon Remix 21.04, Coder Radio, and KDE Breeze Redesign and Blue Ocean

NetBSD: aiomixer, X/Open Curses and ncurses, and other news

aiomixer is an application that I've been maintaining outside of NetBSD for a few years. It was available as a package, and was a "graphical" (curses, terminal-based) mixer for NetBSD's audio API, inspired by programs like alsamixer. For some time I've thought that it should be integrated into the NetBSD base system - it's small and simple, very useful, and many developers and users had it installed (some told me that they would install it on all of their machines that needed audio output). For my particular use case, as well as my NetBSD laptop, I have some small NetBSD machines around the house plugged into speakers that I play music from. Sometimes I like to SSH into them to adjust the playback volume, and it's often easier to do visually than with mixerctl(1). However, there was one problem: when I first wrote aiomixer 2 years ago, I was intimidated by the curses API, so opted to use the Curses Development Kit instead. This turned out to be a mistake, as not only was CDK inflexible for an application like aiomixer, it introduced a hard dependency on ncurses. Read more

Core Scheduling Looks Like It Will Be Ready For Linux 5.14 To Avoid Disabling SMT/HT

It looks like the years-long effort around CPU core scheduling that's been worked on by multiple vendors in light of CPU security vulnerabilities threatening SMT/HT security will see mainline later this summer with Linux 5.14. Linux core scheduling has been worked on by pretty much all of the hyperscalers and public cloud providers to improve security without disabling Hyper Threading. Core scheduling is ultimately about what resources can share a CPU core and ensuring potentially unsafe tasks don't run on a sibling thread of a trusted task. Read more

IBM/Red Hat/Fedora Leftovers

  • Automating RHEL for Edge image rollback with GreenBoot

    With the release of Red Hat Enterprise Linux (RHEL) 8.3, Red Hat announced an rpm-ostree version of RHEL targeted for Edge use cases called RHEL for Edge. One of the unique features of rpm-ostree is that when you update the operating system, a new deployment is created, and the previous deployment is also retained. This means that if there are issues on the updated version of the operating system, you can roll back to the previous deployment with a single rpm-ostree command, or by selecting the previous deployment in the GRUB boot loader. While this ability to manually roll back is very useful, it still requires manual intervention. Edge computing use case scenarios might be up in the tens or hundreds of thousands of nodes, and with this number of systems, automation is critical. In addition, in Edge deployments, these systems might be across the country or across the world, and it might not be practical to access a console on them in the event of issues with an updated image. This is why RHEL for Edge includes GreenBoot, which can automate RHEL for Edge operating system rollbacks. This post will cover an overview of how to get started with GreenBoot and will walk through an example of using GreenBoot.

  • Using Ansible to configure Podman containers

    In complex IT infrastructure, there are many repetitive tasks. Running those tasks successfully is not easy. Human error always presents a chance of failure. With help of Ansible, you perform all of the tasks through a remote host and, as the tasks are executed with playbooks, and those playbooks can be reused as many times as you need. In this article you will learn how to install and configure Ansible on Fedora Linux and describe how to use it to manage and configure Podman containers. Ansible Ansible is an open source infrastructure automation tool sponsored by Red Hat. It can deal with all the problems that come with large infrastructure, like installing & updating packages, taking backups, ensuring specific services are always running, and much more. You do this with a playbook which is written in YAML. Ansible playbooks can be used again and again, making the system administrator’s job less complex. Playbooks also eliminate repetitive tasks and can be easily modified. But we have many automation tools like Ansible, why use it? Unlike some other configuration management tools, Ansible is agentless: you don’t have to install anything on managed nodes. For more information about Ansible, see the Ansible tag in Fedora Magazine.

  • Getting better at counting rpm-ostree based systems

    Since the release of Fedora 32, a new mechanism has been in place to better count the number of Fedora users while respecting their privacy. This system is explicitly designed to make sure that no personally identifiable information is sent from counted systems. It also insures that the Fedora infrastructure does not collect any personal data. The nickname for this new counting mechanism is “Count Me”, from the option name. Details are available in DNF Better Counting change request for Fedora 32. In short, the Count Me mechanism works by telling Fedora servers how old your system is (with a very large approximation). This occurs randomly during a metadata refresh request performed by DNF.

  • Cockpit 244

    Cockpit is the modern Linux admin interface. We release regularly. Here are the release notes from Cockpit version 244 and Cockpit Machines 244.

  • A brief introduction to Ansible Vault

    Ansible Vault is an Ansible feature that helps you encrypt confidential information without compromising security.