Language Selection

English French German Italian Portuguese Spanish

Computer Addiction or Healthy Enthusiam?

Filed under
-s

Are you a computer addict? ... or is someone you love a computer addict?

If so, you are not alone.

I have this friend who I believe has become addicted to her computer. It started out innocently enough with the purchase of a computer to do her bookkeeping, keep in touch with long distant friends and relatives, or a little light reading. Over the next year or so she began to spend more and more time on it and less and less with her friends. She became withdrawn from society and stopped participating in activities she used to enjoy. Call her anytime day or night and in asking "wha'cha doing?" she states "playing on the computer". I jokingly told her "I think you are addicted to that thing".

As time went on, I began to suspect this wasn't a joking matter and perhaps she could have a real condition with serious repercussions. Termed "Internet Addiction Disorder" by some, or "Computer Addiction" by others, this affliction knows no age or sex boundaries. It isn't confined to any social class, race, or country. It doesn't discriminate.

It doesn't discrimate, but different demographics tend to be addicted to certain elements under the massive umbrella we'll term "computers". Youngsters tend to become so entrenched in their video games that they withdraw from friends, lose sleep, and cease all semblance of learning in school. Teenage females lean towards chat rooms and instant messaging. Housewives and women in general might become addicted to ebay or other on-line purchasing and sometimes incur massive debt, neglect the family unit, and her household chores. Many men, age not being a factor, become addicted to porn and the ilk, computer hacking/cracking, irc or discussion forums or even online gambling. Many neglect work, friends and family. All age groups spend countless hours "surfing". In actuality these examples cross demographic lines and are meant only as a loose generalization. "As a trained cognitive behavior therapist, I often treat gamblers, alcoholics and people with obsessive-compulsive disorder, and have also studied mood changes resulting from the recreational use of psychotropic medication. I concluded that this inappropriate and excessive use of the computer might be a distinct disorder" (Orzack et al., 1988).

Symptoms can include feelings of euphoria or contentment when on the computer and depression or loss when not, craving more and more time on the computer and lying to everyone about their computer usage. Ailments can appear physically as well in the form of carpal tunnel syndrome, back and neck soreness, migrains, eating and sleeping disorders, and even neglecting personal hygiene.

Computers have become a constant in our society and in fact they are present in about every aspect of our lives. They are a convenience, a help, even a necessity. Like food or possibly alcohol, one may need or want to partake in order to sustain or enjoy life, but when it becomes an incontrollable excess it can be defined as an addiction. Webster's Revised Unabridged Dictionary (1913) defines addicted as "To apply habitually; to devote; to habituate". Addiction becomes a problem as it interferes with normal life processes. "But as in all addictions, the problem is where to draw the line between "normal" enthusiasm and "abnormal" preoccupation (Suler, 1999).

"We have no idea what levels or kinds of computer usage are "normal." Therefore, we cannot state which behavior is always pathological" (Orzack, 1998). To establish a baseline of normalcy I asked a random sample of 47 people encountered over a three day period throughout the course of my daily life, "how much time do you spend on the computer outside of work within each 24-hour period?". Among this group were friends, co-workers, strangers, and relatives. To minimize bias I asked anyone I encountered regardless of any demographic indicators. Simply put, I asked everyone I ran into, that I hadn't already asked, over the course of three days. Answers ranged from 0 to 12 hours. The average and the number I'm using as a baseline is roughly 2.3 hours per day.

I asked those whose time on the computer each day was greater than 4 hours if they would fill out a survey to help me on a research project and 14 complied. Granted this is a small sample and as such my findings are not exactly scientifically valid. For the scope of this article the results are interesting. Each of the 14 respondants fell into the computer addicted range. That would indicate almost 30% of the given sample was what I considered addicted. Gaming consoles and handhelds were also included as computers.

John M. Grohol, Psy.D. states, "Since the aspects of the Internet where people are spending the greatest amount of time online have to do with social interactions, it would appear that socialization is what makes the Internet so "addicting." That's right -- plain old hanging out with other people and talking with them. Whether it's via e-mail, a discussion forum, chat, or a game online (such as a MUD), people are spending this time exchanging information, support, and chit-chat with other people like themselves" (Grohol, 2004).

Unfortunately it's difficult to locate any real work in this area as most still think of it as a joke. It hasn't become a stigma in our society yet and as such it's being treated nonchalantly or with humor. In phoning local psychologists and mental treatment centers I found only one out of twelve that would even grant a consultation. Among the responses I received, two initially laughed, four referred to me to another doctor, two just said I don't treat that (paraphrasing), two that said they'd get back to me (another paraphrase) and one referred me to Alcoholics Anonymous.

Very few professionals are beginning to consider computer addiction a real affliction such as eating disorders, alcoholism, or conpulsive gambling. Dr. Orzack has founded Computer Addiction Services at McLean Hospital in Belmont, Massachusetts. But this is rare. One of the few serious papers found on the subject described the disorder as "theorized". Even more rare were suggestions for treatment.

For this newly emerging disorder, one might adapt some other basic techniques used in other addiction treatments. Other than using alcoholism as an example and just pulling the plug "cold turkey", some basic suggestions might include:

  • Setting time limits and sticking to them

  • Perhaps scheduling set blocks of time - like appointments
  • No more skipping meals or eating at the computer
  • Don't refuse invitations from family and friends (get out of the house!)
  • Dust off that bowflex or dig out the old football (then use them)
  • Downgrade your connection speed
  • If feasible get a new pet or new hobby
  • Move the computer to a busy, less private part of the house
  • Reinstall Windows! (just kidding).

Unfortunately at this time there is very little work in this area and as such there are few real scientifically valid studies or treatment programs. Whether you believe there is really such a thing or not, perhaps the following survey can be food for thought.




References

Computer Addiction Services [online: http://www.computeraddiction.com/]

International Journal of Applied Psychoanalytic Studies, Computer and cyberspace addiction, John Suler, Ph.D. (March 1999, Vol. Sleepy

Internet Addiction guide [online: http://psychcentral.com/netaddiction/]

Psychiatric Times, Computer Addiction: What Is It?, Maressa Hecht Orzack, Ph.D. (August 1998, Vol. XV, Issue 8)



I'm not a doctor and don't pretend this study is scientifically valid. The sample was small and the questionable methodology of the research and results weren't well documented. It only reflects my personal research and thoughts on the subject.

re: Im not an addict

lolol /Me/ tooo!

----
You talk the talk, but do you waddle the waddle?

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Red Hat and Fedora

  • Red Hat, Logicalis in digital transformation partnership in Latin America
    PromonLogicalis, a provider of information technology and communication solutions and services in Latin America, and Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, announced a collaboration that aim to help organizations navigate the digital transformation of their infrastructures to pave the way for cloud and the software-defined technologies, and to advance open source technology awareness in the region. Open source is delivering significant advancements in many areas of technology through community-powered innovation, including cloud computing, mobile, big data, and more. And, as companies embrace modern technology as a competitive advantage via digital transformation efforts, many are turning to open source because of the flexibility and agility it can enable.
  • Red Hat Inc. (RHT) Downgraded by Zacks Investment Research to “Hold”
  • An Easy Way To Try Intel & RADV Vulkan Drivers On Fedora 24
    Fedora 25 should have good support for the open-source Vulkan Linux drivers (particularly if it lands the next Mesa release) while Fedora 24 users can now more easily play with the latest Mesa Git RADV and Intel ANV Vulkan drivers via a new repository. A Phoronix reader has setup a Fedora Copr repository that is building Intel's Vulkan driver from Mesa Git plus the RADV Radeon Vulkan driver re-based from its source (David Airlie's semi-interesting GitHub branch). Fedora COPR, for the uninformed, is the distribution's equivalent to Ubuntu PPA repositories.
  • Meeting users, lots of users
    Every year, I introduce Fedora to new students at Brno Technical University. There are approx. 500 of them and a sizable amount of them then installs Fedora. We also organize a sort of installfest one week after the presentation where anyone who has had any difficulties with Fedora can come and ask for help. It’s a great opportunity to observe what things new users struggle with the most. Especially when you have such a high number of new users. What are my observations this year?

Linux Devices

  • 96Boards SBCs host Intel Joule and Curie IoT modules
    Gumstix announced two SBCs this week, based on Intel Joule and Curie IoT modules and built to 96Boards CE and IE form-factor specifications, respectively. At Linaro Connect Las Vegas 2016, where earlier this week Linaro’s 96Boards.org announced a new 96Boards IoT Edition (IE) spec, Gumstix announced support for 96Boards.org’s open SBC standards with two new single-board computers. Both SBCs will be available for purchase in October.
  • ORWL — First Open Source And Physically Secure PC, Runs Linux And Windows
    ORWL is the first open source, physically secure computer. Using a secure microcontroller (MCU) and an ‘active clamshell mesh’, the device makes sure that nobody breaks the security of the system. Its maker, Design Shift, has also launched a crowdfunding campaign on Crowd Supply.
  • Purism Is Still Hoping To Build A GNU/Linux Free Software Librem Smartphone
    Purism, the startup behind the Librem laptops with a focus on free software and user privacy/freedom, still has their minds set on coming up with a GNU/Linux smartphone. Purism continues selling their high-priced laptops and their Librem 11 is forthcoming as an Intel-based tablet/convertible device with stocking station. Next on their horizon they want to produce "the ideal no-carrier, Free Software phone running a bona fide GNU+Linux stack."

Leftovers: OSS

  • Asterisk 14 Improves Open-Source VoIP
    Digium, the lead commercial sponsor behind the Asterisk open source PBX project announced the release Asterisk 14 this week, continuing to evolve the decade old effort, making it easier to use and deploy.
  • Yahoo open-sources a deep learning model for classifying pornographic images
    Yahoo today announced its latest open-source release: a model that can figure out if images are specifically pornographic in nature. The system uses a type of artificial intelligence called deep learning, which involves training artificial neural networks on lots of data (like dirty images) and getting them to make inferences about new data. The model that’s now available on GitHub under a BSD 2-Clause license comes pre-trained, so users only have to fine-tune it if they so choose. The model works with the widely used Caffe open source deep learning framework. The team trained the model using its now open source CaffeOnSpark system. The new model could be interesting to look at for developers maintaining applications like Instagram and Pinterest that are keen to minimize smut. Search engine operators like Google and Microsoft might also want to check out what’s under the hood here. “To the best of our knowledge, there is no open source model or algorithm for identifying NSFW images,” Yahoo research engineer Jay Mahadeokar and senior director of product management Gerry Pesavento wrote in a blog post.
  • Cloudera, Hortonworks, and Uber to Keynote at Apache Big Data and ApacheCon Europe
  • Vendors Pile on Big Data News at Strata
    Cloudera, Pentaho and Alation are among vendors making Big Data announcements at this week's Strata event. Vendors big and small are making news at this week's Strata + Hadoop event as they try to expand their portion of the Big Data market. Cloudera highlighted a trio of Apache Software Foundation (ASF) projects to which it contributes. Among them is Spark 2.0, which benefits from a new Dataset API that offers the promise of better usability and performance as well as new machine learning libraries.
  • New alliances focus on open-source, data science empowerment
    How can data science make a true market impact? Partnerships, particularly amongst open source communities. As IBM solidifies its enterprise strategies around data demands, two new partnerships emerge: one with Continuum Analytics, Inc., advancing open-source analytics for the enterprise; and another with Galvanize, initiating a Data Science for Executives program. Continuum Analytics, the creator and driving force behind Anaconda — a leading open data science platform powered by Python — has allied with IBM to advance open-source analytics for the enterprise. Data scientists and data engineers in open-source communities can now embrace Python and R to develop analytic and machine learning models in the Spark environment through its integration with IBM’s DataWorks Project. The new agreement between IBM and Galvanize, which provides a dynamic learning community for technology, will offer an assessment, analysis and training element for Galvanize’s Data Science for Executives program. This program empowers corporations to better understand, use and maximize the value of their data. The program will support IBM’s DataFirst Method, a methodology that IBM says provides the strategy, expertise and game plan to help ensure enterprise customers’ succeed on their journey to become a data-driven business.
  • Apache Spot: open source big data analytics for cyber
  • Chinese open source blockchain startup Antshares raises $4.5M through crowdsourcing [Ed: Microsoft-connected]
  • August and September 2016: photos from Pittsburgh and Fresno
  • Libre Learn Lab: a summit on freely licensed resources for education
    Libre Learn Lab is a two-day summit for people who create, use and implement freely licensed resources for K-12 education, bringing together educators, policy experts, software developers, hardware hackers, and activists to share best practices and address the challenges of widespread adoption of these resources in education. The 2nd biennial conference is Saturday, October 8th, and Sunday, October 9th, at the MIT Tang Center. The keynote addresses will be delivered by the FSF’s own Richard M. Stallman, former Chief Open Education Advisor Andrew Marcinek and founder of HacKIDemia Stefania Druga. At the event, there will be a special tribute to Dr. Seymour Papert (the father of educational computing) by Dr. Cynthia Solomon.

Security Leftovers

  • Friday's security advisories
  • ICANN grinds forward on crucial DNS root zone signing key update
    The Internet Corporation for Assigned Names and Numbers is moving -- carefully -- to upgrade the DNS root zone key by which all domains can be authenticated under the DNS Security Extensions protocol. ICANN is the organization responsible for managing the Domain Name System, and DNS Security Extensions (DNSSEC) authenticates DNS responses, preventing man-in-the-middle attacks in which the attacker hijacks legitimate domain resolution requests and replaces them with fraudulent domain addresses. DNSSEC still relies on the original DNS root zone key generated in 2010. That 1024-bit RSA key is scheduled to be replaced with a 2048-bit RSA key next October. Although experts are split over the effectiveness of DNSSEC, the update of the current root zone key signing key (KSK) is long overdue.
  • Cybersecurity isn't an IT problem, it's a business problem
    The emergence of the CISO is a relatively recent phenomenon at many companies. Their success often relies upon educating the business from the ground up. In the process, companies become a lot better about how to handle security and certainly learn how not to handle it. As a CIO, knowing the pulse of security is critical. I oversee a monthly technology steering committee that all the executives attend. The CISO reports during this meeting on the state of the security program. He also does an excellent job of putting risk metrics out there, color coded by red, yellow, and green. This kind of color grading allows us to focus attention on where we are and what we’re doing about it.