Cellphone vibration syndrome and other signs of tech addiction
How do you counterattack that? There are two things you can do. You don't have to carry your device 24-by-7. What I suggest is you develop your own tech break. About every couple of hours find one way to get away from all of it, phones, computers, everything - for 10 to 15 minutes. You do what neuroscientist call 'resetting your brain.' There are tons of activities that we know reset your brain. Taking a walk in nature, looking at clouds, looking at a picture book (not on your computer), exercising for a few minutes, laughing, talking to somebody, speaking a foreign language, playing a musical instrument. Our brain is at a constant, high-activation level and we need time to let it mellow, rest and reset, so then we can better process the information.
A lot of people use LinkedIn and Facebook for professional as well as social reasons, but you argue that the reliance or heavy use of these platforms can lead to problems. Why is that? First, let me say that I'm a fan of social media. I find it an amazingly powerful tool. Having said that, I think that the way social media is right now, it is promoting obsessive behaviors, it is promoting the constant need to check in. I am the worst at this. I am constantly checking in to see if there are comments on my site, because I want to jump on them. I am constantly checking in on Facebook, and one of the things that I have had to do is moderate this kind of behavior. Social media is intensely compelling.
Are there societal dangers? The major societal issue is not about the social media. The social media research tends to be coming out as flipping to the positive side. We are getting more (from social media) than we might be losing. My concern is smartphones, which I refer to as WMDs (wireless mobile devices) but I think they are also potential weapons of mass destruction. Where I see the problem is in two situations. One is in the family, the other in gatherings of friends, where you are spending too much time checking your phone and responding to things on your phone. I don't care if you claim you are multitasking. You cannot be attending to a text message and getting what your friend across the table in the restaurant is telling you completely. You might get the words, but you're not getting the context, the emotions and the feelings. You're not really paying attention. The same thing happens in the family. I see these devices as being very divisive to the family unless we set very clear guidelines about when they are acceptable and when they are not. As soon your kid gets an iPhone you may as well be talking to him about the right time use it and the wrong time.
Patrick Thibodeau covers cloud computing and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov or subscribe to Patrick's RSS feed . His e-mail address is email@example.com.
Read more about Smartphones in Computerworld's Smartphones Topic Center.
- Tips for Driving User Adoption in New Technology Deployment Read this checklist on tips for driving user adoption to see where you stand.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Smartphones White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!