Technology impacts the pleasure systems of the brain in ways similar to substances. It provides the brain with some of the same dopamine rewards that alcohol, drugs, and other high-risk behaviors might. It can be a boredom buster, a social lubricant, and an escape from reality. Video and computer games, smart phones and tablets, social media and the Internet provide a variety of access points that can promote dependence on technology and negative consequences.
Through self-administering doses of dopamine with the click of a mouse! No civil discourse, no cooperation; misinformation, mistruth. This is a global problem. Smartphone addiction is correlated with neurochemical imbalances in the brain, according to a new study. Study: The Neurochemistry of Smartphone Addiction. Interestingly, another study from July by researchers at Ben-Gurion University in Israel found that heavy smartphone users display changes in social cognition, impaired attention, and reduced right prefrontal cortex excitability.
Researchers found that smartphone-addicted teenagers had significantly higher scores in depression , anxiety, insomnia severity, and impulsivity. The Web can be addictive as a multifunctional tool that brings us exceptionally close to an enormous amount of information at unprecedented speeds. User-friendly by design, we now have access to the Internet on our computers, through apps on our tablets, phones and watches.
Related to FOMO, some Facebook users, for instance, report that they use the Internet-based social media platform as a chosen method to alleviate their anxiety or depression. Have you ever noticed a compulsion to repeatedly check your mobile email even if there is nothing urgent pending yes, it happens to us too! One hallmark of human psychology is that we want to feel competent, autonomous, and related to other people. Challenging video games allow players to feel that they are good at something.
Games offer a great variety of choice to players, promoting a sense of autonomy for teens who might feel otherwise out of control. The same goals that drive people to pursue success in the real world are often present in video games. As one amasses virtual wealth or prestige by spending time on games and advancing through levels, virtual wealth can translate into some version of actual recognition—through monetary purchasing power within an online game or a positive reputation within an online community.
Gamers find themselves linked to others who share their hobby through YouTube channels or blogs dedicated to discussion of their game of choice with other enthusiasts. While there is room for social connection in the gaming universe, this space also provides a potential escape from reality into a digital world where players get to assume new identities more appealing or more novel than those they hold in the real life.
A problem arises when the virtual world becomes more exciting than the real world… a slippery-slope indeed. Researchers have found evidence that people who overuse technology may develop similar brain chemistry and neural patterning to those who are addicted to substances. Hackers sometimes use software hacking tools and often target, for example, particular sites on the internet.
Copying and illegal transfer of data is very quick and easy using online computers and large storage devices such as hard disks , memory sticks and DVDs. Personal data, company research and written work, such as novels and textbooks, cannot be copied without the copyright holder's permission.
This includes copying music and movies with computer equipment and distributing it on the internet without the copyright holder's permission. This is a widespread misuse of both computers and the internet that breaks copyright regulations. Oh, just 10 minutes yesterday and another half hour today. Well, it all adds up! While some of the aforementioned uses of time e. Technology has robbed the workplace of it productivity!
These become the real crimes against the employer! To counter some of this lost revenue and productivity, there has been an increased need and demand for surveillance techniques to monitor employees. Employers have resorted to many means, even to the point of creating separate computer security departments or divisions to deal with both the internal and external threats.
In light of the statistics available or opinions espoused, there is no wonder such measures have had to be taken. He or she maybe seated right outside the boss's door or at the next desk. Workplace crimes can come in many forms and with many different faces, but the obvious from this brief overview is the technological advances in the workplace have put the employer at risk of being robbed of time, energy and resources — all in the name of productivity! From Wikibooks, open books for an open world.
Misuse of technology [ edit edit source ] The big problem about technology misuses can be summarized in two words: culture and education. Category : Book:The Computer Revolution. Namespaces Book Discussion. Views Read Edit Edit source View history. Reading room forum Community portal Bulletin Board Help out!
Policies and guidelines Contact us. Add links. What laws can protect me? Can I get a restraining order based on cyberstalking or online harassment?
Where can I get additional information? Recording How can an abuser misuse recording technology? Is recording a conversation with another person illegal?
Is taking a video or photograph of another person illegal? Can recordings be used in court? What laws address recorded conversations or videos? Spoofing What is spoofing? Is spoofing illegal? What are some ways an abuser could use spoofing technology?
How can I prove spoofing in court? What resources exist if I am a victim of spoofing? Is electronic surveillance illegal? What is spyware? Is impersonation illegal? What are some ways that an abuser might use technology for impersonation?
0コメント