Browse Definitions :
Definition

smartphone addiction (cell phone addiction)

Smartphone addiction is a disorder involving compulsive overuse of the mobile devices, usually quantified as the number of times users access their devices and/or the total amount of time they are online over a specified period.

Compulsive smartphone use is just one type of technology addiction. However, other technologies prone to overuse, like social media and gaming, are often accessed through mobile devices. Smartphones lend themselves to overuse because, unlike a desktop or laptop, they can be easily carried anywhere the user goes. As a result, the devices are increasingly the user's primary computing device. Data plans and near-ubiquitous Wi-Fi make connectivity possible from almost anywhere.

Although phone addiction is not yet classified as a psychological disorder, experts have identified problematic patterns and behaviors. One of the most telling characteristics is the fear of losing access to one's phone or not having connectivity. That anxiety is so widespread that it's been named: nomophobia, a portmanteau that stands for no mobile phone phobia. Telltale signs of phone addiction include never or rarely turning the device off and sleeping with the device nearby, and with sound-based notifications turned on.

In a study conducted by the International Center for Media and the Public Agenda (ICMPA) at the University of Maryland, researchers took away user access to social media for 24 hours. Participants described their reactions in terms that are very typical of addiction: In withdrawal, frantically craving, very anxious, extremely antsy, miserable, jittery, crazy.

 

This was last updated in May 2018

Continue Reading About smartphone addiction (cell phone addiction)

SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

Close