Browse Definitions :
Definition

smartphone addiction (cell phone addiction)

Smartphone addiction is a disorder involving compulsive overuse of the mobile devices, usually quantified as the number of times users access their devices and/or the total amount of time they are online over a specified period.

Compulsive smartphone use is just one type of technology addiction. However, other technologies prone to overuse, like social media and gaming, are often accessed through mobile devices. Smartphones lend themselves to overuse because, unlike a desktop or laptop, they can be easily carried anywhere the user goes. As a result, the devices are increasingly the user's primary computing device. Data plans and near-ubiquitous Wi-Fi make connectivity possible from almost anywhere.

Although phone addiction is not yet classified as a psychological disorder, experts have identified problematic patterns and behaviors. One of the most telling characteristics is the fear of losing access to one's phone or not having connectivity. That anxiety is so widespread that it's been named: nomophobia, a portmanteau that stands for no mobile phone phobia. Telltale signs of phone addiction include never or rarely turning the device off and sleeping with the device nearby, and with sound-based notifications turned on.

In a study conducted by the International Center for Media and the Public Agenda (ICMPA) at the University of Maryland, researchers took away user access to social media for 24 hours. Participants described their reactions in terms that are very typical of addiction: In withdrawal, frantically craving, very anxious, extremely antsy, miserable, jittery, crazy.

 

This was last updated in May 2018

Continue Reading About smartphone addiction (cell phone addiction)

SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • data compliance

    Data compliance is a process that identifies the applicable governance for data protection, security, storage and other ...

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close