Premium Essay

Computer Adiction

In: Computers and Technology

Submitted By topz
Words 372
Pages 2
2002: My Introduction to Computer Addiction
•Two15y/omalesreferredbysheriff’sdepartment
•One attempted to strangle mother with power cord when she unplugged the computer to get him off
•One stabbed brother with kitchen knife when he would not get up from computer to let him play
•No history of mental illness or behavior problems
•Teens denied addiction and were resistant to counseling
•Both placed on involuntary psychiatric holds.
•Cycles of abstinence, behavior contracting did not help cure the addiction or motivation positive change
•Attempts to help parents reestablish parental authority failed
•Limited success with these clients led me to search for effective treatment methods. Mostly non-specific methods were identified
•Conducted research and nationwide survey of mental health professionals in 2003/2004(c)2007 Kenneth M. Woog, Psy. D. 4
Computer Addiction Research / Press
•Very little research, some sensationalized press
•Controversial since 1989 - does it really exist?
•Symptom of other disorders or distinct disorder?
•Blame? - Game Developers vs. Parents
•Addictive Personality (blames genetics)
•Behavior addictions? Most problematic uses, computer is simply the vehicle (sexual, email/chat, gambling)
•Diagnosis - protocols borrowed from gambling or SA
•Treatment - No standard of care(c)2007 Kenneth M. Woog, Psy. D. 5
My 2003 / 2004 Survey of
Mental Health Professionals
•Survey Results: 5000 MD, Psych, MFT (n=229)
•Clinicians mixed 50/50: >clients seen,> believe it is a distinct disorder
•Clinicians saw 3 clients/yr, avg, 0.66 (11-17)
•On average, 50% knew someone personally
•Gaming: #1 endorsed problematic use 11-17 y/o
•Further research
•Prevalence: 0.6 - 6% of computer users
•On-line support groups for gamers
•Gaming addiction popularized in press
•No published treatment protocols(c)2007 Kenneth M. Woog, Psy. D. 6...

Similar Documents

Premium Essay

Reaction Paper

...The topic of the video which is about the history of computer was kind of interesting since it high lightened our mind about where the computer had really came from. Not only have that, it also made us understand how the computers of today became very wonderful and powerful. Before, computers only existed in the imagination of humans and were believed that creating such monstrous device was impossible. It was a huge leap in the field of computer during the 19th century when Charles Babbage developed the 1st modern computer called the difference machine. The most advantageous feature of this machine is that it reflected Babbage’s attitude of being a perfectionist. Although his work was not finished, the detailed text that was written by Ada was significant in modifying his versions and for documentary purposes of his work. The rapid increase of the American population, on the other hand, triggered the development of a machine that will help the census tabulate such population very fast. Hermin Horrith’s occupation was very helpful to the development of this machine since he used business to gain money to revise his machine which had later evolved into the international business machine. Although war causes devastation to the environment as well as the people involved, it also had contributed to the development of computers, which is the birth of ENIAC, the first large-scale, general purpose, digital computer that is used to calculate the paths of artillery shells. It was a......

Words: 320 - Pages: 2

Free Essay

The Hstory of Computers

...History Of Computers The earliest existence of a modern day computer's ancestor was the abacus. These date back to almost 2000 years ago. It is simply a wooden rack holding parallel wires on which beads are strung. When these beads are moved along the wire according to "programming" rules that the user must memorize, all ordinary arithmetic operations can be performed. The next innovation in computers took place in 1694 when Blaise Pascal invented the first "digital calculating machine". It could only add numbers and they had to be entered by turning dials. It was designed to help Pascal's father who was a tax collector. In the early 1800's, a mathematics professor named Charles Babbage designed an automatic calculation machine. It was steam powered and could store up to 1,000 50-digit numbers. Built into his machine were operations that included everything a modern computer would need. It was programmed by, and stored data on, cards with holes punched in them, appropriately called "punch cards". But his inventions became failures because of the lack of precision machining techniques used at the time and the lack of demand for such a device. By the late 1930s punched-card machine techniques had become so well established and reliable that Howard Hathaway Aiken, in collaboration with engineers at IBM, undertook construction of a large automatic digital computer based on standard IBM electromechanical parts. Aiken's machine, called the Harvard Mark I, handled 23-digit......

Words: 592 - Pages: 3

Free Essay

Kotler Marketing Management

...valuable to ask these questions while there is still time for researchers to contribute their leadership, vision, historical perspective, and critical thinking to ethically inform and guide this process. This paper will review Negroponte’s contributions to HCI and explore linkages to historical figures of the field. In addition, this paper aims to critically review Negroponte’s influence as an advocate for universal usability and the OLPC project. Architecture Machine Group In 1967 Negroponte founded the Architecture Machine Group at MIT. Researchers in the group invented new concepts and developed new approaches to human-computer interaction. Inspired, in part, by Ivan Sutherland’s Sketchpad design interface, The Architecture Machine Group’s original focus was to create an architecture machine to help users design buildings without architects. Computer aided design programs, such as AutoCAD, that became widely utilized in the 1980s were influenced by the early work of Negroponte’s Architecture Machine Group and Charles Eastman’s work at Carnigie Melon. (2) Though the...

Words: 1036 - Pages: 5

Premium Essay

Computer Technology

...Final Project: Expository Essay Samantha A. Medina University of Phoenix Final Project: Expository Essay Computer technology has developed tremendously over the decades and centuries to become so modern in every aspect including education and personal leisure. It is breath taking to see how modernized out computer technology is today as opposed to the limited computer technology that was available in history. The changes that have occurred over history to today will be discussed and focused upon in this essay. The Mechanical Era: Early Computing Devices The Abacus The abacus was the first machine to be used computational science. It is considered to be the first computer. This machine was inspired by one of Charles Babbage’s designs. The abacus could process 15 digit numbers and calculate fourth-order differences. In 1885 the machine won gold medal at an exhibition in Paris and also helped calculate the orbit of mars! The abacus is still in use today. Imagine that a computing device from centuries ago still being used to this day! Charles Babbage Charles Babbage was an English mathematician, philosopher, inventor and mechanical engineer ("Charles Babbage", 2012). Babbage is known to have invented the first programmable computer. As stated earlier his design inspired the abacus and other complex designs. He won the Gold Medal of the Royal Astronomical Society for inventing an engine for calculating mathematical and astronomical tables. Babbage was also Lucasian......

Words: 1624 - Pages: 7

Free Essay

Technology in Restaurants

...industry because dependency on computers is the remarkable key to run the business. Computers in restaurants are the key to create the experience that experts want to introduce to guests, to support the changes of a modern society and the information technology that is constantly changing; we are the consumers of a competitive world of technology. The technology that is being used in the business has become innovative and to take a look back on how restaurants ran before technology hit the industry is remarkable. Computers The biggest change in the restaurant business since the creation and introduction of the stove controlled by gas and the electric refrigerator is the implementation of computers (Mandabach, Blanch, Van Leeuwen, & Waters, 2006) “The restaurant industry is no longer a business of cigar boxes and order pads. In most cases restaurant managers use more technology than we used to send men to the moon” (Hamilton, 2004). The transcendental innovation of technology has created a competitive system between experts in the field and the philosophy to avoid looking back in time when restaurants used to run with just a kitchen and a few tables. Comparing the experience of a visit to a modern eating establishment with the same basic hospitality atmosphere versus a more typical restaurant, the chances are that thanks to the technology, the expectations are going to be higher as whole for the current generation than for old fashioned guests. Computers have become......

Words: 1468 - Pages: 6

Premium Essay

Psm Proposal

...Kod Projek : | BITU 3973 | UNIVERSITI TEKNIKAL MALAYSIA MELAKA FACULTY OF INFORMATION AND COMMUNICATION TECHNOLOGY PROJEK SARJANA MUDA PROPOSAL FORM[Incomplete form will be rejected] | A | TITLE OF PROPOSED PROJECT:Tajuk projek yang dicadangkan :Your Proposed Project Title Here | B | DETAILS OF STUDENT / MAKLUMAT PELAJAR | B(i) | 000000-00-0000 Name of Student: Identity card no.:Your Name Here Nama Pelajar: No. Kad Pengenalan : B0300000000 Student card no.: No. Kad Pelajar : | B(iii) | Program Pengajian:Study Program:BITS BITM BITI BITC BITD | B(iv) | 000-000 0000 00-000 0000 Home Telephone No.: Handphone No.:No. Telefon Rumah: No. Telefon Bimbit: | B(v) | your_email@abc.com E-mail......

Words: 796 - Pages: 4

Free Essay

Computer Addiction

...Causes Of Computer Addiction (Cause And Effect Essay) Cause and effect Serious causes of computer addiction   Technology has developed so much that it is almost crucial to have electronic devices at home. Our life has gotten so used to having technology around us that we can’t imagine our lives without them. However, while having electronic devices at home could be comfortable and handy at times, it could also have negative effect on children, especially on teenagers. Parents usually buy computers for their children’s educational resource. But teenagers, who always seek fun activities around them, use computer to play games, chat with friends and to catch up with the latest gossip on celebrities. And before they know it, they are addicted to computer. Computer can cause teenagers to be physically, and mentally ill, and the more the child spends more time on computer, the more he/she loses time to focus on academics, and to talk to their family. Many teenagers who use the computers don’t seem realize that sitting in front of the computer is harmful at all. The electromagnetic waves from the computer-screen make our brain cells get stiffen every second.   Human eyes can also lose its focus and get dehydrated easily because the ELF, VLF, RF and MICROWAVE (types of injurious electromagnetic waves). These harmful waves can cause headache, drop in eyesight, a brain tumor and leucosis in the worst case.   Moreover, sitting in front of computer without exercising makes the......

Words: 325 - Pages: 2

Premium Essay

Fastfit Case Study V7

...require only Personal Computer, operating software and internet to make his/her order. Customer will visit the FastFit website and give their order. Physical Location | Technologies Required | | Hardware | Software | Network | Home | Personal Computer / Laptop Network Card / Modem | Operating Software such as Windows,Web Browsing Capability Security software such as (McAfee, Ad-Aware) | Access to the Internet | Office | Personal Computer / LaptopNetwork Card / Modem | Operating Software such as Windows,Web Browsing CapabilitySecurity software such as (McAfee, Ad-Aware) | Access to the Internet | Note: Customer can make order from any place throughout the world if Fastfit goes ahead with its plans to have an e-commerce site | b) For each of the locations that you mentioned, identify the technologies (cover the areas of software, hardware and networks) that a customer would need (at the location) to accomplish this activity? (use a table); Brief Description of each component:- Technology Components Required by Customer | Brief Description of Component | Personal Computer / Laptop | To make order online computer / labtop is necessary | Network Card / Modem | To connect with the internet | Operating Software such as Windows, | To interface between application program and computer hardware | Web Browsing Capability | To access the online website of FastFit | Security software such as (McAfee, Ad-Aware) | To save the computer from......

Words: 1942 - Pages: 8

Free Essay

Mba Analysis

...USING EXCEL TO FIND MEASURES OF ASSOCIATION by Edward F. Stafford, Jr., PhD Professor of Management Science, UAH Purpose of Handout The purpose of this handout is to describe how to obtain measures of association between two variables using the Microsoft Excel software. These measures include covariance and correlation. For the most part, each measure may be obtained in two ways: (1) “by hand”; and (2) by Excel’s fX function operator. “By hand” does not mean to actually do the computations by hand; rather, it means to use Excel for statistical computations as though the fX function operator did not exist. Example Problem An example problem is used to demonstrate all of the features described in this handout. The problem is extracted from Case Problem 2, “National Health Care Association,” Chapter 3 of the Anderson, Sweeney, and Williams textbook assigned for this course. In particular, the “University Hospitals” data is used in this handout. The data are scales indicating respondent’s “degree of satisfaction” in their work, their pay, and their opportunities for promotion. Scale values range from 0 to 100. The actual data values used are shown in Figure 1. The user may acquire these data, user-ready, in an Excel file by going to Dr. Stafford’s home page on the web {http://cas.uah.edu/stafford/}, then clicking on the following, in order: (1) MSC 287; (2) scroll down then Special Handouts; (3) Excel Materials including Instructions for Statistical Calculations {click......

Words: 1833 - Pages: 8

Free Essay

Eniac Rocks

...what eniac is. ENIAC was the world's first general purpose, electronic, digital computer. "General purpose" means that ENIAC could be reconfigured to solve a variety of problems; "electronic" means ENIAC used electronic devices (i.e., vacuum tubes instead of mechanical methods like the relay switches that were used on most previous computers) for the actual computations; and "digital" means that ENIAC performed computations in discrete steps, unlike the analog computers prevalent at that time. ENIAC is the acronym for Electronic Numerical Integrator and Computer. Eniac is short for Electronic Numerical Integrator and Computer. The first one was made by time during world war2.It is an acronym for Electronic Numerical Integrator and Computer, as it was the first operational electronic digital computer in the U.S. It was developed by the Army Ordnance. It was used as World War II ballistic firing tables. The ENIAC, weighing 30 tons, using 200 kilowatts of electric power and consisting of 18,000 vacuum tubes, 1,500 relays, and hundreds of thousands of resistors, capacitors, and inductor, was completed in 1945. It was heavy, as a matter of fact according to calculations, cosmic-ray studies, thermal ignition, random-number studies, wind-tunnel design, and other scientific uses. The ENIAC soon became obsolete as the need arose for faster computing speeds. Eniac’s is one of the host heaviest computers more than With the advent of everyday use of elaborate calculations, speed......

Words: 727 - Pages: 3

Free Essay

Information Technology

...BOATENG C/O MR. WILLIAM OHENE - ADU P. O. BOX 1294 KUMASI MOBILE: 0245009355 / 0268978260 E-MAIL ADDRESS: eboatengadjei@yahoo.com , eboatengadjei@hotmail.com CAREER OBJECTIVE A computer science graduate, who is keen to find a position as an IT Manager. I am very reliable, industrious, trustworthy, respectful young man and receptive to new but brilliant ideas. I can work with little or without supervision and also work as part of a team. EDUCATIONAL BACKROUND • 2007 – 2011 Kwame Nkrumah University of Science and Technology • 2002 – 2005 Kumasi Polytechnic • 1999 – 2001 Akwamuman Senior High School • 1995 – 1998 Senchi-Ferry Methodist Junior High School • 1988 – 1994 B. Akoto Experimental QUALIFICATION BSc. (Hons) in Computer Science at KNUST Course content includes: Database Management and Administration, Programming in C++, Java and Visual Basic .NET, System Analysis, Networking, Computer Security and Management Science, Business Management and Economics, Management Information System, Etcetera. HND ELECTRICAL/ELECTRONIC ENGINEERING Course content includes: Network Analysis, Engineering Mathematics, Digital Electronics, Telecommunications, Power Systems, Computer Technology, Computer Literacy, Microcomputer, Computer Applications, Fault Diagnosis, Control Systems, Equipment Maintenance, Power Electronics, Etcetera. CISCO (CCNA Exploration: Network Fundamentals) at College of......

Words: 649 - Pages: 3

Free Essay

Advantages and Disadvantages of Computers

...living in the thousand island.Nowadays,our world is becoming modernized because of gadgets devices and machines that help people to do work,to make their work easier and faster.Computers is one of the most patronized devices today.It can help us in many ways,but computer and their peripherals is changing so rapidly that anything we describe “state of art” today will almost surely lose that status within months. III.STATEMENT OF THE PROBLEM The researchers have this topic to know the opinions of student about the advantage and disadvantage of computers and to let elaborate on these Disadvantages and Advantages. Specifilally,it sought answers to the following problem 1.What is the Advantages and Disadvantages of computers? 2.Is there a significant difference between advantages and disadvantages of computers? 3.Is there a significant between advantages and disadvantages of computers? IV.HYPOTHESIS Based on the aforementioned problems the following hypothesis were tested. 1.There is no significant difference between advantages and disadvantages of computer. 2.There is no significant relationship between advantages and disadvantages of computer. TABLE 1 : DISTRIBUTION OF RESPONDENTS ACCORDING TO GENDER GENDER | FREQUENCY | PERCENTAGE(%) | MALE | | | FEMALE | | | The table shown above desplets the distribution of respondence according to gender. TABLE 2: DISTRIBUTION......

Words: 509 - Pages: 3

Premium Essay

Categories of Computer Crimes

...Categories of Computer Crimes CIS 170 – Information Technology in Criminal Justice Dr. Nicole L. Gray Marilyn T. Hawkins October 16, 2012 Computer Crimes are criminal activities, which involve the use of information technology to gain an illegal or an unsanctioned access to a computer system with volition of damaging, deleting or alter computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system intrusion. Computer crimes may not necessarily encompass damage to physical property. They rather encompass the control of confidential data and critical information. Computer crimes involve activities envelop activities of software theft, wherein the privacy of the users is bound. These criminal activities envelop the breach of human and information privacy, as well the theft and illegal alteration of system critical information. The different types of computer crimes have required the introduction and use of newer and more striking security measures. Hacking: The activity of breaking into a computer system to gain an unsanctioned access is known as hacking. The act of defeating the security capabilities of a computer system in order to obtain an illegal access to the information stored on the computer system is called hacking. The unsanctioned revelation of passwords with volition to gain an unsanctioned access to the private communication of an organization of a user is one of the...

Words: 2255 - Pages: 10

Premium Essay

Cosc 1301 Final

...• Question 1 1 out of 1 points When a Web page author includes meta keywords, like sex, that have little to do with the information on the page, the author is engaging in ____. Answer Selected Answer: d. keyword stuffing Correct Answer: d. keyword stuffing • Question 2 1 out of 1 points ____ is the most frequently used HTTP method. Answer Selected Answer: b. GET Correct Answer: b. GET • Question 3 1 out of 1 points Researchers estimate that the most extensive search engines cover less than 20% of the Web. Answer Selected Answer: True Correct Answer: True • Question 4 1 out of 1 points The ____ wildcard character allows a search engine to find pages with any derivation of a basic word. Answer Selected Answer: c. * Correct Answer: c. * • Question 5 1 out of 1 points HTML ____ are typically used to collect shipping and payment information during checkout at an e-commerce Web site. Answer Selected Answer: d. forms Correct Answer: d. forms • Question 6 1 out of 1 points PayPal is a pioneering example of a(n) ____ payment system. Answer Selected Answer: c. P2P (person-to-person) Correct Answer: c. P2P (person-to-person) • Question 7 1 out of 1 points Which of the following Web-based applications is NOT sometimes characterized as Web 2.0? Answer Selected Answer: d. cloud computing Correct......

Words: 4931 - Pages: 20

Free Essay

Computer Information System Brief

...Computer Information System Brief Delvin M. Howard ACC/542 06/02/2012 Instructor Brad Thompson Abstract This brief will identify Kudler’s key business and accounting information needs and analyze the strengths and weaknesses of Kudler’s current computer system and technology use, including hardware and software. It will also explain what opportunities Kudler has in terms of technology and provide suggestions for improving Kudler’s ability to maximize these opportunities and evaluate the threats that Kudler may encounter given their current systems and offer your suggestions, in terms of using technology. Computer Information System Brief When it comes to the Kudler account after months of review the company needs an accounting information overhaul because their way of doing business is outdated. Thare are some strengths and weaknesses associated with this old way of doing business. However the company needs to be updated to compete with its major competitor Whole Foods who is becoming the corporate giant in the health food industry. The company needs an updated inventory accounting system and a system that incorporates this information so it can be interpreted. This brief will explain how Howard & Co. will facilitate this transition. Strengths and weakness We feel that your strengths are in the realm of customer service even though Kudler fine foods have more than one location it still has the feel of......

Words: 1194 - Pages: 5