Digital Technology Disorder: Justification and a Proposed Model of Treatment
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 8
Abstract
Due to advances in technology being made at an exponential rate, organisations are attempting to compete with one another by utilising state-of-the-art technology to provide innovative products and services that encourage use. However, there is no moral code to inform sensitive technology design, a consequence of which is the emergence of so-called technology addiction. While addiction as a term is problematic, increasing evidence suggests that related-conditions present implications for the individual, for organisations and for wider society. In this research, a consideration of the potentially addictive elements of technology indicates that it can be possible to reverse engineer these systems, as it were, to promote the development of new behaviours, which can enable the individual to abstain from overuse. Utilising smartphones to deliver digital behavioural change interventions can leverage abundant data touchpoints to provide highly tailored treatment, in addition to allowing for enhanced monitoring and accuracy. To inform understanding of this contemporary phenomenon, the literature on addiction has been reviewed, along with the literature on persuasion architecture to inform an understanding of techniques that lend themselves to overuse and how these can be leveraged to promote recovery. From which, the authors have developed a proposed model to inform the practice of those operating in the domains of computer science.
Authors and Affiliations
Andrew Kear, Sasha L. Folkes
A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture
The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in t...
An Automated Approach for Identification of Non-Functional Requirements using Word2Vec Model
Non-Functional Requirements (NFR) are embedded in functional requirements in requirements specification docu-ment. Identification of NFR from the requirement document is a challenging task. Ignorance of NFR identificatio...
Improving Seek Time for Column Store Using MMH Algorithm
Hash based search has, proven excellence on large data warehouses stored in column store. Data distribution has significant impact on hash based search. To reduce impact of data distribution, we have proposed Memor...
Internet of Things (IOT): Research Challenges and Future Applications
With the Internet of Things (IoT) gradually evolving as the subsequent phase of the evolution of the Internet, it becomes crucial to recognize the various potential domains for application of IoT, and the research challe...
Fragile Watermarking based on Linear Cellular Automata using Manhattan Distances for 2D Vector Map
There has been a growing demand for publishing maps in secure digital format, since this ensures the integrity of data. This had lead us to put forward a method of detecting and locating modification data that is extreme...