mengoperasikan komputer

Is ADD Now TIADD - Technology Induced Attention Deficit Disorder?

Society today, 'Today' being defined as the time from the late 1980's to the present, has undergone a rapid evolution in information collection, manipulation, storage and presentation. With the introduction of personal computers, the internet, smart phones and more, the life has been transformed into an environment where information readily becomes available on demand.

Along with this technology, comes greater expectation. Initially, users were limited to certain types of data; internal business data and standard news information, enabling people to provide limited information to best site management and peers.

As technology has become a focal point of life for most of the developed world, cost has decreased as rapidly as innovation has progressed, making information more accessible and affordable than ever before.

With this reduced cost and more readily available access, new problems have come to light. Business and human process began to rely more on technology. People began to rely on technology to make decisions or mange decisions. In the past, it was only businesses that relied on technology to drive efficiencies, creating expectation previously achieved through people, process and time. Now, personal expectations have been raised, for every aspect of our lives. This fundamental change in expectation is the foundation for our assertion that ADD (Attention Deficit Disorder) has manifested itself in many aspects of our lives, both in and out of the workplace; our term for this is Technology Induced Attention Deficit Disorder or TIADD.

Twelve years ago we introduced TIADD to the business community as part of our methodology for resolving business efficiency issues in the workplace. In the late 1990's, this disorder was manifesting itself regularly in the workplace, however throughout the early 2000's, TIADD has begun to show up throughout society.

TIADD is a new foundation for inefficiency and vulnerability. An entire generation of worker is being trained to rely solely on technology to collect, analyze, process and distribute information. The inefficiencies are created through lack of planning and understanding of foundational business and personal process, as it relates to an organization or individual prior to technology implementation. Vulnerabilities are created when this technology is implemented with inefficiencies; people are psychologically affected by the negative impact of the technology.
Big image