wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The “High” of ‘likes’, ‘follows’, and ‘views’ – and how I decided to respond to them myself.

profile
Verlyn
Sep 09, 2019
0 Likes
0 Discussions
613 Reads
I could begin by quoting what a lot of parents have told me, whether in or outside my practice about their children’s incessant internet and device usage. But I’m sure you’ve either said them or heard them in surplus. (I would still like to believe that I can say: not long ago), I remember as a teenager, the “high” that ebbed like a wave, every time I got a notification of a follow request, or a like and comment on a photograph or a post. Now that I understand this phenomenon better, each notification served as a reward and lit up that part of the brain which led to pleasure and made me happy. A one and a half year break from most of these social media sites put things into perspective for me. During this part ‘Digital Detox’ I was involved with my Master’s dissertation which focused on Gratitude. I am extremely grateful to my elderly participant who showed me the beneficial impact it had on their lives and truly motivated me to employ it every where. Recently, I joined most of the popular social networks recently as a platform to inform people about ‘ImPerfect’ and spread awareness. I now respond to each notification with gratitude. I am so thankful that each new person on any of the platforms will gain some new awareness and perspective on Mental Health. Each like or comment is a feedback that points me to the required direction of improvement. These ways of thinking or responding are conscious decisions made by me, every time the device beeps. It is difficult. I have only been able to alter my response as a result of accepting myself, and understanding the importance of how I think about myself. More on the importance of self-acceptance, how to enhance it in yourself and children, in the next post – Acceptance, Love & Care – Do We Show It To Ourselves?

Comments ()


Sign in

Read Next

Microsoft powerpoint presentation

Blog banner

Regression Analysis

Blog banner

The functions of operating system

Blog banner

Threading

Blog banner

Memory Management

Blog banner

Caching windows

Blog banner

Types of Malware in Cyber Security

Blog banner

Security issues

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Synchronization

Blog banner

Service Design Principles

Blog banner

Computer Security

Blog banner

Cyber Security in Data Breaching

Blog banner

ODOO

Blog banner

Virtual memory in windows

Blog banner

Linux VServer Architecture

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Embaded operating system

Blog banner

MailChimp

Blog banner

How I use google in my daily life

Blog banner

Linux Threads:

Blog banner

note taker app

Blog banner

About my college life

Blog banner

Evolution of Operating system.

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Memory management

Blog banner

Buffers in Operating Systems

Blog banner

Install Ubuntu Easily

Blog banner

GIS REMOTE SENSING

Blog banner

Google classroom

Blog banner

Getting into anime My anime suggestions

Blog banner

Advantage of freedom

Blog banner

Email Privacy

Blog banner

Cache memory

Blog banner

Deadlock in operating system

Blog banner

INTERNET

Blog banner

Clarizen

Blog banner

The War With Cold On Earth

Blog banner

Jamming Attacks in Network Security: Disrupting Communication Signals

Blog banner

Hosting basics

Blog banner

How to use GIT & GITHUB

Blog banner

Internet of Things

Blog banner