SlideShare a Scribd company logo
1 of 18
College of Telecom and Electronics
Phobia of using Computer
Project.
INSA483 : Research Phobia of using computer
Lecture: dr.Ibrahim
Research Proposal
To study the use of computer without having any fear.
Name: Abdulaziz Alnaeem
ID: 439232084
Email: azoooz-303@hotmail.com
Year of Study: 2019
Abstract
In this research I will do searching about the fears
and the concerns of using a computer for some people
who do not know much of the computer problems and
how to be totally safe with it.
INTRODUCTION
The problem of computer phobia or techno phobia has been
widely researched over the last few decades, and in spite of
consistent findings, a series of myths have been perpetuated.
For example, it was commonly and erroneously believed that
women are more computer phobic than men, that older
people are more computer phobic than younger people and
that students are less computer phobic than non-students.
Many studies have shown that when previous experience is
controlled for, the between group differences disappear.
Moreover, it has been found that the percentage of students
who can be classified as computer phobic (ranging from low
to high), has been around 25%, and this does not differ
substantially from the normal population.
OBJECTIVES
What am I trying to achieve?
the study has been conducted with following main
objectives: -
1- to study the fear of using a computer.
2- to know the treatments of using a computer.
3- finally,to feel safe when using a computer.
Research Question
The research question is about How
to treat and find solutions for people
who have concerns in using the
computer..?
ABRIDGED TABLE OF CONTENTS
1. Technophobia
2.Nomophobia
3.Cyberphobia
4.Telephonophobia
5.Selfie phobia
6.Treatment of computer phobia
7. List OF References
8. Schedule Table
Technophobia
Technophobia Is the fear or dislike of advanced
technology. Or complex devices, especially
computers.
Although there are numerous interpretations of
technophobia, they become more complex as
technology continues to evolve. The term is
generally used in the sense of an irrational fear, but
others contend fears are justified.
Nomophobia
The fear of being without a mobile phone stems
from addiction. When a person feels physically or
mentally dependent on anything, s/he cannot find a
way of stopping that addiction.
People tend to experience this phobia when they are
insecure, or have lack of self-control and discipline,
get easily bored or impatient, or have no other
recreational hobbies and outlets etc.
Cyberphobia
Cyberphobia is a fear of working with computers.
People who have cyberphobia are afraid or not able to
learn new technologies. It is a type of specific phobia. It
was first used in 1985.
While many people feel completely comfortable using
computers, navigating the Internet, or installing
applications on their phones, others find themselves
terrified of these things — they have some degree of
cyberphobia.
Telephonophobia
is a reluctance or fear of making or taking? phone calls,
literally, "fear of telephones". It is considered to be a
type of social phobia or social anxiety. It may be
compared to glossophobia, in that both arise from
having to engage with an audience, and the associated
fear of being criticized, judged or made a fool of.
Selfie phobia
With the popularityof selfies, it's no surprise "selfie
phobia"has become widely used. Althoughit has not been
verified by professionals, the term has been floating
around the Internet.
There are various reasons as to why people are selfie
phobic. Some may not think they are photogenic,while
others may see it as a cry for attentionor a superficial act.
NPR suggested a few present-day phobias,and selfie
phobic was first on its list.
Treatments of the computer phobia
Phobias are highly treatable, and people who have them are
nearly always aware of their disorder. This helps diagnosis a
great deal.
Speaking to a psychologist or psychiatristis a useful first step in
treating a phobia that has already been identified. If the phobia
does not cause severe problems, most people find that simply
avoiding the source of their fear helps them stay in control.
Many people with specific phobias will not seek treatment as
these fears are often manageable.
It is not possible to avoid the triggers of some phobias, as is
often the case with complex phobias. In these cases, speaking to
a mental health professional can be the first step to recovery.
Most phobias can be cured with appropriate treatment. There is
no single treatment that works for every person with a phobia.
Treatment needs to be tailored to the individual for it to work.
Design
 First, my decisionsfor Designing this research that I will
find data aboutwho do have fears and some anxiety of
computer
 Second, the location would be on the internet websites
for collecting informationand time scale research
should be about 7 weeks.
 Third, my research procedures for sources, selecting
participantsand analyzing data will be on doing an
interview with people and social media.
 Finally,the method for collecting data is by individual
interview, picture story or photo voice and group
discussions on websites.
methodology and procedures
Simply, my method for collecting and analysingwould be
targeting ages around18 years and above also searching
on the best recommended website and make interview at
coffee and internet shops.
Ethical considerations
Ethicalconsiderationsduring the evaluationinclude:
Informed consent.
Voluntary participation.
Do no harm.
Confidentiality.
Anonymity.
Only assess relevant components
Delimitation and limitation of research
There is no limitation on this research I suppose
because everyone I think wants to have and tell about
these important data for our generation.
Also, I have delimitation but some boundaries of this
topic that I do not take information from someone
without his knowing.
REFERENCES
Introduction:
https://www.researchgate.net/publication/223632022_Computer_phob
ia_and_computer_self-
efficacy_Their_association_with_undergraduates'_use_of_university_co
mputer_facilities
Technophobia
https://en.wikipedia.org/wiki/Technophobia
Nomophobia
https://www.fearof.net/fear-of-being-without-a-mobile-phone-phobia-
nomophobia/
Cyberphobia
https://www.vocabulary.com/dictionary/cyberphobia
Telephonophobia
https://en.wikipedia.org/wiki/Telephone_phobia
Selfie phobia
https://mashable.com/2014/08/02/tech-phobias/
Treatments of the computer phobia
https://www.medicalnewstoday.com/articles/249347.php
Schedule Table
Weak 9 Title page
Dedication Acknowledgment
Weak 10 Summary (abstract)Introduction
and objectives Statement of the
problem
Weak 11 Research questions Hypothesis
Significant and research outcomes
Weak 12 Objectives Chapter 1: literature
review
Chapter 2: materials and methods
Weak 13 Chapter 3: results
Chapter 4: discussion,conclusions
and recommendations Discussion
Weak 14 Conclusions Recommendations
Weak 15 Bibliography(references)Appendix

More Related Content

What's hot

Botulinum toxin
Botulinum toxinBotulinum toxin
Botulinum toxin
inasoto
 

What's hot (12)

The Art of Liquid Face Lift (Dermal Fillers)
The Art of Liquid Face Lift (Dermal Fillers)The Art of Liquid Face Lift (Dermal Fillers)
The Art of Liquid Face Lift (Dermal Fillers)
 
Talent Playbook
Talent PlaybookTalent Playbook
Talent Playbook
 
Botulinum toxin
Botulinum toxinBotulinum toxin
Botulinum toxin
 
L'Oréal brand La Roche Posay Brand Marketing Strategy
L'Oréal brand La Roche Posay Brand Marketing Strategy L'Oréal brand La Roche Posay Brand Marketing Strategy
L'Oréal brand La Roche Posay Brand Marketing Strategy
 
Face lift without surgery
Face lift without surgeryFace lift without surgery
Face lift without surgery
 
Empathy Leadership Skill Presentation_1.pdf.docx
Empathy Leadership Skill Presentation_1.pdf.docxEmpathy Leadership Skill Presentation_1.pdf.docx
Empathy Leadership Skill Presentation_1.pdf.docx
 
Leadership Through Innovation in Facial Aesthetics: Botox, Juvederm, Latisse...
Leadership Through Innovation in Facial Aesthetics: Botox, Juvederm, Latisse...Leadership Through Innovation in Facial Aesthetics: Botox, Juvederm, Latisse...
Leadership Through Innovation in Facial Aesthetics: Botox, Juvederm, Latisse...
 
Laura Pietrzak CoolSculpting Treatment Technique - New York
Laura Pietrzak   CoolSculpting Treatment Technique - New YorkLaura Pietrzak   CoolSculpting Treatment Technique - New York
Laura Pietrzak CoolSculpting Treatment Technique - New York
 
Anatomy of the skin
Anatomy of the skinAnatomy of the skin
Anatomy of the skin
 
Integrating Social Media in your business model
Integrating Social Media in your business modelIntegrating Social Media in your business model
Integrating Social Media in your business model
 
HAIR DERMATOLOGY REVISION NOTES
HAIR DERMATOLOGY REVISION NOTES HAIR DERMATOLOGY REVISION NOTES
HAIR DERMATOLOGY REVISION NOTES
 
The Deloitte Millennial Survey 2016
The Deloitte Millennial Survey 2016The Deloitte Millennial Survey 2016
The Deloitte Millennial Survey 2016
 

Similar to Phobia Of Computer

Phobia Of Computer
Phobia Of ComputerPhobia Of Computer
Phobia Of Computer
aziiz95
 
Sick Around the WorldWatch Sick Around the World” (either at ht.docx
Sick Around the WorldWatch Sick Around the World” (either at ht.docxSick Around the WorldWatch Sick Around the World” (either at ht.docx
Sick Around the WorldWatch Sick Around the World” (either at ht.docx
mckellarhastings
 
Complete all questions with in-text citations and references.1. .docx
Complete all questions with in-text citations and references.1. .docxComplete all questions with in-text citations and references.1. .docx
Complete all questions with in-text citations and references.1. .docx
luellaj
 
PSYCH610researchproposalweek8TamaraHarms
PSYCH610researchproposalweek8TamaraHarmsPSYCH610researchproposalweek8TamaraHarms
PSYCH610researchproposalweek8TamaraHarms
Tamara Harms
 
Aliaksandra Zuyonak English 12 Freshman Writing I Kevin Kolk.docx
Aliaksandra Zuyonak English 12 Freshman Writing I Kevin Kolk.docxAliaksandra Zuyonak English 12 Freshman Writing I Kevin Kolk.docx
Aliaksandra Zuyonak English 12 Freshman Writing I Kevin Kolk.docx
daniahendric
 
PhilipGuillet-FinalPaper
PhilipGuillet-FinalPaperPhilipGuillet-FinalPaper
PhilipGuillet-FinalPaper
Philip Guillet
 
Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Tok final ppt internet reliabiity
Tok final ppt internet reliabiity
Ahmed Raza
 

Similar to Phobia Of Computer (20)

Thesis
ThesisThesis
Thesis
 
Phobia Of Computer
Phobia Of ComputerPhobia Of Computer
Phobia Of Computer
 
Sick Around the WorldWatch Sick Around the World” (either at ht.docx
Sick Around the WorldWatch Sick Around the World” (either at ht.docxSick Around the WorldWatch Sick Around the World” (either at ht.docx
Sick Around the WorldWatch Sick Around the World” (either at ht.docx
 
Example Discussion Es. Online assignment writing service.
Example Discussion Es. Online assignment writing service.Example Discussion Es. Online assignment writing service.
Example Discussion Es. Online assignment writing service.
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Complete all questions with in-text citations and references.1. .docx
Complete all questions with in-text citations and references.1. .docxComplete all questions with in-text citations and references.1. .docx
Complete all questions with in-text citations and references.1. .docx
 
PSYCH610researchproposalweek8TamaraHarms
PSYCH610researchproposalweek8TamaraHarmsPSYCH610researchproposalweek8TamaraHarms
PSYCH610researchproposalweek8TamaraHarms
 
Aliaksandra Zuyonak English 12 Freshman Writing I Kevin Kolk.docx
Aliaksandra Zuyonak English 12 Freshman Writing I Kevin Kolk.docxAliaksandra Zuyonak English 12 Freshman Writing I Kevin Kolk.docx
Aliaksandra Zuyonak English 12 Freshman Writing I Kevin Kolk.docx
 
PhilipGuillet-FinalPaper
PhilipGuillet-FinalPaperPhilipGuillet-FinalPaper
PhilipGuillet-FinalPaper
 
Nomophobia
NomophobiaNomophobia
Nomophobia
 
Teen Cybersafety & Database Resources
Teen Cybersafety & Database ResourcesTeen Cybersafety & Database Resources
Teen Cybersafety & Database Resources
 
Cyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & ChildrenCyberbullying Guide - Parents, Teachers & Children
Cyberbullying Guide - Parents, Teachers & Children
 
Social Media in Medicine_ Professionalism and Opportunities 2018 moi grand ro...
Social Media in Medicine_ Professionalism and Opportunities 2018 moi grand ro...Social Media in Medicine_ Professionalism and Opportunities 2018 moi grand ro...
Social Media in Medicine_ Professionalism and Opportunities 2018 moi grand ro...
 
Watch out cell phones can be addictive too much dependence on yo
Watch out cell phones can be addictive too much dependence on yoWatch out cell phones can be addictive too much dependence on yo
Watch out cell phones can be addictive too much dependence on yo
 
Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Tok final ppt internet reliabiity
Tok final ppt internet reliabiity
 
LP ME.docx
LP ME.docxLP ME.docx
LP ME.docx
 
Information Technology Essay Topics
Information Technology Essay TopicsInformation Technology Essay Topics
Information Technology Essay Topics
 
World ict day
World ict dayWorld ict day
World ict day
 
internet addiction
internet addictioninternet addiction
internet addiction
 
SAMUEL FULL MSC PROJECT
SAMUEL FULL MSC PROJECTSAMUEL FULL MSC PROJECT
SAMUEL FULL MSC PROJECT
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Phobia Of Computer

  • 1. College of Telecom and Electronics Phobia of using Computer Project. INSA483 : Research Phobia of using computer Lecture: dr.Ibrahim Research Proposal To study the use of computer without having any fear. Name: Abdulaziz Alnaeem ID: 439232084 Email: azoooz-303@hotmail.com Year of Study: 2019
  • 2. Abstract In this research I will do searching about the fears and the concerns of using a computer for some people who do not know much of the computer problems and how to be totally safe with it.
  • 3. INTRODUCTION The problem of computer phobia or techno phobia has been widely researched over the last few decades, and in spite of consistent findings, a series of myths have been perpetuated. For example, it was commonly and erroneously believed that women are more computer phobic than men, that older people are more computer phobic than younger people and that students are less computer phobic than non-students. Many studies have shown that when previous experience is controlled for, the between group differences disappear. Moreover, it has been found that the percentage of students who can be classified as computer phobic (ranging from low to high), has been around 25%, and this does not differ substantially from the normal population.
  • 4. OBJECTIVES What am I trying to achieve? the study has been conducted with following main objectives: - 1- to study the fear of using a computer. 2- to know the treatments of using a computer. 3- finally,to feel safe when using a computer.
  • 5. Research Question The research question is about How to treat and find solutions for people who have concerns in using the computer..?
  • 6. ABRIDGED TABLE OF CONTENTS 1. Technophobia 2.Nomophobia 3.Cyberphobia 4.Telephonophobia 5.Selfie phobia 6.Treatment of computer phobia 7. List OF References 8. Schedule Table
  • 7. Technophobia Technophobia Is the fear or dislike of advanced technology. Or complex devices, especially computers. Although there are numerous interpretations of technophobia, they become more complex as technology continues to evolve. The term is generally used in the sense of an irrational fear, but others contend fears are justified.
  • 8. Nomophobia The fear of being without a mobile phone stems from addiction. When a person feels physically or mentally dependent on anything, s/he cannot find a way of stopping that addiction. People tend to experience this phobia when they are insecure, or have lack of self-control and discipline, get easily bored or impatient, or have no other recreational hobbies and outlets etc.
  • 9. Cyberphobia Cyberphobia is a fear of working with computers. People who have cyberphobia are afraid or not able to learn new technologies. It is a type of specific phobia. It was first used in 1985. While many people feel completely comfortable using computers, navigating the Internet, or installing applications on their phones, others find themselves terrified of these things — they have some degree of cyberphobia.
  • 10. Telephonophobia is a reluctance or fear of making or taking? phone calls, literally, "fear of telephones". It is considered to be a type of social phobia or social anxiety. It may be compared to glossophobia, in that both arise from having to engage with an audience, and the associated fear of being criticized, judged or made a fool of.
  • 11. Selfie phobia With the popularityof selfies, it's no surprise "selfie phobia"has become widely used. Althoughit has not been verified by professionals, the term has been floating around the Internet. There are various reasons as to why people are selfie phobic. Some may not think they are photogenic,while others may see it as a cry for attentionor a superficial act. NPR suggested a few present-day phobias,and selfie phobic was first on its list.
  • 12. Treatments of the computer phobia Phobias are highly treatable, and people who have them are nearly always aware of their disorder. This helps diagnosis a great deal. Speaking to a psychologist or psychiatristis a useful first step in treating a phobia that has already been identified. If the phobia does not cause severe problems, most people find that simply avoiding the source of their fear helps them stay in control. Many people with specific phobias will not seek treatment as these fears are often manageable. It is not possible to avoid the triggers of some phobias, as is often the case with complex phobias. In these cases, speaking to a mental health professional can be the first step to recovery. Most phobias can be cured with appropriate treatment. There is no single treatment that works for every person with a phobia. Treatment needs to be tailored to the individual for it to work.
  • 13. Design  First, my decisionsfor Designing this research that I will find data aboutwho do have fears and some anxiety of computer  Second, the location would be on the internet websites for collecting informationand time scale research should be about 7 weeks.  Third, my research procedures for sources, selecting participantsand analyzing data will be on doing an interview with people and social media.  Finally,the method for collecting data is by individual interview, picture story or photo voice and group discussions on websites.
  • 14. methodology and procedures Simply, my method for collecting and analysingwould be targeting ages around18 years and above also searching on the best recommended website and make interview at coffee and internet shops.
  • 15. Ethical considerations Ethicalconsiderationsduring the evaluationinclude: Informed consent. Voluntary participation. Do no harm. Confidentiality. Anonymity. Only assess relevant components
  • 16. Delimitation and limitation of research There is no limitation on this research I suppose because everyone I think wants to have and tell about these important data for our generation. Also, I have delimitation but some boundaries of this topic that I do not take information from someone without his knowing.
  • 18. Schedule Table Weak 9 Title page Dedication Acknowledgment Weak 10 Summary (abstract)Introduction and objectives Statement of the problem Weak 11 Research questions Hypothesis Significant and research outcomes Weak 12 Objectives Chapter 1: literature review Chapter 2: materials and methods Weak 13 Chapter 3: results Chapter 4: discussion,conclusions and recommendations Discussion Weak 14 Conclusions Recommendations Weak 15 Bibliography(references)Appendix