SlideShare a Scribd company logo
College of Telecom and Electronics
Phobia of using Computer
Project.
INSA483 : Research Phobia of using computer
Lecture: dr.Ibrahim
Research Proposal
To study the use of computer without having any fear.
Name: Abdulaziz Alnaeem
ID: 439232084
Email: azoooz-303@hotmail.com
Year of Study: 2019
For the degree of bachelor of computer
The date of submission: 2019/10/10
Dedication
This study is wholeheartedlydedicated to our
beloved parents, who have been our source of
inspiration and gave us strengthwhen we thought of
giving up, who continually provide their moral,
spiritual, emotional, and financial support.
Acknowledgement
I would like to thank the all library media specialists for
their participation in the survey who supported my
work in this way and helped me get results of better
quality. I am also grateful to the members of my
committee for their patience and support in
overcoming numerous obstacles I have been facing
through my research
Abstract
In this research I will do searching about the fears
and the concerns of using a computer for some people
who do not know much of the computer problems and
how to be totally safe with it.
INTRODUCTION
What do you fear most, more than anything else? Perhaps you
hate social media, or you don't like taking selfi. Maybe the
thought of giving someone your phone makes you nervous.
Everyone is afraid of something. These fears are all normal;
lots of other people feel the same way that you do. The
problem of computer phobia or techno phobia has been
widely researched over the last few decades, and in spite of
consistent findings, a series of myths have been perpetuated.
For example, it was commonly and erroneously believed that
women are more computer phobic than men, that older
people are more computer phobic than younger people and
that students are less computer phobic than non-students.
Many studies have shown that when previous experience is
controlled for, the between group differences disappear.
Moreover, it has been found that the percentage of students
who can be classified as computer phobic (ranging from low
to high), has been around 25%, and this does not differ
substantially from the normal population.
OBJECTIVES
What am I trying to achieve?
the study has been conducted with following main
objectives: -
- To study the fear of using a computer.
- To know the treatments of using a computer.
- finally,to feel safe when using a computer.
Statement of the problem
Many people suffer from anxiety when facing difficult computing
tasks. Different people respond differently to phobia of using
computer.
Regarding of financial costs of the problem that there is non except if
he wanted to go to psychologist and scientist approved that using
PCs could lead to colour or eye blindness.
Research Question
The research question is about How
to treat and find solutions for people
who have concerns in using the
computer..?
Significantand research outcomes Objectives
I have many main objectives but the most important
one is how to face the fear and feel safe while using
computer.
ABRIDGED TABLE OF CONTENTS
1. Technophobia
2.Cyberphobia
3.Selfie phobia
4.Treatment of computer phobia
5. List OF References
6. Schedule Table
Nomophobia
The fear of being without a mobile phone stems
from addiction. When a person feels physically or
mentally dependent on anything, s/he cannot find a
way of stopping that addiction.
People tend to experience this phobia when they are
insecure, or have lack of self-control and discipline,
get easily bored or impatient, or have no other
recreational hobbies and outlets etc.
Cyberphobia
Cyberphobia is a fear of working with computers.
People who have cyberphobia are afraid or not able to
learn new technologies. It is a type of specific phobia. It
was first used in 1985.
While many people feel completely comfortable using
computers, navigating the Internet, or installing
applications on their phones, others find themselves
terrified of these things — they have some degree of
cyberphobia.
Selfie phobia
With the popularityof selfies, it's no surprise "selfie
phobia"has become widely used. Althoughit has not been
verified by professionals, the term has been floating
around the Internet.
There are various reasons as to why people are selfie
phobic. Some may not think they are photogenic,while
others may see it as a cry for attentionor a superficial act.
NPR suggested a few present-day phobias,and selfie
phobic was first on its list.
Treatments the of computer phobia
Phobias are highly treatable, and people who have them are
nearly always aware of their disorder. This helps diagnosis a
great deal.
Speaking to a psychologist or psychiatristis a useful first step in
treating a phobia that has already been identified. If the phobia
does not cause severe problems, most people find that simply
avoiding the source of their fear helps them stay in control.
Many people with specific phobias will not seek treatment as
these fears are often manageable.
It is not possible to avoid the triggers of some phobias, as is
often the case with complex phobias. In these cases, speaking to
a mental health professional can be the first step to recovery.
Most phobias can be cured with appropriate treatment. There is
no single treatment that works for every person with a phobia.
Treatment needs to be tailored to the individual for it to work.
Materials and Methods
The locationfor my materialswould be on the internet and
by individualinterview, picture story or photo voice and
group discussions on websites for collectinginformation
and time scale research should be about 7 weeks.
Simply, my method for collecting and analysingwould be
targeting ages around18 years and above also searching
on the best recommended website and make interview at
coffee and internet shops.
Results
The percentage of computer phobia that concerns most
people with.
Table 1:
discussion, conclusions and recommendations
Results reported in Table 1 demonstrate that,although 67% of students
reported no computer phobia,and 23% reported low computer phobia,
this still left 19% claimingto have moderate to high computer phobia on
the Computer AnxietyRatingScale and Computer Thoughts Survey
measures respectively.
In conclusion,I found that phobia ofthe computer has been seriously
important subject to reconsider after the results that we haveseen above
in table 1, I havecontributed forthis research so we could feel safe when
usinga computer without anxiety
There is no limitation on this research I suppose because everyone I think
wants to have and tell about these important data forourgeneration
My recommendationsforfuture work in this research that is to make the
life safe with using computer technologyand know how to use our
computer and phones without fears and concerns.
.
Ethical considerations
Ethicalconsiderationsduring the evaluationinclude:
Informed consent.
Voluntary participation.
Do no harm.
Confidentiality.
Anonymity.
Only assess relevant components
REFERENCES
Introduction:
https://www.researchgate.net/publication/223632022_Computer_phob
ia_and_computer_self-
efficacy_Their_association_with_undergraduates'_use_of_university_co
mputer_facilities
Technophobia
https://en.wikipedia.org/wiki/Technophobia
Nomophobia
https://www.fearof.net/fear-of-being-without-a-mobile-phone-phobia-
nomophobia/
Cyberphobia
https://www.vocabulary.com/dictionary/cyberphobia
Selfie phobia
https://mashable.com/2014/08/02/tech-phobias/
Treatments of the computer phobia
https://www.medicalnewstoday.com/articles/249347.php
Schedule Table
Weak 9 Title page
Dedication Acknowledgment
Weak 10 Summary (abstract)Introduction
and objectives Statement of the
problem
Weak 11 Research questions Hypothesis
Significant and research outcomes
Weak 12 Objectives Chapter 1: literature
review
Chapter 2: materials and methods
Weak 13 Chapter 3: results
Chapter 4: discussion,conclusions
and recommendations Discussion
Weak 14 Conclusions Recommendations
Weak 15 Bibliography(references)Appendix

More Related Content

What's hot

Ittakesavillage
IttakesavillageIttakesavillage
Ittakesavillage
mackas
 
Argumentative essay
Argumentative essayArgumentative essay
Argumentative essay
krupakarBM
 
Steenhoek follower to_leader
Steenhoek follower to_leaderSteenhoek follower to_leader
Steenhoek follower to_leader
steenhoekic
 
Debate - Electronics good or bad for kids
Debate - Electronics good or bad for kidsDebate - Electronics good or bad for kids
Debate - Electronics good or bad for kids
champchild
 
Digital Health And Wellness
Digital Health And WellnessDigital Health And Wellness
Digital Health And Wellness
Paul I
 
Reflective Response
Reflective Response Reflective Response
Reflective Response
Ern Marino
 
Social networking - a boon or curse.
Social networking - a boon or curse.Social networking - a boon or curse.
Social networking - a boon or curse.
Vaibhav Kakkar
 
Argumentative essay
Argumentative essayArgumentative essay
Argumentative essay
Amzar Mat Said
 
Leveraging technology and adding value by Mirza Yawar Baig
Leveraging technology and adding value by Mirza Yawar BaigLeveraging technology and adding value by Mirza Yawar Baig
Leveraging technology and adding value by Mirza Yawar Baig
Mirza Yawar Baig
 

What's hot (9)

Ittakesavillage
IttakesavillageIttakesavillage
Ittakesavillage
 
Argumentative essay
Argumentative essayArgumentative essay
Argumentative essay
 
Steenhoek follower to_leader
Steenhoek follower to_leaderSteenhoek follower to_leader
Steenhoek follower to_leader
 
Debate - Electronics good or bad for kids
Debate - Electronics good or bad for kidsDebate - Electronics good or bad for kids
Debate - Electronics good or bad for kids
 
Digital Health And Wellness
Digital Health And WellnessDigital Health And Wellness
Digital Health And Wellness
 
Reflective Response
Reflective Response Reflective Response
Reflective Response
 
Social networking - a boon or curse.
Social networking - a boon or curse.Social networking - a boon or curse.
Social networking - a boon or curse.
 
Argumentative essay
Argumentative essayArgumentative essay
Argumentative essay
 
Leveraging technology and adding value by Mirza Yawar Baig
Leveraging technology and adding value by Mirza Yawar BaigLeveraging technology and adding value by Mirza Yawar Baig
Leveraging technology and adding value by Mirza Yawar Baig
 

Similar to Phobia Of Computer

Phobia Of Computer
Phobia Of ComputerPhobia Of Computer
Phobia Of Computer
aziiz95
 
Example Discussion Es. Online assignment writing service.
Example Discussion Es. Online assignment writing service.Example Discussion Es. Online assignment writing service.
Example Discussion Es. Online assignment writing service.
Kristin Reyes
 
SAMUEL FULL MSC PROJECT
SAMUEL FULL MSC PROJECTSAMUEL FULL MSC PROJECT
SAMUEL FULL MSC PROJECT
Samuel Adekanmbi
 
Sick Around the WorldWatch Sick Around the World” (either at ht.docx
Sick Around the WorldWatch Sick Around the World” (either at ht.docxSick Around the WorldWatch Sick Around the World” (either at ht.docx
Sick Around the WorldWatch Sick Around the World” (either at ht.docx
mckellarhastings
 
Computer addiction in children a growing concern by dr.grace macapagal
Computer addiction in children a growing concern by dr.grace macapagalComputer addiction in children a growing concern by dr.grace macapagal
Computer addiction in children a growing concern by dr.grace macapagal
Shirley Valera
 
Complete all questions with in-text citations and references.1. .docx
Complete all questions with in-text citations and references.1. .docxComplete all questions with in-text citations and references.1. .docx
Complete all questions with in-text citations and references.1. .docx
luellaj
 
Module 3 reflections - literacies
Module 3 reflections - literaciesModule 3 reflections - literacies
Module 3 reflections - literacies
lorettamartin3
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Zekhaya Sithole
 
ENGLISH9-Q4-W7-MOD7.docx
ENGLISH9-Q4-W7-MOD7.docxENGLISH9-Q4-W7-MOD7.docx
ENGLISH9-Q4-W7-MOD7.docx
JAREDMABUNGA
 
University Of Georgia Essay Questions 2013
University Of Georgia Essay Questions 2013University Of Georgia Essay Questions 2013
University Of Georgia Essay Questions 2013
Kara Flores
 
Zhang d lis 560 assignment 2
Zhang d lis 560 assignment 2Zhang d lis 560 assignment 2
Zhang d lis 560 assignment 2
Dibiboi
 
Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Tok final ppt internet reliabiity
Tok final ppt internet reliabiity
Ahmed Raza
 
Refresh Portland - User Experience and Healthcare
Refresh Portland - User Experience and HealthcareRefresh Portland - User Experience and Healthcare
Refresh Portland - User Experience and Healthcare
Sheetal Dube
 
PhilipGuillet-FinalPaper
PhilipGuillet-FinalPaperPhilipGuillet-FinalPaper
PhilipGuillet-FinalPaper
Philip Guillet
 
World ict day
World ict dayWorld ict day
World ict day
Salman Farris
 
internet addiction
internet addictioninternet addiction
internet addiction
Salman Farris
 
Social Media in Medicine_ Professionalism and Opportunities 2018 moi grand ro...
Social Media in Medicine_ Professionalism and Opportunities 2018 moi grand ro...Social Media in Medicine_ Professionalism and Opportunities 2018 moi grand ro...
Social Media in Medicine_ Professionalism and Opportunities 2018 moi grand ro...
thegraymatters
 
Impact_of_internet_use_on_young_students
Impact_of_internet_use_on_young_studentsImpact_of_internet_use_on_young_students
Impact_of_internet_use_on_young_students
miftah uddin
 
Digital Students, Digital Parents
Digital Students, Digital ParentsDigital Students, Digital Parents
Digital Students, Digital Parents
Clint Hamada
 
Conversation research: leveraging the power of social media
Conversation research: leveraging the power of social mediaConversation research: leveraging the power of social media
Conversation research: leveraging the power of social media
SKIM
 

Similar to Phobia Of Computer (20)

Phobia Of Computer
Phobia Of ComputerPhobia Of Computer
Phobia Of Computer
 
Example Discussion Es. Online assignment writing service.
Example Discussion Es. Online assignment writing service.Example Discussion Es. Online assignment writing service.
Example Discussion Es. Online assignment writing service.
 
SAMUEL FULL MSC PROJECT
SAMUEL FULL MSC PROJECTSAMUEL FULL MSC PROJECT
SAMUEL FULL MSC PROJECT
 
Sick Around the WorldWatch Sick Around the World” (either at ht.docx
Sick Around the WorldWatch Sick Around the World” (either at ht.docxSick Around the WorldWatch Sick Around the World” (either at ht.docx
Sick Around the WorldWatch Sick Around the World” (either at ht.docx
 
Computer addiction in children a growing concern by dr.grace macapagal
Computer addiction in children a growing concern by dr.grace macapagalComputer addiction in children a growing concern by dr.grace macapagal
Computer addiction in children a growing concern by dr.grace macapagal
 
Complete all questions with in-text citations and references.1. .docx
Complete all questions with in-text citations and references.1. .docxComplete all questions with in-text citations and references.1. .docx
Complete all questions with in-text citations and references.1. .docx
 
Module 3 reflections - literacies
Module 3 reflections - literaciesModule 3 reflections - literacies
Module 3 reflections - literacies
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
ENGLISH9-Q4-W7-MOD7.docx
ENGLISH9-Q4-W7-MOD7.docxENGLISH9-Q4-W7-MOD7.docx
ENGLISH9-Q4-W7-MOD7.docx
 
University Of Georgia Essay Questions 2013
University Of Georgia Essay Questions 2013University Of Georgia Essay Questions 2013
University Of Georgia Essay Questions 2013
 
Zhang d lis 560 assignment 2
Zhang d lis 560 assignment 2Zhang d lis 560 assignment 2
Zhang d lis 560 assignment 2
 
Tok final ppt internet reliabiity
Tok final ppt internet reliabiity Tok final ppt internet reliabiity
Tok final ppt internet reliabiity
 
Refresh Portland - User Experience and Healthcare
Refresh Portland - User Experience and HealthcareRefresh Portland - User Experience and Healthcare
Refresh Portland - User Experience and Healthcare
 
PhilipGuillet-FinalPaper
PhilipGuillet-FinalPaperPhilipGuillet-FinalPaper
PhilipGuillet-FinalPaper
 
World ict day
World ict dayWorld ict day
World ict day
 
internet addiction
internet addictioninternet addiction
internet addiction
 
Social Media in Medicine_ Professionalism and Opportunities 2018 moi grand ro...
Social Media in Medicine_ Professionalism and Opportunities 2018 moi grand ro...Social Media in Medicine_ Professionalism and Opportunities 2018 moi grand ro...
Social Media in Medicine_ Professionalism and Opportunities 2018 moi grand ro...
 
Impact_of_internet_use_on_young_students
Impact_of_internet_use_on_young_studentsImpact_of_internet_use_on_young_students
Impact_of_internet_use_on_young_students
 
Digital Students, Digital Parents
Digital Students, Digital ParentsDigital Students, Digital Parents
Digital Students, Digital Parents
 
Conversation research: leveraging the power of social media
Conversation research: leveraging the power of social mediaConversation research: leveraging the power of social media
Conversation research: leveraging the power of social media
 

Recently uploaded

Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 

Recently uploaded (20)

Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 

Phobia Of Computer

  • 1. College of Telecom and Electronics Phobia of using Computer Project. INSA483 : Research Phobia of using computer Lecture: dr.Ibrahim Research Proposal To study the use of computer without having any fear. Name: Abdulaziz Alnaeem ID: 439232084 Email: azoooz-303@hotmail.com Year of Study: 2019 For the degree of bachelor of computer The date of submission: 2019/10/10
  • 2. Dedication This study is wholeheartedlydedicated to our beloved parents, who have been our source of inspiration and gave us strengthwhen we thought of giving up, who continually provide their moral, spiritual, emotional, and financial support.
  • 3. Acknowledgement I would like to thank the all library media specialists for their participation in the survey who supported my work in this way and helped me get results of better quality. I am also grateful to the members of my committee for their patience and support in overcoming numerous obstacles I have been facing through my research
  • 4. Abstract In this research I will do searching about the fears and the concerns of using a computer for some people who do not know much of the computer problems and how to be totally safe with it.
  • 5. INTRODUCTION What do you fear most, more than anything else? Perhaps you hate social media, or you don't like taking selfi. Maybe the thought of giving someone your phone makes you nervous. Everyone is afraid of something. These fears are all normal; lots of other people feel the same way that you do. The problem of computer phobia or techno phobia has been widely researched over the last few decades, and in spite of consistent findings, a series of myths have been perpetuated. For example, it was commonly and erroneously believed that women are more computer phobic than men, that older people are more computer phobic than younger people and that students are less computer phobic than non-students. Many studies have shown that when previous experience is controlled for, the between group differences disappear. Moreover, it has been found that the percentage of students who can be classified as computer phobic (ranging from low to high), has been around 25%, and this does not differ substantially from the normal population.
  • 6. OBJECTIVES What am I trying to achieve? the study has been conducted with following main objectives: - - To study the fear of using a computer. - To know the treatments of using a computer. - finally,to feel safe when using a computer.
  • 7. Statement of the problem Many people suffer from anxiety when facing difficult computing tasks. Different people respond differently to phobia of using computer. Regarding of financial costs of the problem that there is non except if he wanted to go to psychologist and scientist approved that using PCs could lead to colour or eye blindness.
  • 8. Research Question The research question is about How to treat and find solutions for people who have concerns in using the computer..?
  • 9. Significantand research outcomes Objectives I have many main objectives but the most important one is how to face the fear and feel safe while using computer.
  • 10. ABRIDGED TABLE OF CONTENTS 1. Technophobia 2.Cyberphobia 3.Selfie phobia 4.Treatment of computer phobia 5. List OF References 6. Schedule Table
  • 11. Nomophobia The fear of being without a mobile phone stems from addiction. When a person feels physically or mentally dependent on anything, s/he cannot find a way of stopping that addiction. People tend to experience this phobia when they are insecure, or have lack of self-control and discipline, get easily bored or impatient, or have no other recreational hobbies and outlets etc.
  • 12. Cyberphobia Cyberphobia is a fear of working with computers. People who have cyberphobia are afraid or not able to learn new technologies. It is a type of specific phobia. It was first used in 1985. While many people feel completely comfortable using computers, navigating the Internet, or installing applications on their phones, others find themselves terrified of these things — they have some degree of cyberphobia.
  • 13. Selfie phobia With the popularityof selfies, it's no surprise "selfie phobia"has become widely used. Althoughit has not been verified by professionals, the term has been floating around the Internet. There are various reasons as to why people are selfie phobic. Some may not think they are photogenic,while others may see it as a cry for attentionor a superficial act. NPR suggested a few present-day phobias,and selfie phobic was first on its list.
  • 14. Treatments the of computer phobia Phobias are highly treatable, and people who have them are nearly always aware of their disorder. This helps diagnosis a great deal. Speaking to a psychologist or psychiatristis a useful first step in treating a phobia that has already been identified. If the phobia does not cause severe problems, most people find that simply avoiding the source of their fear helps them stay in control. Many people with specific phobias will not seek treatment as these fears are often manageable. It is not possible to avoid the triggers of some phobias, as is often the case with complex phobias. In these cases, speaking to a mental health professional can be the first step to recovery. Most phobias can be cured with appropriate treatment. There is no single treatment that works for every person with a phobia. Treatment needs to be tailored to the individual for it to work.
  • 15. Materials and Methods The locationfor my materialswould be on the internet and by individualinterview, picture story or photo voice and group discussions on websites for collectinginformation and time scale research should be about 7 weeks. Simply, my method for collecting and analysingwould be targeting ages around18 years and above also searching on the best recommended website and make interview at coffee and internet shops.
  • 16. Results The percentage of computer phobia that concerns most people with. Table 1:
  • 17. discussion, conclusions and recommendations Results reported in Table 1 demonstrate that,although 67% of students reported no computer phobia,and 23% reported low computer phobia, this still left 19% claimingto have moderate to high computer phobia on the Computer AnxietyRatingScale and Computer Thoughts Survey measures respectively. In conclusion,I found that phobia ofthe computer has been seriously important subject to reconsider after the results that we haveseen above in table 1, I havecontributed forthis research so we could feel safe when usinga computer without anxiety There is no limitation on this research I suppose because everyone I think wants to have and tell about these important data forourgeneration My recommendationsforfuture work in this research that is to make the life safe with using computer technologyand know how to use our computer and phones without fears and concerns. .
  • 18. Ethical considerations Ethicalconsiderationsduring the evaluationinclude: Informed consent. Voluntary participation. Do no harm. Confidentiality. Anonymity. Only assess relevant components
  • 20. Schedule Table Weak 9 Title page Dedication Acknowledgment Weak 10 Summary (abstract)Introduction and objectives Statement of the problem Weak 11 Research questions Hypothesis Significant and research outcomes Weak 12 Objectives Chapter 1: literature review Chapter 2: materials and methods Weak 13 Chapter 3: results Chapter 4: discussion,conclusions and recommendations Discussion Weak 14 Conclusions Recommendations Weak 15 Bibliography(references)Appendix