College of Telecom and Electronics
Phobia of using Computer
Project.
INSA483 : Research Phobia of using computer
Lecture: dr.Ibrahim
Research Proposal
To study the use of computer without having any fear.
Name: Abdulaziz Alnaeem
ID: 439232084
Email: azoooz-303@hotmail.com
Year of Study: 2019
Abstract
In this research I will do searching about the fears
and the concerns of using a computer for some people
who do not know much of the computer problems and
how to be totally safe with it.
INTRODUCTION
The problem of computer phobia or techno phobia has been
widely researched over the last few decades, and in spite of
consistent findings, a series of myths have been perpetuated.
For example, it was commonly and erroneously believed that
women are more computer phobic than men, that older
people are more computer phobic than younger people and
that students are less computer phobic than non-students.
Many studies have shown that when previous experience is
controlled for, the between group differences disappear.
Moreover, it has been found that the percentage of students
who can be classified as computer phobic (ranging from low
to high), has been around 25%, and this does not differ
substantially from the normal population.
OBJECTIVES
What am I trying to achieve?
the study has been conducted with following main
objectives: -
1- to study the fear of using a computer.
2- to know the treatments of using a computer.
3- finally,to feel safe when using a computer.
Research Question
The research question is about How
to treat and find solutions for people
who have concerns in using the
computer..?
ABRIDGED TABLE OF CONTENTS
1. Technophobia
2.Nomophobia
3.Cyberphobia
4.Telephonophobia
5.Selfie phobia
6.Treatment of computer phobia
7. List OF References
8. Schedule Table
Technophobia
Technophobia Is the fear or dislike of advanced
technology. Or complex devices, especially
computers.
Although there are numerous interpretations of
technophobia, they become more complex as
technology continues to evolve. The term is
generally used in the sense of an irrational fear, but
others contend fears are justified.
Nomophobia
The fear of being without a mobile phone stems
from addiction. When a person feels physically or
mentally dependent on anything, s/he cannot find a
way of stopping that addiction.
People tend to experience this phobia when they are
insecure, or have lack of self-control and discipline,
get easily bored or impatient, or have no other
recreational hobbies and outlets etc.
Cyberphobia
Cyberphobia is a fear of working with computers.
People who have cyberphobia are afraid or not able to
learn new technologies. It is a type of specific phobia. It
was first used in 1985.
While many people feel completely comfortable using
computers, navigating the Internet, or installing
applications on their phones, others find themselves
terrified of these things — they have some degree of
cyberphobia.
Telephonophobia
is a reluctance or fear of making or taking? phone calls,
literally, "fear of telephones". It is considered to be a
type of social phobia or social anxiety. It may be
compared to glossophobia, in that both arise from
having to engage with an audience, and the associated
fear of being criticized, judged or made a fool of.
Selfie phobia
With the popularityof selfies, it's no surprise "selfie
phobia"has become widely used. Althoughit has not been
verified by professionals, the term has been floating
around the Internet.
There are various reasons as to why people are selfie
phobic. Some may not think they are photogenic,while
others may see it as a cry for attentionor a superficial act.
NPR suggested a few present-day phobias,and selfie
phobic was first on its list.
Treatments of the computer phobia
Phobias are highly treatable, and people who have them are
nearly always aware of their disorder. This helps diagnosis a
great deal.
Speaking to a psychologist or psychiatristis a useful first step in
treating a phobia that has already been identified. If the phobia
does not cause severe problems, most people find that simply
avoiding the source of their fear helps them stay in control.
Many people with specific phobias will not seek treatment as
these fears are often manageable.
It is not possible to avoid the triggers of some phobias, as is
often the case with complex phobias. In these cases, speaking to
a mental health professional can be the first step to recovery.
Most phobias can be cured with appropriate treatment. There is
no single treatment that works for every person with a phobia.
Treatment needs to be tailored to the individual for it to work.
Design
 First, my decisionsfor Designing this research that I will
find data aboutwho do have fears and some anxiety of
computer
 Second, the location would be on the internet websites
for collecting informationand time scale research
should be about 7 weeks.
 Third, my research procedures for sources, selecting
participantsand analyzing data will be on doing an
interview with people and social media.
 Finally,the method for collecting data is by individual
interview, picture story or photo voice and group
discussions on websites.
methodology and procedures
Simply, my method for collecting and analysingwould be
targeting ages around18 years and above also searching
on the best recommended website and make interview at
coffee and internet shops.
Ethical considerations
Ethicalconsiderationsduring the evaluationinclude:
Informed consent.
Voluntary participation.
Do no harm.
Confidentiality.
Anonymity.
Only assess relevant components
Delimitation and limitation of research
There is no limitation on this research I suppose
because everyone I think wants to have and tell about
these important data for our generation.
Also, I have delimitation but some boundaries of this
topic that I do not take information from someone
without his knowing.
REFERENCES
Introduction:
https://www.researchgate.net/publication/223632022_Computer_phob
ia_and_computer_self-
efficacy_Their_association_with_undergraduates'_use_of_university_co
mputer_facilities
Technophobia
https://en.wikipedia.org/wiki/Technophobia
Nomophobia
https://www.fearof.net/fear-of-being-without-a-mobile-phone-phobia-
nomophobia/
Cyberphobia
https://www.vocabulary.com/dictionary/cyberphobia
Telephonophobia
https://en.wikipedia.org/wiki/Telephone_phobia
Selfie phobia
https://mashable.com/2014/08/02/tech-phobias/
Treatments of the computer phobia
https://www.medicalnewstoday.com/articles/249347.php
Schedule Table
Weak 9 Title page
Dedication Acknowledgment
Weak 10 Summary (abstract)Introduction
and objectives Statement of the
problem
Weak 11 Research questions Hypothesis
Significant and research outcomes
Weak 12 Objectives Chapter 1: literature
review
Chapter 2: materials and methods
Weak 13 Chapter 3: results
Chapter 4: discussion,conclusions
and recommendations Discussion
Weak 14 Conclusions Recommendations
Weak 15 Bibliography(references)Appendix

More Related Content

PDF
Sap erp
PDF
IT Service Desk Software RFP Template
PPT
Application support requirements & processes
PDF
ITChamps HCM and SuccessFactors Solutions
PDF
sap fiori architecture
PPTX
TOPdesk Service Excellence Maturity Model
PDF
ServiceNow Configuration Management Database
PDF
Einstieg in relationale Datenbanken mit MySQL (Folien)
Sap erp
IT Service Desk Software RFP Template
Application support requirements & processes
ITChamps HCM and SuccessFactors Solutions
sap fiori architecture
TOPdesk Service Excellence Maturity Model
ServiceNow Configuration Management Database
Einstieg in relationale Datenbanken mit MySQL (Folien)

What's hot (14)

PPTX
Enterprise architecture-career-path
PDF
Application Portfolio Management
PPT
G A InfoMart Cognos TM1 planning budgeting-forecasting solution
PDF
OpenText Archive Server on Azure
PDF
The Future of the Digital Economy and SAP's Role
PPTX
SAP Basic Introduction
PPTX
SAP HANA - Understanding the Basics
PPTX
Dynamics 365 for Finance and Operations - Power BI
PPTX
Everything You Need to Build a Risk-Based Testing Strategy for SAP
ODP
Introduction to SAP ERP
PPTX
Introduction to sap
PPTX
SAP Overview and Architecture
PDF
Business one ppt
PPTX
Original: Lean Data Model Storming for the Agile Enterprise
Enterprise architecture-career-path
Application Portfolio Management
G A InfoMart Cognos TM1 planning budgeting-forecasting solution
OpenText Archive Server on Azure
The Future of the Digital Economy and SAP's Role
SAP Basic Introduction
SAP HANA - Understanding the Basics
Dynamics 365 for Finance and Operations - Power BI
Everything You Need to Build a Risk-Based Testing Strategy for SAP
Introduction to SAP ERP
Introduction to sap
SAP Overview and Architecture
Business one ppt
Original: Lean Data Model Storming for the Agile Enterprise
Ad

Similar to Phobia Of Computer (20)

DOCX
Thesis
DOCX
Phobia Of Computer
PPTX
Technophobia
PPTX
Computer Anxiety
PDF
Techno-Phobia (Technology related Phobias)
PPT
Communication
 
PPT
Technophobia
PPT
Lectio Praecursoria
PPTX
Anxiety and computer mediated communicaton
PPTX
The phobia and its cure
PPTX
The phobia and its cure
DOCX
PPTX
38 FEARS ABOUT COMPUTER TECHNOLOGY
PPTX
Fears about technology bushra h
PPTX
38 FEARS ABOUT COMPUTER TECHNOLOGY
PPTX
Fears about technology bushra h
KEY
Parent Technology Certificate Session 3
PDF
Unraveling Phobia
PPTX
Phobia ( Psychologhy project)
PPTX
Media-and-Information-Literagcy-Quarter-1-Module-7-Digital-Divide-Addiction-a...
Thesis
Phobia Of Computer
Technophobia
Computer Anxiety
Techno-Phobia (Technology related Phobias)
Communication
 
Technophobia
Lectio Praecursoria
Anxiety and computer mediated communicaton
The phobia and its cure
The phobia and its cure
38 FEARS ABOUT COMPUTER TECHNOLOGY
Fears about technology bushra h
38 FEARS ABOUT COMPUTER TECHNOLOGY
Fears about technology bushra h
Parent Technology Certificate Session 3
Unraveling Phobia
Phobia ( Psychologhy project)
Media-and-Information-Literagcy-Quarter-1-Module-7-Digital-Divide-Addiction-a...
Ad

Recently uploaded (20)

PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Five Habits of High-Impact Board Members
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Build Your First AI Agent with UiPath.pptx
Improvisation in detection of pomegranate leaf disease using transfer learni...
TEXTILE technology diploma scope and career opportunities
Comparative analysis of machine learning models for fake news detection in so...
A review of recent deep learning applications in wood surface defect identifi...
Five Habits of High-Impact Board Members
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Final SEM Unit 1 for mit wpu at pune .pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
STKI Israel Market Study 2025 version august
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
sbt 2.0: go big (Scala Days 2025 edition)
Developing a website for English-speaking practice to English as a foreign la...
Consumable AI The What, Why & How for Small Teams.pdf
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Flame analysis and combustion estimation using large language and vision assi...
Taming the Chaos: How to Turn Unstructured Data into Decisions
A proposed approach for plagiarism detection in Myanmar Unicode text
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor

Phobia Of Computer

  • 1. College of Telecom and Electronics Phobia of using Computer Project. INSA483 : Research Phobia of using computer Lecture: dr.Ibrahim Research Proposal To study the use of computer without having any fear. Name: Abdulaziz Alnaeem ID: 439232084 Email: azoooz-303@hotmail.com Year of Study: 2019
  • 2. Abstract In this research I will do searching about the fears and the concerns of using a computer for some people who do not know much of the computer problems and how to be totally safe with it.
  • 3. INTRODUCTION The problem of computer phobia or techno phobia has been widely researched over the last few decades, and in spite of consistent findings, a series of myths have been perpetuated. For example, it was commonly and erroneously believed that women are more computer phobic than men, that older people are more computer phobic than younger people and that students are less computer phobic than non-students. Many studies have shown that when previous experience is controlled for, the between group differences disappear. Moreover, it has been found that the percentage of students who can be classified as computer phobic (ranging from low to high), has been around 25%, and this does not differ substantially from the normal population.
  • 4. OBJECTIVES What am I trying to achieve? the study has been conducted with following main objectives: - 1- to study the fear of using a computer. 2- to know the treatments of using a computer. 3- finally,to feel safe when using a computer.
  • 5. Research Question The research question is about How to treat and find solutions for people who have concerns in using the computer..?
  • 6. ABRIDGED TABLE OF CONTENTS 1. Technophobia 2.Nomophobia 3.Cyberphobia 4.Telephonophobia 5.Selfie phobia 6.Treatment of computer phobia 7. List OF References 8. Schedule Table
  • 7. Technophobia Technophobia Is the fear or dislike of advanced technology. Or complex devices, especially computers. Although there are numerous interpretations of technophobia, they become more complex as technology continues to evolve. The term is generally used in the sense of an irrational fear, but others contend fears are justified.
  • 8. Nomophobia The fear of being without a mobile phone stems from addiction. When a person feels physically or mentally dependent on anything, s/he cannot find a way of stopping that addiction. People tend to experience this phobia when they are insecure, or have lack of self-control and discipline, get easily bored or impatient, or have no other recreational hobbies and outlets etc.
  • 9. Cyberphobia Cyberphobia is a fear of working with computers. People who have cyberphobia are afraid or not able to learn new technologies. It is a type of specific phobia. It was first used in 1985. While many people feel completely comfortable using computers, navigating the Internet, or installing applications on their phones, others find themselves terrified of these things — they have some degree of cyberphobia.
  • 10. Telephonophobia is a reluctance or fear of making or taking? phone calls, literally, "fear of telephones". It is considered to be a type of social phobia or social anxiety. It may be compared to glossophobia, in that both arise from having to engage with an audience, and the associated fear of being criticized, judged or made a fool of.
  • 11. Selfie phobia With the popularityof selfies, it's no surprise "selfie phobia"has become widely used. Althoughit has not been verified by professionals, the term has been floating around the Internet. There are various reasons as to why people are selfie phobic. Some may not think they are photogenic,while others may see it as a cry for attentionor a superficial act. NPR suggested a few present-day phobias,and selfie phobic was first on its list.
  • 12. Treatments of the computer phobia Phobias are highly treatable, and people who have them are nearly always aware of their disorder. This helps diagnosis a great deal. Speaking to a psychologist or psychiatristis a useful first step in treating a phobia that has already been identified. If the phobia does not cause severe problems, most people find that simply avoiding the source of their fear helps them stay in control. Many people with specific phobias will not seek treatment as these fears are often manageable. It is not possible to avoid the triggers of some phobias, as is often the case with complex phobias. In these cases, speaking to a mental health professional can be the first step to recovery. Most phobias can be cured with appropriate treatment. There is no single treatment that works for every person with a phobia. Treatment needs to be tailored to the individual for it to work.
  • 13. Design  First, my decisionsfor Designing this research that I will find data aboutwho do have fears and some anxiety of computer  Second, the location would be on the internet websites for collecting informationand time scale research should be about 7 weeks.  Third, my research procedures for sources, selecting participantsand analyzing data will be on doing an interview with people and social media.  Finally,the method for collecting data is by individual interview, picture story or photo voice and group discussions on websites.
  • 14. methodology and procedures Simply, my method for collecting and analysingwould be targeting ages around18 years and above also searching on the best recommended website and make interview at coffee and internet shops.
  • 15. Ethical considerations Ethicalconsiderationsduring the evaluationinclude: Informed consent. Voluntary participation. Do no harm. Confidentiality. Anonymity. Only assess relevant components
  • 16. Delimitation and limitation of research There is no limitation on this research I suppose because everyone I think wants to have and tell about these important data for our generation. Also, I have delimitation but some boundaries of this topic that I do not take information from someone without his knowing.
  • 18. Schedule Table Weak 9 Title page Dedication Acknowledgment Weak 10 Summary (abstract)Introduction and objectives Statement of the problem Weak 11 Research questions Hypothesis Significant and research outcomes Weak 12 Objectives Chapter 1: literature review Chapter 2: materials and methods Weak 13 Chapter 3: results Chapter 4: discussion,conclusions and recommendations Discussion Weak 14 Conclusions Recommendations Weak 15 Bibliography(references)Appendix