wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The “High” of ‘likes’, ‘follows’, and ‘views’ – and how I decided to respond to them myself.

profile
Verlyn
Sep 09, 2019
0 Likes
0 Discussions
613 Reads
I could begin by quoting what a lot of parents have told me, whether in or outside my practice about their children’s incessant internet and device usage. But I’m sure you’ve either said them or heard them in surplus. (I would still like to believe that I can say: not long ago), I remember as a teenager, the “high” that ebbed like a wave, every time I got a notification of a follow request, or a like and comment on a photograph or a post. Now that I understand this phenomenon better, each notification served as a reward and lit up that part of the brain which led to pleasure and made me happy. A one and a half year break from most of these social media sites put things into perspective for me. During this part ‘Digital Detox’ I was involved with my Master’s dissertation which focused on Gratitude. I am extremely grateful to my elderly participant who showed me the beneficial impact it had on their lives and truly motivated me to employ it every where. Recently, I joined most of the popular social networks recently as a platform to inform people about ‘ImPerfect’ and spread awareness. I now respond to each notification with gratitude. I am so thankful that each new person on any of the platforms will gain some new awareness and perspective on Mental Health. Each like or comment is a feedback that points me to the required direction of improvement. These ways of thinking or responding are conscious decisions made by me, every time the device beeps. It is difficult. I have only been able to alter my response as a result of accepting myself, and understanding the importance of how I think about myself. More on the importance of self-acceptance, how to enhance it in yourself and children, in the next post – Acceptance, Love & Care – Do We Show It To Ourselves?

Comments ()


Sign in

Read Next

Operating Systems Overview

Blog banner

RAID

Blog banner

Who decides your overthinking, anyway?

Blog banner

Deadlock and starvation

Blog banner

Hacking

Blog banner

Supervised and Unsupervised Learning

Blog banner

What is service level Agreement?

Blog banner

EFT

Blog banner

Uniprocessor Scheduling

Blog banner

Deadlock in operating system

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Python as a tool for Data science task & project

Blog banner

INTERNET

Blog banner

How To Setup DVWA Using XAMPP on Windows

Blog banner

Virtualization

Blog banner

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

File management in os

Blog banner

How can denial-of-service(Dos) attacks be prevented?

Blog banner

OS Evolution Achievements

Blog banner

RAID_142

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Banaras

Blog banner

Assignment 2

Blog banner

The Five Steps of Data Science

Blog banner

social media issue

Blog banner

File Management In OS

Blog banner

Therapy Myths That Need to End in 2025

Blog banner

Logical and physical address

Blog banner

Virtual memory in windows

Blog banner

History of Money

Blog banner

Yoga in INDIA and ABROAD

Blog banner

Memory heirchy

Blog banner

How return on investment is defined in IT services

Blog banner

Information of meesho company

Blog banner

LinkedIn

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

"Audit" In Data Science

Blog banner

Wiretapping

Blog banner

Memory management

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner