wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

The “High” of ‘likes’, ‘follows’, and ‘views’ – and how I decided to respond to them myself.

profile
Verlyn
Sep 09, 2019
0 Likes
0 Discussions
613 Reads
I could begin by quoting what a lot of parents have told me, whether in or outside my practice about their children’s incessant internet and device usage. But I’m sure you’ve either said them or heard them in surplus. (I would still like to believe that I can say: not long ago), I remember as a teenager, the “high” that ebbed like a wave, every time I got a notification of a follow request, or a like and comment on a photograph or a post. Now that I understand this phenomenon better, each notification served as a reward and lit up that part of the brain which led to pleasure and made me happy. A one and a half year break from most of these social media sites put things into perspective for me. During this part ‘Digital Detox’ I was involved with my Master’s dissertation which focused on Gratitude. I am extremely grateful to my elderly participant who showed me the beneficial impact it had on their lives and truly motivated me to employ it every where. Recently, I joined most of the popular social networks recently as a platform to inform people about ‘ImPerfect’ and spread awareness. I now respond to each notification with gratitude. I am so thankful that each new person on any of the platforms will gain some new awareness and perspective on Mental Health. Each like or comment is a feedback that points me to the required direction of improvement. These ways of thinking or responding are conscious decisions made by me, every time the device beeps. It is difficult. I have only been able to alter my response as a result of accepting myself, and understanding the importance of how I think about myself. More on the importance of self-acceptance, how to enhance it in yourself and children, in the next post – Acceptance, Love & Care – Do We Show It To Ourselves?

Comments ()


Sign in

Read Next

Virtual memory

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Should you be using a mouthwash? Know from the experts

Blog banner

How to tie a Tie

Blog banner

The Memory Hierarchy

Blog banner

Deadlock and Starvation

Blog banner

From Procrastinator to Performer: How to Beat the Last-Minute Rush

Blog banner

BUSINESS MODELS OF E COMMERCE

Blog banner

LiquidPlanner

Blog banner

Have You Explored India Yet?

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

Understanding Univariate, Bivariate, and Multivariate Analysis in Data Science

Blog banner

Operating system

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Sweet and Sour Mango Pickle (Gol Keri)

Blog banner

Oracle Corporation

Blog banner

Studying Denial of service attack using DOSHTTP tool

Blog banner

Memory Management

Blog banner

Disk Scheduling

Blog banner

Bots and Cyber Security

Blog banner

Memory Partitioning

Blog banner

Vulnerability Assessment (Vulnerability Analysis)

Blog banner

bulk email software

Blog banner

Security and E-mail

Blog banner

Modern Operating System

Blog banner

Emailing the merger document

Blog banner

WomenEmpowerment

Blog banner

operating system

Blog banner

THE ROLE OF CYBER FORENSICS IN CRIMINOLOGY

Blog banner

Self-love: Being the reason of your own smile

Blog banner

What is Spyware? and examples of them.

Blog banner

SECURITY RISKS OF REMOTE WORKING

Blog banner

Service stratergy principles

Blog banner

Pooja Silver

Blog banner

Deadlock

Blog banner

What is Brute Force Attack? How to defend against it?

Blog banner

Hypothesis Testing in Data Science

Blog banner

Water Resources are about to exhaust...

Blog banner

Man In The Middle Attack

Blog banner

Pipedrive

Blog banner

Deadlock in operating system

Blog banner