Feeds

Users smash up PCs in outbreaks of network rage

Survey reveals mice are frequently assaulted – cables ripped out, balls stomped on etc

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Violent acts against computers have become such a problem that behavioural psychologists have branded this digital vandalism as "network rage." Eighty-three per cent of network managers surveyed reported abusive and often violent behaviour by users as a result of computer problems. Acts of wanton violence resulted in shattered monitors, smashed keyboards and kicked-in hard drives. Sometimes the PC GBH was so bad it was impossible to make out the identity of mice that had been flung across a room -- their plastic shells dashed against walls and shattered into tiny fragments. "When people are under a lot of pressure from supervisors and managers to meet tight deadlines, they can become frustrated and lose control of their temper," said Boston-based psychologist Dr Will Calmas. "Instead of voicing their frustrations to their supervisors, some people choose to take out their aggression on inanimate objects -- in this case, their monitor, keyboard or mouse." According to the survey conducted by Concord Communications, the number one piece of equipment broken during an act of network rage is the keyboard. Broken mice and shattered monitors tied for second place and kicked-in hard drives placed third. One network manager who asked to remain anonymous said: "I had a user who complained that her cursor would not move, so she would repeatedly slap the terminal on one side to move it." And another told of how one irate woman was close to breaking point after being unable to send any e-mail. "After I calmed her down, I asked to see a sample of an email message she was trying to send. The email address included street name, town, county and full postal code." * If you've witnessed network rage first hand -- or wish to admit to battering a PC from time to time -- why not share your experiences at The Register's Message Board. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Hey Brit taxpayers. You just spent £4m on Central London ‘innovation playground’
Catapult me a Mojito, I feel an Digital Innovation coming on
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
EU probes Google’s Android omerta again: Talk now, or else
Spill those Android secrets, or we’ll fine you
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.