Mobile phones are penis extensions

Pub research proves it

  • alert
  • submit to reddit

7 Elements of Radically Simple OS Migration

Mobile phones are penis extensions, with men more interested in using the devices to snare a shag than for business purposes.

That's according to a study of Liverpool lads, who apparently like nothing more than to get their phones out and play and fiddle with them in public places. Not so with women, who prefer to keep them safely stashed away in handbags until needed.

And the higher the percentage of males to females, the more the testosterone-packed behaviour increases.

Researchers from the University of Liverpool decided the best way to check out this mobile phone theory was to go down the pub, and got to spend 23 evenings doing just that over a four-month period.

Purely in the interests of science, of course.

Hanging around Liverpool's drinking establishments, they found men liked to sit their phones on the table, move them around, check the battery, and generally make sure everyone saw they had one.

Thirty-two per cent of the men were seen to have a mobile, compared to just 13 per cent of women, The New York Times reported.

And as male rivalry increased, so did the behaviour - researchers compared it to male peacocks fanning out their feathers when more suitors were around.

"What's being displayed here is not so much wealth as social importance, and the fact that you're plugged into a social network and are important enough to be able to be reachable all the time," said Dr Geoffrey Miller, a psychologist at UCLA and author of The Mating Mind.

The research was inspired after nightclubs in South America started asking for mobiles to be checked at the door - and it turned out that a large number of them were fake.

The study, entitled "Mobile Phones as Lekking Devices among Human Males", can be found in the current edition of the journal Human Nature. ®

*A lek is a communal mating area in nature where males strut their stuff and females get their pick of the crop.

Related Stories

Queen in mobe clampdown
Why mobiles may fade but cigarettes are here forever
Kids give up fags for mobiles
Man fined for rude SMS
Brits buy 3.6 million mobile phones during summer

Best practices for enterprise data

More from The Register

next story
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Microsoft says 'weird things' can happen during Windows Server 2003 migrations
Fix coming for bug that makes Kerberos croak when you run two domain controllers
Cisco says network virtualisation won't pay off everywhere
Another sign of strain in the Borg/VMware relationship?
prev story


7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?