Feeds

The internet is for violent jerks, study finds

...or violent jerks are for the internet

High performance access to file storage

Does the internet change folks into assholes? Or do assholes just naturally gravitate to using the internet?

While the question may never truly be answered by modern science, new research suggests the asshole-to-user ratio isn't just in your imagination.

In a study of 9,405 Taiwanese teenagers, a team of researchers at Kaohsiung Medical University in Taiwan claim those with signs of "internet addiction" were more likely to say they've hit, shoved, or threatened someone in the past year. The findings were published online by the Journal of Adolescent Health.

The boffins labeled about 25 per cent of the boys and 13 per cent of the girls as internet addicts, based on questioners about their online and offline behavior. According to the team, signs of addiction include a preoccupation with online activities, "withdrawal" symptoms like irritability if unable to access the internet, and skipping real-world endeavors in favor of the warming glow of a monitor.

While 13 per cent of all the female students and 32 per cent of the males reported aggressive behavior in the past year, 37 per cent of those profiled as addicted reported a toss-up.

That doesn't seem like a huge jump for males, but the researchers say the bump could be the result of activities like online video games and sexually-oriented web sites positively enforcing aggressive behavior.

Or, of course, it could be that jerks just love the 'net.

Whether internet addiction itself deserves our skeptical "quotation marks" on first reference is a subject of debate amongst brain dysfunction connoisseurs.

Some believe being hooked on cyberspace is an actual clinical disorder suffered largely by "highly educated, socially awkward men" and making serious headway with middle-aged women spending hours on their computers.

China's ministry of health defines a 'net addict as someone who spends at least six hours a day on the web and suffers sleeplessness, lack of concentration, and yearnings to get back online.

Bootnote

Others — as I'm told on internet message boards — believe 'net addicts are a bunch of pansies that need to walk it off or get smacked right in the mouth. Then again, it's probably not a good idea to consult the assholes. ®

High performance access to file storage

More from The Register

next story
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.