Feeds

Walking while texting can – OUCH! – end badly, say boffins

Prodding your mobe slows you down and limits your vision

Intelligent flash storage arrays

Scientists have proved what anyone walking down a crowded street in modern city knows: those who gaze at their phones while ambulating are a danger to themselves and others.

Detailed here at PLOS ONE in research titled “Texting and Walking: Strategies for Postural Control and Implications for Safety”, the authors explain that they subjected 26 test subjects to experiments in which they measured normal walking, walking while reading a phone and walking while sending a text message. Subjects were screened to ensure they were familiar with modern phones with QWERTY keyboards.

Eight cameras were used to record subjects' movement on an ~8.5m course and they captured all sorts of data: the paper says “Relative motion between the thorax and head (neck motion), and between pelvis and thorax (trunk motion) were obtained by subtracting the time series of the relevant angles of the lower segment from the higher segment.”

Those measurements lead to a very detailed discussion of kinematics and other exercise-related stuff that make the innards of a CPU seem comfortingly simple. Long story short, walking while looking at or using a phone changes your gait and reduces your ability to walk in straight line, partly because your head actually moves a bit more than is usually the case.

“In a pedestrian environment inability to maintain a straight path would be likely to increase potential for collisions, trips and traffic accidents,” the paper suggests, backing up the observation that “Nine of 26 (35%) participants reported a previous accident while texting on their mobile phone, including falls, trips and collisions with obstacles or other individuals”.

So there you have it: that person you had to avoid on the way home yesterday lest their insistence on doing something with their phone led to a shirt-fronting is a dangerous symptom of the modern world. Something clearly Must Be Done. Unless they were reading The Reg, in which case all is forgiven. ®

Texting and Walking: Strategies for Postural Control and Implications for Safety

TXTing while walking sends you on a dangerous course

Providing a secure and efficient Helpdesk

More from The Register

next story
SECRET U.S. 'SPACE WARPLANE' set to return from SPY MISSION
Robot minishuttle X-37B returns after almost 2 years in orbit
No sail: NASA spikes Sunjammer
'Solar sail' demonstrator project binned
LOHAN crash lands on CNN
Overflies Die Welt en route to lively US news vid
You can crunch it all you like, but the answer is NOT always in the data
Hear that, 'data journalists'? Our analytics prof holds forth
Experts brand LOHAN's squeaky-clean box
Phytosanitary treatment renders Vulture 2 crate fit for export
Carry On Cosmonaut: Willful Child is a poor taste Star Trek parody
Cringeworthy, crude and crass jokes abound in Steven Erikson’s sci-fi debut
Origins of SEXUAL INTERCOURSE fished out of SCOTTISH LAKE
Fossil find proves it first happened 385 million years ago
America's super-secret X-37B plane returns to Earth after nearly TWO YEARS aloft
674 days in space for US Air Force's mystery orbital vehicle
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.