Skip to main content

Problematic Use Of Mobile Phones

Problematic use of mobile phones is an abnormal, but relatively widespread form of consumer consumption which has a range of negative social and financial consequences for many individuals. It is defined here as “a person’s perceived tendency to chronically use mobile phone services in excess of their needs and resources”. Although substantial research exists on problematic behavior in the tangible goods sector, our understanding of problematic consumption of a service-based ‘good’ like mobile phone use is limited.

Research is hampered by the current conceptual and psychometric measures, as well as few theoretical explanations of underlying mechanisms and drivers for this problematic behavior.

Mobile phones continue to alter our social and consumer landscape. Besides the numerous benefits mobile phone technology brings, some consumers are also experiencing a “darker side” to this service revolution.

Popular literature contains an increasing number of references to mobile phone addiction. A new body of academic literature in this area has now also emerged.

This contends that this literature has confounded the study of a problematic behavior, that is, problematic mobile  phone usage with its consequences and our understanding of this would benefit from greater consideration of consumer behavior ideas and theories.

File Type: PDF
File Size: 2.04 MB
Total Pages: 302

Direct Link Mega:
Download Now
Direct Link AnonFiles:
Download Now
Direct Link Mediafire:
Download Now
Direct Link Solidfiles:
Download Now
Direct Link Sabercathost:
Download Now
Direct Link Tusfiles:
Download Now


Popular posts from this blog

Web Hacking 101

With a Foreword written by HackerOne Co-Founders Michiel Prins and Jobert Abma, Web Hacking 101 is about the ethical exploration of software for security issues but learning to hack isn't always easy. With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different. Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties.

Hack-X-Crypt (By Ujjwal Sahay)

This is basically a straight forward guide towards ethical hacking and cyber security.Computer hacking is the practice of altering computer hardware and software to carry out a goal outside of the creator‘s original intention. People who slot in computer hacking actions and activities are often entitled as hackers. The majority of people assume that hackers are computer criminals. They fall short to identify the fact that criminals and hackers are two entirely unrelated things.

High Performance Cloud Auditing

This eBook mainly focuses on cloud security and high performance computing for cloud auditing. The eBook discusses emerging challenges and techniques developed for high performance semantic cloud auditing, and presents the state of the art in cloud auditing, computing and security techniques with focus on technical aspects and feasibility of auditing issues in federated cloud computing environments.