GoggleBox: Moderate Screen Use 'Boosts Teen Wellbeing'

A study of screen time and mental wellbeing among teenagers has suggested moderate use of devices may be beneficial in a connected world. The researchers collected self-reported data from 120,000 English 15-year-olds about their digital device habits.

They found a "Goldilocks effect" where a few hours of device-use seemed to boost mental wellbeing.

One developmental psychologist welcomed the paper but said there was still room for more study.

"Moderate engagement in digital activities is not harmful," notes the paper. In addition, the first hour or two of screen time was actually associated with an increase in mental wellbeing for those using computers, smartphones, video games and watching TV or films.

The Goldilocks effect:

  • Weekday use with a positive effect on wellbeing was described as follows:
  • Playing video games: One hour 40 minutes
  • Using a smartphone: One hour 57 minutes
  • Watching TV and films: Three hours 41 minutes
  • Using computers: Four hours 17 minutes
  • The effect was boosted at weekends, with the peak lasting up to four hours and 50 minutes when watching TV.

However, after this point a negative effect was reported.

The  Goldilocks effect" - refers to the version of the fairy story in which Goldilocks discovers, for instance, that the best porridge is neither too hot nor too cold.

Young people's screen time has increased with the rise of digital devices used at home. For example, children, including pre-schooler’s aged three and four, are spending eight hours and 18 minutes a week online on average, according to a recent report by Ofcom.

Their research stemmed from a larger survey about the habits of nearly 300,000 English 15-year-olds, explained co-author Andrew Przybylski at the University of Oxford.

"We found that the negative effect of screen time was about a third of the size as not getting regular sleep or a regular breakfast," he told the BBC. But Dr Przybylski acknowledged that most children don't simply use one device during the day - and in fact often use more than one concurrently, such as when texting a friend while watching TV.

Choose your Battles

He suggested that rather than totting up screen time and demanding that children stop using a device after a certain point, it might be more beneficial to negotiate longer sessions and suggest alternative activities when appropriate.

"It's not so much that it's bad for a kid to play Minecraft for 12 hours on a Sunday, it's that as parents we often don't have a valued activity that we put in place of that," he said. "It's much more important that the parents focus their limited attention and resources on picking smart battles - that might be more important than having an arbitrary cut-off."

In 2013, a Public Health England briefing paper warned that too much time in front of screens combined with a sedentary lifestyle was harming children's wellbeing and increasing their anxiety.

"A few simple steps, like regular physical activity and spending time together as a family at breakfast and dinner, can minimise young people's screen time and support their wellbeing," said Eustace de Sousa at Public Health England, reacting to today's research.

BBC:   

Give Children More Control Of Data Privacy:

 

« The Cyber Security Landscape: A Frightening Picture
Are Terrorists Winning The Digital Arms Race? »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

Digital Innovation Hub Slovenia (DIH)

Digital Innovation Hub Slovenia (DIH)

DIH Slovenia is a central hub providing services to grow digital competencies in areas including robotics, IoT, cyberphysical systems and cybersecurity.

C3.ai

C3.ai

The C3 AI Suite supports configurable, pre-built, high value AI applications for predictive maintenance, fraud detection, anti-money laundering, sensor network health and more.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

CNS Group

CNS Group

CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance.

Fly Ventures

Fly Ventures

Fly Ventures is a seed-stage venture capital fund for outstanding teams building Enterprise and Deep Tech startups in Europe.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

Mode Solutions

Mode Solutions

Mode guarantee IT performance where you need it most, creating seamless and secure solutions that will alleviate pressure from your business.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Netarx

Netarx

Netarx provide real-time deepfake detection for enterprise voice, video and email.