Social Impact Of Social Media Use Intensity On Mental Health In The Form Of Apatic Attitude
DOI:
https://doi.org/10.34306/ijcitsm.v1i2.62Keywords:
Social Impact, Intensity of Use, Social Media, Mental health, TechnologyAbstract
Applied science in the revolutionary period grew very rapidly in the lives of citizens. The presence of a technology makes human life easier and more efficient. The various means provided by electronic communication, especially online media, are pushing for an increase in usage by young people. The intensity of using social media creates a different form of interaction than before. This is a process of adjustment to social fields in society. When young people really use social media, they are willing to sacrifice their mental condition, lack of skills in adapting to society and low social reaction or sensitivity. Overall called apathy. This research is to identify the extent of the impact of social media use on apathy in nearby areas. The research concept applied is analytic observational research with a cross sectional approach. Data collection is used to obtain primary needs by using a structured questionnaire. The data obtained were then analyzed using the univariate formula (frequency distribution formula) and bivariate (Pearson product moment formula). The final result shows the causes of mental health problems, the formation of apathy occurs if the intensity of social media use among young people. The relationship value is 0.528 and the significance value is p(<0.001) <0.05, with a positive direction so that the level of intensity of using social media continues to increase so that young people's attitudes continue to be apathetic
References
D. Immaniar, N. Azizah, D. Supriyanti, N. Septiani, and M. Hardini, “PoTS: Proof of Tunnel Signature for Certificate Based on Blockchain Technology,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 101–114, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/28.
D. Cahyadi, A. Faturahman, H. Haryani, E. Dolan, and S. millah, “BCS : Blockchain Smart Curriculum System for Verification Student Accreditation,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 65–83, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/20.
T. Ayuninggati, N. Lutfiani, and S. Millah, “CRM-Based E-Business Design (Customer Relationship Management) Case Study : Shoe Washing Service Company S-Neat-Kers,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 216–225, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/58.
M. Mulyati, I. Ilamsyah, A. Aris, iketut gunawan, and M. Suzaki Zahran, “Blockchain Technology: Can Data Security Change Higher Education Much Better?,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 121–135, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/36.
G. Maulani, G. Gunawan, L. Leli, E. Ayu Nabila, and W. Yestina Sari, “Digital Certificate Authority with Blockchain Cybersecurity in Education,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 136–150, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/40.
T. Nurhaeni, N. Lutfiani, A. Singh, W. Febriani, and M. Hardini, “The Value of Technological Developments Based on An Islamic Perspective,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 1–13, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/4.
N. P. Puji, A. Dudhat, H. Teja Sukmana, A. Mardiansyah, and M. Hardini, “Modern Technology Advances with Benefits for Humanity to Demonstrate Design with Conventional Sources Islamic,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 14–36, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/8.
B. Rawat and S. Purnama, “MySQL Database Management System (DBMS) On FTP Site LAPAN Bandung,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2, pp. 173–179, 2021.
P. Edastama, A. Dudhat, and G. Maulani, “Use of Data Warehouse and Data Mining for Academic Data : A Case Study at a National University,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 206–215, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/55.
P. Edastama, A. S. Bist, and A. Prambudi, “Implementation Of Data Mining On Glasses Sales Using The Apriori Algorithm,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 159–172, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/46.
Y. Durachman, A. Sean Bein, E. Purnama Harahap, T. Ramadhan, and F. Putri Oganda, “Technological and Islamic environments: Selection from Literature Review Resources,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 37–47, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/12.
D. Apriani, A. Williams, U. Rahardja, A. Khoirunisa, and S. Avionita, “The Use of Science Technology In Islamic Practices and Rules In The Past Now and The Future,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 48–64, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/16.
I. Y. Ruhiawati, A. P. Candra, and S. N. Sari, “Design and Build a Multimedia System for Indonesian Religious Activities Based on Android,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 233–239, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/64.
M. R. Anwar, R. Panjaitan, and R. Supriati, “Implementation Of Database Auditing By Synchronization DBMS,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 197–205, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/53.
W. Setyowati, R. Widayanti, and D. Supriyanti, “Implementation Of E-Business Information System In Indonesia : Prospects And Challenges,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 180–188, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/49.
S. Watini, T. Nurhaeni, and L. Meria, “Development Of Village Office Service Models To Community Based On Mobile Computing,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 2 SE-Articles, pp. 189–196, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/51.
A. Alwiyah, S. Husin, P. Padeli, M. Anggaraeni, and S. Sulistiawati, “Alignment of Science and Technology With Islamic Principles Using Quantum Theory,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 115–120, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/32.
T. Ramadhan, Q. Aini, S. Santoso, A. Badrianto, and R. Supriati, “Analysis of the potential context of Blockchain on the usability of Gamification with Game-Based Learning,” Int. J. Cyber IT Serv. Manag., vol. 1, no. 1 SE-Articles, pp. 84–100, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/24.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 Fifit Alfiah , Sifa Warohmah, Maria Fransiska Zehn Zehn Wahin, Maziyah Nur Annisa, Agung Kurniawan
This work is licensed under a Creative Commons Attribution 4.0 International License.