Internet Addiction and Attachment Styles A Study on Tunisian Medical Students

Introduction

Prevalence of Internet Addiction Among Medical Student

A cross-sectional study involving 135 medical students at the Faculty of Medicine of Monastir revealed that 23.7% of students were addicted to the Internet. The average daily Internet use was 3.5 hours, with chatting (94.8%) and downloading activities (78.5%) being the most common.

Key Findings:

  • Internet addiction was significantly linked to:
    • School failure
    • Alcohol use
    • Low self-esteem
  • Students spent extensive time on Facebook, primarily for chatting and following news.
  • Establishing online romantic relationships appeared to be a protective factor against Internet addiction.

The Role of Attachment Styles

Attachment theory suggests that early relationships influence how people form emotional connections. This study highlighted:

  • 50.4% of students had a dismissive attachment style.
  • 21.5% had a preoccupied style.
  • 15.6% had a secure attachment style.
  • 12.6% had a fearful attachment style.

Students with fearful attachment styles were more likely to develop Internet addiction, while those with secure attachment styles were less likely to be addicted.

The American Psychological Association emphasizes the importance of early secure attachments in preventing various behavioral addictions, including Internet addiction.

Psychological Implications and Broader Impact

  • Low self-esteem was a significant predictor of Internet addiction.
  • Students who spent more than 4 hours online daily had a higher risk of developing Internet addiction.

Key Takeaways

  • Prevalence of Internet addiction among Tunisian medical students is alarmingly high (23.7%).
  • Fearful attachment style increases the risk of Internet addiction.
  • Secure attachment and online romantic relationships may serve as protective factors.
  • Low self-esteem and problematic behaviors like school failure and substance use are strong predictors of Internet addiction.

Call-to-Action

Disclaimer: This content is generated using AI assistance and should be reviewed for accuracy and compliance before considering this article and its contents as a reference. Any mishaps or grievances raised due to the reusing of this material will not be handled by the author of this article.