Assessment

Assessment

Digital Wellbeing Assessment Framework

Created by Olga Solovyeva, PhD

Introduction

This framework provides organizations and individuals with a structured approach to evaluate and improve their relationship with digital technology. It integrates cybersecurity practices with attention management strategies to create a comprehensive assessment of digital wellbeing.

How to Use This Framework

  1. Complete each assessment section by rating your current practices on a scale of 1-5
  1. Identify priority areas based on your lowest scores
  1. Implement the recommended actions for your priority areas
  1. Reassess after 3 months to track progress

Part 1: Organizational Assessment

1. Digital Communication Practices

Practice
1 (Poor)
3 (Adequate)
5 (Excellent)
Your Score
Communication channels
Multiple overlapping tools with no clear purpose
Defined channels but inconsistent usage
Clear guidelines for which tools to use when
Notification culture
Always-on expectations, immediate response pressure
Some boundaries but frequent interruptions
Thoughtful notification protocols with dedicated focus time
Meeting practices
Excessive, poorly structured digital meetings
Some meeting-free time blocks
Purposeful meetings with clear agendas and alternatives when appropriate
Email management
Overwhelming volume, no filtering systems
Basic organization but still distracting
Strategic email processing times and effective filtering
Score interpretation:
  • 16-20: Excellent digital communication hygiene
  • 11-15: Good practices with room for improvement
  • 6-10: Significant digital communication challenges
  • Below 6: Critical need for digital communication restructuring

2. Cybersecurity Integration

Practice
1 (Poor)
3 (Adequate)
5 (Excellent)
Your Score
Password management
Weak, reused passwords
Strong passwords but manual management
Password manager with unique, complex passwords
Two-factor authentication
Not implemented
Implemented for critical systems only
Universally implemented with hardware keys where possible
Update protocols
Irregular, often postponed
Regular but manual
Automated with verification system
Data protection awareness
Minimal understanding of risks
Basic training provided
Comprehensive, regular training with practical scenarios
Score interpretation:
  • 16-20: Strong security foundation
  • 11-15: Adequate security with vulnerabilities
  • 6-10: Significant security gaps
  • Below 6: Critical security vulnerabilities

3. Digital Workspace Design

Practice
1 (Poor)
3 (Adequate)
5 (Excellent)
Your Score
Device organization
Cluttered, disorganized
Basic organization
Strategic arrangement promoting focus
Software environment
Chaotic, overwhelming
Somewhat organized
Intentionally designed for focus
Digital distraction management
No controls in place
Basic blockers sometimes used
Comprehensive system limiting distractions
Physical/digital integration
Disconnected environments
Some integration
Thoughtfully integrated for optimal workflow
Score interpretation:
  • 16-20: Optimized digital workspace
  • 11-15: Functional workspace with distractions
  • 6-10: Disruptive digital environment
  • Below 6: Highly distracting digital workspace

Part 2: Individual Assessment

1. Attention Management

Practice
1 (Poor)
3 (Adequate)
5 (Excellent)
Your Score
Focus sessions
Rarely able to focus for >30 minutes
Can occasionally achieve deep focus
Regular periods of deep, uninterrupted work
Task switching awareness
Constant multitasking
Some batching of similar tasks
Strategic monotasking with minimal switches
Digital boundaries
Always available, immediate responses
Some boundaries but inconsistent
Clear, communicated boundaries with technology
Cognitive load awareness
Overwhelming information intake
Some filtering of inputs
Strategic information consumption
Score interpretation:
  • 16-20: Excellent attention management
  • 11-15: Good practices with room for improvement
  • 6-10: Significant attention management challenges
  • Below 6: Critical attention fragmentation issues

2. Personal Digital Security

Practice
1 (Poor)
3 (Adequate)
5 (Excellent)
Your Score
Account security
Same password across accounts
Different but memorable passwords
Unique, complex passwords with manager
Public Wi-Fi usage
Connects to any available network
Avoids sensitive transactions on public Wi-Fi
Uses VPN consistently on public networks
Phishing awareness
Difficulty identifying suspicious communications
Can identify obvious scams
Consistently verifies communication legitimacy
Device security
Minimal protection, no encryption
Basic protection measures
Comprehensive security with encryption
Score interpretation:
  • 16-20: Strong personal security practices
  • 11-15: Adequate security with some vulnerabilities
  • 6-10: Significant personal security gaps
  • Below 6: Critical personal security vulnerabilities

3. Digital-Life Balance

Practice
1 (Poor)
3 (Adequate)
5 (Excellent)
Your Score
Screen-free time
Rarely disconnected
Occasional unplugged periods
Regular, intentional digital breaks
Sleep hygiene
Screens used until bedtime
Some limits before sleep
Consistent screen curfew before bed
Physical movement
Prolonged sedentary screen time
Occasional movement breaks
Regular movement integrated with screen use
Mindful usage
Unconscious, habitual screen checking
Some awareness of digital habits
Intentional relationship with technology
Score interpretation:
  • 16-20: Healthy digital-life balance
  • 11-15: Reasonable balance with improvement areas
  • 6-10: Significant imbalance issues
  • Below 6: Critical digital-life imbalance

Part 3: Family Digital Wellbeing (For Parents/Caregivers)

1. Child Screen Management

Practice
1 (Poor)
3 (Adequate)
5 (Excellent)
Your Score
Time boundaries
No limits on screen time
Some time limits but inconsistent
Age-appropriate, consistent screen time limits
Content monitoring
Minimal awareness of content consumed
Basic content filtering
Active engagement with child's digital world
Device-free zones
Screens everywhere
Some screen-free areas
Well-established tech-free spaces and times
Digital role modeling
Adults constantly on devices
Some awareness of modeling behavior
Intentional modeling of healthy tech use
Score interpretation:
  • 16-20: Excellent family digital boundaries
  • 11-15: Good practices with room for improvement
  • 6-10: Significant family screen management challenges
  • Below 6: Critical need for family digital restructuring

2. Child Online Safety

Practice
1 (Poor)
3 (Adequate)
5 (Excellent)
Your Score
Safety conversations
Rarely discuss online safety
Occasional safety discussions
Regular, age-appropriate safety conversations
Privacy awareness
Minimal privacy considerations
Basic privacy settings enabled
Comprehensive privacy protection and education
Contact management
Unrestricted online interactions
Some oversight of online contacts
Active monitoring appropriate to child's age
Digital literacy education
Minimal guidance on evaluating content
Some discussion of critical thinking
Active education on information evaluation
Score interpretation:
  • 16-20: Strong child safety foundation
  • 11-15: Adequate protection with vulnerabilities
  • 6-10: Significant child safety gaps
  • Below 6: Critical child safety vulnerabilities

Action Planning Worksheet

Based on your assessment, identify your three lowest-scoring areas and complete the action plan below:

Priority Area 1: ________________________

Current score: _____
Three actions to improve:
        Target reassessment date: _____________________

        Priority Area 2: ________________________

        Current score: _____
        Three actions to improve:
              Target reassessment date: _____________________

              Priority Area 3: ________________________

              Current score: _____
              Three actions to improve:
                    Target reassessment date: _____________________

                    Additional Resources

                    For more detailed guidance on improving specific areas, refer to:
                    [Section under development]
                     

                    Olga Solovyeva, PhD | Good tech & Digital safety strategist | London, UK
                    © 2025 Good Tech Strategy. All rights reserved.
                     
                     
                    Built with Potion.so