Browse Definitions :
Definition

brain hijacking

Brain hijacking is the application of principles from fields including neuroscience, behavioral psychology and sociology to develop compulsive elements for consumer technologies.

Developers created the term as a reference to the way those compelling mechanisms capture the users' attention and overcome their conscious intention. The effort is intended to make these technologies more addictive to the users so that they spend more time with them, which results in more profit for designers, content owners and marketers. Brain hijacking efforts typically focus on user interfaces, software, Mobile apps, social media, games and marketing content.

Here are some methods designed to hijack user attention:

Autoplay videos, such as those on YouTube and Netflix keep a steady flow of videos so that the user who set out to watch a single video or episode finds themselves sitting through several in a row.

Facebook uses algorithms to tailor techniques to the individual, for example identifying when a teenager might be likely to feel insecure and in need of a confidence boost.

On Snapchat, a feature called Snapstreaks encourages near-constant communication.

"Likes" for posts on social media sites can be delayed for delivery when it has been determined that the user is likely to leave the site or app, in the attempt to make them stay longer.

The intermittent delivery of rewards is a tactic borrowed from operant conditioning, where researchers discovered that giving rewards at irregular intervals was the most effective reinforcement schedule.

This was last updated in May 2018

Continue Reading About brain hijacking

Networking
  • network management system

    A network management system, or NMS, is an application or set of applications that lets network engineers manage a network's ...

  • host (in computing)

    A host is a computer or other device that communicates with other hosts on a network.

  • Network as a Service (NaaS)

    Network as a service, or NaaS, is a business model for delivering enterprise WAN services virtually on a subscription basis.

Security
  • WebAuthn API

    The Web Authentication API (WebAuthn API) is a credential management application program interface (API) that lets web ...

  • Common Vulnerability Scoring System (CVSS)

    The Common Vulnerability Scoring System (CVSS) is a public framework for rating the severity of security vulnerabilities in ...

  • Dridex malware

    Dridex is a form of malware that targets victims' banking information, with the main goal of stealing online account credentials ...

CIO
  • audit program (audit plan)

    An audit program, also called an audit plan, is an action plan that documents what procedures an auditor will follow to validate ...

  • blockchain decentralization

    Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.

  • outsourcing

    Outsourcing is a business practice in which a company hires a third party to perform tasks, handle operations or provide services...

HRSoftware
  • team collaboration

    Team collaboration is a communication and project management approach that emphasizes teamwork, innovative thinking and equal ...

  • employee self-service (ESS)

    Employee self-service (ESS) is a widely used human resources technology that enables employees to perform many job-related ...

  • learning experience platform (LXP)

    A learning experience platform (LXP) is an AI-driven peer learning experience platform delivered using software as a service (...

Customer Experience
  • market segmentation

    Market segmentation is a marketing strategy that uses well-defined criteria to divide a brand's total addressable market share ...

  • sales pipeline

    A sales pipeline is a visual representation of sales prospects and where they are in the purchasing process.

  • market basket analysis

    Market basket analysis is a data mining technique used by retailers to increase sales by better understanding customer purchasing...

Close