Browse Definitions :
Definition

filter bubble

A filter bubble is an algorithmic bias that skews or limits the information an individual user sees on the internet. The bias is caused by the weighted algorithms that search engines, social media sites and marketers use to personalize user experience (UX).

The goal of personalization is to present the end user with the most relevant information possible, but it can also cause a distorted view of reality because it prioritizes information the individual has already expressed interest in. The data used to personalize user experience and create an insulating bubble comes from many sources, including the user’s search history, browsing choices and previous interaction with web pages.

Filter bubbles, which affect an individual's online advertisements, social media newsfeeds and web searches, essentially insulate the person from outside influences and reinforce what the individual already thinks. The word bubble, in this context, is a synonym for isolation; its context comes from a medical device called the isolator, a plastic bubble that was infamously used to sequester a young patient with immunodeficiencies in the 1970s.

Default settings are convenient, but they can also skew an individual's perception of what information the rest of the world sees. It is recommended that users periodically review the privacy and personalized search settings of the browsers and social media websites they use to prevent query results from becoming unnecessarily discriminatory and newsfeeds from being weaponized.

The term filter bubble is often credited to Eli Pariser, whose 2011 book urged companies to become more transparent about their filtering practices. Watch Eli Pariser's TED talk, "Beware online filter bubbles."

This was last updated in January 2018

Continue Reading About filter bubble

Networking
Security
  • timing attack

    A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about...

  • privileged identity management (PIM)

    Privileged identity management (PIM) is the monitoring and protection of superuser accounts that hold expanded access to an ...

  • possession factor

    The possession factor, in a security context, is a category of user authentication credentials based on items that the user has ...

CIO
  • business process reengineering (BPR)

    Business process reengineering (BPR) is a management practice in which business processes used are radically redesigned to ...

  • innovation management

    Innovation management involves the process of managing an organization's innovation procedure, starting at the initial stage of ...

  • radical innovation

    Radical innovation is an invention that destroys or supplants an existing business model.

HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close