Browse Definitions :
Definition

Internet shill

Contributor(s): Ivy Wigmore

An Internet shill is someone who promotes something or someone online for pay without divulging that they are associated with the entity they shill for.

A shill might create a Facebook or Twitter account, set up a blog or simply comment through these and other channels, such as discussion forums.  The purpose is to artificially improve the social perception of the entity shilled for.  Shills promote companies, products, public figures and viewpoints for profit, while pretending to have no motivation for doing so other than personal belief. Alternatively, they sometimes denigrate someone or something, such as a political viewpoint or a competitor’s product, that is in conflict with the entity they serve.  

It can be difficult to detect when inflated metrics are the result of cyber shilling.  Often, the people doing the actual work are not hired directly by the people they shill for.  Someone seeking an enhanced reputation might contract with a domestic firm that performs some less questionable service, such as social media consulting. The consulting firm, in turn, might contract with a cyber shill company based somewhere with very low labor costs. At those premises, low-paid workers perform the actual work. 

More complex Internet shill jobs, such as spreading disinformation, are more demanding and may be well-paid. Such jobs may be telecommute positions or conducted from temporary offices which are frequently moved to avoid detection. 

Shill derives from shillaber, a word used in the early 20th century for the accomplice of a carnival worker employed to excite interest in the games and sideshows while pretending to be a member of the general audience. Internet shills are sometimes referred to as cyber shills or meat puppets; the fake identities they create are sometimes called sock puppets. The practice of using fake identities to promote a product or service is known as sock puppet marketing.

The practice of artificially creating buzz for someone or something is sometimes called astroturfing. The name is word play on grassroots, which refers to authentic movements and trends that develop as a result of the real attitudes and behaviors of people.

See also: reputation management, social media influence, content marketing, gaming the system

This was last updated in October 2013

Continue Reading About Internet shill

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close