Browse Definitions :
Definition

Kool-Aid point

The Kool-Aid point is a threshold of fame or success that, when reached, will cause a negative backlash simply because the individual in question is famous or successful. The phenomenon can also be observed in response to brands and organizations. 

In reference to individual targets, the backlash is typically motivated by insecurity, immaturity and envy rather than involving any substantive criticism of the target. Given the way these traits vary in severity from one person to another, the Kool-Aid point can be reached in response to different levels of fame accordingly.

Online, especially on social media, reaching the Kool-Aid point tends to result in troll attacks. The writer Kathy Sierra noticed when she became well-known enough to elicit the effect and coined the term Kool-Aid point to refer to it. Her first harasser objected to the attention she was getting because, in his opinion, her work did not warrant it.

Sierra explained in a blog post: “the most vocal trolling and ‘hate’ for a brand kicks in HARD once a critical mass of brand fans/users are thought to have ‘drunk the Kool-Aid.’ In other words, the hate wasn’t so much about the product/brand but that other people were falling for it.”

The word “Kool-Aid,” in this context, is a reference to the Jonestown Massacre of 1978, in which 913 of cult leader Jim Jones’ 1,100 followers willingly ingested a poisoned soft drink (not, as it turns out, Kool-Aid but a similar beverage called Flavor-Aid) at his urging. The phrase “drank the Kool-Aid” is commonly used to describe those who have dedicated themselves to something without applying any degree of critical thinking.

This was last updated in October 2018

Continue Reading About Kool-Aid point

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

Close