Browse Definitions :
Definition

Streisand effect

The Streisand effect is the common and counterproductive result of attempting to suppress information about something, such that public awareness of it increases significantly.

The term is a reference to events surrounding the publication of pictures of Barbara Streisand’s house on the now-defunct pictopia.com. Photographer Kenneth Addleman had been taking photographs of the California coast documenting coastal erosion; one image included the star’s home. Streisand responded to publication of the photo with a failed lawsuit that drew public attention to the picture, drove  traffic substantially and resulted in over 420,000 hits over the next month.

Mike Masnick coined the term “Streisand effect” on techdirt.com, discussing how attempts by a holiday resort to have photos of its urinal removed from urinal.net backfired. Masnick mused, “How long is it going to take before lawyers realize that the simple act of trying to repress something they don't like online is likely to make it so that something that most people would never, ever see (like a photo of a urinal in some random beach resort) is now seen by many more people? Let's call it the Streisand effect.”

Other illustrations of the Streisand effect include an incident involving Matt Inman of The Oatmeal. When content aggregator site FunnyJunk for plagiarized The Oatmeal’s cartoons, Inman called the site owner out for using bots to steal content and blaming user uploads when faced with copyright claims. FunnyJunk’s owner responded by suing Inman for $20,000 for defamation of character and demanding to have Inman’s content about FunnyJunk removed. In response, Inman launched a derisive Indiegogo crowdfunding campaign to raise the equivalent in funds requested by the suit (to be given to charity), while simultaneously and humorously exposing lies in the frivolous suit's letter. In the end, the suit drew much more attention to the Oatmeal’s content about FunnyJunk than would otherwise have been the case and the suit was dropped.

This was last updated in May 2016

Continue Reading About Streisand effect

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • denial-of-service attack

    A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to ...

  • information security (infosec)

    Information security, often shortened to infosec, is the practice, policies and principles to protect data and other kinds of ...

  • user authentication

    User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close