Browse Definitions :
Definition

attention economy

Contributor(s): Ivy Wigmore

The attention economy is the collective human capacity to engage with the many elements in our environments that demand mental focus. The term reflects an acknowledgement that the human capacity for attention is limited and that the content and events vying for that attention far exceed that capacity.

The recognition of attention as a limited and valuable resource has different implications in different contexts. In personal life and human resources management (HRM), for example, attention economics is applied to help people most effectively allocate their mental resources for productivity and work-life balance. For content producers and marketers, on the other hand, the attention economy is a competitive landscape where they vie for the greatest possible share of the commodity.

The concept of the attention economy was first developed by Herbert Alexander Simon, an American economist, political scientist and cognitive psychologist. In his 1971 article, “Designing organizations for an information-rich world,” Simon explained how information and attention follow the laws of supply and demand:

“[I]n an information-rich world, the wealth of information means a dearth of something else: a scarcity of whatever it is that information consumes. What information consumes is rather obvious: it consumes the attention of its recipients. Hence a wealth of information creates a poverty of attention and a need to allocate that attention efficiently among the overabundance of information sources that might consume it.”

Since 1971, the amount of information has continued to grow exponentially, in particular since the advent of the internet and social media. Attention management is becoming increasingly crucial to help people deal most effectively with the huge number of events and the enormous volume of content we encounter on a daily basis. 

This was last updated in May 2019

Continue Reading About attention economy

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close