Browse Definitions :
Definition

clickbait title

Contributor(s): Ivy Wigmore

A clickbait title is a title for online content that is designed to engage the reader and tempt them into clicking through to the associated content. The practice is sometimes associated with content marketing.

Conventionally, titles are used to encapsulate the content, telling readers what it is about so they can make an informed decision as to whether they want to access it. For example, a listicle about household uses for baking soda might be titled “20 ways to use baking soda for a cleaner home and better health.”

Clickbait titles hint at the content rather than describing it and imply to readers that they will gain not only information but a visceral response of some sort. They typically provide just enough information for readers to anticipate the contents in a general kind of way. Written in clickbait, the above title might be reimagined as: “Doctors don’t want you to find out about these 20 mind-blowing uses for a common household product! (Number 4 will shock you!)”

In fact, it’s highly unlikely that Number 4 or any of the other items in a listicle about the household applications of baking soda will shock many readers. However, marketers are attempting to create and exploit a psychological phenomenon called the curiosity gap, which can happen when someone detects that there is a piece of valuable information available for them to access.

Increasingly, however, the wording of clickbait titles reduces the likelihood that savvy readers will click through to what they’ve learned to expect will be a letdown. 

This was last updated in June 2019

Continue Reading About clickbait title

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close