Browse Definitions :
Definition

filter bubble

A filter bubble is an algorithmic bias that skews or limits the information an individual user sees on the internet. The bias is caused by the weighted algorithms that search engines, social media sites and marketers use to personalize user experience (UX).

The goal of personalization is to present the end user with the most relevant information possible, but it can also cause a distorted view of reality because it prioritizes information the individual has already expressed interest in. The data used to personalize user experience and create an insulating bubble comes from many sources, including the user’s search history, browsing choices and previous interaction with web pages.

Filter bubbles, which affect an individual's online advertisements, social media newsfeeds and web searches, essentially insulate the person from outside influences and reinforce what the individual already thinks. The word bubble, in this context, is a synonym for isolation; its context comes from a medical device called the isolator, a plastic bubble that was infamously used to sequester a young patient with immunodeficiencies in the 1970s.

Default settings are convenient, but they can also skew an individual's perception of what information the rest of the world sees. It is recommended that users periodically review the privacy and personalized search settings of the browsers and social media websites they use to prevent query results from becoming unnecessarily discriminatory and newsfeeds from being weaponized.

The term filter bubble is often credited to Eli Pariser, whose 2011 book urged companies to become more transparent about their filtering practices. Watch Eli Pariser's TED talk, "Beware online filter bubbles."

This was last updated in January 2018

Continue Reading About filter bubble

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
  • encryption key

    In cryptography, an encryption key is a variable value that is applied using an algorithm to a string or block of unencrypted ...

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit.

  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • cloud NAS (cloud network attached storage)

    Cloud NAS (network attached storage) is remote storage that is accessed over the internet as if it is local.

  • Terabyte (TB)

    A terabyte (TB) is a unit of digital data that is equal to about 1 trillion bytes.

  • object storage

    Object storage, also called object-based storage, is an approach to addressing and manipulating data storage as discrete units, ...

Close