Browse Definitions :
Definition

influencer (social influencer)

An influencer is an individual whose actions and opinions carry more weight with their colleagues, social network and the general public than is the case with most other individuals.

Influencers include journalists, subject experts, celebrities and other individuals with large followings. They typically have established online presences through multiple channels and large followings on social media platforms such as Facebook and Twitter and are widely considered authorities among their follower base. In IT contexts, influencers are often early adopters who are looked to for guidance.

In a social media marketing context, the more influence a person has, the more appeal that individual has to companies or other individuals who want to promote an idea or sell a product. Influencer marketing is an approach that seeks to maximize the effectiveness of efforts by targeting individuals who have the ability to affect the actions and opinions of a sizeable audience of prospective customers.

This was last updated in June 2016

Continue Reading About influencer (social influencer)

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

Close