Browse Definitions :
Definition

information overload

Contributor(s): Ivy Wigmore

Information overload is a state of being overwhelmed by the amount of data presented for one’s attention or processing. The term is used to refer not only to situations involving too much data for a given decision but also the constant inundation of data from many sources that is characteristic of modern life.

Information overload reduces our capacity to function effectively, which can lead to poor decisions in both work and life as well as the inability to make decisions, which is sometimes referred to as analysis paralysis. When the situation persists, burnout is a common result.

Information overload is one of the major areas identified for reform by the humane tech movement, which seeks to realign technology with human needs rather than exploiting human vulnerabilities for profit, as has far too often been the case.

On the individual level and in the workplace, the main tool for preventing information overload is intentionally limiting our exposure by being selective about the amount of data demanding our attention. Attention management strategies such as shutting off notifications and simply limiting time at the computer can be very effective. Technological solutions include calm technology principles applied to software design and the offloading of information processing to increasingly capable AI systems.

The futurist Alvin Toffler wrote about the potential for information overload in 1970, and may have coined the term. Toffler foresaw the exponential growth of the information age and warned about the challenges it could pose for humans in Future Shock and other works.

See also: attention economy

This was last updated in June 2019

Continue Reading About information overload

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close