Browse Definitions :
Definition

slacktivism

Slacktivism is taking social action online in ways that involve little personal effort and have little immediate effect; the word is a portmanteau of slacker and activism.

PC philanthropy, for example, involves donating unused computing resources to benefit a social cause. For the user, this typically means downloading a small program that detects idle time and starts using compute resources until they are required again. Other examples of slacktivism include sharing and promoting content about issues through Facebook, Twitter and other social platforms, joining organizations without contributing significantly, boycotting abusive organizations and signing and sharing online petitions.

Slacktivism is often disdained because of the minimal effort that it requires and the idea that those minimal efforts may make people less likely to take more substantive and effective actions. Nevertheless, online media and social media in particular have made it possible to raise awareness about social issues in a way that has never been possible before. According to proponents, the collective small acts of online activism can be effective in sharing information about important issues, galvanizing public awareness and political will and, ultimately, bringing about change.

See Dr. Melissa Langdon's TEDx talk, "Transforming slacktivism into activism."

This was last updated in December 2015

Continue Reading About slacktivism

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close