Browse Definitions :
Definition

social currency

Contributor(s): Ivy Wigmore

Social currency is the personal assets and attributes of an individual that help them succeed in interactive social channels. The term commonly refers to online social networks, particularly in recent use, but it also refers to real life and the online/physical hybrid environment that is typical of modern life.

The word currency, in a broad sense, refers to anything that can be used as a medium of exchange. In the case of social currency, there is usually no precise monetization and no explicit exchange of assets. The exchange is typically something that occurs naturally and may not be immediately recognized. Although it doesn’t usually involve monetary or even tangible assets, people may capitalize on their social currency through, for example, advertising deals.

Social influence is a prime example of social currency. People can gain influence through various means. They may share content on social media as subject experts, for example, in an engaging way that attracts a following. Followers, in turn, are another example of social currency, and people with larger groups of followers naturally have more influence.

Social currency also includes positive personal attributes that tend to help people succeed in both physical and digital interpersonal environments such as knowledge, status, intelligence, connections, looks, charm and a sense of humour.

The concept of social currency arose from the French sociologist Pierre Bourdieu’s social capital theory, which explored the benefits of social cooperation.

This was last updated in July 2019

Continue Reading About social currency

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close