Browse Definitions :
Definition

sock puppet

Contributor(s): Ivy Wigmore

A sock puppet, in the context of online communications, is a fake identity created to promote someone or something through blogs, wikis, forums or social networking sites such as Facebook or Twitter.

Sock puppets are often created to improve the status of some company or other entity or to promote a particular viewpoint that is expected to be helpful to that entity. Fake identities are created to circumvent site bans, increase product sales, improve or tarnish reputations, spread disinformation and stifle dissent, among other possibilities.

Sometimes people create their own sock puppets; sometimes they hire others to do so. Someone hired to create a sock puppet is referred to as a meat puppet, an Internet shill or a cyber shill. The use of a sock puppet to artificially stimulate demand for a product or service is known as sock puppet marketing.

A few documented examples of sock puppetry:

  • Conrad Black, chief executive of Hollinger International, created an account with the name “nspector” to post on Yahoo Finance chat. Black’s sock puppet blamed short sellers for his company’s lackluster performance.  
  • A marketing executive from Sony created a fictional critic called David Manning, who gave glowing reviews for films from Columbia Pictures (a subsidiary of Sony).
  • Crime fiction writer RJ Ellory created  a sock puppet called Nicodemus Jones to post reviews of his own work. The sock puppet called Ellory’s novel A Quiet Belief in Angels “a modern masterpiece” and exhorted: “Just buy it, read it, and make up your own mind. Whatever else it might do, it will touch your soul." Another Ellory-generated sock puppet, Jelly Bean, posted negative reviews of Stuart MacBride’s novel, Dark Blood: “I think this is a shame. So many good authors given so little advertising and promotion, and here we have another tiresome same-old, same-old from someone who could do so much better…"

Sock puppetry is an unethical and sometimes illegal practice. Another disincentive is the fact that, if detected, sock puppet marketing makes the person or company behind it look ridiculous and desperate. Furthermore, if the purpose is to sell a product, it may be assumed that the company is untrustworthy and the product so lacking in value that it cannot be effectively promoted honestly.  

See also: reputation management, social media influence, content marketing, gaming the system

This was last updated in October 2013

Continue Reading About sock puppet

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close