Browse Definitions :
Definition

sock puppet marketing

Sock puppet marketing is the use of a false identity to artificially stimulate demand for a product, brand or service. A false identity on the Internet is known colloquially as a sock puppet or catfish, depending upon the level of detail attached to the false identity.  Typically, a sock puppet has very little (if any) detail attached to it and may simply be a fictional name attached to a new Google or Yahoo email account.   

Sock puppet marketing is one example of astroturfing, the practice of artificially stimulating online conversation and positive reviews about a product, brand or service.  Because sock puppets can be created quickly and do not need to be maintained, they are often used on social media sites to grow public interest or conversely, denigrate a competitor’s product, brand or service. Many websites that rely on customer reviews have mechanisms in place to discourage the use of sock puppets.  Some sites, for example, will only allow a verified customer to post a review.

Sock puppet marketing and sock puppetry in general are unethical and in some cases, illegal. If detected, sock puppet marketing efforts can have a negative impact, causing potential customers to lose trust and wonder if the product or service is so lacking in value that it cannot be effectively promoted honestly.  In the United States, the Federal Trade Commission (FTC) has the legal authority to levy fines if a company engages in sock puppet marketing.  

Matt Cutts, from Google, explains the hazards of sock puppet marketing:

See also: reputation management, social media influence, content marketing, gaming the system, Internet shill

This was last updated in January 2018

Continue Reading About sock puppet marketing

SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close