Browse Definitions :
Definition

sugging

Sugging, also spelled SUGGing, is an acronym that stands for "selling under the guise” of research. This practice occurs when individuals or companies pretend to be market researchers who are conducting a study when, in fact, they are simply looking for sales leads.

In the United States, research firms are allowed to offer a gift to survey respondents as thanks for their participation in a study. If a research company tries to sell something under the pretense of conducting a study, however, it is in violation of standards established by the Insights Association, a non-profit membership trade organization for companies that specialize in market research, as well as federal laws that distinguish survey, opinion and marketing research from commercial activities.

Sugging is similar to frugging (fundraising under the guise of research) and pugging (politicking under the guise of research).  When a survey about pets ends with a PayPal button and a request for a donation to an animal rescue organization, the participant has been frugged. Pugging often takes the form of a push poll. When a research poll asks questions that are obviously skewed to one side of an issue or favor one candidate, the participant has been pugged.

Sugging, as well as frugging and pugging, undermine the efforts of ethical researchers by attempting to take advantage of those who want to participate in legitimate research. To avoid being sugged, study participants should ask the researcher if they are selling anything, including the data gathered in the study, and inquire who the research is working for. If a survey participant feels they have been sugged, the participant is advised to submit a consumer complaint to the Federal Trade Commission (FTC).

This was last updated in October 2017

Continue Reading About sugging

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • What is RAID 6?

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close