SlideShare a Scribd company logo
1 of 26
Download to read offline
Online Marketing

           John Hale
Center for Information Security
      University of Tulsa

    john-hale@utulsa.edu
                            *Slides adapted from E-Commerce: Business, Technology, Society – 2/e
                                    by K. Laudon and C. Traver, Pearson/Addison-Wesley



    University of Tulsa - Center for Information Security
Overview

1.   Consumer behavior
2.   Basic marketing
3.   Internet marketing
4.   Customer relationships




                  University of Tulsa - Center for Information Security
Consumer Behavior Models

• Attempt to predict/explain what consumers
  purchase and where, when, how much and why
  they buy.
• Consumer behavior models based on background
  demographic factors and other intervening, more
  immediate variables




                 University of Tulsa - Center for Information Security
A General Model of Consumer
          Behavior




    University of Tulsa - Center for Information Security   4
Background Demographic Factors

• Culture: Shapes basic human values, wants perceptions and
  behaviors
• Subculture: Subset of culture; forms around major social
  differences such as ethnicity, age, lifestyle, geography
• Direct reference group: Include one’s family,
  profession/occupation, religion, neighborhood, schools
• Indirect reference group: Includes one’s life-cycle state,
  social class and lifestyle group
• Opinion leaders (viral influencers): Influence the behavior of
  others through their personality, skills or other factors


                      University of Tulsa - Center for Information Security
Consumer Decision Process




  University of Tulsa - Center for Information Security   6
A Model of Online Consumer
                     Behavior
• Adds two new factors:
    Web site capabilities – the content, design and
    functionality of a site
    Consumer clickstream behavior – the transaction
    log that consumers establish as they move about the
    Web




                  University of Tulsa - Center for Information Security
A Model of Online Consumer
         Behavior




  University of Tulsa - Center for Information Security   8
Basic Marketing Concepts

• Marketing: The strategies and actions firms take to
  establish a relationship with a consumer and encourage
  purchases of products and services
• Internet marketing: Using the Web, as well as
  traditional channels, to develop a positive, long-term
  relationship with customers, thereby creating
  competitive advantage for the firm by allowing it to
  charge a higher price for products or services than its
  competitors can charge




                   University of Tulsa - Center for Information Security
Basic Marketing Concepts

• Firms within an industry compete with one another on
  four dimensions:
     Differentiation
     Cost
     Focus
     Scope
• Marketing seeks to create unique, highly differentiated
  products or services that are produced or supplied by
  one trusted firm (“little monopolies”)




                       University of Tulsa - Center for Information Security
Feature Sets
Defined as the bundle of capabilities and
services offered by the product or service




                  University of Tulsa - Center for Information Security   11
Products, Brands and the Branding
                          Process
• Brand: A set of expectations that consumers have when
  consuming, or thinking about consuming, a product or
  service from a specific company
• Branding: The process of brand creation
• Closed loop marketing: When marketers are able to
  directly influence the design of the core product based
  on market research and feedback.
     E-commerce enhances the ability to achieve
• Brand strategy: Set of plans for differentiating a
  product from its competitor, and communicating these
  differences to the marketplace
• Brand equity: estimated value of the premium
  customers are willing to pay for a branded product
  versus unbranded competitor
                       University of Tulsa - Center for Information Security
Marketing Activities: From
   Products to Brands




  University of Tulsa - Center for Information Security   13
Internet Marketing Technologies

•   Web transaction logs
•   Cookies and Web bugs
•   Databases, data warehouses, and data mining
•   Advertising networks
•   Customer relationship management (CRM)
    systems




                  University of Tulsa - Center for Information Security
Web Transaction Logs

•   Built into Web server software
•   Records user activity at a Web site
•   WebTrends a leading log analysis tool
•   Can provide treasure trove of marketing
    information, particularly when combined with:
      Registration forms – used to gather personal data
      Shopping cart database – captures all item selection, purchase
      and payment data




                       University of Tulsa - Center for Information Security
Cookies

• Cookies: small text file that Web sites place on
  a visitor’s client computer every time they visit,
  and during the visit as specific pages are
  accessed.
• Cookies provide Web marketers with a very
  quick means of identifying the customer and
  understanding his or her prior behavior
• Location of cookie files on computer depends
  on browser version

                 University of Tulsa - Center for Information Security
Web Bugs

• Tiny (1 pixel) graphic files embedded in e-mail
  messages and on Web sites
• Used to automatically transmit information
  about the user and the page being viewed to a
  monitoring server




                 University of Tulsa - Center for Information Security
Databases and Data Warehouses
• Database: Software that stores records and attributes
• Database management system (DBMS): Software used to
  create, maintain and access databases
• SQL (Structured Query Language): Industry-standard
  database query and manipulation language used in a
  relational databases
• Relational database: Represents data as two-dimensional
  tables with records organized in rows and attributes in
  columns; data within different tables can be flexibly related
  as long as the tables share a common data element
• Data warehouse: Database that collects a firm’s transactional
  and customer data in a single location for offline analysis by
  marketers and site managers
                      University of Tulsa - Center for Information Security
Data Mining
• Set of analytical techniques that look for patterns in
  data of a database or data warehouse, or seek to
  model the behavior of customers
• Types include:
   – Query-driven – based on specific queries
   – Model-driven – involves use of a model that analyzes key variables of
     interest to decision makers
   – Rule-based – examines demographic and transactional data of
     groups and individuals at a Web site and attempts to derive general
     rules of behavior for visitors
   – Collaborative filtering – behavioral approach; site visitors classify
     themselves into affinity groups based on common interests; products
     are then recommended based on what other people in the group have
     recently purchased

                        University of Tulsa - Center for Information Security
Data Mining and Personalization




     University of Tulsa - Center for Information Security   20
Advertising Networks

• Best known for ability to present users with
  banner advertisements based on a database of
  user behavioral data
• DoubleClick best-known example
• Ad server selects appropriate banner ad based
  on cookies, Web bugs, backend user profile
  databases



                University of Tulsa - Center for Information Security
How Advertising
           Networks Work




University of Tulsa - Center for Information Security   22
Customer Relationship
                  Management (CRM) Systems

• Repository of customer information that records all of the
  contacts that a customer has with a firm and generates a
  customer profile available to everyone in the firm with a
  need to “know the customer”
• Customer profiles can contain:
   –   Map of the customer’s relationship with the firm
   –   Product and usage summary data
   –   Demographic and psychographic data
   –   Profitability measures
   –   Contact history
   –   Marketing and sales information



                           University of Tulsa - Center for Information Security
Customer Relationship
Management Systems




University of Tulsa - Center for Information Security   24
Customer Retention
                Marketing Techniques
• Customization: Changing the product (not just the
  marketing message) according to user preferences
• Customer co-production: Allows the customer to
  interactively create the product (Nike)
• Transactive content: Results from the
  combination of traditional content with dynamic
  information tailored to each user’s profile



                University of Tulsa - Center for Information Security
Other Customer Retention
             Marketing Techniques (cont’d)
Customer service tools include:
• Frequently asked questions (FAQs) – text-based listing of
  common questions and answers
• Real-time customer service chat systems – company’s
  service representatives interactively exchange text
  messages with one or more customers on a real-time basis
• Intelligent agent technology – bots
• Automated response systems – send e-mail confirmations
  and acknowledgments
• VReps



                    University of Tulsa - Center for Information Security

More Related Content

What's hot

Chapter 12 e-marketing communication tools
Chapter 12   e-marketing communication toolsChapter 12   e-marketing communication tools
Chapter 12 e-marketing communication tools
Dr. Ankit Kesharwani
 
Chapter 12 e-marketing communication tools
Chapter 12   e-marketing communication toolsChapter 12   e-marketing communication tools
Chapter 12 e-marketing communication tools
Dr. Ankit Kesharwani
 
Increasing Web traffic through Search Engine Marketing
Increasing Web traffic through Search Engine MarketingIncreasing Web traffic through Search Engine Marketing
Increasing Web traffic through Search Engine Marketing
Dr. Ankit Kesharwani
 

What's hot (20)

07 E-commerce Advertising
07 E-commerce Advertising07 E-commerce Advertising
07 E-commerce Advertising
 
Online marketing scenario
Online marketing scenarioOnline marketing scenario
Online marketing scenario
 
20150330130325chap 8 marketing and advertising v2
20150330130325chap 8 marketing and advertising v220150330130325chap 8 marketing and advertising v2
20150330130325chap 8 marketing and advertising v2
 
Introduction to Digital e-marketing management
Introduction to Digital e-marketing managementIntroduction to Digital e-marketing management
Introduction to Digital e-marketing management
 
E marketing management 4Ps
E marketing management 4PsE marketing management 4Ps
E marketing management 4Ps
 
Tug of war between online and offline retail
Tug of war between online and offline retailTug of war between online and offline retail
Tug of war between online and offline retail
 
E marketing and Advertisement
E marketing and AdvertisementE marketing and Advertisement
E marketing and Advertisement
 
The e-marketing promotion management
The e-marketing promotion managementThe e-marketing promotion management
The e-marketing promotion management
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
EMarketing Techniques Conference_Emarketing at the Speed of Light Worksmart...
EMarketing Techniques Conference_Emarketing at the Speed of Light   Worksmart...EMarketing Techniques Conference_Emarketing at the Speed of Light   Worksmart...
EMarketing Techniques Conference_Emarketing at the Speed of Light Worksmart...
 
Chapter 12 e-marketing communication tools
Chapter 12   e-marketing communication toolsChapter 12   e-marketing communication tools
Chapter 12 e-marketing communication tools
 
Chapter 12 e-marketing communication tools
Chapter 12   e-marketing communication toolsChapter 12   e-marketing communication tools
Chapter 12 e-marketing communication tools
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
E marketing-global scenario
E marketing-global scenarioE marketing-global scenario
E marketing-global scenario
 
Increasing Web traffic through Search Engine Marketing
Increasing Web traffic through Search Engine MarketingIncreasing Web traffic through Search Engine Marketing
Increasing Web traffic through Search Engine Marketing
 
Dijital i̇ndeks-2015
Dijital i̇ndeks-2015Dijital i̇ndeks-2015
Dijital i̇ndeks-2015
 
E marketing
E marketingE marketing
E marketing
 
Digital-marketing Distribution Management
Digital-marketing Distribution ManagementDigital-marketing Distribution Management
Digital-marketing Distribution Management
 
Internet Marketing Basics | E-Commerce
Internet Marketing Basics | E-CommerceInternet Marketing Basics | E-Commerce
Internet Marketing Basics | E-Commerce
 
online marketing
online marketingonline marketing
online marketing
 

Similar to Secom%20 Online%20 Marketing

E commerce - Elective 4
E commerce - Elective 4E commerce - Elective 4
E commerce - Elective 4
nellyportado
 
Data Mining Presentation for College Harsh.pptx
Data Mining Presentation for College Harsh.pptxData Mining Presentation for College Harsh.pptx
Data Mining Presentation for College Harsh.pptx
hp41112004
 

Similar to Secom%20 Online%20 Marketing (20)

Customer 360
Customer 360Customer 360
Customer 360
 
Online macro environment, The digital marketing environment
Online macro environment, The digital marketing environmentOnline macro environment, The digital marketing environment
Online macro environment, The digital marketing environment
 
uae views on big data
  uae views on  big data  uae views on  big data
uae views on big data
 
E commerce - Elective 4
E commerce - Elective 4E commerce - Elective 4
E commerce - Elective 4
 
9 essential competencies of platform marketing 11 22 2015
9 essential competencies of platform marketing 11 22 20159 essential competencies of platform marketing 11 22 2015
9 essential competencies of platform marketing 11 22 2015
 
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_TechnologiesIT8005_EC_Unit_IV_Internet_Marketing_Technologies
IT8005_EC_Unit_IV_Internet_Marketing_Technologies
 
E business models
E  business modelsE  business models
E business models
 
Big Data, Analytics and Data Science
Big Data, Analytics and Data ScienceBig Data, Analytics and Data Science
Big Data, Analytics and Data Science
 
Data Mining Presentation for College Harsh.pptx
Data Mining Presentation for College Harsh.pptxData Mining Presentation for College Harsh.pptx
Data Mining Presentation for College Harsh.pptx
 
Module-1 Marketing in Digital Environment
Module-1 Marketing in Digital EnvironmentModule-1 Marketing in Digital Environment
Module-1 Marketing in Digital Environment
 
Data and Analytics Services.pptx
Data and Analytics Services.pptxData and Analytics Services.pptx
Data and Analytics Services.pptx
 
Crm1
Crm1Crm1
Crm1
 
Research techniques for data driven marketing strategies
Research techniques for data driven marketing strategiesResearch techniques for data driven marketing strategies
Research techniques for data driven marketing strategies
 
Becoming a Customer Centric Bank
Becoming a Customer Centric BankBecoming a Customer Centric Bank
Becoming a Customer Centric Bank
 
Web Governance
Web GovernanceWeb Governance
Web Governance
 
major ppt.pptx
major ppt.pptxmajor ppt.pptx
major ppt.pptx
 
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
Building a Recommendation Platform For E-Commerce Businesses Based on Hybrid ...
 
Big Data in e-Commerce
Big Data in e-CommerceBig Data in e-Commerce
Big Data in e-Commerce
 
Data-driven marketing - expert panel
Data-driven marketing - expert panelData-driven marketing - expert panel
Data-driven marketing - expert panel
 
Customer Relationship Management unit 5 trends in crm
Customer Relationship Management unit 5 trends in crmCustomer Relationship Management unit 5 trends in crm
Customer Relationship Management unit 5 trends in crm
 

More from bhagchand

Week #9 Chap11 Mgt 489
Week #9 Chap11 Mgt 489Week #9 Chap11 Mgt 489
Week #9 Chap11 Mgt 489
bhagchand
 
Kotler06exs Analyzing Consumer Markets And Buyer Behavior
Kotler06exs Analyzing Consumer Markets And Buyer BehaviorKotler06exs Analyzing Consumer Markets And Buyer Behavior
Kotler06exs Analyzing Consumer Markets And Buyer Behavior
bhagchand
 
Consumer Decision Making Process
Consumer Decision Making ProcessConsumer Decision Making Process
Consumer Decision Making Process
bhagchand
 
Exec Cert Presentation
Exec Cert PresentationExec Cert Presentation
Exec Cert Presentation
bhagchand
 
Bb Marketing
Bb MarketingBb Marketing
Bb Marketing
bhagchand
 
18 Services Marketing
18  Services Marketing18  Services Marketing
18 Services Marketing
bhagchand
 
Effective Communication Skills By Bhag Chand Jat
Effective Communication Skills By Bhag Chand JatEffective Communication Skills By Bhag Chand Jat
Effective Communication Skills By Bhag Chand Jat
bhagchand
 
Bhag Chand Coca Cola Summer Training Full Report
Bhag Chand Coca Cola  Summer Training Full ReportBhag Chand Coca Cola  Summer Training Full Report
Bhag Chand Coca Cola Summer Training Full Report
bhagchand
 

More from bhagchand (11)

Week #9 Chap11 Mgt 489
Week #9 Chap11 Mgt 489Week #9 Chap11 Mgt 489
Week #9 Chap11 Mgt 489
 
Kotler06exs Analyzing Consumer Markets And Buyer Behavior
Kotler06exs Analyzing Consumer Markets And Buyer BehaviorKotler06exs Analyzing Consumer Markets And Buyer Behavior
Kotler06exs Analyzing Consumer Markets And Buyer Behavior
 
Consumer Decision Making Process
Consumer Decision Making ProcessConsumer Decision Making Process
Consumer Decision Making Process
 
Exec Cert Presentation
Exec Cert PresentationExec Cert Presentation
Exec Cert Presentation
 
Ch22[1]
Ch22[1]Ch22[1]
Ch22[1]
 
Bb Marketing
Bb MarketingBb Marketing
Bb Marketing
 
07brands
07brands07brands
07brands
 
18 Services Marketing
18  Services Marketing18  Services Marketing
18 Services Marketing
 
9fms Pp12
9fms Pp129fms Pp12
9fms Pp12
 
Effective Communication Skills By Bhag Chand Jat
Effective Communication Skills By Bhag Chand JatEffective Communication Skills By Bhag Chand Jat
Effective Communication Skills By Bhag Chand Jat
 
Bhag Chand Coca Cola Summer Training Full Report
Bhag Chand Coca Cola  Summer Training Full ReportBhag Chand Coca Cola  Summer Training Full Report
Bhag Chand Coca Cola Summer Training Full Report
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Secom%20 Online%20 Marketing

  • 1. Online Marketing John Hale Center for Information Security University of Tulsa john-hale@utulsa.edu *Slides adapted from E-Commerce: Business, Technology, Society – 2/e by K. Laudon and C. Traver, Pearson/Addison-Wesley University of Tulsa - Center for Information Security
  • 2. Overview 1. Consumer behavior 2. Basic marketing 3. Internet marketing 4. Customer relationships University of Tulsa - Center for Information Security
  • 3. Consumer Behavior Models • Attempt to predict/explain what consumers purchase and where, when, how much and why they buy. • Consumer behavior models based on background demographic factors and other intervening, more immediate variables University of Tulsa - Center for Information Security
  • 4. A General Model of Consumer Behavior University of Tulsa - Center for Information Security 4
  • 5. Background Demographic Factors • Culture: Shapes basic human values, wants perceptions and behaviors • Subculture: Subset of culture; forms around major social differences such as ethnicity, age, lifestyle, geography • Direct reference group: Include one’s family, profession/occupation, religion, neighborhood, schools • Indirect reference group: Includes one’s life-cycle state, social class and lifestyle group • Opinion leaders (viral influencers): Influence the behavior of others through their personality, skills or other factors University of Tulsa - Center for Information Security
  • 6. Consumer Decision Process University of Tulsa - Center for Information Security 6
  • 7. A Model of Online Consumer Behavior • Adds two new factors: Web site capabilities – the content, design and functionality of a site Consumer clickstream behavior – the transaction log that consumers establish as they move about the Web University of Tulsa - Center for Information Security
  • 8. A Model of Online Consumer Behavior University of Tulsa - Center for Information Security 8
  • 9. Basic Marketing Concepts • Marketing: The strategies and actions firms take to establish a relationship with a consumer and encourage purchases of products and services • Internet marketing: Using the Web, as well as traditional channels, to develop a positive, long-term relationship with customers, thereby creating competitive advantage for the firm by allowing it to charge a higher price for products or services than its competitors can charge University of Tulsa - Center for Information Security
  • 10. Basic Marketing Concepts • Firms within an industry compete with one another on four dimensions: Differentiation Cost Focus Scope • Marketing seeks to create unique, highly differentiated products or services that are produced or supplied by one trusted firm (“little monopolies”) University of Tulsa - Center for Information Security
  • 11. Feature Sets Defined as the bundle of capabilities and services offered by the product or service University of Tulsa - Center for Information Security 11
  • 12. Products, Brands and the Branding Process • Brand: A set of expectations that consumers have when consuming, or thinking about consuming, a product or service from a specific company • Branding: The process of brand creation • Closed loop marketing: When marketers are able to directly influence the design of the core product based on market research and feedback. E-commerce enhances the ability to achieve • Brand strategy: Set of plans for differentiating a product from its competitor, and communicating these differences to the marketplace • Brand equity: estimated value of the premium customers are willing to pay for a branded product versus unbranded competitor University of Tulsa - Center for Information Security
  • 13. Marketing Activities: From Products to Brands University of Tulsa - Center for Information Security 13
  • 14. Internet Marketing Technologies • Web transaction logs • Cookies and Web bugs • Databases, data warehouses, and data mining • Advertising networks • Customer relationship management (CRM) systems University of Tulsa - Center for Information Security
  • 15. Web Transaction Logs • Built into Web server software • Records user activity at a Web site • WebTrends a leading log analysis tool • Can provide treasure trove of marketing information, particularly when combined with: Registration forms – used to gather personal data Shopping cart database – captures all item selection, purchase and payment data University of Tulsa - Center for Information Security
  • 16. Cookies • Cookies: small text file that Web sites place on a visitor’s client computer every time they visit, and during the visit as specific pages are accessed. • Cookies provide Web marketers with a very quick means of identifying the customer and understanding his or her prior behavior • Location of cookie files on computer depends on browser version University of Tulsa - Center for Information Security
  • 17. Web Bugs • Tiny (1 pixel) graphic files embedded in e-mail messages and on Web sites • Used to automatically transmit information about the user and the page being viewed to a monitoring server University of Tulsa - Center for Information Security
  • 18. Databases and Data Warehouses • Database: Software that stores records and attributes • Database management system (DBMS): Software used to create, maintain and access databases • SQL (Structured Query Language): Industry-standard database query and manipulation language used in a relational databases • Relational database: Represents data as two-dimensional tables with records organized in rows and attributes in columns; data within different tables can be flexibly related as long as the tables share a common data element • Data warehouse: Database that collects a firm’s transactional and customer data in a single location for offline analysis by marketers and site managers University of Tulsa - Center for Information Security
  • 19. Data Mining • Set of analytical techniques that look for patterns in data of a database or data warehouse, or seek to model the behavior of customers • Types include: – Query-driven – based on specific queries – Model-driven – involves use of a model that analyzes key variables of interest to decision makers – Rule-based – examines demographic and transactional data of groups and individuals at a Web site and attempts to derive general rules of behavior for visitors – Collaborative filtering – behavioral approach; site visitors classify themselves into affinity groups based on common interests; products are then recommended based on what other people in the group have recently purchased University of Tulsa - Center for Information Security
  • 20. Data Mining and Personalization University of Tulsa - Center for Information Security 20
  • 21. Advertising Networks • Best known for ability to present users with banner advertisements based on a database of user behavioral data • DoubleClick best-known example • Ad server selects appropriate banner ad based on cookies, Web bugs, backend user profile databases University of Tulsa - Center for Information Security
  • 22. How Advertising Networks Work University of Tulsa - Center for Information Security 22
  • 23. Customer Relationship Management (CRM) Systems • Repository of customer information that records all of the contacts that a customer has with a firm and generates a customer profile available to everyone in the firm with a need to “know the customer” • Customer profiles can contain: – Map of the customer’s relationship with the firm – Product and usage summary data – Demographic and psychographic data – Profitability measures – Contact history – Marketing and sales information University of Tulsa - Center for Information Security
  • 24. Customer Relationship Management Systems University of Tulsa - Center for Information Security 24
  • 25. Customer Retention Marketing Techniques • Customization: Changing the product (not just the marketing message) according to user preferences • Customer co-production: Allows the customer to interactively create the product (Nike) • Transactive content: Results from the combination of traditional content with dynamic information tailored to each user’s profile University of Tulsa - Center for Information Security
  • 26. Other Customer Retention Marketing Techniques (cont’d) Customer service tools include: • Frequently asked questions (FAQs) – text-based listing of common questions and answers • Real-time customer service chat systems – company’s service representatives interactively exchange text messages with one or more customers on a real-time basis • Intelligent agent technology – bots • Automated response systems – send e-mail confirmations and acknowledgments • VReps University of Tulsa - Center for Information Security