Purchase Decision-Making Process and Support System. Making Process CDSS Support Facilities Support Facilities



Similar documents
BUSINESS INTELLIGENCE: FROM DATA COLLECTION TO DATA MINING AND ANALYSIS

Business Intelligence Solutions for Gaming and Hospitality

Data Warehousing and Data Mining in Business Applications

A MODEL OF CONSUMER BEHAVIOR ONLINE

Business Process Services. White Paper. Personalizing E-Commerce: Improving Interactivity to Increase Revenues

Introduction. A. Bellaachia Page: 1

DATA MINING AND WAREHOUSING CONCEPTS

Data Mining Solutions for the Business Environment

IT and CRM A basic CRM model Data source & gathering system Database system Data warehouse Information delivery system Information users

Business Analytics and Data Visualization. Decision Support Systems Chattrakul Sombattheera

Chapter 6. E-commerce Marketing Concepts. Copyright 2009 Pearson Education, Inc. Slide 6-1

Data Mart/Warehouse: Progress and Vision

Technology-Driven Demand and e- Customer Relationship Management e-crm

Business Intelligence and Decision Support Systems

Alexander Nikov. 7. ecommerce Marketing Concepts. Consumers Online: The Internet Audience and Consumer Behavior. Outline

Solve your toughest challenges with data mining

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Chapter 6 - Enhancing Business Intelligence Using Information Systems

Module 6. e-business and e- Commerce

Vendor briefing Business Intelligence and Analytics Platforms Gartner 15 capabilities

ECM 210 Chapter 6 - E-commerce Marketing Concepts: Social, Mobile, Local

6/10/2015. Chapter Nine Overview. Learning Outcomes. Opening Case: Twitter: A Social CRM Tool

Database Marketing, Business Intelligence and Knowledge Discovery

Ensighten Activate USE CASES. Ensighten Pulse. Ensighten One

A Survey on Web Research for Data Mining

Business Intelligence. A Presentation of the Current Lead Solutions and a Comparative Analysis of the Main Providers

A SAS White Paper: Implementing the Customer Relationship Management Foundation Analytical CRM

Advertising media - A

Applied Business Intelligence. Iakovos Motakis, Ph.D. Director, DW & Decision Support Systems Intrasoft SA

Three proven methods to achieve a higher ROI from data mining

Integrating SAP and non-sap data for comprehensive Business Intelligence

Chapter 19 Advertising. Section 19.1 Advertising Media Section 19.2 Media Measurement and Rates

The Impact of Digital Media on Lead Quality:

How To Use Social Media To Improve Your Business

Outline. BI and Enterprise-wide decisions BI in different Business Areas BI Strategy, Architecture, and Perspectives

Driving business intelligence to new destinations

OLAP and Data Mining. Data Warehousing and End-User Access Tools. Introducing OLAP. Introducing OLAP

A Visualization is Worth a Thousand Tables: How IBM Business Analytics Lets Users See Big Data

Case Study: Closing The Loop

not possible or was possible at a high cost for collecting the data.

A financial software company

Foundations of Business Intelligence: Databases and Information Management

Actuate for: Customer Self-Service Reporting Applications

Product recommendations and promotions (couponing and discounts) Cross-sell and Upsell strategies

Overview, Goals, & Introductions

Making critical connections: predictive analytics in government

A SAS White Paper: Implementing a CRM-based Campaign Management Strategy

Data Warehousing: A Technology Review and Update Vernon Hoffner, Ph.D., CCP EntreSoft Resouces, Inc.

Unlock the business value of enterprise data with in-database analytics

How to increase Marketing Efficiency to Gain and Retain Customers

A Guide to Business Intelligence For Sales and Marketing Decision Makers

CONCEPTUALIZING BUSINESS INTELLIGENCE ARCHITECTURE MOHAMMAD SHARIAT, Florida A&M University ROSCOE HIGHTOWER, JR., Florida A&M University

A Knowledge Management Framework Using Business Intelligence Solutions

CONTEMPORARY DECISION SUPPORT AND KNOWLEDGE MANAGEMENT TECHNOLOGIES

Enterprise Information Systems

Solve Your Toughest Challenges with Data Mining

B.Sc (Computer Science) Database Management Systems UNIT-V

Five predictive imperatives for maximizing customer value

The Quality Data Warehouse: Solving Problems for the Enterprise

Data Warehouse Architecture Overview

BENEFITS OF AUTOMATING DATA WAREHOUSING

Chapter 4 Getting Started with Business Intelligence

Digital media glossary

PROVEN INTERACTIVE TELEVISION REVENUES THROUGH INTERACTIVE ADVERTISING & DIRECT MARKETING

Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

The Future of Business Analytics is Now! 2013 IBM Corporation

Table of Contents. Copyright 2011 Synchronous Technologies Inc / GreenRope, All Rights Reserved

DATA WAREHOUSING AND OLAP TECHNOLOGY

Cognos e-applications Fast Time to Success. Immediate Business Results.

Improving Decision Making and Managing Knowledge

Chapter 5. Warehousing, Data Acquisition, Data. Visualization

HELSINKI UNIVERSITY OF TECHNOLOGY T Enterprise Systems Integration, Data warehousing and Data mining: an Introduction

Course DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

INFO What are business processes? How are they related to information systems?

Introduction to Data Mining

How to increase Marketing Efficiency to Gain and Retain Customers

IBM Social Media Analytics

Extend the value of Microsoft Dynamics ERP with other technology innovations from Microsoft

Database Marketing simplified through Data Mining

Demand more from your retail marketing. HP Retail Promotion Manager

Chapter 17 Promotional Concepts and Strategies. Section 17.1 Promotion and Promotional Mix Section 17.2 Types of Promotion

Datalogix. Using IBM Netezza data warehouse appliances to drive online sales with offline data. Overview. IBM Software Information Management

Customer Relationship Management (CRM)

Solve your toughest challenges with data mining

AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries.

Transforming Big Data Into Smart Advertising Insights. Lessons Learned from Performance Marketing about Tracking Digital Spend

IBM SPSS Direct Marketing

What is Customer Relationship Management? Customer Relationship Management Analytics. Customer Life Cycle. Objectives of CRM. Three Types of CRM

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Self-Service Business Intelligence

Web Analytics and the Importance of a Multi-Modal Approach to Metrics

Converging Technologies: Real-Time Business Intelligence and Big Data

Applying Customer Analytics to Promotion Decisions WHITE PAPER

Successful Steps and Simple Ideas to Maximise your Direct Marketing Return On Investment

Data Mining for Fun and Profit

TIBCO Industry Analytics: Consumer Packaged Goods and Retail Solutions

The information contained herein is proprietary to Decision Software, Inc. and is provided solely for the benefit of our customers and potential

Delivering a Smarter Shopping Experience with Predictive Analytics:

Digging for Gold: Business Usage for Data Mining Kim Foster, CoreTech Consulting Group, Inc., King of Prussia, PA

Web Data Mining: A Case Study. Abstract. Introduction

Transcription:

Chapter Four: Consumer Behavior, Internet Marketing, and Advertising 4-1 Online File W4.1 Overview of Design Space for Online Decision Support EXHIBIT W4.1 Purchase Decision-Making Process and Support System Steps in the Decision- Generic Internet and Web Making Process CDSS Support Facilities Support Facilities Need recognition Agents and event notification Banner advertising on Web sites URL on physical material Discussions in newsgroups Information search Virtual catalogs Web directories and classifiers Structured interaction and question/ Internal search on Web site answer sessions External search engines Links to (and guidance on) external Focused directories and information soures brokers Evaluation, negotiation, FAQs and other summaries Discussions in newsgroups selection Samples and trials Cross-site comparisons Models that evaluate consumer behavior Generic models Pointers to and information about existing customers Purchase, payment, Ordering of product or service Electronic cash and virtual banking delivery Arrangement of delivery Logistics providers and package tracking After-purchase service Customer support via e-mail and Discussions in newsgroups and evaluation newsgroups Source: O Keefe, R. M., and T. McEachern (1998). REFERENCE FOR ONLINE FILE W4.1 O Keefe, R. M., and T. McEachern. Web-Based Customer Decision Support System. Communications of the ACM (March 1998).

4-2 Part 2: Internet Consumer Retailing Online File W4.2 Business Intelligence: From Data Collection to Data Mining and Analysis Data for EC organizations can be viewed as either transactional or analytical. Transactional data are those pieces of information that are collected in traditional transactions processing systems (TPSs), are organized mainly in a hierarchical structure, and are centrally processed. Newer systems that contain transactional data are usually Web based; in medium to large organizations, they may be part of an ERP system. These are known as operational systems, and the results of the processing are mainly summaries and reports (see Turban et al. 2008). Today, the most successful companies are those that can respond quickly and flexibly to market changes and opportunities (i.e., they are agile). The key to this response is the effective and efficient use of data and information. EC transactions frequently must be done online in real time. This is done not only via transaction processing, but also through the supplementary activity of analytical processing, which involves analysis of accumulated data, mainly by end users. Analytical processing includes Web applications, market research, data mining, CRM activities, and decisionsupport systems. Placing strategic information in the hands of decision makers aids productivity, empowers users to make better decisions, and improves customer service, leading to greater competitive advantage. Collecting, Organizing, and Storing Data for Analytical Processing Analytical processing basically can be done in two ways. One is to work directly with the operational systems (the let s use what we have approach), using software tools and components known as front-end tools and middleware. This option can be optimal for companies that do not have a large number of end users running queries and conducting analyses against the operating systems. Since the mid-1990s, a wave of front-end tools that allow end users to conduct queries and report on data stored in operational databases have become available. The problem with this approach, however, is that the tools are effective only with end users who have a medium-to-high degree of knowledge about databases. These limitations call for a second, improved, option of analytical processing, which involves three concepts: 1. A business representation of data for end users 2. A user-friendly, Web-based environment that gives the customers and corporate employees query and reporting capabilities 3. A single, server-based data repository a data warehouse (DW) that allows centralized analysis, security, and control over the data Data Warehouses The purpose of a data warehouse is to establish a repository that makes operational data accessible in a form readily acceptable for analytical processing activities, such as EC applications, decision support, and other end-user applications. As part of this accessibility, detaillevel operational data must be transformed into a relational form, which makes them more amenable to analytical processing. Thus, data warehousing is not a concept by itself, but is interrelated with data access, retrieval, analysis, and visualization. The process of building and using a data warehouse is shown in Exhibit W4.2.1. The organization s data are stored in operational systems (left side of the figure). Not all data are transferred to the data warehouse; frequently, only a summary of the data is transferred in a process of extraction, transformation, and load (ETL). The data that are transferred are organized within the warehouse as a relational database so that it is easy for end users to access. Also, the data are organized by subject, such as by product, customer segment, or business partner. EC data also may be organized according to a business process, such as ordering, shipping, or available inventory. The data then can be optionally replicated in data marts (explained later). Data access is provided through Web browsers via middleware software. On the right side of the figure are various applications that may use the data. The activities conducted during much of the process described in Exhibit W4.2.1 are generally referred to as business intelligence. The major reason for the name is that these activities not only collect and process data, but they also enable analysis that results in useful intelligent solutions to business problems. The concept of business intelligence originated from executive information system (EIS) activities, but today it is used to describe online analytical processing and data mining activities as well. Data warehouses provide for the storage of metadata, which are data about data. Metadata include software programs about data, rules for organizing data, and data summaries that are easy to index and search, especially with Web tools. data warehouse (DW) A single, server-based data repository that allows centralized analysis, security, and control over data. business intelligence Activities that not only collect and process data, but also make possible analysis that results in useful intelligent solutions to business problems. metadata Data about data, including software programs about data, rules for organizing data, and data summaries.

Chapter Four: Consumer Behavior, Internet Marketing, and Advertising 4-3 Online File W4.2 EXHIBIT W4.2.1 Data Warehouse Framework and Views Business Intelligence POS ERP Legacy Misc OLTP External Web Document Operational Systems/Data External EDI Extraction, Transformation, Load (ETL) Supply Chain Data Metadata Repository Finance Enterprise Data Warehouse Marketing Data Warehouse Replication Data Mart Marketing Data Mart Management Data Mart Data Access M i d d l e w a r e DSS Data Mining Custom-Built Applications (4GL tools) EIS, Reporting Relational Query Tools I n t e r n e t OLAP/Relational OLAP (ROUP) Web Browser Finance Source: Data Warehouse Framework and Views from Introduction to Information Technology, 2nd Edition by Turban, Efraim, R. Kelly Rainer, Jr., and Richard E. Potter. 2002 by John Wiley and Sons. Reprinted by permission of John Wiley & Sons, Inc. Characteristics of Data Warehousing The major characteristics of data warehousing include the following: Organization. Data are organized by detailed subject (e.g., by customer, vendor, product, price level, and region) and only contain information relevant for decision support. Consistency. Data in different operational databases may be encoded differently. For example, gender data may be encoded 0 and 1 in one operational system and m and f in another. They will be coded in a consistent manner within each warehouse. Time variant. The data are kept for 5 to 10 years so that they can be used for trends, forecasting, and comparisons over time. Nonvolatile. Once entered into the warehouse, data are not updated. However, new, related data may replace or supplement old data. Relational. The data warehouse typically uses a relational structure (organized into tables of rows and columns). Benefits of Data Warehouses The major benefits of data warehouses are (1) the ability of users to reach data quickly, because data are located in one place and organized properly, and (2) the ability to reach data easily, frequently by end users themselves, using Web browsers. Another benefit is that a data warehouse provides a consolidated view of corporate data, which is better than providing many smaller (and differently formatted) views. For example, separate production systems may track sales and coupon mailings. Combining data from these different systems may yield insights into the cost efficiency of coupon sales promotions that would not be immediately evident from the output data of either system alone. Integrated within a data warehouse, however, such information can be easily extracted. Data warehouses allow information processing to be off-loaded from expensive operational systems onto low-cost servers (or processed by application service providers, ASPs). Once this is done, end-user tools can handle a significant

4-4 Part 2: Internet Consumer Retailing Online File W4.2 number of end-user information requests. Furthermore, some operational system reporting requirements can be moved to Web-based decision-support systems, thus freeing up production processing. In addition, accessibility to data warehouse content by decision makers is provided throughout the enterprise via an intranet. Users can view, query, and analyze the data and produce reports using Web browsers. This is an extremely economical and effective method of delivering data. The various benefits offered by data warehouses can improve business knowledge, provide competitive advantage, enhance customer service and satisfaction, facilitate decision making, and help in streamlining business processes. Suitability Data warehousing is most appropriate for organizations in which some of the following apply: Large amounts of data need to be accessed by end users. The operational data are stored in different systems. An information-based approach to management is in use. The company has a large, diverse customer base (such as in a utility company or a bank). The same data are represented differently in different systems. Data are stored in highly technical formats that are difficult to decipher. Extensive end-user computing is performed (many end users performing many activities). Hundreds of successful applications have been reported (e.g., see client success stories and case studies at Web sites of vendors such as MicroStrategy, Inc., Business Objects, Cognos Corp., Information Builders, NCR Corp., Platinum Technology, Software A&G, and Pilot Software). For further discussion, see Turban et al. (2008). Also visit The Data Warehouse Institute (TDWI, tdwi.org). Although data warehouses offer substantial benefits, the cost of a data warehouse can be very high, both to build and to maintain. Furthermore, it may be difficult and expensive to incorporate data from obsolete legacy systems. Finally, there may be a lack of incentive among departments within a company to share data. Therefore, a careful feasibility study must be undertaken before a commitment is made to data warehousing. Alternatively, one or more data marts can be used. Data Marts The high cost of data warehouses confines their use mostly to large companies. An alternative used by many other firms is the creation of a lower-cost, scaled-down version of a data warehouse called a data mart. A data mart is a small warehouse designed for a strategic business unit (SBU) or department. A data mart can be fully dedicated to EC. The advantages of data marts over data warehouses include the following: The cost is low (prices under $100,000 versus $1 million or more for large data warehouses). The lead time for implementation is significantly shorter, often less than 90 days. They are controlled locally rather than centrally, conferring power on the using group. They contain less information than the data warehouse. Hence, they have more rapid response and are more easily understood and navigated than an enterprisewide data warehouse. They allow an EC department to build its own decision support systems without relying on a centralized IS department. Data marts are either replicated (dependent) or stand-alone. Replicated data marts are those in which functional subsets of the data warehouse have been replicated (copied) into smaller data marts. The reason for using replicated data marts is that sometimes it is easier to work with a small subset of the data warehouse. Each of these replicated data marts is dedicated to a certain area. The replicated data mart is an addition to the data warehouse. (This is why it is also called dependent its existence depends on the data warehouse.) Alternatively, a company can have one or more stand-alone data marts without having a data warehouse. Stand-alone data marts are typically used for marketing, finance, and engineering applications. Operational Data Stores An operational data store is a database for transaction processing systems that uses data warehouse concepts to provide clean data. That is, it brings the concepts and benefits of the data warehouse to the operational portions of the business, often at a lower cost. It is used for data mart A small data warehouse designed for a strategic business unit (SBU) or department. operational data store A database for use in transaction processing (operational) systems that uses data warehouse concepts to provide clean data.

Chapter Four: Consumer Behavior, Internet Marketing, and Advertising 4-5 Online File W4.2 short-term decisions involving mission-critical applications rather than for the medium- and long-term decisions associated with the regular data warehouse. Short-term decisions often require current information. For example, when a customer sends an e-mail query to a bank, the bank will quickly need to access all of the customer s current accounts. The operational data store can be viewed as situated between the operational data (legacy systems) and the data warehouse. Successes and Failures of Data Warehousing Since their early inception, data warehouses have produced many success stories. However, many failures have also occurred. Stam (2007) identified several types of warehouse failures: Design: Warehouse did not meet the expectations of those involved. Money: Warehouse was completed, but went severely over budget in relation to time, money, or both. Heritage: Warehouse had to be made from a multitude of legacy systems. Data: Quality and consistency of data are not at the level they must be to be effectively loaded into the warehouse. Stam identified a number of reasons for failures (which are typical for many other large information systems): Data Problems Not enough summarization of data Failure to align data marts and data warehouses Poor data quality (e.g., omitted information) Incomplete user input Incorrectly using data marts instead of data warehouses (and vice versa) Insecure access to data manipulation (users should not have the ability to change any data) Poor upkeep of information (e.g., failure to keep information current) Technology Problems Inappropriate architecture Using the warehouse only for operational, not informational, purposes Poor upkeep of technology Inappropriate format of information a single, standard format was not used Other Problems Training and management issues Vendors overselling capabilities of products Lack or inappropriate training and support for users Inexperienced/untrained/inadequate number of personnel Unrealistic expectations overly optimistic time schedule or underestimation of cost Lack of coordination (or requiring too much coordination) Cultural issues were ignored Improperly managing multiple users with various needs Unclear business objectives; not knowing the information requirements Lack of effective project sponsorship Interfering corporate politics Suggestions on how to avoid data warehouse failure are provided at syntelinc.com/syntelligence/index.aspx?id=200. Data Analysis and Knowledge Discovery Once the data are in the data warehouse and/or data marts, they can be accessed by end users. Users can then conduct several types of analytical activities with the data, ranging from decision support and executive support analyses to ad-hoc queries, online analytical processing (OLAP), and data mining.

4-6 Part 2: Internet Consumer Retailing Online File W4.2 Ad-Hoc Query Ad-hoc queries allow users to request real-time information from the computer that is not available in periodic reports. Such answers are needed to expedite decision making. The system must be intelligent enough to understand what the user wants. Simple ad-hoc query systems are based on menus. More intelligent systems use SQL (structured query language) and query-by-example approaches or Web-based applications. Web-Based Ad-Hoc Query Tools Web-based ad-hoc query tools allow users to access, navigate, and explore relational data to make key business decisions in real time. For instance, users can gauge the success of a Web marketing campaign according to the number of Web hits received last month, last week, or even yesterday, in relation to products or services purchased. This insight helps companies better target marketing efforts and forge closer, more responsive relationships with customers. Several vendors offer such tools. For example, Cognos Corp. (now an IBM company; see ibm.com/software/data/cognos/products/series7/query) offers Web users powerful ad-hoc exploration of corporate data assets, with little or no user training needed. Advanced query tools can be connected to intranets and extranets for B2B and CRM querying. Also, a drill-down from multidimensional analysis to DSS and other tools are available. Answers to queries can be delivered to visualization tools. Online Analytical Processing Online analytical processing (OLAP) refers to such end-user activities as DSS modeling using spreadsheets and graphics, which are done online. OLAP is an information system that enables the user to query the system, conduct an analysis, and so on, while the user is at a PC. The result is generated in seconds. Unlike online transaction processing (OLTP) applications, OLAP involves many data items (frequently many thousands or even millions) in complex relationships. One objective of OLAP is to analyze these relationships and look for patterns, trends, and exceptions. Another objective is to answer user queries. A typical OLAP query might access a multigigabyte, multiyear sales database in order to online analytical processing (OLAP) End-user analytical activities, such as DSS modeling using spreadsheets and graphics, that are done online. find all product sales in each customer segment (female, male, young people, etc.). After reviewing the results, an analyst might further refine the query to find sales volume for each sales channel by hours of the day or by product type. As a last step, the analyst might want to perform year-to-year or quarter-to-quarter comparisons for each sales channel. This whole process must be carried out online with rapid response time. Thus, OLAP queries are able to analyze the relationships among many types of business elements (e.g., sales, products, regions, and channels) involving aggregated data over time (e.g., sales volumes, budgeted dollars, and dollars spent, on a monthly, quarterly, or yearly basis). The ability to present data in different perspectives involving complex calculations between data elements (e.g., expected profit calculated as a function of sales revenue for each type of sales channel in a particular region) enables users to pursue an analytical thought process without being stymied by the system. Many vendors provide ready-made analytical tools, mostly in finance, marketing, and operations (e.g., productivity analyses, profitability analyses). Such packages include built-in Web-based DSSs. For example, Cognos Finance (from cognos.com) is an enterprisewide financial application for monitoring the financial performance of a business organization. It provides a framework for completing financial processes in a timely manner: monthly and quarterly closes, the budget process, and integration of the latest actual data with user-supplied forecasts. Users also can integrate Web information for a single view of the organization. However, although OLAP can be quite useful, it is retrospective in nature and cannot provide the automated and prospective knowledge discovery that is done by advanced data mining techniques. Knowledge Discovery The process of extracting useful knowledge from volumes of data is known as knowledge discovery in databases (KDD), or just knowledge discovery (KD). The objective of KDD is to identify valid, novel, potentially useful, and ultimately understandable patterns in data. KDD is useful because it is supported by three technologies that are now sufficiently mature to produce meaningful data: massive data collection, powerful multiprocessor computers, and data mining algorithms. Formal computer-based knowledge discovery has been done since the 1960s. However, the enabling techniques have been expanded and improved over time. KDD processes have appeared under various names and have shown different characteristics. KDD tools have evolved over time. Over time, KDD has become able to answer more complex business questions. knowledge discovery in databases (KDD)/knowledge discovery (KD) The process of extracting useful knowledge from volumes of data.

Chapter Four: Consumer Behavior, Internet Marketing, and Advertising 4-7 Online File W4.2 Data Mining Data mining derives its name from the similarities between searching for valuable business information in a large database and mining a mountain for a vein of valuable ore. Both processes require either sifting through an immense amount of material or intelligently probing it to find exactly where the value resides. In some cases, the data are consolidated in a data warehouse and data marts; in others, they are kept on the Internet and intranet servers. Given databases of sufficient size and quality, data mining technology can generate new business opportunities by providing the following capabilities: data mining The process of searching a large database to discover previously unknown patterns; automates the process of finding predictive information. Automated prediction of trends and behaviors. Data mining automates the process of finding predictive information in large databases. Questions that traditionally required extensive hands-on analysis can now be answered directly and quickly from the data. A typical example of a predictive problem is targeted marketing. Data mining can use data on past promotional mailings to identify the targets most likely to respond favorably to future mailings. Other predictive examples include forecasting bankruptcy and other forms of default and identifying segments of a population likely to respond similarly to given events. Automated discovery of previously unknown patterns. Data mining tools identify previously hidden patterns in one step. An example of pattern discovery is the analysis of retail sales data to identify seemingly unrelated products that are often purchased together, such as baby diapers and beer. Other pattern discovery problems include detecting fraudulent credit card transactions and identifying invalid (anomalous) data that may represent data entry keying errors. When data mining tools are implemented on high-performance, parallel-processing systems, they can analyze massive databases in minutes. Often, these databases will contain several years worth of data. Faster processing means that users can experiment with more models to understand complex data. High speed makes it practical for users to analyze huge quantities of data. Larger databases, in turn, yield improved predictions. Data mining also can be conducted by nonprogrammers. The miner is often an end user, empowered by data drills and other power query tools to ask ad-hoc questions and get answers quickly, with little or no programming skill. Data mining tools can be combined with spreadsheets and other end-user software development tools, making it relatively easy to analyze and process the mined data. Data mining appears under different names, such as knowledge extraction, data dipping, data archeology, data exploration, data pattern processing, data dredging, and information harvesting. Striking it rich in data mining often involves finding unexpected, valuable results. Data mining yields five types of information: 1. Association. Relationships between events that occur at one time (e.g., the contents of a shopping cart, such as orange juice and cough medicine) 2. Sequences. Relationships that exist over a period of time (e.g., repeat visits to a supermarket) 3. Classifications. The defining characteristics of a certain group (e.g., customers who have been lost to competitors) 4. Clusters. Groups of items that share a particular characteristic that was not known in advance of the data mining 5. Forecasting. Future values based on patterns within large sets of data (e.g., demand forecasting) Data miners use several tools and techniques: case-based reasoning (using historical cases to recognize patterns); neural computing (a machine-learning approach by which historical data can be examined for patterns through massive parallel processing); association analysis (using a specialized set of algorithms to sort through datasets and express statistical rules among items); and intelligent agents (expert or knowledge-based software embedded in information systems). A Sampler of Data Mining Applications According to Nesbit (2009) 95 percent the Fortune 1000 companies worldwide are using data mining technology. Data mining can be very helpful, as shown by the representative examples that follow. Note that the intent of most of these examples is to identify a business opportunity in order to create a sustainable competitive advantage. Retailing and sales distribution. Predicting sales, determining correct inventory levels, and distribution schedules among outlets Banking. Forecasting levels of bad loans and fraudulent credit card use, predicting credit card spending by new customers, predicting which kinds of customers will best respond to (and qualify for) new loan offers Manufacturing and production. Predicting machinery failures, finding key factors that control optimization of manufacturing capacity

4-8 Part 2: Internet Consumer Retailing Online File W4.2 Brokerage and securities trading. Predicting when bond prices will change, forecasting the range of stock fluctuations for particular issues and the overall market, determining when to buy or sell stocks Insurance. Forecasting claim amounts and medical coverage costs, classifying the most important elements that affect medical coverage, predicting which customers will buy new policies Computer hardware and software. Predicting disk-drive failures, forecasting how long it will take to create new chips, predicting potential security violations Police work. Tracking crime patterns, locations, and criminal behavior; identifying attributes to assist in solving criminal cases Government and defense. Forecasting the cost of moving military equipment, testing strategies for potential military engagements, predicting resource consumption; improving homeland security by mining data from many sources (see Chapter 8) Airlines. Capturing data on where customers are flying and the ultimate destination of passengers who change carriers in hub cities so that airlines can identify popular locations that they do not service, checking the feasibility of adding routes to capture lost business Health care. Correlating demographics of patients with critical illnesses, developing better insights on symptoms and their causes, learning how to provide proper treatments Broadcasting. Predicting the most popular programming to air during prime time, predicting how to maximize returns by interjecting advertisements Marketing. Classifying customer demographics that can be used to predict which customers will respond to a mailing or buy a particular product Text Mining Text mining is the application of data mining to nonstructured or less-structured text files. Data mining takes advantage of the infrastructure of stored data to extract predictive information. For example, by mining a customer database, an analyst may discover that everyone who buys product A also buys products B and C, but does so 6 months later. Text mining, however, operates with less-structured information. Documents rarely have strong internal infrastructure, and when they do, it is frequently focused on document format rather than document content. Text mining helps organizations find the hidden content of documents, as well as additional useful relationships. It also helps them group documents by common themes (e.g., identify all the customers of an insurance firm who have similar complaints). Web Mining The previous discussion of data mining refers to data that usually are stored in a data warehouse. However, to analyze a large amount of data on the Web, one needs different mining tools. Web mining is the application of data mining techniques to discover meaningful patterns, profiles, and trends from Web sites. The term Web mining is used to describe two different types of information mining. The first, Web content mining, is the process of discovering information from millions of Web documents. The second, Web usage mining, is the process of analyzing what customers are doing on the Web that is, analyzing clickstream data. In Web mining, the data are clickstream data, usually stored in a special clickstream data warehouse (see clickstreamconsulting.com) or in a data mart. The strategies used may be the same in both. Several companies provide tools for Web mining for example, iopus (iopus.com), KDNuggets (kdnuggets.com), Megaputer (megaputer.com), and SPSS (spss.com). text mining The application of data mining to nonstructured or less-structured text files. Web mining The application of data mining techniques to discover meaningful patterns, profiles, and trends from both the content and usage of Web sites.

Chapter Four: Consumer Behavior, Internet Marketing, and Advertising 4-9 KEY TERMS Business intelligence 2 Data mart 4 Data mining 7 Data warehouse (DW) 2 Knowledge discovery in databases (KDD)/ knowledge discovery (KD) 6 Metadata 2 Online analytical processing (OLAP) 6 Operational data store 4 Text mining 8 Web mining 8 REFERENCES FOR ONLINE FILE W4.2 Inmon, W. H., et al. Corporate Information Factory, 2nd ed. New York: Wiley, 2000. Nesbit, R. Handbook of Statistical Analysis and Data Mining Applications. New York: Academic Press, 2009. Stam, A. A Successful Enterprise Data Warehouse? The Four Biggest Reasons for Failure. Information Management Direct, January 12, 2007. information-management.com/infodirect/20070112/1069537-1.html (accessed April 2009). Turban, E., et al. Business Intelligence: A Managerial Approach. Upper Saddle River, NJ: Prentice Hall, 2008. Turban, E. et al. Introduction to Information Technology, 2nd ed. Hoboken, NJ: John Wiley and Sons, 2002.

4-10 Part 2: Internet Consumer Retailing Online File W4.3 Internet-Based Market Research Process Steps in Collecting Market Research Data 1. Define the research issue and the target market. 2. Identify newsgroups and Internet communities to study. 3. Identify specific topics for discussion. 4. Subscribe to the pertinent groups; register in communities. 5. Search discussion group topic and content lists to find the target market. 6. Search e-mail discussion group lists. 7. Subscribe to filtering services that monitor groups. 8. Read FAQs and other instructions. 9. Visit chat rooms. Content of the Research Instrument 1. Post strategic queries to groups. 2. Post surveys on a Web site. 3. Offer rewards for participation. 4. Post strategic queries on a Web site. 5. Post relevant content to groups, with a pointer to a Web site survey. 6. Post a detailed survey in special e-mail questionnaires. 7. Create a chat room and try to build a community of consumers. Target Audience of the Study 1. Compare audience with the target population. 2. Determine each segment s reason for wanting the product/service. 3. Determine market characteristics and trends. 4. Determine editorial focus. 5. Determine content. 6. Determine what Web services to create for each type of audience. Sources: Compiled from Kennaugh (2009) and Moisander and Valtonen (2006). REFERENCES FOR ONLINE FILE W4.3 Kennaugh, C. Collect Data for Your Marketing Strategy. Microsoft.com, 2009. office.microsoft.com/en-us/help/ HA011415001033.aspx (accessed April 2009). Moisander, J., and A. Valtonen. Qualitative Marketing Research: A Cultural Approach. Thousand Oaks, CA: Sage, 2006.

Chapter Four: Consumer Behavior, Internet Marketing, and Advertising 4-11 Online File W4.4 Spyware Advertisers use spyware to spy on your movements on the Internet and send you e-mail ads or pop-ups based on what they learn about you. Authors of shareware and freeware often use spyware in order to make money on their products, which are often offered free to users. Shareware authors may insert banner ads of advertisers into their products in exchange for a portion of the revenues generated by the banners. This way, end users do not have to pay for the software, and the developers get paid for their efforts. End users who find the banners to be annoying can usually obtain a banner-free copy of the shareware by paying a regular licensing fee to the developer. Increasingly, however, spyware is being embedded in purchased software. Spyware Categories Spyware threats come in different flavors. One variety of spyware is malware. This type of spyware can modify the system settings on the user s computer (see Chapter 11) and perform other undesirable tasks. A hijacker is a piece of spyware that redirects the user s browser to a particular Web site. A dialer is spyware that dials a service, most likely porn sites, without the user s knowledge. In many cases, the user will be held responsible for the bill. A trojan horse is spyware that is attached to a program and performs undesirable tasks on the user s system. Collectware is spyware that collects information about the user. This information is then provided to a third party without the user s knowledge. Simply the Best (simplythebest.net/software/cat/205/spyware-cleaners.html) identifies the following types of spyware: Adware networks. Ad-serving networks such as DoubleClick, Web3000, Radiate, SaveNow, and GAIN pay publishers of games, utilities, and music/video players per download to include their ad-serving programs. Stalking horses. These include a number of programs that collect information on the user and facilitate adware networks to function on desktops. These programs are bundled in many popular programs and often are presented in installation disclosure screens as desirable add-ons to Trojan horse hosts. Examples include TopText, Cydoor, OnFlow, Medialoads, Delfin, WebHancer, and New.net. Trojan horses. These are popular Internet downloads that usually come with the ad-serving network basic software and at least one stalking horse. They are contained in KaZaa, Grokster, Morpheus, Limewire, AudioGalaxy, imesh, and DivX. Backdoor Santas. These are stand-alone programs that incorporate similar approaches as those just discussed. However, they have no links to ad-serving networks, although their purpose is to collect information from users. They are located in Alexa, Hotbar, Comet Cursor, ewallet, CuteFTP, and BonziBuddy. Cookies. Netscape Navigator and Internet Explorer still send out cookies even after cookies have been disabled in the browser settings. Any and all cookie files must be manually deleted on your system in order to eliminate being tracked by third-party ad networks or spyware or adware providers. For more information about spyware, see spywareguide.com and Chapters 10 and 16. Online File W4.5 List of Information Provided by Clickstream Data B2C clickstream data can reveal information such as the following: What goods the customer has looked at What goods the customer has purchased What goods the customer examined but did not purchase What items the customer bought in conjunction with other items What items the customer looked at in conjunction with other items but did not purchase Which ads and promotions were effective and which were not Which ads generate a lot of attention but few sales Whether certain products are too hard to find and/or too expensive Whether there is a substitute product that the customer finds first Whether there are too many products for the customer to wade through Whether certain products are not being promoted Whether the products have adequate descriptions

4-12 Part 2: Internet Consumer Retailing Online File W4.6 From Mass Advertising to Interactive Advertising Desired outcomes Mass Advertising Direct-Mail Advertising Interactive Advertising Volume sales Targeted reach, more sales, customer data Volume sales, CRM, customer feedback, acquire new customers, improve target marketing ROI Consumer activities Passive Passive Active Leading products Food, personal care products, beer, autos, cameras, computers, appliances Credit cards, travel, autos, some appliances Upscale apparel, banking, books, travel, insurance, computers, autos, jewelry, office supplies Market strategy High-volume products Targeted goods to segments Targeted individual or groups Nerve centers (command centers) Preferred media vehicle Preferred technology Madison Avenue (advertisers) Postal distribution centers, warehouses Cyberspace, logistics companies, online marketers Television, newspapers, magazines Mailing lists Online services, e-commerce, banners Storyboards, TV Databases Servers, on-screen navigators, the Web Worst outcome Channel surfing Recycling bins Log off REFERENCES FOR ONLINE FILE W4.6 Hallerman, D. The Death of Mass Marketing. imedia Connection, June 16, 2006. Interactive Advertising News. Confessions of an Online Marketer. Interactive Daily, April 15, 2007.

Chapter Four: Consumer Behavior, Internet Marketing, and Advertising 4-13 ONLINE FILE W4.7 Application Case 1-800-FLOWERS.COM USES DATA MINING TO FOSTER CUSTOMER RELATIONSHIP MANAGEMENT 1-800-Flowers.com (1800flowers.com) is a true Internet pioneer. It had an Internet presence in 1992 and full-fledged e-store capabilities in 1995. Online sales are a major marketing channel (in addition to telephone and fax orders). Competition is very strong in this industry. The company s success was based on operational efficiency, convenience (24/7 accessibility), and reliability. However, all major competitors provide the same features today. To maintain its competitive advantage, the company transformed itself into a customer-intimate organization, caring for more than 15 million customers. The challenge was to make 1-800-Flowers.com the only retailer that customers really trust when shopping for gifts online or by phone. The company decided to cultivate brand loyalty through customer relationships, which is based on intimate knowledge of customers. How is this accomplished? The company uses SAS software that spans the entire decision-support process for managing customer relationships: Collecting data at all customer contact points, the company turns that data into knowledge for understanding and anticipating customer behavior, meeting customer needs, building more profitable customer relationships, and gaining a holistic view of a customer s lifetime value. Using SAS Enterprise Miner, 1-800-Flowers.com sifts through data to discover trends, explain outcomes, and predict results so that the company can increase response rates and identify profitable customers. The rationale for the customer intimate effort is to build loyalty. In addition to selling and campaign management, the ultimate goal is to make sure that when a customer wants to buy, he or she continues to buy from 1-800-Flowers.com and cannot be captured by a competitor s marketing. To build that kind of loyalty, it is necessary to know your customers and build a solid relationship with each one of them. Identifying Each Customer At 1-800-Flowers.com, the objective is not just about getting customers to buy more. It is about making sure that when they decide to purchase a gift online or by phone, they do not think of going to the competition. Loyalty is earned through the quality of the relationship offered. The difficulty is that not every customer wants the same relationship. Some want you to be more involved with them than others; some will give you different levels of permission on how to contact them. At the end of the day, the data mining software helps the company identify the many different types of customers and how each would like to be treated. The company plans its ad campaigns based on the results of the data mining done on a one-to-one basis. For example, some customers like to be notified about sales; others do not. Some prefer notification via e-mail. The data for the analysis is derived from the data center, which is backed up by AT&T technology. Many factors have contributed to the company s recent revenue growth customer relationship management among them. The data mining analysis provides rapid access to better customer information and reduces the amount of time the company needs to spend on the phone with customers, which makes better use of everybody s time. The net result is that customer retention has increased 15 percent over 2 years. Questions 1. Why is being number one in operation efficiency not enough to keep 1 800-Flowers.com at the top of its industry? 2. Identify all market research activities and methods. 3. How was the transformation to a customer intimate business accomplished? 4. What is the role of data mining and personalization in customer relationship management in the case? 5. How is the one-to-one relationship achieved in the case? REFERENCES FOR ONLINE FILE W4.7 1800flowers.com (accessed March 2009). Anonymous. Ultimate Relationship in Bloom. Customer Success: 1-800-Flowers. Sas.com, 2006. sas.com/success/ 1800flowers.html (accessed March 2009). Reda, S. 1-800-Flowers.com and AT&T Cultivate Relationship Rooted in Common Business Objectives. Stores, October 2006.

4-14 Part 2: Internet Consumer Retailing Online File W4.8 Advantages and Limitations of Internet Advertising Medium Advantages Limitations TV Radio Magazines Newspapers Internet Intrusive impact high attention-getter Ability to demonstrate product and to feature slice of life situations Very merchandisable with media buyers Highly selective by station format Allows advertisers to choose the time of day or the day of the week to exploit timing factors Copy can rely on the listener s mood or imagination Offer unique opportunities to segment markets, both demographically and psychographically Ads can be studied and reviewed at leisure High impact can be attained with good graphics and literate, informative copy High single-day reach opportunity Reader often shops for specific information when ready to buy Portable format Internet advertisements are available 24 hours a day, 365 days a year Costs are the same regardless of audience location Accessed primarily because of interest in the content, so market segmentation opportunity is large Opportunity to create one-to-one direct marketing relationship with consumer Multimedia will increasingly create more attractive and compelling ads Fragmented ratings, rising costs, clutter Heavy downscale audience skew Time is sold in multiprogram packages; networks often require major up-front commitments; both limit the advertiser s flexibility Audience surveys are limited in scope, do not provide socioeconomic demographics Difficult to buy with so many stations to consider Testing of copy is difficult because there are few statistical guidelines Reader controls ad exposure, can ignore campaign Difficult to exploit timing aspects Lack of creative opportunities for emotional selling campaigns High cost for large-size ads Lack of demographic selectivity; despite increased zoning, many markets have only one paper Low-quality reproduction, lack of color No clear standard or language of measurement Immature measurement tools and metrics Although the variety of ad content format and style that the Internet allows can be considered a positive in some respects, it also makes applesto-apples comparisons difficult for media buyers Difficult to measure size of market, therefore it is difficult to estimate rating, share, or reach and frequency Audience is still small

Chapter Four: Consumer Behavior, Internet Marketing, and Advertising 4-15 ONLINE FILE W4.9 Application Case TARGETED ADVERTISING THE DOUBLECLICK APPROACH One-to-one targeted advertising can take many forms. Assume that 3M Corp. wants to advertise its multimedia projectors that cost $10,000. It knows that potential buyers are people who work in advertising agencies, in information systems departments of large corporations, or in companies that use the UNIX operating system. 3M approaches DoubleClick and asks the firm to identify such potential customers. How does DoubleClick find them? The answer is both clever and simple. As of 1997, DoubleClick (doubleclick.com/us; now a Google company) monitors people browsing the Web sites of several hundred cooperating companies such as Quicken (quicken.com) and Travelocity (travelocity.com). By inspecting the Internet addresses of the visitors to these companies Web sites and matching them against a database with about 100,000 Internet domain names that include a line-of-business code (code that tells the classification of each industry), DoubleClick can find those people working for advertising agencies. By checking the users browsers, it also can find out which visitors are using UNIX. Although DoubleClick cannot find out a visitor s name, it can build a dossier on the visitor that is attached to an ID number that was assigned during the visitor s first visit to any of the cooperating sites. As the visitor continues to visit the sites, an intelligent (software) agent builds a relatively complete dossier on the visitor that includes the sites they visit, the pages they looked at, the Internet address from which they came, and so on. This process is done with a cookie, so the Web site can remember a visitor s past behavior on the Internet. DoubleClick then prepares an ad about 3M projectors. The ad is targeted to people whose profiles match the criteria listed earlier. If a visitor is a UNIX user or an employee of an advertising agency, on the visitor s next browsing trip to any of the participating Web sites, that person will be greeted with an ad that 3M hopes will be of interest an ad for a multimedia projector. How is this activity financed? DoubleClick charges 3M for the ad. The fee is then split with the participating Web sites that carry the 3M ads based on how many times the ad is matched with visitors. In 1998, DoubleClick expanded the service, called Dynamic Advertising Reporting and Targeting (DART), from pinpoint target and ad design to advertising control, ad frequency determination, and providing verifiable measures of success. DoubleClick brings the right advertisement to the right person at the right time. DART works with 22 criteria that it tries to find on each consumer (e.g., location, time of day, etc.). A schematic view of the process is shown in the following table. Topic DART Adapt Methodology Step 1: Define your goals (DART User Interface) Step 2: Market segmentation Step 3: Optimization Step 4: Reporting/measuring results Description DART Adapt uses best practices from offline direct marketing to drive an automated optimization engine. These best practices include a four-step process that is used to ensure your goals are defined and exceeded. DART Adapt lets you optimize to the specific results your advertisers are looking for. You can choose to optimize several different metrics, including clicks, view-through and click-through conversions, and other site-side activities. You choose the ads you want to optimize through a simple checkbox integrated into the DART User Interface, and DART Adapt does the rest. Optimization works by matching ads with the audience that responds best. How the audience is segmented plays a pivotal role in this process. DART Adapt leverages years of research and sophisticated statistical modeling and clustering methodologies to analyze millions of pieces of data from your ad-serving network, creating segments that would not be intuitive to the naked eye. After segments are built for your network, sophisticated optimization algorithms kick in through the ad server that recognizes how each ad that is enabled for optimization performs across each segment and adapts delivery patterns to optimize performance in real time. DART Adapt leverages the use of a control group to measure and compare performance. This enables you to clearly see the performance increase generated by optimization. This information can be shared with your advertisers, thereby demonstrating the improved ROI they receive on campaigns within your network.

4-16 Part 2: Internet Consumer Retailing ONLINE FILE W4.9 In June 1999, DoubleClick announced the purchase of Abacus Direct, whose database contains the buying habits of 88 million U.S. households. DoubleClick wanted to tie its online consumer data with that of Abacus to collect personal information online. This way, names and addresses would be in DoubleClick s database. Privacy-protection groups opposed the merger, asking the Federal Trade Commission (FTC) to open an investigation. Under pressure, DoubleClick agreed to limit the connection. In 2006, DoubleClick released DART Adapt, which automatically matches ads with the audience that will deliver the greatest return for either branding or direct response goals at any given moment in time. Questions 1. How does DoubleClick build dossiers on people? 2. How are ads matched with individual viewers? 3. Why is an advertising network needed? 4. What role do the participating sites play in the DART system? 5. How does DART Adapt differ from the original DART? REFERENCES FOR ONLINE FILE W4.9 Brown, J. Click, Two. BusinessWeek, February 18, 2002. doubleclick.com (accessed March 2009). Rothenberg, R. An Advertising Power, but Just What Does DoubleClick Do? The New York Times, September 22, 1999.

Chapter Four: Consumer Behavior, Internet Marketing, and Advertising 4-17 Online File W4.10 Click-Through and Conversion Ratios Click-Throughs Consider the following example. Of people who showed interest in an advertising link by hovering their mouse over it, 4 percent clicked through. Of those 4 percent, 6 percent made a purchase. Four percent is a very high click-through rate, but that is 4 percent of those who even hovered over the link. Let s use the same percentages and say that about 5 percent of all visitors will hover over a link that is, 5 percent will at least read the ad. Given these statistics, about 5 percent of visitors read an add, around 0.2 percent (5 percent 4 percent) click on an ad, and around 0.012 percent (0.2 percent 6 percent) actually make a purchase. During the initial Internet boom of 1995 2000, online advertisers paid for each eyeball. That means that 99.988 percent of their money was wasted. Advertisers finally figured that out, stopped paying for eyeball ads, and the dot-com boom went bust. A new model came along, of which Google is the biggest success. Instead of paying for eyeballs, advertisers pay for click-throughs. This model is much more efficient than the old one. How efficient is it? Well, now only 94 percent (100 percent 6 percent) of advertisers money is thrown away. That is a great deal better, but it is still miserable. At least now the buckshot-as-dollars are aiming at a target, but only $6 out of every $100 is hitting the target. Click-Through Rate (CTR) The click-through rate is the ratio of page views to clicks. For example, it may be expressed as the percentage of total visitors to a particular page who actually clicked on the banner ad. However, CTRs can also be determined through keyword searches, as expressed by Kintz (2006). To determine how many searches were conducted on more than 600,000 keywords, a keyword sample was created from the data that allowed the calculation of an estimated click-through rate (CTR). These terms were checked against the Overture Keyword Selector to estimate total searches conducted. By dividing reported searches by clicks received (from all engines), the effective click-through rate was found to be 4.7 percent (Kintz 2006). The Kelsey Group forecasts that the global online local search market, which includes Internet Yellow Pages, local search, and wireless, will grow from the $3.4 billion it brought in last year to nearly $13 billion by 2010. The company s report projects a 30.5 percent growth rate over the next 4 years (Burns 2006). REFERENCES FOR ONLINE FILE W4.10 Burns, E. Local Search to Hit $13B by 2010, ClickZ News, February 16, 2006. clickz.com/showpage.html? page=3585511 (accessed March 2009). Clearfish Research. The Google Bubble and Advertising Dollar Buckshot, November 18, 2005. clearfishresearch. blogspot.com/2005/11/google-bubble-and-advertisingdollar.html (accessed March 2009). Kintz, B. White Paper: Chasing the Long Tail of Natural Search. August 7, 2006. netconcepts.com/long-tailwhitepaper (accessed March 2009).

4-18 Part 2: Internet Consumer Retailing Online File W4.11 Pop-Up Advertising Methods Mouse-trapping. Disables the user s ability to go back, exit, or close while viewing the page. Typo-piracy and cybersquatting. Uses misspellings and derivations of a popular brand name to divert traffic to an unintended site. Unauthorized software downloads. Leaves behind software that contains embedded advertising or tracking capabilities. Sometimes coupled with mislabeling of buttons so that the download occurs regardless of whether yes or no is selected. Visible seeding. Visibly places popular brands, slogans, and proprietary content into a site to optimize search engine rankings. Invisible seeding. Hides content to optimize search service rankings. Changing homepage or favorites. Substitutes a new homepage setting or makes changes to the user s favorites list. Framing. Keeps customer on the original site while the customer views content of another site through the original site s window; the site can then use higher visit time statistics to attract advertisers. Spoof or magnet pages. Seeds site content with select words, brands, slogans, and personalities to draw traffic. Mislabeling links. Falsely labels hyperlinks that send the shopper to an unintended destination. Online File W4.12 What Is Involved in Localization? When companies bring their products and services to foreign markets, they may need to move away from standardization. The problem is how to do it in an efficient way. Rigby and Vishwanath (2006) provide a list of items that demand attention. Details are available in the original article. Variables Considered in Localization Branding (names, language) Store formats (size, layout) Merchandise spaces and assortment (size, color, style, flavor, package design) Pricing (range, changes, financing) Promotions (types, duration, discount level) Vendor policies Management programs Store service levels Vendor services Operating policies Location Variables Consumer characteristics Special demand drivers Competitor characteristics Company s own stores characteristics vs. others

REFERENCES FOR ONLINE FILE W4.12 Rigby, D. K., and V. Vishwanath. Localization: The Revolution in Consumer Markets. Harvard Business Review (April 2006). Chapter Four: Consumer Behavior, Internet Marketing, and Advertising 4-19 SDL International. Creating, Managing, and Maintaining a Global Web Site. SDL.com, March 2005. sdl.com/files/ pdfs/white-paper-creating-managing-maintainingglobal-website.pdf (no longer available online). Online File W4.13 E-Mail Advertising Methods In 2007, countless companies discovered the many uses of e-mail marketing. They saved money, improved efficiency and effectively tracked their results simply by getting on board with e-mail marketing software. The five top uses of e-mail marketing were: 1. Sending e-mail newsletters to customers is an effective communication tool. 2. Special promotions or ecoupons can be sent to mailing list subscribers. 3. E-mail is an easy and cost-effective way to spread the word about events, as well as tracking responses. 4. Customers feel appreciated when they receive personalized e-cards at holidays throughout the year. 5. Making business announcements and sending press releases through e-mail reaches a large audience. The following are a few examples of e-mail advertising methods: E-Mail Promotions. E-Greetings (egreetings.com) produces digital postcards and animations for its customers, who are both individuals and corporations. For a modest membership fee ($13.95 annually), members have access to more than 5,000 e-greeting cards, plus designs for flyers, fax covers, and envelopes. Through its free membership trial and its members list, E-Greetings has compiled a database of millions of recipients. E-Greetings goals for its e-mail promotion campaign include bringing value to its customers, driving traffic and transactions at the customer s site, stimulating involvement with the site, expanding customer relationships, offering added means of sponsorship, and supporting brand affinity. E-Greetings main relationship-building tool is its newsletter, What s Up @ Egreetings! Key factors in its success are the fact that the mailing list is totally voluntarily (opt-in); newsletters are distributed on a regular, biweekly schedule; the content is relevant; and it handles unsubscribe difficulties and customer service in a timely manner. Discussion Lists. Internet Security Systems (ISS), with $1 billion in sales per year, provides software that detects weaknesses in systems and gives detailed corrective measures for fixing security holes. Its success began when its founder, Chris Klaus, posted a notice about his security software on a newsgroup. He then offered a shareware version of the program to the newsgroup members and received 200 e-mail responses the following day. His company s discussion list program includes approximately 80 specialized e-mail lists reaching more than 100,000 people through discussions, partner lists, customer lists, and product announcement lists. Sponsorship of discussion groups, communities, and newsletters is becoming quite popular on the Web (see sponsorship.com). E-Mail List Management. L-Soft s Listserv (lsoft.com/products/listserv.asp), the leader in software for e-mail list management and marketing, is known for its electronic newsletters, discussion groups, and direct e-mail messaging. According to Kinnard (2002), the company understands that 9 out of 10 customer interactions are not transactions, so it offers database integration, mail merges, and customizable Web interfaces that allow companies to send pertinent information, such as product details or advertising, to specific customers. Listserv delivers 30 million messages each weekday and 1 million messages per hour from a single server. For e-mail challenges, see Berkowitz (2004). REFERENCES FOR ONLINE FILE W4.13 Berkowitz, D. Responsys Responds to E-Mail Challenges. emarketer, April 9, 2004. Burko, R. The Five Top E-Mail Marketing Uses in 2007. WebReference.com, December 31, 2007. webreference. com/promotion/email_marketing (accessed April 2009). Kinnard, S. Marketing with E-Mail, 3rd ed. Gulf Breeze, FL: Maximum Press, 2002.

4-20 Part 2: Internet Consumer Retailing Online File W4.14 Marketing and Advertising in the Web 2.0 Environment Organizations that exercise thought leadership rather than traditional advertising and product promotion are today s success stories. Effective Web contents in all Web 2.0 forms (blogs, media-rich Web sites, online videos, podcasts, and social networking) are critical for any business. Rather than trying to coerce people into paying attention to products and services by dreaming up messages and ad campaigns, advertising is now created with or even by people and for people. We now have a tremendous opportunity to directly publish good content online, content that people want to consume and that they are eager to share with their friends, family, and colleagues. In Chapter 4 we covered a few topics and more were covered in Chapter 9. Here we cover some additional topics. Email 2.0 E-mail marketing has been going through a renaissance as marketers experiment with integrating new innovations into e-mail to make it more effective and useful. Today s e-mail campaigns are designed to reach out to new potential customers even to youngsters (see Closing Case, Chapter 4) and get them involved. E-Mail Newsletters E-mail newsletters are comprised of user-generated content (UGC). (Note that UGC also stands for University Grant Commission. ) For example, a newsletter targeted toward professional women highlights UGC such as consumer-submitted recipes. A newsletter called the Daily Shoe Digest, by the shoe e-tailer Zappos, includes only UGC. UGC in e-mail newsletters works best with segmentation. For example, AbeBooks (abebooks.com) newsletters are effective in creating a sense of community. When consumers subscribe, they choose an area like cooking or science fiction, and then they receive relevant content related to their interest. Consumers are then asked to contribute relevant book reviews and participate in poetry contests. Another popular form of UGC is blogs. Companies are establishing blogs to nurture ties with customers, and retailers are promoting their blogs in their e-mail newsletters. In 2007 PETCO launched its blog (petconews.com) and alerted subscribers to its existence in a PETCO newsletter. PETCO has been using its e-mail newsletter and blogs in tandem in order to keep people updated on issues such as pet food recalls. Marketers also are promoting their RSS feeds through e-mail newsletters. Retailer ebags (ebags.com) entices e-mail recipients to subscribe to its frequent brand alert RSS feeds, so consumers can see new styles as soon as they arrive. Video in E-Mail Campaigns Companies are connecting videos to social networking. For example, Bass Pro Shops (basspro.com) has video tutorials on fishing and trips, including UGC. Response rates for e-mails with video links are three to 10 times higher than those for static e-mail. More importantly, these e-mail messages tend to increase traffic and conversion rate. E-mail videos may have two problems: spamming and insufficient broadband. One solution for distributing video via e-mail is offered by magnify.net, which created a branded site to showcase UGC that can be used mainly for marketing videos. Use of Social Media Tools in E-Mail 2.0 Web 2.0 innovations also look at how users can promote and rate content that is important and relevant to them. Marketers can exploit this trend in their e-mail campaigns to induce consumers to indicate what is important to them. For example, Dell, in its campaign to increase customer acquisitions, sent an e-mail that had a four-point rating system, requesting the recipients to rate its products and provide feedback. Blogging as a Marketing Strategy Companies should consider adding blogs to their marketing plans to complement their search engine marketing. Active blogs can rank well in search engines, provide quality links to the main domain, and expand traffic and presence on the Web. Blog marketing and advertising content should be short, simple to read, and updated frequently with unique and attractive content that is helpful to users. The top 50 most popular blogs tracked by Technorati.com (technorati.com), an online buzz tracker, are drawing more than 20 million visitors a day. Optimizing Blogs for Search Engines Southwest Airlines joins a growing number of companies looking to improve search engine ranking with the use of blogs. Blogs are fabulous for search because of the way they are set up. Many are template driven, so they are reasonably search friendly. They also satisfy a search engine s need for frequency, timeliness, and good, solid material. Blogs are typically keyword rich, too. People are more likely to click on a regular search link than a paid search link.