Internet Support to Marketing


Market Research

  1. Market information
  2. Competitor information
  3. Customer information
  4. Miscellaneous information
  5. Collect saving ideas

Database Building

  1. World-wide club
  2. Dynamic relationship marketing

Customer Service

  1. Self-servicing customers
  2. Self-service customer abuse
  3. Self-service cost savings

New Product Development

  1. Collecting new ideas
  2. Tailor-made products
  3. Accelerating new product development

Internal Communications

  1. Intranets
  2. Extranets

Cost Reduction

  1. Print and distribution
  2. Phone calls
  3. Customer service
  4. Collecting cost-saving tips
  5. Revenue generation

Distribution

  1. Products
  2. Services
  3. Purchases

Selling

  1. Few fairytale  sales stories
  2. New markets
  3. Small value, big turnover
  4. Sales management tool

Promotion

  1. Have a presence
  2. Interactive advertising creative sponsorship
  3. Sales promotions
  4. Public relations
  5. Database marketing

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, and my Lectures.

 

Information: The Corporate Power


The explosion of the general public’s use of the Internet or World Wide Web was mirrored by business. In the 1990s, business connections to the Internet increased from 1,000 firms to an estimated 21,000 or more by 1996. Experts predict this growth to increase rapidly into the year 2000.

The Internet can provide firms with many advantages. For example, developing a marketing strategy that relies on the Internet can benefit firms by replacing electronic mail systems, providing a global reach to customers, selling products and services in cyber space, and creating on-line databases, media lists, and other marketing tools. Firms discovered that customer service was enhanced with the Internet.

Use of the Internet became one of the hottest new strategies in the securities trading industry. Brokers had more information available to them to assist their clients since resources were available electronically. In addition, Internet-based brokers can be reached anytime from any computer with a secure Web browser, making them more accessible to their clients.

Paperless libraries dramatically changed the way information was stored and significantly reduced costs to businesses. Rather than printing information on paper, firms documented information on CD-ROMs, videodiscs, and the Internet, where it was stored and retrieved at less cost.

Supplementing the Internet as a communication tool are intranets, private or limited information network systems cordoned off from public access by software programs called firewalls. The corporate use of intranets exploded as companies found that these information communication systems were very expensive.

Satellite imaging was another technological advancement that showed promise for integrating technology into business. For decades, governments used satellite imaging to spy on their enemies. In the 1990s, companies were finding other uses for this technology.

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, and my Lectures.

 

Principals for Defining Privacy Policy


Companies wishing to enact an internal privacy policy or code should consider as a starting point the three concepts that help define information privacy: data collection, data accuracy, and data confidentiality.

Data Collection: the following principles should be adhered to:

  • Data should be collected on individuals only to accomplish a legitimate business objective.
  • Data should be adequate, relevant, and not excessive in relation to the business objective.
  • Data should be obtained in a lawful manner.
  • Individuals must give their consent before data pertaining to them can be gathered. Such consent may be implied from the individual’s actions (e.g., when they apply for credit, insurance, or employment).

Data accuracy: to ensure that misleading information will not be distributed, the following principles apply:

  • Sensitive data gathered on individuals should be verified before it is entered in database.
  • Data should be accurate and, when necessary, kept up to date.
  • The file should be made available so the individual can ensure that the data is correct.
  • If there is disagreement about the accuracy of the data, the individual’s version should be noted and included in any disclosures of the file.

Data Confidentiality: the privacy policy should ensure confidentiality as follows:

  • Computer security procedures should be implemented to provide reasonable assurance against the unauthorized disclosure of data. These procedures should include physical, technical, and administrative security measures.
  • Third parties should not be given access to data without the individual’s knowledge or permission, except as required by law.
  • Disclosures of data, other than the most routine, should be noted and maintained for as long as the data is maintained.
  • Data should not be disclosed for reasons incompatible with the business objective for which it was collected.

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, and my Lectures.

Statistical Analyses


The role of database is to help select names for modeling, implement the results of the modeling process by scoring names and assigning them to the appropriate decile, and selecting names by decile and other criteria for marketing programs. Most companies use statistical analysis for two principal reasons: a) segmentation, and b) predictive modeling.

Segmentation techniques are used to identify and profile groups of customers whose characteristics are similar. If the objective is to segment customers based on their performance, then the procedure is to group people according to their performance characteristics and then develop profiles of each performance group. Typical segmentation variables are performance measures such as recency, frequency, and monetary value of purchases; types of products purchased; or types of promotions responded to.

By linking this data with customer performance data, marketers can analyze who buys what and use the profiles of customers in each segment as a means of finding other customers like them.

Once the segments have been created, individual customers will be assigned to segments and these assignments will be recorded in the database. This makes subsequent selection of individuals for promotion based on the segmentation criteria relatively simple.

Predictive Modeling, based on previous purchase history, based on recency, frequency, and monetary value, models can be developed to predict who is most likely and least likely to purchase at the next opportunity. This scoring model would be used to determine who should be promoted and what they should be promoted with.

Once scoring models have been executed and customers assigned to deciles, this information is recorded in the database so that subsequent selection of customers who have the highest probability of responding to a promotion is easily accomplished.

End users would use a selection menu in which they would indicate which scoring model they wish to use and either a specific cutoff score or a desired number of names to select. The database would then perform the selection and produce an output file to the specific medium. This would either be a file, a magnetic tape, or mailing labels. A file could either be used for further analysis, or in many cases, the file could be combined with a patterned letter file to produce personalized mailings.

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, and my Lectures.

Planning a Research Strategy


If you plan your research strategy carefully, the whole project will flow smoothly. Follow these steps:

1. Work out a schedule and budget for the project that requires the research. When is the deliverable—the document or the presentation—due? Do you have a budget for phone calls, database, or travel to libraries or other sites?

2. Visualize the deliverable. What kind of document will you need to deliver: a proposal, a report, a Website? What kind of oral presentation will you need to deliver?

3. Determine what information will need to be part of that deliverable. Draft an outline of the contents, focusing on the kinds of information that readers will expect to see in each part. For instance, if you are going to make a presentation to your supervisors about the use of e-mail in your company, your audience will expect specific information about the number of e-mails written and received by company employees, as well as the amount of time employees spend reading and writing it.

4. Determine what information you still need to acquire. Make a list of the pieces of information you don’t have. For instance, for the e-mail presentation, you might realize that you have anecdotal information about employee use of e-mail, but you don’t have any specifics.

5. Create questions you need to answer. Make a list of questions, such as the following:

    1. How many e-mails are written each day in our company?
    2. How many people receive each mail?
    3. How much server space is devoted to e-mails?
    4. How much time do people in each department spend writing and reading e-mail?

Writing the questions in a list forces you to think carefully about your topic. One question suggests another, and soon you have a lengthy list that you need to answer.

6. Conduct secondary research. For the e-mail presentation, you want to find out about e-mail usage in organizations similar to yours and what policies these organizations are implementing. You can find this information in journal articles and from Web-based sources, such as online journals, discussion groups, and bulletin boards.

7. Conduct primary research. You can answer some of your questions by consulting company records, by interviewing experts (such as the people in the Information Technology department in your company), and by conducting surveys and interviews of representative employees.

8. Evaluate your information. Once you have your information, you need to evaluate its quality: is it accurate, comprehensive, unbiased, and current?

9. Do more research. If the information you have acquired doesn’t sufficiently answer your questions, do more research. And, if you have thought of additional questions that need to be answered, do more research. When do you stop doing research? You will stop only when you think you have enough high-quality information to create the deliverable. For this reason, you will need to establish and stick to a schedule that will allow for multiple phases of research.

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, and my Lectures.

Intranets


Not all Websites are available to anyone cruising the Net. Some are reserved for the private use of a single company’s employees and stakeholders. An intranet uses the same technologies as the Internet and the World Wide Web, but the information provided and the access allowed are restricted to the boundaries of a company-wide LAN or WAN. In some cases, suppliers, distribution partners, and key customers may also have access, but intranets are protected from unauthorized access through the Internet by a firewall, a special type of gateway that controls access to the local network. People on an intranet can get out to the Internet, but unauthorized people on the Internet cannot get in.

Possibly the biggest advantage of an intranet is that it eliminates the problem of employees’ using different types of computers within a company. On an Intranet, all information is available in a format compatible with Macintosh, PC, UNIX-based computers. The need to publish internal documents on paper is virtually eliminated because everyone can access the information electronically.

Besides saving paper, an intranet can save a company money in the form of employee hours. Employees can find information much faster and more easily by using a well-designed database on an intranet than by digging through a filing cabinet or card catalog. Some of the communication uses companies have for intranets include updating policy manuals, posting job openings and submitting job applications, accessing martketing and sales presentations from anywhere in the world, updating and managing employee benefits, accessing company records and databases, collaborating from anywhere in the  world to develop new products, scheduling meetings, setting up company phone directories, and publishing company newsletters. In fact, just about any information that can help employees communicate is a good candidate for an intranet. As video and audio technologies progress, you can expect to see more multimedia applications on intranets as well.

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, Lectures, Line of Sight

Creating an Integrated Marketing Communications Program (IMC)


a)        Use zero-based budgets. Most companies use incremental approaches in allocating promotional budgets. A preferred approach is the objective and task approach. Start with a zero budget and force all promotional managers managers to justify their investment.

b)        Focus primarily on current customers. Many organizations direct 80% or more of their advertising and selling effort activities to trying to win new business (conquest marketing).  An Integrated Marketing Communications (IMC) program recognizes the importance of retention marketing and inverts that ratio so that a majority of the promotional activity is earmarked for relationship building with existing customers. This reduces customer defection, upgrades business relationships, and creates advocates for the firm’s services.

c)        Use highly targeted mass promotion. Direct mail, specialized lists, trade publications, and the Internet can be used effectively to reach prospects rather than suspects. A website has become an indispensable marketing technology for 21st century companies. It has evolved into a one-stop, online corporate information source, customer support tool, distribution channel, order taker, product catalog, price list, promotional vehicle, research technique, segmentation source, and a strategic and tactical marketing differentiator.

d)        Build marketing relationships. Strategic partnering is a major part of a good IMC program. In addition to Internet and intranets (protected corporation information resource centers), progressive companies are creating extranets which link an enterprise’s extended family of suppliers, distributors, retailers, and partners. Hence, customer, channel, referral, and stakeholder relationships can all be nurtured through carefully conceived promotional efforts.

e)        Note that everything an organization does send a message. Image and atmospherics are very important in communicating value to customers. The little things, such as stationery, signage, telephone greetings, and website design, etc., should all reflect professionalism and a consistent message to the marketplace.

f)          Two-way dialogue is key. In an over-communicated society, the marketing challenge is to establish a meaningful dialogue with customers as to how the firm’s service mix can provide maximum benefits/value. Interactivity and involvement on the part of the customers is important for sharing information and creating firmer bonds. The Web is an ideal medium to accomplish this objective. Its selectivity and flexibility create a customized business experience for each user.

g)        Use 21st century communication technologies. In today’s changing marketplace, companies must seek new and better ways to stay in touch with their target markets. Appropriate communication options include e-mail, electronic commerce, fax-on-demand, telemarketing, point-of-sale promotion, special events, multimedia, etc.

h)        Measure promotional effectiveness. Traditionally, advertising executives competed with sales managers for their “fair share” of the corporate promotional budget. Today, management requires accountability and demands to know and justify the return on investment of limited resources—they will no longer accept the non-measurable communications methods used by marketers in the past. A marketing information system/database is the key tool for effectively monitoring and measuring the success of an IMC program. As part of this process, job descriptions and reward systems are likely to be redesigned. In a strong IMC-centered environment, in-house competition is replaced with cooperation and teamwork. Joint rewards help the organization do what is best, rather than just project individual turfs.

My Consultancy–Asif J. Mir – Management Consultant–transforms organizations where people have the freedom to be creative, a place that brings out the best in everybody–an open, fair place where people have a sense that what they do matters. For details please visit www.asifjmir.com, Line of Sight

Previous Older Entries