Part 2 Chasing Engagement 5 Things You Need to Know About Data-Driven Marketing

Total Page:16

File Type:pdf, Size:1020Kb

Part 2 Chasing Engagement 5 Things You Need to Know About Data-Driven Marketing Part 2 Chasing Engagement 5 things you need to know about data-driven marketing Recommended Best Practice Initiatives: diagram source ADMA & GfK elcomCMS.com | [email protected] Chasing Engagement - Part 2 Page 2 Content 1. Integrate and standardize across all touch points 04 2. Embrace social login 07 3. Understand what data you are collecting and why 09 4. Use data carefully – there is no magic bullet 13 5. Be aware the data capture landscape is changing 15 6. Additional Info 19 Acknowledgements Elcom acknowledges and appreciates the time and contribution to this report from the following people: Jodie Sangster, CEO, ADMA Christian Bartens, CEO & Founder, Datalicious Yorgos Moschovis, Analytical Marketing & Business Intelligence Expert Elcom whitepaper - www.elcomCMS.com Chasing Engagement - Part 2 Page 3 Technology advances and the emergence of new tools on almost a daily basis is drastically changing the way businesses capture, manage and utilize data for marketing purposes. A global survey, by international data management company Teradata, in 2013 of over 2,200 marketers found in the next two years 71% plan to implement a big data analytics solution to help untangle the mass of consumer data available to them. No matter what 5 size your company is, data-driven marketing is no things you longer optional but necessary to remain competitive and relevant. need to For marketers who are often juggling up to seven different channels at once there is no shortage know about of ways to obtain audience data, but an overload of information is making it increasingly difficult data-driven to determine what data to use and how. And the availability of data is only going to grow, with marketing predictions by Teradata, that three billion people will have created eight billion terabytes of data by 2015. Depending on your business and the industry you Regardless of how mature your data strategy is, are in, there are two main schools of thought on the here are our top five tips for ensuring it is effective best use of audience data: some experts claim the today and can withstand anticipated changes to financial return of selling more to existing customers the data landscape tomorrow. outweighs time and effort spent chasing new business. Others are advising companies to forget retention efforts and focus on the ‘here and now’ – seeking out audiences that want your product or information today. Either way, accurate audience data is critical to finding and engaging with people; when, how and where they want. For marketers, this means being able to leverage the data your company has access to in order to achieve the marketing epitome that is personalization. Elcom whitepaper - www.elcomCMS.com Chasing Engagement - Part 2 Page 4 1. Integrate and standardize across all touch points The biggest challenge for many marketers lies between realizing the need to develop or update a data strategy and resourcing it. However, before this is determined thought needs to be given to how data capture processes can be integrated and standardized across all functions of the business. Without this integration it is impossible to achieve accurate and meaningful personalization, says Datalicious CEO and founder, Christian Bartens. “The most dangerous thing I have seen that ruins marketing efforts is product silos, where knowledge isn’t exchanged and metrics aren’t standardized. Most companies don’t know who their most valuable customers are because there is no integration of client data across the company and teams are working in silos,” he said. you with the ability to manage your website, intranet, portals, mobile sites, eLearning, eCommerce and social collaboration for your organisation. “We often find the call centre operates a different platform to the marketing team, and website traffic is managed by yet another team. Companies need to have one view of the customer where all their interactions with the company are captured, so you can deliver a consistent user experience. Wherever a customer touches this company the messages they see should build on their last action.” Data Silos Organisation have many types of data that tends to get put into separate silos. Combining data enables smarter and more informed marketing and sales decisions. Elcom whitepaper - www.elcomCMS.com Chasing Engagement - Part 2 Page 5 A global study conducted in 2013 by Teradata found only 18% of companies had a single view of the customer. Most (75%) said they used customer service, customer satisfaction, digital interaction (eg. search, display ads, email, web browsing), and demographic data, while just over 50% used customer engagement (eg. product usage or preference data), transactional or e-commerce data. The same study found only 33% of marketers believe they have a true data-driven marketing culture embedded into their standard marketing processes, while less than 10% of companies use the data they currently have access to in a systematic, strategic way. Teradata Director, Mark Ash says companies should be tracking every available channel and ensuring their validity. “To fully understand all of your channels, you need as complete a view of your customer journey as possible. Check the validity of your tracking and reporting. Track as many interactions as possible and not just those that are convenient to track.” Prioritization is important if you are overhauling or implementing from scratch a data strategy. Bartens recommends starting with the channels that have historically been most important for your business, and looking closely at your budget spend on each channel. “Many companies think they are tracking their channels and spend carefully, but the way it’s being done does not enable the company to tell what’s working and what’s not. For example, if your TV or print ads primarily point people to your website, you can’t tell where your audience has originated from. Likewise, having a single telephone number can skew your data if most people are accessing it from your website but cannot converse with someone directly via the website,” he said. Data sources or channels that should be routinely tracked include your existing audience sources, external digital sources and other sources like research and data aggregators. External digital sources or assets include internet sites other than your own, such as Facebook, Twitter, Pinterest and Instagram which are valuable for monitoring trends and influential people. “Any individual who has 10,000 friends on Facebook, for example, has the potential to be a very powerful influencer,” Bartens said. “Social media data isn’t the answer to everything but social influence can equal customer value, even if that person is not currently a customer of yours. If someone is very active on a particular site you know you are reaching them in their chosen channel.” Elcom whitepaper - www.elcomCMS.com Chasing Engagement - Part 2 Page 6 In Chasing Engagement: 10 ways to improve your content marketing, we looked at how to execute a successful content marketing strategy through maximizing your company’s own existing channels – website, mobile site, portals, intranet, email database and social media. Other sources include data collected from offline sources such as details from loyalty or membership programs that may have been established long before the company’s digital marketing activities, or in-store purchases. However, be careful trying to link the different data sources, warns Yorgos Moschovis, an analytical marketing and business intelligence expert whose experience includes managing analytics and audience insights at companies such as Fairfax, SingTel, OCBC Bank and IBM. Personalization in the digital world is different to offline. It’s not necessarily predicated on identifying someone, but identifying a set of interests. In the online world people don’t want to tell you who they are if you have not established trust. Offline, you actually have physical contact which is more conducive to establishing trust. When interpreting online data you don’t need to know if someone is male or female or a certain age, just if their interest in something is strong enough to convert to a sale.” “The emphasis on mining information is creating a problem of information quality as someone’s identity or interests are inferred, not given. It’s a big leap to take data gleaned from someone’s behavior online and determine they are ready to invest in something or purchase something right now. Even with information about someone’s specific interests and data about what they’re looking for, to assume they need your product or service requires an inference or leap that is not so simple,” he said. “I’m observing that when people have two sources of data and the ability to connect them, the inference drawn may be totally irrelevant and can even be insulting. Unless you can be 100% confident of a person’s online identity, which is best determined through using social login and even then can be inaccurate, online data is going to be more anonymous than any offline data sources. To integrate the different sources requires several analytical steps that did not exist 5 years ago.” Key points: 1. Integrate and standardize data capture across all touch points of your business 2. Social influence can equal customer value, even if the person is not a customer 3. Be wary of making inferences or assumptions about individuals based on data collected online Elcom whitepaper - www.elcomCMS.com Chasing Engagement - Part 2 Page 7 2. Embrace social login The potential data-capture and personalization capabilities from social login are enormous, though Australian businesses have been much slower to adopt social login as a requirement for making online purchases than American companies. Writing for The Conversation earlier this year, QUT Associate Professor Joanne Jacobs said local businesses are experiencing less growth as a result and warned that increased growth by overseas companies is the direct result of better use of social media, personalized viewing experiences and customer incentive schemes.
Recommended publications
  • Research on Integration of Openid Authentication Within the Gravityzoo
    Research on OpenID and its integration within the GravityZoo framework Jarno van de Moosdijk [email protected] January 2008 1 Research on implementation of OpenID within GravityZoo Abstract This report covers the research on the working of OpenID and its integration into the GravityZoo framework. The GravityZoo frame- work can be used to deliver applications to a wide variety of devices. Currently, it is only possible to log in with a username and password combination. OpenID authentication eliminates the need for separate username/password combinations bound to each service. One identi- fier can be used to log in to multiple OpenID enabled services across different providers. The objective of this document is to give an in depth view on the OpenID login procedure. It covers the usability of the most popular OpenID Providers on mobile devices. None of these providers have custom pages for mobile users, which makes them less usable on mobile devices. Next to this, I have looked in to the require- ments for integrating OpenID authentication within the GravityZoo framework. c 2009 Jarno van de Moosdijk <[email protected]> Some rights reserved: This document is licensed under the Creative Com- mons Attribution 3.0 Netherlands license. You are free to use and share this document under the condition that you properly attribute the origi- nal authors. Please see the following address for the full licence conditions: http://creativecommons.org/licenses/by/3.0/nl/deed.en 2 Research on implementation of OpenID within GravityZoo Contents 1 Introduction5 1.1 Research Focus..........................5 1.2 Structure of this report.....................6 2 The GravityZoo Framework7 3 OpenID overview9 3.1 Why choose for OpenID?....................9 3.2 Basic terminology........................
    [Show full text]
  • A Security Analysis of Openid
    A Security Analysis of OpenID Bart van Delft1 and Martijn Oostdijk2 1 Comp.Sci.Dept., Radboud Univ., P.O.Box 9010, 6500 GL, Nijmegen, The Netherlands, [email protected] 2 Novay, P.O.Box 589, 7500 AN, Enschede, The Netherlands, [email protected] Abstract. OpenID, a standard for Web single sign-on, has been gaining popularity both with Identity Providers, Relying Parties, and users. This paper collects the security issues in OpenID found by others, occasionally extended by the authors, and presents them in a uniform way. It attempts to combine the shattered knowledge into a clear overview. The aim of this paper is to raise awareness about security issues surrounding OpenID and similar standards and help shape opinions on what (not) to expect from OpenID when deployed in a not-so-friendly context. 1 Introduction In 2005 Brad Fitzpatrick developed the first version of the OpenID protocol. Initially intended to save users the effort of going through a registration process on multiple social (blogging) websites they wanted to join, the protocol has by now become a very popular single sign-on method on a large number of high profile websites (JanRain claims over 30,000 OpenID enabled websites in January 2009 [5]). In fact, given an average user on the Internet, chances are high that he or she already owns a so-called `OpenID enabled login', since Google, Yahoo, Facebook, AOL and Windows Live accounts all support OpenID. The latest version of the OpenID Authentication specification, version 2.0 [20], was released in December 20073. The new version mainly enabled more flexibility and support for the possible identities to use, improved some security aspects and enabled the usage of extensions for attribute exchange.
    [Show full text]
  • Opinnäytetyön Mallipohja
    Integrating external authentication service in Viope Solutions Oy’s web platform Malla Pradhananga, Rabi Raj 2015 Leppävaara Laurea University of Applied Sciences Laurea Leppävaara Integrating external authentication service in Viope So- lutions Oy’s web platform Rabi Raj Malla Pradhananga Degree Program in Business Information Technology Bachelor’s Thesis April, 2015 Laurea University of Applied Sciences Abstract Laurea Leppävaara Degree Program in Business Information Technology Rabi Raj Malla Pradhananga Integrating external authentication service in Viope Solutions Oy’s web platform Year 2015 Pages 53 In today’s world, surfing the internet and using various web services has become common- place. Most of the web services require users to create an account in order to use their ser- vices. Studies show that an average internet user has at least 25 different web accounts. This means the user has 25 different set of username and password combinations to remember in order to access those accounts. This could lead to the problems like forgetting username or password or both and password mismatch. External authentication service, EAS, solve this problem at certain extent by letting users to use their existing set of username and password for more than one web accounts. This thesis work has aimed to integrate EAS in the case company, Viope Solutions Oy’s web platform. There are different types of EAS providers available from social networking sites to payment solution services. It was essential to choose the most suitable EAS provider with which Viope’s potential users already have account and they feel comfortable using it. Differ- ent existing researches and survey reports were analyzed and Facebook was chosen as the most suitable EAS provider.
    [Show full text]
  • Annual Report
    2014 ANNUAL REPORT www.adaptivespirit.com “A new addition to our executive team sponsored the event in previous years. He wanted to continue the tradition with us and I have to say, I am thankful he did. We brought clients and they thoroughly enjoyed the event and are already hoping they are on the guest list for next year.” “Overall, the event gets better and better every year!” “Over the last four years, Adaptive Spirit has incorporated great educational panels. People come not only for the on‑mountain activities but also to hear what other people in the industry are saying.” 2 A Message from the Adaptive Spirit Board Chairperson About Adaptive Spirit The focus of Adaptive Spirit remains steadfast: We aim to unite Adaptive Spirit’s partnership with the members with resources that enhance the business outcome, cable industry and U.S. Paralympics stimulate innovative networking opportunities resulting in growth is facing an important milestone and success of the telecommunications industry and share best over the next twelve months. The practices with our members. Also an important goal, Adaptive Annual Event (aka SkiTAM) will Spirit provides the industry a way to give back to the community celebrate its 20th Anniversary in through the organization’s venerable annual event. 2015. You, as part of that industry, can look forward to a special Adaptive Spirit is a not‑for‑profit trade association which focuses on weekend that will celebrate our building business relationships and effective networking practices past and look forward to the future. in the telecommunications industry. Through initiatives that focus We are planning some new events on education and ways to interact with the event and networking, attendees.
    [Show full text]
  • Customer Profile Management How-To Guide
    How-To Guide Customer Profile Management: Optimizing Customer Experience & Engagement By Clare Price, VP of Research April 2014 EXECUTIVE SUMMARY Marketing success has universally rested on a single principle: “Know Thy Customer.” The increasing need for personalization, localization and customization of marketing campaigns depends on it. However, without a unified and current Customer Profile, critical B2B campaigns like demand generation, lead management, scoring and nurturing are woefully inadequate. To succeed in the multifaceted communication environment presented by the web, mobile and social media, modern marketers need to embrace a new paradigm for creating and managing Customer Profiles. This new paradigm is known as Customer Profile Management. This How-To Guide is designed to provide marketers with the information and resources they need to effectively manage their users’/customers’ online experiences based on leading-edge customer profile management and registration systems and strategies. PROFILE MANAGEMENT OPPORTUNITY & CHALLENGE Customer profiles are central to effective digital marketing. The rise of Big Data, social sharing and social selling tools offers the opportunity to collect increasingly more detailed information about prospects and customers. That opportunity also presents some key challenges and questions. © 2014 Demand Metric Research Corporation. All Rights Reserved. How-To Guide Among them: 1. What data should be collected? 2. When and how should it be collected? 3. How should it be stored, managed and accessed? 4. Once collected, how should it be used for more effective marketing? 5. Most importantly, how can it be used to enhance the customer’s experience and engagement? The answers to these questions form the basis of an effective Customer Profile Management strategy.
    [Show full text]
  • A Security Analysis of Openid Bart Delft, Martijn Oostdijk
    A Security Analysis of OpenID Bart Delft, Martijn Oostdijk To cite this version: Bart Delft, Martijn Oostdijk. A Security Analysis of OpenID. Second IFIP WG 11.6 Working Conference on Policies and Reseach Management (IDMAN), Nov 2010, Oslo, Norway. pp.73-84, 10.1007/978-3-642-17303-5_6. hal-01054399 HAL Id: hal-01054399 https://hal.inria.fr/hal-01054399 Submitted on 6 Aug 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License A Security Analysis of OpenID Bart van Delft1 and Martijn Oostdijk2 1 Comp.Sci.Dept., Radboud Univ., P.O.Box 9010, 6500 GL, Nijmegen, The Netherlands, [email protected] 2 Novay, P.O.Box 589, 7500 AN, Enschede, The Netherlands, [email protected] Abstract. OpenID, a standard for Web single sign-on, has been gaining popularity both with Identity Providers, Relying Parties, and users. This paper collects the security issues in OpenID found by others, occasionally extended by the authors, and presents them in a uniform way. It attempts to combine the shattered knowledge into a clear overview.
    [Show full text]