problem 2c

Top Reasons Consumers Give For Marking Emails as Spam

source: http://www.marketingcharts.com/wp/online/top-reasons-consumers-give-for-marking-emails-as-spam-36897/?utm_campaign=rssfeed&utm_source=mc&utm_medium=textlink

Kentico-Top-Reasons-Marking-Email-as-Spam-Sept2013Kentico has released the results of a survey regarding consumers’ views of email marketing. While the company surveyed a relatively small sample of consumers (“more than 300″), some of the attitudes uncovered are intriguing. Among them: respondents are more likely to say they’d mark email from legitimate companies as spam because the companies email them too frequently (38%) than because the emails are unsolicited (34%).

Of course, there are various reasons for marking email as spam, and consumers likely have a number of them. In this case, it appears that the survey asked to choose a single reason. After those top 2 responses, 26% of respondents said they mark emails as spam when they don’t contain anything of interest. The remaining 2% said they do so when the emails seem shoddy with poor design and typos.

Frequency of emails has often been seen as the main culprit for unsubscribes (see here for an example), and it may be that consumers mark frequent emails as spam out of convenience, rather than unsubscribing. Recent research from Return Path, meanwhile, suggests that brands emailing less than once a week see better results than those emailing with more frequency.

Returning to the Kentico study, the results suggest consumer apathy towards email marketing’s progress over the years. In fact, the proportion believing email marketing has gotten worse (36%) over the past 5 years slightly outweighed the proportion believing it has gotten better (32%! ), with t! he remainder neutral.

Clutter may be a problem, as research has found that brands are sending more and more emails, with the average recipient receiving 416 commercial messages a month, according to one study. A plurality 37% of respondents to the Kentico study indicated that they “willfully” subscribe to 1-5 email lists, with 31% subscribing to 6-10 lists, 14% to 11-15 lists, 7% to 15-20 lists, and a brave 5% to more than 20 lists.

Tags: , , , , , , , , , , , , ,

Tuesday, September 24th, 2013 news No Comments

Bot Traffic in Q2: Suspicious Activity Continues to Rise

source: http://www.marketingcharts.com/wp/topics/spam-spyware-intrusive/bot-traffic-in-q2-suspicious-activity-continues-to-rise-36610/?utm_campaign=rssfeed&utm_source=mc&utm_medium=textlink

SolveMedia-Online-Bot-Traffic-Q32012-Q22013-Sept2013Bot traffic continues to be a global problem, says Solve Media in its latest Bot Traffic Market Advisory update. In Q2, activity deemed “suspicious” grew to 49% of all traffic for the web advertising ecosystem, up from 43% in Q1, 40% in Q4 2012 and 26% in Q3. Confirmed bot traffic was in the range of 24-29%, fairly consistent with prior quarters, but still up significantly from 10% in Q3 2012. Suspicious mobile traffic, while not quite on the same level as the web, is also on the rise.

During Q2, suspicious activity grew from 29% to 35% for mobile advertising, with confirmed bot traffic in the 11-14% range.

The US’ level of suspicious web activity was slightly below the global average, at 42%, with suspicious mobile activity also below-average at 22%.

The top 3 countries for suspicious web activity were: China (92%); Venezuela (80%); and the Ukraine (77%). For mobile traffic, the countries with the highest share of suspicious activity were: Singapore (86%); Macau (82%); and Qatar (81%).

Solve Media also warns of a “new threat targeting the video ad marketplace.” Recently, Vindico suggested that 30-40% of video ad impressions could be fraudulent.

Overall, Solve Media estimates that current levels of bot traffic put the digital advertising industry on pace to waste up to $9.5 billion this year advertising to bots.

Tags: , , , , , , , , , , , , , ,

Thursday, September 12th, 2013 news No Comments

Consumers, Complaining of Clutter, Say Sender Familiarity Spurs Mobile Email Opens

source: http://www.marketingcharts.com/wp/topics/branding/consumers-complaining-of-clutter-say-sender-familiarity-spurs-mobile-email-opens-35411/?utm_campaign=rssfeed&utm_source=mc&utm_medium=textlink

Campaigner-Email-Overload-Mobile-Opens-July2013Email overload is frustrating consumers, according to results released from a Campaigner survey conducted during last year’s holiday period that examined the use and influence of mobile emails. 1 in 10 respondents said they dealt with more than 300 emails a day, with close to one-third of those saying that marketing and promotional emails accounted for at least three-quarters of their emails, and almost 60% claiming they just deleted the messages without reading them. With clutter such a problem, what motivates consumers to open emails on their mobile devices?

Tags: , , , , , , , , ,

Tuesday, July 30th, 2013 news No Comments

The Tracking Solutions That Could Lead An Explosion In Mobile Marketing

Source: http://www.businessinsider.com/explosion-tracking-mobile-marketing-2013-6

The effectiveness of any advertising campaign rests on a brand’s ability to effectively deliver their message to a target audience.

As advertisers look to follow consumers across screen, brands need to know how and on what devices target audiences are consuming content. They need to track and measure a single individual’s responses to ads across multiple screens and attribute any results — such as conversions — to the appropriate ad placement.

The technical hurdles are formidable.

In a recent report from BI Intelligence, we take stock of cross-screen marketing, digging into the measurement and analytics problem, and offer a side-by-side comparison of the different mobile tracking technologies. We also analyze how audiences are becoming increasingly screen agnostic and examine how cross-screen advertising can be made effective.

Access the Full Report By Signing Up For A Free Trial Today >>>

Below are some of the leading mobile tracking solutions (click to expand):

slide1 58

slide2 21

Cookies enable advertisers and publishers to track user activity as they move across the desktop Internet and target them with relevant ads, but they are the most contested area of cross-screen tracking and don’t migrate to model. Algorithmic models can be used in conjunction with cookies, or without them. Powerful algorithms might profile specific users based solely on their actions and digital profile as they move across certain apps or mobile website, and give them with a unique device fingerprint on the server side. However, since the method is statistical, it can make errors. The various Mobile device ID schemes create a device-specific number that will identify your phone wherever i! t goes, across apps, mobile browsers, etc.

It’s clear that intermediaries and solutions providers are in a race to provide the technical solutions that will allow marketers to integrate mobile seamlessly into cross-screen campaigns and properly attribute the results achieved. As these solutions develop and improve, they will fuel the already rapid growth of cross-screen marketing.

For full access to the report Why Cross Screen Marketing Will Be A Game-Changer For The Mobile Industry, sign up for a free trial subscription today. 

 

Please follow SAI on Twitter and Facebook.

Join the conversation about this story »

    

Tags: , , , , , , , , , , , , , , , , ,

Tuesday, June 4th, 2013 news No Comments

drag2share: INFOGRAPHIC: Mobile Real-Time Bidding Ad Ecosystem

source: http://feedproxy.google.com/~r/businessinsider/~3/RgW6X0LHRBc/mobile-real-time-bidding-ad-ecosystem-2013-55

Real-time bidding, or RTB, is a style of programmatic buying in which digital advertising opportunities are auctioned off in real-time. The auctions take place in milliseconds as advertisers bid on the right to show you an ad immediately after you open an app or click to a new web page.

On the desktop it’s a powerful technique to deliver the right ad to the right consumer at the right time and place. On mobile, it could be more powerful since consumers take their devices everywhere — to the mall, the car dealership, Starbucks, etc.

In a recent reportBI Intelligence analyzes programmatic bidding and real time bidding, analyze how it may help solve the mobile advertising CPM problem, and detail its recent impact and successes.

We also examine the potential obstacles to its widespread adoption, and lo! ok at ho w the holy grail of mobile advertising – controls and efficiencies – may be reached through its use.

Access The Full Report And Data By Signing Up For A Free Trial Today >>

Take a look at this infographic from our report:

Slide2


drag2share – drag and drop RSS news items on your email contacts to share (click SEE DEMO)

Tags: , , , , , , , , , , , , , , , ,

Friday, May 24th, 2013 news No Comments

Android Account Info Leakage Epidemic

Source: http://gizmodo.com/5802617/androids-account-info-leakage-epidemic

Android's Personal Data Leakage ProblemI own an Android. You own an Android. Heaps of people own Androids. But apparently 99 per cent of them can be easily attacked, every time we log into a website on an unsecured network.

This is according to researchers at the University of Ulm, in Germany, who found that any phones running a version of Android prior to 2.3.3 are vulnerable to an attack thanks to a weak ClientLogin authentication protocol. Any time an Android user signs into a service such as Twitter, Facebook or a new Google account, the authToken information is stored for 14 days, and accessible if you know how to go about it, claim the researchers:

“To collect such authTokens on a large scale an adversary could setup a wifi access point with a common SSID (evil twin) of an unencrypted wireless network, e.g., T-Mobile, attwifi, starbucks…With default settings, Android phones automatically connect to a previously known network and many apps will attempt syncing immediately. While syncing would fail (unless the adversary forwards the requests), the adversary would capture authTokens for each service that attempted syncing.”

The team feigned an attack, and found it was “quite easy to do so.” Gulp. The reason 99 per cent of the Android handsets in existence are said to be vulnerable to such an attack? It’s because any phone not running Android 2.3.4, which Google released a few weeks ago, hasn’t had the security hole patched yet.

While a fix from Google would solve this problem, Android users are recommended to only use ClientLogin on https sites for now. [Uni-Ulm via The Register]

Tags: , , , , , , , , , , , , , , , , , , ,

Tuesday, May 17th, 2011 news No Comments

Dr. Augustine Fou is Digital Consigliere to marketing executives, advising them on digital strategy and Unified Marketing(tm). Dr Fou has over 17 years of in-the-trenches, hands-on experience, which enables him to provide objective, in-depth assessments of their current marketing programs and recommendations for improving business impact and ROI using digital insights.

Augustine Fou portrait
http://twitter.com/acfou
Send Tips: tips@go-digital.net
Digital Strategy Consulting
Dr. Augustine Fou LinkedIn Bio
Digital Marketing Slideshares
The Grand Unified Theory of Marketing