Defending the brand : aggressive strategies for protecting your brand in the online arena / Brian H. Murray.
2004
Items
Details
Author
Uniform Title
Ebrary electronic monographs.
Title
Defending the brand : aggressive strategies for protecting your brand in the online arena / Brian H. Murray.
Added Corporate Author
Imprint
New York : American Management Association, [2004]
Copyright
©2004
Description
xvi, 268 pages : illustrations ; 24 cm
Formatted Contents Note
Digital brand abuse
The dark side
Objectionable content
Pornography
Adult entertainment
Child pornography
Hate, violence, and extremism
Gambling
Parody
Defining "objectionable"
Who's at risk?
What to do
The business case
Boardroom summary
The opportunities and threats of online commentary
The rumor mill
Financial earnings
Early warning
Information security
Other security and liability threats
The world's largest focus group
Activism and "sucks" sites
Nobody is immune
Managing risk
Buried treasure
The business case
Boardroom summary
Customer diversion
Customer capture
Cybersquatting
Typo-piracy
Domain name administration
Arbitration
Search engine manipulation
Invisible seeding
Visible seeding
Spoofing
Paid placement
Managing seeding and spoofing issues
Software utility generated advertisements
Mislabeled links
Unsolicited e-mail
Keeping the customer
Bringing the customer back
Scope of the problem
The future
The business case
Boardroom summary
Online partners and distribution issues
A managing partner compliance
The customer experience
Changing dynamics
Online partners
Affiliates
Suppliers
Distributors
Third parties
Monitoring partners
Step 1: Prioritization
Step 2: Brand management
Step 3: Enforcement
The business case
Boardroom summary
Counterfeits and gray markets
Gray markets
Combating gray market activity
Counterfeiting
Copier supplies
Pharmaceuticals
Online monitoring
Criteria that may signal a suspect distributor
Testing authenticity
The business case
Boardroom summary
Defending against digital piracy
Music
Sales leads
Video
Cease and desist
Customer convenience
Copy protection and digital rights management
Software
Text and images
E-books
The Stephen King experiment
News services
Market data
The business case
Boardroom summary
Trust
The costs of compromised privacy and security
Information collection technologies
Cookies
Web beacons
Information security
Customer information transmission
Customer information storage
Fraud
Managing privacy and security
The business case
Boardroom summary
Competitive intelligence
Using online competitive intelligence to outmaneuver competitor brands
The internet as a competitive intelligence source
Brand presence
Brand reach
Competitor brand abuse
Competitor absence
Linking relationships
Partnerships
Recruiting competitor partners
Online commentary
Collecting the data
Counterintelligence
Actionable information
The business case
Boardroom summary.
The dark side
Objectionable content
Pornography
Adult entertainment
Child pornography
Hate, violence, and extremism
Gambling
Parody
Defining "objectionable"
Who's at risk?
What to do
The business case
Boardroom summary
The opportunities and threats of online commentary
The rumor mill
Financial earnings
Early warning
Information security
Other security and liability threats
The world's largest focus group
Activism and "sucks" sites
Nobody is immune
Managing risk
Buried treasure
The business case
Boardroom summary
Customer diversion
Customer capture
Cybersquatting
Typo-piracy
Domain name administration
Arbitration
Search engine manipulation
Invisible seeding
Visible seeding
Spoofing
Paid placement
Managing seeding and spoofing issues
Software utility generated advertisements
Mislabeled links
Unsolicited e-mail
Keeping the customer
Bringing the customer back
Scope of the problem
The future
The business case
Boardroom summary
Online partners and distribution issues
A managing partner compliance
The customer experience
Changing dynamics
Online partners
Affiliates
Suppliers
Distributors
Third parties
Monitoring partners
Step 1: Prioritization
Step 2: Brand management
Step 3: Enforcement
The business case
Boardroom summary
Counterfeits and gray markets
Gray markets
Combating gray market activity
Counterfeiting
Copier supplies
Pharmaceuticals
Online monitoring
Criteria that may signal a suspect distributor
Testing authenticity
The business case
Boardroom summary
Defending against digital piracy
Music
Sales leads
Video
Cease and desist
Customer convenience
Copy protection and digital rights management
Software
Text and images
E-books
The Stephen King experiment
News services
Market data
The business case
Boardroom summary
Trust
The costs of compromised privacy and security
Information collection technologies
Cookies
Web beacons
Information security
Customer information transmission
Customer information storage
Fraud
Managing privacy and security
The business case
Boardroom summary
Competitive intelligence
Using online competitive intelligence to outmaneuver competitor brands
The internet as a competitive intelligence source
Brand presence
Brand reach
Competitor brand abuse
Competitor absence
Linking relationships
Partnerships
Recruiting competitor partners
Online commentary
Collecting the data
Counterintelligence
Actionable information
The business case
Boardroom summary.
Bibliography, etc. Note
Includes bibliographical references and index.
Linked Resources
Language
English
Reproduction
Electronic reproduction. Palo Alto, Calif. : ebrary, 2005. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.
ISBN
0814407544
Record Appears in