behavior

Results 351 - 375 of 614Sort Results By: Published Date | Title | Company Name
Published By: Sitecore     Published Date: Oct 18, 2016
In a market where 78% of consumers abandon a transaction or purchase because of poor service, businesses need to personalize and customize their interactions with customers to remain competitive. A truly personalized customer experience, framed in the context of the consumer’s previous buying patterns and behaviors as well as their current interactions, can mean the difference between engaged, loyal customers or lost business for your company. Download this white paper now to learn more!
Tags : 
    
Sitecore
Published By: Cornerstone OnDemand     Published Date: May 15, 2015
Leveraging econometric analysis of a dataset of approximately 63,000 hired employees spanning approximately 250,000 observations, this report looks not only at the measurable costs of toxic behavior such as sexual harassment, theft and fraud, but also other, equally damaging and harder-to-measure costs. The report examines these indirect costs closely, looking particularly at the toll toxic employees take on co-workers, and concludes that these costs create an even larger financial burden on businesses than the direct impact of an employee’s misbehavior
Tags : 
hidden costs, sexual harassment, toxic employees, employee behavior
    
Cornerstone OnDemand
Published By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
    
Mimecast
Published By: AcquireWeb     Published Date: Apr 07, 2008
This opinion piece, published by DM News in November 2007, addresses a common but less talked about problem with email marketing – over-mailing to positively effect otherwise mediocre results; which is likely the result of an acquisition email provider using a compiled response file, and guaranteeing high open and click rates in addition to a positive ROI. This article provides insight on what the marketer, broker or agency can do to ensure they are maximizing the ROI from a given campaign, while disincentivizing over-sending behavior.
Tags : 
email, conversion, conversion testing, email marketing, frequency, overdelivery, over-delivery, acquireweb, email marketing campaign, email campaign, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing
    
AcquireWeb
Published By: Vision Critical     Published Date: Jun 23, 2009
Kodak's community-which boasts over 2,600 members to date-has been effective in combining quantitative and qualitative research initiatives, resulting in a more comprehensive understanding of consumer behavior, trends, and demand, which the company continues to use to its advantage. In addition to evaluating existing products and marketing initiatives, it has helped to identify new product and marketing opportunities through analysis of how members shop.
Tags : 
kodak, online community, customer voice, customer data, crm, cost savings, vision critical, marketing research, market research, feedback, trial, customer, brand tracking, longitudinal studies, testimonials, advertising, communication, testing, community, branding
    
Vision Critical
Published By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
    
Cymfony
Published By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : 
collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
    
Cymfony
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection, security
    
Process Software
Published By: Quantivo Corporation     Published Date: Sep 01, 2009
Watch this webinar to learn how top companies are re-energizing their B2B marketing with customer behavior analytics. Take advantage of your Web, CRM, Support and other touch points to identify customer actions that signal a future purchase and which marketing programs will help speed the process.
Tags : 
quantivo, customer behavior, crm, behavior, analytics, lead response, sales leads, cycle times, close rates, crm, support, web, b2b
    
Quantivo Corporation
Published By: Bazaarvoice     Published Date: Jan 17, 2014
Thanks to social, consumers are more vocal than ever and their opinions are influencing the purchase decisions of consumers all across the web. Learn how to turn social data into strategic business advantage with nine guiding insights to improve your bottom line today.
Tags : 
social media, business insights, social media insights, social networks, consumer behavior
    
Bazaarvoice
Published By: Bazaarvoice     Published Date: Jan 17, 2014
Struggling to prove social ROI? The Bazaarvoice whitepaper Real ROI from Social in 5 Steps shows you how the world’s most successful brands and retailers are capturing results and proving true social ROI.
Tags : 
social media, business insights, social media insights, social networks, consumer behavior
    
Bazaarvoice
Published By: MoreVisibility     Published Date: Dec 19, 2017
As the approach to strategic business decision making becomes more and more data driven, a method for consolidating our various data sets, which are often spread across multiple systems becomes exceedingly important. Two of the biggest players in data driven decision making are website analytics platforms and customer relationship management systems. The former includes accumulating data on top of the funnel behavior such as site traffic origins, lead generation, content consumption tracking, device usage, and overall site behavior. While the latter has a focus more on bottom of the funnel activity such as lead nurturing, customer status, lifetime value, etc. Lastly, without communication between these two essential platforms, a complete understanding of your customers, from lead to longtime client, may never be possible. A web analytics (Google Analytics) and CRM integration provides you with a 360 degree view of your customer base, so that you can understand not just what PPC efforts
Tags : 
    
MoreVisibility
Published By: SAS     Published Date: Jun 05, 2017
"How do you make your brick-and-mortar stores as smart as your website – so when customers walk in the door, you recognize them and cater to their individual tastes? What’s the key to making in-store shopping as frictionless for your customer as online shopping? Read this research summary from the International Institute for Analytics to get started. You’ll learn how to use analytics to gain advanced insight from the Internet of Things: tracking chips, in-store infrared traffic monitors, interactive kiosks and customer mobile devices, to name a few. With analytics, you’ll identify who’s walking in your store, understand their behavior and preferences, and create engaging experiences for your connected customers at every turn. "
Tags : 
    
SAS
Published By: Webroot     Published Date: Sep 18, 2013
This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today’s more than 70 million malware variants. It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as: • Improving speed by offloading pattern matching from endpoints • Eliminating large signature downloads • Stopping zero day attacks
Tags : 
antivirus, anti-malware, scanning speed, the cloud, behavioral detection, security, business technology
    
Webroot
Published By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : 
cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware, software development, business technology
    
Webroot
Published By: iCIMS     Published Date: Dec 09, 2013
Learn more about the rise of mobile technology and how to build a recruitment strategy to support it in this complimentary ebook published by iCIMS Hire Expectations Institute.
Tags : 
icims, mobile, mobile hr, talent, new hire, new talent, online behavior, talent acquisition, hiring, hr management
    
iCIMS
Published By: Silverpop     Published Date: Feb 04, 2013
Companies are collecting a ton of information about buyers and their behaviors, but too many aren’t using it effectively, and driving revenue.
Tags : 
data, scoring, leads, prospects, sales, customers, sales process
    
Silverpop
Published By: Silverpop     Published Date: Feb 04, 2013
Shazam, the world’s leading mobile discovery service, wanted to leverage email to build on its in-app experience, increase user retention and deliver personalized content that drives revenue.
Tags : 
email marketing, engagement, crm, social, mobile, engegement, testing, optimization
    
Silverpop
Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications, business technology
    
Intralinks
Published By: GoodData     Published Date: Aug 02, 2013
Sales analytics is a hefty club you can wield to tighten pipeline forecasts and induce pipeline boosting behavior from your reps. This eBook presents 6 practical sales analysis strategies that can help you make it happen.
Tags : 
sales metrics, how to forecast sales, sales analysis, sales analytics, crm analytics, salesforce reports, salesforce analytics, sales projections, sales kpis, sales prospecting, sales forecasting, sales forecast, sales pipeline, analytics, sales, business technology
    
GoodData
Published By: GoodData     Published Date: Aug 02, 2013
A new sales rep's first 100 prospecting calls are the most critical and shapes their likelihood of success. So, why wait until a new sales rep’s pipeline matures to uncover if they’ll ramp to quota? Instead, let their behavior tell the story by tracking their prospecting and lead pursuit activity stream. Use these 4 metrics for evaluating your new sales representatives.
Tags : 
    
GoodData
Published By: IBM     Published Date: Apr 29, 2014
For banks, mining data from social media can be a significant way to gain insights into customer mindsets and behavior, but effectively and accurately capturing and processing this unstructured data to gain useful customer insight requires sophisticated tools and advanced analytics.
Tags : 
ibm, banking, data mining, social media, consumer insights, business analytics, social business, business technology
    
IBM
Published By: IBM     Published Date: Apr 29, 2014
Customer Profitability Analytics enables banks to analyze customer, account, product, and transaction data and apply costing models to determine a bank-wide view of profitability. Applying predictive analytics, they can model future behavior and derive a lifetime value for each customer.
Tags : 
ibm, banking, customer profitability, customer profitability analytics, transaction data, predictive analytics, customer behavior
    
IBM
Published By: Oracle     Published Date: Apr 22, 2014
Pink talks to Profit about what he learned in the process: what surprised him most, how his research has influenced his own behavior, and why he says we all need to re-imagine what a successful salesperson looks like.
Tags : 
sales, daniel pink, to sell is human, salesperson traits, characteristics, research
    
Oracle
Published By: Digital Bungalow     Published Date: Feb 09, 2015
Google Analytics is an excellent tool for gaining insights into user behavior and gathering data for site optimization.
Tags : 
google analytics, site optimization, customer acquisition, consumer behavior, advanced segments
    
Digital Bungalow
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.