My Account Log in

6 options

Defending the brand : aggressive strategies for protecting your brand in the online arena / Brian H. Murray.

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost Ebook Public Library Collection - North America Available online

View online

EBSCOhost eBook Community College Collection Available online

View online

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Murray, Brian H., 1968-
Language:
English
Subjects (All):
Brand name products.
Trademark infringement.
Electronic commerce.
Product management.
Physical Description:
1 online resource (286 p.)
Edition:
1st ed.
Place of Publication:
New York : American Management Association, c2004.
Language Note:
English
Summary:
The best brands attract the most (unwanted) attention.
Contents:
Digital brand abuse
The dark side
Objectionable content
Pornography
Adult entertainment
Child pornography
Hate, violence, and extremism
Gambling
Parody
Defining "objectionable"
Who's at risk?
What to do
The business case
Boardroom summary
The opportunities and threats of online commentary
The rumor mill
Financial earnings
Early warning
Information security
Other security and liability threats
The world's largest focus group
Activism and "sucks" sites
Nobody is immune
Managing risk
Buried treasure
Customer diversion
Customer capture
Cybersquatting
Typo-piracy
Domain name administration
Arbitration
Search engine manipulation
Invisible seeding
Visible seeding
Spoofing
Paid placement
Managing seeding and spoofing issues
Software utility generated advertisements
Mislabeled links
Unsolicited e-mail
Keeping the customer
Bringing the customer back
Scope of the problem
The future
Online partners and distribution issues
A managing partner compliance
The customer experience
Changing dynamics
Online partners
Affiliates
Suppliers
Distributors
Third parties
Monitoring partners
Step 1: Prioritization
Step 2: Brand management
Step 3: Enforcement
Counterfeits and gray markets
Gray markets
Combating gray market activity
Counterfeiting
Copier supplies
Pharmaceuticals
Online monitoring
Criteria that may signal a suspect distributor
Testing authenticity
Defending against digital piracy
Music
Sales leads
Video
Cease and desist
Customer convenience
Copy protection and digital rights management
Software
Text and images
E-books
The Stephen King experiment
News services
Market data
Trust
The costs of compromised privacy and security
Information collection technologies
Cookies
Web beacons
Customer information transmission
Customer information storage
Fraud
Managing privacy and security
Competitive intelligence
Using online competitive intelligence to outmaneuver competitor brands
The internet as a competitive intelligence source
Brand presence
Brand reach
Competitor brand abuse
Competitor absence
Linking relationships
Partnerships
Recruiting competitor partners
Online commentary
Collecting the data
Counterintelligence
Actionable information
Boardroom summary.
Notes:
Description based upon print version of record.
Includes bibliographical references and index.
ISBN:
9780814427538
0814427537
OCLC:
475962456

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account