6 options
Defending the brand : aggressive strategies for protecting your brand in the online arena / Brian H. Murray.
- Format:
- Book
- Author/Creator:
- Murray, Brian H., 1968-
- Language:
- English
- Subjects (All):
- Brand name products.
- Trademark infringement.
- Electronic commerce.
- Product management.
- Physical Description:
- 1 online resource (286 p.)
- Edition:
- 1st ed.
- Place of Publication:
- New York : American Management Association, c2004.
- Language Note:
- English
- Summary:
- The best brands attract the most (unwanted) attention.
- Contents:
- Digital brand abuse
- The dark side
- Objectionable content
- Pornography
- Adult entertainment
- Child pornography
- Hate, violence, and extremism
- Gambling
- Parody
- Defining "objectionable"
- Who's at risk?
- What to do
- The business case
- Boardroom summary
- The opportunities and threats of online commentary
- The rumor mill
- Financial earnings
- Early warning
- Information security
- Other security and liability threats
- The world's largest focus group
- Activism and "sucks" sites
- Nobody is immune
- Managing risk
- Buried treasure
- Customer diversion
- Customer capture
- Cybersquatting
- Typo-piracy
- Domain name administration
- Arbitration
- Search engine manipulation
- Invisible seeding
- Visible seeding
- Spoofing
- Paid placement
- Managing seeding and spoofing issues
- Software utility generated advertisements
- Mislabeled links
- Unsolicited e-mail
- Keeping the customer
- Bringing the customer back
- Scope of the problem
- The future
- Online partners and distribution issues
- A managing partner compliance
- The customer experience
- Changing dynamics
- Online partners
- Affiliates
- Suppliers
- Distributors
- Third parties
- Monitoring partners
- Step 1: Prioritization
- Step 2: Brand management
- Step 3: Enforcement
- Counterfeits and gray markets
- Gray markets
- Combating gray market activity
- Counterfeiting
- Copier supplies
- Pharmaceuticals
- Online monitoring
- Criteria that may signal a suspect distributor
- Testing authenticity
- Defending against digital piracy
- Music
- Sales leads
- Video
- Cease and desist
- Customer convenience
- Copy protection and digital rights management
- Software
- Text and images
- E-books
- The Stephen King experiment
- News services
- Market data
- Trust
- The costs of compromised privacy and security
- Information collection technologies
- Cookies
- Web beacons
- Customer information transmission
- Customer information storage
- Fraud
- Managing privacy and security
- Competitive intelligence
- Using online competitive intelligence to outmaneuver competitor brands
- The internet as a competitive intelligence source
- Brand presence
- Brand reach
- Competitor brand abuse
- Competitor absence
- Linking relationships
- Partnerships
- Recruiting competitor partners
- Online commentary
- Collecting the data
- Counterintelligence
- Actionable information
- Boardroom summary.
- Notes:
- Description based upon print version of record.
- Includes bibliographical references and index.
- ISBN:
- 9780814427538
- 0814427537
- OCLC:
- 475962456
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.