Introduction to Online Marketing Intelligence

54
1 Introduction to Online Marketing Intelligence Zhangxi Lin ISQS 3358 Texas Tech University

description

Introduction to Online Marketing Intelligence. Zhangxi Lin ISQS 3358 Texas Tech University. Outline. Online Targeted Advertising About Web mining Data Knowing your customer Consumer segmentation. Online Targeted Advertising. Marketing Technology Adoption. - PowerPoint PPT Presentation

Transcript of Introduction to Online Marketing Intelligence

Page 1: Introduction to Online Marketing Intelligence

1

Introduction to Online Marketing Intelligence

Zhangxi LinISQS 3358

Texas Tech University

Page 2: Introduction to Online Marketing Intelligence

2

Outline

Online Targeted AdvertisingAbout Web miningDataKnowing your customerConsumer segmentation

Page 3: Introduction to Online Marketing Intelligence

3

Online Targeted Advertising

Page 4: Introduction to Online Marketing Intelligence

4

Marketing Technology Adoption

In December 2005, Forrester surveyed 371 marketing technology decision-makers and influencers to investigate trends in marketing technology adoption and spending.

Respondents hail from six major industry groups, and two-thirds work for firms whose annual revenues in 2005 exceeded $1 billion. Marketing technology adoption is widespread. Marketers say they need a more comprehensive

application suite. Vendors aren’t delivering yet.

Page 5: Introduction to Online Marketing Intelligence

5

Marketing Technology Spending

Since 2003, budgets have crept steadily upward and, on average, 2006 budgets are up 7% over 2005. But spending varies significantly by company size and industry. Specifically: The largest and smallest firms are scaling back slightly. Technology followers are putting cash behind their

intentions. As a percentage of revenue, retailers spend the most on

marketing technology. B2B firms are growing marketing technology spend

aggressively.

Page 6: Introduction to Online Marketing Intelligence

6

Marketing Technology Spending

Page 7: Introduction to Online Marketing Intelligence

7

Online Marketing Technology

Page 8: Introduction to Online Marketing Intelligence

8

Online Advertising Market Status In 2006, the advertising spending was $16.8 billion an

increase of 34% from that of 2005 (IAB 2007). According to DoubleClick (2005)

Limited online advertising publishing resources because of limited online users’ capability to view growing number of web pages (DoubleClick Research 2005)

Online targeted advertising is a seller market Online targeted advertising is emerging as a new trend.

In March 2007, China’s largest advertising company by advertising revenue, Focus Holding Ltd agreed to buy Chinese leading online firm Allyes Information Technology Co. Ltd for $225 million.

In April 2007, Google Inc. announced a definitive agreement to acquire DoubleClick for $3.1 billion.

Page 9: Introduction to Online Marketing Intelligence

9

Targeted Marketing

Users know what they want Users purchased certain items from certain websites

We can apply real-time customized marketing solutions (see the process map later)

Users did not purchase, but click through some links Mining the click streams of the customers, and figure out the

needs----behavioral targeting Users do not know what they want---behavioral targeting

Collecting information online (such as the blogs, discussions boards in a community)

Segment/target/position strategy We can potentially build a database profiling the online users

How to design (create) ads to make it appeal to end users

Page 10: Introduction to Online Marketing Intelligence

10

Implications of Targeted Marketing

For advertisers Help to drive immediate responses (or

increased sales) to their advertisements Help to build branding for the advertisers

For publishers Maximize the value of high-quality ad inventory

space (differential services for different site sectors)

Page 11: Introduction to Online Marketing Intelligence

11

Effectiveness of Online MarketingWhen executed properly, behavioral marketing is a highly

effective means of reaching and converting your target audience.

Network Behavioral Targeting vs. Non-Targeted Advertising

Behavioral Re-Targeting vs. Non-Targeting Advertising

Source: Advertising.com, 2005 Source: Advertising.com, 2004

Lift in CVR

Advertiser A 167%

Advertiser B 2,232%

Advertiser C 3,130%

Lift in CVR

Advertiser A 90%

Advertiser B 323%

Advertiser C 105%

Page 12: Introduction to Online Marketing Intelligence

12

This travel advertiser targeted consumers who previously visited its website in order to drive actual reservations.

Campaign Results

Behavioral Targeting

Impressions 99 million

Clicks 92,223

Bookings 52,936

Conversion Rate 57.4%

PRODUCT PURCHASE

Visitors who had not booked

a reservation received custom ads highlighting

guaranteed rates, seasonal discounts,

new hotel perks and free gifts with an online

booking.

1 out of every 2 people who

clicked on the ad completed a booking.

A hotel booking was generated for

every 2,000 impressions served.

Page 13: Introduction to Online Marketing Intelligence

13

About Web Mining

Page 14: Introduction to Online Marketing Intelligence

14

Web Mining

When online users browse web pages, their activities could be recorded. Using data mining techniques to analyze these activities will enable more accurate web-based online advertising。

The possible web mining applications may include Consumer Profiling Purchase propensity analysis Web page effectiveness evaluation Online recommendation Realtime advertising Others

Page 15: Introduction to Online Marketing Intelligence

15

Some Business Questions

Who is visiting my Web site? Who is buying my product(s)? Who are my repeat buyers? Which customers are churning? Which Web design produces the most purchases? What campaign strategies are most effective in

increasing Web site visits?

Page 16: Introduction to Online Marketing Intelligence

16

Business Questions What factors influence product purchases?

• Time-of-day effects• Gender, Age, Income, and so forth• Latent factors: e-shopper, Web expert, and so forth

Which sales channels produce the most profitable customers? Do any site-visit patterns correlate with outcomes that can be

exploited for business advantage? How can I forecast peak usage and future usage to ensure I have

the hardware and technology to keep my Web site running? How can I monitor my Web site to prevent inappropriate access and

malicious activity? How can I manage purchases, returns, and exchanges to avoid

fraud and reduce waste?

Page 17: Introduction to Online Marketing Intelligence

17

Web Mining for Profitability

Increase viewing, navigation, and transaction efficiency.

Improve the customer experience. Add services and features that promote cross-

selling and up-selling opportunities. Identify problem areas. Improve security. Attract more high quality customers.

Page 18: Introduction to Online Marketing Intelligence

18

Customer Relationship Management (CRM) Making the right offer to the right customer at the

right time. One-to-one marketing. — Peppers and Rogers TQM (Total Quality Management) with new buzz

words. “The practice of annoying customers for short

term profits.” — Herb Edelstein

Page 19: Introduction to Online Marketing Intelligence

19

Examples of Web Site Services

Recommender systemsStock quotes or financial servicesNews, weather, sports, traffic conditionsCelebrity or event photos and multimediaSearch enginesWeb site hosting or e-mailGames or contestsBeach cams, space cams, hot spot cams

Page 20: Introduction to Online Marketing Intelligence

20

Internet Commerce Challenges

24/7 operations International scope Non-standard media

Many browsers Different display monitors and graphics adapters Different window geometry Different computers and operating systems

Different customer concerns Secure transactions Privacy and confidentiality Legitimacy

Page 21: Introduction to Online Marketing Intelligence

21

Data Collection and Preparation

Page 22: Introduction to Online Marketing Intelligence

22

Data Collection Methods

Web logs Cookies Forms Java applications Other applications

Page 23: Introduction to Online Marketing Intelligence

23

Web Log DataFields

User’s IP address, also called Remote host name Client IP address

User name, also called Remote user log name (may be different) Authenticated user name

Date and time of request, with or without a UTC offset Request type, also called “method”

HTTP request with (CLF) or without (IIS) argument Status: HTTP three digit status code Number of bytes sent to client

continued...

Page 24: Introduction to Online Marketing Intelligence

24

Web Log Fields The URL path requested, if request type has no argument The port to which the request was served The name of the server The IP address of the server The time taken to serve the request Number of bytes in the request received from the client User agent, which is usually a text string with the name

and version number of Web browser used by the client and the operating system of the client machine

The domain name or IP address of the referring URL Query information in a text string Cookie information in a text string

Page 25: Introduction to Online Marketing Intelligence

25

The User Session

WebServer

Browser

User requests index.htm.

Server sends copy of index.htm.

Browser parses index.htm,finds references to image files,and requests image files.

...

Page 26: Introduction to Online Marketing Intelligence

26

Three Popular Web Log Formats

NCSA Common Log Format

Microsoft IIS Format

W3C Extended Log File Format

Page 27: Introduction to Online Marketing Intelligence

27

Web Logs May Be Inadequate for Data Mining

Limitations exist with respect to defining users,sessions, and page hits.

User preferences must be inferred from limiteddata: referring URL, page selections, browser.

Different users within a household may beindistinguishable.

Page 28: Introduction to Online Marketing Intelligence

28

What Is a Cookie?

Web ServerWeb Browser Client

Browser requests Web page

Web page is delivered withinstructions for creating cookie

Browser createscookie and writesto hard disk

Value of cookie sent to server

Custom content returned

Page 29: Introduction to Online Marketing Intelligence

29

The Anatomy of a Cookie

Name Sequence of charactersuniquely identifying cookie

Value Stored information

Domain Domain name

Path Path within a site. Accessis restricted to this path.

Expires Expiration date in UTC

Secure Encryption flag

Page 30: Introduction to Online Marketing Intelligence

30

A Sample Cookie

session-id103-0556164-3592039www.megastock.com/ 073071001630123554274210028829450847*

Page 31: Introduction to Online Marketing Intelligence

31

Limitations of Cookies

Can only be accessed by the domain name that created them (which is a GOOD thing)Are restricted to a maximum number of cookiesper Web site (20 with Netscape Version 0)

Are limited in size (4K with Netscape Version 0)

Have an expiration date

Page 32: Introduction to Online Marketing Intelligence

32

Microsoft Internet Explorer Cookie Options

Page 33: Introduction to Online Marketing Intelligence

33

Client-Side Cookies for Personalization

Deployed using JavaScript or VBScript

Implemented through the document.cookie property

Can be maintained using frames or thedocument object model

Page 34: Introduction to Online Marketing Intelligence

34

Server-Side Cookies

Can be used to restrict access

Support shopping cart applications

Help track user activity on the Web site

Page 35: Introduction to Online Marketing Intelligence

35

Server-Side Data Collection

Maintaining user information

Collecting and updating information

e-Commerce strategies

Page 36: Introduction to Online Marketing Intelligence

36

Evaluating Visitor Behavior

Page 37: Introduction to Online Marketing Intelligence

37

Some Common Web Log Statistics

Most popular pages Frequency of referring sites Page count statistics: means, percentiles, variation Session count statistics Frequency of Web browser usage Frequency of operating systems Frequency of error types

Check web log statistics: http://www.commerx.com/usage/ This website is the business site of IMW (

http://www.inetworks.com) headquartered in Austin, Texas.

Page 38: Introduction to Online Marketing Intelligence

38

Baselines and Comparisons

Which statement is more informative? Our Web server recorded 11,000 page views

yesterday. Our Web server recorded an increase of 1000

page views yesterday compared to the previous day.

Our Web server recorded a 10% increase in page views yesterday compared to the previous day.

continued...

Page 39: Introduction to Online Marketing Intelligence

39

Baselines and Comparisons: Good or Bad?“We converted 25% of our registered customers

to premium account status this month.”

“We converted 50% more of our registered customers to premium account status this month compared to last month.”

“Last month we converted 2 registeredcustomers to premium account status, and

this month we converted 3.”

Page 40: Introduction to Online Marketing Intelligence

40

Methods of Evaluating Visitor Behavior

Web Stats Path Analysis Link Analysis Stochastic Process Methods

Page transition probabilities Probability of site abandonment

Page 41: Introduction to Online Marketing Intelligence

41

Path Analysis for an E-tailer

ProductInfo

CustomerInfo

ProductSelection

Shipping Billing/CreditCardInfo

FinalDecision

Page 42: Introduction to Online Marketing Intelligence

42

A Visitor Path

1

2

3

4

5

6

7

8

EXIT

Path: 1 6 7 1 3 8

1

23

4

5

6

Page 43: Introduction to Online Marketing Intelligence

43

Path Analysis Example Results

Sixty percent of site visitors leave after viewing the home page.

Seventy-three percent of customers who purchase product X do not access the product X information page.

The highest probability of abandonment occurs on the shipping page.

Sixty-three percent of consumers who purchased product X viewed warranty information, while twenty-seven percent of consumers who abandoned a shopping cart containing product X viewed warranty information.

Page 44: Introduction to Online Marketing Intelligence

44

Path Analysis E-tailer Example Data

Only sessions with shopping carts are included All paths up to “checking out” are condensed into a

single “Product Selection” state Each session consists of 1 to 7 states, number of

items selected, value of all items in the shopping cart, and time each state is entered.

Purpose: investigate the abandonment of shopping carts and exiting the site without making a purchase.

Analysis: group shopping carts by value, perform a sequential association analysis, and plot confidence as a function of state.

Page 45: Introduction to Online Marketing Intelligence

45

SAS Code for Path Analysis

ods html path='C:\workshop\winsas\CCWEB' body='rlnkstat.html';title1 "Path Analysis of E-tailer Data";proc contents data=crssamp.rlinks;run;

Produce Contents of the RLINKS Dataset

continued...

Page 46: Introduction to Online Marketing Intelligence

46

SAS Code for Path Analysis

proc freq data=crssamp.rlinks;tables Category DollarCat

NumItems PurchaseStep

/list missing;run;

Produce Frequencies for Class Variables

continued...

Page 47: Introduction to Online Marketing Intelligence

47

SAS Code for Path Analysisproc univariate data=rlinks; var TotalCost;run;

title2 "Total Cost when a Purchase is Made";proc univariate data=rlinks (where=(PurchaseSequence=7)); var TotalCost;run;

Basic Descriptive Statistics

continued...

Page 48: Introduction to Online Marketing Intelligence

48

Link Analysis

Link analysis is the examination of the linkages between effects in a complex system. (SAS Help screen)

Analysts try to discover the relationships between states in a complex system.

A link analysis may employ a variety of techniques including OLAP, associations, sequences, clustering, and graphics.

The path analysis performed on the e-tailer data may be viewed as a link analysis performed on a rather simple retail system.

Page 49: Introduction to Online Marketing Intelligence

49

Page 50: Introduction to Online Marketing Intelligence

50

SAS Link Node C1U -- the unweighted first-order Centrality measure. C2U -- the unweighted second-order Centrality measure. C1 -- the first-order Centrality measure. C2 -- the second-order Centrality measure. VALUE -- the value of the class variable, or the midpoint of the bin of the

interval variable that constitutes the node. VAR -- the variable that constitutes the node. ROLE -- the variable role. COUNT -- the node count. The number of observations that are

represented by the level of the variable. PERCENT -- the node count divided by the total number of observations. ID -- the node ID. TEXT -- the text variable, represented as VAR=VALUE. X -- the X-coordinate of the node in the Link Graph. Y -- the Y-coordinate of the node in the Link Graph.

Page 51: Introduction to Online Marketing Intelligence

51

C1 and C2 The values C1 and C2 are measures of node importance.

C1 is the first-order undirected centrality measure, which attempts to measure the importance of the node in the network as a function of how often it directly links to other nodes in the network.

C2 is the second-order undirected centrality measure, which attempts to measure the combined importance of all nodes that are directly linked to the node.

In a social network, C1 would measure “How many people (nodes) are my friends?” C2 would measure, “How many people are friends of my friends?”

The centrality measures can be weighted or unweighted. A weighted first-order centrality measure would be analogous to

measuring, “How many people with many friends are my friends?” Thus, a node with many direct links that is linked to the target node would receive a higher weight than a node with few direct links.

Page 52: Introduction to Online Marketing Intelligence

52

The Web Stochastic Process

HomePage(Point ofEntry)

1

3

2

4

5

EXIT

States

Page 53: Introduction to Online Marketing Intelligence

53

Consumer Segmentation

Page 54: Introduction to Online Marketing Intelligence

54

Discussion – How to segment

Dataset – Commrex web log dataset Two levels of granularity to aggregate the transaction

records Per session Per user

Identify the interested pages and extract the information to be mined

Combining clustering and classification – How? Referring to the case of INSSUBRO in Text Mining: Step 1: clustering Step 2: Using Data Set Attribute node to choose the target

variables and change status of other variables Step 3: Classification based on the target variable