SlideShare una empresa de Scribd logo
1 de 34
Descargar para leer sin conexión
Understanding Behavior:
Getting Engaged or Stranded at the Inbox?
Using Core Metrics to Read Between the Lines.

Session ID: 219

Presenter: Jordan Dossett
jordan.dossett@antharia.com
Who is my key stakeholder?


            Age, Race, Ethnicity, Gender, Disability, Income. Any key
            characteristic used to classify people for statistical purposes.

DEMOGRAPHIC

              Level of education, location (aka geodemographic) such as inner
              city, suburbs, exurbs, miles traveled to/from work, travel time,
              accessibility to transit, car ownership, technographics.

SUB-DEMOGRAPHIC


              Measuring consumers' beliefs, opinions and interests. Instead of
              age and race, etc., psychological information (opinions on abortion,
              religious beliefs, musical tastes, cultural mores, etc.) comes to play.

PSYCHOLOGICAL (PSYCHOGRAPHIC)
Technographics & Clusters (or Groups)


           Online frequency, access from home or office, browser
           dominance, os platform, monitor resolution, how comfortable is
           this user online, do they make purchases easily online? Web
           based email user? What do we know about their “technology”
           characteristics?

TECHNOGRAPHICS

             Birds of a feather, flock together. This is not only true for
             geodemographics, people who buy, believe and value similar
             things naturally gravitate toward like-minded people, but this
             phenomenon follows through on the web with advocacy,
             donations and outreach. A cluster or demographic grouping is a
             collection of people sharing a set of “values” in their profile.

CLUSTERS/GROUPS
NEWSFLASH




            Your key stakeholder is not your Executive Director, Board of
            Directors, IT Director, or anyone* that works at your organization.

KEY STAKEHOLDER




            *Unless your website and email only serves your organization internally such as an intranet.
Goodie: Key Stakeholder Worksheet/Analysis


                                Before you take on layout of
                                your next campaign (for your
                                website or email) download
                                our free key stakeholder
                                worksheet at
                                www.antharia.com/
                                worksheets fill in as much
                                information as you can to
                                create a profile of who you are
                                targeting.

                                You can also get a copy of this
                                presentations at
                                www.antharia.com/
                                presentations
Sending by Stakeholder (Criteria)


Now that you know who your key stakeholders are you more than likely can
“cluster” or “group” them by criteria. This can be anything from geographic
region to past giving history, to eye color. Once you have defined criteria
utilize this as a means to segment your communication.




                            New Contacts.
                                                      Prime.
              Recent Donors.

                                                                   Faculty
                                            Alumni.

                                                       Students.
                       Email Subscribers.
        Donor 3+ Yrs
How is the session going? Remember to txt your
evaluation (if you don’t they don’t ask me back)


         Evaluation Code: 219
     Call In              Text             Online




 Call 404.939.4909      Text 219 to           Visit
  Enter Code 219           69866       nten.org/ntc-eval
                                        Enter Code 219
If you send it, they will read it… um?



               If it does not bounce, they must have “received” it and surely
               they “opened” it, “read” it, and taken action, right?



 While it may make sense to many of us to say that if we sent it and it did not
 bounce that the email was a success. Not so my friend, no so. The EEC (DMA’s
 email experience council) is working hard with folks to implement some well
 needed standards in defining what happens so to speak when that email
 leaves your “outbox” or “queue”.
Email Communication Terminology


Accepted: Used in lieu of “delivered” and defined as any email that is not
rejected by a server, including emails delivered to the inbox or the spam or
junk folders and including those that are missing but did not receive a bounce
reply.

Renders: Used in lieu of “opens” and/or “clicks” and defined as the total number
of times an email is displayed (whether fully opened or within the preview
pane) by any user and recording using only a tracking pixel for a unique
subscriber address. If the user opens the email multiple times, one e-mail
render is counted for each occurrence. This metric is based off of HTML-
formatted emails only. Some contrast to this has been offered in that effective
plain text actionable emails can be delivered and tracked within these same
metrics.
Scheduling Your Email
Your organizations message is competing with: 90%!


                   According to The Spamhause Project, most
                   average sized Internet Service Providers and
                   networks in North America, Europe or
                   Australasia, today's incoming email traffic
                   consists of approximately 90% spam and 10%
                   normal legitimate wanted email.

                   http://www.spamhaus.org/whitepapers/
                   effective_filtering.html
Spam: By Country
Spam: By ISP
Spam: Noted Spammers
How is the session going? Remember to txt your
evaluation (if you don’t they don’t ask me back)


         Evaluation Code: 219
     Call In              Text             Online




 Call 404.939.4909      Text 219 to           Visit
  Enter Code 219           69866       nten.org/ntc-eval
                                        Enter Code 219
Monitoring Results
Follow the path…
Quick & “Dirty” they unsubscribed, but that’s ok!
It’s the path, not the click that matters…
Just how long do they stay?
Entry & Exit: Pay very close attenion
Typing, Searching or Clicking?
Where’s Waldo?
Maintaining Mailing List (Keep it Clean)
http://www.spamhaus.org/whitepapers/mailinglists.html
Focusing Further: Geodemographics
Goodies: Dig out your business cards!


                        Dig in your pockets and pass your
                        business card (or write your info on a
                        sheet of paper) up. I will be giving
                        away one copy of Neuro Web Design
                        which is a great book covering more on
                        the science of what makes people tick,
                        er I mean click.

                        You do not have to be present, the
                        winner will receive the book direct
                        from Amazon, but you have to turn in
                        your cards by end of session today.
Technographics
Technographics: Screen Resolution & Depth
VisiStat
http://www.visistat.com
Google Analytics
http://www.google.com/analytics/
Going Up!
https://www.goingup.com/
Yahoo Web Analytics
https://analytics.yahoo.com
How is the session going? Remember to txt your
evaluation (if you don’t they don’t ask me back)


         Evaluation Code: 219
     Call In              Text             Online




 Call 404.939.4909      Text 219 to           Visit
  Enter Code 219           69866       nten.org/ntc-eval
                                        Enter Code 219
STAYING IN TOUCH
We are sponsoring the Cyber Café. I will be
available for questions both Friday and Saturday
afternoon. Please feel free to swing by and ask away.

Ms. Jordan Dossett
Antharia (antharia.com)
jordan.dossett@antharia.com
twitter/facebook/skype: jordandossett

the only “dumb” question is the one unasked. remember my opinion is
free, you just may not always like the answer.

Más contenido relacionado

Similar a Stranded at the Inbox? - Dossett

11ntctalk resources handout
11ntctalk resources handout11ntctalk resources handout
11ntctalk resources handoutSimone Parrish
 
Unicorn invasion: A UX workshop for all levels and stuff!
Unicorn invasion: A UX workshop for all levels and stuff!Unicorn invasion: A UX workshop for all levels and stuff!
Unicorn invasion: A UX workshop for all levels and stuff!J+E Creative
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565pizonaim
 
Social Impact of Technology - Final Presentation
Social Impact of Technology - Final PresentationSocial Impact of Technology - Final Presentation
Social Impact of Technology - Final Presentationandyjhayes
 
Opening Up User-Centric Identity
Opening Up User-Centric IdentityOpening Up User-Centric Identity
Opening Up User-Centric IdentityEduserv Foundation
 
Open Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration PresentationOpen Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration Presentationdarryl_lehmann
 
Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008coniecto
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)jonaspalen1
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,brylljoanagolo4ever
 
Knowledge Extraction from Social Media
Knowledge Extraction from Social MediaKnowledge Extraction from Social Media
Knowledge Extraction from Social MediaSeth Grimes
 
Next Step Conference Presentation
Next Step Conference PresentationNext Step Conference Presentation
Next Step Conference Presentationjayblove
 
Persona Centric Approach to Experience Led Journeys
Persona Centric Approach to Experience Led JourneysPersona Centric Approach to Experience Led Journeys
Persona Centric Approach to Experience Led JourneysPia Chon
 
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...TechSoup Canada
 
The New Inbox and Other Innovations Part 2
The New Inbox and Other Innovations Part 2The New Inbox and Other Innovations Part 2
The New Inbox and Other Innovations Part 2Vivastream
 
Ashpiaaaaa
AshpiaaaaaAshpiaaaaa
Ashpiaaaaapizonaim
 
"Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis...
"Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis..."Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis...
"Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis...TheFamily
 

Similar a Stranded at the Inbox? - Dossett (20)

11ntctalk resources handout
11ntctalk resources handout11ntctalk resources handout
11ntctalk resources handout
 
Unicorn invasion: A UX workshop for all levels and stuff!
Unicorn invasion: A UX workshop for all levels and stuff!Unicorn invasion: A UX workshop for all levels and stuff!
Unicorn invasion: A UX workshop for all levels and stuff!
 
Beyond Usability
Beyond UsabilityBeyond Usability
Beyond Usability
 
Melanie g done 6565
Melanie g done 6565Melanie g done 6565
Melanie g done 6565
 
Social Impact of Technology - Final Presentation
Social Impact of Technology - Final PresentationSocial Impact of Technology - Final Presentation
Social Impact of Technology - Final Presentation
 
Opening Up User-Centric Identity
Opening Up User-Centric IdentityOpening Up User-Centric Identity
Opening Up User-Centric Identity
 
Open Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration PresentationOpen Web Technologies and You - Durham College Student Integration Presentation
Open Web Technologies and You - Durham College Student Integration Presentation
 
Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008Avram ODonovan Blogtalk2008
Avram ODonovan Blogtalk2008
 
Lea pagoyo final(1)
Lea pagoyo final(1)Lea pagoyo final(1)
Lea pagoyo final(1)
 
Blogging
BloggingBlogging
Blogging
 
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryllEmpowerment Technology by:jewelyn,liezel,mary joy,bryll
Empowerment Technology by:jewelyn,liezel,mary joy,bryll
 
Knowledge Extraction from Social Media
Knowledge Extraction from Social MediaKnowledge Extraction from Social Media
Knowledge Extraction from Social Media
 
Next Step Conference Presentation
Next Step Conference PresentationNext Step Conference Presentation
Next Step Conference Presentation
 
CRM Introduction
CRM IntroductionCRM Introduction
CRM Introduction
 
Persona Centric Approach to Experience Led Journeys
Persona Centric Approach to Experience Led JourneysPersona Centric Approach to Experience Led Journeys
Persona Centric Approach to Experience Led Journeys
 
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
Digital Marketing 101 for Arts Presenters: Connecting in the inbox with ema...
 
The New Inbox and Other Innovations Part 2
The New Inbox and Other Innovations Part 2The New Inbox and Other Innovations Part 2
The New Inbox and Other Innovations Part 2
 
Ashpiaaaaa
AshpiaaaaaAshpiaaaaa
Ashpiaaaaa
 
"Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis...
"Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis..."Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis...
"Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis...
 
Go chart
Go chartGo chart
Go chart
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Stranded at the Inbox? - Dossett

  • 1. Understanding Behavior: Getting Engaged or Stranded at the Inbox? Using Core Metrics to Read Between the Lines. Session ID: 219 Presenter: Jordan Dossett jordan.dossett@antharia.com
  • 2. Who is my key stakeholder? Age, Race, Ethnicity, Gender, Disability, Income. Any key characteristic used to classify people for statistical purposes. DEMOGRAPHIC Level of education, location (aka geodemographic) such as inner city, suburbs, exurbs, miles traveled to/from work, travel time, accessibility to transit, car ownership, technographics. SUB-DEMOGRAPHIC Measuring consumers' beliefs, opinions and interests. Instead of age and race, etc., psychological information (opinions on abortion, religious beliefs, musical tastes, cultural mores, etc.) comes to play. PSYCHOLOGICAL (PSYCHOGRAPHIC)
  • 3. Technographics & Clusters (or Groups) Online frequency, access from home or office, browser dominance, os platform, monitor resolution, how comfortable is this user online, do they make purchases easily online? Web based email user? What do we know about their “technology” characteristics? TECHNOGRAPHICS Birds of a feather, flock together. This is not only true for geodemographics, people who buy, believe and value similar things naturally gravitate toward like-minded people, but this phenomenon follows through on the web with advocacy, donations and outreach. A cluster or demographic grouping is a collection of people sharing a set of “values” in their profile. CLUSTERS/GROUPS
  • 4. NEWSFLASH Your key stakeholder is not your Executive Director, Board of Directors, IT Director, or anyone* that works at your organization. KEY STAKEHOLDER *Unless your website and email only serves your organization internally such as an intranet.
  • 5. Goodie: Key Stakeholder Worksheet/Analysis Before you take on layout of your next campaign (for your website or email) download our free key stakeholder worksheet at www.antharia.com/ worksheets fill in as much information as you can to create a profile of who you are targeting. You can also get a copy of this presentations at www.antharia.com/ presentations
  • 6. Sending by Stakeholder (Criteria) Now that you know who your key stakeholders are you more than likely can “cluster” or “group” them by criteria. This can be anything from geographic region to past giving history, to eye color. Once you have defined criteria utilize this as a means to segment your communication. New Contacts. Prime. Recent Donors. Faculty Alumni. Students. Email Subscribers. Donor 3+ Yrs
  • 7. How is the session going? Remember to txt your evaluation (if you don’t they don’t ask me back) Evaluation Code: 219 Call In Text Online Call 404.939.4909 Text 219 to Visit Enter Code 219 69866 nten.org/ntc-eval Enter Code 219
  • 8. If you send it, they will read it… um? If it does not bounce, they must have “received” it and surely they “opened” it, “read” it, and taken action, right? While it may make sense to many of us to say that if we sent it and it did not bounce that the email was a success. Not so my friend, no so. The EEC (DMA’s email experience council) is working hard with folks to implement some well needed standards in defining what happens so to speak when that email leaves your “outbox” or “queue”.
  • 9. Email Communication Terminology Accepted: Used in lieu of “delivered” and defined as any email that is not rejected by a server, including emails delivered to the inbox or the spam or junk folders and including those that are missing but did not receive a bounce reply. Renders: Used in lieu of “opens” and/or “clicks” and defined as the total number of times an email is displayed (whether fully opened or within the preview pane) by any user and recording using only a tracking pixel for a unique subscriber address. If the user opens the email multiple times, one e-mail render is counted for each occurrence. This metric is based off of HTML- formatted emails only. Some contrast to this has been offered in that effective plain text actionable emails can be delivered and tracked within these same metrics.
  • 11. Your organizations message is competing with: 90%! According to The Spamhause Project, most average sized Internet Service Providers and networks in North America, Europe or Australasia, today's incoming email traffic consists of approximately 90% spam and 10% normal legitimate wanted email. http://www.spamhaus.org/whitepapers/ effective_filtering.html
  • 15. How is the session going? Remember to txt your evaluation (if you don’t they don’t ask me back) Evaluation Code: 219 Call In Text Online Call 404.939.4909 Text 219 to Visit Enter Code 219 69866 nten.org/ntc-eval Enter Code 219
  • 18. Quick & “Dirty” they unsubscribed, but that’s ok!
  • 19. It’s the path, not the click that matters…
  • 20. Just how long do they stay?
  • 21. Entry & Exit: Pay very close attenion
  • 22. Typing, Searching or Clicking?
  • 24. Maintaining Mailing List (Keep it Clean) http://www.spamhaus.org/whitepapers/mailinglists.html
  • 26. Goodies: Dig out your business cards! Dig in your pockets and pass your business card (or write your info on a sheet of paper) up. I will be giving away one copy of Neuro Web Design which is a great book covering more on the science of what makes people tick, er I mean click. You do not have to be present, the winner will receive the book direct from Amazon, but you have to turn in your cards by end of session today.
  • 33. How is the session going? Remember to txt your evaluation (if you don’t they don’t ask me back) Evaluation Code: 219 Call In Text Online Call 404.939.4909 Text 219 to Visit Enter Code 219 69866 nten.org/ntc-eval Enter Code 219
  • 34. STAYING IN TOUCH We are sponsoring the Cyber Café. I will be available for questions both Friday and Saturday afternoon. Please feel free to swing by and ask away. Ms. Jordan Dossett Antharia (antharia.com) jordan.dossett@antharia.com twitter/facebook/skype: jordandossett the only “dumb” question is the one unasked. remember my opinion is free, you just may not always like the answer.