consumer data

Results 201 - 225 of 248Sort Results By: Published Date | Title | Company Name
Published By: SPSS, Inc.     Published Date: Mar 31, 2009
This paper describes why and how Enterprise Feedback Management (EFM) is a critical component in solving the problem of enhancing customer-driven innovation and improving the predictive capabilities of the IT organization.
Tags : 
predictive enterprise, spss, enterprise feedback management, efm, customer-driven innovation, crm, customer relationship management, customer experience, consumer behavior, actionable insight, centralized system, feedback programs, push orientation, lifecycle-based approach, customer retention, churn rate, compliance, internal r&d, behavioral data, descriptive data
    
SPSS, Inc.
Published By: Spredfast, Inc.     Published Date: Jun 24, 2014
We are living in the most revolutionary era in human communication since the invention of the printing press. For the past few years, marketers have ‘woken up’ to consumers who have the power to express their views anytime and anywhere. ‘Social’ is hot, and if nothing else, a response to this awakening. Now, the lines between paid, owned and earned media have been blurred, if not erased. Social media crosses the barrier between the three. It’s fast-paced and chaotic. We partnered with the research firm Sentient Services and surveyed more than 200 consumers about their attitudes, opinions and beliefs about brands and social media integration. The respondents come from all over the country, with all different incomes, lifestyles, and social media habits. Universally, the data supports what we’ve already seen in action: consumers want to engage with brands that integrate social media, and they prefer to do business with social brands. Let's get started!
Tags : 
spredfast, social, social integration, paid media, owned media, earned media, social media
    
Spredfast, Inc.
Published By: Citrix     Published Date: Jul 25, 2014
Mobile devices and applications are quickly becoming as important and widespread in the enterprise as PCs and traditional business apps. Thanks to the consumerization of IT and bring-your-own-device (BYOD) programs, the workplace has expanded beyond the office and even the home to wherever the user happens to be. Traveling executives and Millennials alike expect to communicate, collaborate and access their important work applications and data from anywhere on whatever device they choose.
Tags : 
mobile, enterprise, application gap, pcs, byod, data, networking
    
Citrix
Published By: Viavi Solutions     Published Date: Jun 30, 2014
News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.
Tags : 
network instruments, hacks, apm, security, pci, dss, hackers, database security
    
Viavi Solutions
Published By: Dell     Published Date: Sep 06, 2015
Retailers can analyze this data to generate insights about individual consumer preferences and behaviors, and offer personalized recommendations in near real-time. Key to this is the ability to optimize merchandise selections and pricing that are tailored to a consumer’s likes and dislikes.
Tags : 
ibm, big data, retail data, retail, consumer data, shopper data, business analytics, business intelligence, customer interaction service, customer service, data integration, information management, records management, project management
    
Dell
Published By: CrowdTwist     Published Date: Apr 16, 2018
In order for brands to compete and provide the level of personalization consumers have already come to expect, marketers need to work quickly to develop competencies around their abilities to collect contextual and anticipatory insight and meet customers in the moments that matter most to them. Now is the time for marketers to invest in technology that supports data capture, segmentation, predictive analytics, and machine learning. With these capabilities in place, brands should be on track to build rich first party profiles of customers across all channels and maximize customer lifetime value by creating relevant experiences at all stages of the customer lifecycle.
Tags : 
customers, predictive, branding, consumers, competition, lifecycle
    
CrowdTwist
Published By: CrowdTwist     Published Date: Jul 25, 2018
Over the last decade customer-brand relationships have become more and more digitized. Companies have enjoyed access to new technologies, new capabilities, and greater access to customer data. In turn, consumers have become better informed and able to connect with brands with greater flexibility and convenience. However, concerns around mismanagement of customer data, the proliferation of fake news, high profile retailer database breaches, and the Cambridge Analytica scandal has contributed to an erosion of trust between consumers and brands and demands for data privacy. What can brands do to overcome consumer skepticism? What keeps a customer coming back in 2018? And what can brands do to demonstrate relevancy and provide value?
Tags : 
customer, branding, relationships, consumer, database
    
CrowdTwist
Published By: IBM     Published Date: Feb 27, 2014
This white paper describes software as the invisible thread that links product parts into an intelligent whole. It examines software delivery for smart products and strategies for evolving software development into a business process.
Tags : 
ibm, ibm software, innovation, software development, smart products, product delivery, smart software, consumerization, unified platform, control risks, software delivery, manage big data, automation, configuration data, error-free data, information technology, lifecycle risks, it management, access control, business intelligence
    
IBM
Published By: Symantec     Published Date: Jun 18, 2015
Learn how to secure your customers online by offering strong security that is easy to use and cost-effective.
Tags : 
online consumers, security, availability, data protection, cost-effective secuirty, data management
    
Symantec
Published By: Infacta     Published Date: Jan 22, 2007
Online consumers demand relevance, so list builders must focus on building large, highly-relevant lists rather than just gathering a bunch of email addresses. In this article, the author will discuss list size, registration methods, data collection and permission requirements.
Tags : 
subscriber list, subscription list, email marketing
    
Infacta
Published By: ForeSee Results     Published Date: Jul 20, 2007
Online retailers are always on the lookout for ways to improve the online shopping experience and stay ahead of the competition. Adding consumer product reviews is one such way. As part of the analysis of the Spring 2007 edition of the Top 100 Online Retail Satisfaction Index, we delved into the data specific to consumer product reviews to answer pertinent questions.
Tags : 
customer reviews, reviews, purchase decision, referral, recommendation, customer satisfaction, online retail, e-commerce, ecommerce, ebusiness, e-business, foresee, foresee results
    
ForeSee Results
Published By: NetIQ Corporation     Published Date: Nov 18, 2006
Mandatory compliance requirements often vary or conflict. Discover the major issues and appropriate actions organizations must take today to protect the privacy of information and meet legal and contractual requirements.
Tags : 
compliance, privacy, pci, hipaa compliance, consumer privacy, customer privacy, data protection, database security, regulatory compliance, net iq, netiq, it management, auditing, security management, security policies, best practices, content delivery, document management, information management, software compliance
    
NetIQ Corporation
Published By: ForeSee Results     Published Date: Jul 20, 2007
Online retailers are always on the lookout for ways to improve the online shopping experience and stay ahead of the competition. Adding consumer product reviews is one such way. As part of the analysis of the Spring 2007 edition of the Top 100 Online Retail Satisfaction Index, we delved into the data specific to consumer product reviews to answer pertinent questions.
Tags : 
customer reviews, reviews, purchase decision, referral, recommendation, customer satisfaction, online retail, e-commerce, ecommerce, ebusiness, e-business, foresee, foresee results, best practices, customer interaction service, sales & marketing software, customer experience management
    
ForeSee Results
Published By: GFI     Published Date: Jul 09, 2007
This white paper identifies the problems encountered in addressing network security risks through vulnerability management. It describes how automated vulnerability management contributes to compliance with industry standards such as the Payment Card Industry Data Security Standard (PCI DSS) and assists you in proactively identifying security weaknesses before these are exploited.
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability, vulnerability management, cardholder, data protection, database security, consumer data, consumer privacy, customer data, customer privacy, gfi, security, network security, patch management
    
GFI
Published By: GFI     Published Date: Jul 09, 2007
This white paper highlights why organizations need to implement event log auditing as an integral part of their security policy to meet industry standards such as the Payment Card Industry Data Security Standard (PCI DSS).
Tags : 
security software, pci, payment card, credit card, compliance, pci compliance, pci data security, vulnerability, vulnerability management, cardholder, data protection, database security, consumer data, consumer privacy, customer data, customer privacy, gfi, security, network security, security management
    
GFI
Published By: Perimeter     Published Date: Jul 17, 2007
Download this free paper about read about identity protection services and how it can help fortify the trust that customers place on their Financial Institutions.
Tags : 
financial institution, privacy, consumer, consumer privacy, data protection, cardholder data, pci, compliance, security, personal data, perimeter, phishing, pharming, perimeter esecurity, identity management, customer relationship management, database security, information management
    
Perimeter
Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, pci compliance
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, pci compliance
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Do you need to implement corporate policies regarding security and confidential health information? Learn: How to use IT documentation to prepare for and pass Security audits; What IT data is critical for Security Standards; What is the difference between Security and IT Audits. You can implement a sustainable HIPAA Security Standard – Read this paper to learn more.
Tags : 
hipaa, hippa, health care, healthcare, compliance, privacy, consumer data, data privacy, information management, customer data, consumer privacy, privacy, database security, ecora, hipaa compliance
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
This whitepaper will teach you the necessary steps any organization must take to comply with the Gramm-Leach-Bliley Act (GLBA). Based on the experienced insight of Alex Bakman, Founder, Chairman & Chief Technology Officer at Ecora Software and Khalid Kark, Senior Research Analyst at Forrester Research, this paper discusses how any organization can reduce compliance costs by automating the process of attaining and maintaining proper financial privacy and consumer data safeguard procedures.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, product lifecycle management
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
A summary of the background of GLBA, the precedents it sets for securing nonpublic consumer information, and the responsibilities it places on senior management and IT departments to ensure customer data is safeguarded.
Tags : 
gbla, glba, compliance, financial, privacy, consumer data, data privacy, information management, customer data, network security, security, compliant, glba compliant, consumer privacy, database security, ecora
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Achieve and Maintain Compliance with PCI Data Security Standard – Part 4. Deep dive into PCI DSS requirements 10-12. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, vulnerability management
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 15, 2007
Deep dive into PCI DSS requirements 5-9. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, vulnerability management
    
Ecora Software
Published By: Ecora Software     Published Date: Aug 16, 2007
Deep dive into the first 4 PCI DSS requirements. Learn how to adhere to the PCI security standard by automating regulatory compliance and best practices reporting typically used to identify and validate IT configuration changes throughout operating systems, database management systems, applications and network devices.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial, privacy, consumer data, data privacy, information management, customer data, consumer privacy, database security, ecora, pci compliance, vulnerability management
    
Ecora Software
Published By: SPSS     Published Date: Jun 29, 2009
This paper will focus on how a company might identify its best customers, but the same process could be used for other customer segments.
Tags : 
spss, customer management, consumer behavior, customer retention, crm, customer service, cost-effective strategies, customer database, statistical analysis, data management, data analysis, recency, frequency, and monetary value, rfm, best customers, customer lifetime value, chi-square, customer experience, enterprise applications
    
SPSS
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.