skip to main content


Title: Is first- or third-party audience data more effective for reaching the ‘right’ customers? The case of IT decision-makers
Abstract

Often marketers face the challenge of how to communicate best with the customers who have the right responsibilities, influence or purchasing power, especially in business-to-business (B2B) settings. For example, B2B marketers selling software and IT need to identify IT decision-makers (ITDMs) within organizations. The modern digital environment in theory allows marketers to target individuals in organizations through specifically designed third-party audience segments based on deterministic prospect lists or probabilistic inference. However, in this paper we show that in our context, such ‘off-the-shelf’ segments perform no better at reaching the right person than random prospecting. We present evidence that even deterministic attribute information is flawed for ITDM identification, and that the poor campaign results can be partly linked to incorrect assignment of established prospect profiles to online identifiers. We then use access to our publisher network data to investigate what would happen if the advertiser had used first-party data that are less susceptible to the identified issues. We demonstrate that first-party demographics or contextual information allows advertisers and publishers to outperform both third-party ITDM audience segments and random prospecting. Our findings have implications for understanding the shift in digital advertising away from third-party cookie tracking, and how to execute digital marketing in the context of broad privacy regulation.

 
more » « less
NSF-PAR ID:
10470542
Author(s) / Creator(s):
; ; ;
Publisher / Repository:
Springer Science + Business Media
Date Published:
Journal Name:
Quantitative Marketing and Economics
Volume:
21
Issue:
4
ISSN:
1570-7156
Format(s):
Medium: X Size: p. 519-571
Size(s):
p. 519-571
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract

    What is unknown about commercial lobbying is far greater than what is known. These omissions distort our understanding of the extent and nature of business influence on politics. Especially when businesses engage in practices that harm health, it is crucial for public health advocates to understand corporate lobbying to counter its influence. Our study proceeded in three phases. First, based on an international audit, we developed a list of the categories of information about lobbying that could be disclosed under four groups (lobby firms, lobbyists, organizations and activities) and benchmarked Australian lobbyist registers against this list. Second, we manually extracted data from lobbyist registers in eight jurisdictions, cleaned the data and created a relational model for analysis. Finally, we classified a sample of organizations as public health organizations or harmful industries to compare their activities. We identified 61 possible categories of information about lobbying in international lobbyist registers. When applied to Australian lobbyist registers, Queensland covered the widest range of categories (13, 21%), though many lacked detail and completeness. Australian lobbyist registers provided data on 462 third-party lobby firms across Australia, currently employing 1036 lobbyists and representing 4101 organizations. Several of these represented harmful industries, with gambling interests hiring the most third-party lobby firms. Ultimately, Australian lobbyist registers do not provide enough information to understand the full extent of lobbying activities taking place. Political transparency is important for public health actors to be able to monitor corporate political activity and to protect policy-making from vested interests.

     
    more » « less
  2. Smart home devices are constantly exchanging data with a variety of remote endpoints. This data encompasses diverse information, from device operation and status to sensitive user information like behavioral usage patterns. However, there is a lack of transparency regarding where such data goes and with whom it is potentially shared. This paper investigates the diverse endpoints that smart home Internet-of-Things (IoT) devices contact to better understand and reason about the IoT backend infrastructure, thereby providing insights into potential data privacy risks. We analyze data from 5,413 users and 25,123 IoT devices using the IoT Inspector, an open-source application allowing users to monitor traffic from smart home devices on their networks. First, we develop semi-automated techniques to map remote endpoints to organizations and their business types to shed light on their potential relationships with IoT end products. We discover that IoT devices contact more third or support-party domains than first-party domains. We also see that the distribution of contacted endpoints varies based on the user's location and across vendors manufacturing similar functional devices, where some devices are more exposed to third parties than others. Our analysis also reveals the major organizations providing backend support for IoT smart devices and provides insights into the temporal evolution of cross-border data-sharing practices. 
    more » « less
  3. Cybersecurity is a concern for organizations in this era. However, strengthening the security of an organization’s internal network may not be sufficient since modern organizations depend on third parties, and these dependencies may open new attack paths to cybercriminals. Cyber Third-Party Risk Management (C-TPRM) is a relatively new concept in the business world. All vendors or partners possess a potential security vulnerability and threat. Even if an organization has the best cybersecurity practice, its data, customers, and reputation may be at risk because of a third party. Organizations seek effective and efficient methods to assess their partners’ cybersecurity risks. In addition to intrusive methods to assess an organization’s cybersecurity risks, such as penetration testing, non-intrusive methods are emerging to conduct C-TPRM more easily by synthesizing the publicly available information without requiring any involvement of the subject organization. In this study, the existing methods for C-TPRM built by different companies are presented and compared to discover the commonly used indicators and criteria for the assessments. Additionally, the results of different methods assessing the cybersecurity risks of a specific organization were compared to examine reliability and consistency. The results showed that even if there is a similarity among the results, the provided security scores do not entirely converge. 
    more » « less
  4. We study the problem of designing cyber insurance policies in an interdependent network, where the loss of one agent (a primary party) depends not only on his own effort, but also on the investments and efforts of others (third parties) in the same eco-system (i.e., externalities). In designing cyber insurance policies, the conventional wisdom is to avoid insuring dependent parties for two reasons. First, simultaneous loss incidents threaten the insurer's business and capital. Second, when a loss incident can be attributed to a third party, the insurer of the primary party can get compensation from the insurer of the third party in order to reduce its own risk exposure. In this work, we analyze an interdependent network model in order to understand whether an insurer should avoid or embrace risks interdependencies. We focus on two interdependent agents, where the risk of one agent (primary party) depends on the other agent (third party), but not the other way around. We consider two potential scenarios: one in which an insurer only insures a primary party, and another one in which the insurer of the primary party further insures the third party agent. We show that it is in fact profitable for the primary party's insurer to insure both agents. Further, we show that insuring both agents not only provides higher profit for the insurer, but also reduces the collective risk. 
    more » « less
  5. Social Networking Sites (SNS) offer youth activists and youth empowerment organizations (where adults help youth address community issues) opportunities for civic action. Impression management is critical to youth empowerment organizations’ work online, as they attempt to influence the opinions of their audience. However, there is a dearth of research characterizing online impression management in the context of youth empowerment organizations. To address this research gap, we conducted a qualitative study investigating the use of SNS in a youth empowerment organization. Using Goffman’s dramaturgical model, we characterized how youth tried to hack SNS algorithms, and their desire to better identify their audience. Our findings reveal how youth use SNS to create authentic images and connections with their audience. On the other hand, we discuss adults’ desire to convey a curated organizational image and challenges that arose. We conclude with design implications for tools that support impression management online for youth activists. 
    more » « less