Target Corp. inadvertently drew an early line in the sand between good data use and data use that was too personal for customer comfort. In 2012, Charles Duhigg reported in The New York Times that Target addressed a mailer, which featured coupons for cribs and baby clothes, to a high school girl. When her father complained to the company, yelling that his daughter was not pregnant, the company apologized; when the father called back a few days later, he was contrite. “It turns out there’s been some activities in my house I haven’t been completely aware of,” the father said, according to Duhigg. “She’s due in August. I owe you an apology.”
Failures and successes in e-marketing have shown that when marketing goods online results in distribution, storing, or shipping and handling costs higher than the value of the goods, an exclusively online enterprise may be headed for a short life. In addition, e-marketers need to be aware of cultural pitfalls when designing e-commerce sites for foreign markets.

Targeting, viewability, brand safety and invalid traffic: Targeting, viewability, brand safety and invalid traffic all are aspects used by marketers to help advocate digital advertising. Cookies are a form of digital advertising, which are tracking tools within desktop devices; causing difficulty, with shortcomings including deletion by web browsers, the inability to sort between multiple users of a device, inaccurate estimates for unique visitors, overstating reach, understanding frequency, problems with ad servers, which cannot distinguish between when cookies have been deleted and when consumers have not previously been exposed to an ad. Due to the inaccuracies influenced by cookies, demographics in the target market are low and vary (Whiteside, 2016).[42] Another element, which is affected within digital marketing, is ‘viewabilty’ or whether the ad was actually seen by the consumer. Many ads are not seen by a consumer and may never reach the right demographic segment. Brand safety is another issue of whether or not the ad was produced in the context of being unethical or having offensive content. Recognizing fraud when an ad is exposed is another challenge marketers face. This relates to invalid traffic as premium sites are more effective at detecting fraudulent traffic, although non-premium sites are more so the problem (Whiteside, 2016).[42]
As with conventional marketing, e-marketing is creating a strategy that helps businesses deliver the right messages and product/services to the right audience. It consists of all activities and processes with the purpose of finding, attracting, winning and retaining customers. What has changed is its wider scope and options compared to conventional marketing methods.
Choose an email blasting software or website. To send your email blast, you'll need to do research on popular email blast websites and choose one that works for your team. Consider the amount of training that would be required, if it automatically links to your current database or CRM, how much it costs, and how easy it is to use. Write down pros and cons of each provider and determine the blasting software that's right for you.
I recently had my MailChimp account suspended. One of my sites is in the ‘make money online’ space. It’s a completely legitimate website, but apparently if your emails contain keywords they don’t like, they will suspend you. I would not recommend using them. Contacting support I just get form responses that are completely unhelpful. There’s no phone support- just account termination. Really bad experience. Luckily, this is a very new site- but imagine if you have thousands of emails and they just shut you down without ANY recourse.
Note: If you want to attach additional files, such as a .pdf, we recommend that you store these files on a cloud storage service, such as Dropbox or Google Drive, and linking to these files within your blast. We do not support file attachments to an email blast as these file types tend to be larger, increasing your chances of triggering spam filters and preventing your blast from reaching your recipients.
Short for e lectronic mail , the transmission of messages over communications networks . The messages can be notes entered from the keyboard or electronic files stored on disk . Most mainframes , minicomputers , and computer networks have an e-mail system . Some electronic-mail systems are confined to a single computer system or network, but others have gateways to other computer systems, enabling users to send electronic mail anywhere in the world. Companies that are fully computerized make extensive use of e-mail because it is fast, flexible, and reliable.. Most e-mail systems include a rudimentary text editor for composing messages, but many allow you to edit your messages using any editor you want. You then send the message to the recipient by specifying the recipient's address. You can also send the same message to several users at once. This is called broadcasting .. Sent messages are stored in electronic mailboxes until the recipient fetches them. To see if you have any mail, you may have to check your electronic mailbox periodically, although many systems alert you when mail is received. After reading your mail, you can store it in a text file , forward it to other users, or delete it. Copies of memos can be printed out on a printer if you want a paper copy .. All online services and Internet Service Providers (ISPs) offer e-mail, and most also support gateways so that you can exchange mail with users of other systems. Usually, it takes only a few seconds or minutes for mail to arrive at its destination. This is a particularly effective way to communicate with a group because you can broadcast a message or document to everyone in the group at once.. Although different e-mail systems use different formats , there are some emerging standards that are making it possible for users on all systems to exchange messages. In the PC world, an important e-mail standard is MAPI . The CCITT standards organization has developed the X.400 standard, which attempts to provide a universal way of addressing messages. To date, though, the de facto addressing standard is the one used by the Internet system because almost all e-mail systems have an Internet gateway.. Another common spelling for e-mail is email .. Also see Why E-Mails Bounce and Getting Rid of Spam in the Did You Know section of Webopedia..
Failures and successes in e-marketing have shown that when marketing goods online results in distribution, storing, or shipping and handling costs higher than the value of the goods, an exclusively online enterprise may be headed for a short life. In addition, e-marketers need to be aware of cultural pitfalls when designing e-commerce sites for foreign markets.
E-marketing refers to the use of the Internet and digital media capabilities to help sell your products or services. These digital technologies are a valuable addition to traditional marketing approaches regardless of the size and type of your business. E-marketing is also referred to as Internet marketing (i-marketing), online marketing or web-marketing.

This is a process described by Seth Godin known as permission marketing. The core concept of this idea is that you never market to someone that doesn’t want it, you first have to ask them for their permission. When someone signs up to your email not only do they become a warm lead but they give you their permission to send them offers and to market to them.
Use it to promote up-sells/cross-sells. You can even set up an autoresponder sequence for someone after they purchase and get repeat customers. Depending on the products you sell, you could offer an upsell, or cross sell related products. For example, if someone buys a digital camera, you can offer to add a lens, a tripod, and other accessories to their order before it ships. Or, if you sell products that people buy frequently (like food or disposable items, like diapers), you can automatically send them offers for new items when you know they’re about due for another order.

The first is just common sense. Do you really think that hundreds of random people will be interested in what you are promoting? Probably not. Most will instantly delete the email, unsubscribe, or mark your email as spam. Plus, if you buy the list from a company that gathered the names in less-than-ethical ways, you risk being labeled a spammer. And if that happens, having a small database is the least of your worries.
Transactional emails are usually triggered based on a customer's action with a company. To be qualified as transactional or relationship messages, these communications' primary purpose must be "to facilitate, complete, or confirm a commercial transaction that the recipient has previously agreed to enter into with the sender" along with a few other narrow definitions of transactional messaging.[2] Triggered transactional messages include dropped basket messages, password reset emails, purchase or order confirmation emails, order status emails, reorder emails, and email receipts.
Postcards can still be an effective medium if you use one of the oversized formats. One of our clients mails more than 2 million prospecting postcards a year and has had great success with an 11″ x 6″ size. This is just large enough to stand out from the rest of the mail and yet not so large that it incurrs additional postage. Obviously, good creative and a relevent message help tremendously, but from a pure format standpoint, this size has worked best for our clients.
×