Skip to:Content
|
Bottom
Cover image for Defending the brand : aggressive strategies for protecting your brand in the online arena
Title:
Defending the brand : aggressive strategies for protecting your brand in the online arena
Personal Author:
Publication Information:
New York : American Management Association, 2004
ISBN:
9780814407547

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010029554 HD69.B7 M87 2004 Open Access Book Book
Searching...

On Order

Summary

Summary

Leading brands and the intellectual property of successful organizations are increasingly falling victim to hostile tactics from unscrupulous businesses. Unwanted brand associations, product piracy, and other forms of online brand abuse threaten to alienate consumers and undermine the success of companies in every industry. Defending the Brand introduces strategies being used by companies around the world to fight back and regain control, preserving brand equity and rescuing potentially lost revenue. From marketing and sales initiatives that discourage abuse to how to collect intelligence on possible wrongdoers, this timely book is as valuable as it is fascinating. Punctuated with eye-opening stories from real companies like Home Depot, Disney, the Red Cross, Nintendo, and the Associated Press, Defending the Brand is a call to action for companies unwilling to compromise the power of their brands and the success of their products." "


Author Notes

Brian H. Murray is vice president of client services at Cyveillance


Reviews 1

Library Journal Review

Murray draws on his experience as vice-president of client services at Cyberveillance, Inc., with the aim of providing "an inside view of the unique issues that companies face regarding brand abuse and piracy in the digital age." At Cyberveillance, he led a team of professionals that worked aggressively to defend brands and digital assets for major companies internationally. Murray's practical and informative book discusses such dishonest and aggressive tactics as sending e-mail that appears to come from elsewhere, parodying a company logo or product, propagating false rumors online, and hacking and spamming. He also recommends strategies for dealing with them, which include seeking legal recourse, using online monitoring, using online competitive intelligence to outmaneuver competitor brands, and increasing the security of online transactions. Case studies are provided throughout, and even more helpful are an extensive bibliography, sample cease-and-desist letters, and a glossary. Recommended as useful reading for undergraduate and graduate marketing classes.-Lucy Heckman, St. Johns Univ. Lib., Jamaica, NY (c) Copyright 2010. Library Journals LLC, a wholly owned subsidiary of Media Source, Inc. No redistribution permitted.


Table of Contents

Prefacep. xiii
Acknowledgmentsp. xv
Introductionp. 1
Section 1 Digital Brand Abusep. 5
Chapter 1 The Dark Sidep. 7
Objectionable Contentp. 8
Pornographyp. 8
Adult Entertainmentp. 9
Child Pornographyp. 11
Hate, Violence, and Extremismp. 12
Gamblingp. 13
Parodyp. 14
Defining "Objectionable"p. 18
Who's at Risk?p. 21
What to Dop. 21
The Business Casep. 24
The Board Room Summaryp. 26
Chapter 2 The Opportunities and Threats of Online Commentaryp. 27
The Rumor Millp. 28
Financial Earningsp. 30
Early Warningp. 31
Information Securityp. 32
Other Security and Liability Threatsp. 33
The World's Largest Focus Groupp. 34
Activism and "Sucks" Sitesp. 36
Nobody Is Immunep. 39
Managing Riskp. 40
Buried Treasurep. 40
The Business Casep. 41
The Board Room Summaryp. 42
Chapter 3 Customer Diversionp. 44
Customer Capturep. 45
Cybersquattingp. 45
Typo-Piracyp. 47
Domain Name Administrationp. 50
Arbitrationp. 52
Search Engine Manipulationp. 52
Invisible Seedingp. 54
Visible Seedingp. 54
Spoofingp. 54
Managing Seeding and Spoofing Issuesp. 55
Paid Placementp. 56
Adwarep. 58
Mislabeled Linksp. 60
Unsolicited E-Mailp. 61
Keeping the Customerp. 62
Bringing the Customer Backp. 66
The Motivep. 67
Scope of the Problemp. 68
The Futurep. 69
The Business Casep. 70
The Board Room Summaryp. 71
Section 2 Online Partners and Distribution Issuesp. 73
Chapter 4 Managing Partner Compliancep. 75
The Customer Experiencep. 76
Changing Dynamicsp. 77
Online Partnersp. 77
Affiliatesp. 79
Suppliersp. 80
Distributorsp. 84
Third Partiesp. 90
Monitoring Partnersp. 93
Step 1 Prioritizationp. 93
Step 2 Brand Managementp. 94
Step 3 Enforcementp. 95
The Business Casep. 95
The Board Room Summaryp. 97
Chapter 5 Counterfeits and Gray Marketsp. 98
Gray Marketsp. 99
Combating Gray Market Activityp. 101
Counterfeitingp. 102
Copier Suppliesp. 103
Pharmaceuticalsp. 103
Online Monitoringp. 104
Criteria That May Signal a Suspect Distributorp. 105
Testing Authenticityp. 108
The Business Casep. 109
The Board Room Summaryp. 110
Chapter 6 Defending Against Digital Piracyp. 111
Musicp. 112
Sales Leadsp. 114
Videop. 116
Cease and Desistp. 118
Customer Conveniencep. 119
Copy Protection and Digital Rights Managementp. 120
Softwarep. 121
Text and Imagesp. 125
E-Booksp. 125
The Stephen King Experimentp. 126
News Servicesp. 127
Criteria for Identifying Licensing Revenue Opportunitiesp. 127
Market Datap. 129
The Business Casep. 131
The Board Room Summaryp. 132
Section 3 Trustp. 133
Chapter 7 The Costs of Compromised Privacy and Securityp. 135
Information Collection Technologiesp. 136
Cookiesp. 137
Web Beaconsp. 137
Information Securityp. 140
Customer Information Collectionp. 141
Customer Information Storagep. 142
Corporate Identity Theftp. 144
Managing Privacy and Securityp. 147
The Business Casep. 149
The Board Room Summaryp. 150
Section 4 Competitive Intelligencep. 151
Chapter 8 Using Online Competitive Intelligence to Outmaneuver Competitor Brandsp. 153
The Internet as a Competitive Intelligence Sourcep. 154
Brand Presencep. 155
Brand Reachp. 156
Competitor Brand Abusep. 158
Competitor Absencep. 158
Linking Relationshipsp. 159
Partnershipsp. 159
Recruiting Competitor Partnersp. 160
Online Commentaryp. 162
Collecting the Datap. 164
Counterintelligencep. 164
Actionable Informationp. 165
The Business Casep. 166
The Board Room Summaryp. 167
Section 5 Taking Actionp. 169
Chapter 9 How to Use Online Monitoring to Control Your Brand and Capture Revenuep. 171
The What-Where-How Approachp. 172
What to Search Forp. 172
Where to Searchp. 173
How to Searchp. 175
Stakeholdersp. 175
Customer Eyesp. 177
False Positivesp. 178
Detecting Objectionable Associationsp. 178
Allocation of Resourcesp. 181
When to Outsourcep. 182
How to Outsourcep. 184
Company Backgroundp. 184
Securityp. 185
Scope of Servicesp. 186
Partnershipsp. 187
Experience and Qualificationsp. 187
The Business Casep. 188
The Board Room Summaryp. 189
Chapter 10 Constructing Your Plan of Attackp. 190
Designing an Effective Approachp. 191
Step 1 Categorize Incidents by Offenderp. 191
Step 2 Categorize the Abusep. 192
Step 3 Prioritize the Incidentsp. 193
Step 4 Determine Whether the Incidents Warrant Actionp. 194
Step 5 Assign Responsibilities for Taking Actionp. 196
Step 6 Select the Communicationp. 196
Step 7 Secure Approvalp. 199
Step 8 Contact the Offenderp. 200
Step 9 Revisit the Incidentp. 201
Step 10 Take Follow-up Actionp. 201
Best Practices in Actionp. 202
Objectionable Contentp. 202
Cybersquattingp. 203
Unauthorized Brand/Logo Usep. 203
Partner Noncompliancep. 203
The Business Casep. 203
The Board Room Summaryp. 204
Chapter 11 Mobilizing the Forcesp. 206
State of Affairsp. 206
Raising Awarenessp. 207
Build a Business Casep. 207
Manage Riskp. 207
Adopt Experiential Learningp. 208
Develop a Planp. 208
Apathy Is the Enemyp. 208
Who's Responsible?p. 209
Stepping Upp. 210
The Business Casep. 211
The Board Room Summaryp. 212
Glossaryp. 213
Appendix A Top-Level Domainsp. 221
Appendix B Sample Affiliate Guidelinesp. 225
Appendix C Sample Guidelines for Managing Partner Compliancep. 231
Appendix D Overview of Peer-to-Peer (P2P) Networksp. 235
Appendix E Sample RFP Scope of Workp. 239
Appendix F Sample Cease-and-Desist Lettersp. 243
Notesp. 249
Indexp. 259
Go to:Top of Page