Professional Documents
Culture Documents
Certificate: eCRM, An Introduction
Certificate: eCRM, An Introduction
eCRM , An Introduction
in a satisfactory manner as partial fulfillment for requirement of the degree of
Date :
Place :
Acknowledgements and thanks are also extended to the all the authors
whose articles have been referred to for the completion of this report.
Mrigank Tiwari
(B.E. II)
PICT, Pune-43
2
INDEX
PAGE
CHAPTER 1 : CRM 4
1.1 WHAT IS CRM ? 4
1.2 PROBLEMS WITH TODAY’S CRM SOLUTIONS 5
CHAPTER 2 : eCRM 6
2.1 WHAT IS eCRM ? 6
2.2 HOW DOES eCRM HELP ? 6
2.3 TO CRM OR eCMR ? 7
4.1 wScripting 35
4.2 ClickMobile 36
4.3 wRecommend 37
4.4 Carbon Copy Solutions 38
CHAPTER 5 : FAQ 39
BIBLIOGRAPHY / REFERENCES 45
3
1
CRM
CRM is any interaction you have with your customer, as well as consistent and
easy to access customer information regardless of sales, marketing, and
communication channels. CRM encompasses everything from...
. Strategic CRM
.Technology and Implementation
. Mobile Business for the Enterprise
. Sales & Marketing
. Business Intelligence
4
. Customer Contact Center
Seemingly overnight, vendors from all corners have rushed to introduce CRM
"solutions," viewing CRM as the next business frontier. Yet many CRM offerings
will yield, at best, only tactical improvements—for example automating fulfillment
of Web leads. Other CRM offerings might patch together Sales Force Automation
and Customer Support, producing only a fraction of an eCRM solution. Still other
CRM packages might provide customer analytics needed to observe customer
behavior, but lack the means to turn findings into initiatives that positively impact
customer behavior. A common but pejorative thread exists among most CRM
packages—they fail to provide the discipline and process that would enable a
company to manage its business based on customer economics. In short, this has
resulted in separate and uncoordinated customer-interaction environments. As a
result, CRM initiatives adopted to date have not delivered the business benefits
promised.
5
2
eCRM
eCRM usually manifests itself in the form of CRM software systems which enable
industries to conduct customer relations via internet, intranet, or wireless
communication platforms. An eCRM enabled sales staff can conduct relations with
customers while on-the-go, which not only improves those relations, but also
ensures efficient use of time by that sales staff.
Applied Innovation Management is a pioneer in the eCRM field with its suite of
web-based helpdesk and issue management software products.
6
decisions about messaging, offers, and channel delivery. It synchronizes
communications across otherwise disjointed customer-facing systems. It adheres to
permission-based practices, respecting individuals' preferences for how and
whether they wish to communicate with you. And it focuses on understanding how
the economics of customer relationships impact the business. Advocates of eCRM
recognize that a comprehensive understanding of customer activities,
personalization, relevance, permission, timeliness, and metrics are all a means to
an end—optimizing value between you and your most important asset—your
customers.
While the definition above is simple, achieving eCRM itself is hard. For Global
2000 companies, evolving to eCRM requires process and organizational changes, a
suite of integrated applications, and a non-trivial technical architecture to support
both the eCRM process and the enterprise applications that automate the process.
Mid-size companies may benefit from less sophisticated, and easier to implement
(and afford) hosted solutions, offered through Application Service Providers. But
regardless of the size of your firm, you have no choice but to evolve to eCRM
quickly. Forrester Research expects eCRM applications to "obsolete" channel-
specific CRM applications by 2002. McKinsey & Company notes that "capturing
and effectively using customer profiles will determine winners and losers in . . .
eCommerce development."
Although industries were a bit skeptical about the future of eCRM they have
started realizing its power and more and more of them are embracing eCRM to
enhance their business with customers.
7
GAITHERSBURG, MD--Intellor Group, Inc. has announced the completion of a
research summary titled, "A Comparison of CRM Versus E-CRM Adoption,"
which analyzes how organizations are approaching their customer-centric
initiatives with respect to traditional business and e-business environments.
As an independent knowledge exchange company focused on promoting the
success of the e-Business Intelligence and Integration (eBII) marketplace through
the rapid and comprehensive exchange of information, Intellor Group is well-
suited for researching CRM initiatives. The results included in the summary
represent a current snapshot of where companies are with their level of adoption,
understanding, implementation, priority and staffing with respect to Customer
Relationship Management (CRM) and electronic Customer Relationship
Management (eCRM).
"It is likely that companies are realizing that the customer experience is critical to
their Web business, and they need to focus more attention on the 'e' customer
experience. With this reality setting in and e-competition growing, it will become
critical that organizations have strong eCRM strategies to attract and retain Web
customers," said Richard Rist, President and CEO, Intellor Group, Inc.
Key findings from "A Comparison of CRM Versus E-CRM Adoption" include:
2.3.1 Acceptance/Understanding/Implementation
8
• More than two thirds of respondents indicated they do not have a sufficient
enough understanding of CRM and eCRM to make key decisions.
• Eighty-eight percent of the respondents have deployed, accepted or
minimally considered CRM, while only 12 percent have not considered
CRM. Similarly, 82 percent of the respondents have deployed, accepted or
minimally considered eCRM, while only 18 percent have not considered
eCRM.
• Respondents indicated that nine percent of them have had their CRM
initiatives fail while only five percent have experienced failure of their
eCRM initiatives.
2.3.2 Priority
2.3.3 Staffing
9
2.3.4 CRM and Business Intelligence (BI)
10
3
TOP 10 eCRM TERMS
biometrics
CRM (Customer Relationship management)
CTI (Computer Telephony Integration)
Data mining
EAI (Enterprise Application Integration)
EBPP (Electronic Billing Presentation & Payment)
e-commerce
IVR (Interactive Voice Response)
Log file
Metadata
Information and explanation regarding each of the above terms is given in the
following sub-sections. Note that the above terms originated to realize the idea of
eCRM and are a part of eCRM activities.
11
3.1 Biometrics
The terms "Biometrics" and "Biometry" have been used since early in the 20th
century to refer to the field of development of statistical and mathematical methods
applicable to data analysis problems in the biological sciences. Statistical methods
for the analysis of data from agricultural field experiments to compare the yields of
different varieties of wheat, for the analysis of data from human clinical trials
evaluating the relative effectiveness of competing therapies for disease, or for the
analysis of data from environmental studies on the effects of air or water pollution
on the appearance of human disease in a region or country are all examples of
problems that would fall under the umbrella of "Biometrics" as the term has been
historically used. The journal "Biometrics" is a scholarly publication sponsored by
a non-profit professional society (the International Biometric Society) devoted to
12
the dissemination of accounts of the development of such methods and their
application in real scientific contexts.
Recently, the term "Biometrics" has also been used to refer to the emerging field of
technology devoted to identification of individuals using biological traits, such as
those based on retinal or iris scanning, fingerprints, or face recognition.
13
the context, a biometric system can be either a verification (authentication) system
or an identification system.
3.1.4 Applications:
Biometrics is a rapidly evolving technology, which is being widely used in
forensics such as criminal identification and prison security, and has the potential
to be used in a large range of civilian application areas. Biometrics can be used to
prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs,
workstations, and computer networks. It can be used during transactions conducted
via telephone and internet (electronic commerce and electronic banking). In
automobiles, biometrics can replace keys with key-less entry devices.
Cover Story
Biometrics comes to life
14
Fingerscan has the world's largest application of biometrics in the servicing of
automated teller machines. In conjunction with a contractor called Armaguard,
which services ATMs for Australian banks, 1,400 ATMs now are unlocked by the
representative's fingerprint. The representative brings a portable scanning device
that plugs into the back of the ATM and connects to the bank's server, which
grants him admittance. Unequivocally identifying who entered and how long he
stayed helps keep the representative honest.
15
attributes that can be measured--how one speaks, or how one writes, are two in
use.
Then there is facial recognition, in which an image of a person's face is stored
digitally when the person opens an account. At each transaction, a tiny camera
feeds a live image of the person to a database which compares the image to the one
stored and to the account number.
Another reason it chose voice over fingerprints and signatures was that voice
works remotely (by phone) whereas special readers would need to be installed in
consumer's homes for the others. (FingerScan said all vendors are moving in this
direction, adding that it is in talks with the Central Bank of Asia regarding a home
banking application for the bank's preferred customers.)
…
Interesting , isn’t it.
3.2 CRM
16
3.3 CTI (Computer Telephony Integration)
17
CTI supports better agent utilization, and takes advantage of call specific
information delivery to make the caller/agent transaction more productive and
effective. CTI also enables segmentation through the use of data mining tools and
techniques.
AT&T Solutions offers proven experience and knowledge of complex call
handling technologies with our world-class network support and services, and the
intellectual capital and thought leadership necessary for successful implementation
of this complex technology.
Table 3.1
18
3.3.1 CTI Benefits:
• Improved agent utilization and effectiveness through call-specific
information delivery
• Reduced operating costs resulting from network-enabled call routing as
opposed to premise-based hardware and software
• Enables customer segmentation through data mining tools and techniques
If you regularly make long-distance phone calls, chances are you've already used
IP telephony without even knowing it. IP telephony, known in the industry as
Voice-over IP (VoIP), is the transmission of telephone calls over a data network
like one of the many networks that make up the Internet. While you probably have
heard of VoIP, what you may not know is that many traditional telephone
companies are already using it in the connections between their regional offices.
Circuit switching is a very basic concept that has been used by telephone networks
for over 100 years. What happens is that when a call is made between two parties,
the connection is maintained for the entire duration of the call. Because you are
connecting two points in both directions, the connection is called a circuit. This is
the foundation of the Public Switched Telephone Network (PSTN).
19
3. The call is routed through the switch at your local carrier to the party you
are calling.
4. A connection is made between your telephone and the other party's line,
opening the circuit.
5. You talk for a period of time and then hang up the receiver.
6. When you hang up, the circuit is closed, freeing your line.
Let's say that you talk for 10 minutes. During this time, the circuit is continuously
open between the two phones. Telephone conversations over the traditional PSTN
are transmitted at a fixed rate of about 64 kilobits per second (Kbps), or 1,024 bits
per second (bps), in each direction, for a total transmission rate of 128 Kbps. Since
there are 8 kilobits (Kb) in a kilobyte (KB), this translates to a transmission of 16
KB each second the circuit is open, and 960 KB every minute it's open. So in a 10-
minute conversation, the total transmission is 9600 KB, which is roughly equal to
9.4 megabytes (MB).
20
3.4 Data mining
Short for electronic bill presentment and payment, the Related Categories
Communications
process by which companies bill customers and receive
Electronic Commerce
payments electronically over the Internet.
World Wide Web
There are two types of presentment models:
Related Terms
• direct model: a biller delivers the bill to customers CRM
via its own Web site, or via a third-party's site. EAI
• consolidator model: bills from multiple billers are IVR
delivered to a single Web site, to be presented in aggregate to the consumer
for viewing and payment.
3.6.1 Introduction
Electronic Billing Presentation and Payment (EBPP) is the use of electronic
means, such as email or a short message, for rending a bill.
On the Internet, electronic bill presentment and payment (EBPP) is a process that
enables bills to be created, delivered, and paid over the Internet. The service has
applications for many industries, from financial service providers to
telecommunications companies and utilities.
22
Although buying products over the Internet with a credit card has become a
common occurrence, viewing the credit card bill itself - and making payments to
settle the bill electronically - has not. This is expected to dramatically change as
new EBPP products are introduced that include features such as secure e-mail
delivery, and also as EBPP technology becomes more common in business-to-
business e-commerce.
One of the obstacles to widespread adoption of EBPP lies in the complexity of
billing systems and processes used by competing banks and financial institutions.
Some have resisted implementing EBPP for fear of being unable to cross-promote
other services to customers, although experts claim EBPP appears ideal for this
type of marketing. The banking industry also has been resistant for fear of losing
out on lucrative cash-management services, reminiscent of the battle the industry
fought and lost over credit card transactions. Disputes over adopting uniform
security and implementation standards also have stalled the adoption of EBPP.
The common protocol known as the Open Financial Exchange would allow firms
to integrate their systems. But the protocol has not been widely embraced,
especially by banks, which are concerned about possibly losing control of their
vital customer information. A second competing standard also is emerging.
Spectrum, a joint venture of The Chase Manhattan Corp., First Union Corp. and
Wells Fargo & Co., is adopting the Interactive Financial Exchange (IFX) protocol.
The IFX Forum, an organization that comprises financial institutions, billers,
insurance companies and vendors, is developing IFX.
Despite these difficulties, experts predict the industry will experience a growth
spurt, driven by customers who want the convenience and time savings associated
with being able to access, view and remit their bills directly online.
3.6.2 Advantages
The advantage of EBPP over traditional means is primarily the savings to the
operator in terms of the cost to produce, distribute, and collect bills.
23
3.6.3 Use in Mobile Communications
EBPP may be used in lieu of a standard paper bill as a means to reduce operational
costs. Some operators may view EBPP as an alternative to prepay as some
operators view prepay service strictly as an alternative to traditional billing, but it
usually has most value as an alternative mechanism for billing post-paid
customers. However, EBPP can also be used simply as an informational tool to
inform the customer of charges levied against the account.
3.7 e-commerce
24
"E-commerce services are the silver bullet that will
enable companies to take advantage of the true business
opportunities on the Web."
Traci Gere, Analyst, The New York Times
Fig 3.1
There are many different payment systems available to accommodate the varied
processing needs of merchants, from those who have a few orders a day to those
who process thousands of transactions daily. With the addition of Secure Socket
Layer technology, eCommerce is also a very safe way to complete transactions.
25
There are several basic steps involved in becoming Commerce Enabled.
26
is usually part of a larger application that includes database access. Common IVR
applications include:
In this article, our focus is on how to improve IVR systems through speech
recognition, as well as how to make both touchtone and speech recognition easier
for callers to use. Given that call centers assist lots of callers, whether or not they
recognize them as customers, we're further restricting this article to speaker-
independent speech recognition, which emphasizes what callers say rather than
who does the speaking.
27
individual customers, even those with joint accounts who typically provide the
same information to your voice response system.)
Just as touchtone doesn't replace live service, speech recognition doesn't have to
replace touchtone. Agents can refer callers to touchtone menus for routine requests
or to prevent callers from remaining in queue. You can provide speech recognition
for certain automated tasks, like reserving flights, where callers tend to prefer
saying their itineraries to figuring out menus.
When you enable live and automated service to work together peacefully, you get
the most out of your entire center.
You've seen call routing evolve from a hard-wired component of a phone switch to
a standalone piece of software that runs on different switches.
The World Wide Web Consortium, together with the VoiceXML Forum
(www.voicexml.org), defines specifications for VoiceXML. Both groups plan to
introduce certification by next year to ensure VoiceXML software products from
different companies can work with each other.
28
Two of SpeechWorks' new products, OpenSpeech Recognizer and OpenSpeech
DialogModules, illustrate how VoiceXML is enabling the independence of
recognition from other aspects of speech rec.
A file that lists actions that have occurred. For example, Related Categories
Web Development
Web servers maintain log files listing every request made
Related Terms
to the server. With log file analysis tools, it's possible to audit trail
get a good idea of where visitors are coming from, how blog
often they return, and how they navigate through a site. cookie
Using cookies enables Webmasters to log even more log
detailed information about how individual users are accessing a site.
Web technology is proliferating at a very rapid rate. Hundreds of new web sites
come online each week. Universities, businesses, nonprofit organizations and even
individuals are making enormous investments in the design, development and
marketing of web sites. In such an environment, it will not take long for people to
begin to question whether the investment is paying off. Simple experimental
evaluations of web sites are only now beginning to be constructed. In an
experimental paradigm, the web site will typically be looked at as a molar
intervention and aggregate organizational data will be examined to see the web site
29
effects. This simple approach will help to answer the overall question of whether
the introduction of web site technology makes a difference, but it will not tell us
how the web site produces any effects that are observed. To examine this type of
question it will be necessary to study web site use at a more molecular level (e.g.,
by user).
Every web site automatically keeps log file statistics on each specific hit to a web
page for that site. Web administrators routinely run programs in background that
analyze web access statistics. There are a wide and growing variety of such
programs available. The major problem with such tools is that they are limited to
analyzing only web use -- they do not and can not link web use data to other
meaningful outcomes or measures.
Web site analysis provides useful information in many contexts. Commercial sites
can monitor their advertising on web site. The program evaluator can use the
frequency and traffic on the web site as a measure of program delivery. In the
educational context, web site usage can translate into increased time spent on
coursework. The content of the web is educationally valuable, so educators may
theorize that web site utilization translates into greater academic performance. In
business contexts, we will want to know how web use relates to performance on
the job and, ultimately, to the effect of web use on the bottom-line (i.e., the Return
On Investment issue).
The log files are consulted for such valuable information and the data (log) in the
files is used to arrive at a decision. Log files are very popular in data mining and
decision support systems.
3.10 Metadata
30
Data about data. Metadata describes how and when and byRelated Categories
Data
whom a particular set of data was collected, and how the
Related Terms
data is formatted. Metadata is essential for understanding DAM
information stored in data warehouses. data warehouse
meta
Metadata can be defined literally as "data about data," but the term is normally
understood to mean structured data about digital (and non-digital) resources that
can be used to help support a wide range of operations. These might include, for
example, resource description and discovery, the management of information
resources (including rights management) and their long-term preservation. In the
context of digital resources, there exists a wide variety of metadata formats.
Viewed on a continuum of increasing complexity, these range from the basic
records used by robot-based Internet search services, through relatively simple
formats like the Dublin Core Metadata Element Set (DCMES) and the more
detailed Text Encoding Initiative (TEI) header and MARC formats, to highly
specific formats like the FGDC Content Standard for Digital Geospatial Metadata,
the Encoded Archival Description (EAD) and the Data Documentation Initiative
(DDI) Codebook
3.10.1 Searching
31
Searching is the bane of the Web's existence, despite the plethora of search tools --
Yahoo currently lists 193 registered web search engines. Search engines typically
suffer from a lack of semantics on both the gathering and querying ends. On the
gathering side, search engines typically utilize one of two methods:
How do people find out the names of songs on the CDs they're playing on their
networked PCs? One immediate problem is that there is nothing resembling a URI
32
scheme for naming CDs; this makes it difficult to agree on a protocol for querying
metadata servers about the properties of those CDs. While one might imagine
taking one of the various CDDB-like algorithms and proposing a URI scheme for
universal adoption (for instance, cd:894120720878192091), in practice this would
be time-consuming and somewhat politicized. Meanwhile, peer-to-peer developers
just want to build killer applications; they don't want to spend 18 months on a
standards committee specifying the identifiers for compact discs (or people or
films...). Most of us can't afford the time to create metadata tags, and if we could,
we'd doubtless think of more interesting ways of using that time.
What to do? Having just stressed the importance of unique names when describing
content, can we get by without them? Actually, it appears so.
Every day thousands of MP3 users work around the unique identification problem
without realizing it. Their CD rippers inspect the CD, compute one of several
identifying properties for the CD they're digitizing, and use this uniquely
identifying property to consult a networked metadata service. This is metadata in
action on a massive scale. But it also smacks of the PICS problem. MP3 listeners
have settled on an application-specific piece of infrastructure rather than a more
useful, generalized approach.
These metadata services exist and operate very successfully today, despite the lack
of any canonical "standard" identifier syntax for compact discs. The technique they
use to work around the standards bottleneck is simple, being much the same as
saying things like "the person whose personal mailbox is..." or "the company
whose corporate homepage is...". Being simple, it can (and should) be applied in
other contexts where peer-to-peer and web applications want to query networked
services for metadata. There's no reason to use a different protocol when asking for
a CD track list and when asking for metadata describing any other kind of thing.
33
3.10.3 Conclusion
Metadata applied at a fundamental level, early in the game, will provide rich
semantics upon which innovators can build peer-to-peer applications that will
amaze us with their flexibility. While the symmetry of peer-to-peer brings about a
host of new and interesting ways of interacting, there's no substitute for taking the
opportunity to rethink our assumptions and learned from the mistakes made on the
Web. Let's not continue the screen-scraping modus operandi; rather, let's replace
extrapolation with forethought and rich assertions.
To summarize :
• Design ways of searching for (and finding) resources on the Net that take
full advantage of any exposed metadata.
4
34
SOME eCRM SOFTWARES
4.1 wScripting
Scripting Tool For Call Center Agents
wScripting is an intelligent question and answer guide for call center agents that
can be delivered through the Internet via ASPs (Application Service Providers).
This tool allows the agent to capture customer data from the conversation and can
also be used for product sales or customer service/troubleshooting. The advantage
of wScripting over other call agent scripting modules is the dynamic and
intelligent format of the conversation guide. wScripting can also be modified to
replicate your sales best practices throughout the call center by embedding this
knowledge into the software.
How wScripting works:
1. Agent contacts the potential customer, or vice versa. The agent then pops up the
wScripting module on his/her desktop.
2. If the caller is a current customer, their record can be brought up onscreen. If the
caller is not a customer, then a new record is created.
3. The agent poses the questions presented on screen to the caller, and uses the
multiple choice answer mechanism to input the caller's response.
4. The agent can input gathered customer information by using the data entry fields
at the bottom of the screen.
5. During the conversation, the agent is provided with in context information to
pass onto the caller (such as product ratings), tailored to the informational needs
and sophistication level of the caller.
6. At the conclusion of the question and answer interaction, the agent will provide
the caller with an intelligent recommendation complete with a logical, plain
English justification for the recommendation.
7. The agent can then execute the transaction (e.g. purchase) and record the result
of the call in the data entry fields at the bottom of the screen.
35
8. You end up with a searchable record of the conversation, and a database of
customer information collected during the call.
4.2 ClickMobile
Optimized, Integrated Scheduling Solution For Mobile Field Service
Personnel
ClickMobile enables service representatives in the field to send and receive
updated schedule information throughout the day. Through integration with
ClickSoftware's ClickSchedule, the leading scheduling optimization tool,
ClickMobile enables automatic, real-time re-scheduling to ensure maximum
efficiency and productivity. With ClickMobile, managers have the latest
information about service call status and the activities and whereabouts of field
service personnel. This allows them to respond more effectively to unforeseen
events, alter schedules, and redirect field staff throughout the day.
While mobile scheduling has been available previously, ClickMobile is the first
such tool to integrate with a proven scheduling optimization tool like
ClickSchedule. Field staff can be optimally redirected on the fly to increase
efficiency and ensure that service level commitments are met. Unlike other, older
solutions, ClickMobile takes advantage of low-cost PDAs and two-way pagers that
provide instant communication between the central office and field service staff.
Initially ClickMobile will support PocketPC, Windows CE, and 2-way pagers.
ClickMobile supports most major wireless networks, both circuit- and packet-
switched, in the U.S. and in Europe.
ClickMobile reduces paperwork and phone calls, improves accuracy of
communication, while providing faster dispatching and status updates, real-time
monitoring of field activity, same-day optimization, automatic rescheduling, and
more.
36
4.3 wRecommend
Product Recommendation Tool For Online Customers
How wRecommend works:
1. Potential customers visit the client Web site.
2. Lack of experience and indecision draws users to the "Help Me Decide..."
button (or other entry point).
3. Potential customers are taken through an interactive, online conversation that
discusses their intended needs, uses, and preferences.
4. Along the way, they are presented with "as-needed" information (reviews,
explanations, tutorials, benchmark tests, new features that they might be interested
in, etc.) customized to their specific information needs and level of knowledge.
5. They are presented with products or services (cross-sells) that fit with their
needs, uses, and preferences.
6. The system then presents a range of three customized and fully configured
products that meet the expressed and inferred needs and preferences of each buyer.
Each recommendation is dynamically configured for the customer, and includes a
plain language justification of why the recommendation was made.
37
Carbon Copy Solution can be the single remote control product for all Windows
platforms, supporting systems even as the platforms change. The Web-based
solution also deploys and remotely controls clients, servers and server farms
without rebooting the machine, increasing efficiency and eliminating user
interruption.
It is such interesting applications that are making eCRM a very hot field in
computers today.
5
FAQ
38
Now that we know a bit about CRM/eCRM , here are a few Frequently Asked
Questions about them.
39
5.3 What's in it for students?
Students should be aware of CRM and what it can do for an organization. Due to
the growth that is being seen in today's market of CRM and CRM related software
applications, the knowledge of these systems will help students prepare for the
demands of future positions. CRM applications are integrated throughout an
organization, which means all persons will need to understand and utilize them in
order for overall increased efficiency of the company. There is a greater demand
for customer satisfaction, which is one of the last areas in which a company can
excel. Keeping this in mind, the implementation of a CRM system would enhance
a company's ability to meet these demands and compete on a large, global scale.
40
response times, higher customer satisfaction, and fewer mistakes made interpreting
customer demands.
41
SOME SIMILAR SOUNDING TERMS
Online crm software takes a company's customer relations to the next level. By
making customer data available to sales staff in different locations, customers
receive the individual attention they need, and with unlimited growth potential, an
online crm system fits the long term goals of all business operations.
42
· Decide on concrete business goals
· Determine applicable metrics
· Obtain senior executive support
· Determine customer-field staff touchpoints
· Find a solution based on business goals
If the solution is wireless e-CRM, select devices that fit the solution.
Marketing applications that marry customer and business goals require a different
approach than that of the traditional marketing or sales force automation because
the primary function of the technology isn’t improving the productivity of
employees who interact with customers. Instead, this new breed of “intelligent,”
Web-based marketing applications, called eCRM, focuses on the processes and
information needs of customers themselves as they demand more direct access and
control over their own interactions with a company.
43
by marketing goals. Taking advantage of the “self-service” nature of the Internet
is also the best way to complete the view of the customer because marketers can
take the opportunity to solicit customers and prospects to define their interests,
needs and intentions through opt-in e-mail, multi-channel marketing campaigns,
personalized portals and online surveys.
REFERENCES
Sites Topics
44
www.ecrm.com (ECRM)
www.bitpipe.com (CRM)
http://www.eaiquadrant.com/crm/frawley_1a.html (eCRM)
http://www.online-commerce.com (eCommerce)
www.howstuffworks.com (ecommerce,CTI)
http://searchnetworking.techtarget.com/ (CTI,EBPP,EAI)
45