Professional Documents
Culture Documents
2002 Email-Marketing Chraq PDF
2002 Email-Marketing Chraq PDF
Permission E-mail
Marketing
as a Means of Targeted Promotion
Hospitality operators should be able to use e-mail marketing (by permission) to build relationships
with their existing customers. The question is how to make it work.
E
-mail offers the hospitality industry a flexible and in- while a healthy four of five primary shoppers in the United
expensive tool for testing and distributing sales and States flip through mail-order catalogues sent to them, only
promotional messages to existing customers and pros- half actually buy an item out of those catalogues.3 That statis-
pects. Despite the explosion of internet-based communica- tic raises the question of whether direct mail is losing its punch
tion, however, conventional direct-mail has increased four- as a way of reaching customers.
fold in the past decade.1 One consequence of the increasing Marketers have responded to customers’ lack of interest by
volume of paper that people receive is that just 75 percent of trying to strengthen their mailing lists.4 It is common today
direct mail is opened nowadays, compared to an estimated to create targeted lists by analyzing customer-information
90 percent just a few years ago.2 That does not say anything databases and developing profiles of people who are most likely
about response to direct-mail messages, since opening does to be repeat buyers. The heart of relationship manage-
not automatically lead to buying. Researchers have found that ment lies in understanding one’s consumers: their preferences,
purchasing histories, and future purchasing intentions. Study-
1
D. Bird, “Direct Marketing Is as Relevant Now as It Was in 1900,” ing those factors helps marketers better profile their target
Marketing, October 12, 2000, p. 28.
2
Ibid. 3
D. Bell and D. Gordon, “Note on the Mail-order Industry,” Harvard
Business School Publishing, March 1995, pp. 1–16.
© 2002, CORNELL UNIVERSITY 4
See: F. Newell, loyalty.com (New York: McGraw-Hill, 2000).
audiences for the potential delivery of personal- Permission Marketing via E-mail
ized products and services.5 The idea of so-called permission marketing is to
Data that a company collects from or about a cultivate a relationship with customers who have
consumer are considered to be its property. Those given a marketer the go-ahead to send them in-
data are legally available for marketing campaigns formation about a product, service, special offer,
until that customer “opts out,” or explicitly asks or sale.10 Such an approach “decreases the mail-
to be removed from the mailing list.6 Despite the ing volume but raises the percentage of success,”11
opt-out possibilities, consumers are growing ever and becomes potentially more effective through
more concerned about how businesses are using the use of information technology. Compared to
information about them.7 previous approaches, e-mail allows for easier cus-
Seth Godin has noted that in many cases con- tomer-data collection and more solid analysis of
sumers see direct-marketing regular mail—com- that data.
monly called junk mail—as the paper equivalent Permission marketing has three characteristics
of spam (the now-ubiquitous unsolicited e-mail).8 that set it apart from traditional direct (mail)
Both junk mail and spam arrive unanticipated marketing.12 Customers who permit their names
and unbidden, and they both clutter up people’s to be included on direct-mail lists can anticipate
mail (or e-mail) boxes. Such a comparison makes receiving commercial messages; the sending com-
e-mail an unattractive vehicle for reputable com- pany can personalize those messages; and the mes-
panies with established brand names. sages will be more relevant to the customers’
This is where “permission marketing” enters needs. Godin has likened permission marketing
into the direct-marketing equation. Obtaining a to “dating” a customer.13 Permission marketing
customer’s permission to be contacted as part of involves a long-term process that requires an in-
an advertising campaign works to the company’s vestment of time, information, and resources by
benefit.9 To begin with, obtaining permission both parties. The result is an active, participa-
promotes a corporate image of responsibility and tory, and interactive relationship between both
respect for the consumer. That, in turn, helps sides of the sales equation.
forge and maintain strong commercial relation- A company that embarks on a permission-
ships with current and prospective clients. Such marketing campaign will likely see its objectives
a personal relationship helps the marketer’s mes- evolve from mere communication to include
sage cut through the advertising clutter by creat- measuring the different levels of permission its
ing a distribution list of customers who want to customers grant it. A key part of cultivating a
receive that firm’s communications. relationship with one’s customers is to obtain
from them increasingly greater levels of permis-
5
See: Ibid.; and R. Stone and J.B. Mason, “Relationship sion for receiving commercial messages of either
Management: Strategic Marketing’s Next Source of Com- kind. In turn, customers who grant increasing
petitive Advantage,” Journal of Marketing Theory and Prac-
tice, Vol. 5, No. 2 (Spring1997), pp. 8–19.
levels of permission are signaling increasing trust
6
in the company—and that potentially translates
See, for example: Kin-nam Lau, Kam-hon Lee, Pong-yuen
Lam, and Ying Ho, “Web-site Marketing for the Travel-
into profit.
and-Tourism Industry,” Cornell Hotel and Restaurant Ad- Five levels of permission can be won from
ministration Quarterly, Vol. 42, No. 6 (December 2001), customers targeted by a permission-marketing
pp. 55–62.
7
J. Phelps, G. D’souza and G. Nowak, “Antecedents and 10
See: Godin, op. cit.; and S. Krishnamurthy, “A Compre-
Consequences of Consumer Privacy Concerns: An Empiri- hensive Analysis of Permission Marketing,” Journal of
cal Investigation,” Journal of Interactive Marketing, Vol. 15, Computer Mediated Communication, Vol. 6, No. 2 (2001)
No. 4 (2001), pp. 2–18. at www.ascusc.org/jcmc/vol6/issue2/krishnamurthy.html,
8
S. Godin, Permission Marketing: Turning Strangers into as viewed on February 10, 2002.
Friends, and Friends into Customers (New York: Simon & 11
R. Perlstein, “Getting Permission,” Zip Target Marketing,
Schuster, 1999). Vol. 9, No. 7 (July 1986), p. 36.
9
See: Ibid.; and S. Krishnamurthy, “Spam Revisited,” Quar- 12
Godin, op. cit.
terly Journal of Electronic Commerce, Vol. 1, No. 4 (2000),
pp. 305–321. 13
Ibid.
campaign, according to Godin.14 In descending the hospitality industry, such intermediaries in-
order of involvement, he terms those levels as clude Travelocity, Click International, and
follows: intravenous, points, personal relation- Expedia. These companies typically induce web-
ship, brand trust, and situation. site visitors to register for e-mail newsletters or
“Intravenous” is the highest kind of permis- special-promotion updates. Customers provide
sion to be won from customers. It involves cus- data about themselves as part of the registration
tomers trusting the marketer to make buying process, and the intermediaries use that data to
decisions for them. target newsletter advertisements to specific cus-
“Points” permission involves customers allow- tomers (based on demographic assumptions).
ing the company to collect personal data and to
market its products and services to them on a One Hotel’s Experiment with
points-based loyalty scheme—the level of most Permission E-mail
frequent-customer programs. We conducted a study of an Australian hotel’s
The “personal relationship” level of permis- initial efforts to use e-mail at the “brand trust”
sion uses individual relationships between the level of permission marketing, in hopes of devel-
customer and marketer to temporarily refocus the oping a technique of customer-relationship man-
attention or modify a consumer’s behavior. For agement. The hotel’s broad goal was to experi-
example, an airline may target those frequent- ment with forging an interactive relationship with
flyer customers with hundreds of thousands of its customers through a permission-marketing
accumulated miles. This personalized approach e-mail campaign. Its specific goals were to en-
is the best way to sell customized, expensive, or courage repeat visits by previous guests, retain
highly involving products. them as part of the hotel’s customer base, and to
With “brand trust” permission, the customer increase the number of hotel services that guests
has developed a level of confidence in a product used during their stays.
or service that carries a particular, well-known
brand name. Brand-trust customers are likely to
give their permission to receive sales or promo- Obtaining a customer’s permission
tional messages about other items produced un- to be contacted as part of an
der the same trusted brand.
“Situation” permission is a one-time or limited- advertising campaign works to
time permission, which is the least potent of the company’s benefit.
the five levels of permission. This permission is given
when the customer agrees to receive sales or pro-
motional messages from a company for a specified Located in Perth, the capital of Western
time. This would occur, for instance, if a per- Australia, the hotel is part of a major interna-
son agrees to let a cold-calling sales person send tional chain. It targets the business-travel mar-
a packet of information about a travel package. ket, in which it maintains a “preferred hotel”
So far we have been discussing permission status with several client companies. Domes-
marketing in terms of a direct relationship, in tic and international leisure travelers also pa-
which the customer and company communicate tronize this hotel, and it markets itself as a site
directly, and the company typically offers the for hosting special functions and events. The
customer an additional service as an inducement hotel’s food service features restaurants, a caf-
to maintain the relationship. However, it is also eteria, and a bar, all of which are patronized
possible to conduct a permission-marketing pro- by its guests and local residents.
gram through intermediaries. In an intermedi- The hotel routinely collects detailed guest in-
ary relationship, the customer interacts with a formation at registration and throughout the
third party to the commercial transaction.15 For guests’ stay. These data include guests’ names,
addresses, the number of times they have stayed
14
Ibid. at the hotel, and their average spending during
15
Krishnamurthy, op. cit. their stays.
20
E. Babbie, The Practice of Social Research, eighth edition
19
(Belmont, CA: Wadsworth Publishing, 1998).
C.R. Weylman, “Direct Mail that Gets Opened and
21
Read,” American Salesman, Vol. 44, No. 10 (October 1999), L. Wathieu, “Yesmail.com,” Journal of Interactive
pp. 13–17. Marketing, Vol. 14, No. 3 (Summer 2000), pp. 79–92.
Chi-square tests showed no statistically sig- grant permission in advance before being in-
nificant pattern to opt-out requests connected cluded in a direct e-mailing. Customers may feel
to subject-line relevance. Those tests also showed a greater affinity for a company that allows them
that personalization and subject relevance of the to engage in such proactive behavior. The alter-
hotel’s promotional e-mails had no statistically native of reactive behavior—of withdrawing per-
noteworthy effect on whether recipients re- mission after the fact—likely brings a sense of
sponded by visiting the corresponding web-site annoyance at best to receivers of an unanticipated
visits. e-mailing.
Future research should consider comparing
Confounding the effectiveness of opt-in versus opt-out permis-
The literature argues for the benefit of sending sion e-mail marketing. Future studies could also
promotional mailings that are personalized to explore the subtleties of whether different forms
their recipients, but this Australian hotel’s experi- of address have any effect. Rather than opening
ment with permission e-mail marketing points a promotional message with “Dear Mr. John
to the opposite conclusion. We found that per- Doe,” for instance, a study could test the even
sonalization seemed to encourage customers to more formal (but perhaps more distant) “Dear
shield themselves from future commercial per- Mr. Doe” or a decidedly more familiar “Dear
suasion. We need to study this point more, but John” (or “Dear Jane”).
it may be that personalization is an ineffective This study also suggests that subject-line rel-
device for generating the desired customer re- evance may be largely irrelevant in a permission
sponses to promotional e-mail messages. The e-mail marketing campaign.The Australian ho-
hotel received responses to the personalized ver- tel saw no substantial differences in the perfor-
sions of its e-mail all right, but it was in the form mance of promotional e-mails in the high- and
of opt-out requests, and not in the form of web- low-relevance subject-line categories. But this
site visits. finding seems counterintuitive, considering that
One possible explanation for this effect is that cyber viruses distributed through e-mail com-
people might object to having their names used monly carry ambiguous subject lines. It seems
by marketers when the relationship is tenuous. reasonable, therefore, to expect internet users to
That is, adopting a sales approach of familiar- be suspicious of e-mails with low-relevance or
ity—approaching potential customers by name— ambiguous subject lines—and to not open them
may be counterproductive to the marketer’s pur- readily. Then again, maybe the promotions in this
poses when the customer has had little or no mailing just weren’t of interest to the recipients,
face-to-face interaction with the business—say, regardless of what the subject line said. It may
just one brief stay in a hotel. also be that early autumn in Australia (April) is
We think that laying a foundation for famil- not the time to send out messages of this kind.
iarity ahead of a mailing might instill a more fa- Easy to measure. The simplicity of running
vorable perception in customers, one more con- the e-mail experiments described here and mea-
ducive to a commercial objective. For example, suring web-page visits, bounced e-mails, and
the front-desk clerk or the hotel’s registration e-mail messages opens up a rich avenue of future
form could explicitly ask guests whether they research possibilities. The costs are minimal, and
would like to receive future e-mails. Addition- the overall results can be positive. Ultimately, this
ally, the hotel could target its most loyal custom- hotel’s permission e-mail marketing campaign
ers with a preliminary direct-mail campaign, could be deemed successful in that it generated a
alerting them to future e-mails. greater response percentage than regular direct-
This finding highlights the need for research mail usually draws (9 percent versus 2 percent,
that compares responses to proactive campaigns at best). It’s also promising that all but ten of the
involving opt-in permission to those with a reac- 492 e-mail recipients chose to remain on the
tive opt-out approach. We wonder whether cus- hotel’s e-mail database—meaning that they are
tomers would be more receptive to personalized available for future promotional efforts.
sales approaches if they were given the chance to One practical benefit is that the hotel’s experi-
22
P. Barwise and C. Strong, “Permission-based Mobile
Advertising,” Journal of Interactive Marketing, Vol. 16, No.
1 (Winter 2002), pp. 14–25.
Ana Marinova (above, left), the public-relations and marketing director for a major
Perth hotel (amarinova2000@yahoo.com.au), recently finished her master’s degree at
the University of Western Australia, where Jamie Murphy, Ph.D. (middle photo), is an
associate professor (jmurphy@ecel.uwa.edu.au). Brian L. Massey, Ph.D. (above, right),
is an assistant professor at the University of Utah (brian.massey@ utah.edu).