How To Avoid The Trap Of Using Intrusive Marketing

intrusive marketing

Are you using passive — or intrusive — marketing for your website?

ORLANDO — There are different ways to conduct marketing. One of the most controversial ways, and considered by some to be among the least effective options, is intrusive marketing.
Intrusive Marketing has been around as long as businesses have tried to sell products, and have been used in a variety of different ways. The one connection is that consumers appear to get fed up with their methods, and often rebel. Think of consumers who get tired of telemarketing phone calls when they’re sitting down to dinner, or those who turn on their computers or laptops and discover their mail boxes clogged with junk mail spam. Think of travelers getting annoyed with take-out menus hanging on the door knob of their hotel room, or people complaining about large, unsightly billboards.
The concept of intrusive marketing can apply to digital and social media marketing as well. If you want people to know about your products, how do you avoid becoming the latest negative statistic in the field of intrusive marketing?
Good question.

Social Media marketing

A growing number of studies indicate that people are getting increasingly annoyed with marketing messages popping up on their social media feeds, particularly from companies and accounts they don’t follow. Since Facebook and Twitter both allow companies and individuals to use paid messages, that can translate into hundreds of ads bombarding someone’s Twitter feed. Over the course of time, one man’s message can become another man’s unwanted spam. Continue reading

Exploring the surreal world of Layden Robinson’s “The Havoc Tree”

havoc tree

Layden Robinson’s eBook “The Havoc Tree” takes readers into a surreal and fantastical universe.

As you progress through the short stories that make up author Layden Robinson’s eBook “The Havoc Tree,” you might be initially tempted to tap your finger against the page and say, “Ah-ha!”
At that point, you’ve made an assumption that all of a sudden, the epiphany has arrived, and You get it! Finally, you understand what’s going on here — that is, until the next story throws you decisively off that path.
For example, you might start by reasoning that these stories take you into a mythical alternate universe, a kind of C.S. Lewis fantasy world where anything can happen to the protagonists.
Then again, you might quickly change your mind and conclude that the author spends his evenings jotting down a series of mad ramblings and harrowing stream of consciousness episodes, some eerie, some distinctly twisted, and others downright funny — a theory reinforced by the author himself, who describes his work as “Words, thoughts and manic rantings under the influence of strong drink and fine smoky treats.”
Perhaps, but these nontraditional stories boast far too much in the way of clever imagination to have been born in a drunken stupor.
And frankly, whichever interpretation you settle on, the next story is almost certain to dash it. Continue reading

Internet Safety in the age of Cyber Terrorism

How do you protect yourself today when so much of your life exists on your laptop?

ORLANDO — One of the top news stories today? Was Russia responsible for hacking leading Democrats’ emails during the 2016 presidential election.
U.S. intelligence has concluded that the hacks were part of an effort to discredit the Democratic nominee, Hillary Clinton, using fake news on social media and releasing hacked emails through WikiLeaks.
Another big news story: Congress voted to nullify the Federal Communications Commission’s broadband privacy rules, which critics say will allow Internet service providers to sell your individual browsing history to third parties.
Both of these headlines illustrate the quirky, potentially dangerous world we all live in now, where cyperspace, social media and even news headlines can become weapons — and how our laptops, smartphones, and tablets have gone from vital tools to potentially ticking time bombs.
So in this age when so much of our lives — our personal information, our banking records, etc., is tied to our laptops, how do we protect ourselves? Continue reading

Related Posts Plugin for WordPress, Blogger...