e-Marketing Strategy: 7 Dimensions to Consider (the e-Marketing Mix) - An honest marketer...
(Page 5 of 5 )
An honest marketer will have to consider these possible causes of further trouble and has to co-operate with the company's IT department in order to be able to formulate convincing (and true, honest!) messages towards the customers that their personal details are protected from unauthorized eyes.
7. Sales Promotion
At least but not last, we have to consider sales promotions when we build an e-Marketing strategy. Sales promotions are widely used in traditional Marketing as well, we all know this, and it is an excellent efficient strategy to achieve immediate sales goals in terms of volume.
This function counts on the marketer's ability to think creatively: a lot of work and inspiration is required in order to find new possibilities and new approaches for developing an efficient promotion plan.
On the other hand, the marketer needs to continuously keep up with the latest internet technologies and applications so that he can fully exploit them.
To conclude, we have seen that e-Marketing implies new dimensions to be considered aside of those inherited from the traditional Marketing. These dimensions revolve around the concept of relational functions and they are a must to be included in any e-Marketing strategy in order for it to be efficient and deliver results.
Otilia Otlacan is a young certified professional with expertise in e-Marketing and e-Business, currently working as independent consultant and e-publisher. She developed and teach her own online course in "Principles of e-Marketing" and is also a volunteer Economics teacher.
You can contact her via her personal website at BRAINmarketing.net or check out her latest developing Marketing resources project at TeaWithEdge.com
| DISCLAIMER: The content provided in this article is not warranted or guaranteed by Developer Shed, Inc. The content provided is intended for entertainment and/or educational purposes in order to introduce to the reader key ideas, concepts, and/or product reviews. As such it is incumbent upon the reader to employ real-world tactics for security and implementation of best practices. We are not liable for any negative consequences that may result from implementing any information covered in our articles or tutorials. If this is a hardware review, it is not recommended to open and/or modify your hardware. |