Affiliation:
1. Faculty of Engineering & Information Sciences, University of Wollongong in Dubai, Dubai, UAE
2. Al Dar University, UAE
Abstract
For the past century, companies have had the luxury of deciding what they will produce and sell, what their brand message will be and how they will deliver it to their audience. Planning how best to allocate marketing dollars is arguably the most annoying challenge marketers face. The social web and more specifically, Web 2.0 have changed the original marketing strategy and have done so by giving rise to a new way of marketing where people belong to different social groups and markets have become conversations or recommendations. Social networking sites such as Facebook have reported exponential growth rates and have attracted millions of registered users, and they are interesting from a marketing point of view because they store large amounts of sensitive personal user data. In this paper, the authors introduce a targeted Marketing strategy that exploits group membership information that is available on social networking sites. More precisely, the authors show that information about the group memberships of a user can lead to a more efficient target marketing campaign. To determine the group membership of a user, the authors leverage well-known web browser history recording attacks and other available crawling services. The authors’ proposed algorithm is designed to use the captured customers' details and generate target marketing campaigns by relating each customer with certain rank of products. The authors demonstrate an Experiment by sending a SPAM Email to more than one thousand Facebook users and relate them with certain product pages. To measure the efficiency of the proposed techniques, the authors analyzed how many people have consequently accessed those pages and clicked on the products links inside those pages to get a promising success factor of 82%.
Reference21 articles.
1. Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (2009). All your contacts are belong to us: Automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web (WWW) (pp. 551-560).
2. Bonneau, J., & Preibusch, S. (2009). The privacy jungle: On the market for privacy in social networks. In Proceedings of the Eighth Workshop on the Economics of Information Security (WEIS), (pp. 1-6).
3. Bortz, A., & Boneh, D. (2007). Exposing private information by timing web applications. In Proceedings of the 16th International Conference on World Wide Web (WWW) (pp. 252-259).
4. Brown, G., Howe, T., Ihbe, M., Prakash, A., & Borders, K. (2008). Social networks and context-aware spam. In Proceedings of the ACM 2008 Conference on Computer Supported Cooperative Work (CSCW) (pp. 403-412).
5. Diaz, C., Troncoso, C., & Serjantov, A. (2008). On the impact of social network profiling on anonymity. In Proceedings of the 8th International Symposium on Privacy Enhancing Technologies (PETS) (pp. 44-62).
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献