behavior

Results 351 - 375 of 613Sort Results By: Published Date | Title | Company Name
By: Cornerstone OnDemand     Published Date: May 15, 2015
Leveraging econometric analysis of a dataset of approximately 63,000 hired employees spanning approximately 250,000 observations, this report looks not only at the measurable costs of toxic behavior such as sexual harassment, theft and fraud, but also other, equally damaging and harder-to-measure costs. The report examines these indirect costs closely, looking particularly at the toll toxic employees take on co-workers, and concludes that these costs create an even larger financial burden on businesses than the direct impact of an employee’s misbehavior
Tags : hidden costs, sexual harassment, toxic employees, employee behavior
     Cornerstone OnDemand
By: Mimecast     Published Date: Oct 22, 2018
What if your employees were more informed about security threats, more skeptical about what they receive in email, and less likely to click on malicious links in email without first verifying them? There are some impactful, quick wins that you and your organization can realize by implementing security awareness training. This recent in-depth survey of security professionals by Osterman Research shows that the leading security concerns across organizations are all areas in which security awareness training can yield significant benefits. Here are some suggestions on processes and practices to consider when developing a security awareness training program that will actually change behavior and make the organization less likely to fall prey to a cyberattack.
Tags : 
     Mimecast
By: AcquireWeb     Published Date: Apr 07, 2008
This opinion piece, published by DM News in November 2007, addresses a common but less talked about problem with email marketing – over-mailing to positively effect otherwise mediocre results; which is likely the result of an acquisition email provider using a compiled response file, and guaranteeing high open and click rates in addition to a positive ROI. This article provides insight on what the marketer, broker or agency can do to ensure they are maximizing the ROI from a given campaign, while disincentivizing over-sending behavior.
Tags : email, conversion, conversion testing, email marketing, frequency, overdelivery, over-delivery, acquireweb, email marketing campaign, email campaign, integrated marketing, e-mail, acquisition e-mail, lead generation, e-mail marketing, e-mail appending, acquirelocal, local marketing, local store marketing, restaurant marketing
     AcquireWeb
By: Vision Critical     Published Date: Jun 23, 2009
Kodak's community-which boasts over 2,600 members to date-has been effective in combining quantitative and qualitative research initiatives, resulting in a more comprehensive understanding of consumer behavior, trends, and demand, which the company continues to use to its advantage. In addition to evaluating existing products and marketing initiatives, it has helped to identify new product and marketing opportunities through analysis of how members shop.
Tags : kodak, online community, customer voice, customer data, crm, cost savings, vision critical, marketing research, market research, feedback, trial, customer, brand tracking, longitudinal studies, testimonials, advertising, communication, testing, community, branding
     Vision Critical
By: Cymfony     Published Date: Jul 11, 2007
The Internet has become a hospitable environment for people looking to advance aggressive forms of criticism against corporations. The same social media technologies that strengthen your company’s relationship with consumers also make is easy for a single critic to mount an aggressive campaign against you. This whitepaper will present new research that reveals what drives this type of aggressive behavior.
Tags : collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
     Cymfony
By: Cymfony     Published Date: Jul 11, 2007
This new study by Harvard's Berkman Center for Internet & Society analyzed corporate attacks against leading companies like Wal-Mart, McDonald’s, AOL, Genzyme and Lufthansa. This study establishes three profiles of corporate attacks and examines the unique behavior patterns and personal motivations behind each.
Tags : collaboration, customer behavior, customer service, online behavior, criticism, crm, customer relationship, customer satisfaction, branding, wal-mart, mcdonalds, evil empire, cymfony
     Cymfony
By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection, security
     Process Software
By: Quantivo Corporation     Published Date: Sep 01, 2009
Watch this webinar to learn how top companies are re-energizing their B2B marketing with customer behavior analytics. Take advantage of your Web, CRM, Support and other touch points to identify customer actions that signal a future purchase and which marketing programs will help speed the process.
Tags : quantivo, customer behavior, crm, behavior, analytics, lead response, sales leads, cycle times, close rates, crm, support, web, b2b
     Quantivo Corporation
By: Bazaarvoice     Published Date: Jan 17, 2014
Thanks to social, consumers are more vocal than ever and their opinions are influencing the purchase decisions of consumers all across the web. Learn how to turn social data into strategic business advantage with nine guiding insights to improve your bottom line today.
Tags : social media, business insights, social media insights, social networks, consumer behavior
     Bazaarvoice
By: Bazaarvoice     Published Date: Jan 17, 2014
Struggling to prove social ROI? The Bazaarvoice whitepaper Real ROI from Social in 5 Steps shows you how the world’s most successful brands and retailers are capturing results and proving true social ROI.
Tags : social media, business insights, social media insights, social networks, consumer behavior
     Bazaarvoice
By: MoreVisibility     Published Date: Dec 19, 2017
As the approach to strategic business decision making becomes more and more data driven, a method for consolidating our various data sets, which are often spread across multiple systems becomes exceedingly important. Two of the biggest players in data driven decision making are website analytics platforms and customer relationship management systems. The former includes accumulating data on top of the funnel behavior such as site traffic origins, lead generation, content consumption tracking, device usage, and overall site behavior. While the latter has a focus more on bottom of the funnel activity such as lead nurturing, customer status, lifetime value, etc. Lastly, without communication between these two essential platforms, a complete understanding of your customers, from lead to longtime client, may never be possible. A web analytics (Google Analytics) and CRM integration provides you with a 360 degree view of your customer base, so that you can understand not just what PPC efforts
Tags : 
     MoreVisibility
By: SAS     Published Date: Jun 05, 2017
"How do you make your brick-and-mortar stores as smart as your website – so when customers walk in the door, you recognize them and cater to their individual tastes? What’s the key to making in-store shopping as frictionless for your customer as online shopping? Read this research summary from the International Institute for Analytics to get started. You’ll learn how to use analytics to gain advanced insight from the Internet of Things: tracking chips, in-store infrared traffic monitors, interactive kiosks and customer mobile devices, to name a few. With analytics, you’ll identify who’s walking in your store, understand their behavior and preferences, and create engaging experiences for your connected customers at every turn. "
Tags : 
     SAS
By: Webroot     Published Date: Sep 18, 2013
This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today’s more than 70 million malware variants. It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as: • Improving speed by offloading pattern matching from endpoints • Eliminating large signature downloads • Stopping zero day attacks
Tags : antivirus, anti-malware, scanning speed, the cloud, behavioral detection, security
     Webroot
By: Webroot     Published Date: Sep 18, 2013
This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with: • Cloud/client architecture • Journaling and rollback • Behavioral recognition of malware These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Tags : cloud architecture, behavior recognition, security, antivirus, journaling, rollback, malware, software development
     Webroot
By: iCIMS     Published Date: Dec 09, 2013
Learn more about the rise of mobile technology and how to build a recruitment strategy to support it in this complimentary ebook published by iCIMS Hire Expectations Institute.
Tags : icims, mobile, mobile hr, talent, new hire, new talent, online behavior, talent acquisition, hiring, hr management
     iCIMS
By: Silverpop     Published Date: Feb 04, 2013
Companies are collecting a ton of information about buyers and their behaviors, but too many aren’t using it effectively, and driving revenue.
Tags : data, scoring, leads, prospects, sales, customers, sales process
     Silverpop
By: Silverpop     Published Date: Feb 04, 2013
Shazam, the world’s leading mobile discovery service, wanted to leverage email to build on its in-app experience, increase user retention and deliver personalized content that drives revenue.
Tags : email marketing, engagement, crm, social, mobile, engegement, testing, optimization
     Silverpop
By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications
     Intralinks
By: GoodData     Published Date: Aug 02, 2013
Sales analytics is a hefty club you can wield to tighten pipeline forecasts and induce pipeline boosting behavior from your reps. This eBook presents 6 practical sales analysis strategies that can help you make it happen.
Tags : sales metrics, how to forecast sales, sales analysis, sales analytics, crm analytics, salesforce reports, salesforce analytics, sales projections, sales kpis, sales prospecting, sales forecasting, sales forecast, sales pipeline, analytics, sales
     GoodData
By: GoodData     Published Date: Aug 02, 2013
A new sales rep's first 100 prospecting calls are the most critical and shapes their likelihood of success. So, why wait until a new sales rep’s pipeline matures to uncover if they’ll ramp to quota? Instead, let their behavior tell the story by tracking their prospecting and lead pursuit activity stream. Use these 4 metrics for evaluating your new sales representatives.
Tags : 
     GoodData
By: IBM     Published Date: Apr 29, 2014
For banks, mining data from social media can be a significant way to gain insights into customer mindsets and behavior, but effectively and accurately capturing and processing this unstructured data to gain useful customer insight requires sophisticated tools and advanced analytics.
Tags : ibm, banking, data mining, social media, consumer insights, business analytics, social business, business technology
     IBM
By: IBM     Published Date: Apr 29, 2014
Customer Profitability Analytics enables banks to analyze customer, account, product, and transaction data and apply costing models to determine a bank-wide view of profitability. Applying predictive analytics, they can model future behavior and derive a lifetime value for each customer.
Tags : ibm, banking, customer profitability, customer profitability analytics, transaction data, predictive analytics, customer behavior
     IBM
By: Oracle     Published Date: Apr 22, 2014
Pink talks to Profit about what he learned in the process: what surprised him most, how his research has influenced his own behavior, and why he says we all need to re-imagine what a successful salesperson looks like.
Tags : sales, daniel pink, to sell is human, salesperson traits, characteristics
     Oracle
By: Digital Bungalow     Published Date: Feb 09, 2015
Google Analytics is an excellent tool for gaining insights into user behavior and gathering data for site optimization.
Tags : google analytics, site optimization, customer acquisition, consumer behavior, advanced segments
     Digital Bungalow
By: Jobvite     Published Date: Mar 31, 2015
Once upon a time, finding candidates meant posting a job description…and then waiting. But today, everything’s different. • Jobs have changed • Jobseekers have changed • Technology has changed But here’s the kicker: When candidates change, and the recruiting environment changes, your job as a recruiter will change, too. Are you ready to adapt? If you aren't sure, don’t fret. A number of recruiters today are faced with the challenge of adjusting to the new climate. Now is the perfect time to analyze your behavior and rethink your perspective. Here’s a look at seven of the top “sins” recruiters commit today, along with valuable direction for correcting your bad habits.
Tags : jobseekers, job search, stem, employment, recruiting, technology, hiring, sourcing, talent pools
     Jobvite
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com