Coverart for item
The Resource Defending the brand : aggressive strategies for protecting your brand in the online arena, Brian H. Murray

Defending the brand : aggressive strategies for protecting your brand in the online arena, Brian H. Murray

Label
Defending the brand : aggressive strategies for protecting your brand in the online arena
Title
Defending the brand
Title remainder
aggressive strategies for protecting your brand in the online arena
Statement of responsibility
Brian H. Murray
Creator
Subject
Genre
Language
eng
Summary
"Defending the Brand reveals strategies that have been used successfully by global companies to preserve brand equity and protect millions of dollars in assets and revenues. Packed with eye-opening stories from real companies like Home Depot, the Red Cross, Nintendo, Verizon, and the Associated Press, the book takes you into the digital trenches. Defending the Brand provides the strategic and tactical knowledge you need to fight back and gain control against online threats such as piracy, counterfeiting, deceit, fraud, and manipulation of customers."--Jacket
Member of
Cataloging source
N$T
http://library.link/vocab/creatorDate
1968-
http://library.link/vocab/creatorName
Murray, Brian H.
Dewey number
658.8/27
Illustrations
illustrations
Index
index present
LC call number
HD69.B7
LC item number
M79 2004eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/subjectName
  • Brand name products
  • Internet domain names
  • Trademark infringement
  • Trademark infringement
  • Electronic commerce
  • Product management
  • BUSINESS & ECONOMICS
  • Brand name products
  • Electronic commerce
  • Product management
  • Trademark infringement
Label
Defending the brand : aggressive strategies for protecting your brand in the online arena, Brian H. Murray
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary
Control code
53400843
Dimensions
unknown
Extent
1 online resource (xvi, 268 pages)
File format
unknown
Form of item
online
Isbn
9780814427538
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)53400843
Label
Defending the brand : aggressive strategies for protecting your brand in the online arena, Brian H. Murray
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary
Control code
53400843
Dimensions
unknown
Extent
1 online resource (xvi, 268 pages)
File format
unknown
Form of item
online
Isbn
9780814427538
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)53400843

Library Locations

    • UMKCBorrow it
      800 E 51st St, Kansas City, MO, 64110, US
      39.035061 -94.576518
    • Health Sciences LibraryBorrow it
      2411 Holmes St, Kansas City, Kansas City, MO, 64108, US
      39.083418 -94.575323
    • Leon E. Bloch Law LibraryBorrow it
      500 E. 52nd Street, Kansas City, MO, 64110, US
      39.032488 -94.581967
Processing Feedback ...