Defending the brand :: aggressive strategies for protecting your brand in the online arena /
"Defending the Brand reveals strategies that have been used successfully by global companies to preserve brand equity and protect millions of dollars in assets and revenues. Packed with eye-opening stories from real companies like Home Depot, the Red Cross, Nintendo, Verizon, and the Associated...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York :
American Management Association,
©2004.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Defending the Brand reveals strategies that have been used successfully by global companies to preserve brand equity and protect millions of dollars in assets and revenues. Packed with eye-opening stories from real companies like Home Depot, the Red Cross, Nintendo, Verizon, and the Associated Press, the book takes you into the digital trenches. Defending the Brand provides the strategic and tactical knowledge you need to fight back and gain control against online threats such as piracy, counterfeiting, deceit, fraud, and manipulation of customers."--Jacket |
Beschreibung: | 1 online resource (xvi, 268 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 0814427537 9780814427538 9780814407547 0814407544 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm53400843 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 031112s2004 nyua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d OCLCG |d CWU |d OCLCQ |d HNW |d TUU |d OCLCQ |d TNF |d OCLCQ |d ZCU |d OCLCQ |d VVN |d CO3 |d QE2 |d DKDLA |d ADU |d E7B |d OCLCF |d COO |d OCLCQ |d AU@ |d OCLCQ |d AZK |d INTCL |d JBG |d COCUF |d AGLDB |d CNNOR |d Z5A |d MOR |d PLS |d PIFBR |d OCLCQ |d SAV |d OCLCQ |d OCLCA |d WY@ |d U3W |d LUE |d INARC |d UUM |d ATSAE |d BRL |d STF |d WRM |d VTS |d NRAMU |d MUO |d OCLCQ |d VT2 |d INT |d TOF |d OCLCQ |d A6Q |d G3B |d K6U |d CHBRC |d UKCRE |d BOL |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 54092992 |a 475565310 |a 478229138 |a 531098245 |a 614728610 |a 647271782 |a 722191699 |a 728007900 |a 827879830 |a 961621068 |a 961628943 |a 962633439 |a 962636979 |a 988498574 |a 991909795 |a 992085539 |a 1002066765 |a 1037440236 |a 1037476104 |a 1038615169 |a 1045514221 |a 1050956395 |a 1053042791 |a 1055336659 |a 1076327839 |a 1081237232 |a 1114404572 |a 1135430238 |a 1153511475 | ||
020 | |a 0814427537 |q (electronic bk.) | ||
020 | |a 9780814427538 |q (electronic bk.) | ||
020 | |a 9780814407547 | ||
020 | |a 0814407544 | ||
020 | |z 0814407544 | ||
035 | |a (OCoLC)53400843 |z (OCoLC)54092992 |z (OCoLC)475565310 |z (OCoLC)478229138 |z (OCoLC)531098245 |z (OCoLC)614728610 |z (OCoLC)647271782 |z (OCoLC)722191699 |z (OCoLC)728007900 |z (OCoLC)827879830 |z (OCoLC)961621068 |z (OCoLC)961628943 |z (OCoLC)962633439 |z (OCoLC)962636979 |z (OCoLC)988498574 |z (OCoLC)991909795 |z (OCoLC)992085539 |z (OCoLC)1002066765 |z (OCoLC)1037440236 |z (OCoLC)1037476104 |z (OCoLC)1038615169 |z (OCoLC)1045514221 |z (OCoLC)1050956395 |z (OCoLC)1053042791 |z (OCoLC)1055336659 |z (OCoLC)1076327839 |z (OCoLC)1081237232 |z (OCoLC)1114404572 |z (OCoLC)1135430238 |z (OCoLC)1153511475 | ||
050 | 4 | |a HD69.B7 |b M79 2004eb | |
072 | 7 | |a BUS |x 002000 |2 bisacsh | |
082 | 7 | |a 658.8/27 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Murray, Brian H., |d 1968- |1 https://id.oclc.org/worldcat/entity/E39PCjwJQvCFjXDrdKpdWC3w3P |0 http://id.loc.gov/authorities/names/n2003108262 | |
245 | 1 | 0 | |a Defending the brand : |b aggressive strategies for protecting your brand in the online arena / |c Brian H. Murray. |
260 | |a New York : |b American Management Association, |c ©2004. | ||
300 | |a 1 online resource (xvi, 268 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
340 | |g polychrome. |2 rdacc |0 http://rdaregistry.info/termList/RDAColourContent/1003 | ||
347 | |a data file | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary. | |
588 | 0 | |a Print version record. | |
520 | |a "Defending the Brand reveals strategies that have been used successfully by global companies to preserve brand equity and protect millions of dollars in assets and revenues. Packed with eye-opening stories from real companies like Home Depot, the Red Cross, Nintendo, Verizon, and the Associated Press, the book takes you into the digital trenches. Defending the Brand provides the strategic and tactical knowledge you need to fight back and gain control against online threats such as piracy, counterfeiting, deceit, fraud, and manipulation of customers."--Jacket | ||
650 | 0 | |a Brand name products. |0 http://id.loc.gov/authorities/subjects/sh85016403 | |
650 | 0 | |a Internet domain names |x Management. | |
650 | 0 | |a Trademark infringement |x Prevention. | |
650 | 0 | |a Trademark infringement. |0 http://id.loc.gov/authorities/subjects/sh96001071 | |
650 | 0 | |a Electronic commerce. |0 http://id.loc.gov/authorities/subjects/sh96008434 | |
650 | 0 | |a Product management. |0 http://id.loc.gov/authorities/subjects/sh85107203 | |
650 | 6 | |a Produits de marque. | |
650 | 6 | |a Marques de commerce |x Contrefaçon. | |
650 | 6 | |a Commerce électronique. | |
650 | 6 | |a Produits commerciaux |x Gestion. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Advertising & Promotion. |2 bisacsh | |
650 | 7 | |a Brand name products |2 fast | |
650 | 7 | |a Electronic commerce |2 fast | |
650 | 7 | |a Product management |2 fast | |
650 | 7 | |a Trademark infringement |2 fast | |
653 | |a Andre fag (naturvidenskab og teknik) |a Andre fag | ||
758 | |i has work: |a Defending the brand (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG3qBwjxxjjycfXk8Ff76q |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Murray, Brian H., 1968- |t Defending the brand. |d New York : American Management Association, ©2004 |z 0814407544 |w (DLC) 2003014924 |w (OCoLC)52727192 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=100157 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 100157 | ||
938 | |a Internet Archive |b INAR |n defendingbrandag00bria | ||
938 | |a YBP Library Services |b YANK |n 2343236 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm53400843 |
---|---|
_version_ | 1816881612257755136 |
adam_text | |
any_adam_object | |
author | Murray, Brian H., 1968- |
author_GND | http://id.loc.gov/authorities/names/n2003108262 |
author_facet | Murray, Brian H., 1968- |
author_role | |
author_sort | Murray, Brian H., 1968- |
author_variant | b h m bh bhm |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD69 |
callnumber-raw | HD69.B7 M79 2004eb |
callnumber-search | HD69.B7 M79 2004eb |
callnumber-sort | HD 269 B7 M79 42004EB |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-4-EBA |
contents | Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary. |
ctrlnum | (OCoLC)53400843 |
dewey-full | 658.8/27 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.8/27 |
dewey-search | 658.8/27 |
dewey-sort | 3658.8 227 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07546cam a2200673 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm53400843 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">031112s2004 nyua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCG</subfield><subfield code="d">CWU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HNW</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TNF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VVN</subfield><subfield code="d">CO3</subfield><subfield code="d">QE2</subfield><subfield code="d">DKDLA</subfield><subfield code="d">ADU</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCF</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">INTCL</subfield><subfield code="d">JBG</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CNNOR</subfield><subfield code="d">Z5A</subfield><subfield code="d">MOR</subfield><subfield code="d">PLS</subfield><subfield code="d">PIFBR</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">LUE</subfield><subfield code="d">INARC</subfield><subfield code="d">UUM</subfield><subfield code="d">ATSAE</subfield><subfield code="d">BRL</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">MUO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">INT</subfield><subfield code="d">TOF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">G3B</subfield><subfield code="d">K6U</subfield><subfield code="d">CHBRC</subfield><subfield code="d">UKCRE</subfield><subfield code="d">BOL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">54092992</subfield><subfield code="a">475565310</subfield><subfield code="a">478229138</subfield><subfield code="a">531098245</subfield><subfield code="a">614728610</subfield><subfield code="a">647271782</subfield><subfield code="a">722191699</subfield><subfield code="a">728007900</subfield><subfield code="a">827879830</subfield><subfield code="a">961621068</subfield><subfield code="a">961628943</subfield><subfield code="a">962633439</subfield><subfield code="a">962636979</subfield><subfield code="a">988498574</subfield><subfield code="a">991909795</subfield><subfield code="a">992085539</subfield><subfield code="a">1002066765</subfield><subfield code="a">1037440236</subfield><subfield code="a">1037476104</subfield><subfield code="a">1038615169</subfield><subfield code="a">1045514221</subfield><subfield code="a">1050956395</subfield><subfield code="a">1053042791</subfield><subfield code="a">1055336659</subfield><subfield code="a">1076327839</subfield><subfield code="a">1081237232</subfield><subfield code="a">1114404572</subfield><subfield code="a">1135430238</subfield><subfield code="a">1153511475</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0814427537</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780814427538</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780814407547</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0814407544</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0814407544</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)53400843</subfield><subfield code="z">(OCoLC)54092992</subfield><subfield code="z">(OCoLC)475565310</subfield><subfield code="z">(OCoLC)478229138</subfield><subfield code="z">(OCoLC)531098245</subfield><subfield code="z">(OCoLC)614728610</subfield><subfield code="z">(OCoLC)647271782</subfield><subfield code="z">(OCoLC)722191699</subfield><subfield code="z">(OCoLC)728007900</subfield><subfield code="z">(OCoLC)827879830</subfield><subfield code="z">(OCoLC)961621068</subfield><subfield code="z">(OCoLC)961628943</subfield><subfield code="z">(OCoLC)962633439</subfield><subfield code="z">(OCoLC)962636979</subfield><subfield code="z">(OCoLC)988498574</subfield><subfield code="z">(OCoLC)991909795</subfield><subfield code="z">(OCoLC)992085539</subfield><subfield code="z">(OCoLC)1002066765</subfield><subfield code="z">(OCoLC)1037440236</subfield><subfield code="z">(OCoLC)1037476104</subfield><subfield code="z">(OCoLC)1038615169</subfield><subfield code="z">(OCoLC)1045514221</subfield><subfield code="z">(OCoLC)1050956395</subfield><subfield code="z">(OCoLC)1053042791</subfield><subfield code="z">(OCoLC)1055336659</subfield><subfield code="z">(OCoLC)1076327839</subfield><subfield code="z">(OCoLC)1081237232</subfield><subfield code="z">(OCoLC)1114404572</subfield><subfield code="z">(OCoLC)1135430238</subfield><subfield code="z">(OCoLC)1153511475</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD69.B7</subfield><subfield code="b">M79 2004eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">002000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.8/27</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Murray, Brian H.,</subfield><subfield code="d">1968-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjwJQvCFjXDrdKpdWC3w3P</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2003108262</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Defending the brand :</subfield><subfield code="b">aggressive strategies for protecting your brand in the online arena /</subfield><subfield code="c">Brian H. Murray.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">New York :</subfield><subfield code="b">American Management Association,</subfield><subfield code="c">©2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 268 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="340" ind1=" " ind2=" "><subfield code="g">polychrome.</subfield><subfield code="2">rdacc</subfield><subfield code="0">http://rdaregistry.info/termList/RDAColourContent/1003</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Defending the Brand reveals strategies that have been used successfully by global companies to preserve brand equity and protect millions of dollars in assets and revenues. Packed with eye-opening stories from real companies like Home Depot, the Red Cross, Nintendo, Verizon, and the Associated Press, the book takes you into the digital trenches. Defending the Brand provides the strategic and tactical knowledge you need to fight back and gain control against online threats such as piracy, counterfeiting, deceit, fraud, and manipulation of customers."--Jacket</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Brand name products.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85016403</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet domain names</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Trademark infringement</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Trademark infringement.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh96001071</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic commerce.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh96008434</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Product management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85107203</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Produits de marque.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Marques de commerce</subfield><subfield code="x">Contrefaçon.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Commerce électronique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Produits commerciaux</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Advertising & Promotion.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Brand name products</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic commerce</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Product management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Trademark infringement</subfield><subfield code="2">fast</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Andre fag (naturvidenskab og teknik)</subfield><subfield code="a">Andre fag</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Defending the brand (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG3qBwjxxjjycfXk8Ff76q</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Murray, Brian H., 1968-</subfield><subfield code="t">Defending the brand.</subfield><subfield code="d">New York : American Management Association, ©2004</subfield><subfield code="z">0814407544</subfield><subfield code="w">(DLC) 2003014924</subfield><subfield code="w">(OCoLC)52727192</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=100157</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">100157</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">defendingbrandag00bria</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2343236</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm53400843 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:29Z |
institution | BVB |
isbn | 0814427537 9780814427538 9780814407547 0814407544 |
language | English |
oclc_num | 53400843 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvi, 268 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | American Management Association, |
record_format | marc |
spelling | Murray, Brian H., 1968- https://id.oclc.org/worldcat/entity/E39PCjwJQvCFjXDrdKpdWC3w3P http://id.loc.gov/authorities/names/n2003108262 Defending the brand : aggressive strategies for protecting your brand in the online arena / Brian H. Murray. New York : American Management Association, ©2004. 1 online resource (xvi, 268 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier polychrome. rdacc http://rdaregistry.info/termList/RDAColourContent/1003 data file Includes bibliographical references and index. Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary. Print version record. "Defending the Brand reveals strategies that have been used successfully by global companies to preserve brand equity and protect millions of dollars in assets and revenues. Packed with eye-opening stories from real companies like Home Depot, the Red Cross, Nintendo, Verizon, and the Associated Press, the book takes you into the digital trenches. Defending the Brand provides the strategic and tactical knowledge you need to fight back and gain control against online threats such as piracy, counterfeiting, deceit, fraud, and manipulation of customers."--Jacket Brand name products. http://id.loc.gov/authorities/subjects/sh85016403 Internet domain names Management. Trademark infringement Prevention. Trademark infringement. http://id.loc.gov/authorities/subjects/sh96001071 Electronic commerce. http://id.loc.gov/authorities/subjects/sh96008434 Product management. http://id.loc.gov/authorities/subjects/sh85107203 Produits de marque. Marques de commerce Contrefaçon. Commerce électronique. Produits commerciaux Gestion. BUSINESS & ECONOMICS Advertising & Promotion. bisacsh Brand name products fast Electronic commerce fast Product management fast Trademark infringement fast Andre fag (naturvidenskab og teknik) Andre fag has work: Defending the brand (Text) https://id.oclc.org/worldcat/entity/E39PCG3qBwjxxjjycfXk8Ff76q https://id.oclc.org/worldcat/ontology/hasWork Print version: Murray, Brian H., 1968- Defending the brand. New York : American Management Association, ©2004 0814407544 (DLC) 2003014924 (OCoLC)52727192 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=100157 Volltext |
spellingShingle | Murray, Brian H., 1968- Defending the brand : aggressive strategies for protecting your brand in the online arena / Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary. Brand name products. http://id.loc.gov/authorities/subjects/sh85016403 Internet domain names Management. Trademark infringement Prevention. Trademark infringement. http://id.loc.gov/authorities/subjects/sh96001071 Electronic commerce. http://id.loc.gov/authorities/subjects/sh96008434 Product management. http://id.loc.gov/authorities/subjects/sh85107203 Produits de marque. Marques de commerce Contrefaçon. Commerce électronique. Produits commerciaux Gestion. BUSINESS & ECONOMICS Advertising & Promotion. bisacsh Brand name products fast Electronic commerce fast Product management fast Trademark infringement fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85016403 http://id.loc.gov/authorities/subjects/sh96001071 http://id.loc.gov/authorities/subjects/sh96008434 http://id.loc.gov/authorities/subjects/sh85107203 |
title | Defending the brand : aggressive strategies for protecting your brand in the online arena / |
title_auth | Defending the brand : aggressive strategies for protecting your brand in the online arena / |
title_exact_search | Defending the brand : aggressive strategies for protecting your brand in the online arena / |
title_full | Defending the brand : aggressive strategies for protecting your brand in the online arena / Brian H. Murray. |
title_fullStr | Defending the brand : aggressive strategies for protecting your brand in the online arena / Brian H. Murray. |
title_full_unstemmed | Defending the brand : aggressive strategies for protecting your brand in the online arena / Brian H. Murray. |
title_short | Defending the brand : |
title_sort | defending the brand aggressive strategies for protecting your brand in the online arena |
title_sub | aggressive strategies for protecting your brand in the online arena / |
topic | Brand name products. http://id.loc.gov/authorities/subjects/sh85016403 Internet domain names Management. Trademark infringement Prevention. Trademark infringement. http://id.loc.gov/authorities/subjects/sh96001071 Electronic commerce. http://id.loc.gov/authorities/subjects/sh96008434 Product management. http://id.loc.gov/authorities/subjects/sh85107203 Produits de marque. Marques de commerce Contrefaçon. Commerce électronique. Produits commerciaux Gestion. BUSINESS & ECONOMICS Advertising & Promotion. bisacsh Brand name products fast Electronic commerce fast Product management fast Trademark infringement fast |
topic_facet | Brand name products. Internet domain names Management. Trademark infringement Prevention. Trademark infringement. Electronic commerce. Product management. Produits de marque. Marques de commerce Contrefaçon. Commerce électronique. Produits commerciaux Gestion. BUSINESS & ECONOMICS Advertising & Promotion. Brand name products Electronic commerce Product management Trademark infringement |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=100157 |
work_keys_str_mv | AT murraybrianh defendingthebrandaggressivestrategiesforprotectingyourbrandintheonlinearena |