語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Defending the brand = aggressive str...
~
NetLibrary, Inc.
FindBook
Google Book
Amazon
博客來
Defending the brand = aggressive strategies for protecting your brand in the online arena /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Defending the brand/ Brian H. Murray.
其他題名:
aggressive strategies for protecting your brand in the online arena /
作者:
Murray, Brian H.,
出版者:
New York :American Management Association, : c2004.,
面頁冊數:
xvi, 268 p. :ill.
內容註:
Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.
標題:
Brand name products. -
電子資源:
http://www.netLibrary.com/urlapi.asp?action=summary&v=1&bookid=100157An electronic book accessible through the World Wide Web; click for information
ISBN:
0814427537 (electronic bk.)
Defending the brand = aggressive strategies for protecting your brand in the online arena /
Murray, Brian H.,1968-
Defending the brand
aggressive strategies for protecting your brand in the online arena /[electronic resource] :Brian H. Murray. - New York :American Management Association,c2004. - xvi, 268 p. :ill.
Includes bibliographical references and index.
Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.
Electronic reproduction.
Boulder, Colo. :
NetLibrary,
2003.
Available via World Wide Web.
ISBN: 0814427537 (electronic bk.)Subjects--Topical Terms:
581855
Brand name products.
Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: HD69.B7 / M79 2004eb
Dewey Class. No.: 658.8/27
Defending the brand = aggressive strategies for protecting your brand in the online arena /
LDR
:03817cam a2200253 a 45
001
728574
003
OCoLC
005
20071213
006
m d
007
cr cnu---unuuu
008
071213s2004 nyua sb 001 0 eng d
020
$a
0814427537 (electronic bk.)
035
$a
ocm53400843
040
$a
N
$c
N
$d
OCLCQ
049
$a
AMFA
050
1 4
$a
HD69.B7
$b
M79 2004eb
082
0 4
$a
658.8/27
$2
22
100
$a
Murray, Brian H.,
$d
1968-
$3
814978
245
1 0
$a
Defending the brand
$h
[electronic resource] :
$b
aggressive strategies for protecting your brand in the online arena /
$c
Brian H. Murray.
260
$a
New York :
$c
c2004.
$b
American Management Association,
300
$a
xvi, 268 p. :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.
533
$a
Electronic reproduction.
$b
Boulder, Colo. :
$c
NetLibrary,
$d
2003.
$n
Available via World Wide Web.
$n
Access may be limited to NetLibrary affiliated libraries.
650
$a
Brand name products.
$3
581855
650
$a
Electronic commerce.
$3
576153
650
$a
Product management.
$3
576148
650
$a
Trademark infringement.
$3
779817
655
$a
Electronic books.
$2
lcsh
$3
542853
710
$a
NetLibrary, Inc.
$3
542851
856
4
$3
Bibliographic record display
$u
http://www.netLibrary.com/urlapi.asp?action=summary&v=1&bookid=100157
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
92
$b
AMF
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9014032
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入