Audiences, targeting and signups

A few weeks ago we closed on our new house in Dublin. This weekend we’re going to one of those ‘home shows’ where people try and sell you all sorts of things for your home. We know there are some things we want to do with the house so we’re headed out to the convention centre this weekend. Tickets are “free” but they ask for contact information, including an email address.

Given who we are, this sparked a discussion about the email address we wanted to give them. Right now, we’re in a place where we actually want a lot of email about home stuff. We know we need attic insulation and a new heating system and furniture and so yeah, email from the show vendors is good right now. But we also know that this email address will be traded and sold for the next 20 years. We could set up a tagged address and just route it to /dev/null when we’re tired of mail. Instead, we decided to set up a whole new address to use for house things, one that we could set to bounce when we were bored of getting house related mail.

It will be interesting to see what kind of mail we get over time to this address. Are the marketers smart enough to change what they send based on how long they’ve had our address? Or will the mail change with the seasons? Both are legitimate marketing techniques. It will also be interesting to see how they handle this data in the context of GDPR.

In this case, we’re a clear target for this marketing and, in many ways, receptive to all the stuff they’re selling. We’re receptive, they’re going to send us email, it’s all good. We know what we’re getting into, they are getting good subscribers. Everybody is happy. We’ll continue to be happy with the mail until we’re moved in and feel like all the bits are finished and then we’ll either unsubscribe from everything or, more likely, just turn the address off.

Targeting.

Sometimes I don’t know how savvy marketers always are about their audience, though. Two recent examples come to mind.

A friend of mine got engaged last week. She’s looking at planning a wedding. This is another major opportunity for marketing to collect information and bridal shows are huge. Many brides of the digital generation know what they’re getting into when the give an email address to a bridal magazine or to a bridal show. I’ve seen some discussions that the right thing to do is open a gmail account just to handle wedding planning and subscriptions. But, like buying and furnishing a new house, a wedding is a limited amount of time. Anywhere from a few days to 2 or so years. From what I’ve heard, though, not all wedding vendors are that great about sunsetting addresses.

In another case, I was talking with a startup. They’re a fairly new news / political insight organization that was working with some marketing experts to grow their lists. They decided to use co-reg and it was successful increasing their list size by an order of magnitude. It also tanked their delivery. Part of my end of the conversation was about how to fix their delivery. But that was only part of the conversation. A much bigger piece of the conversation was walking them through some discussion of what audience they were looking for and whether or not co-reg was a good way to find that audience.

Fundamentally, though, “people we can get to give us an email address” do not always equate to “people who want our mail.” Recently one of my ESP clients was dealing with a customer who had a lot of delivery challenges and we eventually worked out the problem set of addresses was from wifi logins. Yes, lots of places expect an email address for a wifi login. Lots of users don’t want any mail based on that login. If those addresses become too big a portion of the mailing list, then it can tank delivery for all subscribers.

Part of the challenge of running a successful email marketing program is understanding your subscribers and your collection processes. Email is an amazing communication channel that is constantly evolving. The audience is evolving in what they want and what their needs are. Technology is evolving. Filters are evolving to handle the morphing threats. What worked yesterday might work today but not tomorrow. Marketers have to evolve, too, or risk not reaching the inbox or their audience.

Related Posts

Equifax compromise and their insecure response

Today it was announced that someone infiltrated Equifax earlier this year and stole 143,000,000 identities. These identities include names, birthdates, and addresses, at a minimum. Details are available at your favorite news site.
What I want to talk about is the website they’ve put up to address the issue. This website is Yet Another Example of how the financial services industry trains users to be phishing victims.
Equifax set up a website for people concerned about the possibility of identity theft after this major data leak. The URL, as distributed by the press and linked to from Equifax’s own website is https://www.equifaxsecurity2017.com.
When I was first sent to the site, I thought it was a phishing site because there is absolutely no way to confirm this site is owned and managed by Equifax. Zero. In fact, there’s a lot of evidence that the site isn’t owned by Equifax. And most of the rest of the evidence relies on trusting that the hackers still don’t have some level of access to Equifax systems.

Read More

November 2017: The Month in Email

We’re in the thick of the busiest time of the year for email. It’s been so busy, in fact, that we’ve seen some slowdowns and delivery issues across the email universe. It may be worth thinking about alternate strategies for end of year promotions beyond Black Friday and Cyber Monday.
I was delighted to chat with Julia Angwin for her ProPublica piece on subscription bombing and abuse prevention. Her piece is a good introduction to the topic, and very much worth reading.
ICYMI, I did a rough analysis of the data from our survey on Google Postmaster Tools. Stay tuned for more insights when I have a moment to explore this further.

Read More

Subscription bombing and abuse prevention

A few weeks ago ProPublica was the victim of a subscription bomb attack. Julia Angwin found my blog post on the subject and contacted me to talk about the post. We spent an hour or so on the phone and I shared some of the information we had on the problem. Julie told me she was interested in investigating this further problem further. Today, ProPublica published Cheap Tricks: the Low Cost of Internet Harassment.
For those of us deeply involved in the issue, there isn’t too much that comes as a surprise in that article. But it’s a good introduction to folks who may not be aware of the existence of subscription bombing.

Julia does mention something I have been thinking about: abuse and anonymity online. Can we continue to have anonymous or  pseudonymous identities on the Internet? Should we?
One of the challenges a lot of companies are struggling with is that anonymity can protect oppressors as well as their targets. How do we support “good” anonymity without enabling “bad” anonymity? I’ve always thought anonymity was an overall good and the fact that it’s abused sometimes didn’t mean it should be taken away. Banning anonymity online might seem to fix the problem of abuse, except it really doesn’t and it comes with its own set of problems.
Let’s be honest, these are hard questions and ones that do need to be addressed. A lot of the tools abuse and security desks currently have rely on volume of complaints. This can result in the targets getting shut down due to false complaints while the perpetrators keep their accounts open. It means subscription bombs can target a few individuals and occur undetected for months.
Big companies in Silicon Valley love to rely on their algorithms and machine learning and AI and code to automate things. But the automation only works after you create working processes. Throwing code at the problem doesn’t work unless you have a picture of the scope of the problem. And a reliance on code ends up with Facebook asking people to upload nudes of themselves to prevent nudes on Facebook. Likewise, throwing cheap labor at the problem isn’t a solution, either.
I don’t have the answers, I don’t think anyone does. But we need to think harder about these problems and address them sooner rather than later. The internet is too important to let abusers break it.

Read More