Defending the brand (Record no. 22740)

MARC details
000 -LEADER
fixed length control field 04167nam a22003854a 4500
001 - CONTROL NUMBER
control field EBC243012
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240120125929.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 030630s2004 nyua sb 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
Canceled/invalid LC control number 2003014924
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 0814407544
035 ## - SYSTEM CONTROL NUMBER
System control number (MiAaPQ)EBC243012
035 ## - SYSTEM CONTROL NUMBER
System control number (Au-PeEL)EBL243012
035 ## - SYSTEM CONTROL NUMBER
System control number (CaPaEBR)ebr10044971
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)468772210
040 ## - CATALOGING SOURCE
Original cataloging agency MiAaPQ
Transcribing agency MiAaPQ
Modifying agency MiAaPQ
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number HD69.B7
Item number M79 2004
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 658.8/27
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Murray, Brian H.,
-- 1968-
245 10 - TITLE STATEMENT
Title Defending the brand
Medium [electronic resource] :
Remainder of title aggressive strategies for protecting your brand in the online arena /
Statement of responsibility, etc. Brian H. Murray.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. American Management Association,
Date of publication, distribution, etc. c2004.
300 ## - PHYSICAL DESCRIPTION
Extent xvi, 268 p. :
Other physical details ill.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Digital brand abuse -- The dark side -- Objectionable content -- Pornography -- Adult entertainment -- Child pornography -- Hate, violence, and extremism -- Gambling -- Parody -- Defining "objectionable" -- Who's at risk? -- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.
533 ## - REPRODUCTION NOTE
Type of reproduction Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Brand name products.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Trademark infringement.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic commerce.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Product management.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element ProQuest (Firm)
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/bacm-ebooks/detail.action?docID=243012">https://ebookcentral.proquest.com/lib/bacm-ebooks/detail.action?docID=243012</a>
Public note Click to View

No items available.