The “100% ad viewability” gambit: Gimmick or game-changer?

Say hello to the ad industry’s newest acronym: vCPM (viewable cost-per-thousand).

viewabilityA few weeks back, Google announced that it will be introducing 100% viewable ads in the coming months, bringing all online ad campaigns bought on a CPM basis into view across its Google Display Network.

The news comes as a relief to advertisers, who have long complained about the high percentage of ads that never have a chance to be viewed by “real people.”

The statistic that Google likes to reference is that approximately 55% of all display ads are never viewed due to a myriad of factors — such as appearing being below the fold, being scrolled out of view, or showing up in a background tab.

And the problem is only growing larger with the increased adoption of ad blocker software tools.

Google isn’t the only that’s one coming up with in-view advertising guarantees. Facebook recently announced that it will begin selling 100% viewable ads in its News Feed area.

But some are questioning how much of a better benefit 100% viewability will be in actuality. For one thing, ad rates for these program are sure to be higher than for conventional ad buying contracts.

For another, neither Facebook nor Google have stated how long an ad would need to remain in view before an advertiser gets charged. Whether it’s 1 second, 2 seconds or 5 seconds makes a huge difference in the real worth of that exposure to the consumer.

Then there’s the realm of mobile advertising. In a startling analysis conducted and reported on by The New York Times, a mix of advertising and editorial on the mobile home pages of the top 50 news sites was measured.  What the analysis found was that mobile airtime is being chewed up by advertising content far more than by the editorial content people are tuning in to view.

Boston.com mobile readers are a case in point. The analysis found that its readers spend an average of ~31 seconds waiting for ads to load versus ~8 seconds waiting for the editorial content to load.  That translates into a home page visitor paying $9.50 per month — just to view the ads.

ad blockerWhen there’s suddenly a cost implication in addition to the basic “irritation factor,” expect more smartphone and tablet users to avail themselves of ad blockers even more than they do today.

As if on cud, Apple is now allowing ad blockers on the iPhone, giving consumers the ability to conserve data, make websites load faster, and save on usage charges all in one fell swoop.

Sounds like a pretty sweet deal all-around.

Surprising statistic? One-third of American adults still aren’t on social media.

social mediaFor the many people who use social media on a daily basis, it may seem inconceivable that there are a substantial number of other Americans who aren’t on social media at all.

But that’s the case. The Pew Research Center has been tracking social media usage on an annual basis over the past decade or so, and it finds that about one-third of Americans still aren’t using any social networking sites.

To be sure, today’s ~65% participation rate is about ten times higher than the paltry ~7% participation rate Pew found the first time it surveyed Americans about their social media usage back in 2005.

According to Pew’s field research findings, here’s how the percentage of social media involvement has risen in selected years in the decade since. (The figures measure the percentage of Americans age 18 or over who use at least one social networking site.)

  • 2006: ~11% using at least one social networking site
  • 2008: ~25%
  • 2010: ~46%
  • 2012: ~55%
  • 2015: ~65%

In more recent years, the highest growth in social media participation rates has been among older Americans (over the age of 65), ~35% of whom are using social media today compared to just 11% five years ago.

That still pales in comparison to younger Americans (age 18-29), ~90% of whom use social media platforms.

While it’s a common perception that women are more avid users of social media than men, Pew’s research shows that the participation rate is actually not that far apart. Statistically it isn’t significant, in fact: a ~68% social media participation rate for women versus ~62% for men.

pew-research-centerSimilarly, there are more similarities than differences among the various racial and ethnic groups that Pew surveys — and the same dynamics are at work when it comes to differing education levels, too.

Regional differences in social media practice continue to persist, however, with rural residents less likely to use social media than suburban residents by a ten-point margin (58% versus 68%). City dwellers fall in between.

More details on Pew’s most recent field research on the topic of social media participation can be accessed here. See if you notice any surprising findings among them.

Where Outside Suppliers of Business Services Fall Down on the Job …

Quirk's Corporate Research ReportQuirk’s Marketing Research Review is a periodical I’ve enjoyed reading for three decades or more.  Unlike the articles that appear in other research-related publications that are more “scholarly” and theoretical,  I find the articles in Quirk’s to be chockfull of insights, while at the same time being “efficiently practical” and easy to digest.

Recently, the magazine published findings from its second annual Quirk’s Corporate Research Report, designed to give corporate researchers an in-depth look into their world.

As part of the research-gathering process for the report, Quirk’s conducted a field survey covering budgets, outsourcing, research techniques in use and under consideration, how research findings are reported inside organizations and, last but not least, the experiences researchers have had when working with outside vendors.

When asked by Quirk’s to state what are the main problem areas when research vendors have come up short on a project, these eight factors were cited by respondents most often:

  • The vendor over-promised and under-delivered: ~56% of respondents mentioned
  • The project was handled by low-level staff: ~51%
  • Vendor failed to take time to understand the client’s business: ~50%
  • Vendor had poor communications: ~39%
  • Vendor failed to take time to understand the project’s needs: ~36%
  • Data integrity issues: ~35%
  • Vendor missed deadlines: ~35%
  • Tools/methodologies that the vendor suggested weren’t right for the project: ~14%

Notice how the most pervasive issues have less to do with the inherent quality of the research product being delivered, and more to do with how the vendor interfaces with and communicates with the companies they support.

The above behaviors represent challenges associated with conducting research projects. But I contend that they apply equally well to providers of other types of business and corporate services, whether they’re ERP or IT projects, website development projects, CRM implementation, SEM/SEO programs, media campaigns, PR initiatives … even IPOs, capital campaigns and the like.

Which of these shortcomings do you find to be most prevalent in your dealings with outside service providers — and what have you done about them? Please share any insights you may have with other readers here.

The lifetime value of a blog post: It’s more than you probably think.

bgHere’s an interesting factoid: In 2014, more than 550 million blog posts were uploaded on WordPress alone.

Add in Tumblr, and there are another 250 million blogs.

Considering the sheer volume of blogging activity, it’s surprising how little intelligence on the “value” of a blog post has been available. But now a study has been published that sheds light on the question.

The evaluation, which was commissioned by branding agency IZEA and conducted by research firm The Halverson Group, has determined that the lifespan of a blog post is far greater than the accepted measurement of 30 days.

The lifespan is more than 20 times longer, it turns out.

Let’s break down the research findings a bit more. The IZEA/Halverson study determined that by Day 700 (about two years), the typical blog post will have received ~99% of its impressions.

That’s a pretty long annuity, and it provides strong ammo for marketers who advocate for blog posts as an important way to maximize the return on their marketing spend.

According to the study, the typical blog post goes through three distinct phases in its useful life:

  • Shout: The initial spike in impressions that happens within the first 7 to 10 days, typically resulting in half of the total impressions the post will ever receive.
  • Echo: The period ending at 30 days, by which time the typical blog post will have racked up ~70% of its total impressions.
  • Reverb: The third phase that stretches from approximately Day 30 all the way to Day 700. This long-tail phase will typically generate the final ~30% of impressions.

Of course, the performance of individual blog posts will depend on the subject matter, the timeliness of the information, and other factors. But as a general rule of thumb, the Halverson findings show the potential value of a blog post as far greater than many marketers may have surmised up until now.

The Halverson study also provides a good rule of thumb for the lifetime impression value of a blog post. It can be calculated by multiplying a blog post’s 30-day monthly pageview total by a factor of 1.4.

In other words, by Day 30, marketers can know with a good deal of confidence how the blog post will perform overall.

Using this formula, marketers will be able to demonstrate the “evergreen” effect of blogging as a marketing tactic.

Certainly, the residual benefits of a blog post look very strong — particularly in contrast to volume-based media such as display or search advertising, which stop performing the instant the campaign investment ends.

The bottom line: Companies should continue to blog away … and if they haven’t started or if they’ve allowed their blogging program to flag, it’s time to get things back in gear!

“Boomerang employees”: No longer such a rarity in the corporate world.

Time was, once a person left a company – for whatever reason – the likelihood that they’d ever come back to work there was pretty slim.

Perhaps to be re-engaged as a consultant or a contract worker … but as a return employee? Not likely at all.

That mindset appears to be changing.  Data accumulated from a recent survey by HR research and advisory firm Workplace Trends from ~1,800 human resources executives, managers of staff, and employees provide the following clues:

  • Half of the HR professionals responding to the survey claimed that their organization once had formal policies against rehiring former employees (even if the employee had departed in good standing).
  • Three-fourths of the HR respondents reported that they are more accepting of hiring boomerang employees today. More than half of the respondents who are people managers felt the same way.

The actual incidence of returning to work at a former company isn’t all that common.  Of the employees who took part in the survey, fewer than 15% of them fell into this category.

Still, 15% is way up from where it has been traditionally — and the current percentage is higher than I would have guessed.

What’s more, nearly 40% of employee respondents reported that they would consider going back to an employer where they had once worked.

There are distinct differences in employee attitudes based on age demographics: More than 45% of Millennials would consider returning to work for a former employer … but the percentage is just 29% for Baby Boomer respondents.

As for why boomerang employees are becoming more common, a number of factors are at play:

  • Intense competition for certain technically advanced employees who may be in short supply makes poaching more common … and also intensifies the need for companies to respond in kind. In fields were strong talent is hard to come by, often the pool of workers is too small to summarily omit former employees from consideration.
  • Familiarity with a company’s organization, culture and ways of doing business reduces “ramp-up” requirements and the amount of training needed, when compared to bringing on a brand-new employee.
  • The “devil you know” factor: Even if a former employee possesses a few characteristics that are less-than-ideal, at least these are known quantities, as compared to a brand-new employee who may or may not be all that she or he seems to be on paper.

chairGoing forward, I suspect that boomerang employees will become even more prevalent than they are today.

To do well at that, companies might wish to look into maintaining open lines of communication with select former employees. It seems like a good way to keep choice workers “in the loop” and potentially available — and interactive/social media makes it easier to keep those channels open.

As things stands now, the results of this survey suggest that such channels are, at best, ad hoc rather than being part of a formal “alumni” communications strategy.

Addressing this point, Dan Schawbel, head of WorkplaceTrends, had this to say:

“In previous research we’ve done, we’ve found that Millennials are switching jobs every two years because they are searching for the job – and organization – of best fit. But this new study indicates that this younger generation is more likely to boomerang back when they’ve experienced other company cultures and realized what they’ve missed.”

Schawbel’s prediction? “We’ll see the boomerang employee trend continue in the future as more employees adopt a ‘free agent’ mentality – and more organizations create a stronger alumni ecosystem.”

What about you? Are you a boomerang employee? Or do you know colleagues who have done this? What are the pluses and minuses? Please share your thoughts with other readers here.

In the “right to be forgotten” battles, Google’s on the defensive again.

untitledSuddenly, the conflict between Google and the European Union countries regarding the censoring of search results has taken on even wider worldwide proportions.

This past week, the courts have upheld the French government’s data protection office (CNIL) order for Google to broaden the “right to be forgotten” by censoring search results worldwide — not just in Europe.

Google had appealed the initial CNIL ruling.

The CNIL rejected Google’s argument that a worldwide implementation of the European standard of censoring search results would mean that the Internet would be only as free as the “least free place.” (Think Belarus or Syria.)  But in its ruling, the CNIL noted that a country-by-country implementation of the “right to be forgotten” would mean that the right could be circumvented too easily.

While it’s true that more than 95% of Google searches in Europe are performed via European versions of the company’s search engine tool, such as google.fr and google.co.uk, identical searches can be performed easily using google.com, meaning that anyone trying to find “forgotten” information on an individual can do so easily, irrespective of the European standard.

file-and-forgetAs I blogged back in May, The European Court of Justice’s 2014 ruling meant that Google is required to allow residents of EU countries to delete links to certain harmful or embarrassing information that may appear about themselves in Google search results.

The directive has turned into a real thicket of challenges for Google.

What the definition of “harmed and embarrassing” is is somewhat amorphous, as the court’s ruling encompassed links to information ranging from excessive and harmful on one end of the scale all the way down to links that are merely outdated, inadequate or irrelevant.

Since the ruling went into effect, Google has had to field requests to remove more than one million links from European search results.

Link removal isn’t accomplished via some sort of “bot” procedure.  Instead, each request is considered on a case-by-case basis by a panel of arbiters made up of attorneys, paralegals and search engineers.

Approximately one-third of the links in question have been removed following panel review, while about half have remained in search results.

The rest – the real toughies – are still under review, and their status as yet unresolved.

Obviously, for this activity to spread from covering just European search engines to include potentially the entire world isn’t what Google has in mind at all.  (If Google could have its way, doubtless the whole notion of “the right to be forgotten” would be off the table.)

But the situation is getting pretty hot now. French authorities imposed a 15-day compliance deadline, after which Google could be fined nearly US$350,000.

Of course, the amount of that penalty pales in comparison to the cost Google would incur to comply with the directive.

But that fine is just the opening salvo; there’s no telling what the full degree of financial penalties might turn out to be for continued non-compliance.

I wrote before that it’s difficult to know where the world will eventually end up on the issue of censoring search engine results.  Today, I don’t think we’re anywhere closer to knowing.

China’s controversial product supplier pledge: An “on the ground” view from the Far East.

The business world is abuzz about the latest moves by China to regulate the behavior of U.S. and other foreign companies that choose to do business in that country.  What’s the real skinny?

contract

While much of the reporting and commentary has been decidedly scant on details, we can actually take a look at the official document that contains the various provisos the Chinese government is intending to impose on foreign companies.

Ostensibly, the declaration is aimed at “protecting user security.” Here are the six provisions that make up the declaration:

Information Technology Product Supplier Declaration of Commitment to Protect User Security

Our company agrees to strictly adhere to the two key principles of “not harming national security and not harming consumer rights” and hereby promises to:

#1.  Respect the user’s right to know. To clearly advise users of the scope, purpose, quantity, storage location, etc. of information collected about the user; and to use clear and easy-to-understand language in the user agreement regarding policies and details of protecting user security and privacy.

#2.  Respect the user’s right to control. To permit the user to determine the scope of information that is collected and products and systems that are controlled; to collect user information only after openly obtaining user permission, and to use collected user information to [sic] the authorized purposes only.

#3.  Respect the user’s right to choice. To allow the user to agree, reject or withdraw agreement for collection of user information; to permit the user to choose to install or uninstall non-essential components; to not restrict user selection of other products and services.

#4.  Guarantee product safety and trustworthiness. To use effective measures to ensure the security and trustworthiness of products during the design, development, production, delivery and maintenance processes; to provide timely notice and fixes upon discovery of security vulnerabilities; to not install any hidden functionalities or operations the user is unaware of [sic] within the product.

#5.  Guarantee the security of user information. To employ effective measures to guarantee that any user information that is collected or processed isn’t illegally altered, leaked, or used; to not transfer, store or process any sensitive user information collected within the China market outside China’s borders without express permission of the user or approval from relevant authorities.

#6.  Accept the supervision of all parts of society. To promise to accept supervision from all parts of society, to cooperate with third-party institutions for assessment and verification that products are secure and controllable and that user information is protected etc. to prove actual compliance with these commitments.

Often with China, there are “official” pronouncements … and then there’s what’s “really” going on behind the curtain.

So to find out the real skinny, I decided to ask my brother, Nelson Nones, who has lived and worked in East Asia for years.  Since Nelson’s business activities take him to China and all of the other key Asian economies on a regular basis, I figured that his perspectives would be well-grounded and worth hearing.  Here’s Nelson’s take:

Points 1 through 3 are fundamentally no different from the provisions of personal data protection laws already on the books in the 27 member states of the European Union, plus Australia, Hong Kong, Iceland, India, Japan, South Korea, Liechtenstein, Macau, Malaysia, New Zealand, Norway, Singapore, the Philippines, Taiwan and some U.S. states.  Nor do they materially differ from privacy policy best practices — so I would not see these as particularly onerous or unreasonable.

The key difference is that these points are not enshrined in law in Mainland China, so compliance is voluntary at the moment (as it was in Singapore until 2013) – presumably binding on only those companies that sign this declaration. 

News reports also indicate that China has asked only American technology companies to sign its Declaration of Commitment, implying that domestic Chinese companies aren’t necessarily held to the same standards — although if this is truly the case, it might actually put Chinese companies at a competitive disadvantage by enhancing the appeal of American technology products to discerning Chinese users.

Point 4 doesn’t generally fall within the scope of existing personal data protection laws, but in my view its provisions fall well within the QA and warranty commitments that any legitimate technology company should be prepared to make in today’s competitive environment.

Comparing Point 5 with legislation currently in force within the European Union, Australia, Hong Kong, Iceland, India, Japan, South Korea, Liechtenstein, Macau, Malaysia, New Zealand, Norway, Singapore, the Philippines, Taiwan and some U.S. states, this point lacks some really key definitions, including:  

  • Who exactly is a “data subject” who is entitled to personal (i.e. user) data protection?
  • Who exactly is the “data controller” who owns the user information that is being collected or processed?
  • Who might be the “data processor” who stores and/or processes user information on behalf of the “data controller”?

EU Data Protection DirectiveThe legislation and regulations I’ve reviewed in this realm provide very explicit (and varied) definitions of these entities. Unlike China’s Declaration of Commitment, for instance, the E.U. Data Protection Directive allows “data controllers” or “data processors” to transfer user data outside the E.U., as long as the country where the data is transferred protects the rights of “data subjects” as much as the E.U. 

It also defines which “data controllers” and “data processors” must comply with E.U. law, based on whether or not they store or process personal information with the E.U., or operate within the E.U. (regardless of where the data is actually stored or processed).

The requirement to keep sensitive user information within China’s borders, in the absence of permission from users or “relevant authorities” to transfer, store or process it elsewhere, could also be seen as an attempt by the Chinese government to enlist the help of American technology companies in circumventing the U.S. government’s ongoing Internet data-gathering programs.

If this attempt succeeds, it might further enhance the appeal of American technology products to discerning Chinese users. 

Point 6 is garnering the most headlines in the West because of the implied threat that cooperating with “third-party institutions for assessment and verification … to prove actual compliance with these commitments” could mean being forced to reveal source code or encryption algorithms.  

However, in classic Chinese style, none of that is actually spelled out. 

Green Dam Youth Escort ServiceA little history about this: Over the past decade, the Chinese government has put forward various proposals for controlling IT – and then abruptly withdrawing them in the face of domestic as well as global criticism. Here are two: 

As for implications, China’s Declaration of Commitment shouldn’t have significant impact on companies that aren’t in the consumer IT market.  At best, its first five points could potentially improve the competitiveness of American IT products in the  Chinese market.    

However, I would advise any tech companies that may be wondering what to do, to sit on their hands for a while. Law in China is always a “work in progress,” so the safest bet is to wait for that “progress” for as long as possible.

So there you have it – the view from someone who is smack in the middle of the business economy in East Asia. If you have your own perspectives to share on the topic, I’m sure other readers would be interested to hear them as well.

Is the Apple Watch already proving the naysayers wrong?

Apple WatchI’ve blogged recently about the market reception to the Apple Watch, which seemed to be somewhat less “ecstatic” compared with previous Apple product introductions — at least in the first few weeks after its unveiling.

Now we have several months behind us — as well as some field research that suggests that the Apple Watch is being very well-received by early adopters.

logoThe findings come courtesy of a research panel of 145 Apple Watch owners who were contacted in late July and early August 2015 by consumer market research company 451 Research. The research sample was drawn from the company’s ChangeWave network of ~25,000 business and technology professionals.

The overall satisfaction level with the Apple Watch among these respondents is ~83%, with ~54% stating that they are “very satisfied” with the product.

In terms of how well the watch is performing in relation to owners’ expectations, almost the same percentage (~79%) state that the Apple Watch is meeting them.

The three attributes of the Apple Watch that are most well-liked are these:

  • Notifications/alerts: ~49% mentioned
  • Health and fitness monitoring: ~41%
  • Design aesthetics of the product: ~30%

The three concerns about the Apple Watch mentioned most frequently are these:

  • Battery life is too short: ~37% mentioned
  • Tied to the iPhone: ~31%
  • Product is not waterproof: ~25%

The battery life issue really is one to “watch,” as it were:  Tracking surveys of Apple Watch owners reveal that more people are checking their battery status at least once per day than are checking their watch faces for the time (!).

Not surprisingly, the Apple Watch poses a competitive threat to more traditional digital watches, as more than four in five respondents report that the Apple Watch has replaced the traditional watches if they had worn one earlier.  (On the other hand, about one third of owners didn’t wear anything on their wrist at all before acquiring their Apple Watch.)

Fitness monitors: Odd man out?
Fitness monitors: Odd man out?

The popularity of the Apple Watch’s health and fitness monitoring capabilities portends problems for competing monitors as well. Nearly half of the Apple Watch owners surveyed by 451 Research reported that they have previously planned on purchasing a monitor, but have since decided not to, thanks to the Apple Watch’s functionality.

As for whether the Apple Watch is becoming an indispensible part of the fabric of daily life with these users as compared to being more of a novelty gadget, the behavior is looking a lot more like the former:

  • Use daily for health and fitness monitoring: ~79% of respondents reported
  • Send and receive text messages daily: ~63%
  • Check weather information daily: ~52%

Perhaps the best indication of how satisfied these early adopters are with the Apple Watch is how they responded to the question, “Would you recommend the Apple Watch to a friend or colleague?”

The answer? More than four in five respondents (~83%) answered in the affirmative: ~55% reported “very likely” and ~28% reported “somewhat likely.”

If consumer response continues along the same lines in the upcoming months, it may well mean that the Apple Watch is on the path to gaining impressive adoption figures — and proving the naysayers wrong.

The real proof will be in the sales figures, of course.  But seeing these indications of early adopters being quite satisfied ith the product’s performance — and willing to recommend it to friends and colleagues — is a very good first step.

If you have begun using an Apple Watch, I’m sure other readers would be interested to know what appeals to you most about it — and what attributes might not be living up your expectations. Please share your experiences here.

Six years on … and the U.S. ad economy is still in recession?

recession recoveryTwo reports from advertising research sources released in the past month reveal that the advertising field doesn’t appear to be rebounding in strongly – at least not to same degree as the economy as a whole.

One report, from U.S. Ad Market Tracker, is an index that pools electronic media buys processed by major agency holding companies and their brand marketers.

It’s true that this report shows an increase in the overall ad activity index year-over-year of about 18 points (it’s 184 today … 166 a year ago … and 100 back in the recession year of 2009).

But when we look at the breakdown where most of the advertising growth is coming from, it’s nearly all from a handful of categories: social media advertising, advertising on video, Internet radio, plus ad network marketplaces.

By contrast, search advertising is growing at a much slower rate, and the most “commoditized” segments – particularly online display advertising – are doing little better than treading water.

This isn’t the robust rebound that many business and ad industry observers were expecting to see by 2015.

advertisingOver at Kantar Media, the statistics are even less encouraging.

In fact, Kantar projects that the 2015 ad economy will underperform U.S. economic growth for the fifth straight year.

Considering how lethargic in general the U.S. economy has been over that period, to be growing at less than the average is almost an indictment of the industry.

That’s what Kantar Media Chief Research Officer Jon Swallen suggests:  a “streak that might have once seemed unimaginable, but now would seem par for the course.”

Second-quarter 2015 data released by Kantar estimates annualized measured media ad spending declines in the neighborhood of 4%.

More to the point, Kantar is seeing increases in just 7 of the 22 individual ad media categories it tracks, led by the same categories U.S. Ad Market Tracker identifies as the most healthy ones.

Perhaps a surprise — considering the overall disappointing numbers — is that Kantar has tracked two analogue categories as experiencing growth:  radio and out-of-home advertising.

But print continues to decline at pronounced rates, and Internet display advertising has also officially joined the ranks of media segments that are contracting.

Is the disappointing performance of advertising a function of a weak market overall?  Or is it the result of structural changes and the reallocation of promo dollars into different, in some cases non-advertising MarComm vehicles?

I’m not completely sure.  It’s true that certain advertising categories that are “newer” ones are attracting more attention (and more dollars).  But Kantar’s 2nd Quarter reporting of advertising expenditures by major industry category finds just one – one – segment that has experienced an overall increase year-over-year — pharmaceuticals:

Ad economy chart

When just one industry segment out of ten is showing an increase, it suggests more than just some restructuring or re-jiggering is going on. Instead, it’s just as likely that the U.S. advertising economy remains stuck in a recession, even if the overall economy has finally emerged from it.

What are your thoughts on the tepid advertising results? Please share your views with other readers.