Goodbye 3 Martini Lunches Hello Social CRM
posted by Anna Mar, June 20, 2011The days of three martini lunches with commission sales people are over.
New generations of consumers don't need a handshake and a smile to make large purchases. That's not to say that sales will become less social. On the contrary, companies will need to be more socially engaged with customers — the age of the social CRM has arrived.
Social CRM Capabilities
The theoretical applications of social CRM are virtually endless. For example:Market Research
Markets are social constructs — what better way to research market conditions than with social software.Social CRM enables ad, product, competitor and consumer research.
Brand Communities
Promote brands by engaging customers by demographic, interest, industry and community.Business Development
Social CRM facilitates product development and sales planning.Publicity
Social technologies are emerging as commercially significant publicity tools.Pricing
Engage consumers on pricing — negotiate and determine price sensitivities.Relationship Marketing
Nurture relationships with existing customers and leads.Advertising
Crowdsource ads and deliver via social tools.Loyalty
Social CRM engages customers on products, brand, loyalty programs, promotions and customer service.A Better World?
Past technological advances in marketing triggered by cheap print ads and television were widely criticised for:- creating a superficial consumer society
- manipulating people's weaknesses, emotions and desires
- enabling propaganda
- targeting children etc ...
Marketing driven by powerful Social CRM software has significant potential to drive sales — it also has great potential for consumer exploitation.
Recently on Simplicable
8 Enterprise Architecture Risksposted by Anna MarEnterprise Architecture (EA) is supposed to help manage IT risks — but is it possible that EA itself introduces new risks? |
Security Through Obscurityposted by Anna MarSecurity through obscurity is generally considered a bad idea ... |
IT Security Guideposted by John SpaceyA guide to information security including cheat sheets, best practices and checklists. |