Preview

Research Methods Ch. 2

Powerful Essays
Open Document
Open Document
1905 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Research Methods Ch. 2
Chapter 2: The Marketing Research Process and Proposal
This chapter provides the overview of the research process (scientific research process)
Changing View of the Market Research Process
1) Data for interpretation
Primary data: information that is collected specifically for a current research problem or opportunity.
Secondary Data: growing emphasis on secondary data. Information previously collected for some other problem or issue → stored in a data warehouse to help understand bus problems
Building databases of customer information to serve more effectively
2) Harder to get information on people
Gatekeeper technologies: means of protecting one’s privacy against intrusive marketing practices (ex: caller ID, automated screening)
People enable cookies, must provide opt in/opt out opportunities when soliciting business or collecting information
3) Expansion into global markets
New set of cultural issues force of cultural issues, also data collection, data interpretation and information management activities.
4) Play a role in strategy development → used to identify new business opportunies, develop new products, service and deliver ideas
Information Research Process: a systematic approach to collecting, analyzing, interpreting and transforming data into decision making information
Applicability of the research process, solving problems and creating opportunities
Determining the Need for Information Research
Existence of the problem is the primary responsibility of the decision maker (not researcher) → recognize that more information is needed to make good plans of actions
Situations when Marketing Research is not Needed
Information is already available
Insufficient time to get research activities done
Inadequate resources, limitations in money, manpower or facilities
Cost outweigh the value
Initial Research question Can the problem be resolved using existing informational and managerial judgment? → Secondary or primary data

You May Also Find These Documents Helpful

  • Good Essays

    When using sound judgment it is best to accumulate fundamental data that is straightforwardly identified with the issue. Doing this will help one to better comprehend what should be done in tackling the issue, and will likewise create thoughts for a conceivable arrangement.…

    • 1255 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Go get it

    • 419 Words
    • 2 Pages

    3. Using the limited information available (i.e., the strategic direction you saw in the commercial and the CEO’s dissatisfaction with how it addresses sales growth), define the research problem.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Research Methodology

    • 395 Words
    • 2 Pages

    By highlighting gaps in provision, services providers such as the NHS are able to see the weaknesses in their practice and…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Research Methods

    • 1624 Words
    • 5 Pages

    5. Conduct research, Interview.University of Texas at Austin, Instructional Assesment Resources. 2007. Available at: http://www.utexas.edu/academic/ctl/assessment/iar/research/plan/method/interview.php. Last visited on: 23 February, 2014.…

    • 1624 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Ftc vs Google

    • 745 Words
    • 3 Pages

    (1) Its collection and use of private information and its customers’ control over that information…

    • 745 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Privacy is a growing concern in the United States and around the world. As we increasingly use the Internet and the seemingly boundary less options for collecting, saving, sharing, and comparing information trigger consumer’s worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives.…

    • 1849 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    In addition to the lack of fair information practices followed by database marketers, other privacy issues exist. In particular, the Internet has made it possible for organizations to gather information without the immediate knowledge of consumers (Caudill and Murphy 2000; Sheehan and…

    • 619 Words
    • 3 Pages
    Good Essays
  • Good Essays

    For most Americans, browsing, shopping and messaging online have all become daily activities that have given us more convenience and the ability to reach out farther across the world. As we utilize the internet a trail of data begins to accumulate. Internet service providers, advertising networks, and hackers track websites that online users visit, and collect detailed data of interactions on them. The personal data that online users provide and store online is not legally protected as files and records privately kept in their homes. Personalized and tailored information has become a dependable feature for online users, but companies are not communicating clearly about the options they have to keep their personal data within a clearly accessible environment. I believe that the American public has a right to know where advertisers keep their personal data on the internet.…

    • 1342 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Paycom Marketing Plan

    • 3233 Words
    • 13 Pages

    “Individual Control: Consumers have a right to exercise control over what personal companies collect from them and how they use it (Kloesk, 2012).” Going forward, companies will have to present consent as well as choices to the consumer about the data that is being collected, whereas before, consumers have been unaware of what type of data was being collected and how it was being used.…

    • 3233 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Consumers have more to fear than just a breach of their financial information. They have to be wary of companies that change privacy policies without notice, publish their personal email contacts without consent, and sell their personal information to advertisers for a profit. In fact, companies are continually finding new ways to leverage the customer data they control by analyzing customer buying trends to discover new insights, which they can sell for a profit. In addition, with the rise of the Internet of Things, the data available about consumer habits is set to increase dramatically. The data is collected through accessing a variety of online and offline consumer activities revealing personal information disclosed in connection with such activities. n22 These activities include: purchasing products online; browsing the Internet; filling out a form or survey to get a coupon; social media; subscribing to websites; or mobile…

    • 1380 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Secondary Data

    • 2025 Words
    • 9 Pages

    A variety of secondary information sources is available to the researcher gathering data on an industry, potential product applications and the market place. Secondary data is also used to gain initial insight into the research problem. Secondary data is classified in terms of its source – either internal or external. Internal, or in-house data, is secondary information acquired within the organization where research is being carried out. External secondary data is obtained from outside sources. The secondary information will provide a useful background and will identify key questions and issues that will need to be addressed by the primary research.…

    • 2025 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Google is by far the most popular search engine in the world and is very widely used across the word by millions of users. Google’s business model is advertising and gathers personal data though user login identity. The gathered personal data is used to fine-tune advertising to the user’s needs and preferences. Though the personal data collected is for advertising purpose and stores this information in the Google database. Google is committed to providing privacy for its users their own advertises. This is evident as Google denies a third party to access its user personal identifying information to the extent that denied the Department of justice access to two months of data collected by Google to combat child pornography, Google argued that they had assured its customers that all personal information would be confidential and leaking information of providing those information readily available would be violate user trust. Users that d not want to want to participate in the tracking activities have the option of disabling Google conversion tracking cookies in the browser. Thus users have the option to keep their personal information confidential and limit goggles use of personal data.…

    • 671 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sony Playstation Case

    • 527 Words
    • 3 Pages

    Privacy protection has been a public policy concern for decades. However, rapid technological changes, the rapid growth of the Internet and electronic commerce, and the development of more sophisticated methods of collecting, analyzing, and using personal information have made privacy a major socio-political issue in the U.S., Europe, and other areas. Privacy issues have attracted the attention of the media, politicians, government agencies, businesses, and privacy advocates. In addition, the public is becoming increasingly sensitized to the protection of their personal information. Nonetheless, some people appear to be willing to trade-off various degrees of personal privacy for discounts on merchandise, free computer hardware, software, or e-mail, and other benefits.…

    • 527 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Online Privacy

    • 542 Words
    • 3 Pages

    A technology writer, Anick Jesdaunun Jesanun discuses “ These five tips will help protect privacy online.” The article was displayed on March 17,2012, within the Bakersfield Californian. Anick reflects on how advertisement will now become more personal, with this new policy, which it says to help the average citizen. This is not the target but business for the Google company. She provides tips to help protect users such as: managing what is sign-in, reviewing what Google knows, taking advantage of browsers privacy modes, using anonymizers and staying offline.…

    • 542 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    There are two types of data can be collected for the research, which are primary and secondary data.…

    • 606 Words
    • 3 Pages
    Good Essays