behavior

Results 201 - 225 of 614Sort Results By: Published Date | Title | Company Name
Published By: Evergage, Inc.     Published Date: Mar 10, 2016
Download this eBook TODAY and gain the insights necessary to support an effective intent-driven personalization strategy for your organization!
Tags : 
intent-based marketing, intent-driven personalization, behavioral analytics
    
Evergage, Inc.
Published By: EX Squared Solutions     Published Date: Jul 16, 2014
Learn how to create a digital storefront to adapt to multi-device consumers and see how you can reach the customers who are moving away from PC and increasingly using mobile devices for purchases.
Tags : 
exsquared, digital retailing, consumer behavior, interactive merchandising, mobile strategy, mobile marketing, multi device, storefronts
    
EX Squared Solutions
Published By: Eyeblaster, Inc.     Published Date: Apr 02, 2009
One of the big challenges faced by online marketers and agencies that handle large online budgets is maximizing conversions and optimizing online budgets at zero or minimum cost. This issue of the Eyeblaster Analytics Bulletin presents findings on conversions and a multitude of methods that can be deployed to ensure a better yield of successful digital campaigns.
Tags : 
eyeblaster, click-thru rate, conversion rate, format type, conversion rate, rich media, data capture, ctr, automatic optimization, conversion metric, behavioral sequencing, optimization, roi, post-click, post-impression, see-click-convert, see-delay-convert, recall, in-banner, e-commerce
    
Eyeblaster, Inc.
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Understanding HTTP and how these headers control behavior of web-based applications can lead to better end-user performance, as well as making it easier to choose an application acceleration solution that addresses the shortcomings of HTTP and browser-based solutions.
Tags : 
fundamentals of http, web-based applications, http, application acceleration solution, browser-based solutions
    
F5 Networks Inc
Published By: Fathom Business Events     Published Date: Oct 15, 2010
Powerful stories captivate us every day. NCM Fathom explores how businesses can drive revenue and build loyalty sharing their brand's story to compel audiences to change behavior and take action.
Tags : 
storytelling, cinema events, movie theater events, events, engagement
    
Fathom Business Events
Published By: FICO     Published Date: Nov 10, 2015
"ACG Michigan, a large auto insurance underwriter in the US state of Michigan, needed a user-friendly system that would enable its agents (internal and independent) to churn out precise and consistent policy quotes and underwriting decisions. They turned to FICO Blaze Advisor decision rules management system to create an enterprise decision management framework to execute decisions. Learn more on how FICO Blaze Advisor helped ACG Michigan automate its underwriting About FICO FICO (NYSE: FICO), formerly known as Fair Isaac, is a leading analytics software company, helping businesses in 90+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. The company's groundbreaking use of Big Data and mathematical algorithms to predict consumer behavior has transformed entire industries. FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, build more profitable customer relationships, optimiz
Tags : 
decision analytics, optimization, profitability
    
FICO
Published By: First Data     Published Date: Apr 25, 2013
Traditional direct mail campaigns often deliver anemic response rates and direct mail campaigns sweetened with discounts don’t fare much better. Poor results combined with escalating printing and mailing costs and changing consumer expectations means that businesses must find more effective ways to get consumers’ attention.
Tags : 
direct mail, gift cards, prepaid incentive, coupon, call to action, incentive cards, direct marketing, customer experience, lead generation, customer engagement, foot traffic, grand opening, customer data, consumer behavior, relationship marketing, loyalty program, direct response, mailing list, card activation, shopping patterns
    
First Data
Published By: Fitbit     Published Date: Jan 23, 2018
Social connectedness is essential to employee health. The need for social connections in ingrained in us from the day we are born. What’s more, humans are known to be naturally social animals and need to have relationships with others, both in our personal lives and in the workplace. But where did this desire for social connectedness come from, and what does it really mean for employees’ health and wellness? Download our white paper, “Social connectedness: The secret to employee health and happiness” to learn: • The science behind social connectedness • How social behaviors impact our health and the workplace • How to incorporate social technology into your wellness program You’ll also receive key takeaways on driving social engagement in your wellness program.
Tags : 
    
Fitbit
Published By: Fitbit     Published Date: Jan 23, 2018
How can a corporate wellness program get your employees motivated? Motivation is essential to maintaining positive behavior changes, especially when it comes to achieving health goals. But how do employees get motivated, and most importantly, stay motivate? Simply put—it depends on the person and why they want to get healthy. Download our white paper, “The truth about motivation and what makes healthy habits stick” to learn: • The ins and outs of motivation • The importance of motivational interviewing • What motivation means for wellness incentives You’ll also get your hands on motivational messaging tips to apply to the various fitness levels at your company. Get your team on a path to wellness today. Download the motivation whitepaper now!
Tags : 
    
Fitbit
Published By: Fitbit     Published Date: Nov 12, 2018
The secret to employee health and happiness. It's a fact: positive social interactions at work have been shown to boost employee health. Social connections are just as important in the workplace as they are in other aspects of life. Being surrounded by compassionate, friendly coworkers can boost productivity and commitment to the workplace. Check out our white paper on social connectedness to explore: ? The science of being social. ? How social behaviors impact our health. ? Key takeaways on driving social engagement as part of your wellness program.
Tags : 
    
Fitbit
Published By: Fitbit     Published Date: Jan 28, 2019
Vaccines. Antibiotics. Organ transplants. All medical breakthroughs which changed the face of health in the developed world. But while certain causes of death have been greatly reduced, chronic disease has emerged as the next big threat, and behavior change as the next blockbuster opportunity.
Tags : 
    
Fitbit
Published By: Fitbit     Published Date: Jan 28, 2019
There are many causes, but patient behaviors can play a large role in many chronic diseases. The 3-4-50 Framework, developed by the UK-based Oxford Health Alliance, states that tobacco use, poor diet and a sedentary lifestyle contribute to cancer, cardiovascular disease, chronic lower-respiratory disease and diabetes. Those four conditions cause 50 percent of deaths, many of them premature.
Tags : 
    
Fitbit
Published By: Forcepoint     Published Date: Apr 19, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.
Tags : 
risk, security, security programme, security, security application
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 03, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 04, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
    
Forcepoint
Published By: Forcepoint     Published Date: Jan 07, 2019
Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 04, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
"Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive"
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
We are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Watch this webcast where we examine the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
Tags : 
analytics, behavioral analytics, ueba, insider threat, cybersecurity, predictive analytics, behavior analytics, security analytics, risk, risk adaptive
    
Forcepoint
Published By: ForeSee Results     Published Date: Feb 05, 2007
With clickstream analytics, you know WHAT your online customers are doing online. But, do you know WHY? To learn how to take your web analytics to the next level by adding the WHY to the WHAT, download this free white paper on the value of adding customer satisfaction measurement to your behavioral web analytics.
Tags : 
website analytics, usability, customer satisfaction, foresee, foresee results, analytics
    
ForeSee Results
Published By: ForeSee Results     Published Date: Feb 05, 2007
To date it has been virtually impossible to find reliable and meaningful standard metrics for multi-channel customers that measure the influence of the online shopping experience on total revenues. Learn more about the Multi-Channel Value index (MCVI), a strategic metric developed by ForeSee Results that projects the contribution of the website to a multi-channel retailer's overall sales through a calculation based on the ACSI methodology.
Tags : 
website analytics, conversion analysis, brick-and-mortar, multi-channel, foresee, foresee results
    
ForeSee Results
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.