A Comprehensive Analysis of Permission Marketing

Godin (1999) has proposed a new idea- permission marketing. Here, consumers provide marketers with the permission to send them certain types of promotional messages. This is seen as reducing clutter and search costs for the consumer while improving targeting precision for marketers. This paper makes three contributions: First, a critical analysis of the concept and its relationship to existing ideas in the marketing literature is discussed. Second, a taxonomy of four models used to implement permission marketing today, direct relationship maintenance, permission partnership, ad market and permission pool, is presented. Permission intensity is seen as a key differentiator among models. Finally, a comprehensive conceptual cost-benefit framework is presented that captures the consumer experience in permission marketing programs. Consumer interest is seen as the key dependent variable that influences the degree of participation. Consumer interest is positively affected by message relevance and monetary benefit and negatively affected by information entry/modification costs, message processing costs and privacy costs. Based on this framework, several empirically testable propositions are identified.

[1]  B. J. Pine,et al.  Making mass customization work , 1993 .

[2]  J. Sheth,et al.  Relationship marketing in consumer markets: Antecedents and consequences , 1995 .

[3]  Louisa Ha Advertising clutter in consumer magazines: dimensions and effects , 1996 .

[4]  Terence A. Oliva,et al.  A Catastrophe Model for Developing Service Satisfaction Strategies , 1992 .

[5]  Andrew Whinston,et al.  The Economics Of Electronic Commerce , 1997 .

[6]  James E. Haefner,et al.  Public Attitudes Toward Advertising: More Favorable Than You Might Think , 1998 .

[7]  Donna L. Hoffman,et al.  New metrics for new media: toward the development of Web measurement standards , 1997, World Wide Web J..

[8]  X. Drèze,et al.  Internet advertising: Is anybody watching? , 2003 .

[9]  Regis McKenna,et al.  Relationship Marketing: Successful Strategies For The Age Of The Customer , 1991 .

[10]  Kevin Lane Keller Conceptualizing, Measuring, and Managing Customer-Based Brand Equity , 1993 .

[11]  F. Dwyer,et al.  Developing Buyer-Seller Relationships , 1987 .

[12]  J. Phelps,et al.  Privacy Concerns and Consumer Willingness to Provide Personal Information , 2000 .

[13]  G. Day Managing market relationships , 2000 .

[14]  G. Tellis Effective Frequency: One Exposure or Three Factors? , 2006 .

[15]  George R. Milne,et al.  Avoiding Misuse of New Information Technologies: Legal and Societal Considerations , 1994 .

[16]  George R. Milne,et al.  Trust and Concern in Consumers’ Perceptions of Marketing Information Management Practices , 1999 .

[17]  K. Sheehan,et al.  Dimensions of Privacy Concern among Online Consumers , 2000 .

[18]  R. Bharat Rao,et al.  Browsers or Buyers in Cyberspace? An Investigation of Factors Influencing Electronic Exchange , 2006, J. Comput. Mediat. Commun..

[19]  Daniel R. Shiman When e-mail becomes junk mail: The welfare implications of the advancement of communications technology , 1996 .

[20]  A. Kambil Electronic Commerce: Implications of the Internet for Business Practice and Strategy , 1995 .

[21]  R. Bagozzi Marketing as Exchange , 1975 .

[22]  David A. Aaker,et al.  The Effects of Sequential Introduction of Brand Extensions , 1992 .

[23]  H J Van Peenen,et al.  Net worth. , 1993, American Journal of Medicine.

[24]  M. E. Gordon,et al.  Direct Mail Privacy-Efficiency Trade-offs within an Implied Social Contract Framework , 1993 .

[25]  Jule B. Gassenheimer,et al.  Marketing and Exchange , 1987 .

[26]  D. Aaker Building Strong Brands , 1995 .

[27]  D. Hoffman,et al.  Marketing in Hypermedia Computer-Mediated Environments: Conceptual Foundations , 1996 .

[28]  Anthony D. Miyazaki,et al.  Internet Privacy and Security: An Examination of Online Retailer Disclosures , 2000 .

[29]  Giles,et al.  Searching the world wide Web , 1998, Science.

[30]  Jinwoo Kim,et al.  Toward the optimal link structure of the cyber shopping mall , 2000, Int. J. Hum. Comput. Stud..

[31]  M. Culnan Protecting Privacy Online: Is Self-Regulation Working? , 2000 .

[32]  C. Lee Giles,et al.  Accessibility of information on the web , 1999, Nature.

[33]  Kevin Lane Keller,et al.  Effects of Quality and Quantity of Information on Decision Effectiveness , 1987 .

[34]  H. Beck,et al.  Jobs on the wire: In search of the perfect labor market , 1999 .

[35]  Jagmohan S. Raju,et al.  The Effect of Package Coupons on Brand Choice: An Epilogue on Profits , 1996 .

[36]  Anita M. McGahan,et al.  Competition to Retain Customers , 1994 .

[37]  J. K. Latting,et al.  Diffusion of computer-mediated communication in a graduate social work class: lessons from “the class from hell” , 1994 .

[38]  Robert C. Blattberg,et al.  Sales Promotion: Concepts, Methods, and Strategies , 1990 .

[39]  Jan H. Samoriski Unsolicited commercial e‐mail, the internet and the first amendment: Another free speech showdown in cyberspace? , 1999 .

[40]  Eric T. Bradlow,et al.  The Little Engines That Could: Modeling the Performance of World Wide Web Search Engines , 2000 .

[41]  Robert C. Blattberg,et al.  Interactive Marketing: Exploiting the Age of Addressability , 1991 .

[42]  Wendell R. Smith Product Differentiation and Market Segmentation as Alternative Marketing Strategies , 1956 .

[43]  Don Peppers,et al.  The One to One Future: Building Relationships One Customer at a Time (Будущее персонализации: построение взаимоотношений с одним клиентом) , 1993 .

[44]  Mary Ellen Gordon,et al.  A segmentation study of consumers’ attitudes toward direct mail , 1994 .

[45]  Maureen Morrin,et al.  The Impact of Brand Extensions on Parent Brand Memory Structures and Retrieval Processes , 1999 .

[46]  Steven M. Shugan The Cost Of Thinking , 1980 .

[47]  William L. Goffe The Economics of Electronic Commerce , 2000 .

[48]  D. Soman The Illusion of Delayed Incentives: Evaluating Future Effort–Money Transactions , 1998 .

[49]  Ramayya Krishnan,et al.  CMU-WEB: A Conceptual Model for Designing Usable Web Applications , 1999, J. Database Manag..

[50]  S. Godin Permission Marketing: Turning Strangers Into Friends And Friends Into Customers , 1999 .

[51]  S. Fournier,et al.  Preventing the premature death of relationship marketing. , 1998, Harvard business review.

[52]  K. Sheehan,et al.  Flaming, Complaining, Abstaining: How Online Users Respond to Privacy Concerns , 1999 .

[53]  Don E. Schultz From the editor , 1994 .

[54]  R. Petty Marketing without Consent: Consumer Choice and Costs, Privacy, and Public Policy , 2000 .

[55]  Bernard J. Jaworski,et al.  Information Processing from Advertisements: Toward an Integrative Framework , 1989 .

[56]  K. Grunert Automatic and Strategic Processes in Advertising Effects , 1996 .

[57]  Vijay Mahajan,et al.  Advertising Pulsing Policies for Generating Awareness for New Products , 1986 .

[58]  David J. Reibstein,et al.  Factors Affecting Coupon Redemption Rates , 1982 .

[59]  J. Sheth,et al.  The antecedents and consequences of customer-centric marketing , 2000 .

[60]  R. Blattberg,et al.  Database marketing , 1997 .

[61]  Robert C. Blattberg,et al.  Identifying the Deal Prone Segment , 1978 .

[62]  T. J. Reynolds,et al.  A means-end analysis of brand persuasion through advertising , 1995 .