It wasn’t raining when Noah built the Ark.
—Howard Ruff
All enterprises use information about their customers to make smarter decisions. But for most traditional marketing decisions and actions, information is really needed only at the aggregate, or market, level. That is, any marketer needs to know the average demand for a particular product feature within a population of prospective customers, or the range of prices that this market population will find attractive. The enterprise then uses this information to plan its production and distribution as well as its marketing and sales activities.
But building relationships with customers necessarily involves making decisions and taking actions at the level of the individual customer, using customer-specific information in addition to information about the aggregate characteristics of the market population. This is because a “relationship” inherently implies some type of mutual interaction between two individual parties. We cannot have a “relationship” with a population or group but only with another individual. So the competitor trying to win with superior customer relationship strategies needs first to know the individual identities of the customers who make up the traditional marketer’s aggregate market population. Then the enterprise will make different marketing, sales, distribution, and production decisions, and take different actions, with respect to different customers, to create better experiences and increase customer value, even within the same market or niche population.
We can see this in action. Husband asks wife if she saw the additional stories about gun control suggested on the New York Times Web site they each read that morning on their own computers. Wife answers with a laugh that those were the extra stories offered to him; she had seen suggestions for stories about stock market prospects in China. The items advertised were different, too, of course.
The essence of managing customer relationships is treating different customers differently; therefore, the first requirement for any enterprise to engage in this type of competition is simply to “know” one customer from another. However, identifying individual customers is not an easy process, and too often not a perfect one. It was not that many years ago when a British utility launched a December promotion to acknowledge its very best customers by mailing each of them a holiday greeting card. To the astonishment of its management, nearly 25 percent of these cards were returned to the company unopened in January. Apparently, many of the firm’s “most valuable customers” were actually lampposts. Until that time, this company’s management had equated electric meters with customers, comfortable in the knowledge that because they tracked meters, they also tracked customers. But lampposts don’t read mail or make decisions.
Most enterprises will find it difficult simply to compile a complete and accurate list of all the uniquely individual customers they serve, though some businesses and industries are more naturally able to identify their customers than others. Consider the differences among these businesses, and consider the advantage that would accrue to a company that’s able to identify individual customers and recognize each one at every contact:
Retail banks must know individual customer identities to keep track of each customer’s banking activities and balances. Historically, banks have been organized along lines of business, with credit cards, checking accounts, and home equity loans processed in completely different divisions. As a result, information about whether a branch banking customer is also a credit card customer often has not always been readily available to either separate division. More and more banks are recognizing the need to coordinate and integrate information across product divisions, to produce a complete relationship profile of the customer accessible to all divisions in real time.1 Westpac New Zealand Bank is using Bluetooth beacon connections and biometrics such as fingerprints along with traditional account numbers, ATM cards, and caller ID to identify customers in a way that delivers the most complete real-time picture of customer interaction with the bank. In addition, all banking products used by the customer (such as mortgages, retirement, checking accounts, investments, etc.) are tracked in one customer profile. While this capability is available at more and more financial services institutions, the goal for Westpac goes a step further; they want employees to use that data to anticipate individual customer needs.2
Consumer packaged goods companies sell their grocery and personal care products in supermarkets, drugstores, and other retail outlets. Although their true end customers are those who walk into the stores and buy these products, there is no technically simple way for the packaged goods companies to find out who these retail consumers are or to link their individual identities with their buying histories, except in some cases by using a “loyalty card” or other information-collection program. However, EdgeVerve offers a suite of services called Consumer Connect, a sensor-based way for retailers and consumer packaged goods companies all to monitor and share information about customer movement and what is bought off store display shelves by whom, in real time, if customers have given their individual permission.3 SK Telecom has also recently released Smart Shopper, an omnichannel marketing platform that allows “cartless shopping.” Upon entering the store, customers can use a special barcode scanner to add items to their virtual shopping cart. To check out, they confirm and pay for their purchases at a self-checkout counter, and the items will be delivered to their homes at a designated date and time.4
Identifying customers, therefore, is not usually very easy, and the degree of difficulty any company faces in identifying its own customers is largely a function of its business model and its channel structure. But to engage any of its customers in relationships, an enterprise needs to know these customers’ identities. Thus, it must first understand the limitations, make choices, and set priorities with respect to its need to identify individual customers. How many end-customer identities are actually known to the enterprise today? How accurate are these identities? How much duplication and overlap is there in the data? What proportion of all customer identities is known? Are there ways the enterprise could uncover a larger number of customer identities? If so, which customer identities does the enterprise want to access first?
With the explosion in customer touch points, slight variations in a customer’s profile can easily result in fragmented data about that customer. Furthermore, the data is constantly in flux. According to Neustar, each year,
Meanwhile, with rising privacy rules, publicly available information on individuals is declining, and therefore it’s harder to use public data to create and maintain a customer’s information file.9
To assess more accurately how much customer-identifying information it already has, an enterprise should:
Only after it assesses its current inventory of customer-identifying information should a company launch its own programs for gathering more. Programs designed to collect customer-identifying information might include, for instance, the purchase of the data, if it is available, from various third-party database companies; the scheduling of an event to be attended by customers; or a contest, a frequency marketing program, or some other promotion that encourages customers to “raise their hands.”
Sales contests and sponsored events are often designed for the specific purpose of gathering potential and established customer names and addresses. But to engage a customer in a genuine relationship, a company must also be able to link the customer to her own specific purchase and service transaction behavior. Analyzing past behavior is probably the single most useful method for modeling a customer’s future value, as we’ll see in Chapter 5, on customer differentiation, and Chapter 12, on analytics. So although a onetime contest or promotion might help a company identify customers it did not previously “know,” linking the customer’s identity to her actual transactions is also important.
Frequency marketing programs, when they are executed strategically, suit both purposes, providing not only a mechanism to identify customers, but also a means to link customers, over time, with the specific transactions they undertake. Such programs have been used for years to strengthen relationships with individual customers, but it’s important to recognize that a frequency marketing program is a tactic, not a strategy. It is an important enabling step for a broader relationship strategy because a frequency marketing program provides a company with a mechanism for identifying and tracking customers individually, but this will lead to a genuine relationship-management strategy only when the company actually uses the information it gets in this way to design different treatments for different customers.
Given that the purpose of identifying individual customers is to facilitate the development of relationships with them individually, we are using the word identify in its broadest possible form. What we are really saying is that an enterprise must undertake all of these identification activities:
Identification Activities
Technology is enabling enterprises to identify customers in ways never before imagined. Many businesspeople still hand out business cards, but computer contact databases and sophisticated customer information cloud-based data warehousing are far more important than physical cards for the same reason that public libraries long ago abandoned their card catalog systems: because card catalog systems cost much more than their electronic counterparts and are available for search only in the physical library building. Sophisticated electronic data systems allow library patrons to search a library’s holdings from anywhere and help the library cut its own costs at the same time.
Integrated computer databases don’t just reduce costs. More important, they also help identify patterns that aren’t visible when the data is kept in filing systems or in separate data silos. The more the company integrates data from all corners of the enterprise, even including the extended enterprise, the richer in value the customer information becomes in planning and executing customer-focused strategies.
The end customer of an enterprise is the one who consumes the product or service it provides. That said, sometimes it is more of an indirect relationship, which makes it more difficult to tag the customer and link information to her. Sometimes, a product or service might be purchased by one customer and used by another member of the household or by the recipient of a gift. And as we discuss later, sometimes an end user will be an employee of a company while it is the company’s purchasing department that actually buys the product. Regardless of these intermediary relationships, however, it is the end user who is at the top of the food chain and the end user whose relationship with the enterprise is most important, because this is the person whose needs will or won’t be met by the product.
A business-to-business (B2B) enterprise still must identify customers, and many of the issues are the same, but there are some important differences that merit additional consideration. For instance, when selling to business customers, the B2B enterprise must consider who will be on the other side of the relationship. Will it be the purchasing manager or the executive who signs the purchase order? Will it be the financial vice president who approved the contract? Or will it be the production supervisor or line engineer who actually uses the product? The correct way for an enterprise to approach a B2B scenario is to think of each of these individuals as a part of the customer base. Each is important in his or her own way, and each one should be identified and tracked. The greatest challenge for many businesses that sell to other businesses is identifying the product’s end users. Discovering who, within the corporate customer’s organization, puts a product to work (i.e., who depends on the product to do her job) is often quite difficult. Some methods for identifying end users include12:
B2B firms use many strategies to get to know the various role players within the corporations they are selling to, from end users to chief financial officers—setting up personal meetings, participating at trade shows, swapping business cards, sponsoring seminars and other events, inviting people to work-related entertainment occasions, and so forth. But the single most important method for identifying the “relationships within relationships” at an enterprise customer is to provide a service or a benefit for the customer that can really be fully realized only when the players themselves reveal their identities and participate actively in the relationship. Thus, even though relationship marketing has always been a standard tool in the B2B space, today’s new technologies are making it possible more than ever before to manage the actual mechanics of these individual relationships from the enterprise level. In so doing, the enterprise ensures that the relationship itself adheres to the enterprise, not just to the sales representative or other employee conducting the activity.
Can we identify—and recognize again and again—millions of customers? In the business-to-consumer (B2C) space, the technology-driven customer relationship management (CRM) movement has only recently made it possible even to conceive of the possibility of managing individual consumer relationships. But while managing relationships within the B2C space might be a relatively new idea, mass marketers have always understood that customer information is critical and that the possible ways of identifying customers are nearly limitless.
Certain technologies have made it possible to identify customers without their active involvement. ExxonMobil, the gasoline retailer, dispenses RFID microchips that can be carried around on the keychain of a customer who participates in its Speedpass campaign. When the customer drives up to a gas pump, the microchip device automatically identifies the customer and charges the customer’s credit card for the transaction. The customer is rewarded with a speedier exit from the gas pump (although she still must pump her own gas). The company, in turn, can identify each customer every time she buys gas at any ExxonMobil station and link that identification with every transaction.
Of course, few would deny that the Internet gave the biggest push to the customer relationship movement in the B2C arena. Not only did the World Wide Web provide tools to existing firms with which they could interact more effectively with their customers and identify an increasing number of them individually, but it also led to the creation of many new, Internet-based businesses with extremely streamlined business models based on direct, one-to-one relationships with individual customers, online.
Writer Stewart Alsop described the way Amazon.com led the way at the turn of the new century:
What Amazon.com has done [in 2001] is invent and implement a model for interacting with millions of customers, one at a time. Old-line companies can’t do that—I like Nordstrom, Eddie Bauer, Starbucks, and Shell, but they have to reach out to me with mass advertising and marketing. Amazon’s technology gives me exactly what I want, in an extraordinarily responsive way. The underlying technology, in fact, is revolutionizing the way companies do business on the Web.13
Clearly, in the Information Age, an enterprise can reach and communicate with individual customers one at a time, it can observe as customers talk to each other about the company, and it can follow strategies for its customer interactions that are based on relevant, customer-specific information stored in a customer database. The computer can now store millions of customer records—not just names and addresses, but age, gender, marital status and family configuration, buying habits, history, devices, and demographic and psychographic profiles. Individuals can be selected from this database by one, two, three, or more of their identifying characteristics. CRM expert Stan Rapp has said that the computer has brought about “three awesome powers”: the power to record, the power to find, and the power to compare.14
For all its power, however, the truth is that when it comes to customer-oriented activities, the computer is an underutilized technology at most businesses—not because companies don’t want to use it but because most customer data are simply not fit for use in an analytical database. The development of a database of customer information requires a data model—the tool required to bring data complexities under control. The data model defines the structure of the database and lays out a map for how information about customers will be organized and deployed.
After it has mined its existing customer databases and developed a plan to gather new customer information, the enterprise then decides how to tag its customers’ individual identities. Names are not always a sufficient customer identifier. More than one customer might have the same name, or a customer might use several different varieties of the same name—middle initial, nickname, maiden name, and so forth. To use a customer database effectively, therefore, it is usually necessary to assign unique and reliable customer numbers or identifiers to each individual customer record. It could be the customer’s e-mail address, phone number, a “user name” selected by the customer, or an internally generated identifier.
In addition to transaction details, other types of data generated from internal operations can make significant contributions. Information relating to billing and account status, customer service interactions, back orders, product shipment, product returns, claims history, and internal operating costs all can significantly affect an enterprise’s understanding of its customers. Directly supplied data consists of data obtained directly from customers, prospects, or suspects. It is generally captured from lead-generation questionnaires, customer surveys, warranty registrations, customer service interactions, Web site responses, or other direct interactions with individuals.
Directly supplied data consists of three obvious types:
In categorizing data contained in a customer database, it’s important to recognize that some data—stable data, such as birth date or gender—will need to be gathered only once. Once verified for accuracy, these data can survive in a database over long periods and many programs. Updates of stable data should be undertaken to correct errors, but, except for errors, stable data won’t need much alteration. In contrast, there are other data—adaptive data, such as a person’s intended purchases or even her feelings about a particular political candidate—that will need constant updating and cleansing. This is not a binary classification, of course. In reality, some data are relatively more stable or adaptive than other data. And part of the challenge comes from the fact that customers relate at different times to different parts of the organization: Web site (online marketing), bill paying (accounting), in-house (e.g., store management).
Ultimately, of course, the central purpose of collecting customer information is to enable the development of closer, more profitable relationships with individual customers by creating consistently better experiences for each of them. In many cases, these relationships will be facilitated by the availability to the enterprise of information that will make the customer’s next transaction simpler, faster, or cheaper. Remembering a customer’s logistical information, for instance, will make reordering easier for her, and therefore more likely. Remembering this type of information will also lead the customer to believe she is important to the company and that her patronage is valued.
Additionally, it’s important to “identify” customers to reduce the waste in serving them. For example, one data cleansing company helped a Fortune 500 consumer electronics firm match unidentified callers in real time with existing customer data, including additional data that could be appended to the current interaction, enabling 54 percent of unidentified callers to be identified in real time, saving $13.8 million in additional data work, and increasing customer satisfaction through better experiences.15 Some companies are also now able to identify callers in the first few seconds of a call through voice or speech recognition.16
In order to make any of this work, however, it is essential for the enterprise to establish a trusting relationship with the customer, so she feels free to share information. A vocal privacy-protection movement—perhaps more active in Europe than in North America—has been energized by the increasing role that individual information plays in ordinary commerce and the perceived threat to individual privacy that this poses. However, both practical experience and a number of academic studies have shown that the vast majority of consumers are not at all reluctant to share their individual information when there is a clear value proposition for doing so and when they trust the company. Therefore, if a company can demonstrate to the customer that individual information will be used to deliver tangible benefits (and provided the customer trusts the enterprise to hold the information reasonably confidential beyond that), then the customer is usually more than willing to allow use of the information. Trusting relationships or not, protecting customer privacy and ensuring the safety and security of customer-specific information are critical issues in the implementation of customer strategies and will be discussed in greater detail in Chapter 9.
The process of identifying customers in order to engage them in relationships requires that customer-identifying information be integrated into many different aspects of an enterprise’s business activities. It used to be that customer data could be collected over a period of time, and the customer database would be updated with revised profile and analytic information in batches. On weekends, perhaps, or late at night, information collected since the last update would be used to update the customer database. Increasingly, however, companies rely on Web sites and call centers to interact with customers, and this places a much greater emphasis on ensuring real-time access to customer-identifying information.
Enterprises must be able to capture customer information and organize it, aggregate it, integrate it, and disseminate it to any individual or group, throughout the enterprise, in real time. Technology is enabling enterprises to accelerate the flow of customer information at the most strategically timed moment. Enterprises strive for zero latency—that is, no lag time required—for the flow of information from customer to database to decision maker (or to a rules-based decision-making “engine”). The computer-driven processes of data mining, collaborative filtering, and predictive modeling will increasingly alter the process of forecasting how consumers behave and what they want,17 and, as more and more real-time interactivity continues to permeate all aspects of our lives, we can expect customers to demand more and more real-time service, which means enterprises will need real-time access to customer data.
In any service context, it is critical that an enterprise’s customer-facing people have ready access to customer-identifying data as well as to the records attached to particular customer identities. Making valuable customer information available to front-line, customer-facing employees, whether they work on board a passenger airliner, behind the counter at a retail bank branch, or at the call center for an automobile manufacturer, is an increasingly important task at all B2C enterprises.
Westpac New Zealand Bank, for example, uses a device-neutral platform to provide real-time data from all channels to both customers and employees. To assemble that customer profile, Westpac must identify customers at all digital and physical branches, and over all departments and 120 services. Earlier in the chapter, we described how the bank uses both traditional methods, such as account numbers, caller ID, ATM cards, as well as cutting-edge ID technologies, such as beacons that identify through smartphones and biometrics that can identify with a fingerprint. Because employees have real-time access to all customer interactions in every category and real-time financial analytics, they can pick up the “conversation” with an individual customer wherever it last left off and anticipate needs—to be proactive in relationships with customers rather than just reactive.
Chief Digital Officer Simon Pomeroy says automating the high-volume, low-value transactions through digital banking, combined with the real-time customer information and analytics, has allowed his employees to spend time on learning about customers and establishing relationships. Statistics bear this out. Interactions with customers are up from having conversations with 40 percent of customers in 2012, most of which were reactive, to interacting with 92 percent of customers in 2014, many of which were proactive.18
The first task to accomplish in building relationships with a customer is to recognize each one at every point of contact, across all products purchased or locations contacted, through every communication channel, over time, and link the information so that one view of each customer is established. Doing this requires knowing the identity of each customer at every contact point in the organization.
What will encourage customers to “raise their hands” and agree to be identified and recognized?
3.147.6.10