11. April 2018

Are you a mind reader?

mind reader 750x410

Are millennial men the right target group for a Pampers marketing campaign? Of course - if they have children. Anticipating what the customer wants is like mind reading. This is now possible by analyzing customer behavior and situations.

More and more products are being developed at an ever-increasing pace thanks to digitalization. The associated disadvantage for the customer is that this makes it increasingly difficult to choose. Marketing therefore needs to use new strategies and tools to support customers in the decision-making process. In the ideal scenario, the customer is offered a customized and personalized product that is exactly what they want or need.

Successful sales and marketing departments work with business intelligence (BI) tools and technologies that allow them to transform customer data into useful information. This is used to acquire new customers and maintain existing ones, for example, when developing personalized marketing campaigns, determining personalized prices, identifying attempts at fraud or predicting churn rates. Creating meaningful customer profiles is the key technique. The more diverse the data source, the more meaningful the profile.

Gathering relevant customer data

Data sources can be roughly divided into three categories: customer channels, internal systems and external systems. Customer channels, such as company websites or online shops, are the primary points of contact that help us to understand customer preferences and interests. Internal systems are less customer focused. They reveal purchasing history or the nature of the relationship between the company and the customer, for example. External systems, such as social media, provide a broader view of the customer and give their actions a wider context.

Handling a variety of sources requires data to be integrated into analysis or BI platforms in an application-specific manner. Customer channels are usually connected in real time to trigger actions during the user session. Other data sources require on-demand integration or import via batch processing, for example. Whatever the integration method, there are two crucial points: Firstly, it needs to be possible to associate processed information directly with a customer. Secondly, data must be collected as soon as possible using an incremental approach. In this way, initial results can be obtained quickly and results can beconstantly improved using agile methods.

Customer profiles comprise all customer-related data. Groups (clusters) are formed from customers with corresponding characteristics, such as similar goals or the same marital status. These are described using virtual representatives, known as personas. They include names, photos and backstories. Example: To identify the relationships between different purchases, a BI specialist uses an affinity analysis to examine an online shop’s entire sales. He observes that a significant number of purchases include Pampers and beer. These sales correspond to the core characteristics of “Dave”, the persona of a young father who shops frequently. To simplify this persona’s user journey, Pampers are promoted automatically if beer is added to the shopping cart. But is Dave actually a father? It is necessary to incorporate several data sources, including social media, to get an unequivocal answer to this question.

From customer profiles to customer clusters

A customer profile is essentially nothing more than a multidimensional vector, with each data source adding a further dimension. A range of techniques and algorithms are needed to identify clusters from these vectors. Finding the right mix of algorithms and techniques, and setting their parameters, is an iterative process. The k-means algorithm is one of the most widely used. In this process, observations (an n-dimensional vector) are assigned to clusters on a continuous basis. These observations might be customer interests identified via customer channels, purchasing patterns or level of income, or the internally identified risk type. However, they also include parameters, such as travel habits or marital status, which are identified via external systems and are not directly related to the company.

Dave’s persona becomes more defined while experimenting with this data. It is possible to deduce that he is trying to save money from his middle-class income to secure his children's financial future. Therefore, a long-term risk-free investment product or life insurance would interest him.

From a clear picture to successful actions

Once significant clusters have been identified, products and services suitable for these customer clusters need to be determined. Marketing campaigns are designed using all the information about clusters and the corresponding customers, and these are tested and verified using A/B testing. Identifying test customers to validate different actions is at the heart of A/B testing. Group A receives an email newsletter with general information about life insurance. Group B receives a personalized email. Group C is shown an investment idea on their preferred channel. At the end of the test cycle, analysis will determine which action was the most successful (new life insurance policies taken out).

Are you ready for the next step?

Therefore, from a technical point of view, mind reading is already possible today. It is an iterative process that consists of collecting relevant user data, segmenting customers into clusters, developing and validating marketing actions, resulting in a global rollout. Modern technologies and exploratory approaches will support you to design the simplest process possible, allowing you to read your customers’ minds.


Need more reading material? This article was originally published in the 2017 edition of the ti&m special titled "Our digital identities - let's get personal". You can download the entire magazine for free here.

Dorian Tanase
Dorian Tanase

Dr. Dorian Tanase has more than 15 years of IT experience. His current focus is on big data and analytics solutions. He graduated from ETH Zurich with a degree in complex systems.

Ähnliche Artikel

Digitalisierung total - die Vernetzung der Dinge
Digitalisierung total - die Vernetzung der Dinge

Editorial: 1 Milliarde PCs, 5 Milliarden Smartphones und geschätzt zwi­schen 50 und 100 oder mehr Milliarden vernetzte Dinge, das sind die prognostizierten Zahlen per 2020. Die neue Ausgabe vom ti&m special beleuchtet, inwiefern sich reale und virtuelle Welt immer mehr vermischen und welchen Einfluss FinTech-Unternehmen und Start-ups dabei haben.

Mehr erfahren
«Das Gesetz unterscheidet nicht zwischen in- und ausländischen Clouds»

Viele Banken haben erst begonnen, sich intensiver mit dem Thema Cloud auseinanderzusetzen. Noch gibt es aber Bedenken, vor allem wie sich die Cloud mit dem Bankgeheimnis vereinbaren lässt. Antworten dazu gibt Martin Hess, Leiter Digitalisierung und Wirtschaftspolitik sowie Direktionsmitglied der Schweizerischen Bankiervereinigung.

Mehr erfahren
Digital first! Jetzt wirklich?

Wie man Digitalisierungsinitiativen zum Erfolg führt, indem man den Menschen miteinbezieht. Der Energiedienstleister ewz überträgt Verantwortung in die Teams, um den sich verändernden Kundenbedürfnissen gerecht zu werden.

Mehr erfahren
Authentication vs. Authorization with OAuth, Does It Really Matter?
Authentication vs. Authorization with OAuth, Does It Really Matter?

While in the security field the terms authentication and authorization have a clearly defined definition, with the introduction of concepts such as “delegated authorization” ambiguity might arise. However, it seems that we know what we intend and therefore should we even bother with such discussions?

Mehr erfahren
Dog 750x410
On the Internet, Nobody Knows You're a Dog – Identification with OpendIDConnect, the Prelude to Unique OAuth Authorization

When considering authentication, the first thing people think of is identity. However, with the use of new authentication frameworks applied to current business cases, essential security requirements seem to get neglected. Thus, it might just happen that we lose our identity on the internet. This article is part of a series based on different user’s feedback dealing with fundamental security concepts applied to the applicability of authentication and authorization protocols such as OAuth and OpenIDConnect.

Mehr erfahren