Skip to main content

Viral Marketing

  • Chapter
  • First Online:
IT Security Management

Abstract

This chapter points out who is the IT security team target audience, why and how they should communicate their message and which messages they should propagate. We complement these three aspects with references to marketing and psychology literature that provides security leaders with useful tips to sell security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See Section 1.12.

  2. 2.

    Information assurance, a broader term than information security, delivers a suitable level of protection for the organisation’s information (Ezingeard et al. 2007, pp. 96–118).

  3. 3.

    To support the business with their IT security advice and actions. See Section 1.19.

  4. 4.

    See Section 1.13.

  5. 5.

    See Section 1.19.

  6. 6.

    For example, an unaware user double clicking on an email attachment could set into motion a destructive piece of malware in the corporate network.

  7. 7.

    ENISA (2006), p. 52.

  8. 8.

    The IT security incident database we proposed in Section 1.15 could be of help in this scenario.

  9. 9.

    Kotler (2003), pp. 443–452.

  10. 10.

    One-way communication. See Section 7.2.

  11. 11.

    According to Kotler (2003), p. 15, the marketing mix is a set of marketing tools (product, price, promotion and place) that a firm uses to pursue its marketing objectives in the target market.

  12. 12.

    The 7 Ps of the “extended marketing mix” of Boots and Bitner expands the number of variables to control from four in the original marketing mix to seven. Extracted from http://www.12manage.com/methods_booms_bitnerPs.html. Last accessed 28-09-2009.

  13. 13.

    Albrechtsen and Hovden (2009), pp. 477 and 487.

  14. 14.

    Albrechtsen and Hovden (2009), p. 484.

  15. 15.

    Albrechtsen and Hovden (2009), p. 481.

  16. 16.

    The manufacturer uses advertising and promotion to induce customers to ask intermediaries for the product (Kotler 2003, p. 511).

  17. 17.

    See Section 10.13.

  18. 18.

    Albrechtsen and Hovden (2009), p. 484.

  19. 19.

    Albrechtsen and Hovden (2009), p. 483.

  20. 20.

    See Section 1.15.

  21. 21.

    Albrechtsen and Hovden (2009), p. 488.

  22. 22.

    See Section 7.11.

  23. 23.

    Albrechtsen and Hovden (2009), p. 487.

  24. 24.

    Albrechtsen and Hovden (2009), p. 484.

  25. 25.

    Proximity outpowers similarity (Gladwell 2000, p. 35).

  26. 26.

    See Chapter 4.

  27. 27.

    See Section 2.3.

  28. 28.

    Albrechtsen and Hovden (2009), p. 478.

  29. 29.

    Such as the case of COSO (2004), pp. 1–103.

  30. 30.

    From marketing lectures prepared by Stephen Lee and Robert Hattemer (Henley Management College MBA, 2006).

  31. 31.

    Kotler et al. (2004), p. 183.

  32. 32.

    Kotler et al. (2004), pp. 181–183.

  33. 33.

    Based on its potential to contribute to a secure organisation.

  34. 34.

    See Blythe (2006), p. 204.

  35. 35.

    See Sections 4.2, Sections 4.3 and Sections 4.4.

  36. 36.

    See Section 1.15.

  37. 37.

    The threat to outsource IT and IT security services is growing.

  38. 38.

    A potential argument against security tasks taken over by other IT teams.

  39. 39.

    Adopted from Kotler (2004), pp. 13 and 29.

  40. 40.

    According to Gronroos (1996), pp. 5–14.

  41. 41.

    See Section 5.10.

  42. 42.

    Gladwell (2000), pp. 38–46, refers to these individuals as connectors.

  43. 43.

    More about viral marketing in wikipedia. Available at http://en.wikipedia.org/wiki/Viral_marketing. Last accessed 20-11-2009.

  44. 44.

    A possible way to obtain this information could be checking the logs of the remote access infrastructure: Who access it most frequently?

  45. 45.

    See Section 2.3.

  46. 46.

    Privacy filters also benefit users’ sight. Although not security related, team members can also use this argument.

  47. 47.

    American author of business and marketing books.

  48. 48.

    Gladwell (2000), pp. 38–46.

  49. 49.

    Win-win deals that increase in value between the provider and the customer (Bird 2000, p. 30).

  50. 50.

    See Section 1.19.

  51. 51.

    Term coined by Jay Conrad Levinson (1984) according to http://en.wikipedia.org/wiki/Guerrilla_marketing. Last accessed 20-09-2009.

  52. 52.

    See the red team in Section 4.10.

  53. 53.

    Guerrilla marketing teams revolve more on human psychology than current incident response teams do.

  54. 54.

    According to Gladwell (2000), pp. 25 and 139.

  55. 55.

    Cyber-attacks that target software installed on users’ workstations. See SANS (2009b). Last accessed 29-09-2009.

  56. 56.

    See Section 10.5.

  57. 57.

    See Section 4.10.

  58. 58.

    See Chapter 8.

  59. 59.

    See Section 7.2.

  60. 60.

    See Section 5.2.

  61. 61.

    Punset (2007), pp. 40–47.

  62. 62.

    Ariely (2008), p. 4.

  63. 63.

    Ariely (2008), “The context of our character”, Chapters 11 and 12.

  64. 64.

    Ariely (2008), p. 212.

  65. 65.

    Always following the personal data protection legislation that applies to the organisation. We recommend to seek legal advice beforehand.

  66. 66.

    Ariely (2008), Chapter 2, “The fallacy of supply and demand”, and Chapter 3, “The cost of zero cost”.

  67. 67.

    This happens for example with medicines.

  68. 68.

    Kahneman and Tversky (2000), p. 301.

  69. 69.

    See Section 2.7.

References

  • Albrechtsen, E., Hovden, J.: The information security digital divide between information security managers and users. Comput. Secur. 28, 476–490. Published by Elsevier (2009)

    Google Scholar 

  • Ariely, D.: Predictably Irrational. Harper Collins, New York (2008)

    Google Scholar 

  • Bird, D.: Commonsense Direct Marketing, 4th edn. Kogan Page, London (2000)

    Google Scholar 

  • Blythe, J.: Principles & Practice of Marketing. TL EMEA Higher Education, p. 204 (2006)

    Google Scholar 

  • COSO: Enterprise Risk Management Framework – Executive summary – Exposure Draft for Public Comment, pp. 1–103. Downloadable after purchase from http://www.coso.org/-ERM.htm, draft retrieved 2006 (2004)

  • ENISA European Network and Information Security Agency: A Users’ Guide: How to Raise Information Security Awareness, p. 52. ENISA (2006)

    Google Scholar 

  • Ezingeard, J.N., McFadzean, E., Birchall, D.: Mastering the art of corroboration: a conceptual analysis of information assurance and corporate strategy alignment. J. Enterprise Inform. Manage. 20(1), 96–118 (2007)

    Article  Google Scholar 

  • Gladwell, M.: The Tipping Point: How Little Things Can Make a Big Difference, p. 132. Little Brown, Boston (2000)

    Google Scholar 

  • Griffin, J.: Customer Loyalty: How to Earn It, How to Keep It, 2nd edn. (published in 2002), pp. 202–215. Wiley, New York (1995)

    Google Scholar 

  • Gronroos, C.: Relationship marketing: strategic and tactical implications. Manage. Decis. J. 34(3), 5–14. Published by MCB UP (1996)

    Google Scholar 

  • Kahneman, D., Tversky, A.: Choices, Values and Frames. Cambridge University Press, New York (2000)

    Google Scholar 

  • Kotler, P.: Marketing Management, International edition, 11th edn, pp. 443–452. Prentice Hall, New Delhi/Upper Saddle River (2003)

    Google Scholar 

  • McCorkell, G.: Direct and Database Marketing, p. 68. Kogan Page, London (1997)

    Google Scholar 

  • Punset, E.: The Happiness Trip. Chelsea Green, White River Junction (2007)

    Google Scholar 

  • SANS: The Top Cyber Security Risks. Data from Tipping Point and Qualys and input from Ed Skoudis and Rob Lee. Available at http://www.sans.org/top-cyber-security-risks/, Retrieved 20-09-2009 (2009b)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alberto Partida GIAC, CEH, CISSP, CISA, CGEIT, MBA .

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Netherlands

About this chapter

Cite this chapter

Partida, A., Andina, D. (2010). Viral Marketing. In: IT Security Management. Lecture Notes in Electrical Engineering, vol 61. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-8882-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-90-481-8882-6_7

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-90-481-8881-9

  • Online ISBN: 978-90-481-8882-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics