CBA vs ROI (cost benefit analysis vs return on investment)

Featured

** Updated to include a new comparison example between CBA and ROI in the second table below **

A great table and explanation of the difference uses and value of the two forms of measurement for social marketeers, from Angie Schottmuller in Search Engine Watch:

Cost-Based Analysis (CBA)
Return on Investment (ROI)

Formula
Benefits – Costs
( Benefits – Costs ) /… Continue reading | 3 Comments

George Clooney petition – sign here!

image_pdfimage_print

If you want to support George Clooney’s petition to support Sony against the hackers who stopped The Interview movie release then sign here on my blog, simply by leaving your comment. Thanks.

On November 24 of this year, Sony Pictures was notified that it was the victim of a cyber attack, the effects of which is the most chilling and devastating of any cyber attack in the history of our country. Personal information including Social Security numbers, email addresses, home addresses, phone numbers and the full texts of emails of tens of thousands of Sony employees was leaked online in an effort to scare and terrorize these workers.

The hackers have made both demands and threats. The demand that Sony halt the release of its upcoming comedy The Interview, a satirical film about North Korean dictator Kim Jong Un. Their threats vary from personal—you better behave wisely—to threatening physical harm—not only you but your family is in danger. North Korea has not claimed credit for the attack but has praised the act, calling it a righteous deed and promising merciless measures if the film is released.

Meanwhile the hackers insist in their statement that what they’ve done so far is only a small part of our further plan. This is not just an attack on Sony. It involves every studio, every network, every business and every individual in this country. That is why we fully support Sony’s decision not to submit to these hackers’ demands.

We know that to give in to these criminals now will open the door for any group that would threaten freedom of expression, privacy and personal liberty.

We hope these hackers are brought to justice but until they are, we will not stand in fear. We will stand together.

Ladies from Taguatinga show their support for Kaka

The girls from Taguatinga have got your back George!

Natural variation sounds a lot less boring than it really is

Sorry about the title. What I wanted to say was this. A boiler engineer from British Gas came round yesterday after we’d lost power for the second time in two weeks. so help fix it. He got to work, got out his laptop to do a diagnostic, and did a good job. The engineer, Kirk, at the end of his work said he could also fix the cause of why… Continue reading

How to hit a target with a ball without actually throwing it!

See the scene from 28 Days when baseball star Eddie gives Gwen (Sandra Bullock, Hollywood’s best paid actress in 2014) a lesson on how to hit the target – focus on getting yourself ready – rather than just trying to hit the target. It’s the key to success. As I couldn’t find a movie clip with the spoken lines, here’s the script from the scene between Eddie and Gwen… Continue reading

How to Start a Startup: all the Y Combinator backed course videos and notes

Kilimanjaro

Shopping.com was one of the dot com boom startup successes

Date
Speaker
Topic

9/23/14
Sam Altman, President, Y Combinator
Dustin Moskovitz, Cofounder, Facebook, Cofounder, Asana, Cofounder, Good Ventures
Welcome, and Ideas, Products, Teams and Execution Part IWhy to Start a Startup

9/25/14
Sam Altman, President, Y Combinator

Fake tweet campaigns come under fire from Indiana scientists

Check out the conclusions of a recent analysis from scientists at the School of Informatics and Computing at the University of Indiana, on fake vs real tweet memes that could have serious implications for corporate social marketing campaigns in the future. Scroll down to the interesting point highlighted in bold. (PDF: Fake-tweets-identifier)
In this work we proposed a framework to deal with the problem of clustering … Continue reading

A mini case study – growth hacking within the enterprise

‘Growth hacking’ is a fashionable subject with the rise of startups, but it’s not so easy to established marketers to know how to use some of the insights to help in improving performance in day to day business activity.

Part of this is down to the fact its as much about mindset, as it is using tools to achieve growth.

I therefore wanted to share a mini… Continue reading