Browse Definitions :
Definition

AARRR metrics

Contributor(s): Matthew Haughn

AARRR metrics (also called pirate metrics) is an approach to analyzing a business' performance that focuses on customer satisfaction. The metrics, which were developed by venture capitalist Dave McLure, are used by growth hackers, analysts, consultants and business owners  to improve profitability.

AARRR is an acronym the individuals standing for:

Acquisition - How does the business get new customers?

Activation – How many customers are satisfied with their shopping experience?

Retention – How many customers return?

Revenue – How much money does each customer bring to the business?

Referral – How many customers suggest that other people should consider your business?

An important goal of AARRR metrics is to break the customer base down into stages that make analysis easier.  The easier analysis allows the issues of the business to be seen and addressed individually for more efficient problem solving keeping. The ultimate goal of AARRR metrics is to maximize the profitability of a startup.

By breaking down customer response into stages, AARRR allows business owners to honestly focus on where their business could do more to help itself rather than blame the market or the entirety of their business. For example, the metrics may reveal that the business doesn’t draw as many customers as it needs. Then the business can begin to focus on how it might be failing to attract customers and take corrective measures. 

This was last updated in April 2019

Continue Reading About AARRR metrics

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery (DR)

    Disaster recovery (DR) is an area of security planning that aims to protect an organization from the effects of significant ...

  • disaster recovery plan (DRP)

    A disaster recovery plan (DRP) is a documented, structured approach that describes how an organization can quickly resume work ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • secondary storage

    Secondary storage is storage for noncritical data that will not be frequently accessed.

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

Close