Browse Definitions :
Definition

e-score

Contributor(s): Ivy Wigmore

The e-score is a consumer rating metric used to to determine an individual's potential value as a customer and to use that information to guide marketing efforts. E-score algorithms factor in variables such as salary, occupation, home value, debt load and shopping history, and assign a numerical score. 

E-scores are often used to evaluate an appropriate level of marketing and the types of offerings that are likely to be successful with a given consumer. Perhaps even more importantly, e-scores can indicate which consumers are unlikely to be profitable, so marketing resources will not be wasted. However, the e-score has no bearing on an individual's credit rating and cannot be taken into account for financial dealings such as loan applications. 

A number of companies provide consumer e-scores to other businesses. eBureau, a St. Cloud, Minnesota-based company, provides a service that they call eScore. Here's how the eBureau service works: A customer, such as a credit card company, provides eBureau with a list of leads (names of potential customers) and a list of existing customers that were first identified as leads. EBureau associates the names with relevant details and the software adds additional data associated with those details. The data from potential customers are compared with data from existing customers to determine the e-scores for individuals on the list of leads. Based on those e-scores, the credit card company can decide what type of card to offer to each individual and determine which individuals are not good prospects.

E-score information is not made available to consumers. 

This was last updated in September 2012

Continue Reading About e-score

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close