Browse Definitions :
Definition

geo-marketing

Geo-marketing is a tool that uses geographic, or location-based, information to help companies put together marketing strategies and campaigns. Using digital mapping to organize and display data enables marketers to analyze data by region or a particular physical location (for instance, a store).

The advent of digital technology has made geo-marketing increasingly affordable so that companies of any size can tap its benefits. As part of a digital strategy, geo-marketing employs geographic information systems (GIS) and data with a geographic context to market businesses and their websites through internet searches, mobile searches and social media. Most geo-marketing services are compatible with multiple smartphone, tablet and PC platforms.

In geo-marketing, customer data from online transactions, mobile devices and other sources is stored in company databases. This information is applied to digital maps, for example, a zip-code map or a street map.

Analysis of geo-marketing data helps marketers determine where their customers are, link data to a digital map to understand where their customers are in a geographical context, locate something on a digital map, create summary information for specific locations and choose customers in particular areas. Geo-marketing can also help marketers select customers similar to a specific type in the rest of the country or address problems regarding the location of a new office or store.

Geo-marketing can be used for choosing a website for a new business or branch, determining key locations for advertising, displaying website content that is distinct to a user’s origin and offering online advertising based on a user’s location. Other applications include showing how a customer segment might be distributed in a particular region and setting up service networks.

Over time, geo-marketing systems should also be updated to reflect changes in customer data. 

This was last updated in April 2017

Continue Reading About geo-marketing

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

Close