Browse Definitions :
Definition

long-tail keywords

Contributor(s): Matthew Haughn

Long-tail keywords, in the context of advertising and SEO, are detailed keyword phrases that a potential customer might use to search online when ready to purchase.

Knowledge about purchase intent is very valuable to advertisers. When customers use long-tail keywords, it is a good indication that they are ready to buy the item for which they are searching. Purchasing long-tail keywords in pay-per-click advertising for the products or services available on a particular site enables the site owners to draw customers who are looking specifically for what they offer. This targeted, contextual advertising is much more likely to result in a sale than random ad placement.

For example, a person searching for sectional sofas is quite likely to be just browsing. When a customer gets very specific – like searching for a white leather reclining sectional sofa -- it is more likely that they know what they want and are ready to buy. Vendors, especially those specializing in niche products, are advised to find keyword phrases that a customer is likely to use when searching for the products or types of products they offer. Model numbers, colors and unique options are a few things to keep in mind for keyword selection. In this way, vendors can target customers that want what they have, when they are ready to buy.

In pay-per-click advertising, long-tail keywords are less expensive to buy and result in more purchases per click than popular short keywords, which bring more traffic but result in fewer purchases. The most searched keywords may boost a site's visibility somewhat, but it is hard to rank well in these terms. Popular keywords will come with a greater cost and may not bring much increase in sales. Long-tail keywords are easier to rank well on, cost less and result in more sales.

This was last updated in June 2017

Continue Reading About long-tail keywords

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

  • WPA3

    WPA3, also known as Wi-Fi Protected Access 3, is the third version of the security certification program developed by the Wi-Fi ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

Close