Browse Definitions :
Definition

retargeting (remarketing)

Contributor(s): Ivy Wigmore

Retargeting, also known as remarketing, is digital advertising that features specific products or services and targets an individual who has viewed them online. Customers and leads already in an advertiser's database may also be subjects for retargeting. Retargeting is the technology behind ads that follow people from one site to another.

Retargeting can work in a couple of different ways. When someone visits a product web page, a cookie consisting of a small piece of JavaScript is added to their browser. The cookie is called a pixel (not related to the computer display pixel); the approach is sometimes referred to as pixel-based retargeting. If that visitor leaves the site without making a purchase, the cookie sends a message to retargeting software to place ads for the product on other sites that the user visits within the associated advertising network.

List-based retargeting is aimed at existing contacts in a business’ database. The process involves uploading a list of their email addresses to a remarketing platform, typically for a social media campaign on Facebook or Twitter. The platform identifies users on the list and serves the ads only to them.

The principle behind remarketing is the Rule of Seven, an advertising concept holding that a consumer typically has to encounter a given marketing message seven times before making a purchase.

See also: targeted advertising

This was last updated in February 2017

Continue Reading About retargeting (remarketing)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close