Browse Definitions :
Definition

retargeting (remarketing)

Contributor(s): Ivy Wigmore

Retargeting, also known as remarketing, is digital advertising that features specific products or services and targets an individual who has viewed them online. Customers and leads already in an advertiser's database may also be subjects for retargeting. Retargeting is the technology behind ads that follow people from one site to another.

Retargeting can work in a couple of different ways. When someone visits a product web page, a cookie consisting of a small piece of JavaScript is added to their browser. The cookie is called a pixel (not related to the computer display pixel); the approach is sometimes referred to as pixel-based retargeting. If that visitor leaves the site without making a purchase, the cookie sends a message to retargeting software to place ads for the product on other sites that the user visits within the associated advertising network.

List-based retargeting is aimed at existing contacts in a business’ database. The process involves uploading a list of their email addresses to a remarketing platform, typically for a social media campaign on Facebook or Twitter. The platform identifies users on the list and serves the ads only to them.

The principle behind remarketing is the Rule of Seven, an advertising concept holding that a consumer typically has to encounter a given marketing message seven times before making a purchase.

See also: targeted advertising

This was last updated in February 2017

Continue Reading About retargeting (remarketing)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

SearchSecurity

  • buffer underflow

    Buffer underflow, also known as buffer underrun or buffer underwrite, is a threat to data that typically occurs when the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

  • denial-of-service attack

    A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific ...

SearchHealthIT

SearchDisasterRecovery

  • virtual disaster recovery

    Virtual disaster recovery is a type of DR that typically involves replication and allows a user to fail over to virtualized ...

  • tabletop exercise (TTX)

    A tabletop exercise (TTX) is a disaster preparedness activity that takes participants through the process of dealing with a ...

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

SearchStorage

  • secondary storage

    Secondary storage is storage for noncritical data that does not need to be frequently accessed.

  • Pure Storage

    Pure Storage is a provider of enterprise data flash storage solutions designed to substitute for electromechanical disk arrays.

  • yobibyte (YiB)

    A yobibyte (YiB) is a unit of measure used to describe data capacity as part of the binary system of measuring computing and ...

Close