Browse Definitions :
Definition

return on marketing investment (ROMI)

Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments. ROMI is usually used in online marketing, though integrated campaigns that span print, broadcast and social media may also rely on it for determining overall success. ROMI is a subset of ROI (return on investment). 

In the simplest sense, ROMI is measured by comparing revenue gains against marketing investment. This calculation, however, reflects only the direct impact of marketing investment on a business's revenue. As a result, many digital marketers include dwell time or brand awareness in their ROMI metrics in an effort to quantify less tangible benefits and target future campaigns more effectively. According to ROMI expert Gary R. Powell, with the right data and analytics, marketers can deliver between 8% - 15% increased revenue, profit and market share to the client without any increase in marketing investment.

Return on marketing opportunity (ROMO) is a similar metric used by digital marketers that focused on the wider influence of a campaign. Both terms are part of a wider attempt in the industry to measure impact-based advertising.

Learn more about IT:
>
 Marketing Evolution.com features a downloadable case study about evaluating the return on marketing objectives (ROMO). (PDF)
> Guy R. Powell explains advertising, branding, ROMI and PR ROI in his book, "Return on Marketing Investment."
 

This was last updated in October 2008
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close