Sources for Targeted Web Site Traffic

Qualified traffic is the lifeblood of any web site today, especially for ecommerce sites that are selling goods or services online. But, many media buyers and/or owners of web sites are paying too much for traffic by relying on top tier PPC ("pay per click") search engines like Overture or Google's Ad Words Select programs and others.

There is a new breed of web site traffic brokers emerging in the interactive marketing world that are brokering qualified traffic to the highest bidder on a CPC ("cost per click") basis. Traffic brokers bypass tried and true business processes by flipping the business proposition 180 degrees. They don't find clients and then optimize their web site for search engines; they do it the other way around, by developing and optimizing their own domains for top tier search engines and then reselling this traffic by redirecting it to a destination of their choosing in real time.

So, is this process illegal or unethical? It's hard to say. I don't believe these processes are more disingenuous than what's occurring with hidden "sponsorship listings" via top tier search engines, including Yahoo, MSN, LookSmart, Overture, etc. The latter are now starting to take up the lion's share of the first page on search results -- these results are viewed tens of millions of times per day, with many people unaware that the results are "sponsored listings."

To muddy the digital waters even more, marketing services companies are starting to offer "trusted feed" traffic to companies who want to buy qualified traffic on a CPC ("cost per click") basis. This process is just starting to take hold in the marketplace and works by a marketing services firm contacting a prospective client and offering them "trusted feed" search engine listings on a top tier web site like MSN or LookSmart on a CPC "cost per click" basis. They (the marketing services firm) then build web site pages for their client that are based on their in-depth knowledge of what the search engines want and then submit these pages to the search engine/directory's editors who then review the sites, give the "client" a top tier listing site and then share in the CPC trusted feed revenue with the marketing services firm.

It's getting pretty murky when you start to look closely at what and how traffic originates. I don't think brokering traffic is bad or unethical as long as the web site that is the final recipient of the traffic is offering goods and services that are identical to the referring web site. And, there is a self-policing component of these types of processes -- the traffic brokers want repeat business, so it is in their self interest to make sure the redirected traffic is being sent to a similar web site.

Also, "conversion rates" (the number of people taking a specific action versus the amount of traffic) are rapidly becoming the final determinant of building a sustaining relationship between the traffic brokering firm and the recipient web site. If the traffic coverts then the recipient typically wants to buy more, if not, they will move on to another source -- this reinforces the self-policing aspects of the relationship.

So what do you look for if you want to start buying traffic from a web site traffic broker? Price is certainly a large factor in determining what your interest should be; most of us in the traffic brokering business typically offer keyword traffic at about a third or half of what you would pay via a trusted feed setup, or Overture or an Ad Words Select program via Google. Expect to pay more for filtered ("automotive, insurance, telecommunications") versus unfiltered ("shopping mall type of traffic") as the former has to be carefully filtered for specific keywords or keywords sets so it can be distributed to a larger number of web sites.

Next, make sure you get a 24/7 reporting capability that enables you to analyze your traffic in real time -- this report should show the originating keyword traffic (keywords are always embedded in the search string). And look carefully at your report; proxy traffic (or cached pages) should be filtered out so that there is no more than 5-10% of the total traffic -- you can't get away from having some proxy traffic in this day in age, even AOL is using proxy servers. Finally, look closely at your report. The timelines should have some randomness in the sequences; if you see a traffic report with keyword traffic that is spaced very closely in terms of the timeline, warning bells should go off.

About The Author

Lee Traupel has 20 plus years of marketing experience - he is the founder of Intelective Communications, Inc. http://www.intelective.com a marketing services company which provides strategic and tactical marketing services exclusively to small to medium sized companies. Lee@intelective.com Reprinted with permission from Intelective Communications - this article may be reprinted freely, provided this attribution box remains intact. (c) 2001-2002 by Intelective Communications, Inc.

http://www.intelective.com

detailed home cleaning Park Ridge ..
In The News:

Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.

The Most Useful Way To Utilize Traffic Exchanges

If you advertise through click-exchange traffic programs or GPTR programs,... Read More

A Simple Guide to Analyzing All Those Web Traffic Ideas - Part 3

Just to recap - Parts 1 and 2 of this... Read More

Create Top Sites To Increase Your Traffic

You have a website, beautiful in design and unique in... Read More

Dont be a Square - 5 Strategies to Get Circular With Those Links

One Way Links from High Page Rank Pages are Your... Read More

Thinking of Using Hit Exchanges to Boost Your Adsense Revenue? Think Again!

So, you've added Adsense to your site and you are... Read More

3 Website Positioning Tactics Guaranteed to Boost Your Traffic

There are many tactics you can use to increase traffic... Read More

The FREE Web Traffic Explosion Method

Dear Friend,Many people like to listen to all the graphic... Read More

Targeted Traffic - How Will You Achieve It?

Wouldn't it be great if your website was listed on... Read More

Increase Online Traffic with Directory Listings

Some of the best advertising available online would be getting... Read More

Getting Free Viral Traffic Using Automated Visitor Referral Systems

Would you like to get unlimited viral traffic to your... Read More

Publicity Tips to Get More Traffic to Your Web Site

Web sites are on my mind, since I just updated... Read More

A Simple Guide to Analyzing All Those Web Traffic Ideas - Part 1

There will be a lot of people unhappy about what... Read More

Deep Linking Strategy for Content Sites

Linking - what a mess if you don't know what's... Read More

Traffic Generation: The Number One Skill That Will Generate Cash Flow. (Part 3 of 3)

If you're feeling a bit of confusion and frustration about... Read More

Traffic Exchange Primer

Traffic exchanges are everywhere. A traffic exchange is a clever... Read More

Link Exhanges - Gaining Link Popularity

Link Exchanges also known as "Reciprocal Links" are an arrangement... Read More

A Beginners Guide to Exchanging Links

Reciprocal linking is an effective, free way to get more... Read More

Is Your Site Hungry For Traffic?

For the past few years, I've been stashed away in... Read More

Quality Traffic & Website Promotion Helps Websites Grow

Quality traffic, website promotion and product and service advertisement is... Read More

Does Traffic Exchange Programs Really Worth The Trouble?

It's been several months now since I've been promoting my... Read More

The Rewards Of Being A Good Consumer

Start building an interstate highway to your website. You're going... Read More

Get Traffic Soon and Surge Ahead or Youll Get Lost in the Internet Wilderness.

Getting Traffic or more precisely Targeted Traffic to your website... Read More

Website Traffics: 10 Sizzling Hot Secret Phrases To Ignite Your Website Traffics

For many months after I put up my new website,... Read More

How To Explode Your Web Sites Traffic With Articles Permanently!

There is one golden rule, which is inherent in this... Read More

Reciprocal Linking Techniques

Building a successful web site is a process that works... Read More

express cleaning service Des Plaines ..