Ponder Tomorrow

Understanding Buyer Motivation: Getting More of Your Ecommerce Customers to Checkout

e-commerce-1606962_1280

(Author’s note: I wrote this post for BigCommerce and Dunn Solutions Group. The original can be found here on BigCommerce’s blog.)

Understanding the motivations behind your buyers, how they interact with your ecommerce site, and where they are in terms of their decision-making process is crucial for any seller.

Here are some eye-opening statistics about today’s digital marketplace:

  • 50-90% of the buyer’s journey is complete before a buyer reaches out to sales.
  • 67% of the buyer’s journey is now completed digitally.
  • 25% of buyers reveal their interest to vendors at the early stages of the journey.

These findings speak volumes about what goes on inside the heads of today’s consumers.

Gaining better insight into what drives them to visit your site and decide to purchase will set you up for more successful interactions with your customers.

What is Buyer Motivation?

Buyer motivation is the set of psychological factors behind a consumer’s decision to make a particular purchase.

That purchase is the end result of a process referred to as the “Buyer’s Journey” — a three-stage process consisting of:

  1. Awareness.
  2. Consideration.
  3. Decision.

Some may define this using a different number of stages, but the underlying concepts are the same.

Let’s take a look at these stages and examine how they relate to a buyer’s purchasing motivation.

1. Awareness.

This is the primary stage of the journey, where a buyer becomes aware of a problem, want, or need.

It could be the need to purchase a smoke detector, or renter’s insurance, or anything for that matter.

The motivation here can be either internal or external (we’ll go into further detail about the differences in the next section), and it’s important that pain-points be addressed to help identify the problem.

2. Consideration.

Once a buyer is aware of their problem (or want or need), they are then motivated to start gathering information.

At this stage buyers are considering their options, so providing any product education resources like product specs, reviews, and other details will be greatly appreciated.

3. Decision.

It’s at this stage where the buyer is motivated to make a final decision and has determined that their needs have been met.

One important note to keep in mind stems from a 2009 study which discovered that two factors can affect final purchasing decisions:

  1. Negative feedback from other customers.
  2. The level of motivation to comply or accept the feedback.

The study’s authors noted the following example for a customer at the decision stage:

A customer chooses to buy a Nikon D80 DSLR camera. However, because his good friend, who is also a photographer, gives him negative feedback, he will then be bound to change his preference.

Motivation itself can be generated either internally or externally – psychologists refer to this as intrinsic versus extrinsic motivation.

Internal motivation is what drives us to make decisions based on our own wants and/or needs.

It steers our behavior and actions toward goals and outcomes that are personally rewarding to us.

A consumer may have a desire — a want — to purchase a new car that’s more luxurious than their current model. By the same token, that same consumer may also be driven by the need to replace an older vehicle in decline.

External motivation, on the other hand, is driven by outside factors in our environment.

This is either the desire to gain something or avoid/mitigate risk and can be based upon rules and regulations or social pressure. While bike helmets are required by law in some places, even in the absence of legal consequences there is a fear of looking reckless in front of peers.

Coming back to the smoke detector reference from earlier, there can be multiple motives based on a buyer’s persona.

Homeowners, landlords, and renters are motivated in different ways in terms of why they purchase one — whether fear of code violations, fines, evictions, or lawsuits.

How to Determine Your Seller Motivation

Before we dive deeper into the motivations of our customers, it’s important to begin with a degree of self-examination and reflect on what your own motivations are as a seller.

The questions below will help to guide you in gaining more insight into your customer’s decision-making process.

1. Where do you want your product to be positioned in the market?

Seller, know thyself! Where — and what — do you want to be?

Some auto manufacturers, such as Lamborghini or Aston Martin, consider themselves to be firmly placed in the high-end luxury market.

Others, such as Hyundai, offer models appealing to different price points, with the Accent, Elantra, and Sonata lines.

For home furniture retailers, you have Walmart positioned on one end and Ethan Allen on the other (with IKEA sitting somewhere in the middle).

2. Who do you want to sell to?

Who do you want your customers to be?

Are they utilitarian, looking for only basic features/functions to accomplish the task, or status and prestige-driven, desiring extras that will make the experience even better?

Are they budget conscious, or is cost not an object?

3. What is your definition of a successful customer?

What is a happy customer to you?

Is it someone who will write glowing product reviews on your site or elsewhere on social media?

What factors do you deem most important that will drive repeat business?

Figure these out for your customer base and you will have a much better insight into both your motivations as well as theirs.

How to Segment Customers Based on Motive

A myriad of factors can influence our decision to purchase a particular product.

It could be the need to signal prestige in order to impress our peers (or ourselves), or it could be the need to address a concern regarding physical safety, money, loss of time, or simply what many millennials call “FOMO” (Fear Of Missing Out).

Now let’s think about shoes for a moment.

If you’re a nurse or restaurant worker, you will probably be more interested in something best suited to handle being on your feet all day.

If you work in an industrial setting, comfort is also going to be important, but the safety provided by a pair of steel-toe boots with non-skid soles will take precedence.

For those who favor form over function, it might be the right pair of Allen Edmonds oxfords or Manolo Blahnik pumps.

And what about aspirational buyers?

While professional athletes the likes of LeBron James or Kevin Durant wear Nike’s high-performance sneakers on the court, plenty of customers who never see the inside of a basketball court are still inspired to pay $200 or more to have the same footwear as their idols (Saturday Night Live made a hilarious fake commercial about this back in 2013).

An extremely helpful method that you can apply in terms of buyer motivation comes from the VALS Framework, used by marketers for decades now.

Consumers are segmented into one of eight different types, based on psychological and demographic traits along two dimensions: resources available and primary motivations.

These primary motivators are idealsachievement, and self-expression.

The eight VALS types are as follows:

  • Innovators
  • Thinkers
  • Believers.
  • Achievers.
  • Strivers
  • Experiencers
  • Makers
  • Survivors

When determining messaging, many of our clients have asked us to help segment their customers, whether newly acquired or long established.

Leveraging machine learning and advanced analytics can help identify the most relevant attributes relating to demographics, psychographics, geography, and behavior, which can help inform buyer personas alongside VALS types.

Translating Motive Into Ecommerce Action

We’ve examined the psychology behind what drives consumers to make a purchase decision while reflecting inward to understand what your own motives are as a seller and how you view yourself in the marketplace.

Drilling down further, we then explored how to best segment your customers based on their different motivations. With our discussions around theory out of the way, let’s get more practical now and figure out how you can translate this into action and market to buyer motives.

The key takeaway here is that motive needs to drive site design.

When we talk about site design, there are three primary factors we need to consider — all of which play a crucial role in successful customer engagement.

1. User interface.

User interface (UI) deals with the look and feel of a site.

The psychological influences behind choice of color have long been understood by designers.

We know that red can invoke feelings of passion, while blue can help calm us.

This also applies to font choice — sans serif fonts can look more modern, while serif fonts have a more traditional appearance — as well as the images you place onto your site.

If you’re selling a hammer designed to break through a car window in an emergency, you need to appeal to your customer’s sense of fear and need for safety. Bold fonts, shades of red, and the right images will invoke these senses to motivate them toward purchasing your your product.

Conversely, if you’re selling high-end perfumes, you need to appeal to your customer’s sense of prestige and luxury. Images of attractive and glamorous people subconsciously motivate your customers to want to aspire to be them.

2. User experience.

The user experience (UX), in contrast to the user interface, describes the navigation of your site.

This ties into how you group your products and present your categories, and what filters and facets you use to help customers narrow down their choices.

Customer motivation should drive the user experience — a fashion buyer looking for dress shoes, for instance, will be more interested in filtering by color than something like durability, whereas the opposite may apply to someone looking for work shoes for a factory setting (safety-motivated vs. prestige).

3. Non-catalog content.

This can include blogs, product reviews, or videos. Anything that you put onto your site for your customers’ consumption needs to be able to reflect your brand and speak to their motivations.

Having a blog alongside your retail content not only helps with SEO — it also is a great resource hub for shoppers who are interested in learning more about your product or your industry.

Having product reviews (bonus points if they include pictures) helps users understand the pros and cons of each product, and can even help to answer any lingering questions they may have.

Videos of people interacting with, using, or wearing your product helps put dimensions into context, and add an additional resource for shoppers who are wondering what the physical product looks like.

4 Ways to Look for Buyer Motives

Armed with this clearer understanding of your customers’ motivations and how to put that into action as a seller, the final piece of the puzzle is to know what signals to watch for. Here are four ways to look for your buyer’s motives:

1. What are customers asking your customer service reps?

Leverage the wealth of information that comes from the conversations your service reps are having with your customers.

Are they asking for guarantees, discounts, refunds? Find out what they are asking questions about, as well as what they are asking for — examine those trends over both the short and long-term to gain better insight.

2. What specific categories or products are buyers looking at on your site?

Alongside gleaning important details from your service rep’s conversations, tracking your buyer’s activities is crucial.

Being as familiar as possible with what your buyers are looking at (and where) on your site will allow you to have a far more detailed understanding of their motivations.

3. Use marketing mix analytics to determine which channels work the best.

Employing predictive analytics can enable sellers to analyze their marketing allocation.

Here at Dunn Solutions we’ve worked with numerous clients to help them better understand the impact of their marketing efforts, and how to determine the optimal mix and budget to maximize ROI.

Companies that use marketing mix analytics tend to drive an average of 40% improvement in marketing campaigns, while also being better able to balance short-term marketing and promotion tactics with long-term brand building needs.

4. Use web analytics to determine any geographic and/or psychographic segments.

Google Analytics provides a wealth of information about your customers.

Consider the Behavior Flow report, which will allow you to see how visitors are interacting with your site.

Site analytics will allow you to uncover insights about your customer base.

You might encounter geographic and/or personality segments you may have never thought to market to before!

Executive Summary

Buyer motivation is the driving force behind what makes your customers decide to make purchases on your site.

Engaging with them at whichever stage they are at in their journey, knowing the right psychological factors at play, and being able to know yourself and how to correctly position your products in the marketplace complete this picture.

Armed with this insight, you can properly segment your customers based on their individual motives, whether those be fear, safety, pleasure, or prestige.

Leveraging this knowledge by tailoring your site’s aesthetics, navigation, and supplemental content, and understanding what signals to look for as your customers interact with you can turn insight into action.

Political Lobbying Visualized: Dollars Spent Per Person in 2017

lobbying-161689_1280

The choropleth map below (created using Piktochart.com) shows political lobbyist spending per person last year. Using data pulled from FollowTheMoney.org (a site run by the National Institute on Money in State Politics) showing 2017 total lobbyist spending in 20 available states as well as the U.S. Census Bureau’s population estimates for those states, I calculated the amounts spent per person for that year. As can be seen on the map, there is quite the disparity between the amount lobbying firms spend, ranging as low as $2.15 per person in Maine to over 8x as much in Alaska with almost $18 spent per person.

 

https://create.piktochart.com/embed/35038552-lobbyist-spending-per-person-in-2017

lobbyist-5c-20s_35038552

 

DIY “cable salad” containment

The Germans are unparalleled in crafting the most fitting words for just about any situation–Weltschmerz, Schadenfreude–but now they’ve outdone themselves with Kabelsalat (literally “cable salad”) for the jumble of USB and HDMI and power cables we all deal with in our work spaces. I’ve been annoyed for ages by this, so I decided to try a DIY hack…

DIY

All that was needed was an empty $2 plastic storage container (which was collecting dust on a bookshelf anyway) along with 4 Phillips-head screws drilled into the wall under the desk. Sturdy enough to hold a 6-outlet power strip as well as a USB hub.

The Blockchain: What It Is and How It Can Benefit Libraries (Part Two)

(NOTE: This is the second and final post of a two-part series on the blockchain and libraries that I wrote for the American Library Association’s Intellectual Freedom Blog. Click here to read part one.)

In the last post, we discussed the origins of blockchain technology, provided some detail into how it actually works, and listed some potential applications relevant to the library and information services profession. We’re now going to take a closer look at these (along with some important additions), briefly talk about the different types of blockchains that exist (yes, there is more than one blockchain), and discuss some of the issues and limitations.

There’s More Than One Blockchain

Just as there are multiple blockchain applications, there are also different types of blockchains. These can be generally viewed as either public and “permissionless” (participation is open to anyone) versus private and “permissioned” (participants are approved). More accurately, this can be broken down into four main categories: public, private, semi-private, and consortium. The most widely-known public blockchains include famous crypto-currencies such as Bitcoin and Ethereum. Private blockchains are controlled by a single entity or institution, analogous to an organization’s private intranet. Semi-private blockchains are an extension of that, with participation granted to outsiders based on agreed-upon protocols. The Cook County, IL pilot project (referenced in the previous post) is one such example. The fourth type, consortium blockchains, consist of a group of companies, organizations, or institutions all acting as participatory members within a closed system. These function in a similar manner to the regional library consortia we see across the globe.

Trust and Identity

A fingerprint overlaid with 1's and 0's.One important component of many blockchain applications are smart contracts, self-executing transactional agreements converted to computer code, obviating the need for a middleman. A more thorough definition, as outlined by legal scholars, states that a smart contract is “an automatable and enforceable agreement. Automatable by computer, although some parts may require human input and control. Enforceable either by legal enforcement of rights and obligations or via tamper-proof execution of computer code.”

Another component worth mentioning is that of digital identification. Personal digital blockchain IDs would allow for individuals to control what they may wish to share on a “need to know” basis. They would send whatever identifying details are necessary to a commercial or governmental entity temporarily, only for purposes of authentication (and nothing more). The individual would then take that ID or “proof” and put it back into their virtual “wallet.” For example, someone could apply for a library card where all that is needed is confirmation of age and residency–without needing to disclose address, gender, or other irrelevant data.

On a larger scale beyond individuals, work is being done by organizations such as Techruption Blockchain in the Netherlands in the area of privacy-preserving analytics, defined as “focusing on the possibilities to do analysis on combined data sets of different organizations, without the input data being revealed to one of the participating organizations, as the data stays encrypted while doing the analysis.”

Blockchain Applications for Libraries

An extremely useful summary showcasing a test-bed of ideas can be found at the website for San Jose State University’s iSchool (who also just hosted a virtual mini-conference). The following list is hardly exhaustive, but still provides a good starting point.

Easier sharing of digital assets between libraries and/or consortia   

The consortium blockchain model would allow for academic, law, medical, and other research libraries to share information and associated digital assets without loss of control. Distributed ledger technology has the potential to be a successor to current Digital Rights Management infrastructure.

Metadata improvements   

San Jose State’s iSchool describes this as follows:

“Building a distributed, permission-less metadata archive has perhaps the most disruptive potential. Because blockchains operate as a type of informational ledger that don’t require a centralized gatekeeping organization, they could be used to build a truly distributed metadata system for libraries and related organizations. A blockchain OCLC, if you will.”

Digital “chains of custody” to safeguard against data censorship   

Harvard Business Review published an article last year titled “Using Blockchain to Keep Public Data Public” following the Trump administration’s decision to eliminate the White House’s open data. The author of that piece also referenced a Wired article about a “hackathon” held at UC Berkeley to save federal climate data from being permanently lost. Blockchain technology has the potential to allow for such data to be safeguarded against politically-motivated acts of censorship.

Greater civic engagement   

In the physical world, the City of Columbus, OH recently established “Internet Purchase Exchange Zones” for residents to safely conduct transactions originated online. Libraries could act as facilitators of transactions in the virtual world via a blockchain. Other ways to engage with the public could include having libraries certify electronic skills badges / credentials earned by patrons, or even allowing for a portion of collection development to be decided via blockchain “voting” tokens.

Issues and Limitations

Blockchain development has hardly been obstacle-free, with many calling it “a solution looking for a problem.” And while encryption protections are at its very core, there are still security issues that need further investigation, in addition to issues such scalability and complexity. As with any new innovations, this should still not deter us from further research, and to be forewarned is to be forearmed.

Amara’s Law

If we were to compare the blockchain’s timeline (starting with the 2008 Satoshi paper) to the World Wide Web (starting with Tim Berners-Lee’s 1989 paper), we’re only as far as 1999–a time before Twitter, Instagram, Facebook, or even Friendster! (Does anyone even remember Friendster?) Given where we stand right now, there are countless developments, successes (and failures), iterations, and breakthroughs to be made, as this technology is still in its infancy.

Corporate law behemoth Skadden Arps, in a recent memorandum specifically about the future of smart contracts, offered them up as an example of Amara’s Law, which states:

“We tend to overestimate the effect of a technology in the short run and underestimate the effect in the long run”

-Roy Amara

I believe this can just as easily apply to everything associated with the distributed ledgers and blockchain networks. Regardless of your outlook, we’re all in for an interesting ride.

 

The Blockchain: What It Is and How It Can Benefit Libraries (Part One)

(NOTE: I originally wrote this post for the American Library Association’s Intellectual Freedom Blog. Part Two can be found here.)

You can’t trip over a magazine rack these days without hearing about Bitcoin or crypto-currencies or blockchain. My goal here is to clarify some of these terms, provide a little background history, and explain how this new technology works. This will be a two-part series, with Part Two going into detail on the potential applications and use-cases for library and information professionals as a whole.

Although a cursory scan of these terms tends to focus overwhelmingly on Bitcoin and crypto-currency, it’s the blockchain that serves as the underlying foundation for this technology. Crypto-currency — including Bitcoin and the thousands of additional “coins” or “tokens” presently available — is the most well-known application of the blockchain, but far from the only one. With a reach extending far beyond anonymous transactions and speculative bubbles, academia is beginning to get involved. Last year, in fact, San José State University’s iSchool was awarded a $100,000 grant by the IMLS in order to “gain a better understanding of blockchain technology for small and large, urban and rural libraries and their communities.”

Outside of academia, private sector firms and public agencies are also taking a closer look. Some of the world’s largest software companies — including heavyweights IBM and SAP — and financial institutions — Goldman Sachs and JPMorgan, among others — are devoting time and resources into examining the blockchain’s impact, while in the civic arena, we find pilot projects sprouting up around the globe, everywhere from Chicago to the Netherlands to Dubai.

So then what is a blockchain?

First, a bit of history. Although its genesis can be traced back to the early 1990s, it wasn’t until 2008 when a paper published under the pseudonym Satoshi Nakamoto discussed the first real application of the technology: Bitcoin. Interestingly enough, the term “blockchain” was never actually used in Satoshi’s paper, only references to a “chain of blocks” or “block in the chain.” That came later from colleague Hal Finney (his real name).

A blockchain can be thought of as a distributed ledger consisting of records of transactions, with each participant holding a copy of the ledger. Of crucial importance here is that a “transaction” does not have to be of a financial nature it is simply data. Every transaction is recorded, time-stamped, and then added to a “block” which serves as a log of the transactions, analogous to a page in a ledger. Once full, the block itself is then time-stamped and “sealed” via encryption. The next block to be created is subject to the same process, after which it gets “chained” to the previous block.

“A blockchain is never finished, as participants in a blockchain can always attach new links to the chain. However once added, links can never be removed again.”

– Dutch Blockchain Consortium

A cartoon image of a cat preparing to unlock a block of data in a chain, while another cat in the background seals a new block to the chain.In terms of security, there are several aspects to note. If someone tries to tamper with any of the recorded transactions, a new record is then created, with every participant notified of the change. Also, as mentioned above, completed blocks are “sealed” via encryption. Wonder how that works? Many of us who grew up in the U.S. performed our own (albeit much simpler) versions of decryption as children. Remember cereal box decoder rings? Or elementary school worksheets instructing us to spell out a secret message where 1 = A, 2 = B, and so on? Blockchain cryptography is somewhat more complex, however the end result is quite clear. An input of any length is taken and converted into an output of a fixed length. That fixed encryption length is measured in bits, with most blockchain transactions subject to 256-bit encryption, translating into a 32-character string of random letters and numbers (8 bits = 1 byte = 1 character). That string is what gets recorded onto the ledger, and while theoretically possible, the odds of decoding such a string are quite low.

Participants are also provided with both a public and a private encryption/decryption key. Blockchain theorist William Mougayar describes this in his 2016 book as the “yin-yang of the blockchain: public visibility, but private inspection. It’s a bit like your home address. You can publish your home address publicly, but that does not give any information about what your home looks like on the inside. You’ll need your private key to enter your private home, and since you claimed that address as yours, no one else can claim a similar address as being theirs.”

Now that we have a better sense of what the blockchain is and how it works on a basic level, we can start to consider some useful applications in the library and information services arena, including:

  • Easier sharing of digital assets between libraries and/or consortia
  • Improved Digital Rights Management
  • OCLC enhancements
  • Digital “chains of custody” to safeguard against data censorship
  • Greater civic engagement

In Part Two we’ll discuss these (and other) use cases in detail and examine their impact on library and information services. Stay tuned.