Power Email Address Extractor v3
The first proffesional email marketing tool
Let's suppose you have a Word DOC (like the one below) containing 5000 email addresses but also other text. With Power Email Address Extractor you can extract all those emails in seconds!
After you press the "Extract emails" button the output will look like this:
Please notice that the last email address was rejected because it is not valid. Also not that 'Services@microsoft.com' was listed twice in the original document but the program automatically removed the duplicate entry.
When done, press the 'Move to collected' button to move the extracted email addresses to the 'Collected items' list. Now, finally press the last button, the 'Send bulk emails' and relax.
Bulk Email marketing is increasingly recognized as an effective Internet marketing tool. Our paper reviews the email marketing literature which highlights the importance of obtaining recipients' permission. Email marketing is compared with other forms of direct and Internet marketing, identifying its key advantages. We identify the factors that have been found to increase response rate in direct marketing and direct mail.
Following exploratory qualitative research among industry experts we analyses 30 email marketing campaigns to identify factors associated with higher response rates. We found the following factors were associated with increased response rate: subject line, email length, incentive, number of images. For nine of these campaigns we were able to link demographic and lifestyle data to response. Analysis of these campaigns suggests that recipients who have previously bought on the Internet have higher response rates to bulk email . These finding are used to create an email marketing process model based on the Vriens et al (1998) direct mail process model.
Bulk Email Marketing
The advantages of email marketing have been recognized by a number of authors. Jackson and DeCormier (1999) recognized that email provided marketers with communication that permitted relationship building and real-time interaction with customers. Wreden (1999, p3) described email marketing as the 'Internet's killer application' because of the precision with which email can be tailored, targeted and tracked. Low costs and digital processing allows companies to send out huge numbers of emails. The medium is push rather than pull, the consumer does not have to instigate the interaction, and currently response rates are high (Di Ianni 2000; Rosenspan 2000). Peppers and Rodgers (2000, p 4), claim that 'clear benefits, including high response rates and low costs are rapidly turning email marketing into an invaluable tool'. Email marketing can be used for acquisition or retention; this paper focuses on acquisition email marketing, marketing designed to win rather than retain customers.
Table 1 - Comparison of Direct and Internet Marketing Techniques
Table 1 compares email to other forms of direct and Internet marketing. The basic characteristics of email marketing are low costs, shorter turnaround (in the time involved to prepare, send the messages and receive the responses), high response rates and customizable campaigns. The advent of HTML, audio and video email improves the scope for creativity in email marketing. Ultimately it is conversion, rather than response rate, that will determine the cost efficiency of acquisition email marketing; this will depend on the targeting, the message, and the receptivity of the recipient. Briggs and Stipp (2000) have argued that the 'lean-forward' nature of the Internet increases involvement in streamed Internet advertising, this could equally apply to email marketing.
Email is a relatively new medium, in the future, consumer response is likely to be adversely affected by increasing traffic volume (Rosenspan 2000; Di Ianni 2000). Mehta and Sividas (1995) suggest that spam messages are unwanted, untargeted and therefore negatively perceived. Turban et al, (2000, p360) define spam 'as the practice of indiscriminate distribution of messages without permission of the receiver and without consideration for the messages' appropriateness.' Jupiter Communications (2000) estimate that the average US surfer will receive up to 1,600 unsolicited emails every year by 2005. Windham (2000) believes that unsolicited email is considered an invasion of privacy, and has already become a serious problem for some customers; spam taints the reputation of email marketing. To avoid being perceived as spam, several authors recommend that companies should restrict the messages they send (Wreden 1999; Wright and Bolfing 2001); in addition, marketers should obtain recipients' permission.
Godin, (1999, p 43) coined the term 'permission marketing' which is based on consumers giving their consent to receive marketing information. Permission marketing 'offers the consumer an opportunity to volunteer to be marketed to' and it is therefore 'anticipated, personal, and relevant'. The idea of consent is not new; customer permission had been introduced in the context of privacy issues in direct marketing (Milne and Gordon 1993). The key to permission marketing is knowing customer interests and knowing their information needs (Sterne and Priore 2000). It is particularly relevant to Internet marketing because the low marginal cost of messages creates a potential volume problem for both consumers and marketers. Permission marketing improves the targeting and relevance of promotional messages, thus improving response and conversion rates. The interactivity of the Internet facilitates communication of consumer permission and preferences.
A survey by IMT Strategies (1999) found that permission email has a higher response rate than non-permission email; more than half of their respondents felt positive about receiving permission email. Successful permission marketing is about building long-term relationships with customers once the initial permission has been granted. The consent, trust and two-way exchange of information develop the relationship between the consumer and the company.
Hagel and Singer, (1999) discuss the emergence of 'infomediaries' or information brokers who elicit the permission of consumers and preserve their privacy. In effect, these companies are 'permission' brokers; an example is yesmail.com.
Krishnamurthy (2001) presents a model where consumer interest in a permission-marketing program depends on five factors: message relevance; monetary benefit; personal information entry costs; message processing costs, and privacy costs. He also introduces the concept of permission intensity, which he defines as 'the degree to which a consumer empowers a marketer in the context of a communicative relationship'. In addition the permission may be more or less explicit. In-order to obtain as many permission email addresses as possible marketers sometimes provide options that are unclear with a default 'opt-in'. A study by Cyber Dialogue found that 69% of US Internet users did not know they had given their consent to inclusion on email distribution lists (Bellman et al 2001).
The effectiveness of direct marketing depends on the targeting, the nature of the offer, the creative, the timing and the volume of communication (Fraser-Robinson 1989; Stone 1996; Roberts and Berger 1989). Vriens et al., (1998, page 325) develop a theoretical framework for the response process in direct mail, see Figure 1, distinguishing between factors that affect the three stages: opening the envelope, paying attention to the contents and the response.
When people switch on their computer the first thing most will do is check their email.
Give me an analogy...
Responsible bulk email marketing is based on the idea of permission. This is a complex issue and the subject of intense debate in the marketing community. Essentially, you need an email address owner's permission before you can send them a commercial email. If you don't have this permission, then the recipients of your mail may well regard your message as spam; unsolicited commercial (bulk) email.
The simplest method involves spammers purchasing or trading lists of e-mail addresses from other spammers.
Another common method is the use of special software known as "harvesting bots" or "harvesters", which spider Web pages, postings on Usenet, mailing list archives, and other online sources to obtain e-mail addresses from public data. These have low efficiency.
Spammers may also use a form of dictionary attack in order to harvest e-mail addresses, known as a directory harvest attack, where valid e-mail addresses at a specific domain are found by guessing e-mail address using common usernames in email addresses at that domain. For example, trying email@example.com, firstname.lastname@example.org, email@example.com, etc and any that are accepted for delivery by the recipient email server, instead of rejected, are added to the list of theoretically valid e-mail addresses for that domain.
Another method of e-mail address harvesting is to offer a product or service free of charge as long as the user provides a valid e-mail address, and then use the addresses collected from users as spam targets. Common products and services offered are jokes of the day, daily bible quotes, news or stock alerts, free merchandise, or even registered sex offender alerts for your area. Another technique was used in late 2007 by the company iDate, which used e-mail harvesting directed at subscribers to the Quechup website to spam the victim's friends and contacts.
Spam differs from other forms of direct marketing in many ways, one of them being that it costs little more to send to a larger number of recipients than a smaller number. For this reason, there is little pressure upon spammers to limit the number of addresses targeted in a spam run, or to restrict it to persons likely to be interested. One consequence of this fact is that many people receive spam written in languages they cannot read — a good deal of spam sent to English-speaking recipients is in Chinese or Korean, for instance. Likewise, lists of addresses sold for use in spam frequently contain malformed addresses, duplicate addresses, and addresses of role accounts such as postmaster.
Spammers may harvest e-mail addresses from a number of sources. A popular method uses e-mail addresses which their owners have published for other purposes. Usenet posts, especially those in archives such as Google Groups, frequently yield addresses. Simply searching the Web for pages with addresses — such as corporate staff directories or membership lists of professional societies — using spambots can yield thousands of addresses, most of them deliverable. Spammers have also subscribed to discussion mailing lists for the purpose of gathering the addresses of posters. The DNS and WHOIS systems require the publication of technical contact information for all Internet domains; spammers have illegally trawled these resources for email addresses. Many spammers use programs called web spiders to find email addresses on web pages. Usenet article message-IDs often look enough like email addresses that they are harvested as well.
Spammer viruses may include a function which scans the victimized computer's disk drives (and possibly its network interfaces) for email addresses. These scanners discover email addresses which have never been exposed on the Web or in Whois. A compromised computer located on a shared network segment may capture email addresses from traffic addressed to its network neighbors. The harvested addresses are then returned to the spammer through the bot-net created by the virus.
A recent, controversial tactic, called "e-pending", involves the appending of e-mail addresses to direct-marketing databases. Direct marketers normally obtain lists of prospects from sources such as magazine subscriptions and customer lists. By searching the Web and other resources for e-mail addresses corresponding to the names and street addresses in their records, direct marketers can send targeted spam e-mail. However, as with most spammer "targeting", this is imprecise; users have reported, for instance, receiving solicitations to mortgage their house at a specific street address — with the address being clearly a business address including mail stop and office number.
Spammers sometimes use various means to confirm addresses as deliverable. For instance, including a hidden Web bug in a spam message written in HTML may cause the recipient's mail client to transmit the recipient's address, or any other unique key, to the spammer's Web site. Users can defend against such abuses by turning off their mail program's option to display images, or by reading email as plain-text rather than formatted.
Likewise, spammers sometimes operate Web pages which purport to remove submitted addresses from spam lists. In several cases, these have been found to subscribe the entered addresses to receive more spam.
When persons fill out a form it is often sold to a spammer using a web service or http post to transfer the data. This is immediate and will drop the email in various spammer databases. The revenue made from the spammer is shared with the source. For instance if someone applies online for a mortgage, the owner of this site may have made a deal with a spammer to sell the address. These are considered the best emails by spammers, because they are fresh and the user has just signed up for a product or service that often is marketed by spam.
So called "CAN SPAM" law act of 2003/2004 clearly identifies what is SPAM and what is not , at least in USA. Email marketer should provide an ability to unsubscribe, identify themselves and make clear subjects. Other than that the Email Marketing is perfectly legal. However the reality of Bulk Email Marketing is much more harsh. Your ISP and Web Hosting provider will disconnect You and will shot down your web site after first complains by some bored users even if your message was perfectly legal.
Bulk mail and email marketing can be an effective way to communicate with your customers, increase sales and improve customer service. You must however be aware that there is a great difference between a bulk mail campaign to your customers, or people that have requested information from you or bought products, and SPAM. Unsolicited Bulk Email, or UBE, is Internet mail that is sent to a group of recipients who have not requested it. A mail recipient may have at one time asked a sender for bulk email, but then later asked that sender not to send any more email or otherwise not have indicated a desire for such additional mail; hence any bulk email sent after that request was received is also UBE.
We encourage all of our customers to comply with the new USA federal law that went into effect on January 1, 2004 referred to as the "Can Spam" law. If you follow a few simple guidelines (listed below), it is actually very easy to comply with this new law. This law supercedes all state and local laws regarding "spam" (unsolicited bulk email), and simply provides
guidelines to prevent fraud and deception, and to enforce the honoring of "remove requests" (requests to have an email address removed from a mailing list).
The software programs and free resources on this website will equip you with the tools and knowledge you will need to succeed with email marketing - legally. If you have a computer, an Internet connection, and a willingness to learn, you can begin getting the same results for your business or organization that the big Fortune 500 online companies are getting from bulk email marketing.
You just have to do it according to the rules. A few of our customers have called and asked if the new USA federal "Can Spam" law has outlawed bulk email marketing. The answer is "no". It simply provides a new set of guidelines to combat fraud and other deceptive practices such as using fraudulent or deceptive subject lines, forged return email addresses, hijacked mail server relays, and requiring that the bulk emailer provides a valid unsubscribe option.
Our software programs are actually designed to help you comply with this new law. For example, our unique Opt Out manager software program automatically processes your remove requests, sparing you the time-consuming process of manually removing them one by one from your email address lists. After Opt Out manager receives your remove requests, you simply load the opt-out lists that it creates into FEDE to remove the unsubscribers from your lists.
The software programs and resources available on this website promote the use of responsible bulk email marketing. We encourage you to use these resources to conduct a bulk email campaign that complies with the new "Can Spam" law. Here are a few recommendations to make sure you are in compliance with the law:
- Always honor remove requests from your recipients.
Note: The content of this web page is not intended to substitute for legal advice.