Percept Research discovered late Friday night on February 3, 2017 that our servers were hacked by criminals located in Russia. Our web and file servers were attacked by the ‘Al Narood’ virus that stealthily infects a computer, encrypts data files, and blocks access. This form of attack is called ’ransomware’ because it renders computers unusable unless victims are willing to pay an extortion fee and obtain a decryption key to unlock the machines.Read More
Evidence-Based Innovation Blog
Designing an engaging questionnaire is one of the first steps in conducting a research study. To do so, researchers ask themselves what type of questions are the best to ask. The answer is that it depends – on what researchers are trying to learn from the survey, who they are recruiting to participate, and how much the respondents and researchers themselves know about the survey topic. The sections that follow explain open- and close-ended questions, offer some of their benefits and drawbacks, and provide recommendations on how to incorporate these question formats into business school stakeholder surveys.Read More
My previous article discussed how blogs and social media are key business school marketing activities that involve permission marketing, a term coined by author Seth Godin featured in this image above. Here are three additional marketing activities that MBA programs should consider using permission marketing to engage prospective students:
Percept Research is pleased to announce an improved format for the Topline Summary and Verbatim Summary reports that are provided in all of the MBA Lifecycle Survey Suite Decision Packages.
I have nothing against Kay Jewelers. I mean, how could a girl not like diamonds?
I was in the middle of a time-sensitive lead nurturing email for a client and I needed to stay focused. I was also up against another imminent deadline involving a university website project.Read More