mirror of
https://github.com/friuns2/BlackFriday-GPTs-Prompts.git
synced 2026-05-03 07:23:53 +07:00
2024 chatgpt update
This commit is contained in:
@@ -1,5 +1,5 @@
|
||||
|
||||
[](https://gptcall.net/chat.html?data=%7B%22contact%22%3A%7B%22id%22%3A%22S_DUFhKr-66eQfrXHBwGm%22%2C%22flow%22%3Atrue%7D%7D)
|
||||
|
||||
# Social Media Marketing Campaign Generator | [Start Chat](https://gptcall.net/chat.html?data=%7B%22contact%22%3A%7B%22id%22%3A%22S_DUFhKr-66eQfrXHBwGm%22%2C%22flow%22%3Atrue%7D%7D)
|
||||
Two prompts for creating various social media marketing campaigns. The first prompt will provide you with a list of three different clients, including their name, age, job or occupation, and their specific problem. The second prompt will give you examples of four different campaign types - funny, persuasive, empathic, and inverse - along with an idea of how you can convey your message with an image or video.
|
||||
|
||||
@@ -11,6 +11,25 @@ I want to sell [cybersecurity services]. What are 3 different customer avatars I
|
||||
Provide the results in a table as detailed as possible, including the customer number, a fictional name, age range, demographic data, goals, and pain points for each one.
|
||||
```
|
||||
|
||||
## Welcome Message
|
||||
As a marketing expert with 10 years of experience, I would recommend the following three customer avatars for selling cybersecurity services:
|
||||
|
||||
|
||||
|
||||
| Customer Number | Fictional Name | Age Range | Demographic Data | Goals | Pain Points |
|
||||
|
||||
| --- | --- | --- | --- | --- | --- |
|
||||
|
||||
| 1 | John | 30-40 | Small Business Owner | Protect against cyber threats, secure customer data, ensure business continuity | Limited budget and resources, lack of in-house expertise, difficulty prioritizing security needs |
|
||||
|
||||
| 2 | Lisa | 45-55 | Corporate IT Manager | Manage enterprise-wide security, comply with regulations and standards, stay ahead of emerging threats | Balancing security needs with business strategy, limited visibility into third-party risks, managing data at scale |
|
||||
|
||||
| 3 | Ryan | 25-35 | Remote Worker | Secure personal and professional data, protect against identity theft and phishing attacks | Lack of IT support, unfamiliarity with cybersecurity best practices, reliance on public Wi-Fi networks |
|
||||
|
||||
|
||||
|
||||
By creating these avatars, we can tailor our messaging and approach to each specific audience, addressing their unique pain points and goals. For example, for John, we could focus on affordable and easy-to-use solutions that meet regulatory requirements while protecting customer data, while for Lisa, we could emphasize the need for comprehensive, enterprise-grade security solutions that address complex threats both internally and externally. And for Ryan, we could highlight the importance of securing personal and professional data from cybercriminals and offer simple tools to secure online activities.
|
||||
|
||||
## Conversation
|
||||
|
||||
**ASSISTANT**: As a marketing expert with 10 years of experience, I would recommend the following three customer avatars for selling cybersecurity services:
|
||||
@@ -129,4 +148,3 @@ Only the text and title of the ad variation should have emojis to facilitate rea
|
||||
|
||||
🤔 TikTok Ad Video Idea: An attention-grabbing video explaining the benefits of upgrading technology in a way that challenges traditional thinking.
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user