How to attack a competitor through social media

Source: Internet
Author: User
Keywords We they attack things things

SNS in this whole network today, there are many marketing programs, such as what Word-of-mouth marketing, meager marketing, virus xx marketing, and ultimately not out of the nature of socialization, and social media the biggest feature, that is, the virus effect (but I do not think the virus effect is the nature of SNS). Users who have an exponential rise will learn about you through your marketing program, SNS hidden in the various relationships will also increase the conversion rate of the enterprise itself, so has been greatly favored by major companies. The official meager, official Xxsns homepage and so on. But in marketing, where are the negative voices coming from? ? Is it really all user feedback? or somebody else? The massive viral effects of social media outbreaks have forced an enterprise to seriously consider the consequences of a negative sound, and since a company is concerned about it, it will naturally be exploited by malicious people. How can you use it?

Seven inch

As an engine of war, it is necessary to develop the intelligence system, in the conduct of http://www.aliyun.com/zixun/aggregation/11454.html "> socialization attacks, need to grasp the attack on the side of the most detailed information, As the saying goes, the snake dozen seven inches, the significance of collecting information is to find its seven inches.

Every company has its worst memories, Marx's grandfather once said "capital came to the world, from head to toe, every pore is dripping with blood and dirty things", any company has no information to pat Chest said I did not do anything to my conscience. 360 3721, rising and the setting of micro points, Tencent, while hindering innovation, Baidu malicious competition, Taobao and other fakes and so on, and so on, these things are a company's seven-inch, to play, we must be accurate. At the same time also consider, in his seven-inch above, there is no strong power to protect him, oil prices, 3G tariffs and so these are the corresponding enterprises seven inches, But they have a strong national system to protect them, once you find that you are attacking the enterprise's shield than your spear good, then change a point to hit it, or not worth the candle.

Scale

Every social attack is a battle, this war must be controlled within a certain range, not too big, at the same time can not be too small, that should be how to control the scale of war?

For a social attack, a participant 2~3 a person, not too much, the use of the Navy is the least technical content is also the most easily found behavior, we have to do is a social attack, so the greatest strength lies in those who join the people, rather than the money to buy people. You can pay them to hire them, They can also betray you because of money. Any team to do this thing, must not spend money to use five Maoist party, especially in the internet industry, our netizens now have mastered the ability to identify five cents. and has a strong ability to identify the soft wen, so, now the netizen is not easy to cheat, A little bit of technical content. Any battle is not the larger the better, must control the scale, but the largest SNS is not controllable, once the outbreak of a thing difficult to suppress it, so to a critical value, as an attack of the launch should be issued a series of announcements, Initiate peace talks with the attacking party. Reach the goal you want to achieve. Never exceed this threshold, once it is over, there will be external forces to control, thus losing the most war initiative. The future is not in the hands of the one who started the war.

When it comes to the critical value, we have to mention the 3Q war, assuming that 360 is the one side of the active attack, he does not have a good control of the critical value, leading to the Ministry of the third party and so on, 10006.html "> Buckle bodyguard was recalled, etc. Issue a joint statement and the like, and then take the initiative to recall the security guard. This example may not be appropriate because there are problems with the product, let's say so.

Induced

In psychology and behavior, people's thoughts and behaviors can be induced, and your attacking planners have a good head. How do you motivate the public to think and participate through your planning? Any strong planning behind must have a strong range of thinking. These thoughts are not for the low-end participants to think about, Because the public doesn't like to think, the public likes things that are easy to understand. Deeper things are left to the depth of the participants, and the importance of stimulating them is far more important than stimulating the public's thinking. Once people begin to think, there will be actions that show what they think, and because of that, Hitler once said to Goebbels: "There is no need to let teenagers have judgment and critical power." Give them motorcycles, stars, music and pop costumes. It is the best policy to deprive of thought and to be grounded in obedience to order. "So, some people do not want them to think, as the active initiator of the attack, we need to let them think, but these things are always for people who understand the thinking, but also have the obvious things to the public." After all, the public is a low IQ group.

A simple example may be a little discordant, just an example.

One of our laws is called "subversion of State power," and what kind of thing does that do to offend the law? There is no most obvious judicial explanation, but simply, what kind of regime might be overturned? Throughout history, no one has been corrupt, the regime decayed, the people oppressed, Such a regime would be subverted, without seeing the people living and working, the people being rich, and the national security of good regimes being overturned. In that case, why would the person who enacted the law write that? Excluding the above reasons is that when the regime decayed, they can use the law as the last shield to dissidents .

Will the passage be more inflammatory and thoughtful? The general public will understand by the literal meaning of what I have stated, and the depth of the thinker they will actively seek this information, and they will find some time through wiki,google and so on, and some things happen to some people, And some of the papers that some people write, and so on. Therefore, the biggest significance of SNS is to participate, not to receive. A good offensive planning must be in-depth, and participatory, so that the depth of user involvement, we just point to the fire, and they are responsible for pouring oil, gather more and more people is dry wood .

Back

When you launch an attack on some companies, every system complete enterprise will have a rapid response department, used to deal with this emergency, more times they will release the announcement, the full text is a meaning: they say is nonsense, we did not do what they say, then the police, Organize a lot of human and material resources to clarify and so on and so on. Be sure to remember that for such things can be met, can not wait for the attackers to do, we must do, we must be in the planning to write this sentence: "When this thing is published, they will certainly make a few responses, is true False, who is not, we judge "Do not underestimate this remark, 1, can profoundly show that we deeply understand your every move, we are strong, do not try to resist, 2, let the participants know that we are internal personnel, we are familiar with all their processes, so we are all true. 3.

When confronted with a counter-attack, they will also find some of your seven-inch to play, this time does not respond is the best response, because we are active, the user involved in the first to receive is our view, the Earth people know is: when you say a person did a good conscience, He would have said the same thing about you. That means your butt is not clean, but have you ever thought that what you're saying means you're admitting what you're doing?

End

All of the above is done, and the rest is over, as a side of the attack, we have to have everyone demeanor, we have to take the initiative to help the attacked party rebuild the user confidence, but also to a notice of what kind of things, write what "before the xxx attack and the company has no relationship, XXX is an excellent company ..." And so on, in short, only say good not bad, because most people will only look at the surface.

Through this series of work, one of our social attacks is basically over, a successful social attack will cause a halo effect, and people will think that all of his products will have the problem you attack, this is not a short period of time to dissipate, and you are his direct competitors, the rest of the things to do, I don't have to teach you that. ^ ^

This article source: soblank.net

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.