Rogue promotion methods are methods that some manufacturers and operators come up with in order to achieve their own user volume goals. These rogue promotion methods carry the sins of deception, immorality, theft, hooliganism and other human evils. They are the dark side of the development of the Internet and a manifestation of the rapid expansion of human interests. It is suggested that a friend who is really engaged in promotion can stick to the moral bottom line and promote a product that is truly useful to users. Products that can truly help users have very strong vitality and will be very convenient to promote. 1. EDM promotion It is email marketing , which promotes by sending bulk emails to your mailbox. Generally, after email addresses are obtained through purchase, collection, and other methods, various advertising messages will be sent to your mailbox every day. You will receive breast augmentation, beauty, infertility, and invoice issuance services. They particularly like to use this method. In particular, Taobao customers often use EDM to promote, sending a bunch of discount information to encourage you to shop, and all the information you open will link you to Taobao. There are also a group of e-commerce ghosts such as JD.com and Dangdang who like to play EDM promotion. Some EDMs can be unsubscribed, while some have nothing at all and can only be blocked through the blocking system. Therefore, EDM promotion is invincible when it becomes rogue. 2. Bundling I don't know who invented the bundling promotion method. The main method of promotion is to secretly bundle software B when you download software A. After you download software A and install it, you find that software B is also installed. It is estimated that many novice users have a bunch of software installed in this way. Generally, there are few bundled software, and most of them are bundled with a large group of software. You install a software, and a group of software appears on your desktop instantly. For example, I once downloaded a YY voice app. After installing it, YY games , YY browser , and a bunch of other things appeared on my desktop. This kind of promotion method makes users very disgusted. The way to deal with it is to delete it immediately after use. 3. Silent installation The so-called silent installation means that you downloaded software A, and while you are using it, it suddenly secretly downloads software B in the background. Currently, many App promotions have silent promotion methods, that is, when you are asleep in the middle of the night, the App you often play downloads a lot of software. It is like a robot, secretly downloading many Apps to your mobile phone, and then automatically installing and activating them. Some will be automatically deleted after installation, and some will stay on your phone. Suddenly one day, you will find: Hey, when was this App installed, and then you will be very puzzled. This method was previously extended from the PC to the mobile terminal, which is very rogue. For example, I didn’t book a train ticket for the Dragon Boat Festival this time, so I wanted to download a ticket-booking app. As a result, I downloaded a ticket-booking software, and just after installing it, I saw that XXX was downloading. It was obviously a silent installation, but it was very obviously silent. Generally, silent installation is done by unknown small apps. In order to earn a few dollars in advertising fees, they silently install multiple apps in the software they developed, so everyone must be careful. 4. Pop-up window I guess everyone knows this. On our PC and App sides, when we are playing with our phones, suddenly a pop-up window appears, blocking the movie you are watching, blocking the text you are typing, blocking the window of the video you are watching... and then you have to close it. It is a pop-up window. Some pop-ups are text, some are static pictures, some are animations, and some are videos. Video pop-ups are especially the most rogue. You were looking up information during working hours and the office was very quiet. Then you opened a webpage and a video popped up, talking loudly, which surprised your colleagues around you. Some pop-up windows have a close button, while others are so annoying that you can’t even close them. You can only close them by clicking and enlarging them. 5. Wechat business Since the advent of Weibo and WeChat, micro-business has become a common sight on the Internet. It is truly everywhere. Micro-business first became popular on Sina Weibo , and then spread to WeChat. Of course, the most popular ones are still those selling facial masks and clothes. Every day in the circle of friends, there are all kinds of screens saying, for example, someone bought something again, and made tens of thousands of yuan a day, or someone used it and the effect was really good, and then they posted all kinds of PS pictures. When I see such people, I just want to say one word: delete them. Of course, there are also people selling clothes and bags. They are all brand-name bags, each costing several thousand yuan, but in fact they are counterfeit A-grade products. No one knows which copycat factory on the coastal area produced them. The advertisements make them sound very high-end, and they say that they were brought back from abroad by friends. The prices are very high, and they are deceiving those vain, silly newbie users. But now everyone knows the tricks of WeChat business, and some have been fooled. But this method is still very rogue. 6. Viruses and Trojans As the name suggests, everyone knows that viruses and Trojans are software installed on your computer or mobile phone that do a lot of bad things. Steal various accounts, steal various information, or download a lot of virus software, turning a good computer into a virus den. This is extremely harmful and very rogue, and most people can't do anything about it. 7. Built-in software What is built-in software? It means when you buy a computer or mobile phone, there are a bunch of software you don’t want when you open it. They are either installed by the manufacturer or the seller. This is especially true for mobile phones, especially those from operators. As soon as you buy it, there are twenty or thirty apps built in, for shopping, payment, video, and comics. These are all things that operators do to make money. They are very rogue. You cannot uninstall them even if you want to, and you must root them. Ordinary novice users don’t even know how to root them. For a user, after spending money to buy a mobile phone, he or she hopes that it will be clean, but in the end, a bunch of software is installed on it. These software are always running and consume your data. There is no benefit for the user. Of course, some people claim that it is for user experience, but most of these built-in software are unknown and almost no one uses them, so it would be very inconvenient if you use it alone. For example, if there is a built-in YiXin, would you use it? All your friends are on WeChat, so it’s useless to have an YiXin app for you. 8. SMS group messaging This is a product of the SP era. Since the emergence of DreamNet, countless SPs have used DreamNet's SMS channel to deduct fees. Once a company of three or four people registered as an SP could earn tens of millions of yuan a month by sending blank deductible SMS. Previously, the maximum deduction for SMS was 200 yuan. Countless users were affected. This is how China Mobile and early SP entrepreneurs made their fortunes. As the times progressed, mobile phone users became smarter, and operators' management systems became more formalized, and SMS mass messaging began to get on the right track. This promotion method is still used by many companies today. Event notifications, discount notifications, invoice information, and scammer information are basically all sent in the form of SMS mass messaging. Users' mobile phone numbers are usually leaked after being sold in bulk to mass-messaging companies by insiders, websites or apps that collect mobile phone numbers. 9. False free You see a free software, download it and want to use it, but when you open it, many functions are not available, and you can only use one of the functions. This is fake free, very rogue. It wastes your search time and download traffic, but you still have to pay for it. This is fake free. There are many such software on PC software download sites that use this method. We don’t know how many users have been deceived in this deceptive way. 10. Fake links What is a fake link? For example, you originally wanted to download an App for grabbing train tickets, but when you downloaded it and opened it, you found an App Store . Or you were about to download an App Store, but after you finished downloading it, you found another App that was replaced by a different one. This is a so-called fake link. In the download link of the App, there are usually two download buttons, one button says Normal Download, and the other button says Advanced Download. Most users probably don't know the difference between Advanced Download and Normal Download, and then they click on Advanced Download, and end up having an App Store installed on their phone. It's very rogue, and many app stores currently do this. Of course, this phenomenon is more common on PC websites. Users are disgusted by this method and are unable to do anything about it. 11. Intimidation marketing A certain digital company likes to use this promotion method the most, and it has reached the pinnacle. Later, many such companies learned it, especially those that make browsers, input methods, and security apps. When users use these apps, a prompt often pops up: XXXX has discovered that your computer or mobile phone does not have XXX browser installed. There are security risks, or it may cause privacy leaks. Please click to protect privacy. As a result, as soon as you click, your computer is immediately installed with XXX browser. Then after installing the browser, you will be prompted with other vulnerabilities and other security risks. In short, unless the user installs all the software of this manufacturer and then is done with it, the user's computer will be safe. This rogue promotion method mainly works on some novice users. 12. Fake upgrades A certain input method reminds you that it has the latest features to upgrade. If you don't upgrade, it will always remind you every now and then. Once the user clicks to upgrade, after the upgrade, there is an additional browser and a computer guard on the computer, but the original software has basically not changed. This promotion method is a fake upgrade. Some input methods and security guards often do this, which is very rogue. 13. Points Wall I don’t know who invented the points wall. It appeared on the PC side. Later, after the mobile Internet became popular, it was also extended to the promotion method of Apps. The promotion method of many Apps relies on the points wall. Moreover, many points wall companies have become wealthy by using this method. The so-called points wall means that when you pass a level in a game or app, you need to download another app or game to get points before you can continue playing. Otherwise, you cannot play if you do not have enough points. This promotion method is completely useless for manufacturers as it is purely for quantity rather than quality. User loyalty and activity are very low. It would be better for them to register hundreds of fake accounts and try it out themselves. 14. Coupon promotion The so-called coupon promotion means that you will get a discount coupon after downloading and using a certain App. This promotion method has been used to death by Didi Chuxing, and countless coupons are flying around in today's circle of friends. After clicking to open, enter your mobile phone number to get a batch of coupons. For example, I once got a 105 yuan coupon, 5 yuan for express train, 2 yuan for private car... In short, the total number of coupons is 105 for users. Of course, there are even more deceptive ones, such as the 5-yuan coupon for Diaoye beef brisket, the 10-yuan coupon for purchases over 500 yuan on JD.com, and the 10-yuan coupon for buying a Mercedes-Benz... In short, they are all extremely deceptive. A very strange thing happened once. I got a 10-yuan coupon for buying a T-shirt on Tencent Paipai. However, when I checked on a price comparison website, I found that the price on Paipai was dozens of times higher than that on other websites. They gave you the 10-yuan coupon and made an extra 20 yuan from you. Such coupons are really a trap. On the surface, users get benefits, but in fact, they are being cheated. 15. Promotion beyond the bottom line of human nature For example, the promotion of the death penalty for human traffickers that has been all over the circle of friends recently came from a dating website. Clicking on this link will jump to the registration page of a dating website. This is a marketing that crosses the bottom line of human nature. This type of promotion mainly exploits the weaknesses of human nature, such as little girls being abducted, family members missing, earthquakes, disasters, donations of abandoned items, and other marketing methods that touch the depths of human nature. This kind of promotion method is no longer within the scope of hooliganism. It has deviated from the bottom line of morality and is a very hateful promotion method. Once there is no bottom line in the promotion, it will definitely be infamous for all eternity. APP Top Promotion (www.opp2.com) is the top mobile application promotion platform in China, focusing on mobile APP promotion operation methods, experience and skills, channel ASO optimization ranking, and sharing App marketing dry goods . Welcome to follow the official WeChat public account : appganhuo This article is compiled and published by (APP Top Promotion). Reprinting this article must be approved by Top Promotion, and please attach the link to this article! |
<<: The clearest and most comprehensive method for writing operation and promotion plans!
>>: Don’t know how to plan advertising? Here is a complete set of templates!
I have just taken over the SEO of Yizhu Decoratio...
How do you design your landing pages? In bidding,...
What is the investment cost of Chenzhou's fla...
1. Market network service customer types Practica...
How is the marketing campaign at the beginning of...
1. First you need to digest the information about...
Many startups are interested in trying to discove...
This chapter will take the recent mini program fi...
How much does it cost to develop the Yichun Roule...
For most public accounts , content monetization i...
The sports and fitness app - Keep, has registered...
Among the key communicators, in addition to the f...
How much does it cost to be an agent for a home f...
The golden September and silver October real esta...
In an era of rapid information change, mobile Int...