Learn Ten Tricks of Network Public Relations from Qihoo 360 and Kingsoft

by luckyse0 on 2010-05-28 19:30:48

  2. Figurative imagery. "Just like two police officers solving a case together...," "Security software is just like the police, everyone has a gun and the public trusts them. If the police were to break the law, there would be big trouble."

3. Preserve evidence. "Fortunately, someone on my team took a screenshot."

4. Evidence disclosure. "There were originally dozens of links I was going to release, but now there's no rush..."

5. Public opinion monitoring. "Suddenly, a large number of comments appeared on Weibo criticizing me as the CEO for mocking our competitors on social media, saying it showed a lack of dignity. It almost convinced me until our marketing department informed me that many of these people are 'familiar faces,' old friends of the Chinese people, who mainly criticize and educate 360 on Weibo."

During the verbal battle between Rising (Ruixing) and 360, a batch of articles attacking Rising appeared online, written quite well, even I thought they might have been written by our employees, but it turned out they weren't."

8. Internet trolls. "A network troll company was hired, and for three months they continuously attacked us online. The famous story of '360 uploading user privacy' was their masterpiece."

9. Strategic alliances. "As the user base of 360 Antivirus continued to grow, several paid antivirus companies became anxious. Setting aside all past grievances, they formed a united front. It’s said they meet once a week in Zhongguancun to discuss the latest strategies to suppress 360."

10. Standardized competition. "We have always adhered to three principles: 1) Transparency, openness on the front end; 2) Respect for users' right to know and choose, allowing users to select themselves whether to install; 3) Permitting users to uninstall at any time. This complies with the global software industry norms."

This article is reprinted from Asia Satellite TV Portal | http://www.wxtv.org/ Original address: http://www.wxtv.org/33/20100528/717.html

6. ID tracking. "After investigation, it was found that some of the IDs attacking 360 had previously posted PR releases for Kingsoft."

7. Mixing pearls with fish eyes. "In 2008, in order to provide free antivirus services..."