Solomo and Darknet in the E-commerce Industry

146
-1

Published on

Published in: Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
146
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Solomo and Darknet in the E-commerce Industry

  1. 1. Solomo and Darknet in the ECommerce Industry
  2. 2.  Short for social-local-mobile  Takes 3 different marketing tactics ▪ Social ▪ Local (Search Engine Marketing) ▪ Mobile  Combines the 3 tactics into a strategy that drives continuous sales
  3. 3.  According to (Devine, 2009) Darknet exploit the infrastructure of the Internet but stand apart from it. They use non-standard protocols and ports to create secure networks for groups of all kinds, from dissidents to illegal fire sharers, and from terrorists to anti-terrorists.
  4. 4.  Solomo and Darknet both engage online merchant and customers  They could be really helpful in business especially in marketing  They differ in activities they involve and promote  They also differ in their crowd of users
  5. 5. SOLOMO DARKNET  Mainstream audience  Anonymous audience  Legal products and services  Mostly Illegal products and services  Restaurant  Spa  Hitman services  Salon   Prohibited drugs  Illegal fire sharing Open Information  Secret Information
  6. 6.  I think in the next two years, Solomo will continue to grow because aside from its strategic driving of sales, it is unique and has just been introduced to the market.  I also see that it will undergo into more modifications as smart phone features rapidly evolve.
  7. 7.  Darknet is not as viral as Solomo. However, I think its intriguing content would make a good publicity once the mainstream audience discovers it.  I see its huge growth in the next two years. It will not stay hidden for a long time. More people will discover it eventually and it will spread like wildfire through word of mouth.
  8. 8.  Devine, S. (2009). Computer Fraud & Security. Darknets, 2009(12). Retrieved from http://www.sciencedirect.com/science/article /pii/S1361372309701502  Retrieved from http://images.nationalgeographic.com/wpf/ media-live/photos/000/109/cache/hiddenface_10942_990x742.jpg
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×