BrandjackingIndexSpecialEditionLuxuryGoodsContentsExecutiveSummary3KeyFindings3HowFraudstersDriveTrafc5RoguesGallery7Summary9Methodology&Background9Glossary10SpecialEdition-LuxuryGoodsBrandjackingIndexE-commercesitesellingsuspiciousbagsgeneratesmorethanfivemillionvisitsannually3BrandjackingIndex:2010-SpecialEditionExecutiveSummaryEveryonewantsabargain,butwhenitcomestobuyingluxuryhandbagsandotherpremiumgoodsonline,thedealsareoftentoogoodtobetrue.
Giventhelureofthesebrands,however,itisnosurprisethatweb-savvypurveyorsofsuspiciousgoodslureonlineshopperstotheirsites.
Whatissurprising,however,istheamountofonlinetrafficgeneratedbythesescammers:visitstosuspicioussitesnumbernearlyhalfthetrafficgeneratedbythelegitimatedotcomsites.
InthisspecialeditionoftheBrandjackingIndex,welookatonlinebrandabusesintheluxuryconsumergoodssector.
Itisn'taprettypicture,despitethesmoothbutteryleatherexteriorthatmanyoftherealhandbagsoffer.
Tocompleteouranalysis,weexaminedecommercesites,business-to-business(B2B)tradingsitesandpaidsearchadvertisingforfivespecificluxurygoodsbrandsfrommajorEuropeandesignhouses.
KeyFindingsWefoundthatpurveyorsofsuspectedcounterfeitgoodsareveryvisibleacrosstheInternet,andtheyarealsoverygoodatgeneratingtraffic.
Throughvarioussearchenginemarketingtechniques,thebadguysattractatleast120millionvisitorsannuallytotheirecommercesites.
Thisfigurerepresentsalmosthalfthetrafficattractedbythelegitimatedotcomsitesforthosebrands.
Aswithotherindustriesthatwehaveexamined,wefoundthatcybersquatting—themisleadingpracticeofincludingabrandnamewithinthedomainnameit-self—ispopularintheluxurysector.
Weidentifiedmorethan1,200websitesthatcontainoneofthefiveluxurybrandsinourstudy.
Noneofthosewebsiteshadanyrightstothatbrand,and,thus,hadnorighttousethebrandinthedomainname.
Therearethousandsmoredomainnamesthatdon'tcontainanybrandnamesbutpurporttobelegitimateonlinelocationssellingrealgoods.
However,thesesites,too,arestockedfullofsuspiciousgoods.
Onesite,handbagcom.
com,sellsnothingbuthandbagsofsuspiciousprovenance.
""Sellersofsuspectedfakesareadeptatdrivingwebtraffic.
Suspiciousgoodsonline,studyoffiveluxurybrands4BrandjackingIndex:2010-SpecialEditionSearchengineadvertisingisanotherimportantinvestmentthatgeneratestraffictothesesitesandtheadvertisersdon'talways'playbytherules'.
Weidenti-fiedmorethan50differentvendorswhopurchasedkeywordsinvolvingthefivebrandnamesinourstudy.
Usingbrandedkeywordstodrivetraffictositesofferingcounterfeitorpiratedgoodsisagainsttherulesateachofthe'bigthree'searchengines.
However,thesearchenginesdonotpreventormonitorthistypeofbe-havior.
Instead,thebrandmustinitiateactionwiththesearchenginestoremovetheoffendingads.
Questionablequalityisn'tlimitedtotheretailsector,either.
Whenitcomestothewholesalesupplychain,wefoundalmost4,000sellersofsuspiciousgoodsonbusiness-to-business(B2B)exchangesitesforjustthesefivebrandnames.
Thesesellersgeneratedalmost12,000listingsforsuspiciousgoodson12B2Bexchangesandoftenadvertisetheabilitytosupplyuptothousands—andsome-timesmillions—ofpiecesperyear.
TheaveragesellingpriceontheB2Bexchang-esforthesegoodsisalittlemorethan$100,oronaverage80%belowtheretailpricesofgenuinemerchandise.
Inadditiontothee-commercesitesandB2Bexchanges,weidentifiedmorethan1,400suspectcounterfeitsellerson10business-to-consumer(B2C)exchanges,includingauctionsitesandclassifiedadsites.
Thesesellersgeneratedalmost3,600additionallistings.
Thedistributionofthesesellersistrulyglobalaswell,with55%ofthesellerslocatedinNorthAmerica,29%inAsiaPacificand16%throughoutEurope.
TheaveragesellingpriceforthesegoodsacrossallB2Csitesisalittlemorethan$300,oronaverage,45%belowtheretailpricesoftherealmerchandise.
Asummaryofourfindingsisshownbelow.
""Suspicioussitesgeneratedalmosthalfthetrafficoflegitimatesites.
Commonwayscustomersfindbrandsviasearch""Suspectedcounter-feiterssiphonactualprospectsawayfrom'therealdeal'.
5BrandjackingIndex:2010-SpecialEditionHowFraudstersDriveTrafficTheoperatorsofthesesitesaresophisticated,andusethesamepromotionalmethodsthatlegitimateonlinemarketersusetoattractvisitors.
Threeofthemostcommonmethodsusedtofindwebsitesare:Directnavigation,typingthedomainnameintothebrowser.
Organicsearch,selectingasitefromthenaturalsearchresultsorsearchengineresultspage(SERP);searchengineoptimization(SEO)isakeytechniqueusedbylegitimatesitestoincreasetheirplacementontheSERP.
Paidsearchads,selectingasitefromasponsoredadshownontheSERPasaresultoftheadvertiserpurchasingkeywordstogeneraterelevantads.
Howfraudstersstealsearchtraffic""Legitimateluxurymarketersarecom-petingwithsuspect-edcounterfeitersforwebtraffic.
6BrandjackingIndex:2010-SpecialEditionFraudstersexploitthesemethodsbytakingadvantageoflegitimatebrandnamesandinteractivemarketingtechniquestostealtraffic:Cybersquatting,thepracticeofabusingtrademarkswithinthedomainnamesystem.
Scammersregisterdomainnamesthatincludewell-knownbrands,suchas"guccioutlet.
com",andintercepttrafficsearchingforthelegitimatebrand.
BlackhatSEO,acollectionoftechniques,includingcybersquatting,toincreasesiterankings.
Additionaltechniquesincludeusingtheactualbrandinpagetitlesandmetatagsaswellashavingalargenumberofinboundlinks.
Thesetechniquesaredesignedtotrickthesearchenginesintothinkingsitesarelegitimateattheexpenseoftheactualbrandedsite.
Paidsearchscams,thepracticeofbuyingbrandedkeywordstogenerateadsforsitesofferingsuspectedcounterfeitgoods.
Thispracticeinterceptstrafficmeantforthelegitimatesitesanddrivesupthecostforpurchasingbrandedkeywordsfortherightfulbrandoraffiliatedresellers.
Cybersquattedsitesellscompetitivebrands,tooPaidsearchscamexploitingapopularluxurybrand7BrandjackingIndex:2010-SpecialEditionAsearchforseasonalsalesofaleadingluxurybrandgeneratedaclearexampleofapaidsearchscam,withthefollowingadontheSERP.
Theadinturnledtoacybersquattedsitesellingsuspectedcounterfeitgoods.
RoguesGalleryThesesitesappearprofessionallyproducedandgenerateappreciabletraffic.
Thisexampleofasitewithacybersquattednamesellssuspiciousqualitygoodsfromawidevarietyofluxurylabels.
Thesitegeneratesvisitsinexcessof400,000peryear.
BlackhatSEOtechniquesdrivesubstantialtrafficattheexpenseofthelegitimatebrandBulkmanufacturersofsuspiciousgoodsuseB2Bexchangesitestopromotetheirbusiness8BrandjackingIndex:2010-SpecialEditionInthisexample,blackhatSEOtechniquesdrivesignificanttraffic,withthesiteattracting3.
3millionvisitsannually.
Thissiteusesacombinationoftechniques—cybersquatting,includingthebrandnameinthemetatagsandpagetitle,aswellaslargenumbersofinboundlinks.
Thesetechniquespropelthesitetoanumberonepositioninorganicsearchfortheterm'LouisVuittononsale'.
Bulkmanufacturersofquestionable-qualitybrandedgoodsaresimilarlyadeptatshowcasingtheircapabilities.
ThisB2Bexchangesitelistingclaimsthemanufacturercansupplymorethan52,000unitsannuallyfor$10to$15periteminlotsofuptoathousandpieces.
9BrandjackingIndex:2010-SpecialEditionSummaryTheamountoftrafficflowingtositesofferingsuspiciousluxurygoodsisstartlingandspeaksasmuchtoconsumerdemandasitdoestotheinteractivemarketingsavvyofsiteoperators.
Whileit'sdebatablethatthepersonwhopurchasesa$100fakehandbagisanactualcustomerfortherealitem,thefactthatsuspicioussitespromotingthesefiveluxurybrandsgeneratemorethan120millionvisitsannuallyindicatesthatactualprospectsarebeingsiphonedawayfrom'therealdeal'bysuspectedcounterfeiters.
Ifeven10%ofthosevisitsrepresentvalidcustomerprospectsforluxuryproducts,then12millionvisitsperyeararebeingledawayfromtheirdesireddestination—andinteractivemarketersintheluxurysegmentarepayingthepriceinlostsales.
Tomakemattersworse,thelegitimateluxurymarketersarecompetingagainstcounterfeiterstopurchasetheirownbrandsaskeywords,drivingupthecostsoflegitimateonlinemarketingcampaignsandimpact-ingcampaignmetricsandROI.
Astheluxurysegment—andluxurybuyers—continuetoembracetheInternet,it'svitalthattheindustrytakesaimatonlinecounterfeiters,paidsearchscamsandotherformsofonlinebrandabuseinordertoreapthefullestreturnfromtheirpreciousbrandsandcarefullycultivatedimages.
MethodologyandBackgroundTheBrandjackingIndexisproducedbyMarkMonitorandanalyzestrendsandstatisticsaboutbrandabuseonlineaswellasanecdotalinformationaboutthebusinessandtechnicalmethodsusedbybrandjackers.
ThecornerstoneoftheBrandjackingIndexisthevolumeofpublicdataanalyzedbyMarkMonitorusingthecompany'sproprietaryalgorithms.
Noneofthisdatacontainsproprietarycustomerinformation.
ThisspecialeditionoftheBrandjackingIndexdrewconclusionsbasedondatafrommajorsearchengines,onlinemarketplaces,WhoisrecordsandAlexatrafficestimates.
10BrandjackingIndex:2010-SpecialEditionGlossaryBrandjacking–Tohijackabrandtodeceiveordivertattention;oftenusedinabusiveorfraudulentactivitiesdevisedforgainattheexpenseofthegoodwill,brandequityandcustomertrustofactualbrandowners.
BlackHatSEO–Theuseofbrands,slogansortrademarkslocatedinvisibletext,hiddentext,metatagsandtitleinordertomanipulatesearchenginerankingssothatthebrandjacker'ssitecangainamorefavorablesearchengineplacement.
Cybersquatting–Thepracticeofabusingtrademarkswithinthedomainnamesystem.
DomainKiting–Theprocesswherebydomainsareregisteredanddroppedwithinthefive-dayICANNgraceperiod,andthenregisteredagainforanotherfivedays.
Kitingadomainletstheregistrantgainthebenefitofownershipwithouteverpayingforthedomain.
eCommerceContent–Websitescontainingaspecifiedbrandthatappearsinvisibletext,hiddentext,metatagsortitleinconjunctionwithothersitecontentthatindicatesonlinesalesarebeingtransactedonthesite.
FalseAssociation–Thepracticeofusingaspecifiedbrandortrademarkinwebcontenttoimplyarelationshipwithacompanyorbrandwherenoneexists.
OffensiveContent–Websitescontainingaspecifiedbrandthatappearsinvisibletext,hiddentext,metatagsortitleinconjunctionwithpornographic,onlinegamingorhatecontent.
PaidSearchScams–Occurwhenabrandisusedwithoutpermission,withinapaidsearchscenariotodrivewebtraffictoacompetitiveorillicitsite.
Phishing–Criminaluseofemailtodiverttraffictowebsitesinordertofraudulentlyacquireusernames,passwords,creditcarddetailsandotherpersonalinformation.
Theemailandwebsitesusedintheseoperationsemploy"socialengineering"techniquestotrickusersintobelievingtheyareinteractingwithabusinessororganizationthattheytrust.
RockPhishing–Amethodofphishingfirstimplementedbythe'rock'phishgangthatutilizesmultiplelayersofredundantinfrastructuretoincreasethedifficultyofshuttingdowntheattack.
Otherphishersarenowusingthesetacticsaswell.
AboutMarkMonitorMarkMonitor,thegloballeaderinenterprisebrandprotection,offerscomprehensivesolutionsandservicesthatsafeguardbrands,reputationandrevenuefromonlinerisks.
Withend-to-endsolutionsthataddressthegrowingthreatsofonlinefraud,brandabuseandunauthorizedchannels,MarkMonitorenablesasecureInternetforbusinessesandtheircustomers.
Thecompany'sexclusiveaccesstodatacombinedwithitspatentedreal-timeprevention,detectionandresponsecapabilitiesprovidewide-rangingprotectiontotheever-changingonlinerisksfacedbybrandstoday.
Formoreinformation,pleasevisitwww.
markmonitor.
com.
MorethanhalftheFortune100trustMarkMonitortoprotecttheirbrandsonline.
Seewhatwecandoforyou.
MarkMonitor,Inc.
U.
S.
(800)745-9229Europe:+44(0)2078401300www.
markmonitor.
com2010MarkMonitorInc.
Allrightsreserved.
MarkMonitorandBrandjackingIndexareregisteredtrademarksofMarkMonitorInc.
Allothertrademarksincludedhereinarethepropertyoftheirrespectiveowners.
Boise|SanFrancisco|WashingtonD.
C.
|NewYork|London|Frankfurt
hypervmart怎么样?hypervmart是一家成立了很多年的英国主机商家,上一次分享他家还是在2年前,商家销售虚拟主机、独立服务器和VPS,VPS采用Hyper-V虚拟架构,这一点从他家的域名上也可以看出来。目前商家针对VPS有一个75折的优惠,而且VPS显示的地区为加拿大,但是商家提供的测速地址为荷兰和英国,他家的优势就是给到G口不限流量,硬盘为NVMe固态硬盘,这个配置用来跑跑数据非常...
极光KVM创立于2018年,主要经营美国洛杉矶CN2机房、CeRaNetworks机房、中国香港CeraNetworks机房、香港CMI机房等产品。其中,洛杉矶提供CN2 GIA、CN2 GT以及常规BGP直连线路接入。从名字也可以看到,VPS产品全部是基于KVM架构的。极光KVM也有明确的更换IP政策,下单时选择“IP保险计划”多支付10块钱,可以在服务周期内免费更换一次IP,当然也可以不选择,...
hostyun新上了香港cloudie机房的香港原生IP的VPS,写的是默认接入200Mbps带宽(共享),基于KVM虚拟,纯SSD RAID10,三网直连,混合超售的CN2网络,商家对VPS的I/O有大致100MB/S的限制。由于是原生香港IP,所以这个VPS还是有一定的看头的,这里给大家弄个测评,数据仅供参考!9折优惠码:hostyun,循环优惠内存CPUSSD流量带宽价格购买1G1核10G3...
luxurygoods为你推荐
产业2014年2月25日伺服器win7支持ipad支持ipad流量支付宝Descriptionios5css3圆角css实现圆角的几种方法是什么?photoshop技术什么是ps技术127.0.0.1为什么输入127.0.0.1无法打开页面fusionchartsFusionCharts连接数据库你是怎么解决的,能告诉我吗?谢谢啦
网站空间价格 idc评测 hawkhost优惠码 l5639 国外空间服务商 美国php空间 网页背景图片 mysql主机 eq2 福建天翼加速 193邮箱 bgp双线 已备案删除域名 135邮箱 gtt 卡巴斯基破解版 根服务器 360云服务 中国电信测速器 便宜空间 更多