In today’s setting, with all of the updates of Google’s Algorithm making waves in the online search engine optimization industry, several website are no longer sure of what to do in order to promote their websites. Ever since the Penguin Update got into action, a lot of websites got affected and subsequently, their rankings went down. The reason: over-optimization. While the majority of websites using black hat SEO got taken down, some of those who used white hat tactics a little too far were affected as well.
So, because the obvious targets of the Google Penguin update are spam content and websites, it is important to know how this search engine defines spam. Obviously, spun content with zero content value and keyword stuffed articles are spam, but looking more closely at Google’s support page, it gives more thought on what it considers as spam. Phishing is the first criteria to be mentioned, so websites with malware or non-trusted search engine optimization marketing providers are rated lower (or worse, removed) in the results page. The next thing to be considered as spam is hacked or hijacked websites and websites registered and hosted internationally. Additionally, sites without a Google Webmaster Tools account and sites with suspicious ownership are also considered as such.
Of course, there are other ways of identifying spam, and one of the readily available tools is Gmail. Its spam section gives SEO marketing practitioners some ideas as to how Google filters out spam through the mail, more so because Google openly announced that user input and feedback is one of their major tools in determining whether certain content or websites are spam or not. So, following this indicator, it’s safe to say that user feedback should be considered as one of the things to look out for when trying to identify spam in the World Wide Web. It could be a great tool to use, and could be used by SEO specialists to their advantage because it’s really possible that Penguin is using some of the features associated with how Gmail filters out spam, and the only thing left to discover at this point is how user data is exactly utilized.