SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Study: 40%
   of mobile    An analysis into the
                effectiveness of mobile
   clicks are   ad spend, and a
accidental or   discussion on click
                fraud techniques,
  fraudulent    symptoms and solutions
The distribution of useless clicks
Mobile is booming, and so are mobile advertising budgets. However,
                                                                                        40% of
due to mobile click fraud and the high rate of accidental clicks, only
very highly targeted ads can effectively reach the target audience and                  all mobile
achieve a profitable ROI. To realise the full potential and possibilities               clicks show
within this new marketing channel, a sophisticated mobile ad
                                                                                        a conversion
verification system is needed.
                                                                                        rate of <0.1%.
It‘s clear from recent media discussion that clicks need to be
monitored in order to ensure that ad spend is used wisely rather than
wasted.1 However, with a noticeable drought of actual studies into the
extent of mobile click fraud and the effectiveness of mobile ad spend,
Trademob decided to shed some light on the situation.


An analysis of six million mobile ad clicks served across ten different
ad networks found that an alarming 40% of bought mobile clicks were
worthless, i.e. the conversion rate of clicks to installs was less than
0.1%.2


Since the Pay Per Click model takes centre stage as the most prominent
reward system offered by most mobile ad networks, these worthless
clicks cost companies 40% of their mobile advertising budgets.

                 Click category based on after-click conversion rates.



                                                                          Click-to-
                                                                         Install rate
                                                                           < 0,1%



                                                     40%
                                                     Useless
                                60%
                             Regular




So how can mobile advertisers become invincible to
ineffective clicks?


1
  Shalom Berkowitz. (2012, July 3). ‚4 ways to identify mobile click
fraud‘. iMedia Connection. Retrieved from http://imediaconnection.com/
content/32195.asp
2
    Trademob mobile click fraud study (2012, June)
Mobile click fraud or accidental clicks?
First, let‘s look at where these useless clicks come from. A closer look   Click fraud
at the data shows that of this 40%, around half show patterns that are
highly symptomatic of click fraud, such as irregular traffic peaks and
                                                                           and accidental
clicks coming from similar IP addresses, and the others appear to be       clicks are
accidental clicks.3                                                        seriously
                                                                           harming ROI.
                           Sources of useless mobile ad clicks




                                                                           Currently,
                                                                           there are three
                                                                           major fraud
                                                                           techniques
                                                                           being used.




    Facts of study
    Sample size                       6 Million mobile ad clicks
    Spread                            10 mobile ad networks
    Conducted by                      Trademob GmbH
    Time of data collection           June 2012



The good news?

With the right strategy both sources can be eliminated and the 40% of
ineffective ad spend can be saved.




3
    Trademob mobile click fraud study (2012, June)
Accidental clicks
Accidental clicks happen                                                  Objectivity
when a user clicks on an ad by mistake.                                   and advanced
                                                                          tracking
This can be due to bad placement, a slip of the hand, or poorly
designed, misguiding mobile banners. These useless clicks cannot          are equally
be associated with click fraud because genuinely accidental clicks do     important
happen sometimes, especially owing to small mobile screen sizes.
                                                                          in detecting
In 2011, a study by Pontiflex (Harrison) found that 47% of all mobile
                                                                          accidental
clicks happened accidentally.4 Since then the mobile industry has         clicks.
grown exponentially, smartphone and tablet screens have increased
in size, and user behaviour has shifted. Despite an observed decrease,
22% of clicks still happen accidentally and fail to convert.


The solution to this problem is identifying and blacklisting publisher
apps and other mobile traffic sources that, purposely or otherwise,
create multiple worthless clicks. There‘s just one problem here: in
order to make informed choices about publishers, pre- and after-
click data need to be matched and analysed, bringing us back to the
perpetual dilemma of thorough campaign tracking on iOS.


However, with ad verification techniques and new innovative tracking
solutions such as accurate fingerprinting, effective UDID- independent
campaign tracking and media buy optimization are possible.


Accidental clicks are really not a new issue in
the mobile industry and could be eradicated if
ad networks had the right tracking at hand. Still,
advertisers lose almost half of their budgets to
ineffective clicks.

Clearly, equally as important as advanced tracking is publisher-
independency and complete objectivity. Thus, advertisers should rely
on unbiased parties having access to the necessary tracking data to
optimize their ad spend.




4
 David Kaplan. (2011, January 27). ‚Pontiflex: About Half Of Mobile App
Clicks Are Accidental. paidContent. Retrieved from http://paidcontent.
org/2011/01/27/419-pontiflex-about-half-of- mobile-app-clicks-are-
accidental/
Mobile click fraud
Click fraud refers to                                                         A constant
premeditated clicks that are not driven by a                                  battle exists
genuine interest in the target of the ad link.                                between fraud
There are difficulties in officially defining click fraud due to the          and anti- fraud
possibility of unethical parties discovering loopholes in the legislation.    due to both
This however does little to protect advertisers, who are thus unable to
                                                                              communities
dispute or verify reasons for click charges.
                                                                              continually
A common understanding of click fraud is as follows: by arranging             improving
false clicks on ads, shady publishers take advantage of Pay Per Click         their
agreements and charge for clicks with extremely low conversion
rates. Performed effectively, this can significantly affect advertising
                                                                              strategies.
costs and revenue potential.


Click fraud has been an issue for online advertisers since the internet‘s
formative years and has already been used by publishers to unfairly
deprive advertisers of millions of dollars. As a reaction to better fraud-
detection solutions, more cunning and sophisticated fraud systems
are conceived, leading to a constant battle between the fraud and
anti-fraud communities.


The recent mobile boom means more substantial investment in mobile
ads. Global mobile advertising spend was 5.3 billion USD in 20115
and is predicted to rise to 24 billion by 2016.6 With this in mind, it‘s
unsurprising that more and more click fraudsters are now targeting
mobile ads as well.


So how exactly do fraudsters fill their pockets with
the mobile advertiser‘s money?

Mobile click fraudsters haven‘t reinvented the wheel. They mostly
rely on traditional online fraud techniques and have more or less
successfully adjusted them to the new ecosystem. Three major fraud
techniques, comprised of plain and pure server-side fraud, and more
sophisticated types (namely botnets and client-side fraud) can be
observed. Fortunately, all types can be detected and eliminated with
the right expertise and tracking.


5
  Mobile Advertising Market Valued at $5.3 Billion (€3.8 Billion) in 2011‘.
(2012, June 6) Interactive Advertising Bureau. Retrived from http://www.
iab.net/about_the_iab/ recent_press_releases/press_release_archive/press_
release/pr-060612_global
6
  By     2016,   Mobile   Advertising   Outlay   Will  Equal   Current
Total Online Ad Spending.‘ (2011, June 23). ABI Research.
Retrieved from http://www.abiresearch.com/press/3706-By+2016,+Mobile+
Advertising+Outlay+Will+Equal+Current+Total+Online+Ad+Spending
Major mobile click fraud techniques
Plain fraud
Server-side
Publishers use (their own or hacked) servers to report millions of fake
clicks per minute, none of which ever actually happened. Though
made to look real by sending convincing data, these false clicks are
easy to detect with the right tracking solution.




                                                                          Fake click
                                                                          triggered on
                                                                          publisher
                                                                          server(s)



Sophisticated fraud
Botnets
Botnets are inventories of hijacked devices on which viruses are
installed, creating fake clicks which go unnoticed by the user due to
not being shown onscreen. Most botnets rely on non-mobile inventory
but fraudsters can manipulate click-data to appear to be mobile ad
clicks.





                                                                          Click
                                                                          autonomously
                                                                          triggered
                                                                          on hijacked
                                                                          device
Client-side
Unlike plain fraud and botnets, client-side fraud involves actual
user interaction. This again goes unobserved by the user. By way of
example, a person might unintentionally click on an ad banner which
is hidden behind another banner, with the publisher then charging
the ad network for both the intentional and unintentional clicks.




                                                                                        Click (in)-
                                                                                        directly
                                                                                        triggered
                                                                                        by user




The bright side: detection of click fraud
Detecting plain fraud
Server-side fraud is probably the most basic form of click fraud and
                                                                                        Click bulks of
is relatively easy to detect. As clicks are sent from the same server(s),
they come from the same IP address and the header data which are
                                                                                        IP address and
transferred along with each click will show a similar device parameter                  fingerprints
composition, also referred to as fingerprint. With the right tracking                   can uncover
and algorithm, these bulks of clicks sharing the same IP address and
parameter composition can quickly be identified.
                                                                                        plain fraud.

IP Address




                                            IP Address




             Device Parameter Composition                Device Parameter Composition
                     (regular traffic)                         (fraudulent traffic)
Detecting sophisticated fraud
The more sophisticated fraudsters have established their own                                                             Under
‘inventory management’ to increase the IP distribution and optimize
click reporting to conceal fraud the best way possible. However, these
                                                                                                                         investigation,
days, most mobile fraudsters only apply the minimum effort required                                                      fraud is found
in order to achieve their goals, and these cover-up strategies are still                                                 out through
immature.
                                                                                                                         inconsistent
Deeper analysis of click data by ad verification platforms can therefore                                                 activity and
also reveal more advanced types of fraud. We may still see peaks of                                                      irregular
clicks at unexpected times of day, for example.
                                                                                                                         patterns.




          Daily click pattern reported by publishers                          Daily click pattern with irregular peaks
                                                                                  (reported by shady publishers)




But the biggest hurdle for shady publishers is that they don’t know
the campaign settings, so the click data may not match the selected
target.


Let’s say a mobile ad campaign is targeted to be shown only to iPhone                                                    Fraudsters
users located in Western Europe. A fraudster, noticing a high-paying
CPC click on his mobile website executed by a German user, decides
                                                                                                                         don‘t know
to increase his revenue stream using his ‘botnet’ made up of hijacked                                                    campaign
Android phones in India to report more of these well-paying clicks.                                                      settings such
Tracking reveals these discrepancies.
                                                                                                                         as target area.




                                  Fraudsters report clicks from outside the target zone
Optimizing ROI through ad verification

Summary
Click fraud and accidental clicks could cost advertisers as much as 40%    With
of their advertising budget, money which is far better spent where it
has a positive impact. Fortunately, this 40% can be moved back into
                                                                           advanced
an advertiser’s efficient ad spend and help ensure the effectiveness of    tracking
their mobile ad campaigns.                                                 and ad
                                                                           verification,
In order to optimize a mobile ad campaign, it is vital to use ad
verification to spot and blacklist sources of click fraud and accidental   useless
clicks who cost money but offer nothing in return. By tracking ad          clicks can be
campaigns and analysing pre- and after-click data, it is possible to
                                                                           stamped out.
sink publishers that underperform and invest in the ones that bring
revenue. Such a cross-network blacklisting of useless publishers
requires a deep integration with ad networks, access to publisher
and user data and an advanced tracking technology that can create a
unique fingerprint for each click source and match clicks with after-
click actions.


Choosing the right strategy
Besides sophisticated tracking data, an independent and objective
optimization is required to ensure that mobile ad spend is allocated
to its most effective sources.


It’s possible to invest only in publishers that bring
in app users and ROI. Via advanced fingerprint
technology, thorough optimization and an
objective approach, accidental clicks and fraud
can be detected and prevented.

While advertisers are obviously pure in their intentions to maximize
their ROI, they lack the tracking technologies as well as access to the
click- and publisher data. Even with the desired data at hand, analysing
and preventing ineffective clicks requires automated systems, a deep
technical network-integration and the right algorithm. Advertisers
will thus most likely face huge manual effort here, without achieving
the desired results. On the other hand, many ad networks lack the
sophisticated tracking solution and data. And given that they are
caught between three business goals (the advertiser’s satisfaction,
the publisher’s satisfaction and their own revenue stream), campaign
optimization is, by nature, corrupted. Advertisers thus depend on
objective intermediaries advocating their interests.
What can Trademob do?
As an aggregation platform, Trademob is able to focus on advertisers‘               A 100%
interests whilst remaining independent from publishers. Providing
accurate and proven fingerprint tracking, a close collaboration with
                                                                                    advertiser-
ad networks and a clear optimization focus, we ensure that our                      targeted
clients‘ marketing goals are achieved in the best, most efficient                   solution
way. As a result,can Trademob do?
         What transparent and revenue-driving campaigns make
mobile advertising profitable for the advertiser and mobile marketing
                                                                                    enables true
          As an aggregation platform, Trademob is able to focus on
budgets rise. Advertisers, ad networks and trustworthy publishers all               campaign
                                                                                 A 100%
          advertisers' interests whilst remaining independent from
benefit from our advertiser-targeted solution. fingerprint tracking, a
          publishers. Providing accurate and proven                              advertiser-
                                                                                    optimization.
          close collaboration with ad networks and a clear optimisation focus,
          we ensure that our clients' marketing goals are achieved in the
                                                                                 targeted
Disclosing and blacklisting click a result, transparent and revenue-
          best, most efficient way. As fraud and accidental clicks can           solution
eradicate 40% campaigns make mobile advertising profitable for ROI.
          driving of ineffective mobile ad spend and ramp-upthe
                                                                                 enables true
          advertiser and mobile marketing budgets rise. Advertisers, ad
However, there are many more optimization settings such as; banner
          networks and trustworthy publishers all benefit from our advertiser-   campaign
type, timing, device, channel, and location. Therefore it comes as
          targeted solution.
                                                                                 optimisation
little surprise that we see overall optimization for our clients’ targeted
           Disclosing and blacklisting click fraud and accidental clicks can
mobile advertising40% of ineffective mobile ad spend and ramp-up ROI.
           eradicate campaigns as high as 70%.
           However, there are many more optimisation settings such as;
           banner type, timing, device, channel, and location. Therefore it
           comes as little surprise that we see overall optimisation for our
           clients’ targeted mobile advertising campaigns as high as 70%.



       Advanced
    Advanced
       campaign
    campaign
       optimisation
    optimization
       sees an ROI
                                         App Users
       increase of
    sees an ROI
       up to 70%
    increase of                         ROI          !
    up to 70%.
Appendix:
Mobile click fraud techniques in
more technical detail
As we’ve only scratched the surface of mobile click fraud
types in the previous section, here’s a more detailed account
for those of you harbouring a hidden passion for IT.
Server-side click fraud
Historically, fraud originated from single machines like privately             Current
owned PCs and servers, with increased professionalism progressing
into server clusters and cloud-hosters. As the number of machines
                                                                               mobile fraud
is a limiting factor, each machine needs to deliver a good number of           attempts are
fraudulent requests, ideally clicks and impressions, to generate an            still largely
unsuspicious clickthrough rate.
                                                                               very primitive.
The generation of the necessary partly-forged http-requests is carried
out by scripts or full-blown fraud-suites obtainable on the internet’s
black market. The most sophisticated come with a throttling of
requests to avoid ‘off-the-chart’ effects that could trigger a review and
also a multitude of faked browser-headers to show a good distribution
of users.


But even with the increase of hacked servers, this source of fraud
can easily be detected. The limit in server numbers means a tight
clustering of IP addresses as well as fingerprinting parameters. Also
with different tools and scripts in use by the fraudster, each cluster
can show a specific distribution of client-parameters.


In addition to the shown weaknesses in masking their unwanted
behaviour, javascript and other more complex client-side technologies
are often ignored in simple fraud attempts. This might be due to the
fact that per server performance and tight control over http-behaviour
is a dominant requirement for server-side fraud.


Botnets
When single servers are not available or too easy to blacklist, a cheap
and willing workforce of hacked consumer PCs is available to paying
‘customers’. Botnets, when perceived as a platform, can be utilised
for online and mobile fraud with a similar toolset as for server-side
fraud.


The renting is flexible, fees are low and the IP distribution is drastically
increased, though it still depends on the size and quality of the used
network. Due to the volatile nature of clients caught in a botnet,
detection and blacklisting can be harder to achieve by opposing ad-
networks or DSPs.


Botnet owners have developed an own ‘inventory
management‘ of their hijacked devices to cover
up their unethical activities.
Client-side
With the recent sharp increase right at the zenith of Web 2.0, client-       Close
side technology has become the new playground for script- kiddies,
benevolent hackers and clever fraudsters alike. Somewhat tech-savvy
                                                                             collaboration
webmasters with a significant user base may think their mobile page          of the
needs a bump in revenue. They can be tempted, once they realise how          anti-fraud
easy it is, to place banners inside invisible layers and put paying clicks
on close buttons or fake scrollbars. Due to the diversity in users on
                                                                             community
international sites this kind of fraud will be harder to detect as long as   can affront
they are able to slip through the ad network’s quality controls.             more
                                                                             sophisticated
It gets much more complex when fraudsters decide to parasite on
other sites, using cross-site scripting and SQL-injects as their most        fraud in the
common angles of attack. This approach programs legitimate websites          future.
to serve malicious javascript code which in turn makes the unaware
user generate visible or invisible clicks on high CPC- campaigns. All of
this is configured and frequency-capped by the fraudster‘s ‘inventory
management’ on yet another hijacked machine.


Client-side fraud techniques show the highest diversity of IPs and
device parameters, leaving fewer other data to identify a pattern.
Some publishers also decide to ‘charge’ their real clicks by a humble
factor of 2 to 10, showing at least some conversions in performance
reports. With this in mind, it is evident that there is a clear need for
a scientific approach and number crunching on past experience to
detect fraud when it comes to its advanced stages.


Conclusion
Though click fraud might sound sophisticated, in reality fraudsters
currently only apply the minimum effort required to achieve their goals.
Right now there is only very little creativity needed to overcome basic
macro-plausibility checks and much of their work goes undetected.
Simple fraud techniques still work out in a big way – an arms race
between the fraud and anti-fraud side has yet to be triggered. On the
bright side, it means that platforms with access to both pre-and after-
click data, can quickly expose fraudulent publishers.


Looking ahead, it is likely that fraudsters will change strategies when
a major part of the market is able to detect their activity. So fraud
detection and prevention will likely be challenged in the future and
will require a close collaboration among the anti-fraud community,
with cross-network and cross-campaign tracking and data analysis
forming the initial steps.
Questions?
Ask us.




    The Data-    Global, Independent, Transparent
                 Mobile Advertising for your App.

   Driven App
    Marketing
                 info@trademob.com, www.trademob.com
      Platform   Berlin, London, Paris, Madrid, New York

Contenu connexe

Tendances

Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Wossname
 
Mobile Marketing to Youth - Mobile Monday
Mobile Marketing to Youth - Mobile MondayMobile Marketing to Youth - Mobile Monday
Mobile Marketing to Youth - Mobile MondayMobileAnthem
 
Reinventing Marketing For The Small Business
Reinventing Marketing For The Small BusinessReinventing Marketing For The Small Business
Reinventing Marketing For The Small BusinessRob Koch
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryDistil Networks
 
Digital dowload all mobile final
Digital dowload all mobile finalDigital dowload all mobile final
Digital dowload all mobile finalRaul Vielma
 
4 reasons
4 reasons4 reasons
4 reasonsbmarx
 
DMS: Opening Workshop with Marchex: Driving Profitable Mobile Marketing Campa...
DMS: Opening Workshop with Marchex: Driving Profitable Mobile Marketing Campa...DMS: Opening Workshop with Marchex: Driving Profitable Mobile Marketing Campa...
DMS: Opening Workshop with Marchex: Driving Profitable Mobile Marketing Campa...Digiday
 
25 Disruptive Technology Trends 2015 - 2016
25 Disruptive Technology Trends 2015 - 201625 Disruptive Technology Trends 2015 - 2016
25 Disruptive Technology Trends 2015 - 2016Brian Solis
 
brandinnovators2015trends-150105172645-conversion-gate01
brandinnovators2015trends-150105172645-conversion-gate01brandinnovators2015trends-150105172645-conversion-gate01
brandinnovators2015trends-150105172645-conversion-gate01FOOK CHUIN NG
 

Tendances (17)

Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)
 
Mobile Marketing to Youth - Mobile Monday
Mobile Marketing to Youth - Mobile MondayMobile Marketing to Youth - Mobile Monday
Mobile Marketing to Youth - Mobile Monday
 
Reinventing Marketing For The Small Business
Reinventing Marketing For The Small BusinessReinventing Marketing For The Small Business
Reinventing Marketing For The Small Business
 
4As Digital Ad Fraud Webinar October 2014
4As Digital Ad Fraud Webinar October 20144As Digital Ad Fraud Webinar October 2014
4As Digital Ad Fraud Webinar October 2014
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad Inventory
 
History and Impact of Digital Ad Fraud
History and Impact of Digital Ad FraudHistory and Impact of Digital Ad Fraud
History and Impact of Digital Ad Fraud
 
ComplianceBrief
ComplianceBriefComplianceBrief
ComplianceBrief
 
Internet advertising
Internet advertisingInternet advertising
Internet advertising
 
Google And The Click Fraud Menace
Google And The Click Fraud MenaceGoogle And The Click Fraud Menace
Google And The Click Fraud Menace
 
Digital dowload all mobile final
Digital dowload all mobile finalDigital dowload all mobile final
Digital dowload all mobile final
 
4 reasons
4 reasons4 reasons
4 reasons
 
IAB Best Practices Traffic Fraud Final
IAB Best Practices Traffic Fraud FinalIAB Best Practices Traffic Fraud Final
IAB Best Practices Traffic Fraud Final
 
Ways To Think About Solving Digital Ad Fraud Augustine Fou Mike Moran Ted McC...
Ways To Think About Solving Digital Ad Fraud Augustine Fou Mike Moran Ted McC...Ways To Think About Solving Digital Ad Fraud Augustine Fou Mike Moran Ted McC...
Ways To Think About Solving Digital Ad Fraud Augustine Fou Mike Moran Ted McC...
 
DMS: Opening Workshop with Marchex: Driving Profitable Mobile Marketing Campa...
DMS: Opening Workshop with Marchex: Driving Profitable Mobile Marketing Campa...DMS: Opening Workshop with Marchex: Driving Profitable Mobile Marketing Campa...
DMS: Opening Workshop with Marchex: Driving Profitable Mobile Marketing Campa...
 
Digital ad dollars trickle down chart
Digital ad dollars trickle down chartDigital ad dollars trickle down chart
Digital ad dollars trickle down chart
 
25 Disruptive Technology Trends 2015 - 2016
25 Disruptive Technology Trends 2015 - 201625 Disruptive Technology Trends 2015 - 2016
25 Disruptive Technology Trends 2015 - 2016
 
brandinnovators2015trends-150105172645-conversion-gate01
brandinnovators2015trends-150105172645-conversion-gate01brandinnovators2015trends-150105172645-conversion-gate01
brandinnovators2015trends-150105172645-conversion-gate01
 

Similaire à Trademob whitepaper click-fraud

State of Supply Quality in Mobile Programmatic
State of Supply Quality in Mobile ProgrammaticState of Supply Quality in Mobile Programmatic
State of Supply Quality in Mobile ProgrammaticMoPub
 
Ana white ops - bot fraud action plan - 2015
Ana white ops - bot fraud action plan - 2015Ana white ops - bot fraud action plan - 2015
Ana white ops - bot fraud action plan - 2015Romain Fonnier
 
Using Online Advertising To Build Brands
Using Online Advertising To Build BrandsUsing Online Advertising To Build Brands
Using Online Advertising To Build BrandsKantar
 
A radical solution for broken digital advertising
A radical solution for broken digital advertisingA radical solution for broken digital advertising
A radical solution for broken digital advertisingMando Liussi
 
The ABCs of Mobile App Fraud
The ABCs of Mobile App FraudThe ABCs of Mobile App Fraud
The ABCs of Mobile App FraudJames Nichols
 
Ana White OPS - the bot baseline - fraud in digital advertising - 2015
Ana White OPS - the bot baseline - fraud in digital advertising - 2015Ana White OPS - the bot baseline - fraud in digital advertising - 2015
Ana White OPS - the bot baseline - fraud in digital advertising - 2015Romain Fonnier
 
Fraud in Digital Advertising (ANA study)
Fraud in Digital Advertising (ANA study)Fraud in Digital Advertising (ANA study)
Fraud in Digital Advertising (ANA study)Margarita Zlatkova
 
The Bot Baseline - Fraud in Digital Advertising
The Bot Baseline - Fraud in Digital AdvertisingThe Bot Baseline - Fraud in Digital Advertising
The Bot Baseline - Fraud in Digital Advertisingyann le gigan
 
Master Mobile Marketing in 2012
Master Mobile Marketing in 2012Master Mobile Marketing in 2012
Master Mobile Marketing in 2012HubSpot
 
Mystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleMystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleShailin Dhar
 
LUMA Digital Brief 016 The Evolution of Digital Measurement
LUMA Digital Brief 016 The Evolution of Digital MeasurementLUMA Digital Brief 016 The Evolution of Digital Measurement
LUMA Digital Brief 016 The Evolution of Digital MeasurementLUMA Partners
 
Borrell Conference on Local Media (Mobile)
Borrell Conference on Local Media (Mobile)Borrell Conference on Local Media (Mobile)
Borrell Conference on Local Media (Mobile)Greg Stuart
 
How to Regain the Trust We Lost on Digital Advertising in China
How to Regain the Trust We Lost on Digital Advertising in ChinaHow to Regain the Trust We Lost on Digital Advertising in China
How to Regain the Trust We Lost on Digital Advertising in ChinaFoodInnovation
 
Clash group white paper 2013
Clash group white paper 2013 Clash group white paper 2013
Clash group white paper 2013 simon wajcenberg
 
[Webinar] driving accountability in mobile advertising
[Webinar] driving accountability in mobile advertising[Webinar] driving accountability in mobile advertising
[Webinar] driving accountability in mobile advertisingInMobi
 
The Wrong Impression | Adfraud
The Wrong Impression | AdfraudThe Wrong Impression | Adfraud
The Wrong Impression | AdfraudAditya Labhe
 
INFOGRAPHIC: The Bot Stops Here
INFOGRAPHIC: The Bot Stops HereINFOGRAPHIC: The Bot Stops Here
INFOGRAPHIC: The Bot Stops HereSolve Media
 
WTF is Ad Fraud?
 WTF is Ad Fraud? WTF is Ad Fraud?
WTF is Ad Fraud?Digiday
 
How CMOs Can Build a Mobile App Strategy
How CMOs Can Build a Mobile App StrategyHow CMOs Can Build a Mobile App Strategy
How CMOs Can Build a Mobile App StrategyKoombea
 

Similaire à Trademob whitepaper click-fraud (20)

State of Supply Quality in Mobile Programmatic
State of Supply Quality in Mobile ProgrammaticState of Supply Quality in Mobile Programmatic
State of Supply Quality in Mobile Programmatic
 
Ana white ops - bot fraud action plan - 2015
Ana white ops - bot fraud action plan - 2015Ana white ops - bot fraud action plan - 2015
Ana white ops - bot fraud action plan - 2015
 
Using Online Advertising To Build Brands
Using Online Advertising To Build BrandsUsing Online Advertising To Build Brands
Using Online Advertising To Build Brands
 
A radical solution for broken digital advertising
A radical solution for broken digital advertisingA radical solution for broken digital advertising
A radical solution for broken digital advertising
 
The ABCs of Mobile App Fraud
The ABCs of Mobile App FraudThe ABCs of Mobile App Fraud
The ABCs of Mobile App Fraud
 
Ana White OPS - the bot baseline - fraud in digital advertising - 2015
Ana White OPS - the bot baseline - fraud in digital advertising - 2015Ana White OPS - the bot baseline - fraud in digital advertising - 2015
Ana White OPS - the bot baseline - fraud in digital advertising - 2015
 
Fraud in Digital Advertising (ANA study)
Fraud in Digital Advertising (ANA study)Fraud in Digital Advertising (ANA study)
Fraud in Digital Advertising (ANA study)
 
The Bot Baseline - Fraud in Digital Advertising
The Bot Baseline - Fraud in Digital AdvertisingThe Bot Baseline - Fraud in Digital Advertising
The Bot Baseline - Fraud in Digital Advertising
 
Master Mobile Marketing in 2012
Master Mobile Marketing in 2012Master Mobile Marketing in 2012
Master Mobile Marketing in 2012
 
Mystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleMystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification Bubble
 
LUMA Digital Brief 016 The Evolution of Digital Measurement
LUMA Digital Brief 016 The Evolution of Digital MeasurementLUMA Digital Brief 016 The Evolution of Digital Measurement
LUMA Digital Brief 016 The Evolution of Digital Measurement
 
Borrell Conference on Local Media (Mobile)
Borrell Conference on Local Media (Mobile)Borrell Conference on Local Media (Mobile)
Borrell Conference on Local Media (Mobile)
 
How to Regain the Trust We Lost on Digital Advertising in China
How to Regain the Trust We Lost on Digital Advertising in ChinaHow to Regain the Trust We Lost on Digital Advertising in China
How to Regain the Trust We Lost on Digital Advertising in China
 
Clash group white paper 2013
Clash group white paper 2013 Clash group white paper 2013
Clash group white paper 2013
 
[Webinar] driving accountability in mobile advertising
[Webinar] driving accountability in mobile advertising[Webinar] driving accountability in mobile advertising
[Webinar] driving accountability in mobile advertising
 
The Ad Quality Conundrum
The Ad Quality ConundrumThe Ad Quality Conundrum
The Ad Quality Conundrum
 
The Wrong Impression | Adfraud
The Wrong Impression | AdfraudThe Wrong Impression | Adfraud
The Wrong Impression | Adfraud
 
INFOGRAPHIC: The Bot Stops Here
INFOGRAPHIC: The Bot Stops HereINFOGRAPHIC: The Bot Stops Here
INFOGRAPHIC: The Bot Stops Here
 
WTF is Ad Fraud?
 WTF is Ad Fraud? WTF is Ad Fraud?
WTF is Ad Fraud?
 
How CMOs Can Build a Mobile App Strategy
How CMOs Can Build a Mobile App StrategyHow CMOs Can Build a Mobile App Strategy
How CMOs Can Build a Mobile App Strategy
 

Plus de Thierry Pires

MForum20 Digital Wallonie M-commerce - @thierry pires
MForum20 Digital Wallonie M-commerce - @thierry piresMForum20 Digital Wallonie M-commerce - @thierry pires
MForum20 Digital Wallonie M-commerce - @thierry piresThierry Pires
 
14ème édition de l’Observatoire de l’e‐pub
14ème édition de l’Observatoire de l’e‐pub14ème édition de l’Observatoire de l’e‐pub
14ème édition de l’Observatoire de l’e‐pubThierry Pires
 
Les grands enjeux b2 b du marketing mobile - 2 juillet
Les grands enjeux b2 b du marketing mobile - 2 juilletLes grands enjeux b2 b du marketing mobile - 2 juillet
Les grands enjeux b2 b du marketing mobile - 2 juilletThierry Pires
 
Livre blanc stratégies marketing les dessous de la performance web
Livre blanc stratégies marketing les dessous de la performance webLivre blanc stratégies marketing les dessous de la performance web
Livre blanc stratégies marketing les dessous de la performance webThierry Pires
 
Soirée psoriasis 2.0 1er décembre 2014 - Présentation Marketing mobile - Thie...
Soirée psoriasis 2.0 1er décembre 2014 - Présentation Marketing mobile - Thie...Soirée psoriasis 2.0 1er décembre 2014 - Présentation Marketing mobile - Thie...
Soirée psoriasis 2.0 1er décembre 2014 - Présentation Marketing mobile - Thie...Thierry Pires
 
Multi screen-moblie-whitepaper research-studies
Multi screen-moblie-whitepaper research-studiesMulti screen-moblie-whitepaper research-studies
Multi screen-moblie-whitepaper research-studiesThierry Pires
 
Deloitte mobile consumer_2014 (UK)
Deloitte mobile consumer_2014 (UK)Deloitte mobile consumer_2014 (UK)
Deloitte mobile consumer_2014 (UK)Thierry Pires
 
Sociomantic : étude power to the screens
Sociomantic : étude power to the screensSociomantic : étude power to the screens
Sociomantic : étude power to the screensThierry Pires
 
Etude sur les acheteurs en ligne idealo
Etude sur les acheteurs en ligne idealoEtude sur les acheteurs en ligne idealo
Etude sur les acheteurs en ligne idealoThierry Pires
 
Keynote marketing mobile : Mobile is mainstream, it’s now or never !
Keynote marketing mobile : Mobile is mainstream, it’s now or never !Keynote marketing mobile : Mobile is mainstream, it’s now or never !
Keynote marketing mobile : Mobile is mainstream, it’s now or never !Thierry Pires
 
Baromètre mobile marketing association france 3ème trimestre 2013
Baromètre mobile marketing association france  3ème trimestre 2013Baromètre mobile marketing association france  3ème trimestre 2013
Baromètre mobile marketing association france 3ème trimestre 2013Thierry Pires
 
Mma location-terminology guide final
Mma location-terminology guide finalMma location-terminology guide final
Mma location-terminology guide finalThierry Pires
 
Webinar MMA LOCATION TERMINOLOGY GUIDE - THE LANGUAGE OF LOCATION
Webinar MMA LOCATION TERMINOLOGY GUIDE - THE LANGUAGE OF LOCATIONWebinar MMA LOCATION TERMINOLOGY GUIDE - THE LANGUAGE OF LOCATION
Webinar MMA LOCATION TERMINOLOGY GUIDE - THE LANGUAGE OF LOCATIONThierry Pires
 
Baromètre mobile marketing association france : 2ème trimestre 2013
Baromètre mobile marketing association france : 2ème trimestre 2013Baromètre mobile marketing association france : 2ème trimestre 2013
Baromètre mobile marketing association france : 2ème trimestre 2013Thierry Pires
 
Les dix commandements du QR Code selon Unitag
Les dix commandements du QR Code selon UnitagLes dix commandements du QR Code selon Unitag
Les dix commandements du QR Code selon UnitagThierry Pires
 
Slow steady apppromo-whitepaper2013
Slow steady apppromo-whitepaper2013Slow steady apppromo-whitepaper2013
Slow steady apppromo-whitepaper2013Thierry Pires
 
FEVAD chiffres clés 2013
FEVAD chiffres clés 2013FEVAD chiffres clés 2013
FEVAD chiffres clés 2013Thierry Pires
 
Baromètre mobile marketing association France mai 2013
Baromètre mobile marketing association France mai 2013Baromètre mobile marketing association France mai 2013
Baromètre mobile marketing association France mai 2013Thierry Pires
 
The World in 2013 : ICTFacts and Figures
The World in 2013 : ICTFacts and FiguresThe World in 2013 : ICTFacts and Figures
The World in 2013 : ICTFacts and FiguresThierry Pires
 
OFcom : Communications Market Report 2012
OFcom : Communications Market Report 2012OFcom : Communications Market Report 2012
OFcom : Communications Market Report 2012Thierry Pires
 

Plus de Thierry Pires (20)

MForum20 Digital Wallonie M-commerce - @thierry pires
MForum20 Digital Wallonie M-commerce - @thierry piresMForum20 Digital Wallonie M-commerce - @thierry pires
MForum20 Digital Wallonie M-commerce - @thierry pires
 
14ème édition de l’Observatoire de l’e‐pub
14ème édition de l’Observatoire de l’e‐pub14ème édition de l’Observatoire de l’e‐pub
14ème édition de l’Observatoire de l’e‐pub
 
Les grands enjeux b2 b du marketing mobile - 2 juillet
Les grands enjeux b2 b du marketing mobile - 2 juilletLes grands enjeux b2 b du marketing mobile - 2 juillet
Les grands enjeux b2 b du marketing mobile - 2 juillet
 
Livre blanc stratégies marketing les dessous de la performance web
Livre blanc stratégies marketing les dessous de la performance webLivre blanc stratégies marketing les dessous de la performance web
Livre blanc stratégies marketing les dessous de la performance web
 
Soirée psoriasis 2.0 1er décembre 2014 - Présentation Marketing mobile - Thie...
Soirée psoriasis 2.0 1er décembre 2014 - Présentation Marketing mobile - Thie...Soirée psoriasis 2.0 1er décembre 2014 - Présentation Marketing mobile - Thie...
Soirée psoriasis 2.0 1er décembre 2014 - Présentation Marketing mobile - Thie...
 
Multi screen-moblie-whitepaper research-studies
Multi screen-moblie-whitepaper research-studiesMulti screen-moblie-whitepaper research-studies
Multi screen-moblie-whitepaper research-studies
 
Deloitte mobile consumer_2014 (UK)
Deloitte mobile consumer_2014 (UK)Deloitte mobile consumer_2014 (UK)
Deloitte mobile consumer_2014 (UK)
 
Sociomantic : étude power to the screens
Sociomantic : étude power to the screensSociomantic : étude power to the screens
Sociomantic : étude power to the screens
 
Etude sur les acheteurs en ligne idealo
Etude sur les acheteurs en ligne idealoEtude sur les acheteurs en ligne idealo
Etude sur les acheteurs en ligne idealo
 
Keynote marketing mobile : Mobile is mainstream, it’s now or never !
Keynote marketing mobile : Mobile is mainstream, it’s now or never !Keynote marketing mobile : Mobile is mainstream, it’s now or never !
Keynote marketing mobile : Mobile is mainstream, it’s now or never !
 
Baromètre mobile marketing association france 3ème trimestre 2013
Baromètre mobile marketing association france  3ème trimestre 2013Baromètre mobile marketing association france  3ème trimestre 2013
Baromètre mobile marketing association france 3ème trimestre 2013
 
Mma location-terminology guide final
Mma location-terminology guide finalMma location-terminology guide final
Mma location-terminology guide final
 
Webinar MMA LOCATION TERMINOLOGY GUIDE - THE LANGUAGE OF LOCATION
Webinar MMA LOCATION TERMINOLOGY GUIDE - THE LANGUAGE OF LOCATIONWebinar MMA LOCATION TERMINOLOGY GUIDE - THE LANGUAGE OF LOCATION
Webinar MMA LOCATION TERMINOLOGY GUIDE - THE LANGUAGE OF LOCATION
 
Baromètre mobile marketing association france : 2ème trimestre 2013
Baromètre mobile marketing association france : 2ème trimestre 2013Baromètre mobile marketing association france : 2ème trimestre 2013
Baromètre mobile marketing association france : 2ème trimestre 2013
 
Les dix commandements du QR Code selon Unitag
Les dix commandements du QR Code selon UnitagLes dix commandements du QR Code selon Unitag
Les dix commandements du QR Code selon Unitag
 
Slow steady apppromo-whitepaper2013
Slow steady apppromo-whitepaper2013Slow steady apppromo-whitepaper2013
Slow steady apppromo-whitepaper2013
 
FEVAD chiffres clés 2013
FEVAD chiffres clés 2013FEVAD chiffres clés 2013
FEVAD chiffres clés 2013
 
Baromètre mobile marketing association France mai 2013
Baromètre mobile marketing association France mai 2013Baromètre mobile marketing association France mai 2013
Baromètre mobile marketing association France mai 2013
 
The World in 2013 : ICTFacts and Figures
The World in 2013 : ICTFacts and FiguresThe World in 2013 : ICTFacts and Figures
The World in 2013 : ICTFacts and Figures
 
OFcom : Communications Market Report 2012
OFcom : Communications Market Report 2012OFcom : Communications Market Report 2012
OFcom : Communications Market Report 2012
 

Dernier

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Dernier (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Trademob whitepaper click-fraud

  • 1. Study: 40% of mobile An analysis into the effectiveness of mobile clicks are ad spend, and a accidental or discussion on click fraud techniques, fraudulent symptoms and solutions
  • 2. The distribution of useless clicks Mobile is booming, and so are mobile advertising budgets. However, 40% of due to mobile click fraud and the high rate of accidental clicks, only very highly targeted ads can effectively reach the target audience and all mobile achieve a profitable ROI. To realise the full potential and possibilities clicks show within this new marketing channel, a sophisticated mobile ad a conversion verification system is needed. rate of <0.1%. It‘s clear from recent media discussion that clicks need to be monitored in order to ensure that ad spend is used wisely rather than wasted.1 However, with a noticeable drought of actual studies into the extent of mobile click fraud and the effectiveness of mobile ad spend, Trademob decided to shed some light on the situation. An analysis of six million mobile ad clicks served across ten different ad networks found that an alarming 40% of bought mobile clicks were worthless, i.e. the conversion rate of clicks to installs was less than 0.1%.2 Since the Pay Per Click model takes centre stage as the most prominent reward system offered by most mobile ad networks, these worthless clicks cost companies 40% of their mobile advertising budgets. Click category based on after-click conversion rates. Click-to- Install rate < 0,1% 40% Useless 60% Regular So how can mobile advertisers become invincible to ineffective clicks? 1 Shalom Berkowitz. (2012, July 3). ‚4 ways to identify mobile click fraud‘. iMedia Connection. Retrieved from http://imediaconnection.com/ content/32195.asp 2 Trademob mobile click fraud study (2012, June)
  • 3. Mobile click fraud or accidental clicks? First, let‘s look at where these useless clicks come from. A closer look Click fraud at the data shows that of this 40%, around half show patterns that are highly symptomatic of click fraud, such as irregular traffic peaks and and accidental clicks coming from similar IP addresses, and the others appear to be clicks are accidental clicks.3 seriously harming ROI. Sources of useless mobile ad clicks Currently, there are three major fraud techniques being used. Facts of study Sample size 6 Million mobile ad clicks Spread 10 mobile ad networks Conducted by Trademob GmbH Time of data collection June 2012 The good news? With the right strategy both sources can be eliminated and the 40% of ineffective ad spend can be saved. 3 Trademob mobile click fraud study (2012, June)
  • 4. Accidental clicks Accidental clicks happen Objectivity when a user clicks on an ad by mistake. and advanced tracking This can be due to bad placement, a slip of the hand, or poorly designed, misguiding mobile banners. These useless clicks cannot are equally be associated with click fraud because genuinely accidental clicks do important happen sometimes, especially owing to small mobile screen sizes. in detecting In 2011, a study by Pontiflex (Harrison) found that 47% of all mobile accidental clicks happened accidentally.4 Since then the mobile industry has clicks. grown exponentially, smartphone and tablet screens have increased in size, and user behaviour has shifted. Despite an observed decrease, 22% of clicks still happen accidentally and fail to convert. The solution to this problem is identifying and blacklisting publisher apps and other mobile traffic sources that, purposely or otherwise, create multiple worthless clicks. There‘s just one problem here: in order to make informed choices about publishers, pre- and after- click data need to be matched and analysed, bringing us back to the perpetual dilemma of thorough campaign tracking on iOS. However, with ad verification techniques and new innovative tracking solutions such as accurate fingerprinting, effective UDID- independent campaign tracking and media buy optimization are possible. Accidental clicks are really not a new issue in the mobile industry and could be eradicated if ad networks had the right tracking at hand. Still, advertisers lose almost half of their budgets to ineffective clicks. Clearly, equally as important as advanced tracking is publisher- independency and complete objectivity. Thus, advertisers should rely on unbiased parties having access to the necessary tracking data to optimize their ad spend. 4 David Kaplan. (2011, January 27). ‚Pontiflex: About Half Of Mobile App Clicks Are Accidental. paidContent. Retrieved from http://paidcontent. org/2011/01/27/419-pontiflex-about-half-of- mobile-app-clicks-are- accidental/
  • 5. Mobile click fraud Click fraud refers to A constant premeditated clicks that are not driven by a battle exists genuine interest in the target of the ad link. between fraud There are difficulties in officially defining click fraud due to the and anti- fraud possibility of unethical parties discovering loopholes in the legislation. due to both This however does little to protect advertisers, who are thus unable to communities dispute or verify reasons for click charges. continually A common understanding of click fraud is as follows: by arranging improving false clicks on ads, shady publishers take advantage of Pay Per Click their agreements and charge for clicks with extremely low conversion rates. Performed effectively, this can significantly affect advertising strategies. costs and revenue potential. Click fraud has been an issue for online advertisers since the internet‘s formative years and has already been used by publishers to unfairly deprive advertisers of millions of dollars. As a reaction to better fraud- detection solutions, more cunning and sophisticated fraud systems are conceived, leading to a constant battle between the fraud and anti-fraud communities. The recent mobile boom means more substantial investment in mobile ads. Global mobile advertising spend was 5.3 billion USD in 20115 and is predicted to rise to 24 billion by 2016.6 With this in mind, it‘s unsurprising that more and more click fraudsters are now targeting mobile ads as well. So how exactly do fraudsters fill their pockets with the mobile advertiser‘s money? Mobile click fraudsters haven‘t reinvented the wheel. They mostly rely on traditional online fraud techniques and have more or less successfully adjusted them to the new ecosystem. Three major fraud techniques, comprised of plain and pure server-side fraud, and more sophisticated types (namely botnets and client-side fraud) can be observed. Fortunately, all types can be detected and eliminated with the right expertise and tracking. 5 Mobile Advertising Market Valued at $5.3 Billion (€3.8 Billion) in 2011‘. (2012, June 6) Interactive Advertising Bureau. Retrived from http://www. iab.net/about_the_iab/ recent_press_releases/press_release_archive/press_ release/pr-060612_global 6 By 2016, Mobile Advertising Outlay Will Equal Current Total Online Ad Spending.‘ (2011, June 23). ABI Research. Retrieved from http://www.abiresearch.com/press/3706-By+2016,+Mobile+ Advertising+Outlay+Will+Equal+Current+Total+Online+Ad+Spending
  • 6. Major mobile click fraud techniques Plain fraud Server-side Publishers use (their own or hacked) servers to report millions of fake clicks per minute, none of which ever actually happened. Though made to look real by sending convincing data, these false clicks are easy to detect with the right tracking solution. Fake click triggered on publisher server(s) Sophisticated fraud Botnets Botnets are inventories of hijacked devices on which viruses are installed, creating fake clicks which go unnoticed by the user due to not being shown onscreen. Most botnets rely on non-mobile inventory but fraudsters can manipulate click-data to appear to be mobile ad clicks.  Click autonomously triggered on hijacked device
  • 7. Client-side Unlike plain fraud and botnets, client-side fraud involves actual user interaction. This again goes unobserved by the user. By way of example, a person might unintentionally click on an ad banner which is hidden behind another banner, with the publisher then charging the ad network for both the intentional and unintentional clicks. Click (in)- directly triggered by user The bright side: detection of click fraud Detecting plain fraud Server-side fraud is probably the most basic form of click fraud and Click bulks of is relatively easy to detect. As clicks are sent from the same server(s), they come from the same IP address and the header data which are IP address and transferred along with each click will show a similar device parameter fingerprints composition, also referred to as fingerprint. With the right tracking can uncover and algorithm, these bulks of clicks sharing the same IP address and parameter composition can quickly be identified. plain fraud.  IP Address IP Address Device Parameter Composition Device Parameter Composition (regular traffic) (fraudulent traffic)
  • 8. Detecting sophisticated fraud The more sophisticated fraudsters have established their own Under ‘inventory management’ to increase the IP distribution and optimize click reporting to conceal fraud the best way possible. However, these investigation, days, most mobile fraudsters only apply the minimum effort required fraud is found in order to achieve their goals, and these cover-up strategies are still out through immature. inconsistent Deeper analysis of click data by ad verification platforms can therefore activity and also reveal more advanced types of fraud. We may still see peaks of irregular clicks at unexpected times of day, for example. patterns. Daily click pattern reported by publishers Daily click pattern with irregular peaks (reported by shady publishers) But the biggest hurdle for shady publishers is that they don’t know the campaign settings, so the click data may not match the selected target. Let’s say a mobile ad campaign is targeted to be shown only to iPhone Fraudsters users located in Western Europe. A fraudster, noticing a high-paying CPC click on his mobile website executed by a German user, decides don‘t know to increase his revenue stream using his ‘botnet’ made up of hijacked campaign Android phones in India to report more of these well-paying clicks. settings such Tracking reveals these discrepancies. as target area. Fraudsters report clicks from outside the target zone
  • 9. Optimizing ROI through ad verification Summary Click fraud and accidental clicks could cost advertisers as much as 40% With of their advertising budget, money which is far better spent where it has a positive impact. Fortunately, this 40% can be moved back into advanced an advertiser’s efficient ad spend and help ensure the effectiveness of tracking their mobile ad campaigns. and ad verification, In order to optimize a mobile ad campaign, it is vital to use ad verification to spot and blacklist sources of click fraud and accidental useless clicks who cost money but offer nothing in return. By tracking ad clicks can be campaigns and analysing pre- and after-click data, it is possible to stamped out. sink publishers that underperform and invest in the ones that bring revenue. Such a cross-network blacklisting of useless publishers requires a deep integration with ad networks, access to publisher and user data and an advanced tracking technology that can create a unique fingerprint for each click source and match clicks with after- click actions. Choosing the right strategy Besides sophisticated tracking data, an independent and objective optimization is required to ensure that mobile ad spend is allocated to its most effective sources. It’s possible to invest only in publishers that bring in app users and ROI. Via advanced fingerprint technology, thorough optimization and an objective approach, accidental clicks and fraud can be detected and prevented. While advertisers are obviously pure in their intentions to maximize their ROI, they lack the tracking technologies as well as access to the click- and publisher data. Even with the desired data at hand, analysing and preventing ineffective clicks requires automated systems, a deep technical network-integration and the right algorithm. Advertisers will thus most likely face huge manual effort here, without achieving the desired results. On the other hand, many ad networks lack the sophisticated tracking solution and data. And given that they are caught between three business goals (the advertiser’s satisfaction, the publisher’s satisfaction and their own revenue stream), campaign optimization is, by nature, corrupted. Advertisers thus depend on objective intermediaries advocating their interests.
  • 10. What can Trademob do? As an aggregation platform, Trademob is able to focus on advertisers‘ A 100% interests whilst remaining independent from publishers. Providing accurate and proven fingerprint tracking, a close collaboration with advertiser- ad networks and a clear optimization focus, we ensure that our targeted clients‘ marketing goals are achieved in the best, most efficient solution way. As a result,can Trademob do? What transparent and revenue-driving campaigns make mobile advertising profitable for the advertiser and mobile marketing enables true As an aggregation platform, Trademob is able to focus on budgets rise. Advertisers, ad networks and trustworthy publishers all campaign A 100% advertisers' interests whilst remaining independent from benefit from our advertiser-targeted solution. fingerprint tracking, a publishers. Providing accurate and proven advertiser- optimization. close collaboration with ad networks and a clear optimisation focus, we ensure that our clients' marketing goals are achieved in the targeted Disclosing and blacklisting click a result, transparent and revenue- best, most efficient way. As fraud and accidental clicks can solution eradicate 40% campaigns make mobile advertising profitable for ROI. driving of ineffective mobile ad spend and ramp-upthe enables true advertiser and mobile marketing budgets rise. Advertisers, ad However, there are many more optimization settings such as; banner networks and trustworthy publishers all benefit from our advertiser- campaign type, timing, device, channel, and location. Therefore it comes as targeted solution. optimisation little surprise that we see overall optimization for our clients’ targeted Disclosing and blacklisting click fraud and accidental clicks can mobile advertising40% of ineffective mobile ad spend and ramp-up ROI. eradicate campaigns as high as 70%. However, there are many more optimisation settings such as; banner type, timing, device, channel, and location. Therefore it comes as little surprise that we see overall optimisation for our clients’ targeted mobile advertising campaigns as high as 70%. Advanced Advanced campaign campaign optimisation optimization sees an ROI App Users increase of sees an ROI up to 70% increase of ROI ! up to 70%.
  • 11. Appendix: Mobile click fraud techniques in more technical detail As we’ve only scratched the surface of mobile click fraud types in the previous section, here’s a more detailed account for those of you harbouring a hidden passion for IT.
  • 12. Server-side click fraud Historically, fraud originated from single machines like privately Current owned PCs and servers, with increased professionalism progressing into server clusters and cloud-hosters. As the number of machines mobile fraud is a limiting factor, each machine needs to deliver a good number of attempts are fraudulent requests, ideally clicks and impressions, to generate an still largely unsuspicious clickthrough rate. very primitive. The generation of the necessary partly-forged http-requests is carried out by scripts or full-blown fraud-suites obtainable on the internet’s black market. The most sophisticated come with a throttling of requests to avoid ‘off-the-chart’ effects that could trigger a review and also a multitude of faked browser-headers to show a good distribution of users. But even with the increase of hacked servers, this source of fraud can easily be detected. The limit in server numbers means a tight clustering of IP addresses as well as fingerprinting parameters. Also with different tools and scripts in use by the fraudster, each cluster can show a specific distribution of client-parameters. In addition to the shown weaknesses in masking their unwanted behaviour, javascript and other more complex client-side technologies are often ignored in simple fraud attempts. This might be due to the fact that per server performance and tight control over http-behaviour is a dominant requirement for server-side fraud. Botnets When single servers are not available or too easy to blacklist, a cheap and willing workforce of hacked consumer PCs is available to paying ‘customers’. Botnets, when perceived as a platform, can be utilised for online and mobile fraud with a similar toolset as for server-side fraud. The renting is flexible, fees are low and the IP distribution is drastically increased, though it still depends on the size and quality of the used network. Due to the volatile nature of clients caught in a botnet, detection and blacklisting can be harder to achieve by opposing ad- networks or DSPs. Botnet owners have developed an own ‘inventory management‘ of their hijacked devices to cover up their unethical activities.
  • 13. Client-side With the recent sharp increase right at the zenith of Web 2.0, client- Close side technology has become the new playground for script- kiddies, benevolent hackers and clever fraudsters alike. Somewhat tech-savvy collaboration webmasters with a significant user base may think their mobile page of the needs a bump in revenue. They can be tempted, once they realise how anti-fraud easy it is, to place banners inside invisible layers and put paying clicks on close buttons or fake scrollbars. Due to the diversity in users on community international sites this kind of fraud will be harder to detect as long as can affront they are able to slip through the ad network’s quality controls. more sophisticated It gets much more complex when fraudsters decide to parasite on other sites, using cross-site scripting and SQL-injects as their most fraud in the common angles of attack. This approach programs legitimate websites future. to serve malicious javascript code which in turn makes the unaware user generate visible or invisible clicks on high CPC- campaigns. All of this is configured and frequency-capped by the fraudster‘s ‘inventory management’ on yet another hijacked machine. Client-side fraud techniques show the highest diversity of IPs and device parameters, leaving fewer other data to identify a pattern. Some publishers also decide to ‘charge’ their real clicks by a humble factor of 2 to 10, showing at least some conversions in performance reports. With this in mind, it is evident that there is a clear need for a scientific approach and number crunching on past experience to detect fraud when it comes to its advanced stages. Conclusion Though click fraud might sound sophisticated, in reality fraudsters currently only apply the minimum effort required to achieve their goals. Right now there is only very little creativity needed to overcome basic macro-plausibility checks and much of their work goes undetected. Simple fraud techniques still work out in a big way – an arms race between the fraud and anti-fraud side has yet to be triggered. On the bright side, it means that platforms with access to both pre-and after- click data, can quickly expose fraudulent publishers. Looking ahead, it is likely that fraudsters will change strategies when a major part of the market is able to detect their activity. So fraud detection and prevention will likely be challenged in the future and will require a close collaboration among the anti-fraud community, with cross-network and cross-campaign tracking and data analysis forming the initial steps.
  • 14. Questions? Ask us. The Data- Global, Independent, Transparent Mobile Advertising for your App. Driven App Marketing info@trademob.com, www.trademob.com Platform Berlin, London, Paris, Madrid, New York