Notes on Advertising
26 minutes read
Jun 1, 2022
Sep 3, 2020
Ad Tech
2022
-
BleepingComputer - Vodafone Plans Carrier-Level User Tracking for Targeted Ads
-
TrustPID
enables mobile phone carriers likeVodafone
to share random subscriber unique IDs based on “network identifiers provided by network operators” with participating advertising providers. - Opt-in consent is obtained through traditional website cookie banners.
- “The mobile carrier plans to assign a fixed ID to each customer and associate all user activity with it. The ID will be based on a number of parameters, so that the system will be able to maintain persistence. Then, the mobile ISP creates a personal profile based on that ID and helps advertisers serve targeted ads to each customer without disclosing any identification details.”
-
-
AdExchanger - SXM Media Intros an Audio Identifier (Because Cookieless)
-
AudioID
seeks to be a widely used advertising identifier for audio content “across Pandora, SiriusXM and Stitcher” and “the widerAdsWizz
network of audio and digital publishers” to enable targeted programmatic advertising. - “AudioID uses an algorithm to match and encrypt different consented listener signals, including mobile ad IDs and email addresses.”
- “We want to offer whoever wants to integrate on the platform as a partner the capability [to do so].”
- These identified users can be used to create look alike audiences for mediums which are traditionally identity poor such as podcasts.
- “zip code, market, country/ region, metro device type and OS, language, and much more”, “Point of Interest targeting — coffee shops, stadiums, gas stations, and so on”, “Increased addressability – target by age, hundreds of behavioral segments” can be used for targeting in podcasts. [Source]
- “Our unique AI Transcription Technology goes beyond traditional targeting parameters to dive deeper into what makes podcasts so strong – their content… which allow[s] advertisers to target or fend off specific content, ensuring brand safety at a granular level and a more contextual understanding of the content by unveiling unique patterns and eventually mood and sentiment”. [Source]
-
2021
-
AdExchanger - Conversational Media, Emoji and DEI with Holler CEO Travis Montague [Article, Podcast]
-
Holler
is a company which provides animated “stickers” as a service as seen in apps likeVenmo
and in “messaging, dating, gaming, social, or productivity apps” in a privacy conscious way where the messaging content used to query the stickers does not leave the device. -
Holler
has expanded into providing marketing opportunities for brands via custom branded stickers for many well known companies such as “Snickers, Ikea, and Fox” as well as Starbucks, HBO, Coors, McDonalds, Disney, Bose, Chipotle, Keurig, and others. - Through these apps
Holler
has significant reach.- “Holler’s exclusive partnership with Venmo awards brands the only opportunity to advertise on the world’s largest peer-to-peer payment platform. With over 101 billion transactions happening each year on Venmo, it’s the ultimate exposure for your brand. Influence over 60 million monthly shared payment experiences with smart contextual brand alignment.”
- “The app currently delivers more than 800 million content recommendations per day, up from 20 million in February 2019.”
-
-
Cornell University - The CNAME of the Game: Large-scale Analysis of DNS-based Tracking Evasion [Paper]
- Advertisers are switching from third party advertiser domains to first party publisher sub-domains to prevent adblockers from blocking advertiser resource requests.
- CNAME records, entries which map a domain to another domain, can be used to mask the domain content is being served from.
- This is impossible to detect without performing the DNS lookups yourself since DNS servers recursively resolve and only return the IP from the final result.
- This is gaining in popularity on major sites: ~10% of top 10,000 sites.
- Use of CNAMES to host third party content creates new privacy and security risks to data on the primary domain; something which third party domains do not have access to due to browser security measures (Ex: An analytics company will have access to the sites session cookies and this could allow the analytics company to do anything a user on the site can do).
- A records have been used as well.
- NX records could be used to delegate control of sub-domains to advertisers in order to randomize entries and mitigate publisher sub-domain blocking.
- Advertisers are switching from third party advertiser domains to first party publisher sub-domains to prevent adblockers from blocking advertiser resource requests.
2020
-
VentureBeat - Ryff raises $5 million for virtual product placements [Article]
-
Ryff
has developed technology to stitch in sponsored products within film and TV content after it has been produced.- “Ryff embeds product placement imagery into the content that is not only contextual, but also drives positive emotions from audiences, the company said. The imagery embedded can take the form of simple branded objects or signage all the way through to sophisticated interactive and dynamic ads.”
- This can be used to deliver dynamically branded content to targeted viewing groups.
- “Brand references appear as if they were filmed in the original production and can be tailored for audience specificity according to a range of variables including individual viewer, platform (e.g., traditional broadcast, web, or mobile), geography, date, and demographic profile.”
-
-
AdExchanger - The PubMatic IPO, With CEO Rajeev Goel [Podcast]
- Companies, such as
PubMatic
are adapting to the “cookliess future” by supporting a sign-in to view content model; This allows the the content provider to gather info from the user on signup, such as an email address, which the advertiser can use to tie to a cross site identity.
- Companies, such as
-
AdExchanger - An Ad Tech Health Check, With TripleLift Founder And CSO Ari Lewine [Podcast]
-
TripleLift
acknowledges the role of ad-tech in enabling misinformation and disinformation; Specifically the potential opaqueness of where programmatic ads are placed or the profit potential for “SSPs and exchanges” provides ad revenue for this type of content.- “These publishers that spread misinformation make most of their money from ads, programatic ads specifically. And there’s less than a dozen companies who can really help facilitate their ad revenue.”
-
NewsGuard
, a service used by TripleLift to ensure supply quality, provides a “newsworthyness” score for publishers. -
TripleLift
is developing “brand integrations” where computer vision is used to insert targeted brand messages into video content post production (ex: A billboard in a video might show an ad for Verizon to one viewer and an ad for ATT to another viewer)
-
-
AdAge - How brands can use neuroscience to solve COVID social distancing dilemmas in ads [Podcast]
-
Neuro-Insight
is using neuroscience research and techniques to measure ad messaging effectiveness in order to improve the desired response of visual and audio ad content. - Specifically they claim to measure brain activity magnitude and location with second granularity to determine:
- Long Term Memory encoding - facts and emotions recallable after an hour or longer
- Engagement - the personal relevance of the content
- Emotional Intensity / Arousal - the strength of emotion
- Approach or Withdrawal / Motivational Balance - emotions of happiness, pleasure, etc. versus fear, anxiety, etc.
- Visual Attention - visual processing of local details or global features
- The company relies on Steady State Topography (SST), which measures brain electrical activity in a related way to an EEG. The high fidelity measurements allow meaningful correlations to be determined over a single session whereas an EEG and fMRI require averaging measurements from multiple sessions to filter out the noise.
- Twitter has used Neuro-Insight’s service to measure how a group responded while using the service versus browsing a typical webpage.
- Neuromarketing is not uncommon in the ad and marketing industry.
- Papers by Neuro-Insight:
- Conceptual Closure: The Impact of Event Boundaries on Advertising Effectiveness | ESOMAR, 2015
- The Power of Social Television: Can Social Media Build Viewer Engagement? A New Approach to Brain Imaging of Viewer Immersion | Journal of Advertising Research, 2014
- Brain Activity Correlatesof Consumer Brand Choices Shift Associated with Television Advertising | International Journal of Advertising, 2008
- Measuring Emotion in Advertising Research | IEEE Pulse, 2012
- Frontal Steady-State Potential Changes Predictlong-Term Recognition Memory Performance | International Journal of Psychophysiology, 2000
- Steady State Visually Evoked Potential (SSVEP) Topography in a Graded Working Memory Task | International Journal of Psychophysiology, 2001
-
-
AdAge - Main Street One CEO Curtis Hougland on the launch of a senior political influencer network [Podcast]
-
Main Street One
is reapplying tactics and techniques developed to fight online ISIS and Russian propaganda for use in political campaigns and eventually general advertising campaigns. - Able to run influence campaigns at scale by matching campaign goals with a network of influencers (ex: “employees, former employees, content creators, social influencers”, …) trusted by the target audience.
- Once matched, inlfuencers who opt-in are paid to produce content according to campaign prompts.
-
-
AdExchanger - Solving For Identity, With MediaWallah CEO Nancy Marzouk [Podcast]
-
“First Party” data (user provided; ex: registration data such as name, email, phone, …) is being linked with “Third Party” data (ex: browser fingerprint, phone advertising ID, cookies, …) in order to link online activities with identities.
- First party can be obtained when 1) a service embeds an advertising framework which hooks into the registration process 2) a single sign on provider (ex: Facebook, Google) is used to login.
- Third party data can include browser and device fingerprints, IDs, and cookies. It can also include information to infer if two people are members of the same household such as access times, and local and public IP addresses.
-
“First Party” data (user provided; ex: registration data such as name, email, phone, …) is being linked with “Third Party” data (ex: browser fingerprint, phone advertising ID, cookies, …) in order to link online activities with identities.
-
AdExchanger - Banking On Data, With Cardlytics CEO Lynne Laube [Podcast]
- Some banks are using
Cardlytics
to process transaction data to provide advertising to bank customers. Customers are offered discounts within spending categories (Ex: The purchase category of Fast Food would offer a discount to Burger King over McDonalds if you frequent the latter, or a discount on an upsell for an airline). - No PII is used however a unique ID is associated with the customer. There is the ability to link customers across bank accounts.
- Some banks are using
-
TransUnion: Identity Graph
-
TransUnion
, a credit bureau, provides “identity resolution” services for resolving third party data of individuals and households into pseudo-anonymous identity and household IDs. - “Lookalike” audiences are built using this technique
- ex: In one case study a model is trained on 3rd party data of people who made in store visits and used to build a cluster, from 99% of US adults, of those likely to convert. Those in the lookalike cluster were then targeted in an online campaign.
- “We link data, including name and postal address, phone, email, MAID [(Mobile Ad Identifier)] and IP address, to create persistent TransUnion IDs” (playbook)
- Probalisitic rather than deterministic techniques across multiple transient IDs and signals are used to link users across devices and homes
-
2019
-
Adelphic - Uniquely Identifying a Network-Connected Entity [Patent]
- A software technology to identify users across devices by looking at device data and usage behavior. Feature data is collected from user devices. Rules are run against the feature data so that the same visitor can be identified across devices and linked to a single id. Rules consist of expert rules which are manually created, and probabilistic rules which are statistically generated (ex: machine learning).
- Feature data may consist of…
- “The deterministic data is data (e.g., a cookie, a device identifier, an MSISDN, a phone number, an email address, a user identifier such as an OpenId, or the like) assigned to a user by a provider. The device and system-specific feature data may be quite varied and typically is one of: operating system (OS) type, OS version, system clock value, execution speed, time of last installation, time of last boot, system default language, system local time, time zone offset, orientation, a display metric, a globally unique identifier (GUID), a model, a brand name, and a build version. The usage feature data also may be quite varied and typically is one of: HTTP headers, usage agent information, user query data, application launch time, application exit time, network type, page load time, page unload time, day and time of access, day of week, time of day, page referrer, plug-in data, geo-data, location data, URL view data, typing frequency data, and gesture data”
- “typically is a cookie, deviceID (e.g., UDID, ODIN, Open UDID, Android_ID, or the like), email address, telephone number or the like.”
- “Another encoding type is range, such as day of the week, hours of the day, and call duration.”
- “For mobile applications, typically a device identifier, such as a UDID in iOS™ devices, and the Android_ID in Android™ OS devices, is used to identify a device. A major advantage of identifiers of this type is that they are unique to a device, and all the applications to which the device has access theoretically share the same identifier. This same advantage, however, creates privacy and security concerns, and these concerns have discouraged the use of such identifiers for identity purposes. Indeed, in some cases these device identifiers are being made inaccessible to developers. Other unique device identifiers, such as MAC address, IMEI, and ESN, are being proposed as substitutes. These alternatives, suffer from some of the same concerns as those that exist with the UDID, but they are also are difficult to use because there are no clearly-defined ways to access them. Another approach is to the problem uses application-generated identification. These approaches, which are available through initiatives such as openUDID, SecureUDID, and ODIN, overcome many of the deficiencies of the device-specific approach. Nevertheless, because these identifiers are assigned by applications, they are accessible only to the applications that have permission to access them.”
- “Another common limitation of both the device-specific and application-generated approaches is from the perspective of usage monitoring in that they do not address or solve the problem of identification of an entity that uses different devices (such as a mobile phone and a tablet) to access the same content. HTTP cookies have long been a de facto standard for identifying unique users on the Web. However, cookie-based techniques suffer from several problems in that they cannot be used easily in non-browser-based applications, which now account for the vast majority of mobile applications. Further, cookies are device and browser-specific; two browsers (or distinct browser instances) on the same device receive two different cookies from the same domain. Conversely, different users of the same device and browser receive the same cookie when they visit a particular domain. Further, cookie support in mobile device-based browsers is not stable and, in general, the approach does not work well with mobile applications. Even when cookie support works, different devices are identified by different cookies. Moreover, because cookies are stored on the client, they are subject to blockage and deletion. Further, because of privacy concerns, browsers often implement functions that it makes it increasingly easy to disable and delete them.”
- “For the mobile web, many techniques besides cookies are being tried for device identification. These include, without limitation, packet sniffing, web beacons, HTTP header information, IP addresses, and the like. Those variables alone often are not enough to serve as persistent device identifiers. These approaches may be combined with fingerprint-based device identification methods for fixed network devices, although the results have variable reliability. Browser fingerprints, for example, which work well with the fixed Web, become unreliable when applied to a mobile Web browser because little user and device-level customization are available to serve as distinguishing features. In addition, such information pertains only to the device, as opposed to the user of the device.”
- Applications of this platform may include “an advertising (ad) engine, a product recommendation engine, a fraud detection engine, a conversion tracking engine, a database program, and the like.”
-
AdExchanger - The Companies Challenging LiveRamp’s Supremacy In Data Onboarding [Article]
- “
LiveRamp
pioneered data onboarding, the technology to match anonymized online user cookies and mobile IDs to real-world consumers and offline data.” - “
Neustar
benefits from the legacy offline data set, which has personally identifiable information like names and home addresses that it can match to emails, cookies and mobile IDs, said Michael Schoen, SVP and GM of marketing solutions.” - “
Throtle
, for instance, is focused on adding healthcare brands, which Chachko said are more comfortable using first-party data now and value accuracy over scale for identity products. There are also healthcare data risks that discourage some tech companies from entering the vertical. ForThrotle
, that’s part of the attraction.” - “
TransUnion
has roots in consumer tracking for individuals to monitor their credit scores and for businesses that issue credit to appraise applicants, like insurance companies, mortgage financiers or real estate landlords. That archive of offline consumer activity is the foundation forTransUnion
’s data onboarding service.” - ”[
ZeoTap
] has exclusive data licensing deals with 10 telcos and 70 other ecommerce or publishing partners. And… telcos own the “gateway” where browser cookies or advertising IDs can be deterministically matched to longer-lasting profile data like emails or phone numbers.”
- “
2014
-
ArsTechnica - Ads use Ultrasound to link Phone, TV, tablet, and PC
-
SilverPush
uses audio beacons embedded in ads to track users. - “The audio beacon enables companies like SilverPush to know which ads the user saw, how long the user watched the ad before changing the channel, which kind of smart devices the individual uses, along with other information that adds to the profile of each user that is linked across devices.”
-
2009
-
ACM Queue - What DNS Is Not
- Missing DNS entries have been overriden by ISPs and Verisign (which operates the .COM TLD) to return ad revenue generating search results instead of a no-entry response (
NXDOMAIN
).
- Missing DNS entries have been overriden by ISPs and Verisign (which operates the .COM TLD) to return ad revenue generating search results instead of a no-entry response (
Advertising Techniques
Sponsored Content
2020
- Dynamic post-production product placement is being used in film and television content.
- See
Ryft
andTripleLift
.
- See
2019
-
Washington Post - Is it news you can use? An ad? Both? On some morning TV programs, it’s hard to tell. [Article]
- Some morning news programs have regularly taken money to dictate content in paid segments of the show, without informing viewers of the sponsorship. Others do show a “brief disclaimer” which can be missed.
2018
-
Wall Street Journal - Instagram’s Content Factories Are Huge—And That’s a Problem for Facebook [Article]
-
Instagram
influencers and creators can command a large reach by growing their followers. Advertisers pay influencers to put out sponsored posts. Instagram’s rules require that sponsored posts are labelled but this is not always followed.- “On a typical day, 421’s staff of about 30 workers churn out dozens of posts from more than 100 Instagram accounts with a total reach of around 300 million followers”
- “Advertisers on these sites pay by the eyeball—an estimated $373 million on influencer marketing in the U.S. and Canada in the first quarter of 2019, according to Instascreener, which tracks marketing on Instagram. About $265 million of that was on Instagram, up 62% from the same period a year earlier.”
- “Instagram accounts for 22% of Facebook’s total ad revenue, according to estimates by Andy Hargreaves, an equity research analyst with KeyBanc Capital Markets Inc.”
- “Aspiring influencers hope to match the success of such celebrities as Ms. Kardashian West, who charges several hundred thousand dollars for a single post.”
- “Up-and-coming influencers can command $100 to $5,000 a post, according to Kamiu Lee, CEO of influencer platform Activate.”
- “Salvatore DiBenedetto, 20, built a large following by buying and selling Instagram accounts, including one he created, @wastedoninstagram. Mr. DiBenedetto sold accounts to 421 for $120,000.”
- This might be eroding public trust on the internet
- “‘The perception that everything on the internet is fake is becoming more and more popular,’ said Sean Spielberg, co-founder of Instascreener, an influencer analytics tool.”
- Some influencers indirectly pay to get more followers via giveaways
- “The influencers pool money to buy a prize, often a coveted designer purse. Each influencer instructs their fans to follow the accounts of all the influencers who put up the prize money. That makes them eligible to enter the prize raffle. Ms. Faust’s followers grew to about 250,000 at the end of last year, from 100,000 followers in late 2016.”
-
-
The Outline - These are the People Paying Journalists to Promote Brands in Articles [Article] and How Brands Secretly Buy their Way into Forbes, Fast Company, and HuffPost Stories [Article]
- Some smaller marketing agencies have paid authors to put brand mentions in tech news articles and blog posts they have written.
- Some marketing agencies and clients may have unknowingly paid for these brand mentions by hiring agencies who use this practice.
- Journalist paid brand placement in articles often goes against the site’s editorial guidelines and the content is removed when it is discovered.
In the News
2021
-
Kreb’s on Security - Intuit to Share Payroll Data from 1.4M Small Businesses With Equifax
-
Intuit
will be selling payroll data of all their business customers who use “QuickBooks Online” withEquifax
’s “The Work Number” unless the business opts out.- Employees have no say in opting out of the data sharing however they can file a request with “The Work Number” and
Experian
.
- Employees have no say in opting out of the data sharing however they can file a request with “The Work Number” and
- It is not clear if the data is currently being used for advertising purposes.
- However
Experian
offers an advertising product “MarketingConnect” which would benefit from this addition of data. - And “The Work Number” offers alternate search capablities for “…consumers [to] still be identified in a variety of ways, including name, address, and date of birth.”
- However
- “Using payroll data from government agencies and thousands of employers — including a vast majority of Fortune 500 companies — Equifax has cultivated a database of 300 million current and historic employment records.” where each record represents “an individual’s employment with a specific employer”.
-
-
Wall Street Journal - FTC Reaches Settlement With Flo Health Over Fertility-Tracking App [Article]
-
Flo Health
“promised” user data would be kept private. - They shared some of that data with “third parties that provided marketing and analytics services” such as
Facebook
andAlphabet
/Google
for use with ad targeting. - “Facebook software collected data from many apps even if no Facebook account was used to log in, and even if the end user wasn’t a Facebook member.”
-
2020
2019
-
Wall Street Journal - You Give Apps Sensitive Personal Information. Then They Tell Facebook. [Article]
- “HR Monitor, the most popular heart-rate app on Apple’s iOS, made by California-based Azumio Inc., sent a user’s heart rate to Facebook immediately after it was recorded.”
- “Flo Health Inc.’s Flo Period & Ovulation Tracker, which claims 25 million active users, told Facebook when a user was having her period or informed the app of an intention to get pregnant, the tests showed.”
- “Real-estate app Realtor.com, owned by Move Inc., a subsidiary of Wall Street Journal parent News Corp, sent the social network the location and price of listings that a user viewed, noting which ones were marked as favorites, the tests showed.”
- “BetterMe: Weight Loss Workouts, was in its Android version also sharing users’ weights and heights with Facebook as soon as they were entered.”
- “Among the top 10 finance apps in Apple’s U.S. app store as of Thursday, none appeared to send sensitive information to Facebook, and only two sent any information at all. But at least six of the top 15 health and fitness apps in that store sent potentially sensitive information immediately after it was collected.”
- This data is used for analytics accessed by developers and for
Facebook
to do ad targeting and market research. - The data is collected as part of “App Events” in the
Facebook
SDK common to many apps. These events include a set of common events such as logins and purchases and custom events defined by the developed where this user data is often collected.
2017
-
Wall Street Journal - Vizio Settles FTC Lawsuit For Snooping On TV Viewers [Article]
-
Vizio
was accused of “using its TVs to track what its owners watched, then selling that information to marketing firms, all without customers’ knowledge or consent. Vizio agreed to pay $2.2 million to settle the lawsuit filed by the Federal Trade Commission and the New Jersey Attorney General” - The TVs tracked what movies, TV, and commercial content was being watches on a per second basis.
- “the FTC said the data that was sold included information such as a consumer IP address, which companies then used to track and target consumers across different internet-connected devices”
-
Laws and Policies
2023
2021
2020
- Identification for Advertisers (IDFA) opt-in in iOS14 [Apple] introduced and goes into effect.
- 3rd-party cookie removal in Chrome web browser [Google] introduced - Third-party cookies in Chrome will be “removed within two years”.
2018
- CCPA [CA, US] introduced and passed.
- GDPR [EU] goes into effect.
2017
- “Restoring Internet Freedom Order” rolls back “Title II Net Neutrality” approved and goes into effect in 2018.
- FCC privacy protection for broadband consumers [US] rolled back by congress before implemented - ISPs can collect and sell customer web browsing data.
2016
- GDPR [EU] introduced.
- FCC “Protecting Privacy for Broadband Consumers” [US] passed - “ISPs would be required to obtain affirmative “opt-in” consent before using or sharing sensitive information”.
- Verizon sued by FCC over “Supercookies” / UIDH [US]
2015
- Title II Net Neutrality [US] adopted and released by FCC.
2013
- “Supercookies” / Unique Identifier Headers (UIDH) [US] used by Verizon and ATT to aid in tracking and targeting of consumer web browsing over cell networks without consumer knowledge or consent.
Terminology
- Supply / Sell Side Platform (SSP) - a platform which provides ad placement opportunities across content providers (ex: sites, apps, etc) from multiple customers.
- Demand Side Platform (DSP) - a platform which provides targeted ad content from multiple ad and data exchanges.
- Customer Data Platorm (CDP) - a platform which unifies customer data across various different collection points in an organization
-
Ad Network - a company which connects advertisers to content providers (ex: TV, print, online).
-
Programmatic Advertising - software automated purchasing of digital advertising.
- Real Time Bidding - a form of programmatic advertising where ads are purchased for placement immediately through an auction.
- Linear Media - media content which is accessed in a fixed order without any interactivity (ex: cable TV)
- Over the Top (OTT) - streaming media service provided directly to customers over the internet across multiple devices (ex: Netflix, WhatsApp, Skype)