Skip to main content

Home/ Open Intelligence / Web 3X (Social + Mobile)/ Group items tagged privacy

Rss Feed Group items tagged

D'coda Dcoda

Google hidden 'Ad Preferences' page reveals what privacy-row search giant thinks it kno... - 0 views

  • IT has been said that Google knows more about what you like than your own partnerNow the search giant has given a glimpse on just how much information it has collected - and who thinks you are.But it seems the famed Google algorithms are far from infallible.
  • And people taking advantage of the facility that allows the public to view what kind of consumer Google thinks they are have been amused to find themselves listed with the wrong age and even sex.Nevertheless, the knowledge that Google works so hard to profile its 350m account holders is bound to intensify the debate about privacy which flared up again this week with the announcement that the company was going to start tracking users across all of its sites, including YouTube.
  • The detailed personal 'profile' sums up many of a user's interests, along with age and gender.Google builds a detailed profile by harvesting the history of its account holders' visits to sites in its advertising network.But your age and gender are decided by those of other Google users who have visited the sites you visit, leading to the mistakes
  • ...1 more annotation...
  • One blogger from tech site Mashable found this week that Google's Ad Preferences page assume that she was middle-aged - and a man, simply because her interests included technology and computing.  The profile page, called Ad Preferences, is hidden away inside a settings menu in Google Accounts, but can be accessed directly here. This sort of in-depth profiling raises alarm bells with privacy activists. 'Consumers have increasingly digital lives and they are developing an unfathomably large data trail every day,' says Rainey Reitman, activism director for privacy group Electronic Frontier Foundation. 'There has never been another time in history where privacy was under the kind of assault it is today.'You can opt out of the tracking, or manually edit your details. Google also  does not store information on controversial subjects such as pornography. The Ad preferences page came to public attention following a sweeping change to 'privacy policy' which comes into effect on March 1, although the preferences page was launched some time ago. YouTube data, Gmail information and search data will all be used to build up ever more accurate advertising profiles and also the company claims it will make searches more personalised.
D'coda Dcoda

10/04/19 Privacy Slips Again - Facebook Retroactively Makes More User Data Public - 0 views

  • There’s an argument circulating that we don’t care about our privacy as much as we did when Facebook rolled out with its “promises”, justifying, in part, this decision. Where do you stand? Will you take steps to remove information from Facebook to keep it from going public? See the article for clarification of Facebook’s claim that these changes are “opt in”.
  • Once upon a time, Facebook could be used simply to share your interests and information with a select small community of your own choosing. As Facebook’s privacy policy once promised, “No personal information that you submit to Facebook will be available to any user of the Web Site who does not belong to at least one of the groups specified by you in your privacy settings.”How times have changed.Today, Facebook removed its users’ ability to control who can see their own interests and personal information. Certain parts of users’ profiles, “including your current city, hometown, education and work, and likes and interests” will now be transformed into “connections,” meaning that they will be shared publicly. If you don’t want these parts of your profile to be made public, your only option is to delete them.Read more at www.eff.org
Dan R.D.

The Privacy Dilemma - Facebook, like the internet, is not a private place. [28Apr10] - 0 views

  • Privacy is ultimately the social media denizen’s dilemma. So, are you building a glass house, or a fortified castle?

    Amplifyd from socialmediatoday.com

    There there are the folks who are appalled that people could be so amazingly stupid to think their information was “just between friends” in the first place.

    The internet is not a private place. Simple as that.
    Does that make their new changes acceptable? Certainly not. Why? Because they portrayed it as a safe haven and now they’ve switched gears when the majority of their users weren’t looking.
    They may not be so savvy. So do us all a favor. Share Peter’s post with those people. Share the link to the video below. Help get the word out that if you want something private don’t say it on the internet.
    See more at socialmediatoday.com
  •  
    Privacy is ultimately the social media denizen's dilemma. So, are you building a glass house, or a fortified castle? On a side note, this evening I rapidly clipped this article during a demonstration for @UOSPJ (The University of Oregon's Society of Professional Journalists Chapter). It was a half-assed effort, but regardless of the quality of the following clip: they love Amplify.
D'coda Dcoda

Twitter unmasks anonymous British user in landmark legal battle [30May11] - 0 views

  • Twitter has been forced to hand over the personal details of a British user in a libel battle that could have huge implications for free speech on the web.The social network has passed the name, email address and telephone number of a south Tyneside councillor accused of libelling the local authority via a series of anonymous Twitter accounts. South Tyneside council took the legal fight to the superior court of California, which ordered Twitter, based in San Francisco, to hand over the user's private details.It is believed to be the first time Twitter has bowed to legal pressure to identify anonymous users and comes amid a huge row over privacy and free speech online.Ryan Giggs, the Manchester United footballer named as being the plaintiff in a gagging order preventing reporting of an alleged affair with a reality TV model, is separately attempting to unmask Twitter users accused of revealing details of the privacy injunction.
  • However, Giggs brought the lawsuit at the high court in London and the move to use California courts is likely to be seen as a landmark moment in the internet privacy battle.
  • Ahmed Khan, the south Tyneside councillor accused of being the author of the pseudonymous Twitter accounts, described the council's move as "Orwellian". Khan received an email from Twitter earlier this month informing him that the site had handed over his personal information. He denies being the author of the allegedly defamatory material.
  • ...1 more annotation...
  • "It is like something out of 1984," Khan told the Guardian. "If a council can take this kind of action against one of its own councillors simply because they don't like what I say, what hope is there for freedom of speech or privacy?"
Dan R.D.

Facebook, Google: Welcome to the new feudalism [10Sep11] - 0 views

  • In the modern web, Google and Facebook are the feudal lords and people are the peasants — at least when it comes to control of the photos, comments, 'likes' and other data that each person posts online.
  • "The users contribute their own content to you for free. You sell it back to them with banner ads put on there. And on top of that, you spy on them to gather profiling data," says Michiel de Jong, of the Unhosted project to decentralise user data.
  • As your friends talk to each other, they feed Facebook data about how information flows between its users. It's likely that your friends will have their own friends and will talk to them as well. Every time these first- and second-level contacts interact, it gives Facebook more pointers to where you fit within your network. To you, it's a bunch of your mates; to Facebook, it's an expanding cloud of data to be harvested.
  • ...5 more annotations...
  • According to Metcalfe's Law, the value of a communications network is proportional to the number of users connected to the system.
  • Mistrust People mistrust this handing over of their data, in much the same way IT managers have concerns about uploading their enterprise's data into the cloud, or web users have misgivings about Gmail and Yahoo automatically scanning their emails.
  • Privacy concerns Meanwhile, Facebook has responded to people's concerns about their privacy on its network by providing more tools for adjusting privacy settings. This does not go far enough, according to de Jong. Read this Why Google+ may change the web for good Read more "If a building company put up a tollway and made drivers cede ownership of their cars whenever on that tollway, the traditional justice system would prohibit that," he argued. "Yet this is exactly what is happening on the 'information highway', and the situation is largely overlooked by justice departments, who still live largely in a brick-and-mortar world."
  • Methods of controlWhat makes this modern feudalism powerful is that the key parties are keeping their methods of control from the users.
  • Neither company openly gives details to users about how their data is being used. We never see inside Google's algorithms, or gain a view of how our connections interweave with every other person on Facebook, but their services see all.
D'coda Dcoda

The cloud and the future of the Fourth Amendment [April10] - 0 views

  • Colorado, defending Yahoo against attempts by the federal government to obtain the contents of Yahoo Mail messages without first obtaining a warrant. One month earlier, the Justice Department filed a 17-page brief arguing that Yahoo Mail messages do not fall under current statutory protection because, once opened, those messages are not considered to be in “electronic storage.” The privacy coalition—which included Google—came to Yahoo’s defense, arguing that users with e-mail stored in the cloud have a reasonable expectation of privacy in the contents of that e-mail, and should thus be protected from warrantless searches by the government. (Hopefully the irony of Google opposing robust searches is not lost on Google’s attorneys.) Unfortunately, the protections afforded by the warrant requirement have not yet been fully extended to the digital “cloud.” This handy metaphor for the ethereal Internet as a storage and access hub is coming to have other implications: can we really conceal our data inside this cloud, shielding it from government intrusion? Read more at arstechnica.com
  •  
    Good article, do you expect to have a degree of privacy concerning your data in the cloud?
D'coda Dcoda

Adulterous Site Outsmarts Apple & Google [16May11] - 0 views

  • A few weeks ago, iPhone users were outraged to discover that their iPhones were tracking their every move, storing the information (in an unencrypted file, no less), and sending the data directly to Apple when synced with iTunes. Even more shocking was the news that iPhones do this even when they do not have location-based services enabled. Users concerned about their privacy were left vulnerable, with nothing they could do about it while they waited for Apple to offer a patch.
  • Enter Ashley Madison.
  • Ashley Madison is an online dating service owned and operated by Toronto-based Avid Life Media Inc. Nearly ten years old, Ashley Madison claims to be the world's largest dating site, with nearly 9.3 million members. What truly distinguishes Ashley Madison from its competitors, however, is its target demographic: married people.
  • ...4 more annotations...
  • Naturally, Ashley Madison's specialty is guaranteeing privacy and anonymity for its customers (well, that and "an affair to remember!"). Users choose whom they share their photos with. Conversations on the site are password-protected. When users delete their accounts, also deleted is all evidence that they were ever members of the site. All messages and correspondence, photos, and personal data -- gone.
  • And now, Ashley Madison is giving privacy lessons to the big boys.
  • To battle smartphone location-tracking, Avid Life has released a new privacy application called iWipe. Completely free to download and use, iWipe not only erases an iPhone's entire location history, it also prevents future tracking.
  • At present, you need a Mac to download and use iWipe (it is not a straight phone app) and then sync your phone to your Mac. A Windows version has been announced as well (it was due for last week, but has not yet been released as of press time). Avid Life is also considering versions of the iWipe utility for other smartphone platforms, such as Google’s Android (which also geo-tracks its users).
  •  
    Here's an app that wipes clean all location history off of iPhones. It may come out with one for android.
Marc-Alexandre Gagnon

Trade Your Wallet for Wireless - 0 views

  • People fed up with the proliferation of credit cards, IDs and key cards that fill their wallets to bulging may soon have an alternative. New technology could bundle such functions into just one item: your cell phone.
  • Near Field Communication technology, jointly developed by Sony and Royal Philips Electronics, lets wireless devices connect to other devices nearby and transfer data, from payment information to digital pictures. Samsung Electronics and Philips say they are developing cell phones with embedded NFC chips that could double as debit cards or electronic IDs. The companies plan to begin field trials toward the end of the year.
  • Such phones are already available in Japan and Korea, where users can charge their phones with virtual cash, then wave them near NFC-enabled machines to buy anything from a soda to lunch. But it remains to be seen how Americans will react to the devices, which are not yet available outside Asia, said wireless technology analyst Allen Nogee of In-Stat/MDR.
  • ...8 more annotations...
  • "Americans seem to be more skeptical of new technology like this," Nogee said, largely because of security and privacy concerns.
  • However, Nogee said the systems seem to have adequate security measures -- like requiring personal identification numbers, so thieves could not make purchases -- and could provide consumers with added protections in some cases.
  • "In theory, merchants will have wireless devices they can bring to you," he said. "When you buy something in a restaurant, you have to give them your card. They go off with your card and could be writing down your number. With this, they'd bring a portable device to your table and (the transaction) would be encrypted."
  • But Nogee said some apprehension about privacy might be well-founded.
  • "A carrier, if they wanted to, could know exactly where you are any time of day, who you're calling, and now they can know what you're purchasing and where," Nogee said. "So if you tie all these things together, that's quite a lot of information available on you."
  • Payments are not the only potential use for the technology. Philips and Samsung have suggested NFC devices could also work as mobile transit passes for users who would swipe their phones to get access to public transportation, and as secure building-access keys and electronic business cards. The technology could also let users swap digital music, photos or other files between devices.
  • Don't go throwing away your wallet just yet, though. The companies have not set a date for when the phones will be for sale in the United States. And even if security and privacy worries are allayed, the technology will need to be widely usable for consumers to adopt it. That means NFC devices from different manufacturers must be interoperable and integrated to work with the credit card infrastructure.
  • To that end, Nokia, Philips and Sony formed the Near Field Communication Forum in March to promote implementation and standardization of NFC technology. Philips is also working with Visa to encourage support of the technology.
D'coda Dcoda

Senator Has 'Serious Doubts' About Privacy of Google, Apple Location Apps [10May11] - 0 views

  • At the close of an almost three-hour hearing on cell-phone tracking, Sen. Al Franken said Tuesday that he still has "serious doubts" that consumers' privacy rights are being respected when it comes to location-based services via iOS and Android. "I think that people have a right to know who is getting their information, and a right to decide how that information is shared and used," said Franken. "After having heard today's testimony, I have serious doubts that those rights are being respected in law or in practice."
  • "We need to think seriously about how to address this problem, [especially since] mobile devices are only going to become more and more popular," he continued. "This is an urgent issue we'll be dealing with." Franken, a Minnesota Democrat who chairs the new Senate Judiciary Subcommittee on Privacy, Technology and the Law, heard testimony from Apple and Google executives today about how their mobile platforms collect and use location-based data, and what type of control users have over that information. Google said that any location-based data it collects via its Android mobile operating system is anonymous in nature and the majority of that information is deleted after one week. "The location information sent to Google servers when users opt in to location services on Android is anonymized and stored in the aggregate and is not tied or traceable to a specific user," said Alan Davidson, director of public policy at Google. "The collected information is stored with a hashed version of an anonymous token, which is deleted after approximately one week."
  •  
    Combine this with the TED talk on selective searches and it looks like a cross between 1984 and The Matrix is brewing up.
D'coda Dcoda

Tracking How Mobile Apps Track You [21May11] - 0 views

  • Third-party apps are the weakest link in user privacy on smart phones. They often get access to large quantities of user data, and there are few rules covering how they must handle that data once they have it. Worse yet, few third-party apps have a privacy policy telling users what they intend to do. That was the message delivered at a hearing of the U.S. Senate committee on Commerce, Science, and Transportation held yesterday. Companies and regulators are struggling to find ways to ensure that user data is handled properly by apps installed on smart phones, but the way apps are designed makes this difficult.
  • This week, Facebook joined Google and Apple on the hot seat. But all three companies run platforms that support thousands of third-party developers, and how to make sure those apps respect users' privacy, and explain their rules, is a major question. Sen. Mark Pryor (D-Arkansas) said at the hearing, "It's not clear that Americans understand how their information may be shared or transferred."
D'coda Dcoda

Obama Tries to Bypass Congress with Deadly Global Internet Treaty ACTA [28Jan12] - 0 views

  • Before the American people were protesting the Stop Online Piracy Act and the Protect Intellectual Property Act, the president managed to sign an international treaty which would permit foreign companies to demand that ISPs (Internet Service Providers) remove web content in the United States without any legal oversight. Entitled the Anti-Counterfeiting Trade Agreement (ACTA), the treaty was signed by Obama on October 1, 2011, but it is currently a subject of discussion because the White House is circulating a petition demanding that senators ratify the treaty.
  • the White House has done some maneuvering — characterizing the treaty as an "executive agreement" — thereby bypassing approval by members of Congress. Concerned by this action of the administration, Sen. Ron Wyden (D-Ore., above left) sent a letter to President Obama in which he declared: It may be possible for the U.S. to implement ACTA or any other trade agreement, once validly entered, without legislation if the agreement requires no change in U.S. law. But regardless of whether the agreement requires changes in U.S. law ... the executive branch lacks constitutional authority to enter a binding international agreement covering issues delegated by the Constitution to Congress' authority, absent congressional approval.
  • Similarly, TechDirt observes: ... [E]ven if Obama has declared ACTA an executive agreement (while those in Europe insist that it’s a binding treaty), there is a very real Constitutional question here: can it actually be an executive agreement? The law is clear that the only things that can be covered by executive agreements are things that involve items that are solely under the President’s mandate. That is, you can’t sign an executive agreement that impacts the things Congress has control over. But here’s the thing: intellectual property, in Article 1, Section 8 of the Constitution, is an issue given to Congress, not the President. Thus, there’s a pretty strong argument that the President legally cannot sign any intellectual property agreements as an executive agreement and, instead, must submit them to the Senate.
  • ...6 more annotations...
  • Twenty-two EU member states signed the treaty at a ceremony in Tokyo on January 26. Other nations interested in signing the agreement have until May 2013 to do so. According to Wikipedia, the Anti-Counterfeiting Trade Agreement “creates a governing body outside national institutions such as the World Trade Organization (WTO), the World Intellectual Property Organization (WIPO) or the United Nations.” The scope of the agreement includes counterfeit goods, generic medicines, and pirated copyright-protected works.
  • The provisions of ACTA grant copyright holders direct powers to demand that ISPs remove material from the Internet, without the requirement of a court order, and permit foreign influence over ISPs in the United States. Advocates of the treaty seek to give copyright holders the ability to demand that users who do violate intellectual property rights have their Internet connections terminated as a punishment. To enforce such a system would require the creation of an individual Internet ID.
  • The Electronic Frontier Foundation (EFF) reports: The same industry rightsholder groups that support the creation of ACTA have also called for mandatory network-level filtering by Internet Service Providers and for Internet Service Providers to terminate citizens’ Internet connection on repeat allegation of copyright infringement (the “Three Strikes”/Graduated Response) so there is reason to believe that ACTA will seek to increase intermediary liability and require these things of Internet Service Providers.
  • The EFF has been vehement in its opposition to ACTA, particularly regarding the secrecy surrounding the treaty negotiations. Likewise, Michael Geist, in writing for Copyright News, asserted that ACTA was “shrouded in secrecy.” He pointed out that ACTA negotiations did not include civil society groups or developing countries, noting also that “reports suggest that trade negotiators have been required to sign non-disclosure agreements for fear of word of the treaty’s provisions leaking to the public.” The European Commission denied this allegations in 2008, arguing, “It is only natural that intergovernmental negotiations dealing with issues that have an economic impact, do not take place in public and that negotiators are bound by a certain level of discretion.”
  • As noted on Wikipedia, opponents of ACTA also assert that it will impinge upon freedom of expression and communication privacy. A large number of the World Trade Organization’s 157 members have voiced concerns that the treaty would have a negative impact on trade. Others have pointed out that ACTA does not include provisions for legal safeguards protecting ISPs from liability for the actions of their subscribers. Without such provisions, ISPs will be forced to invade the privacy of their subscribers in order to protect themselves. Aaron Shaw, research fellow at the Berkman Center for Internet & Society at Harvard University, stressed that “ACTA would create unduly harsh legal standards that do not reflect contemporary principles of democratic government, free market exchange, or civil liberties.”
  • The technology news and information website ArsTechnica.com argues that ACTA encourages ISPs to collect and provide information about suspects by providing for those ISPs “safe harbor from certain legal threats.” In protest against the treaty, the hacktivist group Anonymous hacked into the Federal Trade Commission’s cybersecurity advice website on January 24, replacing the homepage with the Anonymous logo, a rap song, and a message threatening more attacks if anti-piracy legislation in Congress were to pass. According to The Next Web: The message left temporarily on OnGuardOnline referred to the Stop Online Piracy Act, The Protect Intellectual Property Act and the Anti-Counterfeiting Trade Agreement. If they pass, the message said, "we will wage a relentless war against the corporate Internet, destroying dozens upon dozens of government and company websites."
Dan R.D.

10/04/23 Paranoid Chain Reaction - The Facebook Backlash Has Begun... - 0 views

  • As of today, FB has a new privacy setting called "Instant Personalization" that shares data with non-facebook websites and it is automatically set to "Allow." Go to Account > Privacy Settings > Applications and Websites and uncheck "Allow", then repost this to your profile.
  • We're working closely with these partners so you can quickly connect with your friends and see relevant content on their sites. These sites personalize your experience using your public Facebook information. When you arrive on these sites, you'll see a notification from Facebook at the top of the page. You can easily opt-out of experiencing this on these sites by "No Thanks" on the blue Facebook notification on the top of partner sites.
  • We are a generation constantly terrified by the idea of someone, somewhere, effectively advertising to us by way of glancing at our "data" and knowing whether or not we like country music or alternative 1990s rock. But is it really so terrifying to have annoying banner ads offering deals on some product you might actually enjoy?
  • ...1 more annotation...
  • For an in-depth look at how (and why) you should delete applications from your Facebook account, take a look at Sarah Perez's take on the subject.
D'coda Dcoda

Facebook's Hidden Hate Button - - 0 views

  • Perhaps the saddest thing about Facebook (note: I do think there are good things) is that most users seem utterly unware of the way Facebook is changing things; unaware of FB’s ever-changing Privacy settings; little idea about how expansive the recent f8 announcements could be (in fact I’d say a huge percentage of users don’t even know what the heck f8 is or what its impact may have); and perhaps wholly uprepared when their profiles and their data are streaming out in the open publicly. Most users are using FB strictly to post pictures and update their status in the literal way in which FB was designed - no sense of re-purposing the software in broader ways. On one hand, it’s great that we can all share our experiences with each other; on the other hand it’s worrying that more users aren’t educated enough about the fundamental nature of these media to make smart connections back to their own lives.
  • Furthermore, if Facebook becomes the primary place where people congregate, purchase, publish and share, it will become imensely important that users are proficient and savvy and creative in using it *for* their interests as citizens and not against them. The smallest tweaks in any software can have major implications in their use. Imagine if Facebook had a Hate button. I agree with Scoble: I hope we never see something like that. …But I have a feeling, there’s a Hate button hidden deep within our collective social experience and dynamics just waiting to surface its ugly head in the not-too-distant future. Recommend on Amplify                
D'coda Dcoda

Bill Would Require Warrants For Govt to Access Your Email, Cloud Services [18May11] - 0 views

  • Sen. Patrick Leahy on Tuesday unveiled an overhaul to a 25-year-old digital privacy law that would require the government to obtain warrants before accesssing email and other cloud-based data. The update to the Electronic Communications Privacy Act (ECPA), would also extend to location-based data, and allow private companies to collaborate with the government in the event of a cyber attack. The ECPA was first enacted in 1986, well before the Internet, email, or smartphones. As a result, it is "significantly outdated and out-paced by rapid changes in technology and the changing mission of our law enforcement agencies after September 11," said Leahy, a Vermont Democrat. As a result, Leahy's updated 2011 version of the ECPA would apply to technologies like email, cloud services, and location data on smartphones. If the government wanted an ISP to hand over emails on a particular customer, for example, they would need to first obtain a warrant. At this point, the government abides by a rule that provides access to email after 180 days, depending on the circumstance.
D'coda Dcoda

SHAPE Services' Neighbors Location-Based Messaging Platform Now Available For Its IM+ M... - 0 views

  • SHAPE Services, a leading mobile app developer best known for its IM+ All-in-One Mobile Messenger app, today announced that their new location-based messaging service, named “Neighbors,” is now available as a free update to its IM+ Mobile Messenger.With “Neighbors”, user can now find new real life connections and friends, buy and sell local services and goods using an interactive map, chat with local friends as well as initiate conversations with other people who are nearby, and publish and view local offers and announcements as status updates on their profiles.
  • Features:Location-Based Messaging Functionality – Allows users to find real people in their local area and easily initiate conversations, catch up with local friends and post local announcements.Location Privacy – Easy-to-understand privacy settings for disclosing user location, which includes the user’s ability to define their location as wide as their house, street or city.Interactive Map – With just a tap of the finger users can see the person’s profile and status, allowing the user to visually identify people around them.
  • SHAPE Services also plans to incorporate a unique patent pending augmented reality interface that will let the users look around with a 360 degree camera view.
  •  
    plans to incorporate AR later
D'coda Dcoda

INFOGRAPHIC: Why Do We 'Check-In' On Location-Based Services? [16May11] - 0 views

  • The infographic which outlines who does and doesn’t use location-based services and why, states a number of concerns regarding the use of these services. First, 50 percent of users don’t have smartphones (I was once among this group and have since been unable to imagine life without it). 48 percent of non-users cited privacy concerns, which is very understandable because it was at the root of my apprehension until I realized I control my own privacy when using these services, and 49 percent had no motivation.
  • Motivation to use location-based services like Facebook Places, which is utilized by 90 percent of people who “check-in” anywhere online, shouldn’t be waning. Companies should be offering more promotions to bring in local costumers because it’s basically free advertising! 54 percent of current users use the services for discounts and coupons and 44 percent of non-users would consider using a location-based service for discounts and coupons. Why aren’t they converted? There’s just not enough good deals, in my opinion.
  • What’s also interesting is users are more likely to check-in with large brands (perhaps this is because those are the ones that often offer promotions) but less likely to share those check-ins with friends. When it comes to the social aspect of sharing your location, who cares if you went to Panera for lunch? Friends want to know about the cool mom-and-pop places they’ve never heard of.
  •  
    Go to the site for the infographic, provides invaluable insight to brands who are wondering how to utilize LBS to bring in revenue.
Dan R.D.

Cracking the code of mobile advertising [22Jun11] - 0 views

  • Mobile advertising revenue reached $700 million in the U.S. in 2011, according to Gartner research group. That’s a drop in the ocean compared to Internet ad revenue, which hit $7.3 billion in just the first quarter of 2011, according to figures from the Interactive Advertising Bureau and PricewaterhouseCoopers.
  • Concerns about privacy, tracking and the disclosure of personal information could limit the number of people opting in to targeted or local ad mobile campaigns, said Jason Koslofsky, an attorney who specializes in consumer privacy and telecommunications at Arent Fox. Businesses have also been hesitant for these same reasons. “It hurts brands if it looks as though they are generating spam,” Koslofsky said, adding,“companies shouldn’t want to be seen as though they are tracking their users’ every move.”
  • While 9% of adults in the U.S. said they would use their phones to learn about in-store promotions or event, interest in location-based offers was low, according to a report in February by Forrester Research. Only 6% of adults in the U.S. said that they are interested in receiving location-based retail offers on their mobile phones and only 4% are interested in receiving time-sensitive promotions such as daily specials.
1 - 20 of 40 Next ›
Showing 20 items per page