Ad firms using tools to help them read your mind

Agencies
December 24, 2017

New York, Dec 24: Why did you splurge on that new pair of shoes? Or that pricey smartphone? More and more advertisers are trying to tap into the unconscious to divine the invisible forces that drive those spending decisions.

Using gadgets to track eye movements, computer maps of faces to capture a momentary grin (approval) or squinting (anger), and sensors to measure perspiration or monitor brain activity, companies are mining consumers' raw emotions for information.

Traditionally, ad firms have measured the success of their campaigns through consumer surveys, but that technique has its limits.

"It's not that people won't tell you, they actually can't tell you why they're making the decision they're making," said Jessica Azoulay, vice president of the market intelligence practice at Isobar, a digital marketing agency.

The new techniques recognize that our purchase decisions are driven by both rational and emotional factors, and reflect research showing the brain takes in information on different levels.

They "enable us to capture many different types of emotions and to be able to profile the emotions that are happening very granularly on a second by second basis," said Elissa Moses, chief executive of the neuro and behavioral science business at Ipsos, a consultancy and market research firm.

"People won't be able to tell you that something irritated them in scene three or thrilled them in scene seven, but we'll know from looking at the facial coding," Moses said.

The technologies can help track if brands are maintaining their edge over competitors, and make ads more effective by determining what to highlight, for example, whether to emphasize the distress of allergy symptoms or the relief of treatment when pitching medications.

And the techniques are being applied to other industries, such as retail, which is experimenting on ways to attract customers in the Amazon era.

"Ultimately there is a dance between the conscious and unconscious," Moses said, noting that "in order to actually buy a product, you have to make a conscious decision."

Some of the techniques were first employed in the 1970s, but now are being more widely adopted as equipment has improved.

An eye tracking test uses technology-enhanced glasses with a camera to record what a person is seeing on a television or in a store and read how long the eye settles on a particular cue.

That can be combined with other methods, such as galvanic skin responses with sensors applied to a person's hand to read perspiration, and electroencephalography (EEG) which reads brain activity through sensors on a person's head.

The data is used to produce a "heat map" with yellow, orange or red "hotspots" that show where the person's eye fixated.

Techniques measuring arousal can signal whether an ad stands out amid today's media avalanche.

Other tests that are becoming more popular seek to shed light on unconscious associations with products or shopping needs.

Johnson & Johnson has tested thousands of consumers about Tylenol pain relief and other over-the-counter products, showing them quick-fire images or words that connote a particular emotion.

Responses are tracked to the tens of milliseconds, said Eric Dolan, associate director for global strategic insights at Johnson & Johnson.

The insights can help determine "whether we want to dig in and reinforce those emotional spaces," or rethink the marketing to convey a different message, he said.

Tivity Health turned to many of these techniques for its "Silver Sneakers" fitness program for seniors, hiring Isobar to help it devise a marketing strategy based on a psychological profile of potential members.

Isobar had more than 1,000 seniors review a series of rapidly presented images and words about exercise. Based on their clicks, the report showed the population most valued exercise because it made them feel empowered or "ready to go."

The finding was important as Tivity weighed potential marketing campaigns, including "Living Life Well," which featured images of age-defying seniors, such as a grandfatherly figure balancing a toddler on his back while doing push-ups.

These ads performed better than an alternative campaign showing groups of smiling seniors together in swim class and in a gym which emphasized the social aspect of Silver Sneakers.

That campaign appeared to fall flat with seniors who view exercise as a means of staying independent, or who may be intimidated at the thought of immediately exercising in a group.

The results countered Tivity's assumption that the social aspect of the program was the "key motivating driver for members," said Elizabeth Rula, who directs research for Tivity Health. "We were a bit surprised."

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 24,2020

New Delhi, Jun 24: The Centre has made it mandatory for sellers to enter the 'Country of Origin' while registering all new products on government e-marketplace (GeM).

The e-marketplace is a special purpose vehicle (SPV) under the Ministry of Commerce and Industry which facilitates the entry of small local sellers in public procurement, while implementing 'Make in India' and MSE Purchase Preference Policies of the Centre.

Accordingly, the ministry said the move has been made to promote 'Make in India' and 'Atma Nirbhar Bharat'.

The provision has been enabled via the introduction of new features on GeM.

Besides the registration process, the new feature also reminds sellers who have already uploaded their products, to disclose their products' 'Country of Origin' details.

The ministry further said that failing to disclose the detail will lead to removal of the products from the e-marketplace.

"GeM has taken this significant step to promote 'Make in India' and 'Aatmanirbhar Bharat'," the ministry said in a statement.

"GeM has also enabled a provision for indication of the percentage of local content in products. With this new feature, now, the 'Country of Origin' as well as the local content percentage are visible in the marketplace for all items. More importantly, the 'Make in India' filter has now been enabled on the portal. Buyers can choose to buy only those products that meet the minimum 50 per cent local content criteria."

In case of bids, the ministry said that buyers can now reserve any bid for a "Class I Local suppliers. For those bids below Rs 200 crore, only Class I and Class II Local Suppliers are eligible to bid, with Class I supplier getting purchase preference".

In addition to this, the Department for Promotion of Industry and Internal Trade (DPIIT) has reportedly called for a meeting with all e-commerce companies such as Amazon and Flipkart to display the country of origin on the products sold on their platform, as well as the extent of value added in India.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.