Ad firms using tools to help them read your mind

Agencies
December 24, 2017

New York, Dec 24: Why did you splurge on that new pair of shoes? Or that pricey smartphone? More and more advertisers are trying to tap into the unconscious to divine the invisible forces that drive those spending decisions.

Using gadgets to track eye movements, computer maps of faces to capture a momentary grin (approval) or squinting (anger), and sensors to measure perspiration or monitor brain activity, companies are mining consumers' raw emotions for information.

Traditionally, ad firms have measured the success of their campaigns through consumer surveys, but that technique has its limits.

"It's not that people won't tell you, they actually can't tell you why they're making the decision they're making," said Jessica Azoulay, vice president of the market intelligence practice at Isobar, a digital marketing agency.

The new techniques recognize that our purchase decisions are driven by both rational and emotional factors, and reflect research showing the brain takes in information on different levels.

They "enable us to capture many different types of emotions and to be able to profile the emotions that are happening very granularly on a second by second basis," said Elissa Moses, chief executive of the neuro and behavioral science business at Ipsos, a consultancy and market research firm.

"People won't be able to tell you that something irritated them in scene three or thrilled them in scene seven, but we'll know from looking at the facial coding," Moses said.

The technologies can help track if brands are maintaining their edge over competitors, and make ads more effective by determining what to highlight, for example, whether to emphasize the distress of allergy symptoms or the relief of treatment when pitching medications.

And the techniques are being applied to other industries, such as retail, which is experimenting on ways to attract customers in the Amazon era.

"Ultimately there is a dance between the conscious and unconscious," Moses said, noting that "in order to actually buy a product, you have to make a conscious decision."

Some of the techniques were first employed in the 1970s, but now are being more widely adopted as equipment has improved.

An eye tracking test uses technology-enhanced glasses with a camera to record what a person is seeing on a television or in a store and read how long the eye settles on a particular cue.

That can be combined with other methods, such as galvanic skin responses with sensors applied to a person's hand to read perspiration, and electroencephalography (EEG) which reads brain activity through sensors on a person's head.

The data is used to produce a "heat map" with yellow, orange or red "hotspots" that show where the person's eye fixated.

Techniques measuring arousal can signal whether an ad stands out amid today's media avalanche.

Other tests that are becoming more popular seek to shed light on unconscious associations with products or shopping needs.

Johnson & Johnson has tested thousands of consumers about Tylenol pain relief and other over-the-counter products, showing them quick-fire images or words that connote a particular emotion.

Responses are tracked to the tens of milliseconds, said Eric Dolan, associate director for global strategic insights at Johnson & Johnson.

The insights can help determine "whether we want to dig in and reinforce those emotional spaces," or rethink the marketing to convey a different message, he said.

Tivity Health turned to many of these techniques for its "Silver Sneakers" fitness program for seniors, hiring Isobar to help it devise a marketing strategy based on a psychological profile of potential members.

Isobar had more than 1,000 seniors review a series of rapidly presented images and words about exercise. Based on their clicks, the report showed the population most valued exercise because it made them feel empowered or "ready to go."

The finding was important as Tivity weighed potential marketing campaigns, including "Living Life Well," which featured images of age-defying seniors, such as a grandfatherly figure balancing a toddler on his back while doing push-ups.

These ads performed better than an alternative campaign showing groups of smiling seniors together in swim class and in a gym which emphasized the social aspect of Silver Sneakers.

That campaign appeared to fall flat with seniors who view exercise as a means of staying independent, or who may be intimidated at the thought of immediately exercising in a group.

The results countered Tivity's assumption that the social aspect of the program was the "key motivating driver for members," said Elizabeth Rula, who directs research for Tivity Health. "We were a bit surprised."

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 8,2020

Consumer watchdog Which? has claimed that more than one billion Android phones and tablets are vulnerable to hackers as they no longer supported by security updates.

According to the research report, the most at-risk phones are any that run Android 4 or older and those smartphones running Android 7.0 which can not be updated are also at risk.

Based on data from Google analysed by Which?, two in five android device users around the world are no longer receiving the important updates. Currently, those devices are unlikely to have issues, but the lack of security leaves them open to attack.

"It is very concerning that expensive Android devices have such a short shelf life before they lose security support, leaving millions of users at risk of serious consequences if they fall victim to hackers," Kate Bevan editor Which? said in a statement.

"Google and phone manufacturers need to be upfront about security updates with clear information about how long they will last and what customers should do when they run out. The government must also push ahead with planned legislation to ensure manufacturers are far more transparent about security updates for smart devices and their impact on consumers," Kate added.

Android phone released around 2012 or earlier, including popular models like the Samsung Galaxy S3 and Sony Xperia S, are particularly at risk to hackers.

Which? has made suggestions to Android users on what to consider if they have an older phone that may be at risk.

Any Android device which is more than two years old, check whether it can be updated to a newer version of the operating system. If it is on an earlier version than Android 7.0 Nougat, try to update via Settings> System>Advanced System update.

In case a user is not able tto update the phone, the device could be at risk of being hacked if it is running a version of Android 4 or lower.

A user also need to be careful about downloading apps outside the Google Play store and should also install a mobile anti-virus via an app.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 10,2020

In a first, the Supreme Court on Friday allowed the service of summons and notices, a necessity in almost all legal proceedings, through instant messenger like WhatsApp as well as by e-mail and fax.

A bench headed by Chief Justice SA Bobde observed that it has been brought to the notice of the court that it is not feasible to visit post offices for service of notices, summons, and pleadings. The bench also comprising Justices AS Bopanna and R Subhash Reddy observed that notice and summons should be sent through e-mail on the same day along with instant message through WhatsApp and other phone messenger services.

The bench clarified that all methods should be deployed for a valid service on the party. "Two blue ticks would convey that the receiver has seen the notice," noted the bench.

The bench declined the request of the Attorney General for specifically naming WhatsApp as a mode of effectuating service. The top court noted that it would not be practical to specify only WhatsApp. The apex court also permitted RBI to extend the validity of cheques in the backdrop of lockdown to contain the coronavirus outbreak.

Senior advocate V Giri representing RBI informed the bench that he had circulated the note regarding validity of a cheque as directions issued on the previous hearing.

The bench noted that it will be in discretion of the RBI to issue orders which are suitable to alter the validity of the period of a cheque.

During an earlier hearing on the matter on July 7, the Attorney General contended before the top court that the Centre had some reservations in connection with the utilization of mobile applications like WhatsApp and other apps for service of summons. The Centre's top law officer informed the apex court that these apps claimed to be encrypted, and they were not trustworthy.

The RBI counsel had contended before the top court that it was considering clarifying the validity of a cheque which has been reduced to 3 months from 6 months.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 3,2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.