SYS-CON MEDIA Authors: Yeshim Deniz, Elizabeth White, Sean Houghton, Glenn Rossman, Ignacio M. Llorente

News Feed Item

AdaptiveMobile Reveals the Messaging Apps Turning to Growth Hacking to Compete - Two Apps Responsible for over 76% of All Invites

AdaptiveMobile, the world leader in mobile security, has seen mobile apps in North America send 8.5 times more invitations per application in the last six months, in a race to gain new users. As part of a new report released today the company has identified the top social, gaming and messaging applications, including Glide, Meow and Tango, that are using an aggressive form of Growth Hacking that makes it difficult for users to opt-out of sending invitations to their contact lists.

Growth Hacking is a method of increasing the user base of an app, which occurs when a user-installed app requests to promote itself by notifying or inviting the user’s contact list by SMS. AdaptiveMobile started tracking the trend and its associated “App-Spam” earlier this year. The issue has become a mainstream problem with Google recently updating the Google Play terms and conditions to include a note that apps must not be involved in “Unsolicited promotion via SMS services.” Apps now have 15 days to comply with this update to regulations.

“It’s common to invite friends to new apps, but this shouldn’t turn into spam,” said Cathal McDaid, Head of Data Intelligence & Analytics at AdaptiveMobile. “These apps take this principle above and beyond acceptable limits, subverting communications between friends and contacts.”

As part of its investigation, the Data Intelligence & Analytics team at AdaptiveMobile monitored the most active, popular social and messaging applications in North America between February and March 2014, noting which ones were the most frequent and aggressive in exploiting existing contacts for new memberships through sending App-Spam, and which apps were receiving the most complaints. AdaptiveMobile found the following to be the most aggressive in sending SMS messages to a user’s contact list, while also making it difficult for users to opt-out:

In monitoring the invitations sent during this period, AdaptiveMobile found that Glide sent 57% of the invites, and Tango sent 19.7%. In order of comparison, Glide sent out over 10 times more SMS invites than WhatsApp, an application with low levels of customer complaints, and made it very difficult for users to opt-out of inviting their contact list, leading to the highest number of consumer complaints. Although the Tango app allows users to easily opt-out of inviting contacts when they install the app, it also includes an ‘Invite on Activity’ feature, so when a photo is taken using the app, this leads to more invites being sent, resulting in a significant number of complaints.

“The key to whether an SMS invite is welcome or viewed as spam lies in the application’s user interface,” said Mc Daid. “Making it difficult for users to not send SMS spam invites is one reason behind the high level of App-Spam. This will hurt a company in the long run not only by irritating consumers but, as we’ve seen with last week’s Google announcement, it could also result in having an app being removed from an app store for not complying with terms and conditions.”

AdaptiveMobile has drafted a set of recommendations to ensure that application developers that wish to send invites do it in a manner that won’t lead to messaging abuse and complaints including:

  • Make it easy for a user to not invite All Contacts
  • Do not ask on start-up or during activity to invite All Contacts
  • Do not give an Invite All option
  • Do not pre-select All Contacts to be invited in an invite screen
  • Allow the user to edit the invite text
  • Do not make inviting others via SMS Invites part of an incentive system (points etc.)

“If an App chooses to send invites, and if this is permitted by the relevant App store and Mobile Operator, then it needs to make sure that safeguards are built into the design to ensure that a user can easily opt-out,” said Mc Daid. “While compiling the report, we alerted all the applications identified as generating excessive invites in our report and shared the research with Google and other industry players. We will continue to work closely with apps developers, app store owners and mobile operators to reduce the amount of App-Spam being generated.”

About AdaptiveMobile:
AdaptiveMobile is the world leader in mobile security, protecting over one billion consumer and enterprise subscribers worldwide, and the only mobile security company offering products designed to protect all the services on both fixed and mobile networks. With unparalleled expertise and unique focus on network to handset security solutions, AdaptiveMobile’s award-winning security products provide customers with real-time insight into what is happening across their networks. AdaptiveMobile provides its customers with advanced threat detection and actionable intelligence, combined with the most comprehensive mobile security products available on the market today; as well as sophisticated revenue-generating security services – empowering consumers and enterprises alike to take greater control of their own security. www.adaptivemobile.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
There's Big Data, then there's really Big Data from the Internet of Things. IoT is evolving to include many data possibilities like new types of event, log and network data. The volumes are enormous, generating tens of billions of logs per day, which raise data challenges. Early IoT deployments are relying heavily on both the cloud and managed service providers to navigate these challenges. In her session at Big Data Expo®, Hannah Smalltree, Director at Treasure Data, discussed how IoT, Big D...
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, ...
SYS-CON Media announced today that Skytap blog on "DevOps Journal" exceeded 84,000 story reads. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. DevOps Journal brings valuable information to DevOps professionals who are transforming the way enterprise IT is done. Noel Wurst is the managing content editor at Skytap. Skytap provides SaaS-based dev/test environments to the enterprise. Skytap solution removes the inefficiencies and constraints that comp...
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software ...
Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
SYS-CON Events announced today that Gridstore™, the leader in hyper-converged infrastructure purpose-built to optimize Microsoft workloads, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Gridstore™ is the leader in hyper-converged infrastructure purpose-built for Microsoft workloads and designed to accelerate applications in virtualized environments. Gridstore’s hyper-converged infrastructure is the ...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...