The document discusses invalid traffic (IVT) and viewability in online advertising. It defines viewability as ads appearing within the visible space of a browser window. Both static and dynamic factors are considered in viewability measurements. IVT includes traffic from generators, unwanted ads from plugins/injectors, unseen ads like popunders, and misrepresented ad placements. Detection requires diverse telemetry from tags, panels, crawlers and honeypots. Filters are developed to identify IVT signals. Q1 2016 data showed regional IVT levels ranging from 1-5% and in-view rates for display/video around 30-60%. Addressing IVT requires understanding evolving threats and tools for detection, mitigation, and decision support.
PageFair-DCN global stakeholders' roundtable on adblocking Johnny Ryan
Public notes from the latest of the global stakeholders' discussions on adblocking. Contains the notes of a majority view of how to approached the blocked Web, better respect consumers and support publishers.
10:50AM Jonathan Nash - Safe, Premium Video: Still A Programmatic Myth?Digiday
Digiday Programmatic Summit Europe
Dublin, Ireland 2017/04/25
Safe, Premium Video:
Still A Programmatic Myth?
Jonathan Nash – Head Of Programmatic UK International
programmatic Buying in Mobile Advertising Sumit Roy
74% of marketers are now using programmatic media buying on mobile for retargeting users, 62% use it for performance marketing and 61% for branding. • This represents a huge opportunity for the industry to build targeting and measurement solutions that deliver greater effectiveness and efficiency for upper-funnel campaigns. Of those not using programmatic, the biggest barriers for adoption are complexity of the ecosystem (58%), skills shortage (42%) and lack of education (33%).
Interact 2017 Short Keynote: Video & TV Advertising: State of the convergence...IAB Europe
Interact 2017 Short Keynote: Video & TV Advertising: State of the convergence by Nicolas Mignot, SVP International Key accounts Sales & Solutions, FreeWheel
The value of being seen : a guide to digital advertising viewability - Turn -...Romain Fonnier
What’s hard to understand about advertisers wanting ads to be seen by real live consumers?
At first blush, it seems so simple: viewable ads reassure advertisers that their ads are delivered in-view (that is, on an active page or within frame). Yet, viewability does not guarantee that the end consumer will actually view the ad creative or engage with the message.
Successful digital advertising depends on a variety of factors -- including a nuanced understanding of what viewability is, when it matters, and how it fits into a broader campaign strategy.
PageFair-DCN global stakeholders' roundtable on adblocking Johnny Ryan
Public notes from the latest of the global stakeholders' discussions on adblocking. Contains the notes of a majority view of how to approached the blocked Web, better respect consumers and support publishers.
10:50AM Jonathan Nash - Safe, Premium Video: Still A Programmatic Myth?Digiday
Digiday Programmatic Summit Europe
Dublin, Ireland 2017/04/25
Safe, Premium Video:
Still A Programmatic Myth?
Jonathan Nash – Head Of Programmatic UK International
programmatic Buying in Mobile Advertising Sumit Roy
74% of marketers are now using programmatic media buying on mobile for retargeting users, 62% use it for performance marketing and 61% for branding. • This represents a huge opportunity for the industry to build targeting and measurement solutions that deliver greater effectiveness and efficiency for upper-funnel campaigns. Of those not using programmatic, the biggest barriers for adoption are complexity of the ecosystem (58%), skills shortage (42%) and lack of education (33%).
Interact 2017 Short Keynote: Video & TV Advertising: State of the convergence...IAB Europe
Interact 2017 Short Keynote: Video & TV Advertising: State of the convergence by Nicolas Mignot, SVP International Key accounts Sales & Solutions, FreeWheel
The value of being seen : a guide to digital advertising viewability - Turn -...Romain Fonnier
What’s hard to understand about advertisers wanting ads to be seen by real live consumers?
At first blush, it seems so simple: viewable ads reassure advertisers that their ads are delivered in-view (that is, on an active page or within frame). Yet, viewability does not guarantee that the end consumer will actually view the ad creative or engage with the message.
Successful digital advertising depends on a variety of factors -- including a nuanced understanding of what viewability is, when it matters, and how it fits into a broader campaign strategy.
Field Guide for Validating Premium Ad InventoryDistil Networks
Many of the current technologies used to detect fraud are great at detecting the amount of fraud (e.g., post-bid analysis). However, we need more technologies and techniques that focus on how to stop fraud before it happens. Having continuous, real-time data is important for this; but equally important are the policies and disclosures of the publishers and ad networks themselves.
Key Takeaways:
- The State of Digital Ad Fraud -- Terminology, landscape and trends
- The advertiser and publisher perspective -- Top issues and concerns
- Tools of the trade and best practices -- The different technologies and approaches to detecting and mitigating digital ad fraud
- Anatomy of a successful premium ad inventory program -- Whitepages’ guiding principles, policies and procedures
Kickoff Workshop with GeoEdge: Beyond the Banner: Verify Your Ad Quality When...Digiday
With the growth of RTB and dynamic 3rd party demand partners, ad quality is a significant challenge presently facing publishers. Poor ad quality reflects negatively on brand reputation, compromises the user’s experience and affects long-term monetization strategies. In this session, GeoEdge will provide insight into the why and how publishers can automate their advertising QA processes at the highest level to guarantee a clean and transparent advertising ecosystem.
X-Series: Metrics 2014: Measurability and ViewabilityIAB Canada
Presentation from Ian Hewetson, VP Client Services, eyereturn marketing, at IAB Canada's X-Series Metrics 2014 in Toronto:
Fraud and viewability are hot topics right now – but what about measurability? Ian Hewetson from eyereturn marketing discusses some real takeaways on how to maximize your measurability, what 80% viewability might actually means, and how fraud plays into the equation.
This presentation is from Affiliate Summit East 2017 (July 30 - August 1, 2017 in New York).
Session description: Ad fraud is rising. This session uncovers the sophisticated ways mobile advertising fraud is being perpetrated and gives ideas on how it can be identified and how to mitigate the risk.
Guide to Programmatic Media buying for recruitment. Top tips, explanation of strategic uses, examples of how ads are targeted and all the important terms decoded.
“Many clients have asked me to assess and recommend fraud detection and mitigation companies. This deck is intended to provide clients an objective and independent point of view and commentary on the known players in the digital ad fraud space.”
What is online ad fraud and what does um do about itAlan King
Presentation on Brand Safety measures undertaken by UM London.
It's our view that agencies need to lead the charge against ad fraud. We use brand safety software as standard to protect clients' interests.
DIGITAL MARKETING,Ad Operations & TERMS,AD CAMPAIGN,REVENUE UNITS IN DIGITAL ADVERTISING,LIFE OF AN AD CALL,VPAID,TYPE OF CREATIVES,TARGETING,AD TYPES
ad selection Algorithm,Types of Advertising,SALES FUNNEL,REMNANT INVENTORY
Similar to INT2016 - Paul Barford (comScore) - Invalid Traffic & Viewability: what is the cost of an unseen ad? (20)
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
INT2016 - Paul Barford (comScore) - Invalid Traffic & Viewability: what is the cost of an unseen ad?
1. For info about the proprietary technology used in comScore products, refer to http://comscore.com/About_comScore/Patents
Invalid Traffic & Viewability:
What is the cost of an unseen ad?
Paul Barford
Chief Scientist
May 2016
2. Overview
• Objectives
• Viewability
– What & how
• Invalid traffic (IVT)
– What are attackers doing?
• Ad blockers
• Counter measures
– Detection, filtration and mitigation
• Recent measurements
– Views, IVT, ad blockers
1comScore Inc. Proprietary
3. Measuring viewability
comScore Inc. Proprietary 2
Browser
Viewport
Ad
X,Y coords
of browser
X,Y coords
of viewport
X,Y coords
of ad
ABOVE THE FOLD
BELOW THE FOLD
Screen Size
1280 x 1024
Browser Size
1048 x 944
Viewport Size
1025 x 875
Ad Size
160 x 600
Page Size
1025 x 1325
1
2
3
4
5
6
7
8
9
10
11
12
– Ad viewability: ads that
appear within viewable
space in a browser on a
user’s screen
• MRC standards
– Considerations
• Screen size
• Location of the browser
• Location of the ad
relative to the page
• User actions including
tab, scroll, minimize
4. A hybrid approach
• Both static and dynamic characteristics must be
considered to produce accurate viewability
measurements
• Geometry: consider X,Y coordinates of ad to determine
it’s exact location in the viewport
• Timing: use clues associated with content to determine if
creative is in-view
• Hybrid method enables broad coverage (97%) plus
adaptability to browsing dynamics
comScore Inc. Proprietary 3
5. The threat landscape
• What motivates ad fraud?
– “Because that’s where the money is.” W. Sutton
• Fraudster’s advantages
– Anonymity, vulnerabilities, complexity, scale
– Humans in the loop
• Key requirement – a way to put $$ in the bank
– Ad exchanges and DSPs are obvious opportunities
4comScore Inc. Proprietary
6. Who is harmed?
comScore Inc. Proprietary 5
Brands Agencies
Trading
Desks
DSPs Exchanges SSPs Networks Publishers
Everyone
7. Attack vectors
• Invalid traffic falls into four general categories
– Traffic generators – human & automated
– Unwanted ads – plugins & injectors
– Unseen ads – including popunders & PPV
– Misrepresented placements – placement laundering
• Grey areas abound!
Invalid traffic includes both clicks and
impressions that Google suspects to not be
the result of genuine user interest
6comScore Inc. Proprietary
8. Traffic generation
• Valid traffic generation offerings
– Adwords, Outbrain, BingAds, Facebook ads, etc.
• Type “purchase web traffic” in Google
– MANY traffic generation offerings
• Simple threats: script-based page retrieval
– Ubiquitous - $12/10K impressions
– Not very human-like
• More complex threats: botnets*
– Objective – look more “human”
– As much as $100/10K impressions
7comScore Inc. Proprietary
9. Plugins and injectors
• Software that generates ads that are not part of publisher
placements
– Most do not try to hide
• Plugins enhance native browser functionality
– PageRage, BuzzDock, Sambreel, etc.
• Injectors impose ads other than or in addition to those intended
– Trick users by promising extended functionality
– Google: say 5% of their users have an ad injector
– Superfish, JollyWallet, etc.
8comScore Inc. Proprietary
10. What about bots?
• Bots have been around for a long time
– Originally developed in 90’s to manage host
– Compromised hosts under the control of remote entity
• Bots are characterized by key capabilities
– Impressions and injection
• Example: Athena botnet
– Various ad viewing capabilities
• But, why bother with a botnet?
– Clouds are better…
K. Springborn “Inside a Botnet: Athena and Ad Fraud”, comScore blog, 2014.
9comScore Inc. Proprietary
11. Unseen ads and PPV nets
• Ads that appear in invisible frames
– Simple additions to web pages that can be “viewable”
– Many not be 0-size, but still invisible
– Often appear as pupup’s/popunders
• PPV network: groups of sites that run tags from a single TG service
– Some TG services offer a JS tag that when included on a site pays attractive
CPM
– “…will not block any of your site content…”
– Tag will “display” camouflaged 3rd party websites
10comScore Inc. Proprietary
K. Springborn and P. Barford, “Impression Fraud in On-line Advertising via Pay-Per-View
Networks”, In the USENIX Security Symposium, 2013
12. Placement laundering
• How do we know who is requesting an ad or where it’s placed?
– We typically rely on trust and Javascript
• “Domain laundering” coined by comScore’s Jeff Kline in ’14
– Recent press release with Google on vulnerability in Safeframe
• Key issue: Low quality ad: $0.01 CPM, High quality ad: $10 CPM
Placement laundering is the act of sending false
information to an ad provider about an ad placement
J. Kline and P. Barford, “Placement Laundering and the Complexities of Attribution in
Online Advertising”, Under submission, 2015.
11comScore Inc. Proprietary
13. Ad blockers on the rise
• Ad blockers (browser extensions) have received significant attention
over the past year
– Blockers have been available for over a decade
– “…ad blocking is robbery, plain and simple” R. Rothenberg,
AdAge
• Blockers are here to stay, what can we do?
– Measure and assess their prevalence and impact
– Develop technical counter-measures
– Take control of the narrative on responsible advertising
comScore Inc. Proprietary 12
14. Addressing the threats
• Basic issues are similar to IT security
– Need to understand (evolving) threats
– Detection vs. mitigation
– Tools and processes for decision support and remediation
• Core components for addressing ad fraud
– Diverse measurement capability
– Filters to identify/mitigate threats
– Tools for visualization and forensics
13comScore Inc. Proprietary
15. Start with telemetry
• Objective: breadth and depth
– Any specific measurement method has limits!
• Challenges: scale, diversity and dynamics
• Census/Ad tags: for a wide variety of threats
– Careful attention to errors/failures
• Panel: for plugins, injectors, traffic generators and publisher
side threats
• Crawler: for publisher side threats
• Honeypots: for traffic generation threats
14comScore Inc. Proprietary
16. From telemetry to filters
• Objective: accurate, efficient threat identification
• Approach: mine diverse telemetry for signals
– Hypothesis-based, iterative process
• Write code (i.e., filter) that isolates signals in telemetry associated with
fraud
– General vs. sophisticated
– Detection vs. active mitigation
• comScore has over 25 different IVT filters
15comScore Inc. Proprietary
M. Molloy, S. Alfeld and P. Barford, “Contamination Estimation via Convex Relaxations”,
In Proceedings of IEEE International Symposium on Information Theory, 2015
17. Raw Q1 ’16: impressions/IVT
comScore Inc. Proprietary 16
0%
1%
2%
3%
4%
5%
-
10,000,000,000
20,000,000,000
30,000,000,000
40,000,000,000
50,000,000,000
60,000,000,000
70,000,000,000
80,000,000,000
Jan Feb Mar
Gross Impressions
Percent IVT
18. Raw Q1 ’16: regional imprsn/IVT
comScore Inc. Proprietary 17
0%
1%
2%
3%
4%
5%
-
10,000,000,000
20,000,000,000
30,000,000,000
40,000,000,000
50,000,000,000
60,000,000,000
Jan Feb Mar
North America
0%
1%
2%
3%
4%
5%
-
2,000,000,000
4,000,000,000
6,000,000,000
8,000,000,000
10,000,000,000
12,000,000,000
14,000,000,000
16,000,000,000
Jan Feb Mar
Europe
Gross Impressions
Percent IVT
19. Norms Q1 ‘16: IVT
18comScore Inc. Proprietary
0%
1%
2%
3%
4%
5%
6%
7%
8%
9%
10%
January February March
US, desktop
Display
Video
20. Norms Q1 ‘16: in-view
19comScore Inc. Proprietary
0%
10%
20%
30%
40%
50%
60%
January February March
US, desktop
Display
Video
22. Conclusion
• Summary
– Your ads may not be seen
• Viewability has a fixed objective
• IVT detection and mitigation is a moving target
• Ad blockers are having an impact
– Diverse telemetry + data science can address threats
• Q: What is the cost? A: Depends on where you advertise
• Future
– Broad deployment of active mitigation
– Anti-ad blocking
– Cross media
22comScore Inc. Proprietary