SlideShare a Scribd company logo
1 of 11
ETHICS AND PROFESSIONAL
STANDARDS IN MOBILE
QUALITATIVE
Mark Michelson, Executive Director
Mobile Marketing Research Association
IS MOBILE A NEW METHOD?
• Not really - it’s a new channel, not a method
• However there are many unique aspects in mobile that
are creating headlines regarding privacy (gps tracking,
video, photo, etc.)
• This could lead to more strict government regulations,
self-censorship by participants and a reluctance to use
the channel to its’ full potential
• MMRA is working to create professional standards and
ethics for using mobile devices for marketing research
1
“OMG” & “WTF”
SHARED BY KRISTIN LUCK
OF DECIPHER AT MRMW CONFERENCE
• OMG
• O – Online tracking data
• M – Meta-data in photos
• G – Geo-location
• WTF
• W – Wandering device ID’s
• T – Too complex privacy polices
• F – Fees for SMS and data streaming
2
MANY OF THE CURRENT STANDARDS FOR
PRIVACY AND ETHICS WILL APPLY
• Permissions for use of recorded voice/image
• Protection of personal identity and information
• No use of personal information for selling or direct marketing,
etc.
• ESOMAR adopted existing standards in their current
guidelines for conducting survey research via mobile phones
• Other organizations are also currently creating standards and
ethics regarding privacy using mobile devices for marketing
purposes
• Future of Privacy Forum, Mobile Marketing Association
3
ESOMAR’S MOBILE SURVEY GUIDELINES
• Produced last summer, mostly survey related – e.g. contacting
respondent for a survey while they are on their mobile phone
• Adopted guidelines for online identification and tracking
technologies for mobile – including – so what is good for the
web is good for mobile, supposedly
• Additionally covers unsolicited contacting of respondent on
mobile, cost to respondent, security and downloads,
appropriate design, privacy policy readability, and passive data
collection guidelines
• Nothing has been decided regarding mobile qualitative.
This is where the MMRA is heading an initiative working with
leading associations such as ESOMAR, QRCA and AQR
4
GUIDELINES FOR OWNERSHIP OF DATA
• Participants must be able to opt in or out at any time
with mobile
• Don’t rely solely on the recruiter to gain permission when
using apps or mobile platforms. Work with both the recruiting
agency and the mobile supplier
• Participants should know what they are opting in for
• Clear policies for obtaining permission to use information
gathered on the mobile phone – and how it’s gathered
• Data on the phone NOT related to the study should
never be collected
• e.g. contact lists, personal images/video, passwords, etc.
5
GUIDELINES FOR USE OF VIDEO AND
PHOTOS
• If using self-generated video, best to review the video with
the participant and have clearly written permission to
approve use of video AFTER reviewing it with participant
• Similarly with photos – have the participant agree to “post”
EACH photo even if only used for reporting
• Check with country laws if sending the photos via mobile
devices – some countries (i.e. China, Canada) do not allow
transfer of images or video using mobile devices
• Policy for protection of photos and images should be
specified in advance, in a clear manner
6
GUIDELINES FOR GPS TRACKING
• GPS tracking needs permission and the ability for the
participant to understand how it works so they can turn
it off and on as they see fit
• Define the need for geo-location identification and use
only for that purpose
• e.g. knowing participants are at specific locations when doing
shopper studies vs. tracking location and movement 24 hours a
day
• Photos also will imprint with geo-location coding
• Should be disclosed with permission to use specific images
7
GOVERNMENT REGULATIONS
AND PRIVACY LAWS
• Privacy laws vary by country
• There are 27 different privacy laws in the EU (27 countries).
• MMRA is currently compiling a list of privacy laws
related to mobile by country.
• Most strict are China, Canada, Sweden and Germany
• Less strict are the USA, Latin America, India
8
ACCURACY, AUTHENTICITY AND
THE RIGHT TO BE FORGOTTEN
• Mobile ethnography depends on the respondent
to capture their experience
• Similar to social media, self-editing occurs largely because of
fears of loss of privacy
• Involving the respondent in the review and approval process
is advised to gain trust – especially in longitudinal studies
• The Right to Be Forgotten is an internet privacy
policy that allows people to have their images,
videos, notes, etc. cleaned from internet servers and
search engines.
• This policy could impact mobile qualitative in profound ways
in the future if adopted into law.
9
MMA’S SIX FUNDAMENTAL ELEMENTS TO A
POSITIVE CONSUMER EXPERIENCE
The MMA therefore strives to align its members and industry stakeholders generally with consumers needs
and wants to ensure a positive mobile experience. There are six fundamental elements to a positive consumer
experience. They are:
1. Choice. The consumer must “opt-in” to a mobile marketing program. Consumers have a right to privacy
and marketers must therefore gain approval from consumers before content is sent, and include clear
directions on how to unsubscribe from communication should it become unwanted.
2. Control. Consumers should have control of when and how they receive marketing messaging on the
mobile phone and must be allowed to easily terminate or “opt-out” of an unwanted program.
3. Customisation. Data supplied by the consumer for marketing purposes should be used to tailor such
marketing to the interests of the consumer (e.g. restricting communications to those categories specifically
requested by the consumer.). Targeting user consumer data made available to the marketer helps to
eliminate spam, making content as relevant and useful to the consumer as possible.
4. Consideration. The consumer must receive or be offered something of perceived value in return for
receiving the communication (product and service enhancements, entry into competitions etc.).
5. Constraint. The marketer must effectively manage and limit mobile messaging programs to a reasonable
number of programs.
6. Confidentiality. Commitment to not sharing consumer information with non-affiliated third-parties.
The industry must monitor and enforce consumer protection and privacy to ensure the success and integrity of
the mobile content business.
10

More Related Content

Similar to Ethics and Standards for Mobile Qualitative Research

Your Roadmap for Responsible Marketing Initiatives: The DMA Ethics Guidelines
Your Roadmap for Responsible Marketing Initiatives: The DMA Ethics GuidelinesYour Roadmap for Responsible Marketing Initiatives: The DMA Ethics Guidelines
Your Roadmap for Responsible Marketing Initiatives: The DMA Ethics GuidelinesVivastream
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknownsLisa Marie Martinez
 
Beyond Cookies in Mobile Advertising
Beyond Cookies in Mobile AdvertisingBeyond Cookies in Mobile Advertising
Beyond Cookies in Mobile Advertisingcloudburstmedia
 
Kerri Smith: Marketing in a multi-screen world
 Kerri Smith: Marketing in a multi-screen world Kerri Smith: Marketing in a multi-screen world
Kerri Smith: Marketing in a multi-screen worldiProspect the Netherlands
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device managementJason Murray
 
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
 Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
Notes Version: DMA's Do the Right Thing Best Practices Digital GuidepostVivastream
 
Mobile Marketing: Pros and Cons_Michael Hanley
Mobile Marketing: Pros and Cons_Michael HanleyMobile Marketing: Pros and Cons_Michael Hanley
Mobile Marketing: Pros and Cons_Michael HanleySara Quinn
 
!World Research Codes and Guidelines ESOMAR GUIDEL.docx
!World Research Codes and Guidelines ESOMAR GUIDEL.docx!World Research Codes and Guidelines ESOMAR GUIDEL.docx
!World Research Codes and Guidelines ESOMAR GUIDEL.docxkatherncarlyle
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
Privacy-Enhanced Personalization
Privacy-Enhanced PersonalizationPrivacy-Enhanced Personalization
Privacy-Enhanced PersonalizationIHM'10
 
Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work PlacePepovski Darko
 
CMPLY Updated Regulatory Overview June 2014
CMPLY Updated Regulatory Overview June 2014CMPLY Updated Regulatory Overview June 2014
CMPLY Updated Regulatory Overview June 2014CMP.LY, Inc.
 
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTSA BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTSInternet Law Center
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplacemkeane
 
Email Marketing & Mobile Devices Survey
Email Marketing & Mobile Devices SurveyEmail Marketing & Mobile Devices Survey
Email Marketing & Mobile Devices SurveyAcxiom Corporation
 

Similar to Ethics and Standards for Mobile Qualitative Research (20)

Your Roadmap for Responsible Marketing Initiatives: The DMA Ethics Guidelines
Your Roadmap for Responsible Marketing Initiatives: The DMA Ethics GuidelinesYour Roadmap for Responsible Marketing Initiatives: The DMA Ethics Guidelines
Your Roadmap for Responsible Marketing Initiatives: The DMA Ethics Guidelines
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
 
Beyond Cookies in Mobile Advertising
Beyond Cookies in Mobile AdvertisingBeyond Cookies in Mobile Advertising
Beyond Cookies in Mobile Advertising
 
Team x's demo deck
Team x's demo deckTeam x's demo deck
Team x's demo deck
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Kerri Smith: Marketing in a multi-screen world
 Kerri Smith: Marketing in a multi-screen world Kerri Smith: Marketing in a multi-screen world
Kerri Smith: Marketing in a multi-screen world
 
A strategic view of mobile device management
A strategic view of mobile device managementA strategic view of mobile device management
A strategic view of mobile device management
 
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
 Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
Notes Version: DMA's Do the Right Thing Best Practices Digital Guidepost
 
Mobile Marketing: Pros and Cons_Michael Hanley
Mobile Marketing: Pros and Cons_Michael HanleyMobile Marketing: Pros and Cons_Michael Hanley
Mobile Marketing: Pros and Cons_Michael Hanley
 
!World Research Codes and Guidelines ESOMAR GUIDEL.docx
!World Research Codes and Guidelines ESOMAR GUIDEL.docx!World Research Codes and Guidelines ESOMAR GUIDEL.docx
!World Research Codes and Guidelines ESOMAR GUIDEL.docx
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Mobile Media Privacy
Mobile Media PrivacyMobile Media Privacy
Mobile Media Privacy
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
Mobile strategy 2015
Mobile strategy 2015Mobile strategy 2015
Mobile strategy 2015
 
Privacy-Enhanced Personalization
Privacy-Enhanced PersonalizationPrivacy-Enhanced Personalization
Privacy-Enhanced Personalization
 
Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work Place
 
CMPLY Updated Regulatory Overview June 2014
CMPLY Updated Regulatory Overview June 2014CMPLY Updated Regulatory Overview June 2014
CMPLY Updated Regulatory Overview June 2014
 
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTSA BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
A BRIEF HISTORY OF US PRIVACY REGULATION ATTEMPTS
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplace
 
Email Marketing & Mobile Devices Survey
Email Marketing & Mobile Devices SurveyEmail Marketing & Mobile Devices Survey
Email Marketing & Mobile Devices Survey
 

More from Threads Qualitative Research

More from Threads Qualitative Research (7)

Around the World in 14 Days
Around the World in 14 DaysAround the World in 14 Days
Around the World in 14 Days
 
Southernology 25 things about the south
Southernology  25 things about the southSouthernology  25 things about the south
Southernology 25 things about the south
 
Where Are the Purple Cars?
Where Are the Purple Cars?Where Are the Purple Cars?
Where Are the Purple Cars?
 
Improving the Customer Experience With Mystery Shopping
Improving the Customer Experience With Mystery ShoppingImproving the Customer Experience With Mystery Shopping
Improving the Customer Experience With Mystery Shopping
 
MMRA QRCA NYC Mobile Qualitative Presentation
MMRA QRCA NYC Mobile Qualitative PresentationMMRA QRCA NYC Mobile Qualitative Presentation
MMRA QRCA NYC Mobile Qualitative Presentation
 
MMRA Mobile Mystery Shopping
MMRA Mobile Mystery ShoppingMMRA Mobile Mystery Shopping
MMRA Mobile Mystery Shopping
 
Understanding People Using Mobile Devices
Understanding People Using Mobile DevicesUnderstanding People Using Mobile Devices
Understanding People Using Mobile Devices
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 

Ethics and Standards for Mobile Qualitative Research

  • 1. ETHICS AND PROFESSIONAL STANDARDS IN MOBILE QUALITATIVE Mark Michelson, Executive Director Mobile Marketing Research Association
  • 2. IS MOBILE A NEW METHOD? • Not really - it’s a new channel, not a method • However there are many unique aspects in mobile that are creating headlines regarding privacy (gps tracking, video, photo, etc.) • This could lead to more strict government regulations, self-censorship by participants and a reluctance to use the channel to its’ full potential • MMRA is working to create professional standards and ethics for using mobile devices for marketing research 1
  • 3. “OMG” & “WTF” SHARED BY KRISTIN LUCK OF DECIPHER AT MRMW CONFERENCE • OMG • O – Online tracking data • M – Meta-data in photos • G – Geo-location • WTF • W – Wandering device ID’s • T – Too complex privacy polices • F – Fees for SMS and data streaming 2
  • 4. MANY OF THE CURRENT STANDARDS FOR PRIVACY AND ETHICS WILL APPLY • Permissions for use of recorded voice/image • Protection of personal identity and information • No use of personal information for selling or direct marketing, etc. • ESOMAR adopted existing standards in their current guidelines for conducting survey research via mobile phones • Other organizations are also currently creating standards and ethics regarding privacy using mobile devices for marketing purposes • Future of Privacy Forum, Mobile Marketing Association 3
  • 5. ESOMAR’S MOBILE SURVEY GUIDELINES • Produced last summer, mostly survey related – e.g. contacting respondent for a survey while they are on their mobile phone • Adopted guidelines for online identification and tracking technologies for mobile – including – so what is good for the web is good for mobile, supposedly • Additionally covers unsolicited contacting of respondent on mobile, cost to respondent, security and downloads, appropriate design, privacy policy readability, and passive data collection guidelines • Nothing has been decided regarding mobile qualitative. This is where the MMRA is heading an initiative working with leading associations such as ESOMAR, QRCA and AQR 4
  • 6. GUIDELINES FOR OWNERSHIP OF DATA • Participants must be able to opt in or out at any time with mobile • Don’t rely solely on the recruiter to gain permission when using apps or mobile platforms. Work with both the recruiting agency and the mobile supplier • Participants should know what they are opting in for • Clear policies for obtaining permission to use information gathered on the mobile phone – and how it’s gathered • Data on the phone NOT related to the study should never be collected • e.g. contact lists, personal images/video, passwords, etc. 5
  • 7. GUIDELINES FOR USE OF VIDEO AND PHOTOS • If using self-generated video, best to review the video with the participant and have clearly written permission to approve use of video AFTER reviewing it with participant • Similarly with photos – have the participant agree to “post” EACH photo even if only used for reporting • Check with country laws if sending the photos via mobile devices – some countries (i.e. China, Canada) do not allow transfer of images or video using mobile devices • Policy for protection of photos and images should be specified in advance, in a clear manner 6
  • 8. GUIDELINES FOR GPS TRACKING • GPS tracking needs permission and the ability for the participant to understand how it works so they can turn it off and on as they see fit • Define the need for geo-location identification and use only for that purpose • e.g. knowing participants are at specific locations when doing shopper studies vs. tracking location and movement 24 hours a day • Photos also will imprint with geo-location coding • Should be disclosed with permission to use specific images 7
  • 9. GOVERNMENT REGULATIONS AND PRIVACY LAWS • Privacy laws vary by country • There are 27 different privacy laws in the EU (27 countries). • MMRA is currently compiling a list of privacy laws related to mobile by country. • Most strict are China, Canada, Sweden and Germany • Less strict are the USA, Latin America, India 8
  • 10. ACCURACY, AUTHENTICITY AND THE RIGHT TO BE FORGOTTEN • Mobile ethnography depends on the respondent to capture their experience • Similar to social media, self-editing occurs largely because of fears of loss of privacy • Involving the respondent in the review and approval process is advised to gain trust – especially in longitudinal studies • The Right to Be Forgotten is an internet privacy policy that allows people to have their images, videos, notes, etc. cleaned from internet servers and search engines. • This policy could impact mobile qualitative in profound ways in the future if adopted into law. 9
  • 11. MMA’S SIX FUNDAMENTAL ELEMENTS TO A POSITIVE CONSUMER EXPERIENCE The MMA therefore strives to align its members and industry stakeholders generally with consumers needs and wants to ensure a positive mobile experience. There are six fundamental elements to a positive consumer experience. They are: 1. Choice. The consumer must “opt-in” to a mobile marketing program. Consumers have a right to privacy and marketers must therefore gain approval from consumers before content is sent, and include clear directions on how to unsubscribe from communication should it become unwanted. 2. Control. Consumers should have control of when and how they receive marketing messaging on the mobile phone and must be allowed to easily terminate or “opt-out” of an unwanted program. 3. Customisation. Data supplied by the consumer for marketing purposes should be used to tailor such marketing to the interests of the consumer (e.g. restricting communications to those categories specifically requested by the consumer.). Targeting user consumer data made available to the marketer helps to eliminate spam, making content as relevant and useful to the consumer as possible. 4. Consideration. The consumer must receive or be offered something of perceived value in return for receiving the communication (product and service enhancements, entry into competitions etc.). 5. Constraint. The marketer must effectively manage and limit mobile messaging programs to a reasonable number of programs. 6. Confidentiality. Commitment to not sharing consumer information with non-affiliated third-parties. The industry must monitor and enforce consumer protection and privacy to ensure the success and integrity of the mobile content business. 10