News Feed Item

AdaptiveMobile Reveals the Messaging Apps Turning to Growth Hacking to Compete - two apps responsible for over 76% of all invites

AdaptiveMobile, the world leader in mobile security, has seen mobile apps in North America send 8.5 times more invitations per application in the last six months, in a race to gain new users. As part of a new report released today the company has identified the top social, gaming and messaging applications, including Glide, Meow and Tango, that are using an aggressive form of Growth Hacking that makes it difficult for users to opt-out of sending invitations to their contact lists.

Growth Hacking is a method of increasing the user base of an app, which occurs when a user-installed app requests to promote itself by notifying or inviting the user’s contact list by SMS. AdaptiveMobile started tracking the trend and its associated “App-Spam” earlier this year. The issue has become a mainstream problem with Google recently updating the Google Play terms and conditions to include a note that apps must not be involved in “Unsolicited promotion via SMS services.” Apps now have 15 days to comply with this update to regulations.

“It’s common to invite friends to new apps, but this shouldn’t turn into spam,” said Cathal Mc Daid, Head of Data Intelligence & Analytics at AdaptiveMobile. “These apps take this principle above and beyond acceptable limits, subverting communications between friends and contacts.”

As part of its investigation, the Data Intelligence & Analytics team at AdaptiveMobile monitored the most active, popular social and messaging applications in North America between February and March 2014, noting which ones were the most frequent and aggressive in exploiting existing contacts for new memberships through sending App-Spam, and which apps were receiving the most complaints. AdaptiveMobile found the following to be the most aggressive in sending SMS messages to a user’s contact list, while also making it difficult for users to opt-out:

In monitoring the invitations sent during this period, AdaptiveMobile found that Glide sent 57% of the invites, and Tango sent 19.7%. In order of comparison, Glide sent out over 10 times more SMS invites than WhatsApp, an application with low levels of customer complaints, and made it very difficult for users to opt-out of inviting their contact list, leading to the highest number of consumer complaints. Although the Tango app allows users to easily opt-out of inviting contacts when they install the app, it also includes an ‘Invite on Activity’ feature, so when a photo is taken using the app, this leads to more invites being sent, resulting in a significant number of complaints.

“The key to whether an SMS invite is welcome or viewed as spam lies in the application’s user interface,” said Mc Daid. “Making it difficult for users to not send SMS spam invites is one reason behind the high level of App-Spam. This will hurt a company in the long run not only by irritating consumers but, as we’ve seen with last week’s Google announcement, it could also result in having an app being removed from an app store for not complying with terms and conditions.”

AdaptiveMobile has drafted a set of recommendations to ensure that application developers that wish to send invites do it in a manner that won’t lead to messaging abuse and complaints including:

  • Make it easy for a user to not invite All Contacts
  • Do not ask on start-up or during activity to invite All Contacts
  • Do not give an Invite All option
  • Do not pre-select All Contacts to be invited in an invite screen
  • Allow the user to edit the invite text
  • Do not make inviting others via SMS Invites, part of an incentive system (points etc.)

“If an App chooses to send invites, and if this is permitted by the relevant App store and Mobile Operator, then it needs to make sure that safeguards are built into the design to ensure that a user can easily opt-out,” said Mc Daid. “While compiling the report, we alerted all the applications identified as generating excessive invites in our report and shared the research with Google and other industry players. We will continue to work closely with apps developers, app store owners and mobile operators to reduce the amount of App-Spam being generated.”

Notes to editors

To download the full report please visit: http://www.adaptivemobile.com/downloads/messaging-wars-code-of-conduct

About AdaptiveMobile:

AdaptiveMobile is the world leader in mobile security, protecting over one billion consumer and enterprise subscribers worldwide, and the only mobile security company offering products designed to protect all the services on both fixed and mobile networks. With unparalleled expertise and unique focus on network to handset security solutions, AdaptiveMobile’s award-winning security products provide customers with real-time insight into what is happening across their networks. AdaptiveMobile provides its customers with advanced threat detection and actionable intelligence, combined with the most comprehensive mobile security products available on the market today; as well as sophisticated revenue-generating security services – empowering consumers and enterprises alike to take greater control of their own security. www.adaptivemobile.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, wil...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and microservices. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your conta...
19th Cloud Expo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterpri...
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his general session at @DevOpsSummit at 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will discuss how customers are able to achieve a level of transparency that e...
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...
The IoT industry is now at a crossroads, between the fast-paced innovation of technologies and the pending mass adoption by global enterprises. The complexity of combining rapidly evolving technologies and the need to establish practices for market acceleration pose a strong challenge to global enterprises as well as IoT vendors. In his session at @ThingsExpo, Clark Smith, senior product manager for Numerex, will discuss how Numerex, as an experienced, established IoT provider, has embraced a ...
DevOps theory promotes a culture of continuous improvement built on collaboration, empowerment, systems thinking, and feedback loops. But how do you collaborate effectively across the traditional silos? How can you make decisions without system-wide visibility? How can you see the whole system when it is spread across teams and locations? How do you close feedback loops across teams and activities delivering complex multi-tier, cloud, container, serverless, and/or API-based services?
Today every business relies on software to drive the innovation necessary for a competitive edge in the Application Economy. This is why collaboration between development and operations, or DevOps, has become IT’s number one priority. Whether you are in Dev or Ops, understanding how to implement a DevOps strategy can deliver faster development cycles, improved software quality, reduced deployment times and overall better experiences for your customers.
The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.