Welcome!

News Feed Item

AdaptiveMobile Reveals the Messaging Apps Turning to Growth Hacking to Compete - two apps responsible for over 76% of all invites

AdaptiveMobile, the world leader in mobile security, has seen mobile apps in North America send 8.5 times more invitations per application in the last six months, in a race to gain new users. As part of a new report released today the company has identified the top social, gaming and messaging applications, including Glide, Meow and Tango, that are using an aggressive form of Growth Hacking that makes it difficult for users to opt-out of sending invitations to their contact lists.

Growth Hacking is a method of increasing the user base of an app, which occurs when a user-installed app requests to promote itself by notifying or inviting the user’s contact list by SMS. AdaptiveMobile started tracking the trend and its associated “App-Spam” earlier this year. The issue has become a mainstream problem with Google recently updating the Google Play terms and conditions to include a note that apps must not be involved in “Unsolicited promotion via SMS services.” Apps now have 15 days to comply with this update to regulations.

“It’s common to invite friends to new apps, but this shouldn’t turn into spam,” said Cathal Mc Daid, Head of Data Intelligence & Analytics at AdaptiveMobile. “These apps take this principle above and beyond acceptable limits, subverting communications between friends and contacts.”

As part of its investigation, the Data Intelligence & Analytics team at AdaptiveMobile monitored the most active, popular social and messaging applications in North America between February and March 2014, noting which ones were the most frequent and aggressive in exploiting existing contacts for new memberships through sending App-Spam, and which apps were receiving the most complaints. AdaptiveMobile found the following to be the most aggressive in sending SMS messages to a user’s contact list, while also making it difficult for users to opt-out:

In monitoring the invitations sent during this period, AdaptiveMobile found that Glide sent 57% of the invites, and Tango sent 19.7%. In order of comparison, Glide sent out over 10 times more SMS invites than WhatsApp, an application with low levels of customer complaints, and made it very difficult for users to opt-out of inviting their contact list, leading to the highest number of consumer complaints. Although the Tango app allows users to easily opt-out of inviting contacts when they install the app, it also includes an ‘Invite on Activity’ feature, so when a photo is taken using the app, this leads to more invites being sent, resulting in a significant number of complaints.

“The key to whether an SMS invite is welcome or viewed as spam lies in the application’s user interface,” said Mc Daid. “Making it difficult for users to not send SMS spam invites is one reason behind the high level of App-Spam. This will hurt a company in the long run not only by irritating consumers but, as we’ve seen with last week’s Google announcement, it could also result in having an app being removed from an app store for not complying with terms and conditions.”

AdaptiveMobile has drafted a set of recommendations to ensure that application developers that wish to send invites do it in a manner that won’t lead to messaging abuse and complaints including:

  • Make it easy for a user to not invite All Contacts
  • Do not ask on start-up or during activity to invite All Contacts
  • Do not give an Invite All option
  • Do not pre-select All Contacts to be invited in an invite screen
  • Allow the user to edit the invite text
  • Do not make inviting others via SMS Invites, part of an incentive system (points etc.)

“If an App chooses to send invites, and if this is permitted by the relevant App store and Mobile Operator, then it needs to make sure that safeguards are built into the design to ensure that a user can easily opt-out,” said Mc Daid. “While compiling the report, we alerted all the applications identified as generating excessive invites in our report and shared the research with Google and other industry players. We will continue to work closely with apps developers, app store owners and mobile operators to reduce the amount of App-Spam being generated.”

Notes to editors

To download the full report please visit: http://www.adaptivemobile.com/downloads/messaging-wars-code-of-conduct

About AdaptiveMobile:

AdaptiveMobile is the world leader in mobile security, protecting over one billion consumer and enterprise subscribers worldwide, and the only mobile security company offering products designed to protect all the services on both fixed and mobile networks. With unparalleled expertise and unique focus on network to handset security solutions, AdaptiveMobile’s award-winning security products provide customers with real-time insight into what is happening across their networks. AdaptiveMobile provides its customers with advanced threat detection and actionable intelligence, combined with the most comprehensive mobile security products available on the market today; as well as sophisticated revenue-generating security services – empowering consumers and enterprises alike to take greater control of their own security. www.adaptivemobile.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
DevOps at Cloud Expo – being held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, showed how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningful f...