Glossary Pages Archive - Branch https://www.branch.io/glossary/ Unifying user experience and attribution across devices and channels Wed, 12 Jun 2024 19:57:35 +0000 en-US hourly 1 Privacy Manifest https://www.branch.io/glossary/privacy-manifest/ Wed, 12 Jun 2024 19:57:05 +0000 https://www.branch.io/?post_type=glossary&p=19084 A privacy manifest is a document that outlines an app’s data practices, including details about how the app handles user data, and now required by Apple when leveraging commonly-used APIs. This is an important record that ensures mobile marketers are adhering to privacy regulations and protecting user information, essentially creating a privacy nutrition label for... Read more »

The post Privacy Manifest appeared first on Branch.

]]>
A privacy manifest is a document that outlines an app’s data practices, including details about how the app handles user data, and now required by Apple when leveraging commonly-used APIs. This is an important record that ensures mobile marketers are adhering to privacy regulations and protecting user information, essentially creating a privacy nutrition label for consumers.


A privacy manifest file is a document that describes the various ways an app handles user data. This information includes which data the app’s third-party SDKs collect, how the app uses the data, who the data is shared with, and how it will be protected.

Why privacy manifest matters to mobile marketers

Privacy manifest files are invaluable to mobile marketers for many reasons, including the following:

  • They help marketers build trust with consumers. App users are care about how their data is being used and how well it’s being protected. An app’s privacy manifest shows them that the app developer and marketer care about safeguarding their personal information.
  • They help foster stronger user engagement. When users trust apps, such as those using iOS, they are more likely to interact with them, which can help boost user engagement and retention.
  • They help marketers comply with laws and regulations. Mobile marketers are required to adhere with privacy rules, and having strong privacy manifest files in place helps them remain in compliance.
  • They help marketers avoid fines and penalties. When marketers don’t comply with privacy regulations and laws, they are met with penalties and fine. Having a privacy manifest in places helps them steer clear of these punitive actions and remain in good standing.

Understanding third-party SDKs and required reason APIs

Third-party SDKs and required reason APIs are important elements of privacy manifests for iOS apps that operate on Apple devices. Here’s how they work to make sure user data is handled appropriately:

  • Third-party SDKs: Third-party SDKs are tools or libraries of tools that app developers integrate into their apps to collect user data for analytics, social media, advertising, and other functions. These tools are provided to app developers by third parties to help them leverage data for marketing and advertising purposes.
  • Required reason APIs: When an app wants to access features on a user’s device, such as location, the camera, the microphone, or personal data, the app must explain to the user why it wants access. A required reason API enables the app to send the request for information to users in the app. This feature helps empower users to have a say in how their data is collected and used.

Considerations about privacy manifests for iOS and Apple

Apple products and iOS have a unique privacy manifest with a special emphasis on user education that empowers them to make their own decisions about their data.

Privacy manifest files for iOS are well regarded for their comprehensive transparency, strict data collection and sharing guidelines, industry-leading privacy technology, and other related features that are often seen as the industry standard for mobile. In fact, Apple requires that apps running on iOS disclose if any data is collected by a third-party SDK and, if it is, which data is collected, shared, and used.

Staying on top of current trends

It’s important for marketers to stay informed about current trends that may impact the way privacy manifest files are developed and deployed. This includes an increase in regulations and stricter data privacy laws. Marketers must ensure their data manifests are detailed enough to account for enhanced requirements as they continue to evolve.

Privacy manifests are also becoming more user-centric and are written in language that is clear and easy for non-technical users to understand. There’s a growing trend to offer users more control over how their data is used, as iOS does, and some privacy manifests contain simple instructions to help users opt out of data collection or edit or delete their information.

Apps often share user information with third parties, such as advertisers, using third-party SDKs. Today, privacy manifests typically explain which user data is shared and who it is shared with.

Looking ahead

Privacy manifests will continue to evolve as technologies and data privacy laws change.

  • Artificial intelligence will influence the way privacy manifests are created and will be able to tailor them to each user based on how they engage with the app and what their preferences are.
  • Interactive tools may be used to allow users to control how their data is handled in real time.
  • International privacy standards may emerge, which will make it easier for mobile marketers to ensure they are in compliance with regulations, wherever their users may be.
  • Blockchain technology may be used to make data and privacy manifests even more secure.

Privacy manifests are essential to marketers, ultimately helping them build trust with consumers and enhance user engagement and retention.

The post Privacy Manifest appeared first on Branch.

]]>
Privacy-Enhancing Technologies (PETs) https://www.branch.io/glossary/privacy-enhancing-technologies-pets/ Fri, 07 Jun 2024 17:56:50 +0000 https://www.branch.io/?post_type=glossary&p=19044 What are privacy-enhancing technologies? Privacy-enhancing technologies (PETs) are tools and methodologies designed to protect personal data and uphold user privacy rights in digital environments. PETs help organizations navigate the complex privacy landscape while ensuring the safety and integrity of user data.  The FTC’s perspective on PETs emphasizes the gradual shift toward minimizing or even eliminating... Read more »

The post Privacy-Enhancing Technologies (PETs) appeared first on Branch.

]]>
What are privacy-enhancing technologies?

Privacy-enhancing technologies (PETs) are tools and methodologies designed to protect personal data and uphold user privacy rights in digital environments. PETs help organizations navigate the complex privacy landscape while ensuring the safety and integrity of user data. 

The FTC’s perspective on PETs emphasizes the gradual shift toward minimizing or even eliminating user data access: “On one end of the spectrum, a company has access to all of an individual’s private information and relies on internal policies and procedures to ensure this information is not misused or breached. On the other end of the spectrum, there are technologies which allow a company to offer products and services without ever having access to a user’s data. PETs are approaches that allow companies to move towards the latter end of the spectrum — some reach the end goal of a company truly not having access to the data of any individual, and others reside in the middle, where they limit access but still have some reliance on a company’s policies and practices.”

Examples of PETs

PETs encompass a wide range of tools and techniques, including those designed to enhance data security, privacy, and compliant data processing practices. Examples include: 

Data clean rooms: Perhaps the best-known PET use case, data clean rooms facilitate the aggregate, anonymization, and analysis of first-party data from various sources in a secure environment. Their primary application is data sharing for advertising and analytics purposes.

End-to-end encryption (E2EE): E2EE is a secure communication method that protects data from unauthorized access or interception by third parties. The cryptographic technique safeguards sensitive information during transmission and storage from device to device, ensuring that only the intended parties can access encrypted data.

Pseudonymization: Pseudonymization replaces identifiable information with artificial identifiers, or pseudonyms, to reduce the risk of reidentification. Anonymizing personal data enables organizations to process and analyze data while minimizing privacy risks.

Differential privacy: Differential privacy enables organizations to analyze datasets while preserving the privacy of individual data points. It adds noise or “randomness” to query results to prevent the disclosure of sensitive information while still allowing for analysis and insights.

Obfuscation: Obfuscation introduces noise into datasets to protect sensitive information from unauthorized access or misuse. By obscuring the meaning or structure of data, obfuscation enhances privacy protection during data analysis and processing. Unlike differential privacy, which focuses on protecting individual data points, obfuscation operates at the broader dataset level. 

Trusted execution environment (TEE): A trusted execution environment (TEE) is a secure area within a device’s main processor that ensures confidential computing. It isolates code execution and data processing from the rest of the system, protecting it from unauthorized access and threats. Even if the operating system is compromised, the TEE keeps the data safe. 

Blinding: Blinding is a cryptography technique that masks specific data points or attributes within a dataset, preventing organizations from identifying individuals or sensitive information. 

Why do PETs matter now?

PETs aren’t new; they have existed for decades, but their relevance has surged in recent years. With the exponential growth of digital data — and growing concern over data breaches and sensitive data protection — organizations are struggling to leverage data insights while simultaneously protecting individual privacy. PETs offer a privacy-safe approach to tackle these challenges, in turn helping organizations and providers to: 

  • Foster trust: Investments in PETs signal to customers and business stakeholders, including partners, investors, and regulators, that an organization is committed to protecting user data. This helps build brand loyalty and strengthen customer relationships. 
  • Comply with data privacy regulations: Data protection laws, such as the General Data Protection Regulation (GDPR) in the European Union and the California Consumer Privacy Act (CCPA), have pressured organizations to rethink their data collection and usage practices. PETs have become useful tools for navigating the regulatory landscape, providing mechanisms to comply with evolving regulations and avoid penalties. 
  • Reduce risk: Data breaches have significant consequences for organizations, not only in terms of financial losses but also in damaging reputations and fracturing customer trust. PETs help mitigate the risk associated with user data collection, storage, and sharing by minimizing the likelihood of unauthorized access or misuse. 
  • Execute critical business functions: Finding the balance between user privacy and meeting business objectives can be difficult. PETs, in theory, are not just safeguards against data breaches; they enable brands to carry out operations, explore new avenues, and innovate without compromising user privacy. 

The post Privacy-Enhancing Technologies (PETs) appeared first on Branch.

]]>
Data Clean Room https://www.branch.io/glossary/data-clean-room/ Tue, 04 Jun 2024 11:02:29 +0000 https://www.branch.io/?post_type=glossary&p=19025 What is a data clean room? A data clean room serves as a secure environment where companies aggregate, anonymize, and analyze first-party data from multiple sources to derive insights while ensuring user privacy. These privacy-compliant spaces enable advertisers and publishers to utilize data insights for ad campaign targeting, performance measurement, and attribution analysis, all while... Read more »

The post Data Clean Room appeared first on Branch.

]]>
What is a data clean room?

A data clean room serves as a secure environment where companies aggregate, anonymize, and analyze first-party data from multiple sources to derive insights while ensuring user privacy. These privacy-compliant spaces enable advertisers and publishers to utilize data insights for ad campaign targeting, performance measurement, and attribution analysis, all while safeguarding user-level data.

How do data clean rooms work?

Data clean rooms allow companies to upload their first-party data, which is then matched and analyzed with data from other sources within the clean room. This process enables targeted advertising campaigns and performance measurement without the use of individual identifiers or personally identifying information (PII). The most common use case is between advertising providers and publishers to analyze overlapping user data.

Here’s how the process works: 

  1. Data upload: Advertisers and publishers transfer their first-party data to a secure data clean room. 
  2. Data processing: Next, the platform cleans and processes the data using privacy-protection techniques, such as pseudonymization and encryption. Once processed, the platform analyzes the data to match users or create cohorts with similar attributes. 
  3. Activation: Advertisers and publishers analyze reports generated by the data clean room to fine-tune their campaigns. These reports provide insights into audience behavior, such as click-through rates across different demographic segments. In theory, these reports help advertisers and publishers make real-time adjustments to improve campaign performance. 

What are the benefits?

Data clean rooms offer a fundamental advantage: They prioritize data privacy. As privacy laws evolve and the deprecation of third-party cookies approaches, data clean rooms have become an even hotter topic of conversation. They provide a privacy-safe environment for brands to leverage combined data, enabling audience and customer behavior analysis, targeted advertising, and campaign performance measurement. By aggregating and anonymizing data within a clean room environment, brands can protect sensitive user information and ensure compliance with privacy regulations like the General Data Protection Regulation (GDPR).

Plus, data uploaded to a clean room stays within the platform, ensuring that data owners maintain complete control. This reduces the risk of misuse and fosters stakeholders’ trust in data security and privacy.

What are the drawbacks?

Despite their benefits, data clean rooms also pose challenges and limitations. One drawback is the potential decrease in the accuracy of aggregated data compared to user-level data. While privacy measures are essential for protecting user information, data aggregation can affect the precision of targeting and measurement efforts. Similarly, if organizations are reluctant to share their first-party data in clean room ecosystems, it severely limits the insights available to advertisers and publishers. 

Another challenge is that brands must unify data before uploading it to the clean room platform. In other words, they have to ensure that data from different sources is standardized and structured consistently. This is a major headache, often requiring significant effort and resources. To make matters worse, the lack of universal standards for data clean room setups creates interoperability and compatibility issues across different platforms and vendors. As a result, brands may struggle to integrate data from multiple clean room sources and consolidate insights.

Data clean rooms in the wild

While not new technology, brands across various industries are increasingly adopting data clean rooms to navigate the digital advertising landscape. Retail companies like Hershey’s are investing in these platforms to gain deeper insights into advertising effectiveness and consumer behavior. By establishing its own data clean room, Hershey’s can analyze data from other retail partners, enabling it to optimize loyalty programs, assess the impact of advertising campaigns, and refine its marketing strategies. Other major players like Unilever utilize data clean rooms to address cross-platform measurement challenges, integrating and analyzing data from multiple sources within controlled environments. 

And data clean rooms are not limited to retail and consumer goods industries. Even companies in the media and entertainment industries, like Disney, have embraced this technology, enabling advertisers to access valuable audience insights from anonymized data sets. 

The post Data Clean Room appeared first on Branch.

]]>
Sideloading https://www.branch.io/glossary/sideloading/ Wed, 14 Feb 2024 17:25:01 +0000 https://branch2022stg.wpengine.com/?post_type=glossary&p=18222 What is sideloading? Sideloading is the process of installing an application onto a mobile device without using the device’s official app store or marketplace. Users transfer files between two devices, such as a computer and a mobile device, or install software packages –– usually an application file or Android Package Kit (APK) for Android devices... Read more »

The post Sideloading appeared first on Branch.

]]>
What is sideloading?

Sideloading is the process of installing an application onto a mobile device without using the device’s official app store or marketplace. Users transfer files between two devices, such as a computer and a mobile device, or install software packages –– usually an application file or Android Package Kit (APK) for Android devices –– from a website or other unofficial source and manually install it onto their device. Sideloading allows users to access more mobile apps than are officially available on the app store, but it poses risks, as sideloaded apps are not screened for malware and can lead to security breaches. 

How do users sideload apps?

The method of sideloading varies across platforms, and while it’s relatively straightforward on some devices, it requires additional steps or even jailbreaking on others. On Windows computers, for example, users can sideload files from one device to another via a cable or memory card. Sideloading is typically associated with Android devices as the operating system provides more flexibility in installing software from sources other than the Google Play Store. To enable app sideloading, Android users simply check a box in security settings to allow installs from “unknown sources” and download the application file to their device. On iOS devices, including iPhones and iPads, it’s more complex and usually requires third-party app stores or tools.

What are the risks of sideloading?

Sideloading allows users to download apps not available on official app stores, like custom-developed Android or iOS apps, beta versions, or apps removed or banned from app stores. However, sideloading apps can be dangerous, putting users at risk of:

  • Malware infection: As sanctioned app stores do not screen them, sideloaded apps may contain malware, leading to data breaches and other security risks. 
  • Security vulnerabilities: Sideloaded apps can introduce security vulnerabilities to a device, which is why many device manufacturers or operating systems restrict the practice.
  • Lack of updates: Sideloaded apps may not receive regular updates, leaving them vulnerable to cyberattacks. 
  • Privacy risks: Some sideloaded apps request unnecessary permissions or access to user data without appropriate controls and oversight. 
  • Fraud: As they’re often unregulated, sideloaded apps can include fraudulent versions of legitimate apps, exposing users to legal risks. 

How do Apple’s January 2024 changes to iOS, Safari, and the App Store in the European Union impact sideloading?

In response to the Digital Markets Act (DMA), Apple’s recent update in the EU allows for app sideloading with some restrictions. Effective with the beta rollout of iOS 17.4, the update permits sideloading but mandates a “Notarization” process, which involves a combination of automated checks and human review. Apple also announced a “Core Technology Fee” of €0.50 for each first annual install per year over a one million threshold, regardless of whether the apps were sideloaded or downloaded from the Apple App Store. This fee is intended to discourage the use of alternative app stores. Although these changes comply with the DMA’s requirements, Apple has expressed concerns about the potential privacy and security risks for users. Apple is also urging developers to continue distributing apps through the App Store rather than alternative methods, stating that these solutions help mitigate some of the security risks created by the DMA.

The post Sideloading appeared first on Branch.

]]>
Conversion Value https://www.branch.io/glossary/conversion-value/ Mon, 13 Nov 2023 14:41:42 +0000 https://branch2022stg.wpengine.com/?post_type=glossary&p=17639 What is a conversion value? The concept of a conversion value is crucial in the world of mobile app marketing, particularly within the frameworks of iOS attribution measurement and Apple’s SKAdNetwork (SKAN). A conversion value refers to the numerical value (0 to 63) assigned to specific in-app events or actions. These values provide app developers... Read more »

The post Conversion Value appeared first on Branch.

]]>
What is a conversion value?

The concept of a conversion value is crucial in the world of mobile app marketing, particularly within the frameworks of iOS attribution measurement and Apple’s SKAdNetwork (SKAN). A conversion value refers to the numerical value (0 to 63) assigned to specific in-app events or actions. These values provide app developers and marketers with valuable insights into user behavior, helping them measure the effectiveness of their marketing efforts while complying with the latest user privacy regulations. 

Why are conversion values necessary?

Conversion values became a critical tool in mobile marketers’ toolboxes following Apple’s introduction of App Tracking Transparency (ATT). With ATT, Apple cracked down on user privacy, implementing stricter regulations on user data tracking and collection. It then introduced SKAN, a privacy-centric measurement framework and alternative to traditional attribution methods. SKAN requires that app developers and marketers use conversion values instead of traditional identifiers like device IDs (e.g., IDFA) to attribute and measure user actions within apps. This change marked a significant industry shift from relying on granular user-level data to aggregated, privacy-compliant data. 

How do conversion values work?

Each mobile app defines “conversion” differently depending on its industry, business model, and userbase. A conversion can indicate any kind of user action, including an app install, in-app purchase, subscription, or engagement with a piece of content. Most apps track multiple types of conversions to understand how users behave over their entire lifecycle. To translate these actions into quantifiable data, apps assign a graduated scale of conversion values. These values range from 0 to 63, with 0 automatically assigned to the “install” event by Apple, 1 representing the least significant conversion event, and 63 representing the most significant or valuable user action. By using this 64-value system, developers and marketers gain more granular insights into app user behavior and campaign performance.

A T-chart showing conversion value and in-app action 63 - Purchase 62 - Add payment info 61 - Clicking checkout button 60 - View cart 59 - Add to wishlist ... 31 - View item dimensions 30 - View item description 29 - View item 28 - View product category ... 10 - Views in-app ad 9 - Reads article in blog tab ... 2 - Views homescreen 1 - Starts onboarding flow

When a user performs a specified action within an app, the corresponding conversion value is assigned to that event. 

With SKAN 3.0, measurement was relatively straightforward: when a user clicked on an ad and installed your app, a 24-hour postback timer started. Each time a user completed an in-app action of a higher conversion value than the last, the timer reset to 24 hours. When the timer reached 0, a SKAN postback containing the install and the highest conversion value completed was sent to the ad network, the advertiser, and the mobile measurement partner (MMP)

However, SKAN 4.0 introduced additional complexity and capabilities: instead of the previous 24-hour window, SKAN 4.0 offers multiple measurement windows, including 0 to 2 days, 3 to 7 days, and 8 to 35 days post-install. Each of these windows corresponds to a postback, which provides a more representative view of user behavior over time. 

What are coarse conversion values?

SKAN 4.0 introduced coarse conversion values to provide a more user-friendly approach to tracking than the 64-value system. It enables developers and marketers to assign user actions to broader buckets, such as “low,” “medium,” and “high.” In general, these values simplify the attribution and measurement process while still providing marketers valuable insights into campaign performance. 

Bottom line

Conversion values allow app developers and marketers to accurately measure the success of their marketing and advertising campaigns. By tracking the SKAN postback triggered by each unique action, app developers and marketers can determine the value generated by different marketing efforts. This information helps them identify which campaigns are driving the most conversions and more effectively allocate their marketing budget. 

Yet for most marketers, conversion values have a steep learning curve. Which events you track, how you map conversion values, and how you configure postback windows will all depend on your unique business goals. To help brands navigate the complexity of SKAN 4.0 conversion values, Branch introduced SKAN Magic Set Up. Instead of manually implementing a custom configuration, you can now use a Branch-recommended conversion setup to save valuable time and resources. To learn more, request a demo with our team. 

The post Conversion Value appeared first on Branch.

]]>
Impression https://www.branch.io/glossary/impression/ Mon, 23 Oct 2023 14:13:51 +0000 https://branch2022stg.wpengine.com/?post_type=glossary&p=17512 What is an impression? An impression refers to the number of times an advertisement or piece of content is viewed by a user. Ad impressions are used to measure the overall visibility and reach of an ad campaign, and drive important metrics like cost per mille (CPM) and click-through rate (CTR). Even a view-through impression,... Read more »

The post Impression appeared first on Branch.

]]>
What is an impression?

An impression refers to the number of times an advertisement or piece of content is viewed by a user. Ad impressions are used to measure the overall visibility and reach of an ad campaign, and drive important metrics like cost per mille (CPM) and click-through rate (CTR). Even a view-through impression, where an ad is seen by a user but not clicked, is valuable in mobile marketing.

Say you drive by the same billboard advertisement every day for work. 

Some days you’re stuck in bumper-to-bumper traffic and you read that billboard copy ten times before you finally drive past it. Other days you speed by, barely registering its presence at all. Each time you drive by this billboard is an impression (also called a view-through) — it doesn’t matter if you speed by and hardly notice it or read and think about its message.

The same is true of digital advertising and mobile marketing. Imagine you’re on social media and you scroll past a Facebook ad: whether you read the ad or rush past it, you count as an impression for that advertiser.

Impressions: Pros and cons

Measuring impressions tells an advertiser how many times their ad is seen — a useful metric all on its own. In digital marketing, impressions are a relatively simple, easy-to-calculate measure of a specific advertisement’s or advertising channel’s reach. The higher the number of total impressions, the more times the ad was served to an audience.

But impressions are not a perfect metric. For example, one person could scroll past the same ad 10 times and they would count as 10 impressions rather than one. Impressions also don’t tell advertisers anything about engagement and whether or not views actually took action after viewing the ad. To better gauge the true visibility of an ad, some brands distinguish between:

  • Served impressions: refers to an ad that has been displayed or “served” on a mobile app, webpage, or other platform. When an ad is retrieved from the ad server and displayed to a user, it counts as a served impression — regardless of whether the user truly saw it.
  • Viewable impressions: an impression that has met specific criteria to be considered “viewed” by a user, such as being at least 50% in view on a user’s screen for more than one second. This avoids counting a quick scroll-by as a true ad view and is a more meaningful indicator of ad visibility.

Impression counts can also be easily skewed by bot traffic and non-genuine views. Particularly on social media platforms, it can be difficult to discern accurate impression numbers.

However, most advertisers measure impressions because it helps them to properly purchase ad inventory. Tracking impressions is also the first step in calculating even more useful metrics like CPM, ROAS, and CTR.

Additional metrics calculated with impressions

Other metrics useful for advertisers which are calculated using the number of impressions are:

CPM

Advertisers purchase a certain number of impressions — say 1,000 — for a set amount of money. This purchasing method is called CPM which stands for cost per mille or cost per thousand (M is thousand in Roman numerals). So if an advertising campaign has a CPM of $20, the advertiser pays $20 for every 1,000 impressions.

ROAS

An advertiser may use an impressions metric to gauge their ROAS (return on advertising spend) and compare different platforms’ effectiveness. ROAS measures how much revenue is earned for every advertising dollar spent. If an advertiser runs a campaign on both Facebook and Instagram, it can use impressions and ROAS to compare apples to apples campaign performance.

CTR

Finally, measuring impressions is necessary to determine click-through rate (CTR), a crucial metric for most advertisers. CTR is the number of people who click on the ad to go where directed — whether that’s an app, a webpage, or elsewhere. To calculate CTR, an advertiser needs to know their number of impressions. CTR is calculated by dividing the total number of clicks on an ad by the total number of impressions.

The post Impression appeared first on Branch.

]]>
Daily Active Users (DAU) https://www.branch.io/glossary/daily-active-users-dau/ Mon, 23 Oct 2023 14:10:44 +0000 https://branch2022stg.wpengine.com/?post_type=glossary&p=17510 What are daily active users? Daily active users (DAU) is a metric that measures the number of unique users interacting with a mobile app within a 24-hour period. DAU reflects user engagement and retention and is used to determine the lifetime value (LTV) of an app. “Active” is a subjective term that individual companies can... Read more »

The post Daily Active Users (DAU) appeared first on Branch.

]]>
What are daily active users?

Daily active users (DAU) is a metric that measures the number of unique users interacting with a mobile app within a 24-hour period. DAU reflects user engagement and retention and is used to determine the lifetime value (LTV) of an app.

“Active” is a subjective term that individual companies can define for themselves. One company might define “active” as opening the app, another as logging in, and another as making an in-app purchase. As a general industry term, active usually means a user has downloaded or opened the app. 

A daily active user is identified with an IDFA (identifier for advertising) or other IDs, and information a company collects via email, cookies, or from a user opting in on their mobile phone.

DAU benefits and limitations

Daily active users are typically considered a vanity metric — one that shows a snapshot of success. 

Imagine a celebrity shares a link to your app on their social media. You get 100,000 new users downloading your app to check it out. Your DAU goes way up. This is exciting! But those 100,000 downloads don’t tell you much except for your success on that one day. However, inflated DAU’s that aren’t repeatable aren’t a good gauge of what engagement looks like on your app every day. It’s more of a reflection of press than overall or sustained success. 

DAU isn’t a key metric in every industry. It only makes sense for businesses where users actually use the app on a daily basis, like news, social media, or gaming. And, because every company can define “active” however it wants, no one is comparing apples to apples industry-wide, making metrics like DAU unhelpful on their own. 

This is not to say you shouldn’t measure DAU. It’s just more helpful if used in tandem with other metrics, or as the building blocks for other metrics.

DAU helps to gauge an app’s “stickiness,” or the regularity users engage with it. Measuring monthly active users (MAU) or even weekly active users also indicates stickiness, but over a longer period of time. The best metric to gauge consistent engagement and retention, though, is the DAU/MAU ratio. 

The DAU/MAU ratio is calculated by dividing the number of daily active users by the number of monthly active users over a given time period. It measures the proportion of monthly active users who engage with the app on a daily basis. In other words, it measures how well your app retains returning users, giving you a more accurate view of interaction with your app. 

DAU/MAU ratio = (Daily active users) / (Monthly active users)

Generally, a DAU/MAU ratio above 50% is considered good. It means that approximately 50% of monthly active users engage with the app daily. By tracking the DAU/MAU ratio overtime, brands can better understand and benchmark their app’s stickiness and growth potential. 

Most companies want to measure a user’s lifetime value (LTV). LTV is an indicator of the total revenue a business can expect to generate from an individual user. To do this, you need to calculate user retention rates, which rely on DAU.

Bottom line: DAU is crucial to measure, but it’s not indicative on its own.

Strategies to boost DAU

There are several ways to achieve an uptick in their daily active users. In today’s complex digital ecosystem, brands need a multi-pronged user acquisition strategy that focuses on acquiring app users from every touchpoint they interact with. Here are a few examples of proven tactics: 

  • Remind your user base to use your app via emails, texts, or push notifications. With so many apps available to consumers, it’s easy for them to get distracted or forget yours exists. Continuous app promotion is critical for getting users to tap “download.” 
  • Optimize your app for visibility in the app store. App store optimization (ASO) is a key component of any app growth strategy, as it determines whether users can easily find your app in the Apple App Store or Google Play Store. 
  • Remove barriers to entry. If it’s too onerous to sign up, sign in, click through or scroll around, people won’t use your app. Use deep links to make the transition from other marketing channels like email, SMS, or search engine results pages (SERPS) seamless and convenient for users. 

Key takeaways

  • DAU is just one metric to gauge interaction with your app. Evaluating it over the long term can help you determine the success of campaigns and customer experience.
  • DAU is best used as an input for more indicative KPIs like lifetime value, churn rate, and retention rates.

The post Daily Active Users (DAU) appeared first on Branch.

]]>
In-app Purchase https://www.branch.io/glossary/in-app-purchase/ Mon, 23 Oct 2023 14:00:46 +0000 https://branch2022stg.wpengine.com/?post_type=glossary&p=17508 What is an in-app purchase? An in-app purchase (IAP) is a product, feature, functionality, content, or subscription that a user can buy within a mobile app. Users make in-app purchases via the app store, a debit or credit card, or through a third-party provider like PayPal or Stripe. Available through Apple App Store for iOS... Read more »

The post In-app Purchase appeared first on Branch.

]]>
What is an in-app purchase?

An in-app purchase (IAP) is a product, feature, functionality, content, or subscription that a user can buy within a mobile app. Users make in-app purchases via the app store, a debit or credit card, or through a third-party provider like PayPal or Stripe. Available through Apple App Store for iOS and Google Play Store for Android devices, in-app purchases generate revenue and boost user engagement, conversions, lifetime value, and retention rates

In-app purchases vs. other mobile app monetization

Most apps are created with the intention to monetize their use. In fact, consumer mobile app spending is on the rise, reaching $33.8 billion during the second quarter of 2023.

There are a few ways developers can encourage mobile app spending. A prime example is charging for app downloads. However, this creates a barrier to entry before a customer ever interacts with your app. This is why almost 97% of Android apps in the Google Play store are free to download. Additionally, you can display ads within the app. Unfortunately, in-app advertising is expensive and is often ignored by users. 

Due to the drawbacks and challenges of charging for app downloads and in-app advertising,  many app developers choose to offer in-app purchases, which are more enjoyable and less intrusive than ads and tend to boost user engagement. 

Types of in-app purchases

There are four types of in-app purchases:

  1. Auto-renewal subscriptions: Products or services, like streaming services, that app users purchase on a recurring basis. Example: Spotify
  2. Non-renewable subscriptions: Products or services purchased for a period of time. Example: Magazine subscriptions
  3. Consumables: One-time-use products (like extra lives in a game) that can be used up and then repurchased. Example: In-game currency
  4. Non-consumables: Products like ebooks or advanced features that can be purchased once and reused indefinitely. Example: Advanced editing tools in a photo app

Pros and cons of in-app purchases

As with any monetization method for apps, in-app purchases have their pros and cons. 

Pros

  • Revenue generation: Because most apps are free to download, in-app purchases give developers a way to generate revenue without charging for the initial app download.
  • Increased engagement: If someone invests money in the app, they’re more likely to continue using and exploring it.
  • Understand user behavior: Tracking in-app purchases makes for valuable data about user behavior. This data provides insights to help you make your app more relevant and appealing.
  • Cross-sell opportunities: If you offer multiple products or services within your app, you can use in-app purchasing as a way to cross-promote.

Cons

  • Poor user experience: Overzealous developers may include too many in-app purchase opportunities that lead to a poor user experience. When users feel bombarded by purchase prompts, they disengage.
  • Development and monetization challenges: In-app purchases make developing, implementing, and managing an app more complex and costly. Not all apps are suitable for in-app purchases.
  • Competition: With millions of apps available on users’ mobile devices, your pricing and features must be competitive to attract customers.
  • Regulations: Depending on the country and region, there may be specific restrictions on in-app purchase offerings.
  • Fraud: Fraudsters often take advantage of digital platforms like apps, using fake credit information to make purchases. Cost-per-action campaigns are particularly vulnerable to fraud.

Best practices

When done right, in-app purchases can drive significant revenue for mobile app businesses. Here are some things to keep in mind in order to experience the best chance at success:

  1. Transparent pricing: Clearly display the price of in-app purchases and indicate if any charges are billed on a recurring basis. 
  2. Valuable offerings: Your in-app purchase offerings should provide real value to users and be differentiated from your free app offerings. Make sure users know exactly what they’ll get if they make a purchase. 
  3. Seamless user experience: Reduce the likelihood of dropoff with smooth purchase experiences and convenient payment methods.
  4. Special offers and discounts: Incentivize users to convert with limited-time discounts on in-app purchases. Use in-app messaging and push notifications to make users aware of special deals. 
  5. Free trials: If applicable, let users try before they buy. Make sure you clearly communicate the trial terms — and if they’ll be automatically billed when the trial ends!

The post In-app Purchase appeared first on Branch.

]]>
Attribution Modeling https://www.branch.io/glossary/attribution-modeling/ Thu, 05 Oct 2023 13:06:12 +0000 https://branch2022stg.wpengine.com/?post_type=glossary&p=17306 What is attribution modeling? Attribution modeling is a mobile measurement framework used to determine which touchpoints, or marketing channels, receive credit for a conversion event. Understanding first-click, last-click, and multi-touch attribution models helps marketers better understand which channels create the most impressions and contribute most to customer conversions like mobile app installs, in-app purchases, etc.  ... Read more »

The post Attribution Modeling appeared first on Branch.

]]>
What is attribution modeling?

Attribution modeling is a mobile measurement framework used to determine which touchpoints, or marketing channels, receive credit for a conversion event. Understanding first-click, last-click, and multi-touch attribution models helps marketers better understand which channels create the most impressions and contribute most to customer conversions like mobile app installs, in-app purchases, etc.  

Attribution models enhance overall business performance and return on investment (ROI) in mobile marketing, SEO, PPC advertising, and social media marketing strategies. This framework involves a solid grasp of attribution windows, which help marketers define the period of time their conversion events can be attributed to each channel.

Marketing touchpoints in attribution models

Marketing touchpoints like websites, social media platforms, email marketing, or personal interactions each play specific roles in the customer’s journey and contribute to conversions. In the context of attribution models, touchpoints act as a roadmap, indicating how consumers move along the buyer journey. They provide valuable insight into what triggers a potential customer to move from the top of the sales funnel to the middle or bottom of the funnel. In the world of mobile apps, they also provide critical insight into which channels are most effective at converting customers into app users. 

Understanding this dynamic is essential for marketers looking to optimize their strategies and enhance conversion rates. By using different attribution models, marketers can enhance the efficiency of these touchpoints by identifying which interactions contribute the most to conversions and optimizing their marketing budgets accordingly.

The customer journey in attribution models

The customer journey includes multiple channels, touchpoints, and steps from brand awareness to purchase. Understanding the customer journey is crucial in attribution modeling as it helps identify the most influential touchpoints and assess their contribution to conversions.

Event-based attribution models are essential in understanding user interaction within a mobile app or website. They assign credit to specific user activities or “events” — viewing a product, adding it to the cart, or reading reviews — that lead toward a conversion. Analyzing these events provides insights into the customer’s decision-making process and identifies critical touchpoints leading to conversions.

Types of attribution models

There are various types of attribution models, each offering a unique perspective on marketing campaigns:

  • First-click attribution: assigns all credit for the conversion to the first touchpoint a customer interacts with. This model can help you understand the effectiveness of awareness campaigns.
  • Last-click attribution: allocates 100% credit to the last channel a customer interacts with before making a purchase or conversion. This approach favors channels at the later stages of the marketing funnel.
  • Linear attribution: gives equal credit to all touchpoints in the customer journey, offering a balanced view of all marketing efforts.
  • Algorithmic/probabilistic attribution: leverages machine learning and complex algorithms to assign credit to different touchpoints, providing precise insights based on actual impact and performance.
  • Position-based attribution: credits 40% to first and last interactions, with 20% split among others, which improves understanding of all interactions.
  • Multi-touch attribution: distributes conversion credits across multiple touchpoints on the customer journey, useful for understanding the complex interplay of various marketing channels.
  • Time-decay attribution: gives more credit to touchpoints nearer to conversion, ideal for short sales cycles.
  • Data-driven attribution: uses machine learning and algorithmic analysis to distribute credit, considering all possible marketing scenarios and interactions.
  • Shaped attribution: customizable based on the marketer’s discretion, allowing for nuanced assessment in complex customer journeys.

The post Attribution Modeling appeared first on Branch.

]]>
Click Spam https://www.branch.io/glossary/click-spam/ Thu, 05 Oct 2023 13:00:31 +0000 https://branch2022stg.wpengine.com/?post_type=glossary&p=17305 What is click spam? Click spam is a type of online advertising fraud that generates fake clicks to simulate engagement on ads. This deceptive practice is often achieved through SDK spoofing or click injection methods, where fraudsters manipulate the device ID of a legitimate user without their knowledge. The outcome leads to advertisers paying for... Read more »

The post Click Spam appeared first on Branch.

]]>
What is click spam?

Click spam is a type of online advertising fraud that generates fake clicks to simulate engagement on ads. This deceptive practice is often achieved through SDK spoofing or click injection methods, where fraudsters manipulate the device ID of a legitimate user without their knowledge. The outcome leads to advertisers paying for non-genuine ad engagement.

Impact on digital advertising and marketing

Click spam has far-reaching implications for the digital advertising and marketing landscape, including:

  • Inflated metrics and inaccurate analysis. Click spam distorts performance metrics, leading to skewed data analysis. Advertisers end up allocating resources toward fraudulent impressions and conversions, diminishing the effectiveness of their ad campaigns.
  • Increased ad spend. Many brands use pay-per-click (PPC) cost models to pay for advertising, meaning they pay for each fraudulent click. This drives up costs and, when left unchecked, can drain marketing budgets. 
  • Unfair competition. Click spam undermines fair competition by giving an advantage to unethical advertisers. Legitimate businesses aiming to reach their target audience are penalized as fraudulent clicks skew the market.

How click spam works

Typically, real users engage with an ad by clicking on it, leading to legitimate interactions. Click spam, however, involves the simulation of these interactions through fraudulent means, often without users’ awareness or consent.

Click spammers employ techniques like SDK spoofing and click injection to manipulate unique device IDs, creating false engagements that appear genuine. For instance, a downloaded app may continue to run in the background without the user knowing, generating fake clicks on ads that the user never saw. This fraudulent activity not only depletes advertising budgets but also distorts performance metrics, potentially leading to inefficient marketing decisions.

Click spam vs. click fraud vs. click injection

Click spam is a subset of click fraud — a type of mobile ad fraud that generates fake pay-per-click (PPC) ad clicks without genuine engagement or conversion potential. Click injection is another type of click fraud that specifically injects fraudulent click data into a campaign and creates the illusion of engagement. While all three practices involve fraudulent clicks, they vary in execution.

Technical aspects

Device IDs play a pivotal role in click spam. Every smartphone user possesses a unique ID used to track online behavior. Fraudsters exploit this by mimicking or “spoofing” these IDs, generating a high volume of invalid clicks. This manipulates engagement data, creating a false impression of genuine user interaction.

Fraudulent apps also contribute to click spam by simulating clicks on various in-app ads without the user’s knowledge or consent. When a user unknowingly downloads a fraudulent app, often disguised as a utility app — like a calculator or flash light — it continuously runs in the background on their mobile device, generating fake ad clicks. 

Another common click spam method is SDK spoofing, which involves infiltrating a mobile app’s Software Development Kit to insert malicious code that mimics genuine user behavior and results in fraudulent clicks.

Identify and prevent click spam

Identifying click spam can be challenging due to its sophisticated nature. Signs of fraudulent activities include sudden spikes in click-through rates, unusual conversion rates, or disproportionate engagement from specific regions or device types.

Prevention requires a combination of proactive strategies:

  • Sophisticated analytics: Utilize advanced analytics and tracking tools to detect anomalies in user engagement patterns.
  • Vet advertising partners: Thoroughly assess partners and ad networks for robust security measures.
  • Leverage search engines: Use search engines’ algorithms and machine learning capabilities to detect and block fraudulent clicks.
  • Diversify ad placements: Vary ad placements and target different devices to thwart repetition-based click spam.
  • Relevant ad copy: Ensure ad content aligns with the target audience to reduce the risk of attracting bot traffic.

The post Click Spam appeared first on Branch.

]]>