Ubiquitous and Mobile Computing CS 528: Information Leakage through Mobile Analytics Services
|
|
|
- Kelley Murphy
- 10 years ago
- Views:
Transcription
1 Ubiquitous and Mobile Computing CS 528: Information Leakage through Mobile Analytics Services Amit Srivastava Computer Science Dept. Worcester Polytechnic Institute (WPI)
2 This paper is about.. Analytics User profiles and Analytics Profile theft /misuse Experimental setup Results Conclusions
3 Did you ever wonder.. Why does Facebook have Insights? Why did Google buy Admob? Why did Yahoo buy Flurry? What is Adobe doing, hawking analytics tools?
4 Analytics, Advertising and Revenue Generate insights to drive performance improvements Increase conversion i.e. metrics to insights, insights to actions Notable players in the mobile analytics include Adobe, Apsalar, Flurry, Google, IBM, ForeSee, comscore, WebTrends* Collect usage data, user profile etc Advertisement the only successful revenue model for mobile outside e commerce *Source: Forrester Research, Inc
5 User Tracking and its Dangers Analytics vendors create user profile based on app usage This profile can be compromised, as shown by the paper Privacy issues seen in Flurry and Google AdMob Compromise user identity targeted attack
6 Spoofing Capturing the device id 1. Capture usage reports from analytics vendor message over the network and extract device id 2. Or install an app for just this purpose (REALLY?) Google hashes the device id but other third party vendors may not do this Device id access does not require user permission in an app
7 User Profile Extraction Adversary spoofs a target device* (capture device id) Uses an emulator or another device along with it Install apps and change usage behaviour Manipulates usage statistics Retrieve profile based on Android Id Google AdMob Install a new app that uses flurry and access user profile through it
8 Spoofing and Device ID
9 Experimental Validation 44 participants in 4 countries A custom app developed to fetch App id 80% users did not have Google profile 84% had Flurry profile Possibly Flurry is more widely used in apps or maybe user had more furry based apps
10 Ad response to hacked Profiles Based o App usage the analytics services create or update profile Verify an attack by showing high degree of certain kind of apps Or change usage to effect profile and hence the ads Flurry updated the profile in a wekkly manner Google updates frequently, in 6 hrs approx. Flurry hides ad traffic (why?) Google does not
11 Ad response to hacked Profiles Categories: Games (GA), Business(BU), Books(BO), Media(ME), Productivity (PR), Social (SO) A and B are unique set of ads Google has less unique ads but Compare similarity of ads shown in different categories using Jaccard index
12 Ad response to hacked Profiles 6 app categories games, business, books, media social and productivity Train 2 profiles in each category, by 24 hour usage Collect ads from all devices Try Game profile to Business profile shift
13 What is Jaccard Index The Jaccard index, also known as the Jaccard similarity coefficient (originally coined coefficient de communauté by Paul Jaccard), is a statistic used for comparing the similarity and diversity of sample sets. T The Jaccard coefficient measures similarity between finite sample sets, and is defined as the size of the intersection divided by the size of the union of the sample sets: 0 <= J(A,B)<=1
14 Potential Countermeasures MockDroid an android sandbox platform to test app behavior Pdroid allows fine grained control over your private data usage by user/system apps Android and ios should deprecate device id
15 Conclusion Ads are good for developers but bad (potentially) for you, data leakage exists It will take a lot of effort to impact too many people for targeted attack
16 References
Brochure More information from http://www.researchandmarkets.com/reports/3445946/
Brochure More information from http://www.researchandmarkets.com/reports/3445946/ Mobile Analytics Market by Type (Mobile Advertising and Marketing Analytics, In-app Behavioral Analytics, Application Performance
Android Security Extensions
Android Security Extensions Android Security Model Main objective is simplicity Users should not be bothered Does the user care? Most do not care until its too late But We do It needs a more advanced security
Mobile Ad Tracking Impacts. App Marketing Results. How. Comparisons, advantages and limitations of today s ad tracking technologies
How Mobile Ad Tracking Impacts App Marketing Results Comparisons, advantages and limitations of today s ad tracking technologies Advertising Identifier Facebook ID Android Referrer Digital Fingerprinting
MOBILE MARKETING. A guide to how you can market your business to mobile phone users. 2 April 2012 Version 1.0
MOBILE MARKETING A guide to how you can market your business to mobile phone users 2 April 2012 Version 1.0 Contents Contents 2 Introduction 3 Skill Level 3 Terminology 3 Video Tutorials 4 What is Mobile
Search Engine Marketing(SEM)
Search Engine Marketing(SEM) Module 1 Website Analysis Competition Analysis About Internet Marketing Scope & Career Opportunities Basics Of HTML & Website Development Platforms Module 2. Search Engine
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
HOW TO: Privacy Aware Mobile Application Development
HOW TO: Privacy-Aware Mobile Application Development Research Performed For: Privacy Rights Clearinghouse https://privacyrights.org Technical Research, Analysis, and Documentation By: Craig Michael Lie
Publishing, Analytics and Ads
Publishing, Analytics and Ads CE881: Mobile and Social Application Programming Simon Lucas & Spyros Samothrakis March 17, 2015 1 / 33 1 2 2 / 33 Publishing on Google Play Need a developer account Easy
BYOD AND NEXT- GENERATION MOBILE SECURITY
BYOD AND NEXT- GENERATION MOBILE SECURITY Joseph Gan V-Key Inc Session ID: MBS-W02 Session Classification: General Interest Next-Generation Computing Mobile enterprise apps Mobile payments Mobile authentication
2014 Consumer Insights Report for REALTORS
2014 Consumer Insights Report for REALTORS Canada s Leading Real Estate Website REALTOR.ca and associated apps are Canada s leading source for real estate listings from REALTORS with more than 256 million
Professional Diploma in Digital Marketing
Professional Diploma in Digital Marketing Agenda Day 1: Day 2: Day 3: Day 4: Day 5: to Digital Marketing Search Engine Optimisation Search Engine Marketing Email Marketing Digital Display Advertising Mobile
Special Report: Trends in Mobile Payment April 2015
Special Report: Trends in Mobile Payment April 2015 Contents Executive Summary Consumers Adopting Mobile Mobile Payment Methods Leveraging Mobile Payments Enabling Your Business 2 Confidential & Proprietary
IBM API Management Overview. 2014 IBM Corporation
IBM API Management Overview Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential
FOKUS Media Web Symposium :: Berlin :: Nov 4th, 2010. Distilling market noise into market sense. Market maps
09.11.2010 knowledge. passion. innovation VisionMobile Application Analytics Who turned the lights on? George Voulgaris Operations Director Distilling market noise into market sense Analysis + Mapping
Universal Mobile Ads is a plugin for Unreal Engine 4 that enables the MoPub ad mediation system for ios & Android.
Contents 1. License... 3 2. Introduction... 3 3. Supported Ad Formats... 5 a. Banner... 5 b. Interstitial... 5 c. Rewarded Video... 6 4. Supported Ad Networks... 7 5. Getting started... 8 6. Configure
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Best Practices and Tools for the Mobile App Analytics
Best Practices and Tools for the Mobile App Analytics A white paper on Fundamentals and Implementations of Analytics for your Mobile Application Mobile App Analytics Accelerate your Mobile App Monetization
How we keep harmful apps out of Google Play and keep your Android device safe
How we keep harmful apps out of Google Play and keep your Android device safe February 2016 Bad apps create bad experiences, so we work hard to keep them off your device and out of Google Play. In 2015,
Mobile Advertising 2012. Duncan Fisher
Mobile Advertising 2012 Duncan Fisher Importance of mobile Rising volumes, expected to surpass desktop by end 2013 Multi-device path to conversion miss mobile out and you could be missing the penultimate
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
ios Security The Never-Ending Story of Malicious Profiles Adi Sharabani Yair Amit CEO & Co-Founder Skycure CTO & Co-Founder Skycure @AdiSharabani
ios Security The Never-Ending Story of Malicious Profiles SESSION ID: BR-R02 Adi Sharabani CEO & Co-Founder Skycure @AdiSharabani Yair Amit CTO & Co-Founder Skycure @YairAmit About the Presenters Yair
Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus
Mobile Application Hacking for ios 3-Day Hands-On Course Syllabus Course description ios Mobile Application Hacking 3-Day Hands-On Course This course will focus on the techniques and tools for testing
ULTIMATE CHEAT SHEET:
ULTIMATE CHEAT SHEET: DIGITAL MARKETING TERMS FOR NOOBS f rewards TAKING ON ANY NEW CHALLENGE AND DIPPING YOUR TOES INTO A NEW ARENA IS ALWAYS INTIMIDATING. It s made even more so if that new arena is
ITP 140 Mobile Technologies. Mobile Topics
ITP 140 Mobile Technologies Mobile Topics Topics Analytics APIs RESTful Facebook Twitter Google Cloud Web Hosting 2 Reach We need users! The number of users who try our apps Retention The number of users
Introduction to Marketing
Introduction to Marketing Theocharis Katranis Spring Semester 2013 1 Today s Lecture 1. We will explain the importance of information in gaining insights about the marketplace and customers. 2. We will
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
Affiliate Marketing for Mobile Apps. Peter Hamilton Partner / CMO Email: [email protected] Twitter: @PeterHamilton #AMDays
Affiliate Marketing for Mobile Apps Peter Hamilton Partner / CMO Email: [email protected] Twitter: @PeterHamilton #AMDays BOOM!!! Mobile Devices: More Mobile Phones than Humans on Earth More Smart Phones
ASHVINS Group. Mobile Application Testing Summary
ASHVINS Group Mobile Application Testing Summary Mobile Application Testing Challenges Unique challenges with mobile applications; device compatibility, OS compatibility, UI compatibility, browser compatibility
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
understanding media metrics WEB METRICS Basics for Journalists FIRST IN A SERIES
understanding media metrics WEB METRICS Basics for Journalists FIRST IN A SERIES Contents p 1 p 3 p 3 Introduction Basic Questions about Your Website Getting Started: Overall, how is our website doing?
DIGITAL MARKETING DIGITAL MARKETING. Internet Marketing: Website, SEO, social media Mobile Marketing: Mobile web, mobile apps MESSAGE TO THE MASS!!
DIGITAL MARKETING MESSAGE TO THE MASS!! By: Don Phravorachith Date: February 21, 2013 DIGITAL MARKETING Internet Marketing: Website, SEO, social media Mobile Marketing: Mobile web, mobile apps 1 PROS &
Should you allow your employees to bring their own technology to work?
Should you allow your employees to bring their own technology to work? August 2014 Should you allow your employees to bring their own technology to work? Known by a number of terms such as Bring Your Own
CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals
CHECK POINT Mobile Security Revolutionized [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 1 Rapidly Expanding Mobile Threats MOBILE THREATS are ESCALATING
2014-2015 EDITION MOBILE MATTERS: THE IMPACT OF MOBILE FRONTSTREAM NONPROFIT TECHNOLOGY ON PEER- DRIVEN FUNDRAISING CAMPAIGNS FRONTSTREAM.
2014-2015 EDITION FRONTSTREAM NONPROFIT MOBILE MATTERS: THE IMPACT OF MOBILE TECHNOLOGY ON PEER- DRIVEN FUNDRAISING CAMPAIGNS FRONTSTREAM.COM FUNDRAISING ON FACEBOOK FUNDRAISING ON FACEBOOK Page 2 MOBILE
We are a DIGITAL EXPERIENCE AGENCY
We are a DIGITAL EXPERIENCE AGENCY WHO WE ARE DICE LONDON IS A DIGITAL EXPERIENCE AGENCY We work with businesses in all sectors but with a particular speciality in the real money gaming industry. We offer
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
The Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015
The Impact of Computer Engineering 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 The Impact of Computer Engineering 2 Introduction My research project included: Talking
EC Council Certified Ethical Hacker V8
Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction
Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we
Why Google Analytics Doesn t Work for E-Commerce
Why Google Analytics Doesn t Work for E-Commerce Why Google Analytics Doesn t Work for E-Commerce Customers they are the core of e-commerce. Because their buying behaviour has become so complex, businesses
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
Security Analytics The Beginning of the End(Point)
Security Analytics The Beginning of the End(Point) Arie Joosse [email protected] It s 10am, what do you know about your endpoints? What applications are running? New ones that you didn t deploy
Online Marketing Module COMP. Certified Online Marketing Professional. v2.0
= Online Marketing Module COMP Certified Online Marketing Professional v2.0 Part 1 - Introduction to Online Marketing - Basic Description of SEO, SMM, PPC & Email Marketing - Search Engine Basics o Major
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK
APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK John T Lounsbury Vice President Professional Services, Asia Pacific INTEGRALIS Session ID: MBS-W01 Session Classification: Advanced
What is online? Offline?
Splinternet What is online? Offline? Web Windows Mobile Game Consoles Digital Asset FiOS TV Widgets Facebook Apps iphone Apps Android Apps One person? Multiple channels? Windows Mobile Web Game Consoles
Social Intelligence Report Adobe Digital Index Q2 2015
Social Intelligence Report Adobe Digital Index Q2 2015 Key Insights Paid Social Cost per click (CPC) rates for Facebook are flat YoY while impressions fell by half and click through rates doubled 51% of
Mobile App Install Ads
Mobile App Install Ads Product Setup Guide What is launching? Mobile app install ads help developers and advertisers easily drive and measure installs (CPI) for their mobile apps and games. This is the
Gigya Pricing Proposal
Gigya Pricing Proposal Gigya provides websites and apps with a complete social infrastructure that creates immersive social experiences for users, and provides unparalleled customer insights for businesses.
Mobile Experience Benchmark. Crittercism
Crittercism 2 Key Takeaways Mobile App Complexity App Responsiveness App Uptime (Crash) Mobile app performance is challenging with over 100M permutations of variables to manage. To be competitive, your
Social Media Single Sign-On: Could You Be Sharing More than Your Password?
Social Media Single Sign-On: Could You Be Sharing More than Your Password? SESSION ID: HUM-W03B 2/26/14 (Wednesday) 11:20 AM - West 3005 Tom R. Smith VP, Business Dev & Strategy, CloudEntr www.cloudentr.com
Jordan Jozwiak November 13, 2011
Jordan Jozwiak November 13, 2011 Agenda Why Android? Application framework Getting started UI and widgets Application distribution External libraries Demo Why Android? Why Android? Open source That means
Job Description: Digital Marketing Assistant
Job Description: Digital Marketing Assistant We are looking for a Digital Marketing Assistant for a maternity cover contract to support our Marketing department. You ll be instrumental in delivering targeted
FitCause Privacy Policy
FitCause Privacy Policy EFFECTIVE DATE: June 19, 2013 FuelGooder Inc. d/b/a FitCause ( FitCause ) values your privacy. FitCause is a social fundraising platform empowering individuals to turn their exercising
APPS APPS MEDIA MEDIA SOCIAL SOCIAL ENGINE ENGINE SEARCH SEARCH MARKETING MARKETING WEB DESIGN ADVERTISING WEB DESIGN & REPORTING & REPORTING
WEB DESIGN & DEVELOPMENT SEARCH OPTIMIZATION PAY-PER-CLICK ADVERTISING SOCIAL MEDIA APPS CALL LISTENING & REPORTING WEB DESIGN & DEVELOPMENT SEARCH OPTIMIZATION PAY-PER-CLICK INTERNET LEAD GENERATION APPS
SEEM3490 Information Systems Management Lecture 01 Introduction to ISM
SEEM3490 Information Systems Management Lecture 01 Introduction to ISM Terminologies! Two very similar terms:! Information Systems Management (ISM)! Management Information Systems (MIS)! Are there any
1. License. Copyright 2016 gamedna studio. All rights reserved.
Contents 1. License... 3 2. Introduction... 4 3. Getting started... 5 4. Recording events in Blueprints... 6 5. Supported Analytics Provider Nodes... 8 6. Recording events in C++... 9 1. License Copyright
Data Driven Assessment of Cyber Risk:
Data Driven Assessment of Cyber Risk: Challenges in Assessing and Mitigating Cyber Risk Mustaque Ahamad, Saby Mitra and Paul Royal Georgia Tech InformationSecurity Center Georgia Tech Research Institute
ECM 210 - Chapter 4 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps
ECM 210 - Chapter 4 Building an E-commerce Presence: Web Sites, Mobile Sites, and Apps Imagine Your E-commerce Presence What s the idea? Vision Mission statement Target audience Intended market space Strategic
Inbound Marketing ebook for Managed Service Providers
Inbound Marketing ebook for Managed Service Providers Guide to Leverage Inbound Marketing to Generate Leads and Grow Your Revenue! Published by: Inbound Marketing ebook for Managed Service Providers Author:
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY
Look in the top right of the screen and located the "Create an Account" button.
Create an Account Creating a Google Analytics account is a simple but important step in the process of creating your stores. To start the process visit the Google Analytics homepage: http://www.google.com/analytics/
ipad, a revolutionary device - Apple
Flash vs HTML5 ipad, a revolutionary device Apple Lightweight and portable Sufficient battery life Completely Wireless Convenient multitouch interface Huge number of apps (some of them are useful) No Flash
Five Questions to Ask Your Mobile Ad Platform Provider. Whitepaper
June 2014 Whitepaper Five Questions to Ask Your Mobile Ad Platform Provider Use this easy, fool-proof method to evaluate whether your mobile ad platform provider s targeting and measurement are capable
Creative Dynamic Marketing
Creative Dynamic Marketing ROI MAKES A BUSINESS SUCCESSFUL. THE CHOICE OF BUSINESS IS UP TO YOU. We help businesses succed via dynamic Internet marketing strategies. Launching a website is just the beginning
Getting Started with Flurry Analytics
Getting Started with Flurry Analytics Bhanu Birani Chapter No. 1 "Getting Ready with Flurry" In this package, you will find: A Biography of the author of the book A preview chapter from the book, Chapter
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
TACKYDROID. Pentesting Android Applications in Style
TACKYDROID Pentesting Android Applications in Style THIS TALK IS ABOUT AN APP WE ARE MAKING This talk IS NOT about Android platform itself This talk IS about how we want to contribute auditing apps that
G DATA MOBILE MALWARE REPORT
G DATA MOBILE MALWARE REPORT THREAT REPORT: Q2/2015 1 CONTENTS At a glance 03-03 Forecasts and trends 03-03 Current situation: 6,100 new Android malware instances every day 04-04 Monitoring apps on mobile
GOOGLE MOBILE ANALYTICS INTEGRATION. JANUARY 2013 (App version 3.0.8 onwards)
GOOGLE MOBILE ANALYTICS INTEGRATION JANUARY 2013 (App version 3.0.8 onwards) What is Google Mobile Analytics? Google Mobile Analytics is a service to show how users interact with their websites and mobile
2016 Mobile Social Ticketing Survey. Conducted by:
2016 Mobile Social Ticketing Survey Conducted by: other Introduction As we enter 2016 there are several questions hanging above the future of the live entertainment ticketing industry. What are today's
SkyGlue Technology Inc., all rights reserved SkyGlue User Manual SkyGlue Technology Inc.
SkyGlue Technology Inc., all rights reserved SkyGlue User Manual SkyGlue Technology Inc. 1 Contents 2 What is SkyGlue?... 3 3 Why SkyGlue?... 3 4 Event Tracking Basics... 4 4.1 Google Event Tracking Overview...
Social Advertising Best Practice Guidelines
2013 Social Advertising Best Practice Guidelines April 2013 2013 interactive advertising bureau australia www.iabaustralia.com.au Table of Contents Introduction 3 Purpose 4 POE Media Framework 5 Examples
Digitization of Enterprise - New Style of IT
Digitization of Enterprise - New Style of IT Neeraj Tolmare Oct 2014 What happens in an Internet Minute? 20 identity thefts 20 million photo views 1.3 million video views 6 million Facebook views 100,000
Enterprise Analytics. (Also known as Pyramid Analytics or BI Office) Mobile Device Support
Enterprise Analytics (Also known as Pyramid Analytics or BI Office) Mobile Device Support Mobile Device Support Overview Enterprise Analytics provides mobile support for ios, Android and Windows Phone.
Mobile Application Marketplace 2015: Market Analysis and Assessment of Future Evolution and Opportunities
Brochure More information from http://www.researchandmarkets.com/reports/3245389/ Mobile Application Marketplace 2015: Market Analysis and Assessment of Future Evolution and Opportunities Description:
Google Analytics Audit. Prepared For: Xxxxx
Google Analytics Audit Prepared For: Xxxxx Please Note: We have edited all images and some text to protect the privacy of our client. 1. General Setup 3 1.1 current analytics tracking code 3 1.2 test purchase
Testing & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
Optimizing for Success
Optimizing for Success Successful apps use data to optimize on their designs after launch. In this chapter, we explore how to optimize your app to reach your goals. Now that you ve built and launched your
