Academia.eduAcademia.edu

A System for Mobile and Wireless Advertising

2005, IFIP — The International Federation for Information Processing

Mobile terminals are an interesting medium for advertising because of the high penetration rates and their character as personal communication devices. Since advertising in general has the reputation of being something annoying there has to be some kind of incentive mechanism to obtain permission from the consumers for advertising on their mobile terminals. The MoMa-system for mobile and wireless advertising described in the following article focuses on personalized information as such an incentive mechanism. For the provision of personalized information a system requires personal data like profile information and the current location of an user. But there are privacy concems when providing such information for a mobile advertising application, of course. Thus we designed MoMa in a way to realize both of this conflicting requirement: personalized information and guaranteeing data protection.

A SYSTEM FOR MOBILE AND WIRELESS ADVERTISING Personalized information as incentive for receiving advertisement on mobile terminals Michael Decker^ Kolmel^ Rebecca Bulander^ Gunther Schiefer^ and Bemhard ^Institute AIFB, University of Karlsruhe (TH), 76128 Karlsruhe, ^CAS Software AG, Wilhelm-Schickard-Str. 10-12, 76131 Karlsruhe, Germany Germany; Abstract: Mobile terminals are an interesting medium for advertising because of the high penetration rates and their character as personal communication devices. Since advertising in general has the reputation of being something annoying there has to be some kind of incentive mechanism to obtain permission from the consumers for advertising on their mobile terminals. The MoMa-system for mobile and wireless advertising described in the following article focuses on personalized information as such an incentive mechanism. For the provision of personalized information a system requires personal data like profile information and the current location of an user. But there are privacy concems when providing such information for a mobile advertising application, of course. Thus we designed MoMa in a way to realize both of this conflicting requirement: personalized information and guaranteeing data protection. Keywords: Mobile and wireless advertising, context sensitive mobile applications, data protection 1. INTRODUCTION Advertising is defined as making a representation in any form in connection with trade, business, craft or profession in order to promote the supply of goods or services, including immovable property, rights and obligations (directive 84/450 of the European Economic Community). Kotler and Bliemel's (1992) definition of advertising comprehends a paid and non- 288 M Decker, R. Bulander, G. Schiefer andB. Kolmel personal representation. Based on these definitions mobile or wireless advertising is advertising using mobile terminals as medium. While some authors consider on-board vehicle computers or notebooks as mobile terminals, we restrict ourselves to mobile handheld devices like cellular phones, PDAs and smartphones. Notebooks and on-board computers don't have the ubiquitous character of handheld devices: one doesn't carry his notebook with him all day, and even if one does, it won't be turned on all the time (Turowski and Pousttchi, 2004). Mobile advertising can be seen as advancement of digital- or internetadvertising, since both have special features in common which are valuable for advertising purposes; but the ubiquitous character of mobile terminals even increases the potential of these features. Although the term "mobile advertising" (e.g. Barwise and Strong, 2002) as well as "wireless advertising" (e.g. Yunos et al, 2003; Wohlfahrt, 2001; or the Wireless Advertising Association) can be found in literature, strictly speaking one should use the term "mobile and wireless advertising" (figure 1), since "mobile" and "wireless" are orthogonal concepts (Wang, 2003): if a device is mobile (one can easily move it) or not doesn't imply if its data connection is wireless or wired. An ordinary desktop PC (not mobile) might be connected to the internet via Ethernet (wired) or using wireless technologies like WiFi or WiMAX because someone doesn't want to lay cables in the whole house respective there is no cable for broadband internet access available in his street. A notebook or a simple PDA without WiFi or Bluetooth capabilities are examples for wired mobile devices. Services like the one by AvantGo (avantgo.com) show that these kinds of devices can also be used as medium for advertising: using AvantGo owners of PDAs can download web pages from the ordinary internet for offline reading and sync them to their devices; the pages are transcoded to be readable on small PDAs and adverts are added. For the sake of simplicity we will use the term "mobile advertising" when we actually mean "mobile and wireless advertising". The rest of this article is organized as follows: in the second chapter we discuss selected aspects of mobile advertising. Chapter number three describes the MoMa-system, which was developed during the project "MoMa — Mobile Marketing" funded by the Federal Ministry of Economics and Labour of Germany. The last chapter gives a summary. A System for Mobile and Wireless Advertising 289 Advertising digital conventional I I I non-mobile internet advertising e.g. press advertisement, TV commercials mobile | wired 1 wireless Figure 1. Different methods of advertising 2. MOBILE ADVERTISING 2.1 Potentials of Mobile Advertising Mobile terminals are an interesting target platform for advertising because of the high penetration rates: in many countries the penetration rate exceeds the 90 % mark, there are even countries like Sweden and Italy with mobile penetration rates over 100 % (Netsize, 2005). The global number of mobile subscriptions is expected to pass the number of two billions during 2005, and approaching 3 billions by the end of the decade (Informa Telecoms & Media, 2005). Also they are no longer considered as extraordinar>' gadgets but as commonplace household commodities. People carry their mobile device with them most of the day, seldom lem! it away and don't share it with other people (which is quite common for other communication devices, e.g. one telephone or TV set for the whole family), so using mobile technologies advertisers can reach people almost anytime and anywhere. During the pretest for an acceptance study for a mobile service we asked the participants (N=28) how many hours a day on average they are reachable via their cellular phone, and the mean value of the answers was ^ 20.7 h/day (deviation ~ 5.1), whereas ~ 56% stated "24 h". Using conventional advertising methods a marketer can reach his audience only in certain situations and moments, e.g. after work in front of the TV set when using commercials. Mobile advertising can be seen as advancement of internet advertising, whereas the market volume in 2004 for the latter is estimated to be as high as 9.6 billion US $ alone for the US-market (lAB, 2005). Both share the 290 M. Decker, R. Bulander, G. Schiefer andB. Kolmel following features, but the ubiquitous and personal character of mobile devices even increases the advertising potentials provided by these features: • Individually addressable: Mobile terminals can be addressed individually (using the mobile phone number), so personalized and target-oriented advertising can be realized. This is also the case for internet advertising (using the e-Mail- or IP-address). Using conventional advertising methods the advertiser has to broadcast his message to an anonymous crowd of people (e.g. audience of a TV commercial or readership of a newspaper or magazine) so many people are reached that are not in the intended target audience. Advertising messages on mobile terminals are hard to ignore when using push-mode communication (e.g. SMS/MMS or text-to-speech). • Interactive: Internet and mobile advertising can be interactive. One can request further information, participate in a sweepstake or forward the message to friends without changing the medium (e.g. when sent as email or SMS). Especially "forward a message to friends" is an interesting opportunity from a marketing point of view; there are even campaigns with the aim to stimulate a "viral"- or "word-of-mouth"-effect (e.g. "Wella Virtual Kiss", Mohr et al, 2003): an advertisement message is passed to a consumer by another consumer, not by the advertiser directly (Helm, 2000). Viral marketing is supposed to provide a dissemination of adverts with exponential growth and it is assumed that consumers have more confidence in advertisement messages received from friends rather than firms; there are special systems for mobile advertising following the idea of "viral marketing" (Straub and Heinemann, 2004; Ratsimor et al., 2003) using multihop ad hoc networks without infrastructure (so called MANETs, see Toh (2002)). Also the response rates reported for mobile advertising are very promising (Kavassalis et al., 2002; Schwarz, 2001). many users respond within a few minutes after they received an advert (Barwise and Strong, 2002). • Multimedia capabilities: internet advertising may make use of multimedia content like pictures, jingles, sounds, animated graphics and movie sequences. This is very important for advertising since many marketers use such elements to create brand awareness. Many mobile terminals used today already can display multimedia content. A special feature of mobile services is context awareness: Context sensitive applications use information about the situation of an user to adapt themselves according to his needs in that situation (Schilit et al., 1994; Chen and Kotz, 2000). The most prominent example for context information concerning mobile applications is "location". Technically the information about the current location of an end user respective his mobile device can be A System for Mobile and Wireless Advertising 291 retrieved using a receiver for the signal of the global positioning system (GPS), referring to the location of the nearest base station (cell-of-origin) or combining both methods to obtain "assisted GPS". The "time difference of arrivaP'-method (TDOA) calculates the current position referring to the observed time difference of arrival of radio signals from several base stations (Zeimpekis et al., 2003). Applying the idea of location based services (LBS) to advertising one could provide an user with advertisement concerning facilities not far away from his current location (Aalto et al., 2004; Kolmel and Alexakis, 2002) or even suggest a route to get there (Ververidis and Polyzos, 2002). But "location" is just one example for context information; there are many other examples like time or weather and MoMa is designed to handle all kinds of thinkable context parameters. The usage of context information is very important when designing a mobile application, because mobile terminals have a limited user interface (no real keyboard, small screen) and thus it is import to decrease the amount of information that has to be entered by the user to use a mobile service. The "honeymoon effect" — people are interested in new (technical) things — could also help to establish mobile advertising. 2.2 Challenges of Mobile Advertising In the last subchapter we discussed the potentials or advantages of mobile terminals as advertising platform. But there are also big challenges when talking about mobile advertising: Since mobile advertising can be seen as advancement of internet advertising there is the concern that the huge wave of Spam messages known from e-mail-communication spills over to mobile devices. Spam is defined as an unsolicited electronic bulk message with commercial intent (OECD, 2004). There are studies that state values of more than 70 % for the portion of spam message in e-mail-communication, for example MessageLabs (2004). Another study by bmd wireless and the University of St. Gallen (2005) found out that 80 % of the people questioned already received Spam messages on their cellular phones. Besides spam messages there are other kinds of unsolicited messages: messages which pretend to be personal messages and ask the user to call back to a certain number (which is in fact premium rate number), contain a virus or which change the configuration of the handset. Unsolicited messages for mobile terminals are an even bigger problem than for desktop PCs because of the limited resources and the personal or even intimate nature of mobile devices; most mobile devices haven't enough memory to store a lot of unsolicited messages or don't have the computation power necessary for running a spam filter. As our mentioned pretest-study 292 M Decker, R. Bulander, G. Schiefer andB. Kolmel implies there are a lot of people who never turn of their cellular phone, so an unsolicited message could even disturb their sleep. There are also some special challenges for mobile advertising due to the nature of mobile terminals: • Limited user interface: Due to their limited size and weight mobile terminals have a limited user interface: they have a small display with a low resolution and color depth and don't have a full keyboard, so users don't want to enter a lot of data and advertising messages have to be designed in a way to be displayable in a reasonable way on mobile terminals. We consider context information as discussed above as a way to relieve the user of entering more data than necessary. • Limited resources: mobile terminals don't have big resources with regard to bandwidth, calculation power, memory and — probably the worst problem — battery power. • Expenses of mobile data communication: mobile data communication is still very expensive, e.g. about one Euro for 1 Mbyte data traffic (cleared in blocks of 10 or even 100 KByte) when using GPRS or UMTS (prepaid rates are even much more expensive), so many people don't use mobile devices for research on product and services. Also nobody wants to pay for the reception of advertisement. • Privacy concerns: People store sensitive data on their mobile devices (e.g. address book, calendar, personal notes) and it is possible to track their location (see the discussion for location based services in section 2.1), so it's no wonder that there are privacy concerns, e.g. Barkhuss and Dey (2003). There are also laws which ask for data protection, e.g. directive 95/46/EC of the European Economic Community. ^> Different types of mobile terminals: There is a plethora of different types of mobile terminals on the market, all with different capabilities with regard to color or monochrome display, display size and resolution, devices for data input; see the WURFL (2005) project, which maintains an open database with specifications of many different mobile devices. An advert that looks great on one type of device may look terrible on another one (if presentable at all). When developing a mobile application there are high costs caused for testing and porting the application to different types of terminals; these costs often exceed the costs for the actual implementation (Schlickum, 2005). A System for Mobile and Wireless Advertising 3. THE MOMA SYSTEM 3.1 Basic Principle 293 A fundamental concept in mobile advertising due to the experience with unsolicited direct advertising — in particular spam-e-Mail and telephone calls ("cold calls") — is permission marketing (Godin, 1999; Krishnamurthy, 2001): consumers will only receive ads after they have explicitly expressed their allowance; they can opt-out anytime if they no longer want to receive advertisement, of course. In many countries permission marketing is the only legal way of direct advertising (e.g. article 13 of the directive 2002/57/EC of the European Union). Permission marketing also asks for personalized ads which fit the fields of interest (profile) of the consumer. There is one hitch with the concept of permission marketing: a consumer has to know about a brand or firm to give explicitly allowance for receiving their adverts. So firms have to employ conventional methods of advertising (e.g. TV commercials) to "invite" consumers for participation in a mobile advertising campaign (Kavassalis et al., 2003). For this reason mobile advertising is often integrated in bigger campaigns, see Bauer et al. (2005) for examples. However, small enterprises don't have the resources to do this. To realize permission based mobile advertising also affordable for small enterprises we designed MoMa as mediator between advertisers and end users (see figure 2): on the right side of the system advertisers put "offers" into the system. These offers are formulated according to a "catalogue" which is a tree of product and services categories. Each category is specified by certain attributes and inherits attributes of its parent. For example "gastronomy" with the attribute "price level" has "pubs", "restaurants" and "catering services" as child categories. On the left side of the system the end users submit "orders" to MoMa using a special client application on his mobile device; there are client applications for different types of mobile programming platforms (J2ME, Symbian). These orders are also formulated according to the catalogue and may include profile and private context information. The matching-component of MoMa tries to find fitting orders and offers; for this process public context information may be requested from special context providers. If matches are found the end users of the order is notified (but not the advertisers!). These notifications are delivered using the channel defined in the end user's notification profile; such a notification profile describes how (SMS, MMS, e-mail, text-to-speech) and to which end address he wants to be notified. Different channels and end addresses can be M Decker, R. Bulander, G. Schiefer andB. Kolmel 294 used depending on the time, e.g. e-Mail during bedtime, SMS to phone number A from 8 to 9 a.m and to phone number B from 3 to 4 p.m. private context information Anonymizer (trustworthy party) public context information t t t t t End users t Order 1 - Offer 1 Order 2 - Offer 2 MoMa Order n Advertisers - Offer m Matches Chosen kind of notification (SMS/MMS, e-Mail, text-to-speech, ...) Figure 2. Basic principle of the MoMa-system 3.2 System Details Each end user (consumer) of the MoMa-systems (see figure 3) needs an account with an unique user-ID and at least one general and one notification profile. In the general profile information about the user (age, marital status, ...) and his fields of interests are stored. A notification profile holds at least one end address of an user (e-mail-address, mobile phone number, ...); in the case of multiple end addresses the user can specify, what end address at what time interval has to be used for notification. Both profiles can be stored oi. a server and can be synchronized with different tenninals an user m.ay own. When creating an order X the user has to choose a category from the catalogue and to fill in the needed attributes. If possible values for attributes will be looked up in the general profile (e.g. number of children when looking for hotel accommodation) or the available private context parameters (e.g. location). Please note: the order X does not contain information about the identity or the end addresses of an user. The completed order X together with the user-ID (UID) and the number of the chosen notification profile (NID) are submitted to the anonymizer component of the trustworthy party. Appending a random bit string rand the anonymizer encrypts this and obtains a cipher text C=crypt(UID, NID, rand). The random data included ensures that even when using the same ID and notification profile number multiple times we obtain a different cipher text. The pair {X,C} is then forwarded to the core component of the MoMasystem, which cannot decrypt C. This C can be seen as transaction A System for Mobile and Wireless Advertising 295 pseudonym, a pseudonym that is only used for one transaction and thus represents the most secure level of pseudonymity (Pfitzmann and Kohntopp, 2000). Trustworthy party MoMa-Operator Public Contexts administrates statistics Core-System Weather, trafficsituation, time, ... -Advertiser Notification templates Request for notification template Publishing & Rendering Notification-fi4essage Figure 3. Architecture of the MoMa-system On the other side the advertiser defines his offer Y according to the catalogue and submits it to the core component directly. He also has to create templates for the notification of end users concerning his offer Y and deposit them on the publishing & rendering server. Within the core component of the MoMa system the matching server tries to find matching pairs of orders and offers. For each detected matching pair X and Y the core component sends {{X,G},Y} to the resolver component of the trustworthy party. C is decrypted to obtain the relevant notification profile (type of channel and corresponding end address). Afterwards the resolver requests the notification template from the publishing & rendering server, creates the notification message and dispatches it. The resolver component can add suitable labels to the notification messages to guarantee that they are always identifiable as advertising, which is important because of legal requirements. There are several cases when it is necessary to change an order X: the user alters attributes of the order, the user wants to suspend or delete an order, or private context parameters have changed. In this case the updated X along with C (which is the same as for the original order) is sent to the MoMa-core-component, which looks up the old order X by its C and replaces respective deletes it. 296 3.3 M Decker, R. Bulander, G. Schiefer andB. Kolmel Matching Component For the implementation of the matching server it turned out to be helpful to employ the paradigm of "software agents" (Genesereth, 1994). An agent in this sense of computer science is a software component that resides in a special runtime environment (agent container), has a certain degree of autonomy and intelligence and is able to communicate with other agents by exchanging messages in a certain language. Each order is represented by an instance of an order agent and may encapsulate rules, e.g. a gastronomy-order shouldn't match with a "beer garden" when the public context parameter "weather" concerning the current private context parameter "location" is "rainy". All instances of offers are represented by a single instance of an offer agent. For each type of public context information available there is one agent which can be queried by the other agents. In the case of certain events (updated orders/offers or context parameters, new orders and offers) a short-lived notification agent whose purpose is to communicate the change to the affected agents will be created. If an order agent detects an offer suitable for him he will contact the notification agents, who will initiate the notification process. Orders may be configured to have an expiry date, so order agents can kill themselves. While there is the concept of mobile agents — agents can move themselves from one instance of the runtime environment or platform to another — for MoMa stationary agents were used. From an architectural point of view it would be preferable to have mobile agents and thus create the agents representing an order or offer on the mobile device respective a server of the adveniser and then move them to the matching platform; but this would require much more resources on the mobile terminals of the end users and each advertiser had to maintain his own agent platform, so we used the stationary agents for the implementation of MoMa. 3.4 Business Model The basic business model for each form of advertising is that the advertisers have to pay for the presentation of their adverts. This is also the case for the MoMa-approach: the advertisers have to pay for each contact (notification message to an end user) generated by one of their offers. The price for one contact depends on the category of that order and will be in the magnitude of a few Euro-Cents for most categories. For categories covering very costly goods and services (e.g. real estates) or with a lot of competitors higher prices are thinkable. The current implementation assumes the same contact price for a given category for all advertisers; if the number of matching offers for an order is bigger than the number of notification A System for Mobile and Wireless Advertising 297 allowed by that end user we choose the orders to be displayed by random. Another approach would be to allow the advertisers to set a price or bid for a contact and to choose the offers with the highest contact prices. An additional source of revenue for the MoMa-operator is selling statistical data concerning the pattern of demands, e.g. what kind of product where most often requested by the end users. In contrast to many conventional method of advertising we do not have to estimate the number of contacts generated like for example for television commercials or newspapers adverts; the advertiser has only to pay for real contacts. There is no requirement to buy a big deal of contacts like for TV commercials, so MoMa-advertising is even affordable for individual enterprises. Also contacts generated by MoMa reach people that explicitly expressed their interest for a certain kind of product or service. If the end users perceive the offers delivered by MoMa because of their highly personalized nature as valuable information rather than advertisement it is even thinkable that they are willing to pay for the MoMa-service. But in the current implementation they only have to pay the costs for the data transmission when putting an order into the system. Although the prototypes of the MoMa-client-applications use webservice technologies for the communication with the MoMa system and as the usage of a webservice causes a lot of data overhead the data volume for the transmission of one order is less than 1 KByte, so these costs are negligible or will be in the nearer future. The providers for the public context information (e.g. specialized news agencies for weather or sport events) will be paid by the MoMa-operator. The trustv\^orthy third party could be compensated by the MoMa-operator or could also be a government institution or a non-profit association. When introducing a system like MoMa there is the well kiiown "chickenand-egg" of obtaining the necessary critical mass for end users as well as advertisers. End users will only use MoMa if there are enough offers in the system. But advertisers will only put offers into the system if there are enough end users of MoMa. To overcome this vicious circle there is the possibility of automatically obtaining offers from well established eCommerce-platforms without charging the operators of those platforms. Since many eCommerce-platforms offer special interfaces to do this (e.g. webservice interfaces) this can be done without much effort. 3.5 Prevention of Ad Fraud Ad Fraud is the deliberate usage of an internet advertising system with the aim to impair one or more advertisers of that platform. The most prominent types of ad fraud stem from the payment scheme used: when 298 M Decker, R. Bulander, G. Schiefer andB. Kolmel applying the "cost per mille" (CPM) schema an ad is shown on a website (e.g. as a "banner") and the advertiser has to pay a certain amount of money for each time the ad is shown. In the case of the "cost per cUck" (CPC) scheme the advertiser has only to pay when the user clicks on an ad, see Google (2005) for example. To perform ad fraud a malicious businessman might generate page impression or clicks on adverts of a competitor. Using special software these faked requests can be generated without much effort. For CPC usually a certain budget for one day is defined, so an ad fraud attack can bum up the budget of an advertiser and thus make his ads to disappear (Bomhardt, 2005). There are estimates that 10 percent or even more for particular businesses of clicks are fraudulent (Olsen, 2004) and taking into account that over 40 % of the 9.6 billion US $ of internet advertising revenues stem from performance based advertising like CPC (lAB, 2005) the effect of ad fraud isn't negligible. In the short term the operator of the advertising platform is not impaired by ad fraud because contacts which stem from fraudulent actions also generated revenue. But in the medium or longer term the advertisers will find out that spending money on that advertising platform doesn't cause the intended effect (in most sales promotion) and thus ask the operator for a refund or stop advertising with that provider at all. As discussed in chapter 2, mobile advertising can be seen as an advancement of internet advertising and may thus also be vulnerable to ad fraud, especially when the advertisers have to pay for each contact. Since this is the case for the MoMa-system, we also considered different measurements for the prevention of "mobile ad fraud". Ad fraud for MoMa would mean to sign up for many of the free user accounts and to create orders which fit an offer of the advertiser to be attacked. As we have to assume that the protocol used for the communication between MoMa-client and server is public, an attacker could develop a computer program to automate this. Since ad fraud is mainly performed by programs or scripts which generate the fraudulent contacts an obvious approach for prevention would be the usage of so called CAPTCHAs. A CAPTCHA is an automated test to tell humans and computers apart by showing a little riddle which at the current state-of-the-art of artificial intelligence can only be solved by humans, e.g. an users sees a picture with distorted text and has to type in that text into an input field (von Ahn et al., 2004). Many providers of webaccounts use CAPTCHAs to prevent the automated registration of multiple account, but for advertising applications you cannot ask the consumer to solve a CAPTCHA before you grant him access to advertising information, especially not on a mobile device with its limited interface where the user should have to make as little as possible data entries. A System for Mobile and Wireless Advertising 299 To secure MoMa against ad fraud it shouldn't be possible to obtain an user-ID without being a human; it might even be necessary to perform some kind of age verification if there are advertising categories with content not suitable for minors. For each ID it is quiet simple to monitor if there is a conspicuous accumulation of orders which match a certain offer and to suspend the account with a given ID or restrict the number of orders for each category. This check has to be performed by the trustworthy party, because the matching-server only sees transaction pseudonyms and thus cannot determine if a set of orders originates from the same user. 4. SUMMARY We discussed the features of mobile and wireless advertising as advancement of internet advertising. The introduced MoMa-system is based on the idea of permission marketing to comply with legal requirements and gain user acceptance. MoMa gives consideration to the special needs of a mobile application in several ways: because mobile terminals offer a limited user interface MoMa analyzes private and public context information and employs profiles to expect as little as possible entries from the user. Different notification channels are supported. Since mobile terminals are very personal communication devices great importance was attached to technical measurements for guaranteeing data protection while also realizing a high degree of personalization. Spam is practical impossible as the advertisers don't have access to the end addresses; if an user doesn't want to receive advertising from MoMa be just has to suspend or delete active orders. A special feature of the MoMa-context model is the discrimination of public and private context parameters. Unlike for public context parameters (e.g. weather) for the retrieval of private context parameters (e.g. current location of the user) access to the user's mobile terminal is required. The members from industry of the MoMa-consortium plan to develop a mobile guide for soccer fans based on the results of the project. ACKNOWLEDGMENTS The project "MoMa — Mobile Marketing" and this work have been funded by the Federal Ministry of Economics and Labour, Germany (BMWA, contract no 01 MD 243); the responsibility for the content of this article lies solely with the authors. We would like to thank Jan Zeman and 300 M Decker, R. Bulander, G. Schiefer andB. Kolmel Marti Bayo-Alemany for discussing technical details of the MoMa-system during the preparation of this paper. References Aalto, L., Gothlin, N., Korhonenm, J., and Ojala, T., 2004, A Bluetooth and WAP Push based location-aware mobile advertising system, in: Proceedings of the 2""^ international Conference on Mobile Systems, Applications and Services (MobiSys '04), Boston, USA, ACM Press. Bauer, H., Lippert, I., Reichardt, T., and Neumann, M., 2005, Effective Mobile Marketing, Institut fur marktorientierte Untemehmensfuhrung, University of Mannheim, Germany. Barkhuss, L., and Dey, A., 2003, Location-based service for mobile telephony: a study of users' privacy concerns, in: Proceedings of the 9^^ IFIP International Conference on Human-Computer Interaction (Interact 2003), Zurich, Switzerland. Barwise, P, and Strong, C, 2002, Permission-based mobile advertising. Journal of interactive Marketing, 16(l):14-24. bmd wireless, and University of St. Gallen, 2005, First empirical global spam study indicates more than 80 percent of mobile phone users receive spam, http://www.mobilespam.org, visited at August 15, 2005. Bomhardt, C, 2005, Cheating on Online Ads, Institute for Marketing at University of Karlsruhe (TH), Germany, Discussion Paper. Chen, G., and Kotz, D., 2000, A Survey of Context-Aware Mobile Computing Research, Technical Report TR2000-381 of Dartmouth College, Hanover, NH, USA. Genesereth, M., 1994, Software agents. Communication of the ACM, 38(7):48ff Godin, S., 1999, Permission Marketing: Turning strangers into friends, and friends into customers, Simon and Schuster, New York, 1999. Google, 2005, Google AdWords, http://adwords.google.com, visited at August 12, 2005 Helm, S., 2000, Viral Marketing — Establishing Customer Relationships by "Word-ofmouse", Electronic Markets, 10(30): 158-161. Informa Telecoms & Media, 2005, Global Mobile Forecast 5 th Edition, http://www.telecoms.com/gmforecasts, last visited at August 11, 2005. lAB (Internet Advertising Bureau), 2005, lAB Internet Advertising Revenue Report 2004, http ://www. iab .net/resources/adrevenue/pdf^I AB_PwC_2004full .pdf. Kavassalis, P., Spyropoulou, S., Drossos, D., Mitrokostas, E., Gikas, G., and Hatzistamatiou, A., (2002) Mobile Permission Marketing: Framing the Market Inquiry, International Journal of electronic Commerce, 8(l):55-79. Kolmel, B., and Alexakis, S., 2002, Location based Advertising, in: Proceedings of the r^ International Conference on Mobile Business, Athens, Greece. Kotler, P., and Bliemel, F., 1992, Marketing Management, Poeschel, Stuttgart, Germany. Krishnamurthy, S., 2001, A comprehensive Analysis of Permission Marketing, Journal of computer mediated communication. Volume 6(2). MessageLabs, 2004, Intelligence Annual Email Security report, http://www.messagelabs.com OECD, 2004, Organisation for Economic Co-operation and Development, Background paper for the OECD Workshop on Spam. Olsen, S., 2004, Google's fraud squad battles phantom clicks, ZDNet Australia. Mohr, R., Nosekabel, H., and Keber, T., 2003, V-Card: Sublimated Message and Lifestyle Services for the Mobile Mass-Market, in: Proceedings of the 5th International Conference on Information and Web-Based Applications & Services, Jakarta, Indonesia. Netsize, 2005, Netsize Guide 2005, Paris, France; http://www.netsize.com A System for Mobile and Wireless Advertising 301 Pfitzmann, A., and Kohntopp, M., 2000, Anonymity, unobservability, and pseudonymity: A proposal for terminology, in: Designing privacy enhancing technologies: International workshop on design issues in anonymity and unobservability, Berkley, USA; Springer, Heidelberg, Germany. Ratsimor, O., Finin, T., Joshi, A., and Yesha, Y., 2003, eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments, in: Proceedings of the f^ international Conference on Electronic Commerce, Pittsburgh, Pennsylvania, USA. Schilit, B.N., Adams, N.I., and Want, R., 1994, Context-Aware computing applications, in: Proceedings of the IEEE Workshop on mobile Computing Systems and Applications, Santa Cruz, CA, USA, pages 85-90. Schlickum, F., 2005, Erfahrungen in der Applikationsentwicklung mit J2ME, in: Perspektiven • des Mobile Business — Wissenschaft undPraxis im Dialog, DUV, Wiesbaden, Germany. Schwarz, T., 2001, Permission Marketing im Mobile Commerce, in: Mobile Commerce — Grundlagen, Geschdftsmodelle, Erfolgsfaktoren, Gabler, Wiesbaden, Germany. Straub, T., and Heinemann, A., 2004, An Anonymous Bonus Point System for Mobile Commerce based on Word-Of-Mouth-Recommendation, in: Proceedings of the 2004 ACM Symposium on Applied Computing, Nicosia, Cyprus. Toh, C.-K., 2002, Ad hoc wireless networks: Protocols and Systems, Prentice Hall, Upper Saddle River, NJ, USA. Turowski, K., and Pousttchi, K., 2004, Mobile Commerce, Springer, Heidelberg, Germany Ververidis, C , and Polyzos, G., 2002, Mobile Marketing using a location based Service, in: Proceedings of the r^ International Conference on Mobile Business, Athens, Greece. Von Ahn, L., Blum, M., and Langford, J., 2004, Telling Humans and Computers apart automatically, Communications of the ACM, 47(2):57-60. Wang, Z., 2003, An agent based integrated service platform for wireless and mobile environments. Shaker Verlag, Aachen, PhD-Thesis at University of Karlsruhe (TH), Germany. Wohlfahrt, J., 2001, Wireless Advertising, in: Mobile Commerce — Grundlagen, Geschdftsmodelle, Erfolgsfaktoren, Gabler, Wiesbaden, Germany. WURFL, 2005, Wireless Universal Resource File, http://wurfl.sourceforge.net, visited at August 23, 2005. Yunos, H., Gao, J., and Shim, S., 2003, Wireless advertising's challenges and opportunities, IEEE Computer, 36(5):30-37. Zeimpekis, V., Giaglis, G., and Lekakos, G., 2003, A Taxonomy of Indoor and Outdoor Positioning Techniques for Mobile Location SevwicQS, SIGecom Exchanges, 3(4): 19-27, ACM Press, New York, NY, USA.