ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
Information Trust Exchange design
2
Cookies vs. Cohorts: Comparing old and newCHART: Cookies vs. cohorts -- the new way / PRESENTATION DOCS FOLDER
3
Comparing third-party cookie-based system ("old") with ITE shared-user network ("new")
4
5
Old system: "Cookies" targetting individualsNew system: Cohorts in profile booksAdvantage
6
Reaching usersSame user can be tracked to multiple sitesUser can only be reached as part of a site audienceTake high-value sites out of competition with low-value and fraud sites to reach the same users.
7
FraudLegit sites depend on third-party services to show they have legit users. Fraud sites can and do use the same third parties.Users share attributes only with sites they trust. Legit sites can aggregate attributes that fraud sites do not have access to.
New fraud metrics can depend on data where legit sites have an advantage over fraud sites.
8
PerformanceAd is matched to user in real time, while page loads. Dozens of "cookie calls" and scripts clog browser response and slow user experience.Ads are matched to site audiences, asynchronously. Most processing occurs in server/cloud rather than in browser.Move placement calculations off the critical path of page loading and rendering. Enable more sophisticated calculations for agencies, and improve page load times and responsiveness for users.
9
SignalingAn ad may be a low-information "cold call" that user has incentive to block. Ads appear unpredictably on sites that may be inappropriate.Ad is matched to the content site, so many users in a local area or community of practice may see it. Ads "make sense" to viewer.Less likely that ads are economically rational to ignore. Lower incentives to block ads.
10
Deceptive advertisingEasy for deceptive advertisers to buy low-priced, fraud-vulnerable user demographics.All readers of the same content see the same ad.Less cost-effective for deceptive advertisers to selectively connect with victims. Shift deceptive offers to other media.
11
Identity and "cookie" managementThird-party cookies allow a plurality of parties unknown to user to assemble and trade untrustworthy and varying profiles of user for unknown purposes.User can deploy safe tracking protection services which block third-party cookies responsible for privacy challenges and slow user experience.User can make their identity opaque to bad-actor advertisers, while managing enhanced identity for publishers and advertisers they choose to trust.
12
Price managementUsers can be readily presented with different offers based on third-party data which affects price without their knowledge or consent.Users choose what data to share, and can choose not to share attributes that could result in ending up in a higher-price category.Make the medium more trustworthy. Increase user feeling of empowerment and lower incentives to block ads.
13
Service ManagementContent and other services are presented in "silos" because there is no open standard for sharing user identity attributes that could provide for multi-site services.Users can opt into collaborative subscription services enabled by the network logging and settlement of activity.Allow transparent, competing offers of tiered pricing and content access based upon marketplace innovation and user demand.
14
Brand safetyAds often appear in brand-unsafe places, such as on infringing or fraudulent sitesAd buys are based on audience profile for an entire site or section.Advertisers can protect the brand by choosing sites with a high fraction of legit users, by looking for sites that aggregate known good user attributes.
15
16
(created March 2, 2016 by Don Marti; edits by Bill Densmore)
Yellow highlights added Oct. 7, 2016 by Don Marti
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100