Lag Time

Suspicious touchpoints can be detected by identifying unusual lag time or Touchpoint-To-Install-Time. Touchpoint-To-Install-Time is the time interval between a touchpoint and the following app install.  

Rule Setup

1. Navigate to [Settings]>[Fraud Validation Rules].

2. Select the [Lag Time] tab and click Add a rule.

3. Select Click or Impression as [Touchpoint].
4. Select Less than or Greater than as [Condition].

5. Enter the time interval. It can be set in seconds, minutes, hours, and days.

6. Select [Prevention Level] and click Save.

7. Click Add a rule to add more rules. When you have added multiple rules, any touchpoint that matches at least 1 of the configured rules will be considered suspicious.

Attention

It is advised to start from "Prevention Level 1" and switch to higher levels after consulting with your media partner, as the prevention level setting may have a direct impact on the ad performance.

Prevention Level

Events attributed to the suspicious touchpoints detected by the lag time rules are processed according to the set prevention levels.

#{"width":"100px"}

Prevention Level

#{"width":"200px"}

Description

Level 1: Tag as fraud

- Events attributed to the suspicious touchpoints will be tagged as fraud in the Airbridge reports and raw data export files.

Level 2: Don't send postbacks

- Events attributed to the suspicious touchpoints will be tagged as fraud in the Airbridge reports and raw data export files.

- Events attributed to the suspicious touchpoints won't be sent as postbacks.

Level 3: Don't attribute

- Events attributed to the suspicious touchpoints will be tagged as fraud in the Airbridge reports and raw data export files.

- Events attributed to the suspicious touchpoints won't be sent as postbacks.

- Events attributed to the suspicious touchpoints won't be attributed or aggregated.

Reporting

The events attributed to suspicious touchpoints detected by the set rules can be viewed in your Airbridge reports and raw data export files.

In the Actuals Report, select "Touchpoint Fraud Tag" as a GroupBy to visualize the suspicious events tagged as fraud.

In the [App Raw Data Export], select "Touchpoint Fraud Tag" and "Fraud Tags" in the [Select Property] step to export suspicious events as a CSV file.

Was this page helpful?

Have any questions or suggestions?