Phone Solicitation Management System CS410 – Professional Workforce Development Orange Team

advertisement
CS410 – Professional Workforce Development
Orange Team
Phone Solicitation
Management System
Feasibility Presentation, 6th March 2008
Presented by Benjamin Leyland
Benjamin
Leyland
 Manager
 Presenter
 Finance
March 6, 2008
2
Travis
Burlock
 Hardware
 Webmaster
March 6, 2008
3
Dionna
Diggs
 Asst. Manager
 Legal Eagle
March 6, 2008
4
Bob
Larrick
 Software
 Marketing
March 6, 2008
5
Josh
Rode
 Documentation
March 6, 2008
6
How we’re organized
March 6, 2008
7
THE PROBLEM
March 6, 2008
8
Unwanted phone solicitation
still occurs.
Even with current legislation and the
Do-Not-Call-List.
March 6, 2008
9
Effects of the Problem
 Annoying
 Interrupting
 Waste of time
March 6, 2008
10
What is Phone Solicitation?
 A telephone call that acts as an
advertisement.
 Estimated that 4 million "junk" telephone
calls are made every day in the United
States.
Source 1: FCC (www.fcc.gov)
Source 2: Strangefacts (www.strangefacts.com)
March 6, 2008
11
Current FCC Regulations
Phone solicitors are required to transmit or
display:
- Their contact phone number
- The name of the soliciting company
Source: FCC (http://www.fcc.gov/cgb/consumerfacts/tcpa.html)
March 6, 2008
12
The Do Not Call List
 Numbers can be registered online or over the
phone.
 The majority of solicitors are prohibited from
calling those on the list.
Source: FCC (www.fcc.gov)
March 6, 2008
13
Who Can Still Call?
 Organizations that you have established a
business relationship with
 Non-profit organizations
 Callers with prior permission
Source: FCC (www.fcc.gov)
March 6, 2008
14
Do Not Call List Statistics
Makes up 76% registered
Registered
Registered and
still receiving
calls
Not Registered
43%
33%
24%
Source: Harris Interactive (www.harrisinteractive.com)
March 6, 2008
15
Customer
 Potential customer = 46% of American adults
 76% have placed their phone numbers on the
NDNC registry.
 61% of people on the registry still receive
unsolicited calls.
Source 1: FTC (www.ftc.gov)
Source 2: Harris Interactive (www.harrisinteractive.com)
March 6, 2008
16
Major Functional Components
March 6, 2008
17
System Capabilities
 Blocking of calls




Per call basis
Area code
Wild cards
Those contained in the global database
 System configuration
 Configuration software (PC)
 Hardware connected to phone line
March 6, 2008
18
Incoming Call
Intercept
Pass To
Phone
Answer
March 6, 2008
19
Should It Be Blocked ?
Intercept
Check Local
Settings
Search
DB
Block
Call
Pass To
Phone
Answer
March 6, 2008
20
Flagging an Unwanted Call
Answer
Manually
Flag
Add To Local
DB
Send To
Global DB
March 6, 2008
21
Inform Global Database
Flagged Number
Check for
Other Notices
Tolerance
Exceeded
Increment
Record
Add To DB
March 6, 2008
22
Refresh Global Database
Refresh
DB
Check Last
Report
No
Longer In
Service
Remove From
DB
March 6, 2008
23
Request Database Update
Request
Update
Compare
Versions
Prepare
Update
Send
Up-To-Date
Send
Update
Update Local
DB
March 6, 2008
24
Required Hardware





March 6, 2008
Modem
LCD
Wireless adapter
Memory
Database server
25
Specialty Hardware
 Call interception device will be a custom
built unit
 It’s components are readily available OTS
March 6, 2008
26
Required Software
 Configuration application
 Database management software
 Interception/screening software
March 6, 2008
27
What’s In The Box
 Call interception device
 Configuration Software
March 6, 2008
28
What’s Not In The Box




March 6, 2008
Caller ID Subscription
Computer
Internet Connection
Wireless Network
29
Competition Matrix
March 6, 2008
30
Risks





Availability of wireless networks in homes
Security
Cost
Accidental blocks
Difficulty of use
March 6, 2008
31
Risk Matrix
March 6, 2008
32
Risk: Wireless Networks
The Risk:
 Only 12% of US households have a wireless
network
The Mitigation:
 Different options of implementation which do not
require a wireless network
Source: Pew Internet Project
(http://www.pewinternet.org/pdfs/PIP_Wireless.Use.pdf)
March 6, 2008
33
Risk: Security
The Risk:
 Hacking
 Spoofing
 Other sabotage of the online database or personal
database
The Mitigation:
 Standard security techniques
March 6, 2008
34
Risk: Cost
The Risk:
 High cost
 Monthly fee
The Mitigation:
 Look for lower cost hardware
 Different options of implementation
March 6, 2008
35
Risk: Accidental Blocks
The Risk:
 Customers blocking numbers they don’t want to
block
 Numbers being added to the online database who
aren’t telemarketers
The Mitigation:
 Fully customizable filters
 Set up a threshold for adding a number to the
online database
March 6, 2008
36
Risk: Difficulty of Use
The Risk:
 The device is too difficult for people to set up or
use
The Mitigation:
 Make it easier
 Different options of implementation which allow
for easier use
March 6, 2008
37
Experts Needed
 Embedded Systems Engineer
 Online Database Administrator
 Security Expert
March 6, 2008
38
Coordinating Communication
 Email
 Instant Messenger
 Group Chat
March 6, 2008
39
Preliminary Cost Estimates




Basic Caller ID boxes1:
Additional memory (~2GB)2:
Processor2:
Wireless components3:
 Total:
~$15
~$12
~$8
~$15
~$50
Source 1: Google Shopping
(http://www.google.com/products?hl=en&client=firefox-a&rls=org.mozilla:en-US:official&
resnum=0&q=Caller+ID+Box+Prices&um=1&ie=UTF-8)
Source 2: Engadget
(http://www.engadget.com/2007/09/19/isuppli-new-ipod-nanos-cost-apple-just-59-and-83-in-component/)
Source 3: iSuppli
(http://www.isuppli.com/news/default.asp?id=7308)
March 6, 2008
40
Cost for the Customer:
~$60 initial cost
+
~$5 monthly fee
Based On: Cold Call Blocker (http://www.coldcallblocker.com/faq/)
March 6, 2008
41
Alternative Approach
 No wireless network
 Uses the modem to dial in to the database
March 6, 2008
42
Benefits of this approach
 Larger market
 Cheaper to build
 Easier to install
March 6, 2008
43
Problems with this approach
 Ties up phone line for updates
 Slow data transfer
 Have to provide dial-up numbers
March 6, 2008
44
Conclusion
 Phone users are still affected by unsolicited calls.
 No current solution solves this problem.
 Our solution is feasible.
Questions?
March 6, 2008
45
Download