450 likes | 537 Views
CS410 – Professional Workforce Development Orange Team. Phone Solicitation Management System. Feasibility Presentation, 6 th March 2008 Presented by Benjamin Leyland. Benjamin Leyland. Manager Presenter Finance. Travis Burlock. Hardware Webmaster. Dionna Diggs. Asst. Manager
E N D
CS410 – Professional Workforce DevelopmentOrange Team Phone Solicitation Management System Feasibility Presentation, 6th March 2008 Presented by Benjamin Leyland
Benjamin Leyland • Manager • Presenter • Finance
Travis Burlock • Hardware • Webmaster
Dionna Diggs • Asst.Manager • Legal Eagle
Bob Larrick • Software • Marketing
Josh Rode • Documentation
Unwanted phone solicitation still occurs. Even with current legislation and the Do-Not-Call-List.
Effects of the Problem Annoying Interrupting Waste of time
What is Phone Solicitation? • A telephone call that acts as an advertisement. • Estimated that 4 million "junk" telephone calls are made every day in the United States. Source 1: FCC (www.fcc.gov) Source 2: Strangefacts (www.strangefacts.com)
Current FCC Regulations Phone solicitors are required to transmit or display: - Their contact phone number - The name of the soliciting company Source: FCC (http://www.fcc.gov/cgb/consumerfacts/tcpa.html)
The Do Not Call List • Numbers can be registered online or over the phone. • The majority of solicitors are prohibited from calling those on the list. Source: FCC (www.fcc.gov)
Who Can Still Call? • Organizations that you have established a business relationship with • Non-profit organizations • Callers with prior permission Source: FCC (www.fcc.gov)
Do Not Call List Statistics Makes up 76% registered 43% 33% 24% Source: Harris Interactive (www.harrisinteractive.com)
Customer • Potential customer = 46% of American adults • 76% have placed their phone numbers on the NDNC registry. • 61% of people on the registry still receive unsolicited calls. Source 1: FTC (www.ftc.gov) Source 2: Harris Interactive (www.harrisinteractive.com)
System Capabilities • Blocking of calls • Per call basis • Area code • Wild cards • Those contained in the global database • System configuration • Configuration software (PC) • Hardware connected to phone line
Incoming Call Intercept Pass To Phone Answer
Should It Be Blocked ? Intercept Check Local Settings Search DB Block Call Pass To Phone Answer
Flagging an Unwanted Call Answer Manually Flag Add To Local DB Send To Global DB
Inform Global Database Flagged Number Check for Other Notices Tolerance Exceeded Increment Record Add To DB
Refresh Global Database Refresh DB Check Last Report No Longer In Service Remove From DB
Request Database Update Request Update Compare Versions Prepare Update Send Up-To-Date Send Update Update Local DB
Required Hardware • Modem • LCD • Wireless adapter • Memory • Database server
Specialty Hardware • Call interception device will be a custom built unit • It’s components are readily available OTS
Required Software • Configuration application • Database management software • Interception/screening software
What’s In The Box • Call interception device • Configuration Software
What’s Not In The Box • Caller ID Subscription • Computer • Internet Connection • Wireless Network
Risks • Availability of wireless networks in homes • Security • Cost • Accidental blocks • Difficulty of use
Risk: Wireless Networks The Risk: • Only 12% of US households have a wireless network The Mitigation: • Different options of implementation which do not require a wireless network Source: Pew Internet Project (http://www.pewinternet.org/pdfs/PIP_Wireless.Use.pdf)
Risk: Security The Risk: • Hacking • Spoofing • Other sabotage of the online database or personal database The Mitigation: • Standard security techniques
Risk: Cost The Risk: • High cost • Monthly fee The Mitigation: • Look for lower cost hardware • Different options of implementation
Risk: Accidental Blocks The Risk: • Customers blocking numbers they don’t want to block • Numbers being added to the online database who aren’t telemarketers The Mitigation: • Fully customizable filters • Set up a threshold for adding a number to the online database
Risk: Difficulty of Use The Risk: • The device is too difficult for people to set up or use The Mitigation: • Make it easier • Different options of implementation which allow for easier use
Experts Needed • Embedded Systems Engineer • Online Database Administrator • Security Expert
Coordinating Communication • Email • Instant Messenger • Group Chat
Preliminary Cost Estimates • Basic Caller ID boxes1: ~$15 • Additional memory (~2GB)2: ~$12 • Processor2: ~$8 • Wireless components3: ~$15 • Total: ~$50 Source 1: Google Shopping (http://www.google.com/products?hl=en&client=firefox-a&rls=org.mozilla:en-US:official& resnum=0&q=Caller+ID+Box+Prices&um=1&ie=UTF-8) Source 2: Engadget (http://www.engadget.com/2007/09/19/isuppli-new-ipod-nanos-cost-apple-just-59-and-83-in-component/) Source 3: iSuppli (http://www.isuppli.com/news/default.asp?id=7308)
Cost for the Customer: ~$60 initial cost + ~$5 monthly fee Based On: Cold Call Blocker (http://www.coldcallblocker.com/faq/)
Alternative Approach • No wireless network • Uses the modem to dial in to the database
Benefits of this approach • Larger market • Cheaper to build • Easier to install
Problems with this approach • Ties up phone line for updates • Slow data transfer • Have to provide dial-up numbers
Conclusion • Phone users are still affected by unsolicited calls. • No current solution solves this problem. • Our solution is feasible. Questions?