Archive

Cost and Benefits

Draft Outline
02/15/00


1.01 Benefits and Costs to Business (costs include costs to build, to deploy, to maintain)

1.1 Benefits

1.1.1 Better decisions
 
1.1.2 Better and more efficient customer service and operations
 
1.1.3 More effective marketing
 
1.1.4 Better product/service design
 
1.1.5 Better security
 
1.1.6 Less fraud
 
1.1.7 Increased reliability and accuracy of data
 
1.1.8 Public relations benefit
 
1.1.9 Deeper customer relationships

1.2 Costs (include stand-alone expenditures, incremental costs, operational recurring costs)

1.2.1 Communications costs
 
1.2.1.1 Method of access - online, offline
 
1.2.1.2 The time period for access - realtime, other time periods
 
1.2.1.3 Scope of access, what information?
 
1.2.1.4 Sensitivity of information - more sensitive data may require enhanced communications security
 
1.2.1.5 Type of information
 
1.2.2 Storage costs varies by data type
 
1.2.2.1 Permanent data - data collected and stored by service provider
 
1.2.2.2 Temporal data - data only store temporally,as a processing step or input to derived data
 
1.2.2.3 Confidential data - data stored to combat fraud that might be compromised if shared with consumer
 
1.2.2.4 Issue of version control - need to store and access multiple versions; e.g. which version shared with what parties
 
1.2.2.5 Maintain privacy agreements/contracts
 
1.2.2.6 Maintain a record of what data and data versions shared with what parties for what purpose
 
1.2.2.7 Need to maintain multiple profiles on customers
 
1.2.3 Processing/performance requirements and costs
 
1.2.3.1 The kind of system (e.g. legacy, client-server)
 
1.2.3.2 The function of the system
 
1.2.3.3 Required modifications, or design requirements placed on system
 
1.2.3.4 Performance guarantees/requirements
 
1.2.4 Cost of security
 
1.2.4.1 Trade-offs between level of security, cost and resultant risk exposure (e.g. increased exposure to fraud, service denial attacks, ...)
 
1.2.4.2 Potential loss to service provider of large well-publicized security violation/break-in
 
1.2.5 Impact on cost of volume and frequency of use of data access, includes considerations of response time guarantees/requirements, frequency of use restrictions
 
1.2.6 Impact of regulations; e.g. Reg E and other requirements for paper, reporting, customer's right to update, correct, delete
 
1.2.7 Reliability considerations, including countering service denial threats
 
1.2.8 Providing control to service provider
 
1.2.9 Personnel additions and training

2.0 Benefits and Cost to consumer

2.1 Benefits to consumer

2.1.1 More effective and personalized products and services
 
2.1.2 Less spam, more relevance
 
2.1.3 Increased customer trust in medium
 
2.1.4 Accountability - ability to act as a check on business adherence to polices
 
2.1.5 Better control over the accuracy of personal information
 
2.1.6 Enriched understanding of data collection
 
2.1.7 Knowledge of data source
 
2.1.8 Ability to make better privacy decisions in the marketplace - including decisions to protect anonymity
 
2.1.9 Provide check over collection of personal information
 
2.1.10 Ability to police businesses for compliance

2.2 Costs to consumer

2.2.1 Additional requirements on client device
 

2.2.1.1 memory and processing requirements

2.2.2 Training requirements
 
2.2.3 Impact on ease of use
2.2.3.1 installation
 
2.2.3.2 operation
 
2.2.3.3 portability
 
2.3.3.4 performance issues
 
2.2.4 Increased risk exposure to consumer when access is made more open
 
2.2.5 Cost of authentication devices
 
2.2.6 Need and cost to maintain multiple profiles
 
2.2.7 Cost of consumer controls
 
2.2.8 Passthrough costs and fee structures