Cost and Benefits
Draft Outline
02/15/00
1.01 Benefits and Costs to Business (costs
include costs to build, to deploy, to maintain)
1.1 Benefits
- 1.1.1 Better decisions
-
- 1.1.2 Better and more efficient customer service and operations
-
- 1.1.3 More effective marketing
-
- 1.1.4 Better product/service design
-
- 1.1.5 Better security
-
- 1.1.6 Less fraud
-
- 1.1.7 Increased reliability and accuracy of data
-
- 1.1.8 Public relations benefit
-
- 1.1.9 Deeper customer relationships
1.2 Costs (include stand-alone expenditures,
incremental costs, operational recurring costs)
- 1.2.1 Communications costs
-
- 1.2.1.1 Method of access - online, offline
-
- 1.2.1.2 The time period for access - realtime, other time
periods
-
- 1.2.1.3 Scope of access, what information?
-
- 1.2.1.4 Sensitivity of information - more sensitive data may
require enhanced communications security
-
- 1.2.1.5 Type of information
-
- 1.2.2 Storage costs varies by data type
-
- 1.2.2.1 Permanent data - data collected and stored by service
provider
-
- 1.2.2.2 Temporal data - data only store temporally,as a
processing step or input to derived data
-
- 1.2.2.3 Confidential data - data stored to combat fraud that
might be compromised if shared with consumer
-
- 1.2.2.4 Issue of version control - need to store and access
multiple versions; e.g. which version shared with what parties
-
- 1.2.2.5 Maintain privacy agreements/contracts
-
- 1.2.2.6 Maintain a record of what data and data versions shared
with what parties for what purpose
-
- 1.2.2.7 Need to maintain multiple profiles on customers
-
- 1.2.3 Processing/performance requirements and costs
-
- 1.2.3.1 The kind of system (e.g. legacy, client-server)
-
- 1.2.3.2 The function of the system
-
- 1.2.3.3 Required modifications, or design requirements placed
on system
-
- 1.2.3.4 Performance guarantees/requirements
-
- 1.2.4 Cost of security
-
- 1.2.4.1 Trade-offs between level of security, cost and
resultant risk exposure (e.g. increased exposure to fraud, service denial attacks, ...)
-
- 1.2.4.2 Potential loss to service provider of large
well-publicized security violation/break-in
-
- 1.2.5 Impact on cost of volume and frequency of use of data
access, includes considerations of response time guarantees/requirements, frequency of use
restrictions
-
- 1.2.6 Impact of regulations; e.g. Reg E and other requirements
for paper, reporting, customer's right to update, correct, delete
-
- 1.2.7 Reliability considerations, including countering service
denial threats
-
- 1.2.8 Providing control to service provider
-
- 1.2.9 Personnel additions and training
2.0 Benefits and Cost to consumer
2.1 Benefits to consumer
- 2.1.1 More effective and personalized products and services
-
- 2.1.2 Less spam, more relevance
-
- 2.1.3 Increased customer trust in medium
-
- 2.1.4 Accountability - ability to act as a check on business
adherence to polices
-
- 2.1.5 Better control over the accuracy of personal information
-
- 2.1.6 Enriched understanding of data collection
-
- 2.1.7 Knowledge of data source
-
- 2.1.8 Ability to make better privacy decisions in the
marketplace - including decisions to protect anonymity
-
- 2.1.9 Provide check over collection of personal information
-
- 2.1.10 Ability to police businesses for compliance
2.2 Costs to consumer
- 2.2.1 Additional requirements on client device
-
2.2.1.1 memory and processing requirements
- 2.2.2 Training requirements
-
- 2.2.3 Impact on ease of use
- 2.2.3.1 installation
-
- 2.2.3.2 operation
-
- 2.2.3.3 portability
-
- 2.3.3.4 performance issues
-
- 2.2.4 Increased risk exposure to consumer when access is made
more open
-
- 2.2.5 Cost of authentication devices
-
- 2.2.6 Need and cost to maintain multiple profiles
-
- 2.2.7 Cost of consumer controls
-
- 2.2.8 Passthrough costs and fee structures
-
|