世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

ロボコール検出と無人コールマネジメント:ロボコール調査第一弾

Robocall Detection and Unwanted Call Management: Robocall Research, First Edition

 

出版社 出版年月電子版価格
Mind Commerce
マインドコマース
2018年7月US$995
シングルユーザライセンス

サマリー

米国調査会社マインドコマース(Mind Commerce)の調査レポート「ロボコール検出と無人コールマネジメント:ロボコール調査第一弾」は、自動営業電話(ロボコール)の現状を評価し、不要な電話への対処技術や主要企業とソリューションについて記載している。スパムや詐欺に対処するロボコール技術とソリューションなどのこの市場の課題や今後について記載している。通信データ解析、ネットワークベースの認証、発信元特定などのネットワークベースの情報技術などのロボコール検出の今後についても記載している。

Overview:

Commonly referred to as robocalls, computer-generated phone calls are used by legitimate organizations such as schools, churches, and public safety agencies to place calls to registered constituents. Public safety agencies will make reverse 9-1-1 robocalls in the event of a natural disaster or some catastrophe such as a train derailment. However, some Bad Actors use robocalling to trick or even defraud consumers in a random manner. According to YouMail, Americans received over 4 billion such calls in June 2018 alone.

The typical scenario involves a Bad Actor calling a consumer with some type of story about a special offer or concern that the called party is compelled to act upon immediately. In these instances, the calling party is seeking to either extort money directly or obtain identity information (such as credit card info) necessary to steal from the consumer. Technology tricks are used to gain the trust of the consumer such as local number spoofing, which is a technique that involves manipulating the calling party’s number to appear different than the actual number.

Mind Commerce has coined the term “Problematic” to refer to any telephone number that that is identified as a cause for concern including spam, abusive telemarketer or debt collector, scam or fraud. Leading Robocall Detection and Unwanted Call Management solutions use various technologies such as advanced data analytics and artificial intelligence to determine if a number is problematic, and if so, the degree of concern (e.g. Spam, Scam, or Fraud).

Robocall Research, First Edition evaluates the current state of automated calling (robocalls), technologies for dealing with unwanted calls, leading companies and solutions. This report also analyzes industry challenges and the future outlook for robocall technologies and solutions to defeat spammers, scammers, and fraudsters. It also provides a look into the future of robocall detection including evolution of telecom data analytics, network-based authentication (such as STIR/SHAKEN) and network-based intelligence (such as call origination identification).

  • Vendor solutions covered in this report include: First Orion, Hiya, and TNS
  • Carrier solutions covered in this report include: AT&T Wireless’s “Call Protect”, T-Mobile’s “SCAM ID in combination with Name ID”, Verizon Wireless’s “Enhanced Caller Name ID

Purchasers of this report will receive a briefing with the Mind Commerce analyst team to answer questions about the technologies, companies, solutions, and the market outlook. Mind Commerce is also planning to release a market-focused report entitled Robocall and Unwanted Call Management: Solution Assessment and Market Outlook 2018 – 2023

Who Will Benefit from this Report?

  • Robocall Solution Providers
  • Communications Service Providers
  • Software and Application Developers
  • Telecommunications Infrastructure Providers


目次

1.       Introduction

1.1.    What is a Robocall?

1.2.    Current State of the Problem

1.3.    About the First Edition of Robocall Research

2.       How Robocalls Work

2.1.    Architecture

2.2.    Technologies

3.       Who Uses Robocalling

3.1.    The Illegal, Unethical Minority

3.1.1. Spammers, Scammers, and Fraudsters

3.1.2. Who are the Bad Actors?

3.1.3. Bad Actor Practices

3.1.3.1.                          Misrepresentation

3.1.3.2.                          Number Spoofing

3.2.    The Legal and Legitimate Majority

3.2.1. Relationship Based and Legally Authorized

3.2.2. Who are the Good Actors?

3.2.3. When Legal and Ethical Lines are Crossed

4.       Detection and Management Approaches

4.1.    Method Types

4.1.1. Heuristic Methods

4.1.2. Identification and Verification Methods

4.2.    Crowd Sourcing

4.2.1. How is Works

4.2.2. Advantages and Disadvantages

4.3.    Data Analytics

4.3.1. Call Velocity

4.3.2. Call Volume

4.3.3. Behavior Changes

4.4.    Network Diagnostics

4.4.1. Call Origination

4.4.2. Call Path

4.4.3. Call Termination

4.5.    Future Technologies

4.5.1. Authentication and Verification

4.5.2. STIR/SHAKEN

5.       The Market

5.1.    The Good, the Bad, and the Ugly

5.1.1. The Above Board Market

5.1.2. The Gray Market

5.1.3. The Black Market

5.2.    Consumer Market

5.2.1. Call Identification

5.2.2. Unwanted Call Management

5.3.    Business Market

5.3.1. Data Sourcing

5.3.2. Verified Business

6.       Industry Challenges

6.1.    Awareness of Issues: Solution Availability and Usage

6.2.    The Backlash of Neighborhood Spoofing

6.3.    When Solutions Getting it Right and Get it Wrong

6.3.1. False Positives

6.3.2. False Negatives

6.4.    Consumer Issues

6.4.1. When is it Really Safe to Answer

6.4.1.1.                          Annoyance vs. Real Risks

6.4.1.2.                          Actual Personal and Financial Risks

6.4.2. Data Privacy Concerns

6.4.2.1.                          Who has Control of your Private Data?

6.4.2.2.                          Who knows your Call Habits?

6.5.    Business Backlash

6.5.1. Take me off that List: “I am Not a Bad Actor!”

6.5.2. My Calls are Always Legitimate: “White List My Business”

7.       Solution Provider Analysis

7.1.    What Characterizes a Market Leader

7.2.    The Long Tail of Solution Providers

7.3.    What our Latest Testing Indicates

7.3.1. Recognizing the issue of Problematic Calls

7.3.2. Conformance among Leading Solutions

7.3.3. Accuracy among Leading Solutions

7.3.4. Needed Areas of Improvement

7.3.5. The Need for Periodic Testing

8.       The Future Outlook

8.1.    Regulatory Actions

8.2.    Technology Advancements

8.3.    Continuous Solution Improvements

8.4.    Mind Commerce Point of View Areas

8.4.1. Vetting Solution Providers is Important

8.4.2. Data Privacy and the Need for Encrypted Data

 

ページTOPに戻る

あなたが最近チェックしたレポート一覧

  • 最近チェックしたレポートはありません。

お問合は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのお問合せはこちらのフォームから承ります

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

<無料>メルマガに登録する

 

 

ページTOPに戻る