March 28, 2006 Phone 508-864-4800 www.senderatrisk.org V 0.93 A Pure Economic Response to Irrelevant Contact Provable Relationships and Personal Interrupt.

Slides:



Advertisements
Similar presentations
Newsletter No-Nos A Beginner’s Guide Sarah Spencer.
Advertisements

Social Media Marketing: An Hour A Day Author: Dave Evans Author: Dave Evans.
Presentation to HRPA Algoma January 29, My favourite saying… Fail to plan, Plan to Fail. 2.
effective marketing make your creditable.
® 2010 Transworld Systems Inc. All rights reserved. The Transworld Systems and GreenFlag logos are registered service marks of Transworld Systems Inc.
Cyber bullying and internet safety Parents meeting: staying safe online.
“We Can Stop the Spam!” Article written by Jack McHugh Presented by Sebastian Fischer.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
® 2010 Transworld Systems Inc. All rights reserved. The Transworld Systems and GreenFlag logos are registered service marks of Transworld Systems Inc.
New Canadian Anti-Spam Legislation Robert Lipson – April 8, 2014.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc.
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
Preventing Spam For SIP-based Sessions and Instant Messages Kumar Srivastava Henning Schulzrinne June 10, 2004.
Chapter 8 Protecting People and Information: Threats and Safeguards Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Creating Customer Acquisition and Retention by means of Permission Based Marketing.
Copyright © 2008 Constant Contact Inc. The Power of Marketing list practices for retention and acquisition of customers Presented by Richard.
Marketing What is marketing? Marketing is the art and science of management process through which goods and services move from concept to the customer.
Internet Fraud By Jessica Habermehl &Ally Erwine Period 9.
“WE Can Stop the Spam!” By: Jack McHugh. Proposals to identify spam  Michigan- require commercial ers to insert “ADV” as the first three characters.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
E Marketing E Newsletter and E-Surveys Are They For You???
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Goldmine International
“Recipients ” “Signature” “Subject Line” CONTENT of .
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
 The Shift Towards Digital Branding By Zahra Karim.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Chapter 11 BSAD 145 Jason Smith Andrew Fleming. Introduction The Technology Camel Supporting Today’s End User End User Toolset 1. The Internet 2. Mobile.
Marketing for Business Presented by: Helen Duncan
Welcome to the wonderful world of……. . A Quick & Easy Guide.  What IS ?  A quick, easy and convenient way to send a letter to friends, family.
The Best Business Operating System in Adriatic Region.
How to Get Permission and Avoid Being Spam Jill Bastian Training and Education Manager.
A Business solution for your account payable capture process David Dejean.
1 Copyright Scott Wright. All rights reserved. SC 1 Selling the Streetwise Security Awareness Program.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
Social media is no longer a choice but a necessity.
Resident Communication. Made Easy. Social Media The benefits, costs, and risks involved. CFAA 2011 Copyright © Neighbourhood Buzz Communications
Marketing Management Policy Best Practices Deliverability Inbox Placement Marketing Tips/Ideas.
Understanding the Market and Your Place in It 4755 Kingsway Drive, Suite 314 Indianapolis, IN Phone: | Fax:
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
© 2007 The McGraw-Hill Companies, Inc. All rights reserved.
Keep Your Clients Coming Back for More All audio is streamed through your computer speakers. There will be several attendance verification questions during.
 Computer freezes  Internet won’t connect  won’t work  Sound isn’t working  Program won’t run  Document won’t print And What Is the First.
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
Talk to friends family coworkers managers Read handouts websites Read Talk Challenge both sides.
SEM A - Promotion PE – Develop content for use in marketing communications to create interest in product/business/idea PI – Write marketing.
Requirements Hash Cash & Pay IETF 62 - Sipping WG Cullen Jennings.
NEXT Global Simplicity Club. The fact is, most people lack the single most important component of success, a definite step-by-step, easy-to-duplicate.
Creating More Sales Opportunities Your Automated Follow Up System.
XuZhicheng. You never know The magic of finance  Background: Mexico Country Bank ( Citi Bank in USA) has some depreciate bond ( 债券 ) to deal with.
M inimum V iable P roducts Why they are a life or death matter when you are building a live marketplace We share the story on how we’ve built our product.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
Chapter © 2010 South-Western, Cengage Learning Responsibilities and Costs of Credit Using Credit Wisely Costs of Credit 18.
New Age of Digital Marketing Social Media Marketing  Many people knows Facebook and Twitter is the p0pular social medium to connect your friends and.
CORPORATE PARTNERSHIPS  Do you currently have corporate support? Introductions.
Systems Analysis and Design 9 th Edition Toolkit A Communication Tools By: Prof. Lili Saghafi.
TU-C2040 Strategy Fieldwork Marco Clemente Natalia Vuori.
PROFESSIONALISM AND SOCIAL MEDIA Created by: Bedig Galladian.
How to create brand loyalty in a digital age Ashley Joyce Account Manager.
Free But Effective Listing Building and Marketing Service How to easily and quickly grow a list of potential buyers and constantly send them marketing.
I love # . Marketing in 10 minutes WHY? BUILD TARGET TRACK MEASURE.
Engage Your Audience with Cross Media Communications
Internet Fraud By (NAMES).
Information Security Session October 24, 2005
Automating Profitable Growth™
Digital Marketing Services PREPARED BY : GLOBALMAILMEDIA
Presentation transcript:

March 28, 2006 Phone V 0.93 A Pure Economic Response to Irrelevant Contact Provable Relationships and Personal Interrupt Value

2 Antispam & Delivery Mechanisms Personal Filters Community Filters Laws Sender Identification Trust & Reputation Payment or Risk

3 It’s The Economics, Bucko! Spam is undesirable mail Undesirable mail is a product of poor targeting Poor targeting is rewarded by economic incentive Solution: Create an economic disincentive

4 Economics 101: A Knot in the Belly... Fair & Effective (“1 st class” implies a 2 nd class) Simple and Transparent Effective before Widespread adoption Resistant to Zombies Keep Free of Tax & Postage Purity: Do the incentives makes sense?

5 Primitive or Pure: Certified Mail Who Decides It’s Spam? Who Gets the Money? Cash –vs– Risk: The medium is inexpensive Stranger –vs– Friend: Why even risk? Trust: Centralized –vs– Personal Definition: Communal –vs– Personal

6 and the content of his message ain’t in my filter database.” “I get this c-note back if the boss got no beef with my message. Capisch?” “His name is not on my list

7 A Rude Interruption A tall, bald man shouts out … “Wait, Wait! Hold on a second! I’ll ask the questions… If you want the real problems with Economics, let’s not have any canned questions here!”

8 The Gotchas! Who would agree to such onerous terms? I won’t pay to keep in touch with customers. How can I deal with demands of every recipient? If every value floats, what’s my total liability? Can a recipient collect all the time? So now I get rich spammers?! Spam comes from Zombies What about adoption?

9 The ‘Perfect’ Mailing List 10,000 creditors lost $2,000 each 80% lost to filters and challenges Sender wants $100 liability limit 2000 are ‘aware’ of relevance guarantee $100 is insufficient… Risk/Cost: $750 / $14 Apply ‘1:50’ and Vanity rules: $500 / $2 ~ 5¢ each and seizure rate of 0.4%

10 Four Pieces of Magic Personal Interrupt Value: ‘Bid for Attention’ Risk – Trust Conversion Feedback (‘Risk Rules’ stop recipient scam) 1:50 Rule Vanity Rule Age of credentials The Two Sided Network Effect

11 Personal Interrupt Value

12 Fungible: Risk & Personal Trust You are trusted, if… I have written to you before and have never penalized your previous messages. I have not revoked your trusted status It’s not the sender’s identity that counts (useful only for friends)… It’s the fact that they are trusted or at risk

13 Join the Initiative Become part of the solution: Sponsor the ‘Free Ap’ MIT Paper / Slides / Animation / Programmer Forum or Learn about the company that is pioneering R&D Creators of the Message Verification Platform