SlideShare une entreprise Scribd logo
1  sur  5
PRE-PAID TELEPHONE THEFT PROTECTION-PTTP ,[object Object]
What is the target problem or need? Who has it?  Every telephone User How is the problem currently addressed and where is the potential to do better?  Currently the following are available: SIM change detection:  Detects unauthorized SIM change and alerts you to any new number assigned to the device Tamper proof  :Once tracking is activated the software settings cannot be modified unless deactivated Secure encrypted backup  : Photos and contacts are encrypted and uploaded and stored online securely Remote data wipe : Remotely wipe personal data stored on your device and media card Advanced hybrid positioning: We use a combination of GPS, Wi-Fi positioning and cell tower triangulation to track location Device alarm: If your device is lost or stolen you can remotely enable a piercing alarm, even if it's in silent mode   PTTP: as a renewable pre-paid annual plan prepares you for the future, and enables you access pictures, telephone call history, messages used on the device for the first 3weeks of use after it has been stolen, it also sends a continuous disturbing pop-up message to phone, saying  it has been stolen, with information on how to return it and where, which  can only be deactivated by the original owner’s code/Pin. This is installed and activated by a microworker. Smartphones  are used  by millions of people around the world for everything from taking photos, storing contacts, business documents and other sensitive information. What if your device was lost or stolen, what would it mean to you or your business? Not only is it the loss of an expensive device, but also your data, which can be priceless.  Theft victims will spend money in out-of-pocket expenses and days in efforts to resolve the many problems caused by this crime
D Why and how should the problem be addressed through microwork in the developing world ? Loosing a Telephone set is quiet a painful experience , one is made to loose  photos, contacts, business documents and other sensitive information at one moment, one looses expectations ans is made in certain terms to start all over again if this information cannot be recovered, while the thief wipes it off without any sense of morality and pity inconsiderate of the adverse effect this would have on the original owner.  Ofcourse, there are several measures to backup information in recent times but this measures are not popular to everyone.  Through Micro work, one is sure to be approached anywhere, anytime by a micro worker and asked to subscribe. Kiosk,stands and small office locations can be setup to enable passersby stop by to secure their telephone. This will reduce telephone theft drastically as criminals will now be aware they can be seen, traced and caught without much work.  The phone in question becomes impossible  to sell or use when the owner activates the PTTP. BENEFITS 1.Good health as may be affected by loss 2. Crime reduction rate  3. Job creation 4. Information security
How might the problem be broken up into small microtasks ? Microworkers are recruited and trained on how to educate, register subscribers telephones and  transfer the PTTP to Telephone user’s phone accepting this service. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
c.Do the workers need to have any particular skills or resources?   No they will go through an organized training to enable anyone above 18 and above join the team. d.What is the business model? Who pays and how can the workers be compensated?  PTTP is a service that offers the general public access to  TELEPHONE THEFT PROTECTION  at a  highly discounted rate. In  the standard scenario, a subscriber to PTTP pays a fixed sum of money  Annually to the service provider or administrator debited from call credit on telephone on acceptance to subscribe. It can be viewed as property/information Insurance’ and no different from legal or medical insurance ina (Standard Plan of ONEYEAR) . Finally,PTTP simply implies that the  TELEPHONE THEFT PROTECTION  desired by a subscriber is Pre Paid by the subscriber.   The mobile service provider will share with the revenue generated by  PTTP, who in turn pays the micro workers once a week through stipulated  account. This project will be carried out in conjunction with a law enforcement agency to take over investigations and retrieve telephone and arrest culprit. The world stands protected from the society ills with this.

Contenu connexe

Similaire à M2 works

Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossWireless Solutions NY
 
Top 5 mistakes in managing business mobility
Top 5 mistakes in managing business mobilityTop 5 mistakes in managing business mobility
Top 5 mistakes in managing business mobilitySergey Gerashchenko
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloninghcls
 
Mobile banking issues in banking and insurance
Mobile banking issues in banking and insuranceMobile banking issues in banking and insurance
Mobile banking issues in banking and insuranceKumarrebal
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
smart guide to compliant call recording
smart guide to compliant call recordingsmart guide to compliant call recording
smart guide to compliant call recordingmParticle
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur guptaAankur Gupta
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
UPK - Universal Pass Key General Overview
UPK - Universal Pass Key General OverviewUPK - Universal Pass Key General Overview
UPK - Universal Pass Key General OverviewUniversalPassKey
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
keyfetch Metal KF Promotional Presentation
keyfetch Metal KF Promotional Presentationkeyfetch Metal KF Promotional Presentation
keyfetch Metal KF Promotional Presentationsam wong
 
Stolen and Lost Wireless Devices
Stolen and Lost Wireless DevicesStolen and Lost Wireless Devices
Stolen and Lost Wireless Devices- Mark - Fullbright
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?Miradore
 

Similaire à M2 works (20)

Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
 
App Spy
App SpyApp Spy
App Spy
 
Top 5 mistakes in managing business mobility
Top 5 mistakes in managing business mobilityTop 5 mistakes in managing business mobility
Top 5 mistakes in managing business mobility
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
Mis ppt
Mis pptMis ppt
Mis ppt
 
Mobile banking issues in banking and insurance
Mobile banking issues in banking and insuranceMobile banking issues in banking and insurance
Mobile banking issues in banking and insurance
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
smart guide to compliant call recording
smart guide to compliant call recordingsmart guide to compliant call recording
smart guide to compliant call recording
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
UPK - Universal Pass Key General Overview
UPK - Universal Pass Key General OverviewUPK - Universal Pass Key General Overview
UPK - Universal Pass Key General Overview
 
Phone cloning
Phone cloning Phone cloning
Phone cloning
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
keyfetch Metal KF Promotional Presentation
keyfetch Metal KF Promotional Presentationkeyfetch Metal KF Promotional Presentation
keyfetch Metal KF Promotional Presentation
 
Stolen and Lost Wireless Devices
Stolen and Lost Wireless DevicesStolen and Lost Wireless Devices
Stolen and Lost Wireless Devices
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
 
Mobile wallet security
Mobile wallet securityMobile wallet security
Mobile wallet security
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 

Dernier

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

M2 works

  • 1.
  • 2. What is the target problem or need? Who has it? Every telephone User How is the problem currently addressed and where is the potential to do better? Currently the following are available: SIM change detection: Detects unauthorized SIM change and alerts you to any new number assigned to the device Tamper proof :Once tracking is activated the software settings cannot be modified unless deactivated Secure encrypted backup : Photos and contacts are encrypted and uploaded and stored online securely Remote data wipe : Remotely wipe personal data stored on your device and media card Advanced hybrid positioning: We use a combination of GPS, Wi-Fi positioning and cell tower triangulation to track location Device alarm: If your device is lost or stolen you can remotely enable a piercing alarm, even if it's in silent mode   PTTP: as a renewable pre-paid annual plan prepares you for the future, and enables you access pictures, telephone call history, messages used on the device for the first 3weeks of use after it has been stolen, it also sends a continuous disturbing pop-up message to phone, saying it has been stolen, with information on how to return it and where, which can only be deactivated by the original owner’s code/Pin. This is installed and activated by a microworker. Smartphones are used by millions of people around the world for everything from taking photos, storing contacts, business documents and other sensitive information. What if your device was lost or stolen, what would it mean to you or your business? Not only is it the loss of an expensive device, but also your data, which can be priceless. Theft victims will spend money in out-of-pocket expenses and days in efforts to resolve the many problems caused by this crime
  • 3. D Why and how should the problem be addressed through microwork in the developing world ? Loosing a Telephone set is quiet a painful experience , one is made to loose photos, contacts, business documents and other sensitive information at one moment, one looses expectations ans is made in certain terms to start all over again if this information cannot be recovered, while the thief wipes it off without any sense of morality and pity inconsiderate of the adverse effect this would have on the original owner. Ofcourse, there are several measures to backup information in recent times but this measures are not popular to everyone. Through Micro work, one is sure to be approached anywhere, anytime by a micro worker and asked to subscribe. Kiosk,stands and small office locations can be setup to enable passersby stop by to secure their telephone. This will reduce telephone theft drastically as criminals will now be aware they can be seen, traced and caught without much work. The phone in question becomes impossible to sell or use when the owner activates the PTTP. BENEFITS 1.Good health as may be affected by loss 2. Crime reduction rate 3. Job creation 4. Information security
  • 4.
  • 5. c.Do the workers need to have any particular skills or resources?   No they will go through an organized training to enable anyone above 18 and above join the team. d.What is the business model? Who pays and how can the workers be compensated?  PTTP is a service that offers the general public access to TELEPHONE THEFT PROTECTION at a highly discounted rate. In the standard scenario, a subscriber to PTTP pays a fixed sum of money Annually to the service provider or administrator debited from call credit on telephone on acceptance to subscribe. It can be viewed as property/information Insurance’ and no different from legal or medical insurance ina (Standard Plan of ONEYEAR) . Finally,PTTP simply implies that the TELEPHONE THEFT PROTECTION desired by a subscriber is Pre Paid by the subscriber.   The mobile service provider will share with the revenue generated by PTTP, who in turn pays the micro workers once a week through stipulated account. This project will be carried out in conjunction with a law enforcement agency to take over investigations and retrieve telephone and arrest culprit. The world stands protected from the society ills with this.