Call avoidance

Last updated

Call avoidance is a strategy businesses use to reduce inbound call volumes to contact centers in the customer service industry, particularly in the consumer market.

Contents

Basis

Businesses choose call avoidance techniques because person-to-person service calls are time-consuming[ citation needed ] and costly[ citation needed ] and should be accessed only when there is no viable option. Voice calls can then be reserved for high priority customers, complex service requests, or emergency situations where the quick response of skilled phone agents is essential.

Concerns

It is impractical[ citation needed ] and expensive[ citation needed ] for call centers to provide a live answer for every caller during peak demand periods such as certain times of the day, days of the week, or seasons. Callers in urgent need to discuss an issue with a live person are typically put on hold along with callers whose request could be better served through other channels. Both are competing for valuable talk time.

Strategies

With the spread of the Internet and email access, contact centers are moving toward self services[ citation needed ] via a searchable knowledgebase, Interactive Voice Response (IVR), or computer generated emails. Password resets are the most popular[ citation needed ] form of website self-service where clients are asked pre-established confidential questions that verify credentials before the system sends them a temporary password. Other typical areas to employ call avoidance strategies include the following:

See also

Related Research Articles

<span class="mw-page-title-main">Reference desk</span> Public service counter in a library

The reference desk or information desk of a library is a public service counter where professional librarians provide library users with direction to library materials, advice on library collections and services, and expertise on multiple kinds of information from multiple sources.

An automated call distribution system, commonly known as automatic call distributor (ACD), is a telephony device that answers and distributes incoming calls to a specific group of terminals or agents within an organization. ACDs direct calls based on parameters that may include the caller's telephone number, the number they dialed, the time of day or a response to an automated voice prompt. Advanced ACD systems may use digital technologies such as Computer telephony integration (CTI), computer-supported telecommunications applications (CSTA) or IVR as input to determine the route to a person or voice announcement that will serve the caller. Experts claim that "the invention of ACD technology made the concept of a call centre possible."

Enhanced 911, E-911 or E911 is a system used in North America to automatically provide the caller's location to 911 dispatchers. 911 is the universal emergency telephone number in the region. In the European Union, a similar system exists known as E112 and known as eCall when called by a vehicle.

Interactive voice response (IVR) is a technology that allows telephone users to interact with a computer-operated telephone system through the use of voice and DTMF tones input with a keypad. In telecommunications, IVR allows customers to interact with a company's host system via a telephone keypad or by speech recognition, after which services can be inquired about through the IVR dialogue. IVR systems can respond with pre-recorded or dynamically generated audio to further direct users on how to proceed. IVR systems deployed in the network are sized to handle large call volumes and also used for outbound calling as IVR systems are more intelligent than many predictive dialer systems.

<span class="mw-page-title-main">999 (emergency telephone number)</span> Emergency number in several countries

999 is an official emergency telephone number in a number of countries which allows the caller to contact emergency services for urgent assistance. Countries and territories using the number include Bahrain, Bangladesh, Botswana, Eswatini, Ghana, Guernsey, Hong Kong, Ireland, Isle of Man, Jersey, Kenya, Macau, Malaysia, Mauritius, Poland, Qatar, Sudan, Saudi Arabia, Singapore, Trinidad and Tobago, Seychelles, Uganda, the United Arab Emirates, the United Kingdom, and Zimbabwe.

<span class="mw-page-title-main">Voicemail</span> Voice message storage and retrieval

A voicemail system is a computer-based system that allows users and subscribers to exchange personal voice messages; to select and deliver voice information; and to process transactions relating to individuals, organizations, products, and services, using an ordinary phone. The term is also used more broadly to denote any system of conveying a stored telecommunications voice messages, including using an answering machine. Most cell phone services offer voicemail as a basic feature; many corporate private branch exchanges include versatile internal voice-messaging services, and *98 vertical service code subscription is available to most individual and small business landline subscribers.

A dialer or dialler is an electronic device that is connected to a telephone line to monitor the dialed numbers and alter them to seamlessly provide services that otherwise require lengthy National or International access codes to be dialed. A dialer automatically inserts and modifies the numbers depending on the time of day, country or area code dialed, allowing the user to subscribe to the service providers who offer the best rates. For example, a dialer could be programmed to use one service provider for international calls and another for cellular calls. This process is known as prefix insertion or least cost routing. A line powered dialer does not need any external power but instead takes the power it needs from the telephone line.

Phone fraud, or more generally communications fraud, is the use of telecommunications products or services with the intention of illegally acquiring money from, or failing to pay, a telecommunication company or its customers.

<span class="mw-page-title-main">Social engineering (security)</span> Psychological manipulation of people into performing actions or divulging confidential information

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme. It has also been defined as "any act that influences a person to take an action that may or may not be in their best interests."

Email marketing is the act of sending a commercial message, typically to a group of people, using email. In its broadest sense, every email sent to a potential or current customer could be considered email marketing. It involves using email to send advertisements, request business, or solicit sales or donations. Email marketing strategies commonly seek to achieve one or more of three primary objectives, to build loyalty, trust, or brand awareness. The term usually refers to sending email messages with the purpose of enhancing a merchant's relationship with current or previous customers, encouraging customer loyalty and repeat business, acquiring new customers or convincing current customers to purchase something immediately, and sharing third-party ads.

Help desk and incident reporting auditing is an examination of the controls within the help desk operations. The audit process collects and evaluates evidence of an organization's help desk and incident reporting practices, and operations. The audit ensures that all problems reported by users have been adequately documented and that controls exist so that only authorized staff can archive the users’ entries. It also determine if there are sufficient controls to escalate issues according to priority.

Self-service password reset (SSPR) is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk. It is a common feature in identity management software and often bundled in the same software package as a password synchronization capability.

An issue tracking system is a computer software package that manages and maintains lists of issues. Issue tracking systems are generally used in collaborative settings, especially in large or distributed collaborations, but can also be employed by individuals as part of a time management or personal productivity regimen. These systems often encompass resource allocation, time accounting, priority management, and oversight workflow in addition to implementing a centralized issue registry.

<span class="mw-page-title-main">Dialogue system</span>

A dialogue system, or conversational agent (CA), is a computer system intended to converse with a human. Dialogue systems employed one or more of text, speech, graphics, haptics, gestures, and other modes for communication on both the input and output channel.

Voice phishing, or vishing, is the use of telephony to conduct phishing attacks.

Automated telephone surveys is a systematic collection a data from demography by making calls automatically to the preset list of respondents at the aim of collecting information and gain feedback via the telephone and the internet. Automated surveys are used for customer research purposes by call centres for customer relationship management and performance management purposes. They are also used for political polling, market research and job satisfaction surveying.

Call management is the process of designing and implementing inbound telephone call parameters, which govern the routing of these calls through a network. The process is most prominently utilized by corporations and the call centre industry and has its highest effectiveness when call logging software tools are used. Calls are routed according to the set up of calling features within the given system such as Call queues, IVR menus, Hunt groups and Recorded announcements. Call features provide a customised experience for the caller and maximize the efficiency of inbound call handling. Call management parameters can specify how calls are distributed according to an operator's skill level in relation to a call, the time and/or date of a call, the location of the caller or through automatic routing processes.

A recent extension to the cultural relationship with death is the increasing number of people who die having created a large amount of digital content, such as social media profiles, that will remain after death. This may result in concern and confusion, because of automated features of dormant accounts, uncertainty of the deceased's preferences that profiles be deleted or left as a memorial, and whether information that may violate the deceased's privacy should be made accessible to family.

Help desk software is a computer program that enables customer-care operators to keep track of user requests and deal with other customer-care-related issues.

Data center management is the collection of tasks performed by those responsible for managing ongoing operation of a data center. This includes Business service management and planning for the future.