1-Describe some RFID applications that might pose a threat to privacy. What information does RFID enable them to track?
One of the challenges involves the fact that an RFID tag can identify an item uniquely. A bar code, in contrast, identifies an item as a particular type of product but doesn’t distinguish it from identical products on the store shelf.
Thus, when a customer walks out of a store with a pair of RFID-tagged shoes, the tag (if not removed or disabled) could forever identify those shoes as being a particular brand from a particular store purchased for a particular price. consumers may not always know they are carrying RFID tags or that someone else is reading information from the tags.This could allow businesses to target customers with custom advertisements as they walk through a store. You and your items could also be tracked after you’ve bought them, as you carry your shopping bag into another section of a department store or to a different store owned by the same conglomerate (for instance, if you leave The Gap and go to Old Navy).
The use of RFID in tracking and access applications first appeared during the 1980s. RFID quickly gained attention because of its ability to track moving objects.RFID tags come in a wide variety of shapes and sizes. Some tags are easy to spot, such as the hard plastic anti-theft tags attached to merchandise in stores, animal tracking systems, vehicles, people or even currency.RFID systems may be roughly grouped into four categories:
EAS (Electronic Article Surveillance) systems: Generally used in retail stores to sense the presence or absence of an item. Products are tagged and large antenna readers are placed at each exit of the store to detect unauthorized removal of the item.
Portable Data Capture systems: Characterized by the use of portable RFID readers, which enables this system to be used in variable settings.
Networked systems: Characterized by fixed position readers which are connected directly to a centralized information management system, while transponders are positioned on people or moveable items.
Positioning systems: Used for automated location identification of tagged items or vehiclesRFID systems enable business owners to have real-time access to inventory information, as well as a broader, clearer picture of consumers' buying habits. RFID technology also enables retailers and corporations to peek into the lives of consumers in ways that were, until recently, off limits.
2. How do these applications threaten personal privacy? how serious is this threat?
The most serious threat is the fact that RFID tags affixed to products remain functional even after the products have been purchased and taken home and thus can be used for surveillance and other purposes unrelated to their supply chain inventory functions, which leaves chances of surveillance and poses a threat to privacy. The personal information becomes vulnerable.
The threat is quite serious as people are unaware to what extent companies go to analyze the people. However recently at the World Security Information Summit steps were taken to curb this activity and make people aware of the growing trends in the world.
there are always abusers of technology out there and if there are no checks and balances in the use of this technology , we as human beings will have no sense of privacy at all.
3. Should these RFIP applications be deployed? Why or why not? Justify your answer.
These applications threaten privacy in some cases such as attaching RFIDs in apparrel which would enable companies to know our cloth wearing preferences and the frequency of the different tytpe of clothes that we wear and in car tires or in other retail items where companies would be able to monitor the freshness etc of a product that would be classified under directly invading the consumer's privacy without his or her consent which is why I am of the opinion that these RFID applications should not be installed or set up.
The trust between a consumer and the other party has to exist and itshould only be deployed where the long run benefits are greater then the costs. RFID equipment is usually a one-time investment. Recurring costs associated with the equipment may be incurred, though. These include licensing, upgrades, and maintenance costs.
With the way the world is moving, that is, in terms of wrong-doing and other criminal activity, such tags will most definitely be misused - used as readers, unwanted trackers and identifiers for people and objects, and only used to propagate further lies and deception. Hence, for the sake of protection and sanctity of individual rights and freedom, they should not be deployed.
Thus,i believe that a human being's personal life should always be given the highest priority..all religions and cultures around the world consider the right of privacy as an important pillar of ethics and fairness.
Tuesday, April 14, 2009
Subscribe to:
Post Comments (Atom)

No comments:
Post a Comment