Skip to main content

Home/ ITGS News/ Group items tagged RFID

Rss Feed Group items tagged

sarah d

What's Lurking in That RFID Tag? - 2 views

  •  
    After the professor of computer science and technical director of the Information Security Institute at Johns Hopkins University and his students broke the encryption of a popular RFID system in car keys, it was apparent that there is a security issue when it comes to the use of RFIDs. The stakeholders are consumers who use products that have radio frequency identification systems embedded in them. As seen from the experiment done by the professor and his students, people can have their cars broken if the encryption of this identification is broken. The area of impact is business because this identification is on items sold in stores. The IT system is RFIDs, which are radio frequency identification. These forms of identification are similar to bar codes because when scanned can show people the price of items. However, being more advanced, RFIDs also show what the item is, the trends in sales and much more.
Mark Gakin

RFID Business Applications - 2 views

  •  
    RFID, radio frequency identification, is changing the ways companies and organizations operate. For the first time, they can create value in their products. In simpler terms, RFID is enabling companies to do so many different things they could not do before. It's important to know that RFID is used to identify people and objects. Each RFID tag has a tiny microchip within its body that can be recognized by a reader antenna. Even though this is bringing more business to companies because they have made it possible to shop much easier, it also is bringing them many issues because these antennas are permanently integrated into the tag, which can be tracked from anywhere. Given that the shopper purchased the item, the item can also be traced back to the shopper at any given time. Things like this can be dangerous in the real world because people's privacy becomes at stake. Either way, shopping is so much easier now thanks to RFIDs. The truth is, it's only a matter of time before they become a real problem.
helen g

RFID Applications in Supply Chain Management | RCD Technology - 1 views

  •  
    This article talks about the many uses of RFID in Supply Chain Management. There are various ways which businesses are benefited by RFID. In distribution, the ability to track the location of a product is very beneficial for both customers and businesses selling an item. The same tactic is also used with cargo and other items being moved, whether the distance is long or short. This is a useful application of RFID and also a cost efficient way of executing this procedure. Inventory counting is also made alot easier through RFID, since the product count is automatically updated. In the realm of retail and marketing.
T Graham

Credit Cards At Risk from High-Tech Pickpockets? - CBS News - 2 views

  •  
    In this article Walt Augustinowicz has shown and proved many people in the public how they can be pick pocketed with out a single finger being laid upon them. They can have their credit cards, debit cards, and passports information stolen quite easily with a simply passing by of the scanner. With this advanced technology that makes paying for things easier, also makes it easier for others to pay for their things using the same card. The card number, the expiration date, the type of card, and even the person's name can be found out. This can show how the social/ethical issue involved is thus privacy - security is another possible issue. The IT system is the RFID tags/microchips. The stakeholders are the people whose information is getting stolen and the people who are stealing the information - people who make the RFID tags/microchips are also possible stakeholders. The area of impact is politics and government - but also can be business and employment. People's private information is at stake and electronic pickpockets can easily steal the information and order products.
  •  
    This article talks about the security concerns related to RFID technology. RFID technology is susceptible to theft because it broadcasts radio frequencies about the information embedded in the card. This makes it very easy for thieves in possession of a card reader. A person with intent to steal information could just walk past a card carrier with a card reader and pick up the theft victim's credit card numbers, expiration dates and sometimes even the card owner's name. 20% of the card information that was stolen in an experiment has RFID chips. RFID technology increases the chance of identity theft, even passports have RFID implemented in them, this makes them very vulnerable. Passports carry very sensitive information and anyone with a RFID card scanner could wake pass a passport carrier and gain his or her personal information. The stakeholders in this issue include the card carrier or passport carrier whose security is endangered, the information thief who is gaining unauthorized access to a person's personal information and the businesses such as Visa or MasterCard whose reliability is being endangered. This is a security issue that has hampered the positive buzz surrounding RFID technology and its convenience.
Jackie C

RFID tags: Big Brother in small packages - 1 views

  •  
    A relatively old news article, that details concerns and issues about RFID tags that remain relevant, or have become more relevant over time. The article clearly defines law enforcement agents, criminals, marketing corporations, and the average consumer as stakeholders in the development and widespread use of RFID tags. The article describes the issue of privacy and unauthorized or undetected monitoring, whether for illegal use or law enforcement or for marketing schemes as rising from the continued functionality of RFID tags after they have served their purpose -- outside of the stores and past the RFID scanners. The article mentions several concerns, including the more widespread adoption of long-range RFID scanners by non-commercial groups or people, and their ability to be used as an invasion of privacy. Evidently, the technology that makes the continued functionality of RFID tags a privacy issue is in the way that each tag, which can be as small as a few centimeters long, can store various bits of data, such as when the item was bought, where the item was bought, for what price, and who bought it, in combination with the ability to use long-range RFID scanners to scan and detect this information outside of a store.
Kristin O

BBC NEWS | Technology | Consumer concern over RFID tags - 1 views

  •  
    This article talks about the security concerns that the customers of a supermarkets have with the use of RFID technology. They feel that the RFID technology is to invasive and can be used to track where abouts of items after they have been purchased at the store.
Santiago P.

RFID: Protection, privacy and prevention - sourcefire, security, rsa, RFID, intermec - ARN - 1 views

  •  
    RFID is a very valuable and new technology, that promises to bring many advantages to the business world, which is the main area of impact being addressed. RFID is the IT being discussed. It permits people to gain access to goods, data on products, and important financial data. There is, however, the concern over the issue of security and privacy, which go hand in hand. Stakeholders in the issue are normal people, who increasingly are surrounded by RFID tags, especially in their credit cards. Tags can also be used to track a person's movement, which some claim is an invasion of privacy. Defenders claim that most RFID tags are incapable of being read or trasmit data from up to 50 cm. However, this does depend on the tag's antenna and the encryption it may or may not use to protect its data. There is the continual concern however, that RFID tags will handle more sensitive data as its capabilities improve.

    The fact that RFID tags store information on databases is also a concern for privacy advocates. An RFID tag uploads onto the database information on financial transactions, buying, selling, etc. The location, time, and other information is stored on a log in the database. The RFID is essentially tracking users' movement. The security concern, which is more consequential to users, is what is done when the database that contains all the sensitive information is hacked or damaged, and security is breached. Such concerns and these issues' impacts are obviously paramount when dealing with RFID tags and the issues of privacy and security.
Karen M

Visa Introduces a Credit Card on a Phone - NYTimes.com - 1 views

  •  
    In this article, RFID is being used in the business world. People are now able to purchase phones with the capability of making purchases by moving it over the terminal. RFID technology allows people to stop using credit cards, making the process of buying something even more convenient. The stakeholders are the credit card companies, the people using this new technology, and the stores with the terminals that read RFID. Credit card companies need to have a good security system to ensure their customers and users that their information will be kept safe on the RFID chip. The people who are switching to this new technology are risking their private information for convenience. The stores with these new RFID terminals are also risking their customers' private information because there is a possibility that their system could be hacked. The area of impact is Business and Employment. Businesses are switching to this new technology because it is convenient for them as well as their customers. The main issues that arise from using RFID are security and reliability. The RFID terminal needs to be reliable so that every customer is able to use the RFID chip on their phone to make purchases. The security issue is that a hacker may be able to get into the system to read customers' private information. It may also be possible for a hacker to carry around a portable terminal that would be able to store people's private information on it for future usage. The security system described in this article sounds like a good start, but more needs to be done to keep up with the technology that is growing along with it.
Elisavet M

TECHNOLOGY; Companies in Radio Tag Business Broaden Legal Dispute - 0 views

  •  
    Discussion about the agreement to integrate the new process of product tracking in company supply chains (RFID technology), continues to widely expand and challenge the business mentality as it has become reinforced by major companies such as Wal Mart and the Defense Department. A dispute transpired between two alliance companies, Symbol (a leader in bar code systems) and Intermec, as both were unable to consider possessing concurrence upon licensing proposals for RFID technology usefulness. Initially, Intermec Technologies, accused Symbol of infringement transgressions in regards to six Intermec patents that were being sold by Symbol; such products included the utilization of RFID technology, an investment that was supported upon by both business partnerships. Such accusations had been followed after Symbol had also charged Intermec for infringing patents including Wi-Fi technology. The issue of integrity as well as reliability resurfaces in this particular case, directly conveying the disadvantages of business collaboration, that must embed mutuality in justly managing shared information, equality of confidentiality and a clear understanding about each businesses' ideas and plans for profit purposes. It is significant to have fluidity in exchanging perspectives, in order to establish a solid foundation of trust that stands as a promise to future investments and processes.
Jaymee C

AMA Issues Ethics Code for RFID Chip Implants - RFID Journal - 0 views

  • physicians should strive to protect patients' privacy by storing confidential information only on RFID devices utilizing informational security similar to that required for medical records
    • Jaymee C
       
      Though physicians may try to protect the privacy of the patient there is still the chance of it being broken. If some other person holding the reader for the RFID impant happened to pass the patient then they would be able to see that persons person information.
Michael M

WALGREENS RFID TRACKING PLANS STIR CONTROVERSY - Advertising Age - News - 0 views

  •  
    This article strikes the seam that privacy is invaded by those who buy things in stores that are tracked by RFID tags. There are many times that people actually were tracked, two cases in fact, and thus their privacy was breached by the store itself. The group Consumers Against Supermarket Privacy Invasion and Numbering are currently fighting against this so that they make sure that the people have the rights that they deserve, but many stores refuse to bow down.
Madeline Brownstone

BBC NEWS | Health | 'Hospital risk' from radio tags - 0 views

  •  
    Good background on RFID
Madeline Brownstone

Is RFID tracking you? - CNN.com - 0 views

  •  
    Too old for lead article, but informative.
Madeline Brownstone

Group items tagged ITGS10-P2 - ITGS_Portfolio | Diigo Groups - 1 views

  •  
    Informative, but not good for lead article.
  •  
    Very informative article that covers positive impacts of RFID tagging in hospitials.
Madeline Brownstone

Business & Technology | UW team researches a future filled with RFID chips | Seattle Ti... - 2 views

  •  
    Potentially a lead article. Needs to be checked further.
Madeline Brownstone

BBC NEWS | Technology | Public to shape smart tag policy - 0 views

  •  
    The stakeholders may eventually draft new regulations to police the tags, but, for now, the commission proposes no new laws to govern their use.
  •  
    The stakeholders may eventually draft new regulations to police the tags, but, for now, the commission proposes no new laws to govern their use.
Madeline Brownstone

What is a Standard - 0 views

  • Nomenclature is challenging because "technical specification" has different meanings in different areas of the world.  For example, a technical specification in CEN is a lower grade, less permanent deliverable likely to be revised.  A standard, on the other hand, is intended to be stable and products shall conform to the requirements.
    • Madeline Brownstone
       
      Standard is more stable than a technical specification.
  • to limit how a specific technology will be used to carry or represent the data.
  • GS1’s Global Trade Identification Number (GTIN) is an example of a high-level application standard that is completely independent of a technical specification because it can be applied regardless of whether bar code, RFID or even human-readable characters are used to represent it.
    • Madeline Brownstone
       
      GTIN standard is independent--can be used with bar code, RFID or human-readable characters
  •  
    Technology Standards vs Application Standard
Madeline Brownstone

Healthcare Standards Development - 0 views

  • facilitate electronic communications by developing appropriate standards for information exchange among all health care trading partners.
  • ncluding electronic data interchange message formats, bar code labeling data standards, universal numbering systems, and the provision of databases which assure common identifiers.
  • Standardized manufacturer, customer, and product identification codes, including the Labeler Identification Code (LIC), Health Industry Number (HIN®), and Universal Product Number (UPN®) and the Health Industry Bar Code (HIBC) Standards
    • Madeline Brownstone
       
      Labeler Identification Code (LIC)
      Health Industry Number (HIN®)
      Universal Product Number (UPN®)
      Health Industry Bar Code (HIBC)
  •  
    Healthcare Standards Development
Madeline Brownstone

RFID Casestudies - 1 views

  •  
    Excellent selection of case studies in all areas of impact
Madeline Brownstone

RFID - The Technology - 1 views

  • Another form of tag is often called the smart label. This is really a paper (or similar material) label with printing, but also with an RFID tag embedded in it. Examples are shown below (with the antenna structure shown in the corner).
  •  
    Basics on how RFID works\nALSO: RFID embedded in paper labels such as baggage tags
1 - 20 of 21 Next ›
Showing 20 items per page