Tuesday, April 14, 2009

Tuesday, April 14, 2009
HOME ASSIGNMENT

Chapter 07: Telecommunications, the Internet, and Wireless Technology

MIS IN ACTION (page no 335)


Q1: Describe some RFID applications that might pose a threat to privacy. What information does RFID enable them to track?

Answer:
In layman terms, RFID is a tracking device. This system is placed in a very tiny, portable device known as a tag and attached discretely to things. When activated it provides identification or location information or any other specifics about the tagged product, depending upon the programming done.
The feasibility of using RFID systems over bar codes for products is immense. While bar codes have historically been the primary means of tracking products, RFID systems are rapidly becoming the preferred technology for keeping tabs on people, pets, products, and even vehicles. One reason for this is because the read/write capability of an active RFID system enables the use of interactive applications. Also, the tags can be read from a distance and through a variety of substances such as snow, fog, ice, or paint, where bar codes have proved useless.

The website describes the notoriety of the RFID systems. The main use of this technology has been to identify and understand the behavior of consumers and the motives behind their purchases. Products embedded with RFID tags can continuously transmit information ranging from an electronic product code (EPC) identifier, to information about the item itself, such as consumption status or product freshness. Data processing systems read and compile this information, and can even link the product information with a specific consumer. This composite information is vastly superior—and more invasive—than any data that could be obtained from scanning bar codes. RFID systems enable tagged objects to speak to electronic readers over the course of a product's lifetime—from production to disposal—providing retailers with an unblinking, in depth view of consumer attitudes and purchase behavior.
Such a detailed and unwarranted information regarding the users of tagged producers in considered a breech of privacy. RFID systems is integrated into several products. The information these devices provide question the ethics of gaining personal information without consent. Following are some such devices:
  • Tracking apparel: Clothing retail items can be embedded with RFID tags. The implanted devices enables the retailer to track individuals and inventory their belongings by linking a consumer's name and credit card information with the serial number in an item of clothing.
  • Tracking consumer packaged goods (CPGs): This is an innovative invention to develop "smart shelves", which allows for real-time tracking of inventory levels.
  • Tracking tires: This is a radio frequency tire identification system for passenger and light truck tires. The RFID transponder is manufactured into the tire and stores tire identification information, which can be associated with the vehicle identification number (VIN). The tags could ultimately become tracking devices that can tell where and when a vehicle is traveling.
  • Tracking currency: RFID tags as thin as a human hair can be embedded into the fibers bank notes. The tags would allow currency to record information about each transaction in which it is passed. Governments and law enforcement agencies hail the technology as a means of preventing money-laundering, black-market transactions, and even bribery demands for unmarked bills.
  • Tracking patients and personnel: This system, all patients, visitors, and staff entering the hospital are issued a card embedded with an RFID chip. The card is read by sensors installed in the ceiling, which record exactly when a person enters and leaves the department.
  • Payment systems: This system implements radio frequency (RF) in wireless payment systems. This can enable RFID communication between PCs, handheld computers, and other electronic devices.

(DISCLAIMER: The information for this answer has been quoted and used from the official RFID systems website : http://epic.org/privacy/rfid/)


Q2. How do these applications threaten personal privacy? How serious is this threat?

Answer:
RIFD tags have the powerful intelligence of reading RFID tags attached to any retail product or cards in the wallet. The breach to consumer privacy is the biggest threat. Retailers can easily can complete consumer profiles, information about their lifestyles, they places they visit and activities they do. And all of this is done without the consent of the consumer! This is a violation of the fundamental human right: the right to live! Privacy is defined as the choice of being left alone. It is the freedom of not being known to others.

There is growing recognition that the same RFID application which is employed ostensibly to prevent counterfeiting or the theft of cash or goods could also be used to track an individual’s spending habits, preferences and even physical movements.

The potential for RFID to be used to target individuals - not just to check stock levels or ensure baggage does not get lost in transit - is made more serious by the issue of access. Not only will the deployer of an RFID tag, such as a retailer, be able to access the information contained in a tag, but anyone with the right equipment will also be able to do so.

From a privacy standpoint, the current simplicity of the tag’s response, which does not differentiate between requests based on origin or identity, is a flaw. Thieves could use the tags to locate the whereabouts of valuables and interested persons could obtain access to another’s medical records or passport details, or trace another’s spending habits or physical movements.

(DISCLAIMER: The information for this answer has been quoted and used from the website http://www.computerweekly.com/Articles/2005/04/04/209248/rfid-a-threat-to-privacy.htm)


Q3: Should these RFID applications be deployed? Why or why not? Justify your answer.

This is a very controversial issue. Like any other technology, it has its own pros and cons. The benefits of using this technology results in better business operation efficienvy and profitablity. Due to it's pontential of breaching privacy the use must be defined and contained by certain norms and guidelines. These guidelines can be veiwed by accessing this link: http://epic.org/privacy/rfid/rfid_gdlnes-070904.pdf If these guidelines are ethically followed then there is no harm in using RFID systems. Bodies to regulate the use must be established, and penalties for misuse must be set. Then only the use of RFID systems can lead to a sound social and economic advancement.

0 comments:

Post a Comment

 
◄Design by Pocket