Mental models: towards a cognitive science of language, inference, and consciousness
Mental models: towards a cognitive science of language, inference, and consciousness
Foundations of cognitive science
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Design for privacy in ubiquitous computing environments
ECSCW'93 Proceedings of the third conference on European Conference on Computer-Supported Cooperative Work
Vulnerabilities in first-generation RFID-enabled credit cards
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond
Proceedings of the 16th ACM conference on Computer and communications security
Rethinking RFID: awareness and control for interaction with RFID systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Visible and controllable RFID tags
CHI '10 Extended Abstracts on Human Factors in Computing Systems
Hi-index | 0.00 |
While extant for decades in the industrial sector, radio frequency identification (RFID) technology is increasingly being incorporated into everyday products and objects. This growing ubiquity brings with it security and privacy concerns for end users due to implementations that fail to adequately protect personal or identifiable data stored on RF transponders, as well as RFID's inherently stealthy broadcasting capabilities. Accordingly, taking effective measures to mitigate the risk of undesirable data transmission requires understanding what RFID is and how RF transmissions work. In our exploratory research, we attempt to elicit user mental models of RFID technology by interviewing users of three existing implementations of consumer-focused RFID technology: RF-enabled credit cards, transit passes, and the U.S. e-Passport. We explore user comprehension of RFID technology generally and these implementations specifically to gain an understanding of how end users conceptualize RFID and its risks. We found in this initial inquiry that our subjects generally lacked a mental model of how RFID functions, and in turn did not understand risks posed by RFID implementations or how to mitigate them.