Communications of the ACM
Communications of the ACM
E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Security: for ubiquitous computing
Security: for ubiquitous computing
Interpreting Dimensions of Consumer Trust in E-Commerce
Information Technology and Management
A Privacy Awareness System for Ubiquitous Computing Environments
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
Empirical research in on-line trust: a review and critical assessment
International Journal of Human-Computer Studies - Special issue: Trust and technology
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Privacy in e-commerce: stated preferences vs. actual behavior
Communications of the ACM - Transforming China
Disabling RFID tags with visible confirmation: clipped tags are silenced
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Making Radio Frequency Identification Visible--A Watchdog Tag
PERCOMW '07 Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
P3P: Making Privacy Policies More Useful
IEEE Security and Privacy
Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
A survey of RFID privacy approaches
Personal and Ubiquitous Computing
Tampering in RFID: A Survey on Risks and Defenses
Mobile Networks and Applications
Ubiquitous computing: An overview of technology impacts
Telematics and Informatics
Hi-index | 0.00 |
This article investigates the conflicting area of user benefits arising through item level radio frequency identification (RFID) tagging and a desire for privacy. It distinguishes between three approaches feasible to address consumer privacy concerns. One is to kill RFID tags at store exits. The second is to lock tags and have user unlock them if they want to initiate reader communication (user model). The third is to let the network access users' RFID tags while adhering to a privacy protocol (network model). The perception and reactions of future users to these three privacy enhancing technologies (PETs) are compared in the present article and an attempt is made to understand the reasoning behind their preferences. The main conclusion is that users do not trust complex PETs as they are envisioned today. Instead, they prefer to kill RFID chips at store exits even if they appreciate after sales services. Enhancing trust through security and privacy `visibility' as well as PET simplicity may be the road to take for PET engineers in UbiComp.