Scanning with a purpose: supporting the fair information principles in RFID protocols
UCS'04 Proceedings of the Second international conference on Ubiquitous Computing Systems
Security Standards for the RFID Market
IEEE Security and Privacy
Using RFID in the classroom to teach information systems principles
Journal of Computing Sciences in Colleges
Law and privacy: the debate over Radio Frequency Identification (RFID) legislation
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Information Technology and Management
RFID, privacy and the perception of risk: A strategic framework
The Journal of Strategic Information Systems
Ubiquitous computing in the real world: lessons learnt from large scale RFID deployments
Personal and Ubiquitous Computing
Investigating Privacy Attitudes and Behavior in Relation to Personalization
Social Science Computer Review
A research note on ethics in the emerging age of überveillance
Computer Communications
RFID in retail: a framework for examining consumers' ethical perceptions
International Journal of Mobile Communications
Reflecting on the invisible: understanding end-user perceptions of ubiquitous computing
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
RFID as a disruptive innovation
Journal of Theoretical and Applied Electronic Commerce Research
Reducing false reads in RFID-embedded supply chains
Journal of Theoretical and Applied Electronic Commerce Research
Theoretical views on the potential shopper response to RFID item tagging
International Journal of Business Information Systems
rfid in pervasive computing: State-of-the-art and outlook
Pervasive and Mobile Computing
Uncertainty-aware Wireless Sensor Networks
International Journal of Mobile Communications
Security challenges of the EPCglobal network
Communications of the ACM - Barbara Liskov: ACM's A.M. Turing Award Winner
Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk
International Journal of Mobile Communications
Radio frequency identification: a case study of healthcare organisations
International Journal of Security and Networks
Rethinking RFID: awareness and control for interaction with RFID systems
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
Understanding compliance to privacy guidelines using text-and video-based scenarios
INTERACT'07 Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction - Volume Part II
Anti-collision protocol for RFID-sensor network and the security threats
ACMOS'10 Proceedings of the 12th WSEAS international conference on Automatic control, modelling & simulation
Privacy-value-control harmonization for RFID adoption in retail
IBM Journal of Research and Development
Diffusing RFID-sensor networks and security threats
WSEAS Transactions on Signal Processing
RFID systems: a survey on security threats and proposed solutions
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Use of RFID Technology for Automatic Job Costing
International Journal of Information Systems and Social Change
Explaining customers' willingness to use mobile network-based pay-as-you-drive insurances
International Journal of Mobile Communications
Hi-index | 0.00 |
Consumers need to feel they have control over the RFID infrastructure before they routinely trust its services.