The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
A research note on ethics in the emerging age of überveillance
Computer Communications
An enquiry into the ethical efficacy of the use of radio frequency identification technology
Ethics and Information Technology
Location and interactive services not only at your fingertips but under your skin
ISTAS '09 Proceedings of the 2009 IEEE International Symposium on Technology and Society
Privacy and ethical issues in location-based tracking systems
ISTAS '09 Proceedings of the 2009 IEEE International Symposium on Technology and Society
Child positioning system using RFID for shopping complexes
EHAC'10 Proceedings of the 9th WSEAS international conference on Electronics, hardware, wireless and optical communications
A holistic approach examining RFID design for security and privacy
The Journal of Supercomputing
Hi-index | 0.00 |
Radio Frequency Identification, or RFID, is a technology which has been receiving considerable attention as of late. It is a fairly simple technology involving radio wave communication between a microchip and an electronic reader, in which an identification number stored on the chip is transmitted and processed; it can frequently be found in inventory tracking and access control systems. In this paper, we examine the current uses of RFID, as well as identifying potential future uses of the technology, including item-level tagging, human implants and RFID-chipped passports, while discussing the impacts that each of these uses could potentially have on personal privacy. Possible guidelines for RFID's use, including Fair Information Principles and the RFID Bill of Rights are then presented, as well as technological solutions to personal privacy problems, such as tag killing and blocker tags, as well as simple aluminum foil shields for passports. It is then claimed, though, that guidelines and technological solutions will be ineffective for privacy protection, and that legislation will be necessary to guard against the threats posed by the RFID. Finally, we present what we believe to be the most important legislative points that must be addressed.