Monday, September 9, 2019
Residual RFIDs - are these a threat Essay Example | Topics and Well Written Essays - 250 words
Residual RFIDs - are these a threat - Essay Example This information has adverse threats on the person that buy the products containing these tags because the information can be used to cause harm to them when it lands in wrong hands (Cazier, Wilson and Medlin 2007). Some of these threats are outlined below. The RFID tags can be used by non-authorized personnel to track and retrieve personal information of people without their knowledge using objects containing these tags. The assessment of their belonging may lead to access to these belongings without the consent of the owner (Spiekermann and Ziekow 2005). The use of mining of data can help acquire information from RFID tags. This information can be used to retrieve and identify the social links that exist between people. This information can be used by security agents to track criminals, but it can also be used by criminal to cause harm to the people (Spiekermann and Ziekow 2005). RFID tags can also cause technology paternalism. This is the fear in people who have objects that contain these tags over the lack of control of machinesââ¬â¢ action that cannot be overridden. This can cause punishment to owners of these objects thus intruding on the peoples live. RFID residual tags have their benefits, but the presence of threats on the lives of consumers cannot be overruled. Addressing these threats will ensure that consumers are comfortable buying products containing these tags (Gao, Xiang,Wang, Shen, Huang and Song 2004). Gao, X., Z. Xiang, H. Wang, J. Shen, J. Huang, and S. Song. (2004). ââ¬Å"An Approach to Security and Privacy of RFID System for Supply Chain,â⬠Proceedings of the Conference on IEEE International, September 2004, pp.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.