Fill in Order Details

  • Submit paper details for free using our simple order form

Make Payment Securely

  • Add funds to your account. There are no upfront payments. The writer will only be paid once you have approved your paper

Writing Process

  • The best qualified expert writer is assigned to work on your order
  • Your paper is written to standard and delivered as per your instructions

Download your paper

  • Download the completed paper from your online account or your email
  • You can request a plagiarism and quality report along with your paper

Value of RFID Technology and Risk to Privacy

RUNNING HEAD: RFID TECHNOLOGY

Value of RFID Technology and Risk to Privacy

Name:

Course:

Tutor:

Date:

The Value of RFID Technology and Risk to Privacy

The RFID Technology which refers to the Radio Frequency Identification is a type of technology that falls under the category of automatic identification technologies and which has gained a lot of use from many companies for more than a decade now. It has its origin in the tolling tag following innovations in technology and internet (Clampitt, 2007). The generic term is commonly used in the description of a system used in communication and makes use of radio waves to wirelessly transmit a person’s or objects identity normally in the form of an exclusive serial number. It contains a tag consisting of a microchip with the ability to store up to 2 kilobytes of data “attached to a radio antenna mounted on substrate” (Association for Automatic Identification and Mobility, 2011). With the frequency with which the technology is developed and the wide utility of tags it is gaining quick attention hence being more persistent and invasive for its ability to track moving objects. It is commonly used for security long biometric technologies. Additionally, it is used every day and all around us as in the case of payment of gas by use of Speed Pass or ID tagging of pets by chipping. With regards to its importance, the challenges related to RFID technology and their solutions will also be discussed

The system is made up of three components; the antenna or coil, a transreceiver that contains a decoder and a transponder or RF tag usually programmed electronically with unique information. The application of this technology is chiefly significant as it enables a portable device known as a tag to transmit data. This depending on the specific application is read and processed the RFID reader. Subsequently, from this transmission of data, identification or information location is provided by the tag. It is also important in the provision of a tagged product’s specifics with regards to its price, color and its purchase date using its own unique number for identification.

The RFID contains numerous functions which can be useful both currently as well as in the future. For example, there is a dire current need to give a high level of security for vehicles. With implementation of RFID technology, this has been made possible in countries employing it for vehicle registration as it helps to detect and retrieve stolen cars. It has also been made use of during payment where mobile phones are connected to bank accounts making it simple to pay bills through the phones and serve the purpose of a loyalty card (Swedberg, 2002). These include tracking of assets which are either often stolen or lost, underutilized or generally hard to locate when they are required by placing on them the RFID tags, manufacturing where it has been applied for over a decade to manufacture plants. In this case it tracks the parts and work process to reduce defects, enhance throughput and product management of a product’s different versions. In addition it is applicable in supply chain management in closed loops or automate parts of supply chains

As well as tracking shipments among the partners due to emerging standards. The technology also plays a significant role in retailing to improve the efficiency in supply chains and provision of highly demanded products, in payment systems such as in road tolls without the necessity to stop. Another useful area is in security and access control to control those who have access to certain buildings. On the other hand the technology can also be employed in member identification that concerns locking and even unlocking of cars.

Apart from the identification of items, RFID is gaining popularity in hospital settings where it is used for the identification of patients. This is by use of tags to prevent the mix up of specimen hence decreasing the incidents of death or injuries caused by errors therefore increasing the safety of patients (Bacheldor, 2007). However due to the various side effects associated with this technology a lot of research is still in progress. Besides all these functions the RFID has in addition a wide range of benefits. An example is its convenience and its reduction of wear and tear evidenced by the use of badges by employees to unlock doors as opposed to keys or use of magnetic stripe cards.

Association for Automatic Identification and Mobility identifies significance due to the evolution and proliferation of this technology and innovation of its loads of application in solving both common and unique problems in business. It is therefore able to be read items contained in cartons or containers and many at a time from several meters away without the need to be seen which is of great advantage to retail and grocery stores. This is unlike bar codes which are only read one at a time (Clampitt, 2007).

However, as in the case with all other new technology, the use of RFID technology has elicited a great amount of controversy with respect to privacy. Critics argue that the sensitive data concerning an item can be gathered from a distance without the knowledge of its owner. In addition it is easy to locate the purchaser of an item paid for by a credit card in addition to a loyalty card. This can be attained by the global reading of the unique identification number of the item found on the RFID tag since they retain their functionality even after the purchase of the products. The major concerns are therefore the ability for the technology to be used in surveillance and unrelated functions with regards to the roles intended in the invention of supply chain (Hansen & Meissner, 2007). Despite this shortcoming, the protection of consumers can be guaranteed by use of clipped tags which can be implemented by the consumer tearing off part of the tag after purchase of an item. The change then makes the tag easily read only from a few centimeters distance although it may still be visible hence can be returned, recalled or recycled. They can also according to (Doyle, 2011) deactivate the tags to provide security especially of computers and mobile phones. The other challenges such as human implants and government control can as well be overcome through research.

With the gradual incorporation of the RFI D technology in almost all fields such as in museums, schools and universities, passports, tracking runners in marathons and libraries, it is evident that it will consequently be a common and very important technology. In future, as a result of the numerous researches being conducted it will be possible for the chips to be implanted in human beings as an effort to enhance portability and efficiency. The value and significance of this technology is therefore highly recognized hence of great necessity in conclusion. With the necessary mechanisms in place the technology will no longer be risk to the privacy of consumers.

Bibliography

Association for Automatic Identification and Mobility. (2011). Technologies: RFID/ What isRFID. Retrieved April 19, 2011, from

http://www.aimglobal.org/technologies/RFID/what_is_rfid.asp

Bacheldor, B. (2007). RFID-enabled Handheld Helps Nurses Verify Meds. RFID Journal , 2.

Clampitt, H. (2007). The RFID Certification Textbook. United States: American RFID Solutions.

Doyle, E. (2011, April 8). European RFID Guide Sets NFC Privacy Guidelines. eWeek Europe ,

pp. 3-5.

Hansen, M., & Meissner, S. (2007). Identification and Tracking of Individuls and Social Networks using the Electronic Product Code on RFID Tags. Karlstad: IFIP Summer School.

Swedberg, C. (2002). MicroSD Card Brings NFC to Phones for Credit Card Companies, Banks.

RFID Journal , 1 & 2.

WHAT OUR CURRENT CUSTOMERS SAY

  • Google
  • Sitejabber
  • Trustpilot
Zahraa S
Zahraa S
Absolutely spot on. I have had the best experience with Elite Academic Research and all my work have scored highly. Thank you for your professionalism and using expert writers with vast and outstanding knowledge in their fields. I highly recommend any day and time.
Stuart L
Stuart L
Thanks for keeping me sane for getting everything out of the way, I’ve been stuck working more than full time and balancing the rest but I’m glad you’ve been ensuring my school work is taken care of. I'll recommend Elite Academic Research to anyone who seeks quality academic help, thank you so much!
Mindi D
Mindi D
Brilliant writers and awesome support team. You can tell by the depth of research and the quality of work delivered that the writers care deeply about delivering that perfect grade.
Samuel Y
Samuel Y
I really appreciate the work all your amazing writers do to ensure that my papers are always delivered on time and always of the highest quality. I was at a crossroads last semester and I almost dropped out of school because of the many issues that were bombarding but I am glad a friend referred me to you guys. You came up big for me and continue to do so. I just wish I knew about your services earlier.
Cindy L
Cindy L
You can't fault the paper quality and speed of delivery. I have been using these guys for the past 3 years and I not even once have they ever failed me. They deliver properly researched papers way ahead of time. Each time I think I have had the best their professional writers surprise me with even better quality work. Elite Academic Research is a true Gem among essay writing companies.
Got an A and plagiarism percent was less than 10%! Thanks!

ORDER NOW

CategoriesUncategorized

Consider Your Assignments Done

“All my friends and I are getting help from eliteacademicresearch. It’s every college student’s best kept secret!”

Jermaine Byrant
BSN

“I was apprehensive at first. But I must say it was a great experience and well worth the price. I got an A!”

Nicole Johnson
Finance & Economics

Our Top Experts

See Why Our Clients Hire Us Again And Again!


OVER

10.3k
Reviews

RATING
4.89/5
Average

YEARS
13
Mastery

Success Guarantee

When you order form the best, some of your greatest problems as a student are solved!

Reliable

Professional

Affordable

Quick

Using this writing service is legal and is not prohibited by any law, university or college policies. Services of Elite Academic Research are provided for research and study purposes only with the intent to help students improve their writing and academic experience. We do not condone or encourage cheating, academic dishonesty, or any form of plagiarism. Our original, plagiarism-free, zero-AI expert samples should only be used as references. It is your responsibility to cite any outside sources appropriately. This service will be useful for students looking for quick, reliable, and efficient online class-help on a variety of topics.