An Examination of RFID Ethical Issues Supports the Need for Improved Business and Legal Strategies

An Examination of RFID Ethical Issues Supports the Need for Improved Business and Legal Strategies

Ellen Marie Raineri, Lori S. Elias Reno, Pauline S. Cho, Gina M. Dignazio
Copyright: © 2022 |Pages: 24
DOI: 10.4018/978-1-6684-5892-1.ch003
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

RFID (Radio Frequency Identification) is an important and frequently utilized technology in our modern society. It gives its users the ability to capture, store, and access vast amounts of data with ease and efficiency. These abilities make RFID both an asset and a potential hazard. If used in the wrong hands, RFID could be appropriated for nefarious reasons such as data theft and invasion of privacy. Although RFID technology has been around for over 70 years, few laws directly address RFID or define illegal uses of it. Some of the ways that RFID is used in the following industries are thus explored: marketing, transportation, travel, shopping, supply chain management, agriculture, and hospitals. Some of the benefits, drawbacks, ethical concerns, and legal implications of using RFID technology are included, as well as recommendations for addressing ethical concerns.
Chapter Preview
Top

Rfid Background Information

How RFID Works

RFID is a technology that uses electromagnetic fields to automatically capture the digital data encoded in RFID tags. It is a simple system that consists of only three components that identifies, collects, and receives data. The devices that identify and collect data act as a RFID reader, which can be either fixed or mobile. The network-connected reader uses radio waves to transmit signals that activate the tag. Once activated, the tag sends a wave back to the antenna, where it is translated into data (Amsler, 2021). The transponder, which receives data, can have a longer read range based on its power source and type of tag. Two main types of RFID tags are active and passive. The active RFID tag has its own power source, and the passive RFID tag receives its power from the reading antenna, whose electromagnetic wave induces a current in the RFID tag's antenna (Amsler, 2021). The data that is received by the tags is transferred to the main computer system, where the data is stored in the database to be analyzed.

Businesses can use the data that is collected to increase efficiencies and create cost saving solutions for the organization. Various features of RFIDs -- read range, frequency, and interference -- are tailored to each organization's processes and needs. RFID technology extends to many industries to perform tasks such as supply chain management, asset tracking, personnel tracking, controlling access to restricted areas, ID badging, supply chain management and counterfeit prevention (“What is RFID,” n.d.). Large companies use it to check in and track their extensive employee bases for safety reasons during travel and in the event of catastrophes at any of their many sites.

Key Terms in this Chapter

840 RFID tags.: "Official ear tags that are a source of animal identification that, with accurate movement records, provides the ability to trace animals to their origin" ("Understanding official USDA 840," n.d., para. 2).

United States Department of Agriculture (USDA).: "A cabinet-level agency in the federal government responsible for matters involving farming, food, forestry, rural development, and nutrition programs" (Axelrod & Rove, 2021, para. 2).

GS1.: "Creates a common foundation for business by uniquely identifying, accurately capturing and automatically sharing vital information about products, locations, assets and more" (GS1 US, n.d., para. 1).

Standards.: "A level of quality, achievement, etc., that is considered acceptable or desirable" ("Standard," n.d., para. 1).

Artificial intelligence (AI).: "The ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings" (Copeland, 2022, para. 1).

Cyber security.: "The art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information" (Cybersecurity and Infrastructure Security Agency, 2019, para. 1).

Privacy.: "Assurance that the confidentiality of, and access to, certain information about an entity is protected" (National Institute of Standards and Technology, n.d., para. 1).

RFID receiver or reader.: "A device that has one or more antennas that emit radio waves and receive signals back from the RFID tag" (U.S. Food and Drug Administration, n.d., para. 1).

RFID tags.: Small objects that "use radio waves to communicate their identity and other information to nearby readers" (U.S. Food and Drug Administration, n.d., para. 1).

Supply chain.: "An entire system of producing and delivering a product or service, from sourcing the raw materials to the final delivery of the product or service to end users" (CFI Education Inc., 2022, para. 1).

Digital marketing.: "Any marketing methods conducted through electronic devices" ("What is Digital Marketing," 2022, para. 4).

Complete Chapter List

Search this Book:
Reset