Five benefits associated with RFID technologies in the
context of privacy debates --
- RFID stands for radio frequency identification
technology. RFID helps to save money and
time of the organization and provide real time
traceability, identification, communication, temprature and
location data for resources and people.
- RFID is used in engineering, construction, chemical
industries, manufacturing, logistics, retail and public
sector.
- 1.) RFID is fast developing technology which utilizes
radio waves for data transfer and collection.
- The benefits of RFID technology are as follows--
- 2.) Low cost and higher productivity -- RFID
technology helps in the movement and location of assets
components.
- 3.) It reduce cost and provide
accuracy and reliability with menual
methods.
- 4.) Better security -- Access control system
using RFID helps to improve security of business.
- RFID tagging of assets and stcok make easy to tarck inventory
shrinkage.
- Tags are used to fight against product counterfitting.
- 5.) Reduce capital cost -- RFID technology
helps to reduce cost and provide better control for assets.
- IT helps to keep track of business assests like test
equipment, computing technology, transport packaging and portable
devices.
Five pitfalls associated with RFID technologies
in the context of privacy debates --
- While storing data in RFID device privacy and security is
common issues
- RFID privacy debates can include -- technical,
organizational, economic, privacy and security
challenges.
- 1.) RFID is not line of sight technology like bar
coding so security issues develop.
- 2.) for example -- competitor can set high
gain directional antenna to scan tags in trucks which is going to
warehouse.
- 3.) and the information can be
received by the competitors and determine flow
rates of different materials.
- 4.) High security and privacy risk arrives when RFID
is used for operations like - payment
method.
- 5.) The RFID technology uses ghost tags --
here the security and privacy can be damage if tags are reads at
the same time, a reader will sometimes read tags that do not
exists.