Disadvantages Of RFID Technology

Improved Essays
RFID TECHNOLOGY
Radio-frequency identification (RFID): RFID Technology is a wireless electromagnetic field that is used to transfer data, or to identify people or objective, for the purposes of automatically identifying and tracking tags attached to objects. RFID is very fast, reliable and does not require any physical sight or contact between reader and scanner and the tagged items. There are some tags contains electronically stored information. It refers to small electronic devices that consist of a small chip and an antenna.

Figure 1 - RFID read- / writing device Figure 2 - RFID transponder including antenna and microchip
RFID system is same as bar code identification. It consist of an antenna
…show more content…
Since new features can be added to the chip, this technology is very well prepared for future applications. Especially branches of industries that rely strongly on logistics or are specialize in automation profit significantly from these new developments as they accelerate processes as well as decrease expenses. Furthermore sophisticated security systems can be developed which will be interesting for security services as well as governments.
However, the number of critics and opponents is continually increasing also. Customer protection organizations in particular protest that the protection of personal data is neglected. In fact in some cases they have even been successful. Having received massive complaints, they removed the transponders shortly after their

Related Documents

  • Improved Essays

    As humans continue to crave convenience, large technological companies are starting to add features to make products easier to use. However, the consumers do not realize that in order for them to receive such large amounts of convenience, they are sacrificing their privacy. Some of Samsung’s new Smart Televisions ship off “...voice data to an unnamed third party—presumably for the purpose of translating the speech to text”(Newman). This perfectly illustrates how today’s latest technology is invading privacy, one step at a time. People who use the voice command feature on their television can accidentally say something that they should no tell others.…

    • 1601 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    9/11 Cons

    • 591 Words
    • 3 Pages

    Massive amounts of data being collected are causing extremely high risks of identity theft. When…

    • 591 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Cell Phones: An Annotated Bibliography The articles and studies below examine several different aspects pertaining to cell phones. In many of the studies below it can be seen that cell phones are not as private as one would think. With that said one would think that only hackers could evade your privacy true hackers are one, but Law enforcement is the biggest. Does Law Enforcement abide by the law or do they think that they are above the law.…

    • 945 Words
    • 4 Pages
    Decent Essays
  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The NSA surveillance has pushed others over the line in which they think everything has gone too far. The government tried to keep a secret of them watching are personal information, but it would not be kept away for forever. The Local police have started using a suitcase-sized device called a Stingray. It can sweep up basic cellphone data from a neighborhood by tricking phones in the area to believe that it’s a cell tower, allowing it to identify unique subscriber numbers. The data is then transmitted to the police, helping them determine the location of a phone without the user even making a call or sending a text message (Tucker).…

    • 138 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Problems with Government Mandated Systems Successful HIT systems must be customized to the needs of the users, and this increases the chance that systems imposed by governments will fail. Medicare has several commissions to investigate the possibility that structured physician records could be configured for reimbursement purposes. The problem is that patient medical records have historically been used to record what individual physicians needed to know about the treatment of individual patients, and therefore the information contained in them is not the same as the information that would be needed for billing purposes. Another problem is the fact that the workflow in clinical environments can vary, complex and time dependent.…

    • 594 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Many users on the internet distrust communication, sharing, and storing in fear of government surveillance. Many cannot express their will freely because they are aware the government will be supervising their data. If people know that there is a government data base that records information and stores every search or call, this poses a chilling effect for their free speech. The large amounts of data removes a person’s ability to move on from past experiences if it can be recalled (Schneier 2015). The 3rd amendment has been interpreted by courts that there would be privacy of the home; there is no privacy because individuals are constantly monitored.…

    • 1412 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    “Privacy is not an option, and it shouldn't be the price we accept for just getting on the Internet,” stated Gary Kovacs the president of several software companies (Kovacs). However, since the implementation of the Patriot Act in 2001, the loss of American privacy is one of the many results of the new set of revised laws that have been rewritten to give the government more freedom in observing our electronic fingerprint (“Surveillance Under the Patriot Act”). In their hurry to act on the tragedy of 9/11, Congress passed the Act a mere 45 days of the event, with little to no debate. The result of it’s ratification, was a drastic change in the surveillance laws and restrictions of the federal government (“End Mass Surveillance Under the Patriot…

    • 1537 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    (BBC News. Snowden, Jan. 17, 2014). These surveillance issues caused for a public backlash against government surveillance and the NSA. The majority of Americans disapprove of the NSA’s collection of telephone records and more and more people are beginning to be concerned about the country’s lack of civil liberty protection because they don’t believe their liberties should be sacrificed in the name of counter-terrorism. (Civil Liberty in America, Gao, G May 29, 2015).…

    • 875 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    When our privacy management system is thrown off balance and our privacy rules are broken, it creates…

    • 1200 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Introduction In the modern world, the word “smart” is used everywhere from homes, to the schools, hospitals, market and businesses-to mention but just a few. Generally, people have come to love the word smart and want to be smart or even have smart items with them. Parents would want their children to be smart; people want to buy smart products like the Smartphone. The reality is that, you cannot avoid smart products in the modern world.…

    • 977 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Surveillance has presented numerous challenges to the right of privacy. There is a need to develop a high technology surveillance system that will come with great benefits without intrusion. With new advances in technology each day, it is becoming easier to communicate with each other. Yet with all these new forms of communication there have been unpleasant side effects, since this new advanced technology is not only for harmless interactions between one another it is also used to plot against governments and countries. Governments have found themselves under attack a countless number of times and have had no other choice but to resort to monitoring their citizen’s online and phone activities.…

    • 729 Words
    • 3 Pages
    Improved Essays