Ethical consumerism, supply chains, and deceptions with RFID-based systems

被引:0
|
作者
Tu, Yu-Ju [1 ]
Piramuthu, Selwyn [2 ]
机构
[1] Natl Chengchi Univ, Management Informat Syst, Taipei, Taiwan
[2] Univ Florida, Informat Syst & Operat Management, Gainesville, FL 32611 USA
关键词
Ethical consumerism; Information ethics theory; Stakeholder theory; Supply chains; RFID; BUSINESS ETHICS; TECHNOLOGY; BEHAVIOR; PRIVACY;
D O I
10.1016/j.im.2024.104016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ethical consumerism has led manufacturers and retailers to develop new initiatives to align their products and services with related requirements, such as the management of supply chains for ethically produced products. To this end, recent years have witnessed the growing reliance on technological innovations to corroborate claims on ethically produced products. RFID (Radio-Frequency Identification)-based systems have found a natural fit for such applications due to their ability to uniquely identify individual items and locally store their characteristics and history. While the benefits of such a setup are clear, there is a paucity of research on associated unethical risks. What is often unclear is the possibility of deception when RFID-generated information is used to certify ethical production. We draw on stockholder theory, stakeholder theory, social contract theory, and Mason's information ethics theory to study the underlying dynamics. We show that enhancing RFID information accessibility and accuracy in supply chains is key to mitigating the unethical risk of deception and ensuring that RFIDbased systems can truly certify ethically produced products. We develop a portfolio of such risks, identify means to mitigate identified risks, and then use a case study to examine the impact of varying degrees of RFID-generated information accessibility and accuracy on the detection and prevention of associated deceptions.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] A Lightweight Path Authentication Protocol for RFID-based Supply Chains
    Qian, Yuyin
    Zeng, Peng
    Shen, Zuming
    Choo, Kim-Kwang Raymond
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1297 - 1302
  • [2] SoK: RFID-based Clone Detection Mechanisms for Supply Chains
    Maleki, Hoda
    Rahaeimehr, Reza
    van Dijk, Marten
    PROCEEDINGS OF THE 2017 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY (ASHES'17), 2017, : 33 - 41
  • [3] RFID-based information technology and management in agriculture and food supply chains
    Wang, Lidong
    International Journal of Information Technology and Management, 2012, 11 (03) : 225 - 239
  • [4] RFID-BASED REAL-TIME DECISION SUPPORT IN SUPPLY CHAINS
    Hegmanns, Tobias
    Toth, Michael
    10TH INTERNATIONAL CONFERENCE ON MODELING AND APPLIED SIMULATION, MAS 2011, 2011, : 303 - 308
  • [5] A Variant of Schnorr Signature Scheme for Path-Checking in RFID-based Supply Chains
    Xin, Wei
    Wang, Meilin
    Shao, Shuai
    Wang, Zhao
    Zhang, Tao
    2015 12TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2015, : 2608 - 2613
  • [6] RFID-based Information System for Retail Supply Chain optimization
    Ma, Taolin
    Liu, Xinghua
    Ou, Guannan
    Yu, Yun
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 413 - 418
  • [7] RFID-based tracing for wine supply chain
    Rahman, Md Arafatur
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2016, 16 (01) : 48 - 70
  • [8] An RFID-based traceability system A case study of rice supply chain
    Jakkhupan, Worapot
    Arch-int, Somjit
    Li, Yuefeng
    TELECOMMUNICATION SYSTEMS, 2015, 58 (03) : 243 - 258
  • [9] A Scalable Privacy-preserving Protocol for RFID-Based Supply Chain
    Mao, Dongmei
    Wu, Baofeng
    Wang, Liangmin
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [10] A potential weakness in RFID-based Internet-of-things systems
    Erguler, Imran
    PERVASIVE AND MOBILE COMPUTING, 2015, 20 : 115 - 126