Efficiency, privacy, and security analysis of ubiquitous systems in the retail industry

被引:0
|
作者
Deeb, Kevin [1 ]
机构
[1] Barry Univ, Miami, FL 33161 USA
来源
2006 Innovations in Information Technology | 2006年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Radio Frequency Identification (RFID) tagging technology is being implemented by many businesses for production efficiency, logistics planning, supply-chain management, and other business related operations. However, there have been several implementation and control issues with the pervasiveness of this technology. This paper analyzes the security and privacy issues with the use of RFID in the commercial industry. It proceeds to assess the challenges with industry standardization among the RFID manufacturers at both the national and international borders. The Wal-Mart company is then used as a case study to assess its strategic use of RFID technology and its advantageously competitive positioning in light of its RFID technological renovation.
引用
收藏
页码:401 / 406
页数:6
相关论文
共 50 条
  • [1] Security and privacy in ubiquitous computing
    Miri, Ali
    Benslimane, Abderrahim
    Huang, Nen-Fu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1417 - 1419
  • [2] Special issue on "security and privacy in pervasive and ubiquitous computing and communication systems"
    Liu, Peng
    Molva, Refik
    Jing, Jiwu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (12) : 1522 - 1523
  • [3] Analysis and research on network security and privacy security in ubiquitous electricity Internet of Things
    Hou, Rui
    Ren, Guowen
    Zhou, Chunlei
    Yue, Hongxuan
    Liu, Huan
    Liu, Jiayue
    COMPUTER COMMUNICATIONS, 2020, 158 : 64 - 72
  • [4] Personal and Ubiquitous ComputingIssue on privacy and security
    Chris Schmandt
    Mark Ackerman
    Personal and Ubiquitous Computing, 2004, 8 : 389 - 390
  • [5] Security and Privacy in Ubiquitous Sensor Networks
    Perez, Alfredo J.
    Zeadally, Sherali
    Jabeur, Nafaa
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2018, 14 (02): : 286 - 308
  • [6] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [7] Information Assurance, Privacy, and Security in Ubiquitous Questionnaire
    Goto, Yuichi
    Cheng, Jingde
    FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 619 - 624
  • [8] Personal and Ubiquitous Computing Issue on privacy and security
    Schmandt, Chris
    Ackerman, Mark
    PERSONAL AND UBIQUITOUS COMPUTING, 2004, 8 (06) : 389 - 390
  • [9] Ubiquitous Networks, Ubiquitous Sensors: Issues of Security, Reliability and Privacy in the Internet of Things
    Losavio, Michael
    Elmaghraby, Adel
    Losavio, Antonio
    UBIQUITOUS NETWORKING, UNET 2018, 2018, 11277 : 331 - 343
  • [10] Security and Privacy Framework for Ubiquitous Healthcare IoT Devices
    Alkeem, Ebrahim A. L.
    Yeun, Chan Yeob
    Zemerly, M. Jamal
    2015 10TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2015, : 70 - 75