Efficiency, privacy, and security analysis of ubiquitous systems in the retail industry

被引:0
作者
Deeb, Kevin [1 ]
机构
[1] Barry Univ, Miami, FL 33161 USA
来源
2006 Innovations in Information Technology | 2006年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Radio Frequency Identification (RFID) tagging technology is being implemented by many businesses for production efficiency, logistics planning, supply-chain management, and other business related operations. However, there have been several implementation and control issues with the pervasiveness of this technology. This paper analyzes the security and privacy issues with the use of RFID in the commercial industry. It proceeds to assess the challenges with industry standardization among the RFID manufacturers at both the national and international borders. The Wal-Mart company is then used as a case study to assess its strategic use of RFID technology and its advantageously competitive positioning in light of its RFID technological renovation.
引用
收藏
页码:401 / 406
页数:6
相关论文
共 50 条
  • [31] Analysis of security and privacy challenges of smart health and sensing systems
    Bibhu, Vimal
    Shukla, Anand Kumar
    Shivahare, Basu Dev
    Kaur, Jatinder
    Shukri, Mohd
    Johar, M. G. M. Ab Yajid
    Faaq, Ayham Sameer
    Alshujairi, Mohammed Kareem
    Pandey, Shatrudhan
    RESULTS IN ENGINEERING, 2024, 24
  • [32] Security Enhancement on an Authentication Scheme for Privacy Preservation in Ubiquitous Healthcare System
    Mao, Kefei
    Chen, Jie
    Liu, Jianwei
    Wang, Mengmeng
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 885 - 892
  • [33] Composite Sensor Model and Security Agent to Improve Privacy of Ubiquitous Computing
    Xu, Yusheng
    Ma, Zhixin
    Chen, Xiaoyun
    Li, Lian
    2008 FIRST IEEE INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS, PROCEEDINGS, 2008, : 159 - 164
  • [34] Workshop on Usable Privacy & Security for wearable and domestic ubIquitous DEvices (UPSIDE)
    Jung, Jaeyeon
    Kohno, Tadayoshi
    PROCEEDINGS OF THE 2014 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING (UBICOMP'14 ADJUNCT), 2014, : 1279 - 1282
  • [35] Characterizing Ubiquitous Systems Privacy Issues by Gender and Age
    Lopez, Gustavo
    Marin, Gabriela
    Calderon, Marta
    AMBIENT ASSISTED LIVING: ICT-BASED SOLUTIONS IN REAL LIFE SITUATIONS, 2015, 9455 : 247 - 258
  • [36] Evaluating security and privacy issues of social networks based information systems in Industry 4.0
    Saura, Jose Ramon
    Ribeiro-Soriano, Domingo
    Palacios-Marques, Daniel
    ENTERPRISE INFORMATION SYSTEMS, 2022, 16 (10-11) : 1694 - 1710
  • [37] Security Policy Model for Ubiquitous Social Systems
    Jovanovikj, Vladimir
    Gabrijelcic, Dusan
    Klobucar, Tomaz
    MODELING AND USING CONTEXT (CONTEXT 2017), 2017, 10257 : 302 - 314
  • [38] A Survey of Security Middleware for Pervasive and Ubiquitous Systems
    Al-Jaroodi, Jameela
    Al-Dhaheri, Alyaziyah
    Al-Abdouli, Fatmah
    Mohamed, Nader
    2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 188 - 193
  • [39] Privacy-Security Tradeoffs in Biometric Security Systems
    Lai, Lifeng
    Ho, Siu-Wai
    Poor, H. Vincent
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 268 - 273
  • [40] Security on Wheels: Security and Privacy for Vehicular Communication Systems
    Papadimitratos, Panos
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1855 - 1856