Efficiency, privacy, and security analysis of ubiquitous systems in the retail industry

被引:0
作者
Deeb, Kevin [1 ]
机构
[1] Barry Univ, Miami, FL 33161 USA
来源
2006 Innovations in Information Technology | 2006年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Radio Frequency Identification (RFID) tagging technology is being implemented by many businesses for production efficiency, logistics planning, supply-chain management, and other business related operations. However, there have been several implementation and control issues with the pervasiveness of this technology. This paper analyzes the security and privacy issues with the use of RFID in the commercial industry. It proceeds to assess the challenges with industry standardization among the RFID manufacturers at both the national and international borders. The Wal-Mart company is then used as a case study to assess its strategic use of RFID technology and its advantageously competitive positioning in light of its RFID technological renovation.
引用
收藏
页码:401 / 406
页数:6
相关论文
共 50 条
  • [41] Privacy and Security in Environmental Monitoring Systems
    di Vimercati, Sabrina De Capitani
    Livraga, Giovanni
    Piuri, Vincenzo
    Scotti, Fabio
    2012 IEEE FIRST AESS EUROPEAN CONFERENCE ON SATELLITE TELECOMMUNICATIONS (ESTEL), 2012,
  • [42] Security, Privacy and Interoperability in Heterogeneous Systems
    Zhong, Jian
    Bertok, Peter
    Tari, Zahir
    COLLABORATIVE NETWORKS FOR A SUSTAINABLE WORLD, 2010, 336 : 713 - 721
  • [43] Security and Privacy for Augmented Reality Systems
    Roesner, Franziska
    Kohno, Tadayoshi
    Molnar, David
    COMMUNICATIONS OF THE ACM, 2014, 57 (04) : 88 - 96
  • [44] Privacy and security in highly dynamic systems
    Mueller, Guenter
    COMMUNICATIONS OF THE ACM, 2006, 49 (09) : 28 - +
  • [45] Practical Security and Privacy for Database Systems
    He, Xi
    Rogers, Jennie
    Bater, Johes
    Machanavajjhala, Ashwin
    Wang, Chenghong
    Wang, Xiao
    SIGMOD '21: PROCEEDINGS OF THE 2021 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2021, : 2839 - 2845
  • [46] INFORMATION-SYSTEMS SECURITY AND PRIVACY
    WARE, WH
    COMMUNICATIONS OF THE ACM, 1984, 27 (04) : 315 - 321
  • [47] PRIVACY AND SECURITY IN OFFICE AUTOMATION SYSTEMS
    CAELLI, WJ
    AUSTRALIAN COMPUTER JOURNAL, 1985, 17 (03): : 126 - 130
  • [48] Security and privacy in collaborative distributed systems
    Yau, SS
    Bonatti, PA
    Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005, : 267 - 267
  • [49] Towards Automation of Privacy and Security Risks Analysis in Identity Management Systems
    Paintsil, Ebenezer
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 720 - 727
  • [50] Neighborhood watch: Security and privacy analysis of automatic meter reading systems
    Rouf, Ishtiaq
    Mustafa, Hossen
    Xu, Miao
    Xu, Wenyuan
    Miller, Rob
    Gruteser, Marco
    Proceedings of the ACM Conference on Computer and Communications Security, 2012, : 462 - 473