Sign In
Not register? Register Now!
You are here: HomeResearch PaperTechnology
Pages:
7 pages/≈1925 words
Sources:
7 Sources
Level:
APA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 39.95
Topic:

Value of RFID Technology and Risk to Privacy Research Paper (Research Paper Sample)

Instructions:

The RFID Technology which refers to the Radio Frequency Identification is a type of technology that falls under the category of automatic identification technologies and which has gained a lot of use from many companies for more than a decade now. It has its origin in the tolling tag following innovations in technology and internet (Clampitt, 2007). The generic term is commonly used in the description of a system used in communication and makes use of radio waves to wirelessly transmit a person's or objects identity normally in the form of an exclusive serial number. It contains a tag consisting of a microchip with the ability to store up to 2 kilobytes of data “attached to a radio antenna mounted on substrate” (Association for Automatic Identification and Mobility, 2011). With the frequency with which the technology is developed and the wide utility of tags it is gaining quick attention hence being more persistent and invasive for its ability to track moving objects. It is commonly used for security long biometric technologies. Additionally, it is used every day and all around us as in the case of payment of gas by use of Speed Pass or ID tagging of pets by chipping. With regards to its importance, the challenges related to RFID technology and their solutions will also be discussed
The system is made up of three components; the antenna or coil, a transreceiver that contains a decoder and a transponder or RF tag usually programmed electronically with unique information. The application of this technology is chiefly significant as it enables a portable device known as a tag to transmit data. This depending on the specific application is read and processed the RFID reader. Subsequently, from this transmission of data, identification or information location is provided by the tag. It is also important in the provision of a tagged product's specifics with regards to its price, color and its purchase date using its own unique number for identification.
The RFID contains numerous functions which can be useful both currently as well as in the future. For example, there is a dire current need to give a high level of security for vehicles. With implementation of RFID technology, this has been made possible in countries employing it for vehicle registration as it helps to detect and retrieve stolen cars. It has also been made use of during payment where mobile phones are connected to bank accounts making it simple to pay bills through the phones and serve the purpose of a loyalty card (Swedberg, 2002). These include tracking of assets which are either often stolen or lost, underutilized or generally hard to locate when they are required by placing on them the RFID tags, manufacturing where it has been applied for over a decade to manufacture plants. In this case it tracks the parts and work process to reduce defects, enhance throughput and product management of a product's different versions. In addition it is applicable in supply chain management in closed loops or automate parts of supply chains

source..
Content:
RUNNING HEAD: RFID TECHNOLOGY
Value of RFID Technology and Risk to Privacy
Name:
Course:
Tutor:
Date:
The Value of RFID Technology and Risk to Privacy
The RFID Technology which refers to the Radio Frequency Identification is a type of technology that falls under the category of automatic identification technologies and which has gained a lot of use from many companies for more than a decade now. It has its origin in the tolling tag following innovations in technology and internet (Clampitt, 2007). The generic term is commonly used in the description of a system used in communication and makes use of radio waves to wirelessly transmit a person’s or objects identity normally in the form of an exclusive serial number. It contains a tag consisting of a microchip with the ability to store up to 2 kilobytes of data “attached to a radio antenna mounted on substrate” (Association for Automatic Identification and Mobility, 2011). With the frequency with which the technology is developed and the wide utility of tags it is gaining quick attention hence being more persistent and invasive for its ability to track moving objects. It is commonly used for security long biometric technologies. Additionally, it is used every day and all around us as in the case of payment of gas by use of Speed Pass or ID tagging of pets by chipping. With regards to its importance, the challenges related to RFID technology and their solutions will also be discussed
The system is made up of three components; the antenna or coil, a transreceiver that contains a decoder and a transponder or RF tag usually programmed electronically with unique information. The application of this technology is chiefly significant as it enables a portable device known as a tag to transmit data. This depending on the specific application is read and processed the RFID reader. Subsequently, from this transmission of data, identification or information location is provided by the tag. It is also important in the provision of a tagged product’s specifics with regards to its price, color and its purchase date using its own unique number for identification.
The RFID contains numerous functions which can be useful both currently as well as in the future. For example, there is a dire current need to give a high level of security for vehicles. With implementation of RFID technology, this has been made possible in countries employing it for vehicle registration as it helps to detect and retrieve stolen cars. It has also been made use of during payment where mobile phones are connected to bank accounts making it simple to pay bills through the phones and serve the purpose of a loyalty card (Swedberg, 2002). These include tracking of assets which are either often stolen or lost, underutilized or generally hard to locate when they are required by placing on them the RFID tags, manufacturing where it has been applied for over a decade to manufacture plants. In this case it tracks the parts and work process to reduce defects, enhance throughput and product management of a product’s different versions. In addition it is applicable in supply chain management in closed loops or automate parts of supply chains
As well as tracking shipments among the partners due to emerging standards. The technology also plays a significant role in retailing to improve the efficiency in supply chains and provision of highly demanded products, in payment systems such as in road tolls without the necessity to stop. Another useful area is in security and access control to control those who have access to certain buildings. On the other hand the technology can also be employed in member identification that concerns locking and even unlocking of cars.
Apart from the identification of items, RFID is gaining popularity in hospital settings where it is used for the identification of patients. This is by use of tags to prevent the mix up of specimen hence decreasing the incidents of death or injuries caused by errors therefore increasing the safety of patients (Bacheldor, 2007). However due to the various side effects associated with this technology a lot of research is still in progress. Besides all these functions the RFID has in addition a wide range of benefits. An example is its convenience and its reduction of wear and tear evidenced by the use of badges by employees to unlock doors as opposed to keys or use of magnetic stripe cards.
Association for Automatic Identification and Mobility identifies significance due to the evolution and proliferation of this technology and innovation of its loads of application in solving both common and unique problems in business. It is therefore able to be read items contained in cartons or containers and many at a time from several meters away without the need to be seen which is of great advantage to retail and grocery stores. This is unlike bar codes which are only read one at a time (Clampitt, 2007).
However, as in the case with all other new technology, the use of RFID technology has elicited a great amount of controversy with respect to privacy. Critics argue that the sensitive data concerning an item can be gathered from a distance without the knowledge of its owner. In addition it is easy to locate the purchaser of an item paid for by a credit card in addition to a loyalty card. This can be attained by the global reading of the unique identification number of the item found on the RFID tag since they retain their functionality even after the purchase of the products. The major concerns are therefore the ability for the technology to be used in surveillance and unrelated functions with regards to the roles intended in the inv...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Internet Policing: Limitations Of Previous Studies
    Description: The research is to establish forms of internet crime caused by deliberate abuse and misuse, and advance a suitable way of internet policing among other things...
    6 pages/≈1650 words| 8 Sources | APA | Technology | Research Paper |
  • Websites Review: Model of Online Sport Communication
    Description: Dallas, texas rangers, dallas mavericks and the dallas stars are critically analyzed. aspects such as usability and accessibility are checked....
    1 page/≈275 words| 4 Sources | APA | Technology | Research Paper |
  • Wind Energy
    Description: Wind Energy Technology Research Paper...
    17 pages/≈4675 words| 10 Sources | APA | Technology | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!