2,809 research outputs found

    A holistic approach examining RFID design for security and privacy

    Get PDF
    This paper adopts a holistic approach to Radio Frequency Identification (RFID) security that considers security and privacy under resource constraints concurrently. In this context, a practical realisation of a secure passive (battery-less) RFID tag is presented. The tag consists of an off the shelf front end combined with a bespoke 0.18 μm Application Specific Integrated Circuit (ASIC) assembled as a -sized prototype. The ASIC integrates the authors’ ultra low power novel Advanced Encryption Standard (AES) design together with a novel random number generator and a novel protocol, which provides both security and privacy. The analysis presented shows a security of 64-bits against many attack methods. Both modelled and measured power results are presented. The measured average core power consumed during continuous normal operation is 1.36 μW

    An Analysis of Technological Components in Relation to Privacy in a Smart City

    Get PDF
    A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up a smart city, specifically radio frequency identification, wireless sensor networks, and Bluetooth. The holistic focus in turn permits a set of technical and ethical approaches that can combat malicious attacks and enhance data security across the networks that drive smart cities

    Accessing Antecedents and Outcomes of RFID Implementation in Health Care

    Get PDF
    This research first conceptualizes, develops, and validates four constructs for studying RFID in health care, including Drivers (Internal and External), Implementation Level (Clinical Focus and Administrative Focus), Barriers (Cost Issues, Lack of Understanding, Technical Issues, and Privacy and Security Concerns), and Benefits (Patient Care, Productivity, Security and Safety, Asset Management, and Communication). Data for the study were collected from 88 health care organizations and the measurement scales were validated using structural equation modeling. Second, a framework is developed to discuss the causal relationships among the above mentioned constructs. It is found that Internal Drivers are positively related to Implementation Level, which in turn is positively related to Benefits and Performance. In addition, Barriers are found to be positively related to Implementation Level, which is in contrast to the originally proposed negative relationship. The research also compares perception differences regarding RFID implementation among the non-implementers, future implementers, and current implementers of RFID. It is found that both future implementers and current implementers consider RFID barriers to be lower and benefits to be higher compared to the non-implementers. This paper ends with our research implications, limitations and future research

    Realising the strategic value of RFID in academic libraries: A case study of the University of Technology Sydney

    Full text link
    © 2015 Australian Library & Information Association. Radio Frequency Identification (RFID) technology is being increasingly implemented in academic libraries due to a promise of increased collections management efficiency. This paper reports on the recent implementation of RFID technology in the library at the University of Technology Sydney, providing insights into the change management process of RFID implementation. The paper focuses on the implications of the implementation and indigenisation of RFID technology for three specific and symbiotic areas of the library: people, processes and technology. Data from interviews with eight participants involved at various levels of the academic library were collected. This paper develops a best practice model through the insights gained by the people involved in the RFID implementation. The case study posits the dynamic relationships between people, processes and technology as greatly impacted by the implementation process, and analyses the divergence between projected and actual outcomes in the implementation process

    Modality Mix of RFID Regulation

    Full text link
    This paper provides a general reflection on how law must manage the evolution oftechnology. By the example of radio frequency identification (RFID), it analyses the necessity ofRFID regulation based on Lessig’s four modalities law, norms, market and architecture. This papersuggests that a trade-off between or complementing of the four modalities is necessary for a holisticregulation of RFID. To support this claim, various topics of the draft recommendation on theimplementation of privacy, data protection and information security principles in RFID applicationsby the European Commission of February 2008 are cross-examined with and attributed to one ofthe four modalities. This paper concludes that the draft recommendation does not provide precisesupplementing legislation to justify its implementation. Many law-related issues of the draftrecommendation can be traded off against or complemented by the other three modalities norms,market and architecture

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Feasibility Study of RFID Technology for Construction Load Tracking

    Get PDF
    INE/AUTC 10.0

    Volume 7, 2020

    Get PDF

    The Ethical Implications of Personal Health Monitoring

    Get PDF
    Personal Health Monitoring (PHM) uses electronic devices which monitor and record health-related data outside a hospital, usually within the home. This paper examines the ethical issues raised by PHM. Eight themes describing the ethical implications of PHM are identified through a review of 68 academic articles concerning PHM. The identified themes include privacy, autonomy, obtrusiveness and visibility, stigma and identity, medicalisation, social isolation, delivery of care, and safety and technological need. The issues around each of these are discussed. The system / lifeworld perspective of Habermas is applied to develop an understanding of the role of PHMs as mediators of communication between the institutional and the domestic environment. Furthermore, links are established between the ethical issues to demonstrate that the ethics of PHM involves a complex network of ethical interactions. The paper extends the discussion of the critical effect PHMs have on the patient’s identity and concludes that a holistic understanding of the ethical issues surrounding PHMs will help both researchers and practitioners in developing effective PHM implementations
    • …
    corecore