3 research outputs found

    Evidential Recovery in a RFID Business System

    Get PDF
    Efficient stock management in the commercial retail sector is being dominated by Radio Frequency Identification (RFID) tag implementations. Research reports of the security risk of RFID tags show that breaches are likely and that forensic readiness is a requirement. In this paper a RFID tag business simulation is reported that replicates previous research reports of security breaches with the purpose of identifying potential evidence after such attacks. A Read/Write Tag was cloned and used to replicate a SQL poisoning attack on a simulated Business System. A forensic investigation was then undertaken to identify potential locations for evidential recovery. This paper differentiates from the replicated studies in that the whole Business System is considered evidential. The scope of the inquiry includes the technical artefacts, the information artefacts and the human actors. The result of the investigation shows locations of evidence and the priority for investigations in RFID system architectures

    RFID technology as sustaining or disruptive innovation: Applications in the healthcare industry

    Get PDF
    Abstract In this paper we use the implementation of radio frequency identification (RFID) in various sectors of the healthcare industry as an illustration and application of how academics and managers may assess the potential for new technologies to be sustaining or disruptive to an organization. We review RFID technology, summarize literature related to disruptive innovation, develop a qualitative framework that examines the sustaining and disruptive potential of RFID, and discuss examples of healthcare applications within the context of this framework

    Recent researches on social sciences

    Get PDF
    corecore