IT in business Essay Example

IT IN BUSINESS7

IT IN BUSINESS

Radio Frequency Identification (RFID) Technology

The purpose of this report is to discuss the role of RFID technology such as aspect of ethics, implementation, security, privacy issue, stakeholders and so forth. Additionally, the report will discuss potential challenges to the adoption of RFID technology. Basically, scores of businesses make use of the tags to track the locality of all products they produce, and so the paper will highlight RDID technical overview, standards, applications, and its novel computing ability is compared to that of barcodes.

2.0 Key Information

2.1 Introduction

posits that it appears to back the unavoidable progress of supply chain management as well as inventory tracking toward RFID.Weinstein (2005, p.27) is a technology that is presently used to track consumer products across the globe. Aside from the business setting, RFID technology is used for tracking airline passengers, vehicles, pets, and patients suffering from Alzheimer. A number of critics argue that RFID technology is turning out to be a part of human lives; specifically, it is negatively impacting people lives. RFID has been existent for numerous decades, but it is only lately has the convergence of improved capabilities as well as lower cost that made businesses to realize the benefits brought about by RFID technology. Noteworthy push towards the technology surfaced when Wal-Mart, a retailing giant dramatically publicized that all its top 100 suppliers will have to supply RFID-enabled consignments before 2005. Even if the main goal of that deployment is yet to come into view, Hossain and Prybutok (2008, p.316) tags, as per Radio Frequency Identification (RFID)

2.2 Technical Overview

. In this regard, active RFID tags have their own source of power, normally an integrated battery. Passive tags, on the other hand, acquire their electrical energy from an external reader signal. RFID readers as well are in passive and active varieties, all relying on the type of tag being read. (Weinstein, 2005, p.27) store a number of somewhat identification number; for instance the client’s product or number stock-keeping unit code. In this case, the information concerning the identification number is retrieved by a reader from the database, and is accordingly executed. What’s more, RFID tags may as well have writable memory that has the ability to storing information intended for transfer to diverse RFID readers in various locations. RFID tags can be categorized into two groups, passive and active, relying on their power sourceWeinstein (2005, p.28)he key premise behind RFID technology is that businesses mark their items with tags, and such tags have transponders, which send out readable messages through particular RFID readers. The majority of RFID tags, as per Weinstein (2005, p.27) establisjed that t, in the future ubiquitous-computing setting, all sorts of business-related products as well as other physical items will have RFID tags attached to them, and might turn out to be an essential technology for ever-present services wherein RFID technology is utilised for identifying things as well as people automatically. Still, in spite of this assurance, the possible misuse (or merely too much utilisation) by government agencies and retailers of the tracking capability of RFID technology raises issues concerning possible infringements of individual privacy. Ohkubo et al. (2005, p.11)According to

2.3 RFID Standards

posit that data and configuration management capabilities presented by standard products make allowances for modification of the system to optimize for broadly changeable application settings. Therefore, spending in an infrastructure that is standardized guarantees the long-standing value of the investment.Krishna and Husak (2007, p.7). Additionally, country’s regulatory standard bodies are tasked with defining the Radio frequency (RF) spectrum utilised by RFID-based devices. From the customers’ point of view, products that are standardized generate an environment that is rich with competition, which as a result, breeds price reductions as well as technological improvements. Triumphant standards such as the Class 1 Generation 2 UHF Air Interface Protocol as well as the modern software protocols such as Low Level Reader Protocol (LLRP) Standard, Application Level Events (ALE) Standard and EPC Information Services (EPCIS), by means of worldwide approval, has reduced the costs of system design for all and sundry; thus, expanding niche markets into mass markets. End users as well as System integrators gain from: tools that completely bear standard interfaces and as a consequence offer assured interoperable deployment. What’s more, (Krishna & Husak, 2007, p.6)At present, across the globe, RFID standardization is steered mainly by the International Standardization Organization (ISO) as well as EPCglobal. Both ISO and EPCglobal present emerging and existing standards, wherein the majority of RFID aspects are covered, commencing at the air interface as well as spanning the exchange of enterprise data

2.4 RFID applications

posits that RFID tags are employed for tracking products all through the supply chain. Personal ID applications as well as security are a key and wide use of RFID. Scores of business organizations make use of RFID tags implanted in identification cards that can be read at the entrance of the building. Weinstein (2005, p.28), RFID applications are many and across-the-board, and the most attention-grabbing and broadly utilised applications comprise those for security, supply chain management, as well as the tracking of personnel and vital objects. For instance, in supply chain management, Hossain and Prybutok (2008, p.318)According to

2.5 Privacy and Security

it is disturbing for scores of individuals to have their buying habits or movements to be tracked automatically and by electronic means. Lots of privacy entities are worried about the capability to recognize customers as they walk into a shopping mall using the tags implanted in their attire and connected to them when purchasing. Security is an additional key concern in RFID, so score of businesses integrate RFID to their supply chain to stop competitors from tracking their inventory as well as shipments. Individuals who make use of devices that bear private financial information, like credit card numbers, refuse to allow others to access their information. Ohkubo et al. (2005)The main worry concerning RFID is privacy, and as mentioned by

2.6 Comparison with Barcodes

. (Krishna & Husak, 2007, p.5)Unlike barcode readers, RFID technology permits for tag reading from a bigger distance, even in insensitive settings. Additionally, barcodes imprinted information is fixed and so cannot be updated while for RFID tags, they have electronic memory akin to what is in digital camera or computer for storing information concerning the equipment or inventory, and importantly this information may be updated dynamically

2.7 Recommendations and Summary

is a promising technology which market analysts anticipate to develop into ubiquitous in the future, aiding business organizations work out their difficulties in areas such as, security, supply chain management, personal ID, as well as asset tracking.Weinstein (2005) and Ohkubo et al. (2005) recommend that prior to it being trusted adequately by millions of common customers in order to be riveted into the social and economic and infrastructure, the discussed security threats have to be acknowledged and proper countermeasures pursued by vendors and developers of RFID, together with government regulatory agencies. In conclusion, RFID as a technology that has existed for decades, have demonstrated its worthiness and is currently being utilised in various applications. Despite the fact that it has scores of challenges and issues, RFID without doubt as mentioned by Hossain and Prybutok (2008), RFID technology will probably breed and play a crucial technological part in the global economy that is Internet connected, which will include home appliances as well as residential design. However, Krishna and Husak (2007)posits that the reader makes use of either a randomly or fixed generated number to encrypt its ID. In sum, as argued by Weinstein (2005, p.32) have recommended plans that would need tags to verify readers; thus, conveying information just to allowed readers. In this regard, the tags would need to amass identification numbers for approved readers, and also the reader would be required to transmit its ID to the RFID tag. In order to guard the ID of the readers as well as stop others from stealing the information, Weinstein and Ohkubo et al A number of researchers such as

3.0 References

Hossain, M.M. & Prybutok, V.R., 2008. Consumer Acceptance of RFID Technology: An Exploratory Study. IEEE Transactions on Engineering Management , vol. 55, no. 2, pp.316 — 328.

Krishna, P. & Husak, D., 2007. RFID INFRASTRUCTURE. IEEE Applications & Practice, pp.4-10.

Ohkubo, M., Suzuki, K. & Kinoshita, S., 2005. RFID privacy issues and technical challenges. Communications of the ACM, vol. 48, no. 9, pp. 66-71.

Weinstein, R., 2005. RFID: A Technical Overview and Its Application to the Enterprise. IT Professional, vol. 7, no. 3, pp.27 — 33.