An RFID (Radio-Frequency Identification): Review Research Paper

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

An RFID (Radio-frequency identification) chip can considered an ingenious device due to its overall simplicity yet wide applicability in a variety of fields and applications (Nikitin, Rao, Martinez, & Lam, 2009). The chip, no bigger than a grain of rice, works via system of query and transmission wherein the chip releases a coded identification number when it is queried by a reader device that produces the necessary type of signal (Nikitin, Rao, Martinez, & Lam, 2009). The result is a method of tracking and identification which enables companies, medical institutions and even government agencies to immediately identify and track a particular object or person based on the RFID signal transmitted by an embedded chip (Harris, 2006). For example, the Verichip, a small innocuous device no bigger than a grain of rice, was debuted in the latter half of 2004 as being a safe and efficient way for hospitals to access the medical history of a patient so as to speed up treatment and recovery via an embedded RFID chip in their arm.

In a way the advent of this particular type of technology could be thought of as a medical milestone, the future of medicine so to speak; wherein doctors, EMTs, nurses and various other medical personnel can quickly and accurately diagnose a patient’s current condition based on their medical history should the patient be unconscious, unable to speak or is relatively unaware of their own history of medical care. From the point of view of medical practitioners the use of medical “chips” is a positive facilitator of medical care since not only can doctors respond quickly and efficiently to a patient’s condition but they can avoid utilizing particular medicines, procedures or methods of treatment should the patient’s medical record reveal a possible adverse reaction to the intended procedure. Aside from their use in medical institutions RFID chips have been utilized extensively in the transportation industry via installed electronic toll way collection systems. Such devices are commonly seen on commuters who utilize highways or other locations that have tolls in place. These systems allow drivers to pay a select amount beforehand allowing the toll readers to identify the transmitted code attached to the driver’s RFID systems and automatically allow them to pass through while at the same time deducting the amount utilized in the toll within their systems. Other more subtle methods of RFID technology use has been their implementation in passport systems and large scale agricultural operations. The technology in effect has made it easier to easily track both people and animals as they are transported from one location to another thus facilitating easy identification leading to access to particular ports of entry.

Evolution of RFID via Entrepreneurs

Thamhain (2009) indicates that research and development into new ways of producing and utilizing technology is one of the practices most often seen in technology intensive enterprises (Thamhain, 2009). This is due to the fact that technology has as of late been under a constantly accelerating level development and as a result has enabled new players to enter into markets whereas in the past distinct barriers to proper entry would have been present (Thamhain, 2009). As such failure to sufficiently innovate along with new technological trends and products can be thought of as a failure on the part of the managerial practices at a company since being able to anticipate trends and use them to either reach greater market penetration or keep the company relevant to consumers is a necessity in today’s technology intensive market economy. In this regard, authors such as Thamhain (2009) state that entrepreneurs are the vanguards of such a practice due to their ability to utilize already existing technology in ways that were not originally perceived by the inventors but have in effect spawned very successful niche markets.

One of the more interesting cases where this was utilized was explained by the case study of the Technology review (2004) which focused on an examination of how RFID technology was popularized as a way in which to track pets that had escaped or were stolen (Micro tracker, 2004). As the Technology review (2004) explains, the entrepreneurs who implemented this type of innovative procedure sought to fulfill a market niche within the pet industry involving lost or stolen pets (Micro tracker, 2004). Since an RFID chip can be embedded within an animal with no ill effects, embedded chips placed on certain strategic locations on an animals body enables them to be easily identified and tracked when either caught by local animal shelters or if they are brought to a veterinarian’s office by another individual. Other uses of the technology via entrepreneurs has taken the form of the development of small scale RFID trackers with can be utilized in order to track missing objects within a small area.

Since an embedded RFID chip can be read and located via a reader within a 10 meter radius (provided that there are no blockers surrounding the chip) this as a result enables the immediate detection of a lost item. This has become a popular method for stores to both track the location of their inventory as well as prevent their theft with RFID detectors being placed on the fronts of most stores which prevents malicious individuals from coming in and appropriating merchandise without paying for it. Similar types of products are also available to the general public via small scale RFID devices that can be placed within certain items such as a laptop, iPod case, and variety of other types of electronics. This prevents their resale should they be stolen and as a result would lead to the arrest of the person who stole the gadget in the first place. One of the last ways in which RFID technologies have been repurposed by entrepreneurs has been their repurposing as a method of cashless transactions within various parts of Japan. An attached RFID indicator attached to a cell phone and the proliferation of “cashless machines” (i.e. machines that do not accept cash but rather digital methods of payment) has resulted in a greater adoption of this new method of payment which reduces costs inherent to the collection of actual paper money or coins.

Application in Company Information Systems

Information systems can be described as the interface between people, organizations and technology enabling the business to accomplish a specific task or action. One example of an information system are the various applications and websites utilized by Amazon in selling products, accepting client payments through credit card processing applications, contacting their warehouses and shipping bought products to the correct addresses indicated by their consumers. While this is only a one example of the plethora of information systems out there what must be understood is that information systems act as methods of integration for a company helping to streamline specific processes so that they can be controlled, influenced and improved when necessary. Developing proper information systems is an essential aspect for a company for without it a company will be unable to properly deal with the buying, selling and the utilization of resources across various locations in the country. Due to the varied and often complicated nature of company operations it becomes a necessity to streamline and integrate product delivery processes, methods of operation, customer service and various other operational capacities. This is where RFID technology enters into the picture, through the use of embedded chips within shipping containers, IDs and even vehicles companies have in effect integrated RFID technology into their own information systems thus resulting in far more efficient methods of tracking, sorting and granting access to appropriate individuals for use of particular facilities. This establishes a distinct precedent and shows that RFID chips can be utilized and integrated within already present information systems and as such can be implemented with little, if any difficulty, should the technology be modified in order to conform to already present processes.

Current Problems with the RFID Business Model

An examination of the current RFID business model reveals several gaps in its overall approach which actually prevents the technology from meeting its potential. First and foremost, the utilization of RFID chips has primarily been isolated towards tracking and identification. While this was its original purpose there are other possibilities for the technology which have been neglected. For starters studies such as those by (McKee & McKee (2011) indicate that one possible utilization of the technology could be in a way in which it could contain personally identifying information in order to reduce instances of identity theft (McKee & McKee, 2011). This can be accomplished by embedding people with the chip so as to create a way in which it would be almost impossible for duplication to occur. While the point of view of McKee & McKee (2011) is still within the realm of theory, it does present a viewpoint that should be taken into consideration especially with the use of the chips in the medical field. Not only that, there have been relatively few instances where these types of chips have been utilized in daily transactions despite the fact that they can actually add an added level of protection to most transactions. It is based on this that it is recommended that the RFID industry accomplish the following in order to stay relevant:

  1. Reevaluate its current business model.
  2. Recreate its current product to match the demands of modern day consumers.
  3. Focus on new technology oriented trends in development.
  4. Develop a means of distribution that utilizes new innovative technological products.
  5. Create information systems in order to keep pace with the rapid development of news and information that is present on the internet today.

Controversies Attached to RFID Usage

Despite these apparent advantages, privacy concerns are at the forefront of the debate against their usage by the general public due to the potential for disreputable individuals to gain access to an individual’s private records via an appropriated RFID reader. The case of Weis (2011) reveals that while the technology itself makes it easier to track, locate and facilitate the transfer of people, goods and services it has also made it that much easier for unscrupulous individuals to abuse the technology for their own ends Weiss (2011). This took the form of people who “stole” RFID identification data via a reader and embedding it in their own customized chips. By doing so this in effect allowed them to access services without having to pay for them or even pretend to be someone else based on embedded RFID telemetry data.

As noted by studies such as Weiss (2011) which examined the prevalence of hacking and hacking related crimes, any form of personally identifiable information that can be easily and openly accessed can be used by hackers as a form of identity theft. Weiss (2011) pointed to the case of implanted RFID medical chips wherein people may not even realize that their medical information could be accessed, copied and used as way to for others to pose as them in order to receive free medical treatment (Weiss, 2011). With the increasing prevalence of RFID usage also comes with it criticisms in the way in which it supposedly enables the government and private corporations to in effect track the movement of any individual broadcasting an RFID frequency. For example, one of the current plans of the U.S. government is to implant an RFID medical chip in every U.S. citizen so as to facilitate easy identification of certain individuals leading to faster medical care.

Unfortunately, one of the consequences of having an RFID chip embedded within your body is that should there be RFID readers placed in certain public locations a person can in effect be tracked wherever they go which many consider to be a massive violation of privacy. It must also be noted that studies such as those by Reza & Geok (2009) indicate that despite the increasingly sophisticated methods of ensuring that information within RFID chips can only be read by appropriate readers with the right type of authentication key, hackers and a variety of other unscrupulous individuals have also “stepped up their game” so to speak creating increasingly clever ways to circumvent the protective measures meant to ensure the safety of private data contained within the chips (Reza & Geok,2009). Reza & Geok (2009) even notes that the problem lies in the broadcasting of information itself which is the main problem behind RFID chip technologies since it practically invites unscrupulous individuals to attempt to access this broadcast for their own aims (Reza & Geok,2009.

Necessity of the Technology

It must be noted though that based on view of Brusey & McFarlane (2009) embedded RFID technology can be considered a necessity in the future due to the continuing growth and sophistication of individuals who steal identities for a living (Brusey & McFarlane, 2009). As Brusey & McFarlane (2009) explains, with the increasing sophisticated methods of identity thefts comes the necessity of developing methods in protecting an individual’s identity. With the ability of embedded RFID technology to create unique frequencies inherent to a particular chip this creates a level of protection that cannot be replicated easily. It must also be noted that based on data examining the prevalence of medical error related deaths in the U.S. nearly 195,000 people die every year within hospitals due to some medical related error that was unforeseen from the onset of treatment (Medical News, 2004).

In fact, based on studies from Encinosa and Hellinger (2008) it was noted that a large percentage of deaths from some form of treatment error came about as a direct result of a misdiagnosis by doctors as well as unforeseen consequences when using particular methods of treatment due to the apparent lack of information regarding the patient’s medical history (Encinosa & Hellinger, 2008). From this alone it can be seen that there is a distinct necessity in ensuring accurate medical information can be obtained by health care professionals so as to reduce the number of deaths that come about due to lack of information (Dodek, 2010). The utilization of implanted medical chip technology would be able to provide the necessary information doctors need especially if implemented on a global scale. In fact utilization of the technology is rather cheap when compared to the possible complications that may arise as a result of a misdiagnosed medical condition and as such proves the importance of utilizing this particular technology as a global healthcare standard.

Another factor that should be taken into consideration is the possibility of the technology improving within the chip so that aside from enabling access to a person’s medical records it would also be able to monitor a person’s health on a real time basis without having to be connected to cumbersome hospital equipment. This particular type of internal analysis can come in form of cholesterol level monitoring, blood pressure, presence of foreign chemicals in the system etc. These readouts can be utilized by doctors when the patient comes in for a checkup in order to determine the exact causes of certain maladies a person has. Not only would this significantly decrease the time it would take to diagnose a patient’s current condition but it would also help doctors determine whether there is any significant effect on the patient’s health over a long term period due to prescribed medication. On the other hand this particular aspect of the technology is still under development and as such its implementation could be decades more in the future. Other aspects that can be developed in the future regarding this particular type of technology take the form of integrated identification systems wherein aspects related to payment.

Globalizing RFID

It is interesting to note that RFID technology has already been accepted on a global scale by thousands of companies around the world. Embedded RFID chips can already be found in a multitude of company ID systems which are utilized in order to grant employee access to a variety of departments and facilities. RFID technology is also utilized in a variety of Universities wherein an embedded RFID chip within an ID card is encoded with a reference number attached to a particular student which in effect allows guards to ensure that only registered students can enter the school’s facilities. It is based on this particular precedent regarding the utilization of the technology that it can be stated that RFID technology can be easily implemented into a variety of new processes involving identification since it has already been implemented in a similar capacity.

Conclusion and Recommendation

From the point of view of this paper it can be seen that despite the issues of privacy violation and identity theft the fact remains that the implanted RFID chips, such as the Verichip, can help to reduce the number of instances involving identity theft as well as medical error related deaths and as such should be implemented for use to the general public. One way of ensuring that the issues brought up in this paper don’t occur is utilize a form of randomized encryption software on implanted chips that is update after every visit so as to ensure that only people with the right encryption key (medical professionals and hospitals) can access and review the information stored inside.

Assignment 2

Abstract

This paper examines utilization of embedded RFID chips within credit cards and various methods of identification in order to prevent occurrences of identity theft.

Introduction

Identity theft has resulted in millions of dollars in losses and considerable grief for a large percentage of today’s modern day consumer. This is due to the fact that more and more of what defines “identity” is connected to the method of identification utilized which consists of a physical form of identification such as a credit card, drivers license or even a passport. When investigating this particular issue it was seen that the research has primarily concentrated on either making information regarding an individual’s identity harder to get or methods in which identity theft can be detected early on, very few cases have actually delved into the concept of preventing the problem in a way that allows the information to be taken but makes it useless to actually utilize. This is the primary gap in the research that this article seeks to close by presenting a solution involving RFID technology wherein through its use cases of identity theft can be greatly reduced on a global scale without having to place a customer/client/citizen through any undue complications. What this article expects to point out is that there are alternatives to the current methods of identity protection and that through a pursuit of these alternatives a better and more efficient method can be implemented. It is based on this that this article will address the problem of identity theft through the implementation of an embedded RFID chip within various method of identification to ensure that they cannot be easily copied thus reducing instances of identity theft. This will be done through a presentation of how the technology works, its viability if implemented in present day systems, who will benefit and what will be the end result of such an endeavor.

What is an RFID Chip?

An RFID (Radio-frequency identification) chip can considered an ingenious device due to its overall simplicity yet wide applicability in a variety of fields and applications. The chip, no bigger than a grain of rice, works via system of query and transmission wherein the chip releases a coded identification number when it is queried by a reader device that produces the necessary type of signal. The result is a method of tracking and identification which enables companies, medical institutions and even government agencies to immediately identify and track a particular object or person based on the RFID signal transmitted by an embedded chip. Due to its overall size and the fact that the technology is relatively cheap to implement this means that it can in effect be utilized in a wide variety of possible methods of identification.

The Problem

While RFID chips are already utilized within passports what they currently are not utilized in, yet which serves as some of the main ways in which identity thieves steal an individual’s identity, is in credit cards, debit cards and drivers licenses. While it may be true that an individual can call in to the bank to cancel their credit card/ debit card this does not necessarily mean that they may be able to do it in time. For example, it was seen in the study of McKee & McKee (2011) that identify thieves can obtain credit card/ debit card numbers through a wide assortment of methods such as through a hidden scanner installed in an outdoor ATM, through online purchases or even through restaurant attendants who steal the information on a credit card and sell it to the black market (McKee & McKee, 2011). Drivers licenses can also be similarly targeted since copies of licenses are often required for job applications resulting in the possibility of such records being stolen due to inefficient methods of filing and disposal.

Solution

The solution to this problem is actually quite straight forward, each RFID chip has a frequency that is unique only to itself as well as possesses the ability to transmit various types of information that can only be accessible by individuals with the proper type of reader and even the correct kind of code in instances involving some of the more complex chips out there. Due to their relatively small size they can be easily embedded within an assortment of different types of cards which does not make them immediately apparent. Not only that, RFID scanners are actually relatively cheap and all it would take would be to create a separate database along with the primary database utilized to scan various methods of identification so that they can work in conjunction with each other in order to ensure that the ID being utilized is actually valid. By implementing a system where an RFID chip is embedded within these particular methods of identification and creating a setup where the information presented is utilized in conjunction with information on the chip, this in effect limits the number of opportunities where a fake method of identification is utilized.

Approach to Coming up with a Solution

Developing a solution to this problem was actually pretty straightforward; all it took was an examination of how RFID technology works and how it could best be implemented in a situation that involved a secondary degree of identification. By examining new ways in which RFID technology has been implemented at the present I was able to devise the aforementioned solution.

Implications of Solution

The implication of my proposed solution is in effect an easier and above all affordable method of secondary identification that helps to prevent instances of identity theft through the use of RFID technology.

Viability within Present Day Systems

Based on the study of the Technology Review (2004), it can be seen that RFID chips can be implemented within modern day information and identification systems due to a variety of aspects of the technology which will be elaborated on (Micro tracker, 2004). First and foremost it is cheap; the average price of a single RFID embedded chip is less than a dollar due to its overall size and limited capacity as an electronic gadget. This means that it can be easily implemented on a large scale without having to worry about the inherent costs. Secondly it is small; due to its size which is barely larger than a grain of rice it can be easily placed within a wide variety of credit cards, debit cards and drivers licenses without any noticeable difference. As such, this ensures that the various methods of identification can continue to function as normal without them having to undergo any significant changes to their overall structure. Lastly, RFID scanners are not bulky in the least and can function without any significant inconvenience for a customer. Evidence of this can be seen in the way in which electronic toll ways found in various highways do not require the driver to activate a button, flash some form of identification or any other action since the electronic RFID device placed within their can be automatically scanned and the amount deducted from the preloaded credits added onto their account. The same concept can be easily applied to either a credit card or a debit card wherein card readers can be easily modified to read not only the magnetic strip on the card itself but also the embedded RFID chip.

Who cares if the Problem is solved?

Those who would care if the problem is solved are primarily government agencies, financial institutions and everyday consumers who are at risk of identity theft. By resolving this issue through the use of RFID technology this in effect reduces the amount of funds wasted by government agencies, consumers and financial institutions alike in resolving issues related to identity theft.

Who Will Benefit?

Those who will benefit the most from the implementation of such a system would of course be modern day consumers. Since this system does not require any effort on their part this would in effect allow them to go about their daily business with the exception that their identities are better protected. Banks and various financial institutions would also benefit from this since this would reduce the millions of dollars in losses that they experience on a yearly basis as a direct result of credit card/ debit card fraud. Lastly, government institutions would also benefit considerably from the implementation of such a system since the instances where they would have to deal with problems related to the stolen identity of a citizen would be greatly reduced. It must also be noted that as of late RFID chips have become an increasingly utilized method of medical identification wherein they are at times implanted into various patients in order to help doctors immediately identify them, access pertinent medical records regarding treatment and immediately perform the correct types of procedures (Medical News, 2004).. Should the technology become adopted on a wide scale by companies at the present it can be expected that it will eventually come to a point that an embedded RFID chip will become the primary method by which a person can identify themselves and pay for certain goods.

Conclusion

Based on all the facts presented it can be seen that embedded RFID technology can be an effective way of reducing the number of incidents involving identity theft. As such, should this particular type of technology catch on it can be expected that not only will consumers feel safer but banks, government agencies and various financial institutions can in effect devote the money that would have otherwise been lost to fraud towards other endeavors.

Reference List

McKee, T. E., & McKee, L. B. (2011). Helping Taxpayers Who Are Victims of Identity Theft. CPA Journal, 81(7), 46-50.

Medical News, (2004). In hospital deaths from medical errors at 195,000 per year usa. Web.

Micro tracker. (2004). Technology Review, 107(3), 18.

Brusey, J. J., & McFarlane, D. C. (2009). Effective RFID-based object tracking for manufacturing. International Journal Of Computer Integrated Manufacturing, 22(7), 638-647.

Dodek, P. (2010). 2 or more medical errors with adverse consequences, affecting 2.6% of patients, increased mortality in intensive care units. ACP Journal Club, 152(5), 11.

Encinosa, W. E., & Hellinger, F. J. (2008). The Impact of Medical Errors on Ninety-Day Costs and Outcomes: An Examination of Surgical Patients. Health Services Research, 43(6), 2067-2085.

Harris, A. A. (2006). Frozen chips [RFID chips]. Computing & Control Engineering, 17(3), 16-21.

McKee, T. E., & McKee, L. B. (2011). Helping Taxpayers Who Are Victims of Identity Theft. CPA Journal, 81(7), 46-50.

Medical News, (2004). Web.

Micro tracker. (2004). Technology Review, 107(3), 18.

Nikitin, P. V., Rao, K., Martinez, R., & Lam, S. F. (2009). Sensitivity and Impedance Measurements of UHF RFID Chips. IEEE Transactions On Microwave Theory & Techniques, 57(5), 1297-1302.

Reza, A., & Geok, T. (2009). Objects tracking in a dense reader environment utilising grids of RFID antenna positioning. International Journal Of Electronics, 96(12), 1281-1307.

Thamhain, H. J. (2009). Managing globally dispersed R&D teams. International Journal Of Information Technology & Management, 8(1), 107-126.

Weiss, s. (2011). Tempting target. State Legislatures, 37(6), 30. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, May 3). An RFID (Radio-Frequency Identification): Review. https://ivypanda.com/essays/an-rfid-radio-frequency-identification-review/

Work Cited

"An RFID (Radio-Frequency Identification): Review." IvyPanda, 3 May 2022, ivypanda.com/essays/an-rfid-radio-frequency-identification-review/.

References

IvyPanda. (2022) 'An RFID (Radio-Frequency Identification): Review'. 3 May.

References

IvyPanda. 2022. "An RFID (Radio-Frequency Identification): Review." May 3, 2022. https://ivypanda.com/essays/an-rfid-radio-frequency-identification-review/.

1. IvyPanda. "An RFID (Radio-Frequency Identification): Review." May 3, 2022. https://ivypanda.com/essays/an-rfid-radio-frequency-identification-review/.


Bibliography


IvyPanda. "An RFID (Radio-Frequency Identification): Review." May 3, 2022. https://ivypanda.com/essays/an-rfid-radio-frequency-identification-review/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1