• About
  • Advertise
  • Contact
Wednesday, April 15, 2026
No Result
View All Result
NEWSLETTER
iotindiana
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotindiana
No Result
View All Result
Home Security

RFID, presence and privacy

in Security
0
SHARES
6
VIEWS
Share on FacebookShare on Twitter

I shuddered not once, but twice during a recent local newscast that demonstrated how a mere fingerprint scan will soon replace an ATM or credit card swipe for the purchase of goods and services.

The first shiver was for the ease with which I’ll soon be blowing wads of cash with literally the touch of a finger. The second, with a slight nod to Anna Ayala of the Wendy’s finger-in-the-chili fiasco and a big one to Tom Cruise’s retinas in the 2002 flick “Minority Report,” came as I envisioned opportunists eagerly hacking off the index fingers of people with fat bank accounts.

It sounds preposterous, but we do keep inventing things with scary downsides that need some consideration up front. Take the potential privacy issues associated with presence applications. Within a couple of years, they will be enhanced with radio frequency identification (RFID) technology to fulfill part of their location-tracking requirement.

Presence, as you likely know, is about a centralized unified communications application working across wired and wireless networks to keep track of who you are, where you are and what you’re doing. Its goal from a business perspective is to help you manage dynamic communication; to automatically let in the important communication that you need, even in exceptional circumstances, yet send non-urgent communication to a mailbox if you are already constructively engaged.

One part of the location piece of presence will be RFID tags in mobile communications devices. In a healthcare setting, the nearest doctor to a patient in crisis with the most appropriate skill set can be quickly located and dispatched, improving patient care and possibly saving lives.

Retailers with RFID readers throughout their stores might identify customers carrying mobile phones with RFID tags and match them to their purchasing and preferences files. This could be helpful. Or it could be a travesty, depending on how the retailer deploys and manages the technology.

Much in the way talking heads greeted Tom Cruise’s “Minority Report” character, John Anderton, by name to sell him his favorite brands in the mall of 2054, we could suddenly find ourselves barraged by video ads, e-mails, SMS messages and phone calls, all pushing something in the store that applies to us.

Customized service is great to have; but we need it managed in a way that is helpful rather than intrusive.

Learn more about this topic

The privacy challenge

Network World, 05/30/05

IBM has some tall RFID plans

Network World, 05/02/05

Freedom through surveillance data

Network World, 05/02/05

Aruba corrals foreign WLAN clients

Network World, 06/06/05

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2005 IDG Communications, Inc.

Download Nulled WordPress Themes
Free Download WordPress Themes
Download WordPress Themes
Download Nulled WordPress Themes
udemy free download
download xiomi firmware
Download Best WordPress Themes Free Download
free download udemy course
Tags: presence and privacyRFID
Next Post

Start-up plotting to keep RFID traffic under control

Recommended

USENIX researchers get a grip on Hadoop performance

Amazon.com may be working on Etsy competitor

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Indiana USA

© 2024 iotindiana.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotindiana.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In