Consumers' Perceptions of Item-Level RFID Use in FMCG

2017 ◽  
Vol 25 (1) ◽  
pp. 21-42 ◽  
Author(s):  
Wesley Kukard ◽  
Lincoln Wood

This research explores how perceived consumer benefits affect the perceived privacy risks from implementation of Radio Frequency Identification (RFID) tags at an item-level in the Fast Moving Consumer Goods (FMCG) industry. Two new categories measure the benefits and risks: in-store and after-sales. These specific categories allow the respondents' willingness to accept RFID to be evaluated using a quantitative survey focused on the primary household grocery purchasers within the USA. The results suggest differences in perceptions of the in-store and after-sales risks and benefits of RFID use. While consumers are aware of privacy risks while using RFID technology, they would be willing to use the technology if sufficient benefits are available. This research moves the discussion away from a focus on consumer privacy issues to a balanced privacy/benefits approach for consumers and how that might affect their technology acceptance, suggesting that careful management of consumer benefits might allow FMCG firms to introduce RFID technology to support their global supply chains.

2019 ◽  
pp. 1384-1407 ◽  
Author(s):  
Wesley Kukard ◽  
Lincoln Wood

This research explores how perceived consumer benefits affect the perceived privacy risks from implementation of Radio Frequency Identification (RFID) tags at an item-level in the Fast Moving Consumer Goods (FMCG) industry. Two new categories measure the benefits and risks: in-store and after-sales. These specific categories allow the respondents' willingness to accept RFID to be evaluated using a quantitative survey focused on the primary household grocery purchasers within the USA. The results suggest differences in perceptions of the in-store and after-sales risks and benefits of RFID use. While consumers are aware of privacy risks while using RFID technology, they would be willing to use the technology if sufficient benefits are available. This research moves the discussion away from a focus on consumer privacy issues to a balanced privacy/benefits approach for consumers and how that might affect their technology acceptance, suggesting that careful management of consumer benefits might allow FMCG firms to introduce RFID technology to support their global supply chains.


Author(s):  
Wesley A. Kukard ◽  
Lincoln C. Wood

This chapter reviews past radio frequency identification (RFID) literature within the fast-moving consumer goods (FMCG) industry and the impact of consumer benefits on the perceived risks of item-level RFID. Two new categories are used to measure this impact; the separation of consumers' interactions with the technology to in-store and after-sales allows the consumers expectation of privacy to changes depending on the surrounding environment. A quantitative survey on primary household grocery purchasers within the USA revealed that while consumers are aware of the associated privacy risks after sale, they would be willing to use the technology, given sufficient benefits. This important step in RFID literature changes the conversation from a privacy risk management focus to a balanced integration of the technology, focusing on consumer benefits to manage the roll-out within the FMCG industry.


Author(s):  
Wesley A. Kukard ◽  
Lincoln C. Wood

This chapter reviews past radio frequency identification (RFID) literature within the fast-moving consumer goods (FMCG) industry and the impact of consumer benefits on the perceived risks of item-level RFID. Two new categories are used to measure this impact; the separation of consumers' interactions with the technology to in-store and after-sales allows the consumers expectation of privacy to changes depending on the surrounding environment. A quantitative survey on primary household grocery purchasers within the USA revealed that while consumers are aware of the associated privacy risks after sale, they would be willing to use the technology, given sufficient benefits. This important step in RFID literature changes the conversation from a privacy risk management focus to a balanced integration of the technology, focusing on consumer benefits to manage the roll-out within the FMCG industry.


Author(s):  
Peter J. Hawrylak ◽  
Nakeisha Schimke ◽  
John Hale ◽  
Mauricio Papa

Electronic healthcare or E-Health promises to offer better care at lower cost. This is critical as the cost of healthcare continues to increase and as the population ages. Radio Frequency Identification (RFID) technology is one form of wireless technology that will be part of the E-Health environment. RFID provides the ability to identify, track, and monitor patients and staff members. This enables better resource allocation, reduction of medical errors, and increased independence for patients. One part of E-Health is the Electronic Medical Record (EMR). New developments in RFID technology now enable the storage of all or part of the EMR on an RFID tag that remains with the patient. This chapter investigates the use of RFID in E-Health, how RFID can be used to store the EMR, and the security and privacy risks associated with using RFID to store the EMR.


Author(s):  
Vishwajeet V. Jituri

The usage of RFID technology is rapidly increasing. The RFID system provides distinct advantages over the traditional barcode system. The RFID technology is being used in many areas like toll collection, shopping and retail, agriculture, transportation, industries, academics etc. There are some limitations also with the RFID technology including the privacy issues. This paper describes some of the RFID uses which result in ease of life.


Author(s):  
Denis Trcek

Mass deployment of radio-frequency identification (RFID) technology is now becoming feasible for a wide variety of applications ranging from medical to supply chain and retail environments. Its main draw-back until recently was high production costs, which are now becoming lower and acceptable. But due to inherent constraints of RFID technology (in terms of limited power and computational resources) these devices are the subject of intensive research on how to support and improve increasing demands for security and privacy. This chapter therefore focuses on security and privacy issues by giving a general overview of the field, the principles, the current state of the art, and future trends. An improvement in the field of security and privacy solutions for this kind of wireless communications is described as well.


Electronics ◽  
2021 ◽  
Vol 10 (5) ◽  
pp. 599
Author(s):  
Ji Young Chun ◽  
Geontae Noh

The employment of mobile readers (or mobile phone collaborated with a Radio frequency identification (RFID) reader) opens a novel application for RFID technology. In particular, an RFID tag search system has been designed to find a particular tag in a group of tags using a mobile reader. Unfortunately, privacy infringement and availability issues in the search system have not been adequately addressed to date. In this paper, we propose a novel RFID tag search protocol that will enhance mobile reader user privacy while being able to operate under conditions of unstable connection to a central server. First, the proposed protocol preserves the privacy of mobile reader users. The privacy of the mobile reader user is at risk because the signal strength emitted from a mobile reader is much stronger than that from the tag, exposing the location of the mobile reader user and thus compromising the user’s privacy. Thus far, such privacy issues have been overlooked. The second issue is presented because of wireless connections that are either unreliable or too remote, causing a mobile reader to disconnect from the central server. The proposed protocol enables serverless RFID tag searches with passive tags, which obtain operating power from the mobile reader. In unstable environments, the protocol can successfully locate specific tags without any server.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2902 ◽  
Author(s):  
Pagán Alexander ◽  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which must be overcome to resolve RFID security and privacy issues. One reason is the constraints attached to the provision of security and privacy in RFID systems. Along with meeting the security and privacy needs of RFID technology, solutions must be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and long-lasting. To make RFID identifiers effective and efficient they must identify the item(s) while resisting attacks aimed at obtaining the tag’s information and compromising the system or making it possible to bypass the protection RFID tags are supposed to provide. Different authentication methods have been proposed, researched, and evaluated in the literature. In this work, we proposed our methodology in evaluating RFID authentication, and a few of the most promising authentication methods are reviewed, compared, and ranked in order to arrive at a possible best choice of protocol to use.


2014 ◽  
Vol 548-549 ◽  
pp. 1430-1432 ◽  
Author(s):  
Yi Xie ◽  
Dong Wang

The IOT(Internet of Things) is thriving to connect everything on our planet. With the maturity of Radio Frequency Identification technology, companies are adopting RFID technology into their legacy systems. However, systems of different companies are facing obstacles in establishing mutual trust to be partners of the IOT. This paper proposes an item-level access control framework for inter-system security in the IOT, promising to help solve the issue and drive the development of the IOT a step forward.


Author(s):  
Denis Trcek

Mass deployment of radio-frequency identification (RFID) technology is now becoming feasible for a wide variety of applications ranging from medical to supply chain and retail environments. Its main draw-back until recently was high production costs, which are now becoming lower and acceptable. But due to inherent constraints of RFID technology (in terms of limited power and computational resources) these devices are the subject of intensive research on how to support and improve increasing demands for security and privacy. This chapter therefore focuses on security and privacy issues by giving a general overview of the field, the principles, the current state of the art, and future trends. An improvement in the field of security and privacy solutions for this kind of wireless communications is described as well.


Sign in / Sign up

Export Citation Format

Share Document