Skip to main content

Table 10 Transparency issues

From: A systematic review of RFID applications and diffusion: key areas and public policy issues

Issue Paper Year Case Country
Tag Corruption Armknecht et al. 2010 Tag corruption can be occurred at every stage of RFID implementation  
Jules 2006 Dupyu staff attach cloned tags to counterfeit drugs US
Reader Corruption Lee et al. 2012 Although reader corruption can cause serious privacy attack, most of the scholars do not consider it as security problem.  
Cheating Reichenbach 2008 Waste being disposed of at work places EU
Bilitewski 2008 Burning waste or transferring it to outside EU