Skip to main content

Table 10 Transparency issues

From: A systematic review of RFID applications and diffusion: key areas and public policy issues

Issue

Paper

Year

Case

Country

Tag Corruption

Armknecht et al.

2010

Tag corruption can be occurred at every stage of RFID implementation

 

Jules

2006

Dupyu staff attach cloned tags to counterfeit drugs

US

Reader Corruption

Lee et al.

2012

Although reader corruption can cause serious privacy attack, most of the scholars do not consider it as security problem.

 

Cheating

Reichenbach

2008

Waste being disposed of at work places

EU

Bilitewski

2008

Burning waste or transferring it to outside

EU