Abstract
This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales uses. A proposal to address these privacy concerns is detailed, generally based on past philosophical frameworks and specifically on the Fair Information Practices that the Federal Trade Commission has outlined for the electronic marketplace (e-commerce). It is proposed that by application of these Fair Information Practices, the major privacy issues of RFID can be addressed.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
G. Alder (1998) ArticleTitle‘Ethical Issues in Electronic Performance Monitoring: A Consideration of Deontological and Teleological Perspectives’ Journal of Business Ethics 17 729–743 Occurrence Handle10.1023/A:1005776615072
AIM, Inc. (2003a). ‘NEXUS: Life in the Fast Lane’ URL: http://www.aimglobal.org/technologies/rfid/casestudynexus-intermec.htm
AIM, Inc. (2003b). ‘Radio Frequency IDentification Code of Conduct’. URL: http://www.aimglobal.org/technologies/rfid/code_of_conduct.htm
AIM, Inc. (2003c). ‘RFID FAQs, not Fiction’. URL: http://www.aimglobal.org/technologies/rfid/rfid_faqs.asp
AIM, Inc. (2003d). ‘What is Radio Frequency Identification (RFID)?’. URL: http://www.aimglobal.org/technologies/rfid/what_is_rfid.asp
I. Akaah (1997) ArticleTitle‘Influence of Deontological and Teleological Factors on Research Ethics Evaluations’ Journal of Business Research 39 71–80 Occurrence Handle10.1016/S0148-2963(96)00143-9
S. Bowen (2004) ArticleTitle‘Organizational Factors Encouraging Ethical Decision Making: An Exploration into the Case of an Exemplar’ Journal of Business Ethics. 54 IssueID4 311–324 Occurrence Handle10.1007/s10551-004-1527-4
M. Brandel (2003) ArticleTitle‘Smart tags, high costs’ Computerworld. 37 IssueID50 39
V. Bush B. Venable A. Bush (2000) ArticleTitle‘Ethics and Marketing on the Internet: Practitioners’ Perceptions of Societal, Industry and Company Concerns’ Journal of Business Ethics 23 237–248 Occurrence Handle10.1023/A:1006202107464
CASPIAN: (2003–2004). ‘Position Statement on the Use of RFID on Consumer Products’. URL: http://www.spychips.com/jointrfid_position_paper.htm
‘Charter of Fundamental Rights of the European Union’ (2000). Official Journal of the European Communities. URL: http://europa.eu.int/eur-lex/pri/en/oj/dat/2000/c_364/c_36420001218en00010022.pdf
D. Cole M. Sirgy M. Bird (2000) ArticleTitle‘How Do Managers Make Teleological Evaluations in Ethical Dilemmas? Testing Part of and Extending the Hunt-Vitell Model’ Journal of Business Ethics. 26 IssueID3 259–269 Occurrence Handle10.1023/A:1006106300954
Commission of the European Communities: (2003). ‘265 Final Report From The Commission, First report on the implementation of the Data Protection Directive (95/46/EC)’ URL: http://europa.eu.int/eur-lex/en/com/rpt/2003/com2003_0265en01.pdf
Cox, J. (2003a). ‘Battling over RFID ...or is it over spy tags?’. NetworkWorldFusion, URL: http://www.nwfusion.com/weblogs/wireless/003085.html
Cox, J. (2003b). ‘Wal-Mart shelves RFID test plan’. NetworkWorldFusion, URL: http://www.nwfusion.com/news/2003/0714walmart.html
Culnan, M. (1999). ‘Georgetown Internet Privacy Policy Survey: Report to the Federal Trade Commission’. URL: http://www.msb.edu/faculty/culnanm/gipps/gipps1.pdf
R. DeGeorge (2003) The Ethics of Information Technology and Business Blackwell Publishing Malden, MA
Department of Health and Human Services: (2000). ‘Health Insurance Reform: Standards for Electronic Transactions’. URL: http://aspe.hhs.gov/admnsimp/final/txfin00.htm
Department of Health and Human Services: n.d., ‘Provider Hipaa Readiness Checklist – Getting Started’ URL: http://cms.hhs.gov/hipaa/hipaa2/readinesschklst.pdf
‘Directive 95/46/EC of the European Parliament and of the Council, Official Journal of the European communities on the protection of individuals with regard to the processing of personal data and on the free movement of such data’: 1995, Official Journal of the European Communities URL: http://europa.eu.int/comm/internal_market/privacy/docs/95–46-ce/dir1995-46_part1 _en.pdf
European Communities: (2000). ‘Data protection: Commission takes five Member States to court’. URL: http://europa.eu.int/rapid/pressReleasesAction.do? reference=IP/00/10&format=HTML aged=1& language=EN&guiLanguage=en
European Communities: (2004a). ‘Status of implementation of Directive 95/46 on the Protection of Individuals with regard to the Processing of Personal Data’. URL: http://europa.eu.int/comm/internal_market/privacy/law/implementation_en.htm
European Communities: (2004b). ‘Treaty on the European Union’. URL: http://europa.eu.int/comm/internal _market/privacy/law/treaty_en.htm
M. Faber (2002) ArticleTitle‘RFID: The Next Tool for Managing Records’ The Information Management Journal. 36 IssueID6 60–63
Federal Trade Commission: (1998). ‘Privacy Online: A Report to Congress’. URL: http://www.Federal Trade Commission.gov/reports/privacy3/priv-23a.pdf
Federal Trade Commission: (1999). ‘Prepared Statement of the Federal Trade Commission on “Self-Regulation and Privacy Online’. URL: http://www3.Federal Trade Commission.gov/os/1999/07/privacy onlinetestimony.pdf
Federal Trade Commission: (2000). ‘Privacy Online: Fair Information Practices in the Electronic Marketplace, A Report to Congress’. URL: http://www.Federal Trade Commission.gov/reports/privacy2000/privacy 2000.pdf
Floerkemeier, C. and M. Lampe: (2004). ‘Issues with RFID usage in ubiquitous computing applications’. URL: http://www.vs.inf.ethz.ch/publ/papers/RFIDIssues. pdf
S. Garfinkel (2002) ArticleTitle‘An RFID Bill of Rights’ Technology Review. 105 IssueID8 35
R. Glenn (2003) The Right to Privacy: Rights and Liberties under the Law ABC-CLIO Santa Barbara, CA
L. Introna A. Pouloudi (1999) ArticleTitle‘Privacy in the Information Age’ Journal of Business Ethics 22 27–38 Occurrence Handle10.1023/A:1006151900807 Occurrence Handle11660716
Juels, A., R. Rivest and M. Szydlo: (2003). ‘The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy’. Proceedings of the 10th ACM Conference on Computer and Communication Security, October 2003, Washington, DC, U.S.A., pp. 103–111
Lace, S.: (2004). ‘Calling in the Chips? Findings From The First Summit Exploring The Future Of RFID Technology In Retail Seminar’. National Consumer Council, URL: http://www.ncc.org.uk/technology/calling_in_chips.pdf
J. Langenderfer D. Cook (2004) ArticleTitle‘Oh, what a Tangled Web we Weave: The State of Privacy Protection in the Information Economy and Recommendations for Governance’ Journal of Business Research 57 734–747 Occurrence Handle10.1016/S0148-2963(02)00359-4
K. Marshall (1999) ArticleTitle‘Has Technology Introduced New Ethical Problems?’ Journal of Business Ethics 19 81–90 Occurrence Handle10.1023/A:1006154023743
R. Mason (1986) ArticleTitle‘Four Ethical Issues of the Information Age’ MIS Quarterly. 10 IssueID1 5–12
M. Maury D. Kleiner (2002) ArticleTitle‘E-Commerce, Ethical Commerce?’ Journal of Business Ethics 36 21–31 Occurrence Handle10.1023/A:1014274301815
R. McArthur (2001) ArticleTitle‘Reasonable Expectations of Privacy’ Ethics and Information Technology 3 123–128 Occurrence Handle10.1023/A:1011898010298
A. Peslak (2005) ArticleTitle‘Internet Privacy Policies: A Review and Survey of the Fortune 50’ Information Resources Management Journal 18 IssueID1 29–41
‘REGULATION (EC) No 45/2001 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 18 December2000 on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such data’. : 2000, Official Journal of the European Communities, URL: http://europa.eu.int/eur-lex/pri/en/oj/dat/2001/l_008/l_00820010112en00010022.pdf
‘RFID Usage and Trends’: (2003). E-Marketer, URL: http://www.emarketer.com/Report.aspx?rfid_jul04
D. Sappington (1991) ArticleTitle‘Incentives in Principal’Agent’Relationships’ Journal of Economic Perspectives 3 IssueID2 45–66
R. Sarathy C. Robertson (2003) ArticleTitle‘Strategic and Ethical Considerations in Managing Digital Privacy’ Journal of Business Ethics 46 111–126 Occurrence Handle10.1023/A:1025001627419
‘SAS Announces RFID Capabilities’: (2004). RFID Gazette, URL: http://www.rfidgazette.org/2004/07/ sas_announces_r.html
F. Schoeman (1992) Privacy and Social Freedom Cambridge University Press Cambridge
N. Shankman (1999) ArticleTitle‘Reframing the Debate Between Agency and Stakeholder Theories of the Firm’ Journal of Business Ethics 19 IssueID4 319–334 Occurrence Handle10.1023/A:1005880031427
T. Shaw (2003) ArticleTitle‘The Moral Intensity of Privacy: An Empirical Study of Webmasters’ Attitudes’ Journal of Business Ethics 46 301–318 Occurrence Handle10.1023/A:1025628530013
Singhapakdi A. Vitell S. Kraft: K. (1996) ArticleTitle‘Moral Intensity and Ethical Decision-Making of Marketing Professionals’ Journal of Business Research 38 245–255 Occurrence Handle10.1016/0148-2963(95)00155-7
B. Stead J. Gilbert (2001) ArticleTitle‘Ethical Issues in Electronic Commerce’ Journal of Business Ethics 34 75–85 Occurrence Handle10.1023/A:1012266020988
Sullivan, L.: (2004). ‘RFID Technology Could be Used to Build a National Livestock-tracking System’. Information mWeek, January 12, 2004. URL: http://www.informationweek.com/story/showArticle.jhtml?articleID=17300330
Swartz, N.: (2003). ‘Compromising Customers’ Privacy’. Information Management Journal 37(4). 17+
The Economist: (2002). ‘Science and Technology: Where’s the Smart Money’. 362(8259). 81+
‘The Europe We Need: Constitution of the European Union’: (2002). URL: http://www.theepc.be/PDF/Basictreaty.pdf
‘The Future Is Here: A Beginner’s Guide to RFID’: (2004). RFID Gazette, URL: http://www.rfidgazette.org/2004/06/rfid_101.html
United Nations General Assembly: (1948). ‘Universal Declaration of Human Rights’. URL:: http://www.un.org/Overview/rights.html
S. Vitell S. Hunt (1990) ArticleTitle‘The General Theory of Marketing Ethics: A Partial Test of the Model’ Research in Marketing 10 237–265
R. Want (2004) ArticleTitle‘RFID: A Key to Automating Everything’ Scientific American 290 IssueID1 56
Warren S. and L. Brandeis: (1890). ‘The Right to Privacy’. Originally published in Harvard Law Review 4(5). URL: http://www.louisville.edu/library/law/brandies/privacy.html
Waters, J.: (2004). ‘More tech in store: Wal-Mart’s muscle is advancing RFID usage’. URL: http://cbs.marketwatch. com/news/story.asp?guid=%7BA9969BF0-C580-4286-A396-B5ADDEA298DA%7D&siteid=google&dist= google
A. Weiss (2003) ArticleTitle‘Me and My Shadow’ netWorker 7 IssueID3 25–30
A. Westin (1967) Privacy and Freedom Antheneum New York
Author information
Authors and Affiliations
Corresponding author
Additional information
Alan R. Peslak is an Assistant Professor of Information Sciences and Technology at Penn State University, Worthington Scranton. He received his Ph.D. in Information Systems from Nova Southeastern University, Fort Lauderdale, Florida. He has over 25 years of industry experience. Dr. Peslak’s research focuses on the economic, ethical and societal impacts of information technology. He has published in the Information Resources Management Journal, Journal of Computer Information Systems, Information Research, and First Monday. He is a member of ACM, AITP-EDSIG, Financial Executives Institute, IACIS, and ACM-SIGMIS.
Rights and permissions
About this article
Cite this article
Peslak, A.R. An Ethical Exploration of Privacy and Radio Frequency Identification. J Bus Ethics 59, 327–345 (2005). https://doi.org/10.1007/s10551-005-2928-8
Issue Date:
DOI: https://doi.org/10.1007/s10551-005-2928-8