Analytical Study using SWOT and STEEPLE Approach
Rana Ibrahim Alabdan/ Lecturer
Information Systems Department. Majmaah University Riyadh, Saudi Arabia
— The benefits of RFID technology cannot be denied and the new evolution in retails, supply chain management and companies when using this technology is really relevant and make the operation of production smoothie and easy. However, RFID also has some negative issues such as violation to the people’s privacy and violation to the data protection. Even though, these security issues RFID has changed the way dealing with products and people. Thus, let’s take this opportunity, improve the life, use new technology even if there is a little fair do not hesitate to take the benefit from every new technology that change our life to the best.
Keywords-component; RFID; IT technology; Networks; RFID issues; tags; SWOT Introduction
RFID stands for Radio Frequency Identification. The main goal of an RFID system is to carry data on a transponder (tag) that can be retrieved with a transceiver through a wireless connection. The ability to access information through a non-line-of-sight storage in a tag can be utilized for the identification of goods, locations, animals, and even people. Discerning specific information from these tags will have profound impacts on how individuals in commerce and industry keep track of their goods and each other. Early use of this technology concerned the evolution of barcode applications, changing the application scenario perspective . The acronym RFID, Radio Frequency Identification, encompasses a number of technologies usable to identify objects by means of radio waves. The origin of the technique is the “Identification Friend or Foe” IFF system used in World War II by the Royal Air Force, that was able to get a code back only from “friendly” aircrafts identified with RADAR. Under this very wide umbrella the term is today mainly referring to systems where electronic equipment can “read” information from a multitude of “tags” by means of radio waves. The RFID tag can come in various shapes e.g. as a paper sticker, just as barcode tags are, as a plastic Credit Card, or even as a rugged, chemicals and heat resistant, plastic capsule. The tag might be even powered by a very small battery to support local functions such as storing temperature readings or enhancing the reach of the radio communication . Although RFID is a mature technology, it took several years for a large-scale implementation to occur. The first ones were in the United States. The implementation eventually included supply chain, freeway tollbooths, parking areas, vehicle tracking, factory automation, and animal tagging. The most common application of RFID technology today is for tracking goods in the supply chain, tracking assets, and tracking parts from a manufacturing production line. Other application areas include the control of access to buildings, network security, and also payment systems that let customers pay for items without using cash. Nevertheless some technology related issues still condition the possible applications. As an example, liquids, water especially, absorb radiations while metals reflect it. That means that passive tags applied to bottles of water or to aluminum cans can be hardly read though placed very carefully with respect to the reader antenna and with dielectric support. This is due to the properties of the radiations in relation to their wavelength It is true for HF tags but even more relevant for UHF tags . The three basic components of a typical RFID system are an antenna or coil, a transceiver (reader with decoder), and a transponder (RFID tag) with electronically programmed information. In an RFID system, an antenna continuously emits radio signals at a given frequency. When a transponder comes into contact with these signals, the badge is activated and communicates wirelessly with the reader through the modulation of transmittance frequencies. Through the use of an antenna, the information that is stored on the transponder can be read or written from the transponder. Typically, the antenna is packaged with the transceiver into a larger structure called a reader that is in charge of the system’s data communication and acquisition. The data that is obtained and analyzed by the reader can then be transported to a computer . This paper consists of four major sections, which are: 1) Introduction 2) SWOT Analysis for RFID Technology 3) STEEPLE Analysis for RFID Technology 4) Conclusions
(IJCSIS) International Journal of Computer Science and Information Security, Vol. 12, No. 1, January 201415http://sites.google.com/site/ijcsis/ ISSN 1947-5500