An enquiry into the ethical efficacy of the use of radio frequency identification technology

This paper provides an in-depth analysis of the privacy rights dilemma surrounding radio frequency identification (RFID) technology. As one example of ubiquitous information system, RFID has multitudinous applications in various industries and businesses across society. The use of this technology will have to lead to a policy setting dilemma in that a balance between individuals’ privacy concerns and the benefits that they derive from it must be drawn. After describing the basic RFID technology some of its most prevalent uses, a definition of privacy is derived in the context of information systems. To illustrate current attempts at controlling the undesirable side effects of RFID, Lessig’s cyberspace framework is presented. It is found that each of Lessig’s components is inadequate at preventing individual privacy violations in RFID. The main focus within this framework is on the norms of society. The social norm mechanism that addresses privacy issues in cyberspace is the Fair Information Practices Principles (FIPP). After an analysis of these principles, it is posited that the FIPP only deal with procedural justice issues related to data collection and omit distributive and interactional justice reasoning related to the actual beneficial and detrimental outcomes to the individuals whose data is being obtained. Thus, RFID is presented in the context of the tension between the many benefits that are provided by the technology in social exchanges, and the risk it carries of the loss of privacy. The new, expanded framework recognizes both sides of the issue with the ultimate goal of providing a greater understanding of how privacy issues can be addressed with RFID technology.

[1]  J. S. Adams,et al.  Inequity In Social Exchange , 1965 .

[2]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[3]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[4]  J. Rawls A Theory of Justice , 1999 .

[5]  G. Leventhal What Should Be Done with Equity Theory? New Approaches to the Study of Fairness in Social Relationships. , 1976 .

[6]  G. Leventhal What Should Be Done with Equity Theory , 1980 .

[7]  R. Bies Interactional justice : communication criteria of fairness , 1986 .

[8]  T. Tyler,et al.  The Social Psychology of Procedural Justice , 1988 .

[9]  R. Folger,et al.  Effects of Procedural and Distributive Justice on Reactions to Pay Raise Decisions , 1989 .

[10]  H Roberts,et al.  Risk Society: Towards a New Modernity , 1994 .

[11]  J. Greenberg,et al.  The social side of fairness: Interpersonal and informational classes of organizational justice. , 1993 .

[12]  F. Fukuyama Trust: The Social Virtues and the Creation of Prosperity Penguin London , 1995 .

[13]  W. Galston Trust: The Social Virtues and the Creation of Prosperity , 1996 .

[14]  Fred H. Cate,et al.  Privacy in the Information Age , 1997 .

[15]  C. Slade Privacy and regulation , 1997 .

[16]  Kimball P. Marshall,et al.  Has Technology Introduced New Ethical Problems? , 1999 .

[17]  Reginald Whitaker,et al.  The End of Privacy: How Total Surveillance Is Becoming a Reality , 1999 .

[18]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[19]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[20]  Richard A. Spinello,et al.  Cyberethics: Morality and Law in Cyberspace , 2001 .

[21]  Eve M. Caudill,et al.  Consumer Online Privacy: Legal and Ethical Issues , 2000 .

[22]  Peter Y. Chen,et al.  Using Social Exchange Theory to Distinguish Procedural from Interactional Justice , 2002 .

[23]  D. Melé Organizational Humanizing Cultures: Do They Generate Social Capital? , 2003 .

[24]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[25]  Meg McGinity RFID: is this game of tag fair play? , 2004 .

[26]  L. R. Shade Ethical, legal, and policy conundrums of privacy in our knowledge-based society , 1999, Ethics and Information Technology.

[27]  Shin’ichi Konomi Personal Privacy Assistants for RFID Users , 2004 .

[28]  Christian Floerkemeier,et al.  Issues with RFID Usage in Ubiquitous Computing Applications , 2004, Pervasive.

[29]  James A. Landay,et al.  Privacy risk models for designing privacy-sensitive ubiquitous computing systems , 2004, DIS '04.

[30]  G. E. Gorman Cyberethics: Morality and Law in Cyberspace (2nd ed.) , 2004 .

[31]  D. Vasiljević Barbara Hudson: Justice in the risk society: Challenging and re-affirming justice in late modernity, Sage Publications, London: Thousand Oaks & New Delhi, str. 258. , 2005 .

[32]  Alan Robert Peslak,et al.  An Ethical Exploration of Privacy and Radio Frequency Identification , 2005 .

[33]  Gal Eschet,et al.  FIPs and PETs for RFID: Protecting Privacy in the Web of Radio Frequency Identification , 2005 .

[34]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[35]  F. Cate The Failure of Fair Information Practice Principles , 2006 .

[36]  Mary Lou Ingeholm,et al.  RFID in healthcare. , 2006, Journal of AHIMA.

[37]  Philip Brey,et al.  Freedom and Privacy in Ambient Intelligence , 2005, Ethics and Information Technology.

[38]  Laurence Ashworth,et al.  Marketing Dataveillance and Digital Privacy: Using Theories of Justice to Understand Consumers’ Online Privacy Concerns , 2006 .

[39]  Richard S. Rosenberg,et al.  RFID: The Next Serious Threat to Privacy , 2005, Ethics and Information Technology.

[40]  Gjalt de Graaf,et al.  The Autonomy of the Contracting Partners: An Argument for Heuristic Contractarian Business Ethics , 2006 .

[41]  Meghna Virick,et al.  THE EFFECT OF PERSONALITY ON PERCEPTIONS OF JUSTICE , 2006 .

[42]  Richard Marens Returning to Rawls: Social Contracting, Social Justice, and Transcending the Limitations of Locke , 2007 .

[43]  Philip A.E. Brey Computer Ethics of the Right and the Good. , 2007 .

[44]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[45]  William Bonner,et al.  Locating a Space for Ethics to Appear in Decision-making: Privacy as an Exemplar , 2007 .

[46]  P. Maclagan Hierarchical Control or Individuals' Moral Autonomy? Addressing a Fundamental Tension in the Management of Business Ethics , 2007 .

[47]  C. Flanagan,et al.  TIES THAT BIND : CORRELATES OF ADOLESCENTS' CIVIC COMMITMENTS IN SEVEN COUNTRIES , 2010 .