Skip to main content

Die Wahrnehmung von RFID als Risiko für die informationelle Selbstbestimmung

  • Chapter
Das Internet der Dinge

Kurzfassung

Der Erfolg bei der Einführung neuer Technologien hängt zu einem großen Teil auch von der öffentlichen Akzeptanz und der Kommunikation über die mit ihnen verbundenen Risiken ab. Im Fall von RFID dreht sich die Diskussion vor allem um die möglichen Folgen für die Privatsphäre durch Missbrauch bzw. Manipulation der mittels RFID erhobenen Daten. Vor diesem Hintergrund untersucht der vorliegende Beitrag die Wahrnehmung von RFID-Technologie in der Öffentlichkeit als Risiko für die informationelle Selbstbestimmung, identifiziert Handlungsbedarfe für das Risikomanagement von Technologieanbietern/-anwendern und diskutiert mögliche Handlungsoptionen. Dabei liegt der Fokus nicht auf einzelnen technischen Eigenschaften von RFID, sondern auf der Entwicklung einer umfassenderen Strategie, die Ängste und Erwartungen der Konsumenten in den Vordergrund stellt.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 49.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. Cantwell B (2002) Why Technical Breakthroughs Fail: A History of Public Concern with Emerging Technologies. Auto-ID Center White Paper, archive.epcglobalinc.org/publishedresearch/MIT-AUTOID-WH-016.pdf

    Google Scholar 

  2. Cavoukian A (2004) Tag, You’re It: Privacy Implications of Radio Frequency Identification (RFID) Technology. Information and Privacy Commissioner Ontario, Toronto

    Google Scholar 

  3. Carius R, Henschel C, Kastenholz HG, Nothdurft W, Ruff F, Uth HJ, Wiedemann PM (2000) Risikokommunikation für Unternehmen. Verein Deutscher Ingenieure (VDI)

    Google Scholar 

  4. Chau PYK, Lai, VSK (2003) An Empirical Investigation of the Determinants of User Acceptance of Internet Banking. Journal of Organizational Computing and Electronic Commerce 13(2): 123–145

    Article  Google Scholar 

  5. Culnan MJ, Armstrong P (1999) Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation. Organization Science 10(1):104–116

    Article  Google Scholar 

  6. Culnan MJ, Bies RJ (2003) Consumer Privacy: Balancing Economic and Justice Considerations. Journal of Social Issues 59(2): 323–342

    Article  Google Scholar 

  7. Davis F (1989) Perceived Usefulness, Perceived Ease of Use and User Acceptance of Information Technology. MIS Quarterly 13(3): 319–339

    Google Scholar 

  8. Duce H (2003) Public Policy: Understanding Public Opinion. Executive Briefing, Auto-ID Center, archive.epcglobalinc.org/publishedresearch/cam-autoid-eb002.pdf

    Google Scholar 

  9. EPCglobal Consumer Information (2004) EPCglobal Inc., www.epcglobalinc.org/consumer/index.html

    Google Scholar 

  10. Finucane ML (2002) Mad Cows, Mad Corn & Mad Money: Applying What We Know About the Perceived Risk of Technologies to the Perceived Risk of Securities. The Journal of Psychology and Financial Markets 3(4): 236–243

    Article  Google Scholar 

  11. Fleisch E, Dierkes M (2003) Ubiquitous Computing aus betriebswirtschaftlicher Sicht. Wirtschaftsinformatik 41(6): 661–670

    Google Scholar 

  12. Fletcher K (2003) Consumer power and privacy: the changing nature of CRM. International Journal of Advertising 22(2): 249–272

    Google Scholar 

  13. Garfinkel SL (2002) Adopting Fair Information Practices to Low Cost RFID Systems. International Conference on Ubiquitous Computing, Göteborg

    Google Scholar 

  14. Harvard Business Review (2001) Chief Privacy Officer. Harvard Business Review, 78(6): 20–21

    Google Scholar 

  15. Hennen L (1990) Risiko-Kommunikation: Informations-und Kommunikationstechnologien. In: Jungermann H, Rohrmann B, Wiedemann PM (Hrsg) Risiko-Konzepte — Risiko-Konflikte — Risiko-Kommunikation. Forschungszentrum Jülich, S 209–258

    Google Scholar 

  16. Humby C, Hunt T, Phillips T (2004) Scoring Points: How Tesco Is Winning Customer Loyalty. Kogan Page, London

    Google Scholar 

  17. Jones KE (2001) BSE, Risk and the Communication of Uncertainty: A Review of Lord Phillips’ Report from the BSE Inquiry. Canadian Journal of Sociology 26(4):655–666

    Google Scholar 

  18. Jonietz E (2004) Tracking Privacy. Technology Review 107(6): 74–75

    Google Scholar 

  19. Juels A, Rivest R, Szydlo M (2003) The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In Atluri V (ed) Proceedings of the 8th ACM Conference on Computer and Communications Security, pp 103–111

    Google Scholar 

  20. Jungermann H, Inhalte und Konzepte der Risikokommunikation. In: Jungermann, H, Rohrmann B, Wiedemann PM (Hrsg) Risikokontroversen — Konzepte, Konflikte, Kommunikation. Springer-Verlag, S 335–354

    Google Scholar 

  21. Koren G, Klein N (1991) Bias against negative studies in newspaper reports of medical research. Journal of the American Medical Association 266(13): 1824–1826

    Article  Google Scholar 

  22. Kumar R (2003) Interaction of RFID Technology and Public Policy. RFID Privacy Workshop @ MIT

    Google Scholar 

  23. Landt J (2001) Shrouds of Time: The History of RFID. AIM Inc.

    Google Scholar 

  24. Mattern F, Langheinrich M (2001) Allgegenwärtigkeit des Computers-Datenschutz in einer Welt intelligenter Alltagsdinge. In: Müller G, Reichenbach M (Hrsg) Sicherheitskonzepte für das Internet. Springer-Verlag

    Google Scholar 

  25. McCloskey D (2003) Evaluating Electronic Commerce Acceptance with the Technology Acceptance Model. Journal of Computer Information Systems 4(2): 49–57

    Google Scholar 

  26. METRO Group (2004) Leitlinien für den RFID-Roll-out der METRO Group. METRO Group, Düsseldorf

    Google Scholar 

  27. Renn O, Levine D (1991) Credibility and trust in risk communication. In: Kasperson RE, Stallen PJM (eds) Communicating Risks to the Public. Kluwer, Dordrecht, pp 175–218

    Google Scholar 

  28. Richardson K (2001) Risk news in the world of Internet newsgroups. Journal of Sociolinguistics 5(1): 50–72

    Article  Google Scholar 

  29. Sarma S, Brock D, Engels DW (2001) Radio Frequency Identification and the Electronic Product Code. IEEE Micro 21(6): 50–54

    Article  Google Scholar 

  30. Schneider R (2004) Emerging Risks-Analyse or Exclude. Reinsurance Lecture at The Institute of London, London, www.iilondon.co.uk/pdf/RSchneider140104.pdf

    Google Scholar 

  31. Slovic P, Fischhoff B, Lichtenstein S (1981) Facts and Fears: Societal Perception of Risk. Advances in Consumer Research 8(1): 497–502

    Google Scholar 

  32. Siegrist M (2001) Die Bedeutung von Vertrauen bei der Wahrnehmung und Bewertung von Risiken. Arbeitsbericht Nr. 197, Akademie für Technikfolgenabschätzung in Baden-Württemberg, Stuttgart

    Google Scholar 

  33. Sjöberg L, Framm J (2001) Information Technology Risks as Seen by the Public. Risk Analysis 21(3): 427–441

    Google Scholar 

  34. Slovic P (1992) Perception of risk: Reflections on the psychometric paradigm. In: Krimsky S, Golding D (eds) Social theories of risk. Praeger, Westport, pp 117–152

    Google Scholar 

  35. Slovic P (1999) Trust, emotion, sex, politics, and science: Surveying the riskassessment battlefield. Risk Analysis 19(4): 689–701

    Article  Google Scholar 

  36. Smith HJ (2001) Information Privacy and Marketing: What the U.S. should (and shouldn’t) learn from Europe. California Management Review 43(2): 8–33

    MATH  Google Scholar 

  37. Spiekermann S, Berthold O (2004) Maintaining privacy in RFID enabled environments: Proposal for a disable-model. Workshop on Security and Privacy in Pervasive Computing, International Conference on Pervasive Computing

    Google Scholar 

  38. Spinello RA (1998) Privacy Rights in the Information Economy. Business Ethics Quarterly 8(4): 723–742

    Google Scholar 

  39. Sarma S, Weis S, Engels D (2002) RFID Systems, Security & Privacy Implications. Auto-ID Center White Paper, http://archive.epcglobalinc.org/publishedresearch/MIT-AUTOID-WH-014.pdf

    Google Scholar 

  40. Tacke V (2001) BSE as an organizational construction: a case study on the globalization of risk. British Journal of Sociology 52(2): 293–312

    Google Scholar 

  41. Trumbo CW, McComas KA (2003) The Function of Credibility in Information Processing for Risk Perception. Risk Analysis 23(2): 343–353

    Article  Google Scholar 

  42. Warren SD, Brandeis LD (1890) The Right to Privacy. Harvard Law Review 4(5): 193–220

    Google Scholar 

  43. Westin A (2003) Social and Political Dimensions of Privacy. Journal of Social Issues 59(2): 431–453

    Article  Google Scholar 

  44. Westin A (1967) Privacy and Freedom. Atheneum, New York

    Google Scholar 

  45. Whawell P (1998) The ethics of pressure groups. Business Ethics 7(3): 178–181

    Article  Google Scholar 

  46. Wiedemann P (1994) Krisenmanagement & Krisenkommunikation. Arbeiten zur Risiko-Kommunikation Heft 41, Forschungszentrum Jülich

    Google Scholar 

  47. Wiedemann P, Hennen L (1989) Schwierigkeiten bei der Kommunikation über technische Risiken. Arbeiten zur Risiko-Kommunikation Heft 9, Forschungszentrum Jülich

    Google Scholar 

  48. Winer RS (2001) A Framework for Customer Relationship Management. California Management Review 43(4): 89–105

    Google Scholar 

  49. Watson T, Osborne-Brown S, Longhurst M (2002) Issues Negotiation — investing in stakeholders. Corporate Communications 7(1): 54–61

    Google Scholar 

  50. Weis SA, Sarma S, Rivest RL, Engels DW (2003) Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. 1st International Conference on Security in Pervasive Computing, Boppard, March 2003. Springer-Verlag, LNCS 2802: 201–212

    Google Scholar 

  51. Zeidler M (2004) RFID: Der Schnüffel-Chip im Joghurtbecher. Monitor, Westdeutscher Rundfunk, Köln, 8. Januar 2004, www.wdr.de/tv/monitor/pdf/040108f_rfid.pdf

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Thiesse, F. (2005). Die Wahrnehmung von RFID als Risiko für die informationelle Selbstbestimmung. In: Fleisch, E., Mattern, F. (eds) Das Internet der Dinge. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-28299-8_20

Download citation

Publish with us

Policies and ethics