Skip to main content
Log in

An Ethical Exploration of Privacy and Radio Frequency Identification

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

This manuscript reviews the background of Radio Frequency Identification (RFID) as well as the ethical foundations of individual privacy. This includes a historical perspective on personal privacy, a review of the United States Constitutional privacy interpretations, the United Nations Declaration of Human Rights, European Union Regulations, as well as the positions of industry and advocacy groups. A brief review of the information technology ethics literature is also included. The RFID privacy concerns are three-fold: pre-sales activities, sales transaction activities, and post-sales uses. A proposal to address these privacy concerns is detailed, generally based on past philosophical frameworks and specifically on the Fair Information Practices that the Federal Trade Commission has outlined for the electronic marketplace (e-commerce). It is proposed that by application of these Fair Information Practices, the major privacy issues of RFID can be addressed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • G. Alder (1998) ArticleTitle‘Ethical Issues in Electronic Performance Monitoring: A Consideration of Deontological and Teleological Perspectives’ Journal of Business Ethics 17 729–743 Occurrence Handle10.1023/A:1005776615072

    Article  Google Scholar 

  • AIM, Inc. (2003a). ‘NEXUS: Life in the Fast Lane’ URL: http://www.aimglobal.org/technologies/rfid/casestudynexus-intermec.htm

  • AIM, Inc. (2003b). ‘Radio Frequency IDentification Code of Conduct’. URL: http://www.aimglobal.org/technologies/rfid/code_of_conduct.htm

  • AIM, Inc. (2003c). ‘RFID FAQs, not Fiction’. URL: http://www.aimglobal.org/technologies/rfid/rfid_faqs.asp

  • AIM, Inc. (2003d). ‘What is Radio Frequency Identification (RFID)?’. URL: http://www.aimglobal.org/technologies/rfid/what_is_rfid.asp

  • I. Akaah (1997) ArticleTitle‘Influence of Deontological and Teleological Factors on Research Ethics Evaluations’ Journal of Business Research 39 71–80 Occurrence Handle10.1016/S0148-2963(96)00143-9

    Article  Google Scholar 

  • S. Bowen (2004) ArticleTitle‘Organizational Factors Encouraging Ethical Decision Making: An Exploration into the Case of an Exemplar’ Journal of Business Ethics. 54 IssueID4 311–324 Occurrence Handle10.1007/s10551-004-1527-4

    Article  Google Scholar 

  • M. Brandel (2003) ArticleTitle‘Smart tags, high costs’ Computerworld. 37 IssueID50 39

    Google Scholar 

  • V. Bush B. Venable A. Bush (2000) ArticleTitle‘Ethics and Marketing on the Internet: Practitioners’ Perceptions of Societal, Industry and Company Concerns’ Journal of Business Ethics 23 237–248 Occurrence Handle10.1023/A:1006202107464

    Article  Google Scholar 

  • CASPIAN: (2003–2004). ‘Position Statement on the Use of RFID on Consumer Products’. URL: http://www.spychips.com/jointrfid_position_paper.htm

  • ‘Charter of Fundamental Rights of the European Union’ (2000). Official Journal of the European Communities. URL: http://europa.eu.int/eur-lex/pri/en/oj/dat/2000/c_364/c_36420001218en00010022.pdf

  • D. Cole M. Sirgy M. Bird (2000) ArticleTitle‘How Do Managers Make Teleological Evaluations in Ethical Dilemmas? Testing Part of and Extending the Hunt-Vitell Model’ Journal of Business Ethics. 26 IssueID3 259–269 Occurrence Handle10.1023/A:1006106300954

    Article  Google Scholar 

  • Commission of the European Communities: (2003). ‘265 Final Report From The Commission, First report on the implementation of the Data Protection Directive (95/46/EC)’ URL: http://europa.eu.int/eur-lex/en/com/rpt/2003/com2003_0265en01.pdf

  • Cox, J. (2003a). ‘Battling over RFID ...or is it over spy tags?’. NetworkWorldFusion, URL: http://www.nwfusion.com/weblogs/wireless/003085.html

  • Cox, J. (2003b). ‘Wal-Mart shelves RFID test plan’. NetworkWorldFusion, URL: http://www.nwfusion.com/news/2003/0714walmart.html

  • Culnan, M. (1999). ‘Georgetown Internet Privacy Policy Survey: Report to the Federal Trade Commission’. URL: http://www.msb.edu/faculty/culnanm/gipps/gipps1.pdf

  • R. DeGeorge (2003) The Ethics of Information Technology and Business Blackwell Publishing Malden, MA

    Google Scholar 

  • Department of Health and Human Services: (2000). ‘Health Insurance Reform: Standards for Electronic Transactions’. URL: http://aspe.hhs.gov/admnsimp/final/txfin00.htm

  • Department of Health and Human Services: n.d., ‘Provider Hipaa Readiness Checklist – Getting Started’ URL: http://cms.hhs.gov/hipaa/hipaa2/readinesschklst.pdf

  • ‘Directive 95/46/EC of the European Parliament and of the Council, Official Journal of the European communities on the protection of individuals with regard to the processing of personal data and on the free movement of such data’: 1995, Official Journal of the European Communities URL: http://europa.eu.int/comm/internal_market/privacy/docs/95–46-ce/dir1995-46_part1 _en.pdf

  • European Communities: (2000). ‘Data protection: Commission takes five Member States to court’. URL: http://europa.eu.int/rapid/pressReleasesAction.do? reference=IP/00/10&format=HTML aged=1& language=EN&guiLanguage=en

  • European Communities: (2004a). ‘Status of implementation of Directive 95/46 on the Protection of Individuals with regard to the Processing of Personal Data’. URL: http://europa.eu.int/comm/internal_market/privacy/law/implementation_en.htm

  • European Communities: (2004b). ‘Treaty on the European Union’. URL: http://europa.eu.int/comm/internal _market/privacy/law/treaty_en.htm

  • M. Faber (2002) ArticleTitle‘RFID: The Next Tool for Managing Records’ The Information Management Journal. 36 IssueID6 60–63

    Google Scholar 

  • Federal Trade Commission: (1998). ‘Privacy Online: A Report to Congress’. URL: http://www.Federal Trade Commission.gov/reports/privacy3/priv-23a.pdf

  • Federal Trade Commission: (1999). ‘Prepared Statement of the Federal Trade Commission on “Self-Regulation and Privacy Online’. URL: http://www3.Federal Trade Commission.gov/os/1999/07/privacy onlinetestimony.pdf

  • Federal Trade Commission: (2000). ‘Privacy Online: Fair Information Practices in the Electronic Marketplace, A Report to Congress’. URL: http://www.Federal Trade Commission.gov/reports/privacy2000/privacy 2000.pdf

  • Floerkemeier, C. and M. Lampe: (2004). ‘Issues with RFID usage in ubiquitous computing applications’. URL: http://www.vs.inf.ethz.ch/publ/papers/RFIDIssues. pdf

  • S. Garfinkel (2002) ArticleTitle‘An RFID Bill of Rights’ Technology Review. 105 IssueID8 35

    Google Scholar 

  • R. Glenn (2003) The Right to Privacy: Rights and Liberties under the Law ABC-CLIO Santa Barbara, CA

    Google Scholar 

  • L. Introna A. Pouloudi (1999) ArticleTitle‘Privacy in the Information Age’ Journal of Business Ethics 22 27–38 Occurrence Handle10.1023/A:1006151900807 Occurrence Handle11660716

    Article  PubMed  Google Scholar 

  • Juels, A., R. Rivest and M. Szydlo: (2003). ‘The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy’. Proceedings of the 10th ACM Conference on Computer and Communication Security, October 2003, Washington, DC, U.S.A., pp. 103–111

  • Lace, S.: (2004). ‘Calling in the Chips? Findings From The First Summit Exploring The Future Of RFID Technology In Retail Seminar’. National Consumer Council, URL: http://www.ncc.org.uk/technology/calling_in_chips.pdf

  • J. Langenderfer D. Cook (2004) ArticleTitle‘Oh, what a Tangled Web we Weave: The State of Privacy Protection in the Information Economy and Recommendations for Governance’ Journal of Business Research 57 734–747 Occurrence Handle10.1016/S0148-2963(02)00359-4

    Article  Google Scholar 

  • K. Marshall (1999) ArticleTitle‘Has Technology Introduced New Ethical Problems?’ Journal of Business Ethics 19 81–90 Occurrence Handle10.1023/A:1006154023743

    Article  Google Scholar 

  • R. Mason (1986) ArticleTitle‘Four Ethical Issues of the Information Age’ MIS Quarterly. 10 IssueID1 5–12

    Google Scholar 

  • M. Maury D. Kleiner (2002) ArticleTitle‘E-Commerce, Ethical Commerce?’ Journal of Business Ethics 36 21–31 Occurrence Handle10.1023/A:1014274301815

    Article  Google Scholar 

  • R. McArthur (2001) ArticleTitle‘Reasonable Expectations of Privacy’ Ethics and Information Technology 3 123–128 Occurrence Handle10.1023/A:1011898010298

    Article  Google Scholar 

  • A. Peslak (2005) ArticleTitle‘Internet Privacy Policies: A Review and Survey of the Fortune 50’ Information Resources Management Journal 18 IssueID1 29–41

    Google Scholar 

  • ‘REGULATION (EC) No 45/2001 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 18 December2000 on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such data’. : 2000, Official Journal of the European Communities, URL: http://europa.eu.int/eur-lex/pri/en/oj/dat/2001/l_008/l_00820010112en00010022.pdf

  • ‘RFID Usage and Trends’: (2003). E-Marketer, URL: http://www.emarketer.com/Report.aspx?rfid_jul04

  • D. Sappington (1991) ArticleTitle‘Incentives in Principal’Agent’Relationships’ Journal of Economic Perspectives 3 IssueID2 45–66

    Google Scholar 

  • R. Sarathy C. Robertson (2003) ArticleTitle‘Strategic and Ethical Considerations in Managing Digital Privacy’ Journal of Business Ethics 46 111–126 Occurrence Handle10.1023/A:1025001627419

    Article  Google Scholar 

  • ‘SAS Announces RFID Capabilities’: (2004). RFID Gazette, URL: http://www.rfidgazette.org/2004/07/ sas_announces_r.html

  • F. Schoeman (1992) Privacy and Social Freedom Cambridge University Press Cambridge

    Google Scholar 

  • N. Shankman (1999) ArticleTitle‘Reframing the Debate Between Agency and Stakeholder Theories of the Firm’ Journal of Business Ethics 19 IssueID4 319–334 Occurrence Handle10.1023/A:1005880031427

    Article  Google Scholar 

  • T. Shaw (2003) ArticleTitle‘The Moral Intensity of Privacy: An Empirical Study of Webmasters’ Attitudes’ Journal of Business Ethics 46 301–318 Occurrence Handle10.1023/A:1025628530013

    Article  Google Scholar 

  • Singhapakdi A. Vitell S. Kraft: K. (1996) ArticleTitle‘Moral Intensity and Ethical Decision-Making of Marketing Professionals’ Journal of Business Research 38 245–255 Occurrence Handle10.1016/0148-2963(95)00155-7

    Article  Google Scholar 

  • B. Stead J. Gilbert (2001) ArticleTitle‘Ethical Issues in Electronic Commerce’ Journal of Business Ethics 34 75–85 Occurrence Handle10.1023/A:1012266020988

    Article  Google Scholar 

  • Sullivan, L.: (2004). ‘RFID Technology Could be Used to Build a National Livestock-tracking System’. Information mWeek, January 12, 2004. URL: http://www.informationweek.com/story/showArticle.jhtml?articleID=17300330

  • Swartz, N.: (2003). ‘Compromising Customers’ Privacy’. Information Management Journal 37(4). 17+

    Google Scholar 

  • The Economist: (2002). ‘Science and Technology: Where’s the Smart Money’. 362(8259). 81+

  • ‘The Europe We Need: Constitution of the European Union’: (2002). URL: http://www.theepc.be/PDF/Basictreaty.pdf

  • ‘The Future Is Here: A Beginner’s Guide to RFID’: (2004). RFID Gazette, URL: http://www.rfidgazette.org/2004/06/rfid_101.html

  • United Nations General Assembly: (1948). ‘Universal Declaration of Human Rights’. URL:: http://www.un.org/Overview/rights.html

  • S. Vitell S. Hunt (1990) ArticleTitle‘The General Theory of Marketing Ethics: A Partial Test of the Model’ Research in Marketing 10 237–265

    Google Scholar 

  • R. Want (2004) ArticleTitle‘RFID: A Key to Automating Everything’ Scientific American 290 IssueID1 56

    Google Scholar 

  • Warren S. and L. Brandeis: (1890). ‘The Right to Privacy’. Originally published in Harvard Law Review 4(5). URL: http://www.louisville.edu/library/law/brandies/privacy.html

  • Waters, J.: (2004). ‘More tech in store: Wal-Mart’s muscle is advancing RFID usage’. URL: http://cbs.marketwatch. com/news/story.asp?guid=%7BA9969BF0-C580-4286-A396-B5ADDEA298DA%7D&siteid=google&dist= google

  • A. Weiss (2003) ArticleTitle‘Me and My Shadow’ netWorker 7 IssueID3 25–30

    Google Scholar 

  • A. Westin (1967) Privacy and Freedom Antheneum New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alan R. Peslak.

Additional information

Alan R. Peslak is an Assistant Professor of Information Sciences and Technology at Penn State University, Worthington Scranton. He received his Ph.D. in Information Systems from Nova Southeastern University, Fort Lauderdale, Florida. He has over 25 years of industry experience. Dr. Peslak’s research focuses on the economic, ethical and societal impacts of information technology. He has published in the Information Resources Management Journal, Journal of Computer Information Systems, Information Research, and First Monday. He is a member of ACM, AITP-EDSIG, Financial Executives Institute, IACIS, and ACM-SIGMIS.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Peslak, A.R. An Ethical Exploration of Privacy and Radio Frequency Identification. J Bus Ethics 59, 327–345 (2005). https://doi.org/10.1007/s10551-005-2928-8

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10551-005-2928-8

Keywords

Navigation