Abstract
This article investigates the conflicting area of user benefits arising through item level radio frequency identification (RFID) tagging and a desire for privacy. It distinguishes between three approaches feasible to address consumer privacy concerns. One is to kill RFID tags at store exits. The second is to lock tags and have user unlock them if they want to initiate reader communication (user model). The third is to let the network access users’ RFID tags while adhering to a privacy protocol (network model). The perception and reactions of future users to these three privacy enhancing technologies (PETs) are compared in the present article and an attempt is made to understand the reasoning behind their preferences. The main conclusion is that users do not trust complex PETs as they are envisioned today. Instead, they prefer to kill RFID chips at store exits even if they appreciate after sales services. Enhancing trust through security and privacy ‘visibility’ as well as PET simplicity may be the road to take for PET engineers in UbiComp.

Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Fusaro R (2004) None of our business. Harv Bus Rev 82(12):33–44
Smith H, Milberg J, Burke, J (1996) Information privacy: measuring individuals’ concerns about organizational practices. MIS Q 20(2):167–196
Jannasch U, Spiekermann S (2004) RFID Technologie im Einzelhandel der Zukunft: Datenentstehung, Marketing Potentiale und Auswirkungen auf die Privatheit des Kunden. Lehrstuhl für Wirtschaftsinformatik Humboldt Universität zu Berlin: Berlin, Germany
Berthold O, Guenther O, Spiekermann S (2005) RFID Verbraucherängste und Verbraucherschutz. Wirtschaftsinformatik 47(6):422–430
FoeBuD e.V (2003) Positionspapier über den Gebrauch von RFID auf und in Konsumgütern http://www.foebud.org/rfid/positionspapier. 12 September 2007 [cited 14]
Duce H (2003) Public policy: understanding public opinion. In: A.-I. Center (ed.). Auto-ID Center, Massachusetts Institute of Technology (MIT), Cambridge
Auto-ID Center, 860 MHz – 930 MHz Class 1 radio frequency (RF) identification tag radio frequency and logical communication interface specification, 2004. EPCGlobal, Cambridge
Sarma S, Weis S, Engels D (2002) RFID systems, security and privacy implications. In: A.-I. Center (ed.) Massachusetts Institute of Technology (MIT), Cambridge
Auto-ID Center, Technology Guide (2002) In: A.-I. Center (ed.) Massachusetts Institute of Technology (MIT), Cambridge
GCI (2003) G.C.I., Global Commerce initiative EPC roadmap. G.C. Initiative and IBM (eds) GCI, Metro Gruppe, IBM Inc., Köln
Auto-ID Center (2003) EPC-256: the 256-bit electronic product code representation. A.-I. Center (ed) Massachusetts Institute of Technology (MIT), Cambridge
Auto-ID Center (2003) EPC information service—data model and queries. A.-I. Center (ed) Massachusetts Institute of Technology (MIT), Cambridge
Auto-ID Center (2003) Auto-ID object name service (ONS) 1.0. Mealling M (ed) Auto-ID Center, Cambridge
Engels D et al (2003) Security and privacy aspects of low-cost radio frequency identification systems. In: First international conference on security in pervasive computing, SPC 2003. Springer, Boppard
Engberg S, Harning M, Damsgaard Jensen C (2004) Zero-knowledge device authentication: privacy and security enhanced RFID preserving business value and consumer convenience. In: Second annual conference on privacy, security and trust, New Brunswick, Canada
Spiekermann S, Berthold O (2004) Maintaining privacy in RFID enabled environments—proposal for a disable-model. In: Robinson P, Vogt H, Wagealla W (eds) Privacy, security and trust within the context of pervasive computing. Springer, Vienna
Inoue S, Yasuura H (2004) RFID privacy using user-controllable uniqueness. In: RFID privacy workshop. Massachusetts Institute of Technology (MIT), Cambridge
Floerkemeier C, Schneider R, Langheinrich M (2004) Scanning with a purpose—supporting the fair information principles in RFID protocols. In: Murakami H et al (eds) Ubiquitious computing systems. Springer, Tokyo
Langheinrich M (2003) A privacy awareness system for ubiquitous computing environments. In: Fourth international conference on ubiquitous computing, UbiComp2002. Springer, Göteborg
Christian M et al (2007) Making radio frequency identification visible—a watchdog tag. In: Fifth annual IEEE international conference on pervasive computing and communications, New York, USA
Stajano F (2002) Security for ubiquitous computing. Wiley, Chichester
Cranor LF (2003) P3P: making privacy policies more useful. In: IEEE security and privacy, pp 50–55
Juels A, Rivest R, Szydlo M (2003) The blocker tag: selective blocking of RFID tags for consumer privacy. In: 10th ACM conference on computers and communications security (CCS 2003), Washington, USA
Karjoth G, Moskowitz PA (2005) Disabling RFID tags with visible confirmation: clipped tags are silenced. In: ACM workshop on privacy in the electronic society. ACM Press, Alexandria
Shamir A (1979) How to share a secret. Commun ACM (CACM) 22(11):612–613
Fishbein M, Ajzen I (1975) Belief, attitude, intention and behavior: an introduction to theory and research. Addison-Wesley, Reading
Ajzen I (1985) From intentions to actions: a theory of planned behavior. In: Kuhi J, Beckmann J (eds) Action-control: from cognition to behavior. Springer, Heidelberg, pp 11–39
Ajzen I, Fishbein M (2005) The influence of attitudes on behavior. In: Albarracin D, Johnson BT, Zanna MP (eds) The handbook of attitudes on behavior. Erlbaum, Mahwah, pp 173–221
Rogers E (2003) Diffusion of innovations, 4th edn. The Free Press, New York
Venkatesh V (2000) Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Inf Syst Res 11(4):342–365
Baier G (2004) Kontrollüberzeugungen im Umgang mit Technik: Ein Persönlichkeitsmerkmal mit Relevanz für die Gestaltung technischer Systeme, in Institute of Psychology. Humboldt University, Berlin
Spiekermann S, Grossklags J, Berendt B (2001) E-privacy in 2nd generation E-commerce. In: Proceedings of the 3rd ACM conference on electronic commerce EC’01. ACM Press, Tampa
Berendt B, Guenther O, Spiekermann S (2005) Privacy in E-commerce: stated preferences vs. actual behavior. Commun ACM 48(4):101–106
Kassarjian HH (1977) Content analysis in consumer research. J Consumer Res 4(1):8–18
Grabner-Kräuter S, Kaluscha EA (2003) Empirical research in on-line trust: a review and critical assessment. Int J Hum Comput Stud 58(6):783–812
Chen SC, Dhillon GS (2003) Interpreting dimensions of consumer trust in E-commerce. Inf Technol Manage 4(2–3):303–318
Patrick AS, Briggs P, Marsh S (2005) Designing systems that people will trust. In: Cranor LF, Garfinkel S (eds) Security and usability. O’REILLY, Sebastopol, pp 75–99
Adams A, Sasse A (1999) Users are not the enemy—why users compromise computer security mechanisms and how to take remedial measures. Commun ACM 42(12):40–46
Maes P, Wexelblat A (1997) Issues for software agent UI. MIT Media Lab, Cambridge
Sheeran P (2002) Intention–behavior relations: a conceptual and empirical review. In: Stroebe W, Hewstone M (eds) European review of social psychology. Wiley, Chichester, pp 1–36
Trafimow D et al (2002) Evidence that perceived behavioural control is a multidimensional construct: perceived control and perceived difficulty. Br J Soc Psychol 41:101–121
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Spiekermann, S. RFID and privacy: what consumers really want and fear. Pers Ubiquit Comput 13, 423–434 (2009). https://doi.org/10.1007/s00779-008-0215-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-008-0215-2