Wednesday, November 6, 2019

Essay on The Use of TelecommunicationEssay Writing Service

Essay on The Use of TelecommunicationEssay Writing Service Essay on The Use of Telecommunication Essay on The Use of TelecommunicationThe term telecommunications means long distance connection (Floyd,  2012). This is a form of transmitting and receiving all sorts of information (sound, images, text) over long distances via cable, magnetic, wireless, optical and other electromagnetic systems. Telecommunication systems have been developed and spread in the 20th century (Want,  2006).RFID (radio frequency identification) is a way to automatically identify objects, which by means of radio signals read or writes the data stored in the RFID tags (transponders). RFID systems according to distance are divided into near, medium and long-range identification. RFID technology is used in many spheres of human activity: education, medicine, industry, agriculture, as well as in systems: baggage handling, localization of objects in real time, access control and other (Wamba, 2012). This prevalence of this type of technology has caused serious controversy around it. Sometimes its criticism reached boycotting products. For example, many argue that the RFID system violate privacy. They argue that the buyer may not even know of RFID-tags or can not get rid of them, and secondly, the data from the tags can be read without your knowledge, in the third, when paying for goods by credit card it is likely the binding of ID tag with the buyer. Many argue that such a tagging system creates problems with rights for privacy and for most applications it is not necessary. The public is concerned that the presence of such tags for the purchased product, which the buyer may not even be aware of, may cause a number of negative phenomena. For example, goods with RFID-tags can be used to spy on the person. RFID systems represent a danger if obtained information about a person is stored in the database set of independent materials. In the future, obtained information can be used for bad purposes. For example, a burglar, using a handheld reader, can evaluate the material condition of a p otential victim passing by (Periaswamy,  2011). All this is due to the possibility of reading the information over short distances. Security experts are opposed to the use of RFID systems for authentication people, explaining that by high-risk of identity theft.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.