Change search
ReferencesLink to record
Permanent link

Direct link
The Impact of RFID Security Vulnerabilities on Supply Chain: Case Studies: RFID companies in Iran
2011 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Every technology has advantages and disadvantages. RFID is a new technology when compared with other technologies like networking and telecommunication technologies and much more modern in Iran, with lots of unrevealed and not recognized features and applications. In business fields like supply chain the concerns of RFID security vulnerabilities, seem to be the reason for low rate of adaption. The current research is trying to create or suggest a theory or model to executives of RFID in Iran, in order to help the speed up and spread. The researcher investigated through commercial and technical companies involved with RFID technology and implementations in Iran. The current research is focused on the companies' projects which support vast variety of supply chains and is a qualitative research based on case studies. This survey gives a comparison with foreign RFID executives' experiences and concerns in order to find the common and differential points. It would be helpful in specifying the heaviest concern or concerns in a statistical comparison.Here in the current research the area which the investigation is around it is the e-Commerce applications in the market place, which could be affected and become more efficient or accelerated by the use of wireless technology and devices generally, and RFID applications and accessories specifically. The attempt is towards finding and empirical test of a theoretical model aimed at explaining a comparison between security concerns to show the most important efficient one to be considered in the RFID context when implemented in supply chains.In the literature review, the foreign concerns and issues were categorized in three, E-Commerce security, RFID security concepts and issues and RFID in supply chains. Then a conceptual framework was proposed to build links between a secure model of RFID (AIMS4MSD) and supply chains members also with the backbone network where the databases and servers were located. In the current explanatory research relationships are the impacts of RFID on supply chain and security features are variables. With an inductive approach the theory is built from samples and cases towards rules and laws. The current thesis is based on grounded theory and case studies as strategies to complete the research. And the author followed within case and cross case procedures to analyze the primary and secondary data gathered from foreign works and in-depth interviews organized and performed with seven (7) RFID companies in Iran as the research statistical society with a snowball sampling method.At the end as the findings the research questions were answered and concluded that in order to benefit efficiently from RFID in supply chains it is needed to consider security concerns and standards and provide adequate trainings for users and staff concurrently. These would be helpful in recognizing the most effective vulnerabilities around RFID when being implemented in supply chains.

Place, publisher, year, edition, pages
2011. , 111 p.
Keyword [en]
Social Behaviour Law, Vulnerability, supply chain, RFID, Privacy, Authentication, Authorization, Cryptography, Confidentiality, Integrity, Availability
Keyword [sv]
Samhälls-, beteendevetenskap, juridik, supply chain, e-commerce
URN: urn:nbn:se:ltu:diva-58530Local ID: f1b0b913-d769-41f0-9847-592e9d68461cOAI: diva2:1031918
Subject / course
Student thesis, at least 30 credits
Educational program
Electronic Commerce, master's level
Validerat; 20111101 (anonymous)Available from: 2016-10-04 Created: 2016-10-04Bibliographically approved

Open Access in DiVA

fulltext(2108 kB)6 downloads
File information
File name FULLTEXT02.pdfFile size 2108 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Mobahat, Hoopad

Search outside of DiVA

GoogleGoogle Scholar
Total: 6 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 2 hits
ReferencesLink to record
Permanent link

Direct link