Team for Research in
Ubiquitous Secure Technology

Where’s the Beep? User Misunderstandings of RFID
Jennifer King, Aylin Selcugoku

Citation
Jennifer King, Aylin Selcugoku. "Where’s the Beep? User Misunderstandings of RFID". Proceedings of 2011 IEEE International Conference on RFID, pp.192-199, 12, April, 2011.

Abstract
Radio frequency identification (RFID) technology is increasingly being incorporated into everyday objects. This case study examines three examples - credit cards, transit cards, and the U.S. e-Passport - given ubiquitous computing power through the addition of RFID. We explored user comprehension of RFID technology generally and these implementations specifically to understand if and how the addition of this technology transformed subjects' experiences with these objects. By exploring whether or not the new implementations preserved prior expectations of use, we sought to understand what experiences subjects drew upon to create new mental models for engaging with them. As all three of the objects we examine stored personal or financial information, we were specifically interested to understand how individuals dealt with the novel privacy risks introduced by RFID. We distill our findings into general recommendations for designers contemplating embedding ubiquitous computing into everyday objects, particularly those that manage personal or financial information.

Electronic downloads

Citation formats  
  • HTML
    Jennifer King, Aylin Selcugoku. <a
    href="http://www.truststc.org/pubs/863.html"
    >Where’s the Beep? User Misunderstandings of
    RFID</a>, Proceedings of 2011 IEEE International
    Conference on RFID, pp.192-199, 12, April, 2011.
  • Plain text
    Jennifer King, Aylin Selcugoku. "Where’s the
    Beep? User Misunderstandings of RFID". Proceedings of
    2011 IEEE International Conference on RFID, pp.192-199, 12,
    April, 2011.
  • BibTeX
    @inproceedings{KingSelcugoku11_WheresBeepUserMisunderstandingsOfRFID,
        author = {Jennifer King and Aylin Selcugoku},
        title = {Where’s the Beep? User Misunderstandings of RFID},
        booktitle = {Proceedings of 2011 IEEE International Conference
                  on RFID},
        pages = {pp.192-199},
        day = {12},
        month = {April},
        year = {2011},
        abstract = {Radio frequency identification (RFID) technology
                  is increasingly being incorporated into everyday
                  objects. This case study examines three examples -
                  credit cards, transit cards, and the U.S.
                  e-Passport - given ubiquitous computing power
                  through the addition of RFID. We explored user
                  comprehension of RFID technology generally and
                  these implementations specifically to understand
                  if and how the addition of this technology
                  transformed subjects' experiences with these
                  objects. By exploring whether or not the new
                  implementations preserved prior expectations of
                  use, we sought to understand what experiences
                  subjects drew upon to create new mental models for
                  engaging with them. As all three of the objects we
                  examine stored personal or financial information,
                  we were specifically interested to understand how
                  individuals dealt with the novel privacy risks
                  introduced by RFID. We distill our findings into
                  general recommendations for designers
                  contemplating embedding ubiquitous computing into
                  everyday objects, particularly those that manage
                  personal or financial information.},
        URL = {http://www.truststc.org/pubs/863.html}
    }
    

Posted by Mary Stewart on 4 Apr 2012.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.