Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
The Impact of RFID Security Vulnerabilities on Supply Chain: Case Studies: RFID companies in Iran
2011 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Every technology has advantages and disadvantages. RFID is a new technology when compared with other technologies like networking and telecommunication technologies and much more modern in Iran, with lots of unrevealed and not recognized features and applications. In business fields like supply chain the concerns of RFID security vulnerabilities, seem to be the reason for low rate of adaption. The current research is trying to create or suggest a theory or model to executives of RFID in Iran, in order to help the speed up and spread. The researcher investigated through commercial and technical companies involved with RFID technology and implementations in Iran. The current research is focused on the companies' projects which support vast variety of supply chains and is a qualitative research based on case studies. This survey gives a comparison with foreign RFID executives' experiences and concerns in order to find the common and differential points. It would be helpful in specifying the heaviest concern or concerns in a statistical comparison.Here in the current research the area which the investigation is around it is the e-Commerce applications in the market place, which could be affected and become more efficient or accelerated by the use of wireless technology and devices generally, and RFID applications and accessories specifically. The attempt is towards finding and empirical test of a theoretical model aimed at explaining a comparison between security concerns to show the most important efficient one to be considered in the RFID context when implemented in supply chains.In the literature review, the foreign concerns and issues were categorized in three, E-Commerce security, RFID security concepts and issues and RFID in supply chains. Then a conceptual framework was proposed to build links between a secure model of RFID (AIMS4MSD) and supply chains members also with the backbone network where the databases and servers were located. In the current explanatory research relationships are the impacts of RFID on supply chain and security features are variables. With an inductive approach the theory is built from samples and cases towards rules and laws. The current thesis is based on grounded theory and case studies as strategies to complete the research. And the author followed within case and cross case procedures to analyze the primary and secondary data gathered from foreign works and in-depth interviews organized and performed with seven (7) RFID companies in Iran as the research statistical society with a snowball sampling method.At the end as the findings the research questions were answered and concluded that in order to benefit efficiently from RFID in supply chains it is needed to consider security concerns and standards and provide adequate trainings for users and staff concurrently. These would be helpful in recognizing the most effective vulnerabilities around RFID when being implemented in supply chains.

Place, publisher, year, edition, pages
2011. , p. 111
Keywords [en]
Social Behaviour Law, Vulnerability, supply chain, RFID, Privacy, Authentication, Authorization, Cryptography, Confidentiality, Integrity, Availability
Keywords [sv]
Samhälls-, beteendevetenskap, juridik, supply chain, e-commerce
Identifiers
URN: urn:nbn:se:ltu:diva-58530Local ID: f1b0b913-d769-41f0-9847-592e9d68461cOAI: oai:DiVA.org:ltu-58530DiVA, id: diva2:1031918
Subject / course
Student thesis, at least 30 credits
Educational program
Electronic Commerce, master's level
Supervisors
Examiners
Note
Validerat; 20111101 (anonymous)Available from: 2016-10-04 Created: 2016-10-04Bibliographically approved

Open Access in DiVA

fulltext(2108 kB)256 downloads
File information
File name FULLTEXT02.pdfFile size 2108 kBChecksum SHA-512
deee4607b06c2f64df2e9c77673d48a13084435ed9f7d325a7fa193009cf443bffd01d7535d07734c4c97266cbbc1e3c48192bf712ecf9a2450f04342a1d4040
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Mobahat, Hoopad

Search outside of DiVA

GoogleGoogle Scholar
Total: 256 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 40 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf