79
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

RFID Privacy Issues in Healthcare: Exploring the Roles of Technologies and Regulations

Pages 3-28 | Published online: 10 Sep 2014

Reference

  • Abolins, J. (2003). RFID and firearms. Available online at: http://www.jpfo.org/alerts/alert20030907.htm.
  • Albrecht, K. (2007). Microchip-cancer report. Available online at: http://www.antichips.com/cancer/index.html
  • Appari, A., Anthony, D. L., & Johnson, M. E. (2009). HIPAA Compliance: An examination of Institutional and Market Forces. The 8th Workshop on Economics of Information Systems (WEIS 2009).
  • Avoine, G. (2006). Bibliography on security and privacy in RFID systems. Available online at http://www.avoine.net/rfid/download/bib/bibliography-rfid.pdf.
  • Barua, A., Mani, D., & Whinston, A. B. (2006). Assessing the Financial Impacts of RFID Technologies on the Retail and Healthcare Sectors. Center for Research in Electronic Commerce, Department of IROM, McComb School of Business, The University of Texas at Austin.
  • Becker, C. (2004a). A new game of leapfrog? RFID is rapidly changing the product-tracking process. Some say the technology~once costs drop-could displace bar-coding. Modern healthcare, 34 (28), 38–40.
  • Belfort, R. (2009). HITECH raises the stakes on HIPAA compliance [Electronic Version]. Available online at: http://www.manatthealthsolutions.com/publications/articles/HITECH%20%20HIPAA%20Implications.pdf
  • Berkeleycitizen.org. (2005). RFID protest rally [Electronic Version]. Available online at: http://www.berkeleycitizen.org/community/rfid1.html
  • Bishop, L. S., Holmes, B. J., & Kelley, C. M. (2005). National consumer health privacy survey 2005. California HealthCare Foundation. Available online at: http://www.chcf.org/publications/2005/11/national-consumer-health-privacy-survey-2005
  • Black, J. (2004). Shutting shopping bags to prying eyes. Available online at: http://www.businessweek.com/technology/content/mar2004/tc2004035_8506_tc073.htm
  • Boycott-Gillette. (2003). CASPIAN launches worldwide Gillette boycott. Available online at: http://www.boycottgillette.com/pressrelease8-11.html
  • Breese, P., Rietmeijer, C., & Burman, W. (2007). Content among locally approved HIPAA authorization forms for research. Journal of Empirical Research on Human Research Ethics, 2 (1), 43–46.
  • Cavoukian, A. (2009). Privacy by design… take the challenge. Information and Privacy Commissioner of Ontario (Canada). http://www.ipc.on.ca/images/Resources/PrivacybyDesignBook.pdf.
  • Chen, C. C., Wu, J., & Crandall, R. E. (2007). Obstacles to the adoption of radio frequency identification technology in the emergency rooms of hospitals. International Journal of Electronic Healthcare, 3 (2), 193–207.
  • Choi, Y. B., Capitan, K. E., Krause, J. S., & Streeper, M. M. (2006). Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules. Journal of Medical Systems, 30 (1), 57–64.
  • Corsi, J. (2008). Hospitals tagging babies with electronic chips. Available online at: http://www.worldnetdaily.com/news/article.asp?ARTICLE_ID=59690
  • Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10 (1), 104–115.
  • Culnan, M. J., & Bies, R. J. (2003). Consumer privacy: Balancing economic and justice considerations. Contemporary Perspectives on Privacy: Social, Psychological, Political, 59 (2), 323–342.
  • Davis, S. (2004). Tagging along. RFID helps hospitals track assets and people. Health facilities management, 17 (12), 20–24.
  • Engberg, S. J., Harning, M. B., & Jensen, C. D. (2004). Zero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience. Paper Presented at the Second Annual Conference on Privacy, Security, and Trust.
  • Eschet, G. (2004). FIPs and PETs for RFID: Protecting privacy in the web of radio frequency identification. Jurimetrics, 45, 301–323
  • Fisher, J. A., & Monahan, T. (2008). Tracking the social dimensions of RFID systems in hospitals. International journal of medical informatics, 77 (3), 176–183.
  • Fishkin, K. P., Roy, S., & Jiang, B. (2005). Some methods for privacy in RFID communication. Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks, Springer, 42–53.
  • Gostin, L. O., & Sharyl, N. (2009). Reforming the HIPAA privacy rule: Safeguarding privacy and promoting research. Journal of the American Medical Association (JAMA), 301 (13), 1373–1375.
  • Hennig, J. E., Ladkin, P. B., & Sieker, B. (2004). Privacy enhancing technology concepts for RFID technology scrutinized. Research Report, RVS-RR-04-02, University of Bielefeld, Germany.
  • HEW. (1973). Fair Information Practices. U.S. Dept. of Health, Education and Welfare. http://www.privacvrights.org/ar/fairinfo.htm.
  • HIPAA. (1996). Health Insurance Portability Accountability Act (HIPAA). Available online at: http://www.hipaa.org/.
  • HITECH. (2009). Health Information Technology for Economic and Clinical Health Act (HITECH). Available online at: http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/hitechrfi.pdf.
  • Hodge Jr, J. G. (1999). Intersection of federal health information privacy and state administrative law: The protection of individual health data and workers’ compensation, The Administrative Law Review, 51 (1), 117–144.
  • Huyskens, C., & Loebbecke, C. (2007). RFID adoption: theoretical concepts and their practical application in fashion. International Federation For Information Processing-Publications-IFIP, 235, 345–361.
  • Jossi, F. (2004). Electronic follow-up: bar coding and RFID both lead to significant goals—efficiency and safety. Healthcare informatics: the business magazine for information and communication systems, 21 (11), 31–33.
  • Juban, R. L., & Wyld, D. C. (2004). Would you like chips with that?: Consumer perspectives of RFID. Management Research News, 27 (11/12), 29–44.
  • Juels, A. (2006). RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 24 (2), 381–394.
  • Juels, A., & Brainard, J. (2004). Soft blocking: Flexible blocker tags on the cheap. Paper Presented at the Proceedings of the 2004 ACM workshop on Privacy in the Electronic Society, Washington DC, USA.
  • Juels, A., & Pappu, R. (2003). Squealing Euros: privacy protection in RFID-enabled banknotes. Financial Cryptography, Springer Berlin/Heidelberg, 2742, 103–121.
  • Juels, A., Rivest, R. L., & Szydlo, M. (2003). The blocker tag: Selective blocking of RFID tags for consumer privacy. Paper Presented at the Proceedings of the 10th ACM conference on Computer and Communications Security, Washington D.C., USA.
  • Karahanna, E., Straub, D. W., & Chervany, N. L. (1999). Information technology adoption across time: a cross-sectional comparison of pre-adoption and post-adoption beliefs. MIS Quarterly, 23 (2), 183–213.
  • Kravets, D. (2008). Bush administration: dismiss RFID ‘mark of the beast’ lawsuit [Electronic Version]. Available online at: http://blog.wired.com/27bstroke6/2008/11/bush-administra.html
  • Kumar, R. (2003). Interaction of RFID technology and public policy. Wipro White Paper. Available online at: http://www.rfidconsultation.eu/docs/ficheiros/Wipro_Interaction_RFID_Technology_Public_Policy.pdf
  • Langenderfer, J., & Cook, D. L. (2004). Oh, what a tangled web we weave the state of privacy protection in the information economy and recommendations for governance. Journal of Business Research, 57 (7), 734–747.
  • Langheinrich, M. (2001). Privacy by design-principles of privacy-aware ubiquitous systems. Ubicomp 2001: Ubiquitous Computing, Lecture notes in computer science 2207, 273–291.
  • Langheinrich, M. (2002). A privacy awareness system for ubiquitous computing environments. UbiComp 2002: Ubiquitous Computing, Lecture notes in computer science 2498, 315–320.
  • Lee, C. P., & Shim, J. P. (2007). An exploratory study of radio frequency identification (RFID) adoption in the healthcare industry. European Journal of Information Systems, 16 (6), 712–724.
  • Leff, L. (2005). Students ordered to wear tracking tags. [Electronic Version]. Available online at: from http://www.msnbc.msn.com/id/6942751
  • Mason, R. O. (1986). Four ethical issues of the information age. MIS Quarterly, 10 (1), 5–12.
  • McGraw, D., Dempsey, J. X., Harris, L., & Goldman, J. (2009). Privacy as an enabler, not an impediment: building trust into health information exchange. Health Affairs, 28 (2), 416–427.
  • Meingast, M., Roosta, T., & Sastry, S. (2006). Security and privacy issues with health care information technology. Proceedings of 28th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, New York, NY, 5453–5458.
  • Milne, G. R., & Culnan, M. J. (2002). Using the content of online privacy notices to inform public policy: A longitudinal analysis of the 1998–2001 US Web surveys. The Information Society, 18 (5), 345–359.
  • Mowry, M. (2008). A survey of RFID in the medical industry. Available online at: http://www.winmec.ucla.edu/rfid/course/2008s/Final_project_Mike_Mowry.pdf.
  • Muncaster, P. (2005). Tesco sparks RFID protest. [Electronic Version]. IT week. Available online at: http://www.vnunet.com/itweek/news/2085767/tesco-sparks-rfid-protest.
  • Neil, R. (2005). On a roll. RFID moves toward patient safety. Materials Management in Health Care, 14 (3), 20–23.
  • Online Security Authority. (2008). RFID where? You’d better look at your shoes, socks and underwear! [Electronic Version]. Available online at: http://www.onlinesecurityauthority.com/thoughts-on-security/rfid-where-youd-shoes-socks/
  • Peslak, A. R. (2005). An ethical exploration of privacy and radio frequency identification. Journal of Business Ethics, 59 (4), 327–345.
  • Privacyrights.org. (2003). RFID position statement of consumer privacy and civil liberties organizations. Available online at: http://www.privacyrights.org/ar/RFIDposition.htm
  • RFIDnews.org. (2008). Prisoners may be RFID-chipped in the UK. Available online at: http://www.rfidnews.org/2008/01/13/prisoners-may-be-rfid-chipped-in-the-uk
  • Schwaig, K. S., Kane, G. C., & Storey, V. C. (2006). Compliance to the fair information practices: How are the Fortune 500 handling online privacy disclosures? Information & Management, 43 (7), 805–820.
  • Spiekermann, S. (2007). Privacy enhancing technologies for RFID in retail-an empirical investigation. UbiComp 2007: Ubiquitous Computing, Springer Berlin/Heidelberg, 4717, 56-12.
  • Spiekermann, S., & Berthold, O. (2005). Maintaining privacy in RFID enabled environments-proposal for a disable-model. Privacy, Security and Trust within the Context of Pervasive Computing, 780, 137–146.
  • Starrett, M. (2003). I’d rather go naked [Electronic Version]. Available online at: http://newswithviews.com/Mary/starrett4.htm
  • Thiesse, F., Floerkemeier, C., Fleisch, E., & Sorensen, C. (2007). Assessing the impact of privacy-enhancing technologies for RFID in the retail industry. AMCIS 2007 Proceedings, Keystone, Colorado, Paper 223.
  • Volonino, L., & Robinson, S. R. (2003). Principles and practice of information security: Prentice.
  • Wang, S. W., Chen, W. H., Ong, C. S., Liu, L., & Chuang, Y. W. (2006). RFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital. Proceedings of the 39th Annual Hawaii International Conference on System Sciences, Kauai, Hawaii, vol 8, 184a.
  • Weis, S. A., Sarma, S. E., Rivest, R. L., & Engels, D. W. (2004). Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing 2802, 50–59.
  • Westin, A. F. (1967). Privacy and Freedom, Atheneum: New York.
  • Westin, A. F. (2003). Social and political dimensions of privacy. Journal of Social Issues, 59 (2), 431–453.
  • Wicks, A. M., Visich, J. K., & Li, S. (2006). Radio frequency identification applications in hospital environments. Hospital topics, 84 (3), 3–9.
  • Xu, H. (2009). Consumer responses to the introduction of privacy protection measures: an exploratory research framework. International Journal of E-Business Research, 5 (2), 21–47.
  • Xu, H., Bagby, W. J., & Melonas, R. T. (2009). Regulating privacy in wireless advertising messaging: FIPP compliance by policy vs. by design Proceedings of 9th Privacy Enhancing Technologies Symposium (PETS 2009), Seattle, Washington, 19–36.
  • Xu, H., Teo, H. H., Tan, B. C. Y., & Agarwal, R. (2010). The role of push-pull technology in privacy calculus: the case of location-based services. Journal of Management Information Systems, 26 (3), 137–176.
  • Young, D. (2004). FDA embraces RFID to protect drug supply. American journal of health-system pharmacy, 61 (24), 2612–2612.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.