Josh Myers
English 102
Kearney Monday @ 7:00 PM
First Draft
Radio Frequency Identification: Applications in Healthcare Have you ever had your identity stolen? In today’s Information Age, data security breaches and identity theft are becoming a much more prevalent crime. According to NBC news, there were over 12.6 million reported cases of identity theft in the United States alone in 2012. When broken down that is 35,000 cases of identity theft each day! The repercussions of this for the victim can vary greatly. An individual can simply have a few fraudulent charges made on their credit card, which most banks will cover. However, if that individual is not careful they could have numerous loans taken out in their name, maxed out credit
…show more content…
My research has concluded that RFID can be implemented into healthcare, but cannot have any interaction with patients. There are three main points that will be discussed in this paper. Firstly it will discuss the opposing viewpoints to my hypothesis. Secondly, it will explain how RFID is unsafe to be used directly with patients. Thirdly the paper will highlight alternative ways that RFID can be implemented into healthcare.
TOPIC 1
Many who work in the healthcare industry believe that radio frequency identification technology should be adopted due to the numerous benefits it provides. William Koretsky made history in the medical field by becoming the first patient to be identified from an implanted RFID chip in May 2006. Officer Koretsky was a sergeant for the Bergen County Police Department in New Jersey. He was injured when he crashed his patrol car into a tree during a high-speed chase. When ambulance arrived at the hospital, an emergency-room scanner revealed an RFID chip in his arm, which was implanted in 2004 for identification purposes. Doctors retrieved the serial number on the chip, identified Koretsky using an online database that contained his medical records, reviewed his medical history and learned that he had type 1 diabetes. While treating his other injuries, physicians quickly began monitoring Koretsky 's blood sugar level.
Identity theft is the stealing and use of someone’s personal information and is one of the fastest growing crimes in the nation (Dole, 2005). According to Federal Trade Commission estimates, identity thieves victimize approximately 10 million Americans every year at a cost of an astonishing $50 billion (2005). Identity theft has been going on for years now and is easily done with the help of today’s technology. According to the Federal Trade Commission, there are six common ways that identity thieves get a hold of personal information. The varieties of methods that are used are dumpster diving, skimming, phishing, changing the victim’s address, stealing, and pretexting (Federal Trade Commission). Once someone’s identity is stolen,
Identity theft is a major concern today in our country, millions of a person’s identity have been compromised for many of years. Identity theft occurs when someone uses another person’s personal information such as name, Social Security number, driver’s license number, credit card number, or other identifying information to take on that person’s identity in order to commit fraud or other crimes. Stealing an identity is, unfortunately, surprisingly easy to do and happens when you least expect it. Just by opening your mail, something that has personal information on it, throwing it in the trash. Therefore, a person can go through your trash and take all that information and use it against you to take on a new identity.
In 2014, there were an estimated 2.3 million cases, a twenty-two percent increase from the previous year (Andrews, 2016). According to the Federal Trade Commission, identity theft complaints have also increased by more than 47 percent since 2014 and it was the second most reported crime after illegal debt collection. (“FTC Releases Annual Summary of Consumer Complaints Debt Collection, Identity Theft, and Imposter Scams Remain Top Categories of Complaints Received by FTC in 2015”, 2016) “The 2017 Identity Fraud Study, released by Javelin Strategy & Research, found that $16 billion was stolen from 15.4 million U.S. consumers in 2016, compared with $15.3 billion and 13.1 million victims in 2015. In the past six years identity thieves have stolen over $107 billion.” (“Identity Theft and Cybercrime”,
Have you ever received a credit card bill at the end of the month with a ridiculous amount of money needed to be paid that you never spent? This is because of identity theft. The FTC estimates that each year, over 9 million people are affected by identity theft. According to Sally Driscoll, this is because almost anyone with a computer and a slight bit of computer knowledge can pull off identity theft. Experts also claim that identity theft is the fastest-growing crime in the world. Identity theft is a global problem that cannot be stopped without effective measures. The problem is, effective measures are very hard to come by when dealing with identity theft because almost any security protocol can be by-passed.
Identity theft is an issue faced on a daily basis for those that are living in our wonderful state of California. For some it is common knowledge to protect your identity but for those that are not familiar with the practices of these common crooks, will cost a lifetime of savings and irreparable damage to ones credit and finances. According to the California Office of Privacy Protection, “there were more than 11 million victims of Identity Theft in the
Identity theft is a significant problem to both citizens and financial institutions. The FTC estimates that over 27.3 million Americans have been the victims of identity theft in the past five years. The
In recent years, the world has seen significant changes in technology. With new technology come new challenges. One of those new challenges is identity theft. Identity theft can happen through the internet, ATM, emails, or even a phone. Identity theft can happen when any person(s) takes an individual’s information, such as their Social Security number, or even banking information for financial gain. “Close to 100 million Americans have their personal information placed at risk of theft each year when records in databases are lost, stolen or accessed by unauthorized individuals” (Information systems and technology, n.d.). Identity theft not only costs the person, whose
The number of people that have experienced identity theft has been increasing rapidly. Identity theft is when one’s personal information, including social security number, credit card number or even name is stolen and is used for economic gain. A person’s identity could be taken at any time or place, and it could happen without them knowing about it. Once a person’s identity has been stolen, there are not many things they can do about it, and resolving it might take a couple months, if not years. According to “Fending Off Identity Fraud” by Danielle Britni, in 2012 alone, 16.6 million Americans were victims of some type of identity theft. In this article, the author explains multiple ways of protecting one’s identity, as well as a way of keeping
Identity theft over the years has cost citizens and businesses millions of dollars each year just in the United States alone. It has also taken on different forms from true identity theft (false impersonation), to theft for financial gain, and to non-credit forms of identity theft. Identity theft does not necessarily have to cause monetary damage, but what it does do to a victim’s credit, medical history, citizenship, driving records, etc. can do possibly more damage. Furthermore, identity theft threatens our national security, impacts our economy, and can facilitate terrorism and illegal
For this policy paper I have chosen Radio frequency identification (RFID) technology. RFID is able to provide a lot of advantages in the supply chain management, health care system, government operations. RIFD uses electronic magnetic fields for automatically identifying and tracking the tags attached with the objects. The tags contain electronic information. The RFID devices consist of an antenna which emits a radio signals for activating a tag and read and write the electronic data to those. The technology is able to provide a lot of advantages to the users but there are several ethical considerations associated with the use of this technology. Mostly the ethical issues are associated
Identity theft is the fastest growing fraud crime in America (Finklea, 2009). Gaining knowledge in preventing theft will better the economy and lower the crime rates in America. There are reported 9.9 million victims of identity theft and this number is increasing rapidly as the years go on. It has been reported that an estimate of fifty billion dollars has been charged to our consumers every year due to identity theft (Finklea, 2009).
Identity theft is on the rise in the United States and Globally. The Federal Trade Commission advised that there are about nine million cases of identity theft. People who had their identity stolen often feel like they were violated. Any individual can have their identity compromised in numerous ways. Different institutions store personal information. There are several organizations that have social security numbers, bank account numbers, and credit card numbers. Colleges and Universities have people personal information stored in their databases that could be hacked. There are several companies that offer options to people to protect their identity. Most credit card companies offer the option of identity
Identity theft affects millions of Americans every day. Scam artists and hackers lay in wait for an unsuspecting person to get caught up their scheme through ignorance or naivety so they can take full advantage of their personal information to do as they desire with it. Problem is, it infiltrates and depreciates the integral infrastructure of our society which creates a cultural lapse through the declination of economic and cultural growth and double jeopardizes an already unstable system to the brink of its destruction. To understand how
Just as all other technologies have such difficulties, RFID technology has obstacles to overcome. Two main concerns are discussed in this paper: radio wave technology hindrances such as collisions, and the ethical concerns that entangle this controversial yet extremely helpful technology.
The VeriChip that is implanted into the body is considered to be a passive RFID tag because it doesn’t use or contain batteries and due to that the VeriChip remains inactive until a proprietary scanner activates it. Passive RFID tags, like the VeriChip, boast a number of unique, significant features. Passive RFID tags have longer lifetimes than active RFID tags (with onboard batteries) and the, the estimated lifetime of a VeriChip is over 20 years. The passive RFID tags can only broadcast low-frequency radio waves because of their minimal power. In the VeriChip’s case, it broadcasts on the low-frequency (LF) band between 125 and 134.2 KHz (Fox, 2004). Given the VeriChip’s low power, the tag