key: cord-0039985-ui1di3qa authors: Jung, Kwangho; Lee, Sabinne title: A systematic review of RFID applications and diffusion: key areas and public policy issues date: 2015-09-04 journal: nan DOI: 10.1186/s40852-015-0010-z sha: f0850b44c84795b79645f4e678968234429cbbad doc_id: 39985 cord_uid: ui1di3qa RFID applicants called as e-ID, smart tag, and contactless smart card are being applied to numerous areas in our daily life, including tracking manufactured goods, currency, and patients to payments systems. To review these various applications of RFID is important to exploring not only ongoing e-governance issues such as digital identification, delivery process, and governance but also business oriented application areas like supply chain. Through a systematic review methodology from 111 previous studies about RFID technology for public sector, we found six key areas of RFID applications: defense and security, identification, environmental applications, transportation, healthcare and welfare, and agriculture-livestock. We also suggest that the diffusion and applications of RFID can involve unexpected disadvantages including technological deficiency, uncertain benefits, dubious transparency, uncomfortable privacy issue, and unequal distribution of digital power and literacy. Further research on RFID impact includes not only various theoretical issues of but also legal and managerial problems. Rigorous research is required to explore what factors are critical to adopt and implement new RFID applications in terms of technology governance and digital literacy. Massive data driven research is also expected to identify RFID performance in government agencies and various industry sectors. Background RFID technology has been widely implemented all over the world and its impact on our daily life is very diverse and massive Wyld, 2005) . Those diverse areas of RFID application include logistical tracking, monitoring and maintenance of products, product safety and information, and payment process. Today many governments around the world in both developed 1 and developing 2 countries are trying to apply it for various areas from tracking manufactured goods, currency, and patients to securing sagety of payments systems. Massive RFID applications around all the industry sectors and countries are expected to generate a huge potential benefits for sustainable efficient energy infrastructure, transportation safety, and health care. Over the past 50 years, RFID technology went through innovations and progressions to become a more efficient and effective gadget for human beings as well as effective solutions of technical and organizational problems in various industry sectors. However, key issues of appropriate ICT technology, governing networks among RFID domains, standardization requirement, and privacy still remain unsolved 3 . We review previous literature about RFID technology used in public sectors in order to identify what has been done and found to suggest policy implications and further research agenda. More specifically, we discuss four aspects regarding RFID research issues and policy implications. First, we examine various competing concepts of RFID use by governments all over the world. Second, we categorize numerous applications of RFID technology through analyzing previous literature. Third, we try to figure out technological issues and governance problems that RFID technology faces today. Last, we draw key public issues and suggest future research agenda. A brief history of RFID technology RFID technology was emerged as Frederick Hertz found existence of radio frequency during his experiment in 1886 (Wyld, 2005) and developed for the purpose of defense during the Second World War 4 . During 1970s and 1980s, the RFID system attracted plenty of scholars and innovators, so efforts to register patents progressed (Takahashi, 2004) . Researchers like Charles Walton had registered a patent to use RFID. In the 1980s, many US and European companies recognized the importance of developing RFID technology and started to manufacture RFID tags. Soon scholars at MIT University opened an Auto-ID center to promote the use and implementation of RFID technology. But most of the scholars report that the first commercialization of RFID technology was done by Wal-Mart as they launched RFID based material identifying system in 2005 (Shahram and Manish 2005) . Wal-Mart is now tracking merchandise including food, apparels, and electronic items with RFID technology in their supply chain. 5 . RFID technology is a brand new policy tool that can ensure high transparency, efficiency and effectiveness not only in industrial areas but also in government service delivery. Table 1 describes a brief history of how RFID technology was developed and diffused. We searched online data base and expert based information to identify RFID publications between 2003 and 2015. We categorized RFID applications and analyzed issues and concerns that RFID faces today by systematically reviewing published literature. We have The idea of using Radio Frequency to reflect waves from objects was started from Frederick Hertz's experiment. American navy research laboratories developed a system known as IFF (Identify Friend or Foe). The first application of RFID consisted of identifying allied or enemy planes during WW2 through the use of IFF system. Charles Walton, a former IBM researcher registered patent using RFID technology, a radio-operated door lock. [1980] [1981] [1982] [1983] [1984] [1985] [1986] [1987] [1988] [1989] [1990] Many US and European companies started to manufacture RFID tags. The Auto-ID center for MIT became EPC global, an organization whose objective is to promote the use and adoption of RFID technology. Wal-Mart launched and RFID pilot. collected literature we use for systematic review from two different resources. First, most of the studies are found by searching the e-database. We could access electronic databases, such as Google Scholar, World Web of Science (WWS), Proquest Central, and Science Direct through Seoul National University's main library homepage. We had set 'RFID technology' , 'RFID government, ' 'RFID application, and 'RFID issue' as keywords for searching literature. We found most of the research through this method of searching. The second method we used for collecting data was having discussions with experts. To do this, we first made a list of experts who specialize in IT technology, Science technology, and public administration. Five experts agreed to help us and recommended some research papers that were known for their fluent flow of logic and plentiful contents. We chose relevant research papers from among experts' recommendations. In sum we had used previous literature collected from two methods we discussed above, searching e-database and asking experts, as our resource of searching. [ Figure 1 ] shows analytical frame that we use for this study. We have determined the literature for systematic review according to three stages shown on the flow chart. First, the original total number of studies we have found from the e-database was 4260. Also 185 research papers were found from experts' recommendations and previous public papers. A total of 4,445 studies were chosen through the first stage. Second, we excluded 4,121 following general eligibility criteria by screening title and abstract. More specifically, we excluded RFID studies only with one of the following criteria: 1) studies focusing on private sector; 2) studies without considering how public sector implemented RFID technology; 3) studies that did not discuss any social scientific implications; and 4) studies that only deal with RFID technology from pure scientific and engineering points of view. In sum, we included only 324 papers that discussed RFID issues and their implications in public sector. Third, we removed further 213 studies Fig. 1 Analytical Frame too much focusing on private sector or RFID technology itself, rather on its applications in our society and social scientific implications. Finally, 111 articles were chosen for our systematic review. [ Figure 2 ] below showed descriptive statistics of collected literatures by published year. It shows 22 studies were published in 2007 among 111 literatures. As we already described above in history of RFID section, the popularization and commercialization of RFID technology was started in 2005 with Wal-Mart's adoption. It seems that after Wal-Mart's innovative footsteps hit the world, many scholars were started to recognize the potential of new technology and tried to understand and develop RFID technology. Besides some governments from all over the world implemented new way of public service delivery using RFID technology. Consequently, 49 literatures were publishedbetween 2006 and 2008 and it forms almost 45 % of our collected studies For this study, we categorized governments' way of using RFID technology in 6 areas; Agriculture and Livestock, Defense and Security, Environmental Applications, Healthcare and Welfare, Identification, and Transportation. [ Figure 3 ] shows descriptive statistics of collected literatures categorized by applications. We categorized studies that did not focus on specific sector and analyze and introduce RFID technology from the general perspectives as 'RFID general'. 'RFID general' studies usually deal with various ways of using RFID technology in diverse sectors simultaneously. As we can see from [Fig. 3] , RFID general area had 42 papers. That means still lots of RFID studies could not be fully specialized and remained in status of generally introducing RFID technology. Identification sector scores secondly highest number of published literatures among areas. This result seems natural because e-ID card or e-Passport have most powerful force that can hurt privacy, one of the most serious and notorious issues that RFID technology face today Key applied areas of RFID As we show in [Table 1 ], the history of RFID technology was started from the need for ensuring national security. Almost 60 years have passed since US army developed RFID based identification system to identify allies and enemies, RFID technology is still used for protecting people. For instance, Weinstein (2005) and Konsysnki & Smith (2003) reported how the US Army and Navy implement RFID technology in cargo containers to identify materials. The US Army and Navy implement RFID not only to identify US troops' own weapons and containers but also to identify enemies in battle (Tien 2004) 6 . RFID systems are also important in terms of airport and port security. After the 9/11 terror attack on the United States, President George W. Bush let all the airport and port in US adopt identification systems based on RFID technology to protect its nation from additional terrorist attacks (Werb and Sereiko 2002) 7 . In 2012, the Taiwanese government decided to implement an RFID based e-Seal system to increase security and efficiency (Tsai and Huang 2012) . In addition, RFID technology can be used effectively in prison management 8 and child protection. In some countries like Japan and Republic of Korea, the RFID tag is implemented in child protection monitoring (Table 2 ). 9 Electronic passports like 'e-passports' were adopted electrically after the 9/11 attack. After the terrible tragedy broke heart of United States, the American government became aware of the importance of checking VISAs and passports correctly. The US Department of State soon let people who wanted to enter US to use RFID tag embedded electronic passports instead of traditional barcode based passports 10 . The European Union also endorsed the inclusion of biological information in e-passports. The EU Justice and Home Affairs Council decided to include fingerprints as a second mandatory identifier on passports in 2004. 11 In addition, RFID can be used in e-ID cards in various countries. For example, in the United Kingdom, Prime Minister Tony Blair and his Labor Party convinced the nation to adopt biometrically-enhanced national identification cards (Ezovski and Watkins 2007) . Tony Blair's administration announced its will to implement RFID tag embedded national identification card in late 2004. China is another case where the e-ID card is used today. As a matter of fact, China is the country where e-ID card is widely and largely adopted today. The Beijing Olympics held in 2008 lit the fuse of adoption. The largest smart card project was implemented as a part of preparing the most prominent international sports event. In (Table 3) . RFID technology can be widely applied in environmental applications. Adopting an RFID system in waste management is the most prominent way of using RFID to ensure efficient, eco-friendly waste management among lots of countries in the world. PAYT (Pay-As-You-Throw) program done by European Union (EU) is the pioneer of this field. PAYT is an RFID based waste pricing model that allows each individuals or each household to pay for the tag along with the total amount of waste they throw. Since each household and individual has a waste box in which RFID tags are embedded, the exact volume of waste can be calculated. In Europe this incentive based system has been proven to be a powerful policy tool for reducing the total amount of waste and for encouraging recycling (Schindler et al. 2012) . Similar systems are broadly implemented in US (Ransford et al. 2012) . In South Korea, the ministry of environment introduced it to industry and urged them to use an RFID based waste management system, especially in medical waste management. RFID technology is implemented in waste management in developed and developing countries, but the purpose of adoption is somewhat different from Europe to the US. India, the second-most populated country in the world, has adopted RFID technology to cope with the rapid increase of volume and types of waste (Infotech 2013) . Similarly in 2010, what China faced were the World Expo and huge amounts of construction waste that comprised 30 % to 40 % of the total urban waste. Shanghai was chosen for a pilot project using an RFID based waste management system. All the waste dumping trucks had an embed RFID tag and volume of waste they carry was checked by the local government (Ruan and Hu 2011) . Another interesting case of environmental application emerges from South Korea. The South Korean government operates U-Street Trees Systems through which the exact location and status of street trees can be monitored. Information about location and status of street trees are collected by an RFID tag that is attached to each tree is saved in a web information system, so trees can be managed effectively. Kim et al. (2006) claim that this web based information system could manage information remotely with an interactive system (Table 4) . Public transportation is another popular sector for RFID technology applications. RFID based electronic toll collection technology is one of the oldest and widespread RFID implementation (Ulatowski 2007) . As soon as an RFID tag embedded car arrives at a toll booth, the RFID reader scans and reads the information that the RFID tag contains. The driver will pay debits according to the price that electronic reader suggests. In the US, electronic toll collection is thought as efficient and effective method that eliminates long lines of traffic at toll booth (Ulatowski 2007) . RFID based toll collection is also adopted in criminal cases because it enables prosecutors to identify the exact location (Smith 2006) . In South Korea, the Korean government has set credit card-linked electronic toll collection system called 'Hypass' especially for collecting transportation tolls on express ways. If an RFID tag is embedded on their cars, drivers can pass the tollbooth without stopping the car because RFID reader scan the data immediately and handle the whole payment process in about 5 s (Kim 2008) . Hong Kong launched similar public transportation toll collection system in 1997 and the 'Octopus Card' is now internationally famous for its convenience. This system is able to handle 10 million transactions per day and includes all modes of public transport (Kovavisaruch and Suntharasaj 2007) . South Korea has set credit card-linked electronic toll collection system called 'Hypass' especially for collecting transportation tolls on express ways. RFID technology is also implemented in railroad toll collection in India, where railroads are the most widely used form of public transportation. If an RFID tag is embedded on their cars, drivers can pass the tollbooth without stopping the car because RFID reader scan the data immediately and handle the whole payment process in about 5 s (Kim, 2008) . In addition, RFID has been used as a critical technology to promote efficiency and transparency for public transportation system in developing countries. For instance, the Mexican government runs "Creating Traffic Knowledge in Mexico: Applying RFID to prevent vandalism" and one of the purposes of this innovative project is to develop a transportation information system to acquire more subtle data necessary for government decision making (Prado et al. 2010 ). Analogous to Mexican case, in Bangladesh where BRTA (Bangladesh Road Transport Authority) was started in 2003, the technology is operated mainly for control and supervision of the road transport systems ). RFID technology is also implemented in railroad toll collection in India, where railroads are the most widely used form of public transportation (Table 5) . RFID enables hospitals to manage their equipment more easily and save expenses in public health areas 12 . The US government agencies like FDA have also already used RFID tag in monitoring drug industry 13 . Since American hospitals handle almost 4,000 (Table 6) . RFID technology can be an effective tool for securing food safety and managing agriculture and livestock. Another major advantage to this system is that animal disease tracking can be realized through innovative technology like RFID (Hossain and Quaddus 2009) . With the government support, researchers have developed the Navigation System for Appropriate Pesticide Use as a basic system for risk management in agriculture (Nanseki et al. 2005) . RFID technology in agriculture was first introduced by the European Union (EU) in the late 1990s and shortly thereafter many countries, such as Australia, Japan and South Korea, adopted the innovation. Among those countries, the Australian government was the most passionate in implementing RFID 16 . For instance, all the livestock in Australia have RFID embedded tags on their bodies immediately after they are born; information that enables farmers to identify each entity and its health status is registered in National Livestock Identification System (NLIS). RFID technology in Japan has been also adopted in agriculture especially to secure food safety and agricultural risk management that can occur by abusing pesticides (Nanseki et al. 2005 , Sugahara 2009 ). The Japanese government planned to make a food traceability system by 2010 as a part of the "e-Japan" plan . The United States is another case that applies mandatory RFID based identification system in managing livestock. According to RFID Gazette (2006), the USDA is pushing for RFID tagging of cattle to make tracing of disease patterns easier. With the formation of National Institute for Animal Agriculture (NIAA) in 2002, the plan for setting the National Animal Identification System was started. What the US Taiwan government fulfilled through this program was "to be able to identify all animals and premises that have had contact with a foreign or domestic animal disease of concern within 48 h" (Wyld, 2005) because "the sooner animal health officials can identify infected and exposed animals and premises, the sooner they can contain the disease and stop its spread (USDA-APHIS 2005)" (Table 7) . Public policy issues from RFID diffusion RFID applications and diffusion generate complex policy and governance problems. We address public policy issues such as technological gap and uncertainty of expecting potential benefits and costs from a rapid and massive RFID diffusion. Uneasy governing issues in transparency, digital identification and power distribution are arising from inappropriate RFID applications. We discuss governance issues such as corruption, privacy problem, and digital monopoly and literacy in the following. Technology is not still enough to satisfy all the elements that RFID is trying to perform various operational mechanisms. RFID technology deficiencies inevitably occur with the application of technology because there is niche space still left. For instance, RFID technology does not have a unified frequency standard yet. Since there are no internationally agreed upon frequencies for RFID operations, permitted scanner/reader powers also differ between countries. There are still significant differences between the frequencies from the EU and the USA ). In addition, Reichenhach (2008) pointed out the lack of storage capacity. In the EU, where RFID based waste management is common, there are technological barriers like a shortage of storage capacity 17 . Ema and Fujigaki (2011) draw implications from a child monitoring case done in Japan that being informed of children's exact location cannot guarantee their actual safety, but RFID tags often lead to that cherished illusion. Vining (2005) warned about another possibility of niche space. According to his study about port security in the US, stealing goods without damaging RFID tag is possible because at ports, the container can be drilled into and contents can be removed. The RFID tag does not have to endure any damage through this whole process. In the US, as a response to continued pressure from various stakeholders, the US government even adopted the 'Faraday cage' for privacy protection 18 (Table 8) . 19 . In reality, the RFID tag is much more expensive than a barcode, which was very popular in identifying materials before the rise of RFID technology (Becker 2004) . Purchasing RFID devices, hardware, and tags is not sufficient to drive system relevantly. To guarantee a better quality of service, the RFID system needs more additional things such as "circular process mechanism, the richness of consultant, project manager, programmers and plentiful project labors" . These elements for a better RFID performance may involve considerable costs. Kuo and Chen (2008) reported that RFID technology consumers and government should pay the extra hidden cost in the healthcare industry (Table 9) . RFID technology is expected to increase transparency and monitor corruption. However, RFID technology cannot ensure a high level of transparency than expected. As a matter of fact, RFID tags can be cloned and manipulated quite easily, and this kind of tag corruption can occur at every stage of RFID implementation. There are various examples to show an inappropriate use of RFID technology. For instance, Armknecht et al. (2010a, b) warned the possibility of tag corruption. Lee et al. (2012) pointed out reader corruption of the RFID technology. An existing security model mainly focuses on the possibility of tag corruption, but reader corruption can hurt consumers' privacy as seriously as tag corruption can. Jules (2006) reported one of the tag corruption cases that observed in United States. One of the staff members who worked in a Dupyu store, an unscrupulous retailer, attached a cloned tag to counterfeit drugs. Avoine et al. (2010) argued that internet based databases can also be directly attacked and emphasized the possibility of reader corruption. There are also unethical behaviors to avoid RFID monitoring process. In the EU where an RFID based waste management system is aggressively implemented, some people disposed waste that came from their house at work places in order to avoid exact calculation through the RFID system. Not only this, Bilitewski (2008) reported that some conscienceless people are burning or transferring (Table 10) . One of the most serious issues that RFID technology faces today is whether RFID technology is secure enough to protect privacy. Privacy is the most important concern RFID users have to deal with (Perakslis and Wolk 2005) . RFID tag embedded chips often contain important personal information and usually this kind of private information can hurt one's privacy seriously if leaked. To prevent leakage of private information, engineers developed cryptography, but there remains criticism 20 . The reason why these sorts of privacy concerns arise is because of the lack of security protection capacity of modern RFID technology. As we discussed above in the technological issues section, RFID technology today is not developed to secure perfect privacy. The technology itself has lots of deficiencies and people are smart enough to find niche spaces that can destroy the RFID security process. RFID itself can involve not only various hidden costs 21 but also induces a serious privacy problem 22 . However, despite these possibilities of attacks on privacy, there are lots of stakeholders and scholars who advocate the potential benefits of RFID. They claim that tracking and profiling consumers is solely for implementing RFID chips more effectively. Eaward Rerisi, one of the producers of early implementation of RFID technology argued that, "An RFID reader can read the number on a tag, but without knowing what the number means, there is no way to access personal information. The idea that the tags can be read by just anybody-that's pretty impossible" (Murray 2003) (Table 11) . Unequal distribution of RFID technology can generate unequal distribution of various resources such as information and digital literacy. Especially in developing countries, Active tag, which is more safe for securing privacy than passive tag is more expensive than passive tag the combination of unbalanced power distribution between stakeholders and a low level of digital literacy can cause serious problems. Ketprom et al. (2007) emphasized that in developing countries like Thailand 23 , governments should provide education and training on how to use brand new technology to poor farmers whose digital literacy remains relatively low. But poor farmers in Thailand are not the only stakeholders who are suffering from a lack of digital literacy. In Bangladesh, where RFID toll collection is common, traffic policies have no interest in using RFID technology for managing public transportation systems. Rather, they prefer traditional ways of toll collecting to information based technology . Prasanth et al. (2009) found that the lack of digital literacy among the Indian people hampered an effective process of railroad toll collection in India. Another problem developing countries face is an unbalanced power distribution due to lack of democratic value embedded governance. Chen et al. (2008) criticized the Taiwanese government because it monopolizes most of the information collected by RFID technology. As we already discussed above, when RFID tag scanned, information saved in RFID tag is scanned by reader and then transmitted to an internet based database. If that data were available to the public, individuals and industry could make more reasonable decisions by analyzing them. We find another unbalanced power distribution case in China's waste management system. According to Ruan and Hu (2011) , the Chinese government benefits most from the RFID system 24 (Table 12) . We found, relying on a systematic review from 111 RFID studies, six key areas of RFID applications. Specifically in the defense and security section, we addressed how military and airports/ports manage RFID systems to ensure security. We also found that RFID is effectively implemented in prison management and child protection programs. Numerous governments have introduced RFID identification tools such as e-passport and e-ID. RFID systems for waste management and street tree management are widely used from rich to poor countries. In healthcare and welfare delivery, RFID based smart cards have turned out to be very efficient. RFID is now being used to monitor counterfeit drugs. RFID has been applied to delivering service for the impaired and to trace infection. However, despite potential benefits from RFID applications, various unexpected problems arise. RFID can still involve technological deficiencies, especially in securing cryptography techniques, international standards of frequency, and storage capacity. RFID technology is not still enough to be efficient and effective in some areas (Becker 2004 , Jensen et al. 2007 ). Tag and reader corruption can hurt transparency and security. Privacy issues are still the most serious issues that RFID faces today (Naumann and Hogben 2008) . RFID itself can generate new unequal digital literacy and power distribution, especially in developing countries such as Thailand and Bangladesh. Even the most latest innovative technologies, like RFID, do not have perfect answers to securing efficiency, effectiveness, convenience, and transparency. Rather, RFID technology itself creates unexpected problems. It should be noted that democratic governance and trust is still important to technological innovation and policy issues arising from a rapid RFID diffusion. Our systematic review is incomplete to discuss all of the RFID issues from technology, market and management, e-government, and legal aspects. Further research on RFID diffusion and impact include not only various theoretical issues of but also legal and managerial problems. For instance, both qualitative and quantitative research is required to explore what factors are critical to adopt and implement new RFID technology in terms of governance and digital literacy. Both micro and macro approaches with massive data are also required to identify how RFID improve not only organizational performance in government agencies and various industry sectors but also quality of our life. Endnotes 1 For example, after serious attack by Osama Bin Laden on 9/11, the American government decided to implement an RFID tag embedded e-passport and VISA waiver program. The US government asked their member countries to implement e-passport by It is essential to understanding how a rapid diffusion and massive applications of RFID generate conflict or harmony among human behaviors, digital literacy, institutional rules, and technology. 4 US Army and its allies could not only manage weapons and soldiers but also identify who was the enemy or not (Castro and Wamba, 2007) . This whole project of developing an RFID based identifying system was known as IFF (Identify Friend of Foe The New York City government also started an RFID e-seal pilot project in the New Jersey Port. Once RFID read and scan the tag, it can identify the contents of the container box. Also, the port of Tacoma and Seattle planned to adopt E-Seals, made of metal bolts with embedded RFID devices to ensure its security (Konsynski and Smith 2003) . 8 Calpatria prison, located in Los Angeles, adopted a prisoner monitoring system using RFID chips in 2000 as the very first pilot using RFID in prison management in United States (Kim 2008) . According to regulations of Calpatria prison, all the prison inmates were issued bracelets in which RFID chips were embedded. Since the pilot project at the Calpatria prison was successful, the local government let other prisons in Los Angeles adopt the innovative bracelet. The LA County prison started to use a brand new bracelet in response to the state government's order; it is reported that through its adoption the prison could increase efficiency and effectiveness and decrease crimes occurred between inmates simultaneously (Nicholas 2008). 9 For instance, city governments in the Gifu and Osaka prefecture provided RFID tags that can be attached in students' schoolbags to public elementary schools (Ema and Fujigaki, 2011) . Similarly, in Haewoondae beach, one of the most famous vacation spots in South Korea, Busan Metropolitan City provides for parents RFID embedded bracelet that enables tracking exact location of their child by a smart phone (http://news.naver.com/ main/read.nhn?mode=LSD&mid=sec&sid1=102&oid=001&aid=0003353674). 10 This project began in 2002, but it took 3 years to fully implement for all 16 US passports (Meingast et al. 2007) . The appearance of the e-passport is very similar to old passports, but woven into the paper of the passport, there is RFID tag that information about owner of the passport is included. Information about nationality, sex, age, and so on is scanned, as airport staff members scan the passport through RFID reader (Lorenc 2007 (Kuo et al. 2004 ) with strong government support. 15 One peculiar characteristic of this system as compared to other systems is that visually impaired people are both the reader carrier and the service beneficiaries, simultaneously. Generally in government service delivery using RFID technology, the service provider usually carries RFID tag readers and service beneficiaries usually act more passive roles by attaching RFID tags. But in this Pakistani case, the service beneficiaries can identify objects around them by operating RFID tag reader they have. 16 The Australian government passed legislation on mandatory use of RFID tags in the livestock industry, so Hossain and Quaddus (2014) categorized Australian case as a very rare and special adoption case. According to Trevarthen and Michael (2007) 's case study, one of the Australian farms where the RFID tag is implemented, farmers not only track the exact location of the cows but also check the condition, identify cows and even feed the new born cows automatically by using an RFID system. 17 Usually people throw waste in various places. They may throw it away at their houses or at work places, like an office. Since the RFID tag is only attached to a garbage can in house, it is impossible to track all types of waste throwing behaviors. Inevitably, this shortage of storage capacity leads to selective waste collection monitoring. 18 The faraday cage is an object in metal; proponents of this device argue that faraday cage can prevent hacker's attack because electronic devices are prevented from passing through the object (Ezovski et al. 2007) . But speculation about stability of this technology still remains. Lorenc (2007) reported that if there is no additional technology, the faraday cage cannot preserve sensitive security. 19 As a matter of fact, there are two kinds of RFID tags, the passive tag and the active tag. These two tags provide owners with different benefits and liabilities. Active tags are implemented by a power source, such as small battery. Active tags are more efficient and safe in protecting privacy than passive tags, so sensitive organizations like military prefer active tags to passive tags. But ordinary consumers have less accessibility to active tags because active tags are much more expensive than passive ones (Jensen et al. 2007 ). 20 According to Laurie (2007) Hwang et al. (2009) , technological deficiency enables hackers to engage in cloning, eavesdropping, replay attack, denial of service, forward security, tag tracing, individual data privacy, and data forging. Specifically, the hacker can read the tag and then clone the tag (cloning), surreptitiously listen to all the communications between and the tag (eavesdropping), repeat or delay the message (replay attack), send large amount of message to break down RFID system (denial of service), compromise a tag (forward security), trace the exact location of the tag (tag tracing), find out shopping trend of the consumer (individual data privacy), and modify information saved on an RFID tag (Data forging). In addition, Numann and Hogben (2008) categorized the privacy attacking cases more briefly. According to their research, the hacker can attack RFID tag in some ways. First, the attacker can open a connection to the chip and can steal the data inside (skimming). Second, the attacker can intercept the communication between tag and reader (eavesdropping). Last, the attacker can track the exact location of the tag or the person. 23 In Thailand, most of the farms are trying to adopt an RFID system in farm management, but RFID technology is widening the gap between poor and rich farmers. Poor farmers are usually less educated people who have hardly had any experience using digital technology like RFID. On the other hand, well-educated wealthy farmers face low entry barriers and easily adopt the technology. Rich farmers armed with innovative technology not only make enormous fortunes by increasing efficiency but also by replacing poor labors with RFID embedded devices. According to the Thailand Ministry of Labor (2006), most farm labors are afraid of being replaced. Unfortunately, this phenomenon eventually correlates to a serious gap between rich and poor. as readers, tags, hardware, and so on, but in the long run cost of management will decrease. On the other hand, the waste industry could carry a very heavy debt. The waste contractors have to deal with expensive RFID tag rental and as well as the cost of construction simultaneously. Although this situation is totally unfavorable for them, the waste management industry cannot resist to this policy because the Chinese government is the entity which has made the use of RFID policy and set prices. The industry has no other choice but consent. Anonymous authentication for RFID systems On RFID privacy with mutual authentication and tag corruption Time measurement threatens privacy-friendly RFID authentication protocols RFID and corporate responsibility: hidden costs in RFID implementation A new game of leapfrog? RFID is rapidly changing the product-tracking process. Some say the technologyonce costs drop-could displace bar-coding From traditional to modern fee systems An inside look at RFID technology Using RFID technology in food produce traceability RFID-based hospital real-time patient management system How far can child surveillance go?: Assessing the parental perceptions of an RFID child monitoring system in Japan The electronic passport and the future of government-issued RFID-based identification Exploring the Perceived Measures of Privacy: RFID in Public Applications An adoption-diffusion model for RFID applications in Bangladesh Designing and implementing RFID technology for vehicle tracking in Bangladesh Developing and validating a hierarchical model of external responsiveness: A study on RFID technology Privacy and security requirements for RFID applications The impact of government trust perception on privacy risk perceptions and consumer acceptance of residual RFID technologies Mitigating consumer perceptions of privacy and security risks with the use of residual RFID technologies through governmental trust RFID security and privacy: A research survey. Selected Areas RFID based Waste Management System Closing digital gap on RFID usage for better farm management A divide-and-conquer technique for throughput enhancement of RFID anti-collision protocol A management system of street trees by using RFID. In: Web and Wireless Geographical Information Systems Developments in practice x: Radio frequency identification (rfid)-an internet for physical objects Converging technology in society: opportunity for radio frequency identification (RFID) in Thailand's transportation system The critical issues about deploying RFID in healthcare industry by service perspective The Development of RFID in Healthcare in Taiwan. Bejing: ICEB Practical attacks against RFID A state-aware RFID privacy model with reader corruption Radio frequency identification technology: applications, technical challenges and strategies Mark of the Beast: US Government Use of RFID in Government-Issued Documents Embedded RFID and everyday things: A case study of the security and privacy risks of the US e-passport RFAIDE-An RFID based navigation and object recognition assistant for visually impaired people Privacy concerns mount over retail use of RFID technology A navigation system for appropriate pesticide use: design and implementation Privacy features of European eID card specifications Social acceptance of RFID as a biometric security method Creating Traffic Knowledge System in Mexico: Applying RFID to Prevent the Vandalism. The 15th International Business Information Management Association Conference Ticketing Solutions for Indian Railways Using RFID Technology Mementos: system support for long-running computation on RFID-scale devices Status and prospects of pay-as-you-throw in Europe-A review of pilot research and implementation studies Gaining Deeper Insights into RFID Adoption in Hospital Pharmacies Application of an RFID-based system for construction waste transport: a case in Shanghai RFID hybrid tech: Combining GPS for location tracking SMART TRASH -study on RFID tags and the recycling industry, technical report. TR-1283-EC You Can Run, But You Can't Hide: Protecting Privacy from Radio Frequency Identification Technology Traceability system for agricultural productsbased on RFID and mobile technology RFID tags should track inventory, not people The Father of RFID Beyond mere compliance of RFID regulations by the farming community: a case study of the Cochrane dairy farm Cost-Benefit Analysis of Implementing RFID System in Port of Kaohsiung Recent developments in RFID technology: weighing utility against potential privacy concerns National Animal Identification System: Animal Identification Number(AIN) RFID Alone Can't Resolve Cargo Container Security Issues RFID: a technical overview and its application to the enterprise. IT professional More than just tracking Radio frequency identification applications in hospital environments Delta airlines Tags Baggage with RFID. Re:ID Magazine The right frequency for government. Washington DC: IBM Center for the Business of Government. IBM Center Zhang R. A transportation security system applying RFID and GPS The authors declare that they have no competing interests.Authors' contributions KJ and SL carried out a systematic literature review not only from not only technological point of view but also from social scientific point of view. Both authors read and approved the final manuscript.