This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Certification

ATTENDEE MANAGEMENT USING RFIDs

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

ATTENDEE MANAGEMENT USING RFIDs

Introduction

One of the busiest industries in all economy is the entertainment industry. The industry is also one of the best paying when compared to other economic industries. This explains the reasons as to why there are so many investors in the industry. As it is put, a large number of investor justifies the existence of stiff competition in the industry. The competition demands that any business entity which does not employ smart strategies will be dropped out of the market. As it appears, technology is one of the best strategies that can help an entertainment or service industry to remain in business.When we talk about the entertainment industry, the assertion is that the attendance of a large number of people. IN that context, the ultimate need to have efficient plans to manage the mob is inevitable. More so, efficient management attendee is a good technique to make that to want to return to the premise for subsequent entertainment programs organized by a particular company.

In most cases, most of the entertainment programs in the service delivery industry are in the form of music concerts. In line with the beauty and love for music, then it is adequate to assert that music concerts have the most number of the attendee. In that case, there is an overwhelming need to have an effective and efficient plan to manage the attendee at the music concert.

Analysis

This paper is a discussion of the management of adult attendee in a music festival with the help of Radio Frequency Identification (RFID) that is linked to social network sites such as Twitter and Facebook. There are several types of personal data that the Radio Frequency Identification collects. The data include (Nguyen & Chew, 2017)

  • The spending patterns of an attendee
  • The movement of an attendee in the facility
  • The time spent at every position in the facility
  • The attendee’s identification information
  • Credit card information for the attendee

Several compliance policies govern RFID technology. The compliance policies are listed below

  • Certification for all the equipment that make up the RFID systems
  • RFID regulatory Classification
  • Restriction of defined frequencies
  • FCC regulations.

    Don't use plagiarised sources.Get your custom essay just from $11/page

However, some security and privacy concerns arise at the mention or proposal of the technology to a company. (Nguyen & Chew, 2017)

  • One of the security issues is that the Radio Frequency Identification collects sensitive data about the customers and organization. The major concern about the collected data is that it is processed at the cloud levels by a third party company. This could be a source of vulnerability is the third part does not function at the conditions of utmost good faith.
  • The other concern is that Radio Frequency Identification technology can track customers’ behaviour and movement. The threat concern here is that it deprives the customers’ right to privacy. Some customers do not like their spending pattern being monitored without their consent.
  • The other security threat is that RFID bands have access to the company’s financial information which could pose a great threat to the company if it lands on the hands of unintended individuals.
  • The technology has the problem that the chip embedded in the RFID could be hacked. IN such a scenario, the entire company and customers are compromised in the sense that the hacker gets access to the confidential data about the company, and even credit card information for the customers
  • The last issue is on the ability of the RFID to leak data on personal property with the consent of the owner.

Several laws influence the use of RFIDs. Below is an outline of some of the laws

  • The FCC Regulations that limit the distance for which the RFIDs can be monitored. These regulations have the authority to shutdown any non-compliant RFID.
  • The United States government has defined the preferred frequency bands for the RFIDs. In this context, there are also some restricted frequencies.
  • The law requires that all RFID equipment be certified before getting to the market.

 

Despite the security and privacy threats, the Radio Frequency Identification is associated with several strengths that advocate for its adoption. One of the benefits of the system is that it has high capabilities of data collection and processing(Nguyen & Chew, 2017). Such data could be of great significance to the marketing and media department because the data contains spending patterns, behaviour and interests for the market sample. There is another advantage that proves the necessity for Radio Frequency Identification. With an additional fee, the Radio Frequency Identification could be customized to have the company’s brand and logo. It could automate the tracking of attendee, they facilitate cashless mode of payment and also link the kid’s wrist bands to those of their parents’ and also their credit cards with customization of how the parents prefer children to spend.

The other benefit of using the Radio Frequency Identification technology is that it enhances the speed and efficiency of handling queues. The reason for this is that the Radio Frequency Identification does not require adjacent scanners for authentication to take place. The technology makes use of radio wave to connect to other peripheral devices that do not have to be in a close range (Ali  &Yusoff, 2018). More so, the Radio Frequency Identification has other advantages in that they can connect to the owner’s online social networking sites such as Facebook and Twitter. This exploits the fact that everyone willing to attend the concert must have a lot of friends with whom they would like to share their experiences at the concert. In that case, the Radio Frequency Identification technology allows the gadget to share pictures and videos directly to the owners’ social media accounts. The Radio Frequency Identification is linked to the owner’s social media account in advance.

Recommendations

The security and privacy aspects of the company and the attendee are of great concern. In that case, there is an urgency for the establishment of efficient and effective security measures. The measures are to guarantee the security and privacy of both the company and attendee.Due to the nature of the industry, the issue of security and privacy is quite broad(Ali  &Yusoff, 2018). There, the issue is going to be addressed from various perspectives. There should be security and privacy measures that focus on all the people that are going to be present in the company at any particular time. The people include employees and attendee. The other side of security and privacy will address the processes that are to be involved due to the adoption of RFIDs. There are also aspects of policies and technologies. This section seeks to provide a brief discussion onsecurity and privacy measures that address all the perspectives provided above(Ahson&Ilyas, 2017).

  • This measure seeks to address the people aspect of security and privacy measures.All the employees must undergo regular training sessions to ensure that they are aware of their role in enhancing security and privacy in the company. This involves motivating them to practice the moral and ethical values as prescribed by the human resource department of the company.
  • The company is recommended to practice regular system checkup and maintenance regularly. Where necessary or applicable, the company should have system updates to ensure that the system runs with modern technology. This reduces the risks of cyber-attacks, among other types of threats.
  • The company should define effective policies that define the nature of user levels when it comes to which individual employee has the clearance to access different levels of the system. Such policies ensure that there is no unauthorized access to the system.
  • Technology is the other aspect that could greatly help to beef up security and privacy features. In the context of technology, the system could make use of a combination of different security and privacy software and equipment such as firewalls, antivirus and alarm systems.

According to the above discussion in the different sections of the paper, It is clear that Radio Frequency Identification technology has some vulnerabilities. However, the paper has discussed some of the measures and mechanisms that could be used to maintain the vulnerabilities that are associated with the RFID. The paper has also outlined the strengths of the RTF. With that considered, RFIDs could be of great help when adopted to manage the adult attendee in a musical concert. The technology comes with various benefits such as time-saving and advanced data processing capabilities.

References

Ahson, S. A., &Ilyas, M. (2017). RFID Handbook: applications, technology, security, and privacy. CRC press.

Ashton, K. (2018). That ‘internet of things’ thing. RFID J 22 (7): 97–114.

Ali, M. A., &Yusoff, N. A. (2018, October). Development Of Tele-Monitoring Attendance System Using RFID and Photo-Cell. In 2018 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS) (pp. 83-88). IEEE.

Nguyen, H. K., & Chew, M. T. (2017, February).RFID-based attendance management system.In 2017 2nd Workshop on Recent Trends in Telecommunications Research (RTTR) (pp. 1-6).IEEE.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask