{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:57:30Z","timestamp":1725505050241},"publisher-location":"Berlin, Heidelberg","reference-count":44,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540787303"},{"type":"electronic","value":"9783540787310"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78731-0_14","type":"book-chapter","created":{"date-parts":[[2008,3,14]],"date-time":"2008-03-14T10:18:18Z","timestamp":1205489898000},"page":"214-229","source":"Crossref","is-referenced-by-count":1,"title":["Why Marketing Short Range Devices as Active Radio Frequency Identifiers Might Backfire"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Ronzani","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","first-page":"385","volume":"61","author":"A.K. Asamoah","year":"2006","unstructured":"Asamoah, A.K.: Not as easy as it appear: Using radio frequency identification technology to fulfill the prescription drug marketing act\u2019s elusive pedigree requirement. Food and Drug Law Journal\u00a061, 385 (2006)","journal-title":"Food and Drug Law Journal"},{"key":"14_CR2","volume-title":"Short-range wireless communication","year":"2004","unstructured":"Bensky, A. (ed.): Short-range wireless communication, 2nd edn(ed.). Elsevier, Amsterdam (2004)","edition":"2"},{"key":"14_CR3","unstructured":"Brito, J.: Relax don\u2019t do it: Why RFID privacy concerns are exaggerated and legislation is premature. UCLA Journal of Law and Technology\u00a05 (2004)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Cardwell v. Lewis, 417 U.S. 583 (1974)","DOI":"10.1515\/9783110840308-027"},{"key":"14_CR5","first-page":"485","volume":"86","author":"R.S. Dalal","year":"2006","unstructured":"Dalal, R.S.: Chipping away at the constitution: The increasing use of RFID chips could lead to an erosion of privacy rights. Boston University Law Review\u00a086, 485 (2006)","journal-title":"Boston University Law Review"},{"key":"14_CR6","first-page":"543","volume":"1","author":"K. Delaney","year":"2005","unstructured":"Delaney, K.: RFID: Privacy year in review: America\u2019s privacy laws fall short with RFID regulation. A Journal of Law and Policy for the Information Society\u00a01, 543 (2005)","journal-title":"A Journal of Law and Policy for the Information Society"},{"key":"14_CR7","unstructured":"Eden, J.M.: When big brother privatizes: Commercial surveillance, the privacy act of 1974, and the future of RFID. Duke Law & Technology Review\u00a020 (2005)"},{"key":"14_CR8","first-page":"393","volume":"40","author":"D. Eleftheriou","year":"2006","unstructured":"Eleftheriou, D., Berliri, M., Coraggio, G.: Data protection and E-commerce in the United States and the European Union. International Lawyer\u00a040, 393 (2006)","journal-title":"International Lawyer"},{"key":"14_CR9","unstructured":"Eng, G.: Technology trends affecting the practice of law. Los Angeles Lawyer\u00a079, 28-APR (2005)"},{"key":"14_CR10","first-page":"301","volume":"45","author":"G. Eschet","year":"2005","unstructured":"Eschet, G.: FIPS and PETS for RFID: Protecting privacy in the web of radio. Jurimetrics Journal\u00a045, 301 (2005)","journal-title":"Jurimetrics Journal"},{"key":"14_CR11","volume-title":"RFID Handbuch (4. Auflage)","author":"K. Finkenzeller","year":"2006","unstructured":"Finkenzeller, K.: RFID Handbuch (4. Auflage). Hanser, M\u00fcnchen (2006)"},{"key":"14_CR12","volume-title":"RFID essentials","author":"B. Glover","year":"2006","unstructured":"Glover, B., Bhatt, H.: RFID essentials, 1st edn (ed.) O\u2019Reilly, Beijing (2006)","edition":"1"},{"key":"14_CR13","first-page":"199","volume":"32","author":"D. Handler","year":"2005","unstructured":"Handler, D.: The wild, wild west: A privacy showdown on the radio frequency identification (RFID) systems technological frontier. Western State University Law Review\u00a032, 199 (2005)","journal-title":"Western State University Law Review"},{"key":"14_CR14","first-page":"409","volume":"2","author":"W.A. Herbert","year":"2006","unstructured":"Herbert, W.A.: No direction home: Will the law keep pace with human tracking technology to protect individual privacy and stop geoslavery? A Journal of Law and Policy for the Information Society\u00a02, 409 (2006)","journal-title":"A Journal of Law and Policy for the Information Society"},{"key":"14_CR15","unstructured":"Katz v. United States, 389 U.S. 347 (1967)"},{"key":"14_CR16","volume-title":"Anwendung von RFID-systemen","author":"C. Kern","year":"2006","unstructured":"Kern, C.: Anwendung von RFID-systemen. Springer, Berlin (2006)"},{"key":"14_CR17","first-page":"325","volume":"6","author":"O. Kobelev","year":"2005","unstructured":"Kobelev, O.: Big brother on a tiny chip: Ushering in the age of global surveillance through the use of radio frequency identification technology and the need for legislative response. North Carolina Journal of Law & Technology\u00a06, 325 (2005)","journal-title":"North Carolina Journal of Law & Technology"},{"key":"14_CR18","first-page":"115","volume":"12","author":"B. Koops","year":"2005","unstructured":"Koops, B., Leenes, R.: \u2019Code\u2019 and the slow erosion of privacy. Michigan Telecommunications and Technology Law Review\u00a012, 115 (2005)","journal-title":"Michigan Telecommunications and Technology Law Review"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Kyllo v. Unites States, 533 U.S. 29 (2001)","DOI":"10.1016\/S0346-251X(01)00035-5"},{"key":"14_CR20","first-page":"409","volume":"4","author":"S. Landau","year":"2006","unstructured":"Landau, S.: Digital age communications law reform: National security on the line. Journal on Telecommunications & High Technology Law\u00a04, 409 (2006)","journal-title":"Journal on Telecommunications & High Technology Law"},{"key":"14_CR21","unstructured":"U.S. National Prohibition Act, ch. 85, 41 Stat. 305 (1919)"},{"key":"14_CR22","unstructured":"Olmstead v. United States, 277 U.S. 438 (1928)"},{"key":"14_CR23","first-page":"695","volume":"22","author":"S.L. Smith","year":"2006","unstructured":"Smith, S.L.: Symposium review: RFID and other embedded technologies: Who owns the data? Santa Clara Computer and High Technology Law Journal\u00a022, 695 (2006)","journal-title":"Santa Clara Computer and High Technology Law Journal"},{"key":"14_CR24","first-page":"213","volume":"11","author":"S.L. Smith","year":"2007","unstructured":"Smith, S.L.: Gone in a blink: The overlooked privacy problems caused by contactless payment systems. Marquette Intellectual Property Law Review\u00a011, 213 (2007)","journal-title":"Marquette Intellectual Property Law Review"},{"key":"14_CR25","first-page":"11","volume":"40-Fall","author":"S.C. Stark","year":"2004","unstructured":"Stark, S.C., Nagle, E.P.: Full speed ahead with DOD identification requirements: Next stop, radio frequency identification. Procurement Lawyer\u00a040-Fall, 11 (2004)","journal-title":"Procurement Lawyer"},{"key":"14_CR26","first-page":"3","volume":"2007","author":"S.G. Stein","year":"2007","unstructured":"Stein, S.G.: Where will consumers find privacy protection from RFID?: A case for federal legislation. Duke Law & Technology Review\u00a02007, 3 (2007)","journal-title":"Duke Law & Technology Review"},{"key":"14_CR27","first-page":"133","volume":"12","author":"N.P. Terry","year":"2005","unstructured":"Terry, N.P.: Assessing the technical, conceptual, and legal frameworks for patient safety information. Widener Law Review\u00a012, 133 (2005)","journal-title":"Widener Law Review"},{"key":"14_CR28","first-page":"6","volume":"12","author":"D. Thompson","year":"2005","unstructured":"Thompson, D., Kot, K., Brothers, J.: Radio frequency identification: Legal aspects. Richmond Journal of Law and Technology\u00a012, 6 (2005)","journal-title":"Richmond Journal of Law and Technology"},{"key":"14_CR29","unstructured":"U.S. Const. Amend. IV"},{"key":"14_CR30","unstructured":"United States v. Knotts, 460 U.S. 276 (1983)"},{"key":"14_CR31","first-page":"313","volume":"11","author":"K.M. Willingham","year":"2007","unstructured":"Willingham, K.M.: Scanning legislative efforts: Current RFID legislation suffers from misguided fears. North Carolina Banking Institute\u00a011, 313 (2007)","journal-title":"North Carolina Banking Institute"},{"key":"14_CR32","unstructured":"AAiD: (last visited December 9, 2007), http:\/\/www.autoaccessid.com\/Files\/File\/Cutsheets\/AA-T800.pdf"},{"key":"14_CR33","unstructured":"AeroScout: (last visited December 9, 2007), http:\/\/www.aeroscout.com\/data\/uploads\/AeroScout%20T3%20Tag%20Data%20Sheet.pdf"},{"key":"14_CR34","unstructured":"Axcess: (last visited December 9, 2007), http:\/\/www.axcessinc.com\/products\/docs\/containertag.pdf"},{"key":"14_CR35","unstructured":"Multispectral: (last visited December 9, 2007), http:\/\/www.multispectral.com\/pdf\/Sapphire_VISION.pdf"},{"key":"14_CR36","unstructured":"R.F Code: (last visited December 9, 2007), http:\/\/www.rfcode.com\/images\/media_kit_docs\/m100_tech_spec_sheet.pdf"},{"key":"14_CR37","unstructured":"RFID Inc.: (last visited December 9, 2007), http:\/\/www.rfidinc.com\/products1.html"},{"key":"14_CR38","unstructured":"RFind: (last visited December 9, 2007), http:\/\/www.rfind.com\/pdf\/RFind%20Tags%20Gateway%20_V1.5_%2005-01-07.pdf"},{"key":"14_CR39","unstructured":"Savi: (last visited December 9, 2007), http:\/\/www.savi.com\/products\/SaviTag_656.pdf"},{"key":"14_CR40","unstructured":"Synometrix: (last visited December 9, 2007), http:\/\/www.synometrix.com\/SYNOMETRIX_SMPTK-002_active_RFID_tag_specification.pdf"},{"key":"14_CR41","unstructured":"Ubisense: (last visited December 9, 2007), http:\/\/www.ubisense.net\/media\/pdf\/Ubisense%20Compact%20Tag%20EN%20V1.0.pdf"},{"key":"14_CR42","unstructured":"Wherenet: (last visited December 9, 2007), http:\/\/www.wherenet.com\/pdf\/products\/WhereTagIII.6.14.07.pdf"},{"key":"14_CR43","unstructured":"EPC global Inc., Glossary: (last visited December 9, 2007), http:\/\/www.epcglobalinc.org\/what\/cookbook\/chapter5\/039\u2013GlossaryV.6.0May2005FINAL.pdf"},{"key":"14_CR44","unstructured":"RFID Journal: (last visited December 9, 2007), http:\/\/www.rfidjournal.com\/article\/glossary\/3"}],"container-title":["Lecture Notes in Computer Science","The Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78731-0_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T19:48:17Z","timestamp":1708717697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78731-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540787303","9783540787310"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78731-0_14","relation":{},"subject":[]}}