Results: RFID and Identity Management in everyday life - ITAS
Results: RFID and Identity Management in everyday life - ITAS
Results: RFID and Identity Management in everyday life - ITAS
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
when they collect their tag. Accord<strong>in</strong>g to Mr. Bessel<strong>in</strong>g this is not necessary , because ‘the tag is<br />
only used as an access method <strong>and</strong> noth<strong>in</strong>g else’. Also, nobody ever asked about the purposes<br />
of the system <strong>and</strong> the <strong>in</strong>formation that is collected [53].<br />
ID issue The system offers several possibilities to track employees more thorough than is be<strong>in</strong>g done at<br />
this moment. However, management is not us<strong>in</strong>g these possibilities.<br />
There has been no concern among employees work<strong>in</strong>g <strong>in</strong> the office build<strong>in</strong>g. This could be<br />
because they are very poorly <strong>in</strong>formed about the system, but another reason could be because<br />
the application is accepted as it is right now.<br />
Sources 52. Personal observations<br />
53. Interview with Mr. Cees Bessel<strong>in</strong>g, Information <strong>and</strong> system management, system<br />
adm<strong>in</strong>istrator of the NWO office build<strong>in</strong>g, on 18 July 2006.<br />
54. ‘Proxkey II’ (http://www.hidcorp.com/pdfs/products/proxkey2.pdf, visited 11 september 2006)<br />
55. http://www.ipgroep.nl (visited 11 september 2006)<br />
56. http://www.hidcorp.com (visited 11 september 2006)<br />
79