ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

RFID Chip Implants and Ethical Issues

Verified

Added on  2023/01/06

|30
|5725
|24
AI Summary
This article explores the potential ethical issues related to RFID chip implants in humans. It discusses the use of implantable RFID chips, their impact on privacy and bodily integrity, and the concerns regarding health and safety. The article also examines the basic components of human-centric implantable RFID chips and the ethical considerations surrounding their use. The research questions focus on the potential uses of implantable RFID chips and the ethical implications of human-centric RFID chip implants.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
MSc Information Systems Management
IMAT5262 Research,
Ethics & Professionalism
in Computing
Assignment - Project Proposal
RFIDs chip implants and their
related ethical issues
Pxxxxxxxx
De Montfort University

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
Abstract
The recent technological advancement has seen the RFID tags implantations
expanding their role from industrial tagging applications to being embedded and
implantable in humans. With the vast possibilities of RFID technology and its future
human centric applications, potential ethical issues arise in various related areas,
which mostly includes human rights and data protection legislations. Many research
studies in the recent past have identified potential issues in the possible application
of implantable human centric RFID chips in various fields. Over the recent past as
the popularity of the technology started to grow specifically for the commercial
applications, potential concerns are being expressed regarding the health and safety
of human centric RFID chip implantations. The RFID chip is also familiar with the
name ‘RFID tag’, which stores important information about the person on whom it is
embedded or chipped. Four major areas were addressed in this regard such as
migration, carcinogenicity, the effects on the pharmaceutical effectiveness and the
interactions with the MRI signals.
Key Words
RFID tags, human centric RFID implantations, implantable RFID chips, chip
implants, embedded microchips
1
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
Contents
1. Background..........................................................................................................4
2. Research questions.............................................................................................4
3. Literature Review.................................................................................................4
3.1 The next big technology......................................................................................4
3.2 Ethical considerations for RFID chip implantations............................................5
3.3 Basic components of human centric implantable RFID chips............................6
4. Methodology Review...........................................................................................7
4.1 Interviews............................................................................................................7
4.2 Questionnaires....................................................................................................8
4.3 Surveys................................................................................................................8
4.4 Focus Groups......................................................................................................8
4.5 Case Studies.......................................................................................................9
4.6 Chosen Methodologies.....................................................................................10
4.6.1 Interview......................................................................................................10
4.6.2 Survey.........................................................................................................10
5. Conclusion..........................................................................................................11
6. Project Plan........................................................................................................11
7. Ethical Issues.....................................................................................................11
8. Consent Form.....................................................................................................11
9. Pilot interview questions...................................................................................11
10. Pilot survey questions and design...............................................................12
11. References......................................................................................................13
12. Appendices.....................................................................................................16
12.1 Appendix A......................................................................................................16
2
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
12.2 Appendix B........................................................................................................0
12.3 Appendix C........................................................................................................5
12.4 Appendix D........................................................................................................8
12.5 Appendix E........................................................................................................9
3

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
1. Background
The use of RFID (Radio Frequency Identification) is increasing and we are already in
the path of using implantable RFID chips in humans. According to Ito, Takahashi and
Saito (2016), the amount of benefits from these implantable RFID chips will be
numerous and undeniable. These implantable RFID chips are potentially durable
with an approximate size of a grain of rice. However, these chips are potentially
capable of holding adequate information about several aspects of a human being,
including his identity, health, physiological character, and nationality as well as
security clearances. These RFID chips are embedded in a person’s body, which in
turn enables them to do a lot of work (Sarwar et al. 2018). For instance, the proximity
of the hand of a person can potentially unlock his or her front door, start his or her
car or even inform their emergency physicians about certain specific health
conditions of the patient. These implanted chips oh human contains all the
information about the person on which it is embedded and are always with that
person.
However, there is a potentially darker side of this advanced technology of
implantable RFID chips. In this context, Heffernan, Vetere and Chang (2017) has
suggested that this particular technology is capable of violating the privacy and
bodily integrity of the human beings on whom the RFID chip is implanted. Voas and
Kshetri (2017) says there should be much concern and awareness about whether a
human being would want to implant a foreign object in his or her arm only to do a job
or let physicians know about their health conditions. To be more precise, Tabasum et
al. (2018) suggested that, with the implantation of RFID chips in employees,
employers are now able to track whenever they leave office.
2. Research questions
What are the potential use of implantable RFID chips?
What are the ethical implications of human centric RFID chip implants?
4
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
3. Literature Review
3.1 The next big technology
The amount of attention on the future scope and opportunities of human RFID chip
implants is rapidly growing along with the technological innovation of human centric
nanotechnology applications. Prior to 2004, FDA (Food and Drug Administration)
granted Applied Digital Solutions in the US where the injecting medical patients with
a microchip was permitted (Mayer et al., 2017). According to Jebali, Beldi and
Gharsallah (2016), there have been and will be potential scepticism associated with
growing acceptance of RFID microchip implantations under the skin of humans.
Latupeirissa et al. (2018) had predicted that this ability to collect medical data
through GPS would soon turn into a commercial reality. According to a study in the
past, a particular employer in the US had implanted RFID microchips onto its three
employers for access control purposes in the year of 2005. Similarly, Kiourti (2018)
had said that this might become a common practice in the workplace to planted
microchips onto the employees. According to Xiao et al. (2015), it became evident
and clear that employees are now asked to sport implantable RFID chips embedded
onto their bodies for ultimate security and access control applications.
According to Rodriguez (2015), the extent of RFID chip implantations in human
across different applications vary worldwide even if there are no systematic record.
Chips are not always implanted for work related applications. However, a recent
record found that a large number of staff in an US office were chipped in support for
an access control system of a specific department (Mayer et al. 2017). However,
there are potential ethical as well as legal issues regarding the use of RFID chips in
human bodies, most of which are derived from human rights and data protection
legislations.
3.2 Ethical considerations for RFID chip implantations
Significant ethical concerns are gradually stemming, which are mostly related to the
inviolability of the human body and the human dignity. Apart from that, Islam et al.
(2015) has suggested that potential ethical issues relate to the human safety and
health concerns. Lai, Chan and Singh (2016) has loudly questioned the efficacy of
the RFID implantable technology as a secure system along with the choice and
equity as well as the religious concerns (legal issues). Over the recent past as the
5
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
popularity of the technology started to grow specifically for the commercial
applications, potential concerns are being expressed regarding the health and safety
of human centric RFID chip implantations (Aslam, 2017). To be more precise, four
major areas were addressed in this regard such as migration, carcinogenicity, the
effects on the pharmaceutical effectiveness and the interactions with the MRI
signals. In addition to that, the past does not involve any potential systematic
research or scientific studies of the health impacts on the human wearers.
In this context, Mickle et al. (2018) has pointed out the concerns in regards to the
consequences of RFID technology on the pharmaceutical efficacy and effectiveness,
which in turn stems from the use of RFID tags as a component of security for the
purpose of labelling the pharmaceuticals containers. Moreover, Aslam et al. (2017)
says that the technology of RFID chip implantations is not entirely secure. Potential
security issues including cloning, eavesdropping, disabling, unauthorized tag
modifications etc. have been identified in this area (Werber, Baggiaband and
Znidarsic, 2018). However, since the initiation of this technology witnessed a couple
of schemes related to the increase of the security perimeters with some advanced
security components and infrastructure such as encryption, authentication etc. In
addition to that, RFID chip scanning involves a compound circulation within the
human blood stream where a significantly smaller proportion of the substance is
subjected to exposure for the scanning purpose.
3.3 Basic components of human centric implantable RFID chips
The typical form of passive or read only RFID are increasingly becoming familiar in
the workplace applications. According to Catherwood, Finlay and McLaughlin (2016),
these embedded chips can be used in a wide range or variety of applications starting
from medical and toxic waste management to passport control. The chip has three
major components or parts such as the integrated circuit, an RFID reader, and a
channel to acquire power from the RFID reader, an antenna to transmit and receive
the RFID signals. In order to enable these chips for human use, these chips in turn
are encapsulated inside a biocompatible material, which is most commonly a form of
glass. On the other hand, for commercial applications, non-implantable devices are
also used, which are encapsulated in polymers (Smith, 2015). This specific
encapsulating material is not suitable for human use or application/ implantation.
6

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
The RFID chip is also familiar with the name ‘RFID tag’, which stores important
information about the person on whom it is embedded or chipped. This chip is
responsible for sending the stored information back to the RFID reader at the time a
frequency (signal) is sent to the chip by the reader. These chips act as transponders
(both a responder and a transmitter) (Mihovska and Sarkar, 2018). The passive
RFID chips receive electrical energy from the electromagnetic waves that the reader
emits. On the contrary, the active RFID chips usually have their own battery with a
specified or limited life. These chips have their own antennas. Finally, a computer
(also known as a controller or a host) is responsible for controlling or managing the
RFID reader using software functions and operations (Patel, 2018). The controller is
subjected to processing the information as received from the network in order to
enable the operator to take the right decision.
4. Methodology Review
A research project may follow various different approaches in order to able to answer
the research questions in a successful manner. The research approaches can be
categorized into two individual types or techniques such as the qualitative and the
quantitative technique. For instance, these methodologies may include interviews,
surveys or questionnaires (Michael, 2016). These methodologies have their own
drawbacks and advantages. Hence, it is a crucial job for a researcher to select the
best suited research method and a research approach that is the most appropriate in
accordance with the nature of the study and the type of information that needs to be
collected.
4.1 Interviews
Interviewing is an example of qualitative data collection method that collects relevant
descriptive data from a comparatively smaller group of people. The collected
information usually covers broader range of areas and aspects related to a particular
topic. There are three basic types of interviews such as structured, semi structured
and unstructured interviews. The structured interviews are more similar and can be
compared to the questionnaire. According to Brannen (2017), this particular research
technique is the net of qualitative data collection in social research.
The primary benefit of interviews is that, it offers a thorough description along with an
in depth analysis of the subject or topic of concern. Moreover, it does not limit the
7
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
nature of the responses provided by the participants. Kumar (2019) says that
interviews are a great research method for gaining context and insight into the
research topic. On the contrary, one of the main drawbacks of this technique is it is
solely dependent on the skills of the interviewer or the researcher, which can
significantly influence the effectiveness of the interview method.
4.2 Questionnaires
Questionnaire is a form of quantitative research method that focuses on data
collection from a comparatively larger number of audience or a large group of
people. Questionnaire involves a prearranges set of questions (most commonly
multiple choice questions), which are arranged in a pre-specified sequence of order
(Taylor, Bogdan and DeVault, 2015). In the questionnaire method of data collection,
a set of questions is formulated based on the research topic or a given subject.
It is the most affordable way for gathering potentially useful quantitative data.
Moreover, it allows a large number of people to participate in the research, which in
turn makes it easier for the researcher analyse and interpret the data (Fletcher,
2017). However, the fundamental drawback of the questionnaire method is that, the
participants may not always be providing fully honest reply. Thus, it may lead to a
collection of data that is not entirely reliable in terms of conducting a successful and
impressive research study.
4.3 Surveys
Survey is a useful method of resultant data collection involving a sample of
participants or respondents. Survey allows the researcher to gather comprehensive
data from a large population of target audience based on a specific area of concern
or interest to conduct the research (Flick, 2015). Because this method of research
involves easy distribution of the survey form, surveys are widely popular and
acknowledged by researchers across the world. The distribution method of surveys
essentially include emails and internet.
One of the primary advantages of using survey as the main form of research method
is that it covers a comparatively wide variety of audience and as a result, the
research outcomes potentially represent an accurate demonstration of the outcomes
from an ample population (McCusker and Gunaydin, 2015). On the other hand, one
of the major disadvantage of using the survey technique for data collection is that it
8
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
will not yield in depth and detailed information related to all the major areas and
aspects associated with the research topic.
4.4 Focus Groups
Focus groups (also known as group interviews) are essentially a part of the
qualitative research methodology. According to Ledford and Gast (2018), focus
groups is the most suitable means for investigating the topic areas in and in depth
manner gaining detailed insights into the subject matter. Focus groups essentially
undertakes a potentially different approach to the interview method. However, focus
groups typically requires all the group members to gather, interact with each other
and participate in the group discussion, which is based on a specific topic (Walliman,
2017). The main purpose of focus groups is to seek open feelings and thoughts from
the group participants.
One of the main benefits of focus groups is that it involves interactive feedbacks as
opposed to the quantitative technique of surveys involving individual responses
(Quinlan et al. 2019). More precisely, it yields common views and opinions through
rigorous group discussions. On the other hand, a drawback of the focus group
approach is few of the participants in a group discussion may be unwilling to disclose
their personal views in front of the public/ other group members.
4.5 Case Studies
Case studies are beneficial for the nature of research studies that require
concentrating on a single thing or situation, for example, a department, an
organization, an information system, a system development project, a specific
industry, a discussion forum, a community and so on. It is a type of qualitative data
collection method utilized for examining the contemporary real life events/ incidents
or situations. As a result, the findings of the analysis of the particular case enables
the researcher to answer the research question and potentially solve the research
problem (Patten and Newhart, 2017). Case studies are mainly used for
understanding comparatively complex research issues through a deep insight into
the previous real life events or situations.
The most common advantage of case study method is that it can capable of handling
difficult and complex situations. Similarly, there is a significant disadvantage to this
method (Silverman, 2016). The collection of relevant data using the case study
9

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
method can take a long time and thus, it is complicated to implement in time
constrained research studies. In addition to that, another primary disadvantage of
case studies for data collection is it can sometimes be difficult to gain access to the
settings, organizational information, people and their relevant information and related
documents for data gathering purposes (Mackey and Gass, 2015).
4.6 Chosen Methodologies
4.6.1 Interview
Interview is chosen as a qualitative research method as it will effectively help in
answering the research questions and thereby, solving the research problem. The
basic reason behind the selection of this particular research approach is it can
effectively gather open ended answers, which is not possible in using the survey
method (Walliman, 2017). Furthermore, it also provides the participants with the
opportunity of expanding their responses or answers to the open ended questions
asked in detail.
The interview participants will be approached in their everyday work environment in
order to undertake a face to face conversation for the interview session. This
technique will allow the researcher in observing the reactions, personal views and
opinions of the participants while answering the open ended interview questions.
Moreover, interviews are also effective in terms of allowing the participants in asking
for further clarifications about the questions if they face difficulties in understanding
the question for the first time. Hence, 10 employees across three different
organizations (medical/ health care and professional business organization) will be
asked to participate in the interviews that are 30 minutes of duration.
4.6.2 Survey
For the quantitative analysis purpose, the survey method will be chosen in order to
ask the participants or respondent a specific set of prearranged questions to yield a
clear view on the overall research topic. Survey is chosen more importantly because
it will help the researcher in collecting relevant and useful information from a large
group of audience, which can then be interpreted using numerical formulas and
techniques with an aim to create a generalized conclusion (Taylor, Bogdan and
DeVault, 2015). Survey will be more suitable as a mode of quantitative research
method because it will thoroughly describe the characteristics of a large population.
10
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
Therefore, survey will be a quick and time saving approach to collect information via
online survey forms involving a selected population of samples. In this study, 100
employees from two different organizations (one health care organization and
another IT organization) will be asked to participate in the survey through email.
They will require filling up the survey form and submit it online. Then, the gathered
responses will be analysed using numerical mechanisms.
5. Conclusion
RFID chips are embedded in a person’s body, which in turn enables them to do a lot
of work. For instance, the proximity of the hand of a person can potentially unlock his
or her front door, start his or her car or even inform their emergency physicians
about certain specific health conditions of the patient. Significant ethical concerns
regarding the use of human centric implantable RFID tags/ chips are gradually
stemming and they are mostly related to the inviolability of the human body and the
human dignity. Most of the potential ethical issues highly relate to the legislative,
human safety and health concerns.
6. Project Plan
Please refer to Appendix A in the Appendices section to view the Gantt chart; here
you will see the research project is broken down in tasks with appropriate dates set
for the timescale and completion of each task.
7. Ethical Issues
Possible ethical issues can arise from a research project that involves humans as
participants; therefore an Ethical Review Form is provided Appendix B stating the
possible ethical issues related to this research project.
8. Consent Form
As data about participants will be gathered and used to answer the research
question. Therefore, each participant taking part will be provided a consent form
which need to sign in order to take part in the research activity. Please refer to
Appendix C in the Appendices section to view a copy of the consent form.
11
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
9. Pilot interview questions
An Interview will be one of the approaches to gather data in order to answer the
research question. Therefore, a pilot interview design with interview questions is
provided in Appendix D.
10. Pilot survey questions and design
A Survey will be another approach used to gather data in order to answer the
research question. Therefore, a pilot survey design with questions is provided in
Appendix E.
12

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
11. References
Aslam, B., 2017. RFID Tag Antennas for Medical Applications(Doctoral dissertation,
University of Engineering & Technology, Taxila, Pakistan).
Aslam, B., Khan, U.H., Azam, M.A., Amin, Y., Loo, J. and Tenhunen, H., 2017. A
compact implantable RFID tag antenna dedicated to wireless health
care. International Journal of RF and Microwave Computer
Aided
Engineering, 27(5), p.e21094.
Brannen, J., 2017. Mixing methods: Qualitative and quantitative research.
Routledge.
Catherwood, P.A., Finlay, D.D. and McLaughlin, J.A.D., 2016. Intelligent
subcutaneous body area networks: anticipating implantable devices. IEEE
Technology and Society Magazine, 35(3), pp.73-80.
Fletcher, A.J., 2017. Applying critical realism in qualitative research: methodology
meets method. International Journal of Social Research Methodology, 20(2), pp.181-
194.
Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a
research project. Sage.
Heffernan, K.J., Vetere, F. and Chang, S., 2017. Towards insertables: Devices inside
the human body. First Monday, 22(3).
Islam, M.S., Esselle, K.P., Sabrin, S., Morshed, K.M. and Matekovits, L., 2015,
November. A serpentine PIFA antenna for implantable RFID tag. In 2015
International Symposium on Antennas and Propagation (ISAP) (pp. 1-3). IEEE.
Ito, K., Takahashi, M. and Saito, K., 2016. Small antennas used in the vicinity of
human body. IEICE Transactions on Communications, 99(1), pp.9-18.
Jebali, N., Beldi, S. and Gharsallah, A., 2016, December. RFID antennas implanted
for pervasive healthcare applications. In 2016 7th International Conference on
Sciences of Electronics, Technologies of Information and Telecommunications
(SETIT) (pp. 149-152). IEEE.
13
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
Kiourti, A., 2018. RFID Antennas for Body-Area Applications: From Wearables to
Implants. IEEE Antennas and Propagation Magazine, 60(5), pp.14-25.
Kumar, R., 2019. Research methodology: A step-by-step guide for beginners. Sage
Publications Limited.
Lai, H.C., Chan, H.W. and Singh, N.P., 2016. Effects of radiation from a
radiofrequency identification (RFID) microchip on human cancer cells. International
journal of radiation biology, 92(3), pp.156-161.
Latupeirissa, A., Hansson, L., Nowik, M. and Albrecht, T., 2018. Regular Humans
Need Not Apply.
Ledford, J.R. and Gast, D.L., 2018. Single case research methodology: Applications
in special education and behavioral sciences. Routledge.
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and
design. Routledge.
Mayer, J., Froesch, B., Lehmann, M., Langhoff, J., Knecht, T., Mehl, S. and Mueller,
A., Woodwelding AG, 2017. Device to be implanted in a human or animal body for
material or signal delivery or acquisition within the body, and method of implanting
the device. U.S. Patent 9,724,044.
McCusker, K. and Gunaydin, S., 2015. Research using qualitative, quantitative or
mixed methods and choice based on the research. Perfusion, 30(7), pp.537-542.
Michael, K., 2016. Rfid/nfc implants for bitcoin transactions. IEEE Consumer
Electronics Magazine, 5(3), pp.103-106.
Mickle, M.H., Stachel, J.R., Bocan, K.N.S. and Sejdic, E., University of Pittsburgh,
2018. Powering and reading implanted devices. U.S. Patent Application 10/080,624.
Mihovska, A. and Sarkar, M., 2018. Cooperative Human-Centric Sensing
Connectivity. In Internet of Things-Technology, Applications and Standardization.
IntechOpen.
Patel, N., 2018. Science Fiction Twenty Years Ago, a Nanotechnology Reality
Today: Human Microchip Implants. UC Merced Undergraduate Research
Journal, 10(2).
14
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
Patten, M.L. and Newhart, M., 2017. Understanding research methods: An overview
of the essentials. Routledge.
Quinlan, C., Babin, B., Carr, J. and Griffin, M., 2019. Business research methods.
South Western Cengage.
Rodriguez, D.A., 2019. Chipping in at Work: Privacy Concerns Related to the Use of
Body Microchip (" RFID") Implants in the Employer-Employee Context. Iowa Law
Review, 104(3).
Sarwar, N., Khan, F.N., Ali, A., Rafique, H., Hussain, I. and Irshad, A., 2018,
October. Microchip with Advance Human Monitoring Technique and RFTS.
In International Conference on Intelligent Technologies and Applications (pp. 560-
570). Springer, Singapore.
Silverman, D. ed., 2016. Qualitative research. Sage.
Smith, J.A. ed., 2015. Qualitative psychology: A practical guide to research methods.
Sage.
Tabasum, A., Safi, Z., AlKhater, W. and Shikfa, A., 2018, August. Cybersecurity
Issues in Implanted Medical Devices. In 2018 International Conference on Computer
and Applications (ICCA) (pp. 1-9). IEEE.
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research
methods: A guidebook and resource. John Wiley & Sons.
Voas, J. and Kshetri, N., 2017. Human tagging. Computer, 50(10), pp.78-85.
Walliman, N., 2017. Research methods: The basics. Routledge.
Werber, B., Baggia, A. and Žnidaršič, A., 2018. Factors affecting the intentions to
use RFID subcutaneous microchip implants for healthcare
purposes. Organizacija, 51(2), pp.121-133.
Xiao, Z., Tan, X., Chen, X., Chen, S., Zhang, Z., Zhang, H., Wang, J., Huang, Y.,
Zhang, P., Zheng, L. and Min, H., 2015. An implantable RFID sensor tag toward
continuous glucose monitoring. IEEE journal of biomedical and health
informatics, 19(3), pp.910-919.
15

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
12. Appendices
12.1 Appendix A
16
Document Page
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics & Professionalism in Computing
1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
12.2 Appendix B
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
1
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
2

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
3
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
4
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
12.3 Appendix C
RFID Chip Implants and Their Related Ethical Issues Research
Consent Form
Dear Participant,
The purpose of this interview and survey is for a research purpose only as it is part
of my research project “RFID Chip Implants and Their Related Ethical Issues”. The
aim of this research project is to investigate the concerns employees have regarding
the data that is collected about them regarding the use of implantable RFID tags on
them, and whether they are aware of the different ethical issues in the use of these
tags by organisations and employers.
I am inviting you to take part in an interview and a survey in which you will be asked
to answer a series of questions; you may wish to complete them both on the same
day or you may to complete the survey in your own time and send it back to me. The
interview research session will involve only two people, me and the participant
(yourself) and it will not be recorded in any kind of way, only your answers will be
taken down on paper by me, and the interview session will last about 30 minutes.
Your participation in this research is voluntary and you have the right to withdraw any
time. You will get to keep a signed copy of the informed consent form if you wish to
take part in this research, and any information recorded from this research will not be
passed on to any third party. All the data and information collected from this research
is fully confidential and will only be stored on my personal laptop, and the university
account which is password protect and prevents anyone from accessing my account
other than myself.
The personal data collection from this research will be minimised and the personal
data which is necessarily needed will be asked for otherwise not. Your data will only
be used with this project but will not have any of your personal details included.
5

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
Once the research project is complete, the data and information gathered about the
participant will be kept for a maximum time of 1 year but, no more than that, and the
entire data and information collected will be fully destroyed.
If you have any questions regarding this project or research please do not hesitate to
contact myself XXXXXXX, student at De Montfort University via the following email
address; pxxxxxxxx@myemail.dmu.ac.uk
By signing this consent form you specify that you understand the following:
13. I understand the purpose of this project and agree to take part in this research
14. I understand that the data collected will only be used in this project
15. I understand that I can withdraw from this research at any time
16. I understand that the data will be fully destroyed as stated above
Participants Signature: _________________________________
Date of Participants Signature: ___________________________
Researcher’s Signature: __________________________________
Date of Researcher’s Signature: ____________________________
6
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
12.4 Appendix D
7
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
12.5 Appendix E
8

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
9
Document Page
P Number: Pxxxxxxxx IMAT5262 Research, Ethics &
Professionalism in Computing
10
1 out of 30
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]