Part 1. Principles. Automatic identification and data collection: what the future holds
Understanding the RFID technology
RFID and global privacy policy
RFID, privacy and regulation
RFID and the United States Regulatory landscape
RFID and authenticity of goods
Location and identity: a brief history
Interaction design for visible wireless
Pt. 2. Applications. RFID payments at ExxonMobil
Transforming the battlefield with RFID
RFID in the pharmacy: Q&A with CVS
Wireless tracking in the library: benefits, threats, and responsibilities
Tracking livestock with RFID
Pt. 3. Threats. RFID: the doomsday scenario
Multiple scenarios for private-sector use of RFID
Would Macy's scan Gimbels?: competitive intelligence and RFID
Pt. 4. Technical solutions. Technological approaches to the RFID privacy problem
Randomization: another approach to robust RFID security
Killing recoding and beyond
Pt. 5. Stakeholder perspectives. Texas Instruments: lessons from successful RFID applications
Gemplus: smart cards and wireless cards
P&G: RFID and privacy in the supply chain
Citizens: getting at our real concerns
Activists: communicating with consumers, speaking truth to policy makers
Experimenting on humans using alien technology
Asia: billions awaken to RFID
Latin America: wireless privacy, corporations, and the struggle for development
Appendixes. Position statements on the use of RFID on consumer products
RFID and the construction of privacy: why mandatory kill is necessary
Guidelines for privacy protection on electronic Tags of Japan
Adapting fair information practices to low-cost RFID systems
Guidelines on EPC for consumer products
Realizing the mandate: RFID at Wal-Mart.