Research and discuss where RFID tags have been used for security measures.
The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion.
At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Friday of each week. Two additional responses are required after Friday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation.
The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit.
Some organizations have gone as far as inserting radio-frequency identification (RFID) chips into their employees to control their access into secure areas and to monitor their movement and location.
- Research and discuss where RFID tags have been used for security measures.
- Discuss your feelings on how these devices are being used.
- Be sure that you fully explain your viewpoint and justify your response.
As the popularity and use of RFID tags increase, the concern about these devices also continues to grow.
- Research and discuss a company that currently uses RFID tags.
- Explain how they are being used.
- Discuss your feelings on the security concerns that have arisen from the use of these devices.
In your own words, please post a response to the Discussion Board and comment on other postings. You will be graded on the quality of your postings.
For assistance with your assignment, please use your text, Web resources, and all course materials.
Project Criteria Exceeds: 90%–100% Very good: 80%–89% Meets: 70%–79% Needs Improvement: Below 70%
Response covers all topics indicated in the assignment and adds additional content. The writing was of collegiate level with no errors in spelling or grammar. Response covers most topics indicated in the assignment. The writing was of collegiate level with one or less errors in spelling or grammar. Response covers many topics indicated in the assignment. The writing was of collegiate level with two or less errors in spelling or grammar. Response covers none to some of the topics indicated in the assignment. The writing was less than collegiate level with errors in spelling or grammar.
Multiple learner interactions per week that add to the discussion. Responses show evidence of critical analysis with questions to other classmates. At least three learner interactions per week that add to the discussion. Responses show evidence of critical analysis. No less than two learner interactions per week that add to the discussion. Responses show evidence of critical analysis. Zero to one learner interaction per week in the discussion board. Response lacks evidence of critical analysis.
Analysis exceeded minimum requirements. Appropriate sources were used to support analysis and were properly referenced. Basic analysis provided to support discussion. When appropriate to support discussion, appropriate sources were cited and properly referenced. Some limited analysis provided to support discussion. When appropriate to support discussion, sources were cited, appropriate, and properly referenced. No or inaccurate analysis, no sources were cited when needed, analysis and/or sources were not appropriate. When sources used, were not properly referenced.