Home > News > Industry News > The Third-party Barcode-Scanning Applications (Part two)
News
Company News
Industry News
Daily News
QR CODE
Latest News

Happy Birthday to Yumite Family

Yesterday Yumite Family members had spent a loved and sweety night.Yumite,known as a barcode scanner manufacturer/supplier giant in China,full of love...

How to Read & Decode Barcode Images in C#.NET

Using free C# code to scan linear & 2d barcode images in .NET applications Complied advanced barcode reading & scanning functions into a mature .NET B...

What Is the Difference Between 1D and 2D Barcode Scanning?

Barcode There are two general classes of barcodes: one-dimensional (1D or linear) and two-dimensional (2D). They are used in different types of applic...

Chinese valentine's Day in Yumite Barcode Scanner Supplier

9th August 2016(7th day of the 7th lunar month)is the day of Chinese Valentine's Day. According to legend,on the night of every year, Cowherd and Weav...

Yumite Team Very Successful HK Fair

April13th —16th 2016, Yumite bar code scanner manufacturertake participate the HKTDC Hong Kong Electronics Fair(Spring Edition) and ICTExpo with boot...

2016 Olympic Games is ended in Rio de Janeiro of Brazil

2016 Olympic Games is ended in Rio de Janeiro of Brazil In 2016, the global largest important thing is Olympic Games,which is opened from 5th August t...

New Hot Selling Handheld 3G Smart Android POS Machine with MSR, IC, NFC Card Reader And Internal Pri

This model is new and creative Data collector 5.5inch wireless pos handheld mobile 3g payment terminal android printer pda,Handheld 3G Smart Android P...

Welcome Mr Neerai to visit our factory

Today Mr Neeraj a famousinternational business distributer in Indian visited our factory. In last week,Mr Neeraj searched our company information from...

Yumite Barcode Scanner is Everywhere

I have a dream that Yumite barcode scanner isall over the world. We are glad to announce one of our clientsdistribute Yumite barcode scanner. Owing to...

Yumite Develop New Markets(II)

This week, Yumite teamwent to Dubai, which is known as Trade Capital of the Middle East and NorthAfrica. They will open a newjourney, persuade the c...
Contact Us
Factory Add: 4F, ​​Building 5, Lianjian Industrial Park, Huarong Road, Dalang Town, BaoAn District, Shenzhen, China International Trade Department Contact Now

News

The Third-party Barcode-Scanning Applications (Part two)

Rick From Yumite 2015-08-17 17:40:05

Certainly the collection of user data by app developers is part of the consumer calculus of the cost of free tools. That is, in exchange for some of the users’ data, the tool becomes available for use. For the everyday user, QR codes are likely a tool for simple information seeking. In exchange, market-minded developers are given an opportunity to determine the preferences of the user. This, for most users, constitutes a reasonable trade off and the use of the tool represents a transaction between developer and the user.

 

However, the ethical contours and acceptable limits of this trade off remain unsettled, particularly if the type of data taken is not made explicitly comprehensible to consumers. Moreover, contemporary privacy norms are increasingly threatened as what initially appear to be signals of consumer preference slide further into determining bigger-picture life patterns and behavior. The question is, how much and what kinds of data tip the scale from reasonable transfer to privacy violation? We feel that the collection of data that combines content, location, date, and time begins to edge toward the triangulation of private behavior.

 

We feel that the QR case begins to tread beyond reasonable data collection toward behavior triangulation as a result of the intersection of three variables: the expanding purposes for which codes are used; non-explicit user notification by the software; and limitations of user knowledge in comprehending potential threats as a result of seemingly benign data transfer.

Of the applications tested, only a handful required the user to accept an end-user license agreement (EULA). The majority of apps studied provided no notification whatsoever. For those instances in which the application prompted the device, the language contained in the prompt was worded such that the user could not reasonably infer the immediate implications of that data collection. While many QR codes “in the wild” contain only public information, such as a web site or telephone number, others may contain confidential information such as the password to a wireless network or the code to deactivate a security alarm.

 

The study’s designers placed free pregnancy tests in the bathroom of a bar and then provided a QR code in order for the user to scan to get information and answer a questionnaire. In this case, unbeknownst to the researchers, the collection of this data literally works against the intent of the project hoping to reach information seekers anonymously and in the privacy of the bathroom stall. While the QR code itself may point to a location that fully intends to maintain the anonymity of the user, the scanner does not.