Skip to main content
. 2022 Mar 25;7(3):467–483. doi: 10.1080/20961790.2021.2023418

Table 3.

Technology attributes that relate to important considerations in DVI practice (see Table 2), e.g. is the technology human readable? Does the technology enforce access control?

Is/does the technology…? In other words…
Readily human readable? Can a human easily read text on the tag, device or system?
Readily human writable? Can a human easily write text on the tag, device or system?
Readily machine readable? Can computers read information from the tag, device or system?
Readily machine writable? Can computers write information to the tag, device or system?
Involve a human in the loop? Are humans able to check and intervene in the system?
Automatable? Can the process be fully automated?
Conveniently usable for humans? Is the system especially convenient for humans to use?
Internationally interpretable? Can information be understood no matter what languages you speak?
Degrade gracefully? If the system is damaged, is it still useful to some extent?
Robust to environment and failures? Can the system withstand harsh operating conditions?
Usable in many contexts? Is the system useful in many different situations?
Use readily available equipment/consumables? Are the necessary equipment or consumables easy to obtain?
Compliant with widely adopted standards? Is the tag, device or system standards compliant?
Interoperable across jurisdictions? Can the system be used across different state or federal jurisdictions?
Inexpensive? Is the tag, device or system relatively cheap to buy and use?
Enable items to be located in physical space? Does the system help us find specific items?
Support additional features or special uses? Can the functionality of the tag, device, system be extended?
Provide high information transfer rates? Does the system allow rapid data transfer?
Support decentralised control of functionality? Does the system avoid the need for control by a central authority?
Provide redundancy? Can a single task be accomplished by more than one device?
Highly available? Can services be accessed when and where they are needed?
Preserve confidentiality? Are unauthorised parties prevented from reading data?
Ensure data integrity? Can the system ensure data have not been altered since entered?
Enable transaction audit? Do transactions create records that can later be checked?
Enforce authentication? Are users required to identify themselves to gain access to the system?
Enforce authorisation? Can permissions to perform transactions can be granted or revoked?
Enforce access control? Can authorisation be granted to read or write data?