Table 3.
Technology attributes that relate to important considerations in DVI practice (see Table 2), e.g. is the technology human readable? Does the technology enforce access control?
Is/does the technology…? | In other words… |
---|---|
Readily human readable? | Can a human easily read text on the tag, device or system? |
Readily human writable? | Can a human easily write text on the tag, device or system? |
Readily machine readable? | Can computers read information from the tag, device or system? |
Readily machine writable? | Can computers write information to the tag, device or system? |
Involve a human in the loop? | Are humans able to check and intervene in the system? |
Automatable? | Can the process be fully automated? |
Conveniently usable for humans? | Is the system especially convenient for humans to use? |
Internationally interpretable? | Can information be understood no matter what languages you speak? |
Degrade gracefully? | If the system is damaged, is it still useful to some extent? |
Robust to environment and failures? | Can the system withstand harsh operating conditions? |
Usable in many contexts? | Is the system useful in many different situations? |
Use readily available equipment/consumables? | Are the necessary equipment or consumables easy to obtain? |
Compliant with widely adopted standards? | Is the tag, device or system standards compliant? |
Interoperable across jurisdictions? | Can the system be used across different state or federal jurisdictions? |
Inexpensive? | Is the tag, device or system relatively cheap to buy and use? |
Enable items to be located in physical space? | Does the system help us find specific items? |
Support additional features or special uses? | Can the functionality of the tag, device, system be extended? |
Provide high information transfer rates? | Does the system allow rapid data transfer? |
Support decentralised control of functionality? | Does the system avoid the need for control by a central authority? |
Provide redundancy? | Can a single task be accomplished by more than one device? |
Highly available? | Can services be accessed when and where they are needed? |
Preserve confidentiality? | Are unauthorised parties prevented from reading data? |
Ensure data integrity? | Can the system ensure data have not been altered since entered? |
Enable transaction audit? | Do transactions create records that can later be checked? |
Enforce authentication? | Are users required to identify themselves to gain access to the system? |
Enforce authorisation? | Can permissions to perform transactions can be granted or revoked? |
Enforce access control? | Can authorisation be granted to read or write data? |