3,359 research outputs found

    RFID in the supply chain: lessons from European early adopters

    Get PDF
    Purpose Radio frequency identification (RFID) is increasingly being presented as a technology with the potential to improve supply chain performance, but empirical evidence from early adopters is sparse. This paper aims to rectify this scarcity and contribute to a more informed discussion in and between academic and practitioner communities. Design/Methodology/Approach The paper is based on a conceptual model of factors influencing the success of adoption efforts. It then reports the results of a survey of 612 European supply chain managers, focusing on the 128 respondents who have begun RFID trials. Findings A significant influence on operational deployment is the presence of mandates from key customers requiring the technology’s use. Customer mandates also impact the anticipated benefits of a faster sales cycle and of enhanced systems integration, though the relationships are complex. By contrast, greater cost reduction benefits are anticipated in two industries where mandates are less common – industrial goods and logistics. Perceived organizational innovativeness positively impacts anticipated ROI from RFID. Companies adopting a ‘slap and ship’ approach are less likely to anticipate pricing benefits than those integrating RFID into enterprise systems Research Limitations/Implications The limitations of the paper include the limited sample size of early adopters. In addition, qualitative research is needed into RFID supply chain applications and into different approaches to IS integration of RFID, to inform future survey work. Practical Implications This paper informs supply chain managers and senior decision makers who are examining the potential of RFID technology. It offers guidance on what issues to look for when adopting this technology, approaches to take and the benefits that might be accrued. Originality/Valuer This paper offers a major contribution to understanding the current status of the adoption of RFID in European supply chains. This understanding is put in the context of the wider literatures on supply chain management and the adoption of information systems and te

    10. Interuniversitäres Doktorandenseminar Wirtschaftsinformatik Juli 2009

    Get PDF
    Begonnen im Jahr 2000, ist das Interuniversitäre Wirtschaftsinformatik-Doktorandenseminar mittlerweile zu einer schönen Tradition geworden. Zunächst unter Beteiligung der Universitäten Leipzig und Halle-Wittenberg gestartet. Seit 2003 wird das Seminar zusammen mit der Jenaer Universität durchgeführt, in diesem Jahr sind erstmals auch die Technische Universität Dresden und die TU Bergakademie Freiberg dabei. Ziel der Interuniversitären Doktorandenseminare ist der über die eigenen Institutsgrenzen hinausgehende Gedankenaustausch zu aktuellen, in Promotionsprojekten behandelten Forschungsthemen. Indem der Schwerpunkt der Vorträge auch auf das Forschungsdesign gelegt wird, bietet sich allen Doktoranden die Möglichkeit, bereits in einer frühen Phase ihrer Arbeit wichtige Hinweise und Anregungen aus einem breiten Hörerspektrum zu bekommen. In den vorliegenden Research Papers sind elf Beiträge zum diesjährigen Doktorandenseminar in Jena enthalten. Sie stecken ein weites Feld ab - vom Data Mining und Wissensmanagement über die Unterstützung von Prozessen in Unternehmen bis hin zur RFID-Technologie. Die Wirtschaftsinformatik als typische Bindestrich-Informatik hat den Ruf einer thematischen Breite. Die Dissertationsprojekte aus fünf Universitäten belegen dies eindrucksvoll.

    Managing ubiquitous eco cities: the role of urban telecommunication infrastructure networks and convergence technologies

    Get PDF
    A successful urban management system for a Ubiquitous Eco City requires an integrated approach. This integration includes bringing together economic, socio-cultural and urban development with a well orchestrated, transparent and open decision making mechanism and necessary infrastructure and technologies. Rapidly developing information and telecommunication technologies and their platforms in the late 20th Century improves urban management and enhances the quality of life and place. Telecommunication technologies provide an important base for monitoring and managing activities over wired, wireless or fibre-optic networks. Particularly technology convergence creates new ways in which the information and telecommunication technologies are used. The 21st Century is an era where information has converged, in which people are able to access a variety of services, including internet and location based services, through multi-functional devices such as mobile phones and provides opportunities in the management of Ubiquitous Eco Cities. This paper discusses the recent developments in telecommunication networks and trends in convergence technologies and their implications on the management of Ubiquitous Eco Cities and how this technological shift is likely to be beneficial in improving the quality of life and place. The paper also introduces recent approaches on urban management systems, such as intelligent urban management systems, that are suitable for Ubiquitous Eco Cities

    Cashless transactions through ecommerce platform in the Post-Covid-19

    Get PDF
    COVID-19 pandemic becomes one of the critical challenges that occur around the world that is impressed by the social environment of society. This paper is based on a literature review of the conceptual framework of cashless transactions based on attitude customized in e-commerce usage in post-COVID-19. The main purpose of this study paper is to formulate elements that are suitable for the proposed cashless transactions model based on attitude tailored to the use of e-commerce in post-COVID-19 to enhance trustworthiness value and best practices among consumers. The conceptual framework of cashless transactions based on attitude through e-commerce focuses on the influence of e-commerce usage features, perceived behavioural control (consumer abilities), and subjective norms related to motivational values influenced by the social environment. This research paper was also carried out based on previous studies and the use of Theory Of Planned Behaviour tailored to the conceptual framework of the study to be produced. This study proposes a cashless transactions model based on attitude primarily among consumers of higher education institutions. Based on the studies, focuses on the culture of using cashless transactions specializing in e-commerce platforms that will guide further studies in the future

    Designing Controllable Accountabilities of Future Internet of Things Applications

    Get PDF
    Within work environments, the emergence of Internet of Things applications creates radically new scenarios of use involving the enrichment of everyday objects with seamlessly integrated communication, sensing and computing capabilities and their integration into information systems. These changes can profoundly alter transparency of work processes, prescribe and prohibit actions, and change stakeholders’ overall accountability and control capabilities. Actors’ difficulties in meeting changed accountabilities due to an Internet of Things application may trigger severe disturbances in organizations. What actors are in control of and what they are held accountable for is partially prescribed by designers and involved stakeholders in the early stages of technology development. Therefore, this paper presents an approach for prospectively designing controllable accountabilities into envisaged Internet of Things applications. Three dimensions of accountability will be distinguished: visibility, responsibility and liability. Each dimension affects control requirements differently. The narrative network approach has been adopted to study envisioned organizational work processes along with the involved actors and their accountabilities and control capabilities. A description of how the approach can be used to prospectively align accountabilities and control capabilities is provided based on a case study of an Internet of Things application in product authentication. Advantages and limitations of the approach are discussed

    A Strategy for Third-Party Logistics Systems: A Case Analysis Using the Blue Ocean Strategy

    Get PDF
    One of today’s most frequently discussed topics in the business world is how to escape from the intense Red Ocean and how to create an uncontested Blue Ocean. However, because there are few practical guidelines available on this topic, we will introduce a case study of a third-party logistics (3PL) provider, CJ-Global Logistics Service (CJ-GLS), to show how it aspires to be a leader in the newly introduced 3PL industry in South Korea. CJ-GLS is a latecomer in the logistics industry, and its resources, such as the number of trucks and warehouses, are relatively small in comparison to those of established companies. But, it has achieved a distinct competitive advantage through innovative information technology (i.e., RFID— radio frequency identification), which has enabled it to create an uncontested market space, electronic logistics business. One remarkable fact about CJ-GLS is that its swift growth comes not from attracting competitors’ customers from the existing Red Ocean market but from creating a Blue Ocean market (3PL market), which previously existing incumbents ignored, and also from constructing a new business model founded on a RFID-based, ubiquitous-oriented 3PL system. Analyzed through a Four Actions Framework and characterized as Blue Ocean, this case study provides valuable information on how a company reinforces its competitive advantage from the Red Ocean while it transitions into a Blue Ocean by utilizing advanced information communication technologies

    Eavesdropping Whilst You're Shopping: Balancing Personalisation and Privacy in Connected Retail Spaces

    Get PDF
    Physical retailers, who once led the way in tracking with loyalty cards and `reverse appends', now lag behind online competitors. Yet we might be seeing these tables turn, as many increasingly deploy technologies ranging from simple sensors to advanced emotion detection systems, even enabling them to tailor prices and shopping experiences on a per-customer basis. Here, we examine these in-store tracking technologies in the retail context, and evaluate them from both technical and regulatory standpoints. We first introduce the relevant technologies in context, before considering privacy impacts, the current remedies individuals might seek through technology and the law, and those remedies' limitations. To illustrate challenging tensions in this space we consider the feasibility of technical and legal approaches to both a) the recent `Go' store concept from Amazon which requires fine-grained, multi-modal tracking to function as a shop, and b) current challenges in opting in or out of increasingly pervasive passive Wi-Fi tracking. The `Go' store presents significant challenges with its legality in Europe significantly unclear and unilateral, technical measures to avoid biometric tracking likely ineffective. In the case of MAC addresses, we see a difficult-to-reconcile clash between privacy-as-confidentiality and privacy-as-control, and suggest a technical framework which might help balance the two. Significant challenges exist when seeking to balance personalisation with privacy, and researchers must work together, including across the boundaries of preferred privacy definitions, to come up with solutions that draw on both technology and the legal frameworks to provide effective and proportionate protection. Retailers, simultaneously, must ensure that their tracking is not just legal, but worthy of the trust of concerned data subjects.Comment: 10 pages, 1 figure, Proceedings of the PETRAS/IoTUK/IET Living in the Internet of Things Conference, London, United Kingdom, 28-29 March 201

    RFID in textile and clothing manufacturing: technology and challenges

    Get PDF
    • …
    corecore