3,061 research outputs found

    Critical Management Issues for Implementing RFID in Supply Chain Management

    Get PDF
    The benefits of radio frequency identification (RFID) technology in the supply chain are fairly compelling. It has the potential to revolutionise the efficiency, accuracy and security of the supply chain with significant impact on overall profitability. A number of companies are actively involved in testing and adopting this technology. It is estimated that the market for RFID products and services will increase significantly in the next few years. Despite this trend, there are major impediments to RFID adoption in supply chain. While RFID systems have been around for several decades, the technology for supply chain management is still emerging. We describe many of the challenges, setbacks and barriers facing RFID implementations in supply chains, discuss the critical issues for management and offer some suggestions. In the process, we take an in-depth look at cost, technology, standards, privacy and security and business process reengineering related issues surrounding RFID technology in supply chains

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Designing Security Requirements – A Flexible, Balanced, and Threshold-Based Approach

    Get PDF
    Defining security requirements is the important first step in designing, implementing and evaluating a secure system. In thispaper, we propose a formal approach for designing security requirements, which is flexible for a user to express his/hersecurity requirements with different levels of details and for the system developers to take different options to design andimplement the system to satisfy the user’s requirements. The proposed approach also allows the user to balance the requiredsystem security properties and some unfavorable features (e.g., performance degrading due to tight control and strongsecurity). Given the importance of social-technical factors in information security, the proposed approach also incorporateseconomic and organizational security management factors in specifying user’s security requirements. We demonstrate theapplication of our approach with the help of a concrete pervasive information system

    Supply Chain Innovation with IoT

    Get PDF
    In this chapter, we first describe and analyze the evolution of supply chain and the history of IoT technologies’ development briefly. And then, we conduct a systematic research on the characteristics of supply chain system in IoT context and analyze how to realize the innovation of supply chain system in IoT context in detail, and on this basis, we propose the architecture of cold chain traceability system. Furthermore, through the decision-making process model for supply chain disruption and establishment of knowledge management system in IoT environment, the competences needed for improving supply chain resilience is reinforced. In the end, a case study is conducted to illustrate the availability and robustness of traceability system in the food supply chan

    Advanced Information Systems and Technologies

    Get PDF
    This book comprises the proceedings of the VI International Scientific Conference “Advanced Information Systems and Technologies, AIST-2018”. The proceeding papers cover issues related to system analysis and modeling, project management, information system engineering, intelligent data processing, computer networking and telecomunications, modern methods and information technologies of sustainable development. They will be useful for students, graduate students, researchers who interested in computer science

    HUC-HISF: A Hybrid Intelligent Security Framework for Human-centric Ubiquitous Computing

    Get PDF
    制度:新 ; 報告番号:乙2336号 ; 学位の種類:博士(人間科学) ; 授与年月日:2012/1/18 ; 早大学位記番号:新584

    An Analysis of and Perspective on the Information Security Maturity Model: a case study of a Public and a Private Sector Company

    Get PDF
    Information Security (IS) is a concept that is related to protecting a set of data in order to preserve the value it has for an individual or an organization. A review of the literature shows there are four main aspects related to IS: confidentiality, integrity, availability and non-repudiation. Based on these four aspects, a new framework is put forward for analyzing the information security maturity model (ISMM) in an organization, assuming that each organization has a minimum level of information security policies in each aspect, taking into consideration the percentage of policies that this organization has from all those cited in our model. At the end, a case study was conducted in order to analyze the ISMM of a public and private sector company

    Synchronized exchange of material and information

    Get PDF
    Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, June 2003.Includes bibliographical references (leaves 39-41).Commerce is all about the carefully managed exchange of material, money, and information. Traditionally, the connection between material and information has been tenuous, with humans acting as the intermediaries. This has made the supply chain inefficient and expensive. The Auto-lID Center has created a stronger, automatic link between inanimate objects and computers. This thesis completes the information exchange, or feedback loop, which makes commerce possible. Specifically, it identifies a framework for information exchange alongside material exchange using Savant-to-Savant communication. Messaging standards will need to support the Auto-ID Center's technology, and this thesis suggests how to augment existing and emerging communication standards to accomplish this feat. Finally, to address the issue of increasing information management, this thesis analyzes the aggregation database, an IT infrastructure component that might be of value to organizations. The outcome of this thesis is an understanding of the various issues necessary to develop a secure, efficient and robust system for tracking and automatically confirming material exchange.by Amit Goyal.M.Eng
    corecore