Facing the Challenges of RFID Data Management

被引:19
作者
Bose, Indranil [1 ]
Lam, Chun Wai [2 ]
机构
[1] Univ Hong Kong, Sch Business, Informat Syst, Hong Kong, Hong Kong, Peoples R China
[2] Univ Hong Kong, Mech Engn, Hong Kong, Hong Kong, Peoples R China
关键词
data explosion; data management; data overload; false read; middleware; radio frequency identification; real-time acquisition;
D O I
10.4018/jisscm.2008100101
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Radio frequency identification (RFID) has generated vast amounts of interest in the supply chain, logistics, and the manufacturing area. RFID can be used to significantly improve the efficiency of business processes by providing automatic data identification and capture. Enormous data would be collected as items leave a trail of data while moving through different locations. Some important challenges such as false read, data overload, real-time acquisition of data, data security, and privacy must be dealt with. Good quality data is needed because business decisions depend on these data. Other important issues are that business processes must change drastically as a result of implementing RFID, and data must be shared between suppliers and retailers. The main objective of this article is focused on data management challenges of RFID, and it provides potential solutions for each identified risk.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 64 条
[1]   RFID technologies: Supply-chain applications and implementation issues [J].
Angeles, R .
INFORMATION SYSTEMS MANAGEMENT, 2005, 22 (01) :51-65
[2]   An empirical study of the anticipated consumer response to RFID product item tagging [J].
Angeles, Rebecca .
INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2007, 107 (3-4) :461-483
[3]  
[Anonymous], 2007, ECONOMIST
[4]  
[Anonymous], BUSINESSWEEK
[5]  
[Anonymous], 2002, RFID J
[6]  
[Anonymous], 2007, RFID J
[7]  
[Anonymous], 2003, RFID J
[8]  
Asif Z, 2005, COMMUN ASSOC INF SYS, V15, P393
[9]   Security implications in RFID and authentication processing framework [J].
Ayoade, J .
COMPUTERS & SECURITY, 2006, 25 (03) :207-212
[10]  
Bhuptani M, 2005, RFID FIELD GUIDE DEP