Applications for RFID in pharmaceutical industry
|dc.identifier.citation||Potdar, Manohar and Chang, Elizabeth and Potdar, Vidyasagar. 2006. : Applications for RFID in pharmaceutical industry, in Mohanty, S.P. and Sahoo, A. (ed), International Conference on Industrial Technology, Dec 15 2006, pp. 2860-2865. Mumbai, India: IEEE Computer Society Press.|
Security and safety are two important features desired in pharmaceutical supply chain and achieving the same is a challenging task. The need to secure and authenticate pharmaceutical products has increased tremendously with the emerging counterfeit product market. The motivation to introduce counterfeit pharmaceutical products in the supply chain could be to gain rapid economic benefits or affecting the reputation of strong brand in the pharmaceutical industry. RFID technology can be used to deter counterfeiting attempts. It can also be used in various other domains in the pharmaceutical industry. The main aim of this paper is to outline all the applications of RFID in the pharmaceutical industry. After explaining the main applications, we discuss how information hiding techniques could be used with RFID to offer efficient expiry date management, pharmaceutical tamper detection, and fraud detection and prevention.
|dc.publisher||IEEE Computer Society Press|
|dc.subject||pharmaceutical tamper detection|
|dc.title||Applications for RFID in pharmaceutical industry|
|dcterms.source.title||International Conference on Industrial Technology (ICIT 2006)|
|dcterms.source.series||International Conference on Industrial Technology (ICIT 2006)|
|dcterms.source.conference||International Conference on Industrial Technology|
|dcterms.source.conference-start-date||Dec 15 2006|
Copyright 2006 IEEE
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
|curtin.department||Centre for Extended Enterprises and Business Intelligence|
|curtin.faculty||Curtin Business School|