Show simple item record

dc.contributor.authorPotdar, M.
dc.contributor.authorChang, Elizabeth
dc.contributor.authorPotdar, Vidyasagar
dc.identifier.citationPotdar, Manohar and Chang, Elizabeth and Potdar, Vidyasagar. 2006. : Applications for RFID in pharmaceutical industry, in Mohanty, S.P. and Sahoo, A. (ed), International Conference on Industrial Technology, Dec 15 2006, pp. 2860-2865. Mumbai, India: IEEE Computer Society Press.

Security and safety are two important features desired in pharmaceutical supply chain and achieving the same is a challenging task. The need to secure and authenticate pharmaceutical products has increased tremendously with the emerging counterfeit product market. The motivation to introduce counterfeit pharmaceutical products in the supply chain could be to gain rapid economic benefits or affecting the reputation of strong brand in the pharmaceutical industry. RFID technology can be used to deter counterfeiting attempts. It can also be used in various other domains in the pharmaceutical industry. The main aim of this paper is to outline all the applications of RFID in the pharmaceutical industry. After explaining the main applications, we discuss how information hiding techniques could be used with RFID to offer efficient expiry date management, pharmaceutical tamper detection, and fraud detection and prevention.

dc.publisherIEEE Computer Society Press
dc.subjectpharmaceutical products
dc.subjectexpiry date
dc.subjectsupply chain
dc.subjectpharmaceutical tamper detection
dc.titleApplications for RFID in pharmaceutical industry
dc.typeConference Paper
dcterms.source.titleInternational Conference on Industrial Technology (ICIT 2006)
dcterms.source.seriesInternational Conference on Industrial Technology (ICIT 2006)
dcterms.source.conferenceInternational Conference on Industrial Technology
dcterms.source.conference-start-dateDec 15 2006
dcterms.source.conferencelocationMumbai, India

Copyright 2006 IEEE


This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.accessStatusOpen access
curtin.facultyCurtin Business School

Files in this item


This item appears in the following Collection(s)

Show simple item record