Show simple item record

dc.contributor.authorPotdar, Vidyasagar
dc.contributor.authorWu, Chen
dc.contributor.authorChang, Elizabeth
dc.contributor.editorZhang, Qingyu
dc.date.accessioned2017-01-30T13:14:18Z
dc.date.available2017-01-30T13:14:18Z
dc.date.created2008-11-12T23:33:00Z
dc.date.issued2007
dc.identifier.citationPotdar, Vidyasagar and Wu, Chen and Chang, Elizabeth. 2007. Automated data capture technologies: RFID, in Zhang, Q. (ed), E-supply chain technologies and management, pp. 112-141. Hershey, London: Information Science Reference.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/29648
dc.description.abstract

In this chapter we provide an introduction to RFID technology. We discuss the main components of the RFID technology, which includes RFID transponders, RFID readers, RFID middleware, and RFID labels. A detailed classification and explanation for each of these components is provided, followed by the benefits and applications that can be achieved by adopting this technology. After discussing all possibleapplications, we describe the business benefits and how stakeholders can benefit. This is followed by a detailed outline of the adoption challenges, where we discuss issues like the security, privacy, cost, scalability, resilience, and deployment and some existing solutions. Once the issues are discussed, we divert our attention to some successful RFID deployment case studies to describe the adoption of RFID technology that has already begun and how many big organizations across the world are showing interest in this technology. Since this chapter takes into consideration a variety of audiences like researchers, business executives, business consultants, hobbyists, and general readers, we tried to cover material relevant to each target audience. For business executives and consultants interested in knowing who can offer complete RFID solutions, we allocated a dedicated section for RFID vendors where we provide a comprehensive list of RFID vendors across the globe. For researchers, we listed some open issues in the section of adoption challenges. For advanced users, in-depth technical details are provided in the section where we discuss security and privacy enhancing protocols.

dc.publisherInformation Science Reference
dc.titleAutomated Data Capture Technologies: RFID
dc.typeBook Chapter
dcterms.source.startPage112
dcterms.source.endPage141
dcterms.source.titleE-supply chain technologies and management
dcterms.source.isbn9781599042558
dcterms.source.placeHershey, London
dcterms.source.chapter14
curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.identifierEPR-2511
curtin.accessStatusFulltext not available
curtin.facultyCurtin Business School
curtin.facultySchool of Information Systems


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record