skip to main content
article
Free Access

Examining RFID applications in supply chain management

Published:01 July 2007Publication History
Skip Abstract Section

Abstract

Technology infrastructure, business process, and managerial issues must be addressed by IT practitioners as they adapt to the business changes associated with the diffusion of RFID technology in the supply chain.

References

  1. McGinity, M. RFID: Is this game of tag fair play? Commun. ACM 47, 1 (Jan. 2004), 15--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Mearian, L. The data life cycle. Computerworld (Nov. 17, 2003), 38--40.Google ScholarGoogle Scholar
  3. Palmer, M. Seven principles of effective RFID data management (part 1 and 2). Enterprise Systems News; www.esj.com/news/article.asp?EditorialsID=1067.Google ScholarGoogle Scholar
  4. Pottie, G.J. Privacy in the global e-village. Commun. ACM 47, 2 (Feb. 2004), 21--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Redman, T.C. Data Quality for the Information Age. Artech House, Norwood, MA, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. SAP launches RFID package. RFID Journal (Jan. 15, 2004).Google ScholarGoogle Scholar
  7. Seeley, R. RFID and data: Here's what's next. Application Development Trends (July 2004); www.adtmag.com/article.asp?id=9666.Google ScholarGoogle Scholar
  8. Shapiro, J.F. Modeling the Supply Chain. Duxbury, Pacific Grove, CA, 2001.Google ScholarGoogle Scholar
  9. Simchi-Levi, D. Kaminsky, P. and Simchi-Levi, E. Designing and Managing the Supply Chain. McGraw-Hill, Boston, MA, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Songini, M. Wal-Mart offers RFID update. Computerworld (Mar. 13, 2006); www.computerworld.com/mobiletopics/mobile/ story/0,10801,109418,00.html.Google ScholarGoogle Scholar
  11. Wailgum, T. Tag, you're late. CIO Magazine (Nov. 15, 2004), 50--56.Google ScholarGoogle Scholar
  12. Wilde, D., Harris, E., Rogers, Y., and Randell, C. The periscope: Supporting a computer-enhanced field trip for children. Personal Ubiquitous Computing 7 (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Examining RFID applications in supply chain management

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 50, Issue 7
              Creating a science of games
              July 2007
              120 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/1272516
              Issue’s Table of Contents

              Copyright © 2007 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 1 July 2007

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format