Ubiquitous Computing: Why Auto-ID is the Logical Next Step in Enterprise Automation

This paper identifies and analyzes potential business benefits of ubiquitous computing (UbiComp). Its aim is to challenge whether the growing visibility of topics such as ubiquitous or pervasive computing, automatic identification (Auto-ID) and radio frequency identification (RFID) can be justified from a business perspective. To do so it analyzes the business contribution of existing UbiComp applications, reconstructs their development phases, introduces the business-relevant base functionalities and discusses implications for the design of products, processes and services using UbiComp applications. The creation of an alternative and rather cost-efficient machine-machine relationship between already established information systems and the real world things they try to manage has been identified as the main source of business benefit. However, before businesses can systematically leverage all potential benefits, some technical and political questions, such as creating robust solutions and solving privacy issues, have to be answered. Key points for management Ubiquitous computing technologies make it possible to improve business processes in the areas of supply chain management, product life cycle management and customer relationship management. It also enables new business models such as leasing or pay per use. – Ubiquitous Computing (UbiComp) is a logical next step in business computing. – The associated global standardization required in the area of automatic identification (Auto-ID) is advancing at a swift pace. – Software companies such as SAP are already developing infrastructure software to support UbiComp applications. – Particular importance must be given to the issue of privacy when designing applications involving consumers.

[1]  Jim Waldo Virtual Organizations, Pervasive Computing, and an Infrastructure for Networking at the Edge , 2002, Inf. Syst. Frontiers.

[2]  Robert Buderi,et al.  Computing goes everywhere , 2001 .

[3]  M. Kärkkäinen,et al.  Wireless product identification: enabler for handling efficiency, customisation and information sharing , 2002 .

[4]  Frank Stajano,et al.  The Resurrecting Duckling: security issues for ubiquitous computing , 2002, S&P 2002.

[5]  A. Beresford,et al.  The first summer school on ubiquitous and pervasive computing , 2003, IEEE Pervasive Computing.

[6]  Leonard M. Jessup,et al.  The relevance of social issues in ubiquitous computing environments , 2002, CACM.

[7]  James M. Utterback,et al.  Mastering the Dynamics of Innovation , 1996 .

[8]  Mike P. Papazoglou The Role of Agent Technology in Business to Business Electronic Commerce , 1999, CIA.

[9]  Hans-Werner Gellersen,et al.  Beyond Prototypes: Challenges in Deploying Ubiquitous Systems , 2002, IEEE Pervasive Comput..

[10]  Miranda Seymour The Ghosts in the Machines , 2002 .

[11]  Florian Michahelles,et al.  Proactive Instructions for Furniture Assembly , 2002, UbiComp.

[12]  Richard Schroeder,et al.  Six Sigma: The Breakthrough Management Strategy Revolutionizing the World's Top Corporations , 1999 .

[13]  P. Watzlawick,et al.  Menschliche Kommunikation : Formen, Störungen, Parodoxien , 1996 .

[14]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..

[15]  Andrew E. Fano,et al.  The future of business services in the age of ubiquitous computing , 2002, CACM.

[16]  Abraham Bernstein,et al.  Software infrastructure and design challenges for ubiquitous computing applications , 2002, CACM.

[17]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[18]  Elgar Fleisch,et al.  Auf dem Weg zum Echtzeitunternehmen , 2003 .

[19]  Mark Weiser The computer for the 21st century , 1991 .

[20]  Kevin Crowston,et al.  The interdisciplinary study of coordination , 1994, CSUR.

[21]  Kalle Lyytinen,et al.  Issues and Challenges in Ubiquitous Computing , 2002 .

[22]  Samuel Pierre,et al.  Mobile computing and ubiquitous networking: concepts, technologies and challenges , 2001, Telematics Informatics.

[23]  Donald A. Norman,et al.  The invisible computer , 1998 .

[24]  Randy H. Katz,et al.  Emerging challenges: Mobile networking for “Smart Dust” , 2000, Journal of Communications and Networks.

[25]  Bill Serra,et al.  People, Places, Things: Web Presence for the Real World , 2002, Mob. Networks Appl..

[26]  Gregory D. Abowd,et al.  Charting past, present, and future research in ubiquitous computing , 2000, TCHI.

[27]  Gregory D. Abowd,et al.  Context-aware pervasive computing [Guest Editorial] , 2002 .

[28]  Glover T. Ferguson Have your objects call my objects , 2002 .