Effectiveness and Efficiency of RFID technology in Supply Chain Management: Strategic values and Challenges

In this study, we examine the fundamental components of RFID technology in a comprehensive supply chain strategy that directly support the effectiveness and efficiency of supply chain management. We examine the appropriate business processes affected by the RFID technology, the required planning and examination for successful implementation, and many potential impacts on effectiveness and efficiency of supply chain management. We emphasize on business values and strategic advantages of RFID technology as well as the challenges and recommendations in adoption of the technology particularly when a company extends its supply chain to upstream suppliers and downstream customers, as their external integration needs to gain in capacity planning and in efficiency. Using four major supply chain processes, we highlight economic opportunities and challenges when planning and implementing RFID technology within an existing supply chain framework. We will focus on the capabilities of RFID in providing security, privacy, and integrity of supply chain processes while facilitating sharing information with upstream suppliers and downstream customers, developing alliances, establishing strategic alliances, and gaining competitive advantages.

[1]  Dennis Viehland,et al.  The Future of Radio Frequency Identification , 2007, J. Theor. Appl. Electron. Commer. Res..

[2]  Rebecca Angeles,et al.  Rfid Technologies: Supply-Chain Applications and Implementation Issues , 2004, Inf. Syst. Manag..

[3]  Peter G. Keen,et al.  The Freedom Economy: Gaining the mCommerce Edge in the Era of the Wireless Internet , 2001 .

[4]  Trisha Greenhalgh None of our business? , 1998 .

[5]  Ganesh Vaidyanathan,et al.  EFFICIENCY OF RFID IN SUPPLY CHAIN MANAGEMENT: STRATEGIC BENEFITS AND CHALLENGES , 2007 .

[6]  Hau L. Lee,et al.  Unlocking the Value of RFID , 2007 .

[7]  Irvine Clarke,et al.  Emerging Value Propositions For M-Commerce , 1970, Journal of Business Strategies.

[8]  Anil Kumar,et al.  We Love Your Product, but Where Is It? , 1992 .

[9]  Lee Tien,et al.  None of Our Business , 2004 .

[10]  Keely L. Croxton,et al.  The Supply Chain Management Processes , 2001 .

[11]  Hau L. Lee,et al.  Higher supply chain security with lower cost: Lessons from total quality management , 2005 .

[12]  Bill Anckar,et al.  Value-added services in mobile commerce: an analytical framework and empirical findings from a national consumer survey , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[13]  Koutarou Suzuki,et al.  RFID Privacy Issues and Technical Challenges , 2005, IEEE Engineering Management Review.

[14]  M. Kärkkäinen,et al.  Increasing efficiency in the supply chain for short shelf life goods using RFID tagging , 2003 .

[15]  D. Lambert,et al.  SUPPLY CHAIN MANAGEMENT -- MORE THAN A NEW NAME FOR LOGISTICS , 1997 .

[16]  A. Gunasekaran,et al.  Software Agents: Enabling Dynamic Supply Chain Management for a Build to Order Product Line , 2002, International Conference on Internet Computing.

[17]  Thomas Neubauer,et al.  A research agenda for Autonomous Business Process Management , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[18]  Munir Mandviwalla,et al.  Integrating the Supply Chain with RFID: A Technical and Business Analysis , 2005, Commun. Assoc. Inf. Syst..

[19]  Nitin Singh,et al.  Emerging technologies to support supply chain management , 2003, CACM.

[20]  Katina Michael,et al.  Is it the End of Barcodes in Supply Chain Management , 2005 .

[21]  J. L. Cavinato WHAT'S YOUR SUPPLY CHAIN TYPE? , 2002 .

[22]  Bernard Eydt,et al.  Guidelines for Securing Radio Frequency Identification (RFID) Systems | NIST , 2007 .

[23]  Daniel L. Sherrell,et al.  Communications of the Association for Information Systems , 1999 .

[24]  Raktim Pal,et al.  Auto-ID: managing anything, anywhere, anytime in the supply chain , 2005, CACM.

[25]  Philip Damas,et al.  MEGA-PORT GROUPS BACK SECURITY PILOT. , 2002 .

[26]  Robert C. Nickerson,et al.  Issues in Mobile E-Commerce , 2002, Commun. Assoc. Inf. Syst..