IS Change and RFID Deployment Protocol: A Collaboration of Two Models

被引:0
|
作者
Pusatli, Tolga [1 ]
Lutton, Eugene [2 ]
Regan, Brian [2 ]
机构
[1] Atilim Univ, Dept Informat Syst Engn, Ankara, Turkey
[2] Univ Newcastle, Sch Design Commun & IT, Callaghan, NSW 2308, Australia
关键词
information system; change request; IS Maintenance/Replacement Model (ISMRM); radio frequency identification deployment methodology; RFID rationale and Deployment methodology; PRODUCTIVITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents our approach to explain information systems (IS) change in organisations and its applicability in the RFID (radio frequency identification) application management. It aims to investigate collaboration of these two models: an IS change model (Information System Maintenance/Replacement Model (ISMRM)) and RFID deployment model. Similar to other changes in business process and IT infrastructure, RFID deployment requires a business commitment, combined with a thorough analysis, planning and control to enable the organisation to obtain an optimal solution. To assist and guide an organisation in this activity a RFID Rationale and Deployment Methodology was developed, recently. As reported in the literature, this methodology is divided into three phases and has phase transitional motivators that are utilised to support the decision making during the possible deployment of RFID technology. Meanwhile, the ISMRM model lends support and extends the decision making process, within the RFID Rationale and Deployment Methodology, so that decision to implement such technology can be approved with additional factors of productivity, error/failure rate, available support facilities, user feedback, system specialisation and maintenance. This exploratory research concludes that there is a considerable potential for further research including implementation, testing and validation of the true linkages and purpose of the melding of these models.
引用
收藏
页码:258 / +
页数:2
相关论文
共 50 条
  • [11] RFID Deployment at an Airport: A Simulation Study
    Saygin, Can
    Natarajan, Balaji
    PROCEEDINGS OF THE 36TH INTERNATIONAL MATADOR CONFERENCE, 2010, : 139 - 142
  • [12] EMC Considerations in deployment of RFID Systems
    Jamali, Behnam
    Bates, Bevan D.
    ELECTROMAGNETIC COMPATIBILITY SYMPOSIUM 2009, SYMPOSIUM PROCEEDINGS, 2009, : 8 - 12
  • [13] READER CELLULAR DEPLOYMENT FOR RFID SYSTEM
    Zhao, Junhui
    Zhang, Xuexue
    Guan, Shenchun
    Yang, Wei
    PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 44 - +
  • [14] A Survey of RFID Deployment and Security Issues
    Grover, Amit
    Berghel, Hal
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (04): : 561 - 580
  • [15] A methodological approach to optimizing RFID deployment
    Cheung, Benny C. F.
    Ting, S. L.
    Tsang, Albert H. C.
    Lee, W. B.
    INFORMATION SYSTEMS FRONTIERS, 2014, 16 (05) : 923 - 937
  • [16] A Framework for RFID Deployment in Supply Chains
    Bradley, James R.
    Guerrero, Hector H.
    IT PROFESSIONAL, 2010, 12 (04) : 44 - 50
  • [17] Optimal layout and deployment for RFID systems
    Huang, Han-Pang
    Chang, Ying-Ting
    ADVANCED ENGINEERING INFORMATICS, 2011, 25 (01) : 4 - 10
  • [18] A Lightweight RFID Authentication Protocol using Step by step Symmetric Key Change
    Kim, Kyoungyoul
    Chung, Kyungho
    Shin, Juseok
    Kang, Hyunwoo
    Oh, Sejin
    Han, Chunho
    Ahn, Kwangseon
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 853 - 854
  • [19] An Improved Two-Way Security Authentication Protocol for RFID System
    Liu, Baolong
    Yang, Bing
    Su, Xiaohao
    INFORMATION, 2018, 9 (04)
  • [20] A Modified Two-way Authentication Protocol without Server for RFID
    Lu Xin-mei
    He Lei
    APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 2709 - +