IS Change and RFID Deployment Protocol: A Collaboration of Two Models

被引:0
|
作者
Pusatli, Tolga [1 ]
Lutton, Eugene [2 ]
Regan, Brian [2 ]
机构
[1] Atilim Univ, Dept Informat Syst Engn, Ankara, Turkey
[2] Univ Newcastle, Sch Design Commun & IT, Callaghan, NSW 2308, Australia
关键词
information system; change request; IS Maintenance/Replacement Model (ISMRM); radio frequency identification deployment methodology; RFID rationale and Deployment methodology; PRODUCTIVITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents our approach to explain information systems (IS) change in organisations and its applicability in the RFID (radio frequency identification) application management. It aims to investigate collaboration of these two models: an IS change model (Information System Maintenance/Replacement Model (ISMRM)) and RFID deployment model. Similar to other changes in business process and IT infrastructure, RFID deployment requires a business commitment, combined with a thorough analysis, planning and control to enable the organisation to obtain an optimal solution. To assist and guide an organisation in this activity a RFID Rationale and Deployment Methodology was developed, recently. As reported in the literature, this methodology is divided into three phases and has phase transitional motivators that are utilised to support the decision making during the possible deployment of RFID technology. Meanwhile, the ISMRM model lends support and extends the decision making process, within the RFID Rationale and Deployment Methodology, so that decision to implement such technology can be approved with additional factors of productivity, error/failure rate, available support facilities, user feedback, system specialisation and maintenance. This exploratory research concludes that there is a considerable potential for further research including implementation, testing and validation of the true linkages and purpose of the melding of these models.
引用
收藏
页码:258 / +
页数:2
相关论文
共 50 条
  • [21] Two models of political organization - Collaboration versus resistance
    Glass, JM
    AMERICAN BEHAVIORAL SCIENTIST, 1999, 43 (02) : 278 - 300
  • [22] Policy deployment: A review and comparisons of two best practices models
    Jolayemi, Joel K.
    TOTAL QUALITY MANAGEMENT & BUSINESS EXCELLENCE, 2009, 20 (08) : 877 - 902
  • [23] RFID Authentication of Academic Transcripts: In the Context of a RFID Rationale and Deployment Methodology
    Lutton, Eugene
    Regan, Brian
    Skinner, Geoff
    2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 170 - 173
  • [24] RFID light bulb: Enabling ubiquitous deployment of interactive RFID systems
    Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2017, 1 (02):
  • [25] Models of deployment
    Telephony, Suppl (14):
  • [26] Evaluation of Two RFID Traffic Models with Potential in Anomaly Detection
    Alkadi, Al
    Chi, Hongmei
    IEEE SOUTHEASTCON 2018, 2018,
  • [27] A general approach for the intensive RFID reader deployment
    Zhou, Shijie
    Luo, Jiaqing
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2014, 16 (03) : 206 - 215
  • [28] A field study of RFID deployment and return expectations
    Whitaker, Jonathan
    Mithas, Sunil
    Krishnan, M. S.
    PRODUCTION AND OPERATIONS MANAGEMENT, 2007, 16 (05) : 599 - 612
  • [29] Operational considerations in simulation and deployment of RFID systems
    Leong, Kin Seong
    Ng, Mun Leng
    Cole, Peter H.
    2006 17TH INTERNATIONAL ZURICH SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY, VOLS 1 AND 2, 2006, : 521 - +
  • [30] RFID Network Deployment Approaches for Indoor Localisation
    Zhang, Shumei
    McCullagh, Paul
    Zhou, Huiyu
    Wen, Zhe
    Xu, Zhengcheng
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON WEARABLE AND IMPLANTABLE BODY SENSOR NETWORKS (BSN), 2015,