IS Change and RFID Deployment Protocol: A Collaboration of Two Models

被引:0
|
作者
Pusatli, Tolga [1 ]
Lutton, Eugene [2 ]
Regan, Brian [2 ]
机构
[1] Atilim Univ, Dept Informat Syst Engn, Ankara, Turkey
[2] Univ Newcastle, Sch Design Commun & IT, Callaghan, NSW 2308, Australia
关键词
information system; change request; IS Maintenance/Replacement Model (ISMRM); radio frequency identification deployment methodology; RFID rationale and Deployment methodology; PRODUCTIVITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents our approach to explain information systems (IS) change in organisations and its applicability in the RFID (radio frequency identification) application management. It aims to investigate collaboration of these two models: an IS change model (Information System Maintenance/Replacement Model (ISMRM)) and RFID deployment model. Similar to other changes in business process and IT infrastructure, RFID deployment requires a business commitment, combined with a thorough analysis, planning and control to enable the organisation to obtain an optimal solution. To assist and guide an organisation in this activity a RFID Rationale and Deployment Methodology was developed, recently. As reported in the literature, this methodology is divided into three phases and has phase transitional motivators that are utilised to support the decision making during the possible deployment of RFID technology. Meanwhile, the ISMRM model lends support and extends the decision making process, within the RFID Rationale and Deployment Methodology, so that decision to implement such technology can be approved with additional factors of productivity, error/failure rate, available support facilities, user feedback, system specialisation and maintenance. This exploratory research concludes that there is a considerable potential for further research including implementation, testing and validation of the true linkages and purpose of the melding of these models.
引用
收藏
页码:258 / +
页数:2
相关论文
共 50 条
  • [31] An Algorithm for Deployment of RFID Readers in EPC Network
    Zhang, Dingyi
    Zhu, Yunlong
    Chen, Hanning
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12364 - 12367
  • [32] Research on Test based RFID Deployment Simulator
    Zeng, Junfang
    Liu, Yu
    Liu, Chong
    Li, Dan
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 1142 - +
  • [33] A Heuristic Algorithm for Broker Deployment in RFID Applications
    Qian, Yifeng
    Jin, Beihong
    Cao, Donglei
    ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, : 227 - +
  • [34] Security Protocol Deployment Risk
    Foley, Simon N.
    Bella, Giampaolo
    Bistarelli, Stefano
    SECURITY PROTOCOLS XVI, 2011, 6615 : 12 - +
  • [35] The hospice-nursing home collaboration: Two models that work
    Chichin, Eileen
    Downes, Deirdre
    Philpott, Aimee
    Resnick, Thea
    Sauer, Olive
    JOURNAL OF PALLIATIVE CARE, 2006, 22 (03) : 217 - 217
  • [36] PACE and hospice: two models of palliative care on the verge of collaboration
    Ryan, SD
    Tunk, M
    Lee, M
    CLINICS IN GERIATRIC MEDICINE, 2004, 20 (04) : 783 - +
  • [37] COLLABORATION IN CHANGE
    ERNST, K
    DIABETES EDUCATOR, 1995, 21 (06): : 505 - 505
  • [38] An Improved RFID Search Protocol
    Wang, Ping
    Zhou, Zhiping
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 843 - 848
  • [39] On a Lightweight Authentication Protocol for RFID
    Nastase, George-Daniel
    Tiplea, Ferucio Laurentiu
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, 2015, 9522 : 212 - 225
  • [40] RFID Tag Filtering Protocol
    Inuma, Manabu
    Otsuka, Akira
    Inatomi, Yasuaki
    Minemura, Atsushi
    Takehisa, Tatsuya
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,