A special issue of International Journal of Electronic Business
Radio frequency identification (RFID) using radio frequency technology for automated identification is replacing the use of traditional barcode technology. It has been adopted for many uses such as inventory control and asset tracking. The technology allows multiple objects to be identified without line of sights by embedding within a product a unique imprinted identity. Furthermore, transient information can be updated or changed during the transition throughout production systems, warehouses, airliners, trucks, distribution centers, retailers, and finally to the end customers.
The use of RFID brings a second source of information to enterprise management. It is the "second source" because, in the conventional approach, the information is shared among the various departments through an integrated enterprise system or is shared among the partners to enhance the performance of the whole supply chain. However, very often, the information is not synchronized with the physical flow until the track-and-trace function is activated. A familiar scenario is that a production line is eager to but cannot use some parts on dock since the arrival of the parts has not been input into the enterprise system yet. With RFID, the logistic information of the arrival parts can actively pull the information from the system and synchronize both information flow and physical flow at one time.
This special issue is designed as a platform to address the issues of applying RFID in supply chains. We especially welcome case studies on RFID adoption as well as empirical works.
The topics include but are not limited to the application or the impact of RFID on the following and related areas:
- Logistics and supply chain management
- Decision models and process
- E-business management
- Quality management
- IT management
- Knowledge management
- Customer relationship management
- Operational strategy
- Outsourcing and international management
- Production and operation management
- Privacy and security
Full Paper Submission: 31 January, 2008
Inform Review Results: 31 March, 2008
Final Paper Submission: 30 April, 2008