Sie sind auf Seite 1von 10

92 July 2007/Vol. 50, No.

7 COMMUNICATIONS OF THE ACM


BY FRED NIEDERMAN,
RICHARD G. MATHIEU,
ROGER MORLEY, AND
IK-WHAN KWON

EXAMINING
APPLICATIONS IN SUPPLY
RFID
CHAIN MANAGEMENT
Technology

R
adio Frequency Identification
(RFID) is an emerging tech- infrastructure,
nology recently in the news as a
result of large organizations, business process,
most notably Wal-Mart and and managerial
the U.S. Department of Defense, requiring issues must be
shipment of goods identifiable by RFID addressed by IT
tags. In Europe, the Metro Group, the fifth- practitioners as
largest retailer in the world, has teamed with
SAP, Intel, and IBM to form the Future they adapt to the
Store Initiative (www.future-store.org). This business changes
group is using a combination of different associated with the
technologies in a test store to learn whether diffusion of RFID
an integrated information system can lower technology in the
cost by improving inventory management,
consumer information gathering, and supply chain.
checkout procedures. As of March 2006, i
ILLUSTRATION BY PETER HOEY

COMMUNICATIONS OF THE ACM July 2007/Vol. 50, No. 7 93


Wal-Mart reported establishing RFID programs with supply chain information requirements. As these
more than three times the 100 major suppliers initially technical challenges find engineered solutions,
targeted in 2005 [10]. Extensive RFID programs have organizations will have a new longer-range set of
also been established by the U.S. Department of challenges to create significant economic value.
Defense. These will revolve around justifying initial invest-
ment in the technology that would appear to

O
perationally, RFID allows data from involve tangible costs but less tangible benefits;
a tag attached to a pallet, case, or developing the information systems solutions that
individual product to be captured would integrate data derived from RFID into busi-
by a reader device. Functionally, this ness processes; and developing the “feedback-
data can be used to identify all of loops” such that new sources of information
these items passing the reader’s loca- generate more efficient and effective business
tion at a point in time. This technology provides a processes and decision making.
means of tracking items from supplier through the dis- Here, we identify the range of issues IT practi-
tribution network to the point of consumption. tioners are likely to confront in fully implementing
Recent advances have lowered the cost of tags such RFID technology. These issues and ideas are dis-
that passive (not battery powered) tags are beginning cussed within a data life cycle framework to help
to approach commercially viable levels. organize the wide range of topics into related sets.
The goal of RFID technology applied to the Because this technology was relatively new and the
retail supply chain is to streamline inventory man- authors knew of no examples of fully instantiated
agement by providing views of product shipments RFID-integrated information systems in supply
and inventory levels at unprecedented levels of chain management, the framework is presented as a
detail [11]. By providing precise data on product helpful viewpoint rather than as a validated optimal
location, product characteristics, and product approach.
inventory levels, RFID promises to eliminate man- The key issues organizations will face in deriving
ual inventory counting, warehouse mispicking, and maximum benefit from RFID technology as it
order numbering mistakes. The ultimate goal is the matures are previewed here. Most prior research
reduction of inventory and increased product sales found in the ACM digital library pertaining to
in the retail supply chain. RFID application development falls into two cate-
From an information systems perspective, RFID gories. Either it demonstrates the potential of
can be viewed as another technology for capturing futuristic applications such as the use of RFID in
source data. But the characteristics of RFID in the ubiquitous computing for outdoor educational
supply chain context—that it can be read unat- experiences (see [12]) or focuses on issues of pri-
tended, in groupings of various sizes, through some vacy and ethical use of RFID information, (see [1,
materials and with a level of flexibility regarding 4]). Although both are important topics, they do
orientation and positioning between tag and not need to be discussed again here; instead, we
reader—creates the possibility that RFID use will focus specifically on RFID use in supply chain
become transformational. Rather than simply sub- management.
stituting for existing technologies such as bar codes
within current processes, it holds the promise of RFID BACKGROUND
process innovations that create orders of magnitude RFID technology is derived from World War II-era
improvements in supply chain business models. techniques to allow aircraft to identify themselves
Achieving such benefits will require integrating to other friendly aircraft and commanders on the
RFID technology into supply chain operations. ground. Before the invention of the transistor and
Currently, from a supply chain perspective, sev- the evolution of microelectronics, the technology
eral major technical challenges exist for firms wish- was large, heavy, and consumed massive amounts
ing to initiate RFID programs. These challenges of power. In the 1970s, Sandia National Laborato-
revolve around the mechanics of reading RFID ries began incubating commercial applications and
tags in the context of “shop floor” realities. Some of launching businesses. One of these was the Amtech
these challenges are due to difficulties with deflec- Corporation, which commercialized animal tagging
tion and refraction from materials such as metal, (still used today to identify pets), and the motor
glass, and liquids; difficulties with angles and vehicle account tag used on some toll roads starting
reception; and difficulties attaining the levels of in the 1980s. At about the same time, industrial
volume and speed required to support industrial applications in manufacturing automation, ware-

94 July 2007/Vol. 50, No. 7 COMMUNICATIONS OF THE ACM


Figure 1. Data Life Cycle stages for RFID-generated
data in supply chain management.

Data Life Cycle Framework organizations in a standardized format. Today as


Physical Supply Chain
Tags
Organization Application Environment suppliers struggle to implement RFID solutions,
they are just beginning to grapple with the issue of
Stage 1:
Source Data
Stage 2:
Integrating
Stage 3:
Integrating
how to integrate new RFID with existing enterprise
Acquisition within the
enterprise
across
organizations data [11]. Considering the investment in the
mechanics of using RFID is significant and tangi-
ble, the leverage gained from that information being
Stage 4:
Data warehousing
Stage 5 and 6:
Archiving,
able to streamline not only internal business
and analytical
processing
deletion,
and disposal
processes but to create efficiencies between business
partners is also important in shaping the discussion
of ultimate costs and benefits of diffusion of this
technology.

house automation, and asset RFID DATA THROUGH ITS LIFE CYCLE
Figure 1. Data life cycle
stages for RFID-generated
tracking were deployed. In the In order to examine the challenges and opportuni-
data in supply chain
management. 1992–1994 timeframe, the ties for IT professionals in RFID implementation,
Niederman fig 1 (7/07)
North American rail industry it is useful to follow the data generated by reading
deployed the Amtech technology for tracking rail an RFID tag and to consider the journey of that
equipment, tagging over 30,000 locomotives and data as it travels through the data life cycle. Under-
1.2 million rail cars and deploying reader devices at standing the data life cycle is important to under-
key control points along the railroad right-of-way. standing the nature of data. (Note also that we
Figure 2. Typical applications and data within
From 1998 through 2003, leadership of retail present something of an ideal view of the journey
the supply chain data lifecycle.
initiatives has been centered at MIT where in 1999 of particular data from beginning to end of the life
the AutoID center was established. In late 2003, cycle while recognizing that at each identified stage
the AutoID Center at MIT officially closed and technical and organizational issues must be
transferred its intellectual prop-
erty to EPC Global. (It is impor- Stage 4: Warehousing and analytical processing
tant to note that EPC Global Physical Supply Chain
Tags Antenna
standards relate only to the Reader Supply Chain Enterprise
Order Customer Rel.
deployment of RFID into the Management Management
EPC Global
IS*

retail supply chain.) The pres-


Transportation Production
sure is intense within enterprises Management Management EDI**

facing a mandate to comply with Controller


Warehouse
the Electronic Product Code Management
Supplier Rel.
Management E-Mail

(EPC) Global standard, a joint


venture of the Uniform Code
Council and European Article Operational
Data Store
Operational
Data Store

Numbering (EAN) Interna- Extraction, summarization, organization


Operational
tional, the body that administers Analysis
Decision Support,
the EAN standards worldwide. Managers
Operational
Analysis
Quantitative Analysis,
Modeling,
Enterprise Data
Warehouse
(See www.epcglobalinc.org for a Workers
Executives
Operational
IS = Information Service
Analysis
comprehensive description of the EDI = Electronic Data Interchange

EPC Global mission, strategy,


and objectives.)
Figure 2. Typical appli-
EPC Global standards are cations and data within resolved before such a journey can become routine
attracting significant attention the supply chain data and cost effective.) Redman proposed a data life
because of the Wal-Mart man- life cycle.
cycleNiederman
that includes figtwo 2 (7/07)cycles: the data acquisition
date that its top suppliers begin cycle and the data usage cycle [5]. Recently, there
adopting them. Also, several has been a renewed interest in the data life cycle as
other large retailers have joined the initiative, and IT vendors are developing policy-driven automated
the U.S. Department of Defense has issued a policy storage architectures that are able to manage data
directing its suppliers of similar product to comply from beginning to end [2]. For the purposes of this
as well. The standard is also important in establish- article, we view the data life cycle in a series of six
ing the potential for use of RFID information across stages:

COMMUNICATIONS OF THE ACM July 2007/Vol. 50, No. 7 95


Table I: Issues in implementing RFID Applications –
Data Life Cycle (Stages 1 and 2) vs. System Layers

• Source data acquisition (read- DATA LIFE Technology Application Business Management
ing RFID data and integrat- CYCLE Infrastructure Logic Process
ing with other source data); 1. Source Performance, Business logic – Integration with Responsibility for
data speed, and capturing the range physical processes/ investigating exceptions/
• Integrating source data with acquisition capacity of valid actions logistics/industrial recognizing new
enterprise transactions sys- (reading
data and Optimal Missing data
engineering problems

tems; integrating processor, data Identifying elemental Responsibility for


with other storage, and Unwanted data logical operations – standard variations in
• Integrating data across organi- source data) network definition of business process/organizational
bandwidth Information overload events learning
zations; elements and filtering (too
• Data warehousing and ana- Accuracy
much wanted data) Timing so that
reading occurs at
Metrics/evaluation
(error rates,
lytic processing; Generate metrics correct point(s) throughput)
• Data archiving (backup and 2. Integrating Performance, Integration with Discovery of Availability of
replication); and within the
enterprise
speed, and
capacity
business units’
information
business logic
exceptions
programmers for
maintaining
• Data deletion and disposal. (integration manufacturing system
with Timing Cross references Application design/
enterprise between RFID development Responsibility for
systems and
Reliability information and investigating exceptions/
These stages are illustrated in supply chain Covering basic
other enterprise recognizing new problems
the supply chain management Optimal
applications)
processor, data
system keys
operations
Responsibility for standard
context by Figures 1 and 2. storage, and Normalization and Imaginative new variations in process/
network concentration of programs organizational learning
Each conceptual stage presents bandwidth information by
challenges and opportunities elements logical entity Potential performance Company specific
implications of architecture knowledge
for the use of information to Middleware enterprise update on
operational process Metrics/evaluation
enhance supply chain activities
within and among organiza-
tions. Though this sequence is Table 1. Issues in necks that inhibit the organization’s ability to
logical in terms of aggregation, implementing RFID maintain the speed of the business activity where
it should not be taken as literally applications: Data life
cycle (stages 1 and 2)
Niederman
the RFID is deployed.table 1 (7/07)
describing the sequence of vs. system layers.

O
actions in actual usage. For nce elemental data (originating
example, in some scenarios from RFID) has been received and
RFID data might be used along with interorganiza- validated, it is likely that additional
tional data concurrently in performance of a partic- information will be added includ-
ular business task. Nevertheless, the stage framework ing time, temperature, location,
provides a logical way of decomposing the poten- and similar indicators. This exten-
tially highly complex and recursive nature of using sion of data surrounding RFID messages is being
RFID data. called “sensor-based computing” by practitioners at
It is a reality of RFID deployment that, to be suc- Oracle [7]. For the item being identified, it is self-
cessful, it involves changes in organization, business evident to human workers where the tag is being
processes, and application systems. Therefore, analy- read, but for downstream use of this data, time and
sis of the data life cycle involves examination along location information needs to be added.
these dimensions. Dividing application systems into Programming logic for the disposition of
infrastructure and logic, we present our analysis in expected and unexpected RFID-generated data will
subdivisions: technology infrastructure; application need to occur at each stage in a supply chain both
logic; business process; and management. Details internally to an organization and among organiza-
regarding RFID at each stage on each dimension are tions. Accurate timing of such messages will also be
presented in Tables 1 and 2. critical. As a simple example, timing calculation
Source Data Acquisition. An IT perspective on must account for time zone changes so that items
RFID begins with initial handling of the data gen- don’t appear to arrive before they are sent. Further,
erated by the RFID reader. All readers and con- the meaning of each tag reading may need to be clar-
trollers must be able to distribute data to the ified with additional information. For example, does
operational applications in distant locations. This a message indicate shipment of goods, receipt of
implies that all devices capturing data must be con- goods, movement into or out of inventory, or tem-
nected either through wired or wireless networks. porary removal for inspection by a customer versus
The key will be to ensure all physical elements of permanent removal for sale or disposal?
the system have sufficient capacity so that data is From an application logic perspective, much
received, processed, and moved without bottle- work needs to be done handling too much, too lit-

96 July 2007/Vol. 50, No. 7 COMMUNICATIONS OF THE ACM


Table 2. Issues in implementing RFID Applications –
Data Life Cycle (Stages 3-5) vs. System Layer.

DATA LIFE Technology Application Business Management for downstream analysis of


CYCLE Infrastructure Logic Process incoming orders.
3. Integrating Performance, HW and SW Imaginative new Deciding what to share
across speed, and capacity engineering programs / value and what not to share Integration with Enterprise
organizations
(communication Timing and Standard Web tools
added services (and with whom) Systems. Organizations will
and Reliability Potential performance Negotiation with face different sets of issues in
coordination Transaction implications of partners
with EPC Optimal processor, information partner system integrating RFID with existing
Global, EDI
and/or email
data storage,
and network
standards response on
operational process
Ethics, liability, public
perceptions/ privacy
systems depending on the type
applications) bandwidth Translation of firm of systems they already have. We
elements specific information Metrics/evaluation
to commonly anticipate four basic scenarios:
Architecture accessible languages
and Security organizations with relatively ad
4. Data Massive amounts Aggregating the Add decision systems Emphasis on knowledge
hoc business processes will gen-
warehousing of data and data at multiple new levels management (creation, erate flat files from RFID and
and analytic potential storage, transfer)
processing capacity issue Data cleansing Knowledge creation sensor data and provide this data
DSS, data mining,
(Smart shelves,
in-store customer
Allow new layers
of drilldown in
for manipulation by existing
visualization, behaviors, end-to-end operational events applications; organizations will
knowledge supply chain analysis
management tools Metrics/evaluation build new relational databases,
5. Archive Telecom -- Metrics/evaluation systems, and processes (manual
(backup and
replication)
middleware and automated) to interact with
existing enterprise systems; orga-
6. Deletion Automated Policies for when Processes for Legal issues
and Disposal storage solutions data no longer deleting and nizations will work with vendors
needed disposing of data Records management to build capabilities into the
enterprise systems such that they
tle, and unexpected data. For example, the tag will Table 2. Issues in handle the data originating from
implementing RFID
respond repeatedly to a reader’s request for data as applications: Data life
the RFID sources; or organiza-
long as the two Niederman table
are in proximity. In2many
(7/07)cases, cycle (stages 3 through tions with custom legacy sys-
only the ultimate arrival and departure of the item 5) vs. system layers. tems will take this opportunity
(change of state) will be useful to downstream to convert to enterprise systems
applications. and simultaneously address sys-
To the extent that semantics of the data are tem integration and utilization of RFID capabili-
accounted for, some strategies found to be useful in ties. Each of these scenarios presents opportunities
other high throughput, online tasks, such as the and risks. Similarly, the amount of investment in
distribution of financial data, can be employed and optimization of bar code scanning technology
with RFID. Palmer identifies seven such strategies will affect the distribution of costs and benefits
including process data close to its source, cluster from shifting to RFID. In the long run, however, as
various pieces of data into logical events, utilize RFID becomes pervasive and is integrated with
data concentrators, cache contextual information, other sensor information, opportunities may arise
federate data locations for more efficient distribu- to use this richer information to create innovative
tion of data among sites, continuously filter data new business models.
events, and automate exception handling [3]. Vendors such as SAP, Oracle, Sun, Peoplesoft,
While it certainly doesn’t pay to store redundant or IBM, and Microsoft are currently deploying vari-
non-useful data, the planning for these strategies, ous middleware approaches toward the integration
particularly filtering, must be undertaken carefully of RFID with their existing product offerings. For
so that elements necessary for later analysis are not example, SAP is reported to have developed a mid-
removed permanently. dleware layer, named the Auto-ID Infrastructure,
From a management perspective, it will be that routes data from readers to applications
important to build systems that are robust enough (including multiple communication and sensing
that such data will be collected and integrated even devices such as RFID readers and printers, Blue-
when pressured human operators are more con- tooth devices, embedded systems, and bar-code
cerned with “getting the job done” than ensuring devices) and triggers appropriate events using a
accurate acquisition of information needed only at rules engine [6]. This approach is likely to empha-
later stages in the business process. Capitalizing on size reformatting incoming data for use with legacy
imaginative supply chain applications may require systems of various types.
extremely close to 100% accuracy in upstream From a technology infrastructure perspective,
operations and millisecond (or faster) time frames accuracy and planning for contingencies will be

COMMUNICATIONS OF THE ACM July 2007/Vol. 50, No. 7 97


critical. Downstream operations cannot be stopped and content of RFID messages (integrated with
without undue cost if data from upstream opera- other sensor data) while simultaneously reconsider-
tions has been lost, misdirected, or become inaccu- ing business processes and the IT supporting them.
rate. This also raises issues of capacity and assuring From a management perspective, the key issue
that storage, processing, and network capacities are will be balancing innovation and the effort to
sufficient for handling with the vast quantities of achieve competitive advantage against the risks and
data generated by RFID and the processes with costs associated with groundbreaking activities. The
which they may interact. costs of handling the vast amount of data generated
by RFID will be largely tangible and occur early in

A
key issue in implementing such a the data life cycle while the benefits will depend on
system will be developing appro- the quality of data collection, will require added
priate business rules, particularly effort and investment, remain largely intangible,
for handling new exceptions that and be recovered later in the business cycle. More-
arise from having the increased over, those firms aggressively committed to analysis
amount of data generated from and reorganization of business processes will have
RFID use. It can be expected that in many cases the risk that improvements will either not be found
explicit rules will need to be created for program- or be too difficult to implement.
ming business activities where informal methods Integrating Across Organizations. Much of the
are currently in use. rationale for adopting the EPC Global architecture
From an application logic perspective, it will be in the retail supply chain is to facilitate sharing of
critical to normalize data. This is significant for information among supply chain participants such
dealing with dependencies and assignment of as supplier, manufacturer, shipper, and customer in
attributes to proper entities and in the managerial order to provide near-real-time inventory visibility.
sense of ensuring that terms are unambiguously The value created by this process is reduced cost
and appropriately defined for business needs. and improved competitiveness of the cooperating
While it addresses ways to automate data input enterprises. Cost reductions will result from reduc-
into current business processes, in the long run, it is ing the amount of inventory and increasing logis-
likely that the presence of RFID will present oppor- tics efficiency in the supply chain. These include
tunities to develop innovative business models and the cost of carrying the asset, direct network costs
to reengineer existing supply chain processes. such as warehousing and transportation, and obso-
Examples can be found for many common supply lescence. Better visibility will also reduce the inci-
chain activities. The ability to determine time and dence of expensive interventions to avoid
location of reading from unique items will provide undesirable shortages. Improved competitiveness
opportunities to identify bottlenecks. When com- will result from higher customer satisfaction and
bined with value of shortened cycle time, this infor- market responsiveness, and from the ability to dif-
mation can also potentially influence delivery ferentiate commodity products with creative logis-
priorities where resources are constrained. The abil- tics and marketing programs.
ity to determine where a particular object is and has The EPC Global architecture originated at the
been can solve many supply chain problems includ- Auto-ID center at MIT. Key principles underlying
ing the ability to shorten the time to effect product this architecture included minimizing functional-
recalls and removal of outdated products, programs ity on the chip (and thereby lowering the cost); a
to decrease product counterfeiting, decrease occur- product identification scheme that involved the
rences of out-of-stocks, and reduction of shrinkage, enterprise, the product, and the item; using the
and diversion of products. The ability to locate Internet to store and share information about the
inventory can shorten the time for finding a prod- item; and open standards. The core component of
uct as it moves between production floor, ware- this architecture is the product identifier, now
house, and showroom floor. Use of RFID-generated called the Electronic Product Code (EPC). The
information may allow the clustering of small pack- EPC is a set of format standards for encoding prod-
ages from various sources heading toward the same uct identification data on the tag. In the original
destination early in the distribution channel or auto- concept, the EPC had four components, header,
mate dynamic rerouting as information regarding EPC manager (the enterprise,) object class (the
travel conditions or package priorities change. One product,) and serial number (the item). The origi-
related challenge will be dealing with the dynamic nal standard is being replaced by a more complex
aspects of systems change—designing the structure structure to ease the transition from existing stan-

98 July 2007/Vol. 50, No. 7 COMMUNICATIONS OF THE ACM


dards. The other components of the architecture Finally, the management impacts of EPC Global
include: compliance will include the need to set policy with
respect to the trading partner relationships and
• Information Service (IS). A repository of the negotiating with trading partner management.
enterprise’s product information, indexed by There will also be a need to manage cultural expec-
EPC and accessible via the Internet; tations at all levels as trading communities move
• Object Name Service (ONS). A global registry from a world of point-to-point relationships to
of EPC information; and massive collaboration. The current initiatives of
• Product Markup Language (PML). A markup Wal-Mart and others constitute a limited step
language specific to EPC data storage and toward the full EPC Global vision. There are no
retrieval. current plans to tag and identify individual inven-
tory items, only transportation units (pallets, car-

P
lans for an ONS that mirrors Internet tons, cases, and other packaging). Until inventory is
domain name addressing present a nearly identified at the item level, the benefits of and
overwhelming set of opportunities and requirements for the IS, ONS and PML are limited.
challenges. For example, infrastructural Data Warehousing/Analytical Processing. To
challenges of integrating across organiza- this point, expected benefits from the addition of
tions will include creating and supporting RFID-generated data have been discussed in terms
applications that enable other enterprises to access of efficiencies in supply chain operations and new
their information systems. This will likely require the applications that could provide new services or pro-
development of additional security capabilities. vide additional efficiencies. However, the separa-
The IS can be viewed essentially as a new appli- tion of physical products and information about
cation. It must be designed and implemented either them may have its most dramatic influence in sup-
by the participating enterprise or by a third-party porting decision making and other managerial
service. In addition to the core function of the IS, activities. The RFID data warehouse must main-
application logic will be required to support a mul- tain a significant amount of data for decision mak-
tidimensional security model, and to maintain ing. Historical and current data is required from
ONS registration. Full compliance with the EPC supply chain partners and from various functional
Global architecture will also include PML support, areas within the firm in order to support decision
and this may impact the logic of existing internal making in regard to planning, sourcing, produc-
applications. tion, and product delivery. Supply chains are
Business process impacts include the coordina- dynamic in nature. In a supply chain environment
tion of PML dialects with trading partners and the it may be desirable to learn from an archived his-
administration of the multidimensional security tory of temporal data that often contains some
model mentioned previously. Two decades of expe- information that is less than optimal. In particular,
rience with EDI have demonstrated that even with these environments are typically characterized by
a relatively rigid format standard for interenterprise variable changes in product demand, supply levels,
message management, trading partners must coor- product attributes, machine characteristics, and
dinate their individual implementation of those production plans.
standards. The use of PML will create similar Though there is cost associated with storing this
requirements such as developing understandings data, there is potential value as a raw material for
with partners regarding the definition of exchanged knowledge creation, decision support, and data
information, the timing of messages, and the inves- mining. The nature of this data is threefold: items
tigation and resolution of apparent exceptions can be identified at finer levels of individuality;
resulting from operational mistakes, data entry there are many more business events for an item
errors, and true business misunderstandings. Since (events can be disaggregated into parts); and being
the EPC Global architecture provides for the access serialized, individual steps in a sequence have an
of one enterprise’s data by another enterprise, each identity. This opens whole new fields for analysis.
party will need a process to administer the security Not just 20 items leaving a warehouse and 10 arriv-
of its information. At a minimum, the identifica- ing at another location, but which items arrived, by
tion, authentication, and authority of each partici- what route, and how long they were stored.
pant in the relationship must be specified with From a technology infrastructure perspective,
respect to what functionality may be used and what issues will involve selecting and implementing the
data may be accessed. right set of decision support systems and knowl-

COMMUNICATIONS OF THE ACM July 2007/Vol. 50, No. 7 99


edge support tools as well as organizing the data to other transaction systems that are critical for busi-
maximize the trade-off between capturing all pos- ness operations, received in high volume, and of
sible data and retaining a size that is manageable high short- and long-term value.
for ad hoc as well as programmed queries. Applica- Deletion and Disposal. The automated deletion
tion logic will be important in assuring the cleans- and disposal of data records could be a significant
ing and structuring of data as it enters the data issue in an RFID-saturated IT environment.
warehouse and in the design of standard manage- Because of the volume of data, it will almost cer-
ment reporting processes. Although the motivation tainly be necessary to use automated storage tech-
for using RFID in large part revolves around nologies based, in all likelihood, on rules ranging
streamlining operations, Shapiro estimates that from simple time-oriented to complex subject- or
80% of the data in a transactional database that source-oriented differentiations. These rules will be
supports supply chain management is irrelevant to critical for maximizing the value of historic data
decision making, and that data aggregations and and meeting legal obligations without incurring
other analyses are needed to transform the other disadvantageous data storage costs. Organizations
20% into useful information [8]. The value of the will need to perform risk assessment to consider
data warehouse and the collection of RFID process issues such as: How likely is it that we will need
will primarily be in the discovery of new relation- this data again? What are the consequences of not
ships and opportunities for process redesign. having this data? What is the cost of keeping the
Specifically within the supply chain context, this data? And does the data have potential future
information can aid in logistics network design, research value of a currently unknown type?
supply chain planning, and vehicle routing and
scheduling [9]. It can potentially also provide new CONCLUSION
business insights. IT managers will need to con- We have used a data life-cycle framework to dis-
sider trade-offs in developing standalone RFID- cover and illuminate key issues that will face IT
oriented data warehouses versus integrating practitioners as they approach business changes
RFID-oriented data with other organizational resulting from the diffusion of RFID technology.
information from marketing, finance, and We have considered these issues along the dimen-
accounting areas. From a management perspective, sions of technology infrastructure, application
RFID information provides the potential to move logic, business process, and managerial concerns.
companies toward the integration of marketing In conducting this analysis, we also noted some
and operations and financial information. The dis- issues that persist across the life cycle, particularly
solution of barriers in these areas will have signifi- in the case of scalability and performance. How-
cant implications for the way organizational ever, it is important to note that at each stage in the
structures are drawn, the range and type of skills data life cycle, managers will need metrics related
needed by managers, and the approach toward to both business and technical performance. These
business problems and service of customers that metrics will vary with the stage but in all cases
organizations can take. should relate to the overall value created from the
Archive (Backup and Replication). Archiving use of RFID technology as well as the efficient
data is a fairly well understood process throughout operation of information services at each stage.
organizations. By their very nature, RFID applica- Additionally, security issues abound. Though they
tions will be generating large amounts of data. For are probably similar to other e-commerce security
some organizations, RFID data will shift their data issues, the sheer scale may present new issues that
archiving function to another level of complexity must be addressed at a system level. From the per-
as it handles the significantly increased volume. IT spective of an organizational level, part of the busi-
managers will seek to shrink storage requirements ness process management will be deciding on and
through strategic use of summarization. Strategic implementing various levels of access for different
logical and physical data organization will be stakeholders under dynamically changing circum-
needed to balance complete data storage with effi- stances. Ethical issues also are present as the poten-
cient retrieval. Will data be more effectively stored tial for adding customer information and profiling
based on real-world entities, based on time and becomes attached to the creation and distribution
sequence, or some other categorization method? of products. These may be similar to the potential
This is likely to be a company, perhaps even appli- for privacy violation with the creation and distrib-
cation-specific decision. Otherwise, we would not ution of intangible goods such as financial prod-
expect much difference in issues of archiving from ucts (stocks, bank deposits, credit card records) and

100 July 2007/Vol. 50, No. 7 COMMUNICATIONS OF THE ACM


entertainment products (music and movies). mitment to utilization of RFID information. It can
Although there is no guarantee that RFID tech- be anticipated that in reality organizations imple-
nology will spread in usage throughout the econ- menting RFID will utilize a variety of governance
omy, the potential benefits from continuing to structures and future research would be needed to
replace manual labor associated with the distribu- determine under what circumstances each is most
tion and storage of physical goods suggests a effective.
strong future for this technology. The immediate It is our hope that having identified and cata-
impact of RFID technology will probably be expe- loged some of the expected IT challenges and
rienced primarily in the warehouses, loading opportunities associated with the diffusion of
docks, and transportation assets, and in the long RFID technology, IT managers will be able to
run full utilization of RFID technology will anticipate issues and measure the risks associated
require significant business process redesign and with its implementation more knowledgeably. c
associated development of new and retooled IT.
Clearly, RFID holds the promise of significantly References
affecting the handling of physical products 1. McGinity, M. RFID: Is this game of tag fair play? Commun. ACM 47,
1 (Jan. 2004), 15–18.
throughout the supply chain. However, issues of 2. Mearian, L. The data life cycle. Computerworld (Nov. 17, 2003),
security and privacy must be adequately addressed 38–40.
3. Palmer, M. Seven principles of effective RFID data management
to balance market effectiveness with fair practices (part 1 and 2). Enterprise Systems News; www.esj.com/news/arti-
for that promise to be realized. cle.asp?EditorialsID=1067.
4. Pottie, G.J. Privacy in the global e-village. Commun. ACM 47, 2 (Feb.
2004), 21–23.

A
lthough we did not approach this 5. Redman, T.C. Data Quality for the Information Age. Artech House,
topic from the perspective of the Norwood, MA, 1996.
6. SAP launches RFID package. RFID Journal (Jan. 15, 2004).
issues that confront the particular 7. Seeley, R. RFID and data: Here’s what’s next. Application Develop-
IT leader in undertaking an end- ment Trends (July 2004); www.adtmag.com/article.asp?id=9666.
to-end RFID project, we recog- 8. Shapiro, J.F. Modeling the Supply Chain. Duxbury, Pacific Grove,
CA, 2001.
nize that such a perspective would 9. Simchi-Levi, D. Kaminsky, P. and Simchi-Levi, E. Designing and
highlight additional issues and difficulties that IT Managing the Supply Chain. McGraw-Hill, Boston, MA, 2000.
10. Songini, M. Wal-Mart offers RFID update. Computerworld (Mar. 13,
leaders would need to master for successful imple- 2006); www.computerworld.com/mobiletopics/mobile/
mentation. For example, at each stage IT leaders story/0,10801,109418,00.html.
will confront make/buy trade-offs considering dif- 11. Wailgum, T. Tag, you’re late. CIO Magazine (Nov. 15, 2004),
50–56.
ferences in cost, timing, functionality, long-term 12. Wilde, D., Harris, E., Rogers, Y., and Randell, C. The periscope:
support, and project risk in selecting packages ver- Supporting a computer-enhanced field trip for children. Personal
sus building new applications. We would anticipate Ubiquitous Computing 7 (2003).

that some organizations will likely move slowly


applying RFID technology only as required by Fred Niederman (niederfa@slu.edu) is the Shaughnessy Professor
of MIS in the Department of Decision Sciences and MIS at Saint Louis
larger business partners or not adopting the tech- University, MO.
nology at all. Others, however, are likely to move Richard G. Mathieu (mathieurg@jmu.edu) is the chair and a
aggressively adding RFID capabilities in their oper- professor of CIS in the Department of Computer Information Systems
ations and develop new applications based on the and Management Science at James Madison University in Harrison-
burg, VA.
opportunities presented. Roger Morley (rsmorley@protean-inc.com) is the vice president
We also did not directly address the topic of for supply chain consulting at Protean, Inc. in Pacific, MO.
what discipline within an organization would be Ik-Whan Kwon (kwoni@slu.edu) is a professor of Decision
most effective at having responsibility for the intro- Sciences and MIS in the Department of Decision Sciences and MIS
and the director of the Consortium for Supply Chain Management
duction of RFID and related capabilities. An infor- Studies at Saint Louis University, MO.
mal poll of local supply chain managers suggested a
partnership of supply chain and IT specialists as a
Permission to make digital or hard copies of all or part of this work for personal or class-
promising model. It isn’t clear if organizations will room use is granted without fee provided that copies are not made or distributed for
be better served by housing responsibility for RFID profit or commercial advantage and that copies bear this notice and the full citation on
the first page. To copy otherwise, to republish, to post on servers or to redistribute to
technology in supply chain or IT departments lists, requires prior specific permission and/or a fee.
(with consultation and inclusion of members from
both areas) or if setting up a new organizational
component with members drawn from each area
would be more effective. This may depend on the
size of the organization and the scope of its com- © 2007 ACM 0001-0782/07/0700 $5.00

COMMUNICATIONS OF THE ACM July 2007/Vol. 50, No. 7 101

Das könnte Ihnen auch gefallen