English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113311/144292 (79%)
Visitors : 50925253      Online Users : 937
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/33964


    Title: 無限射頻辨識系統(RFID)導入的成功關鍵因素探討
    Key Success Factors Analysis in the Implementation of RFID Technology
    Authors: 劉俊良
    Liu, Eric
    Contributors: 李易諭
    劉俊良
    Liu, Eric
    Keywords: 無限射頻辨識系統
    RFID
    Radio Frequency Identification
    Date: 2005
    Issue Date: 2009-09-17 18:55:50 (UTC+8)
    Abstract: 現在越來越多的廠商和美國國防部都需要較好的無限射頻辨識系統(RFID)系統,所以它越來越受到注目,本論文即在探討無限射頻辨識系統(RFID)導入成功的關鍵因素。
    With the driving force from Wal-Mart, the world’s largest retailer and the US Department of Defense, suppliers are required to integrate Radio Frequency Identification (RFID) in their case and pallet shipments to distribution centers in their supply chain. In comparison with traditional bar code labels and magnetic strips for supply chain management, RFID technology offers better visibility and information integration in the supply chain management.
    In this paper, a variety of Automatic identification technologies will be compared to demonstrate the advantages of RFID solutions. The introduction of RFID technology will be made as well to detail the components in the RFID systems and the factors taken into account in the RFID selection and design phases. In the technology implementation, the diffusion model is adopted to explain the evolution of new technology implementation process. The strategic model for the adoption of RFID technology in business process and management is presented as a guideline for companies who are considering adopting the RFID solutions. The impact on business management and the practice guideline to the RIFD implementation are illustrated.
    The factor analysis in the driving forces and resistance to the RFID adoption are examined to identify the attributes of its successful implementation and the variables of its adoption. According to the factor analysis, the driving forces are summarized into four major ones, including technology innovation, government and standard organization influence, organizational readiness and inter-organization demands. Two cases of RFID applications are presented to illustrate the factors taken into account in the RFID implementation. These two cases include the health care application and agricultural product process application. Companies gain the benefits of the improvement in the production efficiency and quality control over the business process and management. Information flow and capturing are becoming visible and automatic with the implementation of RFID technology.
    Reference: Albano, S., and Engels, D. W., 2002 “Auto-ID center field trial: phase I summary”, Auto-ID Center
    Alexander, K., 2002, “Focus on the supply chain: applying Auto-ID within the distributor center”, Auto-ID Center
    Angels, R., 2005, “RFID technologies: supply-chain applications and implementation issues”, Information Systems Management, Vol. 22, No. 1, pp.51-65
    Boone, C., 2003, “The RFID ecosystem for the retail supply chain”, IDC #30311, Vol. 1, Tab: Markets
    Boushka, M, 2002 “Auto-ID on the move: The value of Auto-ID Technology in freight transportation”, Auto-ID Center
    Chappell, G , 2003 “Auto-ID on the line: The value of Auto-ID Technology in manufacturing”, Auto-ID Center
    Chappel, G, 2003, “Auto-ID on the delivery: The value of Auto-ID Technology in the retail supply chain”, Auto-ID Center
    Chappel, G, 2002, “Auto-ID on demand: The value of Auto-ID Technology in consumer packaged goods demand planning”, Auto-ID Center
    Chwelos, P, 2001, “Research report: empirical test of an EDI adoption model”, Information system research, Vol. 12, No. 3, pp.304-321
    Cooper, R. B. and Zmud, R. W., 1990, “Information technology implementation research: a technological diffusion approach”, Management Science, Vol. 36, No. 2, pp.123-139
    Dunlap, J, 2003, “If you build it, they will come: EPC forum market sizing analysis”, Auto-ID Center
    Fernie, J., 1994, ”Quick response: an international perspective”, International Journal of Physical Distribution & Logistics Management, Vol. 24, No. 6, pp.38-46
    Finkenzeller, K., 1999, “RFID Handbook: Radio-Frequency Identification Fundamentals and Applications”, John Wiley & Sons Ltd
    Gao, X., 2004, “An approach to security and privacy of RFID system for supply chain”, Proceedings of IEEE International Conference on E-commerce Technology for Dynamic E-business
    Hodges, S and McFarlane, D., 2004, “RFID: the concept and the impact”, the security economy OECD, pp.55-75
    Iacovou, C. L., 1995, “Electronic data interchange and small organizations: adoption and impact of technology”, MIS Quarterly, pp.465-485
    Johansson, M., 2005, “Identification of main factors influencing an RFID implementation in the automotive and pharmaceutical industries”,M. Thesis, Linkopings University, Sweden
    Joshi, Y. V., 2000 “Information visibility and its effects on supply chain dynamics”, Master thesis, MIT
    Kambil, A, 2002, “Auto-ID across the value chain: from dramatic potential to greater efficiency & profit”, Auto-ID Center
    Knospe, H., 2004 “RFID Security”, Information Security Technical Report, Vol. 9, No. 4, pp.39-50
    Koh, R, 2003, “Prediction, detection and proof: an integrated Auto-ID solution to retail theft”, Auto-ID Center
    Kourouthanassis, P and Roussos, G, 2003, “Developing consumer-friendly pervasive retail systems”, Pervasive Computing, pp.32-39
    Kurnia, S. and Johnston, R. B., 2002, “A review of approaches to EC-enabled IOS adoption studies”, Proceedings of the 35th Hawaii International Conference on System Sciences”
    Lai, E. M., 2003, “An analysis of the department of defense supply chain: potential applications of the Auto-ID Center Technology to improve effectiveness”, Master thesis, MIT
    Landt, J, 2001, “Shroud of time: the history of RFID”, AIM, Inc
    Laudon, K. C. and Laudon, J. P., 2004, “ Management information systems: managing the digital firm”, eighth edition, Pearson Education, Inc
    Lee, H. L., 1997, “Information distortion in a supply chain: the bullwhip effect”, Management science, Vol. 43, No. 4, pp.546-558
    Lewis, S, 2005, “White paper: A basic introduction to RFIS technology and its use in supply chain”, LARAN RFID
    Markkaunen, M. and Holmstrom, J., 2002, “Wireless product identification: enabler for handling efficiency, customization and information sharing”, Supply Chain Management: An International Journal, Vol. 7, No. 4, pp.242-252
    Morris, P. and Jamieson, A., 2004, “Translating corporate strategy into project strategy: realizing corporate strategy through project management”, Project Management Institute
    Murfett, D., 2004, “The challenge of testing RFID integrated circuit”, Proceedings of the second IEEE International Workshop on Electronic Design, Test and Application
    Prater, E., Frazier, G. V. and Reyes P. M., 2005, “Future impacts of RFID on e-supply chains in grocery retailing”, Supply Chain Management: An International Journal, Vol. 10, No. 2, pp.134-142
    Quaadgras, A, 2005, “Who joins the platform? The case of RFID business ecosystem”, Proceedings of the 38th Hawaii International Conference on System Sciences, pp.1-10
    Rogers, E. M., 1983, “Diffusion of innovations”, third edition, The FREE PRESS
    Romer, K, 2003, “Smart identification frameworks for ubiquitous computing applications”, Proceedings of the First IEEE International Conference on Pervasive Computing and Communication
    Scharfeld, T. A., 2001, “An analysis of the fundamental constraints on low cost passive radio-frequency identification system design”, Master thesis, MIT
    Smith A. D., 2005, “Exploring radio frequency identification technology and its impact on business systems”, Information Management & Computer Security, Vol. 13, No. 1, pp.16-28
    Soga, S., 1999, “Products lifecycle management system using radio frequency identification technology”, Proceedings of the 7th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vol. 2, pp.1459-1467
    Thatcher, S. M. and Foster, W., 2003, “ B2B e-commerce adoption decisions in Taiwan: The interaction of organizational, industrial, governmental and cultural factors”, Proceedings of the 36th Hawaii International Conference on System Sciences”
    Want, R., 2005, “Enabling ubiquitous sensing with RFID”, Computer magazine, pp.84-86
    Weis, S. A., 2004, “RFID privacy workshop: concerns, consensus, and questions”, IEEE Security & Privacy, pp.48-50
    Yang, G. and Jarvenpaa, S. L., 2005, “Trust and radio frequency identification (RFID) adoption within an alliance”, Proceedings of the 38th Hawaii International Conference on System Sciences
    “Whitepaper: EPCglobal Class 1 Gen 2 RFID Specification”, Alien Technology
    “Whitepaper: EPCglobal Class 1 Gen 2 RFID Specification”, Alien Technology
    “Japan RFID market analysis report”, Fuji Chimera Research Institute, Inc, 2004
    “Solution blueprint: EPC RFID-based inventory management solution delivers faster, better goods logistics”, Intel Corporation, 2003
    “Pilot key learning summary: FMCG BAG pilot and implementation work group”, EPCglobal, 2005
    “RFID end-user survey: results of the 2004”, ABI research, 2004
    http://www.efarm.org.tw
    http://www.iso.org
    http://www.epcglobal.org
    http://www.epcglobal.org.tw
    周湘琪 譯, 2004, “RFID 技術與應用 / 日經BP RFID編輯部著”, 旗標出版公司
    Description: 碩士
    國立政治大學
    國際經營管理碩士班(IMBA)
    92933004
    94
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0929330041
    Data Type: thesis
    Appears in Collections:[國際經營管理英語碩士學程IMBA] 學位論文

    Files in This Item:

    File Description SizeFormat
    33004101.pdf44KbAdobe PDF21008View/Open
    33004102.pdf30KbAdobe PDF2966View/Open
    33004103.pdf38KbAdobe PDF21026View/Open
    33004104.pdf39KbAdobe PDF2954View/Open
    33004105.pdf42KbAdobe PDF2990View/Open
    33004106.pdf251KbAdobe PDF218965View/Open
    33004107.pdf96KbAdobe PDF22934View/Open
    33004108.pdf168KbAdobe PDF21902View/Open
    33004109.pdf63KbAdobe PDF21742View/Open
    33004110.pdf32KbAdobe PDF27602View/Open
    33004111.pdf45KbAdobe PDF21588View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback