Exploratory Research to Apply Leadership Theory to the Implementation of Radio Frequency Identification (Rfid) (Report) Exploratory Research to Apply Leadership Theory to the Implementation of Radio Frequency Identification (Rfid) (Report)

Exploratory Research to Apply Leadership Theory to the Implementation of Radio Frequency Identification (Rfid) (Report‪)‬

Academy of Information and Management Sciences Journal 2010, Jan, 13, 1

    • € 2,99
    • € 2,99

Beschrijving uitgever

INTRODUCTION Radio Frequency Identification (RFID) represents the next generation of supply chain management technology. An RFID system typically includes tags, tag readers, antenna, middleware, and application software, providing a much more efficient way to track, locate, and manage objects than bar coding. This technology presents certain risks to companies and the general public, such as consumer privacy invasion, lack of regulations and legislation on data sharing, system failures, loss of data, and tag or reader malfunction (Higgins and Cairney, 2006).

GENRE
Computers en internet
UITGEGEVEN
2010
1 januari
TAAL
EN
Engels
LENGTE
24
Pagina's
UITGEVER
The DreamCatchers Group, LLC
GROOTTE
238,5
kB

Meer boeken van Academy of Information and Management Sciences Journal

A Survey of Information Systems Development Project Performance (Report) A Survey of Information Systems Development Project Performance (Report)
2011
Predicting Leadership Success in Agile Environments: An Inquiring Systems Approach (Report) Predicting Leadership Success in Agile Environments: An Inquiring Systems Approach (Report)
2010
Functional Requirements for Secure Code: The Reference Monitor and Use Case. Functional Requirements for Secure Code: The Reference Monitor and Use Case.
2009
Students' Perception of Effectiveness Using Different Methodologies of Teaching Advanced Business Statistics. Students' Perception of Effectiveness Using Different Methodologies of Teaching Advanced Business Statistics.
1999
E-Commerce Security Standards and Loopholes (Manuscripts) E-Commerce Security Standards and Loopholes (Manuscripts)
2000
Customer Relationship Management Strategies for the Internet (Company Overview) Customer Relationship Management Strategies for the Internet (Company Overview)
2001