{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T19:04:19Z","timestamp":1774983859294,"version":"3.50.1"},"reference-count":117,"publisher":"Emerald","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,5,5]]},"abstract":"<jats:p>Radio Frequency Identification (RFID) has started to exert a major influence on modern supply chain management. In manufacturing, RFID changes the way objects are tracked on the shop floor and how manufactured goods interact with the production environment. In logistics, RFID is used to track and trace pallets or individual objects on a global scale. In retail, RFID is used to identify objects, retrieve related information, and prevent theft. Sometimes the tags remain attached to the objects post-sale, thus facilitating additional services. Overall, enterprises have much more detailed information about the objects: the use and produce, their location, their trajectories, and their physical state.<\/jats:p>\n                  <jats:p>In this survey paper, we show how RFID has transformed the supply chain over the past decade, discussing manufacturing, logistics, and retail and related cost\/benefit considerations. We also describe the vision of an \u201cInternet of Things,\u201d where each participating object has a digital shadow with related information stored in cyberspace. We conclude with an extensive discussion of related privacy and security risks, including some of our own proposals to mitigate them.<\/jats:p>","DOI":"10.1561\/0200000020","type":"journal-article","created":{"date-parts":[[2011,5,17]],"date-time":"2011-05-17T06:28:07Z","timestamp":1305613687000},"page":"105-185","source":"Crossref","is-referenced-by-count":13,"title":["RFID and the Internet of Things: Technology, Applications, and Security Challenges"],"prefix":"10.1561","volume":"4","author":[{"given":"Sergei","family":"Evdokimov","sequence":"first","affiliation":[{"name":"gematik, Gesellschaft f\u00fcr Telematikanwendungen der Gesundheitskarte mbH , Friedrich Str. 136, 10117 Berlin ,","place":["Germany"]}]},{"given":"Benjamin","family":"Fabian","sequence":"additional","affiliation":[{"name":"Institute of Information Systems, Humboldt-Universit\u00e4t zu Berlin , Spandauer Str. 1, 10178 Berlin ,","place":["Germany"]}]},{"given":"Oliver","family":"G\u00fcnther","sequence":"additional","affiliation":[{"name":"Institute of Information Systems, Humboldt-Universit\u00e4t zu Berlin , Spandauer Str. 1, 10178 Berlin ,","place":["Germany"]}]},{"given":"Lenka","family":"Ivantysynova","sequence":"additional","affiliation":[{"name":"Universit\u00e4t Potsdam , August-Bebel-Strasse 89, 14482 Potsdam ,","place":["Germany"]}]},{"given":"Holger","family":"Ziekow","sequence":"additional","affiliation":[{"name":"Institute of Information Systems, Humboldt-Universit\u00e4t zu Berlin , Spandauer Str. 1, 10178 Berlin ,","place":["Germany"]}]}],"member":"140","published-online":{"date-parts":[[2011,5,5]]},"reference":[{"key":"2026033114272681000_ref001","article-title":"L\u2019afnic s\u2019implique dans les services de registre de l\u2019internet du futur et noue un partenariat avec gs1 France","author":"AFNIC","year":"2008","journal-title":"Press release"},{"key":"2026033114272681000_ref002","volume-title":"RFID Handbook \u2014 Applications, Technology, and Privacy","author":"Ahson","year":"2008"},{"key":"2026033114272681000_ref003","volume-title":"Spychips: How Major Corporations and Government Plan to Track Your Every Purchase and Watch Your Every Move","author":"Albrecht","year":"2006"},{"key":"2026033114272681000_ref004","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1111\/j.1937-5956.2007.tb00282.x","article-title":"Simulation modeling and analysis: A collateral application and exposition of RFID technology","volume":"16","author":"Amini","year":"2007","journal-title":"Production and Operations Management"},{"key":"2026033114272681000_ref005","volume-title":"PhD thesis","author":"Andresen","year":"2001"},{"key":"2026033114272681000_ref006","doi-asserted-by":"crossref","unstructured":"R.\n              Arends\n            , R.Austein, M.Larson, D.Massey, and S.Rose, \u201cDNS security introduction and requirements,\u201d http:\/\/www.ietf.org\/rfc\/rfc4033.txt, 2005.","DOI":"10.17487\/rfc4033"},{"key":"2026033114272681000_ref007","unstructured":"G.\n              Avoine\n            \n          , \u201cOnline bibliography on security and privacy in RFID Systems,\u201d http:\/\/www.avoine.net\/rfid\/, 2010."},{"issue":"6","key":"2026033114272681000_ref008","doi-asserted-by":"crossref","first-page":"578","DOI":"10.1057\/ejis.2009.32","article-title":"Evaluation of RFID applications for logistics: A framework for identifying, forecasting and assessing benefits","volume":"18","author":"Baars","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"2","key":"2026033114272681000_ref009","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1145\/606272.606299","article-title":"Looking up data in P2P systems","volume":"46","author":"Balakrishnan","year":"2003","journal-title":"Communications of the ACM"},{"key":"2026033114272681000_ref010","volume-title":"Diskussionspapiere zum Ta\u00a8tigkeitsfeld Informationsverarbeitung und Informationswirtschaft","author":"Bernroider","year":"1999"},{"key":"2026033114272681000_ref011","first-page":"1182","article-title":"Integrating automatic data acquisition with business processes \u2014 experiences with SAP\u2019s Auto-ID infrastructure","author":"Bornho\u00a8vd","year":"2004","journal-title":"in Proceedings of the 30th International Conference on Very large data bases (VLDB \u201904)"},{"issue":"2","key":"2026033114272681000_ref012","doi-asserted-by":"crossref","first-page":"548","DOI":"10.1016\/j.ijpe.2007.05.007","article-title":"Economical assessment of the impact of RFID technology and EPC system on the fast-moving consumer goods supply chain","volume":"112","author":"Bottani","year":"2008","journal-title":"International Journal of Production Economics"},{"key":"2026033114272681000_ref013","first-page":"1","article-title":"Development of a justification tool for advanced technologies: An example for RFID","author":"Bozdag","year":"2007","journal-title":"in Proceedings of RFID Eurasia"},{"key":"2026033114272681000_ref014","unstructured":"BRIDGE\n          , \u201cBRIDGE WP02 \u2014 Requirements document of serial level lookup service for various industries,\u201d http:\/\/www.bridge-project.eu\/, August2007."},{"key":"2026033114272681000_ref015","unstructured":"BRIDGE\n          , \u201cBRIDGE WP04 \u2014 Security analysis report,\u201d http:\/\/www.bridgeproject.eu\/, July2007."},{"issue":"9","key":"2026033114272681000_ref016","doi-asserted-by":"crossref","first-page":"2745","DOI":"10.1080\/00207540903156517","article-title":"RFID opportunity analysis for leaner manufacturing","volume":"48","author":"Brintrup","year":"2010","journal-title":"International Journal of Production Research"},{"key":"2026033114272681000_ref017","article-title":"Reasoning about uncertainty in location identification with RFID","author":"Brusey","year":"2003","journal-title":"Workshop on Reasoning with Uncertainty in Robotics at IJCAI"},{"issue":"1","key":"2026033114272681000_ref018","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.1937-5956.2009.01057.x","article-title":"Misplaced inventory and radiofrequency identification (RFID) technology: Information and coordination","volume":"19","author":"Camdereli","year":"2010","journal-title":"Production and Operations Management"},{"key":"2026033114272681000_ref019","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1108\/01443570810867196","article-title":"RFID in the contemporary supply chain: Multiple perspectives on its benefits and risks","volume":"28","author":"Cannon","year":"2008","journal-title":"International Journal of Operations & Production Management"},{"key":"2026033114272681000_ref020","article-title":"Auto-ID on the line: The value of Auto-ID technology in manufacturing","author":"Chappell","year":"2003","journal-title":"Technical Report, Auto-ID Center"},{"issue":"9","key":"2026033114272681000_ref021","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MCOM.2007.4342873","article-title":"An overview of passive RFID","author":"Chawla","year":"2007","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"2026033114272681000_ref022","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2006.10","article-title":"Denial of service against the domain name system","volume":"4","author":"Cheung","year":"2006","journal-title":"IEEE Security and Privacy"},{"issue":"3","key":"2026033114272681000_ref023","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/0304-405X(79)90015-1","article-title":"Option pricing: A simplified approach","volume":"7","author":"Cox","year":"1979","journal-title":"Journal of Financial Economics"},{"issue":"2","key":"2026033114272681000_ref024","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s10799-007-0010-1","article-title":"Making the most out of RFID technology: A research agenda for the study of adoption, usage and impact of RFID","volume":"8","author":"Curtin","year":"2007","journal-title":"Information Technology and Management"},{"issue":"5","key":"2026033114272681000_ref025","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1111\/j.1937-5956.2007.tb00284.x","article-title":"RFID for better supply-chain management through enhanced information visibility","volume":"16","author":"Delen","year":"2007","journal-title":"Production and Operations Management"},{"key":"2026033114272681000_ref026","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1111\/j.1937-5956.2007.tb00286.x","article-title":"RFID and operations management: Technology, value, and incentives","volume":"16","author":"Dutta","year":"2007","journal-title":"Production and Operations Management"},{"key":"2026033114272681000_ref027","volume-title":"The EPCglobal network: Overview of design, benefits, security","author":"EPCglobal","year":"2004"},{"key":"2026033114272681000_ref028","unstructured":"EPCglobal\n          , \u201cEPCglobal tag class structure,\u201d http:\/\/www.epcglobalinc.org\/standards\/TagClassDefinitions 1 0-whitepaper-20071101.pdf, November2007."},{"key":"2026033114272681000_ref029","unstructured":"EPCglobal\n          , \u201cEPC radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz\u2013960 MHz version 1.2.0,\u201d www.epcglobalinc.org\/standards\/uhfc1g2\/, October2008."},{"key":"2026033114272681000_ref030","unstructured":"EPCglobal\n          , \u201cEPCglobal object naming service (ONS) 1.0.1,\u201d http:\/\/www.epcglobalinc.org\/standards\/ons\/, May2008."},{"key":"2026033114272681000_ref031","unstructured":"EPCglobal\n          , \u201cEPCglobal tag data standards \u2014 Version 1.4,\u201d http:\/\/www.epcglobalinc.org\/standards\/tds\/, August2008."},{"key":"2026033114272681000_ref032","unstructured":"EPCglobal\n          , \u201cThe EPCglobal architecture framework \u2014 Version 1.3,\u201d http:\/\/www.epcglobalinc.org\/standards\/architecture\/, March2009."},{"key":"2026033114272681000_ref033","first-page":"1","volume-title":"in Proceedings of the Internet of Things (IOT 2008), Zurich, Switzerland, 2008","author":"Evdokimov","year":"2008"},{"key":"2026033114272681000_ref034","article-title":"Comparison of discovery service architectures for the internet of things","author":"Evdokimov","year":"2010","journal-title":"in Proceedings of the 3rd IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2010)"},{"key":"2026033114272681000_ref035","article-title":"Implementing secure P2P-ONS","author":"Fabian","year":"2009","journal-title":"in Proceedings of the IEEE International Conference on Communications (IEEE ICC 2009), Dresden"},{"key":"2026033114272681000_ref036","article-title":"Distributed ONS and its Impact on Privacy","author":"Fabian","year":"2007","journal-title":"in Proceedings of the IEEE International Conference on Communications (IEEE ICC 2007), Glasgow"},{"issue":"7","key":"2026033114272681000_ref037","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/1538788.1538816","article-title":"Security challenges of the EPCglobal Network","volume":"52","author":"Fabian","year":"2009","journal-title":"Communications of the ACM"},{"key":"2026033114272681000_ref038","first-page":"71","article-title":"Security analysis of the Object Name Service","author":"Fabian","year":"2005","journal-title":"in Proceedings of the 1st IEEE Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2005), in conj. with IEEE ICPS 2005, Santorini, Greece"},{"issue":"2","key":"2026033114272681000_ref039","doi-asserted-by":"crossref","first-page":"414","DOI":"10.1016\/j.ijpe.2009.12.004","article-title":"When is RFID right for your service?","volume":"124","author":"Ferrer","year":"2010","journal-title":"International Journal of Production Economics"},{"key":"2026033114272681000_ref040","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","volume-title":"RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification","author":"Finkenzeller","year":"2003"},{"key":"2026033114272681000_ref041","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-28299-8","volume-title":"Das Internet der Dinge \u2014 Ubiquitous Computing und RFID in der Praxis","author":"Fleisch","year":"2005"},{"key":"2026033114272681000_ref042","first-page":"219","volume-title":"in Proceedings of the 2005 Joint Conference on Smart Objects and Ambient Intelligence (sOc-EUSAI \u201905)","author":"Floerkemeier","year":"2005"},{"key":"2026033114272681000_ref043","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1177\/1077800405284363","article-title":"Five misunderstandings about case study research","volume":"2","author":"Flyvbjerg","year":"2006","journal-title":"Qualitative Inquiry"},{"issue":"3","key":"2026033114272681000_ref044","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MSP.2005.78","article-title":"RFID privacy: An overview of problems and proposed solutions","volume":"3","author":"Garfinkel","year":"2005","journal-title":"IEEE Security and Privacy"},{"key":"2026033114272681000_ref045","volume-title":"RFID Applications, Security, and Privacy","author":"Garfinkel","year":"2005"},{"key":"2026033114272681000_ref046","unstructured":"S. L.\n              Garfinkel\n            \n          , \u201cAn RFID Bill of Rights,\u201d http:\/\/www.technologyreview.com\/communications\/12953\/, October2002."},{"key":"2026033114272681000_ref047","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/978-1-84628-607-0_2","article-title":"Applications of RFID in supply chains","author":"Gaukler","year":"2007","journal-title":"Trends in Supply Chain Design and Management: Technologies and Methodologies"},{"issue":"8","key":"2026033114272681000_ref048","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1108\/08858621011088301","article-title":"Preventing avoidable stockouts: The impact of item-level RFID in retail","volume":"25","author":"Gaukler","year":"2010","journal-title":"Journal of Business and Industrial Marketing"},{"issue":"1","key":"2026033114272681000_ref049","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1111\/j.1937-5956.2007.tb00166.x","article-title":"Item-level RFID in the retail supply chain","volume":"16","author":"Gaukler","year":"2007","journal-title":"Production and Operations Management"},{"issue":"1","key":"2026033114272681000_ref050","first-page":"12","article-title":"Geographic implications of DNS infrastructure distribution","volume":"10","author":"Gibbard","year":"2007","journal-title":"The Internet Protocol Journal"},{"issue":"2\u20133","key":"2026033114272681000_ref051","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s12525-009-0014-2","article-title":"Benchmarking RFID profitability in complex retail distribution systems","volume":"19","author":"Goebel","year":"2009","journal-title":"Electronic Markets"},{"key":"2026033114272681000_ref052","volume-title":"Technical Report","author":"GS1","year":"2007"},{"key":"2026033114272681000_ref053","volume-title":"RFID in Manufacturing","author":"Gu\u00a8nther","year":"2008","edition":"1st"},{"issue":"9","key":"2026033114272681000_ref054","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/1081992.1082023","article-title":"RFID and the perception of control: The consumer\u2019s view","volume":"48","author":"Gu\u00a8nther","year":"2005","journal-title":"Communications of the ACM"},{"issue":"6","key":"2026033114272681000_ref055","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1111\/j.1937-5956.2009.01100.x","article-title":"E-Business: A review of research published in production and operations management (1992\u20132008)","volume":"18","author":"Gupta","year":"2009","journal-title":"Production and Operations Management"},{"issue":"4","key":"2026033114272681000_ref056","first-page":"181","article-title":"Measuring the impact of RFID on out of stocks at Wal-Mart","volume":"7","author":"Hardgrave","year":"2008","journal-title":"MIS Quarterly Executive"},{"key":"2026033114272681000_ref057","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1111\/j.1937-5956.2007.tb00279.x","article-title":"Inventory record inaccuracy, double marginalization, and RED adoption","volume":"16","author":"Heese","year":"2007","journal-title":"Production and Operations Management"},{"issue":"2","key":"2026033114272681000_ref058","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.ijpe.2010.03.017","article-title":"The uses of tracking in operations management: Synthesis of a research program","volume":"126","author":"Holmstrom","year":"2010","journal-title":"International Journal of Production Economics"},{"issue":"9","key":"2026033114272681000_ref059","doi-asserted-by":"crossref","first-page":"2485","DOI":"10.1080\/00207540903564900","article-title":"Radio frequency identification (RFID): Research trends and framework","volume":"48","author":"Irani","year":"2010","journal-title":"International Journal of Production Research"},{"key":"2026033114272681000_ref060","article-title":"Information technology \u2014 radio frequency identification for item management \u2014 Part 6: Parameters for air interface communications at 860 MHz to 960 MHz","author":"ISO\/IEC-18000","year":"2004","journal-title":"Technical Report, ISO \u2014 International Organization for Standardization"},{"key":"2026033114272681000_ref061","article-title":"RFID in manufacturing: The investment decision","author":"Ivantysynova","year":"2009","journal-title":"in Pacific Asia Conference on Information Systems"},{"key":"2026033114272681000_ref062","first-page":"140","volume-title":"in Proceedings of the 22nd International Conference on Data Engineering (ICDE \u201906)","author":"Jeffery","year":"2006"},{"issue":"2","key":"2026033114272681000_ref063","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/JSAC.2005.861395","article-title":"RFID security and privacy: A research survey","volume":"24","author":"Juels","year":"2006","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2026033114272681000_ref064","article-title":"High-power proxies for enhancing RFID privacy and utility","author":"Juels","year":"2005","journal-title":"in 5th International Workshop on Privacy Enhancing Technologies (PET 2005)"},{"key":"2026033114272681000_ref065","first-page":"184","article-title":"Real-time RFID-based intelligent healthcare diagnosis system","author":"Khosla","year":"2008","journal-title":"Medical Biometrics"},{"key":"2026033114272681000_ref066","article-title":"Security assessment of EPCglobal architecture framework","author":"Konidala","year":"2006"},{"key":"2026033114272681000_ref067","article-title":"Securing the root: A proposal for distributing signing authority","author":"Kuerbis","year":"2007"},{"issue":"2","key":"2026033114272681000_ref068","first-page":"1","article-title":"What is RFID worth to your company? Measuring performance at the activity level","volume":"7","author":"Laubacher","year":"2005","journal-title":"MIT Center for eBusiness Research Brief"},{"issue":"1","key":"2026033114272681000_ref069","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1007\/s12146-007-0010-4","article-title":"Peering through a glass darkly","author":"Lee","year":"2007","journal-title":"International Commerce Review"},{"issue":"1","key":"2026033114272681000_ref070","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1111\/j.1937-5956.2007.tb00165.x","article-title":"Unlocking the value of RFID","volume":"16","author":"Lee","year":"2007","journal-title":"Production and Operations Management"},{"key":"2026033114272681000_ref071","volume-title":"Technical Report","author":"Lee","year":"2004"},{"issue":"2","key":"2026033114272681000_ref072","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1016\/j.ijpe.2007.05.008","article-title":"Radio frequency identification (RFID) implementation in the service sector: A customer-facing diffusion model","volume":"112","author":"Lee","year":"2008","journal-title":"International Journal of Production Economics"},{"key":"2026033114272681000_ref073","article-title":"From identification to authentication \u2014 A review of RFID product authentication techniques","author":"Lehtonen","year":"2006","journal-title":"in Printed handout of Workshop on RFID Security \u2014 RFIDSec 06"},{"key":"2026033114272681000_ref074","article-title":"Homeland security grabs for net\u2019s master keys","author":"Leyden","year":"2007","journal-title":"The Register"},{"key":"2026033114272681000_ref075","first-page":"1014","volume-title":"in Proceedings of the IEEE International Conference on Networking, Sensing and Control","author":"Li","year":"2004"},{"issue":"8","key":"2026033114272681000_ref076","doi-asserted-by":"crossref","first-page":"2203","DOI":"10.1080\/00207540802380556","article-title":"Applications of RFID technology for improving production efficiency in an integrated-circuit packaging house","volume":"47","author":"Liu","year":"2009","journal-title":"International Journal of Production Research"},{"key":"2026033114272681000_ref077","article-title":"RFID technology and applications in the retail supply chain: The early metro group pilot","author":"Loebbecke","year":"2005","journal-title":"18th Bled eConference"},{"key":"2026033114272681000_ref078","first-page":"1","article-title":"RFID\u2019s Potential in the fashion industry: A case analysis","author":"Loebbecke","year":"2006","journal-title":"19th Bled eConference eValues"},{"key":"2026033114272681000_ref079","volume-title":"Information Technology and the Productivity Paradox \u2014 Assessing the Value of Investing in IT","author":"Lucas","year":"1999","edition":"2nd"},{"key":"2026033114272681000_ref080","unstructured":"METRO AG\n          , \u201cMETRO group future store initiative,\u201d http:\/\/www.futurestore.org, February2010."},{"issue":"10","key":"2026033114272681000_ref081","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1108\/01443570910993483","article-title":"A quantitative model for the introduction of RFID in the fast moving consumer goods supply chain: Are there any profits?","volume":"19","author":"Miragliotta","year":"2009","journal-title":"International Journal of Operations and Production Management"},{"issue":"4","key":"2026033114272681000_ref082","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s10796-009-9154-3","article-title":"Design of an RFID-based healthcare management system using an information system design theory","volume":"11","author":"Ngai","year":"2009","journal-title":"Information Systems Frontiers"},{"issue":"9","key":"2026033114272681000_ref083","doi-asserted-by":"crossref","first-page":"2583","DOI":"10.1080\/00207540903564942","article-title":"RFID Systems implementation: A comprehensive framework and a case study","volume":"48","author":"Ngai","year":"2010","journal-title":"International Journal of Production Research"},{"issue":"7","key":"2026033114272681000_ref084","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1145\/1272516.1272520","article-title":"Examining RFID applications in supply chain management","volume":"50","author":"Niederman","year":"2007","journal-title":"Communications of the ACM"},{"issue":"1","key":"2026033114272681000_ref085","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1016\/j.ijpe.2006.08.024","article-title":"Analysis of the impact of the RFID technology on reducing product misplacement errors at retail stores","volume":"112","author":"Rekik","year":"2008","journal-title":"International Journal of Production Economics"},{"key":"2026033114272681000_ref086","volume-title":"in International Workshop on Security Protocols \u2014 IWSP\u201905","author":"Rieback","year":"2005"},{"issue":"1","key":"2026033114272681000_ref087","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.ijpe.2010.07.039","article-title":"A literature review on the impact of RFID technologies on supply chain management","volume":"128","author":"Sarac","year":"2010","journal-title":"International Journal of Production Economics"},{"issue":"1","key":"2026033114272681000_ref088","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.ejor.2010.04.003","article-title":"Exploring the impacts of radio frequency identification (RFID) technology on supply chain performance","volume":"207","author":"Sari","year":"2010","journal-title":"European Journal of Operational Research"},{"key":"2026033114272681000_ref089","unstructured":"P.\n              Schmitt\n             and F.Michahelles, \u201cEconomic impact of RFID report,\u201d http:\/\/www.bridge-project.eu\/, 2008."},{"key":"2026033114272681000_ref090","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1108\/01443571011029994","article-title":"The costs of adoption of RFID technologies in supply networks","volume":"30","author":"Smart","year":"2010","journal-title":"International Journal of Operations & Production Management"},{"issue":"1\/2","key":"2026033114272681000_ref091","first-page":"149","article-title":"Exploring the inherent benefits of RFID and automated self & serve checkouts in a B2C environment","volume":"1","author":"Smith","year":"2005","journal-title":"Int. J. Bus. Inf. Syst."},{"key":"2026033114272681000_ref092","volume-title":"in Privacy, Security and Trust within the Context of Pervasive Computing","author":"Spiekermann","year":"2005"},{"key":"2026033114272681000_ref093","article-title":"Collaborative business items: Decomposing business process services for execution of business logic on the item","author":"Spiess","year":"2005","journal-title":"in European Workshop on Wireless Sensor Networks"},{"key":"2026033114272681000_ref094","first-page":"42","volume-title":"in CEC \u201904: Proceedings of the IEEE International Conference on E-Commerce Technology","author":"Struker","year":"2004"},{"issue":"8","key":"2026033114272681000_ref095","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1108\/08858621011088347","article-title":"A post-retail consumer application of RFID in medical supply chains","volume":"25","author":"Swartz","year":"2010","journal-title":"Journal of Business and Industrial Marketing"},{"key":"2026033114272681000_ref096","unstructured":"C.\n              Swedberg\n            \n          , \u201cHong Kong shoppers use RFID-enabled mirror to see what they want,\u201d http:\/\/www.rfidjournal.com\/article\/view\/3595, September2007."},{"key":"2026033114272681000_ref097","article-title":"The Auto-ID calculator: An overview","author":"Tellkamp","year":"2003","journal-title":"Technical Report, AutoID Centre"},{"issue":"6","key":"2026033114272681000_ref098","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1057\/ejis.2009.33","article-title":"Understanding the value of integrated RFID systems: A case study from apparel retail","volume":"18","author":"Thiesse","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"2026033114272681000_ref099","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1504\/IJEB.2009.023607","article-title":"RFID Data sharing in supply chains: What is the value of the EPC Network?","volume":"7","author":"Thiesse","year":"2009","journal-title":"International Journal of Electronic Business"},{"issue":"2","key":"2026033114272681000_ref100","doi-asserted-by":"crossref","first-page":"532","DOI":"10.1016\/j.ijpe.2007.05.006","article-title":"On the value of location information to lot scheduling in complex manufacturing processes","volume":"112","author":"Thiesse","year":"2008","journal-title":"International Journal of Production Economics"},{"issue":"5-6","key":"2026033114272681000_ref101","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1016\/j.im.2010.05.001","article-title":"Determinants of RFID adoption intention: Evidence from Taiwanese retail chains","volume":"47","author":"Tsai","year":"2010","journal-title":"Information and Management"},{"issue":"2","key":"2026033114272681000_ref102","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1016\/j.ijpe.2007.05.009","article-title":"Evaluating the business value of RFID: Evidence from five case studies","volume":"112","author":"Tzeng","year":"2008","journal-title":"International Journal of Production Economics"},{"issue":"9","key":"2026033114272681000_ref103","doi-asserted-by":"crossref","first-page":"2549","DOI":"10.1080\/00207540903564926","article-title":"Evaluating RFID investment on a supply chain using tagging cost sharing factor","volume":"48","author":"Ustundag","year":"2010","journal-title":"International Journal of Production Research"},{"key":"2026033114272681000_ref104","volume-title":"Technical Report","author":"Ustundag","year":"2005"},{"issue":"2","key":"2026033114272681000_ref105","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1016\/j.ijpe.2009.06.038","article-title":"RFID benefits, costs, and possibilities: The economical analysis of RFID deployment in a cruise corporation global service supply chain","volume":"122","author":"Veronneau","year":"2009","journal-title":"International Journal of Production Economics"},{"issue":"12","key":"2026033114272681000_ref106","doi-asserted-by":"crossref","first-page":"1290","DOI":"10.1108\/01443570911006009","article-title":"Empirical evidence of RFID Impacts on supply chain performance","volume":"29","author":"Visich","year":"2009","journal-title":"International Journal of Operations and Production Management"},{"issue":"1","key":"2026033114272681000_ref107","doi-asserted-by":"crossref","first-page":"92","DOI":"10.3390\/jtaer3010010","article-title":"Enhancing information flow in a retail supply chain using RFID and the EPC network: A proof-of-concept approach","volume":"3","author":"Wamba","year":"2008","journal-title":"Journal of Theoretical and Applied Electronic Commerce Research"},{"issue":"2","key":"2026033114272681000_ref108","doi-asserted-by":"crossref","first-page":"614","DOI":"10.1016\/j.ijpe.2007.05.010","article-title":"Exploring the impact of RFID technology and the EPC network on mobile B2B eCommerce: A case study in the retail industry","volume":"112","author":"Wamba","year":"2008","journal-title":"International Journal of Production Economics"},{"key":"2026033114272681000_ref109","first-page":"281","article-title":"Enabling intelligent B-to-B eCommerce supply chain management using RFID and the EPC network","author":"Wamba","year":"2006","journal-title":"in Proceedings of the 8th International Conference on Electronic Commerce (ICEC \u201906)"},{"issue":"9","key":"2026033114272681000_ref110","doi-asserted-by":"crossref","first-page":"2513","DOI":"10.1080\/00207540903564918","article-title":"An RFID-based digital warehouse management system in the tobacco industry: A case study","volume":"48","author":"Wang","year":"2010","journal-title":"International Journal of Production Research"},{"key":"2026033114272681000_ref111","first-page":"184","volume-title":"in HICSS \u201906: Proceedings of the 39th Annual Hawaii International Conference on System Sciences","author":"Wang","year":"2006"},{"key":"2026033114272681000_ref112","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/978-3-540-39881-3_18","article-title":"Security and privacy aspects of low-cost radio frequency identification systems","author":"Weis","year":"2004","journal-title":"in Security in Pervasive Computing"},{"issue":"2","key":"2026033114272681000_ref113","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1287\/mnsc.1090.1121","article-title":"Timing of RFID adoption in a supply chain","volume":"56","author":"Whang","year":"2010","journal-title":"Management Science"},{"key":"2026033114272681000_ref114","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1111\/j.1937-5956.2007.tb00283.x","article-title":"A field study of RFID deployment and return expectations","volume":"16","author":"Whitaker","year":"2007","journal-title":"Production and Operations Management"},{"key":"2026033114272681000_ref115","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/s11576-007-0064-z","article-title":"Forschungsmethoden der Wirtschaftsinformatik \u2014 Eine empirische Untersuchung","volume":"4","author":"Wilde","year":"2007","journal-title":"Wirtschaftsinformatik"},{"issue":"1","key":"2026033114272681000_ref116","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1080\/00207543.2010.508944","article-title":"Information architecture for supply chain quality management","volume":"49","author":"Xu","year":"2011","journal-title":"International Journal of Production Research"},{"issue":"1","key":"2026033114272681000_ref117","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.ejor.2008.09.017","article-title":"RFID and item-level information visibility","volume":"198","author":"Zhou","year":"2009","journal-title":"European Journal of Operational Research"}],"container-title":["Foundations and Trends\u00ae in Technology, Information and Operations Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/fttom\/article-pdf\/4\/2\/105\/11133960\/0200000020en.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/www.emerald.com\/fttom\/article-pdf\/4\/2\/105\/11133960\/0200000020en.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T18:27:59Z","timestamp":1774981679000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/fttom\/article\/4\/2\/105\/1331270\/RFID-and-the-Internet-of-Things-Technology"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,5]]},"references-count":117,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,5,5]]}},"URL":"https:\/\/doi.org\/10.1561\/0200000020","relation":{},"ISSN":["1571-9545","1571-9553"],"issn-type":[{"value":"1571-9545","type":"print"},{"value":"1571-9553","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,5,5]]}}}