Research on Radio Frequency Identification Technology (RFID) Report (Assessment)

Exclusively available on Available only on IvyPanda®
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Radio Frequency Identification technology is a programme developed and fitted on computers to monitor the movement of goods across the world. The identification system is fitted with a moveable device (tag) which is used to transmit data (Hunt, Albert and Mike140).

Many organisations across the world use this device to monitor the movement of their products until they are pulled out of the shelves for usage or consumption. Information conveyed by the tag indicates the value and date of purchase of a particular product.

The tag has a transponder fitted with a memory chip with an exceptional electronic code. The interrogator produces signals which trigger the tag to read and write the transferred information. The data can then be transferred to the main computer for processing.

Radio Frequency Identification tags are found in different shapes and sizes depending on the intended purpose. For instance, animal tags are found in smaller shapes compared to anti-theft tags.

Before the introduction of RFID system, identification of items was majorly done by barcodes. Barcodes have been rendered useless since their tags cannot be read from far.

Additionally, they are not visible in areas with snow, fog or ice hence RFID system was considered to be more appropriate (Want 35). Most of the consumer products do not have RFID tags because they are still expensive.

Consequently, the price of the tags is expected to go down due to the increased demand from manufacturers.

RFID system supplied in the market have greatly advanced as they have huge memory, an extensive reading rage and have a faster rate of processing as compared to the previous versions. The introduction of pervasive commerce has made the demand of RFID system be higher than before.

Pervasive commerce uses tracking machines to obtain information about the regions where most of the customers can be found.

There are four different types of Radio Frequency Identification system, namely: Electronic Article Surveillance, Movable Data Capture, positioning and Networked systems respectively.

Wholesalers majorly use Electronic Article Surveillance technique to detect the movement of products within their stores (Haley, Lynne and Shai 35). Additionally, the stores are fitted with antenna readers at the door to detect the movement of the tagged products.

Portable data capture technique has movable readers hence the system can be used in a number of settings.

In Networked Systems, readers are positioned at particular areas and connected to main computers to interpret the captured data. Positioning systems are majorly used to identify movable objects like tagged vehicles.

Alternative strategies for acquiring IT applications

IT applications can be acquired in a number of ways, but there are two major strategies which can be applied in the process of obtaining these applications. Additionally, an organisation should consider a number of factors before settling on an appropriate strategy.

IT applications can be obtained through buying, a process called off-the-shelf approach. Most of the qualities needed by information technology applications can be obtained in a number of the software packages sold in the market.

Additionally, buying the software packages directly from the market is cheap and time-saving compared to that which is developed within an organisation (Rainer and Casey 398).

To ensure that the bought software packages are used for a longer period of time, an organisation should make an adequate plan before making the right decision on whether to buy their IT applications or not.

Arguably, an organisation can use a single package to run all its programs. On the other hand, purchasing many software packages is important because an organisation is able to accomplish different needs.

Buying software packages becomes inappropriate when they are not only expensive but also of low quality (Solomon 314). The other alternative strategy for acquiring IT applications is through using software-as-a-service (SaaS) method.

Organisations can obtain their software packages from a vender at a certain fee. The vender can provide an organisation with applications over the internet.

Therefore, companies or customers using the applications are not considered to be the real owners of the software packages, but only pay for the services provided by the designer packages. Through SaaS, organisations do not have to install the software packages in their computers.

This method is cheaper compared to the other alternative strategies since an organisation does not have to spend a lot of money and time in purchasing, operating and servicing the software.

Software Development Life Cycle (SDLC)

Software development life cycle is the step taken by an organisation to establish the most appropriate software for its business projects. The system is majorly common used by companies with large scale information technology projects.

Software development life cycle has six major steps. The first step is the investigation of the system. It provides an organisation with three alternatives. The first option is to continuously use the available system without making changes.

The second option is to make viable changes to the existing system and the last option is to develop a new system. It is important for an organisation to develop their own software as this will give them an opportunity of controlling how it should work.

Software acquired through leasing or purchasing always come with the settings of the developer hence its applications cannot be controlled by the company. An organisation can be accountable for using their developed software in case of any errors or complications.

This is contrary to the leased or purchased software packages where nobody will be held responsible for any irregularities or errors. It will be easy to effectively correct errors and irregularities when the designers of the software packages come from the company.

Consequently, the company will be able to save a lot of money which they could have spent on paying an outside technician. Additionally, their operations will not be interfered with as there will be ready technicians to handle the problems on time.

Disintermediation in e-commerce

Disintermediation in e-commerce is the removal of middlemen from the chain of distribution. This implies that consumers are able to obtain products directly from the producers. Additionally, producers do not need to sell their products through the wholesalers and retailers.

Through internet marketing services, customers can obtain products at a cheaper cost and faster than those obtained through the retailers and wholesalers (May 118).

The internet is slowly changing the system of product delivery as most of the consumers can now obtain direct information regarding the products and services of their choice. Therefore, they can make decisions on the type of goods and services to buy without the services of the middlemen.

A number of people argue that disintermediation has increased the unemployment rate across the world. Conversely, most people, especially consumers, have liked it (Steinfield 217).

Works Cited

Haley, Connie, Lynne. Jacobsen, and Shai Robkin. Radio Frequency Identification Handbook for Librarians. Westport, Connecticut: Libraries Unlimited, 2007. Print.

Hunt, D, Albert Puglia, and Mike Puglia. Rfid: A Guide to Radio Frequency Identification. Hoboken, N.J: Wiley-Interscience, 2007. Print.

May, Paul. The Business of Ecommerce: From Corporate Strategy to Technology. Cambridge: Cambridge Univ. Press, 2000. Print.

Rainer, K, and Casey G. Cegielski. Introduction to Information Systems. Hoboken, N.J: Wiley, 2011. Print.

Solomon, Michael. Security Strategies in Windows Platforms and Applications. Sudbury, Mass: Jones & Bartlett Learning, 2011. Print.

Steinfield, Charles. New Directions in Research on E-Commerce. West Lafayette, Ind: Purdue University Press, 2003. Print.

Want, Roy. Rfid Explained: A Primer on Radio Frequency Identification Technologies. San Rafael, Calif.: Morgan & Claypool, 2006. Print.

Print
More related papers
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2019, July 5). Research on Radio Frequency Identification Technology (RFID). https://ivypanda.com/essays/research-on-radio-frequency-identification-technology-rfid/

Work Cited

"Research on Radio Frequency Identification Technology (RFID)." IvyPanda, 5 July 2019, ivypanda.com/essays/research-on-radio-frequency-identification-technology-rfid/.

References

IvyPanda. (2019) 'Research on Radio Frequency Identification Technology (RFID)'. 5 July.

References

IvyPanda. 2019. "Research on Radio Frequency Identification Technology (RFID)." July 5, 2019. https://ivypanda.com/essays/research-on-radio-frequency-identification-technology-rfid/.

1. IvyPanda. "Research on Radio Frequency Identification Technology (RFID)." July 5, 2019. https://ivypanda.com/essays/research-on-radio-frequency-identification-technology-rfid/.


Bibliography


IvyPanda. "Research on Radio Frequency Identification Technology (RFID)." July 5, 2019. https://ivypanda.com/essays/research-on-radio-frequency-identification-technology-rfid/.

Powered by CiteTotal, online citation creator
If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Cite
Print
1 / 1