Subtopic Deep Dive

RFID Technology Adoption
Research Guide

What is RFID Technology Adoption?

RFID Technology Adoption examines factors influencing the implementation of Radio Frequency Identification systems across industries, focusing on perceived control, privacy concerns, and supply chain integration.

Empirical studies analyze barriers like consumer trust and organizational readiness in sectors from logistics to aerospace. Key works include Günther and Spiekermann (2005, 278 citations) on perception of control and Reyes et al. (2007, 4 citations) on implementation lessons from four firms. Research spans 2005-2020 with over 350 total citations across provided papers.

14
Curated Papers
3
Key Challenges

Why It Matters

RFID adoption enhances supply chain visibility, as shown in Tewary et al. (2008) aerospace pilot reducing inventory errors by real-time tracking. Privacy concerns in Hommes et al. (2012) intelligent number plates impact transport policy design. Reyes et al. (2007) lessons inform ROI decisions in retail and defense, enabling IoT efficiencies in global logistics.

Key Research Challenges

Consumer Privacy Concerns

RFID tracking raises privacy fears, with Günther and Spiekermann (2005) showing consumers require control over infrastructure for trust. Hommes et al. (2012) highlight ethical issues in intelligent number plate systems for tolling. Studies report low adoption due to surveillance perceptions.

Organizational Implementation Barriers

Firms face integration challenges, as Reyes et al. (2007) detail lessons from four companies on cost and process redesign. Tewary et al. (2008) aerospace pilot reveals supply chain coordination hurdles. Investment decisions remain uncertain per Jankowska-Mihułowicz and Jankowski-Mihułowicz (2014).

Perceived Control Deficits

Users demand influence over RFID systems before acceptance, per Günther and Spiekermann (2005, 278 citations). East (2007) COBIE standard addresses data handover gaps in construction. Empirical surveys in Reyes et al. (2007) confirm control perceptions drive adoption rates.

Essential Papers

1.

RFID and the perception of control

Oliver Günther, Sarah Spiekermann · 2005 · Communications of the ACM · 278 citations

Consumers need to feel they have control over the RFID infrastructure before they routinely trust its services.

2.

Construction Operations Building Information Exchange (COBIE): Requirements Definition and Pilot Implementation Standard

E. William East · 2007 · US Army Corps of Engineers: Engineer Research and Development Center (Knowledge Core) · 56 citations

The Construction Operations Building Information Exchange (COBIE) specification denotes how information may be captured during design and construction and provided to facility operators. COBIE elim...

3.

Radio Frequency Identification (RFID) Implementation Efforts at Four Firms: Integrating Lessons Learned and RFID-Specific Survey

Pedro Reyes, Gregory V. Frazier, Edmund Prater et al. · 2007 · Industry Studies Working Papers (University of Pittsburgh) · 4 citations

For more than a century, information technologies have revolutionized the way supply chain management control systems have been designed and implemented. Particular examples are the telegraph used ...

4.

The intelligent number plate system : protection or violation of motorists' privacy?

Erin Hommes, Marlene Holmner, Marietjie Schutte · 2012 · UpSpace Institutional Repository (University of Pretoria) · 3 citations

A number of ethical issues have come under the spotlight with the proposed implementation
\nof an Intelligent Transport System (ITS), known as the Intelligent Number Plate System
\n(INPS), ...

5.

Piloting RFID in an Aerospace and Defense Supply Chain

Ashish Kumar Tewary, Parag Kosalge, Jaideep Motwani · 2008 · AIS Electronic Library (AISeL) (Association for Information Systems) · 3 citations

Radio Frequency Identification (RFID) is an emerging technology increasingly considered by organizations worldwide to coordinate their supply chain in real time. In order to explore the potential b...

6.

Successfully Teaching Supply Chain Management Content In A Technical Curriculum

Kenneth Stier · 2020 · 1 citations

Abstract NOTE: The first page of text has been automatically extracted and included below in lieu of an abstract Successfully Teaching Supply Chain Management Content in a Technical Curriculum Abst...

7.

CONDITIONS OF INVESTMENT DECISION-MAKING IN AREA OF RFID TECHNOLOGY

Marzena Jankowska-Mihułowicz, Piotr Jankowski-Mihułowicz · 2014 · CBU International Conference Proceedings · 1 citations

The application of the electronic product code (EPC) in an enterprise may turn out to be one of the choices in the future. The subject of this article is an analysis preceding decisive conditions i...

Reading Guide

Foundational Papers

Start with Günther and Spiekermann (2005, 278 citations) for core perception of control theory, then Reyes et al. (2007) for multi-firm implementation data, and East (2007) for standards like COBIE.

Recent Advances

Study Jankowska-Mihułowicz and Jankowski-Mihułowicz (2014) on investment conditions and Stier (2020) on supply chain teaching integrations post-2015 pilots.

Core Methods

Core techniques: firm surveys (Reyes et al., 2007), pilot testing (Tewary et al., 2008), ethical ITS analysis (Hommes et al., 2012), and EPC investment modeling (Jankowska-Mihułowicz, 2014).

How PapersFlow Helps You Research RFID Technology Adoption

Discover & Search

Research Agent uses searchPapers and citationGraph to map adoption literature from Günther and Spiekermann (2005), revealing 278 citations and downstream works on privacy. exaSearch uncovers niche pilots like Tewary et al. (2008) aerospace case; findSimilarPapers links Reyes et al. (2007) to logistics implementations.

Analyze & Verify

Analysis Agent applies readPaperContent to extract implementation metrics from Reyes et al. (2007), then verifyResponse with CoVe checks privacy claims against Günther and Spiekermann (2005). runPythonAnalysis with pandas statistically verifies citation trends; GRADE grading scores evidence strength in adoption barriers.

Synthesize & Write

Synthesis Agent detects gaps in privacy-control research post-2005 via contradiction flagging across Hommes et al. (2012) and Jankowska-Mihułowicz (2014). Writing Agent uses latexEditText, latexSyncCitations for Günther (2005), and latexCompile to produce supply chain reports; exportMermaid visualizes adoption factor diagrams.

Use Cases

"Analyze citation trends and adoption rates in RFID supply chain papers using Python."

Research Agent → searchPapers (Reyes 2007) → Analysis Agent → runPythonAnalysis (pandas plot citations vs years) → matplotlib chart of 2005-2020 trends with statistical correlations.

"Write LaTeX review on RFID privacy barriers citing Günther 2005 and Hommes 2012."

Synthesis Agent → gap detection → Writing Agent → latexEditText (intro), latexSyncCitations (Günther, Hommes), latexCompile → PDF with formatted bibliography and figures.

"Find GitHub repos with RFID adoption simulation code from recent papers."

Research Agent → searchPapers (Jankowska-Mihułowicz 2014) → Code Discovery → paperExtractUrls → paperFindGithubRepo → githubRepoInspect → code snippets for EPC investment models.

Automated Workflows

Deep Research workflow conducts systematic review: searchPapers on 'RFID adoption supply chain' → citationGraph (Günther 2005 cluster) → structured report with 50+ papers graded by GRADE. DeepScan applies 7-step analysis to Tewary et al. (2008) pilot: readPaperContent → CoVe verification → Python stats on outcomes. Theorizer generates theory on privacy-control links from Hommes (2012) and Reyes (2007).

Frequently Asked Questions

What defines RFID Technology Adoption?

It covers factors like perceived control and privacy influencing RFID implementation in supply chains and industries (Günther and Spiekermann, 2005).

What are key methods in RFID adoption studies?

Methods include surveys of firms (Reyes et al., 2007), pilot implementations (Tewary et al., 2008), and ethical analyses (Hommes et al., 2012).

What are seminal papers on RFID adoption?

Günther and Spiekermann (2005, 278 citations) on control perceptions; East (2007, 56 citations) on COBIE data exchange; Reyes et al. (2007) on multi-firm lessons.

What open problems persist in RFID adoption?

Unresolved issues include quantifying privacy ROI (Hommes et al., 2012) and scaling pilots to full supply chains (Tewary et al., 2008; Jankowska-Mihułowicz, 2014).

Research Diverse Research and Applications with AI

PapersFlow provides specialized AI tools for Computer Science researchers. Here are the most relevant for this topic:

See how researchers in Computer Science & AI use PapersFlow

Field-specific workflows, example queries, and use cases.

Computer Science & AI Guide

Start Researching RFID Technology Adoption with AI

Search 474M+ papers, run AI-powered literature reviews, and write with integrated citations — all in one workspace.

See how PapersFlow works for Computer Science researchers