Prof.Rupali Shinde(Jr.Lecturer)
Omegan Scool of Business,Baroda
Rupalishinde.1980@gmail.com
Abstract
Radio Frequency Identification (RFID) is the latest phase in the trend of the miniaturization of computers. It is an automatic Identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. The technology requires some extent of cooperation of an RFID reader and an RFID tag.
This paper examines the case of one supply chain in the electricity sector where RFID technology integrated with firm’s information systems acts as an enabler of process optimization.
Using a business process approach and laboratory simulation, it is explained that how the implementation of RFID technology can increase the visibility of information at various layers of the supply chain, allowing members to gather precise information on real demand and improve replenishment processes.
On the other hand, while RFID technology has the potential to automate some processes, human intervention is still required. Therefore, used case scenarios and sensitivity analysis should be carefully considered when selecting the proper design (architecture options) for the virtual and hardware components of RFID systems. The choice of the appropriate configuration needs to be integrated in the firm’s strategies and supply chain partner’s vision.
1. Introduction
There is a great deal of hype happening today around Radio Frequency Identification (RFID). Handled Properly a RFID systems solution can result in an evolutionary change incorporating legacy systems with the real-time supply chain management of tomorrow. Many companies are creating RFID initiatives and some are even beginning pilots of this new technology. Following this trend, this paper takes in hand the case of one supply chain in the electricity sector with special weightage on workers in charge of the power grid maintenance and operation.
Highlights of this white paper include:
1)The introductory technical aspects of RFID,which
will clarify it’s meaning, constituents and working.
2)The importance of information technology for the stability
3)The context of the study is presented
4)The research design where the business process approach and laboratory Simulation are presented.
5)Selected RFID-enabled scenarios are discussed in terms of process optimization.
6)The conclusion and future research are presented.
This paper aims to explain how RFID technology combined with the appropriate infrastructure and firm’s information systems can act as an enabler of process optimization and enhance the efficiency of a supply chain of business in the competitive edge.
2. RFID Technology
RFID technology is a wireless automatic identification and data capture (AIDC) technology . A basic RFID system is composed of a tag containing a microprocessor, a reader and its antennas, and a computer equipped with a middleware program, in which business rules are configured to automate some decisions . The tag, which is generally attached to a product, communicates through radio frequencies with the reader’s antennas. The reader sends the location and unique identification of the product to a computer. When this information is routed to specific enterprise information systems (e.g. Enterprise Resource Planning Systems-ERP, Warehouse Management Systems-WMS), automated transactions can be performed such as reject unplanned receipts, directly enter receipt into computers, compare ASN (Advance Shipping Notice) for inbound deliveries, etc.
Beside some standards and technological limitations such as the read rate, data reliability, lack of unified standards, high costs associated to the technology (hardware and software), security issues (i.e. data access, privacy and legislation)], RFID technology presents many advantages over other AIDC (Automatic Identification and Data Capture) technologies such as (i) Identifies many items simultaneously, (ii) line of sight reading not necessary, (iii) Contributes to advanced supply chain management, including: - Reduced out-of-stocks, -Real-time inventory transactions, -
Improved speed and efficiency in product handling (iv) Read/write tags can receive new information trough out an item’s life cycle, (v) Prevents counterfeiting,(vi) Some tags appendable/reprogrammable (vii) Tags carry more data than bar code (viii) Reading can be completely automated,(ix) Data accuracy is extremely high,(x) longer read range etc. While RFID technology is considered promising, there are still many questions concerning its adoption [8], specifically in the ways its real potential can be delivered. Therefore, the objective of this paper is to demonstrate “how business processes can be optimized using RFID technology”.
3. The Importance of Information Technology for the stability of business in competitive edge
Technological developments in the last 4 to 5 decades have been so rapid that they have made visible imact on the life styles of mankind all over the world. The technological changes, have , in fact been at an exponential rate. The advent of new and emerging technologies has added momentum to the process of change. In the years ahead a technology is going to play a very major role in the industrial and socioeconomic growth of any country.This also would have an important bearing in the on the corporate performance.Growth and profitability of an organization will not only depend on resource availability and it’s optimum utilization but also technological content of it’s product and services. A survey of 700 companies in USA has shown that technological content accounted for 1/3rd of their profit in the decade of 90’s as compared to 1/5th of previous decade.The next decade may perhaps take it to ½ .in other words changes in technologies can not be ignored or given a secondary place.
In the specific case of RFID technology, analysts predict a $5.29 billion RFID market in 2008, with an increase of almost 7.3% over the previous years. Forecasts indicate that RFID spending will double before 2012. Other sources evaluate RFID annual growth rates are over 23%. These growing investments in IT are pressuring many academics and practitioners to seek for economic justification as “more than ever IT executives encounter the justification issue due to senior management’s insistence that the investment be properly utilized”. The literature on the evaluation of business value of IT can be classified into two main categories, namely the production-economics based approach and the process-oriented approach. Respectively, studies in the first category use production functions to study the relationship between IT investments and productivity at the firm level, while studies in the second category try to assess the impact of IT investments on specific processes .For instance, by adopting a production-economics based approach showed considerable return in IT investments at the firm level in terms of cost savings, quality of service improvement and better customer service. However, as noted by the impacts of IT investments are “perhaps better observed at the process level (versus the firm level)”. Indeed, when the process approach is used to assess the impacts of IT investments, other factors that affect the translation of these investments into impacts are investigated more obviously. The process-oriented approach has been used by various researchers to assess the impact of IT ,and it has been considered as the best approach to study the impact of IT at a more exhaustive level .
4. Context of the Study
In the utility context, the adoption of RFID technology is still at its early stages and the use of this technology are under preliminary investigation, mainly due to the “technology push” from technology suppliers, as well as competitive market conditions that create pressure toward supply chain optimization solutions. In fact, today, the world energy production is driven by demand with the global energy consumption that has been rising over the past three years at an annual average rate of 4.2% and is expecting to rise in the years to come, with Asia and Australasia (excluding Japan) which are expected to consume almost as much energy as North America by 2009. In Canada, the energy sector accounts for nearly 6% of GDP, which represents 1.9% of the labor force (327,000 jobs) and has been a major engine of growth in recent years). Beside crude oil, natural gas, coal and uranium, Canada is a major producer of electricity in the world (the fifth largest producer of energy in the world), which accounts for 9% of its total energy output. In this sector, the country benefits from low-price electricity as hydroelectric generation is the most important source of electricity supply, accounting for 60% of the total electricity output .Owing to the abundance of energy, the size of its territory, the rigor of its climate and the high level of industrialization of its economy, Canada ranks among the most intensive consumers of energy. Nevertheless, Canada’s energy output exceeds domestic needs from far, and the surpluses are exported in the US which is its major client.
Since 1997, following a restructuring of the North American market initiated by a deregulation opening the markets to competition, utility industry has undergone significant changes, with the entrance of important competitors specializing in the production and trading of electricity and other forms of energy. This phenomenon has pushed industry members to rethink some of their strategies and revise their business practices. In this context, while supply chain applications at a strategic level (e.g. strategy definition, supplier relationship management, contractual logistic management) have been considered as a rich area of opportunity for cost reduction , this article focuses more on the operational aspects of supply chain management. For instance, activities such as power grid maintenance and mobile field service have also been identified as having important effect on cost savings and level of service improvement. It is along this continuum of electronic platforms (e.g. ERP, electronic marketplaces) and IOS adoption, that utilities are now looking toward emerging technologies such as RFID to drive transaction cost reductions.
5. Methodology
This paper is part of a larger study conducted to improve our understanding of RFID technology in a supply chain context. The business process approach and laboratory simulation are selected as they proved to be relevant in order to assess the impacts and potential benefits of RFID technology
5.1 Research sites
The investigated utility supply chain consists of: (i) a focal firm (Firm A), one of its strategic first-tier suppliers (Firm B), and one of its internal customers (Firm C). Firm A is a major player in the utility industry (electricity) in North America. As managers from Firm A indicated, among their primary motivation toward RFID technology adoption, the power grid maintenance and operations (repair) were key areas of potential improvements. Firm A owns two major distribution centers (DCs) and receives thousands of products (namely overhead distribution transformers) every year, of which 15 thousand are considered strategic components of its power supply infrastructure. These products which were selected in the study are distributed in 90 stores disseminated in a vast territory. Following a power outage, missing one product could have a serious impact on network down time. Therefore optimizing product replenishment at specific stores (level) and automating the picking process at the
store location were identified as critical activities.
5.2 Data Collection
For this study, both qualitative and quantitative data were collected using (i) on-site observations, (ii) interviews and (iii) joint working session with industrial partners in laboratory settings.
1. On-site observations were conducted in all research sites involved in this study. The main objective of on-site observations was to map the current intra- and inter-organizational business processes (As-Is) related to the chosen product value chain. This was done using a Business Process Analysis tool (ARIS Toolset) at various stages of the research. The ARIS Toolset is a Business Process Analysis (BPA) tool used for global definition, mapping, analysis, optimization and implementation of business processes. It helps to make “quick decisions about the management of e-business processes, by providing realistic simulations of resource utilisation, activity-based cost calculations, as well as web-based communication of modelled and optimised company processes” .
2. Interviews were conducted with a semi-structured questionnaire to complement to observations and gather more information on specific business processes.
3. Joint working sessions where conducted with key respondents from each firms to identify critical processes to be redesigned while integrating RFID technology The resulting RFID-enabled B2B e-commerce scenarios, therefore, had to be validated by ERP consultants and RFID solution providers and, most importantly, by a middleware provider in order to ensure their technical feasibility. This iterative approach allowed refining the scope of the simulation in laboratory settings (see the RFID laboratory in Figure 2).
5.3 RFID Laboratory
The laboratory where RFID-enabled B2B e-commerce scenarios were simulated is presented in Figure 2.
On the left side, an RFID portal represents the supplier’s shipping dock including:
• Photo eye (1) for automatic product detection and trigger to activate two fixed antennas (2). This procedure allows the antennas to be awakened and transmits radio waves only where necessary.
• These two antennas are connected to a fixed reader
(3) that captures the information written on the tags (4).A stack light (5) linked to this reader allows the confirmation of the status of the readings as the products (or boxes) are passing on the conveyor belts (6).• On the right side of figure 1 of an RFID portal represents a customer’s receiving dock (7) with technical consideration similar to that of the shipping dock.• Based on each specific business cases, other technological options could be considered such as mounted RFID fork lift or handheld RFID gun. • The third part of the laboratory is composed of the ERP and middleware servers where all the business rules are configured. While the new generations of readers allow “built in intelligence”, in the case of these pre-pilot experiments, business rules where configured in the middleware.
• For the purpose of the demo, OMS from Ship2save was used at the supplier location (simulated environment), and Catamaran (provided by Hewlett Packard and Shipcom Wireless) was used at the client location (simulated environment). The integration of these two middleware was facilitated with pre-configured bridges. Because of the scope of this paper, our discussion will only emphasize on the results obtained within Catamaran.
• Ultimately, the last components are the three screens on the walls , where all the information resulting from transactions is projected, allowing participants to follow the information flow in real time, as each transaction is automatically performed.
• Moreover, complementary devices such as mobile RFID reader (i.e. RFID gun) were used, to allow real time access to the middleware in order to take action while being on the move.
6. RFID-Enabled Scenarios
In this study, I have adopted a “store” perspective in conformity with the indication of firms A managers on targeted critical activities. This focus enables researchers to understand HOW the work would be carried out within one store as a power grid operator would handle an electronic working order (e-WO) in order to fix a power outage.
The EPC (Event-driven Process Chains) formalism was used as a common language between all the project stakeholders for the participants to fully understand the impacts of implementing RFID technology on selected processes. The EPC formalism allows a logic representation of activities within and between processes. An interesting aspect of the EPC formalism is that it highlights all the events that trigger the activities and the resulting sequence of events; suggesting that a process can be seen as a chain of events and functions (i.e. an activity which needs to be performed). Moreover, the modeling of a business process using EPC formalism uses three types of logical connectors to indicate the workflow between activities and events, mainly the “^” (i.e. and), “v”(i.e. or) “XOR” (i.e. exclusive or). In addition to the basic representation of a process using EPC formalism, it is possible to assign responsibilities (i.e. employee) to a specific function, allocate a system which is used to perform the function (e.g. ERP, RFID middleware), indicate information inputs and outputs (e.g. RFID data) specify some business rules, assign them to logical connectors and quantify their probabilities of occurrence.
6.1 Simulated Scenarios in the Laboratory
Today, when a power outage occurs, the operators have to call a maintenance center for identifying the closest remote store where required products (e.g. transformers) are available in order to proceed with their picking before to go on the site for repairing the power grid. However, because of store management issues, a store manager has to be assigned for opening the store, providing operators with the products and filling up the documentation. An alternative approach being used is a permanent store manager assigned to a specific store.
Indeed, if multiple stores can constitute critical inventory buffer areas between remote locations and distribution centers, the current situation is rather costly and inefficient. Therefore, a redesigned process integrating RFID technology was proposed and validated in laboratory settings. The simulated scenario represents the automatic “access” to a remote store for the “automatic picking” of a “specific product” in order to fix a power outage that just occurred (Figure 4).
6.2 Discussion
The following course of actions is triggered by an electronic working order (e-WO) sent to an operator in order to fix a power outage that has just occurred.
More precisely, the following steps can summarize the scenario simulated (Figure 4) in laboratory:
1. When the e-WO is received, the operator can directly access the ERP from the field, using a wireless device (i.e. PDA), check product availability in the inventory and reserve the required product at the closest store.
2. When the product arrives at the store, by automating its identification (i.e. RFID employee smart card), the operator automatically access the store, locate the reserved product, scan the product to confirm the matching with a specific e-WO before picking it up (i.e. operator equipped with RFID reader with embedded middleware functionalities and products equipped with RFID tags) (Figure 3, part (a)).
3. Once the verification is performed, the operator semi automatically validates the transaction by associating a specific e-WO with this specific product (Figure 3, part (b)) and posts the transaction into the ERP (Figure 3, part (c)).
4. As this transaction is posted, this triggers other functions such as the automatic inventory adjustment in the ERP in real time (Figure 3, part (c-1, c-2)). This could in turn trigger more events such as sending a notification to specific supply chain members on the stock movements.
5. Finally, as the operator exits the store, a notification is sent to the ERP to notify the status of the employee.
The same logic could be used to follow the whole process from power outage to reparation, giving the organization a better visibility on its mobile workforce performance.
7. Conclusion
This study attempts to improve our understanding of the impact of RFID technology on business processes by trying to answer the following question: “How business processes can be optimized using RFID technology?” In terms of practical implications, it is in line with recent questions raised about RFID while these authors are asking for models, theories, concepts, frameworks, methods, techniques, and tools that are being applied in practice, raising the importance on RFID research to meet the needs of practitioners and managers.
Our results suggest that, when implementing RFID technology at the store level, the visibility could allow supply chain members to gather precise information on real demand, thus enabling lean assembling at the supplier’s level and optimizing the replenishment procedures at the distribution center and at the store levels. Also, in critical situations, as power outage minimum downtime is a key issue, RFID technology seems to be a relevant technology to increase the responsive of organization managing emergency situations. Moreover, RFID technology still requires human intervention for some activities. For example, the operator still has to select the exact working order to match the specific product for the billing of a project. More intelligent business rules could have been configured in the middleware to avoid this human intervention, but is it worth it? Indeed, each scenario could lead to many possible configurations, suggesting that use case scenarios and sensitivity analysis should be carefully considered when selecting the proper design (architecture options) for the virtual and hardware components of RFID systems.
In reality, the exercise can be highly complicated, when considering all the options for selecting (i) the proper RFID systems vs. other AIDC systems (ii) the type of wireless network, (iii) the level of integration with various enterprise information systems modules, and with ecommerce intra and inter organizational systems. Moreover, beside trade off on functionality vs. costs consideration, the selected configuration will heavily depend on the decisions of different managers at the supply chain level. This raises the issue of the identification and selection of performance measurement that needs to be shared among supply chain members in order to evaluate the implementation of the retained scenario. Indeed, when building RFID-enabled scenarios, such performance measures would enable managers to (i) evaluate and control the performance of their resources, (ii) communicate these performance, and (iii) improve their supply chain processes by identifying gaps (between "As-Is" situation and expectation) and point out at action for improvements. Also, the integration of RFID infrastructure with the existing enterprise information systems at focal firm level and between supply chain members could be a very challenging task and require a high level of collaboration. The next logical step of this research could be the investigation of the impact of RFID on the supply chain members’ relationship.
References
[1] ARIS Toolset. “ARIS toolset: the professional tool for e-business engineering,” 2008. Retrieved May 22, 2008, from:http://www.palma.com.jo/Downloads/Factsheets/AR IS_Toolset_FS_en_2004-02.pdf
[2] Asif, Z. & Mandviwalla, M. “Integrating the supply chain with RFID: a technical and business analysis,” Communications of the Association for Information Systems, 2005, 15, 393-427.
[3] Beamon, B.M.“Measuring Supply Chain Performance,”International Journal of Operations & Production Management,1999, 19(3), 275-292.
[4] Bendavid., Y., Lefebvre, É., Lefebvre, L.A. & Fosso Wamba, S. “B-to-B e-Commerce: Assessing the impacts of RFID technology in a five layer supply chain,” Computer Society Press, IEEE, Proceedings of HICSS, B-to-B E-Commerce Mini-Track, Hawaii, 2007.
[5] Brynjolfsson, E. & Hitt, L.M. “Paradox lost? Firm-level evidence on the returns to information systems spending,” Management Science, 1996, 42(4), 541–558.
[6] Byrd, T.A. & Davidson, N.W. “Examining possible antecedents of IT impact on the supply chain and its effect on firm performance,” Information & Management, 2003, 41,243–255.
[7] ChainLink Research. “RFID Checklist: RFID Markets and Solutions for 2008,” 2007. Retrieved May 20, 2008, from: http://www.clresearch.com/ActiveRFID.htm.
[8] Curtin, J., Kauffman, R.J. & Riggins, F.J. “Making the most out of RFID technology: A research agenda for the study of the adoption, usage and impact of RFID,” Information Technology and Management, 2007, 8(2), 87–110.
[9] Devaraj, S. & Kohli, R. “Performance impacts of information technology: Is actual usage the missing link?,” Management Science, 2003, 49(3), 273–299.
[10] Economist Intelligence Unit, 2005. Retrieved September 12,2007, from http://www.eiu.com/index.asp?rf=0
[11] Emarketer. “IT Spending and Trends,” 2005. Retrieved June10, 2006, from: www.eMarketer.com
[12] Energy Information Administration. “Country analysis in brief,” 2007. Retrieved April 15, 2007 from: www.eia.doe.gov
[13] Elia, E., Lefebvre, L.A. & Lefebvre, É. “Typology of B-to-B E-Commerce Initiatives and Related Benefits in Manufacturing SMEs,” Proceedings of the 37th Hawaii International Conference on System Sciences.
[14] Fleisch, E. & Tellkamp, C. “Inventory inaccuracy and supply chain performance: a simulation study of a retail supply chain,” International Journal of Production Economics, 2005,95(3), 373-385.
[15] Fosso Wamba, S., Lefebvre, L. A. & Lefebvre, É. “Enabling intelligent B-to-B eCommerce supply chain management using RFID and the EPC network: a case study in the retail industry,” ICEC 2006, 281-288.
[16] Fosso Wamba, S., Lefebvre, L.A., Bendavid, Y. & Lefebvre, É. “Exploring the impact of RFID and the EPC network on mobile B2B eCommerce: a case study in the retail industry,” International Journal of Production Economics, Special Issue on RFID: Technology, Applications, and Impact on Business Operations, 2008, 112, 614–629.
[17] Gaukler, G.M. RFID in supply chain management. Ph. D. Thesis, Stanford University, 2005.
[18] Gunasekaran, A. &. Ngai, E.W.T. “Build-to-Order Supply Chain Management: A Literature Review and Framework for Development,” Journal of Operations Management, 2005,
23(5), 423-451.
[19] Hanson, D., Knapp, T. & Olson, E. “Enabling high performance in utilities through supply chain management”,2005, Retrieved June 10, 2006, from
http://www.accenture.com/Global/Services/By_Subject/Supply _Chain_Mgmt/R_and_I/EnablingManagement.htm.
[20] Hardgrave, B.C., Waller, M. & Miller, R. “Does RFID Reduce Out of Stocks? A Preliminary Analysis,” Information technology research institute, 2005, retrieved February15,2007from http://itri.uark.edu/research/default.asp
[21] Hou, J.L. & Huang, C.H. “Quantitative performance evaluation of RFID applications in the supply chain of the printing industry,” Industrial Management & Data Systems,2006, 106(1), 96-120.
[22] IDTECHEX (2008). “RFID Forecasts, Players and Opportunities 2008-2018”.
[23] Kelepouris, T., Pramatari, K. & Doukidis, G. “RFID-enabled traceability in the food supply chain,” Industrial Management & Data Systems, 2007, 107(2), 183-200.
[24] Kohli, R. & Sherer, S. “Measuring payoff of information technology investments: Research issues and guidelines,” Communications of the AIS, 2002, 9(14), 241–268.
[25] Lefebvre, L.-A., Lefebvre, É., Bendavid, Y., Fosso Wamba, S. & Boeck, H. “The potential of RFID in warehousing activities in a retail industry supply chain,” Journal of Chain and Network Science, 2005, 5(2), 101-111.
[26] Loebbecke, C. & Palmer, J. “RFID in the Fashion Industry: Kaufhof Department Stores AG and Gerry Weber International AG, Fashion Manufacturer,” Management Information Systems Quarterly Executive (MISQE), 2006, 5(2), 15-25.
[27] Loebbecke, C. “RFID Technology and Application in the Retail Supply Chain: The Early Metro Group Pilot,” 18th Bled conference on eIntegration in action, Bled, Slovenia, June 6-8,2005.
[28] Melnyk, S.A., Stewart, D.M. & Swink, M. “Metrics and performance measurement in operations management: dealing with the metrics maze,” Journal of Operations Management,
2004, 22, 209–17.
[29] Ngai, E.W.T., Moon, K.L., Riggins, F.J., Candace, Y. Yi., “RFID research: An academic literature review (1995–2005) and future research directions”. International Journal of Production Economics, 2008, 112(2), 507-1010.
[30] Pavlou, P.A., Housel, T.J., Rodgers, W. & Jansen, E. “Measuring the return on information technology: a knowledge-based approach for revenue allocation at the process and firm level,” Journal of the Association for Information Systems, 2005, 6(7), 199-226.
[31] Pramataris, K.C., Doukidis, G. I. & Kourouthanassis, P. “Towards ‘smarter’ supply and demand-chain collaboration practices enabled by RFID technology,” The Hermes Newsletter, Eltrum, 31, March – April 2005.
[32] SAP “Strategies for profitable growth in utilities industry,2005, retrieved from www.sap.com/industries/utilities/pdf/BWP_Strategies.pdf
[33] Zhu, K. & Kraemer, K.L. “E-Commerce metrics for net-enhanced organizations: assessing the value of e-commerce to firm performance in the manufacturing sector,” Information Systems Research, 2002, 13(3), 275-295.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment