The Electronic Journal of Information Systems Evaluation provides critical perspectives on topics relevant to Information Systems Evaluation, with an emphasis on the organisational and management implications
For general enquiries email administrator@ejise.com
Click here to see other Scholarly Electronic Journals published by API
For a range of research text books on this and complimentary topics visit the Academic Bookshop

Information about the European Conference on Information Management and Evaluation is available here

linkedin-120 

twitter2-125 

fb_logo-125 

 

Journal Article

The use of RFID and Web 2.0 Technologies to Improve Inventory Management in South African Enterprises  pp228-241

Sizakele Mathaba, Nomusa Dlodlo, Andrew Smith³, Mathew Adigun

© Sep 2011 Volume 14 Issue 2, ICIME 2011, Editor: Ken Grant, pp167 - 281

Look inside Download PDF (free)

Abstract

Cost‑effective inventory management includes balancing the cost of inventory with its profit. Most business owners fail to recognize the value of the cost of carrying inventory, which include not only the direct cost of storage, insurance and taxes but also the cost of money tied up in inventory. Running inventory using paper‑based systems, Excel files and traditional enterprise software is a costly and resource‑intensive approach that may not even address the appropriate issues for most businesses. It is with this in mind that this research proposes taking advantage of the Internet of Things (IoT) technology i.e. Radio Frequency Identification (RFID) and Web 2.0 tools in the management of inventory. RFID promotes the communication of things/object through sensors. On the other hand Web 2.0 tools promote the communication of people through their phones or desktop computers. The collaboration of these two technologies could improve inventory management. A comprehensive literature survey is conducted on inventory management functionalities. RFID and Web 2.0 technologies are then mapped to the identified inventory management functionalities. As a result the research proposes inventory management architecture. The paper looks at the architecture of a system that fully integrates the technical advantages of RFID and Web 2.0 tools, such as Twitter for loss prevention and as an enabler for locating misplaced stock, anti‑counterfeiting of stock, and notifications on stock level on the shelve, amongst other applications. The system focuses on enterprises in developing regions in Africa, and South Africa in particular.

 

Keywords: Internet of things, IoT, Radio Frequency Identification, RFID, Web 2.0 tools, inventory management, South African Enterprises, Twitter

 

Share |

Journal Article

Radio Frequency Identification (RFID) Adoption in the South African Retail Sector: an Investigation of Perceptions Held by Members of the Retail Sector Regarding the Adoption Constraints  pp87-96

Chris Upfold, Haidi Liu

© Jan 2010 Volume 13 Issue 1, ECIME 2009, Editor: Elizabeth Frisk and Kerstin Grunden, pp1 - 96

Look inside Download PDF (free)

Abstract

Radio Frequency Identification (RFID) technology is a method of identifying unique items using radio waves that communicate between RFID tags and readers without line‑of‑sight readability. Application areas include person identification, logistics, pharmaceutical, access control, security guard monitoring and asset management. One of the areas where RFID promises excellent potential is in the retail industry for the tracking of goods and products throughout the supply chain. There are concerns around numerous RFID adoption barriers. Decision makers in the South African retail sector seem to be adopting a wait‑and‑see approach. In an attempt to identify and explore these barriers, a literature review was conducted identifying 29 unique barriers to RFID adoption. A survey instrument, informed by these barriers, was constructed and administered to members of the retail sector in South Africa. The research reveals that the South African retail sector is aware of the benefits in adopting RFID technology, however, they have identified numerous adoption barriers that will need mitigation before they will commit to adopting RFID. The research confirms six main categories with several adoption barriers in each, needing to be addressed. The main categories include, RFID skills shortage, a lack of standardization, high costs of RFID devices, the difficulty of integrating with current legacy systems and a lack of familiarity with RFID systems.

 

Keywords: RFID, diffusion of innovation, adoption barriers, business case, supply chain management

 

Share |

Journal Article

Using RFID Inventory Reader at the Item‑Level in a Library Environment: Performance Benchmark  pp107-120

Paul Golding, Vanesa Tennant

© Oct 2010 Volume 13 Issue 2, ICIME 2010, Editor: Shaun Pather and Corrie Uys, pp97 - 196

Look inside Download PDF (free)

Abstract

Radio Frequency Identification (RFID) technology revolutionizes the library operations in areas of circulation and inventory management, and is anticipated to replace barcode. However, there is a surprisingly scarce number of conceptual and empirical researches on RFID performance testing in libraries. The literature has advocated that evaluation is an important activity in the problem‑solving process and that significant difficulties in performance can occur in the absence of test in the related environment. This paper will address and apply a methodology to evaluate the RFID inventory reader in a library with the intent to provide recommendations/best practices on the utility of an inventory reader. The methodology encompassed a design of experiment approach that investigates four factors: read angle (A), read distance (B), tag location (C) and shelf material (D). The findings suggested that read angle, read distance and tag location has a significant impact on the performance on the inventory reader. Initial findings on shelf type (wood or metal) suggest that this factor has an impact on read rate of the inventory reader. The results also shows significant interaction effects between some factors. It is anticipated that the findings may help researchers and library practitioners to understand and further investigate methods to optimize the performance of the reader.

 

Keywords: RFID, evaluation, library, experiment, performance

 

Share |

Journal Issue

Volume 13 Issue 1, ECIME 2009 / Jan 2010  pp1‑96

Editor: Elizabeth Frisk, Kerstin Grunden

View Contents Download PDF (free)

Editorial

This issue represents papers presented at the 3rd European Conference on Information Management and Evaluation. The conference was held in September 2009 at the University of Gothenburg in Sweden.

 

Keywords: accounting firms, adoption, adoption barriers, business case, case study, cluster analysis (CA), collaborative technology (CT) business education, competitive advantage, complexity, computer-supported collaborative learning (CSCL), developing countries, developing countries, diffusion of innovation, e-Business adoption, e-government, e-Government portal, enterprise, ERP, European Union (EU) members, EUS, evaluation, executive information system, health informatics, HealthCare information systems, ICT, information and communication technology (ICT), information technology, integration, IT management practices, Jordan., mixed research, performance strategic value, post-implementation evaluation, RFID, satisfaction, small business, supply chain management, sustainability, TAM, technology-organizational-environment (TOE) framework, video conferencing, video-ethnography

 

Share |

Journal Issue

Volume 13 Issue 2, ICIME 2010 / Oct 2010  pp97‑196

Editor: Shaun Pather, Corrie Uys

View Contents Download PDF (free)

Editorial

We have pleasure in presenting this special issue of EJISE.  As Information and Communications Technologies and the related Information Systems become ever more pervasive across all spheres of business, government and community based organizations, the scope of this journal has flexed to accommodate these varied settings in which pertinent research problems are located.   Consequently, in this special issue wide‑ranging problems related to the broad ambit of IS evaluation is reported on: 

As many countries continue to develop policies to enhance and sustain the growth of the SME sector, so too does the expenditure and consumption of IT amongst this category of business grow at an ever increasing rate thus warranting the attention of evaluation research. Avraam Papastathopoulos and Christina Beneki investigate an important concern with regards to the factors which are associated with the benefits from the adoption of ICTs amongst SMEs. In a study of the Greek SME sector the paper provides evidence that strategy plays a major role in the adoption and the appropriate use of ICTs.  Importantly their research also finds that prior entrepreneurial experience‑knowledge of ICT is significantly associated with the ICT performance. 

RFID technologies are increasingly used in a number of organisational settings for inventory control and management. Paul Golding and Vanesa Tennant contribute to our understanding of evaluation by proposing a methodology to evaluate the RFID inventory reader in a library.  Whilst the findings of this paper hone in on the application of RFID in a specific environment, the findings provide a basis for which evaluation of RFID in other similar contexts can take place, and thus adds to the conceptual base on RFID performance testing.

Notwithstanding many years of case studies and an increasing body of literature on ERP implementation and evaluation thereof questions continue to arise in respect of successful outcomes.  Brian O’Donovan and his co‑authors argue that during the ERP usage stage the intended efficiencies from ERP systems are not always realised. Having studied organisational memory mismatches and the resultant coping strategies their research posits that mismatches and short‑term coping strategies were found to contribute to ERP underperformance. 

In their paper Peter Weimann and co authors investigate the role of communications culture in a distributed team environment.  In assessing the role of ICTs in such an environment the paper argues that team member satisfaction and team success can only be accomplished if the communication culture in the company takes into account the technologies used and the distributed work setting. 

From amongst the various IS evaluation approaches, those apporaches which focus on the role of human stakeholders  are  worthy of a deeper understanding. Jeffrey Bagraim examines the multiple commitments of information technology knowledge workers and the related outcomes of such commitment. The results of his study challenges managers to review their assumptions about the organizational commitments of information technology knowledge workers.

Web 2.0 applications also receive attention in this issue.  Hooper and Evans investigate the value congruence of social networking services in New Zealand, and make an assessment of ethical information handling.  Their findings demonstrate significant shortcomings in the contractual relationships between the users and social networking services and they argue that this could be exploited in order to misuse personally identifiable data.

The paper by Racheal Lindsay and co‑authors discusses measures which are used to monitor data quality in the context of mobile devices in the UK police force.  Their findings show that whilst there are processes in place to verify data standards, these processes only take into consideration the structural completeness of data, and not other measurements of data quality, such as accuracy, timeliness, relevance, understandability and consistency.

Robbert in't Hout and coauthors studied how a wiki could be used to improve knowledge sharing.  The paper reports on a case study in which a consulting company was able to improve knowledge sharing amongst consultants during the devleopment of a Municipal Traffic and Transport Plan.  The findings  suggest that wikis need to be tuned to the learning styles that are available within the community that will use the tool.  In the context of knowledge sharing impolrtant lessons for wiki design are offered.

Finally, in a study of e‑government adoption, Rangarirai Matavire and co‑authors report on factors which inhibit the successful implementation of e‑government in South Africa. The findings of their research demonstrate that leadership, project fragmentation, perceived value of Information Technology, citizen inclusion and task co‑ordination are among the key inhibitors of e‑government success.

Shaun Pather and Corrie Uys

South Africa, October 2010

 

Keywords: affective commitment, boosting behaviour, communication culture, communication pattern, communication technology, data quality, e-Government, enterprise systems, entrepreneurial experience, ERP customising, ERP systems, ERP training, ERP usage, evaluation, grounded theory, helping behaviour, ICT-adoption, ICT-performance, ICT-strategy, interface design , knowledge management , law enforcement, library, mobile working, Municipal Traffic and Transport Planning, New Zealand Privacy Act 1993, ordinal regression, organisational memory, performance , personal security, personally identifiable information, privacy policies, RFID, social networking services , social software, South Africa, turnover intentions, value congruence, virtual teams, Wiki

 

Share |