You are on page 1of 14

University of Wollongong

Research Online
Sydney Business School - Papers Faculty of Business

2013

Factors affecting radio frequency identification


technology implementation: a comparative study
of Australian and Chinese supply chains
Shams Rahman
RMIT University, shamsr@uow.edu.au

Shahadat Khan
RMIT University

Stephen Waters
University of Wollongong, smw080@uow.edu.au

Laura Yang
Shanghai University of International Business and Economics

Publication Details
Rahman, S., Khan, S., Waters, S. & Yang, L. (2013). Factors affecting radio frequency identification technology implementation: a
comparative study of Australian and Chinese supply chains. 24th Australasian Conference on Information Systems (pp. 1-12).
Melbourne, Australia: ACIS.

Research Online is the open access institutional repository for the University of Wollongong. For further information contact the UOW Library:
research-pubs@uow.edu.au
Factors affecting radio frequency identification technology
implementation: a comparative study of Australian and Chinese supply
chains
Abstract
Radio Frequency Identification (RFID) technology has emerged as one of the most significant process
innovations in supply chain contexts. It is a proven technology with the capability to increase accuracy,
efficiency and speed of supply chain processes; reduce inventory and handling costs. The aim of this study is
to investigate and compare enabling factors of RFID implementation in Australian and Chinese supply chains.
Employing the analytic hierarchy process (AHP) approach this study suggests that managers in Chinese firms
have a very different view concerning importance of factors for RFID implementation. Australians firms view
technological factor-category as the most important priority, whereas Chinese firms view it as the least
important category. Again, Australian firms view organizational factor-category as one of the least important
priorities in terms of RFID implementation, whereas Chinese view it by far the most important. With respect
to external environment category, there was no agreement - opinions varied widely. For Chinese managers this
category of factor is quite important, whereas Australian managers view it as the least important priority.
However, with respect to economic factor-category, views were generally in agreement, although levels of
importance differed significantly. For effective implementation of RFID in their supply chains, managers in
Australian and Chinese firms must take into account priorities associated with these factor-categories and
individual factors. In particular, Chinese firm must buy-in top management support, and concentrate on
hardware&software cost and tag cost, whereas, Australian firm must concentrate on standards, tag cost and
implementation cost.

Keywords
supply, chains, identification, frequency, radio, affecting, factors, implementation, australian, comparative,
study, chinese, technology

Disciplines
Business

Publication Details
Rahman, S., Khan, S., Waters, S. & Yang, L. (2013). Factors affecting radio frequency identification
technology implementation: a comparative study of Australian and Chinese supply chains. 24th Australasian
Conference on Information Systems (pp. 1-12). Melbourne, Australia: ACIS.

This conference paper is available at Research Online: http://ro.uow.edu.au/gsbpapers/445


24th Australasian Conference on Information Systems Challenges of RFID Application in Australia and China
4-6 Dec 2013, Melbourne Rahman et al.

Factors Affecting Radio Frequency Identification Technology


Implementation: A Comparative Study of Australian and Chinese Supply
Chains
Shams Rahman
Shahadat Khan
School of Business IT and Logistics
RMIT University, Melbourne, Australia
Email: shams.rahman@rmit.edu.au

Stephen Waters
Sydney Business School
Wollongong University, Wollongong, Australia
Email: s.waters@uow.edu.au

Laura Yang
International Education School
Shanghai University of International Business & Economics, Shanghai, China
Email: laurayang7010@yahoo.com.cn

Abstract
Radio Frequency Identification (RFID) technology has emerged as one of the most significant process
innovations in supply chain contexts. It is a proven technology with the capability to increase accuracy,
efficiency and speed of supply chain processes; reduce inventory and handling costs. The aim of this study is to
investigate and compare enabling factors of RFID implementation in Australian and Chinese supply chains.
Employing the analytic hierarchy process (AHP) approach this study suggests that managers in Chinese firms
have a very different view concerning importance of factors for RFID implementation. Australians firms view
technological factor-category as the most important priority, whereas Chinese firms view it as the least
important category. Again, Australian firms view organizational factor-category as one of the least important
priorities in terms of RFID implementation, whereas Chinese view it by far the most important. With respect to
external environment category, there was no agreement – opinions varied widely. For Chinese managers this
category of factor is quite important, whereas Australian managers view it as the least important priority.
However, with respect to economic factor-category, views were generally in agreement, although levels of
importance differed significantly. For effective implementation of RFID in their supply chains, managers in
Australian and Chinese firms must take into account priorities associated with these factor-categories and
individual factors. In particular, Chinese firm must buy-in top management support, and concentrate on
hardware & software cost and tag cost, whereas, Australian firm must concentrate on standards, tag cost and
implementation cost.

Keywords
Analytic Hierarchy Process (AHP), Australia, China, Enabling factors, Radio Frequency
Identification (RFID) technology

INTRODUCTION
Radio Frequency Identification (RFID) technology which uses radio waves to identify, trace and track products
is increasingly being used in supply chains (Sarac et al., 2010). However, application of this technology is not
new. Initial applications of RFID include electronic road toll collection (Landt, 2001), railcars tracking and
animal tracking (Dew, 2006; Jones et al., 2005). Dell’s assembly line workers build computers based on
information provided by RFID tags attached to moving trays (Srivastava, 2004). Boeing Ltd utilises RFID by
fastening RFID tags containing critical information to spare parts for maintenance purposes (Asif and
Mandviwalla, 2004). Recent advances in RFID technologies, improvements in Internet technologies and lower
costs of tags have generated an interest in RFID capabilities as an inter-organisational system. RFID supply
24th Australasian Conference on Information Systems Challenges of RFID Application in Australia and China
4-6 Dec 2013, Melbourne Rahman et al.

chain applications became popular only following the mandate from retail giant Wal-Mart in 2003 (Prater and
Frazier, 2005).
Literature suggests that adoption of RFID technologies can increase accuracy, efficiency and speed of supply
chain processes; reduce storage and handling costs (Li et al., 2006). Thonemann (2002) reports that by deploying
RFID technologies Wal-Mart and Procter and Gamble reduced inventory by 70% and improved service levels
from 96 per cent to 99 per cent. Hoffman (2007) reports that companies that have adopting RFID made
significant improvement in key supply chain metrics such as cycle time, per cent on-time delivery, safety stock,
changeover time and out-of-stocks. However, such gains are not without challenges such as development and
implementation costs, complexity and compatibility of technologies and, privacy and security. The purpose of
this study is two folds. First, to assess the criticality of RFID implementation factors in Australian and Chinese
supply chains. Second, compare the importance of these factors in the Australian and Chinese supply chain
contexts.
The remainder of the paper is organized as follows. First, we review the literature on RFID implementation in
the following section and develop a conceptual framework. Next, we provide the research methodology, and
background of sample organisations and respondents. Then we present and discuss our results. Lastly, we
present our conclusions and limitations of this study.

LITERATURE REVIEW
Literature on RFID identifies a number of issues believed to be obstacles to RFID implementation. These
include incompatible standards, a lack of infrastructure, and the failure to precisely calculate return on
investment (ROI) (Wu et al., 2006). In addition, the factors such as technical limitations, cost constraints and
organizational barriers have also deepen the reluctance of top levels of management to embrace RFID (Curtin et
al., 2007).

Drawing on extant empirical RFID adoption literature, Brown and Russell (2007) establish the suitability of
three categories of factors for analysing the implementation characteristics of RFID technology. These include
technological, organisational, and external environmental challenges (Brown and Russell 2007). In addition,
economic factors were considered as an important category (Shih et al., 2008). Therefore, our literature includes
these four categories. These factor-categories and specific factors are discussed in the following sub-sections.

Technology-related Factor Category


Earlier literature identifies compatibility, and complexity, as challenges influencing the implementation of
information technology (Tornatzky and Klein 1982). These challenges are acknowledged in the adoption process
of both EDI (Premkumar et al., 1997) and e-business (Beatty et al., 2001). Davenport and Brooks (2004)
describe uncertainties about the compatibility of RFID with other systems (including enterprise resource
planning [ERP] systems) as a potential obstacle. RFID is a complex set of considerations, with different
operating systems, hardware, languages, and architectural structures (Gessner, Volonino et al. 2007). These
challenges are compounded by the fact that RFID networks require globally synchronised numbering, frequency
and power standards. Research ranks standards as the number one challenge from a list of twelve issues shaping
the future of RFID (Viehland and Wong, 2007). RFID requires several important standards to work effectively.
A summary of the technology-related factors is given in Table 1.

Table 1. Technology-related Factors

Technological factor category Source


Compatibility Attaran 2007; Curtin et al. 2007; Tsai et al. 2010
Complexity Loebbecke 2007; Park et al. 2009; Wamba 2011

Standards Sweeney 2005; Twist 2005; Viehland & Wong 2007


Data volume Angeles 2005; Lin et al. 2007; Twist 2005; Zeier et al. 2009

Economic Factor Category


Cost is another important issue regarding RFID adoption (Viehland and Wong, 2007). Tag cost, which range
between USD$0.05-0.25 (Attaran, 2007), is one of the critical aspects of variable cost. Infrastructure costs also
affect adoption intentions with one source estimating the cost of infrastructure as between USD$2-16 million
(Chappell et al., 2003). Finally, training costs are often unknown and may at times be greater than the expenses
24th Australasian Conference on Information Systems Challenges of RFID Application in Australia and China
4-6 Dec 2013, Melbourne Rahman et al.

on technology (Walker, 2004). These economic factors impact adversely on RFID adoption intentions when
compared to the relatively cheap, established costs of barcode technology. A summary of the economic factors is
given in Table 2.

Table 2. Economic-related Factors

Economic factor-category Source

Hardware and software cost Asif & Mandviwalla 2004; Brown & Russell 2007;
Smart et al. 2010; Walker 2004
Tag cost Lee & Lee 2010; Li et al. 2006; Reyes & Jaska 2007

Implementation cost Sarac et al. 2010; Veeramani et al. 2008

Organisational Factor Category


Two organisational factors that may influence the implementation of information technology are organisational
size and top management support (Grover, 1993). Research suggests that RFID technologies are expensive and,
hence, could be more applicable for larger organisations with the requisite resources (Lin and Ho, 2009).
Equally, larger organisations must often choose between risky innovations to remain competitive. Top
management commitment to IT initiatives is critical for the adoption of RFID technology (Ngai et al., 2005;
Attaran, 2007). Technological readiness includes the critical abilities of being able to source IT skills and
partnering with competent technology providers (Sharma et al., 2007). A summary of the organisational factors
is given in Table 3.

Table 3. Organisational Factors

Organisational challenge-category Source

Top management support Attaran 2007; Wamba et al. 2010; Wang et al. 2012
Organisational size Hamilton et al. 2009; Jones et al. 2005; Strüker & Gille 2009
Organisational IT readiness Angeles 2009; Kim & Garrison 2010; Lee & Shim 2007

External Environmental Factor Category


Studies suggest that a number of external environmental factors influence the RFID implementation. Firstly,
industry pressure affects decisions to adopt RFID (Sharma et al., 2007). For example, Walmart’s mandate to
install RFID systems (Reyes and Jaska, 2007), and suppliers’ awareness of the consequences of not complying
(Murphy, 2003), resulted in the adoption of the technology. Secondly, security is a major factor in considerations
of implementing RFID. Open systems raise serious concerns about corporate espionage, trust, inadvertent
disclosure of information to competitors, and threats to infrastructure (Shih et al., 2005). Technology providers
are continuously counteracting these issues in order to build confidence in the security of RFID (Backhouse,
2002). Finally, privacy is an issue with consumers concerned about unwanted access to information held on
tagged products after they leave the store (Knospe and Pohl, 2004). Benetton, a major international clothing
producer, abandoned tagging plans due to consumer boycott actions (Atkinson, 2004). A summary of the
external environmental factors is given in Table 4.

Table 4. External environmental factors

External environmental factor category


Source
Industry forces Boeck & Wamba 2008; Hingley et al. 2007; Loebbecke &
Reyes 2007; Sullivan 2004
Security Alomaur & Poovendran 2010; Langheinrich 2009; Pietro
& Molva 2011; Spiekermann 2009; Weber 2010
Privacy Alomaur & Poovendran 2010; Angeles 2007;
Langheinrich 2009; Spiekermann 2009; Weber 2010
24th Australasian Conference on Information Systems Challenges of RFID Application in Australia and China
4-6 Dec 2013, Melbourne Rahman et al.

The issues and challenges foregrounded above inform our conceptualisation of factor categories in our work on
industry intentions to implement RFID. The enabling factors of RFID implementation and the structure of the
problem are shown in Figure 1.

RESEARCH METHODOLOGY
Method of Analysis – Analytic Hierarchy Process
This study employs the analytic hierarchy process (AHP) method for analysis. AHP is a decision-making
approach which integrates simultaneously qualitative and quantitative information for prioritizing alternatives
when multiple criteria must be considered. Over the last twenty-five years AHP has been widely used to solve
decision problems in areas such as supply chain risks assessment (Schoenherr et al. 2008), 3PL selection (Gol
and Catay, 2007); supplier selection (Wang et al. 2004). To understand the nature of the AHP applications
surveys were conducted in the past (Vaidya and Kumar, 2006; Steuer and Na, 2003; Ho, 2008). Steuer and Na
(2003) review the literature of the applications of AHP in the finance area, whereas, Vaidya and Kumar (2006)
explore the use of AHP in areas such as education, engineering, government and sports. Ho (2008) reviews the
literature of the applications of the integrated AHPs published between 1997 and 2006. More recently, Rahman
et al. (2011) investigate the applications of multi-criteria decision making technique AHP and its variants such as
fuzzy AHP and ANP in logistics research. With AHP complex decision problems can be decomposed into a set
of manageable decision-making problems. Besides providing the consistency in managers’ judgement, the main
benefit of AHP in relation to other methods, such as obtaining managers preferences through Likert scales, is the
fact it is in line with the basic idea of the trade-off concept (Skinner, 1969). It forces managers to make explicit
comparisons between priorities. This results in relative importance weights for each priority challenges.
Moreover, the AHP analysis not only illuminates the ranking of the priorities, but also assesses how much
more/less important a given priority is.

RFID
implementation
Objective factors

Technological Economic Organisational External environment


Factor category
factor category factor category factor category factor category
Top management support
IT readiness
Compatibility

Firm size
Data volume

Privacy

Security

Industry force
Standards

Hardware/Software cost
Complexity

Implementation

Tag cost

Factor

Figure 1: Structure of the AHP model

The modeling process of AHP involves four steps:


1. assessment of the key factors of RFID implementation,
2. structuring the problem as a hierarchy and building the AHP model,
3. collection and compilation of experts’ opinions and application of the prioritisation procedure, and
4. determination of critical factors through the synthesis of normalized priority weights and checking the
consistency of opinions of respondents.

Step 1: Identification of key factors. The first step involves identification of key factors of RFID implementation.
A total of thirteen challenges were identified and classified into four factor-categories (see Figure 1). These
24th Australasian Conference on Information Systems Challenges of RFID Application in Australia and China
4-6 Dec 2013, Melbourne Rahman et al.

factors are used for analysis and to identify critical factors of RFID implementation in Chinese and Australian
supply chains.
Step 2: Structuring the problem as a hierarchy. The structuring step consists of breaking down any complex
multiple criteria decision-making problem into a series of hierarchies or set of integrated levels.
Step 3: The next step is the application of the prioritization procedure to determine the relative importance of
criteria (factor-categories and factors) in each level. Criteria in each level are compared pair-wise in terms of
their importance to a criterion in the next higher level. Starting at the top of the hierarchy and working down, a
number of preference (square) matrices are generated in the process of comparing criteria at a given level. A
generic matrix is as follows:

(1)

where rows indicate ratios of weights of each factor with respect to all other factors. The scale used for pair-wise
comparisons in AHP is called a one-to-nine scale. For a set of n factors in a matrix, (n2 − n)/2 judgments are
needed because there are 1’s on the diagonal (comparing factors with themselves) and the remaining judgments
are reciprocals (aji = 1/aij).
Step 4: The fourth and final step of AHP is the determination and synthesis of normalized weights. The
normalized weights can be determined using either the eigenvector method or the simple row average method.
The preference matrices generated in step three are translated into largest eigenvalue problems and solved to find
unique and normalized vectors of weight to factors in each level of hierarchy. When matrix A (Eq. 1) is
multiplied by the transpose of the vector of weights w, we get the resulting vector in nw,
Aw = nw, (2)
where w = (w1; w2; . . . ; wn)T and n is the number of rows or columns. Further, Eq. (2) could be rewritten as:

(A − nI)w = 0, (3)

where n is also the largest eigenvalue, λmax, or trace of matrix A and I is the identity matrix of size n. For a
further mathematical discussion of this method, see Saaty and Vargas (1982). The overall weights of the decision
alternatives are determined by aggregating the weights throughout the hierarchy. This is done by following a
path from the top of the hierarchy to each alternative at the lowest level and multiplying the weights along each
segment of the path and the best alternative is chosen for the decision purpose.

AHP offers not only a methodology to rank alternative courses of action but also provides a direct measure of
consistency of judgment elicited by the decision makers. Saaty (1977) demonstrated that λmax = n is a necessary
and sufficient condition for consistency. Inconsistency may arise when λmax deviates from n due to inconsistent
responses in pair-wise comparisons. Therefore, the matrix A should be tested for consistency using the formula:
CI = (λmax − n)/(n − 1) (4)
CR = CI/RI (5)
where CI is the consistency index, RI is random index generated for a random matrix of order n, and CR is the
inconsistency ratio. The CR refers to the degree to which decision-makers adhere to the rank order specified and
measures the extent to which an established preference is kept. A CR ≤ 0.1 is recommended as acceptable (Saaty
and Kearns, 1985). If CR > 0.1, it is suggested that the decision-makers reevaluate their judgments.
Homogeneity of factors within each group, smaller number of factors in the group, and better understanding of
the decision problem would improve the consistency index (Saaty, 1993).
Sample Firms and Respondents
A two-part questionnaire was employed for data collection. Part A contained questions (in AHP format)
designed to capture experts’ (decision-makers) opinions on the relative importance of factors, whereas, Part B
contained general questions about the company and experts’ background. First the questionnaire was designed in
English and then was translated in Mandarin by one of the authors for use in China. Before the primary study
was implemented, the questionnaire was pre-tested by two senior logistics managers (one from China, in
Shanghai region and one from Australia, state of Victoria). The readability and understandability of the
instrument was subsequently improved based on the comments and suggestions from these respondents.
24th Australasian Conference on Information Systems Challenges of RFID Application in Australia and China
4-6 Dec 2013, Melbourne Rahman et al.

The critical case sampling method was used to identify the cases for this study. Critical case sampling is a type
of purposive sampling (Neuman, 1991) that looks for cases that are ‘particularly information rich’ in relationship
to the questions under consideration (Yin, 2003). The following guidelines were used to select the sample
companies and respondents for interviews:
 companies who intent to implement RFID in their supply chains, and,
 respondents who have experience with barcode technology and have some exposure to RFID
implementation.

All respondents were assured that their answers would be kept confidential. Neither the Australian nor the
Chinese managers were familiar with the AHP data collection procedure. Therefore, the following two steps
were considered:
 respondents were explained the meaning of the integer scores of the 1-9 scale used for data collection.
 respondents were explained how these scores need to be considered while making the pairwise
comparisons between any two factors.
These two steps were critical to ascertain the accuracy of data.
Chinese Firms
Six firms in China were chosen for this study. These are large firm with employees ranging between 300 and
over 2500. Six senior managers were chosen from these companies (one from each company) who have
experiences in both bar code and RFID technologies. All six interviews were conducted face-to-face by one of
the authors using the mandarin version of the questionnaire and each interview lasted approximately 45 minutes.
All managers have working experience with both barcode and some experience with RFID technologies, hence
they were in a position to make judgments on the factors that would impact adoption of RFID. Interviewee
answers were recorded using the AHP matrix. A summary of the companies and respondents is given in Table 5.

Table 5. Chinese Firm Characteristics and Respondents’ Job Titles

Firm No. of Employee Job title of respondent


AA > 2500 Deputy General Manager

BB 300-500 Senior IT Manager

CC 1001-1500 Managing Director

DD 1001-1500 General Manager


EE 1001-1500 IT Manager

FF 501 - 1000 General manager

Table 6. Characteristics of Firms and Respondents in Australia


Firm No. of Employee Job title of respondent
XA > 500 Supply Chain Manager
XB > 500 IT Manager
XC 20 - 200 Logistics Manager
XD > 500 Distribution Manager
XE < 20 Manufacturing Manager
XF 20 - 200 Manufacturing Manager
XG > 500 E-business Manager
XH 20–200 Technical Manager
XI 20–200 Technical Manager
XJ 20–200 Business Development Manager
XK < 20 Business Development Manager
XL 20 - 200 Business Development Manager
Australian Firms
To assess the criticality of factors affecting RFID implementation in Australia twelve firms were chosen. The
size of the firms ranged from quite small, with 20 or fewer employees, to larger organisations represented by
24th Australasian Conference on Information Systems Challenges of RFID Application in Australia and China
4-6 Dec 2013, Melbourne Rahman et al.

more than 500 staff. From these firms twelve senior managers were identified to conduct face-to-face interviews
and each interview lasted approximately 45 minutes. Managers who participated in the study were assured that
all details of their organisations would remain strictly confidential, in line with ethics approval. All managers
have working experience with both barcode and some experience with RFID technologies, hence like managers
in the Chinese firms, they were also in a position to make judgments on factors that would impact
implementation of RFID. Interviewee answers were recorded using the AHP matrix. A summary of the
companies and respondents is given in Table 6.

RESULTS AND DISCUSSION


In order to determine the priority weight of each factor-category and each factor, judgment matrices, based on
managers’ interviews, were translated into the largest eigenvalue problems, and then calculated the normalized
and unique priority vectors of weights by using the Expert Choice® Software. The overall inconsistency index of
judgments was then calculated for performance measures and critical challenges. This was done taking all
responses together using geometric means of six responses for Chinese firms and twelve responses for
Australian firms.

Numerical analysis was conducted in two stages: (1) determination of weights of each higher level factor-
category; (2) determination of weights of each factor under each higher level factor-category. Hence, the
outcome of the first stage would identify the degree of importance for each factor-category as a percentage of
total importance over all measures in RFID implementation considered. Based on the outcome of this evaluation,
factors contributing to each higher level factor category in RFID implementation could be prioritised, so that
firms adopting RFID can choose the appropriate levels of those factors in their implementation projects.

Figure 2 shows that the main factor-category in adopting RFID in China is related to organizational challenges,
with an overall weight of 0.292. The second most important factor-category is economic (weight = 0.276), the
third is external environment (weight = 0.221), and the forth is technological factor (weight = 0.210). However,
the range of weights is narrow, suggesting that each factor-category contributes significantly to the
implementation of RFID.

0.4465
Technological
0.1

0.0394
External Environment
0.221

0.4274
Economic
0.276

0.0896
Organisational
0.292

0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5
Australia China

Figure 2: Weight priorities of factor-categories


(For Chinese managers inconsistency = 0.00085; for Australian managers inconsistency = 0.050)

The main factor-category in adopting RFID in Australia is the technological factor, with an overall weight of
0.4465. The second most important factor-category is economic (weight=0.4274), the third is organisationl
(weight = 0.0896), and the fourth is external environment (weight = 0.0394).

From Figure 2 it is clear that managers in Chinese firms have a very different view concerning importance of
factors for RFID implementation. Australians firms view technological factor-category as the most important
priority, whereas Chinese firms view it as the least important category. Again, Australian firms view
organizational factor-category as one of the least important priorities in terms of RFID implementation, whereas
Chinese view it by far the most important. With respect to external environment category, there was no
agreement – opinions varied widely. For Chinese managers this category of factor is quite important, whereas
Australian managers view it as the least important priority. However, with respect to economic factor-category,
views were generally in agreement, although levels of importance differed significantly.
24th Australasian Conference on Information Systems Challenges of RFID Application in Australia and China
4-6 Dec 2013, Melbourne Rahman et al.

In the second stage of evaluation, weight priorities of RFID implementation factors on respective higher level
factor-category and overall importance were considered. Figure 3 displays that the top five important factors in
adopting RFID in Chinese firms are Top management support (weight = 0.141), Hardware & software cost
(weight = 0.133), Tag cost (weight = 0.127), Industry force (weight = 0.107), Compatibility (weight = 0.101)
and Implementation cost (0.068). The least three important factors found in the analysis are Firm size (weight =
0.030), Complexity (weight = 0.031), and Data volume (weight = 0.037).

Firm size 0.030


Complexity 0.031
Data volume 0.037
IT readiness 0.043
Privacy 0.052
Security 0.063
Standards 0.066
Implemtation cost 0.068
Compatibility 0.101
Industry force 0.107
Tag cost 0.127
Hard/software cost 0.133
Top management support 0.141

0.000 0.020 0.040 0.060 0.080 0.100 0.120 0.140 0.160

China

Figure 3: Weight priorities of RFID implementation factors in Chinese firms


(Inconsistency = 0.000)

Privacy 0.009
Firm size 0.009
Top management support 0.034
Hard/software cost 0.038
Industry force 0.039
Data volume 0.044
IT readiness 0.054
Security 0.072
Complexity 0.077
Compatibility 0.094
Implemtation cost 0.103
Tag cost 0.210
Standards 0.218

0.000 0.050 0.100 0.150 0.200 0.250

Australia

Figure 4: Weight priorities of RFID implementation factors in Australian firms


(Inconsistency = 0.010)

For Australian firms the top six important factors are Standards (weight = 0.218), Tag cost (weight = 0.210),
Implementation cost (weight = 0.103), Compatibility (weight =0.0.094), complexity (weight =0.0.077) and
Security (weight = 0.072). Out of top six factors, three factors such as Tag cost, implementation cost and
compatibility are common for firms from both countries.

Figure 5 encapsulates the differences (or similarity) in factor priorities as perceived by Chinese and Australian
24th Australasian Conference on Information Systems Challenges of RFID Application in Australia and China
4-6 Dec 2013, Melbourne Rahman et al.

managers. It indicates that the managers are in agreement on five out of thirteen factors. These are compatibility,
data volume, Firm size, IT readiness and security. These are also relatively low priority challenges for managers
in both countries. Australian managers view standards as the top factor whereas Chinese managers view top
management support as the most important factor. Concerning industry force, there is no agreement – opinions
varied widely. The results provide insights to critical factors for RFID implementation in Chinese and Australian
supply chains. The firms in Australia and China who would plan to implement RFID in their supply chains must
take into account the relative importance of these enabling factors.

0.25

0.2

0.15

0.1
Australia
0.05 China

Figure 5: Comparison of weight priorities of RFID implementation factors in Chinese and Australian firms

CONCLUSIONS
RFID technology has emerged as one of the most significant process innovations in supply chain contexts. RFID
promises to increase visibility in supply chains, to reduce labour and inventory costs and to improve supply
chain coordination and product availability. However, literature has not yet comprehensively addressed the issue
of successful implementation of RFID. The objective of this study was to compare RFID implementation factors
between Australian and Chinese firms. Results demonstrate that managers in Chinese firms have a very different
view concerning importance of factors for RFID implementation as compared to Australian managers.
Australians firms view technological factor-category as the most important priority, whereas Chinese firms view
it as the least important category. Again, Australian firms view organizational factor-category as one of the least
important priorities, whereas Chinese view it by far the most important. However, with respect to economic
factor-category, views were generally in agreement, although levels of importance differed significantly. It also
demonstrates that indicates that the managers are in agreement on five out of thirteen factors. These are
compatibility, data volume, Firm size, IT readiness and security. These are also relatively low priority factors for
managers in both countries. Concerning industry force, there is no agreement – opinions varied widely. The
firms in Australia and China who would plan to implement RFID in their supply chains must take into account
the relative importance of these enabling factors. Although the use of limited number of firms is adequate given
the methodology employed, it is recommended to conduct empirical study using a large sample data set in the
future.

REFERENCES
Alomaur, B., and Poovendran, R. 2010. “Privacy Versus Scalability in Radio Frequency Identification Systems”,
Computer Communications (13:8), pp 2155-2163.
Angeles, R. 2005. “RFID Technologies: Supply Chain Applications and Implementation Issues”, Information
Systems Management (22:1), pp 51 - 65.
Asif, Z., and Mandviwalla, M. 2004. “Integrating the Supply Chain with RFID: A Technical and Business
Analysis”, http://ebi.temple.edu/programs/RFID/default.htm. The Fox School of Business and
Management.Temple University.
Attaran, M. (2007). “RFID: an enabler of supply chain operations”, Supply Chain Management (12:4), pp 249-
257.
Backhouse, J. 2002. “Assessing Certification Authorities: Guarding the Guardians of Secure E-commerce”?
Journal of Financial Crime (9:3), 217-226.
24th Australasian Conference on Information Systems Challenges of RFID Application in Australia and China
4-6 Dec 2013, Melbourne Rahman et al.

Beatty, R. C., J. P. Shim, et al. 2001. “Factors influencing corporate web site adoption: a time-based
assessment”, Information and Management (38), pp 337-354.
Boeck, H. and Wamba, S. F. 2008. “RFID and Buyer – Seller Relationships in the Retail Supply Chain”,
International Journal of Retail and Distribution Management (36:6), pp. 433-460.
Brown, I. and J. Russell. 2007. “Radio frequency identification technology: An exploratory study on adoption in
South African sector”, International Journal of Information Management (27), pp 250-265.
Chappell, G., D. Durdan, et al. 2003. Auto-Id on Delivery: The Value of Auto-ID Technology in the Stores. Auto-
ID Centre Massachusetts Institute of Technology (MIT).
Chena, Y. M. Goanb, M-J and Huang, P-N. 2011. “Selection process in logistics outsourcing – a view from third
party logistics provider”, Production Planning and Control (22:3), pp 308–324
Curtin, J., R. and Kauffman, J. 2007. “Making the Most out of RFID technology: A research agenda for the
study of the adoption, usage and impact of RFID”, Information Technology and Management (8:2), pp 86-
109.
Davenport, T. H. and J. D. Brooks 2004. “Enterprise Systems and The Supply Chain”, Journal of Enterprise
Information Management (17:1), pp. 8-19.
Deloitte China Research. 2011. Where is China’s industry Going? Deloitte Touche Tohmatsu CPA Ltd.
Shanghai, China.
Dew, N. 2006. “Incommensurate technological paradigm? Quarrelling in the RFID industry”, Industrial and
Corporate Change (15:5), pp 785-810.
Gessner, G. L. Volonino, et al. 2007. “One-Up, One-Back ERM in the Food Supply Chain”, Information systems
Management (24:3), pp 213-223.
Gol, H and Catay, B. 2007. “Third party logistics provider selection: insights from a Turkish automotive
company”, Supply Chain Management: An International Journal (12:6), pp 379-384.
Hamilton, D., Michael, K. and Wamba, S. F. 2009. “Overcoming Visibility Issues in a Small-to-Medium
Retailer Using Automatic Identification and Data Capture Technology: An Evolutionary Approach”,
International Journal of e-Business Management (5), pp 2-20.
Hingley, M. S. Taylor . 2007. “Radio frequency identification tagging: Supplier attitudes to implementation in
the grocery sector”, International Journal of Physical distribution and Distribution Management (35:10),
pp 803-820.
Ho, W. 2008. “Integrated analytic hierarchy process and its applications – a literature review”, European Journal
of Operational Research (186), pp 211-228.
Hoffman, W. 2007. “RFID crossroads”, Traffic World (271:12), pp 10-13.
Jones, P., Clarke-Hill, C., Hillier, D., and Comfort, D. 2005. “The Benefits, Challenges and Impact of radio
frequency identification technologies (RFID) for retailers in the UK”, Marketing Intelligence and Planning
(23:4), pp 395-402.
Kim, S. and Garrison, G. 2010. “Understanding Users’ Behaviors Regarding Supply Chain Technology:
Determinants Impacting the Adoption and Implementation of RFID Technology in South Korea”,
International Journal of Information Management (30), pp 388-398.
Knospe, H. and H. Pohl (2004). RFID Security. Information Security Technical Report 9(4).
Landt, J. 2001. Shrouds of Time. The History of RFID, AIM Incorporated. [Online]
http://www.transcore.com/pdf/AIM%20shrouds_of_time.pdf [accessed 27th June 2012].
Langheinrich, M. 2009. “A Survey of RFID Privacy Approaches”, Personal Ubiquitous Computing (13), pp
413-421.
Lee, C. and Shim, J. 2007. “An Exploratory Study of Radio Frequency Identification (RFID) Adoption in the
Healthcare Industry”, European Journal of Information Systems (16:6), pp 712-724.
Li, S., Visich, J. K., Kumawala, B. M. and Zhang, C. 2006. “Radio frequency identification technology:
applications, technical challenges and strategies”, Sensor Review (26:3), pp 193-202.
Lin, C.-Y. and Y.-H. Ho. 2009. “RFID technology adoption and supply chain performance: An empirical study
in China's logistics industry”, Supply Chain Management: An International Journal (14:5), pp 369-378.
Liu, F-H. F. and Hai, H. L. 2005. “The Voting Analytic Hierarchy process method for selecting supplier”,
International Journal of Production Economics (97), pp 308–317.
Loebbecke, C. 2006. “RFID's Potential in the Fashion Industry: A Case Analysis”, 19th Bled eConference
eValues, Slovenia.
Murphy, P. 2003. Get Ready! Wal-Mart Mandate puts RFID Smart Tags on Fast Track. www.ascsis.
com/media_center/acsis_in_the_news/glscstrategies01.pdf Accessed 4th April 2012.
Neuman, W.L., 1991. Social Research Methods. Allyn and Bacon, Boston.
Ngai, E. W. T., T. C. E. Cheng. 2005. “Mobile Commerce Integrated with RFIID Technology in a Container
Depot”, Decision Support Systems
Ngai, E. W. T. and A. Gunasekaran. 2009. “RFID Adoption: Issues and Challenges”, International Journal of
Enterprise Information System (5:1), pp 1-7.
24th Australasian Conference on Information Systems Challenges of RFID Application in Australia and China
4-6 Dec 2013, Melbourne Rahman et al.

Park, K. S., Koh, C. E. and Nam, K. T. 2009. “Perceptions of RFID Technology: A Cross-National Study”,
Industrial Management + Data Systems (110:5), pp 682-700.
Pietro, R. D. and Molva, R. 2011. “An Optimal Probabilistic Solution for Information Confinement, Privacy, and
Security in RFID Systems”, Journal of Network and Computer Applications (34:3), pp 853-863.
Prater, E., Frazier, G. V. and Reyes, P. 2005. “Future Impacts of RFID on e-Supply Chains in Grocery
Retailing”, Supply Chain Management, (10:2), pp 134-142.
Premkumar, G., K. Ramamurthy. 1997. “Determinants of EDI Adoption in the Transport Industry”, European
Journal of Information Systems (6), pp 107-121.
Rahman, S., Subramanian, N. and Chan, C. 2010. “Analytic Hierarchic Process and its application in logistics
research, Proceedings, 16th International Symposium on Logistics, Rebuilding supply chain for a globalised
world, July 10-13, Berlin, Germany,
Reyes, P. 2007. “Radio Frequency Identification (RFID) Implementation Efforts at Four Firms: Integrated
Lessons Learned and RFID-Specific Survey”, [Online]. http://web.mit.edu/sis07/www/reyes.pdf [Accessed
16th February 2012].
Reyes, P. and P. Jaska. 2007. “Is RFID right for your organization or application”? Management Research News
(30:8), pp 570-580.
Rundh, B. 2008. “Radio Frequency Identification (RFID); Invaluable Technology or a New Obstacle in the
Marketing Process”? Marketing Intelligence and Planning, 26(1).
Saaty, T. L. 1977. “A scaling method for priorities in hierarchical structure”, Journal of Mathematical
Psychology (15), pp 234–281.
Saaty, T. L. (1993). “The Analytic Hierarchy Process: a 1993 overview”. Central European Journal of
Operation Research and Economics (2:2), pp 119—137.
Saaty, T. L. and Kearns, K. P. 1985. Analytical Planning: The Organisation of Systems, Pergamon Press, N.Y.
Saaty, T. L. and Vargas, L. G. 1982. The Logic of Priorities, Kluwer Nijhoff Publishing, US.
Sarac, A, Absi, N and Dauzere-Peres, S. 2010. “A literature review on the impact of RFID technologies on
supply chain management”, International Journal of Production Economics, (128), pp 77-95.
Schoenherr, T, Tummala and Harrison, T. P. 2008. “Assessing Supply chain risks with the analytic hierarchy
process: providing decision support for the offshoring decision by a US manufacturing company”, Journal
of Purchasing and Supply Management (14), pp 100-111.
Sharma, A., A. Citurs. 2007. “Strategic and institutional perspectives in the adoption and early integration of
radio frequency identification (RFID”, Proceedings of the 40th Hawaii International Conference on System
Sciences, Hawaii.
Shih, D., and Sun P. 2005. “Securing Industry-wide EPCglobal Network with WS-Security”, Industrial
Management & Data Systems (105:7), pp 972-996.
Shih, D. H. and Chiu, Y. W. 2008. “An Empirical Study of Factors Affecting RFID's Adoption in Taiwan”,
Journal of Global Information Management, (16:2), pp 58-80.
Smith, A. D. 2005. “Exploring Radio Frequency Identification Technology and its Impact on Business Systems”,
Information Management and Computer Security (13:1), pp 16-28.
Skinner, W. 1969. “Manufacturing – missing link in corporate strategy”, Harvard Business Review (47:3), pp
136-145.
Spiekermann, S. 2009. “RFID and Privacy: What Consumers Really Want and Fear”, Personal Ubiquitous
Computing (13), pp 423-434.
Srivastava, B. 2004. “Radio Frequency ID Technology: The Next Revolution in SCM”, Business Horizons
(47:6), pp 60-68.
Steuer, R.E., and Na, P. 2003. “Multiple criteria decision making combined with finance: A categorized
bibliographic study”, European Journal of Operational Research (150:3), pp 496–515.
Strüker, J. & Gille, D. 2009. “The SME Way of Adopting RFID Technology – Empirical Findings from a
German Cross-Sectoral Study”. University of Freiburg. [Online].
http://is2.lse.ac.uk/asp/aspecis/20080093.pdf [Accessed 2nd April 2012].
Sullivan, L. 2004. “Wal-Mart Tests RFID with Eight Suppliers”, Information week (987), p 28.
Sweeney, P. 2005. RFID for Dummies, Wiley Publishing New York.
Thonemann, U. W., 2002. Improving supply chain performance by sharing advance demand information,
European Journal of Operational Research (142), pp 81-107.
Tornatzky, L. G. and K. J. Klein. 1982. “Innovation Characteristics and Innovation Adoption-Implementation: A
Meta-analysis of Findings” .IEEE Transactions on Engineering Management (29:11), pp 28-45.
Tsai, M., Lee, W. & Wu, H. 2010. “Determinants of RFID Adoption Intention: Evidence from Taiwanese Retail
Chains”, Information and Management (47), pp 255-261.
Twist, D. C. 2005. “The Impact of Radio Frequency Identification on Supply Chain Facilities”, Journal of
Facilities Management (3:3), pp 226-239.
24th Australasian Conference on Information Systems Challenges of RFID Application in Australia and China
4-6 Dec 2013, Melbourne Rahman et al.

Vaidya, O.S., Kumar, S., 2006. “Analytic hierarchy process: A overview of applications”, European Journal of
Operational Research (169:1), pp 1–29.
Viehland, D. and A. Wong. 2007. “The Future of Radio Frequency Identification”. Journal of Theoretical and
Applied Electronic Commerce Research (2:2), pp 74-82.
Vijayaraman, B. and B. Osyk. 2006. “An empirical study of RFID implementation in the warehousing industry”,
International Journal of Logistics Management (17:1), pp 6-20.
Walker, J. 2004. “Commentary: The year of living RFID”, Forrester Research. CNET News.com.
Wamba, S. F. 2011. “Achieving Supply Chain Integration Using RFID Technology: The Case of Emerging
Intelligent B-to-B e-Commerce Processes in a Living Laboratory”, Business Process Management Journal.
Wang.G., Huang.S.H., Dismukes.J.P. 2004. “Product-driven supply chain selection using integrated multi-
criteria decision-making methodology”, International Journal of Production Economics (91), pp 1–15.
Wang, X.J., Chan, H. K., Yee, R. W. Y and Rainey, I. D. 2012. “A two-stage fuzzy-AHP model for risk
assessment of implementing green initiatives in the fashion supply chain”, International Journal of
Production Economics, (135), pp 595-606.
Weber, R. 2010. “Internet of Things – New Security and Privacy Challenges”, Computer Law and Security
Review (26), pp 23-30.
Wu, N. C., M. A. Nystrom, et al. 2006. “Challenges to global RFID adoption”. Technovation, (26), pp 1317-
1323.
Yin, R.K., 2003. Applications of Case Study Research, 2nd ed. Sage, Thousand Oaks, CA.
Zeier, A., Hofmann, P., Krüger, J., Müller, J. and Schapranow, M.-P. 2009. “Integration of RFID Technology is
a Key Enabler for Demand-Driven Supply Network”, Journal of Supply Chain Management (VI, ¾), p 5774.

COPYRIGHT
Shams Rahman, Stephen Waters, Shahadat Khan, Laura Yang © 2013. The authors assign to ACIS and
educational and non-profit institutions a non-exclusive licence to use this document for personal use and in
courses of instruction provided that the article is used in full and this copyright statement is reproduced. The
authors also grant a non-exclusive licence to ACIS to publish this document in full in the Conference Papers and
Proceedings. Those documents may be published on the World Wide Web, CD-ROM, in printed form, and on
mirror sites on the World Wide Web. Any other usage is prohibited without the express permission of the
authors.

You might also like