RFID and Mobile Fusion for Authenticated ATM Transaction Analysis
VerifiedAdded on 2020/05/11
|111
|27574
|62
Report
AI Summary
This report provides a detailed analysis of Radio Frequency Identification (RFID) technology and its fusion with mobile devices for authenticated ATM transactions. The study begins with an introduction to RFID, its historical development, components, principles, and various applications, including supply chain management, inventory control, and retail management. The research addresses the aims and objectives, research questions, and the problem statement related to RFID's security and privacy concerns. The report outlines the research methodology, including the research onion, approach, design, strategy, data collection, and analysis. The findings, presented through quantitative analysis, delve into the utilization of RFID technology, major drivers for its implementation, advantages, purposes, objectives, specifications, privacy, security, costs, and government support. The report concludes with recommendations to address the challenges and limitations, as well as suggestions for future research directions, offering a comprehensive understanding of RFID technology and its potential for secure transactions.

Running head: RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
RFID and mobile fusion for authenticated ATM transaction
Name of the Student:
Name of the University:
Author note:
RFID and mobile fusion for authenticated ATM transaction
Name of the Student:
Name of the University:
Author note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
Abstract
This paper gives a research on radio frequency identification (RFID) innovation. At first RFID
tags were created to in the long run supplant scanner tags in supply chains. Their favorable
circumstances are that they can be perused remotely and without observable pathway; contain
more data than scanner tags. The RFID innovation did not stop at thing level labeling. Since the
utilizations for RFID tags are so across the board, there is an extensive enthusiasm for bringing
down the expenses for creating them. For reasons unknown printing labels may turn into a
feasible other option to customary creation. The study deals with reviewing literature from
different sources. In addition, research methodology, finding and analysis as well as conclusion
and recommendations are discussed in the study.
Abstract
This paper gives a research on radio frequency identification (RFID) innovation. At first RFID
tags were created to in the long run supplant scanner tags in supply chains. Their favorable
circumstances are that they can be perused remotely and without observable pathway; contain
more data than scanner tags. The RFID innovation did not stop at thing level labeling. Since the
utilizations for RFID tags are so across the board, there is an extensive enthusiasm for bringing
down the expenses for creating them. For reasons unknown printing labels may turn into a
feasible other option to customary creation. The study deals with reviewing literature from
different sources. In addition, research methodology, finding and analysis as well as conclusion
and recommendations are discussed in the study.

2RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
Acknowledgement
Conducting the research study enhances me to improve my knowledge as well as analytical
ability in RFID technology. It gave me the chance to face challenges all the while and conquer
them. It will not be possible to conduct the research without the significant direction of my
professors, companions and every one of who have added to this advancing knowledge. I also
want to thank my supervisor __________ for helping me in my research work as well as give
their full support during the research process. I would also thank all the participants within this
study for giving their time and helping me out. From the support of people, I am inspired to work
on the research in this subject area. Finally, thank you to my family members those help me and
encourage me.
Thank You.
Acknowledgement
Conducting the research study enhances me to improve my knowledge as well as analytical
ability in RFID technology. It gave me the chance to face challenges all the while and conquer
them. It will not be possible to conduct the research without the significant direction of my
professors, companions and every one of who have added to this advancing knowledge. I also
want to thank my supervisor __________ for helping me in my research work as well as give
their full support during the research process. I would also thank all the participants within this
study for giving their time and helping me out. From the support of people, I am inspired to work
on the research in this subject area. Finally, thank you to my family members those help me and
encourage me.
Thank You.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
Table of Contents
Chapter 1: Introduction....................................................................................................................8
1.1 Background of the study............................................................................................................8
1.2 Research Aims and Objectives..................................................................................................9
1.2.1 Aims of the study....................................................................................................................9
1.2.2 Objectives of the study...........................................................................................................9
1.3 Research Questions..................................................................................................................10
1.4 Problem Statement...................................................................................................................10
1.5 Rationale of the study..............................................................................................................12
1.6 Structure of the study...............................................................................................................13
Capter 2: Literature Review...........................................................................................................15
2.1 Preface.....................................................................................................................................15
2.2 Overview of Radio Frequency Identification (RFID) technology...........................................15
2.3 Development history of RFID.................................................................................................19
2.4 Components in RFID used at present days..............................................................................20
2.4.1 Frequency bands...................................................................................................................22
2.4.2 Sources of energy.................................................................................................................23
2.4.3 Standards...............................................................................................................................24
2.5 Principles of RFID...................................................................................................................24
2.6 Applications of RFID..............................................................................................................29
Table of Contents
Chapter 1: Introduction....................................................................................................................8
1.1 Background of the study............................................................................................................8
1.2 Research Aims and Objectives..................................................................................................9
1.2.1 Aims of the study....................................................................................................................9
1.2.2 Objectives of the study...........................................................................................................9
1.3 Research Questions..................................................................................................................10
1.4 Problem Statement...................................................................................................................10
1.5 Rationale of the study..............................................................................................................12
1.6 Structure of the study...............................................................................................................13
Capter 2: Literature Review...........................................................................................................15
2.1 Preface.....................................................................................................................................15
2.2 Overview of Radio Frequency Identification (RFID) technology...........................................15
2.3 Development history of RFID.................................................................................................19
2.4 Components in RFID used at present days..............................................................................20
2.4.1 Frequency bands...................................................................................................................22
2.4.2 Sources of energy.................................................................................................................23
2.4.3 Standards...............................................................................................................................24
2.5 Principles of RFID...................................................................................................................24
2.6 Applications of RFID..............................................................................................................29
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
2.6.1 Supply chain management system........................................................................................29
2.6.2 Application in fashion industry............................................................................................32
2.6.3 Inventory management.........................................................................................................33
2.6.4 Production control................................................................................................................34
2.6.5 Retail management...............................................................................................................34
2.6.6 RFID for brand segregation..................................................................................................36
2.6.7 RFID tags for care labeling...................................................................................................37
2.7 Advantages of RFID technology.............................................................................................39
2.8 Privacy and security issues in RFID........................................................................................40
2.9 Summary..................................................................................................................................43
Chapter 3: Research Methodology................................................................................................43
3.1 Preface.....................................................................................................................................43
3.2 Method Outline........................................................................................................................43
3.3 Research Onion........................................................................................................................44
3.4 Research Philosophy................................................................................................................45
3.5 Research Approach..................................................................................................................46
3.6 Research Design......................................................................................................................46
3.7 Research strategy.....................................................................................................................48
3.8 Data Collection........................................................................................................................48
3.9 Sample Size.............................................................................................................................49
2.6.1 Supply chain management system........................................................................................29
2.6.2 Application in fashion industry............................................................................................32
2.6.3 Inventory management.........................................................................................................33
2.6.4 Production control................................................................................................................34
2.6.5 Retail management...............................................................................................................34
2.6.6 RFID for brand segregation..................................................................................................36
2.6.7 RFID tags for care labeling...................................................................................................37
2.7 Advantages of RFID technology.............................................................................................39
2.8 Privacy and security issues in RFID........................................................................................40
2.9 Summary..................................................................................................................................43
Chapter 3: Research Methodology................................................................................................43
3.1 Preface.....................................................................................................................................43
3.2 Method Outline........................................................................................................................43
3.3 Research Onion........................................................................................................................44
3.4 Research Philosophy................................................................................................................45
3.5 Research Approach..................................................................................................................46
3.6 Research Design......................................................................................................................46
3.7 Research strategy.....................................................................................................................48
3.8 Data Collection........................................................................................................................48
3.9 Sample Size.............................................................................................................................49

5RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
3.10 Data Analysis.........................................................................................................................49
3.11 Accessibility issues................................................................................................................50
3.12 Ethical Consideration.............................................................................................................50
3.13 Gantt chart.............................................................................................................................51
3.14 Summary................................................................................................................................51
Chapter 4: Results and findings.....................................................................................................53
4.1 Preface.....................................................................................................................................53
4.2 Quantitative analysis................................................................................................................53
4.3 Summary..................................................................................................................................76
Chapter 5: Conclusion and Recommendations..............................................................................77
5.1 Conclusion...............................................................................................................................77
5.2 Linking with objectives...........................................................................................................77
5.3 Recommendations....................................................................................................................78
5.4 Limitation and Future scopes...................................................................................................79
References......................................................................................................................................81
Bibliography..................................................................................................................................91
Appendices..................................................................................................................................108
Appendix 1...................................................................................................................................108
Appendix 2...................................................................................................................................109
3.10 Data Analysis.........................................................................................................................49
3.11 Accessibility issues................................................................................................................50
3.12 Ethical Consideration.............................................................................................................50
3.13 Gantt chart.............................................................................................................................51
3.14 Summary................................................................................................................................51
Chapter 4: Results and findings.....................................................................................................53
4.1 Preface.....................................................................................................................................53
4.2 Quantitative analysis................................................................................................................53
4.3 Summary..................................................................................................................................76
Chapter 5: Conclusion and Recommendations..............................................................................77
5.1 Conclusion...............................................................................................................................77
5.2 Linking with objectives...........................................................................................................77
5.3 Recommendations....................................................................................................................78
5.4 Limitation and Future scopes...................................................................................................79
References......................................................................................................................................81
Bibliography..................................................................................................................................91
Appendices..................................................................................................................................108
Appendix 1...................................................................................................................................108
Appendix 2...................................................................................................................................109
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
List of tables
Table 1: Differences between active tags and passive tags...............................................15
Table 2: Use of RFID technology......................................................................................51
Table 3: Time-period of using RFID technology..............................................................53
Table 4: Major drivers for implementing RFID................................................................54
Table 5: Advantages of using RFID technology...............................................................56
Table 6: Purposes of implementing RFID.........................................................................57
Table 7: the objectives for using RFID..............................................................................59
Table 8: Tracking products accurately as advantage for RFID.........................................60
Table 9: Reader specifications of RFID............................................................................62
Table 10: Antenna specifications of RFID........................................................................63
Table 11: Product specifications of RFID.........................................................................65
Table 12: Privacy and security in RFID............................................................................66
Table 13: Cost of implementing RFID..............................................................................68
Table 14: Governments’ support for RFID.......................................................................69
Table 15: Major concerns for implementing RFID technology........................................71
Table 16: Future of RFID technology...............................................................................72
Table 17: Gantt chart.......................................................................................................106
List of tables
Table 1: Differences between active tags and passive tags...............................................15
Table 2: Use of RFID technology......................................................................................51
Table 3: Time-period of using RFID technology..............................................................53
Table 4: Major drivers for implementing RFID................................................................54
Table 5: Advantages of using RFID technology...............................................................56
Table 6: Purposes of implementing RFID.........................................................................57
Table 7: the objectives for using RFID..............................................................................59
Table 8: Tracking products accurately as advantage for RFID.........................................60
Table 9: Reader specifications of RFID............................................................................62
Table 10: Antenna specifications of RFID........................................................................63
Table 11: Product specifications of RFID.........................................................................65
Table 12: Privacy and security in RFID............................................................................66
Table 13: Cost of implementing RFID..............................................................................68
Table 14: Governments’ support for RFID.......................................................................69
Table 15: Major concerns for implementing RFID technology........................................71
Table 16: Future of RFID technology...............................................................................72
Table 17: Gantt chart.......................................................................................................106
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
List of figures
Figure 1: A passive RFID tag............................................................................................22
Figure 2: Near filed mechanism of RFID tags..................................................................27
Figure 3: Far field mechanism of RFID tags.....................................................................29
Figure 4: Benefits in supply chain.....................................................................................31
Figure 5: Research onion...................................................................................................45
Figure 6: Use of RFID technology....................................................................................54
Figure 7: Time-period of using RFID technology.............................................................55
Figure 8: Major drivers for implementing RFID...............................................................56
Figure 9: Advantages of using RFID technology..............................................................58
Figure 10: Purposes of implementing RFID......................................................................59
Figure 11: the objectives for using RFID..........................................................................61
Figure 12: Tracking products accurately as advantage for RFID......................................62
Figure 13: Reader specifications of RFID.........................................................................64
Figure 14: Antenna specifications of RFID.......................................................................65
Figure 15: Product specifications of RFID........................................................................67
Figure 16: Privacy and security in RFID...........................................................................68
Figure 17: Cost of implementing RFID.............................................................................70
Figure 18: Governments’ support for RFID......................................................................71
Figure 19: Major concerns for implementing RFID technology.......................................73
Figure 20: Future of RFID technology..............................................................................74
List of figures
Figure 1: A passive RFID tag............................................................................................22
Figure 2: Near filed mechanism of RFID tags..................................................................27
Figure 3: Far field mechanism of RFID tags.....................................................................29
Figure 4: Benefits in supply chain.....................................................................................31
Figure 5: Research onion...................................................................................................45
Figure 6: Use of RFID technology....................................................................................54
Figure 7: Time-period of using RFID technology.............................................................55
Figure 8: Major drivers for implementing RFID...............................................................56
Figure 9: Advantages of using RFID technology..............................................................58
Figure 10: Purposes of implementing RFID......................................................................59
Figure 11: the objectives for using RFID..........................................................................61
Figure 12: Tracking products accurately as advantage for RFID......................................62
Figure 13: Reader specifications of RFID.........................................................................64
Figure 14: Antenna specifications of RFID.......................................................................65
Figure 15: Product specifications of RFID........................................................................67
Figure 16: Privacy and security in RFID...........................................................................68
Figure 17: Cost of implementing RFID.............................................................................70
Figure 18: Governments’ support for RFID......................................................................71
Figure 19: Major concerns for implementing RFID technology.......................................73
Figure 20: Future of RFID technology..............................................................................74

8RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
Chapter 1: Introduction
1.1 Background of the study
At present years, radio frequency identification technology (RFID) has moved from
obscurity into mainstream applications. It helps to handle manufacturing products and materials
in faster way (Dobkin 2012). In addition, RFID enables detection from a distance along with the
earlier bar code technology. RFID technology has been around 60 years in market and was
developed in order to enhance warfare technologies. The cards enabled RFID have brought
revolution in large sectors handling a large number of products. RFID tags can support a larger
set of unique IDs compared to bar codes. Moreover, it can incorporate additional data like
manufacturer, type of product as well as measurement of environmental factors like temperature.
Along with these, RFID systems can discern several distinctive tags, which are located in the
general area without taking any human assistance.
On contrary, consider a super market checkout where it is required to orient each bar-
coded item toward reader before scanning. However, it has not been in mainstream over 50
years. The primary reason is cost. In terms of electronic identification technologies, it is
important to compete with the rock-bottom pricing of printed signs. Thus, it is required to be low
cost and provide added value for the organization in order to recover the cost. However, RFID is
not so affordable compared traditional tagging technologies (Zhu et al. 2012). On contrary, RFID
can offer added value for enabling it in large scale adoption in order to manage customer retail
products. The benefits with RFID tags is that these are not based on the line of sight concept as
well as used in times of adverse weather conditions consisting of snow, fog as well as ice.
Chapter 1: Introduction
1.1 Background of the study
At present years, radio frequency identification technology (RFID) has moved from
obscurity into mainstream applications. It helps to handle manufacturing products and materials
in faster way (Dobkin 2012). In addition, RFID enables detection from a distance along with the
earlier bar code technology. RFID technology has been around 60 years in market and was
developed in order to enhance warfare technologies. The cards enabled RFID have brought
revolution in large sectors handling a large number of products. RFID tags can support a larger
set of unique IDs compared to bar codes. Moreover, it can incorporate additional data like
manufacturer, type of product as well as measurement of environmental factors like temperature.
Along with these, RFID systems can discern several distinctive tags, which are located in the
general area without taking any human assistance.
On contrary, consider a super market checkout where it is required to orient each bar-
coded item toward reader before scanning. However, it has not been in mainstream over 50
years. The primary reason is cost. In terms of electronic identification technologies, it is
important to compete with the rock-bottom pricing of printed signs. Thus, it is required to be low
cost and provide added value for the organization in order to recover the cost. However, RFID is
not so affordable compared traditional tagging technologies (Zhu et al. 2012). On contrary, RFID
can offer added value for enabling it in large scale adoption in order to manage customer retail
products. The benefits with RFID tags is that these are not based on the line of sight concept as
well as used in times of adverse weather conditions consisting of snow, fog as well as ice.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
At initial times, RFID tags were mainly used in military for tracking of missiles as well
as occasionally in telemetry. After that, for low cost of operation as well as in-expensive devices
availability, these are utilized in daily activities. On the other hand, International Standards
Organization 18000 as well as its sub parametric rules can specify the needs as well as protocols
to be followed in terms of standards (Ruiz et al. 2012). These have sub clauses, which mention
regarding their air interface as well as its usage. In recent days, RFID devices are utilized for
several purposes such as passports, tracking of products, automotive parts detection as well as in
transport systems such as highway toll tags. However, security and privacy issues, commercial
developments along with implementation of RFID are major issues in using the technology.
1.2 Research Aims and Objectives
1.2.1 Aims of the study
The research aims to find new approaches in terms of security as well as sustainability of
RFID technology. At present days, it has been seen that several issues are involved with security
and privacy of mobile devices. As the current industries are facing rapid technological changes,
it becomes necessary to identify the issues and develop a sustainable system that can provide
competitive advantages. Moreover, the aim of the present study is to identify the RFID and
mobile fusion for enabling authenticated transaction in ATMs.
1.2.2 Objectives of the study
The major objective of the present study is to provide an idea regarding security system,
which can be developed through mobile devices for authorized users as well as proposed
methods that can assist to implement RFID technology easily. In, the objectives of the study can
be stated as followed.
At initial times, RFID tags were mainly used in military for tracking of missiles as well
as occasionally in telemetry. After that, for low cost of operation as well as in-expensive devices
availability, these are utilized in daily activities. On the other hand, International Standards
Organization 18000 as well as its sub parametric rules can specify the needs as well as protocols
to be followed in terms of standards (Ruiz et al. 2012). These have sub clauses, which mention
regarding their air interface as well as its usage. In recent days, RFID devices are utilized for
several purposes such as passports, tracking of products, automotive parts detection as well as in
transport systems such as highway toll tags. However, security and privacy issues, commercial
developments along with implementation of RFID are major issues in using the technology.
1.2 Research Aims and Objectives
1.2.1 Aims of the study
The research aims to find new approaches in terms of security as well as sustainability of
RFID technology. At present days, it has been seen that several issues are involved with security
and privacy of mobile devices. As the current industries are facing rapid technological changes,
it becomes necessary to identify the issues and develop a sustainable system that can provide
competitive advantages. Moreover, the aim of the present study is to identify the RFID and
mobile fusion for enabling authenticated transaction in ATMs.
1.2.2 Objectives of the study
The major objective of the present study is to provide an idea regarding security system,
which can be developed through mobile devices for authorized users as well as proposed
methods that can assist to implement RFID technology easily. In, the objectives of the study can
be stated as followed.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
To understand how RFID technology can be used in the online industry
To identify both positive and negative impact of such technology on people
To critically analyze the challenges faced while implementing and using RFID
technology
To recommend solutions in order to overcome the challenges
1.3 Research Questions
The research questions are important to be discussed as it would be helpful through
getting answers of the questions in the particular research. In the present study, the research
questions can be explained as followed.
How RFID technology is used in the online industry?
What are the positive and negative impacts of using RFID technology on people?
What are the challenges faced while deploying and using RFID technology?
How the challenges can be mitigated?
1.4 Problem Statement
The utilization of RFID technology has endangered considerable controversy as well as
product boycotts by consumer privacy advocates. There are two major concerns of using RFID
can be stated as followed.
If a tagged product is paid for by credit card or in conjunction with utilization of
loyalty card, it would be possible to indirectly minimize the identity of the buyer
through reading the unique ID of the item.
On the other hand, there are chances of indirect monitoring by third parties.
To understand how RFID technology can be used in the online industry
To identify both positive and negative impact of such technology on people
To critically analyze the challenges faced while implementing and using RFID
technology
To recommend solutions in order to overcome the challenges
1.3 Research Questions
The research questions are important to be discussed as it would be helpful through
getting answers of the questions in the particular research. In the present study, the research
questions can be explained as followed.
How RFID technology is used in the online industry?
What are the positive and negative impacts of using RFID technology on people?
What are the challenges faced while deploying and using RFID technology?
How the challenges can be mitigated?
1.4 Problem Statement
The utilization of RFID technology has endangered considerable controversy as well as
product boycotts by consumer privacy advocates. There are two major concerns of using RFID
can be stated as followed.
If a tagged product is paid for by credit card or in conjunction with utilization of
loyalty card, it would be possible to indirectly minimize the identity of the buyer
through reading the unique ID of the item.
On the other hand, there are chances of indirect monitoring by third parties.

11RFID AND MOBILE FUSION FOR AUTHENTICATED TRANSACTION
The anti-RFID advocacy as well as inquiry and regulations of RFID without any
type of particular regulation law.
Moreover, the basic success of the technology lies in proper comprehension of the
technology as well as other features that can be helpful to mitigate potential issues. Even though,
the technology is existed for several years, the challenges are major concerns for widespread of
RFID technology (Schneider et al. 2012). The security and privacy of RFID against the
unauthorized readers is considered as a great challenge to the privacy of consumers. The
customers utilizing the product with RFID tags can be easily traced. It results high chances in
violating privacy. The consumers utilizing the product with RFID tags can be easily traced. The
RFID tag broadcasts the ID serial number of the EPC to nearby reader. As a result, there is a
high chance of violating privacy. In addition, the size of the dress bought for a woman can be
publicly readable by nearby scanner. In this perspective, Benetton, a cloth retailer has planned to
withdraw the utilization of RFID tags in apparel products. Consumer against Supermarket Policy
Invasion and Numbering group has claimed that RFID tags embedded in the products can track
creating unwanted surveillance of customers and invasion of privacy.
On the other side, in the field clothing and radio frequency identification becomes one of
the most promising technological technologies. It is utilized in manufacturing, warehousing,
logistics, inventory, distribution and automatic object tracking as well as supply chain
management system (Jia et al. 2012). There are several retailers as well as manufacturers like
Tesco, Prada, CVS, Wal-mart and Procter & Gamble are deploying the particular technology as
well as exploring the impact of RFID technology on business. Adoption of the technology may
enhance the potential advantages of supply chain management through minimization of inventor
losses. In addition, it increases efficiency as well as speed of processes and enhancement in
The anti-RFID advocacy as well as inquiry and regulations of RFID without any
type of particular regulation law.
Moreover, the basic success of the technology lies in proper comprehension of the
technology as well as other features that can be helpful to mitigate potential issues. Even though,
the technology is existed for several years, the challenges are major concerns for widespread of
RFID technology (Schneider et al. 2012). The security and privacy of RFID against the
unauthorized readers is considered as a great challenge to the privacy of consumers. The
customers utilizing the product with RFID tags can be easily traced. It results high chances in
violating privacy. The consumers utilizing the product with RFID tags can be easily traced. The
RFID tag broadcasts the ID serial number of the EPC to nearby reader. As a result, there is a
high chance of violating privacy. In addition, the size of the dress bought for a woman can be
publicly readable by nearby scanner. In this perspective, Benetton, a cloth retailer has planned to
withdraw the utilization of RFID tags in apparel products. Consumer against Supermarket Policy
Invasion and Numbering group has claimed that RFID tags embedded in the products can track
creating unwanted surveillance of customers and invasion of privacy.
On the other side, in the field clothing and radio frequency identification becomes one of
the most promising technological technologies. It is utilized in manufacturing, warehousing,
logistics, inventory, distribution and automatic object tracking as well as supply chain
management system (Jia et al. 2012). There are several retailers as well as manufacturers like
Tesco, Prada, CVS, Wal-mart and Procter & Gamble are deploying the particular technology as
well as exploring the impact of RFID technology on business. Adoption of the technology may
enhance the potential advantages of supply chain management through minimization of inventor
losses. In addition, it increases efficiency as well as speed of processes and enhancement in
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 111
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.