Skip to main content

Advertisement

Log in

IoT security perspective of a flexible healthcare supply chain

  • Published:
Information Technology and Management Aims and scope Submit manuscript

Abstract

Organizations are continually looking for ways to increase the effectiveness of their product and service delivery through supply chain collaborations. Recent technologies (both software and hardware) have been designed to facilitate supply chain collaboration and partnership. Due to the different operational environment throughout the supply chain, the application of these technologies are very often disconnected, causing various operational wastes. We investigate this problem and propose the concept of flexible technology. We use RFID system as an example and investigate the issues related to the electromagnetic regulation in various health care environments. We propose a flexible technology system framework that automatically learns and evolves to accommodate environmental variations throughout the supply chain. Our results show that flexible technology can greatly increase supply chain productivity and collaboration efficacy. In conclusion, we discuss its managerial implications and conditions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Ashar BS, Ferriter A (2007) Radiofrequency identification technology in health care: benefits and potential risks. JAMA 298:2305–2307

    Article  Google Scholar 

  2. Bose I, Lui AKH, Ngai EWT (2011) The impact of RFID adoption on the market value of firms: an empirical analysis. J Organ Comput Electr Commerce 21(4):268–294

    Google Scholar 

  3. Bose I, Leung ACM (2008) Radio frequency identification for customer relationship management. In: Blecker T, Huang G (eds) RFID in operations and supply chain management: research and applications. Erich Schmidt Verlag Publishing, Berlin, pp 273–288

    Google Scholar 

  4. Byrd TA, Turner DE (2000) Measuring the flexibility of information technology infrastructure: exploratory analysis of a construct. J Manag Inf Syst 17(1):167–208

    Article  Google Scholar 

  5. Juels A, Weis S (2005) Authenticating pervasive devices with human protocols. In: Shoup V (ed) Advanced in cryptology—CRYPTO’05, vol 3126. Lecture notes in computer science, pp 293–308, Springer

  6. Meiller Y, Bureau S, Zhou W, Piramuthu S (2011) Adaptive knowledge-based system for health care applications with RFID-generated information. Decis Support Syst 51(1):198–207

    Article  Google Scholar 

  7. Nelson KM, Ghods M (1998) Measuring technology flexibility. Eur J Inf Syst 7(4):232–240

    Article  Google Scholar 

  8. Piramuthu S (2007) Protocols for RFID tag/reader authentication. Decis Support Syst 43(3):897–914

    Article  Google Scholar 

  9. Piramuthu S (2011) RFID mutual authentication protocols. Decis Support Syst 50(2):387–393

    Article  Google Scholar 

  10. Piramuthu S, Wochner S, Grunow M (2014) Should retail stores also RFID-tag ‘cheap’ items? Eur J Oper Res 233(1):281–291

    Article  Google Scholar 

  11. Seidman SJ, Brockman R, Lewis BM, Guag J, Shein MJ, Clement WJ, Kippols J, Digby D, Barber C, Huntwork D (2010) In vitro tests reveal sample radiofrequency identification readers inducing clinically significant electromagnetic interference to implantable pacemakers and implantable cardioverter-defibrillators. HeartRhythm 7(1):99–107

    Google Scholar 

  12. Slack N (2005) The changing nature of operations flexibility. Int J Oper Prod Manag 25(12):1201–1210

    Article  Google Scholar 

  13. Togt R, van Lieshout EJ, Hensbroek R, Beinat E, Binnekade JM, Bakker PJ (2008) Electromagnetic interference from radiofrequency identification inducing potentially hazardous incidents in critical care medical equipment. JAMA 299:2884–2890

    Article  Google Scholar 

  14. Tu Y-J, Zhou W, Piramuthu S (2009) Identifying RFID-embedded objects in pervasive healthcare applications. Decis Support Syst 46(2):586–593

    Article  Google Scholar 

  15. Whang S (2010) Timing of RFID adoption in a supply chain. Manage Sci 56(2):343–355

    Article  Google Scholar 

  16. Zhou W (2009) RFID and item-level information visibility. Eur J Oper Res 198(1):252–258

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Selwyn Piramuthu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, W., Piramuthu, S. IoT security perspective of a flexible healthcare supply chain. Inf Technol Manag 19, 141–153 (2018). https://doi.org/10.1007/s10799-017-0279-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10799-017-0279-7

Keywords

Navigation