Open Access. Powered by Scholars. Published by Universities.®

Management Information Systems Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Management Information Systems

A Field Study Of Rfid Deployment And Return Expectations, Jonathan W. Whitaker, Sunil Mithas, M. S. Krishnan Sep 2007

A Field Study Of Rfid Deployment And Return Expectations, Jonathan W. Whitaker, Sunil Mithas, M. S. Krishnan

Management Faculty Publications

Radio Frequency Identification (RFID) technology promises to transform supply chain management. Building on previous research in information systems and supply chain management, this paper proposes a theoretical framework for RFID adoption and benefits, and tests the framework using data on U.S. firms. Our analysis suggests that there is a positive association between information technology (IT) application deployment and RFID adoption. We find that RFID implementation spending and partner mandate are associated with an expectation of early return on RFID investment, and a perceived lack of industry-wide standards is associated with an expectation of delayed return on RFID investment. These results …


Releasing Individually Identifiable Microdata With Privacy Protection Against Stochastic Threat: An Application To Health Information, Robert Garfinkel, Ram Gopal, Steven M. Thompson Feb 2007

Releasing Individually Identifiable Microdata With Privacy Protection Against Stochastic Threat: An Application To Health Information, Robert Garfinkel, Ram Gopal, Steven M. Thompson

Management Faculty Publications

The ability to collect and disseminate individually identifiable microdata is becoming increasingly important in a number of arenas. This is especially true in health care and national security, where this data is considered vital for a number of public health and safety initiatives. In some cases legislation has been used to establish some standards for limiting the collection of and access to such data. However, all such legislative efforts contain many provisions that allow for access to individually identifiable microdata without the consent of the data subject. Furthermore, although legislation is useful in that penalties are levied for violating the …