{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:09:38Z","timestamp":1725516578961},"publisher-location":"Boston, MA","reference-count":35,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387097671"},{"type":"electronic","value":"9780387097688"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-09768-8_13","type":"book-chapter","created":{"date-parts":[[2008,8,19]],"date-time":"2008-08-19T13:40:02Z","timestamp":1219153202000},"page":"189-198","source":"Crossref","is-referenced-by-count":3,"title":["Emerging Technologies in the Service Sector: An Early Exploration of Item-Level RFID on the Fashion Sales Floor"],"prefix":"10.1007","author":[{"given":"Claudia","family":"Loebbecke","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Huyskens","sequence":"additional","affiliation":[]},{"given":"Janis","family":"Gogan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"13_CR1_Ref","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1201\/1078\/44912.22.1.20051201\/85739.7","volume":"22","author":"R. Angeles","year":"2005","unstructured":"Angeles, R. 2005. \u201cRFID Technologies: Supply-Chain Applications and Implementation Issues,\u201d Information Systems Management (22:1), pp. 51-65.","journal-title":"Information Systems Management"},{"issue":"4","key":"13_CR2_Ref","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1080\/07421222.2001.11045663","volume":"17","author":"J. Benamati","year":"2001","unstructured":"Benamati, J., and Lederer, A. 2001. \u201cRapid Information Technology Change, Coping Mech-anisms, and the Emerging Technologies Group,\u201d Journal of Management Information Systems (17:4), pp. 183-202.","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"13_CR3_Ref","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/s10799-007-0010-1","volume":"8","author":"J. Curtin","year":"2007","unstructured":"Curtin, J., Kauffmann, R., and Riggins, F. 2007. \u201cMaking the \u2018Most\u2019 out of RFID Technology: A Research Agenda for the Study of the Adoption, Usage and Impact of RFID,\u201d Information Technology Management (8:2), pp. 87-110.","journal-title":"Information Technology Management"},{"issue":"2","key":"13_CR4_Ref","doi-asserted-by":"crossref","first-page":"8","DOI":"10.2307\/41166030","volume":"42","author":"G. Day","year":"2000","unstructured":"Day, G., and Schoemaker, P. 2000. \u201cAvoiding Pitfalls of Emerging Technologies,\u201d California Management Review (42:2), pp. 8-33.","journal-title":"California Management Review"},{"issue":"2","key":"13_CR5_Ref","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1287\/orsc.5.2.121","volume":"5","author":"G. DeSanctis","year":"1994","unstructured":"DeSanctis, G., and Poole, M. 1994. \u201cCapturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory,\u201d Organization Science (5:2), pp. 121-147.","journal-title":"Organization Science"},{"issue":"1\/2","key":"13_CR6_Ref","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1023\/A:1019160605755","volume":"1","author":"J. Gebauer","year":"2000","unstructured":"Gebauer, J., and Segev, A. 2000. \u201cEmerging Technologies to Support Indirect Procurement: Two Case Studies from the Petroleum Industry,\u201d Information Technology and Management (1:1\/2), pp. 107-128.","journal-title":"Information Technology and Management"},{"key":"13_CR7_Ref","doi-asserted-by":"crossref","unstructured":"Hardgrave, B., Armstrong, C., Riemenschneider, C. 2007. \u201cRFID Assimilation Hierarchy,\u201d In Proceedings of the 40\n                  \n                    th\n                  \n                  Annual Hawaii International Conference on System Sciences, Waikoloa, Big Island, HI, January 3-6, p. 224b..","DOI":"10.1109\/HICSS.2007.469"},{"issue":"1","key":"13_CR8_Ref","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1080\/10864415.1996.11518278","volume":"1","author":"S. Jarvenpaa","year":"1996","unstructured":"Jarvenpaa, S., and Ives, B. 1996. \u201cIntroducing Transformational Information Technologies: The Case of the World Wide Web Technology,\u201d International Journal of Electronic Commerce (1:1), pp. 95-126.","journal-title":"International Journal of Electronic Commerce"},{"issue":"4","key":"13_CR9_Ref","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1111\/j.1540-5915.1997.tb01331.x","volume":"28","author":"K. Kendall","year":"1997","unstructured":"Kendall, K. 1997. \u201cThe Significance of Information Systems Research on Emerging Tech-nologies: Seven Information Technologies that Promise to Improve Managerial Effec-tiveness,\u201d Decision Sciences (28:4), pp. 775-792.","journal-title":"Decision Sciences"},{"issue":"9","key":"13_CR10_Ref","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MCOM.2007.4342872","volume":"45","author":"P. Krishna","year":"2007","unstructured":"Krishna, P., and Husak, D. 2007. \u201cRFID Infrastructure,\u201d Communications Magazine, IEEE (45:9), pp. 4-10.","journal-title":"Communications Magazine, IEEE"},{"issue":"4","key":"13_CR11_Ref","first-page":"177","volume":"3","author":"C. Loebbecke","year":"2004","unstructured":"Loebbecke, C. 2004. \u201cModernizing Retailing Worldwide at the Point of Sale,\u201d MIS Quarterly Executive (3:4), pp. 177-187","journal-title":"MIS Quarterly Executive"},{"key":"13_CR12_Ref","doi-asserted-by":"crossref","first-page":"948","DOI":"10.4018\/978-1-59140-799-7.ch152","volume-title":"Encyclopedia of E-Commerce, E-Government and Mobile Commerce","author":"C. Loebbecke","year":"2006","unstructured":"Loebbecke, C. 2006. \u201cRFID in the Retail Supply Chain,\u201d In Encyclopedia of E-Commerce, E-Government and Mobile Commerce, M. Khosrow-Pour (ed.), Hershey, PA: Idea Group Publishing, pp. 948-953."},{"issue":"1","key":"13_CR13_Ref","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/10196780601136773","volume":"17","author":"C. Loebbecke","year":"2007","unstructured":"Loebbecke, C. 2007. \u201cPiloting RFID Along the Supply Chain: A Case Analysis,\u201d Electronic Markets (17:1), pp. 29-37.","journal-title":"Electronic Markets"},{"issue":"4","key":"13_CR14_Ref","first-page":"169","volume":"5","author":"C. Loebbecke","year":"2006","unstructured":"Loebbecke, C., and Huyskens, C. 2006. \u201cWeaving the RFID Yarn in the Fashion Industry: The Kaufhof Case,\u201d MIS Quarterly Executive (5:4), pp. 169-179.","journal-title":"MIS Quarterly Executive"},{"issue":"2","key":"13_CR15_Ref","first-page":"15","volume":"5","author":"C. Loebbecke","year":"2006","unstructured":"Loebbecke, C., and Palmer, J. 2006. \u201cRFID in the Fashion Industry: Kaufhof Department Stores AG and Gerry Weber International AG, Fashion Manufacturer,\u201d MIS Quarterly Executive (5:2), pp. 15-25.","journal-title":"MIS Quarterly Executive"},{"issue":"1","key":"13_CR16_Ref","first-page":"1","volume":"1","author":"K. Lyytinen","year":"2001","unstructured":"Lyytinen, K., and Yoo, Y. 2001. \u201cThe Next Wave of Nomadic Computing: A Research Agenda for Information Systems Research,\u201d Sprouts: Working Papers on Information Environments, Systems and Organizations (1:1), pp. 1-12.","journal-title":"Sprouts: Working Papers on Information Environments, Systems and Organizations"},{"issue":"12","key":"13_CR17_Ref","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1145\/585597.585616","volume":"45","author":"K. Lyytinen","year":"2002","unstructured":"Lyytinen, K., and Yoo, Y. 2002. \u201cIssues and Challenges in Ubiquitous Computing,\u201d Communications of the ACM (45:12), pp. 63-65.","journal-title":"Communications of the ACM"},{"key":"13_CR18_Ref","unstructured":"O\u2019Connor, M. 2007. \u201cFalabella Plans Second Item-Level RFID Pilot,\u201d RFID Journal, August 29 (\n                    www.rfidjournal.com\/article\/articleview\/3585\/1\/1\/definitions_on\n                    \n                  )."},{"issue":"3","key":"13_CR19_Ref","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1287\/orsc.3.3.398","volume":"3","author":"W. Orlikowski","year":"1992","unstructured":"Orlikowski, W. 1992. \u201cThe Duality of Technology: Rethinking the Concept of Technology in Organizations,\u201d Organization Science (3:3), pp. 398-427.","journal-title":"Organization Science"},{"issue":"1\/2","key":"13_CR20_Ref","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.ijhcs.2005.04.008","volume":"63","author":"B. Price","year":"2005","unstructured":"Price, B., Adam, K., and Nuseibeh, B. 2005. \u201cKeeping Ubiquitous Computing to Your-Self: A Practical Model for User Control of Privacy,\u201d International Journal of Human-Computer Studies (63:1\/2), pp. 228-253.","journal-title":"International Journal of Human-Computer Studies"},{"key":"13_CR21_Ref","unstructured":"Raafat, F., Sherrard, W., Meslis, L., and Windt, J. 2007. \u201cCase Study: Applications of RFID in Retail Business,\u201d in Proceedings of the 2007 Meeting of the South West Region of the Decision Sciences Institute, San Diego, CA, pp. 695-701."},{"key":"13_CR22_Ref","volume-title":"Designing Organizations","author":"D. Robey","year":"1986","unstructured":"Robey, D. 1986. Designing Organizations (2nd ed.), Homewood, IL: Irwin.","edition":"2nd ed."},{"issue":"1","key":"13_CR23_Ref","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/001872679504800102","volume":"48","author":"H. Scarbrough","year":"1995","unstructured":"Scarbrough, H. 1995. \u201cReview Article on The Social Engagement of Social Science,\u201d Human Relations (48:1), pp. 1-11.","journal-title":"Human Relations"},{"issue":"3","key":"13_CR24_Ref","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1057\/palgrave.ejis.3000615","volume":"15","author":"R. pers","year":"2006","unstructured":"pers, R., Scheepers, H., Ngwenyama, O. 2006. \u201cContextual Influences on User Satisfaction with Mobile Computing: Findings From Two Healthcare Organizations,\u201d European Journal of Information Systems (15:3), pp. 261-268.","journal-title":"European Journal of Information Systems"},{"issue":"1","key":"13_CR25_Ref","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1108\/09590550710722350","volume":"35","author":"C. Sellitto","year":"2007","unstructured":"Sellitto, C., Burgess, S., and Hawking, P. 2007. \u201cInformation Quality Attributes Associated with RFID-Derived Benefits in the Retail Supply Chain,\u201d International Journal of Retail & Distribution Management (35:1), pp. 69-87.","journal-title":"International Journal of Retail & Distribution Management"},{"issue":"4\/5","key":"13_CR26_Ref","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/S0278-4254(01)00037-0","volume":"20","author":"B. Shapiro","year":"2001","unstructured":"Shapiro, B., and Baker, C. 2001. \u201cInformation Technology and the Social Construction of Information Privacy,\u201d Journal of Accounting and Public Policy (20:4\/5), pp. 295-322.","journal-title":"Journal of Accounting and Public Policy"},{"issue":"3","key":"13_CR27_Ref","first-page":"2","volume":"1","author":"S. Spiekermann","year":"2006","unstructured":"Spiekermann, S., and Ziekow, H. 2006. \u201cRFID: A Systematic Analysis of Privacy Threats and a 7-Point Plan to Adress Them,\u201d Journal of Information System Security (1:3), pp. 2-17.","journal-title":"Journal of Information System Security"},{"key":"13_CR28_Ref","unstructured":"Swedberg, C. 2007a. \u201cHong Kong Shoppers Use RFID-Enabled Mirror to see what they Want,\u201d RFID Journal, September 4 (\n                    www.rfidjournal.com\/article\/articleview\/3595\/\n                    \n                  )."},{"key":"13_CR29_Ref","unstructured":"Swedberg, C. 2007b. \u201cThrottleman Adopts Item-Level Tagging,\u201d RFID Journal, August 24 (\n                    www.rfidjournal.com\/article\/articleview\/3580\/\n                    \n                  )."},{"issue":"2","key":"13_CR30_Ref","doi-asserted-by":"crossref","first-page":"365","DOI":"10.2307\/25148683","volume":"29","author":"A. Van de Ven","year":"2005","unstructured":"Van de Ven, A. 2005. \u201cRunning in Packs to Develop Knowledge-Intensive Technologies,\u201d MIS Quarterly (29:2), pp. 365-378.","journal-title":"MIS Quarterly"},{"issue":"3","key":"13_CR31_Ref","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M. Weiser","year":"1991","unstructured":"Weiser, M. 1991. \u201cThe Computer of the 21st Century,\u201d Scientific American (265:3), pp. 66-75.","journal-title":"Scientific American"},{"issue":"3","key":"13_CR32_Ref","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/329124.329127","volume":"3","author":"M. Weiser","year":"1999","unstructured":"Weiser, M. 1999. \u201cSome Computer Science Issues in Ubiquitous Computing,\u201d Mobile Computing and Communication Review (3:3), pp. 12-21.","journal-title":"Mobile Computing and Communication Review"},{"key":"13_CR33_Ref","unstructured":"Wessel, R. 2007. \u201cMetro Group\u2019s Galeria Kaufhof Launches UHF-Item-Level Pilot,\u201d RFID Journal, September 20 (\n                    www.rfidjournal.com\/article\/articleview\/3624\n                    \n                  )."},{"key":"13_CR34_Ref","volume-title":"Case Study Research: Design and Methods","author":"R. Yin","year":"2003","unstructured":"Yin, R. 2003. Case Study Research: Design and Methods (5th ed.), Thousand Oaks, CA: Sage Publications.","edition":"5th ed."},{"issue":"12","key":"13_CR35_Ref","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1287\/mnsc.28.12.1421","volume":"28","author":"R. Zmud","year":"1982","unstructured":"Zmud, R. 1982. \u201cDiffusion of Modern Software Practices: Influence of Centralization and Formalization,\u201d Management Science (28:12), pp. 1421-1431.","journal-title":"Management Science"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Information Technology in the Service Economy: Challenges and Possibilities for the 21st Century"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-09768-8_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:48:14Z","timestamp":1619574494000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-09768-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387097671","9780387097688"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-09768-8_13","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}