{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:07:25Z","timestamp":1754158045359,"version":"3.41.2"},"reference-count":29,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2010,11,9]],"date-time":"2010-11-09T00:00:00Z","timestamp":1289260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11,9]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The widespread application of radio frequency identification (RFID) tags in supply chains is said to cause enormous data volume problems that could render RFID event\u2010driven supply chains unmanageable. An unbiased and quantitative understanding of the characteristics and extent of these data volume problems is necessary to identify and remove adoption barriers. This paper aims to address the issues.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The paper presents a simulation study based on a real\u2010world scenario that reveals quantitative characteristics of the data volumes problem in an RFID\u2010enabled supply chain and discusses its implications.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The results suggest that data volumes will be much lower than currently assumed by practitioners. Thus, this work can be seen as a first basis for eliminating unjustified adoption concerns regarding data volumes complexity. However, it finds that the data volume problems bear still significant challenges for researchers and developers of RFID infrastructures with real\u2010time decision\u2010making applications.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The simulation study is based on a single product case study of a retail supply chain in Europe. Since a simulation is always a simplification of the real world, the results need to be interpreted carefully in different contexts. The nature and extent of the problem might vary across different products, industries and geographic regions.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Researchers, end\u2010users and solution providers might use our paper as a guideline how to approach and quantify the data volume problem in their particular case. Moreover, the result data can be used to benchmark and optimize RFID applications.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>This paper is one of the first scholarly works that analyze RFID data volume problems in supply chains with a quantitative methodology.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14637151011092982","type":"journal-article","created":{"date-parts":[[2010,11,6]],"date-time":"2010-11-06T08:03:29Z","timestamp":1289030609000},"page":"904-916","source":"Crossref","is-referenced-by-count":9,"title":["Understanding data volume problems of RFID\u2010enabled supply chains"],"prefix":"10.1108","volume":"16","author":[{"given":"Alexander","family":"Ilic","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Gr\u00f6ssbauer","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Michahelles","sequence":"additional","affiliation":[]},{"given":"Elgar","family":"Fleisch","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022021519484724100_b1","unstructured":"Beier, S., Grandison, T., Kailing, K. and Rantzau, R. (2006), \u201cDiscovery services \u2013 enabling RFID traceability in EPCglobal networks\u201d, Proceedings of the 13th International Conference on Management of Data (COMAD\u2009), Delhi, India."},{"key":"key2022021519484724100_b2","unstructured":"Bhuptani, M. and Moradpour, S. (2005), \u201cEmerging trends in RFID\u201d, Jupitermedia, available at: www.developer.com\/java\/web\/article.php\/3494591 (accessed 10 October 2008)."},{"key":"key2022021519484724100_b3","doi-asserted-by":"crossref","unstructured":"Brady, M., Armstrong, C. and Fellenz, M.R. (2007), Too Much Data, Too Little Information: The Challenges of RFID Implementation, University of Dublin, Dublin, 30 May.","DOI":"10.2139\/ssrn.989303"},{"key":"key2022021519484724100_b4","unstructured":"Chopra, S. and Meindl, P. (2007), Supply Chain Management: Strategy, Planning, and Operation, Prentice\u2010Hall, Upper Saddle River, NJ."},{"key":"key2022021519484724100_b5","doi-asserted-by":"crossref","unstructured":"Delen, D., Hardgrave, B.C. and Sharda, R. (2007), \u201cRFID for better supply\u2010chain management through enhanced information visibility\u201d, Production and Operations Management, Vol. 16 No. 5, pp. 613\u201024.","DOI":"10.1111\/j.1937-5956.2007.tb00284.x"},{"key":"key2022021519484724100_b6","doi-asserted-by":"crossref","unstructured":"Derakhshan, R., Orlowska, M.E. and Xue, L. (2007), \u201cRFID data management: challenges and opportunities\u201d, paper presented at the IEEE International Conference on RFID, Grapevine, TX.","DOI":"10.1109\/RFID.2007.346166"},{"key":"key2022021519484724100_b7","unstructured":"EPCglobal (2007a), Architecture Framework v. 1.2, EPCglobal, Brussels."},{"key":"key2022021519484724100_b8","unstructured":"EPCglobal (2007b), EPCIS Standard v. 1.0.1, EPCglobal, Brussels."},{"key":"key2022021519484724100_b9","doi-asserted-by":"crossref","unstructured":"Gaukler, G.M., Seifert, R.W. and Hausman, W.H. (2007), \u201cItem\u2010level RFID in the retail supply chain\u201d, Production and Operations Management, Vol. 16 No. 1, pp. 65\u201076.","DOI":"10.1111\/j.1937-5956.2007.tb00166.x"},{"key":"key2022021519484724100_b10","doi-asserted-by":"crossref","unstructured":"Ghiani, G., Laporte, G. and Musmanno, R. (2004), Introduction to Logistics Systems Planning and Control, Wiley, Chichester.","DOI":"10.1002\/0470014040"},{"key":"key2022021519484724100_b11","doi-asserted-by":"crossref","unstructured":"Gonzalez, H., Jiawei, H., Xiaolei, L. and Klabjan, D. (2006), \u201cWarehousing and analyzing massive RFID data sets\u201d, Proceedings of the 22nd International Conference on Data Engineering (ICDE '06\u2009), IEEE Computer Society, Atlanta, GA.","DOI":"10.1109\/ICDE.2006.171"},{"key":"key2022021519484724100_b12","unstructured":"GS1 (2006), The Global Traceability Standard, GS1, Brussels."},{"key":"key2022021519484724100_b13","doi-asserted-by":"crossref","unstructured":"Han, J., Gonzalez, H., Li, X. and Klabjan, D. (2006), \u201cWarehousing and mining massive RFID data sets\u201d, in Carbonell, J.G. and Siekmann, J. (Eds), Advanced Data Mining and Applications, Springer, Heidelberg.","DOI":"10.1007\/11811305_1"},{"key":"key2022021519484724100_b14","doi-asserted-by":"crossref","unstructured":"Ilic, A., Andersen, T. and Michahelles, F. (2009), \u201cIncreasing supply\u2010chain visibility with rule\u2010based RFID data analysis\u201d, Internet Computing, IEEE, Vol. 13 No. 1, pp. 31\u20108.","DOI":"10.1109\/MIC.2009.10"},{"key":"key2022021519484724100_b15","unstructured":"Kurschner, C., Condea, C., Kasten, O. and Thiesse, F. (2008), \u201cDiscovery service design in the EPCglobal network \u2013 towards full supply chain visibility\u201d, The Internet of Things Conference, Springer, Zurich."},{"key":"key2022021519484724100_b16","unstructured":"Law, A.M. and Kelton, D.M. (2001), Simulation Modeling and Analysis, McGraw\u2010Hill, New York, NY."},{"key":"key2022021519484724100_b17","doi-asserted-by":"crossref","unstructured":"Lee, H. and \u00d6zer, \u00d6. (2007), \u201cUnlocking the value of RFID\u201d, Production and Operations Management, Vol. 16 No. 1, pp. 40\u201064.","DOI":"10.1111\/j.1937-5956.2007.tb00165.x"},{"key":"key2022021519484724100_b18","unstructured":"Levinson, M. (2003), \u201cThe RFID imperative\u201d, CIO Magazine, Vol. 17 No. 5, pp. 77\u201088."},{"key":"key2022021519484724100_b19","unstructured":"Lin, D., Elmongui, H., Bertino, E. and Ooi, B. (2007), \u201cData management in RFID applications\u201d, Database and Expert Systems Applications, Springer, Heidelberg."},{"key":"key2022021519484724100_b20","doi-asserted-by":"crossref","unstructured":"Nath, B., Reynolds, F. and Want, R. (2006), \u201cRFID technology and applications\u201d, Pervasive Computing, IEEE, Vol. 5 No. 1, pp. 22\u20104.","DOI":"10.1109\/MPRV.2006.13"},{"key":"key2022021519484724100_b21","unstructured":"Sargent, R.G. (2005), \u201cVerification and validation of simulation models\u201d, Proceedings of the 37th Winter Simulation Conference, Orlando, FL."},{"key":"key2022021519484724100_b22","unstructured":"Schuman, E. (2004), Will Users Get Buried Under RFID Data?, Ziff Davis Media, available at: www.eweek.com\/article2\/0,1895,1722063,00.asp (accessed 17 October 2008)."},{"key":"key2022021519484724100_b23","unstructured":"Srivastava, L. (2005), \u201cRFID and the internet of things: ICT trends and challenges in a global era\u201d, paper presented at the World Summit on the Information Society (WSIS), Tunis, Tunisia."},{"key":"key2022021519484724100_b24","doi-asserted-by":"crossref","unstructured":"Szmerekovsky, J.G. and Zhang, J. (2008), \u201cCoordination and adoption of item\u2010level RFID with vendor managed inventory\u201d, International Journal of Production Economics, Vol. 114 No. 1, pp. 388\u201098.","DOI":"10.1016\/j.ijpe.2008.03.002"},{"key":"key2022021519484724100_b25","unstructured":"Vadlamani, R., Kalyan, R. and Murali, K.M. (2006), \u201cApplications of intelligent technologies in retail marketing\u201d, Retailing in the 21st Century: Current and Future Trends, Springer, Heidelberg."},{"key":"key2022021519484724100_b26","unstructured":"Wang, F. and Liu, P. (2005), \u201cTemporal management of RFID data\u201d, paper presented at the 31st International Conference on Very Large Data Bases (VLDB), Trondheim, Norway, VLDB Endowment."},{"key":"key2022021519484724100_b27","doi-asserted-by":"crossref","unstructured":"Wang, F., Liu, S., Liu, P. and Bai, Y. (2006), \u201cBridging physical and virtual worlds: complex event processing for RFID data streams\u201d, Advances in Database Technology \u2013 EDBT 2006, Springer, New York, NY.","DOI":"10.1007\/11687238_36"},{"key":"key2022021519484724100_b28","doi-asserted-by":"crossref","unstructured":"Wu, N.C., Nystrom, M.A., Lin, T.R. and Yu, H.C. (2006), \u201cChallenges to global RFID adoption\u201d, Technovation, Vol. 26 No. 12, pp. 1317\u201023.","DOI":"10.1016\/j.technovation.2005.08.012"},{"key":"key2022021519484724100_b29","unstructured":"Zipkin, P.H. (2000), Foundations of Inventory management, McGraw\u2010Hill, Boston, MA."}],"container-title":["Business Process Management Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14637151011092982","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637151011092982\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637151011092982\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:36:22Z","timestamp":1753403782000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/bpmj\/article\/16\/6\/904-916\/258239"}},"subtitle":[],"editor":[{"given":"Samuel","family":"Fosso Wamba","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2010,11,9]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2010,11,9]]}},"alternative-id":["10.1108\/14637151011092982"],"URL":"https:\/\/doi.org\/10.1108\/14637151011092982","relation":{},"ISSN":["1463-7154"],"issn-type":[{"type":"print","value":"1463-7154"}],"subject":[],"published":{"date-parts":[[2010,11,9]]}}}