{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:07:26Z","timestamp":1754158046445,"version":"3.41.2"},"reference-count":32,"publisher":"Emerald","issue":"6","license":[{"start":{"date-parts":[[2010,11,9]],"date-time":"2010-11-09T00:00:00Z","timestamp":1289260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,11,9]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to describe a virtualisation model of RFID enabled infrastructure incorporating non\u2010standard radio frequency identification (RFID) components. The model is implemented as a software service that draws upon other sources of internet services.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>In a global supply chain environment, circumstances at different locations may not allow RFID system to be used. Some supply chain members do not have compatible network infrastructure in place. These include RFID frameworks such as China's National Product Codes and Japan's ubiquitous identification which are utilised around the world. There is also a reachability problem for consignments going offsite. The paper introduces a service abstraction layer (SAL) in the RFID architecture to remove dependency on specific RFID framework. From this principle, the paper introduces a new virtual infrastructure that interfaces with emerging identification technologies.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>The model bridges the gaps that exist between various RFID standards, as well as utilising various technologies to emulate data capture devices so that the information chain remains intact across the global network. The resulting system significantly reduces the costs of commissioning and operating costs of existing RFID infrastructures.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>The new system has been tested in real industry environment with defined scope and coverage. The implication due to full roll out of the technologies in global supply chains still requires further investigation.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Usability of the virtualised RFID infrastructures depends on the cooperation among partners in the supply chain rather than the technology level. New business rules are required when special stakeholders such as customs are included in this virtualised infrastructure.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The concept of virtualisation has been used in operating systems, but its application to supply chain has not been explored before. Introduction of the SAL allows interoperability of systems handling goods tracking events through the supply chain.<\/jats:p><\/jats:sec>","DOI":"10.1108\/14637151011092991","type":"journal-article","created":{"date-parts":[[2010,11,6]],"date-time":"2010-11-06T08:03:23Z","timestamp":1289030603000},"page":"917-931","source":"Crossref","is-referenced-by-count":6,"title":["RFID implementation with virtual infrastructures"],"prefix":"10.1108","volume":"16","author":[{"given":"William","family":"Lorchirachoonkul","sequence":"first","affiliation":[]},{"given":"John P.T.","family":"Mo","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031520114091600_b1","doi-asserted-by":"crossref","unstructured":"Behzadan, A.H., Aziz, Z., Anumba, C.J. and Kamat, V.R. (2008), \u201cUbiquitous location tracking for context\u2010specific information delivery on construction sites\u201d, Automation in Construction, Vol. 17 No. 6, pp. 737\u201048.","DOI":"10.1016\/j.autcon.2008.02.002"},{"key":"key2022031520114091600_b2","unstructured":"BRIDGE Consortium (2009), Building Radio Frequency Identification Solutions for the Global Environment Final Report 2006\u20102009, available at: www.bridge\u2010project.eu\/data\/File\/BRIDGE_Final_report.pdf (assessed 19 November 2009)."},{"key":"key2022031520114091600_b3","doi-asserted-by":"crossref","unstructured":"Cheung, B.K.S., Choy, K.L., Li, S.L., Shi, W. and Tang, J. (2008), \u201cDynamic routing model and solution method for fleet management and mobile technologies\u201d, International Journal of Production Economics, Vol. 113 No. 2, pp. 694\u2010705.","DOI":"10.1016\/j.ijpe.2007.10.018"},{"key":"key2022031520114091600_b4","doi-asserted-by":"crossref","unstructured":"Chiang, K.W. and Huang, Y.W. (2008), \u201cAn intelligent navigator for seamless INS\/GPS integrated land vehicle navigation applications\u201d, Applied Computing, Vol. 8 No. 1, pp. 722\u201033.","DOI":"10.1016\/j.asoc.2007.05.010"},{"key":"key2022031520114091600_b5","doi-asserted-by":"crossref","unstructured":"Cicirelli, M.G. and Distante, A. (2008), \u201cRFID\u2010assisted mobile robot system for mapping and surveillance of indoor environments\u201d, Industrial Robot: An International Journal, Vol. 35 No. 2, pp. 143\u201052.","DOI":"10.1108\/01439910810854638"},{"key":"key2022031520114091600_b6","doi-asserted-by":"crossref","unstructured":"Dawson, P. (2008), \u201cIT virtualisation \u2013 virtual tales and real life stories\u201d, Engineering and Technology, Vol. 3 No. 3, pp. 56\u20108.","DOI":"10.1049\/et:20080314"},{"key":"key2022031520114091600_b7","doi-asserted-by":"crossref","unstructured":"GS1 Australia and RMIT (2007), National EPC NetworkTM Demonstrator Project Extension, Public Report Distributed in Smart Conference, Sydney, 20\u201021 June, Soft copy of the publication is available at: www.gs1au.org\/products\/epcglobal\/australian_activities\/demonstrator_project.asp (assessed 19 November 2009).","DOI":"10.1093\/ppar\/19.1.20"},{"key":"key2022031520114091600_b8","doi-asserted-by":"crossref","unstructured":"Hamilton, J.W. (1993), \u201cWireless communication systems: a satellite\u2010based communications approach for competitive advantage in logistic and transportation support services\u201d, Computers in Industry, Vol. 21 No. 3, pp. 273\u20108.","DOI":"10.1016\/0166-3615(93)90023-T"},{"key":"key2022031520114091600_b9","doi-asserted-by":"crossref","unstructured":"Kelepouris, T., Pramatari, K. and Doukidis, G. (2007), \u201cRFID\u2010enabled traceability in the food supply chain\u201d, Industrial Management & Data Systems, Vol. 107 No. 2, pp. 183\u2010200.","DOI":"10.1108\/02635570710723804"},{"key":"key2022031520114091600_b10","doi-asserted-by":"crossref","unstructured":"Kim, G. (2008), \u201cSeven steps to a secure virtual environment\u201d, Network Security, Vol. 8, pp. 14\u201018.","DOI":"10.1016\/S1353-4858(08)70098-9"},{"key":"key2022031520114091600_b11","doi-asserted-by":"crossref","unstructured":"Krefting, D., Bart, J., Beronov, K., Dzhimova, O., Falkner, J., Hartung, M., Hoheisel, A., Knoch, T.A., Lingner, T., Mohammed, Y., Peter, K., Rahm, K., Sax, U., Sommerfeld, D., Steinke, T., Tolxdroff, T., Vossberg, M., Viezens, F. and Weisbecker, A. (2009), \u201cMediGRID: towards a user friendly secured grid infrastructure\u201d, Future Generation Computer Systems, Vol. 25 No. 3, pp. 326\u201036.","DOI":"10.1016\/j.future.2008.05.005"},{"key":"key2022031520114091600_b12","doi-asserted-by":"crossref","unstructured":"Lewis, G., Simanta, S., Morris, E., Wrage, L. and Smith, D. (2007), \u201cCommon misconceptions about service\u2010oriented architecture\u201d, Cross Talk \u2013 The Journal of Defense Software Engineering, November, pp. 27\u201030.","DOI":"10.1109\/ICCBSS.2007.9"},{"key":"key2022031520114091600_b13","doi-asserted-by":"crossref","unstructured":"Liu, C.H., Sia, C.L. and Wei, K.K. (2008), \u201cAdopting organizational virtualization in B2B firms: an empirical study in Singapore\u201d, Information & Management, Vol. 45 No. 7, pp. 429\u201037.","DOI":"10.1016\/j.im.2008.06.005"},{"key":"key2022031520114091600_b14","doi-asserted-by":"crossref","unstructured":"Lu, M., Chen, W., Shen, X., Lam, H.C. and Liu, J. (2007), \u201cPositioning and tracking construction vehicles in highly dense urban areas and building construction sites\u201d, Automation in Construction, Vol. 16 No. 5, pp. 647\u201056.","DOI":"10.1016\/j.autcon.2006.11.001"},{"key":"key2022031520114091600_b15","doi-asserted-by":"crossref","unstructured":"Mo, J.P.T., Sheng, Q.S., Li, X. and Zeadally, S. (2009), \u201cRFID infrastructure design: a case study of two Australian national RFID projects\u201d, IEEE Internet Computing, Vol. 13 No. 1, pp. 14\u201021.","DOI":"10.1109\/MIC.2009.18"},{"key":"key2022031520114091600_b16","doi-asserted-by":"crossref","unstructured":"O'Brien, L., Moreno, P. and Bass, L. (2007), \u201cQuality attributes for service\u2010oriented architectures\u201d, paper presented at the International Workshop on Systems Development in SOA Environments (SDSOA) at the International Conference on Software Engineering, Minneapolis, MN, 20\u201026 May.","DOI":"10.1109\/SDSOA.2007.10"},{"key":"key2022031520114091600_b17","doi-asserted-by":"crossref","unstructured":"Okumura, T. and Moss\u00e9, D. (2004), \u201cVirtualizing network I\/O on end\u2010host operating system: operating system support for network control and resource protection\u201d, IEEE Transactions on Computers, Vol. 53 No. 10, pp. 1303\u201016.","DOI":"10.1109\/TC.2004.86"},{"key":"key2022031520114091600_b18","doi-asserted-by":"crossref","unstructured":"Pawar, K.S. and Driva, H. (2000), \u201cElectronic trading in the supply chain: a holistic implementation framework\u201d, Logistics Information Management, Vol. 13 No. 1, pp. 21\u201032.","DOI":"10.1108\/09576050010306369"},{"key":"key2022031520114091600_b19","doi-asserted-by":"crossref","unstructured":"Pedroso, M.C., Zwicker, R. and de Souza, C.A. (2009), \u201cRFID adoption: framework and survey in large Brazilian companies\u201d, Industrial Management & Data Systems, Vol. 109 No. 7, pp. 877\u201097.","DOI":"10.1108\/02635570910982256"},{"key":"key2022031520114091600_b20","unstructured":"Pennsylvania University RFID Study Group (2006), \u201cChallenges in RFID enabled supply chain management\u201d, Emerald Management Reviews, November, pp. 22\u20108."},{"key":"key2022031520114091600_b21","doi-asserted-by":"crossref","unstructured":"Piccinelli, G., Vitantonio, G.D. and Mokrushin, L. (2001), \u201cDynamic service aggregation in electronic marketplaces\u201d, Computer Networks, Vol. 37 No. 2, pp. 95\u2010109.","DOI":"10.1016\/S1389-1286(01)00211-0"},{"key":"key2022031520114091600_b22","doi-asserted-by":"crossref","unstructured":"Qurioga, C.A. and Bullock, D. (1998), \u201cTravel time studies with global positioning and geographic information systems: an integrated methodology\u201d, Transportation Research Part C, Vol. 6 Nos 1\u20102, pp. 101\u201027.","DOI":"10.1016\/S0968-090X(98)00010-2"},{"key":"key2022031520114091600_b23","doi-asserted-by":"crossref","unstructured":"Reyes, P.M. (2007), \u201cIs RFID right for your organization or application?\u201d, Management Research News, Vol. 30 No. 8, pp. 570\u201080.","DOI":"10.1108\/01409170710773706"},{"key":"key2022031520114091600_b24","doi-asserted-by":"crossref","unstructured":"Skapinetz, K. (2007), \u201cVirtualisation as a blackhat tool\u201d, Network Security, Vol. 10, pp. 4\u20107.","DOI":"10.1016\/S1353-4858(07)70092-2"},{"key":"key2022031520114091600_b25","doi-asserted-by":"crossref","unstructured":"Stormer, H. (2006), \u201cExploring solutions for a MobileWeb\u201d, Proceedings of the 8th IEEE International Conference on e\u2010Commerce Technology and the 3rd IEEE International Conference on Enterprise Computing, e\u2010Commerce, and e\u2010Services (CEC\/EEE'06), San Francisco, CA, USA, 26\u201029 June, pp. 75\u201083.","DOI":"10.1109\/CEC-EEE.2006.48"},{"key":"key2022031520114091600_b26","doi-asserted-by":"crossref","unstructured":"Vijayaraman, B.S. and Osyk, B.A. (2006), \u201cAn empirical study of RFID implementation in the warehousing industry\u201d, The International Journal of Logistics Management, Vol. 17 No. 1, pp. 6\u201020.","DOI":"10.1108\/09574090610663400"},{"key":"key2022031520114091600_b27","doi-asserted-by":"crossref","unstructured":"Visser, H.G. (1991), \u201cTerminal area traffic management\u201d, Prog. Aerospace Science, Vol. 28 No. 4, pp. 323\u201068.","DOI":"10.1016\/0376-0421(91)90004-N"},{"key":"key2022031520114091600_b28","unstructured":"Wamba, S.F., Keating, B., Coltman, T. and Michael, K. (2009), RFID Adoption Issues: Analysis of Organization Benefits and Risks, Centre of Business Service Science, University of Wollongong, Wollongong."},{"key":"key2022031520114091600_b29","doi-asserted-by":"crossref","unstructured":"Xiao, Y., Yu, S.H., Wu, K., Ni, Q., Janecek, C. and Nordstad, J. (2007), \u201cRadio frequency identification: technologies, applications, and research issues\u201d, Wireless Communications and Mobile Computing, Vol. 7 No. 4, pp. 457\u201072.","DOI":"10.1002\/wcm.365"},{"key":"key2022031520114091600_b30","doi-asserted-by":"crossref","unstructured":"Yu, S.C. (2008), \u201cImplementation of an innovative RFID application in libraries\u201d, Library Hi Tech., Vol. 26 No. 3, pp. 398\u2010410.","DOI":"10.1108\/07378830810903328"},{"key":"key2022031520114091600_b31","doi-asserted-by":"crossref","unstructured":"Zarour, N., Boufaida, M., Seinturier, L. and Estraillier, P. (2005), \u201cSupporting virtual enterprise systems using agent coordination\u201d, Knowledge and Information Systems, Vol. 8 No. 3, pp. 330\u201049.","DOI":"10.1007\/s10115-004-0183-4"},{"key":"key2022031520114091600_b32","doi-asserted-by":"crossref","unstructured":"Zito, R., D'Este, G. and Taylor, M.A.P. (1995), \u201cGlobal positioning systems in the time domain: how useful a tool for intelligent vehicle\u2010highway systems?\u201d, Transportation Research Part C, Vol. 3 No. 4, pp. 193\u2010209.","DOI":"10.1016\/0968-090X(95)00006-5"}],"container-title":["Business Process Management Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14637151011092991","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637151011092991\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14637151011092991\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:36:23Z","timestamp":1753403783000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/bpmj\/article\/16\/6\/917-931\/258233"}},"subtitle":[],"editor":[{"given":"Samuel","family":"Fosso Wamba","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2010,11,9]]},"references-count":32,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2010,11,9]]}},"alternative-id":["10.1108\/14637151011092991"],"URL":"https:\/\/doi.org\/10.1108\/14637151011092991","relation":{},"ISSN":["1463-7154"],"issn-type":[{"type":"print","value":"1463-7154"}],"subject":[],"published":{"date-parts":[[2010,11,9]]}}}