28
Enhancing ERP System with RFID: Logistic Process Integration and Exception Handling Dickson K.W. Chiu 1,4 , Kai-Pan Mark 2,5 , Eleanna Kafeza 3 and Tat- Pui Wong 4 1 Dickson Computer Systems, 7 Victory Avenue, Homantin, Hong Kong 2 Department of Information Systems, City University of Hong Kong, Hong Kong 3 Department of Marketing & Communications, Athens University of Economics & Business, Greece 4 Department of Computing, The Hong Kong Polytechnic University, Hong Kong 5 Department of Information Engineering, Chinese University of Hong Kong, Hong Kong Abstract Various contemporary information and communication technologies (ICT) have revolutionized the global computing environment. This impacts most companies, especially traditional stand-alone ERP systems are inadequate to handle the current requirements of logistics applications. In this paper, we study the integration of RFID and mobile technologies with Web-enabled applications to an existing in- house ERP system. This enables management to utilize accurate information for analyzing their business performance and then perform any other further decisions quickly. Benefits include retrieving information more easily, reducing order processing and delivery time, increasing sales performance, enhancing communication with 1

Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

  • Upload
    lambao

  • View
    216

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

Enhancing ERP System with RFID:

Logistic Process Integration and Exception Handling

Dickson K.W. Chiu1,4, Kai-Pan Mark2,5, Eleanna Kafeza3 and Tat-Pui Wong4

1 Dickson Computer Systems, 7 Victory Avenue, Homantin, Hong Kong 2 Department of Information Systems, City University of Hong Kong, Hong Kong

3 Department of Marketing & Communications, Athens University of Economics & Business,

Greece 4 Department of Computing, The Hong Kong Polytechnic University, Hong Kong

5 Department of Information Engineering, Chinese University of Hong Kong, Hong Kong

AbstractVarious contemporary information and communication technologies (ICT) have revolutionized the

global computing environment. This impacts most companies, especially traditional stand-alone ERP

systems are inadequate to handle the current requirements of logistics applications. In this paper, we

study the integration of RFID and mobile technologies with Web-enabled applications to an existing in-

house ERP system. This enables management to utilize accurate information for analyzing their business

performance and then perform any other further decisions quickly. Benefits include retrieving

information more easily, reducing order processing and delivery time, increasing sales performance,

enhancing communication with customer, and improving data accuracy for in-house ERP System. In

particular, we illustrate how this infrastructure can help the integration of logistic processes and the

handling of exceptions in key business processes. We further evaluate our approach with respect to the

requirements of key system stakeholders.

Key words: Information integration, process management, mobile technologies

IntroductionThe Internet has become a global and common platform for every organization and individual.

Organizations have lots of opportunities and benefits when they fully utilize the Internet such as

introducing their company, products, services, and supporting on-line transactions and data processing.

Traditional ERP systems, therefore, are insufficient to integrate different stakeholders such as customers,

suppliers, and other business parties, especially when they are out of the company premises (Li & Peng,

2005). In this case study, one of the authors is an IT Supervisor for the Hong Kong telecommunication

service company being studied. We found that typical computer infrastructures of web-1

Page 2: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

enabled systems need to be enhanced to fit the recent logistic business environment and increase the

competition power at a timely manner. Otherwise, this leads to lowered productivity, competitiveness,

and revenue.

This paper studies the requirements, design, implementation, and advantages of enhancing an in-

house ERP system with Web-enabled applications, mobile, and Radio Frequency Identification (RFID)

technology. With such integration of disparate business functions and data, we focus on how the key

business processes concerning logistics can be improved through effective automation support for

exception handling.

Web-enabled system (Dahanayake & Gerhardt, 2003) is a technology that allows staff, partners, and

outsiders to connect to the back-end system through the Internet. Using a Web-enabled system, staff can

connect to the in-house ERP system through a Web browser and perform any actions similar to using a

thick client. Based on this, we further enhance the support of mobile technologies (Chiu, Cheung, Leung,

et al., 2010; Chiu, Cheung, Kafeza, & Leung, 2003), i.e., various types of mobile clients, such as mobile

phone, PDA, notebooks, to connect to the back-end system. This enables roaming users (e.g., sales and

management), who need to work outdoors, to access the in-house ERP system through the Web server

anytime and anywhere to support their business need. RFID (Rosenberg & Garfinkel, 2005) is a

technology that uses radio waves to automatically identify objects. A microchip is used to store the stock

information, and the stock information can be transferred using radio-frequency waves automatically.

RFID supports anti-counterfeiting and is being applied to supply chain management with mobile

technology. Using RFID, warehouse staff can manage stocks more efficiently(Meng, Chiu, Kafeza,

Wenyin, & Li, 2010) .

We share our experience in integrating the above technologies to an existing ERP system to

facilitate the exception handling in various logistic processes, which is inadequately studied before. The

remainder of this paper is organized as follows. First we introduce the background and related work.

Then we highlight an overview of the requirements for the logistic process integration. Next, we describe

our system design and implementation, followed by a tabulation of the key exception handling scenarios

for the logistic processes. Finally, we discuss the advantages of our approach with respect to different

stakeholders before concluding our paper with future work.

Background and Related WorkThe company being studied mainly focuses on telecommunication business (such as PABX,

Keyline, data communication, and voice systems) in Hong Kong. Owing to its business nature, the

delivery process must be smooth in order not to affect other service parties to perform their jobs (e.g.,

Installation Team, Training Team). According to the existing system infrastructure, some of the systems

need to be upgraded or enhanced. Basically, the ERP System had been running for over 8 years with just

some new business operational features and some bug fixes. There was no integration to other system or

employment of new technologies. Based on the system functionalities and constraints, the 2

Page 3: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

existing system could only fulfill basic internal usage but not the external ones. The users often

complained that they could not obtain the information from outside. Meanwhile, most of the competitors

have developed Web-enabled system and can support mobile devices. To increase the productivity and

competitiveness, it is necessary to develop a Web-enabled system that supports mobile devices in

addition to desktop devices, as well as enhanced exception feature (Chiu, Cheung, Till, Narupiyakul, &

Hung, 2010). To enhance the warehouse operation (e.g., to avoid mis-packing or mis-delivery, improve

stock keeping and the update interval for delivery status, etc.), it is necessary to have a system to verify

every delivered item. A RFID system can perform this kind of checking effectively (Meng et al., 2010).

Information Technology has a significant impact on every sector. RFID and ERP cause tremendous

impact on the transportation and logistics industries (Gunasekaran, Ngai, & McGaughey, 2006). Several

research papers on integrating ERP systems with RFID have been published. Attaran (2007) explored

RFID’s capabilities in the industries and evaluated the success factors on RFID integration. He further

pointed out that RFID is not only a technical issue but in fact it changes the whole business process.

Chow et. al. (2007) proposed a model to integrate RFID and web-based applications to optimize

information flow in supply chain parties. Cochran et. al. (2007) mentioned that the most threatening

incident is the re-use or re-transfer of information to third parties rather than the initial disclosure which

implies that the systems need privacy protection mechanisms.

There are many successful cases of building a Web-enabled system for different purposes. CJ-GLS,

a Korean-based Third Party Logistic Operator, successfully gains competitive advantages by deploying

RFID technology in electronic logistics business (2008). Similar RFID case studies on Shanghai Port are

presented by Wang et. al. (2006) as well. Enhancing a Web-enabled system with support for mobile

devices, users can communicate with the internal ERP system at anytime and anywhere. The security of

RFID is becoming a concern of technologists. A recent report indicates that it would be possible to

introduce RFID virus. RFID systems are subject to sniffing, spoofing, tracking and denial of service

attack like an ordinary computer system (Sparkes, 2006). At the meantime, security issue will then be

introduced because managing secure interactions over the Internet is an important issue. One method of

protecting the Web system is to build a Demilitarized Zone (DMZ) (Shimonski, 2003) and place the Web

server inside it. Typically, a DMZ is used for connecting servers that need to be accessible from the

outside world, such as e-mail server, domain-name servers (DNS), Web servers, other Web services, etc.

The Web server must have the ability to encrypt the data transferred in the public network so that the data

can be protected against eavesdropping.

For supporting mobile users, a key issue is that they must have a Web server that can be contacted

by mobile devices such as mobile phones and PDA. Such devices must have the ability to connect via

mobile networks (e.g., GSM) to the Internet (Küpper, 2005). The most common way to connect to the

Internet is to subscribe some add-on services from a GSM network provider such as GPRS, WAP, etc.

When a mobile device is connected to a service subscriber, the GSM system can then authenticate and

validate the user’s identity and then assign the user with an IP address for using GPRS. The 3

Page 4: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

mobile device can then use this IP address to access the Web server through the GPRS Internet tunnel.

Another import issue for serving the mobile user is that the mobile interface must be light-weight because

the mobile devices have limited computing power and screen size. Therefore, there is a need to develop a

different Graphical User Interface (GUI) to serve mobile users. For example, Ngai et. al. (2007) presents

a practical implementation of such web-enabled mobile logistics management system with RFID support

that has successfully improved container port operations.

For technical principles and details on how RFID works, we skip this in this paper as there have

been many papers and textbooks discussing such details. For example, Hassan and Chatterjee (Hassan &

Chatterjee, 2006) propose and evaluate taxonomy of various RFID systems currently available for the

understanding of this technology, the factors for implementation of a successful RFID system, its

strengths and weaknesses, as well as scalability options. Viehland and Wong (2007) identify the most

important and unsolved issues that will determine the future of RFID, with a review of the RFID

business-oriented literature. Rosenberg and Garfinkel (2005) introduce RFID applications as well as their

security and privacy issues in their book. Poirier and McCollum (2006) further detail some RFID

strategic implementation and basic adoption strategies in their book. RFID implementation in Taiwan

has been deployed in diverse areas including security, asset management, access control, logistics, and

pharmaceuticals (Chang & Yen, 2008). In particular, the high price of most stock items related to

telecommunication in our case study justifies the cost of employing RFID (Meng et al., 2010).

Lefebvre et al. (2005) present a pilot study in the context of warehousing activities in one specific

supply chain in the retail industry. Results indicate that RFID appears to be a disruptive technology as it

supports a new business model, entails major redesign of existing processes and fosters a higher level of

electronic integration among supply chain members. They further attempt to track key performance

indicators in order to assess the impacts of RFID technology in a five layer supply chain in the utility

sector, with the focus of inter-company connectivity and relationship management (Bendavid, Lefebvre,

Lefebvre, & Wamba, 2007).

However, the focus of this paper is an in-depth study on the integration of ERP systems with RFID

technology. We have based on some successful cases as an example. One of the successful stories of

using RFID is Wal-Mart Stores (Roussos, 2006). Wal-Mart uses RFID tags to the automatic tracking of

pallets and cases of goods. The RFID tags contain a chip that is imparted with information and can also

be used in the manufacturing process, which helps suppliers to become more efficient. Holmqvist and

Stefansson (2006) discuss the feasibility of a mobile RFID solution in the automotive business-to-

business of Volvo from the perspectives of operational reliability, usability, and productivity. We also

have successful experiences in utilizing RFID technologies for tracking expensive equipments for the

telecom industry (Meng et al., 2010). Most studies have been performed in the context of large

enterprises but not on small-and-medium enterprises (SME) as we did.

In summary, there have been many successful cases in using all these technologies (Angeles, 2005).

Implementation of business rules that handle new exceptions, especially to deal with the extra 4

Page 5: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

volume of data generated from the use of RFID, remains an important point of research(Niederman,

Mathieu, Morley, & Kwon, 2007). However, there have not been any studies explicitly in integrating all

of these technologies for exception handling of logistic process integration.

Requirements Overview

Figure 1. Stakeholders of ERP System with RFID

After interviewing with some of the key users, we arrived at the requirements for a new system

using Web-enabled technology, RFID technology for the process and information integration. Different

stakeholders can connect to the system through the Internet from different locations and devices. Figure 1

summarized the stakeholders of the system. Their roles and requirements are as follows.

For Internal Staff

Internal General Staff – They are located in the office and perform general business operation tasks

in the intra-net, e.g., create quotations, contracts, invoices, service orders, work orders, maintenance

agreements, etc. The mobile enhancement and RFID integration can better support their information

needs.

Warehouse Staff – They need an efficient system to check in, check out, validate, verify, and locate

the stock. Also, they need to provide updated stock status reports to the management. When they check

out stock items, they need to use the RFID Reader/Scanner to scan the RFID tag based on the order.

After scanning, the items will be flagged as reserved status and are ready for delivery.

Management – They are the decision makers of this project and responsible for budgeting and

forecasting. They need to decide and approve who can use the Web-enabled system and what features

can be released. They need various up-to-date reports for analysis and actions as well.

5

Page 6: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

IT Staff – They need to handle all the development activities of the project, including the design of

the system workflows, functions, logics, and exception handling. Also, they need to evaluate different

vendors’ solutions and select the best ones to integrate to the existing ERP system. They also handle all

technical activities such as testing, documentations, sys-tem support, further system enhancements, and

debugging.

For Mobile Staff

Salespersons – They need to retrieve the information of product items such as item description and

price through the Web-enabled system, sometimes outside the office. They also need to create and update

quotations and send them to their customers immediately in an electronic form.

External Warehouse Staff – They need to communicate with the ERP system outside the office and

warehouse to update the delivery status. When they reach the destination, they need to use RFID readers

to scan the RFID tags based on the order. After scanning, the item status will be updated as delivered.

They then can use their PDA to update the order delivery status immediately. So, there is no need to wait

until the truck is back to the warehouse and then update the order delivery status manually.

Roaming Management Staff (e.g., Financial Officer) – They need to connect to the ERP system

when they are out of town in order to access the management reports immediately through the Web-

enabled system by themselves.

Roaming General Staff – Some staff working at home can use their PCs to connect to the Web-

enabled system. For example, some staff may need to work outside office hours for urgent tasks or

separate because of unpredictable events such as sickness, weather, or accidents.

System Design and ImplementationIn this section, our system design and implementation issues are discussed. The technical details on

RFID process conceptual model, system architecture and integration architecture are being explained,

followed by the business process issues on workflow enhancement with RFID and process integration

with an example. The last section gives an emphasis on security issue, which is a challenge in system

design and must be handled with extra care.

System Overview

There are two user categories based on the different requirements of different stakeholders: the

mobile user group and the normal user group. A user is classified as a mobile user or normal user based

on the process flow of the Web-enabled system. The mobile users and normal users are presented with

different front-end programs of different Graphical User Interfaces (GUIs) that are designed for different

devices. The purpose of having different GUIs is that appropriate GUI components enhance the usability

of e-Commerce applications (Chiu et al., 2003; Zou, Zhang, & Zhao, 2007).

6

Page 7: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

After presenting users with different GUIs according to device type, users then can select different

modules that they have the privilege to access. For example, staff member of different sales teams are

granted permission to access their own product module. Another example is that accounting staff can

access the account, contract and inventory modules.

Error control is implemented in every module. For each operation, alert message is sent to the user if

a process is invalid. Possible further actions are recommended to the user at the same time. For example,

when the user enters an invalid password, the system will prompt “Your password is wrong, please re-

enter.” to the user. When the user accesses the wrong service module that he has not been granted

permission, the system will prompt “You do not have enough privilege to access this module/function,

please contact the system administrator.”

RFID Process Conceptual Model

Figure 2 shows the conceptual model of the integration of RFID and ERP tasks based on the

requirement of different stakeholders. The process can be split into two smaller modules, RFID and ERP,

which further contain a number of tasks.

Process Request ERP TaskRFID Task

Warehouse Module

Object Identify Task

Stock Item

Object Registration Task Object Disposal Task

1 0..*

1

*

Figure 2. Conceptual Model for RFID integrated with in-house ERP system

The main function of RFID module is to handle stock identification and to transfer the stock data to

the ERP system automatically. Before a stock object can be identified, it must be registered in the RFID

database so that the relevant information can be made available to the whole system. While a stock object

is being disposed of, appropriate operations must be done to ensure that record of the stock object is

deleted from the system. This keeps the inventory record accurate and up-to-date, which guarantees that

the ERP system operates on the latest accurate inventory data.

7

Page 8: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

The RFID process is invoked by object identification. When a RFID process is executed, the RFID

Reader/Scanner scans the RFID tag to identify the object automatically. Relevant information is then

passed to the ERP system for further process.

The ERP system handles the stock. The warehouse module, which is a major module in the ERP

system, can perform any stock transactions (e.g., deducting the delivery quantity, increasing the reserved

quantity, etc) based on the data supplied by the RFID module. If stock is in shortage, the RFID system

can handle it separately as an exception, which can trigger replenishment automatically. More

information on exceptions are discussed in the next section.

System Architecture

This subsection describes our Web-enabled system with mobile user infrastructure together with

functions and features of each system component. Figure 3 depicts an infrastructure of a Web-enabled

system for in-house ERP system with mobile support, showing its key components.

Figure 3. Web-enabled system with Mobile Users Infrastructure

The whole system consists of several key components that perform RFID and ERP functions. In

addition to this, two firewalls are installed to maximize system security. The functionalities of different

system components are summarized below.

Mobile Devices - These devices have the ability to connect to the Internet from any places (say, by

using GPRS or Wireless Access Point technology) with a mobile Web browser. Examples include mobile

phone, notebook, PDA, and so on. Staff working outdoors is equipped with mobile devices, which enable

them to connect to the ERP system at anywhere and anytime through wireless network.8

Page 9: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

Front-End Web Server – The Front-End Web server is placed strategically between the public

Internet and the private Local Area Network in order to protect it against malicious intrusion from the

public Internet by the External Firewall. The Web Server is a Linux-based server with Apache Tomcat

Web service. It has two main functions: to accept the connections from outside users, and to establish

connections to the back-end ERP system. Other core functions are placed in servers inside the private

Local Area Network. This networking topology helps to minimize the risk of intrusion by filtering the

incoming connections from the Internet. Only authenticated genuine connections are permitted to access

the Intranet resources.

Firewall - There are two firewalls installed to protect the whole system. The External Firewall is to

protect the Front-End Web Server by only accepting incoming traffic from the Internet using the SSL

protocol (TCP Port 443) and rejecting any other unsolicited traffic. This can protect the server and reduce

the chance of the Front-End Web Server being hacked. Internal Firewall only accepts the traffic

authenticated by the Front-End Web Server in DMZ to the Internal Local Area Network (LAN) so that

the ERP system can further be protected by double authentication.

In-House ERP System – This tailor-made and self-developed system is used for daily business

operations, maintaining quotations, contracts, packing lists, delivery notes, collect notes, invoices, service

orders, work orders, maintenance orders, maintenance agreements, etc.

Thick Client - Thick clients are installed with self-developed software to connect and communicate

to the In-House ERP system. All the operations must be carried out through this thick client for security

enforcement.

Integration Architecture

Figure 4 depicts an integration of RFID system for In-House ERP system, showing the key

components to be built in the Web-enabled system.

In-House ERP System - This tailor-made and self-developed system has been used for daily business

operation for over 8 years. Its functions have been mentioned above.

RFID Server – It is a Linux based server with Sybase Database System containing the information

for all registered RFID tags, and is integrated to the existing In-House ERP System. Information of RFID

tags can be exchanged between these two servers.

Warehouse Staff (Internal) - Internal Warehouse Staff use RFID Reader/Scanner to scan the stock

items with RFID tags before packing them for delivery.

Warehouse Staff (External) - When reaching the destination, external warehouse staff use RFID

Reader/Scanner to scan the goods with RFID tag to finish delivery process. The delivery status for items

will then be sent back to RFID Server & ERP System.

9

Page 10: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

Figure 4. Integration of RFID with ERP System

Figure 5. System Integration Architecture

Figure 5 shows the overall integration architecture. It is based on three main modules, namely, Web

Engine, ERP Engine, and RFID Engine, together with other supporting modules, including Process

Definition, Process Execution, and System Workflow and Application Logic.

10

Page 11: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

Web Engine – It is used to receive and to respond to the requests from outsiders. If the request is

accepted, it will forward the request to the ERP Engine for further actions.

ERP System – It is used to receive the request from the Web Engine. The ERP System then

dispatches the request to its Process Execution Module, Process Definition Module, and System

Workflow and Application Logic to verify and execute the process operation.

Process Definition Module – It is used to clarify each request and define which program module is

to be executed.

Process Execution Module – Based on the definition from Process Definition Module, it creates a

process and it triggers the appropriate program handler in the application logic.

System Workflow and Application Logic – It is used to handle the program logic and workflow. For

example, when a delivery order is posted, it updates all the items information such as quantity on hand

and average cost. Also, it triggers other programs to update the accounting module like job costing,

invoicing, etc.

RFID Engine – It is used to update and validate each RFID tag’s information and then transfer all

the available information to ERP Engine for further processing.

Figure 6: Integration the data of ERP System & RFID System

11

Page 12: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

We need all the existing features for the ERP System be remaining. To enhance the efficiency of the

warehouse process, some of the features must be rewritten, e.g., order posting. The update is that external

warehouse staff can use a PDA to enter the order number and post the order to complete the process.

For database design, some existing tables and fields can still be used. The key extension is to link up

RFID information to the ERP System. Figure 6 shows some integration data schema between ERP

System and RFID System.

Workflow Enhancement with RFID

Integrating RFID with ERP module brings several advantages by automating the workflow. Figure 7

shows the shipping flow after RFID is integrated into the ERP system.

Figure 7. Shipping Workflow with RFID

RFID speeds up the whole delivery process by automating stock identification. Stocks being

delivered to customers are being recorded automatically through RFID system. Traditionally, stock level

is maintained manually that it is often too late to realize stock shortage. RFID stock management enables

warehouse staff to obtain accurate stock level instantly so that decision on delivery schedule can be

made. Warehouse staff may defer delivery schedule, or arrange partial delivery based on the statistics.

Automation of receiving workflow is shown in Figure 8. RFID gives accurate product information

on stock level and order delivery status and prevents much manual errors on data entry by workflow

automation.

Workflow automation in logistics chain optimizes warehouse space. At the same time, better

customer satisfaction can be achieved.

12

Page 13: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

Figure 8. Receiving Workflow with RFID

Process Integration and Example Scenario

Figure 9 shows a key process of the Web-enabled system and integration of RFID to in-house ERP

system.

Figure 9. Typical System Workflow in UML Activity Diagram

When a user logins to the ERP system through the Web server, the user can create, update, cancel,

and query the transaction according to his/her privilege. If the user is a warehouse staff member, he needs

to perform the RFID function to complete a transaction. The system flow can be described as follows.

A user first accesses the system by entering appropriate login name and password. As described in

the above section, relevant GUI is displayed to the user based on the device being used. The user is

presented with different modules that he has the privilege to access. For instance, warehouse staff can

13

Page 14: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

access the warehouse module interface, which allows them to validate the RFID and to update logistics

transactions. Administrative staff may use the administrative module for transaction management and

enquiry. Finally, the system responses with latest status of the transactions involved.

Security

Security of the Web-enabled system is important as all the information such as customer, supplier,

and accounting are very sensitive business data. These kinds of sensitive information must not be

compromised by intruders. Most importantly, if the information is stolen by other third parties, this will

affect the company image and reputation.

Security and privacy issues of RFID remain a major concern as well (D. S. Kim, Shin, & Park,

2007). Therefore, the traffic from Front-End Web Server is encrypted using electronic certificates. Using

certification, the client browser will then use a secure channel to communicate with the Front-End Web

Server. Also, there are two Firewalls to protect any unauthorized traffic in and out to the DMZ. When a

user tries to establish a connection to the Front-End Web Server, a login screen will appear. The user

must type in the username and password to validate his/her identity. If not, the user is not allowed to

enter the system. This validation process is using the Lightweight Directory Access Protocol (LDAP)

protocol to query the Back-End Authentication Server, i.e., no user information is hosted in the Front-

End Web Server.

Exceptions and HandlingThe key benefit of the new integrated system is that it can adequately support exception handlings,

though the adequate integration of disparate business functions and data. Robust business processes

should be able to handle various exception scenarios (Chiu, Cheung, Till, et al., 2010; Chiu, Karlapalem,

Li, & Kafeza, 2002). Table 1 summarizes some of the key scenarios and events. Otherwise, previous

manual handling of these frequently occurred exceptions in the logistics is very much inefficient and

ineffective, which not only impairs customer relationships but also hinders the growth of the company.

Scenarios/Events Exception Handling

1. Order, delivery location or schedule delivery date is confirmed, but amendment on order, delivery location, or schedule delivery date is needed.

As stocks are not checked out yet, only amendment of order is needed.

14

Page 15: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

2. Stocks are checked out at Warehouse, but amendment on the order, delivery location or schedule delivery date (if not delivered) is needed.

As the stocks are reserved, the warehouse needs to release the order to go back to the normal situation so that Stock Administration Department can amend the order. During this release operation, the ERP Engine will update stock availability status and RFID tags information through the RFID Engine. After the order is confirmed again by the Stock Administration Department, if items are added or the quantity is changed, warehouse staff needs to run the operation again as shown in Figure 7.

3. Stocks are checked out at Warehouse, but order cancellation (if not delivered) is needed.

As the stocks are reserved, warehouse needs to release the order back to normal situation so that Stock Administration Department can cancel the order. During cancellation, the ERP Engine updates the Stock availability status, cancels the reserved quantity, and updates the RFID tags information through the RFID Engine.

4. Stocks are checked out at Warehouse, but amendment on the order, delivery location or schedule delivery date (if stocks are on the way) is needed.

Order status is updated as "Pending" by warehouse staff. During the "Pending" status, external warehouse staff is permitted to delay delivery of the goods to the customer location until further notice and the goods need to be sent back to warehouse for further actions.

5. Stocks are checked out at Warehouse, but cancellation of order (if stocks are on the way) is needed.

As the stocks are reserved, the warehouse needs to release the order back to the normal situation so that the Stock Administration Department can cancel the order. During cancellation, the ERP Engine updates the Stock available status, cancels the reserved quantity, and updates the RFID tags information through the RFID Engine.

6. Stocks are delivered; external warehouse staff has not updated the order status yet, but amendment /cancellation of order is needed.

External warehouse staff needs to update the order status to "Completed". No other action is carried out. For additional items or change in quantity, the Stock Administration Department needs to revise the contract and amend the related items quantity and create separate delivery order or collection note. For cancellation, refer to case (8).

7. Stocks are delivered; external warehouse staff has updated the order status already, but amendment/cancellation of order is needed.

The Stock Administration Department needs to revise the contract and amend the related items quantity and create a revised delivery order or collection note. For cancellation, refer to case (8).

8. Stocks are delivered, but order cancellation is needed.

The Stock Administration Department needs to create a collection note and send to the Warehouse. Warehouse staff then goes to the customer’s premise to collect the stock and then uses a RFID Reader/Scanner to scan the RFID tags for that package lot. While updating the collection note order status, the ERP Engine updates the quantity in the Warehouse and also the RFID tag's information through the RFID Engine.

15

Page 16: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

Table 1. Typical exception handling scenarios

DiscussionIn this section, we evaluate the applicability of our implementation approach with respect to the

major stakeholders, including users, management, and IT staff.

Users’ Perspective

Users want a system that is powerful and user friendly to perform their daily operations. Users

benefit from the Web-enabled system and RFID integrated in streamlining their work through improved

organizational interoperability and connectivity. System and information can now be easily accessed

through the Internet even they are in the warehouse or roaming outside of the office. Traditional

information request through telephone conversation can therefore be speeded-up through direct

information access. In particular, tedious and error-prone manual exception handling can now be

streamlined and automated.

Management’s Perspective

The major concern of the management is the costs against the benefits of whole project. In

particular, if any of the improvements to the process as discussed in the previous sections can

significantly help improving their productivities, the costs can be justified. Efficiency is also a key factor

for automation. Otherwise, if the system just supports the storing of information, the business value is

minimal.

Company image is very import to customers. The new system helps external workers to perform

their job more smoothly, and they can get enough information when needed so that it can reduce the

workload of the internal staff for handling lots of enquiry. Also, they can reduce the response time to the

customers so as to enhance the customer service level. Using RFID, warehouse staff can perform their

job more smoothly. The programmed exception handling also helps capture organization knowledge and

to ensure quality and consistent handling of the exceptions. A good warehouse system plus good delivery

team can help the customer build up confident, especially when exception conditions are properly

handled.

IT Staff’s Perspective

Project managers often concern about system development cost and subsequent maintenance efforts.

These concerns can be addressed by systematic fine-grained requirements elicitation. Analysis is one of

the important issues in the study. Capturing requirements from domain specific knowledge and expertise

is ultimately important in designing detail business processes and asynchronous event-triggered rules for

exception handling and relation-ship management. Documentation is also important for maintenance and

16

Page 17: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

further enhancement the system. Any errors or bugs can refer to the system specification to handle. Any

enhancement can than based on the system specification to further develop.

ConclusionThe paper has presented a pragmatic case study on the enhancement of an existing in-house ERP

System by integrating with mobile and RFID technologies to overcome some key existing system

weaknesses. We show the key components that are needed for the deployment. Secondly, we have

analyzed requirements of different stakeholders. Thirdly, we have presented the system architecture

required integration, and the workflow for new RFID processes in logistics. Fourthly, we show how

systematic exception handling can be facilitated with the new system. Finally, we discussed the

advantages gained by different stakeholders.

As the company studied is a typical SME in the region requiring enhanced logistics support to

increase its competitiveness, such approach of extending and integrating existing systems in phases

enables them to adopt new technology in a affordable pace and manner. The high-price tag of individual

stock item is also characteristics of high value-added industries and trading operations in the region,

justifying the use of RFID technologies. So, we expect our experience is relevant and applicable to many

similar and related industries in the region.

Our future work is mainly on the detailed performance evaluation of the system in order to

determine how much the new system helps the business operations. We will also compare the service

response time to the existing practice. Also, the effect of the tuning parameters inside the ERP System

(such as the SQL Statement and Store Procedure) to search time and quality are also important to

investigate. Using questionnaires, we also evaluate the satisfaction of various stakeholders in comparison

with the existing services. Secondly, we consider the integration of an alert system (Chiu et al., 2009;

Meng et al., 2010) so that documents and notifications can be routed automatically with deadline

enforced.

References

Angeles, R. (2005). RFID technologies: supply-chain applications and implementation issues. Information Systems Management, 22(1), 51-65. Attaran, M. (2007). RFID: an enabler of supply chain operations. Supply Chain Management: An International Journal, 12(4), 249-257. Bendavid, Y., Lefebvre, E., Lefebvre, L. A., & Wamba, S. F. (2007). B-to-B E-commerce: assessing the impacts of RFID technology in a five layer supply chain. Proceedings of the 40th Annual Hawaii International Conference on System Sciences, 143c-143c. Chang, S. I., & Yen, D. C. (2008). An empirical study of factors affecting RFID’s adoption in Taiwan. Journal of Global Information Management, 16(2), 58-80. Chiu, D. K. W., Cheung, S., Leung, H., Hung, P. C. K., Kafeza, E., Hu, H., . . . Zhuang, Y. (2010). Engineering e-Collaboration Services with a Multi-Agent System Approach. International Journal of Systems and Service-Oriented Engineering (IJSSOE), 1(1), 1-25.

17

Page 18: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

Chiu, D. K. W., Cheung, S. C., Kafeza, E., & Leung, H.-f. (2003). A three-tier view methodology for adapting M-services. IEEE TSMC, Part A, 33(6), 725-741. Chiu, D. K. W., Cheung, S. C., Till, S., Narupiyakul, L., & Hung, P. C. K. (2010). Enhancing E-Service Collaboration with Enforcement and Relationship Management: A Methodology from Requirements to Event Driven Realization. International Journal of Organizational and Collective Intelligence (IJOCI), 1(1), 15-43. Chiu, D. K. W., Karlapalem, K., Li, Q., & Kafeza, E. (2002). Workflow view based e-contracts in a cross-organizational e-services environment. Distributed and Parallel Databases, 12(2), 193-216. Chiu, D. K. W., Kwok, B. W. C., Wong, R. L. S., Kafeza, M., Cheung, S., Kafeza, E., & Hung, P. C. K. (2009). Alerts in Healthcare Applications: Process and Data Integration. International Journal of Healthcare Information Systems and Informatics (IJHISI), 4(2), 36-56. Chow, H. K. H., Choy, K. L., Lee, W., & Chan, F. T. S. (2007). Integration of web-based and RFID technology in visualizing logistics operations–a case study. Supply Chain Management: An International Journal, 12(3), 221-234. Cochran, P. L., Tatikonda, M. V., & Magid, J. M. (2007). Radio frequency identification and the ethics of privacy. Organizational Dynamics, 36(2), 217. Dahanayake, A., & Gerhardt, W. (2003). Web-enabled systems integration: practices and challenges: Idea Group Publishers.Gunasekaran, A., Ngai, E., & McGaughey, R. (2006). Information technology and systems justification: A review for research and applications. European Journal of Operational Research, 173(3), 957-983. Hassan, T., & Chatterjee, S. (2006). A Taxonomy for RFID. Proceedings of the 39th Annual Hawaii International Conference on System Sciences 184b-184b. Holmqvist, M., & Stefansson, G. (2006). Smart Goods and Mobile RFID: A Case with Innovation from Volvo. Journal of Business Logistics, 27(2), 251-272. Küpper, A. (2005). Location-based services: Wiley Online Library.Kim, C., Yang, K. H., & Kim, J. (2008). A strategy for third-party logistics systems: A case analysis using the blue ocean strategy. Omega, 36(4), 522-534. Kim, D. S., Shin, T. H., & Park, J. S. (2007). A security framework in RFID multi-domain system. Proceedings of the Second International Conference on Availability, Reliability and Security 1227-1234. Lefebvre, L. A., Lefebvre, É., Bendavid, Y., Wamba, S. F., & Boeck, H. (2005). The potential of RFID in warehousing activities in a retail industry supply chain. Journal on Chain and Network Science, 5(2), 101-110. Li, W., & Peng, L. (2005). Upgrade ERP from C/S to B/S based on Web service. Proceedings of the International Conference on Services Systems and Services Management, 1, 593-597. Meng, S., Chiu, D. K. W., Kafeza, E., Wenyin, L., & Li, Q. (2010). Automated management of assets based on RFID triggered alarm messages. Information Systems Frontiers, 1-16. Ngai, E., Cheng, T., Au, S., & Lai, K. (2007). Mobile commerce integrated with RFID technology in a container depot. Decision Support Systems, 43(1), 62-76. Niederman, F., Mathieu, R. G., Morley, R., & Kwon, I. W. (2007). Examining RFID applications in supply chain management. Communications of the ACM, 50(7), 92-101. Poirier, C. C., & McCollum, D. (2006). RFID strategic implementation and ROI: A practical roadmap to success: J. Ross Publishing.Rosenberg, B., & Garfinkel, S. (2005). RFID: applications, security, and privacy: Addison-Wesley.Roussos, G. (2006). Enabling RFID in retail. Computer, 39(3), 25-30. Shimonski, R. (2003). Building DMZs for enterprise networks: Syngress.Sparkes, M. (2006). Gambling on chips [radiofrequency identification chips-security]. Manufacturing Engineer, 85, 10. Viehland, D., & Wong, A. (2007). The Future of Radio Frequency Identification. Journal of Theoretical and Applied Electronic Commerce Research, 2(2), 74-81. Wang, W. J., Yuan, Y., & Wang, X. (2006). RFID implementation issues in china: Shanghai port case study. Journal of Internet commerce, 5(4), 89-103. Zou, Y., Zhang, Q., & Zhao, X. (2007). Improving the usability of e-commerce applications using business processes. IEEE Transactions on Software Engineering, 837-855.

18

Page 19: Abstract - Hong Kong Baptist Universitycomp7880/rfid.docx  · Web view5 Department of Information Engineering, ... Various contemporary ... a DMZ is used for connecting servers that

19