The digitization of health care retailing

2017 ◽  
Vol 11 (4) ◽  
pp. 432-446 ◽  
Author(s):  
Mark Scott Rosenbaum ◽  
Germán Contreras Ramírez ◽  
Karen Edwards ◽  
Jiyeon Kim ◽  
Jeffery M. Campbell ◽  
...  

Purpose This paper aims to offer insights into the impact of digitization technology on consumer goods manufacturers and retail organizations. The authors propose that the “next phase” of digitization will entail the employment of digitization technology to offer consumers personalized product offerings and recommendations based on their internal biomarkers. Design/methodology/approach The authors draw on past investigations into digitization and their retailing experience to speculate on how the next phase of digitization will affect both consumer goods manufacturers and retailers. Findings The next phase of digitization will entail the use of nutrigenomics (DNA sequencing), exhaled breath analysis, fitness tracker devices, sensory patches, radio frequency identification tags and quantum ID tags to create customized and recommend products, and support product-to-customer communication regarding authenticity. Research limitations/implications Consumers will increasingly rely on technology to inform them of their bodily needs and to receive personalized solutions to help satisfy those needs. Consumer behavior theories must be reconsidered because consumers will become more passive participants in retail consumption as they rely on technology for need-recognition and product-fulfillment. Social implications Digitization technologies that use consumers’ biomarkers for new product creation or product recommendation raise new risks and uncertainty. For example, the legal implications of an incorrect product recommendation based on customer biomarkers are unknown. Furthermore, retailers would need to maintain data privacy of biomarker data and be responsible for data breaches. Originality/value The research explores how digitization will affect consumers’ in-store experiences with consumer goods products.

Facilities ◽  
2020 ◽  
Vol 38 (9/10) ◽  
pp. 739-760 ◽  
Author(s):  
Charlotte Dixon ◽  
David John Edwards ◽  
Monica Mateo-Garcia ◽  
Joseph Lai ◽  
Wellington Didibhuku Didibhuku Thwala ◽  
...  

Purpose This study aims to investigate the behaviour of building users and how this impacts upon building energy performance. Specifically, the work examines the behavioural traits of able-bodied users of a large higher education building who erroneously access and egress the building using doorways intended for disabled users. Design/methodology/approach An inductive methodological approach is adopted that uses grounded theory to devise new insights into building users’ access and egress habits. Structured interviews are conducted to collect primary data from 68 building users of a large educational building over a four-week period. Responses to questions posed provide the basis for a tabularisation of behavioural traits. Findings Reasons for able-bodied building users’ preferences to using disabled access are identified and discussed; these are thematically grouped under the headings of apathy, convenience, emergency, ergonomics, ignorance and phobia. Building upon these findings, the research then offers insights into the approaches that could be adopted to change the erroneous behaviours. These approaches include education of building users on the impact their behaviour has upon building performance and environmental pollution, more stringent regulation to penalise repeat offenders and changes to building entrance design using obtrusive (i.e. radio frequency identification tags) and unobstrusive control measures (i.e. a second entrance doorway or slower opening mechanism). Originality/value To the best of the author’s knowledge, this study is the first of its kind to investigate the rationale for able-bodied building users erroneously using disabled persons’ access and egress doorways within a building, which as a consequence, inadvertently reduces the building’s environmental performance.


Sensor Review ◽  
2017 ◽  
Vol 37 (3) ◽  
pp. 338-345 ◽  
Author(s):  
Yawei Xu ◽  
Lihong Dong ◽  
Haidou Wang ◽  
Jiannong Jing ◽  
Yongxiang Lu

Purpose Radio frequency identification tags for passive sensing have attracted wide attention in the area of Internet of Things (IoT). Among them, some tags can sense the property change of objects without an integrated sensor, which is a new trend of passive sensing based on tag. The purpose of this paper is to review recent research on passive self-sensing tags (PSSTs). Design/methodology/approach The PSSTs reported in the past decade are classified in terms of sensing mode, composition and the ways of power supply. This paper presents operation principles of PSSTs and analyzes the characteristics of them. Moreover, the paper focuses on summarizing the latest sensing parameters of PSSTs and their matching equipment. Finally, some potential applications and challenges faced by this emerging technique are discussed. Findings PSST is suitable for long-term and large-scale monitoring compared to conventional sensors because it gets rid of the limitation of battery and has relatively low cost. Also, the static information of objects stored in different PSSTs can be identified by a single reader without touch. Originality/value This paper provides a detailed and timely review of the rapidly growing research in PSST.


2016 ◽  
Vol 29 (2) ◽  
pp. 236-247 ◽  
Author(s):  
Kaori Kusuda ◽  
Kazuhiko Yamashita ◽  
Akiko Ohnishi ◽  
Kiyohito Tanaka ◽  
Masaru Komino ◽  
...  

Purpose – To prevent malpractices, medical staff has adopted inventory time-outs and/or checklists. Accurate inventory and maintenance of surgical instruments decreases the risk of operating room miscounting and malfunction. In our previous study, an individual management of surgical instruments was accomplished using Radio Frequency Identification (RFID) tags. The purpose of this paper is to evaluate a new management method of RFID-tagged instruments. Design/methodology/approach – The management system of RFID-tagged surgical instruments was used for 27 months in clinical areas. In total, 13 study participants assembled surgical trays in the central sterile supply department. Findings – While using the management system, trays were assembled 94 times. During this period, no assembly errors occurred. An instrument malfunction had occurred after the 19th, 56th, and 73th uses, no malfunction caused by the RFID tags, and usage history had been recorded. Additionally, the time it took to assemble surgical trays was recorded, and the long-term usability of the management system was evaluated. Originality/value – The system could record the number of uses and the defective history of each surgical instrument. In addition, the history of the frequency of instruments being transferred from one tray to another was recorded. The results suggest that our system can be used to manage instruments safely. Additionally, the management system was acquired of the learning effect and the usability on daily maintenance. This finding suggests that the management system examined here ensures surgical instrument and tray assembly quality.


2019 ◽  
Vol 31 (3) ◽  
pp. 441-457 ◽  
Author(s):  
Pamela J. Zelbst ◽  
Kenneth W. Green ◽  
Victor E. Sower ◽  
Philip L. Bond

Purpose The purpose of this paper is to assess the combined impact of radio frequency identification (RFID), Industrial Internet of Things (IIoT) and Blockchain technologies on supply chain transparency (SCT). Design/methodology/approach Data from 211 US manufacturing managers is analyzed using a covariance-based structural equation modeling methodology. Findings The structural model fits the data relatively well. RFID technology directly and positively impact both IIoT and Blockchain technologies which, in turn, directly and positively impact SCT. RFID technology indirectly affects SCT through both IIoT technology and Blockchain technology. Research limitations/implications This study is the first to empirically assess the impact of RFID, IIoT and Blockchain technologies on SCT. First-wave empirical studies must be replicated to support generalization of the findings. Practical implications This study provides empirical evidence to support the implementation of a combination of RFID, IIoT and Blockchain technologies as infrastructure necessary to achieve end-to-end SCT. Originality/value New measurement scales for IIoT technology utilization and Blockchain technology utilization are developed and assessed for validity and reliability. This is the first study to assess the combined impact of RFID, IIoT and Blockchain technologies on SCT.


Author(s):  
Aisha Aseeri ◽  
Omaimah Bamasag

Purpose In the past few years, HB-like protocols have gained much attention in the field of lightweight authentication protocols due to their efficient functioning and large potential applications in low-cost radio frequency identification tags, which are on the other side spreading so fast. However, most published HB protocols are vulnerable to man-in-the-middle attacks such as GRS or OOV attacks. The purpose of this research is to investigate security issues pertaining to HB-like protocols with an aim of improving their security and efficiency. Design/methodology/approach In this paper, a new and secure variant of HB family protocols named HB-MP* is proposed and designed, using the techniques of random rotation. The security of the proposed protocol is proven using formal proofs. Also, a prototype of the protocol is implemented to check its applicability, test the security in implementation and to compare its performance with the most related protocol. Findings The HB-MP* protocol is found secure against passive and active adversaries and is implementable within the tight resource constraints of today’s EPC-type RFID tags. Accordingly, the HB-MP* protocol provides higher security than previous HB-like protocols without sacrificing performance. Originality/value This paper proposes a new HB variant called HB-MP* that tries to be immune against the pre-mentioned attacks and at the same time keeping the simple structure. It will use only lightweight operations to randomize the rotation of the secret.


2018 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Omneya Kandil ◽  
Rasha Abd El Aziz

Purpose There is a great deal of concern among the Egyptian economy that small- and medium-sized enterprises’ (SMEs’) potentials are not fully used although they dominate it and contribute to its success. The question is what challenges are preventing those SMEs from performing efficiently. This research aims to focus on examining the issues regarding the supply chain of Egyptian SMEs, exploring the areas that need improvement and assessing the impact of technology in enhancing their performance and whether they afford applying it. Design/methodology/approach In this research, semi-structured interviews were conducted at 14 Egyptian SMEs. Then, the business process at six of the fourteen SMEs was observed. After that, a representative sampling was applied and a company was chosen as a representative case company. Moreover, the selected company’s documents were analyzed to capture the full image of the current supply chain performance in Egyptian SMEs. Finally, the Six Sigma DMAIC approach was used to assess the effectiveness of the current supply chain and identify the problems faced and how to deal with these deficiencies. Findings The current process of the supply chain was analyzed and the result shows the obstacles and constrains facing SMEs in Egypt. Despite the clear benefits of radio frequency identification (RFID) technology, Egyptian SMEs still do not use it to solve their problems due to its high cost and their low budgets. However, the investigation concludes that SMEs in particular can benefit from the RFID technology and will be able to pay back the cost of the system applied after a certain period of time that is measured by calculating the breakeven point of having the RFID system against the current situation. As a result, improvements were realized and recommended for the organization. Originality/value This research develops a model that suits SMEs in the Egyptian market. The use of a case study approach with a quality measurement tool, namely, the Six Sigma DMAIC approach, especially after surveying several SMEs, and observing the business process at some of them, makes this a thorough investigation which proves that even SMEs can use the RFID technology despite its high cost that hinders its utilization. Thus, this research helps decision-makers in Egyptian SMEs make better informed decisions and guides them to when will they be able to pay back the cost of the system applied.


Author(s):  
Marcel Papert ◽  
Patrick Rimpler ◽  
Alexander Pflaum

Purpose This work analyzes a pharmaceutical supply chain (PSC) in terms of supply chain visibility (SCV). The current good distribution practice (GDP) guideline demands increased visibility from firms. The purpose of this paper is to propose a solution for SCV enhancements based on automatic identification (Auto-ID) technologies. Design/methodology/approach The authors qualitatively analyze data from ten case studies of actors in a PSC. A review of Auto-ID technologies supports the derivation of solutions to enhance SCV. Findings This work shows that the functionalities of Auto-ID technologies offered by current practical monitoring solutions and challenges created by the GDP guideline necessitate further SCV enhancements. To enhance SCV, the authors propose three solutions: securPharm with passive radio frequency identification tags, transport containers with sensor nodes, and an SCV dashboard. Research limitations/implications This study is limited to a PSC in Germany and is therefore not intended to be exhaustive. Thus, the results serve as a foundation for further analyses. Practical implications This study provides an overview of the functionality of Auto-ID technologies. In juxtaposition with the influence of the GDP guideline, the use of our Auto-ID-based solutions can help to enhance SCV. Originality/value This work analyzes a PSC in Germany, with consideration given to the influence of current legislation. Based on a multiple-case-study design, the authors derive three Auto-ID-based solutions for enhancing SCV.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Florian Kellner

PurposeDue to the growing percentage share of urban dwellers, the physical distribution of products faces altering conditions. This research explores the effects that urbanization has on the performance of a fast-moving consumer goods distribution network. A focus is set on changes in distribution cost, the cost-minimal network design, and greenhouse gas emissions.Design/methodology/approachThe analyses are based on a quantitative distribution network model of an existing manufacturer of consumer goods.FindingsThe results indicate that the foreseen population shift will affect the network's economic and environmental performance. Effects are, among others, due to differences in the efficiency of supplying urban and nonurban regions. The combined effects of urbanization and the development of the population size will even more affect the network's performance.Originality/valueResearch dealing with distribution logistics and urbanization primarily focuses on city logistics. In this paper, the object of analysis is the entire distribution system.


2013 ◽  
Vol 114 (3/4) ◽  
pp. 132-141 ◽  
Author(s):  
Judith Mavodza

PurposeThe purpose of this paper is to discuss issues involved in navigating the modern information environment where the relevance of cloud computing is unavoidable. This is a way of shifting from the hardware and software demands of storing and organizing data, to information access concerns. That is because with the exponential growth in information sources and all accompanying complexities, the limited capacity of libraries to host their own in its entirety necessitates opting for alternatives in the cloud.Design/methodology/approachA review of current literature about the topic was performedFindingsLiterature used reveals that currently, libraries are using the cloud for putting together user resources, i.e. using Software as a Service (SaaS), such as in library catalogues, WorldCat, Googledocs, and the aggregated subject gateways like SUMMON, and others; the web Platform as a Service (PaaS) as in the use of GoogleApp Engine; or Infrastructure as a Service (IaaS) as in the use of D‐Space, FEDORA, and others. The cloud is confirmed as a facilitator in storing and accessing information in addition to providing a unified web presence with reduced local storage capacity challenges.Originality/valueThe value of these findings is to remind librarians of the shift in focus towards which devices provide the easiest access to data and applications. This is one of the reasons they in many instances are currently having to address issues relating to the use of electronic media tools such as smartphones, iPad, e‐book readers, and other handheld devices. The largely borderless information resources also bring to the forefront considerations about digital rights management, fair use, information security, ownership and control of data, privacy, scholarly publishing, copyright guidance, and licensing that the librarian has to be knowledgeable about. It has become necessary for librarians who make use of commercial cloud services to be conversant with the implications on institutional data. To avert the ever present dangers and risks involving cyber‐security, it is usually practical for institutions to keep policies, procedures, fiscal, and personnel data in private clouds that have carefully crafted access permissions. Being aware of these implications enables thoughtful, adaptive planning strategies for the future of library practice and service.


2017 ◽  
Vol 25 (2) ◽  
pp. 217-232
Author(s):  
Eunji Seo ◽  
Katsuyoshi Takashima

Purpose The purpose of this study is to investigate the negative impact of horizontal conflict on vertical conflict in a triadic configuration, which is based on the supposition that buyers who experience horizontal conflict due to competition with other buyers are motivated to limit vertical conflict to better cooperate with store staff. Design/methodology/approach This study tests the hypotheses with an AMOS-based structure equation model based on survey data of 236 merchandise managers at Japanese retailers. Findings The study’s findings demonstrate that process conflict concerning resource and role allocation, negatively affects the task conflict and relationship conflict involved in vertical interactions. The results suggest that conflict between buyers is an accelerative mechanism affecting the construction of cooperative relationships between buyers and store staff. Originality/value Previous studies have discussed the possibility of positive effects arising from process conflict. In this study, the authors found that horizontal process conflict tolerates vertical conflict statistically and identified a new positive effect of process conflict.


Sign in / Sign up

Export Citation Format

Share Document