|
Preface |
7 |
|
|
Acknowledgements |
9 |
|
|
Contents |
11 |
|
|
Contributors |
13 |
|
|
1 Ubiquitous Computing for Electronic Business |
15 |
|
|
1.1 Ubiquitous Computing and Networked Business |
15 |
|
|
1.2 Ubiquitous Commerce Technologies |
17 |
|
|
1.3 Ubiquitous Commerce Case Studies |
21 |
|
|
1.4 Ubiquitous Commerce and Business Innovation |
23 |
|
|
1.5 Ubiquitous Commerce and Society |
24 |
|
|
1.6 New Frontiers for Electronic Business |
25 |
|
|
References |
25 |
|
|
Part I Technology |
28 |
|
|
2 Supply Chain Management Standards in Ubiquitous Commerce |
29 |
|
|
2.1 Introduction |
29 |
|
|
2.2 Unique Identifiers in Supply Chain Management |
30 |
|
|
2.3 The EAN.UCC System |
35 |
|
|
2.4 The Role of Standardization for Ubiquitous Commerce |
43 |
|
|
2.5 Summary |
44 |
|
|
References |
44 |
|
|
3 Optimizing Business Processes by Automatic Data Acquisition: RFID Technology and Beyond |
47 |
|
|
3.1 Introduction |
47 |
|
|
3.2 Enterprise Software for Supply Chain Management |
49 |
|
|
3.3 Auto-ID System Requirements |
52 |
|
|
3.4 System Overview |
53 |
|
|
3.5 Case Studies |
57 |
|
|
3.6 Open Issues |
62 |
|
|
3.7 Summary |
64 |
|
|
References |
64 |
|
|
4 RFID in Movable Asset Management |
67 |
|
|
4.1 Introduction |
67 |
|
|
4.2 RFID-Enhanced Asset Management |
68 |
|
|
4.3 Case Studies on Smart Asset Management Solutions |
71 |
|
|
4.4 Critical Success Factors for RFID Adoption |
78 |
|
|
4.5 Recommendations for a Pathway to RFID Adoption |
81 |
|
|
4.6 Conclusions |
83 |
|
|
References |
84 |
|
|
Part II Business |
87 |
|
|
5 Ubiquitous Services: Extending Customer Relationship Management |
89 |
|
|
5.1 Ubiquitous Devices as a Service Channel |
89 |
|
|
5.2 Ubiquitous Devices as Sensors |
90 |
|
|
5.3 Ubiquitous Devices as Effectors |
91 |
|
|
5.4 Web Services as a Common Language |
92 |
|
|
5.5 Re-thinking Business Functions |
93 |
|
|
5.6 Re-thinking Business Location |
94 |
|
|
5.7 Smart Appliances and Intelligent Agents |
96 |
|
|
5.8 Microservices on Tap |
100 |
|
|
5.9 Camera Phones — the New Element of Ubiquitous Services Infrastructure |
102 |
|
|
5.10 Conclusions |
104 |
|
|
References |
105 |
|
|
6 The Business Value of Ubiquitous Computing Technologies |
107 |
|
|
6.1 Introduction |
107 |
|
|
6.2 Ubiquitous Computing: Integration of the Real and the Virtual Worlds |
108 |
|
|
6.3 Identifying Value-Creating Ubiquitous Computing Applications |
113 |
|
|
6.4 Overcoming the Challenges: RFID in the Retail Industry |
118 |
|
|
6.5 Conclusions |
123 |
|
|
References |
125 |
|
|
7 Ubiquitous Computing, Customer Tracking, and Price Discrimination |
129 |
|
|
7.1 Introduction |
129 |
|
|
7.2 Ubiquitous Computing and Commerce |
131 |
|
|
7.3 Tracking and Price Discrimination |
133 |
|
|
7.4 Interactive Marketing and Optimal Profit |
134 |
|
|
7.5 Implications |
143 |
|
|
References |
144 |
|
|
8 The Design of Pervasive Retail Experiences |
147 |
|
|
8.1 Consumerism and Technological Change |
147 |
|
|
8.2 Creating Consumer Value |
148 |
|
|
8.3 The New Consumer |
150 |
|
|
8.4 Revisiting the Retail Experience |
151 |
|
|
8.5 Pervasive Retail Application Scenarios |
152 |
|
|
8.6 A Case Study in Pervasive Retail |
154 |
|
|
8.7 Discussion and Conclusions |
164 |
|
|
References |
166 |
|
|
Part III Society |
169 |
|
|
9 Legal Challenges to Ubiquitous Commerce |
171 |
|
|
9.1 Introduction |
171 |
|
|
9.2 Ubiquitous Commerce Technologies |
172 |
|
|
9.3 Legal Challenges |
173 |
|
|
9.4 Application Scenarios |
176 |
|
|
9.5 Conclusions |
178 |
|
|
References |
179 |
|
|
10 Thoughts on Retail System Design to Support Polimorphic Actions Among Clerks: That’ll Be $ 20 — But if You Buy Two, I’ll Knock off 10% |
181 |
|
|
10.1 Opening |
181 |
|
|
10.2 Back Stories |
182 |
|
|
10.3 Agency |
185 |
|
|
10.4 Technology Examples |
187 |
|
|
10.5 Summary |
189 |
|
|
References |
189 |
|
|
11 Privacy Protection and RFID |
191 |
|
|
11.1 The RFID Prox Card |
191 |
|
|
11.2 RFID: Promise and Threat |
193 |
|
|
11.3 But What Is RFID, Really? |
195 |
|
|
11.4 The 21st Century Bar Code? |
197 |
|
|
11.5 Privacy Issues |
199 |
|
|
11.6 Conclusion |
202 |
|
|
References |
202 |
|
|
A The Code of Fair Information Practices |
203 |
|
|
B The ISTAG Maria Scenario |
205 |
|
|
Index |
207 |
|