Identification technologies evaluation method: an application in cattle chain
Keywords:Evaluation method, Identification technologies, Information Technology, RFID
The objective of this paper is to apply an identification technologies evaluation method in cattle chain in a sample in Brazil and in USA. These technologies are information and communication technologies, such as Radio Frequency Identification and barcode. The research methodology used was a qualitative study, with an extensive literature review on information technology, information systems, and Radiofrequency evaluation methods. A scale was created to decide what decision the case study has to take according to its technology. The method proposed can contribute to the theory of information technology evaluation and can offer practitioners an efficient and effective way to evaluate prospective information technology implementations. The rankings showed that American respondents evaluate RFID with a better performance in security variables. Brazilian agents evaluate Radiofrequency with a better performance in technical and organizational variable. The scale revealed that the Americans have more agents in Group B (8), which means reevaluation of the identification method, and just one in Group A, meaning that it has to change its information technology. Brazilian agents have more cases in Group B (6), than group C (3), and Group A (1). This means that the majority of the sample has to reevaluate their method to trace cattle.
How to Cite
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors must have a written permission from any third-party materials used in the article, such as figures and graphics. The permission must explicitly allow authors to use the materials. The permission should be submitted with the article, as a supplementary file.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after BJO&PM publishes it (See The Effect of Open Access).