[american institute of aeronautics and astronautics 7th aiaa atio conf, 2nd ceiat int'l conf on...

10
7 th AIAA Aviation Technology, Integration and Operations (ATIO) Conference Barriers to integrating RFID baggage security into network operations Dr. Akemi Takeoka Chatfield University of Wollongong Faculty of Informatics School of Information Systems and Technology Telephone: 61 2 4221 3884 Facsimile: 61 2 4221 4045 [email protected] 1. Introduction The International Air Transport Association (IATA) introduced a global standard for radio frequency identification (RFID) baggage tags in 2005. With an average 1 per cent of the 1.7 billion passenger checked-in baggage that were mishandled, IATA estimates that, if its RFID standard is adopted on a global scale, the annual industry savings would be US$760 million. The key drivers are operational efficiency gains: reducing costs of airline business operations and improving service quality. As such, the RFID baggage initiative has not explicitly focused on how the RFID baggage tags can be used to provide security information to a wide array of industry stakeholders (airlines, airports, passengers and government agencies). Despite the individual RFID trials and implementations by airlines and airports (IATA, 2007), network-level initiatives and real-time integrated operations are still few in number and the overall industry adoption and proactive use of RFID for security remains low. The urgent need for research exists to investigate a network-level problem of integrating RFID-enabled baggage security into operations for collaborative advantage. In this paper, we have focused on a network (of airlines/airports) as the unit of analysis vis-à-vis an individual organization. The aim of this research in progress paper is to identify key barriers to integrating RFID-enabled baggage security into operations. Our research strategy applied Dyer’s seminal work (2000) on collaborative advantage through extended enterprise supplier networks. While his work focused on the global automobile manufacturing industry, the framework derived from the automobile industry is very relevant and readily applicable to the air transport industry. The structure of this paper is 7th AIAA Aviation Technology, Integration and Operations Conference (ATIO)<BR>2nd Centre of E 18 - 20 September 2007, Belfast, Northern Ireland AIAA 2007-7770 Copyright © 2007 by University of Wollongong. Published by the American Institute of Aeronautics and Astronautics, Inc., with permission.

Upload: akemi

Post on 14-Dec-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

7th AIAA Aviation Technology, Integration and Operations (ATIO)Conference

Barriers to integrating RFID baggage security into network operations

Dr. Akemi Takeoka ChatfieldUniversity of Wollongong

Faculty of InformaticsSchool of Information Systems and Technology

Telephone: 61 2 4221 3884Facsimile: 61 2 4221 4045

[email protected]

1. Introduction

The International Air Transport Association (IATA) introduced a global standard for radio

frequency identification (RFID) baggage tags in 2005. With an average 1 per cent of the

1.7 billion passenger checked-in baggage that were mishandled, IATA estimates that, if its

RFID standard is adopted on a global scale, the annual industry savings would be US$760

million. The key drivers are operational efficiency gains: reducing costs of airline

business operations and improving service quality. As such, the RFID baggage initiative

has not explicitly focused on how the RFID baggage tags can be used to provide security

information to a wide array of industry stakeholders (airlines, airports, passengers and

government agencies). Despite the individual RFID trials and implementations by airlines

and airports (IATA, 2007), network-level initiatives and real-time integrated operations

are still few in number and the overall industry adoption and proactive use of RFID for

security remains low. The urgent need for research exists to investigate a network-level

problem of integrating RFID-enabled baggage security into operations for collaborative

advantage. In this paper, we have focused on a network (of airlines/airports) as the unit of

analysis vis-à-vis an individual organization. The aim of this research in progress paper is

to identify key barriers to integrating RFID-enabled baggage security into operations. Our

research strategy applied Dyer’s seminal work (2000) on collaborative advantage through

extended enterprise supplier networks. While his work focused on the global automobile

manufacturing industry, the framework derived from the automobile industry is very

relevant and readily applicable to the air transport industry. The structure of this paper is

7th AIAA Aviation Technology, Integration and Operations Conference (ATIO)<BR> 2nd Centre of E18 - 20 September 2007, Belfast, Northern Ireland

AIAA 2007-7770

Copyright © 2007 by University of Wollongong. Published by the American Institute of Aeronautics and Astronautics, Inc., with permission.

2

as follows: literature review on IT productivity, IOS strategic payoffs, RFID, and network

externalities (section 2), network-level adoption and implementation problem (section 3),

collaborative advantage through extended enterprise supplier networks (section 4), key

barriers to integrating RFID baggage security into network operations (section 5) and

conclusion (section 6).

2. Literature Review

The integration of RFID-enabled baggage security into network-level operations involves

many issues. In this section, we review the critical importance of improved management

practices for IT productivity, key research issues and questions on RFID, and the concept

of network externalities to create network-wide collaborative advantage.

2.1. IT Investments

Prior academic research on IT investment and IT productivity presented strong evidence

for the critical importance of improved management practices to increase IT productivity,

not further IT investment (Dorgan and Dowdy, 2004). More specifically, a cross-case

analysis study of three organizations that initiated sophisticated inter-organizational EDI

networks demonstrated evidence of different levels of strategic payoffs from their IT

investments (Chatfield and Yetton, 2000). Applying sociological theories of

embeddedness, we showed that EDI embeddedness acts as a moderator on the relationship

between the adoption of EDI network and the realization of strategic payoffs. EDI

embeddedness is defined as how central or peripheral a specific EDI network is to

managing inter-firm interdependence. In summary, prior IT research suggests that RFID

investment by itself will unlikely generate IT productivity gains and strategic payoffs.

2.2. RFID Issues

In addition to the IT research literature in general, a review of the RFID literature

identified key issues and research questions on the adoption, usage, and impact of RFID

(Curtin et al., 2007). Table 1 below lists these key issues and questions. They

underscored that the managerial and organizational issues would emerge as critical areas

in RFID research. While all these issues listed in Table 1 are important to the air transport

3

industry, the global network centric nature of the industry suggests the top priority need

for those questions that are salient to the network level adoption, usage and impact of

RFID, particularly the issue of aligning inter-organizational governance, incentives, and

ownership.

Table 1. RFID research issues and questions on the adoption, usage and impactThe role of process redesign when RFID is usedHow are business processes and work systems changed due to RFID at all points in the value chain?

To what extent should initiators encourage process redesign at their trading partner facilities?

Can business value be realized without RFID-focused process redesign? What strategies will yield value?How does RFID change the job descriptions and work roles? Are the impacts similar across industries?Will process design for outsourced business processes be affected by the capabilities that RFID offers?Technical integration with other applicationsHow difficult will RFID be to integrate with other applications? What capabilities in the firm will mitigatethe impacts?What are the technical challenges of achieving application integration? Internally and externally? The costs?How does application integration at the trading partner’s organization impact usage? Are the impacts large?What real options are created with increasing application integration? Is business value enhanced?Will technical integration be differentially costly depending on the industry setting of the application?Costs and risks associated with becoming dependent on RFIDHow costly are errors in an RFID-based work system? How will the errors drive costs in RFID-based IOS?What roles do redundancy, back-up, exception processing, and human intervention play?What analysis approach is appropriate for optimizing RFID costs?Will the possibility of RFID dependency diminish investment levels? Will there be “underinvestment”?Will the hidden costs of information exploitation affect the real cost of RFID?Taking advantage of voluminous data collectionHow can managers leverage the data flood organizations will experience with RFID?Will new performance measurement approaches be required to realize value from RFID?How can this data effectively be mined to create business intelligence and promote CRM?Will new data processing intermediaries arise to help organization manage this flood of data?What new data mining techniques will make the data usable?Will different industry settings offer unique opportunities for leveraging voluminous data collection?Will RFID add value for information sharing in outsourced business processes, such as logistics and supply?Facilitating decision making capabilities in real-timeHow can the firm make efficient use of real-time item/operator entity RFID tag placement?How will real-time entity location management add value to business processes?How can organization make use of real-time systems-based decision-making? Industries?How will RFID and real-time decision making change managerial capabilities?Aligning inter-organizational governance, incentives, and ownershipWho does the tagging? Who owns the technology? Who owns the data? Who gets the value?What is the role of mandates and subsidies to entice trading partner adoption? Usage in a particular manner?What is the role of a major player promoting adoption? How might they motivate partner R&D?Who will pay for readers that benefit multiple parties? Who will drive the effort to build standards?How can incentives be put in place to avoid exploitative behaviour when RFID supports informationcollection?How contractible are joint RFID initiatives? How will the resulting business value be measured and split?Will RFID provide a basis for cross-organizational control in business process outsourcing?Source: adopted form Curtin et al., (2007, p. 99)

3.3. Network Externalities

4

The concept of network externalities has been examined in the literature on economics,

marketing and IT. Economists, Michael Katz and Carl Shapiro (1985, p. 424), defined

network externalities as “products for which the utility that a user derives from

consumption of the good increases with the number of other agents consuming the good.”

Prior IT research on network externalities has examined positive consumption externalities

(Riggins et al., 1994) as well as two-sided network externalities (Yoo et al., 2002). Two-

sided network externalities in the context of B2B electronic marketplace means that the

value of the e-marketplace to online buyers is dependent on the number of online

suppliers, and value to suppliers is dependent on the number of buyers and suppliers.

The international nature of most air transportation operations and business processes

(Montevalli and Stough, 2004) suggests the presence of network externalities in the

industry, suggesting the importance of interdependencies and cooperation across a

network of airlines and airport operators (Leone and Liu, 2005). It also suggests the

importance of evaluating the industry stakeholders’ ability to forge strategic partnerships

and to realize collaborative advantage from IT investments such as RFID (Chatfield and

Yetton, 2000). Prior studies (i.e., Leone and Liu, 2005) found that there are economies of

scale in standardization and cooperation in integrating security oversight requirements into

the interdependent air transportation operations and business processes. However, the

history of Transportation Security Administration (TSA) with heavy lobbying by airport

and airline groups to Congress and Bush administration officials (Weinstock, 2003 cited in

Leone and Liu, 2005) also suggests the presence of commercial and political conflict of

interest among the key stakeholders.

3. Network-Level Adoption and Implementation Problem

The adoption of RFID tags by the US Department of Defense and Wal-Mart highlights the

potential capability of RFID technologies in providing extended enterprise supplier

networks with improved asset visibility, safety and security. These emerging RFID

developments worldwide have some implications for the air transport industry in creating

new capability in aviation security, through RFID-enabled real-time baggage visibility,

baggage passenger reconciliation, and agile emergency response. However, the industry-

wide adoption and diffusion has been slow, despite the post-9/11 legal and policy

5

mandates in the US, Australia and other countries to screen baggage for explosives and the

falling price of RFID tags, high-level accurate read rate, and the IATA RFID standard.

Figure 1. RFID Adoption in the Air Transport Industry

Source: IATA (2007, p. 59)

Recently, RFID baggage systems were implemented to automate baggage handling

through real-time tracking and sorting at McCarran International Airport, Hong Kong

International Airport, and Narita International Airport. However, while airports and

airlines are involved in various stages of RFID proof of concept trials and implementations

(IATA, 2007), their primary focus is on technical feasibility. The first baggage trials in

1998 achieved a read rate of 97.3%, demonstrating the potential RFID benefits for

baggage sorting and reconciliation than the current lower level accuracy provided by

baggage handling based on bar code technologies. Table 2 lists these technical trials and

implementations. The scope of the trials and implementations, except the TSA’s global

interoperability initiative, is largely limited to a single airline/airport. Table 2 shows that

the absence of network-level trials and implementations, for example, by The Star

Alliance or by one of the 14 airport groups that participated in the Air Transport Research

Society (ATRS) Global Airport Benchmarking study (Oum, 2005).

6

Table 2. RFID trials and implementationsTrial/Implementation Technology Used Purpose Status

Las Vegas McCarrenAirport

UHF RFID Security Ongoing implementation

ASTREC UHF RFID Proof of concept Ongoing

Auto_ID Centre @ HKG UHF RFID Proof of concept Completed

TSA UHF RFID Global interoperability Completed

Hong Kong International UHF RFID Baggage sorting andreconciliation

Implemented, nowadopting IATA RP

KLM/AF UHF RFID Baggage sorting Implementing

SFO UHF RFID Baggage security Ongoing

Asiana Airlines UHF RFID Tracking Completed

Delta Airlines UHF RFID read only Proof of concept Completed

British Airways HF RFID Proof of concept Completed

SIA, SIN, FRA, AUK HF RFID Baggage sorting Closed

Heathrow Airportbaggage collection

HF RFID Baggage collection anddelivery services

Implemented

ASTREC HF RFID Baggage collection andsecurity

Implemented

Seattle Airport Sea TacTerminal

Microwave RFID Tracking Closed

Source: Adopted from IATA (2007, p. 15)

The dominant RFID implementation problem facing the industry is not

technological (Curtin et al., 2007) but rather the dynamic interplay among technological,

organizational and political factors as extant barriers to the adoption and diffusion of RFID

technologies in the aviation industry. Given the literature on IT in general and RFID in

specific, the technical focus and the absence of network-level trials and implementations

are significant. As the aviation industry is operating in a global network environment, we

direct our focus on the implementation problem across a network of different airlines and

airports. Hence, the unit of analysis should not be a single organization but a network of

organizations operating in the air transport industry. In other words, while technological

challenges may be faced by individual airlines or airports with regard to adopting and

integrating new information technologies such as RFID into their operations, we do not

address these problems. In this paper, we address this network-level RFID

implementation issue by identifying key perceived barriers to integrating RFID baggage

security into operations. In this paper, we draw on extant literature on collaborative

advantage to address this urgent RFID implementation problem. An insight provided in

this paper on the key barriers to the network-level adoption of RFID is beneficial both to

7

the industry managers and academic researchers in RFID and aviation technologies. This

paper outlines a step towards developing a conceptual framework for gaining collaborative

advantage in aviation security through RFID technologies.

4. Extended Enterprise Supplier Networks for Collaborative Advantage

This research draws on prior theoretical and empirical work by Dyer (2000) on the

importance of extended enterprise supplier networks for gaining collaborative advantage.

Dyer conducted detailed case studies of the automotive industry firms across the globe.

He found strong evidence in these firms that the fundamental unit of competition has

changed from the individual enterprise to the extended enterprise supplier networks. In

other words, the fundamental paradigm has shifted from competitive advantage to

collaborative advantage. Toyota and, to a lesser extent, Chrysler realized the shift and

developed new capabilities to forge strategic partnerships with their extended enterprise

supplier networks for technology diffusion and information sharing. The two firms

successfully realized collaborative advantage through information technology enabled

Toyota Production System (TPS). They gained performance and operational efficiency

gains. On the other hand, Ford and GM failed to realize the paradigm shift and fell much

behind Toyota and Chrysler in terms of a number of performance measurements.

Key characteristics of these extended enterprise supplier networks include:

o The extended enterprise as a new unit of competition and competitive advantage

o The four core capabilities of a lean extended enterprise:

• The capability to design the new boundaries of the firm (or the “governance profile”

of the production network);

• The capability to make greater investments in dedicated or relationship specific

assets;

• The capability to create more effective inter-organizational knowledge-sharing

routines;

• The capability to create high levels of trust throughout the extended enterprise,

which will effectively reduce transaction costs and maximize flexibility and

responsiveness.

8

It must be noted that these core capabilities of the lean extended enterprise are

fundamental to address the issue of aligning inter-organizational governance, incentives,

and ownership (the issue listed in Table 1) discussed in Section 2.

5. Key Barriers to Integrating RFID Baggage Security into Network

Operations

A content analysis of the IATA and the Airports Council International publications show

that two key barriers to integrating RFID-enabled baggage security into network

operations are the dominantly technical focus of the past and present trials and

implementations and the narrow scope of these trials and implementations. The latter

reflects the mindset that the fundamental unit of competition has not changed from the

individual enterprise to the extended enterprise supplier networks. Unlike the global

automobile manufacturing industry studied by Dyer, the global air transportation industry

does not provide clear evidence of the fundamental paradigm shift from competitive

advantage to collaborative advantage. For example, the IATA (2007, p. 55) shows a

normative model of RFID as a global IT tracking and tracing solution which can be used

to simplifying the business. While the model components, such as IT strategy and

governance, are identified as important to facilitate RFID integration into operations, the

model is at the enterprise level. It does not address the issue of how to align inter-

organizational governance, incentives, and ownership. Furthermore, it does not address

the issue of how to facilitate the paradigm shift from viewing the fundamental unit of

competition from the individual enterprise to the extended enterprise supplier networks.

In light of the evidence found in the research literature and the new paradigm for

collaborative advantage, we identify these two areas as potentially key managerial and

organizational barriers to integrating RFID baggage security into network operations.

In Australia, in March 2005 a new enhanced aviation security regime came into

force. The Department of Transport and Regional Services (DTRS) consulted closely with

industry to evaluate and approve transport security programs for 186 airports, 170 airline

operators and over 900 air cargo agents (DTRS Annual Report 2004-05). Australia

Tourism & Transport Forum Regulation Taskforce issued a statement in December 2005

to argue that the costs of aviation security regulations (i.e., Aviation Transport Security

Bill 2003) imposed on business are significant. More central attention needs to be directed

9

to address the inter-firm governance issues and the network-level RFID adoption and

implementation issues so that high cost of RFID investments will create business value

and strategic payoffs for the industry. Data collection in Australia is ongoing to explore

the two key barrier issues.

Figure 1. RFID integrated onto track & trace application and within IT corporate system

6. Conclusion

Despite the potential of RFID technologies, the air transport industry faces the challenge

in proving the business value of RFID investments. Since the industry operates in a global

network environment, the dominantly technical focus of the past and the present RFID

trials and implementations and their single firm scope are considered as the two key

barriers to the real-time integration of RFID into network operations in the air transport

industry. This research in progress paper proposed the utility of applying the Dyer’s

conceptual framework to explore the key barriers to integrating RFID security into

network operations. The real-time integration of RFID into network operations requires

closer attention to managerial and organizational barriers. More specifically, it argued the

risk of insufficient attention to the importance of inter-firm governance capabilities in the

air transport industry, which was shown as the key critical success factor in deploying IT-

based production technologies successfully in the global automobile manufacturing

industry.

RFIDTechnologyIntegration

Management of Change

Organization

RiskManagement

&Security

Solution Integration

Business ProcessTransformation

IT Strategy & Governance

10

References

Chatfield, A., & Yetton, P. (2000). Strategic payoff from EDI as a function ofEDI embeddedness. Journal of Management Information Systems, 16(4), 195-224.

Curtin, J., Kauffman, R. & Riggins, F. (2007). Making the ‘MOST’ out of RFIDtechnology: a research agenda for the study of adoption, usage and impact of RFID.Information Technology Management, 8, 87-110.

International Air Transport Association. (2007). RFID Business Case for BaggageTagging, www.iata.org/stbsupportportal.

Dyer, J. (2000). Collaborative advantage: Winning through extended enterprisesupplier networks. New York: Oxford University Press.

Garfinkel, S., & Rosenberg, B. (eds). (2006). RFID Applications, Security, andPrivacy. USA: Pearson Education, Inc.

Ghobrial, A., & Irvin, W. (2004). Combating air terrorism: Some implicationsto the aviation industry. Journal of Air Transportation, 9 (3), 67-86.

Katz, M. and Shapiro, C. (1985). Network externalities, competition, and compatibility.The American Economic Review, 75(3), 424-440.

Leone, K., & Liu, R. (2005). The key design parameters of checked baggagesecurity screening systems in airports. Journal of Air TransportManagement, 11, 69-78.

Montevalli, V., & Stough, R. (2004) Aviation safety and security; reachingbeyond borders. Journal of Air Transport Management, 10, 225-226.

Oum, T. (2005). Key results of the ATRS global airport benchmarking. The ATRSPowerPoint presentation, www.atrsworld.org.

Riggins, F., Kriebel, C. & Mukhopadhyay, T. (1994). The growth of interorganizationalsystems in the presence of network externalities. Management Science, 40(8), 984-998.

Sim, k., Koh, H. and Shetty, S. (2006). Some Potential Issues of Service QualityReporting for Airlines. Journal of Air Transport Management, 12, 293-299.

Yoo, B., Choudhary, V. & Mukhopadhyay, T. (2002). Pricing strategies of electronic B2Bmarketplaces with two-sided network externalities. Proceedings of the 35th HawaiiInternational Conference on System Science.