A Model for Measuring the Aggregative Risk Degree of Implementing RFID Campus-Safety Systems

Article Preview

Abstract:

When the school decides to implement the RFID campus-safety system, the administrators always encounter internal and external risk items or difficulties which they know even they don’t know. This study therefore proposes an analytic hierarchy model to help the administrators understand the critical risk factors influence the RFID campus-safety system initiation, and an aggregative risk degree is indicated which risk grade they are in. The importance weights of risk factors and possible occurrence ratings of four risk grade (high-risk, medium-risk, low-risk and none-risk) are determined by using consistent fuzzy preference relations. The relative priority weights of evaluators are taken into consideration at the same time and obtained by simple additive weighting method. By multiplying the importance weights of risk factors, possible occurrence ratings of risk grades and the relative priority weights of evaluators, the aggregative risk degree of implementing RFID campus-safety system.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1800-1805

Citation:

Online since:

March 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] P. C. C. Ribeiro, et al., Application of an IT Evaluation Method, International Journal of e - Business Management, vol. 3, pp.24-42, (2009).

Google Scholar

[2] A. Bednarz, RFID can help locate that misplaced server, HP says, Network World, vol. 23, pp.79-79, (2006).

Google Scholar

[3] W. Liu, et al., Determinants of RFID Adoption in Supply Chain among Manufacturing Companies in China: A Discriminant Analysis, Journal of Technology Management & Innovation, vol. 4, pp.22-32, (2009).

DOI: 10.4067/s0718-27242009000100003

Google Scholar

[4] L. Howard and M. Anderson, RFID Technology in the Library Environment, Journal of Access Services, vol. 3, pp.29-39, (2005).

Google Scholar

[5] S. H. Ching and A. Tai, HF RFID versus UHF RFID - Technology for Library Service Transformation at City University of Hong Kong, Journal of Academic Librarianship, vol. 35, pp.347-359, (2009).

DOI: 10.1016/j.acalib.2009.04.005

Google Scholar

[6] M. C. O'Connor, Juniper Putting RFID to Work in Product-, Asset-Tracking, RFID Journal, Apr. 21, (2010).

Google Scholar

[7] C. s. s. E. newspaper. (2009). RFID security system Implement campus application Available: http: /www. peopo. org/enews/post/48157.

Google Scholar

[8] R. D. Barlow, Looking forward to smarter storage systems, Healthcare Purchasing News, vol. 33, pp.10-15, (2009).

Google Scholar

[9] A. L. P. Ustundag and E. CevİKcan, Vehicle route optimization for FRID integated waste collection system, International Journal of Information Technology & Decision Making, vol. 7, pp.611-625, (2008).

DOI: 10.1142/s0219622008003125

Google Scholar

[10] L. Huey-Ming, Applying fuzzy set theory to evaluate the rate of aggregative risk in software development, Fuzzy Sets and Systems, vol. 79, pp.323-336, (1996).

DOI: 10.1016/0165-0114(95)00163-8

Google Scholar

[11] S. -M. Chen, Fuzzy group decision making for evaluating the rate of aggregative risk in software development, Fuzzy Sets and Systems, vol. 118, pp.75-88, (2001).

DOI: 10.1016/s0165-0114(99)00103-7

Google Scholar

[12] C. C. Wei, et al., An AHP-based approach to ERP system selection, International Journal of Production Economics, vol. 96, pp.47-62, (2005).

Google Scholar

[13] J. Comas, et al., Risk assessment modelling of microbiology-related solids separation problems in activated sludge systems, Environmental Modelling & Software, vol. 23, pp.1250-1261, (2008).

DOI: 10.1016/j.envsoft.2008.02.013

Google Scholar

[14] T. -H. Hsu and L. -Z. Lin, Using fuzzy set theoretic techniques to analyze travel risk: An empirical study, Tourism Management, vol. 27, pp.968-981, (2006).

DOI: 10.1016/j.tourman.2005.10.022

Google Scholar

[15] E. Herrera-Viedma, et al., Some issues on consistency of fuzzy preference relations, European Journal of Operational Research, vol. 154, pp.98-109, (2004).

DOI: 10.1016/s0377-2217(02)00725-7

Google Scholar

[16] T. L. Saaty, Exploring the interface between hierarchies, multiple objectives and fuzzy sets, Fuzzy Sets and Systems, vol. 1, pp.57-68, (1978).

DOI: 10.1016/0165-0114(78)90032-5

Google Scholar

[17] Y. -M. Wang and Z. -P. Fan, Fuzzy preference relations: Aggregation and weight determination, Computers & Industrial Engineering, vol. 53, pp.163-172, (2007).

DOI: 10.1016/j.cie.2007.05.001

Google Scholar