413
Views
1
CrossRef citations to date
0
Altmetric
Articles

Leveraging Information Technology for Disaster Recovery: A Case Study of Radio Frequency Identification (RFID) Implementation for Facility Retrieval

REFERENCES

  • 3M. (2010). Recommendations for marking gas facilities using 3M EMS electronic markers. Retrieved from http://multimedia.3m.com/mws/media/565783O/ems-gas-marker-recommendations-for-marking.pdf
  • Adam, N. R., Shafiq, B., & Staffin, R. (2012). Spatial computing and social media in the context of disaster management. IEEE Intelligent Systems, 27(6), 90–96.
  • Burby, R. J. (2006). Hurricane Katrina and the paradoxes of government disaster policy: Bringing about wise governmental decisions for hazardous areas. Annals of the American Academy of Political & Social Science, 604(1), 171– 191.
  • Chatfield, A., Wamba, S. F., & Tatano, H. (2010). E-government challenge in disaster evacuation response: the role of RFID technology in building safe and secure local communities. Proceedings of the 43rd Hawaii International Conference on System Sciences (HICSS). Koloa, Kauai, HI: IEEE Computer Society Press. Retrieved from http://ro.uow.edu.au/cgi/viewcontent.cgi?article=1744&context=infopapers
  • Common Ground Alliance. (2013). DIRT annual report for 2013. Retrieved from http://www.commongroundalliance.com/template.cfm?section=dirt_overview&contentid=8383&template=/contentmanagement/contentdisplay.cfm
  • Cumbie, B. A., & Sankar, C. S. (2012). Choice of governance mechanisms to promote information sharing via boundary objects in the disaster recovery process. Information Systems Frontier, 14(5), 1079–1094.
  • D’Mello, S., Mathews, E., McCauley, L., & Markham, J. (2008). Impact of position and orientation of RFID tags on real time asset tracking in a supply chain. Journal of Theoretical and Applied Electronic Commerce Research, 3(1), 1–12.
  • Emrich, C. T., & Cutter, S. L. (2011). Social vulnerability to climate-sensitive hazards in the southern United States. Weather, Climate & Society, 3(3), 193–208.
  • Gal U., Lyytinen K., & Yoo, Y. (2008). The dynamics of IT boundary objects, information infrastructures, and organisational identities: The introduction of 3D modelling technologies into the architecture, engineering, and construction industry. European Journal of Information Systems, 17(3), 290–304.
  • Hardgrave, B. C., Langford, S., Waller, M., & Miller, R. (2008). Measuring the impact of RFID on out of stocks at Wal-Mart. MIS Quarterly Executive, 7(4), 181–192.
  • Hibbard, P. J. (2006). US Energy Infrastructure Vulnerability: Lessons from the Gulf Coast Hurricanes, Analysis Group, Boston, MA. Retrieved from http://bipartisanpolicy.org/wp-content/uploads/sites/default/files/Infrastructure%20Vulnerability%20Hibbard_44873b7081ec6.pdf
  • Johnson, R. (2000). GIS technology for disasters and emergency management. Redlands, CA: Environmental Systems Research Institute
  • Ker, J. I., Wang, Y., Hajli, M. N., Song, J., & Ker, C. W. (2014). Deploying lean in healthcare: Evaluating information technology effectiveness in U.S. hospital pharmacies. Information Journal of Information Management, 34(4), 556–560.
  • Lakshmi Narayanan, R. G., & Ibe, O. C. (2012). A joint network for disaster recovery and search and rescue operations. Computer Networks, 56, 3347–3373.
  • Lally, L (2008a). Crisis compliance in the post-Katrina world. International Journal of Technology, Knowledge, and Society, 4(2): 75–80.
  • Lally, L. (2008b). Crisis compliance: Using information technology to predict, prevent and prevail over disasters. Journal of Information Technology Research, 1(1), 34–46.
  • Maldonado, E. A., Maitland, C. F., & Tapia, A. H. (2010). Collaborative systems development in disaster relief: The impact of multi-level governance, Information Systems Frontiers, 12(1), 9–27.
  • National Research Council. (2007). Improving disaster management: The role of IT in mitigation, preparedness, response, and recovery. Washington, DC: National Academies Press.
  • Peña-Mora, F., Aziz, Z., Chen, A. Y., Plans, A., Foltz, S. (2008). Building assessment during disaster response and recovery. Institution of Civil Engineers, Urban Design and Planning, 161(4), 183–195.
  • Reddick, C. (2011). Information technology and emergency management: Preparedness and planning in United States states. Disasters, 35(1), 45–61.
  • Roberti, M. (2015, January 16). The history of RFID technology, RFID Journal. Retrieved from http://www.rfidjournal.com/articles/view?1338/
  • Sterling, R. L., Anspach, J. H., Allouche, E. N., Simicevic, J., Rogers, C. D., Weston, K. E., & Hayes, K. (2009). Encouraging innovation in locating and characterizing underground utilities. Washington, DC: Transportation Research Board.
  • Wang, H., Hubbard, B., & Hubbard S. (2014). RFID applied to supply chain logistics in disaster recovery. Proceedings of the 10th International Conference of the International Institute for Infrastructure Resilience and Reconstruction. West Lafayette, IN: Purdue University.
  • Wang, Y., Kung, L., & Byrd, T. A. (2013). Leveraging event-driven IT architecture capability for competitive advantage in healthcare industry: A mediated model. In Proceedings of the 34th International Conference on Information Systems. Milan, Italy: AIS Press.
  • Yates, D., & Paquette, S. (2011). Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake. International Journal of Information Management, 31(1), 6–13.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.