عنوان مقاله [English]
The paper analyzes the possibilities of using a relative new technology, RFID, in an information system. The main features of this technology, the components of the system, the way the system functions and the stages of the implementing process are also presented. One of the main uses of RFID technology is the Traffic Confined Control System based on RFID. Development of this system has a large amount of risk. Reviewing the related literature, the authors did not find any suitable framework for identification and classification of IT project
risks in Iran, and no research concerning identification of Traffic Confined Control System risks has so far been carried out. In this paper, in order to analyze the risks of a vehicle movement control system based on RFID, research is carried out in two stages: In the first step, in addition to introducing the Risk Breakdown Structure (RBS) as the best method for identification of IT project risk, a framework is proposed for classification of current risks in the Traffic Confine Control System, based on RFID, and then, a list of current risks is provided that can be used in all IT projects. At this stage, the approach of the research is qualitative, and the data was collected by means of interviews, focus groups and library studies. The validation of results is also reported. At the second stage, identified risks of the noun system are analyzed by qualitative approaches. The approach of this stage is quantitative and the data is collected using questionnaires. The values of the parameters
probability and impact are identified for the risks. In addition, qualitative and quantitative risk analysis was extracted. Data analysis will provide the final list of top ten risks and five important resources, so that they can be addressed in other risk management cycles. The research results show that dysfunction of the supply chain needed and resource management (partial resources) are considered the most important risks and the most
significant sources, respectively, which should be taken into consideration by the IT manager.