This journal provides immediately free access to its contents under the principle that make available the research results for free to the public, helps for a greater global exchange of knowledge.
Therefore, the journal invokes the Creative Commons 4.0
License attributions: Recognition – Non-commertial - Share equal. Commercial use and distribution of original or derivative works are not permitted and must be done with a equal license as the one that regulate the original work.
Abstract
¿Cuál o cuáles serían los mecanismos para apoyar a la industria farmacéutica en cuanto a la mejora de sus procesos con herramientas tecnológicas para combatir los medicamentos espurios? Ante este planteamiento se enfrentan las sociedades a nivel mundial, quienes ven con preocupación cómo el mercado de medicamentos falsificados aumenta en una proporción similar a las muertes por su consumo. Este escenario plantea grandes retos para los gobiernos quienes deberán tomar decisiones que intenten detener la fabricación, expendio y consumo de medicamentos espurios, de etiquetado engañoso o de imitación. Existen numerosos riesgos dentro la industria farmacéutica, tales como las imitaciones, procesos incorrectos de fabricación y condiciones no apropiadas de transporte y almacenamiento, que ocasionan riesgos a los diferentes actores como los fabricantes, distribuidores y clientes, de tal manera que pueden llegar a tener pérdidas económicas o afectaciones en la salud. Así, en este documento se pretende mostrar cómo algunas implementaciones que utilizan tecnologías con radiofrecuencia en la industria farmacéutica, ayudan a mitigar la posibilidad de riesgo en las diferentes etapas a lo largo de la cadena de producción y suministro de medicamentos, buscando mejorar la calidad en los procesos y la seguridad en los fármacos.
References
[2] B. Violino, “Grupo biofarmacéutico francés hace el seguimiento del plasma sanguíneo.” RFID Journal Español, Agosto 2015.
[3] M. Laniel and I. Uysal, “Rfid system optimization for item-level pharmaceutical serialization,” in 2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA), pp. 1–6, Sept 2013.
[4] T. M. Choi, “Coordination and risk analysis of vmi supply chains with rfid technology,” IEEE Transactions on Industrial Informatics, vol. 7, pp. 497–504, Aug 2011.
[5] A. M. de la Salud, “Productos médicos de calidad subestándar, espurios, de etiquetado engañoso, falsificados o de imitación: Informe de la directora general,” 2014.
[6] E. Tardif, “Medicamentos falsificados: una píldora difícil de tragar y un reto sanitario global,” Anuario Español de Derecho Internacional, vol. 27, pp. 591–613, 2011.
[7] O. M. de la Salud, “La falsificación de medicamentos: una amenaza creciente,” tech. rep., Organización Mundial de la Salud, Abril 2010.
[8] Intermec, “Conceptos básicos de rfid: Conocimiento y uso de la identificación por radiofrecuencia,” tech. rep., Intermec, 2007.
[9] S. M. Roy and N. C. Karmakar, “Introduction to rfid systems,” Handb. Smart Antennas RFID Syst, pp. 11–51, July 2011.
[10] APCglobal, “Epc information services (epcis) versión 1.0.1 specification,” tech. rep., APCglobal Inc., Sept. 2007.
[11] J. S. Ting, “Arquitectura de software para los actuales sistemas ciber-físicos,” Ingenierías USBmed, vol. 2, no. 1, pp. 29–32, 2011.
[12] Y. Miaji, M. A. A. Mohamed, and N. B. Daud, “Rfid based improving supply chain traceability,” in 2013 IEEE Implementación RFID en la industria Farmacéutica (Artículo de Investigación) — 46/47 International Conference on RFID-Technologies and Applications (RFID-TA), pp. 1–6, Sept 2013.
[13] R. Journal, “La terminal de contenedores de Colombia pone en marcha la tecnología de rfid,” Ene. 2012.
[14] R. Derakhshan, M. E. Orlowska, and X. Li, “Rfid data management: Challenges and opportunities,” in 2007 IEEE International Conference on RFID, pp. 175–182, March 2007.
[15] C. Poetker, D. Rodgers, M. Sarachman, K. Traub, S. Ackley, and D. Anarkat, “Gs1 rfid/barcode interoperability guideline,” tech. rep., GS1 Global Office, 2016.
[16] R. Journal, “Preguntas frecuentes.”
[17] C. H. Cho, K. H. Do, J. W. Kim, and M. S. Jun, “Design of rfid mutual authentication protocol using time stamp,” in 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, pp. 1047–1051, Nov 2009.
[18] INTECO, “Guía sobre seguridad y privacidad de la tecnología rfid,” tech. rep., Instituto Nacional de Tecnologías de la Comunicación (INTECO), 2010.
[19] M. Lehtonen, F. Michahelles, and E. Fleisch, “How to detect cloned tags in a reliable way from incomplete rfid traces,” in 2009 IEEE International Conference on RFID, pp. 257–264, April 2009.
[20] L. Mirowski and J. Hartnett, “Deckard: A system to detect change of rfid tag ownership,” International Journal of Computer Science and Network Security, vol. 7, pp. 89–98, July 2007.
[21] Y. Liu, “An efficient rfid authentication protocol for lowcost tags,” in 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, vol. 2, pp. 180–185, Dec 2008.
[22] R. G. Johnston, “An anticounterfeiting strategy using numeric tokens,” International Journal of Pharmaceutical Medicine, vol. 19, pp. 163–171, Jun 2005.
[23] E. Nilsson, B. Nilsson, and E. J¨arpe, “A pharmaceutical anti-counterfeiting method using time controlled numeric tokens,” in 2011 IEEE International Conference on RFID Technologies and Applications, pp. 343–347, Sept 2011.
[24] S. R. Jeffery, M. Garofalakis, and M. J. Franklin, “Adaptive cleaning for rfid data streams,” in Proceedings of the 32Nd International Conference on Very Large Data Bases, VLDB ’06, pp. 163–174, VLDB Endowment, 2006.
[25] Y. C. Huang and J. R. Jiang, “Efficient ultralightweight rfid mutual authentication,” in 2014 IEEE International Conference on Internet of Things (iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), pp. 102–108, Sept 2014.
[26] A. B. Jeng, L.-C. Chang, and T.-E. Wei, “Survey and remedy of the technologies used for rfid tags against counterfeiting,” in 2009 International Conference on Machine Learning and Cybernetics, vol. 5, pp. 2975–2981, July 2009.
[27] R. Acierno, M. Maffia, L. Mainetti, L. Patrono, and E. Urso, “Rfid-based tracing systems for drugs: Technological aspects and potential exposure risks,” in 2011 IEEE Topical Conference on Biomedical Wireless Technologies, Networks, and Sensing Systems, pp. 87–90, Jan 2011.
[28] J. Harris, P. Stevens, and J. Morris, “Gato por liebre. la amenaza de las medicinas falsas,” tech. rep., Health Issues Internacional Policy Network, 2009.
[29] P. Shetty, “Medicinas falsas: hechos y cifras,” Marzo 2011.
[30] G. Q. Huang, Z. Qin, T. Qu, and Q. Dai, “Rfid-enabled pharmaceutical regulatory traceability system,” in 2010 IEEE International Conference on RFID-Technology and Applications, pp. 211–216, June 2010.
[31] R. A. G. Gao, C. DesRoches, and A. Jha, “The role of information systems in healthcare: Current research and road ahead,” Information Systems Research, vol. 22, pp. 419–428, 2011.
[32] M. Potdar, E. Chang, and V. Potdar, “Applications of rfid in pharmaceutical industry,” in 2006 IEEE International Conference on Industrial Technology, pp. 2860–2865, Dec 2006.
[33] M. L. Pardal, M. Harrison, S. Sarma, and J. A. Marques, “Expressive rfid data access policies for the pharmaceuticals supply chain,” in 2013 IEEE International Conference on RFID (RFID), pp. 199–206, April 2013.
[34] T. Inaba, “Inference of product quality by using rfidenabled traceability information a study on the us pharmaceutical supply chain,” in 2009 IEEE International Conference on RFID, pp. 298–305, April 2009.
[35] J. Dalli, “Ensuring patients have access to safe medicines,” tech. rep., European Stakeholder Model, 2011.
[36] R. T. Wigand, D. M. Mande, and J. D. Wood, “Information management and tracking of drugs in supply chains within the pharmaceutical industry,” in 2011 Eighth International Conference on Information Technology: New Generations, pp. 500–507, April 2011.
[37] T. Engel, S. Lunow, J. Fischer, F. Koebler, S. Goswami, and H. Krcmar, “Value creation in pharmaceutical supply chains using customer- centric rfid applications,” in Smart SysTech 2012; European Conference on Smart Objects, Systems and Technologies, pp. 1–8, June 2012.
[38] S. Campillo, “Del laboratorio a tu botiquín: ¿c´omo se fabrican los medicamentos?.” Hipertextual, Diciembre 2014.
[39] C. C. Drugs, “A report of the food and drug administration,” tech. rep., U. S. Department of Health and Human Services, 2004. Implementaci ´on RFID en la industria Farmac´eutica (Art´ıculo de Investigación ´ on) — 47/47
[40] B. King and X. Zhang, “Securing the pharmaceutical supply chain using rfid,” in 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE’07), pp. 23–28, April 2007.
[41] M. Lehtonen, T. Staake, and F. Michahelles, From Identification to Authentication – A Review of RFID Product Authentication Techniques, ch. 9, pp. 169–187. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008.
[42] N. Forum, “Nfc and contactless technologies,” 2007.
[43] Z. Jianbo and Y. Qun, “Design of pharmaceutical drugs security based on rfid sensor networks,” in 2014 9th International Conference on Computer Science Education, pp. 1010–1013, Aug 2014.
[44] R. Bhattacharyya, C. Floerkemeier, S. Sarma, and D. Deavours, “Rfid tag antenna based temperature sensing in the frequency domain,” in 2011 IEEE International Conference on RFID, pp. 70–77, April 2011.