This document discusses the use of RFID (radio frequency identification) technology in libraries. It provides a brief history of RFID, describing how it has evolved from use in aircraft identification during WWII to today's implementation using small chips and antennas. The document outlines common RFID applications including automated toll payment, building access control, inventory tracking and more. In libraries, RFID is used for self-service checkout/return and collection management. Key considerations for implementing an RFID system include staffing impacts, return on investment calculation, privacy policies, and integration with existing library software.
1 of 16
Download to read offline
More Related Content
20110913 rfid in_libraries_ip_bib_jk
1. Management of RFID in
Libraries
J笛rat Kuprien
Director for economics and development
Vilnius University Library
PhD student
Institute of Library and Information
Sciences
2011 09 13
2. Radio frequency identification (RFID) is a
generic term that is used to describe a
system that transmits the identity of an
object or person wirelessly, using radio
waves.
3. RFID: a brief history
From... Second World War
First used for differentiation of aircraft
Mario W. Cardullo received a patent in 1973:
to converge different but related existing
technologies electronic security system and a
chip with memory capacity into a smaller and
portable format
Now a tag: a memory chip and an antenna as a
single device
4. Scanning device detects a radio frequency signal
from a transponder the tag
The information goes to a database
The process
5. RFID: applications
Commercial:
Automated toll payment since mid 1980s
Security cards for controlling access to buildings
The tagging of cattle
Logistics solutions
Security of goods in shops
Sports:
Football did the ball cross the line?
Ticketing of sports events
Transport
6. RFID new changes
in libraries
The major change in libraries from close to open
access
Main applications:
Self-service
Security
Stock control
9. RFID staff-station
Allows staff to initialize library media and ID
cards at their workstation.
In most cases is fully integrated into existing
library software;
Reads/writes in any data model
10. RFID self-check
Enables library patrons to:
check out and return items themselves
manage their accounts independently
stack circulation and user-friendly touch screen
navigation make the entire process fast and secure
do not need to wait
Library staff has more time for other tasks
11. RFID tags
Can support variuos data models
Active, passive
Memory capacity: 256 bit, 1048 bit, 2048 bit
AFI application family identifier
Compliance with standard ISO 18000-3
Frequency 13.56 MHz
Can be re-written (egz.100,000 times)
12. Privacy issues
Libraries that make available books or other
items to the public utilizing RFID technologies
shall:
Implement an organizational privacy policy that
gives notice and full description about use, terms
of use for data collected via RFID
Ensure that no personal data is recorded on RFID
tags (taking in mind and variety of transactional
data)
Use passive tags
Ensure a protection of data
13. RFID management in
libraries
When starting with RFID need to think of:
- The rationale for wanting to move in this
direction
- What alternatives exists
- The implications for staffing
- What might constitute a return on investment
- How this return might be achieved
- The risks involved, both in adopting RFID
and not adopting it
14. The reasons for
implementing RFID
To resolve specific problems with specific building
To resolve specific problem with specific element of
service
Modernize the service:
Simpler and quicker transaction processes
Longer opening hours
Improved stock management
15. Management issues
How will RFID affect staffing and procedures?
How will return on investment be calculated?
How will RFID work with the library management
system?
What criteria will be used to choose an RFID
system?
Buying a system: evaluating of offers
#4: The full name of this technology is - Radio Frequency (da転nis) identification
There is general agreement that the basic technology dates back to at least the Second World War
And of course as all good technologies it came from military world it was used to enable swift differentiation between friendly and enemy aircraft
However it was only in 1973 that Mario W Cardullo received a patent (US) for what is now clearly recognizable as a passive, read-write RFID tag.
The idea was to converge [konvedz] different but related existing technologies electronic security system and a chip with memory capacity into a smaller and portable format. We call this format a tag now. And now we have RFID a single device consisting of two main elements a memory chip and an antenna
#5: The basic process involved in all RFID transactions is the same: a scanning device detects a radio frequency signal from a transponder the tag, and sends information to a database
#6: RFID is in use all around us. If you have ever chipped your pet with an ID tag, used EZPass through a toll booth, or paid for gas using SpeedPass, you've used RFID. In addition, RFID is increasingly used with biometric technologies for security.
#7: Libraries are changing time to time. The last major changes were made in 1990 when weve got an internet it fundamentally changed traditional approaches to information management in many different ways. The our days tendency is going from closed library to open access library or information and learning center. And RFID helps to realize this. However, RFID technology does a lot of changes too it changes library processes, its services and relations between librarians, readers and books.
Self service RFID is very attractive technology for libraries, because with this technology lots of processes can be managed without a librarian. Thats why libraries in particular have been so much quicker to adopt RFID than most retailers. Well, shopkeepers generally hope never to see an item again once it has left a shop. But it is good for libraries where individual items are lent and returned possibly hundreds of times.
Security RFID technology can work independently of self-service, but usually libraries installs RFID when it is decided to start providing an open access services. You can find an information saying that RFID is less effective in security area than electromagnetic devices. But it depends on where and how these devices are installed. RFID is more expensive technology than electromagnetic or radio frequent systems. But supporters of RFID point out that while Rf and EM security systems have only limited other benefits to offer, RFID can also be used in a number of different ways.
Stock control the benefits that rfid offers the library manager in relation to stock control particularly inventory and shelf-checking
#9: Usually RFID tagging is integrated with library management systems. In our library we use an Ex Libris product Aleph and for RFID technology we use Bibliotheca RFID system called BiblioCockpit.
RFID interacts with the LMS. RFID provides an alternative method of accessing an LMS, enabling library staff and customers to exploit the benefits of the technology. So RFID makes the LMS more user friendly and able to carry out a wider range of tasks.
#12: Well lets go back and talk about key elements that must be in this process. Of course the main one is a tag and here you can see a common features of RFID tags
Passive RFID does not use abattery, while an active has an on-board battery that always broadcasts its signal.
A memory capacity it can be various. Of course the decision on what to choose depends on how much data has to be in a tag. There must be written the identification number of an item, the metadata can be written too, and the important thing for security is - the AFI application family identifier. It is needed because RFID tags are now used in many different sectors, a method of differentiating between these sectors is needed to enable systems to function smoothly.
The tags should be compliant with standards. The main for libraries is ISO 18000-3, that says what data fields have to be mandatory, what can be compulsory, what a length of data codes has to be and so on.
Frequency it is one common 13.56 MHz
The data in a tag can be rewritten lots of times
#13: A number of organizations have been very active in trying to alert the public to what they see as the dangers of RFID use. The crucial element is that there appears to have been no attempt to alert customers to either the existence of the technology or the way in which it was being used.
There are lots of RFID applications and for sure - devices around us. The data can be collected with these devices if they a configured on a same parameters. It can be done of course accidentally or intentionally. Thats is why there are a key principles for libraries: