RFID
Radio Frequency Identification
A New Frontier for Libraries
Created By: Marybeth Bean,Emily Boisvert,Peter Breault
Radio Frequency Identification
Basic History of RFID TechnologyResearch done by Singh, Brar, and Fong (2006) states First Public Library use was the
Farmington Community Library in Michigan - 1999 (p.24)Research started as early as the 1970s RFID designed to replace the UPC codeKey Promoters: Walmart,Target, and the U.S. Department of Defense
UPC vs. EPC
Bar Codes use UPC’s (Universal Product Code)
RFID uses EPC’s (Electronic Product Code)
Header /Manufacturer code / Stock Keeping Unit / Serial Number
Data identifier / Manufacturer’s number / Product number / Single digit security
Source 1: Sweeney, P. J. II.(2005) . RFID for Dummies. Indianapolis, IN: Wiley Publishing, Inc. p.45.Source 2: Sweeney, P. J. II.(2005) . RFID for Dummies. Indianapolis, IN: Wiley Publishing, Inc. p. 46.
How It WorksThe system is made up of a Host (a computer) where
the data is storedA reader emits and interprets an electrical signalTwo antennas disburse and receive the signal
- similar to sonarA tag is the target, and it returns the antenna’s signal
Source: Sweeney, P. J. II.(2005) . RFID for Dummies. Indianapolis, IN: Wiley Publishing, Inc. p. 38.
Components
Reader
**Think of this like a high tech version of Morse Code**
The reader is what produces the electrical frequency that the antenna sends off.HF 13.56 Megahertz • UHF 860 - 960
Megahertz
The reader then takes in a signal that is returned by the tag.
It turns the signals back and forth into ones and zeros which can then be sent to the host computer for storage.
Source: Sweeney, P. J. II.(2005) . RFID for Dummies. Indianapolis, IN: Wiley Publishing, Inc. p. 21.
Components
AntennasThey send out and receive the
electromagnetic frequency through the airThink of its range like being in a big bubble
Source: Sweeney, P. J. II.(2005) . RFID for Dummies. Indianapolis, IN: Wiley Publishing, Inc. p. 21.
Components
TagPart 1: An integrated circuit - contains an on
or off activation code & stored data such as library barcodes for that specific item.
Part 2: An antenna helps the tag gain energy and respond to the reader.
Source: Sweeney, P. J. II.(2005) . RFID for Dummies. Indianapolis, IN: Wiley Publishing, Inc. p. 21.
Source: (2009). Dual Aisle Plexi – Tech Gates. Retrieved September 22, 2009 from http://libramation.com/home.html
Active vs. Passive Tags
Does the tag have its own power supply?Yes - That is an Active chipNo - That is a Passive Chip
If the tag has no independent power supply it uses BackscatterBackscatter - The tag does not emit its own
signal it just absorbs, modifies, and returns the original signal to the reader.
TAGSHF versus UHF RFID
High Frequency versus Ultra High FrequencyHF was developed first, and has been around longer.UHF has faster speeds, and longer reading ranges.UHF has a lower manufacturer cost.UHF is more susceptible to water (debatable).
HF Tags>>>
Source: (2009). Roll of RFID tags. Retrieved September 22, 2009 from http://libramation.com/Pages/prod_radio.html.
Bar Codes, Memory Buttons, and RFID
Linear Bar CodesScans one object at a timeInformation can’t be changedCheapIf the image is dirty it is hard to read
Memory ButtonsReaders must physically touch the tag for it to
scanDurableInformation can be modified
• RFID - Tags can be read over distances of 10 meter
- Information can be modified***And MORE***
Source: Heinrich, C. (2005) . RFID and Beyond: Growing Your Business Through Real World Awareness. Indianapolis, IN: Wiley Publishing, Inc. p. 65.
RFID Applications in Libraries
At the service desk:
• RFID can be used to check out material
• It can be used in conjunction with a library’s LMS (Library Management System)• It can check out a whole stack of books at one time• If so enabled, it can deactivate security chip
Patron self check station by Bibliotheca
Source: BIBLIOTHECA RFID Library SystemsRFID Products. Retrieved September 21, 2009 from http://www.bibliotheca-rfid.com/BiblioWand_Mobile_Units.
From a patron’s perspective:• Self check option
• Patron can check out own materials, avoiding lines• Self check readers allow for check out of multiple items at one time
Stacks Management:Current inventory practices are:
• Labor intensive• Time intensive
Checking against shelf list drawer…
…or using barcode, barcode reader, laptop, software to talk to LMS
All involve checking book by book…by book…
Stacks Management:
• RFID inventory• Staff run wand along shelf of books• Wand reads tags in books on shelf• Stores data for download later or connects to laptop• Can tell what is missing• Can tell what is out of order
Source: BIBLIOTHECA RFID Library Systems RFID Products. Retrieved September 21, 2009 from http://www.bibliotheca-rfid.com/selfcheck_mercury
Wand for scanning
PDA for data collection in inventory
Automated Book Check in and Sorting
Automated Book Returns• Books checked in as placed through the return• Security can be turned on• Books pass along a conveyor belt• Based on info from check in, books are sorted into bins for re-shelving
Source: 3M Library Systems Product Guide (2009). Retrieved September 21, 2009 at http://solutions.3m.com/wps/portal/3M/en_US/library/home/
Book return items are checked in Conveyor sorts to bins based
on RFID sort at discharge
Bins sorted by shelving location
Security of Collection:
• RFID tags can be enabled with a security chip
• When activated, will activate alarm at exit• Are automatically deactivated at checkout• Staff have access to identity of what has been removed• If patrons have RFID enabled library identification, there will also be access to who has removed the material• Catches check out error, staff or system
• Browsing of collection difficult to capture
• Relies on cooperation of patron to record/report• RFID can capture this:
• Co-locate readers with materials from a collection• Readers undetected for a period of time indicate materials off shelf
RFID Benefits: Advantages of Implementation
Benefits forLibrary organization as a whole
Library staff
Library patrons
How does RFID help the whole library organization?
Tags combine barcode and security device functions (barcodes + book cards + magnetic strips)
Provides ability to increase business without adding to the budget for more staff (hours, speed, streamline tasks)
Cost savings
Cost savings examples:Berkeley, CA
Berkeley Library director claims $2 million saved in worker’s compensation over 5-year period due to decrease in repetitive motion injuries
University of Nevada, Las Vegas Library recovered 500+ items
by tagging collection, saved $40,000 in replacement costs
What else can it provide?Flexibility in library design and use
Greater control over stock and acquisitions/ revising current records
Decreased human error
Which means…
A focus on increasing patron satisfaction and services in all areas of library use
Source: Man with Child, Retrieved September 21, 2009, from www.morerfid.com/upload/report/2008/checkpoint_080623-1.jpg.
Benefits for library staff may include…
Fewer instances of injury from repetitive motions
Opportunity for more interesting roles and tasks
Greater job satisfaction and decreased stress
Shift to flexible and customer-oriented focus
A look at traditional handling of library materials at the
circulation desk…1. Staff reach for materials to be checked in/out.
2. Staff locate barcode to scan.
3. Staff sensitize/desensitize security device on material.
4. Staff may insert cards or stamp materials at check-out.
5. Staff sort returned materials for shelving.
The RFID MethodStaff may be involved in some
circulation tasks, but RFID technology allows for multiple items scanned at once (six items or items up to six inches height)
ORNo staff involvement with self-service
equipment including sorting conveyor
New ways to review inventory with hand-held
RFID scanners… No need to touch or move
materials
Less physical, less time
Scanner IDs items out of order Simultaneous check for
activation of security component
Increased accuracy
Additional use for reference materials/periodicals previously unchecked
Source: Products: RFID Library Management. Retrieved September 21, 2009, from www.cbb-middleware.com/ibit/Index_files/images/library_rfid_1.jpg.
An example from the Vatican Library…
Source: Vatican Library. Retrieved 21, 2009, from www.artremis.com/article/pics/vatican_library3.jpg.
Before RFID:Library closes for one month per year for inventory of
stock
With RFID:Library remains open, inventory takes few hours
Conclusion:RFID reduces downtime and increases success in
finding materialsReportedly 5, 10, even 20 times faster than
traditional barcode reading
Staff efficiencies:Reduction of time preparing materials for re-shelving
with help from conveyor and sorting system
RFID tag system allows staff to readily locate materials for patrons
Increase of staff-patron interaction
Increase of library security and supervision by staff
Personalized service with patron information available on tags
Which means…
A focus on increasing patron satisfaction and services in all areas of library use
Source: Library Computer Child, Retrieved 21, 2009, from www.pharos.com/images/main/library-computer-child.jpg.
Now, what about patrons and RFID?
Shorter lines for check-out with self-check devices
Increased staff assistance with specific searches and questions
Enhanced privacy Faster rate of reserve requests Timeliness of account changes
and status
Self-scanners provide receipts of all patron holdings
Aesthetic appeal of library space along with increased functionality
Noted rise in customer satisfaction, opinion of staff helpfulness
Hand-held guiding equipment tailoring interest of patron used for personal service Source: All in one Kiosk Library, Retrieved 21,
2009, from www.envisionware.com/files/AllInOneKiosk_Library_350.jpg.
What do patrons have to say about RFID?
Study by Salt Lake County Library Services found 95% of 625 patrons surveyed gave self-checkout systems grade of B or above
Case study #1: Darien, CT New library opened Jan. 10,
2009 complete with RFID technology
Changes included 3M and FKI Logistex automated returns technology= elimination of circulation desk
Addition of “Welcome Desk” acting as concierge for building, more circulation staff trained as readers’ advisors
Technology became way to expand services and save
Source: Berry, L.P., & Gray, A.K. (2009, May 15). State of the art in Darien. Library Journal, 9.
Case Study #2: Cardiff University, Wales, United
KingdomFour sites with RFID
self-service as of Jan. 2009
Goals: increase staff involvement with academic schools, provide better research support
Introduction of smaller information desks= larger and more private office/work area for library assistants Source: Library Kiosk, Retrieved 21, 2009, from
www.cardiff.ac.uk/insrv/images/news/image_73121_web.jpg.
Pre-RFID Post-RFIDTwo staff members
at circ desk (3 at peak)
Subject librarian and most staff 2-3 hours/day rotation
Work=inter-library loan, book orders, overdues, journal processing, invoicing, etc.
One staff member maximum 2 hour shift
Library staff roam for 1 hour at peak times
Work=new training program for research staff, blog for distance learners, developing pages on Blackboard and converting manual to wiki format
Case study #3: San Bernardino County Library
System, CA30 branches serve 1,000,000+ peopleStaff able to greet patrons, guide and
assistWith self-service, patrons can also
unlock AV security cases and pay fines and fees
Benefit=kiosk available 24/7Found that takes 2 people 1 hour to tag
200 items
Additional BenefitsPredict costs will decrease to point
of tag inclusion in books and AV materials at time of manufacture
Reduction of security equipment purchased and maintained long term
Grants may be available for technology projects like RFID
Challenges
According to Singh, Brar, and Fong (2006), In 2006 California Library Association did a survey and found that out of the 51% who were not implementing RFID in their survey 58 % cited cost as their major issue (p.24).• According to Singh, Brar, and Fong (2006), The costs to convert a library to RFID technology range from $113,000 to $1.2 million average being $502,917 (p.28).
MONEY, MONEY, & More MONEY
The Truth about the Price
Libraries would face an initial one time cost then it would be like buying expensive barcodes today.
The Real Cost is in the Tags
According to Shahid Syed (2005) the average cost for tags was $ .40 to $ .75 (p.6).
-- Prices are dropping, but the goal for most bulk purchasers is $.05 per tag
According to Alan Butters (2008) UHF may be the better choice in the long run because of manufacturing companies affecting the price
ChallengesTechnical / Physical Layout of the
Library Reader & Tag CollisionsAccording to an article by Singh,
Brar, and Fong, a single conversion takes 11.8 month to complete (p.29).
Challenges
A growing concern is the lack of trained professionals in this field
In a 2009 article by Sadanand Bansode and Desale, concerning the University of Pune (located in India) the library was forced to outsource the entry of their computer data to other areas (p. 206).
Beware of a imposters!
By installing RFID systems you are taking on new technology that is developing while we speak!
ChallengesOpposition Groups
CASPIANElectronic Frontier Foundation
“Mandatory Kills” -- Concept of Tag DeactivationReligious Groups
- Amish- Billy Cone: Niagara Frontier Bible Churchhttp://www.tangle.com/search?
page=1&search_type=all&search_text=RFID&search_text.x=0&search_text.y=0
PrivacySince the library is a public facility
Are patrons granted the right to personal privacy?
FactThe RFID tags in libraries contain two things
1. Either a 0 or a 1 designating it as on or off
2. A barcode identifying that book.
PrivacyTracking - Following a book or reader through
Hotlisting - Described by David Mulnar “Materials of Interest” Recording the tags in your own database and monitoring
that numberCesar Chavez Library Branch in Oakland
Could people interested in censorship use this for their own purposes?
ChallengesHow Secure is your Database?
Homemade / Makeshift Readers are Possible.
Health Issues / Constant Exposure
Your Opinion
• Is there a problem with constant exposure to radiation from radio waves?
• Would you say the same about radiation from microwaves?
• What about radiation from cellular phones?
? ?
RFID is a new technologyMore Research is Clearly Needed.
HarmlessJeannette Woodward’s book What Every Librarian should know about Electronic Privacy (2007) explains how the electromagnetic waves of RFID are higher than those made by A.M. radio station, but lower than F.M. transmissions. (p. 102)
HurtfulIn a 2008 article by Alan Butter, he said “The current design of UHF systems has the RFID antenna permanently radiating and therefore continually exposing staff to essentially the same electromagnetic radiation as emitted by mobile phones.” (p. 126)
Health Concerns
Concerns Tags are becoming smaller (the size of a grain of sand)
and more complex
Example by Jeannette Woodward (2007) explains how Philip Electronics in 2003 admitted to micro chipping underwear - Concerning their microchips Philip Electronics was quoted as saying the technology was “imperceptible to the wearer and remain in individual items of clothing throughout their lifetime.”(p. 95)
The VeriChip would be implanted into people and contain their medical histories.
Source: Strickland, L. S., Hunt, L. E. (2005). Technology, Security, and Individual Privacy: New Tools, New Threats, and New Public Perceptions. Journal of the American Society for Information Science and Technology, 56 (3), 221-234. p. 223.
RFID Use On PeopleTracking People
Case 1: Sutter School in California2005 ACLU & EFF stopped itFor More Info -
http://www.eff.org/press/archives/2005/02/17Case 2: Video Surveillance Company in
Cincinnati Ohio -- referenced by Jeannette Woodward (p.116)
Case 3: According to Claus Heinrich Multiple Mexican Leaders (p. 178)
Best Practices
Privacy Best Practices
Valid Concerns:•What information should be kept private?•How should it be protected?•How much transparency should there be in the use of the system?•Will information be susceptible to theft?•If we collect it, how long will it be kept?
Who Is Concerned?
Groups engaged in the conversation:• American Civil Liberties Union (ACLU)• Electronic Frontier Foundation (EFF)• Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN)• American Library Association
What is the Library Community Thinking About
RFID & Privacy?ALA Midwinter 2004:•Recommends libraries include RFID in their privacy policies•Limit type of information on tags•Inform patrons that information is being collected•Tell them why it is being collected•Have security measures that can be audited(Smart, 2005)
Two ViewsMichael Schuyler
•Admits there are privacy concerns•Believes that there is more privacy with RFID and barcode than in past•Past practices involve writing patron name on card kept in book
Lee Tien•Libraries have not done enough to safeguard civil liberties•“partly because they believe that it serves their interests. Unfortunately how bad can they be if your friendly neighborhood library is using them?”(Tien, 2005)
(Schuyler, 2004)
RFID Interest Group• Part of LITA (Library and Information Technology Association, a division of ALA)• Mission and Goals:
“Formed in 2005Provides a forum for librarians to learn from each other and discuss the critical issues of Radio Frequency Identification (RFID)”http://www.ala.org/ala/mgrps/divs/lita/litamembership/litaigs/rfidtechnology/index.cfm
ALA and the Center for Democracy and Technology• 2006 ALA participates as part of a working group
• Membership in working group includes members of watchdog consumer groups and industry (ex. National Consumers League, Cisco)
• Create an interim draft “CDT Working Group on RFID: Privacy Best Practices for Deployment of RFID Technology “http://www.cdt.org/privacy/20060501rfid-best-practices.php
Berkley Public Library• The Library should be open about its use of RFID technology including providing publicly available documents stating the rational for using RFID, objectives of its use and associated policies and procedure and who to contact with questions
• Signs should be posted to all facilities using RFID. The signs should inform the public that RFID technology is in use, the types of usage, and a statement of protection of privacy and how this technology differs from other information collection methods. Only authorized personnel will have access to the RFID system
• No personal information should be stored on the RFID tag
Berkley Public Library, cont.
• Information describing the tagged item should be encrypted on the tag even if the data is limited to a serial number.
• No static information should be contained on the tag (barcode, manufacturer number,) that can be read by unauthorized readers
• All communication between tag and reader should be encrypted via a unique encrytption
• ISO1800 mode-tags should be used rather than ISO 1569(Shahid, 2005)
ImplementationLearning from others experience
•Ask vendors for references from libraries that have implemented products•Well known libraries that have “made the leap” to RFID •Seattle, New Orleans, Berkley Public Libraries, the Vatican Library
•Local libraries•UConn in process•Darien Public Library
The Complete RFID HandbookAuthored by Diane Marie Ward (INSERT REFERENCE)
•Masters in Informatics, RFID focus•Teaches coursework in RFID technology/management
Covers assessment, implementation, management of RFID in libraries
•Explains basics of technology•Library applications •Physical installation •Design•Determining return on investment (ROI)•Selecting a vendor•Maintaining system
The Complete RFID Handbook•Interviews with patrons, staff, administrators, vendors, and others working in settings that employ RFID
•Advice from first hand knowledge of implementation
•Pocket guides that include•Copies of Ward’s 2006 survey of libraries who have implemented and explanation of methodology•Worksheets to guide through the decision
making and implementation process•A DVD“This book is an essential reading for librarians considering implementing RFID in their library” (Laws, 2006)
Conclusion
Case studies have shown the potential for RFID in different library settings
Goals are efficiency, savings and satisfaction for staff and patrons
Does RFID implementation meet those goals?
Are the risks concerning the invasion of patron privacy too great for implementation of RFID?
What is your library’s position regarding patron privacy?
Is technology the answer to enhancing library service?
What do you think?
Any Questions about RFID?
Reference List3M. (2009). 3M Library Systems Product Guide. Retrieved from http://solutions.3m.com/wps/portal/3M/en_US/library/home/products/automated-materials-handling/intelligent-return-sorter/
All in one Kiosk Library, Retrieved 21, 2009, fromwww.envisionware.com/files/AllInOneKiosk_Library_350.jpg.
Balas, J. L., (2005, June). Should There be an Expectation of Privacy in the Library. Computers in Libraries, 25 (6), 33 – 36.
Bansode, S. Y., Desale, S. K. (2009). Implementation of RFID technology in University of Pune Library. Emerald Program: Electronic Library and Information Systems, 43 (2), 202 – 214.
Berry, L.P., & Gray, A.K. (2009, May 15). State of the art in Darien. Library Journal, 9.
Butters, A. (2008, April). RFID for Libraries: A Comparison of High Frequency and Ultra High Frequency Options. Australia’s Public Library Information Services, 21 (3), 120 – 134.
Reference ListButters, A. (2008). RFID in Australian Academic Libraries: Exploring the Barriers to Implementation. Australian Academic & Research Libraries, 39 (3), 198 – 206.
Bibliotheca RFID library systems RFID products. Retrieved September 21, 2009, from http://www.bibliotheca-rfid.com/BiblioWand_Mobile_Units
CDT working group on RFID: Privacy best practices for deployment of RFID technology. (2006). Retrieved September 15, 2009, from http://www.cdt.org/privacy/20060501rfid-best-practices.php
Ching, S. H., Tai, A. (2009, June 16). HF RFID versus UHF RFID – Technology for Library Service Transformation at City University of Hong Kong. The Journal of Academic Librarianship, 35 (4), 347 – 359.
Davies, L., & Roberts, L. (2009). Set your library staff free with RFID: A case study from Cardiff University. SCONUL Focus, 45(Spring), 117-122. Retrieved September 17, 2009, from LISA: Library & Information Science Abstracts (CSA).
Dorman, D. (2003). RFID Poses No Problem for Patron Privacy. American Libraries, 34 (11).
Reference ListElectronic Frontier Foundation. (2005, February,). RFID Tracking Pilot Program ended in Sutter School. Retrieved from http://www.eff.org/press/archives/2005/02/17.
Evans, W. (2007, June / July). Arphids in Ascendance: Librarians need to get cozy with the new RFID culture. American Libraries, 58.
Falken Secure Networks. Retrieved September 15, 2009, from www.falkensecurenetworks.com.
Finkenzeller, K. (2003) . RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. (2nd ed.). (Rachel Waddington Trans.). West Sussex, England: John Wiley & Sons Ltd.
Givens, B., Tien, L. (2004, January,). RFID implementation in libraries. Presentations to ALA Intellectual Freedom Committee. San Diego, CA: Retrieved from http://www.privacyrights.org/ar/RFID-ALA.htm
Hadro, J. (2009). Overview: Revisiting RFID in libraries. Library Journal/netconnect, Winter, S1-S2.
Reference List
Haley, C.K., Jacobsen, L.A., & Robkin, S. (2007). Radio frequency identification handbook for librarians. Westport, CT and London: Libraries Unlimited, Greenwood Publishing Group.
Heinrich, C. (2005). RFID and Beyond: Growing Your Business Through Real World Awareness. Indianapolis, IN: Wiley Publishing, Inc.
Intermec Technologies Corporation. (2007). ABCs of RFID: Understanding and Using Radio Frequency Identification. Intermec, n.a.(n.a.). 2- 5.
Jacobsen, L., & Haley, C. (2008). Report of the LITA RFID interest group meeting. american library association midwinter meeting, seattle, january 2007. Technical Services Quarterly, 25(3), 79-82.
Kieczykowski, E. (2009, Winter). The Case of RFID in San Bernardino. Library Journal: Reed Business Information, n.a (n.a), S8-S10.
Laws, R. D. (2008). [The complete RFID handbook]. The Journal of Academic Librarianship, 34(2), 170-171.
Reference List
Libramation. (2009). Dual Aisle Plexi – Tech Gates. Retrieved September 22, 2009 from http://libramation.com/home.html.
Libramation. (2009). Roll of RFID tags. Retrieved September 22, 2009 from http://libramation.com/Pages/prod_radio.html.
Library Computer Child, Retrieved September 21, 2009, from www.pharos.com/images/main/library-computer-child.jpg.
Library Kiosk, Retrieved September 21, 2009, fromwww.cardiff.ac.uk/insrv/images/news/image_73121_web.jpg.
LITA RFID interest group. Retrieved September 21, 2009, from http://www.ala.org/ala/mgrps/divs/lita/litamembership/litaigs/rfidtechnology/index.cfm
Man with Child, Retrieved September 21, 2009, from www.morerfid.com/upload/report/2008/checkpoint_080623-1.jpg.
Reference Listn.a. (2004, May). RFID Raises Questions in SF, Other Libraries. Newsletter on Intellectual Freedom, 53 (3). 92 - 92.
n.a. (2005). RFID: More Worrisome Than You Think. Public Libraries, 44 (6), 1-2.
n.a. (2005) Tiny Trackers: Protecting Privacy in an RFID world. Newsletter of Intellectual Freedom, 54 (6), 273 – 276 & 315 – 321.
McGuire, D. (2006, May 1). RFID Privacy Test Practices Aim to Protect Consumers. Center for Democracy & Technology, 1-4.
Narver, J. (2009). RFID and Library Financial Security. Feliciter, 55 (2), 46 – 49.
Oder, N. (2003, November 15). RFID Use Raises Privacy Concerns: Tags Help Foster Circulation and Fight Theft; Standards Needed. Library Journal, 128 (19), 19-20.
Reference List
Palmer, M. (2009). Making the most of RFID in libraries. London: Facet Publishing.
Products: RFID Library Management. Retrieved September 21, 2009, from www.cbb-middleware.com/ibit/Index_files/images/library_rfid_1.jpg.
Schuyler, M. (2004, January), RFID Helpmate or Conspiracy? Computers in Libraries: the View From the Top Left Corner, 24 (1), 22-24.
Shahid, S. Md., (2005, Fall). Use of RFID Technology in Libraries: a New Approach to Circulation, Tracking, Inventorying, and Security of Library Materials. Library Philosophy and Practice, 8 (1), 1-9. Retrieved September 3, 2009, from http://www.webpages.uidaho.edu/~mbolin/shahid.htm.
Singh, J., Brar, N., Fong, C. (2006, March) . The State of RFID: Applications in Libraries. Information Technology and Libraries, 25 (1), 24 - 32.
Smart, L. J. (2005, January). Considering RFID: Benefits, limitations, and best practices. College & Research Libraries News, 66(1), 13-16, 42.
Reference List
Strickland, L. S., Hunt, L. E. (2005). Technology, Security, and Individual Privacy: New Tools, New Threats, and New Public Perceptions. Journal of the American Society for Information Science and Technology, 56 (3), 221-234.
Sweeney, P. J. II.(2005) . RFID for Dummies. Indianapolis, IN: Wiley Publishing, Inc.
Tien, L. (2005/2006, Winter). Location Tracking, RFID, & Libraries. Progressive Librarian, (26), 3 - 10.
Vatican Library. Retrieved 21, 2009, fromwww.artremis.com/article/pics/vatican_library3.jpg.
Ward, D. M. (2007). The complete RFID handbook: A manual and DVD for assessing, implementing, and managing radio frequency identification technologies in libraries. New York, NY: Neal-Schuman Publishers, Inc.
Williams, B. K., Sawyer, S. C. (2010). Using Information Technology: A Practical Introduction to Computers & Communications. (8th ed.). New York, NY: McGraw-Hill, 276.
Reference List
Woodward, J. (2007) . What Every Librarian Should Know About Electronic Privacy. Westport, CT: Libraries Unlimited.
Yu, S. (2007). RFID implementation and benefits in libraries. The Electronic Library, 25(1), 54-64. Retrieved September 17, 2009, from Emerald Library Suite database.