1 / 20

RFID ( Remote Frequency IDentification) in Libraries

RFID ( Remote Frequency IDentification) in Libraries. SEMLS Workshop Middleborough Public Library. From notes by M. Lou Nesson For OCLN Tech Roundtable April 6, 2006. Terminology. TAGS – microchip and ISO (still proprietary, no standard yet)

shayla
Download Presentation

RFID ( Remote Frequency IDentification) in Libraries

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. RFID (Remote Frequency IDentification) in Libraries SEMLS WorkshopMiddleborough Public Library From notes by M. Lou Nesson For OCLN Tech Roundtable April 6, 2006

  2. Terminology • TAGS – microchip and ISO (still proprietary, no standard yet) • Checkpoint uses microchip, ISO is used by most other vendors • Life of tag is guaranteed for the life of the book

  3. Examples of RFID Tags

  4. Examples of tags Security access & control card Windshield tag Books in libraries Inventory management

  5. Microchip Pros & Cons • Greater read range and faster transaction speeds • More expensive than ISO

  6. ISO pros and cons • Less expensive • Reduced read range, slower transaction speed because of on/off security bit • One piece tag

  7. RFID COMPONENTS • Long range sensor – wood or plastic form, most RFID vendors, 42” wide eye (ISO = 38”) (Usually 3 needed for most 7 – 8 ft. doorway) • Self checkout station – tabletop, kiosk of built in version usually also has a barcode reader, touchpad screen, also need an RFID patron card. • NOTE: You will still need to barcode books because not all libraries are RFID and will need for them to check-out and track books.

  8. COMPONENTS cont. • Reader – installed under circulation desk counter (about the size of a laptop) plugs into circulation computer already in place on inside of book drop. Note: reads through granite, wood, glass. Con – It picks up the book and applies it to an open patron account on computer – be careful where it is placed (see Worcester Public library) • Inventory wand – performs shelf inventory – reads 15 at a time, search for missing books, search by shelf order

  9. Challenges for Libraries • Growing circulation • Desire to expand other services • Limited budgets • More types of materials

  10. RFID at Worcester Public LibraryAnn A. Robinson, Associate Head Librarianarobinson@cwmars.org508-799-1691

  11. Implementation • Define goals and expectations • Develop ROI model (return on investment) • Involve all departments and staff in process – the hardest part is the tagging of the materials, most time consuming • Use staff and volunteers or 3rd party vendor

  12. Estimate 5 years to interoperability in RFID Vendors • Recommend only putting the barcode on the tag – it will take longer to read and slow down checkout otherwise. • ROI (return on investment)– there is a calculator • Checkpoint has 160 libraries as customers. • See RFID Journal – cost estimate $120,000 for 100,000 volumes – for hardware and tags.

  13. Benefits • Faster – fewer steps, less handling • Real-time – missing, stolen reports • Easier – patron self-checkout – greater use of materials • Less chance for errors • Shorter lines & waiting at checkout • Improved self service, convenience & privacy • More personal assistance form staff • Increased availability of materials

  14. RFID - Checkpoint • Checkpoint will be at PLA in Boston • They also have a chip for videos and DVD's • Developed a locked case for CD’s / DVD's that patron would go through checkout and then insert case in a special piece of equipment to release the lock and take out.

  15. Privacy Concerns • Security issue should be in policy • Not using RFID patron cards • Theft – they do have some ships ripped out of items

  16. Project Management • Team approach – they still meet after implementation • Recommend including IT person in planning • Used staff and library volunteers to put label & chip together • Published newsletter, kept statistics on progress, set up “chipping” stations in areas to be done first. • Team trained staff, checked on compatibility with SIRSI • Only work 1 hour at a time – 2 together make time bearable.

  17. Changes in Workflow • Circ desk now able to do multiple check-in/outs faster • Patrons – started using 9/03 like the privacy and ease • Staff love it, has freed up circ staff for other work, accuracy is very good, less repetitive motion injury.

  18. Results • Good with minor problems • Dealing with Innovative and consortium – there is a delay in processing check-out, Innovative is slower to sense the checkout than RFID is, so sensors go off when patrons leave the library. • Software resides on server @ CWMARS and the process is slowed trying to get through circ software.

  19. SPYCHIPS http://www.spychips.com/ • Catherine Albrecht, EdM., founder of CASPIAN • Consumer Against Supermarket Privacy Invasion and Numbering. http://www.nocards.org/ • Presented lots of controversial reasons why not to do it.

  20. Further reading • http://www.ala.org/ala/pla/plapubs/technotes/rfidtechnology.html • See also Berkeley Public Library – Best Practices for RFID technology (sheet handed out at meeting). • www.rfid-weblog.com • http://rfidexchange.com/

More Related