Article information:
Access to this document was granted through an Emerald subscription provided by emerald-srm:600842 []
For Authors
If you would like to write for this, or any other Emerald publication, then please use our Emerald for
Authors service information about how to choose which publication to write for and submission guidelines
are available for all. Please visit www.emeraldinsight.com/authors for more information.
The current issue and full text archive of this journal is available at
www.emeraldinsight.com/0264-0473.htm
EL
29,1
36
Purpose This paper aims to propose the idea of developing an automatic Radio Frequency
Identification (RFID)-based system for library search and to examine the existing literature to
determine whether current technology and developed RFID-based systems are helpful for building
that. To fully understand its key points, adoptions, risks, and benefits, the fundamentals of radio
frequency are to be identified and reviewed. Some applications of radio frequency identification in
library systems and various industries are to be briefly discussed and four related cases
reviewed.
Design/methodology/approach The paper identifies key benefits and risks of radio frequency
identification through review of library literature and case studies. For this purpose, four cases are
reviewed from the entire industry and then key features of those cases are matched with the
requirements of the big pictures RFID-based system to determine the current level of the RFID-based
system development.
Findings To make library systems functional and successfully operational RFID solutions can be
used to reduce operating costs through decreasing the labor costs, enhancing automation, improving
tracking and tracing, and preventing the loss of materials under any circumstances.
Originality/value The proposed automated RFID-based system is a novel idea by itself. Owing to
the fact that better management of books and materials becomes possible, materials are not lost, theft
is avoided, and patrons are served on time and correctly.
Keywords Readers, Libraries, Applications, Automation, Tracking, Case studies
Paper type Research paper
1. Introduction
Picture a library where each book has its own place on a particular shelf. Patrons like
to take a book off the shelf, browse it through and then put it away and take another
one and do the same until the right book is found. There are some people who put back
the book in the right place but many people either leave the books in some corner of the
library or return them to the wrong locations. This latter situation is hard to detect and
can become a librarians nightmare. Until books find their rightful homes, with limited
number of staff that a library has, days will pass and in some cases more time is
needed. When a patron needs a book for research or even leisure and needs it
immediately needed then tracking down the missing book starts the librarian gets
called in, and sometimes management hears about the case as well. In this case,
tracking and tracing is not easy and finding the book somewhere in a very large public
or university library is not a simple task. Do tagging book and materials in the library
help such situations?
The author appreciates the anonymous reviewers useful and constructive suggestions.
Curran and Porter (2007) have proposed and outlined a library prototype that
utilizes Radio Frequency Identification (RFID) to enhance and speed up the current
customer book search and identification processes. The hardware used in the design
and implementation of the prototypes are a laptop to host the server, a router to create
the wireless network, a PDA to host the applications, RFID tags and an RFID reader to
carry out the RFID communication. The user can search for a book on the shelf by
entering the book information in any of the search criteria text boxes and pressing the
Search button. The system has to search the database to return the appropriate book
(Curran and Porter, 2007). The functionality and benefits offered by the RFID systems
match the needs and areas of improvement for libraries. The development and
evaluation of the library application has demonstrated that RFID can be successfully
integrated into library systems.
According to 3M, 2 per cent of libraries in the USA use RFID technology and 8 per
cent worldwide. One such library is at the University of Guelph, in Ontario, Canada,
which has had its books tagged since at least 1991 (Gazette, 2006). Another public
library is in Shenzhen, China, which has over 500,000sq.ft and around 2 million books
tagged. Tagsys was involved in that project as well as Seattles Public Library (Curran
and Porter, 2007). With regard to the library use of RFID, Seattles RFID library project
is the largest in the world, with Shenzhens in second place. All RFID vendors in the
library market offer a product with anti-collision (the ability to read several tags
simultaneously). The actual speed at which this can be performed, and total number of
tags that can be read does vary considerably (Curran and Porter, 2007).
This article proposes an automatic RFID-based system for library search and
examines the existing literature to determine whether current technology and the
developed RFID-based systems are unique to help in building such a system. The rest
of this article is organized as follow. Section 2 describes the active verses passive tags.
Section 3 discusses RFID frequencies and the costs. Section 4 is about the RFID use in
library. Section 5 discusses the risks in relation to its usage in library. Section 6
discusses some ideas about the RFID benefits in libraries. Section 7 presents the
automatic RFID-based system for library search, which is named the Big picture
RFID-based system. In section 8, four cases along with their RFID-based systems are
reviewed where each can be used to develop a portion of the proposed Big-picture
RFID-based system. Section 9 is devoted to the research findings and
recommendations. Management implementation is described in section 10. The
authors conclusion is given in section 11.
2. RFID: active and passive tags
Radio frequency identification is a term used for technologies utilizing radio waves for
identifying individual items automatically. The most common way is storing a serial
number identifying a product and related information on a microchip attached to an
antenna. RFID is used very similar to bar codes. It is designed to track items without
requiring a line of sight. To read a bar code its lines had to stay in sight of the scanner
to identify product correctly. Radio Frequency Identification is a location
determination technology that has been receiving a lot of commercial attention in
recent times, especially in the areas of asset tracking and supply chain management.
RFID is not a new phenomenon. It has been around for decades. It was used initially
for proximity access control. Thereafter, it was evolved-to-be-used in supply chain
37
EL
29,1
38
tracking, toll barrier control, and even protecting automobiles (Potter, 2005). There are
four types of tags in industry:
(1) Passive.
(2) Active.
(3) Semi passive.
(4) Semi active[1,2].
Table I.
Differences between
active and passive tags
Issues
Power sources
Power availability
Communication range
Data storage
Signal strength from tag to reader
Signal strength from reader to tag
Weight
Capabilities
Operational life
Memory
Cost
Internal
Continuous
Long range
Large
High
Low
120-130 grams
Read/write
Five to ten years
2mB
$100
13.56 MHz, 2.45 GHz and 5.8 GHz and for UHF 860-950 MHz. Low frequency tags work
along 120KHz-140KHz frequencies while high frequency tags work along the
13.56 MHz radio frequencies. Ultra high frequency (UHF) tags work along the
850-900 MHz range. Low frequency tags are less expensive and use less power
compared to other kinds of tags, though high and ultra high tags have better ranges
and transfer data faster. However, these two types of tags use more power and are
more expensive. Table I summarizes the areas of application of various chips for
different frequencies (Card Technology Today, 2004). Knowing that producers target
specific industries once begin to produce a tag and try to expand to other areas as well
it is important to know the producers and users at the same time.
The RFID reader acts as a transmitter/receiver. The reader transmits an
electromagnetic field that wakes-up the tag and provides the power required for the
tag to operate. RFID readers usually cost around $1,000-2,000. The tag cost can be
broken down into the following components:
.
chip;
.
inlay/substance with antenna;
.
assembly; and
.
licensing.
39
Chips cost is about $0.25 to $0.35 while inlay cost ranges from $0.02 to $0.10 and
assembly from 0.02 to 0.04. In comparison with the price of one chip being estimated to
reach $0.05 in year 2004 it is still very high (Chao et al., 2007). The cost of RFID tags by
frequencies is given in Table II. There exist few ways in helping to reduce costs
significantly:
.
utilization of a universal RFID chip that can be used for many applications;
.
capable of handling multiple applications;
.
reducing the cost of packaging antenna to the chip; and
.
automatic handling versus manual.
4. RFID use in libraries
There are voices on the side of the use of RFID in the libraries as well as not using it.
Arguments presented in favor of RFID implementation in libraries by Chachra and
McPherson (2003) are that:
Frequencies
125-134 KHz
13.56 MHz
433.05-434.79 MHz
865-868 MHz
866-869 and 923-969 MHz
902-928 MHz
952-954 MHz
2,400-2,500 and 5.725-5.875 GHz
Table II.
Tag frequencies used by
different countries
EL
29,1
.
.
.
40
There are others who have concerns about the use of RFID in the libraries of the future.
David Dorman (2003) refers to concerns about RFIDs as a hullabaloo. Librarians
should keep in mind that since the many of the integrated library systems and RFID
vendors have a vested interest in promoting the use of RFIDs for increased sales that
will assist their companys profitability, so it is natural that they will minimize the
security concerns. Some RFID vendors are responding to the security criticisms and
are now offering a next generation of RFID labels that reportedly have improved
security features than those labels previously available (Wray, 2006).
Management of an organization must determine whether adopting RFID will be
beneficial to its firm or one of its subsidiaries or its processing units or not.
Performance metrics should be aligned with the firms objectives and reflect such
topics as improved cash-to-cash cycles, leaner inventories, reduced stock outs, and
more accurate data (Spekman and Sweeny, 2006).
5. RFID risks in library
To implement RFID, gaining management commitment is a big challenge. Here,
management looks into the Return On Investment (ROI) to assess RFID investment
before commits to its implementation. A challenge that companies face with is the high
cost of implementation. To justify the adoption of RFID technology into business,
cost-benefit analysis is a must. The key risks factors relate to the library of the future
having RFID-based system with the identified capabilities are discussed in the
following.
Initial cost
The cost is one of the major factors influencing acceptance of RFID, although the
production costs of RFID have reduced and Alien Technology has cut the tag price to
less than $US0.20 (Collins, 2004). At present, the costs of RFID adoption comprise the
major investment in hardware, application software, middleware, and tags, and the
cost of integrating the RFID-based system with the legacy systems, of consultancy
fees, and of employee training. Therefore, the cost of RFID tags may continue to
present a major hurdle for RFID deployment.
IT infrastructure cost
Another cost of RFID adoption for many companies is the major investment in large
scale IT infrastructure. Other costs for RFID adoption may be significant, including the
purchase of initial hardware/software, integrating RF-enabled technology into
distribution and warehousing activities and existing management systems, and
additional maintenance costs for application upgrades, readers and software, and
employee training (Smith, 2005). A library with over 200,000 collections must have
sufficient funds to invest in the purchase of tags alone although, the costs for the
reader, peripheral equipment and application software will be even more of the
problem. With the economic crisis in most cities and countries around the world it is
most likely that a great number of public libraries cannot own an independent and full
RFID-based system soon.
41
EL
29,1
42
system. Between 5-10 trillion bar codes are printed every year, and approximately 5
billion bar code scans occur every day (IDTechEx, 2006a, b; Wyld, 2006). Bar codes are
inexpensive, standardized, and, in some cases, are already achieving a satisfactory
performance level. Although the popularity of bar codes is not believed to be a
deterrent per se, their popularity has not helped spread larger-scale RFID deployment
(Smith, 2005). Taking these key issues into consideration, we will notice barcode factor
is a big player in the spread of the RFID.
Patron issues
There may be some patrons that refuse to accept the new RFID-based system at first.
Some patrons might be unfamiliar or unwilling to use any new technology for not
putting their own or family security and privacy at risk. Therefore it may become
necessary to have someone at the library to have free lectures for them or give away
brochures on the topic to patrons discussing the issues. However, it must be mentioned
that RFID patron cards open many opportunities for offering a wealth of information
about individuals. Security based on obscurity, and proprietary protocols, are not
enough (Molnar and Wagner, 2004). This may become an even greater problem if there
is convergence in the protocols and technology that will allow all these systems to
readily talk to one another (Tien, 2005).
6. RFID benefits in library
RFID-based systems include many benefits that surpass their disadvantages and risks.
In the following sections some of these benefits are briefly discussed.
Information management
Barcodes, book cards, and magnetic strips can all be integrated into one RFID tag
(Chachra, 2003). With a suitable RFID tag that has memory for recording information
and then supplying it to the system, bibliographical records and circulation status can
be stored on that. This system is capable of locating the location of material in the
library when it is necessary to be located. Videotapes and diskettes are unable to use
magnetic strips to enforce entrance guard because demagnetization will destroy the
data on the material. Because RFID tags do not use demagnetization to modify data,
they can use tags to manage magnetic materials the same as the books (Yu, 2007)
Circulation
With the use of RFID-based system efficient operation of library and circulation
begins. It brings the opportunity of not scanning barcodes one by one at all. Having
RFID readers by the librarians sides they can check in/out books in a short time and
continuously. The verification of materials and controlling the entrance guard for not
taking out materials by someone without checking is easy and highly manageable.
Library cards will include RFID tags. Readers will detect and fetch information from
library cards when patrons enter a library, and it will be transmitted to a backend
system process. After that, the front desk shows loaned materials, overdue books,
reserve materials, and other circulation status on the monitor about this patron.
Librarians depend on these messages to provide service (Yu, 2007).
Inventory
Batch processing can also apply to libraries to perform inventory or shelf reading.
Take hand-held readers to sweep shelves, for instance readers can immediately
detect all of the collection within this range, including abnormal situations such as
books put on the wrong shelf. Libraries can use RFID to replace barcodes and obtain
several advantages (Kern, 2004):
.
reduce queues at the front desk;
.
decrease repeatable tasks;
.
increase interaction with patrons;
.
extend internal security;
.
lower the cost of manipulating and managing collections;
.
procure collections, checking and accepting automation; and
.
raise the efficiency of inventory and arrangement.
Assistance in searching and orientation
The application of RFID in industrial circles provides material flow management
similar to library circulation (Bhuptani and Moradpour, 2005). A library automation
system can only query about check in/out situations. But, it is not possible for that to
determine where it is if it is not at the right place in the shelf. When, as a part of the
RFID-based system, a reader is installed on each gate in the library, once a patron takes
a book or other item and enters another room, the system will detect who took it and
where it was left. Then, this information will be passed to the automation system to
record the position of the material.
Data accuracy and reliability
The effective deployment of RFID has a potential to quickly provide accurate and
reliable data that exceeds the bar coding or manual capabilities available today. This
can have a major impact, particularly in busy libraries such as university libraries and
public libraries in populated areas.
Theft prevention
For those public and university libraries that are in search of technology to keep away
theft from the library by not allowing them to take materials without check in them
RFID is the answer. As a tool, RFID is a good technology for providing added security
to the library system. There are various options on how to implement this including
security gates at the entrance and exit points.
Utilization statistics for serials
There is not a proper and accurate method for calculating the reading rates of
magazines that are placed on the periodical racks in the library. Often, many
periodicals are not used at all and some are used far more than expected. General
library systems cannot record when periodicals are used in open shelves and read in
the libraries. Usually, a patrons response to the designed questionnaires is not very
accurate. However, utilizing the detection scope of RFID, it is possible to determine the
location of such materials from the periodical rack and the readers. If readers remain
43
EL
29,1
44
undetected on one tag for a while, this shows that the magazine was taken off the shelf
and is being read.
7. The big picture RFID-based system
The functionality and benefits offered by the RFID systems match the needs of library
systems and the improvements to be made in other situations. The development and
evaluation of the library applications demonstrated that RFID could successfully be
integrated into library systems. However, no single solution can maximize the value of
RFID but rather a combination of technology needs to be taken into consideration to
make the system functional, useful, and manageable. To obtain a necessary level of
visibility, tags need to be read at many points in the system.
The library of the not too distant future will be very different with what we have
today. It will work with a combination of computer hardware/software, RFID
technology, robots, conveyor belts, computer experts, and few librarians. Already
many of these technologies and systems are in place in some libraries. This is a big
picture of the RFID-based system for large libraries where a combination of
technologies is used for wisely managing situations better and more efficiently. RFID
is used to do one or more of the following important tasks, as they are necessary:
.
read tags instead of bar codes;
.
determine the location of materials in the library;
.
trace of the materials;
.
finding whether journals and newspapers are at their place or in use;
.
identify the patron in the library and serve them if it is necessary;
.
check in/out materials;
.
manage the inventory of books and materials;
.
quick identification of lost materials on a hourly/daily basis;
.
online data collection and utilization;
.
prevent from losing its materials through theft or other forms of possible loss;
.
use robots to take books off the shelf for patron or librarian; and
.
use conveyor belt to send book down the line from the shelf to patron or
circulation desk.
A good material-handling system (MHS) as it is used in large warehouses can be
tremendously helpful in the research and university libraries. Since the use of MHS can
be quite expensive for large libraries it is possible to set-up such systems in a portion of
the library having large demands on the hourly and daily basis. Using RFID-based
systems, it is possible to determine where the material is currently located and then by
the help of robots the materials can be brought to the conveyor belt and routed easily to
the patron or circulation desk. This is quite possible with the aid of the current
technology if the working system at the library is an RFID-based system.
8. Case studies
If RFID is to achieve the level of adoption that has been forecast, it is important to
understand the capabilities and limitations of the technology as it evolves, its
application areas, and various types of its applications. In this section, four newly
developed RFID-based systems are reviewed. Although, these RFID-based systems are
each developed for a purpose other than the library use these research results can be
employed for building the RFID-based system of the big-picture described in section 7.
Each of these systems has some capabilities necessary for building this library of the
future. Case 1 describes the concept of traceability of highly important for the
management of library. Case 2 is about the RFID-based system with data collection
capability while case 3 discusses an automated RFID-based service system developed
for running a restaurant with the aid of a conveyor belt. Case 4 discusses the Bluebot
tracking via robotic system.
Case 1 (traceability)
RFID technology has several advantages in handling enterprises as well as service
organizations. One of its benefits is product traceability. If a product can be tracked
and traced, then obviously the product recall, history analysis, and consumer visibility
can be improved and enhanced. However, few studies have introduced various
methodologies to provide the full traceability of products (Lee and Park, 2008). In a
research conducted by Lee and Park (2008) a novel dynamic tracing task model to
enhance the traceability range along the supply chain beyond simple distribution
channels is proposed. Researchers found that existing RFID data management scheme
has to be modified so as to provide end-to-end traceability. To that end they have
considered two critical characteristics for RFID data namely:
(1) Dynamic.
(2) Procedural.
The dynamic characteristic means that data changes over time but it imposes the
concept of the item being merged with other subparts and being divided into
several components through the production process. While, in procedural case items
will leave a trail of data as they pass through several different locations. As an
object is equipped with a tag, when it passes by the vicinity of a reader it will send
information messages to the interrogator. This process will make the identification
of a tag for the reader at every location creating a consistent path of the object (Lee
and Park, 2008).
Case 2: RFID-based system with data collection capability
A new paradigm of knowledge management called real time enterprise (RTE) is based
on the premise of getting the right information to the right people at the right time in
real time without being late and without delay. The system architecture of Logistic
Process knowledge Based System (LPKBS) is a server based system which offers a
knowledge sharing platform working in a logistics operations environment. The
system architecture of LPKBS comprises five modules (Chow et al., 2007):
(1) Logistic data collection (RFID and Palm).
(2) Data storage (data warehouse).
(3) Process knowledge management (which comprises process monitoring agent,
process rule manipulating agent and process knowledge retrieval agent).
45
EL
29,1
46
previous samples to refine its location. The resulting experiments have shown that
the positioning algorithms can bring a twofold improvement over the positional
accuracy limitations in both the RFID reader and the positioning technology.
Patils prototype system combines (passive) RFID technology and a Wi-Fi
(802.11b)-based continuous location positioning system to provide a periodic
asset-locating sweep. Although, the proposed system uses Wi-Fi based location
positioning, it works with any continuous positioning technology, however. The
prototype system not only identifies but also provides location information of every
RFID-tagged item in the sweep space. As the robot moves, the RF-reader periodically
samples which tags are detectable. At each sample time, the robots position is
obtained from the positioning system. For each detected tag, given the estimate of the
robots current position, knowledge of the readers physical detection range, and the
robots position estimates at previous detections, an algorithm computes an estimate of
the tags position. The results of Patils experiments with the prototype system show
that they are able to estimate positions of tagged entities to within 1.5m, given an
accuracy of the raw positioning system of about 4m. They experimented with different
position estimation algorithms and found that certain algorithms work better than
others when the raw positioning system is capable of giving better accuracy (Patil et al.,
2008).
47
Case 2
Case 3
Case 4
Tag reading
Conveyor belt
Automatic
handling of
foods
Automatic
service
Check-in/out
Bill preparation
Wireless
system
Tracking
Robot
Wi-Fi
positioning
system
RFID-reader
Automatic
location
sensing
Table III.
Listing of RFID-based
systems capabilities
EL
29,1
48
The types of operations that can be done by RFID technology and the benefits
offered by that match the needs of libraries and the areas of improvement that
management have in mind. RFID technology can help in streamlining major library
processes such as stocktaking and book searches. Library employees as well as
patrons share the same convenience and ease of operations. However, patrons can face
risks in libraries with RFID systems unless the rules protecting patrons are changed
and stronger one replaced them. Currently, only about 8 percent of libraries world-wide
are using RFID, but this figure will soon rapidly increases as libraries understand the
benefits and convenience of incorporating RFID into their processes.
As already noted, the library of the future is going to be different from what we
have today. It will be partly made possible with the aid of already existing technologies
(discussed in the previous case studies) plus RFID-based systems. As a continuation of
the ideas outlined in this paper, the author is working with a group of experts from
various fields to make such a prototype RFID-based system with just such additional
technological capabilities a reality for libraries.
Notes
1. What is Radio Frequency Identification (RFID)?, available at: www.aimglobal.org/
technologies/rfid/what_is_rfid.asp/
2. Part 1: Active and Passive RFID: Two Distinct, But Complementary, Technologies for
Real-Time Supply Chain Visibility, available at: www.autoid.org/2002_Documents/sc31_
wg4/docs_501_520/520_18000_ 7_WhitePaper.pdf/
References
Bhuptani, M. and Moradpour, S. (2005), RFID Field Guide: Deploying Radio Frequency
Identification Systems, Sun Microsystems/Prentice-Hall, Upper Saddle River, NJ.
Boulard, G. (2005), RFID: promise or perils?, State Legislatures Magazine, December, pp. 22-4.
Butters, A. (2007), RFID systems, standards and privacy within libraries, The Electronic
Library, Vol. 25, pp. 430-9.
Card Technology Today (2004), Another link in the chain, Card Technology Today, Vol. 16 No. 4,
pp. 11-12.
Chachra, V. (2003), Experiences in implementing the VTLS RFID solution in a multi-vendor
environment, paper presented at World Library and Information Congress: 69th IFLA
General Conference and Council, available at: www.ifla.org/IV/ifla69/papers/132eChachra.pdf (accessed 21 March 2005).
Chachra, V. and McPherson, D. (2003), Personal Privacy and Use of RFID Technology in Libraries,
VTLS, Blacksburgh, VA, pp. 1-7.
Chao, C.-C., Yang, J.M. and Jen, W. (2007), Determining technology trends and forecasts of RFID
by a historical review and bibliometric analysis from 1991 to 2005, Technovation, Vol. 27
No. 5, pp. 268-79.
Chow, H.K.H., Choy, K.L. and Lee, W.B. (2007), A dynamic logistics process knowledge-based
system an RFID multi-agent approach, Knowledge Based Systems, Vol. 20, pp. 357-72.
Collins, J. (2004), Alien cuts tag price, RFID Journal, available at: www.rfidjournal.com/article/
Curran, K. and Porter, M. (2007), A primer on radio frequency identification for libraries,
Library Hi Tech, Vol. 25 No. 4, pp. 595-611.
49
EL
29,1
50
Dorman, D. (2003), RFID poses no problem for patron privacy, American Libraries, Vol. 36
No. 11, pp. 86-7.
Ferguson, R.B. (2006), RFID loses reception: high tag costs are still putting the kibosh on returns
on investment, e-Week, Vol. 23 No. 10, pp. 11-12.
Gazette (2006), More bookstores using RFID, Gazette, October, available at: www.rfidgazette.
org /libraries (accessed 7 August 2007).
Gilbert, A. (2004), Patent problems plague RFID, available at: www.zdnet.com.au/insight/
IDTechEx (2006a), RFID forecasts, players and opportunities 2006-2016, IDTechEx market
research, URL.
IDTechEx (2006b), RFID retail case studies, IDTechEx Case Studies, (URL/.infrastructure,
December 2000).
Jones, P., Clarke-Hill, C., Hillier, D., Shears, P. and Comfort, D. (2004), Radio frequency
identification in retailing and privacy and public policy issues, Management Research
News, Vol. 27 Nos 8/9, pp. 46-56.
Kern, C. (2004), Radio-frequency-identification in libraries, The Electronic Library, Vol. 22 No. 4,
pp. 317-24.
Lee, D. and Park, J. (2008), RFID-based traceability in the supply chain, Industrial Management
& Data Systems, Vol. 108 No. 6, pp. 713-25.
Molnar, D. and Wagner, D. (2004), Privacy and security in library RFID issues, practices, and
architectures, Proceedings of the 11th ACM Conference on Computer and
Communications Security, pp. 210-19.
Ngai, E.W.T., Suk, F.F.C. and Lo, S.Y.Y. (2007), Development of an RFID-based Sushi
management system: the case of a conveyor belt sushi restaurant, International Journal of
Production Control.
Patil, A., Munson, J., Wood, D. and Cole, A. (2008), Bluebot: asset tracking via robotic location
crawling, Computer Communications, Vol. 31, pp. 1067-77.
Potter, B. (2005), RFID: misunderstood or untrustworthy?, Network Security, April, pp. 17-18.
Smith, A. (2005), Exploring radio frequency identification technology and its impact on
business, Information Management & Computer Security, Vol. 13 No. 1, pp. 16-28.
Spekman, R. and Sweeny, P. (2006), RFID: from concept to implementation, International
Journal of Physical Distribution & Logistics Management, Vol. 36 No. 10, pp. 736-54.
Tien, L. (2005), T08 . . . RFID and privacy: potential and perils, program presented at: Michigan
Library Association Annual Conference, Grand Rapids, MI, 25-28 October.
Wray, G. (2006), Turning into radio frequency identification (RFID), Cognotes, Midwinter
Meeting Highlights, p. 10.
Wyld, D. (2006), RFID 101: the next big thing for management, Management Research News,
Vol. 29 No. 4, pp. 154-73.
Yu, S.-C. (2007), RFID implementation and benefits in libraries, The Electronic Library, Vol. 25
No. 1, pp. 54-64.
Further reading
Boss, R. (2004), RFID technology for libraries, Tech Notes, available at: www.ala.org/ala/pla/
plapubs/technotes/rfidtechnology.cfm (accessed 7 August 2007).
Collins, J. (2006), Reading books reduces out-of-stocks, RFID Journal, available at: www.
rfidjournal.com/article/ articleview/2696/
51