DIGITAL LIBRARY SECURITY SYSTEM



What is a good digital library? As was pointed out in Fuhr, Hansen, Mabe, Micsik, and So¨lvberg (2001),the answer to this question depends on whom you ask. Many consider that what differentiates a good DL from a not so good one is the quality of its services and content. In previous work, we have sought to formally elaborate the notion of digital libraries using the 5S framework (Gonc¸alves, Fox, Watson, & Kipp, 2004).

Since one of the main goals of that work with 5S was to try to answer (at least partially) the question ‘‘What is a digital library?’’ our hypothesis in this article is that further development of the theory will allow us to define critical dimensions and indicators of DL quality. The ‘‘digital’’ nature of digital libraries allows automatic assessment and enforcement of those quality properties, thereby supporting prevention and elimination of quality problems, which may be more difficult in physical libraries.

5S gives a standard terminology to discuss these issues in a common framework. Moreover, the formal nature of our DL theory allows us to add precision as we define specific DL quality dimensions and corresponding numeric indicators. In this article, we will follow the standard terminology used in the social sciences (Babbie, 1990).We will use the term composite quality indicator1 (or in short quality indicator) to refer to the proposed quantities instead of the stronger term quality measure. Only after one has a number of indicators, and they are validated2 and tested for reliability,3 can they be composed into reliable ‘‘measures’’. Despite partial tests of validity (for example, through focus groups)4 the proposed quality indicators do not qualify as measures yet. Also, it should be stressed that the proposed quantities are only approximations of or give quantified indication of a quality dimension.

They should not be interpreted as a complete specification of a quality dimension, since
more factors/variables could be relevant than are specified here. We will, however, reserve the right to use theterm ‘‘measure’’ when talking about standard measures that have long been used by the CS/LIS communities.The distinction should be clear in context.
This article is organized as follows. Section 2 provides background and context necessary to understand the remainder of the article. Sections 3–6 present all the dimensions of quality, the proposed indicators, and their applications to key DL concepts. Section 7 deals with the connections between the proposed dimensions and Borgman et al.’s Information Life Cycle (Borgman, 1996). Section 8 shows the evaluation of the proposed quality model with a focus group. Section 9 covers related work and Section 10 concludes the article.

1. Library Security System Only:

Phase Action:

Using RFID Tag replace EM Security Stripe

Phase Target:

1.    Radio Frequency Detection

   2. Replace the EM Anti-theft system to avoid the high volume EM field harm human body
       and without False  Alarm.

 Equipment & parts needed:

1.    Anti-theft Detection Gate - Detect the RFID Tag on Book and Check EAS Status, System alarm when the EAS status is ON.

2.    Security Processing Station - Turn On or Off the EAS Setting of the Chip


   3. RFID Tags

2. Support Library Circulation:

Phase Action:

Using RFID tags replace the barcode in Circulation process. Reading book’s access number from RFID than from barcode to borrow and return the book.

Phase Target:

   1. No line of sight needed
   2. Allows to check-out and check-in several items simultaneously
   3. Performing both identification and antitheft in one single operation

Equipment & parts needed:

   1. Counter Station
   2. New Integrated Library System functions - read from RFID and set the EAS status.
   3. Patron Self Check-in/Check-out:

3. Patron Self Check-in/Check-out:

Phase Action:

Let patron do the check-out and check-in process of books.
Phase Target:

1.    Benefit to Librarian:

          * Speeds up book check-in / check-out

          * Frees staff to better service patrons

          * Better space planning

2.    Benefit to Patrons:

          * Easy to use: books can be read in any orientation

          * Reduces queuing time

          * Provides patron privacy

Equipment & parts needed:

1.    Self Check Station - Perform patron self check-out and check-in process and turn off or    
turn off the EAS status

2.    Book-Drop - Indoor or Outdoor. After patron drop in the book into this station, book’s id is  checked and turned on the EAS simultaneously

3.    Remote Book-drop - Long distance away from library, Acquire better protection of the
       Book-drop

   4. Sorting station - Sorting the return books automotive or manual.


4. Smart and Quick Inventory:

  Phase Action:

          Search and Inventory by reading the RFID using portable reader and portable computer

Phase Target:

1.    Quick inventory

2.    Look up the misplace material

   3. Search for certain material

Equipment & parts needed:

1.    Portable RFID reader

2.    Portable Computer - Notebook PC or PDA

   3. Inventory & Searching software

RFID Transponder:

Lib Best Library RFID Management System - RFID Tag
An RFID tag is the most important link in any RFID system. It has the ability to store information relating to the specific item to which they are attached, rewrite again without any requirement for contact or line of sight. Data within a tag may provide identification for an item, proof of ownership, original storage location, loan status and history.

RFID Tag consists of an integrated circuit and an antenna combined to form a transponder. RFID tags collect the energy to operate from a Radio Frequency (RF) field emitted by a reader device; therefore they do not need a battery. When energized by a radio signal from a fixed position reader or handheld scanner, the tag returns the stored information in order that the item to which it is attached can be easily located.

The chip also has a "multi-read" function, which means that several tags can be read at once.

RFID tags have been specifically designed to be affixed into library media, including books, CDs, DVDs and tapes.
RFID Transponder

It is thin, flexible and thus can be laminated between paper and plastic. With special method to attach to books, patron is totally unaware that the tag is there.

KEY BENEFITS:

    * No line of sight needed

    * Allows to check-out and check-in several items simultaneously

    * Information directly attached to product

    * Performing both identification and antitheft in one single operation

    * Different shape and sizes available

    * Able to tag almost anything

    * Accelerate scanning and identifying

Counter Station:

Lib Best Library RFID Management System - Counter Station
The LibBest™ Counter Station is a staff assisted station on services such as loan, return, tagging, sorting and etc. It is loaded with arming/disarming module, tagging module and sorting module. Arming/Disarming module allows EAS (Electronic Article Surveillance) bit inside the tag of the library material to be set/reset so as to trigger/not trigger the alarm of the EAS gate. Checking of EAS status of library material is easy. The staff puts the item on the reader and click on the view to display the information stored inside the tag and status of EAS. There are also feature of Auto Arming and Auto Disarm. Auto Arm/Disarm will automatic arm/disarm library material that is within the Reader range.

Together with circulation module from Library Management System Software, this station is used for the following services:

    * Editing and updating of patron’s record

    * Add and deleting of patron’s record

    * Generate loan history for a particular patrons

    * Managing of fines incurred by the patron

    * Arm/Disarm of EAS bit inside the library material

    * Program of new library material

    * Sort item in accordance to their branch and category number

    * The features of this station depend on the module loaded by the Library  
        Management  Software

KEY BENEFITS:

    * Provide Value Added Customer Service instead of manual daily routine

    * Perform media check-in/-out for those patrons who choose not to use the  
       self service System

    * Help patron that need assistance from the staff

Installation Examples:

Library RFID Counter Station 1     Library RFID Counter Station 2
Self Check out / in Station 1

The Patron Self Check-out station is basically a computer with a touch screen and a built-in RFID reader, plus special software for personal identification, book and other media handling and circulation. After identifying the patron with a library ID card, a barcode card, or his personal ID number (PIN), the patron is asked to choose the next action (check-out of one or several books). After choosing check-out , the patron puts the book(s) in front of the screen on the RFID reader and the display will show the book title and its ID number (other optional information can be shown if desired) which have been checked out.

The patron then confirms that he has finished the check-out process and a receipt is printed, showing which books have been borrowed and the return date. The RFID tag in the book is set on quiet as a result no alarm will go off at the EAS gates.

It is also possible to use the station for Check-In (return) of books. In this case the patron identifies herself, chooses return and then puts one book or a stack of books onto the reader. She will receive a receipt. If the books were to be taken through the gate now, an alarm would sound.

One important point for library productivity is that the whole process is significantly less time consuming than with barcode and magnetic strip system; therefore long lines are avoided and fewer stations are needed for the same process.

KEY BENEFITS:

1.    To Librarian:

          * Speeds up book check-in / check-out

          * Frees staff to better service patrons

          * Better space planning

          * Increases membership rate

2.    To Patrons:

          * Easy to use: books can be read in any orientation

          * Reduces queuing time

          * Provides patron privacy

          * Encourages patrons to come back


Installation Examples:

Library RFID Self Check Station 1           Library RFID Self Check Station

Book-Drop (Return Station)

LibBest Library RFID Management System - Book Drop
LibBest Library RFID Management System - Book Drop2

Smart BookDrop

LibBest Library RFID Management System - Book Drop2
The Book Drops can be located anywhere, within or outside the library. Possible remote locations outside the library include MRT/train stations, shopping centers, schools, etc.This offers unprecedented flexibility and convenience of returning library items at anytime of the day, even when the library is closed.

Patron inserts the library item into the slot. The reader captures the electronic signature and sends to backend system for loan cancellation. Patron is acknowledged by beeping sound and flashlight. Patron’s record is updated immediately. This is possible due to the seamless link between LibBest Library RFID Management System and the host computer system. As such, users who have reached their loan quota can start borrowing items once they have returned them through the Book Drop.

KEY BENEFITS:

    * The ability to return books during off hours.
    * Loans for the returned items will be instantaneously cancelled so that patron may
       immediately borrow again

    * Librarians are able to allocate more time to customer service, as they are free from the   
       labor-intensive loan cancellation activity associated with barcode system

    * Display the return status and printing receipt.

    * The design of the Book Drops is such that items cannot be retrieved back once
      deposited.


OPTIONS:

    * Accept special design

    * Able to Integrate with Auto-Sorting system

New Design

 Smart Book-Drop with Smart Bin

    * Smart Book-drop - Able to reject the improper book to return.
    * Smart Bin - Protect book from falling, alarm when it is 80% and 100% full.

Shelf Management System

The Lib Best TM Shelf Management Solution makes locating and identifying items on the shelves an easy task for librarians. It comprises basically of a portable scanner and a base station.

The solution is designed to cover three main requirements:

    * Search for individual books requested
    * Inventory check of the whole library stock
    * Search for books which are miss-helved

RFID EP

All these functions are performed by sweeping the portable scanner across the spines of the books on the shelves to gather their identities. In an inventory check situation, the identities collected are compared with the database and a discrepancy report could be generated.

In situations when search function is required, whether for a particular item or an item category, the information is first entered into the portable scanner from the base station, and when a foreign item is found on the shelves, a built-in beeper sound to alert the librarians.

KEY BENEFITS:

   1. Changes inventory process:
          * No more book handling: just pass the reader across shelved books to perform an
            instant inventory

          * Accuracy: book identification numbers are registered in the Shelf-Management
             Reader. The data is then downloaded to the central database
         
          * The fastest inventory you have ever made: 20 books per second.

          * Notification: books to be pulled are up-loaded to the reader for quick identification.

   2. User friendly:

          * Light weight

          * Wand allows easy reading of high and low shelves

   3. Saves time and resources:
          * Implementers indicate a 75% reduction in human resources required for shelf
             management activities.

Anti-theft Detection

The LibBest™ RFID EAS Gates is the anti-theft part of the  Library  RFID Management System using the same RFID tags embedded in the library items. Each lane is able to track items of about 1 meter and would trigger the alarm system when an un-borrowed item passed through them. The alarm will sound and lights on the gate will flash as patron passes through with the un-borrowed library material.

The EAS Anti-Theft Gates is used to detect RFID tag that is equipped with EAS (Electronic Article Surveillance). It can detect the RFID tags within 1 meter range without interference of magnetic items, Upon detecting of Armed RFID tags, the alarm will sound on the gate. It has option to trigger a Camera to record patrons who trigger the alarm to the Surveillance Station.

Theft detection is an integral feature of the chip within the tag. It is a stand-alone technology, which operates independently of the library database.

FEATURES:

    * Detect EAS Armed RFID tags

    * Multi-item detection

    * Able to integrate camera with the gate (Option)

    * Gale to integrate with Surveillance Station (Option)

KEY BENEFITS:

    * Single technology is required for both inventory and theft management of the library.

    * Library staff are alerted immediately when un-borrowed items pass through the theft
      detection gates.

    * Would-be thieves are deterred by the physical presence of the gates.

    * Number of patrons passing through the gates is captured by a counter on the gates Alarm
       volume can be easily controlled.


Installation Examples:

Library RFID Anti-theft Gate 02     Library RFID Counter Station 3

Library RFID Anti-theft Gate 01a   Library RFID Counter Station 1b
Library RFID Management System


SIX SENTENCE About RFID FOR LIBRARY


1.    RFID tags replace both the EM security strips and Barcode.

2.    Simplify patron self check-out / check-in.

3.    Ability to handle material without exception for video and audio tapes.

4.    Radio Frequency anti-theft detection is innovative and safe.

3.    High-speed inventory and identify items which are out of proper order.

4.    Long-term development guarantee when using Open Standard.


RFID Technology for Libraries

1.    RFID (Radio Frequency IDentification) is the latest technology to be used in library theft detection systems. Unlike EM (Electro-Mechanical) and RF (Radio Frequency) systems, which have been used in libraries for decades, RFID-based systems move beyond security to become tracking systems that combine security with more efficient tracking of materials throughout the library, including easier and faster charge and discharge, inventorying, and materials handling.

2.    RFID is a combination of radio-frequency-based technology and microchip technology. The information contained on microchips in the tags affixed to library materials is read using radio frequency technology regardless of item orientation or alignment (i.e., the technology does not require line-of-sight or a fixed plane to read tags as do traditional theft detection systems) and distance from the item is not a critical factor except in the case of extra-wide exit gates. The corridors at the building exit(s) can be as wide as four feet because the tags can be read at a distance of up to two feet by each of two parallel exit sensors.


3.    The targets used in RFID systems can replace both EM or RF theft detection targets and barcodes.

Advantages of RFID systems

Rapid check-out / check-in

The use of RFID reduces the amount of time required to perform circulation operations. The most significant time savings are attributable to the facts that information can be read from RFID tags much faster than from barcodes and that several items in a stack can be read at the same time. While initially unreliable, the anti-collision algorithm that allows an entire stack to be check-out or check-in now appears to be working well.

The other time savings realized by circulation staff are modest unless the RFID tags replace both the EM security strips or RF tags of older theft detection systems and the barcodes of the library management system - i.e., the system is a comprehensive RFID system that combines RFID security and the tracking of materials throughout the library; or it is a hybrid system that uses EM for security and RFID for tracking, but handles both simultaneously with a single piece of equipment. There can be as much as a 50 percent increase in throughput. The time savings are less for check-out than for check-in because the time required for check-out usually is extended by social interaction with patrons.
Simplified patron self check-out / check-in

For patrons using self check out, there is a marked improvement because they do not have to carefully place materials within a designated template and they can check out several items at the same time.

Patron self check-in shifts that work from staff to patrons. Staff is relieved further when readers are installed in book-drops.
High reliability

1.    The readers are highly reliable. RFID library systems claim an almost 100 percent
detection rate using RFID tags.
2.    There is no false alarm than with older technologies once an RFID system is properly
tuned.
3.    RFID systems encode the circulation status on the RFID tag. This is done by designating a bit as the "theft" (EAS) bit and turning it off at time of check-out and on at time of check-in. If the material that has not been properly check-out is taken past the exit sensors, an immediate alarm is triggered.

Ø  It has the capability for multiple applications

Ø  It provides effective and efficient library detection system

Ø  It has improved users satisfaction substantially

Ø  It has enhanced the security level of collections

Ø  It has removed various repetitive work carried out by the staff

Ø  It has enabled us to update the database in real time environment


High-speed inventorying

A unique advantage of RFID systems is their ability to scan books on the shelves without tipping them out or removing them. A hand-held inventory reader can be moved rapidly across a shelf of books to read all of the unique identification information. Using wireless technology, it is possible not only to update the inventory, but also to identify items which are out of proper order.
Automated materials handling

Another application of RFID technology is automated materials handling. This includes conveyer and sorting systems that can move library materials and sort them by category into separate bins or onto separate carts. This significantly reduces the amount of staff time required to ready materials for re-shelving.
Long tag life

Finally, RFID tags last longer than barcodes because nothing comes into contact with them. Most RFID vendors claim a minimum of 100,000 transactions before a tag may need to be replaced counter


Patron Card Process System

Components:

v  Card Printer (Double Side printing)

v  Digital Webcam & Tripod

v  Mid Range RFID Reader/Writer

v  Capture, Edit & Printing Software

v  Price not include PC & Monitor


KEY BENEFITS:

    * Double Side Card Printing will set librarian print patron card without changing side of card.

    * Library can make patron card in quick way and without patron to bring their own photo.

    * It is best way to serve patron.

    * Connect to Integrated Library System Directly (this option depend on ILS/LMS system)


Disadvantages of RFID systems

v  Lack of Trained Staff

v  Shortage of Staff

v  Leaving the Trained Staff

v  Removing Installed RFID Tags

v  Initial Activation problem in Tags

v  Training of Users and Staff


v  Application Areas @ IIT Madras

v  Library Security

v  Transactions

v  Location of Publications

v  Users Autonomy

v  Users Dependent Services

v  Stock Management

v  Quality and Excellence in Services


Resources

Anderson, J. P., Computer Security Technology Planning Study, ESD-TR-73-51, ESD/AFSC, Hanscom AFB, Bedford, MA  at http://seclab.cs.ucdavis.edu/projects/history/seminal.html

Department of Defense Computer Security Evaluation Center; Trusted Computer System Evaluation Criteria (Orange Book);  at http://seclab.cs.ucdavis.edu/projects/history/seminal.html.

Trusted Computing Group: Home page,

England, P., Lampson, B., Manferdelli, J., Peinado, M., and Willman, B.: A
trusted open platform. IEEE Computer, 36(7):55

DeTreville, J.: Binder, a logic-based security language. In Proceedings of the
IEEE Symposium on Security and Privacy, pages 105–113

Microsoft Security and Privacy Home Page

No comments:

Post a Comment

leave your opinion